<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2025-01-29T14:32:57</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:19990077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-1999-0077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-1999-0077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0077" source="CVE"/>
    <reference ref_id="SUSE CVE-1999-0077" ref_url="https://www.suse.com/security/cve/CVE-1999-0077" source="SUSE CVE"/>
    <description>
    Predictable TCP sequence numbers allow spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-1999-0077/">CVE-1999-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-1999-0077">CVE-1999-0077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/954946">SUSE bug 954946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:19990195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-1999-0195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-1999-0195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0195" source="CVE"/>
    <reference ref_id="SUSE CVE-1999-0195" ref_url="https://www.suse.com/security/cve/CVE-1999-0195" source="SUSE CVE"/>
    <description>
    Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-1999-0195/">CVE-1999-0195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-1999-0195">CVE-1999-0195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914171">SUSE bug 914171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009732558" comment="rpcbind is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:19990524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-1999-0524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-1999-0524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0524" source="CVE"/>
    <reference ref_id="SUSE CVE-1999-0524" ref_url="https://www.suse.com/security/cve/CVE-1999-0524" source="SUSE CVE"/>
    <description>
    ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-06"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-1999-0524/">CVE-1999-0524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-1999-0524">CVE-1999-0524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/351997">SUSE bug 351997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20001254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2000-1254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2000-1254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1254" source="CVE"/>
    <reference ref_id="SUSE CVE-2000-1254" ref_url="https://www.suse.com/security/cve/CVE-2000-1254" source="SUSE CVE"/>
    <description>
    crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C bitwise-shift operations that exceed the size of an expression, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging improper RSA key generation on 64-bit HP-UX platforms.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2000-1254/">CVE-2000-1254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2000-1254">CVE-2000-1254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978847">SUSE bug 978847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20010405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2001-0405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2001-0405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0405" source="CVE"/>
    <reference ref_id="SUSE CVE-2001-0405" ref_url="https://www.suse.com/security/cve/CVE-2001-0405" source="SUSE CVE"/>
    <description>
    ip_conntrack_ftp in the IPTables firewall for Linux 2.4 allows remote attackers to bypass access restrictions for an FTP server via a PORT command that lists an arbitrary IP address and port number, which is added to the RELATED table and allowed by the firewall.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-0405/">CVE-2001-0405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-0405">CVE-2001-0405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20010851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2001-0851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2001-0851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0851" source="CVE"/>
    <reference ref_id="SUSE CVE-2001-0851" ref_url="https://www.suse.com/security/cve/CVE-2001-0851" source="SUSE CVE"/>
    <description>
    Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2001-0851/">CVE-2001-0851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2001-0851">CVE-2001-0851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175687">SUSE bug 1175687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:200220001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-20001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2002-20001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001" source="CVE"/>
    <reference ref_id="SUSE CVE-2002-20001" ref_url="https://www.suse.com/security/cve/CVE-2002-20001" source="SUSE CVE"/>
		<reference ref_id="TID000020510" ref_url="https://www.suse.com/support/kb/doc/?id=000020510" source="SUSE-SU"/>
    <description>
    The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2002-20001/">CVE-2002-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2002-20001">CVE-2002-20001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192815">SUSE bug 1192815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199367">SUSE bug 1199367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2003-0252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0252" source="CVE"/>
    <reference ref_id="SUSE CVE-2003-0252" ref_url="https://www.suse.com/security/cve/CVE-2003-0252" source="SUSE CVE"/>
		<reference ref_id="SuSE-SA:2003:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I6YZPNLSOBWCHMIMVHEUYZ7DSVFTAUON/#I6YZPNLSOBWCHMIMVHEUYZ7DSVFTAUON" source="SUSE-SU"/>
    <description>
    Off-by-one error in the xlog function of mountd in the Linux NFS utils package (nfs-utils) before 1.0.4 allows remote attackers to cause a denial of service and possibly execute arbitrary code via certain RPC requests to mountd that do not contain newlines.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2003-0252/">CVE-2003-0252 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2003-0252">CVE-2003-0252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/42744">SUSE bug 42744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/42918">SUSE bug 42918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667767" comment="nfs-client is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667769" comment="nfs-kernel-server is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20031605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-1605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2003-1605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605" source="CVE"/>
    <reference ref_id="SUSE CVE-2003-1605" ref_url="https://www.suse.com/security/cve/CVE-2003-1605" source="SUSE CVE"/>
    <description>
    curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2003-1605/">CVE-2003-1605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2003-1605">CVE-2003-1605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105868">SUSE bug 1105868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-0790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-0790" ref_url="https://www.suse.com/security/cve/CVE-2004-0790" source="SUSE CVE"/>
    <description>
    Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (reset TCP connections) via spoofed ICMP error messages, aka the "blind connection-reset attack."  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0790/">CVE-2004-0790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0790">CVE-2004-0790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-0791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-0791" ref_url="https://www.suse.com/security/cve/CVE-2004-0791" source="SUSE CVE"/>
    <description>
    Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack."  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-0791/">CVE-2004-0791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-0791">CVE-2004-0791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-1060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1060" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-1060" ref_url="https://www.suse.com/security/cve/CVE-2004-1060" source="SUSE CVE"/>
    <description>
    Multiple TCP/IP and ICMP implementations, when using Path MTU (PMTU) discovery (PMTUD), allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via forged ICMP ("Fragmentation Needed and Don't Fragment was Set") packets with a low next-hop MTU value, aka the "Path MTU discovery attack."  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2004-1060/">CVE-2004-1060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-1060">CVE-2004-1060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2004-1074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1074" source="CVE"/>
    <reference ref_id="SUSE CVE-2004-1074" ref_url="https://www.suse.com/security/cve/CVE-2004-1074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2004:042" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IHTGHGQLHSB7SW3AVC34D6BLU2NJT3W2/#IHTGHGQLHSB7SW3AVC34D6BLU2NJT3W2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2004:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MXTG6RXXBY3QGHOP2YGVPYDMYTJGV4EL/#MXTG6RXXBY3QGHOP2YGVPYDMYTJGV4EL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2004:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXE43CN2Y6ATRQWCAO2CIYS57PM343ET/#PXE43CN2Y6ATRQWCAO2CIYS57PM343ET" source="SUSE-SU"/>
    <description>
    The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2004-1074/">CVE-2004-1074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2004-1074">CVE-2004-1074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/63199">SUSE bug 63199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/64493">SUSE bug 64493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0065" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0065" ref_url="https://www.suse.com/security/cve/CVE-2005-0065" source="SUSE CVE"/>
    <description>
    The original design of TCP does not check that the TCP sequence number in an ICMP error message is within the range of sequence numbers for data that has been sent but not acknowledged (aka "TCP sequence number checking"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced.  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2005-0065/">CVE-2005-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0065">CVE-2005-0065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0066" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0066" ref_url="https://www.suse.com/security/cve/CVE-2005-0066" source="SUSE CVE"/>
    <description>
    The original design of TCP does not check that the TCP Acknowledgement number in an ICMP error message generated by an intermediate router is within the range of possible values for data that has already been acknowledged (aka "TCP acknowledgement number checking"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced.  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2005-0066/">CVE-2005-0066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0066">CVE-2005-0066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0067" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0067" ref_url="https://www.suse.com/security/cve/CVE-2005-0067" source="SUSE CVE"/>
    <description>
    The original design of TCP does not require that port numbers be assigned randomly (aka "Port randomization"), which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced.  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2005-0067/">CVE-2005-0067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0067">CVE-2005-0067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0068" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0068" ref_url="https://www.suse.com/security/cve/CVE-2005-0068" source="SUSE CVE"/>
    <description>
    The original design of ICMP does not require authentication for host-generated ICMP error messages, which makes it easier for attackers to forge ICMP error messages for specific TCP connections and cause a denial of service, as demonstrated using (1) blind connection-reset attacks with forged "Destination Unreachable" messages, (2) blind throughput-reduction attacks with forged "Source Quench" messages, or (3) blind throughput-reduction attacks with forged ICMP messages that cause the Path MTU to be reduced.  NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability.  While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2005-0068/">CVE-2005-0068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0068">CVE-2005-0068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173637">SUSE bug 1173637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173639">SUSE bug 1173639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173640">SUSE bug 1173640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173642">SUSE bug 1173642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173643">SUSE bug 1173643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173644">SUSE bug 1173644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173645">SUSE bug 1173645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0210" ref_url="https://www.suse.com/security/cve/CVE-2005-0210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7JEDIHNFVGMBEEMMG6TSRUJV5INAANY/#S7JEDIHNFVGMBEEMMG6TSRUJV5INAANY" source="SUSE-SU"/>
    <description>
    Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0210/">CVE-2005-0210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0210">CVE-2005-0210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/65594">SUSE bug 65594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0400" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0400" ref_url="https://www.suse.com/security/cve/CVE-2005-0400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:029" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KC6TBIRQ3ZUBR7PRCIHVAVNLA6MZBM5O/#KC6TBIRQ3ZUBR7PRCIHVAVNLA6MZBM5O" source="SUSE-SU"/>
    <description>
    The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0400/">CVE-2005-0400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0400">CVE-2005-0400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/75706">SUSE bug 75706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-0749" ref_url="https://www.suse.com/security/cve/CVE-2005-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:029" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KC6TBIRQ3ZUBR7PRCIHVAVNLA6MZBM5O/#KC6TBIRQ3ZUBR7PRCIHVAVNLA6MZBM5O" source="SUSE-SU"/>
    <description>
    The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-0749/">CVE-2005-0749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-0749">CVE-2005-0749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/73837">SUSE bug 73837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1264" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1264" ref_url="https://www.suse.com/security/cve/CVE-2005-1264" source="SUSE CVE"/>
    <description>
    Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1264/">CVE-2005-1264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1264">CVE-2005-1264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/84043">SUSE bug 84043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1265" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1265" ref_url="https://www.suse.com/security/cve/CVE-2005-1265" source="SUSE CVE"/>
    <description>
    The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1265/">CVE-2005-1265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1265">CVE-2005-1265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/84728">SUSE bug 84728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1763" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1763" ref_url="https://www.suse.com/security/cve/CVE-2005-1763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:029" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KC6TBIRQ3ZUBR7PRCIHVAVNLA6MZBM5O/#KC6TBIRQ3ZUBR7PRCIHVAVNLA6MZBM5O" source="SUSE-SU"/>
    <description>
    Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1763/">CVE-2005-1763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1763">CVE-2005-1763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/84078">SUSE bug 84078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-1767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1767" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-1767" ref_url="https://www.suse.com/security/cve/CVE-2005-1767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:044" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YZRS4B6XGJCGOBJ5WLAEFKHEUT75YSU/#4YZRS4B6XGJCGOBJ5WLAEFKHEUT75YSU" source="SUSE-SU"/>
    <description>
    traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-1767/">CVE-2005-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-1767">CVE-2005-1767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/88492">SUSE bug 88492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/90500">SUSE bug 90500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-2098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-2098" ref_url="https://www.suse.com/security/cve/CVE-2005-2098" source="SUSE CVE"/>
    <description>
    The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2098/">CVE-2005-2098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2098">CVE-2005-2098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/100506">SUSE bug 100506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-2458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-2458" ref_url="https://www.suse.com/security/cve/CVE-2005-2458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDSAMPZH66PI7YEBCZDLH2SHXX2NDTOE/#EDSAMPZH66PI7YEBCZDLH2SHXX2NDTOE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2005:068" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7X5COWFH6DSUARPIKBXEP6RR3CFLKOA/#P7X5COWFH6DSUARPIKBXEP6RR3CFLKOA" source="SUSE-SU"/>
    <description>
    inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2458/">CVE-2005-2458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2458">CVE-2005-2458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/100428">SUSE bug 100428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/102323">SUSE bug 102323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/104085">SUSE bug 104085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/114364">SUSE bug 114364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/117169">SUSE bug 117169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/130270">SUSE bug 130270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/132739">SUSE bug 132739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/133577">SUSE bug 133577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/133972">SUSE bug 133972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-2492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-2492" ref_url="https://www.suse.com/security/cve/CVE-2005-2492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2005:068" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7X5COWFH6DSUARPIKBXEP6RR3CFLKOA/#P7X5COWFH6DSUARPIKBXEP6RR3CFLKOA" source="SUSE-SU"/>
    <description>
    The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-2492/">CVE-2005-2492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-2492">CVE-2005-2492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/114365">SUSE bug 114365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-3623" ref_url="https://www.suse.com/security/cve/CVE-2005-3623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:006" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G53K7KVT2Y3XFUN3SU5NBB5BF6VQOSQA/#G53K7KVT2Y3XFUN3SU5NBB5BF6VQOSQA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2006:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XN2T5MRYJLG63WOOOGFB3WYEAZPLUVC/#2XN2T5MRYJLG63WOOOGFB3WYEAZPLUVC" source="SUSE-SU"/>
    <description>
    nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-3623/">CVE-2005-3623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-3623">CVE-2005-3623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/139411">SUSE bug 139411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2005-4881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4881" source="CVE"/>
    <reference ref_id="SUSE CVE-2005-4881" ref_url="https://www.suse.com/security/cve/CVE-2005-4881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
    <description>
    The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2005-4881/">CVE-2005-4881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2005-4881">CVE-2005-4881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/536467">SUSE bug 536467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-3635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3635" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-3635" ref_url="https://www.suse.com/security/cve/CVE-2006-3635" source="SUSE CVE"/>
    <description>
    The ia64 subsystem in the Linux kernel before 2.6.26 allows local users to cause a denial of service (stack consumption and system crash) via a crafted application that leverages the mishandling of invalid Register Stack Engine (RSE) state.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-08"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-3635/">CVE-2006-3635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-3635">CVE-2006-3635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/199440">SUSE bug 199440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/199441">SUSE bug 199441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4623" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4623" ref_url="https://www.suse.com/security/cve/CVE-2006-4623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:079" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXZJTAPEOPVLCSHRFZGAHVOIP7BTJS4F/#PXZJTAPEOPVLCSHRFZGAHVOIP7BTJS4F" source="SUSE-SU"/>
    <description>
    The Unidirectional Lightweight Encapsulation (ULE) decapsulation component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel 2.6.17.8 allows remote attackers to cause a denial of service (crash) via an SNDU length of 0 in a ULE packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4623/">CVE-2006-4623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4623">CVE-2006-4623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/201429">SUSE bug 201429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-4814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4814" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-4814" ref_url="https://www.suse.com/security/cve/CVE-2006-4814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/25OXAAJ2W2YCVZUQYVYEY652FJDO6UME/#25OXAAJ2W2YCVZUQYVYEY652FJDO6UME" source="SUSE-SU"/>
    <description>
    The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-4814/">CVE-2006-4814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-4814">CVE-2006-4814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/207667">SUSE bug 207667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-5701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5701" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-5701" ref_url="https://www.suse.com/security/cve/CVE-2006-5701" source="SUSE CVE"/>
    <description>
    Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5701/">CVE-2006-5701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5701">CVE-2006-5701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/218162">SUSE bug 218162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-5751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5751" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-5751" ref_url="https://www.suse.com/security/cve/CVE-2006-5751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2006:079" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PXZJTAPEOPVLCSHRFZGAHVOIP7BTJS4F/#PXZJTAPEOPVLCSHRFZGAHVOIP7BTJS4F" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IRQT7YGHOGQ5SRWA6KZXO7A6FPXMSHN3/#IRQT7YGHOGQ5SRWA6KZXO7A6FPXMSHN3" source="SUSE-SU"/>
    <description>
    Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5751/">CVE-2006-5751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5751">CVE-2006-5751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/222656">SUSE bug 222656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-5794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-5794" ref_url="https://www.suse.com/security/cve/CVE-2006-5794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2006:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RFUPSAEOFKR6RRF32GRYIJFS3PEAH3A/#3RFUPSAEOFKR6RRF32GRYIJFS3PEAH3A" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-5794/">CVE-2006-5794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-5794">CVE-2006-5794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/219115">SUSE bug 219115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-6106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6106" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-6106" ref_url="https://www.suse.com/security/cve/CVE-2006-6106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/25OXAAJ2W2YCVZUQYVYEY652FJDO6UME/#25OXAAJ2W2YCVZUQYVYEY652FJDO6UME" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IRQT7YGHOGQ5SRWA6KZXO7A6FPXMSHN3/#IRQT7YGHOGQ5SRWA6KZXO7A6FPXMSHN3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HWUDIM4YACOXCFTSRRINC6MMCPCYPFNC/#HWUDIM4YACOXCFTSRRINC6MMCPCYPFNC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:035" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZV7DJBE3IQIJVKDOPKL7SHO5W25BUN2C/#ZV7DJBE3IQIJVKDOPKL7SHO5W25BUN2C" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CN3HDZKMZ6P6RA245W76UX2VHACAIXV7/#CN3HDZKMZ6P6RA245W76UX2VHACAIXV7" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-6106/">CVE-2006-6106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2006-6106">CVE-2006-6106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/227603">SUSE bug 227603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-7246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7246" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTNLI2FZQMIPRDJTMQMJYNP2762EWQAT/#CTNLI2FZQMIPRDJTMQMJYNP2762EWQAT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1270-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAQPACVFA5W6XQVKQLJM3RLPWJ44CW2G/#YAQPACVFA5W6XQVKQLJM3RLPWJ44CW2G" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000033.html" source="SUSE-SU"/>
    <description>
    NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2006-7246">CVE-2006-7246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1047509">SUSE bug 1047509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047511">SUSE bug 1047511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/574266">SUSE bug 574266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/777228">SUSE bug 777228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904466" comment="libnm0-1.22.10-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904467" comment="typelib-1_0-NM-1_0-1.22.10-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-0005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0005" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-0005" ref_url="https://www.suse.com/security/cve/CVE-2007-0005" source="SUSE CVE"/>
    <description>
    Multiple buffer overflows in the (1) read and (2) write handlers in the Omnikey CardMan 4040 driver in the Linux kernel before 2.6.21-rc3 allow local users to gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-0005/">CVE-2007-0005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-0005">CVE-2007-0005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/242996">SUSE bug 242996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-1496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1496" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-1496" ref_url="https://www.suse.com/security/cve/CVE-2007-1496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:043" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC3TJ3F7CMYFURLVDZVROEDG4DWAD5KU/#YC3TJ3F7CMYFURLVDZVROEDG4DWAD5KU" source="SUSE-SU"/>
    <description>
    nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) bridged packets, which trigger a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1496/">CVE-2007-1496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1496">CVE-2007-1496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/270458">SUSE bug 270458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-1497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1497" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-1497" ref_url="https://www.suse.com/security/cve/CVE-2007-1497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:043" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YC3TJ3F7CMYFURLVDZVROEDG4DWAD5KU/#YC3TJ3F7CMYFURLVDZVROEDG4DWAD5KU" source="SUSE-SU"/>
    <description>
    nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fragments.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-1497/">CVE-2007-1497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-1497">CVE-2007-1497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/268298">SUSE bug 268298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/270460">SUSE bug 270460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-2875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2875" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-2875" ref_url="https://www.suse.com/security/cve/CVE-2007-2875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CN3HDZKMZ6P6RA245W76UX2VHACAIXV7/#CN3HDZKMZ6P6RA245W76UX2VHACAIXV7" source="SUSE-SU"/>
    <description>
    Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-09"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2875/">CVE-2007-2875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2875">CVE-2007-2875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/280819">SUSE bug 280819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-2878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2878" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-2878" ref_url="https://www.suse.com/security/cve/CVE-2007-2878" source="SUSE CVE"/>
    <description>
    The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-2878/">CVE-2007-2878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-2878">CVE-2007-2878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/280888">SUSE bug 280888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3104" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3104" ref_url="https://www.suse.com/security/cve/CVE-2007-3104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LWDYM2DRKK74E2FKLECQRBPN343QVMVR/#LWDYM2DRKK74E2FKLECQRBPN343QVMVR" source="SUSE-SU"/>
    <description>
    The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3104/">CVE-2007-3104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3104">CVE-2007-3104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/329758">SUSE bug 329758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3107" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3107" ref_url="https://www.suse.com/security/cve/CVE-2007-3107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D23ASTVUMVU5USPFK4HGSK2YGMAURC5B/#D23ASTVUMVU5USPFK4HGSK2YGMAURC5B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CN3HDZKMZ6P6RA245W76UX2VHACAIXV7/#CN3HDZKMZ6P6RA245W76UX2VHACAIXV7" source="SUSE-SU"/>
    <description>
    The signal handling in the Linux kernel before 2.6.22, including 2.6.2, when running on PowerPC systems using HTX, allows local users to cause a denial of service via unspecified vectors involving floating point corruption and concurrency, related to clearing of MSR bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3107/">CVE-2007-3107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3107">CVE-2007-3107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/290622">SUSE bug 290622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/329765">SUSE bug 329765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3513" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3513" ref_url="https://www.suse.com/security/cve/CVE-2007-3513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D23ASTVUMVU5USPFK4HGSK2YGMAURC5B/#D23ASTVUMVU5USPFK4HGSK2YGMAURC5B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CN3HDZKMZ6P6RA245W76UX2VHACAIXV7/#CN3HDZKMZ6P6RA245W76UX2VHACAIXV7" source="SUSE-SU"/>
    <description>
    The lcd_write function in drivers/usb/misc/usblcd.c in the Linux kernel before 2.6.22-rc7 does not limit the amount of memory used by a caller, which allows local users to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3513/">CVE-2007-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3513">CVE-2007-3513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/293092">SUSE bug 293092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3719" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3719" ref_url="https://www.suse.com/security/cve/CVE-2007-3719" source="SUSE CVE"/>
    <description>
    The process scheduler in the Linux kernel 2.6.16 gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly Monopolizing the CPU Without Superuser Privileges."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3719/">CVE-2007-3719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3719">CVE-2007-3719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/291701">SUSE bug 291701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-3851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3851" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-3851" ref_url="https://www.suse.com/security/cve/CVE-2007-3851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D23ASTVUMVU5USPFK4HGSK2YGMAURC5B/#D23ASTVUMVU5USPFK4HGSK2YGMAURC5B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CN3HDZKMZ6P6RA245W76UX2VHACAIXV7/#CN3HDZKMZ6P6RA245W76UX2VHACAIXV7" source="SUSE-SU"/>
    <description>
    The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-3851/">CVE-2007-3851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-3851">CVE-2007-3851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/298309">SUSE bug 298309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4308" ref_url="https://www.suse.com/security/cve/CVE-2007-4308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LWDYM2DRKK74E2FKLECQRBPN343QVMVR/#LWDYM2DRKK74E2FKLECQRBPN343QVMVR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:006" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7/#EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/362NAP24N3TE6HS43QZT5UK5652N6EGY/#362NAP24N3TE6HS43QZT5UK5652N6EGY" source="SUSE-SU"/>
    <description>
    The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4308/">CVE-2007-4308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4308">CVE-2007-4308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/326270">SUSE bug 326270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/329764">SUSE bug 329764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4567" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4567" ref_url="https://www.suse.com/security/cve/CVE-2007-4567" source="SUSE CVE"/>
    <description>
    The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4567/">CVE-2007-4567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4567">CVE-2007-4567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/307626">SUSE bug 307626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570608">SUSE bug 570608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4571" ref_url="https://www.suse.com/security/cve/CVE-2007-4571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CN3HDZKMZ6P6RA245W76UX2VHACAIXV7/#CN3HDZKMZ6P6RA245W76UX2VHACAIXV7" source="SUSE-SU"/>
    <description>
    The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2007-4571/">CVE-2007-4571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4571">CVE-2007-4571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/328404">SUSE bug 328404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4774" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4774" ref_url="https://www.suse.com/security/cve/CVE-2007-4774" source="SUSE CVE"/>
    <description>
    The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-4774/">CVE-2007-4774 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2007-4774">CVE-2007-4774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161116">SUSE bug 1161116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-5966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5966" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-5966" ref_url="https://www.suse.com/security/cve/CVE-2007-5966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:006" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7/#EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7" source="SUSE-SU"/>
		<reference ref_id="TID7002558" ref_url="https://www.suse.com/support/kb/doc?id=7002558" source="SUSE-SU"/>
    <description>
    Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-5966/">CVE-2007-5966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-5966">CVE-2007-5966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/347262">SUSE bug 347262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/512584">SUSE bug 512584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6063" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6063" ref_url="https://www.suse.com/security/cve/CVE-2007-6063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2007:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LWDYM2DRKK74E2FKLECQRBPN343QVMVR/#LWDYM2DRKK74E2FKLECQRBPN343QVMVR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:006" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7/#EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7" source="SUSE-SU"/>
    <description>
    Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6063/">CVE-2007-6063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6063">CVE-2007-6063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/343210">SUSE bug 343210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6206" ref_url="https://www.suse.com/security/cve/CVE-2007-6206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX2CPW3AY4IENFWKAQHLPBR37UAZ4BLN/#KX2CPW3AY4IENFWKAQHLPBR37UAZ4BLN" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWGYFOJOYOXXOIOSHF247YJ64HXN24Q/#6XWGYFOJOYOXXOIOSHF247YJ64HXN24Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNBYR6LZDVAP5UJEPNROGPKU7C4OSMSC/#DNBYR6LZDVAP5UJEPNROGPKU7C4OSMSC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
    <description>
    The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6206/">CVE-2007-6206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-6206">CVE-2007-6206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/342686">SUSE bug 342686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6716" ref_url="https://www.suse.com/security/cve/CVE-2007-6716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTCBR6G3HDYMMHID2LQD745JRZFXQSF/#NOTCBR6G3HDYMMHID2LQD745JRZFXQSF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2QMIPFK6MZHDZLBAG524YDQGJGMA5J2/#C2QMIPFK6MZHDZLBAG524YDQGJGMA5J2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKC4CZP65LTXZHWI6JGEHWG7EA2737MN/#EKC4CZP65LTXZHWI6JGEHWG7EA2737MN" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUP6AM5TYP75PTFMN7ROPEQS4TU3L77Z/#UUP6AM5TYP75PTFMN7ROPEQS4TU3L77Z" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-08"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6716/">CVE-2007-6716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-6716">CVE-2007-6716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/422963">SUSE bug 422963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-6762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6762" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-6762" ref_url="https://www.suse.com/security/cve/CVE-2007-6762" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 2.6.20, there is an off-by-one bug in net/netlabel/netlabel_cipso_v4.c where it is possible to overflow the doi_def-&gt;tags[] array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2007-6762/">CVE-2007-6762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2007-6762">CVE-2007-6762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143172">SUSE bug 1143172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0007" ref_url="https://www.suse.com/security/cve/CVE-2008-0007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:006" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7/#EDEHGIEHVK773WKKVVPFKGUZEFSHZ5X7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/362NAP24N3TE6HS43QZT5UK5652N6EGY/#362NAP24N3TE6HS43QZT5UK5652N6EGY" source="SUSE-SU"/>
    <description>
    Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0007/">CVE-2008-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0007">CVE-2008-0007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/353207">SUSE bug 353207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0009" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0009" ref_url="https://www.suse.com/security/cve/CVE-2008-0009" source="SUSE CVE"/>
    <description>
    The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0009/">CVE-2008-0009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0009">CVE-2008-0009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/358006">SUSE bug 358006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-0352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0352" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-0352" ref_url="https://www.suse.com/security/cve/CVE-2008-0352" source="SUSE CVE"/>
    <description>
    The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-0352/">CVE-2008-0352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-0352">CVE-2008-0352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/307626">SUSE bug 307626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1367" ref_url="https://www.suse.com/security/cve/CVE-2008-1367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWGYFOJOYOXXOIOSHF247YJ64HXN24Q/#6XWGYFOJOYOXXOIOSHF247YJ64HXN24Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PFCWFZAJDMUIE5YVXDTWBACU5HXYVF2K/#PFCWFZAJDMUIE5YVXDTWBACU5HXYVF2K" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNBYR6LZDVAP5UJEPNROGPKU7C4OSMSC/#DNBYR6LZDVAP5UJEPNROGPKU7C4OSMSC" source="SUSE-SU"/>
    <description>
    gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1367/">CVE-2008-1367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1367">CVE-2008-1367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/369911">SUSE bug 369911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/372038">SUSE bug 372038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKVFIRXWUFGDX6UL5AHLMLQ3MQMR7F57/#OKVFIRXWUFGDX6UL5AHLMLQ3MQMR7F57" source="SUSE-SU"/>
    <description>
    Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1420">CVE-2008-1420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/372246">SUSE bug 372246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1483" ref_url="https://www.suse.com/security/cve/CVE-2008-1483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:009" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4YFJUTC5WJ2BGEFAYXE73LPEWXZPBGY/#E4YFJUTC5WJ2BGEFAYXE73LPEWXZPBGY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="TID7005435" ref_url="https://www.suse.com/support/kb/doc/?id=7005435" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2008-1483/">CVE-2008-1483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1483">CVE-2008-1483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069509">SUSE bug 1069509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/373527">SUSE bug 373527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/585630">SUSE bug 585630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/647633">SUSE bug 647633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706386">SUSE bug 706386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-1679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-1679" ref_url="https://www.suse.com/security/cve/CVE-2008-1679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KUUXE6IWBPGX77THPJH4GX6TYOFU2EQR/#KUUXE6IWBPGX77THPJH4GX6TYOFU2EQR" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-1679/">CVE-2008-1679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-1679">CVE-2008-1679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/377090">SUSE bug 377090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/444989">SUSE bug 444989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2358" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2358" ref_url="https://www.suse.com/security/cve/CVE-2008-2358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XWGYFOJOYOXXOIOSHF247YJ64HXN24Q/#6XWGYFOJOYOXXOIOSHF247YJ64HXN24Q" source="SUSE-SU"/>
    <description>
    Integer overflow in the dccp_feat_change function in net/dccp/feat.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.18, and 2.6.17 through 2.6.20, allows local users to gain privileges via an invalid feature length, which leads to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-12"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2358/">CVE-2008-2358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2358">CVE-2008-2358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/387819">SUSE bug 387819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2365" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2365" ref_url="https://www.suse.com/security/cve/CVE-2008-2365" source="SUSE CVE"/>
    <description>
    Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise Linux (RHEL) 4, allows local users to cause a denial of service (oops) via a long series of PTRACE_ATTACH ptrace calls to another user's process that trigger a conflict between utrace_detach and report_quiescent, related to "late ptrace_may_attach() check" and "race around &amp;dead_engine_ops setting," a different vulnerability than CVE-2007-0771 and CVE-2008-1514. NOTE: this issue might only affect kernel versions before 2.6.16.x.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2365/">CVE-2008-2365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2365">CVE-2008-2365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/404288">SUSE bug 404288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2544" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2544" ref_url="https://www.suse.com/security/cve/CVE-2008-2544" source="SUSE CVE"/>
    <description>
    Mounting /proc filesystem via chroot command silently mounts it in read-write mode. The user could bypass the chroot environment and gain write access to files, he would never have otherwise.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2544/">CVE-2008-2544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2008-2544">CVE-2008-2544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189500">SUSE bug 1189500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2750" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2750" ref_url="https://www.suse.com/security/cve/CVE-2008-2750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:037" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3/#ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3" source="SUSE-SU"/>
    <description>
    The pppol2tp_recvmsg function in drivers/net/pppol2tp.c in the Linux kernel 2.6 before 2.6.26-rc6 allows remote attackers to cause a denial of service (kernel heap memory corruption and system crash) and possibly have unspecified other impact via a crafted PPPOL2TP packet that results in a large value for a certain length variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2750/">CVE-2008-2750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2750">CVE-2008-2750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/400874">SUSE bug 400874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2812" ref_url="https://www.suse.com/security/cve/CVE-2008-2812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:035" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MQWR3CMXVSJ3DIKYOXHHVS2BJWM7E3L/#3MQWR3CMXVSJ3DIKYOXHHVS2BJWM7E3L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:037" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3/#ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SUNGHMMPHYSHOG44YXVKWP2QEMIIPT3/#6SUNGHMMPHYSHOG44YXVKWP2QEMIIPT3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NOTCBR6G3HDYMMHID2LQD745JRZFXQSF/#NOTCBR6G3HDYMMHID2LQD745JRZFXQSF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:049" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7SWHXQ6TCDAGI27M5IKXBJE6LK3B6GQ/#Z7SWHXQ6TCDAGI27M5IKXBJE6LK3B6GQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKC4CZP65LTXZHWI6JGEHWG7EA2737MN/#EKC4CZP65LTXZHWI6JGEHWG7EA2737MN" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2812/">CVE-2008-2812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-2812">CVE-2008-2812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175688">SUSE bug 1175688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/405017">SUSE bug 405017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2826" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2826" ref_url="https://www.suse.com/security/cve/CVE-2008-2826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:037" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3/#ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKC4CZP65LTXZHWI6JGEHWG7EA2737MN/#EKC4CZP65LTXZHWI6JGEHWG7EA2737MN" source="SUSE-SU"/>
    <description>
    Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2826/">CVE-2008-2826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2826">CVE-2008-2826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/402607">SUSE bug 402607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-2931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2931" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-2931" ref_url="https://www.suse.com/security/cve/CVE-2008-2931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:035" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MQWR3CMXVSJ3DIKYOXHHVS2BJWM7E3L/#3MQWR3CMXVSJ3DIKYOXHHVS2BJWM7E3L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SUNGHMMPHYSHOG44YXVKWP2QEMIIPT3/#6SUNGHMMPHYSHOG44YXVKWP2QEMIIPT3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:049" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7SWHXQ6TCDAGI27M5IKXBJE6LK3B6GQ/#Z7SWHXQ6TCDAGI27M5IKXBJE6LK3B6GQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2931/">CVE-2008-2931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-2931">CVE-2008-2931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175780">SUSE bug 1175780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/407428">SUSE bug 407428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3077" ref_url="https://www.suse.com/security/cve/CVE-2008-3077" source="SUSE CVE"/>
    <description>
    arch/x86/kernel/ptrace.c in the Linux kernel before 2.6.25.10 on the x86_64 platform leaks task_struct references into the sys32_ptrace function, which allows local users to cause a denial of service (system crash) or have unspecified other impact via unknown vectors, possibly a use-after-free vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3077/">CVE-2008-3077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3077">CVE-2008-3077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/406464">SUSE bug 406464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3247" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3247" ref_url="https://www.suse.com/security/cve/CVE-2008-3247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:037" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3/#ZABZPDYTMKAJL7NCLHXG655PUSA3E6I3" source="SUSE-SU"/>
    <description>
    The LDT implementation in the Linux kernel 2.6.25.x before 2.6.25.11 on x86_64 platforms uses an incorrect size for ldt_desc, which allows local users to cause a denial of service (system crash) or possibly gain privileges via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3247/">CVE-2008-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3247">CVE-2008-3247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/408734">SUSE bug 408734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/432488">SUSE bug 432488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3275" ref_url="https://www.suse.com/security/cve/CVE-2008-3275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:044" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/77NAP3QMJMS366WJWEJC5WK2ABIFDSDD/#77NAP3QMJMS366WJWEJC5WK2ABIFDSDD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:048" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F6WHQHSAWTYHQ3UPGQFDJXOHEUMQIWXF/#F6WHQHSAWTYHQ3UPGQFDJXOHEUMQIWXF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:049" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7SWHXQ6TCDAGI27M5IKXBJE6LK3B6GQ/#Z7SWHXQ6TCDAGI27M5IKXBJE6LK3B6GQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
    <description>
    The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3275/">CVE-2008-3275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-3275">CVE-2008-3275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/413936">SUSE bug 413936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3496" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3496" ref_url="https://www.suse.com/security/cve/CVE-2008-3496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2C5WNTYWAC6OAKJJPA5EXSNETFH4M536/#2C5WNTYWAC6OAKJJPA5EXSNETFH4M536" source="SUSE-SU"/>
    <description>
    Buffer overflow in format descriptor parsing in the uvc_parse_format function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the video4linux (V4L) implementation in the Linux kernel before 2.6.26.1 has unknown impact and attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3496/">CVE-2008-3496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3496">CVE-2008-3496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/415702">SUSE bug 415702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3526" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3526" ref_url="https://www.suse.com/security/cve/CVE-2008-3526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
    <description>
    Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3526/">CVE-2008-3526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3526">CVE-2008-3526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/421003">SUSE bug 421003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3527" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3527" ref_url="https://www.suse.com/security/cve/CVE-2008-3527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel before 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install_special_mapping, syscall, and syscall32_nopage functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3527/">CVE-2008-3527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3527">CVE-2008-3527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/437689">SUSE bug 437689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3528" ref_url="https://www.suse.com/security/cve/CVE-2008-3528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2QMIPFK6MZHDZLBAG524YDQGJGMA5J2/#C2QMIPFK6MZHDZLBAG524YDQGJGMA5J2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EKC4CZP65LTXZHWI6JGEHWG7EA2737MN/#EKC4CZP65LTXZHWI6JGEHWG7EA2737MN" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUP6AM5TYP75PTFMN7ROPEQS4TU3L77Z/#UUP6AM5TYP75PTFMN7ROPEQS4TU3L77Z" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:057" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOAY2RDECP2WS7P22TPN6BBVJ45V4HZK/#GOAY2RDECP2WS7P22TPN6BBVJ45V4HZK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations. NOTE: there are limited scenarios in which this crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3528/">CVE-2008-3528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3528">CVE-2008-3528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/427244">SUSE bug 427244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3534" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3534" ref_url="https://www.suse.com/security/cve/CVE-2008-3534" source="SUSE CVE"/>
    <description>
    The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3534/">CVE-2008-3534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3534">CVE-2008-3534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/414257">SUSE bug 414257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3792" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3792" ref_url="https://www.suse.com/security/cve/CVE-2008-3792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
    <description>
    net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4 does not verify that the SCTP-AUTH extension is enabled before proceeding with SCTP-AUTH API functions, which allows attackers to cause a denial of service (NULL pointer dereference and panic) via vectors that result in calls to (1) sctp_setsockopt_auth_chunk, (2) sctp_setsockopt_hmac_ident, (3) sctp_setsockopt_auth_key, (4) sctp_setsockopt_active_key, (5) sctp_setsockopt_del_key, (6) sctp_getsockopt_maxburst, (7) sctp_getsockopt_active_key, (8) sctp_getsockopt_peer_auth_chunks, or (9) sctp_getsockopt_local_auth_chunks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3792/">CVE-2008-3792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3792">CVE-2008-3792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/423541">SUSE bug 423541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3831" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3831" ref_url="https://www.suse.com/security/cve/CVE-2008-3831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ/#QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ" source="SUSE-SU"/>
    <description>
    The i915 driver in (1) drivers/char/drm/i915_dma.c in the Linux kernel 2.6.24 on Debian GNU/Linux and (2) sys/dev/pci/drm/i915_drv.c in OpenBSD does not restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager (DRM) master, which allows local users to cause a denial of service (memory corruption) via a crafted ioctl call, related to absence of the DRM_MASTER and DRM_ROOT_ONLY flags in the ioctl's configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3831/">CVE-2008-3831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3831">CVE-2008-3831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/429919">SUSE bug 429919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3833" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3833" ref_url="https://www.suse.com/security/cve/CVE-2008-3833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3833/">CVE-2008-3833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3833">CVE-2008-3833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/432487">SUSE bug 432487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3911" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3911" ref_url="https://www.suse.com/security/cve/CVE-2008-3911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
    <description>
    The proc_do_xprt function in net/sunrpc/sysctl.c in the Linux kernel 2.6.26.3 does not check the length of a certain buffer obtained from userspace, which allows local users to overflow a stack-based buffer and have unspecified other impact via a crafted read system call for the /proc/sys/sunrpc/transports file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3911/">CVE-2008-3911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3911">CVE-2008-3911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/422964">SUSE bug 422964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-3915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3915" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-3915" ref_url="https://www.suse.com/security/cve/CVE-2008-3915" source="SUSE CVE"/>
    <description>
    Buffer overflow in nfsd in the Linux kernel before 2.6.26.4, when NFSv4 is enabled, allows remote attackers to have an unknown impact via vectors related to decoding an NFSv4 acl.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-3915/">CVE-2008-3915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-3915">CVE-2008-3915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/423515">SUSE bug 423515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4113" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4113" ref_url="https://www.suse.com/security/cve/CVE-2008-4113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
    <description>
    The sctp_getsockopt_hmac_ident function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, relies on an untrusted length value to limit copying of data from kernel memory, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4113/">CVE-2008-4113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4113">CVE-2008-4113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/429781">SUSE bug 429781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/432898">SUSE bug 432898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4210" ref_url="https://www.suse.com/security/cve/CVE-2008-4210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2QMIPFK6MZHDZLBAG524YDQGJGMA5J2/#C2QMIPFK6MZHDZLBAG524YDQGJGMA5J2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUP6AM5TYP75PTFMN7ROPEQS4TU3L77Z/#UUP6AM5TYP75PTFMN7ROPEQS4TU3L77Z" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2008:057" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOAY2RDECP2WS7P22TPN6BBVJ45V4HZK/#GOAY2RDECP2WS7P22TPN6BBVJ45V4HZK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4210/">CVE-2008-4210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4210">CVE-2008-4210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/429478">SUSE bug 429478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/432487">SUSE bug 432487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4302" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4302" ref_url="https://www.suse.com/security/cve/CVE-2008-4302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2008:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL/#RO2OGFGBEZJTF5QIXBFJMPY2MQ3KVKAL" source="SUSE-SU"/>
    <description>
    fs/splice.c in the splice subsystem in the Linux kernel before 2.6.22.2 does not properly handle a failure of the add_to_page_cache_lru function, and subsequently attempts to unlock a page that was not locked, which allows local users to cause a denial of service (kernel BUG and system crash), as demonstrated by the fio I/O tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4302/">CVE-2008-4302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2008-4302">CVE-2008-4302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/427651">SUSE bug 427651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4307" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4307" ref_url="https://www.suse.com/security/cve/CVE-2008-4307" source="SUSE CVE"/>
    <description>
    Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a denial of service (crash) via vectors resulting in an interrupted RPC call that leads to a stray FL_POSIX lock, related to improper handling of a race between fcntl and close in the EINTR case.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4307/">CVE-2008-4307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4307">CVE-2008-4307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/465672">SUSE bug 465672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4409" ref_url="https://www.suse.com/security/cve/CVE-2008-4409" source="SUSE CVE"/>
    <description>
    libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-11"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4409/">CVE-2008-4409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4409">CVE-2008-4409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/432486">SUSE bug 432486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009337751" comment="libxml2-2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337752" comment="libxml2-tools is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4410" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4410" ref_url="https://www.suse.com/security/cve/CVE-2008-4410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
    <description>
    The vmi_write_ldt_entry function in arch/x86/kernel/vmi_32.c in the Virtual Machine Interface (VMI) in the Linux kernel 2.6.26.5 invokes write_idt_entry where write_ldt_entry was intended, which allows local users to cause a denial of service (persistent application failure) via crafted function calls, related to the Java Runtime Environment (JRE) experiencing improper LDT selector state, a different vulnerability than CVE-2008-3247.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4410/">CVE-2008-4410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4410">CVE-2008-4410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/432488">SUSE bug 432488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4445" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4445" ref_url="https://www.suse.com/security/cve/CVE-2008-4445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE/#SUCWLVHA2HE3Z4JVN7DNRJN3NM5QMUZE" source="SUSE-SU"/>
    <description>
    The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4445/">CVE-2008-4445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4445">CVE-2008-4445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/432898">SUSE bug 432898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-4554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4554" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-4554" ref_url="https://www.suse.com/security/cve/CVE-2008-4554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ/#QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
    <description>
    The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-11"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-4554/">CVE-2008-4554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-4554">CVE-2008-4554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/435151">SUSE bug 435151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5029" ref_url="https://www.suse.com/security/cve/CVE-2008-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2008:057" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOAY2RDECP2WS7P22TPN6BBVJ45V4HZK/#GOAY2RDECP2WS7P22TPN6BBVJ45V4HZK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ/#QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NTYCCNYTQAOTKBGI4RVDX22QHVTTDF4/#2NTYCCNYTQAOTKBGI4RVDX22QHVTTDF4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IXS5HPZQWUVL5R6PGAP6Q24XHJDD3OF/#6IXS5HPZQWUVL5R6PGAP6Q24XHJDD3OF" source="SUSE-SU"/>
    <description>
    The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5029/">CVE-2008-5029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5029">CVE-2008-5029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/442364">SUSE bug 442364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/449739">SUSE bug 449739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5079" ref_url="https://www.suse.com/security/cve/CVE-2008-5079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ/#QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NTYCCNYTQAOTKBGI4RVDX22QHVTTDF4/#2NTYCCNYTQAOTKBGI4RVDX22QHVTTDF4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IXS5HPZQWUVL5R6PGAP6Q24XHJDD3OF/#6IXS5HPZQWUVL5R6PGAP6Q24XHJDD3OF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
    <description>
    net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2008-5079/">CVE-2008-5079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5079">CVE-2008-5079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/450417">SUSE bug 450417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5700" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5700" ref_url="https://www.suse.com/security/cve/CVE-2008-5700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ/#QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
    <description>
    libata in the Linux kernel before 2.6.27.9 does not set minimum timeouts for SG_IO requests, which allows local users to cause a denial of service (Programmed I/O mode on drives) via multiple simultaneous invocations of an unspecified test program.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-06"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5700/">CVE-2008-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5700">CVE-2008-5700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/457896">SUSE bug 457896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2008-5702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5702" source="CVE"/>
    <reference ref_id="SUSE CVE-2008-5702" ref_url="https://www.suse.com/security/cve/CVE-2008-5702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ/#QOSP6H7BC2FLXVD2KX77R63J2PXZXWIQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
    <description>
    Buffer underflow in the ibwdt_ioctl function in drivers/watchdog/ib700wdt.c in the Linux kernel before 2.6.28-rc1 might allow local users to have an unknown impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-12"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-5702/">CVE-2008-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-5702">CVE-2008-5702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/457898">SUSE bug 457898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0024" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0024" ref_url="https://www.suse.com/security/cve/CVE-2009-0024" source="SUSE CVE"/>
    <description>
    The sys_remap_file_pages function in mm/fremap.c in the Linux kernel before 2.6.24.1 allows local users to cause a denial of service or gain privileges via unspecified vectors, related to the vm_file structure member, and the mmap_region and do_munmap functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0024/">CVE-2009-0024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0024">CVE-2009-0024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/464050">SUSE bug 464050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0029" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0029" ref_url="https://www.suse.com/security/cve/CVE-2009-0029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
    <description>
    The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0029/">CVE-2009-0029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0029">CVE-2009-0029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/466015">SUSE bug 466015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0065" ref_url="https://www.suse.com/security/cve/CVE-2009-0065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RMMD3K5Q4FF3SVREJGFACVDJKZG2E2D/#7RMMD3K5Q4FF3SVREJGFACVDJKZG2E2D" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJJFDT4H3Z3M2HSKTCOQSVMEIRGHXJOY/#BJJFDT4H3Z3M2HSKTCOQSVMEIRGHXJOY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
    <description>
    Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0065/">CVE-2009-0065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0065">CVE-2009-0065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/463522">SUSE bug 463522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0269" ref_url="https://www.suse.com/security/cve/CVE-2009-0269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
    <description>
    fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0269/">CVE-2009-0269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0269">CVE-2009-0269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/470942">SUSE bug 470942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0316">CVE-2009-0316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/470100">SUSE bug 470100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0322" ref_url="https://www.suse.com/security/cve/CVE-2009-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU/#OBFSHNFHMZ3KKUERGUO4BSM63X7EQ5CU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RMMD3K5Q4FF3SVREJGFACVDJKZG2E2D/#7RMMD3K5Q4FF3SVREJGFACVDJKZG2E2D" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
    <description>
    drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0322/">CVE-2009-0322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0322">CVE-2009-0322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/470943">SUSE bug 470943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0342" ref_url="https://www.suse.com/security/cve/CVE-2009-0342" source="SUSE CVE"/>
    <description>
    Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0342/">CVE-2009-0342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0342">CVE-2009-0342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/483819">SUSE bug 483819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483820">SUSE bug 483820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0676" ref_url="https://www.suse.com/security/cve/CVE-2009-0676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7RMMD3K5Q4FF3SVREJGFACVDJKZG2E2D/#7RMMD3K5Q4FF3SVREJGFACVDJKZG2E2D" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJJFDT4H3Z3M2HSKTCOQSVMEIRGHXJOY/#BJJFDT4H3Z3M2HSKTCOQSVMEIRGHXJOY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TU3XWDG6LGWTZHOB5PQE5CKQ2OIHYECG/#TU3XWDG6LGWTZHOB5PQE5CKQ2OIHYECG" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
    <description>
    The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0676/">CVE-2009-0676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0676">CVE-2009-0676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/478002">SUSE bug 478002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0745" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0745" ref_url="https://www.suse.com/security/cve/CVE-2009-0745" source="SUSE CVE"/>
    <description>
    The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0745/">CVE-2009-0745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0745">CVE-2009-0745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/480860">SUSE bug 480860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0778" ref_url="https://www.suse.com/security/cve/CVE-2009-0778" source="SUSE CVE"/>
    <description>
    The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an "rt_cache leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0778/">CVE-2009-0778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0778">CVE-2009-0778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/482712">SUSE bug 482712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0787" ref_url="https://www.suse.com/security/cve/CVE-2009-0787" source="SUSE CVE"/>
    <description>
    The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 before 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions of kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0787/">CVE-2009-0787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0787">CVE-2009-0787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/487107">SUSE bug 487107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0834" ref_url="https://www.suse.com/security/cve/CVE-2009-0834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA7U7YS2I4IX4N246AGSFIA3QRUEYISY/#WA7U7YS2I4IX4N246AGSFIA3QRUEYISY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
    <description>
    The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0834/">CVE-2009-0834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0834">CVE-2009-0834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/483819">SUSE bug 483819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483820">SUSE bug 483820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0835" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0835" ref_url="https://www.suse.com/security/cve/CVE-2009-0835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TU3XWDG6LGWTZHOB5PQE5CKQ2OIHYECG/#TU3XWDG6LGWTZHOB5PQE5CKQ2OIHYECG" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA7U7YS2I4IX4N246AGSFIA3QRUEYISY/#WA7U7YS2I4IX4N246AGSFIA3QRUEYISY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
    <description>
    The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0835/">CVE-2009-0835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-0835">CVE-2009-0835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/483819">SUSE bug 483819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/483820">SUSE bug 483820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-0935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0935" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-0935" ref_url="https://www.suse.com/security/cve/CVE-2009-0935" source="SUSE CVE"/>
    <description>
    The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-08"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-0935/">CVE-2009-0935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-0935">CVE-2009-0935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/482843">SUSE bug 482843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1046" ref_url="https://www.suse.com/security/cve/CVE-2009-1046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJJFDT4H3Z3M2HSKTCOQSVMEIRGHXJOY/#BJJFDT4H3Z3M2HSKTCOQSVMEIRGHXJOY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
    <description>
    The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1046/">CVE-2009-1046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1046">CVE-2009-1046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/478699">SUSE bug 478699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1072" ref_url="https://www.suse.com/security/cve/CVE-2009-1072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TU3XWDG6LGWTZHOB5PQE5CKQ2OIHYECG/#TU3XWDG6LGWTZHOB5PQE5CKQ2OIHYECG" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA7U7YS2I4IX4N246AGSFIA3QRUEYISY/#WA7U7YS2I4IX4N246AGSFIA3QRUEYISY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA/#WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA" source="SUSE-SU"/>
    <description>
    nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1072/">CVE-2009-1072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1072">CVE-2009-1072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/487681">SUSE bug 487681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/497551">SUSE bug 497551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1185" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1185" ref_url="https://www.suse.com/security/cve/CVE-2009-1185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CSB3WYORCFFXQWIMT7IX7JSJ7UXGCQTZ/#CSB3WYORCFFXQWIMT7IX7JSJ7UXGCQTZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:025" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPTRM7HAM7WGDGPWSG5H3FH72BZIZ7CL/#QPTRM7HAM7WGDGPWSG5H3FH72BZIZ7CL" source="SUSE-SU"/>
    <description>
    udev before 1.4.1 does not verify whether a NETLINK message originates from kernel space, which allows local users to gain privileges by sending a NETLINK message from user space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1185/">CVE-2009-1185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1185">CVE-2009-1185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034330">SUSE bug 1034330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550249">SUSE bug 550249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/776925">SUSE bug 776925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1192" ref_url="https://www.suse.com/security/cve/CVE-2009-1192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY/#FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ/#MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:055" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTZFKAYEX5AMATOLRDBX7VRLGHI7ZA2G/#NTZFKAYEX5AMATOLRDBX7VRLGHI7ZA2G" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR/#DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR" source="SUSE-SU"/>
    <description>
    The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1192/">CVE-2009-1192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1192">CVE-2009-1192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/497159">SUSE bug 497159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1242" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1242" ref_url="https://www.suse.com/security/cve/CVE-2009-1242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY/#FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY" source="SUSE-SU"/>
    <description>
    The vmx_set_msr function in arch/x86/kvm/vmx.c in the VMX implementation in the KVM subsystem in the Linux kernel before 2.6.29.1 on the i386 platform allows guest OS users to cause a denial of service (OOPS) by setting the EFER_LME (aka "Long mode enable") bit in the Extended Feature Enable Register (EFER) model-specific register, which is specific to the x86_64 platform.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1242/">CVE-2009-1242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1242">CVE-2009-1242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/492760">SUSE bug 492760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1265" ref_url="https://www.suse.com/security/cve/CVE-2009-1265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA7U7YS2I4IX4N246AGSFIA3QRUEYISY/#WA7U7YS2I4IX4N246AGSFIA3QRUEYISY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY/#FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA/#WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA" source="SUSE-SU"/>
    <description>
    Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1265/">CVE-2009-1265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1265">CVE-2009-1265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/490608">SUSE bug 490608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1298" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1298" ref_url="https://www.suse.com/security/cve/CVE-2009-1298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
    <description>
    The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1298/">CVE-2009-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1298">CVE-2009-1298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/560697">SUSE bug 560697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1336" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1336" ref_url="https://www.suse.com/security/cve/CVE-2009-1336" source="SUSE CVE"/>
    <description>
    fs/nfs/client.c in the Linux kernel before 2.6.23 does not properly initialize a certain structure member that stores the maximum NFS filename length, which allows local users to cause a denial of service (OOPS) via a long filename, related to the encode_lookup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1336/">CVE-2009-1336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1336">CVE-2009-1336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/492766">SUSE bug 492766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1337" ref_url="https://www.suse.com/security/cve/CVE-2009-1337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA7U7YS2I4IX4N246AGSFIA3QRUEYISY/#WA7U7YS2I4IX4N246AGSFIA3QRUEYISY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY/#FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA/#WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA" source="SUSE-SU"/>
    <description>
    The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1337/">CVE-2009-1337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1337">CVE-2009-1337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/492768">SUSE bug 492768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1385" ref_url="https://www.suse.com/security/cve/CVE-2009-1385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO/#BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
    <description>
    Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1385/">CVE-2009-1385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1385">CVE-2009-1385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/509822">SUSE bug 509822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567678">SUSE bug 567678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1389" ref_url="https://www.suse.com/security/cve/CVE-2009-1389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO/#BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1389/">CVE-2009-1389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1389">CVE-2009-1389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/511243">SUSE bug 511243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/567678">SUSE bug 567678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1439" ref_url="https://www.suse.com/security/cve/CVE-2009-1439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:028" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA7U7YS2I4IX4N246AGSFIA3QRUEYISY/#WA7U7YS2I4IX4N246AGSFIA3QRUEYISY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:032" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY/#FKUZWYSUCPF6AGCWVZS4CRL7TKXV6BLY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA/#WOBCJ2UP3OWQ4XJ5H43IICA2CCMYGSYA" source="SUSE-SU"/>
    <description>
    Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1439/">CVE-2009-1439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1439">CVE-2009-1439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/492282">SUSE bug 492282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/498824">SUSE bug 498824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1630" ref_url="https://www.suse.com/security/cve/CVE-2009-1630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO/#BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
    <description>
    The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1630/">CVE-2009-1630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1630">CVE-2009-1630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175689">SUSE bug 1175689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/503353">SUSE bug 503353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1633" ref_url="https://www.suse.com/security/cve/CVE-2009-1633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ/#MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR/#DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-19"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1633/">CVE-2009-1633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1633">CVE-2009-1633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/492282">SUSE bug 492282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1883" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1883" ref_url="https://www.suse.com/security/cve/CVE-2009-1883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
    <description>
    The z90crypt_unlocked_ioctl function in the z90crypt driver in the Linux kernel 2.6.9 does not perform a capability check for the Z90QUIESCE operation, which allows local users to leverage euid 0 privileges to force a driver outage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1883/">CVE-2009-1883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1883">CVE-2009-1883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/539879">SUSE bug 539879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1895" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1895" ref_url="https://www.suse.com/security/cve/CVE-2009-1895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
    <description>
    The personality subsystem in the Linux kernel before 2.6.31-rc3 has a PER_CLEAR_ON_SETID setting that does not clear the ADDR_COMPAT_LAYOUT and MMAP_PAGE_ZERO flags when executing a setuid or setgid program, which makes it easier for local users to leverage the details of memory usage to (1) conduct NULL pointer dereference attacks, (2) bypass the mmap_min_addr protection mechanism, or (3) defeat address space layout randomization (ASLR).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1895/">CVE-2009-1895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-1895">CVE-2009-1895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/521427">SUSE bug 521427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-1961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1961" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-1961" ref_url="https://www.suse.com/security/cve/CVE-2009-1961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:030" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ/#VMT5WZZAXN6WOUZSX4YFP5OHCSHB43UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD/#WD5YHDKZ4LLVCMXA4H3RGT2EZCHRTGBD" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO/#BETPZ7GF5R736P5IF6I2GTR2BHSUDUYO" source="SUSE-SU"/>
    <description>
    The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-1961/">CVE-2009-1961 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-1961">CVE-2009-1961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/495065">SUSE bug 495065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2406" ref_url="https://www.suse.com/security/cve/CVE-2009-2406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUR3YYO2WM7DRXSSFKXTUHURRCIUR55X/#LUR3YYO2WM7DRXSSFKXTUHURRCIUR55X" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-11"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2406/">CVE-2009-2406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2406">CVE-2009-2406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/523719">SUSE bug 523719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2407" ref_url="https://www.suse.com/security/cve/CVE-2009-2407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ7SGVDOLVRKPES5OF75642QUQHTIIED/#MZ7SGVDOLVRKPES5OF75642QUQHTIIED" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2009:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUR3YYO2WM7DRXSSFKXTUHURRCIUR55X/#LUR3YYO2WM7DRXSSFKXTUHURRCIUR55X" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2407/">CVE-2009-2407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2407">CVE-2009-2407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/523719">SUSE bug 523719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2691" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2691" ref_url="https://www.suse.com/security/cve/CVE-2009-2691" source="SUSE CVE"/>
    <description>
    The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and earlier allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2691/">CVE-2009-2691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2691">CVE-2009-2691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/529919">SUSE bug 529919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2698" ref_url="https://www.suse.com/security/cve/CVE-2009-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2T5AWEFJILCBU3CYMFTH4L5LGKKVKX2M/#2T5AWEFJILCBU3CYMFTH4L5LGKKVKX2M" source="SUSE-SU"/>
    <description>
    The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2698/">CVE-2009-2698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-2698">CVE-2009-2698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/532338">SUSE bug 532338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2767" ref_url="https://www.suse.com/security/cve/CVE-2009-2767" source="SUSE CVE"/>
    <description>
    The init_posix_timers function in kernel/posix-timers.c in the Linux kernel before 2.6.31-rc6 allows local users to cause a denial of service (OOPS) or possibly gain privileges via a CLOCK_MONOTONIC_RAW clock_nanosleep call that triggers a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2767/">CVE-2009-2767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2767">CVE-2009-2767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/529555">SUSE bug 529555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2844" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2844" ref_url="https://www.suse.com/security/cve/CVE-2009-2844" source="SUSE CVE"/>
    <description>
    cfg80211 in net/wireless/scan.c in the Linux kernel 2.6.30-rc1 and other versions before 2.6.31-rc6 allows remote attackers to cause a denial of service (crash) via a sequence of beacon frames in which one frame omits an SSID Information Element (IE) and the subsequent frame contains an SSID IE, which triggers a NULL pointer dereference in the cmp_ies function.  NOTE: a potential weakness in the is_mesh function was also addressed, but the relevant condition did not exist in the code, so it is not a vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2844/">CVE-2009-2844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2844">CVE-2009-2844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/532438">SUSE bug 532438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536466">SUSE bug 536466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2848" ref_url="https://www.suse.com/security/cve/CVE-2009-2848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ/#MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR/#DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-&gt;clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2848/">CVE-2009-2848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2848">CVE-2009-2848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/527865">SUSE bug 527865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2903" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2903" ref_url="https://www.suse.com/security/cve/CVE-2009-2903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
    <description>
    Memory leak in the appletalk subsystem in the Linux kernel 2.4.x through 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2903/">CVE-2009-2903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2903">CVE-2009-2903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/539878">SUSE bug 539878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2908" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2908" ref_url="https://www.suse.com/security/cve/CVE-2009-2908" source="SUSE CVE"/>
    <description>
    The d_delete function in fs/ecryptfs/inode.c in eCryptfs in the Linux kernel 2.6.31 allows local users to cause a denial of service (kernel OOPS) and possibly execute arbitrary code via unspecified vectors that cause a "negative dentry" and trigger a NULL pointer dereference, as demonstrated via a Mutt temporary directory in an eCryptfs mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2908/">CVE-2009-2908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2908">CVE-2009-2908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/545274">SUSE bug 545274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-2910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-2910" ref_url="https://www.suse.com/security/cve/CVE-2009-2910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:051" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CLLFAANFK2YALUEWHTQXNWRM5L2UJPOM/#CLLFAANFK2YALUEWHTQXNWRM5L2UJPOM" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ/#MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:055" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTZFKAYEX5AMATOLRDBX7VRLGHI7ZA2G/#NTZFKAYEX5AMATOLRDBX7VRLGHI7ZA2G" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR/#DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-2910/">CVE-2009-2910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-2910">CVE-2009-2910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175785">SUSE bug 1175785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/543740">SUSE bug 543740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3228" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3228" ref_url="https://www.suse.com/security/cve/CVE-2009-3228" source="SUSE CVE"/>
    <description>
    The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3228/">CVE-2009-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3228">CVE-2009-3228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175788">SUSE bug 1175788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/536467">SUSE bug 536467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3280" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3280" ref_url="https://www.suse.com/security/cve/CVE-2009-3280" source="SUSE CVE"/>
    <description>
    Integer signedness error in the find_ie function in net/wireless/scan.c in the cfg80211 subsystem in the Linux kernel before 2.6.31.1-rc1 allows remote attackers to cause a denial of service (soft lockup) via malformed packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3280/">CVE-2009-3280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3280">CVE-2009-3280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/541662">SUSE bug 541662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3286" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3286" ref_url="https://www.suse.com/security/cve/CVE-2009-3286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    NFSv4 in the Linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an O_EXCL create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3286/">CVE-2009-3286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3286">CVE-2009-3286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/541648">SUSE bug 541648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:003" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VACWA4CFRR6435STTXDOXOKJ7TJGSBFT/#VACWA4CFRR6435STTXDOXOKJ7TJGSBFT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMSGWTGNMZ6OBF4PSADAZBORDOW6FLX6/#KMSGWTGNMZ6OBF4PSADAZBORDOW6FLX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ACBTGUNJ6CTYWLVUTLYEKQX3ERY3PSCW/#ACBTGUNJ6CTYWLVUTLYEKQX3ERY3PSCW" source="SUSE-SU"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3297">CVE-2009-3297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/550002">SUSE bug 550002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550003">SUSE bug 550003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/550004">SUSE bug 550004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/577925">SUSE bug 577925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583535">SUSE bug 583535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583536">SUSE bug 583536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/594263">SUSE bug 594263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/620680">SUSE bug 620680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651598">SUSE bug 651598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489671" comment="fuse-2.9.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489674" comment="libfuse2-2.9.7-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G6RZQCWUCPMAR26UNV4LGFRS3PDLN3UK/#G6RZQCWUCPMAR26UNV4LGFRS3PDLN3UK" source="SUSE-SU"/>
    <description>
    Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3379">CVE-2009-3379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/522109">SUSE bug 522109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/545277">SUSE bug 545277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608192">SUSE bug 608192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3547" ref_url="https://www.suse.com/security/cve/CVE-2009-3547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:054" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ/#MCVC6IAJSMAHKCEXE4OZYZAM4H2TQQKJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:055" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTZFKAYEX5AMATOLRDBX7VRLGHI7ZA2G/#NTZFKAYEX5AMATOLRDBX7VRLGHI7ZA2G" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:056" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR/#DW5FG56XB7KWTH4LWPSEK5Z7ZHTFIBZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3547/">CVE-2009-3547 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3547">CVE-2009-3547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/550001">SUSE bug 550001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3556" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3556" ref_url="https://www.suse.com/security/cve/CVE-2009-3556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IGWGCVJIVXEJTQI63OKMDXG6Z7NEK7Q/#7IGWGCVJIVXEJTQI63OKMDXG6Z7NEK7Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D5G4PTV5M2INPXOCAW5ONECG6YT3HVXP/#D5G4PTV5M2INPXOCAW5ONECG6YT3HVXP" source="SUSE-SU"/>
    <description>
    A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3556/">CVE-2009-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3556">CVE-2009-3556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/572193">SUSE bug 572193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605463">SUSE bug 605463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3559" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3559" ref_url="https://www.suse.com/security/cve/CVE-2009-3559" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** main/streams/plain_wrapper.c in PHP 5.3.x before 5.3.1 does not recognize the safe_mode_include_dir directive, which allows context-dependent attackers to have an unknown impact by triggering the failure of PHP scripts that perform include or require operations, as demonstrated by a script that attempts to perform a require_once on a file in a standard library directory. NOTE: a reliable third party reports that this is not a vulnerability, because it results in a more restrictive security policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3559/">CVE-2009-3559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3559">CVE-2009-3559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/557157">SUSE bug 557157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3612" ref_url="https://www.suse.com/security/cve/CVE-2009-3612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors. NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3612/">CVE-2009-3612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3612">CVE-2009-3612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/536467">SUSE bug 536467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3620" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3620" ref_url="https://www.suse.com/security/cve/CVE-2009-3620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
    <description>
    The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3620/">CVE-2009-3620 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3620">CVE-2009-3620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/548071">SUSE bug 548071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3621" ref_url="https://www.suse.com/security/cve/CVE-2009-3621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS/#SLOP7MCIFAZZCZ5AAOWG6YLG3LNMARBS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
    <description>
    net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3621/">CVE-2009-3621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3621">CVE-2009-3621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/548070">SUSE bug 548070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3623" ref_url="https://www.suse.com/security/cve/CVE-2009-3623" source="SUSE CVE"/>
    <description>
    The lookup_cb_cred function in fs/nfsd/nfs4callback.c in the nfsd4 subsystem in the Linux kernel before 2.6.31.2 attempts to access a credentials cache even when a client specifies the AUTH_NULL authentication flavor, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an NFSv4 mount request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3623/">CVE-2009-3623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3623">CVE-2009-3623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/549029">SUSE bug 549029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3624" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3624" ref_url="https://www.suse.com/security/cve/CVE-2009-3624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
    <description>
    The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3624/">CVE-2009-3624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3624">CVE-2009-3624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/549030">SUSE bug 549030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3638" ref_url="https://www.suse.com/security/cve/CVE-2009-3638" source="SUSE CVE"/>
    <description>
    Integer overflow in the kvm_dev_ioctl_get_supported_cpuid function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.31.4 allows local users to have an unspecified impact via a KVM_GET_SUPPORTED_CPUID request to the kvm_arch_dev_ioctl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3638/">CVE-2009-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3638">CVE-2009-3638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/550072">SUSE bug 550072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3640" ref_url="https://www.suse.com/security/cve/CVE-2009-3640" source="SUSE CVE"/>
    <description>
    The update_cr8_intercept function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.32-rc1 does not properly handle the absence of an Advanced Programmable Interrupt Controller (APIC), which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via a call to the kvm_vcpu_ioctl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3640/">CVE-2009-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3640">CVE-2009-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/549487">SUSE bug 549487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3725" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3725" ref_url="https://www.suse.com/security/cve/CVE-2009-3725" source="SUSE CVE"/>
    <description>
    The connector layer in the Linux kernel before 2.6.31.5 does not require the CAP_SYS_ADMIN capability for certain interaction with the (1) uvesafb, (2) pohmelfs, (3) dst, or (4) dm subsystem, which allows local users to bypass intended access restrictions and gain privileges via calls to functions in these subsystems.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3725/">CVE-2009-3725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3725">CVE-2009-3725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/551854">SUSE bug 551854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3889" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3889" ref_url="https://www.suse.com/security/cve/CVE-2009-3889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
    <description>
    The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3889/">CVE-2009-3889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-3889">CVE-2009-3889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/555173">SUSE bug 555173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557180">SUSE bug 557180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-3939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-3939" ref_url="https://www.suse.com/security/cve/CVE-2009-3939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2009:061" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVQDYXE247CCYLODCQ2FT375OTEYBNU3/#ZVQDYXE247CCYLODCQ2FT375OTEYBNU3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2009:064" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ/#NMXLT3SUEIDLWBSV3BCGH6E62INCQ5UZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5/#6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
    <description>
    The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-3939/">CVE-2009-3939 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-3939">CVE-2009-3939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/555173">SUSE bug 555173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/557180">SUSE bug 557180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4004" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4004" ref_url="https://www.suse.com/security/cve/CVE-2009-4004" source="SUSE CVE"/>
    <description>
    Buffer overflow in the kvm_vcpu_ioctl_x86_setup_mce function in arch/x86/kvm/x86.c in the KVM subsystem in the Linux kernel before 2.6.32-rc7 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a KVM_X86_SETUP_MCE IOCTL request that specifies a large number of Machine Check Exception (MCE) banks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4004/">CVE-2009-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-4004">CVE-2009-4004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/557164">SUSE bug 557164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4012" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JDNZAYLNO6FUYWDXDIWJ45D3WMHHVY2B/#JDNZAYLNO6FUYWDXDIWJ45D3WMHHVY2B" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4012">CVE-2009-4012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/569615">SUSE bug 569615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882361" comment="libthai-data-0.1.27-1.16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882363" comment="libthai0-0.1.27-1.16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4020" ref_url="https://www.suse.com/security/cve/CVE-2009-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:016" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IW366OA2QCFISGE6LTWFS27XBCPBY5XF/#IW366OA2QCFISGE6LTWFS27XBCPBY5XF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D5G4PTV5M2INPXOCAW5ONECG6YT3HVXP/#D5G4PTV5M2INPXOCAW5ONECG6YT3HVXP" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:023" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LHH3HFDCR45LY6R5O4DNEOZJFO57XVXT/#LHH3HFDCR45LY6R5O4DNEOZJFO57XVXT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4020/">CVE-2009-4020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4020">CVE-2009-4020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/564374">SUSE bug 564374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605463">SUSE bug 605463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/760902">SUSE bug 760902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4026" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4026" ref_url="https://www.suse.com/security/cve/CVE-2009-4026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4026/">CVE-2009-4026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4026">CVE-2009-4026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4027" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4027" ref_url="https://www.suse.com/security/cve/CVE-2009-4027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4027/">CVE-2009-4027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4027">CVE-2009-4027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/558267">SUSE bug 558267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4031" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4031" ref_url="https://www.suse.com/security/cve/CVE-2009-4031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5/#Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5" source="SUSE-SU"/>
    <description>
    The do_insn_fetch function in arch/x86/kvm/emulate.c in the x86 emulator in the KVM subsystem in the Linux kernel before 2.6.32-rc8-next-20091125 tries to interpret instructions that contain too many bytes to be valid, which allows guest OS users to cause a denial of service (increased scheduling latency) on the host OS via unspecified manipulations related to SMP support.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4031/">CVE-2009-4031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4031">CVE-2009-4031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/558269">SUSE bug 558269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/558662">SUSE bug 558662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4067" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4067" ref_url="https://www.suse.com/security/cve/CVE-2009-4067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW/#PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z/#TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH/#O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH" source="SUSE-SU"/>
    <description>
    Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-23"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4067/">CVE-2009-4067 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-4067">CVE-2009-4067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/706375">SUSE bug 706375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4131" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4131" ref_url="https://www.suse.com/security/cve/CVE-2009-4131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
    <description>
    The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4131/">CVE-2009-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4131">CVE-2009-4131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/561018">SUSE bug 561018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/564380">SUSE bug 564380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4138" ref_url="https://www.suse.com/security/cve/CVE-2009-4138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4138/">CVE-2009-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4138">CVE-2009-4138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/564712">SUSE bug 564712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4306" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4306" ref_url="https://www.suse.com/security/cve/CVE-2009-4306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in the EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel 2.6.32-git6 and earlier allows local users to cause a denial of service (filesystem corruption) via unknown vectors, a different vulnerability than CVE-2009-4131.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4306/">CVE-2009-4306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4306">CVE-2009-4306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/564380">SUSE bug 564380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4307" ref_url="https://www.suse.com/security/cve/CVE-2009-4307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
    <description>
    The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4307/">CVE-2009-4307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4307">CVE-2009-4307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/564381">SUSE bug 564381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/757278">SUSE bug 757278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4308" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4308" ref_url="https://www.suse.com/security/cve/CVE-2009-4308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B/#6EUPN3X7UVL2F6RVNW2ZMDKAJ4DGDC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
    <description>
    The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4308/">CVE-2009-4308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4308">CVE-2009-4308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/564382">SUSE bug 564382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4536" ref_url="https://www.suse.com/security/cve/CVE-2009-4536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHSYYK2C4AVXP3463IZLFVHKMS3EFLTJ/#VHSYYK2C4AVXP3463IZLFVHKMS3EFLTJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IGWGCVJIVXEJTQI63OKMDXG6Z7NEK7Q/#7IGWGCVJIVXEJTQI63OKMDXG6Z7NEK7Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5/#6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4536/">CVE-2009-4536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4536">CVE-2009-4536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/583434">SUSE bug 583434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4537" ref_url="https://www.suse.com/security/cve/CVE-2009-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:023" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LHH3HFDCR45LY6R5O4DNEOZJFO57XVXT/#LHH3HFDCR45LY6R5O4DNEOZJFO57XVXT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-11"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4537/">CVE-2009-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4537">CVE-2009-4537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-4538" ref_url="https://www.suse.com/security/cve/CVE-2009-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU/#YRJM6AABPE7I4ELSYAKTGTNGOMJ4AUMU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHSYYK2C4AVXP3463IZLFVHKMS3EFLTJ/#VHSYYK2C4AVXP3463IZLFVHKMS3EFLTJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:009" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7IGWGCVJIVXEJTQI63OKMDXG6Z7NEK7Q/#7IGWGCVJIVXEJTQI63OKMDXG6Z7NEK7Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5/#6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
    <description>
    drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-23"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2009-4538/">CVE-2009-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2009-4538">CVE-2009-4538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/567376">SUSE bug 567376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2009-5155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155" source="CVE"/>
    <reference ref_id="SUSE CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2009-5155">CVE-2009-5155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127223">SUSE bug 1127223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0003" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0003" ref_url="https://www.suse.com/security/cve/CVE-2010-0003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5/#6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
    <description>
    The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0003/">CVE-2010-0003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0003">CVE-2010-0003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/569902">SUSE bug 569902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0006" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0006" ref_url="https://www.suse.com/security/cve/CVE-2010-0006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5/#6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5" source="SUSE-SU"/>
    <description>
    The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, when network namespaces are enabled, allows remote attackers to cause a denial of service (NULL pointer dereference) via an invalid IPv6 jumbogram, a related issue to CVE-2007-4567.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0006/">CVE-2010-0006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0006">CVE-2010-0006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/570608">SUSE bug 570608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0007" ref_url="https://www.suse.com/security/cve/CVE-2010-0007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHSYYK2C4AVXP3463IZLFVHKMS3EFLTJ/#VHSYYK2C4AVXP3463IZLFVHKMS3EFLTJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5/#6HF6RY6TTMH5GUAKIY4PK5ORTYBMCRH5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7/#VOKMCX2E7RFNL3MQBKUR5MTUYN2PLRY7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:013" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOO52H6HPGT3AKFW3LG6FA5JFG77BK23/#JOO52H6HPGT3AKFW3LG6FA5JFG77BK23" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
    <description>
    net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0007/">CVE-2010-0007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0007">CVE-2010-0007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/570602">SUSE bug 570602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/570606">SUSE bug 570606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0008" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0008" ref_url="https://www.suse.com/security/cve/CVE-2010-0008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    The sctp_rcv_ootb function in the SCTP implementation in the Linux kernel before 2.6.23 allows remote attackers to cause a denial of service (infinite loop) via (1) an Out Of The Blue (OOTB) chunk or (2) a chunk of zero length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0008/">CVE-2010-0008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0008">CVE-2010-0008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/586195">SUSE bug 586195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0307" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0307" ref_url="https://www.suse.com/security/cve/CVE-2010-0307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:016" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IW366OA2QCFISGE6LTWFS27XBCPBY5XF/#IW366OA2QCFISGE6LTWFS27XBCPBY5XF" source="SUSE-SU"/>
    <description>
    The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0307/">CVE-2010-0307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0307">CVE-2010-0307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/575644">SUSE bug 575644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0410" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0410" ref_url="https://www.suse.com/security/cve/CVE-2010-0410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:016" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IW366OA2QCFISGE6LTWFS27XBCPBY5XF/#IW366OA2QCFISGE6LTWFS27XBCPBY5XF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5/#Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D5G4PTV5M2INPXOCAW5ONECG6YT3HVXP/#D5G4PTV5M2INPXOCAW5ONECG6YT3HVXP" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:023" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LHH3HFDCR45LY6R5O4DNEOZJFO57XVXT/#LHH3HFDCR45LY6R5O4DNEOZJFO57XVXT" source="SUSE-SU"/>
    <description>
    drivers/connector/connector.c in the Linux kernel before 2.6.32.8 allows local users to cause a denial of service (memory consumption and system crash) by sending the kernel many NETLINK_CONNECTOR messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0410/">CVE-2010-0410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0410">CVE-2010-0410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/576927">SUSE bug 576927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/605463">SUSE bug 605463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0415" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0415" ref_url="https://www.suse.com/security/cve/CVE-2010-0415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:014" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F/#YRNOCSHY76L5C3H4KMTO6OBS4KNFSB7F" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:016" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IW366OA2QCFISGE6LTWFS27XBCPBY5XF/#IW366OA2QCFISGE6LTWFS27XBCPBY5XF" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5/#Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5" source="SUSE-SU"/>
    <description>
    The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which allows local users to read arbitrary kernel memory locations, cause a denial of service (OOPS), and possibly have unspecified other impact by specifying a node that is not part of the kernel's node set.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0415/">CVE-2010-0415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0415">CVE-2010-0415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/577753">SUSE bug 577753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0623" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0623" ref_url="https://www.suse.com/security/cve/CVE-2010-0623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:018" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5/#Z2IU6Z7CZCLRAGF6XATO2C3HR6SFA6H5" source="SUSE-SU"/>
    <description>
    The futex_lock_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly manage a certain reference count, which allows local users to cause a denial of service (OOPS) via vectors involving an unmount of an ext3 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0623/">CVE-2010-0623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0623">CVE-2010-0623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/579439">SUSE bug 579439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:011" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ACBTGUNJ6CTYWLVUTLYEKQX3ERY3PSCW/#ACBTGUNJ6CTYWLVUTLYEKQX3ERY3PSCW" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0624">CVE-2010-0624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/579475">SUSE bug 579475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/608034">SUSE bug 608034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491105" comment="tar-1.30-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0730" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0730" ref_url="https://www.suse.com/security/cve/CVE-2010-0730" source="SUSE CVE"/>
    <description>
    The MMIO instruction decoder in the Xen hypervisor in the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows guest OS users to cause a denial of service (32-bit guest OS crash) via vectors that trigger an unspecified instruction emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0730/">CVE-2010-0730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0730">CVE-2010-0730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/601231">SUSE bug 601231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-0741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0741" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-0741" ref_url="https://www.suse.com/security/cve/CVE-2010-0741" source="SUSE CVE"/>
    <description>
    The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-0741/">CVE-2010-0741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-0741">CVE-2010-0741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/596032">SUSE bug 596032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1148" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1148" ref_url="https://www.suse.com/security/cve/CVE-2010-1148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The cifs_create function in fs/cifs/dir.c in the Linux kernel 2.6.33.2 and earlier allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a NULL nameidata (aka nd) field in a POSIX file-creation request to a server that supports UNIX extensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1148/">CVE-2010-1148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1148">CVE-2010-1148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/593940">SUSE bug 593940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1162" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1162" ref_url="https://www.suse.com/security/cve/CVE-2010-1162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The release_one_tty function in drivers/char/tty_io.c in the Linux kernel before 2.6.34-rc4 omits certain required calls to the put_pid function, which has unspecified impact and local attack vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1162/">CVE-2010-1162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1162">CVE-2010-1162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/596462">SUSE bug 596462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2010:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4LZZ3MZO5J623JA5TRPWFTPY7VAGNDI/#D4LZZ3MZO5J623JA5TRPWFTPY7VAGNDI" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOIEDREROIMRGBCEM4AQRCTMZ7TT4MR4/#MOIEDREROIMRGBCEM4AQRCTMZ7TT4MR4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:022" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XDLWM7AJKC7A6DXLRCE7CIRPCLQPJD3/#3XDLWM7AJKC7A6DXLRCE7CIRPCLQPJD3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MRJCRTNKYOCZRTJU7NWI4JJU22523JSM/#MRJCRTNKYOCZRTJU7NWI4JJU22523JSM" source="SUSE-SU"/>
    <description>
    DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1172">CVE-2010-1172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/628607">SUSE bug 628607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633621">SUSE bug 633621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633622">SUSE bug 633622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633623">SUSE bug 633623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633629">SUSE bug 633629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633637">SUSE bug 633637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633639">SUSE bug 633639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633648">SUSE bug 633648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633652">SUSE bug 633652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633653">SUSE bug 633653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633654">SUSE bug 633654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633658">SUSE bug 633658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633660">SUSE bug 633660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633678">SUSE bug 633678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633679">SUSE bug 633679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633681">SUSE bug 633681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633682">SUSE bug 633682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633685">SUSE bug 633685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633686">SUSE bug 633686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633700">SUSE bug 633700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633701">SUSE bug 633701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/633702">SUSE bug 633702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881810" comment="dbus-1-glib-0.108-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1173" ref_url="https://www.suse.com/security/cve/CVE-2010-1173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BB4UGPH27UKXQRHBKISZ3D6Y2F4NJ5TH/#BB4UGPH27UKXQRHBKISZ3D6Y2F4NJ5TH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
    <description>
    The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1173/">CVE-2010-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1173">CVE-2010-1173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/600375">SUSE bug 600375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702025">SUSE bug 702025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941110">SUSE bug 941110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1188" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1188" ref_url="https://www.suse.com/security/cve/CVE-2010-1188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1188/">CVE-2010-1188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1188">CVE-2010-1188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/592571">SUSE bug 592571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1436" ref_url="https://www.suse.com/security/cve/CVE-2010-1436" source="SUSE CVE"/>
    <description>
    gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1436/">CVE-2010-1436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1436">CVE-2010-1436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/599957">SUSE bug 599957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1437" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1437" ref_url="https://www.suse.com/security/cve/CVE-2010-1437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1437/">CVE-2010-1437 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-1437">CVE-2010-1437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/599955">SUSE bug 599955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1446" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1446" ref_url="https://www.suse.com/security/cve/CVE-2010-1446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
    <description>
    arch/powerpc/mm/fsl_booke_mmu.c in KGDB in the Linux kernel 2.6.30 and other versions before 2.6.33, when running on PowerPC, does not properly perform a security check for access to a kernel page, which allows local users to overwrite arbitrary kernel memory, related to Fsl booke.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1446/">CVE-2010-1446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1446">CVE-2010-1446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/600774">SUSE bug 600774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1636" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1636" ref_url="https://www.suse.com/security/cve/CVE-2010-1636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the btrfs functionality in the Linux kernel 2.6.29 through 2.6.32, and possibly other versions, does not ensure that a cloned file descriptor has been opened for reading, which allows local users to read sensitive information from a write-only file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1636/">CVE-2010-1636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1636">CVE-2010-1636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/606743">SUSE bug 606743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1641" ref_url="https://www.suse.com/security/cve/CVE-2010-1641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5LTWJAB7OTJNIUK5PCEWNE6D3DANBJ2/#P5LTWJAB7OTJNIUK5PCEWNE6D3DANBJ2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1641/">CVE-2010-1641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1641">CVE-2010-1641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/608576">SUSE bug 608576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1643" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1643" ref_url="https://www.suse.com/security/cve/CVE-2010-1643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ/#A6RZQO4A76KMDJ3GESFHU2SI6XZIX2XQ" source="SUSE-SU"/>
    <description>
    mm/shmem.c in the Linux kernel before 2.6.28-rc3, when strict overcommit is enabled, does not properly handle the export of shmemfs objects by knfsd, which allows attackers to cause a denial of service (NULL pointer dereference and knfsd crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1643/">CVE-2010-1643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1643">CVE-2010-1643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/608933">SUSE bug 608933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-1646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-1646" ref_url="https://www.suse.com/security/cve/CVE-2010-1646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2VK7FPKD3ZEG555N25GLTFTZJJB237A/#C2VK7FPKD3ZEG555N25GLTFTZJJB237A" source="SUSE-SU"/>
    <description>
    The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-19"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-1646/">CVE-2010-1646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-1646">CVE-2010-1646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/594738">SUSE bug 594738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2066" ref_url="https://www.suse.com/security/cve/CVE-2010-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5LTWJAB7OTJNIUK5PCEWNE6D3DANBJ2/#P5LTWJAB7OTJNIUK5PCEWNE6D3DANBJ2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2066/">CVE-2010-2066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2066">CVE-2010-2066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/612457">SUSE bug 612457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2226" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2226" ref_url="https://www.suse.com/security/cve/CVE-2010-2226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel before 2.6.35 does not properly check the file descriptors passed to the SWAPEXT ioctl, which allows local users to leverage write access and obtain read access by swapping one file into another file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2226/">CVE-2010-2226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2226">CVE-2010-2226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/615141">SUSE bug 615141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2240" ref_url="https://www.suse.com/security/cve/CVE-2010-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUES5DJ2AEGCMOYQOK3OMXCCIWMDQPJW/#JUES5DJ2AEGCMOYQOK3OMXCCIWMDQPJW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000121.html" source="SUSE-SU"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2240/">CVE-2010-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2240">CVE-2010-2240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039348">SUSE bug 1039348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/211997">SUSE bug 211997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/546062">SUSE bug 546062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/59807">SUSE bug 59807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/615929">SUSE bug 615929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/618152">SUSE bug 618152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/632737">SUSE bug 632737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/643986">SUSE bug 643986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746949">SUSE bug 746949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2243" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2243" ref_url="https://www.suse.com/security/cve/CVE-2010-2243" source="SUSE CVE"/>
    <description>
    A vulnerability exists in kernel/time/clocksource.c in the Linux kernel before 2.6.34 where on non-GENERIC_TIME systems (GENERIC_TIME=n), accessing /sys/devices/system/clocksource/clocksource0/current_clocksource results in an OOPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2243/">CVE-2010-2243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2243">CVE-2010-2243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/617903">SUSE bug 617903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2248" ref_url="https://www.suse.com/security/cve/CVE-2010-2248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
    <description>
    fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel before 2.6.34-rc4 allows remote attackers to cause a denial of service (panic) via an SMB response packet with an invalid CountHigh value, as demonstrated by a response from an OS/2 server, related to the CIFSSMBWrite and CIFSSMBWrite2 functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2248/">CVE-2010-2248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2248">CVE-2010-2248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/618156">SUSE bug 618156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2492" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2492" ref_url="https://www.suse.com/security/cve/CVE-2010-2492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    Buffer overflow in the ecryptfs_uid_hash macro in fs/ecryptfs/messaging.c in the eCryptfs subsystem in the Linux kernel before 2.6.35 might allow local users to gain privileges or cause a denial of service (system crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2492/">CVE-2010-2492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2492">CVE-2010-2492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/619850">SUSE bug 619850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2495" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2495" ref_url="https://www.suse.com/security/cve/CVE-2010-2495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:033" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5LTWJAB7OTJNIUK5PCEWNE6D3DANBJ2/#P5LTWJAB7OTJNIUK5PCEWNE6D3DANBJ2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The pppol2tp_xmit function in drivers/net/pppol2tp.c in the L2TP implementation in the Linux kernel before 2.6.34 does not properly validate certain values associated with an interface, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors related to a routing change.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2495/">CVE-2010-2495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2495">CVE-2010-2495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/616612">SUSE bug 616612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2521" ref_url="https://www.suse.com/security/cve/CVE-2010-2521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:036" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC/#T6NN6UVHY3MOOXSRYFLDG7L7RH7SFAHC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUES5DJ2AEGCMOYQOK3OMXCCIWMDQPJW/#JUES5DJ2AEGCMOYQOK3OMXCCIWMDQPJW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in fs/nfsd/nfs4xdr.c in the XDR implementation in the NFS server in the Linux kernel before 2.6.34-rc6 allow remote attackers to cause a denial of service (panic) or possibly execute arbitrary code via a crafted NFSv4 compound WRITE request, related to the read_buf and nfsd4_decode_compound functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-12"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2521/">CVE-2010-2521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2521">CVE-2010-2521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/620372">SUSE bug 620372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2524" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2524" ref_url="https://www.suse.com/security/cve/CVE-2010-2524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:039" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKGWQM2WFN2RPEKJF5ECNIJIEVHTPZCJ/#JKGWQM2WFN2RPEKJF5ECNIJIEVHTPZCJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The DNS resolution functionality in the CIFS implementation in the Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a user's keyring for the dns_resolver upcall in the cifs.upcall userspace helper, which allows local users to spoof the results of DNS queries and perform arbitrary CIFS mounts via vectors involving an add_key call, related to a "cache stuffing" issue and MS-DFS referrals.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2524/">CVE-2010-2524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2524">CVE-2010-2524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/627386">SUSE bug 627386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/627447">SUSE bug 627447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2537" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2537" ref_url="https://www.suse.com/security/cve/CVE-2010-2537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:039" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKGWQM2WFN2RPEKJF5ECNIJIEVHTPZCJ/#JKGWQM2WFN2RPEKJF5ECNIJIEVHTPZCJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
    <description>
    The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a (1) BTRFS_IOC_CLONE or (2) BTRFS_IOC_CLONE_RANGE ioctl call that specifies this file as a donor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2537/">CVE-2010-2537 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2537">CVE-2010-2537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/624587">SUSE bug 624587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2798" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2798" ref_url="https://www.suse.com/security/cve/CVE-2010-2798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:039" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKGWQM2WFN2RPEKJF5ECNIJIEVHTPZCJ/#JKGWQM2WFN2RPEKJF5ECNIJIEVHTPZCJ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
    <description>
    The gfs2_dirent_find_space function in fs/gfs2/dir.c in the Linux kernel before 2.6.35 uses an incorrect size value in calculations associated with sentinel directory entries, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact by renaming a file in a GFS2 filesystem, related to the gfs2_rename function in fs/gfs2/ops_inode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-05"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2798/">CVE-2010-2798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2798">CVE-2010-2798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/627386">SUSE bug 627386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2803" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2803" ref_url="https://www.suse.com/security/cve/CVE-2010-2803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ/#GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2803/">CVE-2010-2803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2803">CVE-2010-2803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/628604">SUSE bug 628604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2942" ref_url="https://www.suse.com/security/cve/CVE-2010-2942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ/#GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2942/">CVE-2010-2942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2942">CVE-2010-2942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/632309">SUSE bug 632309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/642324">SUSE bug 642324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2943" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2943" ref_url="https://www.suse.com/security/cve/CVE-2010-2943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
    <description>
    The xfs implementation in the Linux kernel before 2.6.35 does not look up inode allocation btrees before reading inode buffers, which allows remote authenticated users to read unlinked files, or read or overwrite disk blocks that are currently assigned to an active file but were previously assigned to an unlinked file, by accessing a stale NFS filehandle.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2943/">CVE-2010-2943 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-2943">CVE-2010-2943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/632317">SUSE bug 632317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2946" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2946" ref_url="https://www.suse.com/security/cve/CVE-2010-2946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH/#KH22AJA2BG6TIE4IF6EUZWXJDQFF4BTH" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    fs/jfs/xattr.c in the Linux kernel before 2.6.35.2 does not properly handle a certain legacy format for storage of extended attributes, which might allow local users by bypass intended xattr namespace restrictions via an "os2." substring at the beginning of a name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2946/">CVE-2010-2946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2946">CVE-2010-2946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/633585">SUSE bug 633585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-2954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-2954" ref_url="https://www.suse.com/security/cve/CVE-2010-2954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ/#GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-2954/">CVE-2010-2954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-2954">CVE-2010-2954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/636112">SUSE bug 636112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3066" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3066" ref_url="https://www.suse.com/security/cve/CVE-2010-3066" source="SUSE CVE"/>
    <description>
    The io_submit_one function in fs/aio.c in the Linux kernel before 2.6.23 allows local users to cause a denial of service (NULL pointer dereference) via a crafted io_submit system call with an IOCB_FLAG_RESFD flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3066/">CVE-2010-3066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3066">CVE-2010-3066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/657944">SUSE bug 657944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3067" ref_url="https://www.suse.com/security/cve/CVE-2010-3067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3067/">CVE-2010-3067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3067">CVE-2010-3067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/642302">SUSE bug 642302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3078" ref_url="https://www.suse.com/security/cve/CVE-2010-3078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ/#GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CL5HFGDLUSOW3JFSC7DUXL3KNBR6VYM3/#CL5HFGDLUSOW3JFSC7DUXL3KNBR6VYM3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3078/">CVE-2010-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3078">CVE-2010-3078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/637436">SUSE bug 637436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3079" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3079" ref_url="https://www.suse.com/security/cve/CVE-2010-3079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3079/">CVE-2010-3079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3079">CVE-2010-3079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/637502">SUSE bug 637502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3080" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3080" ref_url="https://www.suse.com/security/cve/CVE-2010-3080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the snd_seq_oss_open function in sound/core/seq/oss/seq_oss_init.c in the Linux kernel before 2.6.36-rc4 might allow local users to cause a denial of service or possibly have unspecified other impact via an unsuccessful attempt to open the /dev/sequencer device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3080/">CVE-2010-3080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3080">CVE-2010-3080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/638277">SUSE bug 638277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3081" ref_url="https://www.suse.com/security/cve/CVE-2010-3081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ/#GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:043" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KA4GM7FOYXSUCJ5V2DGVTEKZXXQON6KL/#KA4GM7FOYXSUCJ5V2DGVTEKZXXQON6KL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CL5HFGDLUSOW3JFSC7DUXL3KNBR6VYM3/#CL5HFGDLUSOW3JFSC7DUXL3KNBR6VYM3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3L5GDZXI3WMZHDVQIRALSDV4XZQ2HFUX/#3L5GDZXI3WMZHDVQIRALSDV4XZQ2HFUX" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RKDKQLNEM7RLORAT2NPXV4HKQT2JJMHA/#RKDKQLNEM7RLORAT2NPXV4HKQT2JJMHA" source="SUSE-SU"/>
    <description>
    The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3081/">CVE-2010-3081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3081">CVE-2010-3081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/639709">SUSE bug 639709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/641575">SUSE bug 641575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3084" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3084" ref_url="https://www.suse.com/security/cve/CVE-2010-3084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3L5GDZXI3WMZHDVQIRALSDV4XZQ2HFUX/#3L5GDZXI3WMZHDVQIRALSDV4XZQ2HFUX" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3084/">CVE-2010-3084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3084">CVE-2010-3084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/638274">SUSE bug 638274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3086" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3086" ref_url="https://www.suse.com/security/cve/CVE-2010-3086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
    <description>
    include/asm-x86/futex.h in the Linux kernel before 2.6.25 does not properly implement exception fixup, which allows local users to cause a denial of service (panic) via an invalid application that triggers a page fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3086/">CVE-2010-3086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3086">CVE-2010-3086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/652595">SUSE bug 652595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3192" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192" source="SUSE CVE"/>
    <description>
    Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3192">CVE-2010-3192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/636113">SUSE bug 636113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3296" ref_url="https://www.suse.com/security/cve/CVE-2010-3296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3296/">CVE-2010-3296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3296">CVE-2010-3296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/639481">SUSE bug 639481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3297" ref_url="https://www.suse.com/security/cve/CVE-2010-3297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:044" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CL5HFGDLUSOW3JFSC7DUXL3KNBR6VYM3/#CL5HFGDLUSOW3JFSC7DUXL3KNBR6VYM3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:052" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS/#4GV6CUGE3JGTZZUYVACC3MINIWE4G3TS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3297/">CVE-2010-3297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3297">CVE-2010-3297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/639482">SUSE bug 639482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3298" ref_url="https://www.suse.com/security/cve/CVE-2010-3298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:050" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR/#FTWHZQECZVF4TGRTEVUBSSGMYS5MBMZR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3298/">CVE-2010-3298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3298">CVE-2010-3298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/639483">SUSE bug 639483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3301" ref_url="https://www.suse.com/security/cve/CVE-2010-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ/#GIKX6GMKTTINWV56BL7MRYU7LPQUBWUZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:043" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KA4GM7FOYXSUCJ5V2DGVTEKZXXQON6KL/#KA4GM7FOYXSUCJ5V2DGVTEKZXXQON6KL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:045" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3L5GDZXI3WMZHDVQIRALSDV4XZQ2HFUX/#3L5GDZXI3WMZHDVQIRALSDV4XZQ2HFUX" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS/#CRNVKNONG6RCZA7FTZTQXH2W5N2RC2YS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:047" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y/#J4VIDSB2HDHQJXBRRREJDLCGFFDJBX5Y" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SR:2010:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RKDKQLNEM7RLORAT2NPXV4HKQT2JJMHA/#RKDKQLNEM7RLORAT2NPXV4HKQT2JJMHA" source="SUSE-SU"/>
    <description>
    The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3301/">CVE-2010-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3301">CVE-2010-3301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/639708">SUSE bug 639708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3432" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3432" ref_url="https://www.suse.com/security/cve/CVE-2010-3432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3432/">CVE-2010-3432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3432">CVE-2010-3432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/641983">SUSE bug 641983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3437" ref_url="https://www.suse.com/security/cve/CVE-2010-3437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3437/">CVE-2010-3437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3437">CVE-2010-3437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/642486">SUSE bug 642486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3442" ref_url="https://www.suse.com/security/cve/CVE-2010-3442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3442/">CVE-2010-3442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3442">CVE-2010-3442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/642484">SUSE bug 642484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3448" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3448" ref_url="https://www.suse.com/security/cve/CVE-2010-3448" source="SUSE CVE"/>
    <description>
    drivers/platform/x86/thinkpad_acpi.c in the Linux kernel before 2.6.34 on ThinkPad devices, when the X.Org X server is used, does not properly restrict access to the video output control state, which allows local users to cause a denial of service (system hang) via a (1) read or (2) write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3448/">CVE-2010-3448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3448">CVE-2010-3448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/662671">SUSE bug 662671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3698" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3698" ref_url="https://www.suse.com/security/cve/CVE-2010-3698" source="SUSE CVE"/>
    <description>
    The KVM implementation in the Linux kernel before 2.6.36 does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3698/">CVE-2010-3698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3698">CVE-2010-3698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161450">SUSE bug 1161450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3705" ref_url="https://www.suse.com/security/cve/CVE-2010-3705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3705/">CVE-2010-3705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3705">CVE-2010-3705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/643513">SUSE bug 643513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3848" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3848" ref_url="https://www.suse.com/security/cve/CVE-2010-3848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW/#BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3848/">CVE-2010-3848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3848">CVE-2010-3848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/647632">SUSE bug 647632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3849" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3849" ref_url="https://www.suse.com/security/cve/CVE-2010-3849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW/#BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3849/">CVE-2010-3849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3849">CVE-2010-3849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/647632">SUSE bug 647632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3850" ref_url="https://www.suse.com/security/cve/CVE-2010-3850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW/#BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-24"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3850/">CVE-2010-3850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3850">CVE-2010-3850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/647632">SUSE bug 647632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/658461">SUSE bug 658461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3858" ref_url="https://www.suse.com/security/cve/CVE-2010-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3858/">CVE-2010-3858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3858">CVE-2010-3858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/648302">SUSE bug 648302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655220">SUSE bug 655220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3861" ref_url="https://www.suse.com/security/cve/CVE-2010-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3861/">CVE-2010-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3861">CVE-2010-3861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/649187">SUSE bug 649187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3865" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3865" ref_url="https://www.suse.com/security/cve/CVE-2010-3865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:057" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDMH6BQEYPWE2HAWMSUDVWHLOVCMF7ER/#UDMH6BQEYPWE2HAWMSUDVWHLOVCMF7ER" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3865/">CVE-2010-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3865">CVE-2010-3865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/650128">SUSE bug 650128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3873" ref_url="https://www.suse.com/security/cve/CVE-2010-3873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3873/">CVE-2010-3873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3873">CVE-2010-3873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/651219">SUSE bug 651219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/653260">SUSE bug 653260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3874" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3874" ref_url="https://www.suse.com/security/cve/CVE-2010-3874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3874/">CVE-2010-3874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3874">CVE-2010-3874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/651218">SUSE bug 651218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3875" ref_url="https://www.suse.com/security/cve/CVE-2010-3875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-19"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3875/">CVE-2010-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3875">CVE-2010-3875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/650897">SUSE bug 650897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3876" ref_url="https://www.suse.com/security/cve/CVE-2010-3876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3876/">CVE-2010-3876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3876">CVE-2010-3876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/650897">SUSE bug 650897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3877" ref_url="https://www.suse.com/security/cve/CVE-2010-3877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-24"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3877/">CVE-2010-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3877">CVE-2010-3877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/650897">SUSE bug 650897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3880" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3880" ref_url="https://www.suse.com/security/cve/CVE-2010-3880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3880/">CVE-2010-3880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3880">CVE-2010-3880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/651599">SUSE bug 651599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3881" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3881" ref_url="https://www.suse.com/security/cve/CVE-2010-3881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I/#O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q/#6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRDQJI67RACNYNJZVERB7O4CS7274XPK/#WRDQJI67RACNYNJZVERB7O4CS7274XPK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-3" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52/#7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/x86.c in the Linux kernel before 2.6.36.2 does not initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory via read operations on the /dev/kvm device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3881/">CVE-2010-3881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-3881">CVE-2010-3881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/651596">SUSE bug 651596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662663">SUSE bug 662663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/706696">SUSE bug 706696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-3904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3904" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-3904" ref_url="https://www.suse.com/security/cve/CVE-2010-3904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:053" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTLSHLX5ONFIBW3H2QBEV4KSNX7YANJL/#FTLSHLX5ONFIBW3H2QBEV4KSNX7YANJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2010:057" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDMH6BQEYPWE2HAWMSUDVWHLOVCMF7ER/#UDMH6BQEYPWE2HAWMSUDVWHLOVCMF7ER" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-19"/>
	<updated date="2024-06-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-3904/">CVE-2010-3904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-3904">CVE-2010-3904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/647392">SUSE bug 647392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676707">SUSE bug 676707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703752">SUSE bug 703752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4078" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4078" ref_url="https://www.suse.com/security/cve/CVE-2010-4078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel before 2.6.36-rc6 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4078/">CVE-2010-4078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4078">CVE-2010-4078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/642311">SUSE bug 642311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4080" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4080" ref_url="https://www.suse.com/security/cve/CVE-2010-4080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4080/">CVE-2010-4080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4080">CVE-2010-4080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/642312">SUSE bug 642312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4081" ref_url="https://www.suse.com/security/cve/CVE-2010-4081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-21"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4081/">CVE-2010-4081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4081">CVE-2010-4081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/642312">SUSE bug 642312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4158" ref_url="https://www.suse.com/security/cve/CVE-2010-4158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4158/">CVE-2010-4158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4158">CVE-2010-4158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/652563">SUSE bug 652563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4160" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4160" ref_url="https://www.suse.com/security/cve/CVE-2010-4160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW/#BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-22"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4160/">CVE-2010-4160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4160">CVE-2010-4160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/652939">SUSE bug 652939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4162" ref_url="https://www.suse.com/security/cve/CVE-2010-4162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2010:060" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2/#PPSS4LZ6IGVCHKT27TPEVHCN67OXYLT2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4162/">CVE-2010-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4162">CVE-2010-4162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/652945">SUSE bug 652945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4163" ref_url="https://www.suse.com/security/cve/CVE-2010-4163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4163/">CVE-2010-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4163">CVE-2010-4163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/652945">SUSE bug 652945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/662202">SUSE bug 662202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4165" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4165" ref_url="https://www.suse.com/security/cve/CVE-2010-4165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4165/">CVE-2010-4165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4165">CVE-2010-4165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/653258">SUSE bug 653258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4169" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4169" ref_url="https://www.suse.com/security/cve/CVE-2010-4169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4169/">CVE-2010-4169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4169">CVE-2010-4169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/653930">SUSE bug 653930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4242" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4242" ref_url="https://www.suse.com/security/cve/CVE-2010-4242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
    <description>
    The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4242/">CVE-2010-4242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4242">CVE-2010-4242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/655451">SUSE bug 655451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4243" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4243" ref_url="https://www.suse.com/security/cve/CVE-2010-4243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-22"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4243/">CVE-2010-4243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4243">CVE-2010-4243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/655220">SUSE bug 655220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/746947">SUSE bug 746947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4248" ref_url="https://www.suse.com/security/cve/CVE-2010-4248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-22"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4248/">CVE-2010-4248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4248">CVE-2010-4248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/655468">SUSE bug 655468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4249" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4249" ref_url="https://www.suse.com/security/cve/CVE-2010-4249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4249/">CVE-2010-4249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4249">CVE-2010-4249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/655696">SUSE bug 655696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/656153">SUSE bug 656153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4250" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4250" ref_url="https://www.suse.com/security/cve/CVE-2010-4250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4250/">CVE-2010-4250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4250">CVE-2010-4250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/655693">SUSE bug 655693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4251" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4251" ref_url="https://www.suse.com/security/cve/CVE-2010-4251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4251/">CVE-2010-4251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4251">CVE-2010-4251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/643138">SUSE bug 643138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/655973">SUSE bug 655973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826455">SUSE bug 826455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4256" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4256" ref_url="https://www.suse.com/security/cve/CVE-2010-4256" source="SUSE CVE"/>
    <description>
    The pipe_fcntl function in fs/pipe.c in the Linux kernel before 2.6.37 does not properly determine whether a file is a named pipe, which allows local users to cause a denial of service via an F_SETPIPE_SZ fcntl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4256/">CVE-2010-4256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4256">CVE-2010-4256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/656483">SUSE bug 656483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4258" ref_url="https://www.suse.com/security/cve/CVE-2010-4258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6/#MU6PRS7M3TH2CAHMB2VVAHUSADI3LEX6" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:004" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR/#OYMCYEC6QN4XM7JNVFBS2L6M23CWAJKR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW/#BZRQXOPBVRYYJ7VAQXHPHBOZMJNT7JAW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
    <description>
    The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4258/">CVE-2010-4258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4258">CVE-2010-4258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/657350">SUSE bug 657350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4263" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4263" ref_url="https://www.suse.com/security/cve/CVE-2010-4263" source="SUSE CVE"/>
    <description>
    The igb_receive_skb function in drivers/net/igb/igb_main.c in the Intel Gigabit Ethernet (aka igb) subsystem in the Linux kernel before 2.6.34, when Single Root I/O Virtualization (SR-IOV) and promiscuous mode are enabled but no VLANs are registered, allows remote attackers to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via a VLAN tagged frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4263/">CVE-2010-4263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4263">CVE-2010-4263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/657716">SUSE bug 657716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4342" ref_url="https://www.suse.com/security/cve/CVE-2010-4342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4342/">CVE-2010-4342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4342">CVE-2010-4342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/658461">SUSE bug 658461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4343" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4343" ref_url="https://www.suse.com/security/cve/CVE-2010-4343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4343/">CVE-2010-4343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4343">CVE-2010-4343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/658178">SUSE bug 658178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4346" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4346" ref_url="https://www.suse.com/security/cve/CVE-2010-4346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4346/">CVE-2010-4346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4346">CVE-2010-4346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/658720">SUSE bug 658720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4347" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4347" ref_url="https://www.suse.com/security/cve/CVE-2010-4347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:001" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7/#ABAOHR5GPBMBJSIKJXIJISPWBXLDW2J7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:007" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE/#KBGX4XHX7U4QGKLRI6GK72P7L6QETSTE" source="SUSE-SU"/>
    <description>
    The ACPI subsystem in the Linux kernel before 2.6.36.2 uses 0222 permissions for the debugfs custom_method file, which allows local users to gain privileges by placing a custom ACPI method in the ACPI interpreter tables, related to the acpi_debugfs_init function in drivers/acpi/debugfs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4347/">CVE-2010-4347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4347">CVE-2010-4347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/659076">SUSE bug 659076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4527" ref_url="https://www.suse.com/security/cve/CVE-2010-4527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:008" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQK53FUX3E72AX265QSP5ANFTEO2HFOC/#PQK53FUX3E72AX265QSP5ANFTEO2HFOC" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4527/">CVE-2010-4527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4527">CVE-2010-4527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/661945">SUSE bug 661945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4565" ref_url="https://www.suse.com/security/cve/CVE-2010-4565" source="SUSE CVE"/>
    <description>
    The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4565/">CVE-2010-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4565">CVE-2010-4565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161355">SUSE bug 1161355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/651218">SUSE bug 651218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4648" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4648" ref_url="https://www.suse.com/security/cve/CVE-2010-4648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4648/">CVE-2010-4648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4648">CVE-2010-4648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/662951">SUSE bug 662951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4649" ref_url="https://www.suse.com/security/cve/CVE-2010-4649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
    <description>
    Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4649/">CVE-2010-4649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-4649">CVE-2010-4649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/662953">SUSE bug 662953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-4805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4805" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-4805" ref_url="https://www.suse.com/security/cve/CVE-2010-4805" source="SUSE CVE"/>
    <description>
    The socket implementation in net/core/sock.c in the Linux kernel before 2.6.35 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service by sending a large amount of network traffic, related to the sk_add_backlog function and the sk_rmem_alloc socket field.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4251.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-4805/">CVE-2010-4805 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-4805">CVE-2010-4805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/698190">SUSE bug 698190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5107" ref_url="https://www.suse.com/security/cve/CVE-2010-5107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-August/000579.html" source="SUSE-SU"/>
    <description>
    The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5107/">CVE-2010-5107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5107">CVE-2010-5107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802639">SUSE bug 802639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841638">SUSE bug 841638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/858359">SUSE bug 858359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880259">SUSE bug 880259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/881234">SUSE bug 881234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5313" ref_url="https://www.suse.com/security/cve/CVE-2010-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5313/">CVE-2010-5313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2010-5313">CVE-2010-5313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5321" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5321" ref_url="https://www.suse.com/security/cve/CVE-2010-5321" source="SUSE CVE"/>
    <description>
    Memory leak in drivers/media/video/videobuf-core.c in the videobuf subsystem in the Linux kernel 2.6.x through 4.x allows local users to cause a denial of service (memory consumption) by leveraging /dev/video access for a series of mmap calls that require new allocations, a different vulnerability than CVE-2007-6761. NOTE: as of 2016-06-18, this affects only 11 drivers that have not been updated to use videobuf2 instead of videobuf.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5321/">CVE-2010-5321 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5321">CVE-2010-5321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035720">SUSE bug 1035720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916831">SUSE bug 916831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5331" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5331" ref_url="https://www.suse.com/security/cve/CVE-2010-5331" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In the Linux kernel before 2.6.34, a range check issue in drivers/gpu/drm/radeon/atombios.c could cause an off by one (buffer overflow) problem. NOTE: At least one Linux maintainer believes that this CVE is incorrectly assigned and should be rejected because the value is hard coded and are not user-controllable where it is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5331/">CVE-2010-5331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5331">CVE-2010-5331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143173">SUSE bug 1143173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2010-5332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5332" source="CVE"/>
    <reference ref_id="SUSE CVE-2010-5332" ref_url="https://www.suse.com/security/cve/CVE-2010-5332" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2010-5332/">CVE-2010-5332 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2010-5332">CVE-2010-5332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143170">SUSE bug 1143170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0010" ref_url="https://www.suse.com/security/cve/CVE-2011-0010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:002" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2VK7FPKD3ZEG555N25GLTFTZJJB237A/#C2VK7FPKD3ZEG555N25GLTFTZJJB237A" source="SUSE-SU"/>
    <description>
    check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0010/">CVE-2011-0010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0010">CVE-2011-0010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/663881">SUSE bug 663881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0463" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0463" ref_url="https://www.suse.com/security/cve/CVE-2011-0463" source="SUSE CVE"/>
    <description>
    The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by reading a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0463/">CVE-2011-0463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0463">CVE-2011-0463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/670595">SUSE bug 670595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673037">SUSE bug 673037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0521" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0521" ref_url="https://www.suse.com/security/cve/CVE-2011-0521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
    <description>
    The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0521/">CVE-2011-0521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0521">CVE-2011-0521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/666836">SUSE bug 666836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:005" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EGMBZ4V3FXEOTK3OYPVBV3OWLOESLOL/#2EGMBZ4V3FXEOTK3OYPVBV3OWLOESLOL" source="SUSE-SU"/>
    <description>
    fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0541">CVE-2011-0541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/668820">SUSE bug 668820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/685055">SUSE bug 685055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489671" comment="fuse-2.9.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489674" comment="libfuse2-2.9.7-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0699" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0699" ref_url="https://www.suse.com/security/cve/CVE-2011-0699" source="SUSE CVE"/>
    <description>
    Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0699/">CVE-2011-0699 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-0699">CVE-2011-0699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167455">SUSE bug 1167455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0709" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0709" ref_url="https://www.suse.com/security/cve/CVE-2011-0709" source="SUSE CVE"/>
    <description>
    The br_mdb_ip_get function in net/bridge/br_multicast.c in the Linux kernel before 2.6.35-rc5 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an IGMP packet, related to lack of a multicast table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0709/">CVE-2011-0709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-0709">CVE-2011-0709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/672493">SUSE bug 672493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0710" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0710" ref_url="https://www.suse.com/security/cve/CVE-2011-0710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
    <description>
    The task_show_regs function in arch/s390/kernel/traps.c in the Linux kernel before 2.6.38-rc4-next-20110216 on the s390 platform allows local users to obtain the values of the registers of an arbitrary process by reading a status file under /proc/.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0710/">CVE-2011-0710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0710">CVE-2011-0710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/672492">SUSE bug 672492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0711" ref_url="https://www.suse.com/security/cve/CVE-2011-0711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:015" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VABTVUJW3D4JCIJP6MWROJY2VX53MOON/#VABTVUJW3D4JCIJP6MWROJY2VX53MOON" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
    <description>
    The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0711/">CVE-2011-0711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0711">CVE-2011-0711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/672505">SUSE bug 672505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/672524">SUSE bug 672524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0712" ref_url="https://www.suse.com/security/cve/CVE-2011-0712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:012" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73/#S4CYF4OFPS24A7LXDTWNIDHSC6TZEJ73" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0712/">CVE-2011-0712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0712">CVE-2011-0712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/672499">SUSE bug 672499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0726" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0726" ref_url="https://www.suse.com/security/cve/CVE-2011-0726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
    <description>
    The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0726/">CVE-2011-0726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0726">CVE-2011-0726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/701254">SUSE bug 701254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-0999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0999" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-0999" ref_url="https://www.suse.com/security/cve/CVE-2011-0999" source="SUSE CVE"/>
    <description>
    mm/huge_memory.c in the Linux kernel before 2.6.38-rc5 does not prevent creation of a transparent huge page (THP) during the existence of a temporary stack for an exec system call, which allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-0999/">CVE-2011-0999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-0999">CVE-2011-0999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183531">SUSE bug 1183531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/673261">SUSE bug 673261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1010" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1010" ref_url="https://www.suse.com/security/cve/CVE-2011-1010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1010/">CVE-2011-1010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1010">CVE-2011-1010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/673929">SUSE bug 673929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1012" ref_url="https://www.suse.com/security/cve/CVE-2011-1012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    The ldm_parse_vmdb function in fs/partitions/ldm.c in the Linux kernel before 2.6.38-rc6-git6 does not validate the VBLK size value in the VMDB structure in an LDM partition table, which allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted partition table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-22"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1012/">CVE-2011-1012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1012">CVE-2011-1012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674254">SUSE bug 674254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1013" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1013" ref_url="https://www.suse.com/security/cve/CVE-2011-1013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
    <description>
    Integer signedness error in the drm_modeset_ctl function in (1) drivers/gpu/drm/drm_irq.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.38 and (2) sys/dev/pci/drm/drm_irq.c in the kernel in OpenBSD before 4.9 allows local users to trigger out-of-bounds write operations, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via a crafted num_crtcs (aka vb_num) structure member in an ioctl argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1013/">CVE-2011-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1013">CVE-2011-1013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674691">SUSE bug 674691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1016" ref_url="https://www.suse.com/security/cve/CVE-2011-1016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    The Radeon GPU drivers in the Linux kernel before 2.6.38-rc5 do not properly validate data related to the AA resolve registers, which allows local users to write to arbitrary memory locations associated with (1) Video RAM (aka VRAM) or (2) the Graphics Translation Table (GTT) via crafted values.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1016/">CVE-2011-1016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1016">CVE-2011-1016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674691">SUSE bug 674691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/674693">SUSE bug 674693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1017" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1017" ref_url="https://www.suse.com/security/cve/CVE-2011-1017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-06"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1017/">CVE-2011-1017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1017">CVE-2011-1017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674648">SUSE bug 674648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698221">SUSE bug 698221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1019" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1019" ref_url="https://www.suse.com/security/cve/CVE-2011-1019" source="SUSE CVE"/>
    <description>
    The dev_load function in net/core/dev.c in the Linux kernel before 2.6.38 allows local users to bypass an intended CAP_SYS_MODULE capability requirement and load arbitrary modules by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1019/">CVE-2011-1019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1019">CVE-2011-1019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674978">SUSE bug 674978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1020" ref_url="https://www.suse.com/security/cve/CVE-2011-1020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1020/">CVE-2011-1020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1020">CVE-2011-1020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674982">SUSE bug 674982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1021" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1021" ref_url="https://www.suse.com/security/cve/CVE-2011-1021" source="SUSE CVE"/>
    <description>
    drivers/acpi/debugfs.c in the Linux kernel before 3.0 allows local users to modify arbitrary kernel memory locations by leveraging root privileges to write to the /sys/kernel/debug/acpi/custom_method file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4347.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1021/">CVE-2011-1021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1021">CVE-2011-1021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674988">SUSE bug 674988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1023" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1023" ref_url="https://www.suse.com/security/cve/CVE-2011-1023" source="SUSE CVE"/>
    <description>
    The Reliable Datagram Sockets (RDS) subsystem in the Linux kernel before 2.6.38 does not properly handle congestion map updates, which allows local users to cause a denial of service (BUG_ON and system crash) via vectors involving (1) a loopback (aka loop) transmit operation or (2) an InfiniBand (aka ib) transmit operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1023/">CVE-2011-1023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1023">CVE-2011-1023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/676707">SUSE bug 676707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/703752">SUSE bug 703752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1076" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1076" ref_url="https://www.suse.com/security/cve/CVE-2011-1076" source="SUSE CVE"/>
    <description>
    net/dns_resolver/dns_key.c in the Linux kernel before 2.6.38 allows remote DNS servers to cause a denial of service (NULL pointer dereference and OOPS) by not providing a valid response to a DNS query, as demonstrated by an erroneous grand.centrall.org query, which triggers improper handling of error data within a DNS resolver key.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1076/">CVE-2011-1076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1076">CVE-2011-1076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/702355">SUSE bug 702355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1078" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1078" ref_url="https://www.suse.com/security/cve/CVE-2011-1078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1078/">CVE-2011-1078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1078">CVE-2011-1078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/676601">SUSE bug 676601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1079" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1079" ref_url="https://www.suse.com/security/cve/CVE-2011-1079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1079/">CVE-2011-1079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1079">CVE-2011-1079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139868">SUSE bug 1139868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/676601">SUSE bug 676601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1080" ref_url="https://www.suse.com/security/cve/CVE-2011-1080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1080/">CVE-2011-1080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1080">CVE-2011-1080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/676602">SUSE bug 676602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1082" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1082" ref_url="https://www.suse.com/security/cve/CVE-2011-1082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
    <description>
    fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1082/">CVE-2011-1082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1082">CVE-2011-1082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/676202">SUSE bug 676202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1083" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1083" ref_url="https://www.suse.com/security/cve/CVE-2011-1083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1083/">CVE-2011-1083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1083">CVE-2011-1083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/676204">SUSE bug 676204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1090" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1090" ref_url="https://www.suse.com/security/cve/CVE-2011-1090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-20"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1090/">CVE-2011-1090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1090">CVE-2011-1090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/677286">SUSE bug 677286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1093" ref_url="https://www.suse.com/security/cve/CVE-2011-1093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1093/">CVE-2011-1093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1093">CVE-2011-1093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/677676">SUSE bug 677676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3SFKURISLALS2JGJL22FCLRZSUGU7TT/#J3SFKURISLALS2JGJL22FCLRZSUGU7TT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
    <description>
    Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1098">CVE-2011-1098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007000">SUSE bug 1007000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136195">SUSE bug 1136195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/677336">SUSE bug 677336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009886989" comment="logrotate-3.13.0-4.3.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3SFKURISLALS2JGJL22FCLRZSUGU7TT/#J3SFKURISLALS2JGJL22FCLRZSUGU7TT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
    <description>
    The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1154">CVE-2011-1154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679661">SUSE bug 679661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/681984">SUSE bug 681984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009886989" comment="logrotate-3.13.0-4.3.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SR:2011:010" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3SFKURISLALS2JGJL22FCLRZSUGU7TT/#J3SFKURISLALS2JGJL22FCLRZSUGU7TT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
    <description>
    The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1155">CVE-2011-1155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/677335">SUSE bug 677335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/679662">SUSE bug 679662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009886989" comment="logrotate-3.13.0-4.3.9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1160" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1160" ref_url="https://www.suse.com/security/cve/CVE-2011-1160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1160/">CVE-2011-1160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1160">CVE-2011-1160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/680040">SUSE bug 680040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1162" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1162" ref_url="https://www.suse.com/security/cve/CVE-2011-1162" source="SUSE CVE"/>
    <description>
    The tpm_read function in the Linux kernel 2.6 does not properly clear memory, which might allow local users to read the results of the previous TPM command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1162/">CVE-2011-1162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1162">CVE-2011-1162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/680040">SUSE bug 680040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1163" ref_url="https://www.suse.com/security/cve/CVE-2011-1163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1163/">CVE-2011-1163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1163">CVE-2011-1163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/679812">SUSE bug 679812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1169" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1169" ref_url="https://www.suse.com/security/cve/CVE-2011-1169" source="SUSE CVE"/>
    <description>
    Array index error in the asihpi_hpi_ioctl function in sound/pci/asihpi/hpioctl.c in the AudioScience HPI driver in the Linux kernel before 2.6.38.1 might allow local users to cause a denial of service (memory corruption) or possibly gain privileges via a crafted adapter index value that triggers access to an invalid kernel pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1169/">CVE-2011-1169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1169">CVE-2011-1169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/680816">SUSE bug 680816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1170" ref_url="https://www.suse.com/security/cve/CVE-2011-1170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1170/">CVE-2011-1170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1170">CVE-2011-1170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681180">SUSE bug 681180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1171" ref_url="https://www.suse.com/security/cve/CVE-2011-1171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1171/">CVE-2011-1171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1171">CVE-2011-1171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681181">SUSE bug 681181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1172" ref_url="https://www.suse.com/security/cve/CVE-2011-1172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1172/">CVE-2011-1172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1172">CVE-2011-1172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681185">SUSE bug 681185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693976">SUSE bug 693976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1173" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1173" ref_url="https://www.suse.com/security/cve/CVE-2011-1173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.39 on the x86_64 platform allows remote attackers to obtain potentially sensitive information from kernel stack memory by reading uninitialized data in the ah field of an Acorn Universal Networking (AUN) packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1173/">CVE-2011-1173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1173">CVE-2011-1173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681186">SUSE bug 681186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1182" ref_url="https://www.suse.com/security/cve/CVE-2011-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1182/">CVE-2011-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1182">CVE-2011-1182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681826">SUSE bug 681826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/690537">SUSE bug 690537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1410" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1410" ref_url="https://www.suse.com/security/cve/CVE-2011-1410" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2011-1410/">CVE-2011-1410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1410">CVE-2011-1410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/706386">SUSE bug 706386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1478" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1478" ref_url="https://www.suse.com/security/cve/CVE-2011-1478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
    <description>
    The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1478/">CVE-2011-1478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1478">CVE-2011-1478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/682965">SUSE bug 682965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698450">SUSE bug 698450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1479" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1479" ref_url="https://www.suse.com/security/cve/CVE-2011-1479" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the inotify subsystem in the Linux kernel before 2.6.39 allows local users to cause a denial of service (system crash) via vectors involving failed attempts to create files. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-4250.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1479/">CVE-2011-1479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1479">CVE-2011-1479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/655693">SUSE bug 655693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1493" ref_url="https://www.suse.com/security/cve/CVE-2011-1493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:017" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW/#XRWLBRQP4IGXBYYECF2N6PTVZO3NGLGW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:020" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY/#SQYDUXR6IEZWQG2Y4CUCRDFUUPS4L2TY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data that specifies a large number of digipeaters, and then sending this data to a ROSE socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1493/">CVE-2011-1493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1493">CVE-2011-1493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681175">SUSE bug 681175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1494" ref_url="https://www.suse.com/security/cve/CVE-2011-1494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1494/">CVE-2011-1494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1494">CVE-2011-1494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/685402">SUSE bug 685402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1495" ref_url="https://www.suse.com/security/cve/CVE-2011-1495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-11"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1495/">CVE-2011-1495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1495">CVE-2011-1495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/685402">SUSE bug 685402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1573" ref_url="https://www.suse.com/security/cve/CVE-2011-1573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:019" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL/#ZGBBDY2BACB6GLLGP6SDBHTGB3LG5YJL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
    <description>
    net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1573/">CVE-2011-1573 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1573">CVE-2011-1573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/686813">SUSE bug 686813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1576" ref_url="https://www.suse.com/security/cve/CVE-2011-1576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
    <description>
    The Generic Receive Offload (GRO) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux 5 and 2.6.32 on Red Hat Enterprise Linux 6, as used in Red Hat Enterprise Virtualization (RHEV) Hypervisor and other products, allows remote attackers to cause a denial of service via crafted VLAN packets that are processed by the napi_reuse_skb function, leading to (1) a memory leak or (2) memory corruption, a different vulnerability than CVE-2011-1478.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1576/">CVE-2011-1576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1576">CVE-2011-1576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/698450">SUSE bug 698450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1577" ref_url="https://www.suse.com/security/cve/CVE-2011-1577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:021" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ/#6K63QHIKYTXFR35KLOSC3HZD6EJUX7PZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW/#PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH/#O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1577/">CVE-2011-1577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1577">CVE-2011-1577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/687113">SUSE bug 687113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/692784">SUSE bug 692784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1585" ref_url="https://www.suse.com/security/cve/CVE-2011-1585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:026" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLWFE54U4VECE5GXYGG67GPNICBLJOI4/#QLWFE54U4VECE5GXYGG67GPNICBLJOI4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:027" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ/#NWEEUJ7BLLFNNQNQTCP2GMNHRKZXJ7FQ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA/#2GYOIMCZROPCPAJ2KKWIHJNXYM6WHVDA" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RASHLWHVHVIECGDWMR5S37FZEWJSK6UU/#RASHLWHVHVIECGDWMR5S37FZEWJSK6UU" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1585/">CVE-2011-1585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1585">CVE-2011-1585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/687812">SUSE bug 687812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1598" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1598" ref_url="https://www.suse.com/security/cve/CVE-2011-1598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1598/">CVE-2011-1598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1598">CVE-2011-1598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/688685">SUSE bug 688685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/689038">SUSE bug 689038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1745" ref_url="https://www.suse.com/security/cve/CVE-2011-1745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
    <description>
    Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-19"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1745/">CVE-2011-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1745">CVE-2011-1745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/689797">SUSE bug 689797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/693043">SUSE bug 693043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1747" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1747" ref_url="https://www.suse.com/security/cve/CVE-2011-1747" source="SUSE CVE"/>
    <description>
    The agp subsystem in the Linux kernel 2.6.38.5 and earlier does not properly restrict memory allocation by the (1) AGPIOC_RESERVE and (2) AGPIOC_ALLOCATE ioctls, which allows local users to cause a denial of service (memory consumption) by making many calls to these ioctls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1747/">CVE-2011-1747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1747">CVE-2011-1747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/689797">SUSE bug 689797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1767" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1767" ref_url="https://www.suse.com/security/cve/CVE-2011-1767" source="SUSE CVE"/>
    <description>
    net/ipv4/ip_gre.c in the Linux kernel before 2.6.34, when ip_gre is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1767/">CVE-2011-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1767">CVE-2011-1767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/692239">SUSE bug 692239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1770" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1770" ref_url="https://www.suse.com/security/cve/CVE-2011-1770" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel before 2.6.33.14 allows remote attackers to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which triggers a buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-08"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1770/">CVE-2011-1770 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1770">CVE-2011-1770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/692498">SUSE bug 692498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1771" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1771" ref_url="https://www.suse.com/security/cve/CVE-2011-1771" source="SUSE CVE"/>
    <description>
    The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1771/">CVE-2011-1771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1771">CVE-2011-1771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/692497">SUSE bug 692497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1776" ref_url="https://www.suse.com/security/cve/CVE-2011-1776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I/#O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW/#PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q/#6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRDQJI67RACNYNJZVERB7O4CS7274XPK/#WRDQJI67RACNYNJZVERB7O4CS7274XPK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-3" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52/#7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z/#TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH/#O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH" source="SUSE-SU"/>
    <description>
    The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1776/">CVE-2011-1776 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-1776">CVE-2011-1776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/692784">SUSE bug 692784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0898-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PDDWPGIFMXM4CV4DTIL5H2QGRQFFYQZ/#7PDDWPGIFMXM4CV4DTIL5H2QGRQFFYQZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
    <description>
    Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1833">CVE-2011-1833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/709771">SUSE bug 709771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/711539">SUSE bug 711539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-1927" ref_url="https://www.suse.com/security/cve/CVE-2011-1927" source="SUSE CVE"/>
    <description>
    The ip_expire function in net/ipv4/ip_fragment.c in the Linux kernel before 2.6.39 does not properly construct ICMP_TIME_EXCEEDED packets after a timeout, which allows remote attackers to cause a denial of service (invalid pointer dereference) via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-1927/">CVE-2011-1927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-1927">CVE-2011-1927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/694498">SUSE bug 694498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2182" ref_url="https://www.suse.com/security/cve/CVE-2011-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
    <description>
    The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2182/">CVE-2011-2182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2182">CVE-2011-2182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/674648">SUSE bug 674648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/698221">SUSE bug 698221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2189" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2189" ref_url="https://www.suse.com/security/cve/CVE-2011-2189" source="SUSE CVE"/>
    <description>
    net/core/net_namespace.c in the Linux kernel 2.6.32 and earlier does not properly handle a high rate of creation and cleanup of network namespaces, which makes it easier for remote attackers to cause a denial of service (memory consumption) via requests to a daemon that requires a separate namespace per connection, as demonstrated by vsftpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2189/">CVE-2011-2189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2189">CVE-2011-2189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/698449">SUSE bug 698449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2203" ref_url="https://www.suse.com/security/cve/CVE-2011-2203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2203/">CVE-2011-2203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2203">CVE-2011-2203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/699709">SUSE bug 699709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2213" ref_url="https://www.suse.com/security/cve/CVE-2011-2213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2213/">CVE-2011-2213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2213">CVE-2011-2213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/700879">SUSE bug 700879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2482" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2482" ref_url="https://www.suse.com/security/cve/CVE-2011-2482" source="SUSE CVE"/>
    <description>
    A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2482/">CVE-2011-2482 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2482">CVE-2011-2482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/735611">SUSE bug 735611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/750395">SUSE bug 750395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2484" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2484" ref_url="https://www.suse.com/security/cve/CVE-2011-2484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2484/">CVE-2011-2484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2484">CVE-2011-2484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/703153">SUSE bug 703153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2491" ref_url="https://www.suse.com/security/cve/CVE-2011-2491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:034" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B/#AUWCU7UECIPWR2OCEFCVH7XMHIBAMT4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT/#FT7C5SUYHXGPNFTUO64TWPKQ5FDMOQQT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
    <description>
    The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2491/">CVE-2011-2491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2491">CVE-2011-2491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/702013">SUSE bug 702013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2492" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2492" ref_url="https://www.suse.com/security/cve/CVE-2011-2492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2492/">CVE-2011-2492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2492">CVE-2011-2492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/702014">SUSE bug 702014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2493" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2493" ref_url="https://www.suse.com/security/cve/CVE-2011-2493" source="SUSE CVE"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel before 2.6.39 does not properly initialize a certain error-report data structure, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2493/">CVE-2011-2493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2493">CVE-2011-2493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/701998">SUSE bug 701998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2494" ref_url="https://www.suse.com/security/cve/CVE-2011-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user's password.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2494/">CVE-2011-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2494">CVE-2011-2494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/703156">SUSE bug 703156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2497" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2497" ref_url="https://www.suse.com/security/cve/CVE-2011-2497" source="SUSE CVE"/>
    <description>
    Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2497/">CVE-2011-2497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2497">CVE-2011-2497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/702286">SUSE bug 702286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2517" ref_url="https://www.suse.com/security/cve/CVE-2011-2517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:031" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7/#724DLQRA2MJMRHTZ75Z2RKOYB7Q7TTI7" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0832-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FKPHVULP43HGISNCTJADNJ3KAPNIOO2T/#FKPHVULP43HGISNCTJADNJ3KAPNIOO2T" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2517/">CVE-2011-2517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2517">CVE-2011-2517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/703410">SUSE bug 703410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2518" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2518" ref_url="https://www.suse.com/security/cve/CVE-2011-2518" source="SUSE CVE"/>
    <description>
    The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2518/">CVE-2011-2518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2518">CVE-2011-2518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/703158">SUSE bug 703158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2525" ref_url="https://www.suse.com/security/cve/CVE-2011-2525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
    <description>
    The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not prevent tc_fill_qdisc function calls referencing builtin (aka CQ_F_BUILTIN) Qdisc structures, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2525/">CVE-2011-2525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2525">CVE-2011-2525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/735612">SUSE bug 735612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2534" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2534" ref_url="https://www.suse.com/security/cve/CVE-2011-2534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    Buffer overflow in the clusterip_proc_write function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might allow local users to cause a denial of service or have unspecified other impact via a crafted write operation, related to string data that lacks a terminating '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2534/">CVE-2011-2534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2534">CVE-2011-2534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/681182">SUSE bug 681182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/702037">SUSE bug 702037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2689" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2689" ref_url="https://www.suse.com/security/cve/CVE-2011-2689" source="SUSE CVE"/>
    <description>
    The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple of the block size, which allows local users to cause a denial of service (BUG and system crash) by arranging for all resource groups to have too little free space.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2689/">CVE-2011-2689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2689">CVE-2011-2689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/710672">SUSE bug 710672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2695" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2695" ref_url="https://www.suse.com/security/cve/CVE-2011-2695" source="SUSE CVE"/>
    <description>
    Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before 3.0-rc5 allow local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corresponding to the largest possible 32-bit unsigned integer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2695/">CVE-2011-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2695">CVE-2011-2695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/706374">SUSE bug 706374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2699" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2699" ref_url="https://www.suse.com/security/cve/CVE-2011-2699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0115-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-January/000007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2699/">CVE-2011-2699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2699">CVE-2011-2699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/707288">SUSE bug 707288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2700" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2700" ref_url="https://www.suse.com/security/cve/CVE-2011-2700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I/#O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q/#6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRDQJI67RACNYNJZVERB7O4CS7274XPK/#WRDQJI67RACNYNJZVERB7O4CS7274XPK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-3" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52/#7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the si4713_write_econtrol_string function in drivers/media/radio/si4713-i2c.c in the Linux kernel before 2.6.39.4 on the N900 platform might allow local users to cause a denial of service or have unspecified other impact via a crafted s_ext_ctrls operation with a (1) V4L2_CID_RDS_TX_PS_NAME or (2) V4L2_CID_RDS_TX_RADIO_TEXT control ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2700/">CVE-2011-2700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2700">CVE-2011-2700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/707332">SUSE bug 707332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2707" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2707" ref_url="https://www.suse.com/security/cve/CVE-2011-2707" source="SUSE CVE"/>
    <description>
    The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2707/">CVE-2011-2707 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2707">CVE-2011-2707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/707337">SUSE bug 707337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2898" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2898" ref_url="https://www.suse.com/security/cve/CVE-2011-2898" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 2.6.39.3 does not properly restrict user-space access to certain packet data structures associated with VLAN Tag Control Information, which allows local users to obtain potentially sensitive information via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2898/">CVE-2011-2898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2898">CVE-2011-2898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/710235">SUSE bug 710235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2905" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2905" ref_url="https://www.suse.com/security/cve/CVE-2011-2905" source="SUSE CVE"/>
    <description>
    Untrusted search path vulnerability in the perf_config function in tools/perf/util/config.c in perf, as distributed in the Linux kernel before 3.1, allows local users to overwrite arbitrary files via a crafted config file in the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2905/">CVE-2011-2905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2905">CVE-2011-2905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/711414">SUSE bug 711414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2918" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2918" ref_url="https://www.suse.com/security/cve/CVE-2011-2918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:038" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I/#O7IS7JCIVBUYLCFPRGVHQYA4J52NBN2I" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q/#6HCOSERHZFFSQKSSSLJZFVHCZ4ODPD4Q" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRDQJI67RACNYNJZVERB7O4CS7274XPK/#WRDQJI67RACNYNJZVERB7O4CS7274XPK" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:0984-3" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52/#7WQ72SLSA2TOW5OCQVUK3I7I7B7OOT52" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
    <description>
    The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2918/">CVE-2011-2918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-2918">CVE-2011-2918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/712366">SUSE bug 712366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/713650">SUSE bug 713650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2928" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2928" ref_url="https://www.suse.com/security/cve/CVE-2011-2928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/236O7JWWHVHCISWQQUKMZHZDJP7M6NQL/#236O7JWWHVHCISWQQUKMZHZDJP7M6NQL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZT5STSK4C7JRTAI4Y2NMJSE6WEQLQXS/#WZT5STSK4C7JRTAI4Y2NMJSE6WEQLQXS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KJK53NLSAVICDBBPF2JY4GERNJ4DKIY/#7KJK53NLSAVICDBBPF2JY4GERNJ4DKIY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5UHBMAIHLC5EILJT3XQYYWE6BRFR64UB/#5UHBMAIHLC5EILJT3XQYYWE6BRFR64UB" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2928/">CVE-2011-2928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2928">CVE-2011-2928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/713430">SUSE bug 713430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-2942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2942" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-2942" ref_url="https://www.suse.com/security/cve/CVE-2011-2942" source="SUSE CVE"/>
    <description>
    A certain Red Hat patch to the __br_deliver function in net/bridge/br_forward.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging connectivity to a network interface that uses an Ethernet bridge device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-2942/">CVE-2011-2942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-2942">CVE-2011-2942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/726064">SUSE bug 726064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3188" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3188" ref_url="https://www.suse.com/security/cve/CVE-2011-3188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
    <description>
    The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3188/">CVE-2011-3188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3188">CVE-2011-3188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/713650">SUSE bug 713650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/737874">SUSE bug 737874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3191" ref_url="https://www.suse.com/security/cve/CVE-2011-3191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:040" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4/#DQFI3I6BPKSDWN5K7OUIOMLA7MLEUOH4" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:041" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/236O7JWWHVHCISWQQUKMZHZDJP7M6NQL/#236O7JWWHVHCISWQQUKMZHZDJP7M6NQL" source="SUSE-SU"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW/#PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SI42FCLA44ITGURXPWDCSCE4HIXSUC56/#SI42FCLA44ITGURXPWDCSCE4HIXSUC56" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT/#FGPY6IK77NPKUIA3AYLBI4CFUVTD4XJT" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZT5STSK4C7JRTAI4Y2NMJSE6WEQLQXS/#WZT5STSK4C7JRTAI4Y2NMJSE6WEQLQXS" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1101-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7KJK53NLSAVICDBBPF2JY4GERNJ4DKIY/#7KJK53NLSAVICDBBPF2JY4GERNJ4DKIY" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5UHBMAIHLC5EILJT3XQYYWE6BRFR64UB/#5UHBMAIHLC5EILJT3XQYYWE6BRFR64UB" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z/#TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH/#O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH" source="SUSE-SU"/>
    <description>
    Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-05"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3191/">CVE-2011-3191 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3191">CVE-2011-3191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/714001">SUSE bug 714001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3359" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3359" ref_url="https://www.suse.com/security/cve/CVE-2011-3359" source="SUSE CVE"/>
    <description>
    The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3359/">CVE-2011-3359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3359">CVE-2011-3359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/717749">SUSE bug 717749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3363" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3363" ref_url="https://www.suse.com/security/cve/CVE-2011-3363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:042" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW/#PSUFR7VFCJPPYXKFYBB7AXMICIRUICSW" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z/#TVSK3LQUBZVYMR2HYVRPGIZ6PQJE5U6Z" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2011:1203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH/#O6BF6JGYOURZ25L2RHILUSCTEXFU3HGH" source="SUSE-SU"/>
    <description>
    The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3363/">CVE-2011-3363 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3363">CVE-2011-3363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/718028">SUSE bug 718028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3593" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3593" ref_url="https://www.suse.com/security/cve/CVE-2011-3593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote attackers to cause a denial of service (system crash) via priority-tagged VLAN frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3593/">CVE-2011-3593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3593">CVE-2011-3593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/735347">SUSE bug 735347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 suffer from multiple stack-based buffer overflow flaws because of the way directory trees with deeply nested directories are processed. A remote attacker could provide a specially-crafted directory tree, and trick the local user into consolidating it, leading to hardlink executable crash, or, potentially arbitrary code execution with the privileges of the user running the hardlink executable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3630">CVE-2011-3630 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896219" comment="hardlink-1.0+git.e66999f-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3631">CVE-2011-3631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896219" comment="hardlink-1.0+git.e66999f-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3632" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632" source="SUSE CVE"/>
    <description>
    Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-3632">CVE-2011-3632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896219" comment="hardlink-1.0+git.e66999f-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-3638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3638" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-3638" ref_url="https://www.suse.com/security/cve/CVE-2011-3638" source="SUSE CVE"/>
    <description>
    fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-3638/">CVE-2011-3638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-3638">CVE-2011-3638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/726045">SUSE bug 726045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4077" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4077" ref_url="https://www.suse.com/security/cve/CVE-2011-4077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the xfs_readlink function in fs/xfs/xfs_vnodeops.c in XFS in the Linux kernel 2.6, when CONFIG_XFS_DEBUG is disabled, allows local users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an XFS image containing a symbolic link with a long pathname.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4077/">CVE-2011-4077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4077">CVE-2011-4077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/726600">SUSE bug 726600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4080" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4080" ref_url="https://www.suse.com/security/cve/CVE-2011-4080" source="SUSE CVE"/>
    <description>
    The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4080/">CVE-2011-4080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4080">CVE-2011-4080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/726772">SUSE bug 726772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4081" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4081" ref_url="https://www.suse.com/security/cve/CVE-2011-4081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
    <description>
    crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call, as demonstrated by a write operation on an AF_ALG socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4081/">CVE-2011-4081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4081">CVE-2011-4081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/726788">SUSE bug 726788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4086" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4086" ref_url="https://www.suse.com/security/cve/CVE-2011-4086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel before 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesystem that was mounted with a journal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4086/">CVE-2011-4086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4086">CVE-2011-4086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/745832">SUSE bug 745832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4110" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4110" ref_url="https://www.suse.com/security/cve/CVE-2011-4110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4110/">CVE-2011-4110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4110">CVE-2011-4110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/734056">SUSE bug 734056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4131" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4131" ref_url="https://www.suse.com/security/cve/CVE-2011-4131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4131/">CVE-2011-4131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4131">CVE-2011-4131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/730117">SUSE bug 730117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/762992">SUSE bug 762992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4132" ref_url="https://www.suse.com/security/cve/CVE-2011-4132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0153-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allows local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4132/">CVE-2011-4132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4132">CVE-2011-4132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/730118">SUSE bug 730118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4324" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4324" ref_url="https://www.suse.com/security/cve/CVE-2011-4324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4324/">CVE-2011-4324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4324">CVE-2011-4324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/732613">SUSE bug 732613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4326" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4326" ref_url="https://www.suse.com/security/cve/CVE-2011-4326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000056.html" source="SUSE-SU"/>
    <description>
    The udp6_ufo_fragment function in net/ipv6/udp.c in the Linux kernel before 2.6.39, when a certain UDP Fragmentation Offload (UFO) configuration is enabled, allows remote attackers to cause a denial of service (system crash) by sending fragmented IPv6 UDP packets to a bridge device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4326/">CVE-2011-4326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4326">CVE-2011-4326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/732021">SUSE bug 732021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4330" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4330" ref_url="https://www.suse.com/security/cve/CVE-2011-4330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SA:2011:046" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2RBS4D4S6QSCPRASISULC5523JXQC4B/#G2RBS4D4S6QSCPRASISULC5523JXQC4B" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXK7FBRPSSBTD4TISN4455IWAX4SAUI2/#VXK7FBRPSSBTD4TISN4455IWAX4SAUI2" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2011:1319-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L/#I3BE6KPXHNAHQRYVUA5ZD3OJGBG45L7L" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the hfs_mac2asc function in fs/hfs/trans.c in the Linux kernel 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via an HFS image with a crafted len field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4330/">CVE-2011-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4330">CVE-2011-4330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/731673">SUSE bug 731673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941447">SUSE bug 941447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4348" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4348" ref_url="https://www.suse.com/security/cve/CVE-2011-4348" source="SUSE CVE"/>
    <description>
    Race condition in the sctp_rcv function in net/sctp/input.c in the Linux kernel before 2.6.29 allows remote attackers to cause a denial of service (system hang) via SCTP packets. NOTE: in some environments, this issue exists because of an incomplete fix for CVE-2011-2482.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4348/">CVE-2011-4348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4348">CVE-2011-4348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/750395">SUSE bug 750395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4594" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4594" ref_url="https://www.suse.com/security/cve/CVE-2011-4594" source="SUSE CVE"/>
    <description>
    The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4594/">CVE-2011-4594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4594">CVE-2011-4594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/735810">SUSE bug 735810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4604" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4604" ref_url="https://www.suse.com/security/cve/CVE-2011-4604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG/#IKDRY7ECUXCHETLZFT3H5HKTO5DVG2BG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP/#3RX4AW4NXVY2APIBWG3LKHRVCSUNFQEP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4604/">CVE-2011-4604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4604">CVE-2011-4604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/736149">SUSE bug 736149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4611" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4611" ref_url="https://www.suse.com/security/cve/CVE-2011-4611" source="SUSE CVE"/>
    <description>
    Integer overflow in the perf_event_interrupt function in arch/powerpc/kernel/perf_event.c in the Linux kernel before 2.6.39 on powerpc platforms allows local users to cause a denial of service (unhandled performance monitor exception) via vectors that trigger certain outcomes of performance events.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4611/">CVE-2011-4611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-4611">CVE-2011-4611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/744023">SUSE bug 744023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4915" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4915" ref_url="https://www.suse.com/security/cve/CVE-2011-4915" source="SUSE CVE"/>
    <description>
    fs/proc/base.c in the Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /proc/interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4915/">CVE-2011-4915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4915">CVE-2011-4915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/738749">SUSE bug 738749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-4917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4917" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-4917" ref_url="https://www.suse.com/security/cve/CVE-2011-4917" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 3.1 there is an information disclosure issue via /proc/stat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-4917/">CVE-2011-4917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2011-4917">CVE-2011-4917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/738749">SUSE bug 738749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5321" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5321" ref_url="https://www.suse.com/security/cve/CVE-2011-5321" source="SUSE CVE"/>
    <description>
    The tty_open function in drivers/tty/tty_io.c in the Linux kernel before 3.1.1 mishandles a driver-lookup failure, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted access to a device file under the /dev/pts directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5321/">CVE-2011-5321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-5321">CVE-2011-5321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922447">SUSE bug 922447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-5327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5327" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-5327" ref_url="https://www.suse.com/security/cve/CVE-2011-5327" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 3.1, an off by one in the drivers/target/loopback/tcm_loop.c tcm_loop_make_naa_tpg() function could result in at least memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2011-5327/">CVE-2011-5327 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2011-5327">CVE-2011-5327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143175">SUSE bug 1143175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0028" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0028" ref_url="https://www.suse.com/security/cve/CVE-2012-0028" source="SUSE CVE"/>
    <description>
    The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0028/">CVE-2012-0028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0028">CVE-2012-0028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/739721">SUSE bug 739721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0045" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0045" ref_url="https://www.suse.com/security/cve/CVE-2012-0045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000112.html" source="SUSE-SU"/>
    <description>
    The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0045/">CVE-2012-0045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0045">CVE-2012-0045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/740969">SUSE bug 740969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0055" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0055" ref_url="https://www.suse.com/security/cve/CVE-2012-0055" source="SUSE CVE"/>
    <description>
    OverlayFS in the Linux kernel before 3.0.0-16.28, as used in Ubuntu 10.0.4 LTS and 11.10, is missing inode security checks which could allow attackers to bypass security restrictions and perform unauthorized actions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0055/">CVE-2012-0055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0055">CVE-2012-0055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/742027">SUSE bug 742027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0056" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0056" ref_url="https://www.suse.com/security/cve/CVE-2012-0056" source="SUSE CVE"/>
    <description>
    The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-05"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0056/">CVE-2012-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0056">CVE-2012-0056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171985">SUSE bug 1171985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742028">SUSE bug 742028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/742279">SUSE bug 742279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0058" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0058" ref_url="https://www.suse.com/security/cve/CVE-2012-0058" source="SUSE CVE"/>
    <description>
    The kiocb_batch_free function in fs/aio.c in the Linux kernel before 3.2.2 allows local users to cause a denial of service (OOPS) via vectors that trigger incorrect iocb management.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0058/">CVE-2012-0058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0058">CVE-2012-0058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/742030">SUSE bug 742030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-February/000023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-March/000049.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:0319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WY52RHOOS6D4P7TWG64JCZN5SSLY46OW/#WY52RHOOS6D4P7TWG64JCZN5SSLY46OW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LZWA5IC5L2QN74MAY2LDOH57OMCZY4GE/#LZWA5IC5L2QN74MAY2LDOH57OMCZY4GE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0444">CVE-2012-0444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/744275">SUSE bug 744275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/747912">SUSE bug 747912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000961.html" source="SUSE-SU"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0786">CVE-2012-0786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/853044">SUSE bug 853044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885003">SUSE bug 885003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881701" comment="augeas-1.10.1-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881703" comment="augeas-lenses-1.10.1-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881704" comment="libaugeas0-1.10.1-1.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0810" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0810" ref_url="https://www.suse.com/security/cve/CVE-2012-0810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0810/">CVE-2012-0810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0810">CVE-2012-0810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/749118">SUSE bug 749118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
    <description>
    The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0876">CVE-2012-0876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/750914">SUSE bug 750914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751464">SUSE bug 751464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/751465">SUSE bug 751465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0879" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0879" ref_url="https://www.suse.com/security/cve/CVE-2012-0879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000112.html" source="SUSE-SU"/>
    <description>
    The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0879/">CVE-2012-0879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-0879">CVE-2012-0879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/748812">SUSE bug 748812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-0957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0957" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-0957" ref_url="https://www.suse.com/security/cve/CVE-2012-0957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
    <description>
    The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-0957/">CVE-2012-0957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-0957">CVE-2012-0957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/783515">SUSE bug 783515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/783606">SUSE bug 783606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1090" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1090" ref_url="https://www.suse.com/security/cve/CVE-2012-1090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-April/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1090/">CVE-2012-1090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-1090">CVE-2012-1090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/749569">SUSE bug 749569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1583" ref_url="https://www.suse.com/security/cve/CVE-2012-1583" source="SUSE CVE"/>
    <description>
    Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1583/">CVE-2012-1583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1583">CVE-2012-1583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/757707">SUSE bug 757707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-1601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1601" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-1601" ref_url="https://www.suse.com/security/cve/CVE-2012-1601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The KVM implementation in the Linux kernel before 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-1601/">CVE-2012-1601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-1601">CVE-2012-1601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/754898">SUSE bug 754898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2100" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2100" ref_url="https://www.suse.com/security/cve/CVE-2012-2100" source="SUSE CVE"/>
    <description>
    The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 3.2.2, on the x86 platform and unspecified other platforms, allows user-assisted remote attackers to trigger inconsistent filesystem-groups data and possibly cause a denial of service via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value). NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4307.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2100/">CVE-2012-2100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2100">CVE-2012-2100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/757278">SUSE bug 757278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2119" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2119" ref_url="https://www.suse.com/security/cve/CVE-2012-2119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    Buffer overflow in the macvtap device driver in the Linux kernel before 3.4.5, when running in certain configurations, allows privileged KVM guest users to cause a denial of service (crash) via a long descriptor with a long vector length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2119/">CVE-2012-2119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2119">CVE-2012-2119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/758243">SUSE bug 758243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2121" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2121" ref_url="https://www.suse.com/security/cve/CVE-2012-2121" source="SUSE CVE"/>
    <description>
    The KVM implementation in the Linux kernel before 3.3.4 does not properly manage the relationships between memory slots and the iommu, which allows guest OS users to cause a denial of service (memory leak and host OS crash) by leveraging administrative access to the guest OS to conduct hotunplug and hotplug operations on devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2121/">CVE-2012-2121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2121">CVE-2012-2121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/758355">SUSE bug 758355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2123" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2123" ref_url="https://www.suse.com/security/cve/CVE-2012-2123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2123/">CVE-2012-2123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2123">CVE-2012-2123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/758260">SUSE bug 758260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2127" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2127" ref_url="https://www.suse.com/security/cve/CVE-2012-2127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000129.html" source="SUSE-SU"/>
    <description>
    fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2127/">CVE-2012-2127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2127">CVE-2012-2127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/757783">SUSE bug 757783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2133" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2133" ref_url="https://www.suse.com/security/cve/CVE-2012-2133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-May/000112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2133/">CVE-2012-2133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2133">CVE-2012-2133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/758532">SUSE bug 758532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2136" ref_url="https://www.suse.com/security/cve/CVE-2012-2136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2136/">CVE-2012-2136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2136">CVE-2012-2136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/765320">SUSE bug 765320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2137" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2137" ref_url="https://www.suse.com/security/cve/CVE-2012-2137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    Buffer overflow in virt/kvm/irq_comm.c in the KVM subsystem in the Linux kernel before 3.2.24 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to Message Signaled Interrupts (MSI), irq routing entries, and an incorrect check by the setup_routing_entry function before invoking the kvm_set_irq function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2137/">CVE-2012-2137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2137">CVE-2012-2137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/767612">SUSE bug 767612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2313" ref_url="https://www.suse.com/security/cve/CVE-2012-2313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-22"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2313/">CVE-2012-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2313">CVE-2012-2313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/758813">SUSE bug 758813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2372" ref_url="https://www.suse.com/security/cve/CVE-2012-2372" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
    <description>
    The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2372/">CVE-2012-2372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2372">CVE-2012-2372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/767610">SUSE bug 767610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2375" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2375" ref_url="https://www.suse.com/security/cve/CVE-2012-2375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000157.html" source="SUSE-SU"/>
    <description>
    The __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the NFSv4 implementation in the Linux kernel before 3.3.2 uses an incorrect length variable during a copy operation, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words in an FATTR4_ACL reply. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-4131.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2375/">CVE-2012-2375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2375">CVE-2012-2375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/762992">SUSE bug 762992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2383" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2383" ref_url="https://www.suse.com/security/cve/CVE-2012-2383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2383/">CVE-2012-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2383">CVE-2012-2383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/763194">SUSE bug 763194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2384" ref_url="https://www.suse.com/security/cve/CVE-2012-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2384/">CVE-2012-2384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2384">CVE-2012-2384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/763194">SUSE bug 763194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2390" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2390" ref_url="https://www.suse.com/security/cve/CVE-2012-2390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-June/000157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
    <description>
    Memory leak in mm/hugetlb.c in the Linux kernel before 3.4.2 allows local users to cause a denial of service (memory consumption or system crash) via invalid MAP_HUGETLB mmap operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2390/">CVE-2012-2390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2390">CVE-2012-2390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/764150">SUSE bug 764150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2669" ref_url="https://www.suse.com/security/cve/CVE-2012-2669" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2012:1673-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2012-December/000869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000166.html" source="SUSE-SU"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-18"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2669/">CVE-2012-2669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2669">CVE-2012-2669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/761200">SUSE bug 761200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2744" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2744" ref_url="https://www.suse.com/security/cve/CVE-2012-2744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000284.html" source="SUSE-SU"/>
    <description>
    net/ipv6/netfilter/nf_conntrack_reasm.c in the Linux kernel before 2.6.34, when the nf_conntrack_ipv6 module is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via certain types of fragmented IPv6 packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2744/">CVE-2012-2744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2744">CVE-2012-2744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770697">SUSE bug 770697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-2745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2745" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-2745" ref_url="https://www.suse.com/security/cve/CVE-2012-2745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
    <description>
    The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-2745/">CVE-2012-2745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-2745">CVE-2012-2745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770695">SUSE bug 770695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3364" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3364" ref_url="https://www.suse.com/security/cve/CVE-2012-3364" source="SUSE CVE"/>
    <description>
    Multiple stack-based buffer overflows in the Near Field Communication Controller Interface (NCI) in the Linux kernel before 3.4.5 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via incoming frames with crafted length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3364/">CVE-2012-3364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3364">CVE-2012-3364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/769171">SUSE bug 769171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3375" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3375" ref_url="https://www.suse.com/security/cve/CVE-2012-3375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-July/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-August/000234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3375/">CVE-2012-3375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3375">CVE-2012-3375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/769896">SUSE bug 769896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-November/000297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000539.html" source="SUSE-SU"/>
    <description>
    The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3406">CVE-2012-3406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770891">SUSE bug 770891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826666">SUSE bug 826666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3412" ref_url="https://www.suse.com/security/cve/CVE-2012-3412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2012:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGNI3GSLL4JWYRO3OO2QMP3COLVUAH6A/#CGNI3GSLL4JWYRO3OO2QMP3COLVUAH6A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3412/">CVE-2012-3412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3412">CVE-2012-3412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/774523">SUSE bug 774523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3430" ref_url="https://www.suse.com/security/cve/CVE-2012-3430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2012:1708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
    <description>
    The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3430/">CVE-2012-3430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3430">CVE-2012-3430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/773383">SUSE bug 773383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3510" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3510" ref_url="https://www.suse.com/security/cve/CVE-2012-3510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-October/000284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3510/">CVE-2012-3510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3510">CVE-2012-3510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/776888">SUSE bug 776888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3520" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3520" ref_url="https://www.suse.com/security/cve/CVE-2012-3520" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2012:1330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGNI3GSLL4JWYRO3OO2QMP3COLVUAH6A/#CGNI3GSLL4JWYRO3OO2QMP3COLVUAH6A" source="SUSE-SU"/>
    <description>
    The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3520/">CVE-2012-3520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3520">CVE-2012-3520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/776925">SUSE bug 776925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-3552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3552" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-3552" ref_url="https://www.suse.com/security/cve/CVE-2012-3552" source="SUSE CVE"/>
    <description>
    Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3552/">CVE-2012-3552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-3552">CVE-2012-3552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/778460">SUSE bug 778460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/795039">SUSE bug 795039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/827565">SUSE bug 827565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option).  NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4024">CVE-2012-4024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/773015">SUSE bug 773015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896702" comment="squashfs-4.3-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4025" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025" source="SUSE CVE"/>
    <description>
    Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4025">CVE-2012-4025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/773015">SUSE bug 773015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896702" comment="squashfs-4.3-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4398" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4398" ref_url="https://www.suse.com/security/cve/CVE-2012-4398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The __request_module function in kernel/kmod.c in the Linux kernel before 3.4 does not set a certain killable attribute, which allows local users to cause a denial of service (memory consumption) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4398/">CVE-2012-4398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4398">CVE-2012-4398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/778463">SUSE bug 778463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/779488">SUSE bug 779488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4444" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4444" ref_url="https://www.suse.com/security/cve/CVE-2012-4444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4444/">CVE-2012-4444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4444">CVE-2012-4444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/789831">SUSE bug 789831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4461" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4461" ref_url="https://www.suse.com/security/cve/CVE-2012-4461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4461/">CVE-2012-4461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4461">CVE-2012-4461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/787821">SUSE bug 787821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4508" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4508" ref_url="https://www.suse.com/security/cve/CVE-2012-4508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
    <description>
    Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4508/">CVE-2012-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4508">CVE-2012-4508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/784192">SUSE bug 784192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4530" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4530" ref_url="https://www.suse.com/security/cve/CVE-2012-4530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
    <description>
    The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4530/">CVE-2012-4530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4530">CVE-2012-4530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/786013">SUSE bug 786013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4542" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4542" ref_url="https://www.suse.com/security/cve/CVE-2012-4542" source="SUSE CVE"/>
    <description>
    block/scsi_ioctl.c in the Linux kernel through 3.8 does not properly consider the SCSI device class during authorization of SCSI commands, which allows local users to bypass intended access restrictions via an SG_IO ioctl call that leverages overlapping opcodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4542/">CVE-2012-4542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4542">CVE-2012-4542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/807154">SUSE bug 807154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-4565" ref_url="https://www.suse.com/security/cve/CVE-2012-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-4565/">CVE-2012-4565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-4565">CVE-2012-4565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/787576">SUSE bug 787576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5517" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5517" ref_url="https://www.suse.com/security/cve/CVE-2012-5517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2012:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2012-December/000318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-March/000365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5517/">CVE-2012-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5517">CVE-2012-5517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/789235">SUSE bug 789235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-5532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5532" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-5532" ref_url="https://www.suse.com/security/cve/CVE-2012-5532" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2012:1673-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2012-December/000869.html" source="SUSE-SU"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-5532/">CVE-2012-5532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-5532">CVE-2012-5532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/791605">SUSE bug 791605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6536" ref_url="https://www.suse.com/security/cve/CVE-2012-6536" source="SUSE CVE"/>
    <description>
    net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not verify that the actual Netlink message length is consistent with a certain header field, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability and providing a (1) new or (2) updated state.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6536/">CVE-2012-6536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6536">CVE-2012-6536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809889">SUSE bug 809889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6537" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6537" ref_url="https://www.suse.com/security/cve/CVE-2012-6537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6537/">CVE-2012-6537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6537">CVE-2012-6537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809889">SUSE bug 809889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6538" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6538" ref_url="https://www.suse.com/security/cve/CVE-2012-6538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The copy_to_user_auth function in net/xfrm/xfrm_user.c in the Linux kernel before 3.6 uses an incorrect C library function for copying a string, which allows local users to obtain sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6538/">CVE-2012-6538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6538">CVE-2012-6538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809889">SUSE bug 809889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6539" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6539" ref_url="https://www.suse.com/security/cve/CVE-2012-6539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The dev_ifconf function in net/socket.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6539/">CVE-2012-6539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6539">CVE-2012-6539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809891">SUSE bug 809891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6542" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6542" ref_url="https://www.suse.com/security/cve/CVE-2012-6542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect return value in certain circumstances, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that leverages an uninitialized pointer argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6542/">CVE-2012-6542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6542">CVE-2012-6542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809894">SUSE bug 809894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6544" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6544" ref_url="https://www.suse.com/security/cve/CVE-2012-6544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6544/">CVE-2012-6544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6544">CVE-2012-6544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809898">SUSE bug 809898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6545" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6545" ref_url="https://www.suse.com/security/cve/CVE-2012-6545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6545/">CVE-2012-6545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6545">CVE-2012-6545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809899">SUSE bug 809899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6546" ref_url="https://www.suse.com/security/cve/CVE-2012-6546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6546/">CVE-2012-6546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6546">CVE-2012-6546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809900">SUSE bug 809900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6547" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6547" ref_url="https://www.suse.com/security/cve/CVE-2012-6547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6547/">CVE-2012-6547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6547">CVE-2012-6547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809901">SUSE bug 809901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6548" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6548" ref_url="https://www.suse.com/security/cve/CVE-2012-6548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The udf_encode_fh function in fs/udf/namei.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6548/">CVE-2012-6548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6548">CVE-2012-6548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809902">SUSE bug 809902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6549" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6549" ref_url="https://www.suse.com/security/cve/CVE-2012-6549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6549/">CVE-2012-6549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6549">CVE-2012-6549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809903">SUSE bug 809903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6647" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6647" ref_url="https://www.suse.com/security/cve/CVE-2012-6647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
    <description>
    The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6647/">CVE-2012-6647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6647">CVE-2012-6647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/878289">SUSE bug 878289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6657" ref_url="https://www.suse.com/security/cve/CVE-2012-6657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 does not ensure that a keepalive action is associated with a stream socket, which allows local users to cause a denial of service (system crash) by leveraging the ability to create a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6657/">CVE-2012-6657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-6657">CVE-2012-6657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896779">SUSE bug 896779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6689" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6689" ref_url="https://www.suse.com/security/cve/CVE-2012-6689" source="SUSE CVE"/>
    <description>
    The netlink_sendmsg function in net/netlink/af_netlink.c in the Linux kernel before 3.5.5 does not validate the dst_pid field, which allows local users to have an unspecified impact by spoofing Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6689/">CVE-2012-6689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6689">CVE-2012-6689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920170">SUSE bug 920170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6701" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6701" ref_url="https://www.suse.com/security/cve/CVE-2012-6701" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    Integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6701/">CVE-2012-6701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6701">CVE-2012-6701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6702">CVE-2012-6702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983215">SUSE bug 983215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6703" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6703" ref_url="https://www.suse.com/security/cve/CVE-2012-6703" source="SUSE CVE"/>
    <description>
    Integer overflow in the snd_compr_allocate_buffer function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.6-rc6-next-20120917 allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6703/">CVE-2012-6703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6703">CVE-2012-6703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986941">SUSE bug 986941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6704" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6704" ref_url="https://www.suse.com/security/cve/CVE-2012-6704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
    <description>
    The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6704/">CVE-2012-6704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6704">CVE-2012-6704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013531">SUSE bug 1013531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013542">SUSE bug 1013542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6708" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6708" ref_url="https://www.suse.com/security/cve/CVE-2012-6708" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions, jQuery determined whether the input was HTML by looking for the '&lt;' character anywhere in the string, giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions, jQuery only deems the input to be HTML if it explicitly starts with the '&lt;' character, limiting exploitability only to attackers who can control the beginning of a string, which is far less common.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2012-6708/">CVE-2012-6708 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6708">CVE-2012-6708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111661">SUSE bug 1111661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2012-6712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6712" source="CVE"/>
    <reference ref_id="SUSE CVE-2012-6712" ref_url="https://www.suse.com/security/cve/CVE-2012-6712" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 3.4, a buffer overflow occurs in drivers/net/wireless/iwlwifi/iwl-agn-sta.c, which will cause at least memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2012-6712/">CVE-2012-6712 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2012-6712">CVE-2012-6712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143176">SUSE bug 1143176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0216" ref_url="https://www.suse.com/security/cve/CVE-2013-0216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ4YSHVKEIZ7SYD4PTYLVJPYAW3SDU7B/#PJ4YSHVKEIZ7SYD4PTYLVJPYAW3SDU7B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0216/">CVE-2013-0216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0216">CVE-2013-0216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800801">SUSE bug 800801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0217" ref_url="https://www.suse.com/security/cve/CVE-2013-0217" source="SUSE CVE"/>
    <description>
    Memory leak in drivers/net/xen-netback/netback.c in the Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (memory consumption) by triggering certain error conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0217/">CVE-2013-0217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0217">CVE-2013-0217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/800280">SUSE bug 800280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/800801">SUSE bug 800801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/801178">SUSE bug 801178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0221">CVE-2013-0221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896051" comment="coreutils-8.29-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0222">CVE-2013-0222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/796243">SUSE bug 796243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896051" comment="coreutils-8.29-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000600.html" source="SUSE-SU"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0223">CVE-2013-0223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/798538">SUSE bug 798538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798541">SUSE bug 798541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896051" comment="coreutils-8.29-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0228" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0228" ref_url="https://www.suse.com/security/cve/CVE-2013-0228" source="SUSE CVE"/>
    <description>
    The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel before 3.7.9 on 32-bit Xen paravirt_ops platforms does not properly handle an invalid value in the DS segment register, which allows guest OS users to gain guest OS privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0228/">CVE-2013-0228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0228">CVE-2013-0228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/801179">SUSE bug 801179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0268" ref_url="https://www.suse.com/security/cve/CVE-2013-0268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0268/">CVE-2013-0268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0268">CVE-2013-0268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/802642">SUSE bug 802642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0290" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0290" ref_url="https://www.suse.com/security/cve/CVE-2013-0290" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0951-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YBOOOUXLQA65MGPXKDQR6B4Q5BG74GEV/#YBOOOUXLQA65MGPXKDQR6B4Q5BG74GEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USCM24OK6GYTIPB7LLUXDDNDJBZUO2GK/#USCM24OK6GYTIPB7LLUXDDNDJBZUO2GK" source="SUSE-SU"/>
    <description>
    The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel before 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0290/">CVE-2013-0290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0290">CVE-2013-0290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/803931">SUSE bug 803931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0292" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292" source="SUSE CVE"/>
    <description>
    The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0292">CVE-2013-0292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/792095">SUSE bug 792095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804392">SUSE bug 804392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881810" comment="dbus-1-glib-0.108-1.29 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0309" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0309" ref_url="https://www.suse.com/security/cve/CVE-2013-0309" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
    <description>
    arch/x86/include/asm/pgtable.h in the Linux kernel before 3.6.2, when transparent huge pages are used, does not properly support PROT_NONE memory regions, which allows local users to cause a denial of service (system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0309/">CVE-2013-0309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0309">CVE-2013-0309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/804652">SUSE bug 804652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0310" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0310" ref_url="https://www.suse.com/security/cve/CVE-2013-0310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The cipso_v4_validate function in net/ipv4/cipso_ipv4.c in the Linux kernel before 3.4.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an IPOPT_CIPSO IP_OPTIONS setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0310/">CVE-2013-0310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0310">CVE-2013-0310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133087">SUSE bug 1133087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804653">SUSE bug 804653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0311" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0311" ref_url="https://www.suse.com/security/cve/CVE-2013-0311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The translate_desc function in drivers/vhost/vhost.c in the Linux kernel before 3.7 does not properly handle cross-region descriptors, which allows guest OS users to obtain host OS privileges by leveraging KVM guest OS privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0311/">CVE-2013-0311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0311">CVE-2013-0311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/804656">SUSE bug 804656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0343" ref_url="https://www.suse.com/security/cve/CVE-2013-0343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
    <description>
    The ipv6_create_tempaddr function in net/ipv6/addrconf.c in the Linux kernel through 3.8 does not properly handle problems with the generation of IPv6 temporary addresses, which allows remote attackers to cause a denial of service (excessive retries and address-generation outage), and consequently obtain sensitive information, via ICMPv6 Router Advertisement (RA) messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0343/">CVE-2013-0343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0343">CVE-2013-0343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/805226">SUSE bug 805226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0349" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0349" ref_url="https://www.suse.com/security/cve/CVE-2013-0349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The hidp_setup_hid function in net/bluetooth/hidp/core.c in the Linux kernel before 3.7.6 does not properly copy a certain name field, which allows local users to obtain sensitive information from kernel memory by setting a long name and making an HIDPCONNADD ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0349/">CVE-2013-0349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0349">CVE-2013-0349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/805227">SUSE bug 805227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0871" ref_url="https://www.suse.com/security/cve/CVE-2013-0871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-February/000352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-April/000423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U/#NFA4MFWJWTOTSXF5M2F4DO7JDJ2ULD3U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0871/">CVE-2013-0871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0871">CVE-2013-0871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/804154">SUSE bug 804154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/804227">SUSE bug 804227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/841063">SUSE bug 841063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0913" ref_url="https://www.suse.com/security/cve/CVE-2013-0913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD/#WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0913/">CVE-2013-0913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0913">CVE-2013-0913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/808829">SUSE bug 808829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0914" ref_url="https://www.suse.com/security/cve/CVE-2013-0914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0914/">CVE-2013-0914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0914">CVE-2013-0914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/808827">SUSE bug 808827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1763" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1763" ref_url="https://www.suse.com/security/cve/CVE-2013-1763" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2013:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJ4YSHVKEIZ7SYD4PTYLVJPYAW3SDU7B/#PJ4YSHVKEIZ7SYD4PTYLVJPYAW3SDU7B" source="SUSE-SU"/>
    <description>
    Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel before 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1763/">CVE-2013-1763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1763">CVE-2013-1763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/805633">SUSE bug 805633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807436">SUSE bug 807436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1767" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1767" ref_url="https://www.suse.com/security/cve/CVE-2013-1767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD/#WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the shmem_remount_fs function in mm/shmem.c in the Linux kernel before 3.7.10 allows local users to gain privileges or cause a denial of service (system crash) by remounting a tmpfs filesystem without specifying a required mpol (aka mempolicy) mount option.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1767/">CVE-2013-1767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1767">CVE-2013-1767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806138">SUSE bug 806138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807436">SUSE bug 807436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1772" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1772" ref_url="https://www.suse.com/security/cve/CVE-2013-1772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The log_prefix function in kernel/printk.c in the Linux kernel 3.x before 3.4.33 does not properly remove a prefix string from a syslog header, which allows local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and triggering a call_console_drivers function call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1772/">CVE-2013-1772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1772">CVE-2013-1772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806238">SUSE bug 806238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807441">SUSE bug 807441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1773" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1773" ref_url="https://www.suse.com/security/cve/CVE-2013-1773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the VFAT filesystem implementation in the Linux kernel before 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF-8 to UTF-16 conversion.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1773/">CVE-2013-1773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1773">CVE-2013-1773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806977">SUSE bug 806977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807452">SUSE bug 807452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1774" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1774" ref_url="https://www.suse.com/security/cve/CVE-2013-1774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD/#WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel before 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1774/">CVE-2013-1774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1774">CVE-2013-1774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806976">SUSE bug 806976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/807455">SUSE bug 807455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1776" ref_url="https://www.suse.com/security/cve/CVE-2013-1776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000614.html" source="SUSE-SU"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-22"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1776/">CVE-2013-1776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1776">CVE-2013-1776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806921">SUSE bug 806921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817349">SUSE bug 817349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/817350">SUSE bug 817350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1792" ref_url="https://www.suse.com/security/cve/CVE-2013-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
    <description>
    Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1792/">CVE-2013-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1792">CVE-2013-1792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/807428">SUSE bug 807428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/808358">SUSE bug 808358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1796" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1796" ref_url="https://www.suse.com/security/cve/CVE-2013-1796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD/#WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1796/">CVE-2013-1796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1796">CVE-2013-1796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1797" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1797" ref_url="https://www.suse.com/security/cve/CVE-2013-1797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD/#WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-06"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1797/">CVE-2013-1797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1797">CVE-2013-1797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806980">SUSE bug 806980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1819" ref_url="https://www.suse.com/security/cve/CVE-2013-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
    <description>
    The _xfs_buf_find function in fs/xfs/xfs_buf.c in the Linux kernel before 3.7.6 does not validate block numbers, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the ability to mount an XFS filesystem containing a metadata inode with an invalid extent map.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1819/">CVE-2013-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1819">CVE-2013-1819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/807471">SUSE bug 807471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1826" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1826" ref_url="https://www.suse.com/security/cve/CVE-2013-1826" source="SUSE CVE"/>
    <description>
    The xfrm_state_netlink function in net/xfrm/xfrm_user.c in the Linux kernel before 3.5.7 does not properly handle error conditions in dump_one_state function calls, which allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1826/">CVE-2013-1826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1826">CVE-2013-1826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809889">SUSE bug 809889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1827" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1827" ref_url="https://www.suse.com/security/cve/CVE-2013-1827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    net/dccp/ccid.h in the Linux kernel before 3.5.4 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for a certain (1) sender or (2) receiver getsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1827/">CVE-2013-1827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1827">CVE-2013-1827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/811354">SUSE bug 811354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1848" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1848" ref_url="https://www.suse.com/security/cve/CVE-2013-1848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
    <description>
    fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1848/">CVE-2013-1848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1848">CVE-2013-1848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/809155">SUSE bug 809155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1860" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1860" ref_url="https://www.suse.com/security/cve/CVE-2013-1860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the wdm_in_callback function in drivers/usb/class/cdc-wdm.c in the Linux kernel before 3.8.4 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted cdc-wdm USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1860/">CVE-2013-1860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1860">CVE-2013-1860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/806431">SUSE bug 806431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1873" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1873" ref_url="https://www.suse.com/security/cve/CVE-2013-1873" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-2634, CVE-2013-2635, CVE-2013-2636. Reason: This candidate is a duplicate of CVE-2013-2634, CVE-2013-2635, and CVE-2013-2636. Notes: All CVE users should reference one or more of CVE-2013-2634, CVE-2013-2635, and CVE-2013-2636 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1873/">CVE-2013-1873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1873">CVE-2013-1873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1928" ref_url="https://www.suse.com/security/cve/CVE-2013-1928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1928/">CVE-2013-1928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1928">CVE-2013-1928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/813735">SUSE bug 813735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1929" ref_url="https://www.suse.com/security/cve/CVE-2013-1929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1929/">CVE-2013-1929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1929">CVE-2013-1929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/813733">SUSE bug 813733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1943" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1943" ref_url="https://www.suse.com/security/cve/CVE-2013-1943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-05"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1943/">CVE-2013-1943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-1943">CVE-2013-1943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/828012">SUSE bug 828012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1979" ref_url="https://www.suse.com/security/cve/CVE-2013-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
    <description>
    The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1979/">CVE-2013-1979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1979">CVE-2013-1979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816708">SUSE bug 816708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1099-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000906.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1982">CVE-2013-1982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821665">SUSE bug 821665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881984" comment="libXext6-1.3.3-1.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1095-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000929.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1987">CVE-2013-1987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821669">SUSE bug 821669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882003" comment="libXrender1-0.9.10-1.30 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-1989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-1989">CVE-2013-1989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882011" comment="libXv1-1.0.11-1.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2015" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2015" ref_url="https://www.suse.com/security/cve/CVE-2013-2015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
    <description>
    The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2015/">CVE-2013-2015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2015">CVE-2013-2015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/817377">SUSE bug 817377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000905.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2066">CVE-2013-2066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/815451">SUSE bug 815451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/821671">SUSE bug 821671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880221">SUSE bug 880221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882011" comment="libXv1-1.0.11-1.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2094" ref_url="https://www.suse.com/security/cve/CVE-2013-2094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD/#WDQAGS3HIWV5U43YU5XZ47D2RCKJCBQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0925-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F/#D6BDTGUKFRICSQMOZAZQBL5QZOS7N57F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:0951-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YBOOOUXLQA65MGPXKDQR6B4Q5BG74GEV/#YBOOOUXLQA65MGPXKDQR6B4Q5BG74GEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USCM24OK6GYTIPB7LLUXDDNDJBZUO2GK/#USCM24OK6GYTIPB7LLUXDDNDJBZUO2GK" source="SUSE-SU"/>
    <description>
    The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2094/">CVE-2013-2094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2094">CVE-2013-2094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/819789">SUSE bug 819789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/820202">SUSE bug 820202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2128" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2128" ref_url="https://www.suse.com/security/cve/CVE-2013-2128" source="SUSE CVE"/>
    <description>
    The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2128/">CVE-2013-2128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-2128">CVE-2013-2128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/822583">SUSE bug 822583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2140" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2140" ref_url="https://www.suse.com/security/cve/CVE-2013-2140" source="SUSE CVE"/>
    <description>
    The dispatch_discard_io function in drivers/block/xen-blkback/blkback.c in the Xen blkback implementation in the Linux kernel before 3.10.5 allows guest OS users to cause a denial of service (data loss) via filesystem write operations on a read-only disk that supports the (1) BLKIF_OP_DISCARD (aka discard or TRIM) or (2) SCSI UNMAP feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2140/">CVE-2013-2140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2140">CVE-2013-2140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/844107">SUSE bug 844107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2141" ref_url="https://www.suse.com/security/cve/CVE-2013-2141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2141/">CVE-2013-2141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2141">CVE-2013-2141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/823267">SUSE bug 823267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2146" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2146" ref_url="https://www.suse.com/security/cve/CVE-2013-2146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2146/">CVE-2013-2146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2146">CVE-2013-2146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/825006">SUSE bug 825006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2206" ref_url="https://www.suse.com/security/cve/CVE-2013-2206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-November/000650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2206/">CVE-2013-2206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2206">CVE-2013-2206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/826102">SUSE bug 826102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2232" ref_url="https://www.suse.com/security/cve/CVE-2013-2232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2232/">CVE-2013-2232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2232">CVE-2013-2232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/827750">SUSE bug 827750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2234" ref_url="https://www.suse.com/security/cve/CVE-2013-2234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2234/">CVE-2013-2234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2234">CVE-2013-2234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/827749">SUSE bug 827749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2237" ref_url="https://www.suse.com/security/cve/CVE-2013-2237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2237/">CVE-2013-2237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2237">CVE-2013-2237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/828119">SUSE bug 828119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2634" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2634" ref_url="https://www.suse.com/security/cve/CVE-2013-2634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    net/dcb/dcbnl.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2634/">CVE-2013-2634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2634">CVE-2013-2634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2635" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2635" ref_url="https://www.suse.com/security/cve/CVE-2013-2635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0759-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-May/000451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2013:1187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV/#DS6LV3XZKPPENXXBGQO7QC4KI3KAUAZV" source="SUSE-SU"/>
    <description>
    The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2635/">CVE-2013-2635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2635">CVE-2013-2635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871595">SUSE bug 871595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2636" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2636" ref_url="https://www.suse.com/security/cve/CVE-2013-2636" source="SUSE CVE"/>
    <description>
    net/bridge/br_mdb.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-17"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2636/">CVE-2013-2636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2636">CVE-2013-2636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/810473">SUSE bug 810473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2888" ref_url="https://www.suse.com/security/cve/CVE-2013-2888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2888/">CVE-2013-2888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2888">CVE-2013-2888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2889" ref_url="https://www.suse.com/security/cve/CVE-2013-2889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2889/">CVE-2013-2889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2889">CVE-2013-2889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2890" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2890" ref_url="https://www.suse.com/security/cve/CVE-2013-2890" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2890/">CVE-2013-2890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2890">CVE-2013-2890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2891" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2891" ref_url="https://www.suse.com/security/cve/CVE-2013-2891" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2891/">CVE-2013-2891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2891">CVE-2013-2891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2892" ref_url="https://www.suse.com/security/cve/CVE-2013-2892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2892/">CVE-2013-2892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2892">CVE-2013-2892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2893" ref_url="https://www.suse.com/security/cve/CVE-2013-2893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2893/">CVE-2013-2893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2893">CVE-2013-2893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2894" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2894" ref_url="https://www.suse.com/security/cve/CVE-2013-2894" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2894/">CVE-2013-2894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2894">CVE-2013-2894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2895" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2895" ref_url="https://www.suse.com/security/cve/CVE-2013-2895" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2895/">CVE-2013-2895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2895">CVE-2013-2895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2896" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2896" ref_url="https://www.suse.com/security/cve/CVE-2013-2896" source="SUSE CVE"/>
    <description>
    drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2896/">CVE-2013-2896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2896">CVE-2013-2896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2897" ref_url="https://www.suse.com/security/cve/CVE-2013-2897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2897/">CVE-2013-2897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2897">CVE-2013-2897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2898" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2898" ref_url="https://www.suse.com/security/cve/CVE-2013-2898" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2898/">CVE-2013-2898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2898">CVE-2013-2898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-2899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2899" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-2899" ref_url="https://www.suse.com/security/cve/CVE-2013-2899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-2899/">CVE-2013-2899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-2899">CVE-2013-2899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/835839">SUSE bug 835839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3076" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3076" ref_url="https://www.suse.com/security/cve/CVE-2013-3076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
    <description>
    The crypto API in the Linux kernel through 3.9-rc8 does not initialize certain length variables, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call, related to the hash_recvmsg function in crypto/algif_hash.c and the skcipher_recvmsg function in crypto/algif_skcipher.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3076/">CVE-2013-3076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3076">CVE-2013-3076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3222" ref_url="https://www.suse.com/security/cve/CVE-2013-3222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3222/">CVE-2013-3222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3222">CVE-2013-3222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3223" ref_url="https://www.suse.com/security/cve/CVE-2013-3223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3223/">CVE-2013-3223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3223">CVE-2013-3223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3224" ref_url="https://www.suse.com/security/cve/CVE-2013-3224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3224/">CVE-2013-3224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3224">CVE-2013-3224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3226" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3226" ref_url="https://www.suse.com/security/cve/CVE-2013-3226" source="SUSE CVE"/>
    <description>
    The sco_sock_recvmsg function in net/bluetooth/sco.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3226/">CVE-2013-3226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3226">CVE-2013-3226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3227" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3227" ref_url="https://www.suse.com/security/cve/CVE-2013-3227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
    <description>
    The caif_seqpkt_recvmsg function in net/caif/caif_socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3227/">CVE-2013-3227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3227">CVE-2013-3227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3228" ref_url="https://www.suse.com/security/cve/CVE-2013-3228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3228/">CVE-2013-3228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3228">CVE-2013-3228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3229" ref_url="https://www.suse.com/security/cve/CVE-2013-3229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3229/">CVE-2013-3229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3229">CVE-2013-3229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3230" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3230" ref_url="https://www.suse.com/security/cve/CVE-2013-3230" source="SUSE CVE"/>
    <description>
    The l2tp_ip6_recvmsg function in net/l2tp/l2tp_ip6.c in the Linux kernel before 3.9-rc7 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-09"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3230/">CVE-2013-3230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3230">CVE-2013-3230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3231" ref_url="https://www.suse.com/security/cve/CVE-2013-3231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3231/">CVE-2013-3231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3231">CVE-2013-3231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3232" ref_url="https://www.suse.com/security/cve/CVE-2013-3232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3232/">CVE-2013-3232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3232">CVE-2013-3232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3233" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3233" ref_url="https://www.suse.com/security/cve/CVE-2013-3233" source="SUSE CVE"/>
    <description>
    The llcp_sock_recvmsg function in net/nfc/llcp/sock.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable and a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-05"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3233/">CVE-2013-3233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3233">CVE-2013-3233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3234" ref_url="https://www.suse.com/security/cve/CVE-2013-3234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3234/">CVE-2013-3234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3234">CVE-2013-3234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3235" ref_url="https://www.suse.com/security/cve/CVE-2013-3235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1022-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-June/000485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-July/000526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3235/">CVE-2013-3235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3235">CVE-2013-3235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3236" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3236" ref_url="https://www.suse.com/security/cve/CVE-2013-3236" source="SUSE CVE"/>
    <description>
    The vmci_transport_dgram_dequeue function in net/vmw_vsock/vmci_transport.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-08"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3236/">CVE-2013-3236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3236">CVE-2013-3236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/816668">SUSE bug 816668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3301" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3301" ref_url="https://www.suse.com/security/cve/CVE-2013-3301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
    <description>
    The ftrace implementation in the Linux kernel before 3.8.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for write access to the (1) set_ftrace_pid or (2) set_graph_function file, and then making an lseek system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3301/">CVE-2013-3301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3301">CVE-2013-3301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/815256">SUSE bug 815256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-3495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2JSN7GQBZ6NZNREK27W7N4TUEDG4K46/#L2JSN7GQBZ6NZNREK27W7N4TUEDG4K46" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0256-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NE4AUXK7RJHEGTGY7Q2OVYNORVSC2CM6/#NE4AUXK7RJHEGTGY7Q2OVYNORVSC2CM6" source="SUSE-SU"/>
    <description>
    The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-3495">CVE-2013-3495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/826717">SUSE bug 826717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903970">SUSE bug 903970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4162" ref_url="https://www.suse.com/security/cve/CVE-2013-4162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4162/">CVE-2013-4162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4162">CVE-2013-4162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/831058">SUSE bug 831058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4163" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4163" ref_url="https://www.suse.com/security/cve/CVE-2013-4163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2013:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-September/000599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2013:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2013-October/000608.html" source="SUSE-SU"/>
    <description>
    The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4163/">CVE-2013-4163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4163">CVE-2013-4163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/831055">SUSE bug 831055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4270" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4270" ref_url="https://www.suse.com/security/cve/CVE-2013-4270" source="SUSE CVE"/>
    <description>
    The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4270/">CVE-2013-4270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4270">CVE-2013-4270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/836949">SUSE bug 836949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001391.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4282">CVE-2013-4282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/848279">SUSE bug 848279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4288" ref_url="https://www.suse.com/security/cve/CVE-2013-4288" source="SUSE CVE"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4288/">CVE-2013-4288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4288">CVE-2013-4288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/835827">SUSE bug 835827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836932">SUSE bug 836932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836937">SUSE bug 836937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/836939">SUSE bug 836939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/844967">SUSE bug 844967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/852368">SUSE bug 852368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/854144">SUSE bug 854144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336198" comment="libvirt-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4311" ref_url="https://www.suse.com/security/cve/CVE-2013-4311" source="SUSE CVE"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4311/">CVE-2013-4311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4311">CVE-2013-4311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/836931">SUSE bug 836931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/838638">SUSE bug 838638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336198" comment="libvirt-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4350" ref_url="https://www.suse.com/security/cve/CVE-2013-4350" source="SUSE CVE"/>
    <description>
    The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4350/">CVE-2013-4350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4350">CVE-2013-4350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/840506">SUSE bug 840506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4387" ref_url="https://www.suse.com/security/cve/CVE-2013-4387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
    <description>
    net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4387/">CVE-2013-4387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4387">CVE-2013-4387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/843430">SUSE bug 843430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/848042">SUSE bug 848042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4458">CVE-2013-4458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/883217">SUSE bug 883217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941444">SUSE bug 941444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955181">SUSE bug 955181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4483" ref_url="https://www.suse.com/security/cve/CVE-2013-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
    <description>
    The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4483/">CVE-2013-4483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4483">CVE-2013-4483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/848321">SUSE bug 848321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4515" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4515" ref_url="https://www.suse.com/security/cve/CVE-2013-4515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
    <description>
    The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4515/">CVE-2013-4515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4515">CVE-2013-4515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/849034">SUSE bug 849034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4516" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4516" ref_url="https://www.suse.com/security/cve/CVE-2013-4516" source="SUSE CVE"/>
    <description>
    The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4516/">CVE-2013-4516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4516">CVE-2013-4516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/849036">SUSE bug 849036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4533">CVE-2013-4533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864655">SUSE bug 864655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964644">SUSE bug 964644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4534">CVE-2013-4534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864811">SUSE bug 864811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964452">SUSE bug 964452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4537">CVE-2013-4537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864391">SUSE bug 864391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962642">SUSE bug 962642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4538">CVE-2013-4538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864769">SUSE bug 864769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962335">SUSE bug 962335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4539">CVE-2013-4539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/864805">SUSE bug 864805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962758">SUSE bug 962758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001039.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QRVIEAWUK5I2GI4AKVSPV4QCNPSZOAAJ/#QRVIEAWUK5I2GI4AKVSPV4QCNPSZOAAJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1281-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EMA77RMT4BV6BHVYDYY6YMYNXGXZ63IC/#EMA77RMT4BV6BHVYDYY6YMYNXGXZ63IC" source="SUSE-SU"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4540">CVE-2013-4540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864801">SUSE bug 864801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871442">SUSE bug 871442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880751">SUSE bug 880751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4579" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4579" ref_url="https://www.suse.com/security/cve/CVE-2013-4579" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4579/">CVE-2013-4579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4579">CVE-2013-4579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/851426">SUSE bug 851426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4587" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4587" ref_url="https://www.suse.com/security/cve/CVE-2013-4587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3Z5ZMLJMQRQPFMAXESRJNBNJMBGCZSK/#S3Z5ZMLJMQRQPFMAXESRJNBNJMBGCZSK" source="SUSE-SU"/>
    <description>
    Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4587/">CVE-2013-4587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4587">CVE-2013-4587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/853050">SUSE bug 853050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4591" ref_url="https://www.suse.com/security/cve/CVE-2013-4591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the __nfs4_get_acl_uncached function in fs/nfs/nfs4proc.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a getxattr system call for the system.nfs4_acl extended attribute of a pathname on an NFSv4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4591/">CVE-2013-4591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4591">CVE-2013-4591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/851103">SUSE bug 851103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-4592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-4592" ref_url="https://www.suse.com/security/cve/CVE-2013-4592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
    <description>
    Memory leak in the __kvm_set_memory_region function in virt/kvm/kvm_main.c in the Linux kernel before 3.9 allows local users to cause a denial of service (memory consumption) by leveraging certain device access to trigger movement of memory slots.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-4592/">CVE-2013-4592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-4592">CVE-2013-4592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/851101">SUSE bug 851101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370" source="SUSE CVE"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6370">CVE-2013-6370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882202" comment="libjson-c3-0.13-1.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371" source="SUSE CVE"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6371">CVE-2013-6371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/870147">SUSE bug 870147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882202" comment="libjson-c3-0.13-1.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6376" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6376" ref_url="https://www.suse.com/security/cve/CVE-2013-6376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3Z5ZMLJMQRQPFMAXESRJNBNJMBGCZSK/#S3Z5ZMLJMQRQPFMAXESRJNBNJMBGCZSK" source="SUSE-SU"/>
    <description>
    The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6376/">CVE-2013-6376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6376">CVE-2013-6376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/853053">SUSE bug 853053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6378" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6378" ref_url="https://www.suse.com/security/cve/CVE-2013-6378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-January/000710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-February/000734.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
    <description>
    The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6378/">CVE-2013-6378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6378">CVE-2013-6378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/852559">SUSE bug 852559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6381" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6381" ref_url="https://www.suse.com/security/cve/CVE-2013-6381" source="SUSE CVE"/>
    <description>
    Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6381/">CVE-2013-6381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6381">CVE-2013-6381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/852552">SUSE bug 852552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6393" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
    <description>
    The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6393">CVE-2013-6393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/860617">SUSE bug 860617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882404" comment="libyaml-0-2-0.1.7-1.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6763" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6763" ref_url="https://www.suse.com/security/cve/CVE-2013-6763" source="SUSE CVE"/>
    <description>
    The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6763/">CVE-2013-6763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6763">CVE-2013-6763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/850263">SUSE bug 850263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-6999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6999" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-6999" ref_url="https://www.suse.com/security/cve/CVE-2013-6999" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The IsHandleEntrySecure function in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 SP2 does not properly validate the tagPROCESSINFO pW32Job field, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted NtUserValidateHandleSecure call for an owned object.  NOTE: the vendor reportedly disputes the significance of this report, stating that "it appears to be a local DOS ... we don't consider it a security vulnerability."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-19"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-6999/">CVE-2013-6999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-6999">CVE-2013-6999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7263" ref_url="https://www.suse.com/security/cve/CVE-2013-7263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7263/">CVE-2013-7263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7263">CVE-2013-7263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7264" ref_url="https://www.suse.com/security/cve/CVE-2013-7264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7264/">CVE-2013-7264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7264">CVE-2013-7264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7265" ref_url="https://www.suse.com/security/cve/CVE-2013-7265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-05"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7265/">CVE-2013-7265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7265">CVE-2013-7265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/853040">SUSE bug 853040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7267" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7267" ref_url="https://www.suse.com/security/cve/CVE-2013-7267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7267/">CVE-2013-7267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7267">CVE-2013-7267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7268" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7268" ref_url="https://www.suse.com/security/cve/CVE-2013-7268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7268/">CVE-2013-7268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7268">CVE-2013-7268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7269" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7269" ref_url="https://www.suse.com/security/cve/CVE-2013-7269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7269/">CVE-2013-7269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7269">CVE-2013-7269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7270" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7270" ref_url="https://www.suse.com/security/cve/CVE-2013-7270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7270/">CVE-2013-7270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7270">CVE-2013-7270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7271" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7271" ref_url="https://www.suse.com/security/cve/CVE-2013-7271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7271/">CVE-2013-7271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7271">CVE-2013-7271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/854722">SUSE bug 854722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882914">SUSE bug 882914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7339" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7339" ref_url="https://www.suse.com/security/cve/CVE-2013-7339" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
    <description>
    The rds_ib_laddr_check function in net/rds/ib.c in the Linux kernel before 3.12.8 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7339/">CVE-2013-7339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7339">CVE-2013-7339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/869563">SUSE bug 869563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7446" ref_url="https://www.suse.com/security/cve/CVE-2013-7446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-7446/">CVE-2013-7446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-7446">CVE-2013-7446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955654">SUSE bug 955654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955837">SUSE bug 955837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-7470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7470" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-7470" ref_url="https://www.suse.com/security/cve/CVE-2013-7470" source="SUSE CVE"/>
    <description>
    cipso_v4_validate in include/net/cipso_ipv4.h in the Linux kernel before 3.11.7, when CONFIG_NETLABEL is disabled, allows attackers to cause a denial of service (infinite loop and crash), as demonstrated by icmpsic, a different vulnerability than CVE-2013-0310.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-7470/">CVE-2013-7470 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2013-7470">CVE-2013-7470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133087">SUSE bug 1133087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0012" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0012" ref_url="https://www.suse.com/security/cve/CVE-2014-0012" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001522.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2465-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJNH6YK3YXI7X2BE3AQNYL7PA2FETC66/#RJNH6YK3YXI7X2BE3AQNYL7PA2FETC66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J6U2NCERMUWAZTZY5VD4C4YB2XD5EDKW/#J6U2NCERMUWAZTZY5VD4C4YB2XD5EDKW" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0012/">CVE-2014-0012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0012">CVE-2014-0012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/858239">SUSE bug 858239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897127" comment="python3-Jinja2-2.10.1-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0038" ref_url="https://www.suse.com/security/cve/CVE-2014-0038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003486.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA/#LVUAZOUKQZFEYUPQYU5QOR2Y3GSESDMA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3Z5ZMLJMQRQPFMAXESRJNBNJMBGCZSK/#S3Z5ZMLJMQRQPFMAXESRJNBNJMBGCZSK" source="SUSE-SU"/>
    <description>
    The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0038/">CVE-2014-0038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0038">CVE-2014-0038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/860993">SUSE bug 860993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0055" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0055" ref_url="https://www.suse.com/security/cve/CVE-2014-0055" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
    <description>
    The get_rx_bufs function in drivers/vhost/net.c in the vhost-net subsystem in the Linux kernel package before 2.6.32-431.11.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly handle vhost_get_vq_desc errors, which allows guest OS users to cause a denial of service (host OS crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-16"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0055/">CVE-2014-0055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0055">CVE-2014-0055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0069" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0069" ref_url="https://www.suse.com/security/cve/CVE-2014-0069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-April/000792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0069/">CVE-2014-0069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0069">CVE-2014-0069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864025">SUSE bug 864025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0077" ref_url="https://www.suse.com/security/cve/CVE-2014-0077" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
    <description>
    drivers/vhost/net.c in the Linux kernel before 3.13.10, when mergeable buffers are disabled, does not properly validate packet lengths, which allows guest OS users to cause a denial of service (memory corruption and host OS crash) or possibly gain privileges on the host OS via crafted packets, related to the handle_rx and get_rx_bufs functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0077/">CVE-2014-0077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0077">CVE-2014-0077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/870173">SUSE bug 870173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870576">SUSE bug 870576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0131" ref_url="https://www.suse.com/security/cve/CVE-2014-0131" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the skb_segment function in net/core/skbuff.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0131/">CVE-2014-0131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0131">CVE-2014-0131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867723">SUSE bug 867723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869564">SUSE bug 869564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0155" ref_url="https://www.suse.com/security/cve/CVE-2014-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
    <description>
    The ioapic_deliver function in virt/kvm/ioapic.c in the Linux kernel through 3.14.1 does not properly validate the kvm_irq_delivery_to_apic return value, which allows guest OS users to cause a denial of service (host OS crash) via a crafted entry in the redirection table of an I/O APIC. NOTE: the affected code was moved to the ioapic_service function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-0155/">CVE-2014-0155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0155">CVE-2014-0155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/872540">SUSE bug 872540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0181" ref_url="https://www.suse.com/security/cve/CVE-2014-0181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0181/">CVE-2014-0181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0181">CVE-2014-0181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/875051">SUSE bug 875051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0191">CVE-2014-0191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876652">SUSE bug 876652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996079">SUSE bug 996079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0196" ref_url="https://www.suse.com/security/cve/CVE-2014-0196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="TID7015061" ref_url="https://www.suse.com/support/kb/doc?id=7015061" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0196/">CVE-2014-0196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0196">CVE-2014-0196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871252">SUSE bug 871252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875690">SUSE bug 875690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/879878">SUSE bug 879878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933423">SUSE bug 933423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0203" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0203" ref_url="https://www.suse.com/security/cve/CVE-2014-0203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
    <description>
    The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0203/">CVE-2014-0203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-0203">CVE-2014-0203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883526">SUSE bug 883526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0222">CVE-2014-0222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877642">SUSE bug 877642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964925">SUSE bug 964925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-0223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0223" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-0223">CVE-2014-0223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/877645">SUSE bug 877645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001200.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK/#CPNOA6KEWHUDLFMZUY6VPIEPD5JXBXHK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG/#SDBTOLJRA7KFYU5XRVWP4REQ3XZOS2FG" source="SUSE-SU"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1569">CVE-2014-1569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910647">SUSE bug 910647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913096">SUSE bug 913096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917597">SUSE bug 917597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1737" ref_url="https://www.suse.com/security/cve/CVE-2014-1737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1737/">CVE-2014-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1737">CVE-2014-1737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1738" ref_url="https://www.suse.com/security/cve/CVE-2014-1738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000880.html" source="SUSE-SU"/>
		<reference ref_id="TID7015062" ref_url="https://www.suse.com/support/kb/doc?id=7015062" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-1738/">CVE-2014-1738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1738">CVE-2014-1738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/875798">SUSE bug 875798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877345">SUSE bug 877345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2039" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2039" ref_url="https://www.suse.com/security/cve/CVE-2014-2039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
    <description>
    arch/s390/kernel/head64.S in the Linux kernel before 3.13.5 on the s390 platform does not properly handle attempted use of the linkage stack, which allows local users to cause a denial of service (system crash) by executing a crafted instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2039/">CVE-2014-2039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2039">CVE-2014-2039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/862796">SUSE bug 862796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/865307">SUSE bug 865307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2240" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the cf2_hintmap_build function in cff/cf2hints.c in FreeType before 2.5.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of stem hints in a font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2240">CVE-2014-2240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/867620">SUSE bug 867620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2309" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2309" ref_url="https://www.suse.com/security/cve/CVE-2014-2309" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2309/">CVE-2014-2309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2309">CVE-2014-2309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/867531">SUSE bug 867531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-March/000769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2525">CVE-2014-2525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/868944">SUSE bug 868944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882404" comment="libyaml-0-2-0.1.7-1.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2532" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2532" ref_url="https://www.suse.com/security/cve/CVE-2014-2532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000878.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-2532/">CVE-2014-2532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2532">CVE-2014-2532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/869101">SUSE bug 869101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/890850">SUSE bug 890850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916239">SUSE bug 916239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2672" ref_url="https://www.suse.com/security/cve/CVE-2014-2672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU/#BCWIEOLJXTC6OSQ5E7LE3SLUJ5YQHDEU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5/#EDN3IM3GY6YV6UDSEUSUOZ3MACM7TYS5" source="SUSE-SU"/>
    <description>
    Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2672/">CVE-2014-2672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2672">CVE-2014-2672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871148">SUSE bug 871148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2678" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2678" ref_url="https://www.suse.com/security/cve/CVE-2014-2678" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
    <description>
    The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2678/">CVE-2014-2678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2678">CVE-2014-2678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/871561">SUSE bug 871561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-2706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-2706" ref_url="https://www.suse.com/security/cve/CVE-2014-2706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via network traffic that improperly interacts with the WLAN_STA_PS_STA state (aka power-save mode), related to sta_info.c and tx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-2706/">CVE-2014-2706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-2706">CVE-2014-2706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/871797">SUSE bug 871797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3122" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3122" ref_url="https://www.suse.com/security/cve/CVE-2014-3122" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-May/000827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
    <description>
    The try_to_unmap_cluster function in mm/rmap.c in the Linux kernel before 3.14.3 does not properly consider which pages must be locked, which allows local users to cause a denial of service (system crash) by triggering a memory-usage pattern that requires removal of page-table mappings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3122/">CVE-2014-3122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3122">CVE-2014-3122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/876102">SUSE bug 876102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3144" ref_url="https://www.suse.com/security/cve/CVE-2014-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
    <description>
    The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3144/">CVE-2014-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3144">CVE-2014-3144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3145" ref_url="https://www.suse.com/security/cve/CVE-2014-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
    <description>
    The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3145/">CVE-2014-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3145">CVE-2014-3145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/824295">SUSE bug 824295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/877257">SUSE bug 877257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3153" ref_url="https://www.suse.com/security/cve/CVE-2014-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0837-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-June/000887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0840-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU/#XLXCCGEHVD47C5H2TLO2QIAAI7G5NSQU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z/#SEEEAGWYAN5SF226ACFJ347RDR4VKF5Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHN7RK7XDM3RYDYKQP5MRVZGMURCOHLB/#XHN7RK7XDM3RYDYKQP5MRVZGMURCOHLB" source="SUSE-SU"/>
    <description>
    The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-04"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3153/">CVE-2014-3153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3153">CVE-2014-3153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/877775">SUSE bug 877775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/880892">SUSE bug 880892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/882228">SUSE bug 882228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3181" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3181" ref_url="https://www.suse.com/security/cve/CVE-2014-3181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the magicmouse_raw_event function in drivers/hid/hid-magicmouse.c in the Magic Mouse HID driver in the Linux kernel through 3.16.3 allow physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with an event.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3181/">CVE-2014-3181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3181">CVE-2014-3181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896382">SUSE bug 896382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3184" ref_url="https://www.suse.com/security/cve/CVE-2014-3184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3184/">CVE-2014-3184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3184">CVE-2014-3184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896390">SUSE bug 896390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3185" ref_url="https://www.suse.com/security/cve/CVE-2014-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3185/">CVE-2014-3185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3185">CVE-2014-3185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896391">SUSE bug 896391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3186" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3186" ref_url="https://www.suse.com/security/cve/CVE-2014-3186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Buffer overflow in the picolcd_raw_event function in devices/hid/hid-picolcd_core.c in the PicoLCD HID device driver in the Linux kernel through 3.16.3, as used in Android on Nexus 7 devices, allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted device that sends a large report.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3186/">CVE-2014-3186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3186">CVE-2014-3186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896392">SUSE bug 896392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3461" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001032.html" source="SUSE-SU"/>
    <description>
    hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3461">CVE-2014-3461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/878541">SUSE bug 878541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH/#OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH" source="SUSE-SU"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3513">CVE-2014-3513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH/#OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3567">CVE-2014-3567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/877506">SUSE bug 877506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1387-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1557-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001094.html" source="SUSE-SU"/>
		<reference ref_id="TID7010867" ref_url="https://www.suse.com/support/kb/doc/?id=7010867" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH/#OXLUMJEZOOE2HOIJFB6A5TK5GVXXPQTH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3568">CVE-2014-3568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/901277">SUSE bug 901277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905106">SUSE bug 905106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="TID7016027" ref_url="https://www.suse.com/support/kb/doc/?id=7016027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3569">CVE-2014-3569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911399">SUSE bug 911399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3570">CVE-2014-3570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912296">SUSE bug 912296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3571">CVE-2014-3571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912294">SUSE bug 912294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3572">CVE-2014-3572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912015">SUSE bug 912015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3591">CVE-2014-3591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949135">SUSE bug 949135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3601" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3601" ref_url="https://www.suse.com/security/cve/CVE-2014-3601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.16.1 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to (1) cause a denial of service (host OS memory corruption) or possibly have unspecified other impact by triggering a large gfn value or (2) cause a denial of service (host OS memory consumption) by triggering a small gfn value that leads to permanently pinned pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3601/">CVE-2014-3601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3601">CVE-2014-3601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3610" ref_url="https://www.suse.com/security/cve/CVE-2014-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS crash) by leveraging guest OS privileges, related to the wrmsr_interception function in arch/x86/kvm/svm.c and the handle_wrmsr function in arch/x86/kvm/vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3610/">CVE-2014-3610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3610">CVE-2014-3610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3631" ref_url="https://www.suse.com/security/cve/CVE-2014-3631" source="SUSE CVE"/>
    <description>
    The assoc_array_gc function in the associative-array implementation in lib/assoc_array.c in the Linux kernel before 3.16.3 does not properly implement garbage collection, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via multiple "keyctl newring" operations followed by a "keyctl timeout" operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3631/">CVE-2014-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3631">CVE-2014-3631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896262">SUSE bug 896262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001137.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3636">CVE-2014-3636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637" source="SUSE CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3637">CVE-2014-3637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639" source="SUSE CVE"/>
    <description>
    The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3639">CVE-2014-3639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896453">SUSE bug 896453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903055">SUSE bug 903055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/903057">SUSE bug 903057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
    <description>
    The sosendto function in slirp/udp.c in QEMU before 2.1.2 allows local users to cause a denial of service (NULL pointer dereference) by sending a udp packet with a value of 0 in the source port and address, which triggers access of an uninitialized socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3640">CVE-2014-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897654">SUSE bug 897654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965112">SUSE bug 965112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3646" ref_url="https://www.suse.com/security/cve/CVE-2014-3646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3646/">CVE-2014-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3646">CVE-2014-3646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899192">SUSE bug 899192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001142.html" source="SUSE-SU"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3660">CVE-2014-3660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/901546">SUSE bug 901546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3672">CVE-2014-3672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/981264">SUSE bug 981264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3673" ref_url="https://www.suse.com/security/cve/CVE-2014-3673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3673/">CVE-2014-3673 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3673">CVE-2014-3673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902346">SUSE bug 902346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3675">CVE-2014-3675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904495" comment="shim-15+git47-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3676">CVE-2014-3676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904495" comment="shim-15+git47-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001162.html" source="SUSE-SU"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3677">CVE-2014-3677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889332">SUSE bug 889332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904495" comment="shim-15+git47-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
    <description>
    wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3686">CVE-2014-3686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/900611">SUSE bug 900611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3687" ref_url="https://www.suse.com/security/cve/CVE-2014-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3687/">CVE-2014-3687 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3687">CVE-2014-3687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902349">SUSE bug 902349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/904899">SUSE bug 904899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909208">SUSE bug 909208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3688" ref_url="https://www.suse.com/security/cve/CVE-2014-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2177-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182177-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3688/">CVE-2014-3688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3688">CVE-2014-3688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3690" ref_url="https://www.suse.com/security/cve/CVE-2014-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or cause a denial of service (system disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC prctl calls within a modified copy of QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3690/">CVE-2014-3690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-3690">CVE-2014-3690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902232">SUSE bug 902232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3710">CVE-2014-3710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902367">SUSE bug 902367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-3917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-3917" ref_url="https://www.suse.com/security/cve/CVE-2014-3917" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2014:0907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2014-July/002089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3917/">CVE-2014-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-3917">CVE-2014-3917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/880484">SUSE bug 880484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4040" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001210.html" source="SUSE-SU"/>
    <description>
    snap in powerpc-utils 1.2.20 produces an archive with fstab and yaboot.conf files potentially containing cleartext passwords, and lacks a warning about reviewing this archive to detect included passwords, which might allow remote attackers to obtain sensitive information by leveraging access to a technical-support data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4040">CVE-2014-4040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883174">SUSE bug 883174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904485" comment="powerpc-utils-1.3.7.1-3.27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4157" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4157" ref_url="https://www.suse.com/security/cve/CVE-2014-4157" source="SUSE CVE"/>
    <description>
    arch/mips/include/asm/thread_info.h in the Linux kernel before 3.14.8 on the MIPS platform does not configure _TIF_SECCOMP checks on the fast system-call path, which allows local users to bypass intended PR_SET_SECCOMP restrictions by executing a crafted application without invoking a trace or audit subsystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4157/">CVE-2014-4157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4157">CVE-2014-4157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994755">SUSE bug 994755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4171" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4171" ref_url="https://www.suse.com/security/cve/CVE-2014-4171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4171/">CVE-2014-4171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4171">CVE-2014-4171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883518">SUSE bug 883518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4508" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4508" ref_url="https://www.suse.com/security/cve/CVE-2014-4508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-4508/">CVE-2014-4508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4508">CVE-2014-4508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883724">SUSE bug 883724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-July/000936.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZO algorithm variant in Oberhumer liblzo2 and lzo-2 before 2.07 on 32-bit platforms might allow remote attackers to execute arbitrary code via a crafted Literal Run.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4607">CVE-2014-4607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883947">SUSE bug 883947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882217" comment="liblzo2-2-2.10-2.22 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4608" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4608" ref_url="https://www.suse.com/security/cve/CVE-2014-4608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run.  NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4608/">CVE-2014-4608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4608">CVE-2014-4608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883948">SUSE bug 883948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/889071">SUSE bug 889071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4611" ref_url="https://www.suse.com/security/cve/CVE-2014-4611" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    Integer overflow in the LZ4 algorithm implementation, as used in Yann Collet LZ4 before r118 and in the lz4_uncompress function in lib/lz4/lz4_decompress.c in the Linux kernel before 3.15.2, on 32-bit platforms might allow context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run that would be improperly handled by programs not complying with an API limitation, a different vulnerability than CVE-2014-4715.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4611/">CVE-2014-4611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4611">CVE-2014-4611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/883949">SUSE bug 883949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885389">SUSE bug 885389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-August/000958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-4650">CVE-2014-4650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/856835">SUSE bug 856835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/856836">SUSE bug 856836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/863741">SUSE bug 863741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/885882">SUSE bug 885882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/898572">SUSE bug 898572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912739">SUSE bug 912739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4667" ref_url="https://www.suse.com/security/cve/CVE-2014-4667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76/#GO7GJ4UCFKZBCYTCLG7H63BO55AEZN76" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W/#NWVYV5V3NMGO4WS5TC6FPFJL4CDM275W" source="SUSE-SU"/>
    <description>
    The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4667/">CVE-2014-4667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4667">CVE-2014-4667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/885422">SUSE bug 885422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4715" ref_url="https://www.suse.com/security/cve/CVE-2014-4715" source="SUSE CVE"/>
    <description>
    Yann Collet LZ4 before r119, when used on certain 32-bit platforms that allocate memory beyond 0x80000000, does not properly detect integer overflows, which allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted Literal Run, a different vulnerability than CVE-2014-4611.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4715/">CVE-2014-4715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4715">CVE-2014-4715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678603" comment="liblz4-1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-4943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4943" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-4943" ref_url="https://www.suse.com/security/cve/CVE-2014-4943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 allows local users to gain privileges by leveraging data-structure differences between an l2tp socket and an inet socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-4943/">CVE-2014-4943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-4943">CVE-2014-4943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/887082">SUSE bug 887082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5033" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5033" ref_url="https://www.suse.com/security/cve/CVE-2014-5033" source="SUSE CVE"/>
    <description>
    KDE kdelibs before 4.14 and kauth before 5.1 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, related to CVE-2013-4288 and "PID reuse race conditions."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5033/">CVE-2014-5033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5033">CVE-2014-5033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/864716">SUSE bug 864716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912121">SUSE bug 912121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336198" comment="libvirt-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5045" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5045" ref_url="https://www.suse.com/security/cve/CVE-2014-5045" source="SUSE CVE"/>
    <description>
    The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5045/">CVE-2014-5045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5045">CVE-2014-5045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889060">SUSE bug 889060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5077" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5077" ref_url="https://www.suse.com/security/cve/CVE-2014-5077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/000987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-September/001005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The sctp_assoc_update function in net/sctp/associola.c in the Linux kernel through 3.15.8, when SCTP authentication is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by starting to establish an association between two endpoints immediately after an exchange of INIT and INIT ACK chunks to establish an earlier association between these endpoints in the opposite direction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5077/">CVE-2014-5077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5077">CVE-2014-5077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/889173">SUSE bug 889173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5277" ref_url="https://www.suse.com/security/cve/CVE-2014-5277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001112.html" source="SUSE-SU"/>
    <description>
    Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5277/">CVE-2014-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5277">CVE-2014-5277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904165">SUSE bug 904165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-November/001060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5351">CVE-2014-5351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897874">SUSE bug 897874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5352">CVE-2014-5352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5353">CVE-2014-5353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910457">SUSE bug 910457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5354">CVE-2014-5354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910458">SUSE bug 910458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001507.html" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5355">CVE-2014-5355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918595">SUSE bug 918595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5471" ref_url="https://www.suse.com/security/cve/CVE-2014-5471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5471/">CVE-2014-5471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5471">CVE-2014-5471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-5472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-5472" ref_url="https://www.suse.com/security/cve/CVE-2014-5472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-5472/">CVE-2014-5472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-5472">CVE-2014-5472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892490">SUSE bug 892490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001034.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6272">CVE-2014-6272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947373">SUSE bug 947373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882142" comment="libevent-2_1-8-2.1.8-2.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6407" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6407" ref_url="https://www.suse.com/security/cve/CVE-2014-6407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1596-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QM7ZAJWOKU3FANG3HO7CPHJWEFPCCQ7S/#QM7ZAJWOKU3FANG3HO7CPHJWEFPCCQ7S" source="SUSE-SU"/>
    <description>
    Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6407/">CVE-2014-6407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6407">CVE-2014-6407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907012">SUSE bug 907012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6408" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6408" ref_url="https://www.suse.com/security/cve/CVE-2014-6408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1596-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QM7ZAJWOKU3FANG3HO7CPHJWEFPCCQ7S/#QM7ZAJWOKU3FANG3HO7CPHJWEFPCCQ7S" source="SUSE-SU"/>
    <description>
    Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6408/">CVE-2014-6408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6408">CVE-2014-6408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907014">SUSE bug 907014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6410" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6410" ref_url="https://www.suse.com/security/cve/CVE-2014-6410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-October/001040.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The __udf_read_inode function in fs/udf/inode.c in the Linux kernel through 3.16.3 does not restrict the amount of ICB indirection, which allows physically proximate attackers to cause a denial of service (infinite loop or stack consumption) via a UDF filesystem with a crafted inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6410/">CVE-2014-6410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6410">CVE-2014-6410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896689">SUSE bug 896689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-6418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6418" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-6418" ref_url="https://www.suse.com/security/cve/CVE-2014-6418" source="SUSE CVE"/>
    <description>
    net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-22"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-6418/">CVE-2014-6418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-6418">CVE-2014-6418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/896384">SUSE bug 896384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7202" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7202">CVE-2014-7202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/898917">SUSE bug 898917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7203" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7203">CVE-2014-7203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/898917">SUSE bug 898917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7207" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7207" ref_url="https://www.suse.com/security/cve/CVE-2014-7207" source="SUSE CVE"/>
    <description>
    A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging (1) tun or (2) macvtap device access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7207/">CVE-2014-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7207">CVE-2014-7207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139403">SUSE bug 1139403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902351">SUSE bug 902351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7283" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7283" ref_url="https://www.suse.com/security/cve/CVE-2014-7283" source="SUSE CVE"/>
    <description>
    The xfs_da3_fixhashpath function in fs/xfs/xfs_da_btree.c in the xfs implementation in the Linux kernel before 3.14.2 does not properly compare btree hash values, which allows local users to cause a denial of service (filesystem corruption, and OOPS or panic) via operations on directories that have hash collisions, as demonstrated by rmdir operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7283/">CVE-2014-7283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7283">CVE-2014-7283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/899480">SUSE bug 899480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7815">CVE-2014-7815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/902737">SUSE bug 902737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962627">SUSE bug 962627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7817">CVE-2014-7817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906371">SUSE bug 906371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7822" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7822" ref_url="https://www.suse.com/security/cve/CVE-2014-7822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The implementation of certain splice_write file operations in the Linux kernel before 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7822/">CVE-2014-7822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7822">CVE-2014-7822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915322">SUSE bug 915322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939240">SUSE bug 939240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7823">CVE-2014-7823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904176">SUSE bug 904176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7824">CVE-2014-7824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904017">SUSE bug 904017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7840" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
    <description>
    The host_from_stream_offset function in arch_init.c in QEMU, when loading RAM during migration, allows remote attackers to execute arbitrary code via a crafted (1) offset or (2) length value in savevm data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7840">CVE-2014-7840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905097">SUSE bug 905097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7842" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7842" ref_url="https://www.suse.com/security/cve/CVE-2014-7842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7842/">CVE-2014-7842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-7842">CVE-2014-7842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/905312">SUSE bug 905312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907822">SUSE bug 907822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7970" ref_url="https://www.suse.com/security/cve/CVE-2014-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
    <description>
    The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7970/">CVE-2014-7970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7970">CVE-2014-7970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900644">SUSE bug 900644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-7975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-7975" ref_url="https://www.suse.com/security/cve/CVE-2014-7975" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
    <description>
    The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss of writability) by making certain unshare system calls, clearing the / MNT_LOCKED flag, and making an MNT_FORCE umount system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-7975/">CVE-2014-7975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-7975">CVE-2014-7975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900392">SUSE bug 900392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8086" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8086" ref_url="https://www.suse.com/security/cve/CVE-2014-8086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
    <description>
    Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8086/">CVE-2014-8086 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8086">CVE-2014-8086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900881">SUSE bug 900881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8106">CVE-2014-8106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907805">SUSE bug 907805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8116" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    The ELF parser (readelf.c) in file before 5.21 allows remote attackers to cause a denial of service (CPU consumption or crash) via a large number of (1) program or (2) section headers or (3) invalid capabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8116">CVE-2014-8116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8117" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    softmagic.c in file before 5.21 does not properly limit recursion, which allows remote attackers to cause a denial of service (CPU consumption or crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8117">CVE-2014-8117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910252">SUSE bug 910252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/910253">SUSE bug 910253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917152">SUSE bug 917152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8119" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    The find_ifcfg_path function in netcf before 0.2.7 might allow attackers to cause a denial of service (application crash) via vectors involving augeas path expressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8119">CVE-2014-8119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/925225">SUSE bug 925225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881701" comment="augeas-1.10.1-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881703" comment="augeas-lenses-1.10.1-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881704" comment="libaugeas0-1.10.1-1.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8121">CVE-2014-8121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918187">SUSE bug 918187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945779">SUSE bug 945779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131" source="SUSE CVE"/>
    <description>
    The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8131">CVE-2014-8131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909274">SUSE bug 909274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001140.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8132">CVE-2014-8132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910790">SUSE bug 910790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493127" comment="libssh4-0.8.7-10.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8133" ref_url="https://www.suse.com/security/cve/CVE-2014-8133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT/#537UDQ3EUWRMATJUJW6VCQRHQ6WZ7VVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AREA426W422LHV5ZMM3CZJJVFK4DAZWL/#AREA426W422LHV5ZMM3CZJJVFK4DAZWL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8133/">CVE-2014-8133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8133">CVE-2014-8133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/817142">SUSE bug 817142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8134" ref_url="https://www.suse.com/security/cve/CVE-2014-8134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8134/">CVE-2014-8134 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8134">CVE-2014-8134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907818">SUSE bug 907818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909077">SUSE bug 909077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909078">SUSE bug 909078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8148" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148" source="SUSE CVE"/>
    <description>
    The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8148">CVE-2014-8148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912023">SUSE bug 912023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001199.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8150">CVE-2014-8150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911363">SUSE bug 911363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8160" ref_url="https://www.suse.com/security/cve/CVE-2014-8160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="TID7016668" ref_url="https://www.suse.com/support/kb/doc?id=7016668" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8160/">CVE-2014-8160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8160">CVE-2014-8160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/857643">SUSE bug 857643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913059">SUSE bug 913059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8178" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8178" ref_url="https://www.suse.com/security/cve/CVE-2014-8178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001630.html" source="SUSE-SU"/>
    <description>
    Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers, which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8178/">CVE-2014-8178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8178">CVE-2014-8178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/949660">SUSE bug 949660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8179" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8179" ref_url="https://www.suse.com/security/cve/CVE-2014-8179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001630.html" source="SUSE-SU"/>
    <description>
    Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull, which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8179/">CVE-2014-8179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8179">CVE-2014-8179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/949660">SUSE bug 949660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8242">CVE-2014-8242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/900914">SUSE bug 900914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922710">SUSE bug 922710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887035" comment="rsync-3.1.3-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8275">CVE-2014-8275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912018">SUSE bug 912018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8369" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8369" ref_url="https://www.suse.com/security/cve/CVE-2014-8369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or possibly have unspecified other impact by leveraging guest OS privileges.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2014-3601.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8369/">CVE-2014-8369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8369">CVE-2014-8369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/892782">SUSE bug 892782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/902675">SUSE bug 902675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8559" ref_url="https://www.suse.com/security/cve/CVE-2014-8559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8559/">CVE-2014-8559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-8559">CVE-2014-8559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903640">SUSE bug 903640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001110.html" source="SUSE-SU"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8564">CVE-2014-8564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904603">SUSE bug 904603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8709" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8709" ref_url="https://www.suse.com/security/cve/CVE-2014-8709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY/#KMCOHP6GELYLJBOOYH4FHHAYS7Q36GJY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
    <description>
    The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8709/">CVE-2014-8709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8709">CVE-2014-8709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904700">SUSE bug 904700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8884" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8884" ref_url="https://www.suse.com/security/cve/CVE-2014-8884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2014:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1693-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2014:1669-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X/#GDZOTMP2VOUC5CTGQ542UWQZWRTOES4X" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8884/">CVE-2014-8884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8884">CVE-2014-8884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/904876">SUSE bug 904876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905522">SUSE bug 905522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905739">SUSE bug 905739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905744">SUSE bug 905744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905748">SUSE bug 905748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/905764">SUSE bug 905764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-8964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-8964">CVE-2014-8964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906574">SUSE bug 906574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882277" comment="libpcre2-8-0-10.31-1.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001154.html" source="SUSE-SU"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9087">CVE-2014-9087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907074">SUSE bug 907074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926826">SUSE bug 926826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996084">SUSE bug 996084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882205" comment="libksba8-1.3.5-2.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001153.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo before 1.3.1 allows remote attackers to cause a denial of service (crash) via a crafted JPEG file, related to the Exif marker.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9092">CVE-2014-9092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906761">SUSE bug 906761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001118.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9112">CVE-2014-9112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907456">SUSE bug 907456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/913479">SUSE bug 913479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490765" comment="cpio-2.12-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001313.html" source="SUSE-SU"/>
    <description>
    Blkid in util-linux before 2.26rc-1 allows local users to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9114">CVE-2014-9114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907434">SUSE bug 907434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/908742">SUSE bug 908742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904456" comment="libblkid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904457" comment="libfdisk1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904458" comment="libmount1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904459" comment="libsmartcols1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904460" comment="libuuid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904461" comment="util-linux-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904462" comment="util-linux-systemd-2.33.1-4.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:0611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-March/002829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2014-December/001131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2014:1699-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0925-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0953-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001412.html" source="SUSE-SU"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9130">CVE-2014-9130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/907809">SUSE bug 907809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911782">SUSE bug 911782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921588">SUSE bug 921588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882404" comment="libyaml-0-2-0.1.7-1.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9356" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9356" ref_url="https://www.suse.com/security/cve/CVE-2014-9356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001163.html" source="SUSE-SU"/>
    <description>
    Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9356/">CVE-2014-9356 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9356">CVE-2014-9356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909712">SUSE bug 909712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909747">SUSE bug 909747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9357" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9357" ref_url="https://www.suse.com/security/cve/CVE-2014-9357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001163.html" source="SUSE-SU"/>
    <description>
    Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9357/">CVE-2014-9357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9357">CVE-2014-9357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909710">SUSE bug 909710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909747">SUSE bug 909747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9358" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9358" ref_url="https://www.suse.com/security/cve/CVE-2014-9358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001163.html" source="SUSE-SU"/>
    <description>
    Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9358/">CVE-2014-9358 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9358">CVE-2014-9358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/909709">SUSE bug 909709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/909747">SUSE bug 909747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9402">CVE-2014-9402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/910599">SUSE bug 910599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9419" ref_url="https://www.suse.com/security/cve/CVE-2014-9419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9419/">CVE-2014-9419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9419">CVE-2014-9419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911326">SUSE bug 911326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9420" ref_url="https://www.suse.com/security/cve/CVE-2014-9420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9420/">CVE-2014-9420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9420">CVE-2014-9420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/906545">SUSE bug 906545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9421">CVE-2014-9421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9422">CVE-2014-9422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0290-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001225.html" source="SUSE-SU"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9423">CVE-2014-9423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005509">SUSE bug 1005509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912002">SUSE bug 912002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001269.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9447">CVE-2014-9447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911662">SUSE bug 911662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/912408">SUSE bug 912408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007445.html" source="SUSE-SU"/>
    <description>
    The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9488">CVE-2014-9488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921719">SUSE bug 921719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881923" comment="less-530-1.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002227.html" source="SUSE-SU"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9512">CVE-2014-9512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915410">SUSE bug 915410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960191">SUSE bug 960191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887035" comment="rsync-3.1.3-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001703.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9556">CVE-2014-9556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912214">SUSE bug 912214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919283">SUSE bug 919283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934533">SUSE bug 934533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492057" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9584" ref_url="https://www.suse.com/security/cve/CVE-2014-9584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9584/">CVE-2014-9584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9584">CVE-2014-9584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912654">SUSE bug 912654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9585" ref_url="https://www.suse.com/security/cve/CVE-2014-9585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ/#45VR2J6DOCMZ7DOFZ5B4QZ5CLCL3DYNQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9585/">CVE-2014-9585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9585">CVE-2014-9585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912705">SUSE bug 912705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9656">CVE-2014-9656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916847">SUSE bug 916847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9657">CVE-2014-9657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916856">SUSE bug 916856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9658">CVE-2014-9658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916857">SUSE bug 916857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9659">CVE-2014-9659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916867">SUSE bug 916867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9660">CVE-2014-9660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916858">SUSE bug 916858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9661">CVE-2014-9661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916859">SUSE bug 916859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9662">CVE-2014-9662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916860">SUSE bug 916860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9663">CVE-2014-9663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916865">SUSE bug 916865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9664">CVE-2014-9664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916864">SUSE bug 916864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9665">CVE-2014-9665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916863">SUSE bug 916863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9666">CVE-2014-9666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916862">SUSE bug 916862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9667">CVE-2014-9667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916861">SUSE bug 916861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9668">CVE-2014-9668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916868">SUSE bug 916868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9669">CVE-2014-9669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916870">SUSE bug 916870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9670">CVE-2014-9670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916871">SUSE bug 916871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9671">CVE-2014-9671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916872">SUSE bug 916872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933247">SUSE bug 933247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9672">CVE-2014-9672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916873">SUSE bug 916873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9673">CVE-2014-9673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916874">SUSE bug 916874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9674">CVE-2014-9674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916879">SUSE bug 916879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001277.html" source="SUSE-SU"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9675">CVE-2014-9675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916881">SUSE bug 916881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
    <description>
    sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9680">CVE-2014-9680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917806">SUSE bug 917806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919737">SUSE bug 919737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/921999">SUSE bug 921999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953359">SUSE bug 953359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9710" ref_url="https://www.suse.com/security/cve/CVE-2014-9710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
    <description>
    The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time window, related to a race condition, or (2) after an xattr-replacement attempt that fails because the data does not fit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9710/">CVE-2014-9710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9710">CVE-2014-9710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923908">SUSE bug 923908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939260">SUSE bug 939260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9717" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9717" ref_url="https://www.suse.com/security/cve/CVE-2014-9717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-20"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9717/">CVE-2014-9717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9717">CVE-2014-9717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928547">SUSE bug 928547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9721" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001578.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9721">CVE-2014-9721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931978">SUSE bug 931978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9728" ref_url="https://www.suse.com/security/cve/CVE-2014-9728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9728/">CVE-2014-9728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9728">CVE-2014-9728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9729" ref_url="https://www.suse.com/security/cve/CVE-2014-9729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9729/">CVE-2014-9729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9729">CVE-2014-9729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9730" ref_url="https://www.suse.com/security/cve/CVE-2014-9730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9730/">CVE-2014-9730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9730">CVE-2014-9730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933904">SUSE bug 933904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9731" ref_url="https://www.suse.com/security/cve/CVE-2014-9731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9731/">CVE-2014-9731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9731">CVE-2014-9731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/911325">SUSE bug 911325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933896">SUSE bug 933896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9761">CVE-2014-9761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962738">SUSE bug 962738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9766" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9766" ref_url="https://www.suse.com/security/cve/CVE-2014-9766" source="SUSE CVE"/>
    <description>
    Integer overflow in the create_bits function in pixman-bits-image.c in Pixman before 0.32.6 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via large height and stride values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9766/">CVE-2014-9766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9766">CVE-2014-9766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968090">SUSE bug 968090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337724" comment="libpixman-1-0 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9904" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9904" ref_url="https://www.suse.com/security/cve/CVE-2014-9904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9904/">CVE-2014-9904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9904">CVE-2014-9904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986811">SUSE bug 986811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986941">SUSE bug 986941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9914" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9914" ref_url="https://www.suse.com/security/cve/CVE-2014-9914" source="SUSE CVE"/>
    <description>
    Race condition in the ip4_datagram_release_cb function in net/ipv4/datagram.c in the Linux kernel before 3.15.2 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect expectations about locking during multithreaded access to internal data structures for IPv4 UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9914/">CVE-2014-9914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2014-9914">CVE-2014-9914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023997">SUSE bug 1023997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-9922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9922" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-9922" ref_url="https://www.suse.com/security/cve/CVE-2014-9922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
    <description>
    The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-9922/">CVE-2014-9922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-9922">CVE-2014-9922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1032340">SUSE bug 1032340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1086-4" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2168-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001721.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016252" ref_url="https://www.suse.com/support/kb/doc?id=7016252" source="SUSE-SU"/>
		<reference ref_id="TID7016260" ref_url="https://www.suse.com/support/kb/doc/?id=7016260" source="SUSE-SU"/>
		<reference ref_id="TID7016273" ref_url="https://www.suse.com/support/kb/doc/?id=7016273" source="SUSE-SU"/>
		<reference ref_id="TID7016312" ref_url="https://www.suse.com/support/kb/doc/?id=7016312" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7016340" ref_url="https://www.suse.com/support/kb/doc/?id=7016340" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0204">CVE-2015-0204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912014">SUSE bug 912014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920482">SUSE bug 920482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920484">SUSE bug 920484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927591">SUSE bug 927591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936787">SUSE bug 936787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952088">SUSE bug 952088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0172-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0205">CVE-2015-0205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912293">SUSE bug 912293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915848">SUSE bug 915848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-January/001202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-February/001205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001410.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5NKKL36OVJL3XH5PE2LUB3THMPTHPONL/#5NKKL36OVJL3XH5PE2LUB3THMPTHPONL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0206">CVE-2015-0206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/912292">SUSE bug 912292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927623">SUSE bug 927623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0209">CVE-2015-0209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0236">CVE-2015-0236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914693">SUSE bug 914693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0245">CVE-2015-0245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003898">SUSE bug 1003898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916343">SUSE bug 916343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKEXLBPXEYUU5654O6B373YX2QNQCMHV/#LKEXLBPXEYUU5654O6B373YX2QNQCMHV" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0247">CVE-2015-0247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904430" comment="e2fsprogs-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904431" comment="libcom_err2-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904432" comment="libext2fs2-1.43.8-4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0274" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0274" ref_url="https://www.suse.com/security/cve/CVE-2015-0274" source="SUSE CVE"/>
    <description>
    The XFS implementation in the Linux kernel before 3.15 improperly uses an old size value during remote attribute replacement, which allows local users to cause a denial of service (transaction overrun and data corruption) or possibly gain privileges by leveraging XFS filesystem access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0274/">CVE-2015-0274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0274">CVE-2015-0274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919655">SUSE bug 919655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0275" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0275" ref_url="https://www.suse.com/security/cve/CVE-2015-0275" source="SUSE CVE"/>
    <description>
    The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0275/">CVE-2015-0275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0275">CVE-2015-0275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919032">SUSE bug 919032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0286">CVE-2015-0286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922496">SUSE bug 922496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-August/003340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-August/003341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2015:1477-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2015-September/003394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0287">CVE-2015-0287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922499">SUSE bug 922499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991722">SUSE bug 991722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0288">CVE-2015-0288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920236">SUSE bug 920236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001312.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021714" ref_url="https://www.suse.com/support/kb/doc/?id=7021714" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021863" ref_url="https://www.suse.com/support/kb/doc/?id=7021863" source="SUSE-SU"/>
		<reference ref_id="TID7021977" ref_url="https://www.suse.com/support/kb/doc/?id=7021977" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0289">CVE-2015-0289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922500">SUSE bug 922500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0545-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0546-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016336" ref_url="https://www.suse.com/support/kb/doc/?id=7016336" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SCGIR2QPTXC36KQPVGJ7ILLZTTUN4LVQ/#SCGIR2QPTXC36KQPVGJ7ILLZTTUN4LVQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0293">CVE-2015-0293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/919648">SUSE bug 919648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922488">SUSE bug 922488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968051">SUSE bug 968051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968053">SUSE bug 968053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0777" ref_url="https://www.suse.com/security/cve/CVE-2015-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0777/">CVE-2015-0777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0777">CVE-2015-0777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917830">SUSE bug 917830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001602.html" source="SUSE-SU"/>
    <description>
    The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-0837">CVE-2015-0837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/920057">SUSE bug 920057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-0840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0840" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840" source="SUSE CVE"/>
    <description>
    The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-0840">CVE-2015-0840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926749">SUSE bug 926749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882499" comment="update-alternatives-1.19.0.4-2.48 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1287-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ENHCMX4SOE6FHGMIMNVWCJ4M2REVNXKE/#ENHCMX4SOE6FHGMIMNVWCJ4M2REVNXKE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDPURAJ5I4VP56UBTJSE3VWOEJE74DNB/#MDPURAJ5I4VP56UBTJSE3VWOEJE74DNB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FFR7NYQL7GYPXPBU6TRQN3XO5Z3M73U/#5FFR7NYQL7GYPXPBU6TRQN3XO5Z3M73U" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1283">CVE-2015-1283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345" source="SUSE CVE"/>
    <description>
    The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1345">CVE-2015-1345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/914695">SUSE bug 914695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887056" comment="grep-3.1-4.3.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1420" ref_url="https://www.suse.com/security/cve/CVE-2015-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001706.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1420/">CVE-2015-1420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1420">CVE-2015-1420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915517">SUSE bug 915517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001305.html" source="SUSE-SU"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1472">CVE-2015-1472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473" source="SUSE CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1473">CVE-2015-1473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916222">SUSE bug 916222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920341">SUSE bug 920341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/922243">SUSE bug 922243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1545">CVE-2015-1545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/846389">SUSE bug 846389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916897">SUSE bug 916897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001443.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1546">CVE-2015-1546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/916914">SUSE bug 916914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKEXLBPXEYUU5654O6B373YX2QNQCMHV/#LKEXLBPXEYUU5654O6B373YX2QNQCMHV" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1572">CVE-2015-1572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123790">SUSE bug 1123790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/915402">SUSE bug 915402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/918346">SUSE bug 918346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904430" comment="e2fsprogs-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904431" comment="libcom_err2-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904432" comment="libext2fs2-1.43.8-4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1593" ref_url="https://www.suse.com/security/cve/CVE-2015-1593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-March/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI/#NWCJPZ26DJQKJAYBVBW2J4THDLRJKACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD/#TGDFE2ZE62NVTCXF3ICQYCJ3S7RQZBVD" source="SUSE-SU"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1593/">CVE-2015-1593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1593">CVE-2015-1593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1044934">SUSE bug 1044934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1779">CVE-2015-1779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924018">SUSE bug 924018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962632">SUSE bug 962632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1781">CVE-2015-1781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927080">SUSE bug 927080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979109">SUSE bug 979109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-April/001334.html" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1782">CVE-2015-1782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/921070">SUSE bug 921070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1788">CVE-2015-1788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934487">SUSE bug 934487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1789">CVE-2015-1789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934489">SUSE bug 934489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1790">CVE-2015-1790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934491">SUSE bug 934491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936586">SUSE bug 936586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1791">CVE-2015-1791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933911">SUSE bug 933911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989464">SUSE bug 989464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016602" ref_url="https://www.suse.com/support/kb/doc/?id=7016602" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1792">CVE-2015-1792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934493">SUSE bug 934493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934666">SUSE bug 934666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937891">SUSE bug 937891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001739.html" source="SUSE-SU"/>
		<reference ref_id="TID7016662" ref_url="https://www.suse.com/support/kb/doc/?id=7016662" source="SUSE-SU"/>
		<reference ref_id="TID7016686" ref_url="https://www.suse.com/support/kb/doc/?id=7016686" source="SUSE-SU"/>
		<reference ref_id="TID7016693" ref_url="https://www.suse.com/support/kb/doc/?id=7016693" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CG5LJLU356KG55PZAGA4KDAMICLY5O5L/#CG5LJLU356KG55PZAGA4KDAMICLY5O5L" source="SUSE-SU"/>
    <description>
    The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1793">CVE-2015-1793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/936746">SUSE bug 936746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937637">SUSE bug 937637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1794" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
    <description>
    The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1794">CVE-2015-1794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957984">SUSE bug 957984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1805" ref_url="https://www.suse.com/security/cve/CVE-2015-1805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
    <description>
    The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux kernel before 3.16 do not properly consider the side effects of failed __copy_to_user_inatomic and __copy_from_user_inatomic calls, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted application, aka an "I/O vector array overrun."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1805/">CVE-2015-1805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1805">CVE-2015-1805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933429">SUSE bug 933429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939270">SUSE bug 939270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964730">SUSE bug 964730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964732">SUSE bug 964732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1819">CVE-2015-1819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928193">SUSE bug 928193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1821" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1821" ref_url="https://www.suse.com/security/cve/CVE-2015-1821" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1821/">CVE-2015-1821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1821">CVE-2015-1821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926323">SUSE bug 926323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009342637" comment="chrony is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348255" comment="chrony-pool-suse is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1822" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1822" ref_url="https://www.suse.com/security/cve/CVE-2015-1822" source="SUSE CVE"/>
    <description>
    chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1822/">CVE-2015-1822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1822">CVE-2015-1822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926323">SUSE bug 926323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009342637" comment="chrony is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348255" comment="chrony-pool-suse is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1853" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1853" ref_url="https://www.suse.com/security/cve/CVE-2015-1853" source="SUSE CVE"/>
    <description>
    chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1853/">CVE-2015-1853 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-1853">CVE-2015-1853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926323">SUSE bug 926323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009342637" comment="chrony is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348255" comment="chrony-pool-suse is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-1863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/24WJWXAHA4BBDXWFY6U6WSBXW5IJPF7S/#24WJWXAHA4BBDXWFY6U6WSBXW5IJPF7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-1863">CVE-2015-1863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927558">SUSE bug 927558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2059">CVE-2015-2059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/919214">SUSE bug 919214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923241">SUSE bug 923241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937096">SUSE bug 937096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937097">SUSE bug 937097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882167" comment="libidn11-1.34-3.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2296" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2021:2130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The resolve_redirects function in sessions.py in requests 2.1.0 through 2.5.3 allows remote attackers to conduct session fixation attacks via a cookie without a host value in a redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2296">CVE-2015-2296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922448">SUSE bug 922448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/926396">SUSE bug 926396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897595" comment="python3-requests-2.20.1-6.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2325">CVE-2015-2325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882277" comment="libpcre2-8-0-10.31-1.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code and cause a denial of service (out-of-bounds read) via regular expression with a group containing both a forward referencing subroutine call and a recursive back reference, as demonstrated by "((?+1)(\1))/".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-2326">CVE-2015-2326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924960">SUSE bug 924960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/924961">SUSE bug 924961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933288">SUSE bug 933288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936408">SUSE bug 936408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882277" comment="libpcre2-8-0-10.31-1.14 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2666" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2666" ref_url="https://www.suse.com/security/cve/CVE-2015-2666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2666/">CVE-2015-2666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2666">CVE-2015-2666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/922944">SUSE bug 922944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939044">SUSE bug 939044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2694" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001505.html" source="SUSE-SU"/>
    <description>
    The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a client's request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2694">CVE-2015-2694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928978">SUSE bug 928978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1898-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46Y5SNJ3BHHCPDGSIVYJLLXMCYT6RXC5/#46Y5SNJ3BHHCPDGSIVYJLLXMCYT6RXC5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQUB5AD5B7NGXTEPE2WVNYWGUYV6F7DB/#VQUB5AD5B7NGXTEPE2WVNYWGUYV6F7DB" source="SUSE-SU"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2695">CVE-2015-2695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952188">SUSE bug 952188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969771">SUSE bug 969771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001666.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46Y5SNJ3BHHCPDGSIVYJLLXMCYT6RXC5/#46Y5SNJ3BHHCPDGSIVYJLLXMCYT6RXC5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQUB5AD5B7NGXTEPE2WVNYWGUYV6F7DB/#VQUB5AD5B7NGXTEPE2WVNYWGUYV6F7DB" source="SUSE-SU"/>
    <description>
    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2696">CVE-2015-2696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952189">SUSE bug 952189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001666.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1928-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46Y5SNJ3BHHCPDGSIVYJLLXMCYT6RXC5/#46Y5SNJ3BHHCPDGSIVYJLLXMCYT6RXC5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQUB5AD5B7NGXTEPE2WVNYWGUYV6F7DB/#VQUB5AD5B7NGXTEPE2WVNYWGUYV6F7DB" source="SUSE-SU"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2697">CVE-2015-2697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952190">SUSE bug 952190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001738.html" source="SUSE-SU"/>
    <description>
    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2698">CVE-2015-2698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954204">SUSE bug 954204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2721">CVE-2015-2721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001791.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2806">CVE-2015-2806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/924828">SUSE bug 924828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961491">SUSE bug 961491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969208">SUSE bug 969208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490140" comment="libtasn1-4.13-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490141" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-2924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2924" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924" source="SUSE CVE"/>
    <description>
    The receive_ra function in rdisc/nm-lndp-rdisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in NetworkManager 1.x allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message, a similar issue to CVE-2015-2922.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-2924">CVE-2015-2924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/926223">SUSE bug 926223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904466" comment="libnm0-1.22.10-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904467" comment="typelib-1_0-NM-1_0-1.22.10-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3143">CVE-2015-3143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927556">SUSE bug 927556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3144">CVE-2015-3144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927608">SUSE bug 927608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3145">CVE-2015-3145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927607">SUSE bug 927607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3146" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001624.html" source="SUSE-SU"/>
    <description>
    The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3146">CVE-2015-3146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928323">SUSE bug 928323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493127" comment="libssh4-0.8.7-10.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3148">CVE-2015-3148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092962">SUSE bug 1092962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927746">SUSE bug 927746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001421.html" source="SUSE-SU"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3153">CVE-2015-3153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928533">SUSE bug 928533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3193" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
    <description>
    The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for remote attackers to obtain sensitive private-key information via an attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman Ephemeral (DHE) ciphersuite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3193">CVE-2015-3193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960151">SUSE bug 960151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7017046" ref_url="https://www.suse.com/support/kb/doc/?id=7017046" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3194">CVE-2015-3194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7014420" ref_url="https://www.suse.com/support/kb/doc/?id=7014420" source="SUSE-SU"/>
		<reference ref_id="TID7016875" ref_url="https://www.suse.com/support/kb/doc/?id=7016875" source="SUSE-SU"/>
		<reference ref_id="TID7017047" ref_url="https://www.suse.com/support/kb/doc/?id=7017047" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3195">CVE-2015-3195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957812">SUSE bug 957812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957815">SUSE bug 957815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958768">SUSE bug 958768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963977">SUSE bug 963977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986238">SUSE bug 986238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3196">CVE-2015-3196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957813">SUSE bug 957813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3197">CVE-2015-3197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963415">SUSE bug 963415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001438.html" source="SUSE-SU"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3202">CVE-2015-3202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931452">SUSE bug 931452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489671" comment="fuse-2.9.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489674" comment="libfuse2-2.9.7-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001605.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN/#GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3209">CVE-2015-3209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932823">SUSE bug 932823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3217">CVE-2015-3217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933878">SUSE bug 933878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958373">SUSE bug 958373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654598" comment="libpcre2-8-0 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3218" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC/#2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC" source="SUSE-SU"/>
    <description>
    The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3218">CVE-2015-3218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/933922">SUSE bug 933922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236" source="SUSE CVE"/>
    <description>
    cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3236">CVE-2015-3236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934501">SUSE bug 934501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951391">SUSE bug 951391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237" source="SUSE CVE"/>
    <description>
    The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3237">CVE-2015-3237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/934502">SUSE bug 934502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3238">CVE-2015-3238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123794">SUSE bug 1123794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934920">SUSE bug 934920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887067" comment="pam-1.3.0-6.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005095.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSQZF6HJRQVSVJ2EFD3G4HVMHOYHQDFR/#NSQZF6HJRQVSVJ2EFD3G4HVMHOYHQDFR" source="SUSE-SU"/>
    <description>
    Off-by-one error in the dwarf_to_unw_regnum function in include/dwarf_i.h in libunwind 1.1 allows local users to have unspecified impact via invalid dwarf opcodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3239">CVE-2015-3239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936786">SUSE bug 936786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904476" comment="libunwind-1.2.1-4.2.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
    <description>
    Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3247">CVE-2015-3247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944460">SUSE bug 944460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC/#2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC" source="SUSE-SU"/>
    <description>
    The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3255">CVE-2015-3255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/939246">SUSE bug 939246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC/#2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC" source="SUSE-SU"/>
    <description>
    PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3256">CVE-2015-3256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3259">CVE-2015-3259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935634">SUSE bug 935634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/936281">SUSE bug 936281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937018">SUSE bug 937018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3288" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3288" ref_url="https://www.suse.com/security/cve/CVE-2015-3288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3288/">CVE-2015-3288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3288">CVE-2015-3288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979021">SUSE bug 979021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3290" ref_url="https://www.suse.com/security/cve/CVE-2015-3290" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1842-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K/#52CT3NPGIEFS3FRUZ5D6HC6XZML63T2K" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3290/">CVE-2015-3290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3290">CVE-2015-3290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226159">SUSE bug 1226159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939269">SUSE bug 939269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3291" ref_url="https://www.suse.com/security/cve/CVE-2015-3291" source="SUSE CVE"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register, issuing a syscall instruction, and triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3291/">CVE-2015-3291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3291">CVE-2015-3291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3331" ref_url="https://www.suse.com/security/cve/CVE-2015-3331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
    <description>
    The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3331/">CVE-2015-3331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3331">CVE-2015-3331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/927257">SUSE bug 927257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931231">SUSE bug 931231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939262">SUSE bug 939262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJRBBVSCWK64IXCWDAQWMSYZBV6OOOZ4/#BJRBBVSCWK64IXCWDAQWMSYZBV6OOOZ4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
    <description>
    Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3340">CVE-2015-3340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/927967">SUSE bug 927967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3414">CVE-2015-3414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&amp;O&gt;O) in a CREATE TABLE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3415">CVE-2015-3415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416" source="SUSE CVE"/>
    <description>
    The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3416">CVE-2015-3416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928702">SUSE bug 928702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335190" comment="libsqlite3-0 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0889-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-May/001408.html" source="SUSE-SU"/>
		<reference ref_id="TID7016497" ref_url="https://www.suse.com/support/kb/doc?id=7016497" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0893-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2V5WER4KNKN6PYRSUH3XIADXSRI6VT5J/#2V5WER4KNKN6PYRSUH3XIADXSRI6VT5J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4ZAOLBFFHRWEHZUAUTQKU56GURYVX4U/#N4ZAOLBFFHRWEHZUAUTQKU56GURYVX4U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJRBBVSCWK64IXCWDAQWMSYZBV6OOOZ4/#BJRBBVSCWK64IXCWDAQWMSYZBV6OOOZ4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3456">CVE-2015-3456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929339">SUSE bug 929339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932770">SUSE bug 932770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935900">SUSE bug 935900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3622">CVE-2015-3622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929414">SUSE bug 929414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490140" comment="libtasn1-4.13-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490141" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3627" ref_url="https://www.suse.com/security/cve/CVE-2015-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001419.html" source="SUSE-SU"/>
    <description>
    Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3627/">CVE-2015-3627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3627">CVE-2015-3627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930235">SUSE bug 930235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945060">SUSE bug 945060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3629" ref_url="https://www.suse.com/security/cve/CVE-2015-3629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001419.html" source="SUSE-SU"/>
    <description>
    Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3629/">CVE-2015-3629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-3629">CVE-2015-3629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930235">SUSE bug 930235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945060">SUSE bug 945060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3630" ref_url="https://www.suse.com/security/cve/CVE-2015-3630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001419.html" source="SUSE-SU"/>
    <description>
    Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3630/">CVE-2015-3630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3630">CVE-2015-3630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930235">SUSE bug 930235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945060">SUSE bug 945060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3631" ref_url="https://www.suse.com/security/cve/CVE-2015-3631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001419.html" source="SUSE-SU"/>
    <description>
    Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3631/">CVE-2015-3631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3631">CVE-2015-3631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930235">SUSE bug 930235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945060">SUSE bug 945060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-3636" ref_url="https://www.suse.com/security/cve/CVE-2015-3636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001574.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-3636/">CVE-2015-3636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-3636">CVE-2015-3636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/929525">SUSE bug 929525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939277">SUSE bug 939277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1177-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1181-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1183-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1268-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1547-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017140.html" source="SUSE-SU"/>
		<reference ref_id="TID7010166" ref_url="https://www.suse.com/support/kb/doc/?id=7010166" source="SUSE-SU"/>
		<reference ref_id="TID7016528" ref_url="https://www.suse.com/support/kb/doc/?id=7016528" source="SUSE-SU"/>
		<reference ref_id="TID7016529" ref_url="https://www.suse.com/support/kb/doc?id=7016529" source="SUSE-SU"/>
		<reference ref_id="TID7016539" ref_url="https://www.suse.com/support/kb/doc/?id=7016539" source="SUSE-SU"/>
		<reference ref_id="TID7016657" ref_url="https://www.suse.com/support/kb/doc/?id=7016657" source="SUSE-SU"/>
		<reference ref_id="TID7016694" ref_url="https://www.suse.com/support/kb/doc/?id=7016694" source="SUSE-SU"/>
		<reference ref_id="TID7016726" ref_url="https://www.suse.com/support/kb/doc/?id=7016726" source="SUSE-SU"/>
		<reference ref_id="TID7016795" ref_url="https://www.suse.com/support/kb/doc/?id=7016795" source="SUSE-SU"/>
		<reference ref_id="TID7021279" ref_url="https://www.suse.com/support/kb/doc/?id=7021279" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021433" ref_url="https://www.suse.com/support/kb/doc/?id=7021433" source="SUSE-SU"/>
		<reference ref_id="TID7021435" ref_url="https://www.suse.com/support/kb/doc/?id=7021435" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="TID7021676" ref_url="https://www.suse.com/support/kb/doc/?id=7021676" source="SUSE-SU"/>
		<reference ref_id="TID7021743" ref_url="https://www.suse.com/support/kb/doc/?id=7021743" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7021836" ref_url="https://www.suse.com/support/kb/doc/?id=7021836" source="SUSE-SU"/>
		<reference ref_id="TID7021848" ref_url="https://www.suse.com/support/kb/doc/?id=7021848" source="SUSE-SU"/>
		<reference ref_id="TID7021978" ref_url="https://www.suse.com/support/kb/doc/?id=7021978" source="SUSE-SU"/>
		<reference ref_id="TID7021993" ref_url="https://www.suse.com/support/kb/doc/?id=7021993" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="TID7022026" ref_url="https://www.suse.com/support/kb/doc/?id=7022026" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022095" ref_url="https://www.suse.com/support/kb/doc/?id=7022095" source="SUSE-SU"/>
		<reference ref_id="TID7022096" ref_url="https://www.suse.com/support/kb/doc/?id=7022096" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT/#FWJ5D6XMAKVEDCAJ7ERXTGMFTTDWN5PT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ/#KHOOMDUPEQLMQZN7JRZIBDKGHYJ2TBKQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1229-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4/#W6I3NS2A7HT62ZCI53NMT32HGQIV5BS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1266-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY/#5VNGKNJGYZV377DMZMDSGTC6LXFPDDSY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF/#XQAZGF7SIGXMQQGI6UJF7VBAOBYMY5WF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1288-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU/#TXVU3Y3MZTDHVP52DAEBRCD5GP4FAMIU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1289-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO/#PZ3KWYO2IVEORKHG62M62G3UEKUH6TTO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN/#6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC/#HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3/#OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074631">SUSE bug 1074631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211968">SUSE bug 1211968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931600">SUSE bug 931600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931698">SUSE bug 931698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931723">SUSE bug 931723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/931845">SUSE bug 931845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932026">SUSE bug 932026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/932483">SUSE bug 932483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934789">SUSE bug 934789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935033">SUSE bug 935033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935540">SUSE bug 935540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935979">SUSE bug 935979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937202">SUSE bug 937202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937766">SUSE bug 937766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938248">SUSE bug 938248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938432">SUSE bug 938432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938895">SUSE bug 938895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938905">SUSE bug 938905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938906">SUSE bug 938906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938913">SUSE bug 938913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938945">SUSE bug 938945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943664">SUSE bug 943664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944729">SUSE bug 944729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/955589">SUSE bug 955589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980406">SUSE bug 980406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990592">SUSE bug 990592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994144">SUSE bug 994144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4037">CVE-2015-4037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/932267">SUSE bug 932267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
    <description>
    The keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 on 64-bit platforms performs a size calculation without considering the number of bytes occupied by multibyte characters, which allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via long UTF-8 strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4041">CVE-2015-4041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896051" comment="coreutils-8.29-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4042" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001604.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4042">CVE-2015-4042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167100">SUSE bug 1167100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928749">SUSE bug 928749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896051" comment="coreutils-8.29-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN/#GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4103">CVE-2015-4103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931625">SUSE bug 931625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN/#GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4104">CVE-2015-4104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931626">SUSE bug 931626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN/#GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN" source="SUSE-SU"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4105">CVE-2015-4105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931627">SUSE bug 931627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-June/001468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="TID7016590" ref_url="https://www.suse.com/support/kb/doc?id=7016590" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML/#CQMOBB2P5AC2XENWS2CQI3JBBQ3QBSML" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN/#GYRRDBK2XFSCVYWJXCUOJYA55TMXNLJN" source="SUSE-SU"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4106">CVE-2015-4106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/931628">SUSE bug 931628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4141">CVE-2015-4141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4142">CVE-2015-4142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/915323">SUSE bug 915323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4143">CVE-2015-4143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4144" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4144">CVE-2015-4144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4145" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4145">CVE-2015-4145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4146" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146" source="SUSE CVE"/>
    <description>
    The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4146">CVE-2015-4146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4167" ref_url="https://www.suse.com/security/cve/CVE-2015-4167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001611.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4167/">CVE-2015-4167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4167">CVE-2015-4167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/917839">SUSE bug 917839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/933907">SUSE bug 933907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4625" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001649.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC/#2IETLXYNOVWQ7TJE66GLJU2WLE6YUEDC" source="SUSE-SU"/>
    <description>
    Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4625">CVE-2015-4625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935119">SUSE bug 935119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943816">SUSE bug 943816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-4692" ref_url="https://www.suse.com/security/cve/CVE-2015-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001518.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S/#WK73PLTGJ2J7BSDKZCVOUPKENB4UND7S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
    <description>
    The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4692/">CVE-2015-4692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4692">CVE-2015-4692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/935542">SUSE bug 935542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-July/001511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5154">CVE-2015-5154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/938344">SUSE bug 938344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5156" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5156" ref_url="https://www.suse.com/security/cve/CVE-2015-5156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004055.html" source="SUSE-SU"/>
    <description>
    The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5156/">CVE-2015-5156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5156">CVE-2015-5156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123903">SUSE bug 1123903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/940776">SUSE bug 940776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945048">SUSE bug 945048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5157" ref_url="https://www.suse.com/security/cve/CVE-2015-5157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5157/">CVE-2015-5157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5157">CVE-2015-5157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937969">SUSE bug 937969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/937970">SUSE bug 937970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/938706">SUSE bug 938706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939207">SUSE bug 939207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5165" ref_url="https://www.suse.com/security/cve/CVE-2015-5165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-August/001547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1479-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-5165/">CVE-2015-5165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5165">CVE-2015-5165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/939712">SUSE bug 939712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011984.html" source="SUSE-SU"/>
    <description>
    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5180">CVE-2015-5180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215582">SUSE bug 1215582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941234">SUSE bug 941234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0563-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190563-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005428.html" source="SUSE-SU"/>
    <description>
    Audit before 2.4.4 in Linux does not sanitize escape characters in filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5186">CVE-2015-5186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941922">SUSE bug 941922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904454" comment="libaudit1-2.8.1-12.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904455" comment="libauparse0-2.8.1-12.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5191" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002699.html" source="SUSE-SU"/>
    <description>
    VMware Tools prior to 10.0.9 contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation. CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5191">CVE-2015-5191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007600">SUSE bug 1007600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904477" comment="libvmtools0-11.2.5-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904478" comment="open-vm-tools-11.2.5-4.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2016:1515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2016-June/004750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008640.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5218">CVE-2015-5218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/949754">SUSE bug 949754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904456" comment="libblkid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904457" comment="libfdisk1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904458" comment="libmount1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904459" comment="libsmartcols1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904460" comment="libuuid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904461" comment="util-linux-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904462" comment="util-linux-systemd-2.33.1-4.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5225" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225" source="SUSE CVE"/>
    <description>
    Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5225">CVE-2015-5225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/942845">SUSE bug 942845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Integer overflow in the VNC display driver in QEMU before 2.1.0 allows attachers to cause a denial of service (process crash) via a CLIENT_CUT_TEXT message, which triggers an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5239">CVE-2015-5239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944463">SUSE bug 944463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5245" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5245" ref_url="https://www.suse.com/security/cve/CVE-2015-5245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001952.html" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the Ceph Object Gateway (aka radosgw or RGW) in Ceph before 0.94.4 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted bucket name.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5245/">CVE-2015-5245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5245">CVE-2015-5245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945206">SUSE bug 945206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009335684" comment="librados2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335686" comment="librbd1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5247" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247" source="SUSE CVE"/>
    <description>
    The virStorageVolCreateXML API in libvirt 1.2.14 through 1.2.19 allows remote authenticated users with a read-write connection to cause a denial of service (libvirtd crash) by triggering a failed unlink after creating a volume on a root_squash NFS pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5247">CVE-2015-5247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945645">SUSE bug 945645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5260">CVE-2015-5260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944787">SUSE bug 944787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5261">CVE-2015-5261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/948976">SUSE bug 948976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows attackers to cause a denial of service (infinite loop and instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5278">CVE-2015-5278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945989">SUSE bug 945989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964947">SUSE bug 964947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ne2000_receive function in hw/net/ne2000.c in QEMU before 2.4.0.1 allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via vectors related to receiving packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5279">CVE-2015-5279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945987">SUSE bug 945987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5297" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5297" ref_url="https://www.suse.com/security/cve/CVE-2015-5297" source="SUSE CVE"/>
    <description>
    An integer overflow issue has been reported in the general_composite_rect() function in pixman prior to version 0.32.8. An attacker could exploit this issue to cause an application using pixman to crash or, potentially, execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-5297/">CVE-2015-5297 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5297">CVE-2015-5297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117000">SUSE bug 1117000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337724" comment="libpixman-1-0 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5307">CVE-2015-5307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5310" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
    <description>
    The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5310">CVE-2015-5310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952254">SUSE bug 952254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953115">SUSE bug 953115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5312">CVE-2015-5312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957105">SUSE bug 957105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001977.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5313">CVE-2015-5313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/953110">SUSE bug 953110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5315" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5315" ref_url="https://www.suse.com/security/cve/CVE-2015-5315" source="SUSE CVE"/>
    <description>
    The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5315/">CVE-2015-5315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5315">CVE-2015-5315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/953115">SUSE bug 953115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5316" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5316" ref_url="https://www.suse.com/security/cve/CVE-2015-5316" source="SUSE CVE"/>
    <description>
    The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5316/">CVE-2015-5316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-5316">CVE-2015-5316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/953115">SUSE bug 953115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5738" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5738" ref_url="https://www.suse.com/security/cve/CVE-2015-5738" source="SUSE CVE"/>
    <description>
    The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x, when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS), makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5738/">CVE-2015-5738 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5738">CVE-2015-5738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944456">SUSE bug 944456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944835">SUSE bug 944835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/944836">SUSE bug 944836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-5745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    Buffer overflow in the send_control_msg function in hw/char/virtio-serial-bus.c in QEMU before 2.4.0 allows guest users to cause a denial of service (QEMU process crash) via a crafted virtio control message.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-5745">CVE-2015-5745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-September/001582.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6251">CVE-2015-6251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/941794">SUSE bug 941794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6525" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6525" ref_url="https://www.suse.com/security/cve/CVE-2015-6525" source="SUSE CVE"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 2.0.x before 2.0.22 and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_prepend, (3) evbuffer_expand, (4) exbuffer_reserve_space, or (5) evbuffer_read function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier was SPLIT from CVE-2014-6272 per ADT3 due to different affected versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6525/">CVE-2015-6525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6525">CVE-2015-6525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/897243">SUSE bug 897243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943011">SUSE bug 943011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654580" comment="libevent-2_1-8 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-6815">CVE-2015-6815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/944697">SUSE bug 944697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6855">CVE-2015-6855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945404">SUSE bug 945404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965156">SUSE bug 965156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN/#6PJL6VDYM2BF76IMT64TDCZYCMTZLJLN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC/#HT6LYJCGGLAPRBTC4QN62E75JZBMUBRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3/#OBCAOITX3L4BHAVIXSGXNTMWKD2QELP3" source="SUSE-SU"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6908">CVE-2015-6908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945582">SUSE bug 945582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-6937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-6937" ref_url="https://www.suse.com/security/cve/CVE-2015-6937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-6937/">CVE-2015-6937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-6937">CVE-2015-6937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7181">CVE-2015-7181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-10-23"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7182">CVE-2015-7182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001691.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6/#5J7Y2TMONA53MKP4NVMADVEOHZPRGPG6" source="SUSE-SU"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-10-27"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7183">CVE-2015-7183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/952810">SUSE bug 952810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492703" comment="mozilla-nspr-4.25.1-3.15.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1705-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1706-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001623.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7236">CVE-2015-7236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940191">SUSE bug 940191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946204">SUSE bug 946204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979097">SUSE bug 979097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887076" comment="rpcbind-0.2.3-5.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7295" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
    <description>
    hw/virtio/virtio.c in the Virtual Network Device (virtio-net) support in QEMU, when big or mergeable receive buffers are not supported, allows remote attackers to cause a denial of service (guest network consumption) via a flood of jumbo frames on the (1) tuntap or (2) macvtap interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7295">CVE-2015-7295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7311">CVE-2015-7311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/947165">SUSE bug 947165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7497">CVE-2015-7497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957106">SUSE bug 957106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7498">CVE-2015-7498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957107">SUSE bug 957107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7499">CVE-2015-7499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957109">SUSE bug 957109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7500">CVE-2015-7500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957110">SUSE bug 957110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7504">CVE-2015-7504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956411">SUSE bug 956411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7510" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7510" ref_url="https://www.suse.com/security/cve/CVE-2015-7510" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the getpwnam and getgrnam functions of the NSS module nss-mymachines in systemd.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7510/">CVE-2015-7510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7510">CVE-2015-7510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956712">SUSE bug 956712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7511">CVE-2015-7511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965902">SUSE bug 965902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PK44VBMIWQVKV6LUYH5USCPSBIGYWK6/#3PK44VBMIWQVKV6LUYH5USCPSBIGYWK6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7512">CVE-2015-7512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/957162">SUSE bug 957162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962360">SUSE bug 962360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7513" ref_url="https://www.suse.com/security/cve/CVE-2015-7513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7513/">CVE-2015-7513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7513">CVE-2015-7513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960689">SUSE bug 960689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017265" ref_url="https://www.suse.com/support/kb/doc?id=7017265" source="SUSE-SU"/>
		<reference ref_id="TID7017273" ref_url="https://www.suse.com/support/kb/doc/?id=7017273" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017329" ref_url="https://www.suse.com/support/kb/doc/?id=7017329" source="SUSE-SU"/>
		<reference ref_id="TID7021300" ref_url="https://www.suse.com/support/kb/doc/?id=7021300" source="SUSE-SU"/>
		<reference ref_id="TID7021823" ref_url="https://www.suse.com/support/kb/doc/?id=7021823" source="SUSE-SU"/>
		<reference ref_id="TID7022077" ref_url="https://www.suse.com/support/kb/doc/?id=7022077" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0511-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CV7CKNEEDXVSF4NS5NGK7OXLJA7ZKLKU/#CV7CKNEEDXVSF4NS5NGK7OXLJA7ZKLKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0512-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X24EQEUQCAY6HF7XTDWCO3ECDCY7DTY5/#X24EQEUQCAY6HF7XTDWCO3ECDCY7DTY5" source="SUSE-SU"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7547">CVE-2015-7547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077097">SUSE bug 1077097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/847227">SUSE bug 847227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961721">SUSE bug 961721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967023">SUSE bug 967023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967061">SUSE bug 967061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967072">SUSE bug 967072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967496">SUSE bug 967496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969216">SUSE bug 969216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969241">SUSE bug 969241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7549">CVE-2015-7549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958917">SUSE bug 958917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958918">SUSE bug 958918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7566" ref_url="https://www.suse.com/security/cve/CVE-2015-7566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7566/">CVE-2015-7566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7566">CVE-2015-7566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-7575">CVE-2015-7575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959888">SUSE bug 959888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960996">SUSE bug 960996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961280">SUSE bug 961280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961281">SUSE bug 961281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961282">SUSE bug 961282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961283">SUSE bug 961283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961284">SUSE bug 961284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961290">SUSE bug 961290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961357">SUSE bug 961357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967521">SUSE bug 967521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981087">SUSE bug 981087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7613" ref_url="https://www.suse.com/security/cve/CVE-2015-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001699.html" source="SUSE-SU"/>
    <description>
    Race condition in the IPC object implementation in the Linux kernel through 4.2.3 allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-7613/">CVE-2015-7613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7613">CVE-2015-7613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948536">SUSE bug 948536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/948701">SUSE bug 948701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7799" ref_url="https://www.suse.com/security/cve/CVE-2015-7799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7799/">CVE-2015-7799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7799">CVE-2015-7799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/949936">SUSE bug 949936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951638">SUSE bug 951638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7833" ref_url="https://www.suse.com/security/cve/CVE-2015-7833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-7833/">CVE-2015-7833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7833">CVE-2015-7833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950998">SUSE bug 950998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7835">CVE-2015-7835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/940929">SUSE bug 940929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/947159">SUSE bug 947159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950367">SUSE bug 950367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7884" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7884" ref_url="https://www.suse.com/security/cve/CVE-2015-7884" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
    <description>
    The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7884/">CVE-2015-7884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7884">CVE-2015-7884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7885" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7885" ref_url="https://www.suse.com/security/cve/CVE-2015-7885" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
    <description>
    The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7885/">CVE-2015-7885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7885">CVE-2015-7885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951626">SUSE bug 951626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951627">SUSE bug 951627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7941">CVE-2015-7941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951734">SUSE bug 951734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7942">CVE-2015-7942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951735">SUSE bug 951735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7969">CVE-2015-7969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/950703">SUSE bug 950703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950705">SUSE bug 950705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7970">CVE-2015-7970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-October/001654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7971">CVE-2015-7971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/950706">SUSE bug 950706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDFPIHUORGRCSRYB743FA3OE4NKVH2VB/#IDFPIHUORGRCSRYB743FA3OE4NKVH2VB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y/#BQNNLOO42C2AJVHL72XWPCAH7YOGFT6Y" source="SUSE-SU"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7972">CVE-2015-7972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/950704">SUSE bug 950704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951845">SUSE bug 951845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7990" ref_url="https://www.suse.com/security/cve/CVE-2015-7990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7990/">CVE-2015-7990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7990">CVE-2015-7990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/945825">SUSE bug 945825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952384">SUSE bug 952384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953052">SUSE bug 953052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-7995">CVE-2015-7995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952474">SUSE bug 952474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8019" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8019" ref_url="https://www.suse.com/security/cve/CVE-2015-8019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
    <description>
    The skb_copy_and_csum_datagram_iovec function in net/core/datagram.c in the Linux kernel 3.14.54 and 3.18.22 does not accept a length argument, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write system call followed by a recvmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8019/">CVE-2015-8019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8019">CVE-2015-8019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1032268">SUSE bug 1032268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951199">SUSE bug 951199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/952587">SUSE bug 952587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979078">SUSE bug 979078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8035">CVE-2015-8035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954429">SUSE bug 954429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8041" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8041">CVE-2015-8041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/937419">SUSE bug 937419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8104">CVE-2015-8104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/953527">SUSE bug 953527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954018">SUSE bug 954018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954404">SUSE bug 954404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954405">SUSE bug 954405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962977">SUSE bug 962977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-November/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001942.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2099-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IA3JSOC6TODLLXWQSU7IIE27WYY434BQ/#IA3JSOC6TODLLXWQSU7IIE27WYY434BQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3RIBJLRBMGLPB65CDCRVKAPQAUO27ON/#O3RIBJLRBMGLPB65CDCRVKAPQAUO27ON" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0263-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI/#WB2NQ3V2BHAFYEU5DCOQH3B3SIMMKMRI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC/#OXB4QAFWJUQEZEK2MFV5C6VMXORCHTOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EM5IRJXZE66HIX564A56RBKHOFXINXH2/#EM5IRJXZE66HIX564A56RBKHOFXINXH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0272-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6/#YX6XI7PJCN66EMA6MG6N5F3SLBKL3UF6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0279-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH/#5PDBMSXPRSUZRBQWXDNZ3KHQVA53KFEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D3C3NOJM72UXURYDWTEMDOPUCNQC7J6A/#D3C3NOJM72UXURYDWTEMDOPUCNQC7J6A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0684-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDITRUQS4SRIKAXVWYM3UEYWRLUUYM7Z/#DDITRUQS4SRIKAXVWYM3UEYWRLUUYM7Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0729-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OPH54WIXHYBZND4XGIJC36WO62H6YQD/#3OPH54WIXHYBZND4XGIJC36WO62H6YQD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1652-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY3W2XBVKUBNO6MRKKQXJUMKNUQOVG67/#YY3W2XBVKUBNO6MRKKQXJUMKNUQOVG67" source="SUSE-SU"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8126">CVE-2015-8126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/954980">SUSE bug 954980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958198">SUSE bug 958198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960402">SUSE bug 960402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962743">SUSE bug 962743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963937">SUSE bug 963937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969333">SUSE bug 969333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8242">CVE-2015-8242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956021">SUSE bug 956021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959469">SUSE bug 959469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969769">SUSE bug 969769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8324" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8324" ref_url="https://www.suse.com/security/cve/CVE-2015-8324" source="SUSE CVE"/>
    <description>
    The ext4 implementation in the Linux kernel before 2.6.34 does not properly track the initialization of certain data structures, which allows physically proximate attackers to cause a denial of service (NULL pointer dereference and panic) via a crafted USB device, related to the ext4_fill_super function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8324/">CVE-2015-8324 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8324">CVE-2015-8324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956707">SUSE bug 956707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8325">CVE-2015-8325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975865">SUSE bug 975865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8339">CVE-2015-8339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8340">CVE-2015-8340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956408">SUSE bug 956408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8341">CVE-2015-8341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956409">SUSE bug 956409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0536-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PK44VBMIWQVKV6LUYH5USCPSBIGYWK6/#3PK44VBMIWQVKV6LUYH5USCPSBIGYWK6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The eepro100 emulator in QEMU qemu-kvm blank allows local guest users to cause a denial of service (application crash and infinite loop) via vectors involving the command block list.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8345">CVE-2015-8345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956829">SUSE bug 956829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956832">SUSE bug 956832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2015:2385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2015:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2015-December/001770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HCIOHRYCBOGNSMICWP7RHCYVA2NZZPO/#6HCIOHRYCBOGNSMICWP7RHCYVA2NZZPO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2015:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQ4XUBQD26IVJUIRHZGRTUF7Z6ZUULDV/#WQ4XUBQD26IVJUIRHZGRTUF7Z6ZUULDV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OAXX6TGRO3I5KL46K32COXYNVNDPNXG/#4OAXX6TGRO3I5KL46K32COXYNVNDPNXG" source="SUSE-SU"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8370">CVE-2015-8370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/956631">SUSE bug 956631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8374" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8374" ref_url="https://www.suse.com/security/cve/CVE-2015-8374" source="SUSE CVE"/>
    <description>
    fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8374/">CVE-2015-8374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8374">CVE-2015-8374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/956053">SUSE bug 956053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8504">CVE-2015-8504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958491">SUSE bug 958491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958493">SUSE bug 958493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8539" ref_url="https://www.suse.com/security/cve/CVE-2015-8539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8539/">CVE-2015-8539 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8539">CVE-2015-8539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/781018">SUSE bug 781018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958463">SUSE bug 958463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958601">SUSE bug 958601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8543">CVE-2015-8543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/958886">SUSE bug 958886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969522">SUSE bug 969522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8550">CVE-2015-8550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957988">SUSE bug 957988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8551" ref_url="https://www.suse.com/security/cve/CVE-2015-8551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8551/">CVE-2015-8551 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8551">CVE-2015-8551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8552" ref_url="https://www.suse.com/security/cve/CVE-2015-8552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS/#TD5WLQ4FFRPU2BIT7RWEY3U73G4UNDCS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OC7663UNXLKFWJKPITRGQNF4FU4KJWNK/#OC7663UNXLKFWJKPITRGQNF4FU4KJWNK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0318-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS/#7PLUD6GJFLZ2LR3VZPLUZ5KPDX3EVFZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8552/">CVE-2015-8552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8552">CVE-2015-8552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8553" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8553" ref_url="https://www.suse.com/security/cve/CVE-2015-8553" source="SUSE CVE"/>
    <description>
    Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8553/">CVE-2015-8553 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8553">CVE-2015-8553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/903967">SUSE bug 903967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957990">SUSE bug 957990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8554">CVE-2015-8554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958007">SUSE bug 958007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8555">CVE-2015-8555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/958009">SUSE bug 958009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0124-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFBCJLYM3GQVTBACNHPS6L4SXGP266S/#PKFBCJLYM3GQVTBACNHPS6L4SXGP266S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8558">CVE-2015-8558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959005">SUSE bug 959005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959006">SUSE bug 959006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976109">SUSE bug 976109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976111">SUSE bug 976111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    Memory leak in net/vmxnet3.c in QEMU allows remote attackers to cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8567">CVE-2015-8567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ/#WTAARVAKQCKIR26HIJTUZQCNJJ7CRNGJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ/#3LZI7C7SN5OGIWRGLROZX45HYK4KCQDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    Memory leak in QEMU, when built with a VMWARE VMXNET3 paravirtual NIC emulator support, allows local guest users to cause a denial of service (host memory consumption) by trying to activate the vmxnet3 device repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8568">CVE-2015-8568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/959386">SUSE bug 959386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/959387">SUSE bug 959387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the megasas_ctrl_get_info function in QEMU, when built with SCSI MegaRAID SAS HBA emulation support, allows local guest users to cause a denial of service (QEMU instance crash) via a crafted SCSI controller CTRL_GET_INFO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8613">CVE-2015-8613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961358">SUSE bug 961358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961556">SUSE bug 961556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615" source="SUSE CVE"/>
    <description>
    The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8615">CVE-2015-8615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960093">SUSE bug 960093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8619">CVE-2015-8619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960334">SUSE bug 960334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965269">SUSE bug 965269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8629">CVE-2015-8629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/770172">SUSE bug 770172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963968">SUSE bug 963968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8630">CVE-2015-8630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963964">SUSE bug 963964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001871.html" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8631">CVE-2015-8631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963975">SUSE bug 963975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8660" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8660" ref_url="https://www.suse.com/security/cve/CVE-2015-8660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001936.html" source="SUSE-SU"/>
    <description>
    The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8660/">CVE-2015-8660 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8660">CVE-2015-8660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/923755">SUSE bug 923755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960281">SUSE bug 960281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960329">SUSE bug 960329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963994">SUSE bug 963994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8743">CVE-2015-8743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960725">SUSE bug 960725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960726">SUSE bug 960726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8744">CVE-2015-8744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960835">SUSE bug 960835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960836">SUSE bug 960836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8745">CVE-2015-8745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960707">SUSE bug 960707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960708">SUSE bug 960708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8776">CVE-2015-8776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962736">SUSE bug 962736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
    <description>
    The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8777">CVE-2015-8777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/950944">SUSE bug 950944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962735">SUSE bug 962735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8778">CVE-2015-8778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962737">SUSE bug 962737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="TID7017287" ref_url="https://www.suse.com/support/kb/doc?id=7017287" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X/#YY2DTMAT2VLWPTXSSUAUBFCCAYY3S63X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN/#XMCYM5IM5GBBV2HEJEZMVKTJIYVLENHN" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8779">CVE-2015-8779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962739">SUSE bug 962739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965453">SUSE bug 965453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986086">SUSE bug 986086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8785" ref_url="https://www.suse.com/security/cve/CVE-2015-8785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8785/">CVE-2015-8785 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8785">CVE-2015-8785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963765">SUSE bug 963765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8803">CVE-2015-8803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964845">SUSE bug 964845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493118" comment="libhogweed4-3.4.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493121" comment="libnettle6-3.4.1-4.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
    <description>
    x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8804">CVE-2015-8804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964847">SUSE bug 964847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493118" comment="libhogweed4-3.4.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493121" comment="libnettle6-3.4.1-4.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001877.html" source="SUSE-SU"/>
    <description>
    The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8805">CVE-2015-8805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964849">SUSE bug 964849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493118" comment="libhogweed4-3.4.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493121" comment="libnettle6-3.4.1-4.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8816" ref_url="https://www.suse.com/security/cve/CVE-2015-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8816/">CVE-2015-8816 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8816">CVE-2015-8816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968010">SUSE bug 968010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979064">SUSE bug 979064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8830" ref_url="https://www.suse.com/security/cve/CVE-2015-8830" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8830/">CVE-2015-8830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8830">CVE-2015-8830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969354">SUSE bug 969354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969355">SUSE bug 969355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8839" ref_url="https://www.suse.com/security/cve/CVE-2015-8839" source="SUSE CVE"/>
    <description>
    Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8839/">CVE-2015-8839 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8839">CVE-2015-8839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/972174">SUSE bug 972174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8844" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8844" ref_url="https://www.suse.com/security/cve/CVE-2015-8844" source="SUSE CVE"/>
    <description>
    The signal implementation in the Linux kernel before 4.3.5 on powerpc platforms does not check for an MSR with both the S and T bits set, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8844/">CVE-2015-8844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8844">CVE-2015-8844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8845" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8845" ref_url="https://www.suse.com/security/cve/CVE-2015-8845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8845/">CVE-2015-8845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8845">CVE-2015-8845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975531">SUSE bug 975531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975533">SUSE bug 975533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8948">CVE-2015-8948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190777">SUSE bug 1190777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882167" comment="libidn11-1.34-3.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8950" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8950" ref_url="https://www.suse.com/security/cve/CVE-2015-8950" source="SUSE CVE"/>
    <description>
    arch/arm64/mm/dma-mapping.c in the Linux kernel before 4.0.3, as used in the ION subsystem in Android and other products, does not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory by triggering a dma_mmap call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8950/">CVE-2015-8950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8950">CVE-2015-8950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003931">SUSE bug 1003931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004045">SUSE bug 1004045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8952" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8952" ref_url="https://www.suse.com/security/cve/CVE-2015-8952" source="SUSE CVE"/>
    <description>
    The mbcache feature in the ext2 and ext4 filesystem implementations in the Linux kernel before 4.6 mishandles xattr block caching, which allows local users to cause a denial of service (soft lockup) via filesystem operations in environments that use many attributes, as demonstrated by Ceph and Samba.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8952/">CVE-2015-8952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8952">CVE-2015-8952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995759">SUSE bug 995759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8953" ref_url="https://www.suse.com/security/cve/CVE-2015-8953" source="SUSE CVE"/>
    <description>
    fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8953/">CVE-2015-8953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8953">CVE-2015-8953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995763">SUSE bug 995763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8955" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8955" ref_url="https://www.suse.com/security/cve/CVE-2015-8955" source="SUSE CVE"/>
    <description>
    arch/arm64/kernel/perf_event.c in the Linux kernel before 4.1 on arm64 platforms allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via vectors involving events that are mishandled during a span of multiple HW PMUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8955/">CVE-2015-8955 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8955">CVE-2015-8955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003931">SUSE bug 1003931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8962" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8962" ref_url="https://www.suse.com/security/cve/CVE-2015-8962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8962/">CVE-2015-8962 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8962">CVE-2015-8962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010501">SUSE bug 1010501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8963" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8963" ref_url="https://www.suse.com/security/cve/CVE-2015-8963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8963/">CVE-2015-8963 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8963">CVE-2015-8963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010502">SUSE bug 1010502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8970" ref_url="https://www.suse.com/security/cve/CVE-2015-8970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
    <description>
    crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8970/">CVE-2015-8970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8970">CVE-2015-8970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008374">SUSE bug 1008374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008850">SUSE bug 1008850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8982" ref_url="https://www.suse.com/security/cve/CVE-2015-8982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the strxfrm function in the GNU C Library (aka glibc or libc6) before 2.21 allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-8982/">CVE-2015-8982 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8982">CVE-2015-8982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193616">SUSE bug 1193616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199869">SUSE bug 1199869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200203">SUSE bug 1200203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334828" comment="glibc-locale is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339499" comment="glibc-locale-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8983" ref_url="https://www.suse.com/security/cve/CVE-2015-8983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the _IO_wstr_overflow function in libio/wstrops.c in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors related to computing a size in bytes, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2015-8983/">CVE-2015-8983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8983">CVE-2015-8983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193615">SUSE bug 1193615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199869">SUSE bug 1199869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334828" comment="glibc-locale is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339499" comment="glibc-locale-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-8985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3942-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013175.html" source="SUSE-SU"/>
    <description>
    The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-8985">CVE-2015-8985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920169">SUSE bug 920169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/920338">SUSE bug 920338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669024" comment="glibc-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669032" comment="glibc-locale-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669033" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
    <description>
    In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-9019">CVE-2015-9019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/934119">SUSE bug 934119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9251">CVE-2015-9251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099458">SUSE bug 1099458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100133">SUSE bug 1100133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111660">SUSE bug 1111660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9289" ref_url="https://www.suse.com/security/cve/CVE-2015-9289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005859.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.1.4, a buffer overflow occurs when checking userspace params in drivers/media/dvb-frontends/cx24116.c. The maximum size for a DiSEqC command is 6, according to the userspace API. However, the code allows larger values such as 23.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-9289/">CVE-2015-9289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9289">CVE-2015-9289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143179">SUSE bug 1143179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9290" ref_url="https://www.suse.com/security/cve/CVE-2015-9290" source="SUSE CVE"/>
    <description>
    In FreeType before 2.6.1, a buffer over-read occurs in type1/t1parse.c on function T1_Get_Private_Dict where there is no check that the new values of cur and limit are sensible before going to Again.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9290/">CVE-2015-9290 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9290">CVE-2015-9290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143564">SUSE bug 1143564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336128" comment="libfreetype6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9381" ref_url="https://www.suse.com/security/cve/CVE-2015-9381" source="SUSE CVE"/>
    <description>
    FreeType before 2.6.1 has a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9381/">CVE-2015-9381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9381">CVE-2015-9381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149384">SUSE bug 1149384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336128" comment="libfreetype6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9382" ref_url="https://www.suse.com/security/cve/CVE-2015-9382" source="SUSE CVE"/>
    <description>
    FreeType before 2.6.1 has a buffer over-read in skip_comment in psaux/psobjs.c because ps_parser_skip_PS_token is mishandled in an FT_New_Memory_Face operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9382/">CVE-2015-9382 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9382">CVE-2015-9382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149395">SUSE bug 1149395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336128" comment="libfreetype6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20159383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-9383" ref_url="https://www.suse.com/security/cve/CVE-2015-9383" source="SUSE CVE"/>
    <description>
    FreeType before 2.6.2 has a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-9383/">CVE-2015-9383 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-9383">CVE-2015-9383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149397">SUSE bug 1149397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336128" comment="libfreetype6 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0701" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701" source="SUSE CVE"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
    <description>
    The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0701">CVE-2016-0701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176331">SUSE bug 1176331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195379">SUSE bug 1195379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963410">SUSE bug 963410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963413">SUSE bug 963413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0702">CVE-2016-0702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007806">SUSE bug 1007806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968050">SUSE bug 968050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7021744" ref_url="https://www.suse.com/support/kb/doc/?id=7021744" source="SUSE-SU"/>
		<reference ref_id="TID7021994" ref_url="https://www.suse.com/support/kb/doc/?id=7021994" source="SUSE-SU"/>
		<reference ref_id="TID7021995" ref_url="https://www.suse.com/support/kb/doc/?id=7021995" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA47QPDDMRSXFULROHSU5XOJYAEI63UQ/#SA47QPDDMRSXFULROHSU5XOJYAEI63UQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0705">CVE-2016-0705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968047">SUSE bug 968047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971238">SUSE bug 971238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976341">SUSE bug 976341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MDPURAJ5I4VP56UBTJSE3VWOEJE74DNB/#MDPURAJ5I4VP56UBTJSE3VWOEJE74DNB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1523-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FFR7NYQL7GYPXPBU6TRQN3XO5Z3M73U/#5FFR7NYQL7GYPXPBU6TRQN3XO5Z3M73U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1964-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6/#5HBRNDT43TAT3XC3DQZSVPGF7XNM7YD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6/#5FOCHWPBBRB5OK6GTW52LXIMIMMZD6Q6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0718">CVE-2016-0718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979441">SUSE bug 979441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991809">SUSE bug 991809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
    <description>
    The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0749">CVE-2016-0749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-February/001852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0755">CVE-2016-0755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962983">SUSE bug 962983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0764" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764" source="SUSE CVE"/>
    <description>
    Race condition in Network Manager before 1.0.12 as packaged in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows local users to obtain sensitive connection information by reading temporary files during ifcfg and keyfile changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0764">CVE-2016-0764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/974072">SUSE bug 974072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904466" comment="libnm0-1.22.10-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904467" comment="typelib-1_0-NM-1_0-1.22.10-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0772">CVE-2016-0772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/984751">SUSE bug 984751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001805.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="TID7017180" ref_url="https://www.suse.com/support/kb/doc/?id=7017180" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2/#R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q/#KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3/#SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF/#ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF" source="SUSE-SU"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0777">CVE-2016-0777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961642">SUSE bug 961642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-January/001805.html" source="SUSE-SU"/>
		<reference ref_id="TID7017154" ref_url="https://www.suse.com/support/kb/doc?id=7017154" source="SUSE-SU"/>
		<reference ref_id="TID7017155" ref_url="https://www.suse.com/support/kb/doc?id=7017155" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2/#R7FZXC627WBJIDCDZEYQLLMKYOCLGTH2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q/#KG22AHWOUP3O2CQJXLG3TPW4BOFPPN5Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3/#SKEQIBI4FAQSK2KSGNHUDTP6IFNW72I3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF/#ZQX4IUCQNLQ6M7HK5P6KRSV2TQWA4FTF" source="SUSE-SU"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0778">CVE-2016-0778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961645">SUSE bug 961645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0787">CVE-2016-0787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149968">SUSE bug 1149968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967026">SUSE bug 967026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968174">SUSE bug 968174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974691">SUSE bug 974691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0797">CVE-2016-0797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968048">SUSE bug 968048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
    <description>
    Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0798">CVE-2016-0798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968265">SUSE bug 968265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002014.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017297" ref_url="https://www.suse.com/support/kb/doc?id=7017297" source="SUSE-SU"/>
		<reference ref_id="TID7017315" ref_url="https://www.suse.com/support/kb/doc/?id=7017315" source="SUSE-SU"/>
		<reference ref_id="TID7017316" ref_url="https://www.suse.com/support/kb/doc/?id=7017316" source="SUSE-SU"/>
		<reference ref_id="TID7017317" ref_url="https://www.suse.com/support/kb/doc/?id=7017317" source="SUSE-SU"/>
		<reference ref_id="TID7017338" ref_url="https://www.suse.com/support/kb/doc/?id=7017338" source="SUSE-SU"/>
		<reference ref_id="TID7017374" ref_url="https://www.suse.com/support/kb/doc/?id=7017374" source="SUSE-SU"/>
		<reference ref_id="TID7021979" ref_url="https://www.suse.com/support/kb/doc/?id=7021979" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0627-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT/#BKJTQ7YEQCOVAXCXA6XUS5C6AY6CDJTT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D/#PRZS7YRGBNMMNA7AOZICYXH6FDRHX57D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0637-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/732C2WZF6MGNUGO3W3NVEM4POAHDFAKP/#732C2WZF6MGNUGO3W3NVEM4POAHDFAKP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5ZZO44NS35G5NQFFXUERK5DXLTQN534/#C5ZZO44NS35G5NQFFXUERK5DXLTQN534" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7/#EYE22ZU64KWEPJSQY75BXN2QAW2RIMF7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0800">CVE-2016-0800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106871">SUSE bug 1106871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961377">SUSE bug 961377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968044">SUSE bug 968044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968046">SUSE bug 968046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968888">SUSE bug 968888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969591">SUSE bug 969591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979060">SUSE bug 979060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-0821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-0821" ref_url="https://www.suse.com/security/cve/CVE-2016-0821" source="SUSE CVE"/>
    <description>
    The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-0821/">CVE-2016-0821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-0821">CVE-2016-0821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/987709">SUSE bug 987709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994624">SUSE bug 994624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1000110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1000110">CVE-2016-1000110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988484">SUSE bug 988484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989523">SUSE bug 989523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10009">CVE-2016-10009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016366">SUSE bug 1016366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217035">SUSE bug 1217035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10010" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10010">CVE-2016-10010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016368">SUSE bug 1016368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021751">SUSE bug 1021751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196721">SUSE bug 1196721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
    <description>
    authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10011">CVE-2016-10011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1029445">SUSE bug 1029445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004804.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10012">CVE-2016-10012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1006166">SUSE bug 1006166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016336">SUSE bug 1016336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016369">SUSE bug 1016369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016370">SUSE bug 1016370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017870">SUSE bug 1017870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026634">SUSE bug 1026634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035742">SUSE bug 1035742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073044">SUSE bug 1073044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092582">SUSE bug 1092582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26/#JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10013">CVE-2016-10013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26/#JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10024">CVE-2016-10024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014298">SUSE bug 1014298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10025" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26/#JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26" source="SUSE-SU"/>
    <description>
    VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10025">CVE-2016-10025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014300">SUSE bug 1014300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10028" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10028">CVE-2016-10028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1017084">SUSE bug 1017084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017085">SUSE bug 1017085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10029" ref_url="https://www.suse.com/security/cve/CVE-2016-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    The virtio_gpu_set_scanout function in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a scanout id in a VIRTIO_GPU_CMD_SET_SCANOUT command larger than num_scanouts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10029/">CVE-2016-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10029">CVE-2016-10029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1017081">SUSE bug 1017081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017082">SUSE bug 1017082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10044" ref_url="https://www.suse.com/security/cve/CVE-2016-10044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
    <description>
    The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10044/">CVE-2016-10044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10044">CVE-2016-10044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023992">SUSE bug 1023992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002787.html" source="SUSE-SU"/>
    <description>
    The png_set_text_2 function in libpng 0.71 before 1.0.67, 1.2.x before 1.2.57, 1.4.x before 1.4.20, 1.5.x before 1.5.28, and 1.6.x before 1.6.27 allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10087">CVE-2016-10087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1017646">SUSE bug 1017646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149680">SUSE bug 1149680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10147" ref_url="https://www.suse.com/security/cve/CVE-2016-10147" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10147/">CVE-2016-10147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10147">CVE-2016-10147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020381">SUSE bug 1020381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020429">SUSE bug 1020429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10155">CVE-2016-10155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021129">SUSE bug 1021129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024183">SUSE bug 1024183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0287-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M37XAFJ3OCQP3TX5FWJSRJH2JDUZNEJW/#M37XAFJ3OCQP3TX5FWJSRJH2JDUZNEJW" source="SUSE-SU"/>
    <description>
    A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10156">CVE-2016-10156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020601">SUSE bug 1020601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021969">SUSE bug 1021969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086936">SUSE bug 1086936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The gst_aac_parse_sink_setcaps function in gst/audioparsers/gstaacparse.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted audio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10198">CVE-2016-10198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024014">SUSE bug 1024014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The qtdemux_tag_add_str_full function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted tag value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10199">CVE-2016-10199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024017">SUSE bug 1024017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10208" ref_url="https://www.suse.com/security/cve/CVE-2016-10208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
    <description>
    The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.9.8 does not properly validate meta block groups, which allows physically proximate attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10208/">CVE-2016-10208 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10208">CVE-2016-10208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023377">SUSE bug 1023377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10214" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10214">CVE-2016-10214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024244">SUSE bug 1024244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011984.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1560-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LDTHO3OJZ2XD7I3ONIRIUSKEMP42OY2/" source="SUSE-SU"/>
    <description>
    The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10228">CVE-2016-10228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704997" comment="glibc-2.26-13.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704998" comment="glibc-locale-2.26-13.62.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704999" comment="glibc-locale-base-2.26-13.62.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0903-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190903-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1250-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEBZ42G23A4PRQRKKG425HHEGA3GK7EF/#SEBZ42G23A4PRQRKKG425HHEGA3GK7EF" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10739">CVE-2016-10739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10741" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10741" ref_url="https://www.suse.com/security/cve/CVE-2016-10741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2016-10741/">CVE-2016-10741 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10741">CVE-2016-10741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114920">SUSE bug 1114920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124010">SUSE bug 1124010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10745" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E/#KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR/#4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10745">CVE-2016-10745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132174">SUSE bug 1132174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897127" comment="python3-Jinja2-2.10.1-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10746" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10746" ref_url="https://www.suse.com/security/cve/CVE-2016-10746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005815.html" source="SUSE-SU"/>
    <description>
    libvirt-domain.c in libvirt before 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-10746/">CVE-2016-10746 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10746">CVE-2016-10746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336198" comment="libvirt-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10905" ref_url="https://www.suse.com/security/cve/CVE-2016-10905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10905/">CVE-2016-10905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10905">CVE-2016-10905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146312">SUSE bug 1146312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10906" ref_url="https://www.suse.com/security/cve/CVE-2016-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10906/">CVE-2016-10906 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10906">CVE-2016-10906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146584">SUSE bug 1146584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-10907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-10907" ref_url="https://www.suse.com/security/cve/CVE-2016-10907" source="SUSE CVE"/>
    <description>
    An issue was discovered in drivers/iio/dac/ad5755.c in the Linux kernel before 4.8.6. There is an out of bounds write in the function ad5755_parse_dt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-10907/">CVE-2016-10907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-10907">CVE-2016-10907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146302">SUSE bug 1146302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1234">CVE-2016-1234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020940">SUSE bug 1020940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969727">SUSE bug 969727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988770">SUSE bug 988770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988782">SUSE bug 988782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989127">SUSE bug 989127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1237" ref_url="https://www.suse.com/security/cve/CVE-2016-1237" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
    <description>
    nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1237/">CVE-2016-1237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1237">CVE-2016-1237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986570">SUSE bug 986570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2011-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192011-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0297-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T5ANAUXCDCGLYH4N2EPY5MA7CJJND4MP/#T5ANAUXCDCGLYH4N2EPY5MA7CJJND4MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1831-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWM23J3YFXDJ4Y2P4EH532AXFSDKVM3Q/#XWM23J3YFXDJ4Y2P4EH532AXFSDKVM3Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14657-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M45NUZAE5T2PPU2VV4DPBYV25BXNEI4O/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    (1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1238">CVE-2016-1238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108749">SUSE bug 1108749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123389">SUSE bug 1123389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/987887">SUSE bug 987887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988311">SUSE bug 988311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336057" comment="perl-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'&lt;((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1283">CVE-2016-1283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960837">SUSE bug 960837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001945.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6/#XBUTQW2MV4VDVRQLFNZUGQBGKTVOVIT6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA/#DIW536NOJY6TFBQ3EAPIL4BZ3B35D2LA" source="SUSE-SU"/>
    <description>
    The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1521">CVE-2016-1521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965803">SUSE bug 965803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965806">SUSE bug 965806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965807">SUSE bug 965807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/965810">SUSE bug 965810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881851" comment="libgraphite2-3-1.3.11-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1544" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
    <description>
    nghttp2 before 1.7.1 allows remote attackers to cause a denial of service (memory exhaustion).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1544">CVE-2016-1544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/966514">SUSE bug 966514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897519" comment="libnghttp2-14-1.40.0-1.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1567" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567" source="SUSE CVE"/>
    <description>
    chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1567">CVE-2016-1567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887094" comment="chrony-3.2-9.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887096" comment="chrony-pool-suse-3.2-9.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1568">CVE-2016-1568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961332">SUSE bug 961332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961333">SUSE bug 961333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1570">CVE-2016-1570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1571">CVE-2016-1571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/960861">SUSE bug 960861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/960862">SUSE bug 960862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1575" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1575" ref_url="https://www.suse.com/security/cve/CVE-2016-1575" source="SUSE CVE"/>
    <description>
    The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1575/">CVE-2016-1575 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1575">CVE-2016-1575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/968092">SUSE bug 968092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1583" ref_url="https://www.suse.com/security/cve/CVE-2016-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="TID7017678" ref_url="https://www.suse.com/support/kb/doc/?id=7017678" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1583/">CVE-2016-1583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1583">CVE-2016-1583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983143">SUSE bug 983143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983144">SUSE bug 983144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1585" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1585" ref_url="https://www.suse.com/security/cve/CVE-2016-1585" source="SUSE CVE"/>
    <description>
    In all versions of AppArmor mount rules are accidentally widened when compiled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1585/">CVE-2016-1585 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1585">CVE-2016-1585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995594">SUSE bug 995594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808877" comment="apparmor-abstractions is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337464" comment="apparmor-parser is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1714">CVE-2016-1714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/961691">SUSE bug 961691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961692">SUSE bug 961692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1762">CVE-2016-1762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981040">SUSE bug 981040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1833">CVE-2016-1833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981108">SUSE bug 981108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1834">CVE-2016-1834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981041">SUSE bug 981041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1835">CVE-2016-1835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981109">SUSE bug 981109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1836">CVE-2016-1836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174862">SUSE bug 1174862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981110">SUSE bug 981110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1837">CVE-2016-1837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981111">SUSE bug 981111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1838">CVE-2016-1838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981112">SUSE bug 981112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1839">CVE-2016-1839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039069">SUSE bug 1039069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963963">SUSE bug 963963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981114">SUSE bug 981114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1840">CVE-2016-1840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981115">SUSE bug 981115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1866" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1866" ref_url="https://www.suse.com/security/cve/CVE-2016-1866" source="SUSE CVE"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
    <description>
    Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1866/">CVE-2016-1866 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1866">CVE-2016-1866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965403">SUSE bug 965403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the TPR optimization for 32-bit Windows guests support is vulnerable to a null pointer dereference flaw. It occurs while doing I/O port write operations via hmp interface. In that, 'current_cpu' remains null, which leads to the null pointer dereference. A user or process could use this flaw to crash the QEMU instance, resulting in DoS issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1922">CVE-2016-1922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/962320">SUSE bug 962320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962321">SUSE bug 962321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1950">CVE-2016-1950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970257">SUSE bug 970257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970377">SUSE bug 970377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970378">SUSE bug 970378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970379">SUSE bug 970379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970380">SUSE bug 970380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970381">SUSE bug 970381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970431">SUSE bug 970431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970433">SUSE bug 970433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4/#E3N7NQ7QAE3HH2XCKBURJIR2VROQ4NP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2/#2TMO77LZI5PLXBX43DUX7QKP5MGYJXZ2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1979">CVE-2016-1979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969894">SUSE bug 969894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-1981">CVE-2016-1981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/963782">SUSE bug 963782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963783">SUSE bug 963783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201620022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-20022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-20022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20022" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-20022" ref_url="https://www.suse.com/security/cve/CVE-2016-20022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
    <description>
    ** UNSUPPORTED WHEN ASSIGNED ** In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2024-08-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-20022/">CVE-2016-20022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-20022">CVE-2016-20022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227154">SUSE bug 1227154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2037">CVE-2016-2037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028410">SUSE bug 1028410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/963448">SUSE bug 963448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490765" comment="cpio-2.12-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2105">CVE-2016-2105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977614">SUSE bug 977614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989902">SUSE bug 989902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2106">CVE-2016-2106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977615">SUSE bug 977615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979279">SUSE bug 979279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="TID7017793" ref_url="https://www.suse.com/support/kb/doc/?id=7017793" source="SUSE-SU"/>
		<reference ref_id="TID7017881" ref_url="https://www.suse.com/support/kb/doc/?id=7017881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K/#X5IGZQ5VZE75TBXVAEAEK72WKRMYLO4K" source="SUSE-SU"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2107">CVE-2016-2107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977616">SUSE bug 977616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990370">SUSE bug 990370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP/#WSFMTFAUIIKKH3I6GTU6QJ57RZO3W5MP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW/#VYJ2NJ5W4TATUG4MZ2IB7COQYQG3JKYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG/#ZNQRDVNZBEFFFUFANVI5BGCXK3VV7BLG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL/#NQ6BE3KQYEDRTVTZ6S7H3L3NZGFAMQEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532/#MLVNWQIN3Y4GRZ5LBEYGXL7O5ECGS532" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P/#J2UWKLVEL4Y4YDNH4P5SV2WSLSW42P3P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS/#WMIZV3VWTKX3FDPSEQAPDV77CWNBSVZS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6/#3KDMMNY7VQAJW736NN5LHFSPNXJZFXB6" source="SUSE-SU"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2109">CVE-2016-2109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/976942">SUSE bug 976942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/977584">SUSE bug 977584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978492">SUSE bug 978492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
    <description>
    SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2150">CVE-2016-2150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982385">SUSE bug 982385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982386">SUSE bug 982386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="TID7017583" ref_url="https://www.suse.com/support/kb/doc/?id=7017583" source="SUSE-SU"/>
    <description>
    The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2176">CVE-2016-2176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978224">SUSE bug 978224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990369">SUSE bug 990369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2177">CVE-2016-2177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999075">SUSE bug 999075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2178">CVE-2016-2178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983249">SUSE bug 983249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983519">SUSE bug 983519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2179">CVE-2016-2179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2180">CVE-2016-2180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990419">SUSE bug 990419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2181">CVE-2016-2181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994749">SUSE bug 994749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2182">CVE-2016-2182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993819">SUSE bug 993819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995959">SUSE bug 995959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7017985" ref_url="https://www.suse.com/support/kb/doc/?id=7017985" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="TID7020150" ref_url="https://www.suse.com/support/kb/doc/?id=7020150" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ/#CFQXMIUEYAAFEMNGA4VAINBTGFZC5IIJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6/#5MQTL4UZJTP3OTMSAPDFWKNC6HVTCMS6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2183">CVE-2016-2183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001912">SUSE bug 1001912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024218">SUSE bug 1024218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027038">SUSE bug 1027038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034689">SUSE bug 1034689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056614">SUSE bug 1056614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171693">SUSE bug 1171693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995359">SUSE bug 995359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2187" ref_url="https://www.suse.com/security/cve/CVE-2016-2187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2187/">CVE-2016-2187 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2187">CVE-2016-2187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971919">SUSE bug 971919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971944">SUSE bug 971944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2198">CVE-2016-2198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/964413">SUSE bug 964413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964415">SUSE bug 964415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2270">CVE-2016-2270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965315">SUSE bug 965315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
    <description>
    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2271">CVE-2016-2271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/965317">SUSE bug 965317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2384" ref_url="https://www.suse.com/security/cve/CVE-2016-2384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB/#SZXKXH7AVPHU63LOTNQP5IB3D5RGAWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2384/">CVE-2016-2384 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2384">CVE-2016-2384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/966693">SUSE bug 966693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967773">SUSE bug 967773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2391">CVE-2016-2391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967013">SUSE bug 967013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967101">SUSE bug 967101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2392">CVE-2016-2392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967012">SUSE bug 967012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/967090">SUSE bug 967090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3/#56SB7O6IKG3PWP6IFVQ334V6YMU3GFH3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:0995-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG/#4OGUN5F4IJ2HL42Y4XJBGLVFNE3RUZGG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2538">CVE-2016-2538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/967969">SUSE bug 967969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968004">SUSE bug 968004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779" source="SUSE CVE"/>
    <description>
    runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2779">CVE-2016-2779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1018892">SUSE bug 1018892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/946429">SUSE bug 946429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968375">SUSE bug 968375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968674">SUSE bug 968674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968675">SUSE bug 968675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904456" comment="libblkid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904457" comment="libfdisk1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904458" comment="libmount1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904459" comment="libsmartcols1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904460" comment="libuuid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904461" comment="util-linux-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904462" comment="util-linux-systemd-2.33.1-4.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2782" ref_url="https://www.suse.com/security/cve/CVE-2016-2782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2782/">CVE-2016-2782 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2782">CVE-2016-2782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/961512">SUSE bug 961512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968670">SUSE bug 968670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT/#OFVLXYUR62NIMEMDMMTTSVO7ZBXO6NRT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y/#ILY2VDGTTJZSAXCYD4RXVCUPXRIBH65Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2834">CVE-2016-2834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983549">SUSE bug 983549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983639">SUSE bug 983639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-2841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-March/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
    <description>
    The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-2841">CVE-2016-2841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/969350">SUSE bug 969350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/969351">SUSE bug 969351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3044" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3044" ref_url="https://www.suse.com/security/cve/CVE-2016-3044" source="SUSE CVE"/>
    <description>
    The Linux kernel component in IBM PowerKVM 2.1 before 2.1.1.3-65.10 and 3.1 before 3.1.0.2 allows guest OS users to cause a denial of service (host OS infinite loop and hang) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3044/">CVE-2016-3044 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3044">CVE-2016-3044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013013">SUSE bug 1013013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3070" ref_url="https://www.suse.com/security/cve/CVE-2016-3070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
    <description>
    The trace_writeback_dirty_page implementation in include/trace/events/writeback.h in the Linux kernel before 4.4 improperly interacts with mm/migrate.c, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by triggering a certain page move.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3070/">CVE-2016-3070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3070">CVE-2016-3070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979215">SUSE bug 979215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3075">CVE-2016-3075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/973164">SUSE bug 973164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3115" ref_url="https://www.suse.com/security/cve/CVE-2016-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
		<reference ref_id="TID7022313" ref_url="https://www.suse.com/support/kb/doc/?id=7022313" source="SUSE-SU"/>
    <description>
    Multiple CRLF injection vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3115/">CVE-2016-3115 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3115">CVE-2016-3115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005738">SUSE bug 1005738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059233">SUSE bug 1059233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970632">SUSE bug 970632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992296">SUSE bug 992296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992991">SUSE bug 992991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/996040">SUSE bug 996040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002016.html" source="SUSE-SU"/>
    <description>
    The process_db_args function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) through 1.13.4 and 1.14.x through 1.14.1 mishandles the DB argument, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request to modify a principal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3119">CVE-2016-3119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971942">SUSE bug 971942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002222.html" source="SUSE-SU"/>
    <description>
    The validate_as_request function in kdc_util.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.13.6 and 1.4.x before 1.14.3, when restrict_anonymous_to_tgt is enabled, uses an incorrect client data structure, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3120">CVE-2016-3120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991088">SUSE bug 991088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3134" ref_url="https://www.suse.com/security/cve/CVE-2016-3134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3134/">CVE-2016-3134 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3134">CVE-2016-3134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971126">SUSE bug 971126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/971793">SUSE bug 971793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986362">SUSE bug 986362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986365">SUSE bug 986365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986377">SUSE bug 986377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3139" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3139" ref_url="https://www.suse.com/security/cve/CVE-2016-3139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/001996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3DY3J73NZK532BN4KZEFFGULVYJU3D2/#M3DY3J73NZK532BN4KZEFFGULVYJU3D2" source="SUSE-SU"/>
    <description>
    The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3139/">CVE-2016-3139 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3139">CVE-2016-3139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970909">SUSE bug 970909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1206-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AZOAIG3ZRFB4G3OJLLK5642AFVIYJNTD/#AZOAIG3ZRFB4G3OJLLK5642AFVIYJNTD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7VRUBSDP7NDWZ4MG7YOXMK7M2QH7IBYO/#7VRUBSDP7NDWZ4MG7YOXMK7M2QH7IBYO" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3189">CVE-2016-3189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/985657">SUSE bug 985657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490359" comment="libbz2-1-1.0.6-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3191">CVE-2016-3191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/971741">SUSE bug 971741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882277" comment="libpcre2-8-0-10.31-1.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3627">CVE-2016-3627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026099">SUSE bug 1026099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/972335">SUSE bug 972335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3697" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3697" ref_url="https://www.suse.com/security/cve/CVE-2016-3697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-April/002030.html" source="SUSE-SU"/>
    <description>
    libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3697/">CVE-2016-3697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3697">CVE-2016-3697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976777">SUSE bug 976777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3705">CVE-2016-3705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1017497">SUSE bug 1017497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975947">SUSE bug 975947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3706">CVE-2016-3706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980483">SUSE bug 980483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/997423">SUSE bug 997423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3710">CVE-2016-3710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978158">SUSE bug 978158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3712">CVE-2016-3712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978160">SUSE bug 978160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978164">SUSE bug 978164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978167">SUSE bug 978167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3841" ref_url="https://www.suse.com/security/cve/CVE-2016-3841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
    <description>
    The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3841/">CVE-2016-3841 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3841">CVE-2016-3841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992566">SUSE bug 992566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992569">SUSE bug 992569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-3951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-3951" ref_url="https://www.suse.com/security/cve/CVE-2016-3951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/63T7MPEXO4FJGO6VMAHMMK2GLCCK7TE7/#63T7MPEXO4FJGO6VMAHMMK2GLCCK7TE7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
    <description>
    Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-3951/">CVE-2016-3951 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-3951">CVE-2016-3951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/974418">SUSE bug 974418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4002">CVE-2016-4002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975136">SUSE bug 975136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975138">SUSE bug 975138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4008">CVE-2016-4008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982779">SUSE bug 982779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490140" comment="libtasn1-4.13-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490141" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4020">CVE-2016-4020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/975700">SUSE bug 975700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/975907">SUSE bug 975907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4070" ref_url="https://www.suse.com/security/cve/CVE-2016-4070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-May/002063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K25PUT6VEWNCTP2GSC4FELXIHVJ6LCK3/#K25PUT6VEWNCTP2GSC4FELXIHVJ6LCK3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QFFHEOUNG6FBIQ3D32KL6QJX4HTZMPLL/#QFFHEOUNG6FBIQ3D32KL6QJX4HTZMPLL" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4070/">CVE-2016-4070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4070">CVE-2016-4070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/976997">SUSE bug 976997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980366">SUSE bug 980366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4429">CVE-2016-4429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4439">CVE-2016-4439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/980711">SUSE bug 980711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980716">SUSE bug 980716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4440" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4440" ref_url="https://www.suse.com/security/cve/CVE-2016-4440" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4440/">CVE-2016-4440 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4440">CVE-2016-4440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/980829">SUSE bug 980829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-July/002154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4441">CVE-2016-4441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/980723">SUSE bug 980723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980724">SUSE bug 980724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4453">CVE-2016-4453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982223">SUSE bug 982223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982225">SUSE bug 982225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4454">CVE-2016-4454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982222">SUSE bug 982222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982224">SUSE bug 982224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
    <description>
    The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4472">CVE-2016-4472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034050">SUSE bug 1034050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/939077">SUSE bug 939077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980391">SUSE bug 980391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983985">SUSE bug 983985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4476" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
    <description>
    hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4476">CVE-2016-4476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978172">SUSE bug 978172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4477" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4477" ref_url="https://www.suse.com/security/cve/CVE-2016-4477" source="SUSE CVE"/>
    <description>
    wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4477/">CVE-2016-4477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4477">CVE-2016-4477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/978175">SUSE bug 978175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4480" ref_url="https://www.suse.com/security/cve/CVE-2016-4480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4480/">CVE-2016-4480 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4480">CVE-2016-4480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072198">SUSE bug 1072198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978288">SUSE bug 978288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978295">SUSE bug 978295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4482" ref_url="https://www.suse.com/security/cve/CVE-2016-4482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4482/">CVE-2016-4482 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4482">CVE-2016-4482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978401">SUSE bug 978401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978445">SUSE bug 978445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1594-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5/#VPIWVKUKHLGF55QF7LRF4BCZDRFSIAA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW/#U4WPGCASE7GW5OQYSFLRWUX74F6KB6OW" source="SUSE-SU"/>
    <description>
    The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization.  NOTE: this vulnerability may be a duplicate of CVE-2016-3627.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4483">CVE-2016-4483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026101">SUSE bug 1026101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978395">SUSE bug 978395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4485" ref_url="https://www.suse.com/security/cve/CVE-2016-4485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
    <description>
    The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4485/">CVE-2016-4485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4485">CVE-2016-4485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/978821">SUSE bug 978821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4565" ref_url="https://www.suse.com/security/cve/CVE-2016-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4565/">CVE-2016-4565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4565">CVE-2016-4565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979548">SUSE bug 979548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980363">SUSE bug 980363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980883">SUSE bug 980883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4568" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4568" ref_url="https://www.suse.com/security/cve/CVE-2016-4568" source="SUSE CVE"/>
    <description>
    drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4.5.3 allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a crafted number of planes in a VIDIOC_DQBUF ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4568/">CVE-2016-4568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4568">CVE-2016-4568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/979022">SUSE bug 979022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981516">SUSE bug 981516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4569" ref_url="https://www.suse.com/security/cve/CVE-2016-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-4569/">CVE-2016-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4569">CVE-2016-4569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979213">SUSE bug 979213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979879">SUSE bug 979879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4574">CVE-2016-4574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979261">SUSE bug 979261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882205" comment="libksba8-1.3.5-2.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4579" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4579">CVE-2016-4579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135436">SUSE bug 1135436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/979906">SUSE bug 979906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882205" comment="libksba8-1.3.5-2.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4658">CVE-2016-4658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005544">SUSE bug 1005544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014873">SUSE bug 1014873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069433">SUSE bug 1069433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078813">SUSE bug 1078813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4738" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    libxslt in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4738">CVE-2016-4738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005591">SUSE bug 1005591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4794" ref_url="https://www.suse.com/security/cve/CVE-2016-4794" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:1798-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W/#5FLLPQLWSS6KPU5LQ2LLJQIWQXEEE77W" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4794/">CVE-2016-4794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4794">CVE-2016-4794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/980265">SUSE bug 980265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981517">SUSE bug 981517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4804" ref_url="https://www.suse.com/security/cve/CVE-2016-4804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002225.html" source="SUSE-SU"/>
    <description>
    The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4804/">CVE-2016-4804 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4804">CVE-2016-4804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/980364">SUSE bug 980364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980377">SUSE bug 980377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655181" comment="dosfstools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
    <description>
    The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4912">CVE-2016-4912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074356">SUSE bug 1074356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980722">SUSE bug 980722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899804" comment="openslp-2.0.0-6.12.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5/#SSRKERVXT73P7DSZ6HZX7CRK2ECW4YU5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4952">CVE-2016-4952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/981266">SUSE bug 981266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981276">SUSE bug 981276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-4964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4964" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964" source="SUSE CVE"/>
    <description>
    The mptsas_fetch_requests function in hw/scsi/mptsas.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop, and CPU consumption or QEMU process crash) via vectors involving s-&gt;state.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4964">CVE-2016-4964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/981399">SUSE bug 981399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/981401">SUSE bug 981401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5011">CVE-2016-5011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988361">SUSE bug 988361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904456" comment="libblkid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904457" comment="libfdisk1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904458" comment="libmount1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904459" comment="libsmartcols1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904460" comment="libuuid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904461" comment="util-linux-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904462" comment="util-linux-systemd-2.33.1-4.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5105">CVE-2016-5105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982017">SUSE bug 982017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982024">SUSE bug 982024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5106">CVE-2016-5106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982018">SUSE bug 982018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982025">SUSE bug 982025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5107">CVE-2016-5107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982019">SUSE bug 982019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982026">SUSE bug 982026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5126">CVE-2016-5126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982285">SUSE bug 982285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982286">SUSE bug 982286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5238">CVE-2016-5238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/982959">SUSE bug 982959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982960">SUSE bug 982960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5244" ref_url="https://www.suse.com/security/cve/CVE-2016-5244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-June/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:1641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL/#IGM6U4LKVWMXO6ZXETRLFQOGMA4A2ZQL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5/#G3VWHAWQDEVZ37XRAAROFMJVDBBQ6YF5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5244/">CVE-2016-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5244">CVE-2016-5244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983213">SUSE bug 983213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986225">SUSE bug 986225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5300">CVE-2016-5300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5337">CVE-2016-5337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983961">SUSE bug 983961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983973">SUSE bug 983973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5338">CVE-2016-5338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/983982">SUSE bug 983982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983984">SUSE bug 983984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5389" ref_url="https://www.suse.com/security/cve/CVE-2016-5389" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-5696.  Reason: This candidate is a reservation duplicate of CVE-2016-5696.  Notes: All CVE users should reference CVE-2016-5696 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5389/">CVE-2016-5389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2016-5389">CVE-2016-5389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5403">CVE-2016-5403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/990923">SUSE bug 990923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991080">SUSE bug 991080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002477.html" source="SUSE-SU"/>
    <description>
    The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5407">CVE-2016-5407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003017">SUSE bug 1003017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123148">SUSE bug 1123148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882011" comment="libXv1-1.0.11-1.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5410" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410" source="SUSE CVE"/>
    <description>
    firewalld.py in firewalld before 0.4.3.3 allows local users to bypass authentication and modify firewall configurations via the (1) addPassthrough, (2) removePassthrough, (3) addEntry, (4) removeEntry, or (5) setEntries D-Bus API method.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5410">CVE-2016-5410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/992772">SUSE bug 992772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009896811" comment="firewalld-0.5.5-4.24.9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009896813" comment="python3-firewall-0.5.5-4.24.9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5412" ref_url="https://www.suse.com/security/cve/CVE-2016-5412" source="SUSE CVE"/>
    <description>
    arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS users to cause a denial of service (host OS infinite loop) by making a H_CEDE hypercall during the existence of a suspended transaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5412/">CVE-2016-5412 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5412">CVE-2016-5412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013013">SUSE bug 1013013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417" source="SUSE CVE"/>
    <description>
    Memory leak in the __res_vinit function in the IPv6 name server management code in libresolv in GNU C Library (aka glibc or libc6) before 2.24 allows remote attackers to cause a denial of service (memory consumption) by leveraging partial initialization of internal resolver data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5417">CVE-2016-5417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991670">SUSE bug 991670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5636">CVE-2016-5636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065451">SUSE bug 1065451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106262">SUSE bug 1106262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985177">SUSE bug 985177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5696" ref_url="https://www.suse.com/security/cve/CVE-2016-5696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-5696/">CVE-2016-5696 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5696">CVE-2016-5696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020452">SUSE bug 1020452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989152">SUSE bug 989152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5699">CVE-2016-5699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122729">SUSE bug 1122729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985348">SUSE bug 985348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/985351">SUSE bug 985351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/986630">SUSE bug 986630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5735" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5735" ref_url="https://www.suse.com/security/cve/CVE-2016-5735" source="SUSE CVE"/>
    <description>
    Integer overflow in the rwpng_read_image24_libpng function in rwpng.c in pngquant 2.7.0 allows remote attackers to have unspecified impact via a crafted PNG file, which triggers a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5735/">CVE-2016-5735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5735">CVE-2016-5735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173616">SUSE bug 1173616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5759" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002337.html" source="SUSE-SU"/>
    <description>
    The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5759">CVE-2016-5759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/990200">SUSE bug 990200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904450" comment="kdump-0.9.0-11.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-5828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-5828" ref_url="https://www.suse.com/security/cve/CVE-2016-5828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2/#NA2C2XZHCLKYOLPO7FG5N5MJ7TLHYLY2" source="SUSE-SU"/>
    <description>
    The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-5828/">CVE-2016-5828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-5828">CVE-2016-5828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/986569">SUSE bug 986569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991065">SUSE bug 991065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6130" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6130" ref_url="https://www.suse.com/security/cve/CVE-2016-6130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6130/">CVE-2016-6130 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6130">CVE-2016-6130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/987542">SUSE bug 987542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6136" ref_url="https://www.suse.com/security/cve/CVE-2016-6136" source="SUSE CVE"/>
    <description>
    Race condition in the audit_log_single_execve_arg function in kernel/auditsc.c in the Linux kernel through 4.7 allows local users to bypass intended character-set restrictions or disrupt system-call auditing by changing a certain string, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6136/">CVE-2016-6136 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6136">CVE-2016-6136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988153">SUSE bug 988153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6197" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6197" ref_url="https://www.suse.com/security/cve/CVE-2016-6197" source="SUSE CVE"/>
    <description>
    fs/overlayfs/dir.c in the OverlayFS filesystem implementation in the Linux kernel before 4.6 does not properly verify the upper dentry before proceeding with unlink and rename system-call processing, which allows local users to cause a denial of service (system crash) via a rename system call that specifies a self-hardlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6197/">CVE-2016-6197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6197">CVE-2016-6197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988708">SUSE bug 988708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6198" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6198" ref_url="https://www.suse.com/security/cve/CVE-2016-6198" source="SUSE CVE"/>
    <description>
    The filesystem layer in the Linux kernel before 4.5.5 proceeds with post-rename operations after an OverlayFS file is renamed to a self-hardlink, which allows local users to cause a denial of service (system crash) via a rename system call, related to fs/namei.c and fs/open.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6198/">CVE-2016-6198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6198">CVE-2016-6198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988708">SUSE bug 988708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6210">CVE-2016-6210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001712">SUSE bug 1001712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105010">SUSE bug 1105010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/989363">SUSE bug 989363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6213" ref_url="https://www.suse.com/security/cve/CVE-2016-6213" source="SUSE CVE"/>
    <description>
    fs/namespace.c in the Linux kernel before 4.9 does not restrict how many mounts may exist in a mount namespace, which allows local users to cause a denial of service (memory consumption and deadlock) via MS_BIND mount system calls, as demonstrated by a loop that triggers exponential growth in the number of mounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6213/">CVE-2016-6213 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6213">CVE-2016-6213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988964">SUSE bug 988964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6258">CVE-2016-6258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072198">SUSE bug 1072198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988675">SUSE bug 988675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988692">SUSE bug 988692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6259" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6259">CVE-2016-6259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/988676">SUSE bug 988676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/988694">SUSE bug 988694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6261">CVE-2016-6261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990190">SUSE bug 990190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882167" comment="libidn11-1.34-3.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6262">CVE-2016-6262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014473">SUSE bug 1014473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190777">SUSE bug 1190777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990189">SUSE bug 990189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882167" comment="libidn11-1.34-3.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6263">CVE-2016-6263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990191">SUSE bug 990191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882167" comment="libidn11-1.34-3.2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6302">CVE-2016-6302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995324">SUSE bug 995324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6303">CVE-2016-6303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994844">SUSE bug 994844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995377">SUSE bug 995377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2769-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF/#BOIVZNRI2WQ56MPKE6BVFPLBB4RKMOJF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2788-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B/#2XSIJ4CL46B7JEPC7XYAF6F24TA3GW4B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6304">CVE-2016-6304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001706">SUSE bug 1001706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003811">SUSE bug 1003811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005579">SUSE bug 1005579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021375">SUSE bug 1021375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999666">SUSE bug 999666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID3426981" ref_url="https://www.suse.com/support/kb/doc/?id=3426981" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6/#457PQSBNF5LPTML5PWFZ5WOFHAE6PCC6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L/#UC3J55W76QZY2RGZ6NR6FKQWCAIVCF6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6/#3K4Z2X4Q5GYLAOESQ5O5R5ESW4LZENO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6306">CVE-2016-6306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004104">SUSE bug 1004104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999665">SUSE bug 999665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999668">SUSE bug 999668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6313">CVE-2016-6313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994157">SUSE bug 994157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6318">CVE-2016-6318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123113">SUSE bug 1123113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992966">SUSE bug 992966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887100" comment="cracklib-2.9.7-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887102" comment="cracklib-dict-small-2.9.7-11.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887103" comment="libcrack2-2.9.7-11.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002417.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6321">CVE-2016-6321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007188">SUSE bug 1007188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123796">SUSE bug 1123796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491105" comment="tar-1.30-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323" source="SUSE CVE"/>
    <description>
    The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6323">CVE-2016-6323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/994359">SUSE bug 994359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6351">CVE-2016-6351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/990835">SUSE bug 990835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/990843">SUSE bug 990843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6480" ref_url="https://www.suse.com/security/cve/CVE-2016-6480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-August/002237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-6480/">CVE-2016-6480 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6480">CVE-2016-6480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004418">SUSE bug 1004418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991608">SUSE bug 991608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991667">SUSE bug 991667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992568">SUSE bug 992568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002936.html" source="SUSE-SU"/>
    <description>
    The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6489">CVE-2016-6489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991464">SUSE bug 991464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493118" comment="libhogweed4-3.4.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493121" comment="libnettle6-3.4.1-4.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6490" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6490">CVE-2016-6490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/991466">SUSE bug 991466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/993854">SUSE bug 993854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-September/002289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002338.html" source="SUSE-SU"/>
		<reference ref_id="TID7022102" ref_url="https://www.suse.com/support/kb/doc/?id=7022102" source="SUSE-SU"/>
    <description>
    The auth_password function in auth-passwd.c in sshd in OpenSSH before 7.3 does not limit password lengths for password authentication, which allows remote attackers to cause a denial of service (crypt CPU consumption) via a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6515">CVE-2016-6515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010950">SUSE bug 1010950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992533">SUSE bug 992533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6786" ref_url="https://www.suse.com/security/cve/CVE-2016-6786" source="SUSE CVE"/>
    <description>
    kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 30955111.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6786/">CVE-2016-6786 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6786">CVE-2016-6786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6787" ref_url="https://www.suse.com/security/cve/CVE-2016-6787" source="SUSE CVE"/>
    <description>
    kernel/events/core.c in the performance subsystem in the Linux kernel before 4.0 mismanages locks during certain migrations, which allows local users to gain privileges via a crafted application, aka Android internal bug 31095224.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6787/">CVE-2016-6787 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6787">CVE-2016-6787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6828" ref_url="https://www.suse.com/security/cve/CVE-2016-6828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT/#TVIOU3ZPOAQ2W3SQKZVQILGGHDJYFHOT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6828/">CVE-2016-6828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6828">CVE-2016-6828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994296">SUSE bug 994296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6833">CVE-2016-6833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/994774">SUSE bug 994774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994775">SUSE bug 994775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6836">CVE-2016-6836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/994760">SUSE bug 994760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994761">SUSE bug 994761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-6888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-6888">CVE-2016-6888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/994771">SUSE bug 994771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/994772">SUSE bug 994772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7031" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7031" ref_url="https://www.suse.com/security/cve/CVE-2016-7031" source="SUSE CVE"/>
    <description>
    The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7031/">CVE-2016-7031 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7031">CVE-2016-7031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/997025">SUSE bug 997025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009335684" comment="librados2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335686" comment="librbd1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
    <description>
    sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7032">CVE-2016-7032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007766">SUSE bug 1007766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2470-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7018311" ref_url="https://www.suse.com/support/kb/doc/?id=7018311" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2496-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR/#ZBUNI7MQOGTTK5V6ZEUBGZKAQMZP6XAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7052">CVE-2016-7052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001148">SUSE bug 1001148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker's direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7055">CVE-2016-7055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009528">SUSE bug 1009528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7056">CVE-2016-7056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019334">SUSE bug 1019334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002420.html" source="SUSE-SU"/>
    <description>
    sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7076">CVE-2016-7076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011975">SUSE bug 1011975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1011976">SUSE bug 1011976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7092">CVE-2016-7092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995785">SUSE bug 995785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7093" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7093">CVE-2016-7093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995789">SUSE bug 995789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002394.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI/#SEGSV5T3S2ZKXR3FBHOEH6ZATP7GNXOI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SN42T3R5VY52V47YKP7INPGVVIOYAXJM/#SN42T3R5VY52V47YKP7INPGVVIOYAXJM" source="SUSE-SU"/>
    <description>
    Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7094">CVE-2016-7094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/995792">SUSE bug 995792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7097" ref_url="https://www.suse.com/security/cve/CVE-2016-7097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="TID7018489" ref_url="https://www.suse.com/support/kb/doc/?id=7018489" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7097/">CVE-2016-7097 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7097">CVE-2016-7097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052256">SUSE bug 1052256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7116" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to access host files outside the export path via a .. (dot dot) in an unspecified string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7116">CVE-2016-7116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/996441">SUSE bug 996441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7117" ref_url="https://www.suse.com/security/cve/CVE-2016-7117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7117/">CVE-2016-7117 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">CVE-2016-7117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003077">SUSE bug 1003077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003253">SUSE bug 1003253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057478">SUSE bug 1057478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071943">SUSE bug 1071943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7155" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds access or infinite loop, and QEMU process crash) via a crafted page count for descriptor rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7155">CVE-2016-7155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/997858">SUSE bug 997858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7156" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002402.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2642-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7/#LC23VKKIEESEEWT2LOAIKN4OILWG3KQ7" source="SUSE-SU"/>
    <description>
    The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7156">CVE-2016-7156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/997859">SUSE bug 997859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7157" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157" source="SUSE CVE"/>
    <description>
    The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7157">CVE-2016-7157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/997860">SUSE bug 997860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7161" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7161">CVE-2016-7161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001151">SUSE bug 1001151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1001152">SUSE bug 1001152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7167">CVE-2016-7167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/998760">SUSE bug 998760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7170" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7170">CVE-2016-7170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/998516">SUSE bug 998516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7421" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7421">CVE-2016-7421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/999661">SUSE bug 999661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7422" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
    <description>
    The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7422">CVE-2016-7422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000346">SUSE bug 1000346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7423" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423" source="SUSE CVE"/>
    <description>
    The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7423">CVE-2016-7423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000397">SUSE bug 1000397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7425" ref_url="https://www.suse.com/security/cve/CVE-2016-7425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE/#RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7425/">CVE-2016-7425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7425">CVE-2016-7425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/999932">SUSE bug 999932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7466" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7466">CVE-2016-7466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000345">SUSE bug 1000345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7545" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002612.html" source="SUSE-SU"/>
    <description>
    SELinux policycoreutils allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7545">CVE-2016-7545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000998">SUSE bug 1000998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968375">SUSE bug 968375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/968674">SUSE bug 968674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904482" comment="policycoreutils-3.1-1.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904483" comment="policycoreutils-python-utils-3.1-1.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904484" comment="python3-policycoreutils-3.1-1.25 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7567" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-October/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003598.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7567">CVE-2016-7567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1001600">SUSE bug 1001600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074356">SUSE bug 1074356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899804" comment="openslp-2.0.0-6.12.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7777">CVE-2016-7777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1000106">SUSE bug 1000106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7837" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7837" ref_url="https://www.suse.com/security/cve/CVE-2016-7837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in BlueZ 5.41 and earlier allows an attacker to execute arbitrary code via the parse_line function used in some userland utilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7837/">CVE-2016-7837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7837">CVE-2016-7837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026652">SUSE bug 1026652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336474" comment="libbluetooth3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
    <description>
    The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7907">CVE-2016-7907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1002549">SUSE bug 1002549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7908">CVE-2016-7908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1002550">SUSE bug 1002550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003030">SUSE bug 1003030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7909">CVE-2016-7909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1002557">SUSE bug 1002557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003032">SUSE bug 1003032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7910" ref_url="https://www.suse.com/security/cve/CVE-2016-7910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7910/">CVE-2016-7910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7910">CVE-2016-7910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010716">SUSE bug 1010716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7913" ref_url="https://www.suse.com/security/cve/CVE-2016-7913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7913/">CVE-2016-7913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7913">CVE-2016-7913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010478">SUSE bug 1010478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7916" ref_url="https://www.suse.com/security/cve/CVE-2016-7916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7916/">CVE-2016-7916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7916">CVE-2016-7916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010467">SUSE bug 1010467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7994" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7994">CVE-2016-7994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003613">SUSE bug 1003613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
    <description>
    Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7995">CVE-2016-7995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003612">SUSE bug 1003612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1003870">SUSE bug 1003870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8576">CVE-2016-8576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003878">SUSE bug 1003878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004016">SUSE bug 1004016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8577">CVE-2016-8577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003893">SUSE bug 1003893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004021">SUSE bug 1004021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8578">CVE-2016-8578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003894">SUSE bug 1003894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1004023">SUSE bug 1004023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS/#NEVLKMTWKZHIHXYGCHNEYH5ECARK6UQS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY/#J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY" source="SUSE-SU"/>
    <description>
    A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8610">CVE-2016-8610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005878">SUSE bug 1005878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005879">SUSE bug 1005879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110018">SUSE bug 1110018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120592">SUSE bug 1120592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/982575">SUSE bug 982575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8615">CVE-2016-8615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005633">SUSE bug 1005633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8616">CVE-2016-8616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005634">SUSE bug 1005634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8617">CVE-2016-8617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005635">SUSE bug 1005635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8618">CVE-2016-8618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005637">SUSE bug 1005637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8619">CVE-2016-8619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005638">SUSE bug 1005638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8620">CVE-2016-8620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005640">SUSE bug 1005640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8621">CVE-2016-8621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005642">SUSE bug 1005642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8622">CVE-2016-8622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005643">SUSE bug 1005643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8623">CVE-2016-8623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005645">SUSE bug 1005645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI/#ISHPY4KAPUZXW4MWHUKGNB2IKJNOSNLI" source="SUSE-SU"/>
    <description>
    curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8624">CVE-2016-8624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005646">SUSE bug 1005646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625" source="SUSE CVE"/>
    <description>
    curl before version 7.51.0 uses outdated IDNA 2003 standard to handle International Domain Names and this may lead users to potentially and unknowingly issue network transfer requests to the wrong host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8625">CVE-2016-8625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005649">SUSE bug 1005649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8630" ref_url="https://www.suse.com/security/cve/CVE-2016-8630" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    The x86_decode_insn function in arch/x86/kvm/emulate.c in the Linux kernel before 4.8.7, when KVM is enabled, allows local users to cause a denial of service (host OS crash) via a certain use of a ModR/M byte in an undefined instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8630/">CVE-2016-8630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8630">CVE-2016-8630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009222">SUSE bug 1009222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8632" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8632" ref_url="https://www.suse.com/security/cve/CVE-2016-8632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE/#H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE" source="SUSE-SU"/>
    <description>
    The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8632/">CVE-2016-8632 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8632">CVE-2016-8632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008831">SUSE bug 1008831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012852">SUSE bug 1012852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8633" ref_url="https://www.suse.com/security/cve/CVE-2016-8633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8633/">CVE-2016-8633 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8633">CVE-2016-8633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008833">SUSE bug 1008833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8637" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003286.html" source="SUSE-SU"/>
    <description>
    A local information disclosure issue was found in dracut before 045 when generating initramfs images with world-readable permissions when 'early cpio' is used, such as when including microcode updates. Local attacker can use this to obtain sensitive information from these files, such as encryption keys or credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8637">CVE-2016-8637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008340">SUSE bug 1008340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904429" comment="dracut-049.1+suse.186.g320cc3d1-1.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8645" ref_url="https://www.suse.com/security/cve/CVE-2016-8645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8645/">CVE-2016-8645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8645">CVE-2016-8645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009969">SUSE bug 1009969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8646" ref_url="https://www.suse.com/security/cve/CVE-2016-8646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8646/">CVE-2016-8646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8646">CVE-2016-8646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010150">SUSE bug 1010150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8650" ref_url="https://www.suse.com/security/cve/CVE-2016-8650" source="SUSE CVE"/>
    <description>
    The mpi_powm function in lib/mpi/mpi-pow.c in the Linux kernel through 4.8.11 does not ensure that memory is allocated for limb data, which allows local users to cause a denial of service (stack memory corruption and panic) via an add_key system call for an RSA key with a zero exponent.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8650/">CVE-2016-8650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8650">CVE-2016-8650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011820">SUSE bug 1011820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8655" ref_url="https://www.suse.com/security/cve/CVE-2016-8655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="TID7018348" ref_url="https://www.suse.com/support/kb/doc/?id=7018348" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE/#H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE" source="SUSE-SU"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8655/">CVE-2016-8655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8655">CVE-2016-8655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012754">SUSE bug 1012754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012759">SUSE bug 1012759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013822">SUSE bug 1013822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1052365">SUSE bug 1052365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8658" ref_url="https://www.suse.com/security/cve/CVE-2016-8658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE/#RQFL6VT6HOSDOVBCI7IGQVPVXDZ5ENNE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL/#4S7UHJM6T55DAAXQ6V2UZD53B3N7CANL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD/#RNLBL6OKPBVGYFXWDCIZX6MURLH6ERPD" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8658/">CVE-2016-8658 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8658">CVE-2016-8658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004462">SUSE bug 1004462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8667" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8667">CVE-2016-8667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004702">SUSE bug 1004702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005004">SUSE bug 1005004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8668" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
    <description>
    The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8668">CVE-2016-8668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004706">SUSE bug 1004706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8669">CVE-2016-8669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1004707">SUSE bug 1004707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1005005">SUSE bug 1005005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8858" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0607-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002972.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The kex_input_kexinit function in kex.c in OpenSSH 6.x and 7.x through 7.3 allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate KEXINIT requests.  NOTE: a third party reports that "OpenSSH upstream does not consider this as a security issue."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8858">CVE-2016-8858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1005480">SUSE bug 1005480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8867" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8867" ref_url="https://www.suse.com/security/cve/CVE-2016-8867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002467.html" source="SUSE-SU"/>
    <description>
    Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8867/">CVE-2016-8867 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8867">CVE-2016-8867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007249">SUSE bug 1007249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8909">CVE-2016-8909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1006536">SUSE bug 1006536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007160">SUSE bug 1007160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-8910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8910">CVE-2016-8910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1006538">SUSE bug 1006538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1007157">SUSE bug 1007157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024178">SUSE bug 1024178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9015" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZGZFUQULBA4PFQY3WNIVJPUFPM3ZGTG/#WZGZFUQULBA4PFQY3WNIVJPUFPM3ZGTG" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects users using versions 1.17 and 1.18 of the urllib3 library, who are using the optional PyOpenSSL support for TLS instead of the regular standard library TLS backend, and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely uncommon configuration, so the security impact of this vulnerability is low.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9015">CVE-2016-9015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023502">SUSE bug 1023502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024540">SUSE bug 1024540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904486" comment="python3-urllib3-1.24-9.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA/#ZCR7QQVKUUZQ2Z6RNKLB2WOCJVSQUWUA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN/#S5LAOL4JSUPVGNKECSFNO5CPDJG2CPKN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox &lt; 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9063">CVE-2016-9063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009026">SUSE bug 1009026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010424">SUSE bug 1010424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047240">SUSE bug 1047240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9082" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the write_png function in cairo 1.14.6 allows remote attackers to cause a denial of service (invalid pointer dereference) via a large svg file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9082">CVE-2016-9082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007255">SUSE bug 1007255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881737" comment="libcairo2-1.16.0-1.55 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9101" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
    <description>
    Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9101">CVE-2016-9101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007391">SUSE bug 1007391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013668">SUSE bug 1013668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024181">SUSE bug 1024181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9102" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9102">CVE-2016-9102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007450">SUSE bug 1007450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014256">SUSE bug 1014256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9103" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9103">CVE-2016-9103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007454">SUSE bug 1007454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014259">SUSE bug 1014259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9104" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9104">CVE-2016-9104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007493">SUSE bug 1007493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014297">SUSE bug 1014297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9105" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9105">CVE-2016-9105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007494">SUSE bug 1007494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014279">SUSE bug 1014279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9106" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-November/002426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002440.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR/#WQITIQ37OHAUK2RUBFZD3IXFVSLABYFR" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9106">CVE-2016-9106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007495">SUSE bug 1007495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014299">SUSE bug 1014299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9178" ref_url="https://www.suse.com/security/cve/CVE-2016-9178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
    <description>
    The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9178/">CVE-2016-9178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9178">CVE-2016-9178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008650">SUSE bug 1008650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012353">SUSE bug 1012353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9313" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9313" ref_url="https://www.suse.com/security/cve/CVE-2016-9313" source="SUSE CVE"/>
    <description>
    security/keys/big_key.c in the Linux kernel before 4.8.7 mishandles unsuccessful crypto registration in conjunction with successful key-type registration, which allows local users to cause a denial of service (NULL pointer dereference and panic) or possibly have unspecified other impact via a crafted application that uses the big_key data type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9313/">CVE-2016-9313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9313">CVE-2016-9313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012356">SUSE bug 1012356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9377" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9377">CVE-2016-9377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9378" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
    <description>
    Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9378">CVE-2016-9378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009108">SUSE bug 1009108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9379">CVE-2016-9379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9380">CVE-2016-9380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009111">SUSE bug 1009111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9381">CVE-2016-9381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009109">SUSE bug 1009109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9382">CVE-2016-9382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009103">SUSE bug 1009103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9383">CVE-2016-9383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009107">SUSE bug 1009107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9384" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
    <description>
    Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9384">CVE-2016-9384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009105">SUSE bug 1009105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9385">CVE-2016-9385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009104">SUSE bug 1009104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9386">CVE-2016-9386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009100">SUSE bug 1009100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9401">CVE-2016-9401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1010845">SUSE bug 1010845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044328">SUSE bug 1044328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123788">SUSE bug 1123788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159416">SUSE bug 1159416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009899807" comment="bash-4.4-9.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899811" comment="libreadline7-7.0-9.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9555" ref_url="https://www.suse.com/security/cve/CVE-2016-9555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH/#ZJRJIBDQAMXP33FAT3LCBWJRGIKQYVEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE/#H3CHJ7L3LE6B6DAFZGESPLJCDTT43DLE" source="SUSE-SU"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9555/">CVE-2016-9555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9555">CVE-2016-9555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011685">SUSE bug 1011685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1012183">SUSE bug 1012183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS/#ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX/#XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9577">CVE-2016-9577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002625.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS/#ST4NVLSJLSGMX6BN6TF4KAWN4BTUYNHS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX/#XTVRBASNBPIPUZL2GUHD5QGZYQ62DZAX" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9578">CVE-2016-9578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023078">SUSE bug 1023078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023079">SUSE bug 1023079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9586">CVE-2016-9586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015332">SUSE bug 1015332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9588" ref_url="https://www.suse.com/security/cve/CVE-2016-9588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/vmx.c in the Linux kernel through 4.9 mismanages the #BP and #OF exceptions, which allows guest OS users to cause a denial of service (guest OS crash) by declining to handle an exception thrown by an L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9588/">CVE-2016-9588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9588">CVE-2016-9588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015703">SUSE bug 1015703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017512">SUSE bug 1017512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9594" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594" source="SUSE CVE"/>
    <description>
    curl before version 7.52.1 is vulnerable to an uninitialized random in libcurl's internal function that returns a good 32bit random value.  Having a weak or virtually non-existent random value makes the operations that use it vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9594">CVE-2016-9594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1016738">SUSE bug 1016738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1017161">SUSE bug 1017161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9602" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9602">CVE-2016-9602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020427">SUSE bug 1020427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9604" ref_url="https://www.suse.com/security/cve/CVE-2016-9604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    It was discovered in the Linux kernel before 4.11-rc8 that root can gain direct access to an internal keyring, such as '.dns_resolver' in RHEL-7 or '.builtin_trusted_keys' upstream, by joining it as its session keyring. This allows root to bypass module signature verification by adding a new public key of its own devising to the keyring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-9604/">CVE-2016-9604 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9604">CVE-2016-9604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035576">SUSE bug 1035576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H/#ETBXUPX7DARP4QMWYH2Y6DM76AUKLO4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9637">CVE-2016-9637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011652">SUSE bug 1011652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9639" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2017:0169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-January/005783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2017:0171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-January/005785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2017:0174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2017-January/005788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
    <description>
    Salt before 2015.8.11 allows deleted minions to read or write to minions with the same id, related to caching.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9639">CVE-2016-9639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012398">SUSE bug 1012398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9756" ref_url="https://www.suse.com/security/cve/CVE-2016-9756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QM4JBQQ5EURTLE472P4NKKXFDNA6TGCV/#QM4JBQQ5EURTLE472P4NKKXFDNA6TGCV" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9756/">CVE-2016-9756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9756">CVE-2016-9756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013038">SUSE bug 1013038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the ColdFire Fast Ethernet Controller emulator support is vulnerable to an infinite loop issue. It could occur while receiving packets in 'mcf_fec_receive'. A privileged user/process inside guest could use this issue to crash the QEMU process on the host leading to DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9776">CVE-2016-9776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013285">SUSE bug 1013285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013657">SUSE bug 1013657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024182">SUSE bug 1024182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9794" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9794" ref_url="https://www.suse.com/security/cve/CVE-2016-9794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O/#QXEFFZRQPMWZP53PFRPS3ZPTNBTR7K6O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYANF56WB457ENVSY7PHYIW7M4H3WVH5/#TYANF56WB457ENVSY7PHYIW7M4H3WVH5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2016:3118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQEFNT522C2XD6C2QEESALPHMZXUC4TR/#IQEFNT522C2XD6C2QEESALPHMZXUC4TR" source="SUSE-SU"/>
    <description>
    Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9794/">CVE-2016-9794 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9794">CVE-2016-9794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013533">SUSE bug 1013533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013543">SUSE bug 1013543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013604">SUSE bug 1013604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9797" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL/#XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer over-read was observed in "l2cap_dump" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9797">CVE-2016-9797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9798" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL/#XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2585-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQCMJ3S23QNDH5LYNDD7WFLMU6BHPW2H/#NQCMJ3S23QNDH5LYNDD7WFLMU6BHPW2H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E5FQ643W3V2OADUIBEE2U2U7KJ3WODW7/#E5FQ643W3V2OADUIBEE2U2U7KJ3WODW7" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a use-after-free was identified in "conf_opt" function in "tools/parser/l2cap.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9798">CVE-2016-9798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013708">SUSE bug 1013708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013712">SUSE bug 1013712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9800" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OPFNHABYABCO6JRHKH73UHFXTZGFFC4N/#OPFNHABYABCO6JRHKH73UHFXTZGFFC4N" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "pin_code_reply_dump" function in "tools/parser/hci.c" source file. The issue exists because "pin" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "pin_code_reply_cp *cp" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9800">CVE-2016-9800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013721">SUSE bug 1013721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9801" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OPFNHABYABCO6JRHKH73UHFXTZGFFC4N/#OPFNHABYABCO6JRHKH73UHFXTZGFFC4N" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "set_ext_ctrl" function in "tools/parser/l2cap.c" source file when processing corrupted dump file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9801">CVE-2016-9801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013732">SUSE bug 1013732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9802" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL/#XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer over-read was identified in "l2cap_packet" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9802">CVE-2016-9802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9803" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9803" ref_url="https://www.suse.com/security/cve/CVE-2016-9803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012661.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, an out-of-bounds read was observed in "le_meta_ev_dump" function in "tools/parser/hci.c" source file. This issue exists because 'subevent' (which is used to read correct element from 'ev_le_meta_str' array) is overflowed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9803/">CVE-2016-9803 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9803">CVE-2016-9803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013885">SUSE bug 1013885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336474" comment="libbluetooth3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9804" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm-&gt;ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9804">CVE-2016-9804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013877">SUSE bug 1013877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-January/007678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3972-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183972-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0555-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190555-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0628-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190628-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005775.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC/#O4VIVCNLR3AUTND2OCCBDJPMRH2Y4HRC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW/#AP5LSLYIG36TN25VI6WAOVXYV7J3ACHW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3478-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXOIDV3A62VYHQJPOT3AJWCVKKCGT56F/#TXOIDV3A62VYHQJPOT3AJWCVKKCGT56F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6/#ZBIBDKV4Q445TSAAVXOJN365L7BQQWY6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14656-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA2YASY5GVVBWOWVKGZPCNZJI5WMPXEX/" source="SUSE-SU"/>
    <description>
    The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9843">CVE-2016-9843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1003580">SUSE bug 1003580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1013882">SUSE bug 1013882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038505">SUSE bug 1038505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062104">SUSE bug 1062104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116686">SUSE bug 1116686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120866">SUSE bug 1120866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123150">SUSE bug 1123150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127473">SUSE bug 1127473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184301">SUSE bug 1184301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904479" comment="libz1-1.2.11-3.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9845" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET_INFO' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9845">CVE-2016-9845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013767">SUSE bug 1013767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9846" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while updating the cursor data in update_cursor_data_virgl. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9846">CVE-2016-9846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013764">SUSE bug 1013764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9907" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in 'usbredir_handle_destroy'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9907">CVE-2016-9907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014109">SUSE bug 1014109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014490">SUSE bug 1014490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9908" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to an information leakage issue. It could occur while processing 'VIRTIO_GPU_CMD_GET_CAPSET' command. A guest user/process could use this flaw to leak contents of the host memory bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9908">CVE-2016-9908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014514">SUSE bug 1014514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9911" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the USB EHCI Emulation support is vulnerable to a memory leakage issue. It could occur while processing packet data in 'ehci_init_transfer'. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9911">CVE-2016-9911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014111">SUSE bug 1014111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014507">SUSE bug 1014507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9912" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the Virtio GPU Device emulator support is vulnerable to a memory leakage issue. It could occur while destroying gpu resource object in 'virtio_gpu_resource_destroy'. A guest user/process could use this flaw to leak host memory bytes, resulting in DoS for a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9912">CVE-2016-9912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014112">SUSE bug 1014112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9913" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
    <description>
    Memory leak in the v9fs_device_unrealize_common function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) via vectors involving the order of resource cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9913">CVE-2016-9913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014110">SUSE bug 1014110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1014311">SUSE bug 1014311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9917" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1353-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL/#XZHD5VUMX7KIQPDT63RDBFNM2PUTFJEL" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, a buffer overflow was observed in "read_n" function in "tools/hcidump.c" source file. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9917">CVE-2016-9917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015171">SUSE bug 1015171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9918" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005494.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTXYHE6PGTMF25YP75XLZYTQRMVXASLS/#NTXYHE6PGTMF25YP75XLZYTQRMVXASLS" source="SUSE-SU"/>
    <description>
    In BlueZ 5.42, an out-of-bounds read was identified in "packet_hexdump" function in "monitor/packet.c" source file. This issue can be triggered by processing a corrupted dump file and will result in btmon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9918">CVE-2016-9918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1013893">SUSE bug 1013893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015173">SUSE bug 1015173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9921" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM/#DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9921">CVE-2016-9921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9922" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F/#5OAJMFRPBJT2G2YR4V4OF5BDJCLFTB4F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM/#DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    The cirrus_do_copy function in hw/display/cirrus_vga.c in QEMU (aka Quick Emulator), when cirrus graphics mode is VGA, allows local guest OS privileged users to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving blit pitch values.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9922">CVE-2016-9922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014702">SUSE bug 1014702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015169">SUSE bug 1015169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9923" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923" source="SUSE CVE"/>
    <description>
    Quick Emulator (Qemu) built with the 'chardev' backend support is vulnerable to a use after free issue. It could occur while hotplug and unplugging the device in the guest. A guest user/process could use this flaw to crash a Qemu process on the host resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9923">CVE-2016-9923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1014703">SUSE bug 1014703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015145">SUSE bug 1015145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015148">SUSE bug 1015148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1015154">SUSE bug 1015154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2016:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2016:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2016-December/002513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26/#JLG3EHZ4ZVLYFQUGEJC7WHFBD7I7AO26" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q/#TD6VBHSNLJ6X342Z72W5MYWRKDXWA37Q" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF/#6T3UTRTTAWWYZV6EUWIEMYVJGSLIWEVF" source="SUSE-SU"/>
    <description>
    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9932">CVE-2016-9932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012651">SUSE bug 1012651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1016340">SUSE bug 1016340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2016-9962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962" source="CVE"/>
    <reference ref_id="SUSE CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
    <description>
    RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container.  This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9962">CVE-2016-9962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1012568">SUSE bug 1012568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173425">SUSE bug 1173425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379" source="SUSE CVE"/>
    <description>
    Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-10-07"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0379">CVE-2017-0379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1055837">SUSE bug 1055837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0381" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002636.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T3F5LQYOXCD3L3AQO4CN4URMPY6U4YGO/#T3F5LQYOXCD3L3AQO4CN4URMPY6U4YGO" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability in silk/NLSF_stabilize.c in libopus in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-31607432.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0381">CVE-2017-0381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020102">SUSE bug 1020102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882254" comment="libopus0-1.3.1-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0386" ref_url="https://www.suse.com/security/cve/CVE-2017-0386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012179.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the libnl library could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32255299.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0386/">CVE-2017-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0386">CVE-2017-0386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020123">SUSE bug 1020123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009654583" comment="libnl-config is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654584" comment="libnl3-200 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20170663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-0663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-0663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-0663">CVE-2017-0663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1044337">SUSE bug 1044337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000099" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099" source="SUSE CVE"/>
    <description>
    When asking to get a file from a file:// URL, libcurl provides a feature that outputs meta-data about the file using HTTP-like headers. The code doing this would send the wrong buffer to the user (stdout or the application's provide callback), which could lead to other private data from the heap to get inadvertently displayed. The wrong buffer was an uninitialized memory area allocated on the heap and if it turned out to not contain any zero byte, it would continue and display the data following that buffer in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000099">CVE-2017-1000099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051645">SUSE bug 1051645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053919">SUSE bug 1053919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000100">CVE-2017-1000100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051644">SUSE bug 1051644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000101">CVE-2017-1000101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051643">SUSE bug 1051643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249" source="SUSE CVE"/>
    <description>
    An issue in file() was introduced in commit 9611f31313a93aa036389c5f3b15eea53510d4d1 (Oct 2016) lets an attacker overwrite a fixed 20 bytes stack buffer with a specially crafted .notes section in an ELF binary. This was fixed in commit 35c94dc6acc418f1ad7f6241a6680e5327495793 (Aug 2017).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000249">CVE-2017-1000249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056838">SUSE bug 1056838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000250" ref_url="https://www.suse.com/security/cve/CVE-2017-1000250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005161.html" source="SUSE-SU"/>
    <description>
    All versions of the SDP server in BlueZ 5.46 and earlier are vulnerable to an information disclosure vulnerability which allows remote attackers to obtain sensitive information from the bluetoothd process memory. This vulnerability lies in the processing of SDP search attribute requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000250/">CVE-2017-1000250 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000250">CVE-2017-1000250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057342">SUSE bug 1057342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336474" comment="libbluetooth3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="TID000019028" ref_url="https://www.suse.com/support/kb/doc/?id=000019028" source="SUSE-SU"/>
		<reference ref_id="TID7021383" ref_url="https://www.suse.com/support/kb/doc/?id=7021383" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF/#YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q/#NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q" source="SUSE-SU"/>
    <description>
    The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000251">CVE-2017-1000251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057389">SUSE bug 1057389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057950">SUSE bug 1057950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070535">SUSE bug 1070535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072117">SUSE bug 1072117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072162">SUSE bug 1072162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120758">SUSE bug 1120758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
    <description>
    libcurl may read outside of a heap allocated buffer when doing FTP. When libcurl connects to an FTP server and successfully logs in (anonymous or not), it asks the server for the current directory with the `PWD` command. The server then responds with a 257 response containing the path, inside double quotes. The returned path name is then kept by libcurl for subsequent uses. Due to a flaw in the string parser for this directory name, a directory name passed like this but without a closing double quote would lead to libcurl not adding a trailing NUL byte to the buffer holding the name. When libcurl would then later access the string, it could read beyond the allocated heap buffer and crash or wrongly access data beyond the buffer, thinking it was part of the path. A malicious server could abuse this fact and effectively prevent libcurl-based clients to work with it - the PWD command is always issued on new FTP connections and the mistake has a high chance of causing a segfault. The simple fact that this has issue remained undiscovered for this long could suggest that malformed PWD responses are rare in benign servers. We are not aware of any exploit of this flaw. This bug was introduced in commit [415d2e7cb7](https://github.com/curl/curl/commit/415d2e7cb7), March 2005. In libcurl version 7.56.0, the parser always zero terminates the string but also rejects it if not terminated properly with a final double quote.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000254">CVE-2017-1000254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1061876">SUSE bug 1061876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000256" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003354.html" source="SUSE-SU"/>
    <description>
    libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000256">CVE-2017-1000256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062563">SUSE bug 1062563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
    <description>
    An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000257">CVE-2017-1000257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063824">SUSE bug 1063824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="TID7020973" ref_url="https://www.suse.com/support/kb/doc/?id=7020973" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1629-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K3IQSSU3N5JKUH3TDRTL5Y2QKDCA2GMR/#K3IQSSU3N5JKUH3TDRTL5Y2QKDCA2GMR" source="SUSE-SU"/>
    <description>
    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000366">CVE-2017-1000366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063847">SUSE bug 1063847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002930.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UJCGSRMBKFPNZBU7GWKANVXCKVBZQDT6/#UJCGSRMBKFPNZBU7GWKANVXCKVBZQDT6" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000367">CVE-2017-1000367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1007501">SUSE bug 1007501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077345">SUSE bug 1077345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003009.html" source="SUSE-SU"/>
		<reference ref_id="TID7021027" ref_url="https://www.suse.com/support/kb/doc/?id=7021027" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLSRIXYTU37PFAVOYK3S37KQP6TUCUHA/#YLSRIXYTU37PFAVOYK3S37KQP6TUCUHA" source="SUSE-SU"/>
    <description>
    Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000368">CVE-2017-1000368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039361">SUSE bug 1039361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042146">SUSE bug 1042146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045986">SUSE bug 1045986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000370" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000370" ref_url="https://www.suse.com/security/cve/CVE-2017-1000370" source="SUSE CVE"/>
    <description>
    The offset2lib patch as used in the Linux Kernel contains a vulnerability that allows a PIE binary to be execve()'ed with 1GB of arguments or environmental strings then the stack occupies the address 0x80000000 and the PIE binary is mapped above 0x40000000 nullifying the protection of the offset2lib patch. This affects Linux Kernel version 4.11.5 and earlier. This is a different issue than CVE-2017-1000371. This issue appears to be limited to i386 based systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000370/">CVE-2017-1000370 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000370">CVE-2017-1000370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000371" ref_url="https://www.suse.com/security/cve/CVE-2017-1000371" source="SUSE CVE"/>
    <description>
    The offset2lib patch as used by the Linux Kernel contains a vulnerability, if RLIMIT_STACK is set to RLIM_INFINITY and 1 Gigabyte of memory is allocated (the maximum under the 1/4 restriction) then the stack will be grown down to 0x80000000, and as the PIE binary is mapped above 0x80000000 the minimum distance between the end of the PIE binary's read-write segment and the start of the stack becomes small enough that the stack guard page can be jumped over by an attacker. This affects Linux Kernel version 4.11.5. This is a different issue than CVE-2017-1000370 and CVE-2017-1000365. This issue appears to be limited to i386 based systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000371/">CVE-2017-1000371 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000371">CVE-2017-1000371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037551">SUSE bug 1037551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039346">SUSE bug 1039346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039349">SUSE bug 1039349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039354">SUSE bug 1039354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000380" ref_url="https://www.suse.com/security/cve/CVE-2017-1000380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP/#P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP" source="SUSE-SU"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000380/">CVE-2017-1000380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000380">CVE-2017-1000380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1044125">SUSE bug 1044125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000382" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382" source="SUSE CVE"/>
    <description>
    VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000382">CVE-2017-1000382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065958">SUSE bug 1065958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000408">CVE-2017-1000408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039357">SUSE bug 1039357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20171000409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-1000409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-1000409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    A buffer overflow in glibc 2.5 (released on September 29, 2006) and can be triggered through the LD_LIBRARY_PATH environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-1000409">CVE-2017-1000409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071319">SUSE bug 1071319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10661" ref_url="https://www.suse.com/security/cve/CVE-2017-10661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003537.html" source="SUSE-SU"/>
    <description>
    Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10661/">CVE-2017-10661 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10661">CVE-2017-10661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053152">SUSE bug 1053152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053153">SUSE bug 1053153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ/#NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K/#A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10664">CVE-2017-10664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046636">SUSE bug 1046636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046637">SUSE bug 1046637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K/#A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10806">CVE-2017-10806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1047674">SUSE bug 1047674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047675">SUSE bug 1047675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201710911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-10911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-10911" ref_url="https://www.suse.com/security/cve/CVE-2017-10911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10911/">CVE-2017-10911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-10911">CVE-2017-10911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1042863">SUSE bug 1042863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043330">SUSE bug 1043330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057378">SUSE bug 1057378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11176" ref_url="https://www.suse.com/security/cve/CVE-2017-11176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11176/">CVE-2017-11176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11176">CVE-2017-11176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048275">SUSE bug 1048275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11334" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K/#A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11334">CVE-2017-11334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1048902">SUSE bug 1048902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1048920">SUSE bug 1048920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368" source="SUSE CVE"/>
    <description>
    In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11368">CVE-2017-11368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049819">SUSE bug 1049819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11423" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003864.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSGZRM5ELLHC2VOALXXN4DFDXVER3465/#OSGZRM5ELLHC2VOALXXN4DFDXVER3465" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQD6RQPWKLSLDYVFXICA4X5SCNO7VGHG/#QQD6RQPWKLSLDYVFXICA4X5SCNO7VGHG" source="SUSE-SU"/>
    <description>
    The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11423">CVE-2017-11423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049423">SUSE bug 1049423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492057" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11434" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ/#NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K/#A2KPRZOY7YYKVWPW2XDKEGFUKUFWPQ7K" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11434">CVE-2017-11434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049381">SUSE bug 1049381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049578">SUSE bug 1049578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
    <description>
    Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11462">CVE-2017-11462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056995">SUSE bug 1056995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11472" ref_url="https://www.suse.com/security/cve/CVE-2017-11472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF/#YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q/#NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q" source="SUSE-SU"/>
    <description>
    The acpi_ns_terminate() function in drivers/acpi/acpica/nsutils.c in the Linux kernel before 4.12 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-11472/">CVE-2017-11472 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11472">CVE-2017-11472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049580">SUSE bug 1049580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    net/xfrm/xfrm_policy.c in the Linux kernel through 4.12.3, when CONFIG_XFRM_MIGRATE is enabled, does not ensure that the dir value of xfrm_userpolicy_id is XFRM_POLICY_MAX or less, which allows local users to cause a denial of service (out-of-bounds access) or possibly have unspecified other impact via an XFRM_MSG_MIGRATE xfrm Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11600">CVE-2017-11600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096564">SUSE bug 1096564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11695" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11695" ref_url="https://www.suse.com/security/cve/CVE-2017-11695" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the alloc_segs function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11695/">CVE-2017-11695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11695">CVE-2017-11695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338955" comment="libfreebl3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338959" comment="libsoftokn3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338964" comment="mozilla-nss-certs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11696" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11696" ref_url="https://www.suse.com/security/cve/CVE-2017-11696" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the __hash_open function in lib/dbm/src/hash.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11696/">CVE-2017-11696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11696">CVE-2017-11696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338955" comment="libfreebl3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338959" comment="libsoftokn3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338964" comment="mozilla-nss-certs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201711698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-11698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-11698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-11698" ref_url="https://www.suse.com/security/cve/CVE-2017-11698" source="SUSE CVE"/>
    <description>
    Heap-based buffer overflow in the __get_page function in lib/dbm/src/h_page.c in Mozilla Network Security Services (NSS) allows context-dependent attackers to have unspecified impact using a crafted cert8.db file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11698/">CVE-2017-11698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11698">CVE-2017-11698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053418">SUSE bug 1053418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053419">SUSE bug 1053419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053420">SUSE bug 1053420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1053422">SUSE bug 1053422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338955" comment="libfreebl3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338959" comment="libsoftokn3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338964" comment="mozilla-nss-certs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12132">CVE-2017-12132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051791">SUSE bug 1051791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003870.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12133">CVE-2017-12133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081556">SUSE bug 1081556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/980854">SUSE bug 980854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ/#NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
    <description>
    Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12135">CVE-2017-12135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051787">SUSE bug 1051787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ/#NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
    <description>
    Race condition in the grant table code in Xen 4.6.x through 4.9.x allows local guest OS administrators to cause a denial of service (free list corruption and host crash) or gain privileges on the host via vectors involving maptrack free list handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12136">CVE-2017-12136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051789">SUSE bug 1051789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ/#NSCRDZ2SSU3A7UIHH6UDINU2CBUFGZHQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S/#IUHKBRFLKIRYEWIJATEEGVTNCRQTBC5S" source="SUSE-SU"/>
    <description>
    arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12137">CVE-2017-12137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1051788">SUSE bug 1051788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAGLLWTW52CL2EANHYBSPEELC5M2ZW45/#YAGLLWTW52CL2EANHYBSPEELC5M2ZW45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H/#OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H" source="SUSE-SU"/>
    <description>
    A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12153">CVE-2017-12153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1058410">SUSE bug 1058410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058624">SUSE bug 1058624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016340.html" source="SUSE-SU"/>
    <description>
    libpng before 1.6.32 does not properly check the length of chunks against the user limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12652">CVE-2017-12652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141493">SUSE bug 1141493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12791" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.11.7 and 2017.7.x before 2017.7.1 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12791">CVE-2017-12791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12814" ref_url="https://www.suse.com/security/cve/CVE-2017-12814" source="SUSE CVE"/>
    <description>
    Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-23"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-12814/">CVE-2017-12814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12814">CVE-2017-12814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057727">SUSE bug 1057727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336057" comment="perl-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\N{}' escape and the case-insensitive modifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12837">CVE-2017-12837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057724">SUSE bug 1057724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201712883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-12883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-12883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12883" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
    <description>
    Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\N{U+...}' escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-12883">CVE-2017-12883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057721">SUSE bug 1057721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13077">CVE-2017-13077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063963">SUSE bug 1063963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13078">CVE-2017-13078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13079">CVE-2017-13079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BASVOF5IYBWFH4KY2PGMCRYCT2LROR66/#BASVOF5IYBWFH4KY2PGMCRYCT2LROR66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH/#CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCXOF5O57ARCW5HJNFHL54NEQVUPOHTM/#FCXOF5O57ARCW5HJNFHL54NEQVUPOHTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13080">CVE-2017-13080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063667">SUSE bug 1063667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063671">SUSE bug 1063671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178872">SUSE bug 1178872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904451" comment="kernel-firmware-20200107-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCXOF5O57ARCW5HJNFHL54NEQVUPOHTM/#FCXOF5O57ARCW5HJNFHL54NEQVUPOHTM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13081">CVE-2017-13081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066295">SUSE bug 1066295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904451" comment="kernel-firmware-20200107-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID7022107" ref_url="https://www.suse.com/support/kb/doc/?id=7022107" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13082">CVE-2017-13082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13086">CVE-2017-13086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13087">CVE-2017-13087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R74YPATBIXZZY53VWIV4DR6ARJILTINT/#R74YPATBIXZZY53VWIV4DR6ARJILTINT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FVO5LGM6MML3JRTJIGXKSVAE727P46NU/#FVO5LGM6MML3JRTJIGXKSVAE727P46NU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13088">CVE-2017-13088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056061">SUSE bug 1056061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063479">SUSE bug 1063479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179588">SUSE bug 1179588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13168" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13168" ref_url="https://www.suse.com/security/cve/CVE-2017-13168" source="SUSE CVE"/>
    <description>
    An elevation of privilege vulnerability in the kernel scsi driver. Product: Android. Versions: Android kernel. Android ID A-65023233.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13168/">CVE-2017-13168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13168">CVE-2017-13168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072831">SUSE bug 1072831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13215" ref_url="https://www.suse.com/security/cve/CVE-2017-13215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
    <description>
    A elevation of privilege vulnerability in the Upstream kernel skcipher. Product: Android. Versions: Android kernel. Android ID: A-64386293. References: Upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13215/">CVE-2017-13215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13215">CVE-2017-13215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1075908">SUSE bug 1075908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13220" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13220" ref_url="https://www.suse.com/security/cve/CVE-2017-13220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
    <description>
    An elevation of privilege vulnerability in the Upstream kernel bluez. Product: Android. Versions: Android kernel. Android ID: A-63527053.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13220/">CVE-2017-13220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13220">CVE-2017-13220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076537">SUSE bug 1076537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056334">SUSE bug 1056334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056336">SUSE bug 1056336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13673" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13673">CVE-2017-13673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056386">SUSE bug 1056386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1056387">SUSE bug 1056387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13693" ref_url="https://www.suse.com/security/cve/CVE-2017-13693" source="SUSE CVE"/>
    <description>
    The acpi_ds_create_operands() function in drivers/acpi/acpica/dsutils.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13693/">CVE-2017-13693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13693">CVE-2017-13693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1055713">SUSE bug 1055713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13694" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13694" ref_url="https://www.suse.com/security/cve/CVE-2017-13694" source="SUSE CVE"/>
    <description>
    The acpi_ps_complete_final_op() function in drivers/acpi/acpica/psobject.c in the Linux kernel through 4.12.9 does not flush the node and node_ext caches and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-13694/">CVE-2017-13694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13694">CVE-2017-13694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1055705">SUSE bug 1055705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201713711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-13711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-13711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-13711">CVE-2017-13711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056291">SUSE bug 1056291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MUYRK7OAWYMGYB543VIQJT63REBWYN7W/#MUYRK7OAWYMGYB543VIQJT63REBWYN7W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q/#NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q" source="SUSE-SU"/>
    <description>
    An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14051">CVE-2017-14051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056588">SUSE bug 1056588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003879.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14062">CVE-2017-14062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056450">SUSE bug 1056450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087709">SUSE bug 1087709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123123">SUSE bug 1123123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173590">SUSE bug 1173590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882167" comment="libidn11-1.34-3.2.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14106" ref_url="https://www.suse.com/security/cve/CVE-2017-14106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF/#YPGIUZYK74E5SKBIZ5WWZR73INQMGVZF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q/#NMSI4RCMJWBVGY3QK5XMZEO3O7WUFC4Q" source="SUSE-SU"/>
    <description>
    The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14106/">CVE-2017-14106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14106">CVE-2017-14106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056982">SUSE bug 1056982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14140" ref_url="https://www.suse.com/security/cve/CVE-2017-14140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
    <description>
    The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14140/">CVE-2017-14140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14140">CVE-2017-14140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057179">SUSE bug 1057179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14160" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DINN76OAUIKO2F7LNIEWCTEGEC6D5ADH/#DINN76OAUIKO2F7LNIEWCTEGEC6D5ADH" source="SUSE-SU"/>
    <description>
    The bark_noise_hybridmp function in psy.c in Xiph.Org libvorbis 1.3.5 allows remote attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact via a crafted mp4 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059812">SUSE bug 1059812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14167">CVE-2017-14167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1057585">SUSE bug 1057585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14316" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14316" ref_url="https://www.suse.com/security/cve/CVE-2017-14316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003266.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2514-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BO4VU44NE3XNY7VJ63H36LQRZ6SVSW7X/#BO4VU44NE3XNY7VJ63H36LQRZ6SVSW7X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2540-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR3J6XVRH6XTCWX4OBGY2TIB2SLGSPRM/#FR3J6XVRH6XTCWX4OBGY2TIB2SLGSPRM" source="SUSE-SU"/>
    <description>
    A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the function checks to see if the special constant `NUMA_NO_NODE` is specified, it otherwise does not handle the case where `node &gt;= MAX_NUMNODES`. This allows an out-of-bounds access to an internal array.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14316/">CVE-2017-14316 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14316">CVE-2017-14316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056278">SUSE bug 1056278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072198">SUSE bug 1072198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072223">SUSE bug 1072223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAGLLWTW52CL2EANHYBSPEELC5M2ZW45/#YAGLLWTW52CL2EANHYBSPEELC5M2ZW45" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2741-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H/#OEEY2PRTREONRYLJOOZKK5RRVRZM4Y7H" source="SUSE-SU"/>
    <description>
    The iscsi_if_rx function in drivers/scsi/scsi_transport_iscsi.c in the Linux kernel through 4.13.2 allows local users to cause a denial of service (panic) by leveraging incorrect length validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14489">CVE-2017-14489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059051">SUSE bug 1059051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14497" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14497" ref_url="https://www.suse.com/security/cve/CVE-2017-14497" source="SUSE CVE"/>
    <description>
    The tpacket_rcv function in net/packet/af_packet.c in the Linux kernel before 4.13 mishandles vnet headers, which might allow local users to cause a denial of service (buffer overflow, and disk and memory corruption) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14497/">CVE-2017-14497 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14497">CVE-2017-14497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059058">SUSE bug 1059058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14632" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
    <description>
    Xiph.Org libvorbis 1.3.5 allows Remote Code Execution upon freeing uninitialized memory in the function vorbis_analysis_headerout() in info.c when vi-&gt;channels&lt;=0, a similar issue to Mozilla bug 550184.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14632">CVE-2017-14632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059809">SUSE bug 1059809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003568.html" source="SUSE-SU"/>
    <description>
    In Xiph.Org libvorbis 1.3.5, an out-of-bounds array read vulnerability exists in the function mapping0_forward() in mapping0.c, which may lead to DoS when operating on a crafted audio file with vorbis_analysis().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14633">CVE-2017-14633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1059811">SUSE bug 1059811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081833">SUSE bug 1081833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14695" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in minion id validation in SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote minions with incorrect credentials to authenticate to a master via a crafted minion ID.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12791.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14695">CVE-2017-14695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062462">SUSE bug 1062462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14696" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-October/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
    <description>
    SaltStack Salt before 2016.3.8, 2016.11.x before 2016.11.8, and 2017.7.x before 2017.7.2 allows remote attackers to cause a denial of service via a crafted authentication request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14696">CVE-2017-14696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1053955">SUSE bug 1053955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062464">SUSE bug 1062464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201714992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-14992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-14992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14992" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6WQNCNHPTDRE2ZJPDWTP64G77S2QWF4/#N6WQNCNHPTDRE2ZJPDWTP64G77S2QWF4" source="SUSE-SU"/>
    <description>
    Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0, 1.10.3, 17.03.0, 17.03.1, 17.03.2, 17.06.0, 17.06.1, 17.06.2, 17.09.0, and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload, aka gzip bombing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-14992">CVE-2017-14992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066210">SUSE bug 1066210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15038" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15038">CVE-2017-15038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062069">SUSE bug 1062069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15102" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15102" ref_url="https://www.suse.com/security/cve/CVE-2017-15102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
    <description>
    The tower_probe function in drivers/usb/misc/legousbtower.c in the Linux kernel before 4.8.1 allows local users (who are physically proximate for inserting a crafted USB device) to gain privileges by leveraging a write-what-where condition that occurs after a race condition and a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15102/">CVE-2017-15102 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15102">CVE-2017-15102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066705">SUSE bug 1066705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15115">CVE-2017-15115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068671">SUSE bug 1068671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15116" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15116" ref_url="https://www.suse.com/security/cve/CVE-2017-15116" source="SUSE CVE"/>
    <description>
    The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15116/">CVE-2017-15116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15116">CVE-2017-15116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070613">SUSE bug 1070613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15118" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118" source="SUSE CVE"/>
    <description>
    A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15118">CVE-2017-15118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070147">SUSE bug 1070147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15119" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
    <description>
    The Network Block Device (NBD) server in Quick Emulator (QEMU) before 2.11 is vulnerable to a denial of service issue. It could occur if a client sent large option requests, making the server waste CPU time on reading up to 4GB per request. A client could use this flaw to keep the NBD server from serving other requests, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15119">CVE-2017-15119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070144">SUSE bug 1070144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 1.5.2 has a NULL Pointer Dereference in jdpostct.c and jquant1.c via a crafted JPEG file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15232">CVE-2017-15232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062937">SUSE bug 1062937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BASVOF5IYBWFH4KY2PGMCRYCT2LROR66/#BASVOF5IYBWFH4KY2PGMCRYCT2LROR66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH/#CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH" source="SUSE-SU"/>
    <description>
    Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15265">CVE-2017-15265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062520">SUSE bug 1062520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15268">CVE-2017-15268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1062942">SUSE bug 1062942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15274" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15274" ref_url="https://www.suse.com/security/cve/CVE-2017-15274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
    <description>
    security/keys/keyctl.c in the Linux kernel before 4.11.5 does not consider the case of a NULL payload in conjunction with a nonzero length value, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted add_key or keyctl system call, a different vulnerability than CVE-2017-12192.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15274/">CVE-2017-15274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15274">CVE-2017-15274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045327">SUSE bug 1045327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1062471">SUSE bug 1062471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2938-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3/#4ZOC5UWC4S23HZWTUSJDD66LGMVNU3L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J3HSEJH2QUAYG6EAQ24HYRIVSLEAZ45X/#J3HSEJH2QUAYG6EAQ24HYRIVSLEAZ45X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3194-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFR5FHHXVWZRZ6MMP3FXVOZO6Q3DVPIQ/#JFR5FHHXVWZRZ6MMP3FXVOZO6Q3DVPIQ" source="SUSE-SU"/>
    <description>
    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15289">CVE-2017-15289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063122">SUSE bug 1063122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063123">SUSE bug 1063123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003807.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BASVOF5IYBWFH4KY2PGMCRYCT2LROR66/#BASVOF5IYBWFH4KY2PGMCRYCT2LROR66" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH/#CPM3KJR2I4TDUD2FFWOSGMI4QVW7CONH" source="SUSE-SU"/>
    <description>
    net/packet/af_packet.c in the Linux kernel before 4.13.6 allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free, a different vulnerability than CVE-2017-6346.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15649">CVE-2017-15649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064388">SUSE bug 1064388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064392">SUSE bug 1064392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15670">CVE-2017-15670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064583">SUSE bug 1064583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110160">SUSE bug 1110160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15671">CVE-2017-15671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064569">SUSE bug 1064569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15804">CVE-2017-15804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1064580">SUSE bug 1064580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110160">SUSE bug 1110160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15868" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15868" ref_url="https://www.suse.com/security/cve/CVE-2017-15868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003671.html" source="SUSE-SU"/>
    <description>
    The bnep_add_connection function in net/bluetooth/bnep/core.c in the Linux kernel before 3.19 does not ensure that an l2cap socket is available, which allows local users to gain privileges via a crafted application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15868/">CVE-2017-15868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15868">CVE-2017-15868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071470">SUSE bug 1071470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071471">SUSE bug 1071471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201715908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-15908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-15908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15908" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003686.html" source="SUSE-SU"/>
    <description>
    In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15908">CVE-2017-15908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065276">SUSE bug 1065276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16526" ref_url="https://www.suse.com/security/cve/CVE-2017-16526" source="SUSE CVE"/>
    <description>
    drivers/uwb/uwbd.c in the Linux kernel before 4.13.6 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16526/">CVE-2017-16526 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16526">CVE-2017-16526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066624">SUSE bug 1066624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16528">CVE-2017-16528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066629">SUSE bug 1066629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16530" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16530" ref_url="https://www.suse.com/security/cve/CVE-2017-16530" source="SUSE CVE"/>
    <description>
    The uas driver in the Linux kernel before 4.13.6 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device, related to drivers/usb/storage/uas-detect.h and drivers/usb/storage/uas.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16530/">CVE-2017-16530 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16530">CVE-2017-16530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066668">SUSE bug 1066668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16532" ref_url="https://www.suse.com/security/cve/CVE-2017-16532" source="SUSE CVE"/>
    <description>
    The get_endpoints function in drivers/usb/misc/usbtest.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16532/">CVE-2017-16532 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16532">CVE-2017-16532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066673">SUSE bug 1066673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16536">CVE-2017-16536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066606">SUSE bug 1066606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16537">CVE-2017-16537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066573">SUSE bug 1066573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16539" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16539" ref_url="https://www.suse.com/security/cve/CVE-2017-16539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003714.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6WQNCNHPTDRE2ZJPDWTP64G77S2QWF4/#N6WQNCNHPTDRE2ZJPDWTP64G77S2QWF4" source="SUSE-SU"/>
    <description>
    The DefaultLinuxSpec function in oci/defaults.go in Docker Moby through 17.03.2-ce does not block /proc/scsi pathnames, which allows attackers to trigger data loss (when certain older Linux kernels are used) by leveraging Docker container access to write a "scsi remove-single-device" line to /proc/scsi/scsi, aka SCSI MICDROP.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16539/">CVE-2017-16539 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16539">CVE-2017-16539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066801">SUSE bug 1066801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003604.html" source="SUSE-SU"/>
    <description>
    The receive_xattr function in xattrs.c in rsync 3.1.2 and 3.1.3-development does not check for a trailing '\0' character in an xattr name, which allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly have unspecified other impact by sending crafted data to the daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16548">CVE-2017-16548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066644">SUSE bug 1066644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887035" comment="rsync-3.1.3-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16646">CVE-2017-16646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1067105">SUSE bug 1067105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16648" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648" source="SUSE CVE"/>
    <description>
    The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16648">CVE-2017-16648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1067087">SUSE bug 1067087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16845" ref_url="https://www.suse.com/security/cve/CVE-2017-16845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
    <description>
    hw/input/ps2.c in Qemu does not validate 'rptr' and 'count' values during guest migration, leading to out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16845/">CVE-2017-16845 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16845">CVE-2017-16845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068613">SUSE bug 1068613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201716997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-16997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-16997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
    <description>
    elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the "./" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16997">CVE-2017-16997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073231">SUSE bug 1073231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17053" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17053" ref_url="https://www.suse.com/security/cve/CVE-2017-17053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
    <description>
    The init_new_context function in arch/x86/include/asm/mmu_context.h in the Linux kernel before 4.12.10 does not correctly handle errors from LDT table allocation when forking a new process, allowing a local attacker to achieve a use-after-free or possibly have unspecified other impact by running a specially crafted program. This vulnerability only affected kernels built with CONFIG_MODIFY_LDT_SYSCALL=y.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17053/">CVE-2017-17053 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17053">CVE-2017-17053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070264">SUSE bug 1070264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096679">SUSE bug 1096679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17087" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17087" ref_url="https://www.suse.com/security/cve/CVE-2017-17087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17087/">CVE-2017-17087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17087">CVE-2017-17087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065958">SUSE bug 1065958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1070955">SUSE bug 1070955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17426" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426" source="SUSE CVE"/>
    <description>
    The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17426">CVE-2017-17426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071479">SUSE bug 1071479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17450">CVE-2017-17450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071695">SUSE bug 1071695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074033">SUSE bug 1074033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
    <description>
    The usb_destroy_configuration function in drivers/usb/core/config.c in the USB core subsystem in the Linux kernel through 4.14.5 does not consider the maximum number of configurations and interfaces before attempting to release resources, which allows local users to cause a denial of service (out-of-bounds write access) or possibly have unspecified other impact via a crafted USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17558">CVE-2017-17558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072561">SUSE bug 1072561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17740" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46KFS6OC36UWKEJS7D2YUROL2323KWEB/#46KFS6OC36UWKEJS7D2YUROL2323KWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQYMYQN54XQCPQJJZEIGGCBW3W7U53IW/#TQYMYQN54XQCPQJJZEIGGCBW3W7U53IW" source="SUSE-SU"/>
    <description>
    contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17740">CVE-2017-17740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073313">SUSE bug 1073313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17742">CVE-2017-17742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087434">SUSE bug 1087434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17806" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
    <description>
    The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17806">CVE-2017-17806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073874">SUSE bug 1073874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2779-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2991-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O4V5BRCDW43YWFK6V2VJPYO5ZOQFA5PS/#O4V5BRCDW43YWFK6V2VJPYO5ZOQFA5PS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2813-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFDI2R7CPOWCUKXCT45HEOUTKCF35ZPV/#JFDI2R7CPOWCUKXCT45HEOUTKCF35ZPV" source="SUSE-SU"/>
    <description>
    OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17833">CVE-2017-17833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090638">SUSE bug 1090638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099519">SUSE bug 1099519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899804" comment="openslp-2.0.0-6.12.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17840" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17840" ref_url="https://www.suse.com/security/cve/CVE-2017-17840" source="SUSE CVE"/>
    <description>
    An issue was discovered in Open-iSCSI through 2.0.875. A local attacker can cause the iscsiuio server to abort or potentially execute code by sending messages with incorrect lengths, which (due to lack of checking) can lead to buffer overflows, and result in aborts (with overflow checking enabled) or code execution. The process_iscsid_broadcast function in iscsiuio/src/unix/iscsid_ipc.c does not validate the payload length before a write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17840/">CVE-2017-17840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17840">CVE-2017-17840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1072312">SUSE bug 1072312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659871" comment="iscsiuio is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659872" comment="libopeniscsiusr0_2_0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659873" comment="open-iscsi is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18078" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003753.html" source="SUSE-SU"/>
    <description>
    systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18078">CVE-2017-18078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077925">SUSE bug 1077925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18207" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5SJJLDTHEAEYXTZGWG4F77UDIZS6RYQ/#B5SJJLDTHEAEYXTZGWG4F77UDIZS6RYQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value, which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications "need to be prepared to handle a wide variety of exceptions."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18207">CVE-2017-18207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083507">SUSE bug 1083507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18222" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18222" ref_url="https://www.suse.com/security/cve/CVE-2017-18222" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.12, Hisilicon Network Subsystem (HNS) does not consider the ETH_SS_PRIV_FLAGS case when retrieving sset_count data, which allows local users to cause a denial of service (buffer overflow and memory corruption) or possibly have unspecified other impact, as demonstrated by incompatibility between hns_get_sset_count and ethtool_get_strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18222/">CVE-2017-18222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18222">CVE-2017-18222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084529">SUSE bug 1084529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18249" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18249" ref_url="https://www.suse.com/security/cve/CVE-2017-18249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
    <description>
    The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18249/">CVE-2017-18249 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18249">CVE-2017-18249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087036">SUSE bug 1087036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18255" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18255" ref_url="https://www.suse.com/security/cve/CVE-2017-18255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
    <description>
    The perf_cpu_time_max_percent_handler function in kernel/events/core.c in the Linux kernel before 4.11 allows local users to cause a denial of service (integer overflow) or possibly have unspecified other impact via a large value, as demonstrated by an incorrect sample-rate calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18255/">CVE-2017-18255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18255">CVE-2017-18255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087813">SUSE bug 1087813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
    <description>
    The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18258">CVE-2017-18258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18261" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18261" ref_url="https://www.suse.com/security/cve/CVE-2017-18261" source="SUSE CVE"/>
    <description>
    The arch_timer_reg_read_stable macro in arch/arm64/include/asm/arch_timer.h in the Linux kernel before 4.13 allows local users to cause a denial of service (infinite recursion) by writing to a file under /sys/kernel/debug in certain circumstances, as demonstrated by a scenario involving debugfs, ftrace, PREEMPT_TRACER, and FUNCTION_GRAPH_TRACER.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18261/">CVE-2017-18261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18261">CVE-2017-18261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090225">SUSE bug 1090225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP/#WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR/#IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR" source="SUSE-SU"/>
    <description>
    An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18269">CVE-2017-18269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1094150">SUSE bug 1094150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18270" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18270" ref_url="https://www.suse.com/security/cve/CVE-2017-18270" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.13.5, a local user could create keyrings for other users via keyctl commands, setting unwanted defaults or causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18270/">CVE-2017-18270 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18270">CVE-2017-18270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1065999">SUSE bug 1065999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094186">SUSE bug 1094186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174993">SUSE bug 1174993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18342">CVE-2017-18342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099308">SUSE bug 1099308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164453">SUSE bug 1164453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493125" comment="python3-PyYAML-5.1.2-6.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201718552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-18552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-18552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18552" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-18552" ref_url="https://www.suse.com/security/cve/CVE-2017-18552" source="SUSE CVE"/>
    <description>
    An issue was discovered in net/rds/af_rds.c in the Linux kernel before 4.11. There is an out of bounds write and read in the function rds_recv_track_latency.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-18552/">CVE-2017-18552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-18552">CVE-2017-18552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146295">SUSE bug 1146295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2584" ref_url="https://www.suse.com/security/cve/CVE-2017-2584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2584/">CVE-2017-2584 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2584">CVE-2017-2584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1019851">SUSE bug 1019851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM/#DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2615">CVE-2017-2615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023004">SUSE bug 1023004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003867.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0589-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KSXOYBBQO2OYVFCV6VWE7MSURMGEULI2/#KSXOYBBQO2OYVFCV6VWE7MSURMGEULI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDHGCLBIGSCQTY2DNQTISCQPBFISPD32/#GDHGCLBIGSCQTY2DNQTISCQPBFISPD32" source="SUSE-SU"/>
    <description>
    A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2616">CVE-2017-2616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023041">SUSE bug 1023041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123789">SUSE bug 1123789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904456" comment="libblkid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904457" comment="libfdisk1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904458" comment="libmount1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904459" comment="libsmartcols1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904460" comment="libuuid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904461" comment="util-linux-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904462" comment="util-linux-systemd-2.33.1-4.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0665-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM/#DWMSK2BRJZ6JRNQHRA4GNXUADNVDRZNM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2620">CVE-2017-2620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024834">SUSE bug 1024834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024972">SUSE bug 1024972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629" source="SUSE CVE"/>
    <description>
    curl before 7.53.0 has an incorrect TLS Certificate Status Request extension feature that asks for a fresh proof of the server's certificate's validity in the code that checks for a test success or failure. It ends up always thinking there's valid proof, even when there is none or if the server doesn't support the TLS extension in question. This could lead to users not detecting when a server's certificate goes invalid or otherwise be mislead that the server is in a better shape than it is in reality. This flaw also exists in the command line tool (--cert-status).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2629">CVE-2017-2629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025379">SUSE bug 1025379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2630" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630" source="SUSE CVE"/>
    <description>
    A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server's response to a 'NBD_OPT_LIST' request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2630">CVE-2017-2630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025396">SUSE bug 1025396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003575.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access issue was found in Quick Emulator (QEMU) before 1.7.2 in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2633">CVE-2017-2633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026612">SUSE bug 1026612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1026636">SUSE bug 1026636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2635" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635" source="SUSE CVE"/>
    <description>
    A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2635">CVE-2017-2635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027075">SUSE bug 1027075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2647" ref_url="https://www.suse.com/security/cve/CVE-2017-2647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2647/">CVE-2017-2647 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2647">CVE-2017-2647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-2671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-2671" ref_url="https://www.suse.com/security/cve/CVE-2017-2671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2671/">CVE-2017-2671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-2671">CVE-2017-2671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1031003">SUSE bug 1031003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2/#Z7DVWELHOI3HIW2TCX7MRYG6JIMYW4R2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3731">CVE-2017-3731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022085">SUSE bug 1022085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064118">SUSE bug 1064118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064119">SUSE bug 1064119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7021518" ref_url="https://www.suse.com/support/kb/doc/?id=7021518" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65/#FBYBD5ZUSPVBWEEIVTKA25Q5QWELRG65" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3732">CVE-2017-3732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021641">SUSE bug 1021641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022086">SUSE bug 1022086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049418">SUSE bug 1049418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049421">SUSE bug 1049421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049422">SUSE bug 1049422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882252" comment="openssl-1.1.1d-1.46 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
    <description>
    While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3735">CVE-2017-3735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1056058">SUSE bug 1056058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7016794" ref_url="https://www.suse.com/support/kb/doc/?id=7016794" source="SUSE-SU"/>
		<reference ref_id="TID7022367" ref_url="https://www.suse.com/support/kb/doc/?id=7022367" source="SUSE-SU"/>
    <description>
    There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3736">CVE-2017-3736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1066242">SUSE bug 1066242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076369">SUSE bug 1076369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/957814">SUSE bug 957814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20173738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-3738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-3738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="TID7022464" ref_url="https://www.suse.com/support/kb/doc/?id=7022464" source="SUSE-SU"/>
		<reference ref_id="TID7022627" ref_url="https://www.suse.com/support/kb/doc/?id=7022627" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNPINS5VCZAZPCBVAYYEBEHQT2KH26D4/#CNPINS5VCZAZPCBVAYYEBEHQT2KH26D4" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-3738">CVE-2017-3738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071906">SUSE bug 1071906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097757">SUSE bug 1097757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0738-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGEJIAKNREDZSMA4I6FRAI6U2CLXZKIO/#CGEJIAKNREDZSMA4I6FRAI6U2CLXZKIO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0740-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PWEOYPGN6NS2GPOOLH27ZPXQ7KSRFP4/#2PWEOYPGN6NS2GPOOLH27ZPXQ7KSRFP4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5029">CVE-2017-5029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028848">SUSE bug 1028848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028875">SUSE bug 1028875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035905">SUSE bug 1035905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123130">SUSE bug 1123130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5200" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5200" ref_url="https://www.suse.com/security/cve/CVE-2017-5200" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002948.html" source="SUSE-SU"/>
    <description>
    Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5200/">CVE-2017-5200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5200">CVE-2017-5200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1011800">SUSE bug 1011800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009347405" comment="python3-salt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009347406" comment="salt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009347413" comment="salt-minion is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656852" comment="salt-transactional-update is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FAXP4GXQ7BQG2KR6KYJQQKZPWG5CWE4P/#FAXP4GXQ7BQG2KR6KYJQQKZPWG5CWE4P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write in the Graphite 2 library triggered with a maliciously crafted Graphite font. This results in a potentially exploitable crash. This issue was fixed in the Graphite 2 library as well as Mozilla products. This vulnerability affects Thunderbird &lt; 52.1, Firefox ESR &lt; 45.9, Firefox ESR &lt; 52.1, and Firefox &lt; 53.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5436">CVE-2017-5436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035082">SUSE bug 1035082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035204">SUSE bug 1035204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881851" comment="libgraphite2-3-1.3.11-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5525" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5525">CVE-2017-5525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020491">SUSE bug 1020491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003364.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TL2XHRWMCBBACYLDJEDSDB7R7E24WRSR/#TL2XHRWMCBBACYLDJEDSDB7R7E24WRSR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELW5KHJJOWHXGNKGWLXW5EZDWQNEBL72/#ELW5KHJJOWHXGNKGWLXW5EZDWQNEBL72" source="SUSE-SU"/>
    <description>
    Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5526">CVE-2017-5526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1020589">SUSE bug 1020589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059777">SUSE bug 1059777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5549" ref_url="https://www.suse.com/security/cve/CVE-2017-5549" source="SUSE CVE"/>
    <description>
    The klsi_105_get_line_state function in drivers/usb/serial/kl5kusb105.c in the Linux kernel before 4.9.5 places uninitialized heap-memory contents into a log entry upon a failure to read the line status, which allows local users to obtain sensitive information by reading the log.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5549/">CVE-2017-5549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5549">CVE-2017-5549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021256">SUSE bug 1021256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5551" ref_url="https://www.suse.com/security/cve/CVE-2017-5551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER/#BIIWQN3DXKSG2W6OKPZAEUQIPS7IYZER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ/#4NRW2RRQBPH6CB4X5XXCAI3A3XMYRHHZ" source="SUSE-SU"/>
    <description>
    The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5551/">CVE-2017-5551 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">CVE-2017-5551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021258">SUSE bug 1021258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/995968">SUSE bug 995968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5552" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5552">CVE-2017-5552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021195">SUSE bug 1021195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5578" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5578">CVE-2017-5578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021481">SUSE bug 1021481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5579" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5579">CVE-2017-5579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1021741">SUSE bug 1021741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022627">SUSE bug 1022627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5667" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5667">CVE-2017-5667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1022541">SUSE bug 1022541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5669" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5669" ref_url="https://www.suse.com/security/cve/CVE-2017-5669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
    <description>
    The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5669/">CVE-2017-5669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5669">CVE-2017-5669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026914">SUSE bug 1026914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102390">SUSE bug 1102390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2018:0779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-March/008124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2018:0821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-March/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1571-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2631-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005270.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7022982" ref_url="https://www.suse.com/support/kb/doc/?id=7022982" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU--1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQI57KB27Y3J7MHI7FNPSD5V2PXGUQOD/#XQI57KB27Y3J7MHI7FNPSD5V2PXGUQOD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOLD6T3YHL77L4FUBHAF3IBMTUEP7B4J/#JOLD6T3YHL77L4FUBHAF3IBMTUEP7B4J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6TPEZRAWPYRUJAPGQBIZBXVHVDV7BDDV/#6TPEZRAWPYRUJAPGQBIZBXVHVDV7BDDV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6Y2GA4ROXJPMDU2ENWE2UM6KW5I2Z7ZD/#6Y2GA4ROXJPMDU2ENWE2UM6KW5I2Z7ZD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/357MDHGAKQDD2S36TCURMQXS5BKF7A2Z/#357MDHGAKQDD2S36TCURMQXS5BKF7A2Z" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHTY26WCAT6QTEEB7JAO7N53HEOONACI/#EHTY26WCAT6QTEEB7JAO7N53HEOONACI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNM34X4DJVBP4PEGQLR7XSG5ZZXAJTG2/#QNM34X4DJVBP4PEGQLR7XSG5ZZXAJTG2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE/#TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WIL5NAJJPNZF3LRWF5OLMJ6WO4I6RD6/#3WIL5NAJJPNZF3LRWF5OLMJ6WO4I6RD6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0745-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XJY2NLMZ4HUGOBISN5XO74V52VOBRY4/#4XJY2NLMZ4HUGOBISN5XO74V52VOBRY4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF/#GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2K5LXDBYZTKPSPZMCP37K7L2YS4NJ7W/#R2K5LXDBYZTKPSPZMCP37K7L2YS4NJ7W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1631-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4VWJ3BB6JSQI7JH45Z34DX4JRL5GT6T4/#4VWJ3BB6JSQI7JH45Z34DX4JRL5GT6T4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TNNLUIWCTPW2UQNGH6RVS4HTZYS3BBWK/#TNNLUIWCTPW2UQNGH6RVS4HTZYS3BBWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3/#O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074741">SUSE bug 1074741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074919">SUSE bug 1074919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075007">SUSE bug 1075007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075262">SUSE bug 1075262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076115">SUSE bug 1076115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076372">SUSE bug 1076372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076606">SUSE bug 1076606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078353">SUSE bug 1078353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095735">SUSE bug 1095735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102517">SUSE bug 1102517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105108">SUSE bug 1105108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126516">SUSE bug 1126516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201457">SUSE bug 1201457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203236">SUSE bug 1203236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904451" comment="kernel-firmware-20200107-3.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ/#VVUXCLQ7WIXJFNYSB6YFSFQV3AE3BKOZ" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID000019229" ref_url="https://www.suse.com/support/kb/doc/?id=000019229" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="TID7023075" ref_url="https://www.suse.com/support/kb/doc/?id=7023075" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1212-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IDOTKMILRKOFD2ODQXJF3OOEYZ3EMR5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MOJKTUHVZFZADZQ6EYELCLEJ5BD766Q/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5753">CVE-2017-5753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075419">SUSE bug 1075419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075748">SUSE bug 1075748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1080039">SUSE bug 1080039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087084">SUSE bug 1087084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209547">SUSE bug 1209547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0552-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="TID000019122" ref_url="https://www.suse.com/support/kb/doc/?id=000019122" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022514" ref_url="https://www.suse.com/support/kb/doc/?id=7022514" source="SUSE-SU"/>
		<reference ref_id="TID7022531" ref_url="https://www.suse.com/support/kb/doc/?id=7022531" source="SUSE-SU"/>
		<reference ref_id="TID7022541" ref_url="https://www.suse.com/support/kb/doc/?id=7022541" source="SUSE-SU"/>
		<reference ref_id="TID7022548" ref_url="https://www.suse.com/support/kb/doc/?id=7022548" source="SUSE-SU"/>
		<reference ref_id="TID7022568" ref_url="https://www.suse.com/support/kb/doc/?id=7022568" source="SUSE-SU"/>
		<reference ref_id="TID7022569" ref_url="https://www.suse.com/support/kb/doc/?id=7022569" source="SUSE-SU"/>
		<reference ref_id="TID7022571" ref_url="https://www.suse.com/support/kb/doc/?id=7022571" source="SUSE-SU"/>
		<reference ref_id="TID7022572" ref_url="https://www.suse.com/support/kb/doc/?id=7022572" source="SUSE-SU"/>
		<reference ref_id="TID7022578" ref_url="https://www.suse.com/support/kb/doc/?id=7022578" source="SUSE-SU"/>
		<reference ref_id="TID7022579" ref_url="https://www.suse.com/support/kb/doc/?id=7022579" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6/#47VWN6YQVTJIK4KOIPOKDOUQNRHO3UO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6/#ZHXQ2V7OTLSNQH4TTBOC6U6FWIKLIWB6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU/#WVOVBKQUBBNJEMQZQRUPUMHFN6AWLXDU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX/#UDH4GC26SHCV4RBWDLH6XECWQIIC5KVX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5754">CVE-2017-5754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1068032">SUSE bug 1068032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074562">SUSE bug 1074562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074578">SUSE bug 1074578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075006">SUSE bug 1075006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075008">SUSE bug 1075008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087939">SUSE bug 1087939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089055">SUSE bug 1089055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5837">CVE-2017-5837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024076">SUSE bug 1024076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5838" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002792.html" source="SUSE-SU"/>
    <description>
    The gst_date_time_new_from_iso8601_string function in gst/gstdatetime.c in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a malformed datetime string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5838">CVE-2017-5838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024051">SUSE bug 1024051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 does not properly limit recursion, which allows remote attackers to cause a denial of service (stack overflow and crash) via vectors involving nested WAVEFORMATEX.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5839">CVE-2017-5839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024047">SUSE bug 1024047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The qtdemux_parse_samples function in gst/isomp4/qtdemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving the current stts index.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5840">CVE-2017-5840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024034">SUSE bug 1024034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving ncdt tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5841">CVE-2017-5841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024030">SUSE bug 1024030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
    <description>
    The html_context_handle_element function in gst/subparse/samiparse.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted SMI file, as demonstrated by OneNote_Manager.smi.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5842">CVE-2017-5842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024041">SUSE bug 1024041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) gst_mini_object_unref, (2) gst_tag_list_unref, and (3) gst_mxf_demux_update_essence_tracks functions in GStreamer before 1.10.3 allow remote attackers to cause a denial of service (crash) via vectors involving stream tags, as demonstrated by 02785736.mxf.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5843">CVE-2017-5843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024044">SUSE bug 1024044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
    <description>
    The gst_riff_create_audio_caps function in gst-libs/gst/riff/riff-media.c in gst-plugins-base in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (floating point exception and crash) via a crafted ASF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5844">CVE-2017-5844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024079">SUSE bug 1024079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002801.html" source="SUSE-SU"/>
    <description>
    The gst_avi_demux_parse_ncdt function in gst/avi/gstavidemux.c in gst-plugins-good in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via a ncdt sub-tag that "goes behind" the surrounding tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5845">CVE-2017-5845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024062">SUSE bug 1024062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5846" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846" source="SUSE CVE"/>
    <description>
    The gst_asf_demux_process_ext_stream_props function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer before 1.10.3 allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors related to the number of languages in a video file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5846">CVE-2017-5846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5847" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847" source="SUSE CVE"/>
    <description>
    The gst_asf_demux_process_ext_content_desc function in gst/asfdemux/gstasfdemux.c in gst-plugins-ugly in GStreamer allows remote attackers to cause a denial of service (out-of-bounds heap read) via vectors involving extended content descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5847">CVE-2017-5847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002790.html" source="SUSE-SU"/>
    <description>
    The gst_ps_demux_parse_psm function in gst/mpegdemux/gstmpegdemux.c in gst-plugins-bad in GStreamer allows remote attackers to cause a denial of service (invalid memory read and crash) via vectors involving PSM parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5848">CVE-2017-5848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023259">SUSE bug 1023259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024068">SUSE bug 1024068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881861" comment="gstreamer-1.16.2-1.53 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881865" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5856" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5856">CVE-2017-5856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023053">SUSE bug 1023053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024186">SUSE bug 1024186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5857" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5857">CVE-2017-5857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023073">SUSE bug 1023073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5897" ref_url="https://www.suse.com/security/cve/CVE-2017-5897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN/#ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H/#PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H" source="SUSE-SU"/>
    <description>
    The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-5897/">CVE-2017-5897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5897">CVE-2017-5897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023762">SUSE bug 1023762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0707-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5/#2DRN3D32GFDYFBOUDVFPRJRWN6TYFZJ5" source="SUSE-SU"/>
    <description>
    Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5898">CVE-2017-5898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1023907">SUSE bug 1023907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1024307">SUSE bug 1024307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5931" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931" source="SUSE CVE"/>
    <description>
    Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5931">CVE-2017-5931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024114">SUSE bug 1024114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5937" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
    <description>
    The util_format_is_pure_uint function in vrend_renderer.c in Virgil 3d project (aka virglrenderer) 0.6.0 and earlier allows local guest OS users to cause a denial of service (NULL pointer dereference) via a crafted VIRGL_CCMD_CLEAR command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5937">CVE-2017-5937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024232">SUSE bug 1024232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1041089">SUSE bug 1041089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5950" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003791.html" source="SUSE-SU"/>
    <description>
    The SingleDocParser::HandleNode function in yaml-cpp (aka LibYaml-C++) 0.5.3 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5950">CVE-2017-5950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1032144">SUSE bug 1032144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882406" comment="libyaml-cpp0_6-0.6.1-4.2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953">CVE-2017-5953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024724">SUSE bug 1024724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123143">SUSE bug 1123143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173534">SUSE bug 1173534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5957" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the vrend_decode_set_framebuffer_state function in vrend_decode.c in virglrenderer before 926b9b3460a48f6454d8bbe9e44313d86a65447f, as used in Quick Emulator (QEMU), allows a local guest users to cause a denial of service (application crash) via the "nr_cbufs" argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5957">CVE-2017-5957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024993">SUSE bug 1024993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5967" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5967" ref_url="https://www.suse.com/security/cve/CVE-2017-5967" source="SUSE CVE"/>
    <description>
    The time subsystem in the Linux kernel through 4.9.9, when CONFIG_TIMER_STATS is enabled, allows local users to discover real PID values (as distinguished from PID values inside a PID namespace) by reading the /proc/timer_list file, related to the print_timer function in kernel/time/timer_list.c and the __timer_stats_timer_set_start_info function in kernel/time/timer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5967/">CVE-2017-5967 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5967">CVE-2017-5967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025209">SUSE bug 1025209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5969" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document.  NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5969">CVE-2017-5969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1024989">SUSE bug 1024989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5972" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5972" ref_url="https://www.suse.com/security/cve/CVE-2017-5972" source="SUSE CVE"/>
    <description>
    The TCP stack in the Linux kernel 3.x does not properly implement a SYN cookie protection mechanism for the case of a fast network connection, which allows remote attackers to cause a denial of service (CPU consumption) by sending many TCP SYN packets, as demonstrated by an attack against the kernel-3.10.0 package in CentOS Linux 7. NOTE: third parties have been unable to discern any relationship between the GitHub Engineering finding and the Trigemini.c attack code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-5972/">CVE-2017-5972 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5972">CVE-2017-5972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026173">SUSE bug 1026173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5973" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-February/002669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5973">CVE-2017-5973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025109">SUSE bug 1025109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025188">SUSE bug 1025188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5987" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local OS guest privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors involving the transfer mode register during multi block transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5987">CVE-2017-5987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025311">SUSE bug 1025311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5993" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5993">CVE-2017-5993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025505">SUSE bug 1025505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-5994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5994" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5994">CVE-2017-5994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025507">SUSE bug 1025507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6001" ref_url="https://www.suse.com/security/cve/CVE-2017-6001" source="SUSE CVE"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.9.7 allows local users to gain privileges via a crafted application that makes concurrent perf_event_open system calls for moving a software group into a hardware context.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-6786.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6001/">CVE-2017-6001 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6001">CVE-2017-6001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1015160">SUSE bug 1015160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1025626">SUSE bug 1025626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    The compile_bracket_matchingpath function in pcre_jit_compile.c in PCRE through 8.x before revision 1680 (e.g., the PHP 7.1.1 bundled version) allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6004">CVE-2017-6004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025709">SUSE bug 1025709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191803">SUSE bug 1191803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193384">SUSE bug 1193384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6058" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058" source="SUSE CVE"/>
    <description>
    Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6058">CVE-2017-6058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025837">SUSE bug 1025837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6074" ref_url="https://www.suse.com/security/cve/CVE-2017-6074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="TID7018645" ref_url="https://www.suse.com/support/kb/doc/?id=7018645" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN/#ZCJVE2MEOOWP5HQROHL5VZ3DQ4SFBZYN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H/#PD5NFVFX6KVORZDNEZTHBV46E5OFTT6H" source="SUSE-SU"/>
    <description>
    The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6074/">CVE-2017-6074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6074">CVE-2017-6074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1026024">SUSE bug 1026024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6345" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6345" ref_url="https://www.suse.com/security/cve/CVE-2017-6345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6345/">CVE-2017-6345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6345">CVE-2017-6345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027190">SUSE bug 1027190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6348" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6348" ref_url="https://www.suse.com/security/cve/CVE-2017-6348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
    <description>
    The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6348/">CVE-2017-6348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6348">CVE-2017-6348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027178">SUSE bug 1027178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6349" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6349">CVE-2017-6349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027057">SUSE bug 1027057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350">CVE-2017-6350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027053">SUSE bug 1027053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6353" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6353" ref_url="https://www.suse.com/security/cve/CVE-2017-6353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY/#4LKB4K2PHJZ4HXCYAGRXG6YSPVEHMLTY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ/#53AU4WLWNJVGYTRR745YR4MG5H4LZMNQ" source="SUSE-SU"/>
    <description>
    net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6353/">CVE-2017-6353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6353">CVE-2017-6353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1025235">SUSE bug 1025235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027066">SUSE bug 1027066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6386" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-March/002738.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_OBJECT_VERTEX_ELEMENTS commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6386">CVE-2017-6386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027376">SUSE bug 1027376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6414" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
    <description>
    Memory leak in the vcard_apdu_new function in card_7816.c in libcacard before 2.5.3 allows local guest OS users to cause a denial of service (host memory consumption) via vectors related to allocating a new APDU object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6414">CVE-2017-6414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027514">SUSE bug 1027514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027570">SUSE bug 1027570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6419" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003864.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OSGZRM5ELLHC2VOALXXN4DFDXVER3465/#OSGZRM5ELLHC2VOALXXN4DFDXVER3465" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QQD6RQPWKLSLDYVFXICA4X5SCNO7VGHG/#QQD6RQPWKLSLDYVFXICA4X5SCNO7VGHG" source="SUSE-SU"/>
    <description>
    mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6419">CVE-2017-6419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1052449">SUSE bug 1052449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083915">SUSE bug 1083915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492057" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6505" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-April/002822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ONQVNISDCITSIAWNOLREHPRVMQ3LZB24/#ONQVNISDCITSIAWNOLREHPRVMQ3LZB24" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    The ohci_service_ed_list function in hw/usb/hcd-ohci.c in QEMU (aka Quick Emulator) before 2.9.0 allows local guest OS users to cause a denial of service (infinite loop) via vectors involving the number of link endpoint list descriptors, a different vulnerability than CVE-2017-9330.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6505">CVE-2017-6505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1028184">SUSE bug 1028184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1028235">SUSE bug 1028235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6507" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:0969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W4MCOQTHC3OQBGCQ3W5H2XYAQK2OEJQN/#W4MCOQTHC3OQBGCQ3W5H2XYAQK2OEJQN" source="SUSE-SU"/>
    <description>
    An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6507">CVE-2017-6507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029696">SUSE bug 1029696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904427" comment="apparmor-parser-2.13.4-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6874" ref_url="https://www.suse.com/security/cve/CVE-2017-6874" source="SUSE CVE"/>
    <description>
    Race condition in kernel/ucount.c in the Linux kernel through 4.10.2 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls that leverage certain decrement behavior that causes incorrect interaction between put_ucounts and get_ucounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6874/">CVE-2017-6874 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6874">CVE-2017-6874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029314">SUSE bug 1029314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6891" ref_url="https://www.suse.com/security/cve/CVE-2017-6891" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012726.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NAQJ4OPIS2LGLIAOG5Z4TFCGM3RK3UF/#2NAQJ4OPIS2LGLIAOG5Z4TFCGM3RK3UF" source="SUSE-SU"/>
    <description>
    Two errors in the "asn1_find_node()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6891/">CVE-2017-6891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6891">CVE-2017-6891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1040621">SUSE bug 1040621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049210">SUSE bug 1049210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009655543" comment="libgnutls30 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334127" comment="libtasn1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336122" comment="libtasn1-6 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20176951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-6951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-6951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-6951" ref_url="https://www.suse.com/security/cve/CVE-2017-6951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the "dead" type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6951/">CVE-2017-6951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6951">CVE-2017-6951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1029850">SUSE bug 1029850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030593">SUSE bug 1030593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    libpcre1 in PCRE 8.40 and libpcre2 in PCRE2 10.23 allow remote attackers to cause a denial of service (segmentation violation for read access, and application crash) by triggering an invalid Unicode property lookup.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7186">CVE-2017-7186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030066">SUSE bug 1030066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037164">SUSE bug 1037164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882277" comment="libpcre2-8-0-10.31-1.14 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7187" ref_url="https://www.suse.com/security/cve/CVE-2017-7187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7187/">CVE-2017-7187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7187">CVE-2017-7187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1027179">SUSE bug 1027179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030213">SUSE bug 1030213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    The _pcre32_xclass function in pcre_xclass.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (invalid memory read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7244">CVE-2017-7244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030807">SUSE bug 1030807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7245" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 4) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7245">CVE-2017-7245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7246" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in the pcre32_copy_substring function in pcre_get.c in libpcre1 in PCRE 8.40 allows remote attackers to cause a denial of service (WRITE of size 268) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7246">CVE-2017-7246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030803">SUSE bug 1030803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1030805">SUSE bug 1030805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882267" comment="libpcre1-8.41-4.20 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7273" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7273" ref_url="https://www.suse.com/security/cve/CVE-2017-7273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005067.html" source="SUSE-SU"/>
    <description>
    The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7273/">CVE-2017-7273 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7273">CVE-2017-7273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1031240">SUSE bug 1031240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7435" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQ76IXPMTSLLERA7ZTGLPMQXTZ7CQQ43/#OQ76IXPMTSLLERA7ZTGLPMQXTZ7CQQ43" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCXG2DS7FV6SOBEJ4CQK7KYV7S6TW2UR/#DCXG2DS7FV6SOBEJ4CQK7KYV7S6TW2UR" source="SUSE-SU"/>
    <description>
    In libzypp before 20170803 it was possible to add unsigned YUM repositories without warning to the user that could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7435">CVE-2017-7435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1009127">SUSE bug 1009127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904480" comment="libzypp-17.25.6-3.28.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7436" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQ76IXPMTSLLERA7ZTGLPMQXTZ7CQQ43/#OQ76IXPMTSLLERA7ZTGLPMQXTZ7CQQ43" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCXG2DS7FV6SOBEJ4CQK7KYV7S6TW2UR/#DCXG2DS7FV6SOBEJ4CQK7KYV7S6TW2UR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDI7VJDGZBJXD46JDLFXAMBZSJWUYSKP/#RDI7VJDGZBJXD46JDLFXAMBZSJWUYSKP" source="SUSE-SU"/>
    <description>
    In libzypp before 20170803 it was possible to retrieve unsigned packages without a warning to the user which could lead to man in the middle or malicious servers to inject malicious RPM packages into a users system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7436">CVE-2017-7436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1008325">SUSE bug 1008325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1009127">SUSE bug 1009127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904480" comment="libzypp-17.25.6-3.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904502" comment="zypper-1.14.42-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904503" comment="zypper-needs-restarting-1.14.42-3.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468" source="SUSE CVE"/>
    <description>
    In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7468">CVE-2017-7468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033413">SUSE bug 1033413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1033442">SUSE bug 1033442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042181">SUSE bug 1042181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991389">SUSE bug 991389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7471" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7471">CVE-2017-7471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034866">SUSE bug 1034866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1034990">SUSE bug 1034990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7472" ref_url="https://www.suse.com/security/cve/CVE-2017-7472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
    <description>
    The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7472/">CVE-2017-7472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7472">CVE-2017-7472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034862">SUSE bug 1034862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7475" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
    <description>
    Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7475">CVE-2017-7475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1036789">SUSE bug 1036789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881737" comment="libcairo2-1.16.0-1.55 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7476" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476" source="SUSE CVE"/>
    <description>
    Gnulib before 2017-04-26 has a heap-based buffer overflow with the TZ environment variable. The error is in the save_abbr function in time_rz.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-17"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7476">CVE-2017-7476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1036636">SUSE bug 1036636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037124">SUSE bug 1037124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037125">SUSE bug 1037125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037142">SUSE bug 1037142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009896051" comment="coreutils-8.29-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655543" comment="libgnutls30 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7482" ref_url="https://www.suse.com/security/cve/CVE-2017-7482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-7482/">CVE-2017-7482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7482">CVE-2017-7482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046107">SUSE bug 1046107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7487" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7487" ref_url="https://www.suse.com/security/cve/CVE-2017-7487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7487/">CVE-2017-7487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7487">CVE-2017-7487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038879">SUSE bug 1038879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038883">SUSE bug 1038883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038981">SUSE bug 1038981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038982">SUSE bug 1038982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1072204">SUSE bug 1072204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/870618">SUSE bug 870618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7493" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7493">CVE-2017-7493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039495">SUSE bug 1039495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7495" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7495" ref_url="https://www.suse.com/security/cve/CVE-2017-7495" source="SUSE CVE"/>
    <description>
    fs/ext4/inode.c in the Linux kernel before 4.6.2, when ext4 data=ordered mode is used, mishandles a needs-flushing-before-commit list, which allows local users to obtain sensitive information from other users' files in opportunistic circumstances by waiting for a hardware reset, creating a new file, making write system calls, and reading this file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7495/">CVE-2017-7495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7495">CVE-2017-7495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039010">SUSE bug 1039010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QWVKKZCPUBQG6H4SOIGZ7R4FBWUGBHDQ/#QWVKKZCPUBQG6H4SOIGZ7R4FBWUGBHDQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EDAU2NJ32A323DXAMQD7OBYDEOMFRKX/#2EDAU2NJ32A323DXAMQD7OBYDEOMFRKX" source="SUSE-SU"/>
    <description>
    It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7500">CVE-2017-7500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135195">SUSE bug 1135195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/964063">SUSE bug 964063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897606" comment="rpm-4.14.1-20.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7501" ref_url="https://www.suse.com/security/cve/CVE-2017-7501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3884-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005393.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EDAU2NJ32A323DXAMQD7OBYDEOMFRKX/#2EDAU2NJ32A323DXAMQD7OBYDEOMFRKX" source="SUSE-SU"/>
    <description>
    It was found that versions of rpm before 4.13.0.2 use temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7501/">CVE-2017-7501 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7501">CVE-2017-7501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119217">SUSE bug 1119217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135195">SUSE bug 1135195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/943457">SUSE bug 943457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009347616" comment="rpm is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7518" ref_url="https://www.suse.com/security/cve/CVE-2017-7518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KW47RCHHHHDDR7LCVS6ZII5VWGZMWXVK/#KW47RCHHHHDDR7LCVS6ZII5VWGZMWXVK" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7518/">CVE-2017-7518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7518">CVE-2017-7518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045922">SUSE bug 1045922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7526">CVE-2017-7526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046607">SUSE bug 1046607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047462">SUSE bug 1047462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123792">SUSE bug 1123792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK/#JUR4JGJYESLTC7RDIOY2YLFJ2BM6INRK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI/#CYYVH5QN4AXO6QRCXNNNBJTZ5ITWPYYI" source="SUSE-SU"/>
    <description>
    The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7542">CVE-2017-7542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049882">SUSE bug 1049882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7555" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003801.html" source="SUSE-SU"/>
    <description>
    Augeas versions up to and including 1.8.0 are vulnerable to heap-based buffer overflow due to improper handling of escaped strings. Attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7555">CVE-2017-7555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1054171">SUSE bug 1054171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881701" comment="augeas-1.10.1-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881703" comment="augeas-lenses-1.10.1-1.11 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881704" comment="libaugeas0-1.10.1-1.11 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    The handle_gnu_hash function in readelf.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7607">CVE-2017-7607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033084">SUSE bug 1033084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    The ebl_object_note_type_name function in eblobjnotetypename.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7608">CVE-2017-7608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033085">SUSE bug 1033085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    elf_compress.c in elfutils 0.168 does not validate the zlib compression factor, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7609">CVE-2017-7609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033086">SUSE bug 1033086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    The check_group function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7610">CVE-2017-7610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033087">SUSE bug 1033087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    The check_symtab_shndx function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7611">CVE-2017-7611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033088">SUSE bug 1033088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    The check_sysv_hash function in elflint.c in elfutils 0.168 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7612">CVE-2017-7612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033089">SUSE bug 1033089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    elflint.c in elfutils 0.168 does not validate the number of sections and the number of segments, which allows remote attackers to cause a denial of service (memory consumption) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7613">CVE-2017-7613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033090">SUSE bug 1033090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7618" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7618" ref_url="https://www.suse.com/security/cve/CVE-2017-7618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW/#Y5XA3CLIM5GZTSS4UJWBZNQ4VSK43EYW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1215-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU/#3ZY7NWS35KQP4O7EZNRNLOOYD4L775HU" source="SUSE-SU"/>
    <description>
    crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7618/">CVE-2017-7618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7618">CVE-2017-7618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1033340">SUSE bug 1033340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7645" ref_url="https://www.suse.com/security/cve/CVE-2017-7645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The NFSv2/NFSv3 server in the nfsd subsystem in the Linux kernel through 4.10.11 allows remote attackers to cause a denial of service (system crash) via a long RPC reply, related to net/sunrpc/svc.c, fs/nfsd/nfs3xdr.c, and fs/nfsd/nfsxdr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7645/">CVE-2017-7645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7645">CVE-2017-7645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034670">SUSE bug 1034670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036741">SUSE bug 1036741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046191">SUSE bug 1046191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003036.html" source="SUSE-SU"/>
    <description>
    GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7869">CVE-2017-7869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034173">SUSE bug 1034173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038337">SUSE bug 1038337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1049210">SUSE bug 1049210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149679">SUSE bug 1149679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7874" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7874" ref_url="https://www.suse.com/security/cve/CVE-2017-7874" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7874/">CVE-2017-7874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-7874">CVE-2017-7874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034330">SUSE bug 1034330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/493158">SUSE bug 493158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7889" ref_url="https://www.suse.com/security/cve/CVE-2017-7889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The mm subsystem in the Linux kernel through 3.2 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7889/">CVE-2017-7889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7889">CVE-2017-7889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034405">SUSE bug 1034405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7960" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5/#76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5" source="SUSE-SU"/>
    <description>
    The cr_input_new_from_uri function in cr-input.c in libcroco 0.6.11 and 0.6.12 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7960">CVE-2017-7960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034481">SUSE bug 1034481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882062" comment="libcroco-0_6-3-0.6.13-1.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7961" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5/#76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** The cr_tknzr_parse_rgb function in cr-tknzr.c in libcroco 0.6.11 and 0.6.12 has an "outside the range of representable values of type long" undefined behavior issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted CSS file. NOTE: third-party analysis reports "This is not a security issue in my view. The conversion surely is truncating the double into a long value, but there is no impact as the value is one of the RGB components."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7961">CVE-2017-7961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034482">SUSE bug 1034482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132069">SUSE bug 1132069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882062" comment="libcroco-0_6-3-0.6.13-1.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20177980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-7980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-7980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-7980" ref_url="https://www.suse.com/security/cve/CVE-2017-7980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Heap-based buffer overflow in Cirrus CLGD 54xx VGA Emulator in Quick Emulator (Qemu) 2.8 and earlier allows local guest OS users to execute arbitrary code or cause a denial of service (crash) via vectors related to a VNC client updating its display after a VGA operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7980/">CVE-2017-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7980">CVE-2017-7980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035406">SUSE bug 1035406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035483">SUSE bug 1035483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GV744YN6XWG4LRCRFJBPUNKFXYF2YKJC/#GV744YN6XWG4LRCRFJBPUNKFXYF2YKJC" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-03-24 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_decoder_parse_charstrings function in psaux/t1decode.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8105">CVE-2017-8105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8106" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8106" ref_url="https://www.suse.com/security/cve/CVE-2017-8106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
    <description>
    The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8106/">CVE-2017-8106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8106">CVE-2017-8106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1035877">SUSE bug 1035877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8112" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8112">CVE-2017-8112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1036211">SUSE bug 1036211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036470">SUSE bug 1036470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GV744YN6XWG4LRCRFJBPUNKFXYF2YKJC/#GV744YN6XWG4LRCRFJBPUNKFXYF2YKJC" source="SUSE-SU"/>
    <description>
    FreeType 2 before 2017-03-26 has an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8287">CVE-2017-8287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1034186">SUSE bug 1034186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1035807">SUSE bug 1035807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1036457">SUSE bug 1036457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079459">SUSE bug 1079459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMR5V6EH656GKCNXCGNOXX5MUWUMX5AR/#SMR5V6EH656GKCNXCGNOXX5MUWUMX5AR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LF3TGTQVMKYS37UYWRQR2TRGZPJQXK4I/#LF3TGTQVMKYS37UYWRQR2TRGZPJQXK4I" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8309">CVE-2017-8309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037242">SUSE bug 1037242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037243">SUSE bug 1037243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8379" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8379">CVE-2017-8379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037334">SUSE bug 1037334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8380" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    Buffer overflow in the "megasas_mmio_write" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8380">CVE-2017-8380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037336">SUSE bug 1037336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KIGUM3WEFSDH5FSKVZN2GRB55FUVCJ7C/#KIGUM3WEFSDH5FSKVZN2GRB55FUVCJ7C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LTC4KPRY3SGGIAA5UD2P43DC5YVUZQ3/#2LTC4KPRY3SGGIAA5UD2P43DC5YVUZQ3" source="SUSE-SU"/>
    <description>
    rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8779">CVE-2017-8779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037559">SUSE bug 1037559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037930">SUSE bug 1037930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101814">SUSE bug 1101814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/798028">SUSE bug 798028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887076" comment="rpcbind-0.2.3-5.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8786" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8786" ref_url="https://www.suse.com/security/cve/CVE-2017-8786" source="SUSE CVE"/>
    <description>
    pcre2test.c in PCRE2 10.23 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8786/">CVE-2017-8786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8786">CVE-2017-8786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1036942">SUSE bug 1036942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037718">SUSE bug 1037718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882277" comment="libpcre2-8-0-10.31-1.14 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8797" ref_url="https://www.suse.com/security/cve/CVE-2017-8797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
    <description>
    The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8797/">CVE-2017-8797 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8797">CVE-2017-8797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046202">SUSE bug 1046202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1046206">SUSE bug 1046206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8813" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8813" ref_url="https://www.suse.com/security/cve/CVE-2017-8813" source="SUSE CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2017-8831.  Reason: This candidate is a duplicate of CVE-2017-8831.  A typo caused the wrong ID to be used.  Notes: All CVE users should reference CVE-2017-8831 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8813/">CVE-2017-8813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2017-8813">CVE-2017-8813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070849">SUSE bug 1070849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
    <description>
    The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8816">CVE-2017-8816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069226">SUSE bug 1069226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003607.html" source="SUSE-SU"/>
    <description>
    The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8817">CVE-2017-8817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069222">SUSE bug 1069222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818" source="SUSE CVE"/>
    <description>
    curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8818">CVE-2017-8818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1069714">SUSE bug 1069714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003629.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX/#4UYJRYWN3YIKVO45AOJQMXXWEWZ76QPX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:3359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y/#KNOTZX2CMPWZWZ2GTPQ2RA6T3XMG2V5Y" source="SUSE-SU"/>
    <description>
    The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8824">CVE-2017-8824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070771">SUSE bug 1070771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076734">SUSE bug 1076734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092904">SUSE bug 1092904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-December/003488.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5W57DNUZVJT7O3VCW5IIFG273VXFPMF/#S5W57DNUZVJT7O3VCW5IIFG273VXFPMF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LGI6QYI3WSJSQPRZJQFZKDW7QDTCDEN2/#LGI6QYI3WSJSQPRZJQFZKDW7QDTCDEN2" source="SUSE-SU"/>
    <description>
    The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8831">CVE-2017-8831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1037994">SUSE bug 1037994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061936">SUSE bug 1061936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8834" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5/#76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ADX7FL43GXKSISV5OKCBKBORP4TJ5JPA/" source="SUSE-SU"/>
    <description>
    The cr_tknzr_parse_comment function in cr-tknzr.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (memory allocation error) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8834">CVE-2017-8834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882062" comment="libcroco-0_6-3-0.6.13-1.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8871" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1575-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5/#76EOG6HNTK3ERLOORSDGBZCUNZEU2EA5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ADX7FL43GXKSISV5OKCBKBORP4TJ5JPA/" source="SUSE-SU"/>
    <description>
    The cr_parser_parse_selector_core function in cr-parser.c in libcroco 0.6.12 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted CSS file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8871">CVE-2017-8871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043898">SUSE bug 1043898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043899">SUSE bug 1043899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882062" comment="libcroco-0_6-3-0.6.13-1.26 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8872" ref_url="https://www.suse.com/security/cve/CVE-2017-8872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    The htmlParseTryOrFinish function in HTMLparser.c in libxml2 2.9.4 allows attackers to cause a denial of service (buffer over-read) or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8872/">CVE-2017-8872 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8872">CVE-2017-8872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038444">SUSE bug 1038444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009337751" comment="libxml2-2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337752" comment="libxml2-tools is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20178890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-8890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-8890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-8890" ref_url="https://www.suse.com/security/cve/CVE-2017-8890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8890/">CVE-2017-8890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8890">CVE-2017-8890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038564">SUSE bug 1038564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content-&gt;type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-&gt;prefix is appended to buf (if it actually fits) whereupon (ii) content-&gt;name is written to the buffer. However, the check for whether the content-&gt;name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9047">CVE-2017-9047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039657">SUSE bug 1039657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 &lt; size. This vulnerability causes programs that use libxml2, such as PHP, to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9048">CVE-2017-9048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039658">SUSE bug 1039658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-May/002931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9049">CVE-2017-9049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039063">SUSE bug 1039063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039064">SUSE bug 1039064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039066">SUSE bug 1039066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039659">SUSE bug 1039659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039661">SUSE bug 1039661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069690">SUSE bug 1069690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123919">SUSE bug 1123919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9074" ref_url="https://www.suse.com/security/cve/CVE-2017-9074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9074/">CVE-2017-9074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9074">CVE-2017-9074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1039882">SUSE bug 1039882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9075" ref_url="https://www.suse.com/security/cve/CVE-2017-9075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9075/">CVE-2017-9075 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9075">CVE-2017-9075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039883">SUSE bug 1039883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9076" ref_url="https://www.suse.com/security/cve/CVE-2017-9076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9076/">CVE-2017-9076 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9076">CVE-2017-9076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1039885">SUSE bug 1039885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1051906">SUSE bug 1051906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9077" ref_url="https://www.suse.com/security/cve/CVE-2017-9077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1513-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA/#OJPCJK74NZCBK4RODZ6N44CRQEQUWPUA" source="SUSE-SU"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9077/">CVE-2017-9077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9077">CVE-2017-9077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038544">SUSE bug 1038544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1040069">SUSE bug 1040069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042364">SUSE bug 1042364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9227" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9227" ref_url="https://www.suse.com/security/cve/CVE-2017-9227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002994.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg-&gt;dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-31"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9227/">CVE-2017-9227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9227">CVE-2017-9227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1040883">SUSE bug 1040883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044976">SUSE bug 1044976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009348236" comment="libruby2_5-2_5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348228" comment="ruby2.5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348239" comment="ruby2.5-stdlib is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006536.html" source="SUSE-SU"/>
    <description>
    XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9233">CVE-2017-9233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1030296">SUSE bug 1030296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1047236">SUSE bug 1047236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1073350">SUSE bug 1073350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123115">SUSE bug 1123115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/983216">SUSE bug 983216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9242" ref_url="https://www.suse.com/security/cve/CVE-2017-9242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP/#P2HNEQKNZE2RG4SRLNOORHC25EUGVNTP" source="SUSE-SU"/>
    <description>
    The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9242/">CVE-2017-9242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9242">CVE-2017-9242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1041431">SUSE bug 1041431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042892">SUSE bug 1042892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9269" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-September/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<reference ref_id="TID000018998" ref_url="https://www.suse.com/support/kb/doc/?id=000018998" source="SUSE-SU"/>
		<reference ref_id="TID7021171" ref_url="https://www.suse.com/support/kb/doc/?id=7021171" source="SUSE-SU"/>
		<reference ref_id="TID7021201" ref_url="https://www.suse.com/support/kb/doc/?id=7021201" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OQ76IXPMTSLLERA7ZTGLPMQXTZ7CQQ43/#OQ76IXPMTSLLERA7ZTGLPMQXTZ7CQQ43" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2335-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCXG2DS7FV6SOBEJ4CQK7KYV7S6TW2UR/#DCXG2DS7FV6SOBEJ4CQK7KYV7S6TW2UR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXWDNGS7WA5EKGYYSESAPSWC6QAAJST3/#VXWDNGS7WA5EKGYYSESAPSWC6QAAJST3" source="SUSE-SU"/>
    <description>
    In libzypp before August 2018 GPG keys attached to YUM repositories were not correctly pinned, allowing malicious repository mirrors to silently downgrade to unsigned repositories with potential malicious content.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9269">CVE-2017-9269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1038984">SUSE bug 1038984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904480" comment="libzypp-17.25.6-3.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904502" comment="zypper-1.14.42-3.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904503" comment="zypper-needs-restarting-1.14.42-3.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9271" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:21-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035640.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FB5G3FIS4OQH3FX723SLMBOC4P37HKHV/" source="SUSE-SU"/>
    <description>
    The commandline package update tool zypper writes HTTP proxy credentials into its logfile, allowing local attackers to gain access to proxies used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9271">CVE-2017-9271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1050625">SUSE bug 1050625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904480" comment="libzypp-17.25.6-3.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009373564" comment="zypper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654588" comment="zypper-needs-restarting is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-June/002992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1742-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMR5V6EH656GKCNXCGNOXX5MUWUMX5AR/#SMR5V6EH656GKCNXCGNOXX5MUWUMX5AR" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1826-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LF3TGTQVMKYS37UYWRQR2TRGZPJQXK4I/#LF3TGTQVMKYS37UYWRQR2TRGZPJQXK4I" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9330">CVE-2017-9330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1042159">SUSE bug 1042159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1042160">SUSE bug 1042160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043157">SUSE bug 1043157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-October/003289.html" source="SUSE-SU"/>
    <description>
    In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9445">CVE-2017-9445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045290">SUSE bug 1045290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1063249">SUSE bug 1063249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9502" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502" source="SUSE CVE"/>
    <description>
    In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9502">CVE-2017-9502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1044243">SUSE bug 1044243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9503" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-July/003016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2017:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003413.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:1872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN/#7XMS3TZG4TGPXHU4UGQT3AV4WTRA3LLN" source="SUSE-SU"/>
    <description>
    QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9503">CVE-2017-9503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043296">SUSE bug 1043296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043297">SUSE bug 1043297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1043312">SUSE bug 1043312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9524" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2017:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2017-November/003376.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2017:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR/#NIVAYUS4Z3IDRS3LK2TACYUZB2ORNQTR" source="SUSE-SU"/>
    <description>
    The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9524">CVE-2017-9524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1043808">SUSE bug 1043808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9614" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9614" ref_url="https://www.suse.com/security/cve/CVE-2017-9614" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** The fill_input_buffer function in jdatasrc.c in libjpeg-turbo 1.5.1 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted jpg file. NOTE: Maintainer asserts the issue is due to a bug in downstream code caused by misuse of the libjpeg API.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2017-9614/">CVE-2017-9614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9614">CVE-2017-9614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1050231">SUSE bug 1050231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9814" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007144.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EGQASUKO2VHZ55PM65YQMIIXQ5QTRS3R/#EGQASUKO2VHZ55PM65YQMIIXQ5QTRS3R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2ZFWT4IIM2TWOMRFGKHBQTXHZNQL3TI/" source="SUSE-SU"/>
    <description>
    cairo-truetype-subset.c in cairo 1.15.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) because of mishandling of an unexpected malloc(0) call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9814">CVE-2017-9814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1049092">SUSE bug 1049092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881737" comment="libcairo2-1.16.0-1.55 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9984" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9984" ref_url="https://www.suse.com/security/cve/CVE-2017-9984" source="SUSE CVE"/>
    <description>
    The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9984/">CVE-2017-9984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9984">CVE-2017-9984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046599">SUSE bug 1046599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/187396">SUSE bug 187396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9985" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9985" ref_url="https://www.suse.com/security/cve/CVE-2017-9985" source="SUSE CVE"/>
    <description>
    The snd_msndmidi_input_read function in sound/isa/msnd/msnd_midi.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9985/">CVE-2017-9985 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9985">CVE-2017-9985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046601">SUSE bug 1046601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20179986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-9986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-9986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9986" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-9986" ref_url="https://www.suse.com/security/cve/CVE-2017-9986" source="SUSE CVE"/>
    <description>
    The intr function in sound/oss/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9986/">CVE-2017-9986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-9986">CVE-2017-9986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1046600">SUSE bug 1046600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2452-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2122-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K44EEDKDT6DYRZD3RRBBFW356RIIETXT/#K44EEDKDT6DYRZD3RRBBFW356RIIETXT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6TJA2LGC65AB5GZVV7A5YTA2H6TGRDAX/#6TJA2LGC65AB5GZVV7A5YTA2H6TGRDAX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVOHMMYUB4EBVJNCM6KS54JBQFLRIHPI/#PVOHMMYUB4EBVJNCM6KS54JBQFLRIHPI" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0495">CVE-2018-0495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097410">SUSE bug 1097410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2431-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZCXF77SNICMB2C5RLURYGDIGQBGRWEE/#OZCXF77SNICMB2C5RLURYGDIGQBGRWEE" source="SUSE-SU"/>
    <description>
    Curl_smtp_escape_eob in lib/smtp.c in curl 7.54.1 to and including curl 7.60.0 has a heap-based buffer overflow that might be exploitable by an attacker who can control the data that curl transmits over SMTP with certain settings (i.e., use of a nonstandard --limit-rate argument or CURLOPT_BUFFERSIZE value).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0500">CVE-2018-0500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099793">SUSE bug 1099793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1887-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LXQB6RHQJIVOORGSWZAD6OVXFA3RULPE/#LXQB6RHQJIVOORGSWZAD6OVXFA3RULPE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F3ZAGM4A5HVGKFQM74NZZFR6YOSMVC6H/#F3ZAGM4A5HVGKFQM74NZZFR6YOSMVC6H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UWGYNDKJ6PICOJ32FEKD76F4JXFJEKHI/#UWGYNDKJ6PICOJ32FEKD76F4JXFJEKHI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2667-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FCDZ7GLSL23WT22IQU4KISWM7XBY5UO2/#FCDZ7GLSL23WT22IQU4KISWM7XBY5UO2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ/#WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2816-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LYUIV6EYNJ3355RPQTTDUGSOYYXRGIJA/#LYUIV6EYNJ3355RPQTTDUGSOYYXRGIJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L6GR7U6TGFSNVTN2OORBDADTDNGZTYEM/#L6GR7U6TGFSNVTN2OORBDADTDNGZTYEM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5K3CSNKQ5KLBKFPD3CPU2B7TX2ESVCUN/#5K3CSNKQ5KLBKFPD3CPU2B7TX2ESVCUN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI/#KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI" source="SUSE-SU"/>
    <description>
    During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0732">CVE-2018-0732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077628">SUSE bug 1077628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097158">SUSE bug 1097158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099502">SUSE bug 1099502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106692">SUSE bug 1106692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110163">SUSE bug 1110163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112097">SUSE bug 1112097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3964-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5DLYYXYOD3Y2CTWTWBAIZE2CVLVVOGR/#O5DLYYXYOD3Y2CTWTWBAIZE2CVLVVOGR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3903-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33ZHM3NJ5DWLZFFD5BEPGTEBVQR7TL5H/#33ZHM3NJ5DWLZFFD5BEPGTEBVQR7TL5H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RP4YGFIZ2DT67O24SFMUGKHPDZE2YQ6E/#RP4YGFIZ2DT67O24SFMUGKHPDZE2YQ6E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY/#J4BMNRK7ZVDGHSZAJJ4O24DNPDEMLYIY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TSUMEMN7UGDKZYOYYDERMMDEYTAE4KOD/#TSUMEMN7UGDKZYOYYDERMMDEYTAE4KOD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCR24YF2JL7BUZULCM3J6PO547A2FBEH/#MCR24YF2JL7BUZULCM3J6PO547A2FBEH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN/#TTCAAVZAMA2OKJYY5RKTV5VCZWZ5Z2EN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI/#TEDLOHSLOHZ36RTEAODDXPLT3YMQBGBI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1547-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLQFCLW7556SZJCWGWKR74FS7FGGTK7J/#YLQFCLW7556SZJCWGWKR74FS7FGGTK7J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN/#RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN" source="SUSE-SU"/>
    <description>
    The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0734">CVE-2018-0734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113652">SUSE bug 1113652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113742">SUSE bug 1113742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122212">SUSE bug 1122212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148697">SUSE bug 1148697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3945-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183945-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3890-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5DLYYXYOD3Y2CTWTWBAIZE2CVLVVOGR/#O5DLYYXYOD3Y2CTWTWBAIZE2CVLVVOGR" source="SUSE-SU"/>
    <description>
    The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0735">CVE-2018-0735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113651">SUSE bug 1113651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2928-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ/#WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2957-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P274BXIHSGDJS6M2S4OFQ5HJMFD2PM55/#P274BXIHSGDJS6M2S4OFQ5HJMFD2PM55" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI/#KFC7X2UNSP2WXTALHPX2AM5EANDJNTDI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIAYIHJLDAY2NLW33V5MTK3K22WFL3KN/#HIAYIHJLDAY2NLW33V5MTK3K22WFL3KN" source="SUSE-SU"/>
    <description>
    The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0737">CVE-2018-0737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089039">SUSE bug 1089039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089041">SUSE bug 1089041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089044">SUSE bug 1089044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089045">SUSE bug 1089045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123780">SUSE bug 1123780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20180739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-0739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-0739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2534-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182534-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006535.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1057-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C/#MLFP43VCYBFTSZUBC5JVSDITYRWTNN5C" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TB7QFJY4AJ4QZ5FMCLM4J6VZVT363YSH/#TB7QFJY4AJ4QZ5FMCLM4J6VZVT363YSH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKPQ3YXL5ZVJM4OCSADUC6JYCCIR6EIR/#TKPQ3YXL5ZVJM4OCSADUC6JYCCIR6EIR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB/#UNBLNDQ3K45QI6KFSQ2UZSBOVQ6QHQQB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2524-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3/#O6Y2Q53SARM33ZNDBTJD7HGXN4LJY3W3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ/#WVNVGC7M6N7O4J65Z6CCM5OGFL4GWFDZ" source="SUSE-SU"/>
    <description>
    Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-0739">CVE-2018-0739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087102">SUSE bug 1087102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089997">SUSE bug 1089997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094291">SUSE bug 1094291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108542">SUSE bug 1108542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF/#JJS3XXDA4SHQTNPUFBZSZ5XHKSMTGGOF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000001">CVE-2018-1000001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074293">SUSE bug 1074293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099047">SUSE bug 1099047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2018-February/007939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE/#TBPHSNBEYKQGP3AGWJUUS3K6HJEQZTZE" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000004">CVE-2018-1000004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076017">SUSE bug 1076017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091815">SUSE bug 1091815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005" source="SUSE CVE"/>
    <description>
    libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000005">CVE-2018-1000005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076360">SUSE bug 1076360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003634.html" source="SUSE-SU"/>
    <description>
    libcurl 7.1 through 7.57.0 might accidentally leak authentication data to third parties. When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value. Sending the same set of headers to subsequent hosts is in particular a problem for applications that pass on custom `Authorization:` headers, as this header often contains privacy sensitive information or data that could allow others to impersonate the libcurl-using client's request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000007">CVE-2018-1000007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1077001">SUSE bug 1077001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145903">SUSE bug 1145903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185551">SUSE bug 1185551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192797">SUSE bug 1192797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000073">CVE-2018-1000073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082007">SUSE bug 1082007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000074">CVE-2018-1000074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082008">SUSE bug 1082008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175764">SUSE bug 1175764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000075">CVE-2018-1000075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082014">SUSE bug 1082014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000076">CVE-2018-1000076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082009">SUSE bug 1082009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000077">CVE-2018-1000077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082010">SUSE bug 1082010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183937">SUSE bug 1183937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000078">CVE-2018-1000078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082011">SUSE bug 1082011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000079">CVE-2018-1000079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082058">SUSE bug 1082058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
    <description>
    A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000120">CVE-2018-1000120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084521">SUSE bug 1084521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000121">CVE-2018-1000121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084524">SUSE bug 1084524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085215">SUSE bug 1085215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0769-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20180769-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004059.html" source="SUSE-SU"/>
    <description>
    A buffer over-read exists in curl 7.20.0 to and including curl 7.58.0 in the RTSP+RTP handling code that allows an attacker to cause a denial of service or information leakage
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000122">CVE-2018-1000122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084532">SUSE bug 1084532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101811">SUSE bug 1101811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112526">SUSE bug 1112526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000135" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5HHHP6HRC27GJXSH33SJTDNWTSVTWFT/#C5HHHP6HRC27GJXSH33SJTDNWTSVTWFT" source="SUSE-SU"/>
    <description>
    GNOME NetworkManager version 1.10.2 and earlier contains a Information Exposure (CWE-200) vulnerability in DNS resolver that can result in Private DNS queries leaked to local network's DNS servers, while on VPN. This vulnerability appears to have been fixed in Some Ubuntu 16.04 packages were fixed, but later updates removed the fix. cf. https://bugs.launchpad.net/ubuntu/+bug/1754671 an upstream fix does not appear to be available at this time.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000135">CVE-2018-1000135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1086263">SUSE bug 1086263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904466" comment="libnm0-1.22.10-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904467" comment="typelib-1_0-NM-1_0-1.22.10-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000168" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1963-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YLJUDFTOQPG4HUUXDJ4R3UO4R7KZDL7K/#YLJUDFTOQPG4HUUXDJ4R3UO4R7KZDL7K" source="SUSE-SU"/>
    <description>
    nghttp2 version &gt;= 1.10.0 and nghttp2 &lt;= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in &gt;= 1.31.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000168">CVE-2018-1000168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088639">SUSE bug 1088639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097401">SUSE bug 1097401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897519" comment="libnghttp2-14-1.40.0-1.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000204">CVE-2018-1000204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096728">SUSE bug 1096728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QE6IUT3RKAYXEWTTPV4NHUSZSOUHXI7C/#QE6IUT3RKAYXEWTTPV4NHUSZSOUHXI7C" source="SUSE-SU"/>
    <description>
    curl version curl 7.54.1 to and including curl 7.59.0 contains a CWE-122: Heap-based Buffer Overflow vulnerability in denial of service and more that can result in curl might overflow a heap based memory buffer when closing down an FTP connection with very long server command replies.. This vulnerability appears to have been fixed in curl &lt; 7.54.1 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000300">CVE-2018-1000300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092094">SUSE bug 1092094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1344-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQUQ2RWEOSUAYE6KMGHTJS7RY3DDJCSG/#XQUQ2RWEOSUAYE6KMGHTJS7RY3DDJCSG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QE6IUT3RKAYXEWTTPV4NHUSZSOUHXI7C/#QE6IUT3RKAYXEWTTPV4NHUSZSOUHXI7C" source="SUSE-SU"/>
    <description>
    curl version curl 7.20.0 to and including curl 7.59.0 contains a CWE-126: Buffer Over-read vulnerability in denial of service that can result in curl can be tricked into reading data beyond the end of a heap based buffer used to store downloaded RTSP content.. This vulnerability appears to have been fixed in curl &lt; 7.20.0 and curl &gt;= 7.60.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000301">CVE-2018-1000301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092098">SUSE bug 1092098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1372-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012726.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBPHCDNPF4OMNQRNFMDNJWW64KCW5M2P/#TBPHCDNPF4OMNQRNFMDNJWW64KCW5M2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NAQJ4OPIS2LGLIAOG5Z4TFCGM3RK3UF/#2NAQJ4OPIS2LGLIAOG5Z4TFCGM3RK3UF" source="SUSE-SU"/>
    <description>
    GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000654">CVE-2018-1000654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105435">SUSE bug 1105435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490140" comment="libtasn1-4.13-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490141" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000802" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VPLNHUIZT5RF2PBMSVX7P5OOWMGZ7WY/#5VPLNHUIZT5RF2PBMSVX7P5OOWMGZ7WY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D/#4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Python Software Foundation Python (CPython) version 2.7 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in shutil module (make_archive function) that can result in Denial of service, Information gain via injection of arbitrary files on the system or entire drive. This attack appear to be exploitable via Passage of unfiltered user input to the function. This vulnerability appears to have been fixed in after commit add531a1e55b0a739b0f42582f1c9747e5649ace.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000802">CVE-2018-1000802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109663">SUSE bug 1109663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000807" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000807" ref_url="https://www.suse.com/security/cve/CVE-2018-1000807" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-May/011426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRUVEQQGAYB6WLSONL7ACSUCWKR75FLC/#WRUVEQQGAYB6WLSONL7ACSUCWKR75FLC" source="SUSE-SU"/>
    <description>
    Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-10-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000807/">CVE-2018-1000807 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000807">CVE-2018-1000807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656853" comment="python3-pyOpenSSL is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000808" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000808" ref_url="https://www.suse.com/security/cve/CVE-2018-1000808" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-May/011426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035247.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRUVEQQGAYB6WLSONL7ACSUCWKR75FLC/#WRUVEQQGAYB6WLSONL7ACSUCWKR75FLC" source="SUSE-SU"/>
    <description>
    Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Failure to Release Memory Before Removing Last Reference vulnerability in PKCS #12 Store that can result in Denial of service if memory runs low or is exhausted. This attack appear to be exploitable via Depends upon calling application, however it could be as simple as initiating a TLS connection. Anything that would cause the calling application to reload certificates from a PKCS #12 store.. This vulnerability appears to have been fixed in 17.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000808/">CVE-2018-1000808 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000808">CVE-2018-1000808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111634">SUSE bug 1111634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111635">SUSE bug 1111635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656853" comment="python3-pyOpenSSL is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181000858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1000858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1000858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1000858" ref_url="https://www.suse.com/security/cve/CVE-2018-1000858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J35G4IJYYGQAV5QCCZF7QKA2FSV2PCFU/#J35G4IJYYGQAV5QCCZF7QKA2FSV2PCFU" source="SUSE-SU"/>
    <description>
    GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000858/">CVE-2018-1000858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000858">CVE-2018-1000858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120346">SUSE bug 1120346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899855" comment="gpg2-2.2.5-4.14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10021" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10021" ref_url="https://www.suse.com/security/cve/CVE-2018-10021" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** drivers/scsi/libsas/sas_scsi_host.c in the Linux kernel before 4.16 allows local users to cause a denial of service (ata qc leak) by triggering certain failure conditions. NOTE: a third party disputes the relevance of this report because the failure can only occur for physically proximate attackers who unplug SAS Host Bus Adapter cables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10021/">CVE-2018-10021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10021">CVE-2018-10021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089281">SUSE bug 1089281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10322" ref_url="https://www.suse.com/security/cve/CVE-2018-10322" source="SUSE CVE"/>
    <description>
    The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10322/">CVE-2018-10322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10322">CVE-2018-10322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090749">SUSE bug 1090749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10323" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10323">CVE-2018-10323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090717">SUSE bug 1090717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/62HXM6XXIXDOG7DWM2B5W4CSRO6NAY7P/#62HXM6XXIXDOG7DWM2B5W4CSRO6NAY7P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L/#UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P23RB42Q226QTD5TC654YQ2P3E7EXSET/#P23RB42Q226QTD5TC654YQ2P3E7EXSET" source="SUSE-SU"/>
    <description>
    The do_core_note function in readelf.c in libmagic.a in file 5.33 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096974">SUSE bug 1096974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096984">SUSE bug 1096984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10392" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004243.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1622-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRDOZVHIJFKNNAMB2DGY75I2KF2Z2KE2/#JRDOZVHIJFKNNAMB2DGY75I2KF2Z2KE2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SIW6BU5AGZPXT72KYAII2QIRICFEMJ4Q/#SIW6BU5AGZPXT72KYAII2QIRICFEMJ4Q" source="SUSE-SU"/>
    <description>
    mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091070">SUSE bug 1091070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10393" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004060.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DINN76OAUIKO2F7LNIEWCTEGEC6D5ADH/#DINN76OAUIKO2F7LNIEWCTEGEC6D5ADH" source="SUSE-SU"/>
    <description>
    bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1091072">SUSE bug 1091072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10471" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10471">CVE-2018-10471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089635">SUSE bug 1089635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10472" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10472">CVE-2018-10472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1089152">SUSE bug 1089152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/URI4S557IJSAG6F3UQBDKUCBGZZNBQS3/#URI4S557IJSAG6F3UQBDKUCBGZZNBQS3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D/#4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in pop3lib's apop() method. An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1060">CVE-2018-1060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088009">SUSE bug 1088009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3554-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/URI4S557IJSAG6F3UQBDKUCBGZZNBQS3/#URI4S557IJSAG6F3UQBDKUCBGZZNBQS3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D/#4LNVZL3CCUTH3EA4JE5RUYTAG3EMAZ7D" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    python before versions 2.7.15, 3.4.9, 3.5.6rc1, 3.6.5rc1 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method.  An attacker could use this flaw to cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1061">CVE-2018-1061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088004">SUSE bug 1088004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1063" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003888.html" source="SUSE-SU"/>
    <description>
    Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1063">CVE-2018-1063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083624">SUSE bug 1083624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904482" comment="policycoreutils-3.1-1.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904483" comment="policycoreutils-python-utils-3.1-1.25 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904484" comment="python3-policycoreutils-3.1-1.25 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0939-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF/#GNPLPRYR75LWWU4CR5O6E4YST3PJLYAF" source="SUSE-SU"/>
    <description>
    libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1064">CVE-2018-1064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088147">SUSE bug 1088147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10675" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10675" ref_url="https://www.suse.com/security/cve/CVE-2018-10675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
    <description>
    The do_get_mempolicy function in mm/mempolicy.c in the Linux kernel before 4.12.9 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10675/">CVE-2018-10675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10675">CVE-2018-10675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091755">SUSE bug 1091755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    Qemu emulator &lt;= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10839">CVE-2018-10839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110910">SUSE bug 1110910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110924">SUSE bug 1110924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK/#EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM2RODSJY6POW76EMB2Z566OVHYLGHMO/#PM2RODSJY6POW76EMB2Z566OVHYLGHMO" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10844">CVE-2018-10844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK/#EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM2RODSJY6POW76EMB2Z566OVHYLGHMO/#PM2RODSJY6POW76EMB2Z566OVHYLGHMO" source="SUSE-SU"/>
    <description>
    It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10845">CVE-2018-10845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105437">SUSE bug 1105437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105459">SUSE bug 1105459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2825-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005483.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK/#EW7SZ23TQUSIVG5WG54FNTONTHBQEPOK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM2RODSJY6POW76EMB2Z566OVHYLGHMO/#PM2RODSJY6POW76EMB2Z566OVHYLGHMO" source="SUSE-SU"/>
    <description>
    A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10846">CVE-2018-10846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105460">SUSE bug 1105460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10856" ref_url="https://www.suse.com/security/cve/CVE-2018-10856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004558.html" source="SUSE-SU"/>
    <description>
    It has been discovered that podman before version 0.6.1 does not drop capabilities when executing a container as a non-root user. This results in unnecessary privileges being granted to the container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10856/">CVE-2018-10856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10856">CVE-2018-10856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097970">SUSE bug 1097970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494403" comment="podman-2.1.1-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887139" comment="podman-cni-config-2.1.1-4.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK/#NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37/#JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLWISO43IR4PCYBCZV4TYAOG65GRLIJX/#SLWISO43IR4PCYBCZV4TYAOG65GRLIJX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ/#IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in SPICE before version 0.14.1 where the generated code used for demarshalling messages lacked sufficient bounds checks. A malicious client or server, after authentication, could send specially crafted messages to its peer which would result in a crash or, potentially, other impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10873">CVE-2018-10873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104448">SUSE bug 1104448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10880" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10880" ref_url="https://www.suse.com/security/cve/CVE-2018-10880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    Linux kernel is vulnerable to a stack-out-of-bounds write in the ext4 filesystem code when mounting and writing to a crafted ext4 image in ext4_update_inline_data(). An attacker could use this to cause a system crash and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10880/">CVE-2018-10880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10880">CVE-2018-10880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099845">SUSE bug 1099845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10882" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10882" ref_url="https://www.suse.com/security/cve/CVE-2018-10882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause an out-of-bound write in in fs/jbd2/transaction.c code, a denial of service, and a system crash by unmounting a crafted ext4 filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10882/">CVE-2018-10882 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10882">CVE-2018-10882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099849">SUSE bug 1099849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10892" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK/#22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK" source="SUSE-SU"/>
    <description>
    The default OCI linux spec in oci/defaults{_linux}.go in Docker/Moby from 1.11 to current does not block /proc/acpi pathnames. The flaw allows an attacker to modify host's hardware like enabling/disabling bluetooth or turning up/down keyboard brightness.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10892">CVE-2018-10892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100331">SUSE bug 1100331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100838">SUSE bug 1100838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK/#NN4TGDZ6XZE2VU5NTTD2UPNONLWDWLMK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2601-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37/#JLHVRNTHG65PKJDWJUIORGTFSTNE6Z37" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLWISO43IR4PCYBCZV4TYAOG65GRLIJX/#SLWISO43IR4PCYBCZV4TYAOG65GRLIJX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ/#IGRTJ3FFVE7QZSUA5INY6X2YU6DZARXJ" source="SUSE-SU"/>
    <description>
    Multiple integer overflow and buffer overflow issues were discovered in spice-client's handling of LZ compressed frames. A malicious server could cause the client to crash or, potentially, execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10893">CVE-2018-10893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101295">SUSE bug 1101295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CV4QA4RIYV6SXL7NQV4IVAQEAXHGGGBK/#CV4QA4RIYV6SXL7NQV4IVAQEAXHGGGBK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3326-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEMSCCDMFN6MQD6URFAAISE43AMO4MMU/#EEMSCCDMFN6MQD6URFAAISE43AMO4MMU" source="SUSE-SU"/>
    <description>
    In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10906">CVE-2018-10906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1101797">SUSE bug 1101797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127346">SUSE bug 1127346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127350">SUSE bug 1127350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489671" comment="fuse-2.9.7-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489674" comment="libfuse2-2.9.7-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10932" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10932" ref_url="https://www.suse.com/security/cve/CVE-2018-10932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009652.html" source="SUSE-SU"/>
    <description>
    lldptool version 1.0.1 and older can print a raw, unsanitized attacker controlled buffer when mngAddr information is displayed. This may allow an attacker to inject shell control characters into the buffer and impact the behavior of the terminal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10932/">CVE-2018-10932 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10932">CVE-2018-10932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104624">SUSE bug 1104624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009654591" comment="liblldp_clif1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654592" comment="open-lldp is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10933" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OHXMGJ5FCDHUY74HNHHJP7KDR45CPJIW/#OHXMGJ5FCDHUY74HNHHJP7KDR45CPJIW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VQICGWV52R2USH36NJL54INORG6C6LVF/#VQICGWV52R2USH36NJL54INORG6C6LVF" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10933">CVE-2018-10933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108020">SUSE bug 1108020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122198">SUSE bug 1122198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493127" comment="libssh4-0.8.7-10.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1095" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1095" ref_url="https://www.suse.com/security/cve/CVE-2018-1095" source="SUSE CVE"/>
    <description>
    The ext4_xattr_check_entries function in fs/ext4/xattr.c in the Linux kernel through 4.15.15 does not properly validate xattr sizes, which causes misinterpretation of a size as an error code, and consequently allows attackers to cause a denial of service (get_acl NULL pointer dereference and system crash) via a crafted ext4 image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1095/">CVE-2018-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1095">CVE-2018-1095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087004">SUSE bug 1087004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10981" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC/#5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10981">CVE-2018-10981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090823">SUSE bug 1090823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201810982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-10982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-10982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10982" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC/#5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10982">CVE-2018-10982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1090822">SUSE bug 1090822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1116" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004366.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NKRVL4VCE46UQRET33VY55MQRRKZBR6P/#NKRVL4VCE46UQRET33VY55MQRRKZBR6P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMM2JDBUU52UWSZTR6XQXTVNT2QEJ7CH/#GMM2JDBUU52UWSZTR6XQXTVNT2QEJ7CH" source="SUSE-SU"/>
    <description>
    A flaw was found in polkit before version 0.116. The implementation of the polkit_backend_interactive_authority_check_authorization function in polkitd allows to test for authentication and trigger authentication of unrelated processes owned by other users. This may result in a local DoS and information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1116">CVE-2018-1116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099031">SUSE bug 1099031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a local privilege escalation in top. If a user runs top with HOME unset in an attacker-controlled directory, the attacker could achieve privilege escalation by exploiting one of several vulnerabilities in the config_file() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1122">CVE-2018-1122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904468" comment="libprocps7-3.3.15-7.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904469" comment="procps-3.3.15-7.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a denial of service in ps via mmap buffer overflow. Inbuilt protection in ps maps a guard page at the end of the overflowed buffer, ensuring that the impact of this flaw is limited to a crash (temporary denial of service).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1123">CVE-2018-1123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904468" comment="libprocps7-3.3.15-7.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904469" comment="procps-3.3.15-7.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004403.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP/#WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR/#IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR" source="SUSE-SU"/>
    <description>
    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11236">CVE-2018-11236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1094161">SUSE bug 1094161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1110160">SUSE bug 1110160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1562-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004285.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP/#WTX4RJFPF6A65XH45RH3EXZ3MWBNZ5IP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OHOOP727H2MRWXQHAGEJ3C3JVSYLEQS4/#OHOOP727H2MRWXQHAGEJ3C3JVSYLEQS4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR/#IBCZUVKRWW62LDC7GGU5YGWFE2BZBTLR" source="SUSE-SU"/>
    <description>
    An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11237">CVE-2018-11237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1092877">SUSE bug 1092877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094154">SUSE bug 1094154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118435">SUSE bug 1118435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a heap corruption in file2strvec function. This allows a privilege escalation for a local attacker who can create entries in procfs by starting processes, which could result in crashes or arbitrary code execution in proc utilities run by other users.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1124">CVE-2018-1124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904468" comment="libprocps7-3.3.15-7.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904469" comment="procps-3.3.15-7.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to a stack buffer overflow in pgrep. This vulnerability is mitigated by FORTIFY, as it involves strncat() to a stack-allocated string. When pgrep is compiled with FORTIFY (as on Red Hat Enterprise Linux and Fedora), the impact is limited to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1125">CVE-2018-1125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904468" comment="libprocps7-3.3.15-7.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904469" comment="procps-3.3.15-7.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2451-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0450-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1848-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK/#N43O4OHYE34GEVGUD4JAK4ZIQ3EIBOGK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER/#TLAKWPMUVFZH3K3L6EPO2RZSBDIG5SER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB/#4EP32ED5GDRC2L3UFTOK2NPRC2TNQRPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/373YKSXQ2VINMOOBAFFGM6KATT7DSMIN/#373YKSXQ2VINMOOBAFFGM6KATT7DSMIN" source="SUSE-SU"/>
    <description>
    procps-ng before version 3.3.15 is vulnerable to an incorrect integer size in proc/alloc.* leading to truncation/integer overflow issues. This flaw is related to CVE-2018-1124.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1126">CVE-2018-1126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092100">SUSE bug 1092100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093158">SUSE bug 1093158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123135">SUSE bug 1123135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128955">SUSE bug 1128955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904468" comment="libprocps7-3.3.15-7.13.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904469" comment="procps-3.3.15-7.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11412" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11412" ref_url="https://www.suse.com/security/cve/CVE-2018-11412" source="SUSE CVE"/>
    <description>
    In the Linux kernel 4.13 through 4.16.11, ext4_read_inline_data() in fs/ext4/inline.c performs a memcpy with an untrusted length value in certain circumstances involving a crafted filesystem that stores the system.data extended attribute value in a dedicated inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11412/">CVE-2018-11412 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11412">CVE-2018-11412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094678">SUSE bug 1094678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20181152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-1152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-1152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1152" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PGXD27E76CECHHIGW57SLEC6FXMAF5N/#7PGXD27E76CECHHIGW57SLEC6FXMAF5N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R/#HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 1.5.90 is vulnerable to a denial of service vulnerability caused by a divide by zero when processing a crafted BMP image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1152">CVE-2018-1152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098155">SUSE bug 1098155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV572SEMHY7W2BLBGHICX7YQUWOEXYOY/#LV572SEMHY7W2BLBGHICX7YQUWOEXYOY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC/#6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC" source="SUSE-SU"/>
    <description>
    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11806">CVE-2018-11806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096223">SUSE bug 1096223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096224">SUSE bug 1096224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201811813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-11813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-11813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PGXD27E76CECHHIGW57SLEC6FXMAF5N/#7PGXD27E76CECHHIGW57SLEC6FXMAF5N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R/#HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R" source="SUSE-SU"/>
    <description>
    libjpeg 9c has a large loop because read_pixel in rdtarga.c mishandles EOF.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11813">CVE-2018-11813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096209">SUSE bug 1096209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172994">SUSE bug 1172994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172995">SUSE bug 1172995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1972-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004474.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOSXMG2B4DT5GCC7FQYU2KBMKHK3AQFZ/#YOSXMG2B4DT5GCC7FQYU2KBMKHK3AQFZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2011-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOBXL4LVFRCGH2TAYIAFJOANZ35Y5OPY/#ZOBXL4LVFRCGH2TAYIAFJOANZ35Y5OPY" source="SUSE-SU"/>
    <description>
    In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12015">CVE-2018-12015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096718">SUSE bug 1096718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099497">SUSE bug 1099497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099507">SUSE bug 1099507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106717">SUSE bug 1106717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1698-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004384.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4JGHTRKE5HZ6SALKB3UKOBD2PEIBLCP/#P4JGHTRKE5HZ6SALKB3UKOBD2PEIBLCP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1708-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MMHJU2LXXGSQKQZECK6R6IZXLOPGIU7R/#MMHJU2LXXGSQKQZECK6R6IZXLOPGIU7R" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1722-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BADS6EXC4GPMVQ6Q64ZRGEFK36QLBJBW/#BADS6EXC4GPMVQ6Q64ZRGEFK36QLBJBW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1724-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XID436D7VNVU3GZHK24YKSUJP37XAITX/#XID436D7VNVU3GZHK24YKSUJP37XAITX" source="SUSE-SU"/>
    <description>
    mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12020">CVE-2018-12020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096745">SUSE bug 1096745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1101134">SUSE bug 1101134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899855" comment="gpg2-2.2.5-4.14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12126">CVE-2018-12126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135524">SUSE bug 1135524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149725">SUSE bug 1149725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149726">SUSE bug 1149726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149729">SUSE bug 1149729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12127">CVE-2018-12127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12130">CVE-2018-12130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135409">SUSE bug 1135409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137916">SUSE bug 1137916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12207" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019411" ref_url="https://www.suse.com/support/kb/doc/?id=000019411" source="SUSE-SU"/>
		<reference ref_id="TID7023735" ref_url="https://www.suse.com/support/kb/doc/?id=7023735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E37URKMMJAKXS5WM65BEKIVDDLOSR6PW/#E37URKMMJAKXS5WM65BEKIVDDLOSR6PW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75/#VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75" source="SUSE-SU"/>
    <description>
    Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12207">CVE-2018-12207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117665">SUSE bug 1117665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155812">SUSE bug 1155812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155817">SUSE bug 1155817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155945">SUSE bug 1155945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12232" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY/#HZOAR52RMMAMPTGY2TTSFPEKREAVGPNY" source="SUSE-SU"/>
    <description>
    In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat's execution, leading to a NULL pointer dereference and system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12232">CVE-2018-12232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1097593">SUSE bug 1097593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127757">SUSE bug 1127757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN/#ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN" source="SUSE-SU"/>
    <description>
    When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12384">CVE-2018-12384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106873">SUSE bug 1106873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4236-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005091.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4117-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN/#ZVVV5W3TKACNO7E6UUTICT7MG33NV5XN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0183-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55UMHGS7YZ5AZ4K7HNYIQ73VCFF6QA4L/#55UMHGS7YZ5AZ4K7HNYIQ73VCFF6QA4L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC/#3XSXZIQWRQRVOR3YE3OFV7LENA3NBVZC" source="SUSE-SU"/>
    <description>
    A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12404">CVE-2018-12404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119069">SUSE bug 1119069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119105">SUSE bug 1119105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121207">SUSE bug 1121207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12617" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2693-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOSY7LENXTZX7RKJ26QPYDXI32TWEBV4/#UOSY7LENXTZX7RKJ26QPYDXI32TWEBV4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC/#6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC" source="SUSE-SU"/>
    <description>
    qmp_guest_file_read in qga/commands-posix.c and qga/commands-win32.c in qemu-ga (aka QEMU Guest Agent) in QEMU 2.12.50 has an integer overflow causing a g_malloc0() call to trigger a segmentation fault when trying to allocate a large memory chunk. The vulnerability can be exploited by sending a crafted QMP command (including guest-file-read with a large count value) to the agent via the listening socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12617">CVE-2018-12617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1098735">SUSE bug 1098735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098744">SUSE bug 1098744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12891" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH/#N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing the conditions through its own page table contents, a malicious guest may cause such bypasses to be used for an unbounded number of iterations. A malicious or buggy PV guest may cause a Denial of Service (DoS) affecting the entire host. Specifically, it may prevent use of a physical CPU for an indeterminate period of time. All Xen versions from 3.4 onwards are vulnerable. Xen versions 3.3 and earlier are vulnerable to an even wider class of attacks, due to them lacking preemption checks altogether in the affected code paths. Only x86 systems are affected. ARM systems are not affected. Only multi-vCPU x86 PV guests can leverage the vulnerability. x86 HVM or PVH guests as well as x86 single-vCPU PV ones cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12891">CVE-2018-12891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097521">SUSE bug 1097521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12892" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH/#N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supposedly read-only disk images. Only emulated SCSI disks (specified as "sd" in the libxl disk configuration, or an equivalent) are affected. IDE disks ("hd") are not affected (because attempts to make them readonly are rejected). Additionally, CDROM devices (that is, devices specified to be presented to the guest as CDROMs, regardless of the nature of the backing storage on the host) are not affected; they are always read only. Only systems using qemu-xen (rather than qemu-xen-traditional) as the device model version are vulnerable. Only systems using libxl or libxl-based toolstacks are vulnerable. (This includes xl, and libvirt with the libxl driver.) The vulnerability is present in Xen versions 4.7 and later. (In earlier versions, provided that the patch for XSA-142 has been applied, attempts to create read only disks are rejected.) If the host and guest together usually support PVHVM, the issue is exploitable only if the malicious guest administrator has control of the guest kernel or guest kernel command line.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12892">CVE-2018-12892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097523">SUSE bug 1097523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12893" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH/#N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can crash Xen, leading to a Denial of Service. All Xen systems which have applied the XSA-260 fix are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only x86 PV guests can exploit the vulnerability. x86 HVM and PVH guests cannot exploit the vulnerability. An attacker needs to be able to control hardware debugging facilities to exploit the vulnerability, but such permissions are typically available to unprivileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12893">CVE-2018-12893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1097522">SUSE bug 1097522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12928" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12928" ref_url="https://www.suse.com/security/cve/CVE-2018-12928" source="SUSE CVE"/>
    <description>
    In the Linux kernel 4.15.0, a NULL pointer dereference was discovered in hfs_ext_read_extent in hfs.ko. This can occur during a mount of a crafted hfs filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12928/">CVE-2018-12928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12928">CVE-2018-12928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099613">SUSE bug 1099613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201812930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-12930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-12930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12930" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-12930" ref_url="https://www.suse.com/security/cve/CVE-2018-12930" source="SUSE CVE"/>
    <description>
    ntfs_end_buffer_async_read in the ntfs.ko filesystem driver in the Linux kernel 4.15.0 allows attackers to trigger a stack-based out-of-bounds write and cause a denial of service (kernel oops or panic) or possibly have unspecified other impact via a crafted ntfs filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12930/">CVE-2018-12930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-12930">CVE-2018-12930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099619">SUSE bug 1099619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI/#HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
    <description>
    The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13053">CVE-2018-13053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1099924">SUSE bug 1099924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13096" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13096" ref_url="https://www.suse.com/security/cve/CVE-2018-13096" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7/#56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.14. A denial of service (out-of-bounds memory access and BUG) can occur upon encountering an abnormal bitmap size when mounting a crafted f2fs image.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-13096/">CVE-2018-13096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13096">CVE-2018-13096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100062">SUSE bug 1100062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI/#HY4T7FGRNW6MVQE44HNUSIL7M4Y3P4WI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC/#WKPTBMLW6CO7OGF3LPNC4LMQ2SS7VXKC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13405">CVE-2018-13405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100416">SUSE bug 1100416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129735">SUSE bug 1129735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198702">SUSE bug 1198702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201813785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-13785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-13785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13785" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3933-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0057-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ/#U4E6TD23MZPFSCCET3CCXBOEPKA4LWCJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4HM5QQMXWECPZMLHD5SAWL5ZKD2JZWL/#Q4HM5QQMXWECPZMLHD5SAWL5ZKD2JZWL" source="SUSE-SU"/>
    <description>
    In libpng 1.6.34, a wrong calculation of row_factor in the png_check_chunk_length function (pngrutil.c) may trigger an integer overflow and resultant divide-by-zero while processing a crafted PNG file, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-13785">CVE-2018-13785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1100687">SUSE bug 1100687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112153">SUSE bug 1112153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116574">SUSE bug 1116574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM/#UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AV7P2XPVE2GW6NK2J7LPNFK4M3HRKL2B/#AV7P2XPVE2GW6NK2J7LPNFK4M3HRKL2B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14404">CVE-2018-14404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102046">SUSE bug 1102046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148896">SUSE bug 1148896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14498" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005518.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7PGXD27E76CECHHIGW57SLEC6FXMAF5N/#7PGXD27E76CECHHIGW57SLEC6FXMAF5N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R/#HFGEL7BLY3XLORUPMBTMJE2RLV52VT2R" source="SUSE-SU"/>
    <description>
    get_8bit_row in rdbmp.c in libjpeg-turbo through 1.5.90 and MozJPEG through 3.3.1 allows attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted 8-bit BMP in which one or more of the color indices is out of range for the number of palette entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14498">CVE-2018-14498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128712">SUSE bug 1128712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DJYNKWT24TFOMWG4OBIHWFRWGYPNPMWO/#DJYNKWT24TFOMWG4OBIHWFRWGYPNPMWO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YBRTICRXU3VADRFXWSGI5DNTPREEIAQO/#YBRTICRXU3VADRFXWSGI5DNTPREEIAQO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AZTEOGAXEUPEEYYEF67IEO4UST36N2UI/#AZTEOGAXEUPEEYYEF67IEO4UST36N2UI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14526">CVE-2018-14526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1104205">SUSE bug 1104205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14550" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14550" ref_url="https://www.suse.com/security/cve/CVE-2018-14550" source="SUSE CVE"/>
    <description>
    An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14550/">CVE-2018-14550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14550">CVE-2018-14550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102846">SUSE bug 1102846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336008" comment="libpng16-16 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM/#UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM" source="SUSE-SU"/>
    <description>
    libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14567">CVE-2018-14567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT/#GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG/#FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG" source="SUSE-SU"/>
    <description>
    An issue was discovered in XListExtensions in ListExt.c in libX11 through 1.6.5. A malicious server can send a reply in which the first string overflows, causing a variable to be set to NULL that will be freed later on, leading to DoS (segmentation fault).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14598">CVE-2018-14598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102073">SUSE bug 1102073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492445" comment="libX11-6-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904453" comment="libX11-data-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492449" comment="libX11-xcb1-1.6.5-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT/#GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG/#FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG" source="SUSE-SU"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c is vulnerable to an off-by-one error caused by malicious server responses, leading to DoS or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14599">CVE-2018-14599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102062">SUSE bug 1102062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492445" comment="libX11-6-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904453" comment="libX11-data-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492449" comment="libX11-xcb1-1.6.5-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2567-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT/#GHRDEUUWF54UMJT7EQU25GDSW3ZBOSVT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG/#FW5YN6WXKHOT2P6C6HMB3TWLCEPTJMLG" source="SUSE-SU"/>
    <description>
    An issue was discovered in libX11 through 1.6.5. The function XListExtensions in ListExt.c interprets a variable as signed instead of unsigned, resulting in an out-of-bounds write (of up to 128 bytes), leading to DoS or remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14600">CVE-2018-14600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102068">SUSE bug 1102068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178417">SUSE bug 1178417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492445" comment="libX11-6-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904453" comment="libX11-data-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492449" comment="libX11-xcb1-1.6.5-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HRFQXLE5AY4NMDJEONTG7SYX74GUB3KS/#HRFQXLE5AY4NMDJEONTG7SYX74GUB3KS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LZSFXUQU7XFILG7OTCDROZBOI3XKWZ2C/#LZSFXUQU7XFILG7OTCDROZBOI3XKWZ2C" source="SUSE-SU"/>
    <description>
    curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14618">CVE-2018-14618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106019">SUSE bug 1106019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14619" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14619" ref_url="https://www.suse.com/security/cve/CVE-2018-14619" source="SUSE CVE"/>
    <description>
    A flaw was found in the crypto subsystem of the Linux kernel before version kernel-4.15-rc4. The "null skcipher" was being dropped when each af_alg_ctx was freed instead of when the aead_tfm was freed. This can cause the null skcipher to be freed while it is still in use leading to a local user being able to crash the system or possibly escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14619/">CVE-2018-14619 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14619">CVE-2018-14619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106174">SUSE bug 1106174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5/#IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Python's elementtree C accelerator failed to initialise Expat's hash salt during initialization. This could make it easy to conduct denial of service attacks against Expat by constructing an XML document that would cause pathological hash collisions in Expat's internal data structures, consuming large amounts CPU and RAM. The vulnerability exists in Python versions 3.7.0, 3.6.0 through 3.6.6, 3.5.0 through 3.5.6, 3.4.0 through 3.4.9, 2.7.0 through 2.7.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14647">CVE-2018-14647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1109847">SUSE bug 1109847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14679" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2323-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSGOFLU5EABBIUAWNFKDCLZP43TISZSZ/#RSGOFLU5EABBIUAWNFKDCLZP43TISZSZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14679">CVE-2018-14679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704936" comment="libmspack0-0.6-3.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ/#AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6/#TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14681">CVE-2018-14681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704936" comment="libmspack0-0.6-3.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3436-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ/#AOWJYQIO7AZB7B2VLPGPKAT4MC2SAJOQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6/#TTPTOQ375E7C5RL7DUFQTOCZFKO6JRX6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1200-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CB3MRNYWFKRQUSWOFW43J2YAPXGFTDWP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZGPJK567IBN35AOF3QFMOJCRA2NANSF/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14682">CVE-2018-14682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102922">SUSE bug 1102922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103040">SUSE bug 1103040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704936" comment="libmspack0-0.6-3.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201814722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-14722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-14722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14722" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722" source="SUSE CVE"/>
    <description>
    An issue was discovered in evaluate_auto_mountpoint in btrfsmaintenance-functions in btrfsmaintenance through 0.4.1. Code execution as root can occur via a specially crafted filesystem label if btrfs-{scrub,balance,trim} are set to auto in /etc/sysconfig/btrfsmaintenance (this is not the default, though).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14722">CVE-2018-14722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1102721">SUSE bug 1102721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881730" comment="btrfsmaintenance-0.4.2-1.11 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15120" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004568.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2790-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZF7XLSPLTNHYJJJKBZTZ3W3CJY4AQQP/#XZF7XLSPLTNHYJJJKBZTZ3W3CJY4AQQP" source="SUSE-SU"/>
    <description>
    libpango in Pango 1.40.8 through 1.42.3, as used in hexchat and other products, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted text with invalid Unicode sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103877">SUSE bug 1103877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882262" comment="libpango-1_0-0-1.44.7+11-1.25 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15468" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably not to lock up the core. As a result, it must only be available to fully trusted guests. Unfortunately, in the case that vPMU is disabled, all value checking was skipped, allowing the guest to choose any MSR_DEBUGCTL setting it likes. A malicious or buggy guest administrator (on Intel x86 HVM or PVH) can lock up the entire host, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15468">CVE-2018-15468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103276">SUSE bug 1103276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hypercalls hitting BUG() checks. An unprivileged guest can cause a BUG() check in the hypervisor, resulting in a denial-of-service (crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15469">CVE-2018-15469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103275">SUSE bug 1103275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15470" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15470">CVE-2018-15470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103279">SUSE bug 1103279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15664" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XND3PJF4WMYRE2Y2BUQWB6ZHX6ZEYX5G/#XND3PJF4WMYRE2Y2BUQWB6ZHX6ZEYX5G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC/#IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC" source="SUSE-SU"/>
    <description>
    In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15664">CVE-2018-15664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1096726">SUSE bug 1096726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139649">SUSE bug 1139649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904463" comment="libcontainers-common-20200727-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7/#FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO/#PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO" source="SUSE-SU"/>
    <description>
    A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15686">CVE-2018-15686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113665">SUSE bug 1113665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15687" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15687" ref_url="https://www.suse.com/security/cve/CVE-2018-15687" source="SUSE CVE"/>
    <description>
    A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15687/">CVE-2018-15687 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15687">CVE-2018-15687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113666">SUSE bug 1113666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3767-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004941.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7/#FG3I7LRZT4K74SL3UV2BRO73WXQKMXH7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO/#PM6YQLR7Q7WL5FEISVHM4JT3SFODW2IO" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15688">CVE-2018-15688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113632">SUSE bug 1113632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113668">SUSE bug 1113668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113669">SUSE bug 1113669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904466" comment="libnm0-1.22.10-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904467" comment="typelib-1_0-NM-1_0-1.22.10-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15746">CVE-2018-15746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106222">SUSE bug 1106222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15750" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNCKLLD3IFV6YSRBCSH67MRPK5RROYM6/#VNCKLLD3IFV6YSRBCSH67MRPK5RROYM6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCVCTPT42CHNLMJLTM3MQY6ZEUS2JFON/#XCVCTPT42CHNLMJLTM3MQY6ZEUS2JFON" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GW2K66LI6CQMXXR5ABJWHGQK64P5J5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15750">CVE-2018-15750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-OU-2019:13965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-February/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VNCKLLD3IFV6YSRBCSH67MRPK5RROYM6/#VNCKLLD3IFV6YSRBCSH67MRPK5RROYM6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCVCTPT42CHNLMJLTM3MQY6ZEUS2JFON/#XCVCTPT42CHNLMJLTM3MQY6ZEUS2JFON" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GW2K66LI6CQMXXR5ABJWHGQK64P5J5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15751">CVE-2018-15751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113698">SUSE bug 1113698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113699">SUSE bug 1113699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15854" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because geometry tokens were desupported incorrectly.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15854">CVE-2018-15854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15855" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because the XkbFile for an xkb_geometry section was mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15855">CVE-2018-15855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15856" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    An infinite loop when reaching EOL unexpectedly in compose/parser.c (aka the keymap parser) in xkbcommon before 0.8.1 could be used by local attackers to cause a denial of service during parsing of crafted keymap files.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15856">CVE-2018-15856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15857" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15857">CVE-2018-15857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15858" ref_url="https://www.suse.com/security/cve/CVE-2018-15858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap in xkbcomp/keycodes.c in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15858/">CVE-2018-15858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15858">CVE-2018-15858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15861" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15862" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15862">CVE-2018-15862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15864" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15864">CVE-2018-15864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489751" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16062">CVE-2018-16062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106390">SUSE bug 1106390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16276" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16276" ref_url="https://www.suse.com/security/cve/CVE-2018-16276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2908-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7/#56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7" source="SUSE-SU"/>
    <description>
    An issue was discovered in yurex_read in drivers/usb/misc/yurex.c in the Linux kernel before 4.17.7. Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16276/">CVE-2018-16276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16276">CVE-2018-16276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106095">SUSE bug 1106095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115593">SUSE bug 1115593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012115.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16395">CVE-2018-16395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112530">SUSE bug 1112530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16396" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16396">CVE-2018-16396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112532">SUSE bug 1112532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16402">CVE-2018-16402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107066">SUSE bug 1107066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16403">CVE-2018-16403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107067">SUSE bug 1107067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMCE64KZBTBZQUSA6NPIG6JSX6IOEF6N/#PMCE64KZBTBZQUSA6NPIG6JSX6IOEF6N" source="SUSE-SU"/>
    <description>
    In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16428">CVE-2018-16428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107121">SUSE bug 1107121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904434" comment="glib2-tools-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904435" comment="libgio-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904436" comment="libglib-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904437" comment="libgmodule-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904438" comment="libgobject-2_0-0-2.62.6-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3966-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183966-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PMCE64KZBTBZQUSA6NPIG6JSX6IOEF6N/#PMCE64KZBTBZQUSA6NPIG6JSX6IOEF6N" source="SUSE-SU"/>
    <description>
    GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16429">CVE-2018-16429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1107116">SUSE bug 1107116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904434" comment="glib2-tools-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904435" comment="libgio-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904436" comment="libglib-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904437" comment="libgmodule-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904438" comment="libgobject-2_0-0-2.62.6-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16597" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16597" ref_url="https://www.suse.com/security/cve/CVE-2018-16597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7/#56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 4.8. Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16597/">CVE-2018-16597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16597">CVE-2018-16597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1106512">SUSE bug 1106512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD/#3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD" source="SUSE-SU"/>
    <description>
    Curl versions 7.33.0 through 7.61.1 are vulnerable to a buffer overrun in the SASL authentication code that may lead to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16839">CVE-2018-16839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131886">SUSE bug 1131886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X6JWJNEIXWEQUGGAQRLV7YWFAU5EA6NJ/#X6JWJNEIXWEQUGGAQRLV7YWFAU5EA6NJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD/#3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD" source="SUSE-SU"/>
    <description>
    A heap use-after-free flaw was found in curl versions from 7.59.0 through 7.61.1 in the code related to closing an easy handle. When closing and cleaning up an 'easy' handle in the `Curl_close()` function, the library code first frees a struct (without nulling the pointer) and might then subsequently erroneously write to a struct field within that already freed struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16840">CVE-2018-16840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112758">SUSE bug 1112758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113029">SUSE bug 1113029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3699-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X6JWJNEIXWEQUGGAQRLV7YWFAU5EA6NJ/#X6JWJNEIXWEQUGGAQRLV7YWFAU5EA6NJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD/#3EVOC42Y4MFWBXEDJEMG3E5CFJF7HFMD" source="SUSE-SU"/>
    <description>
    Curl versions 7.14.1 through 7.61.1 are vulnerable to a heap-based buffer over-read in the tool_msgs.c:voutf() function that may result in information exposure and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16842">CVE-2018-16842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113660">SUSE bug 1113660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122464">SUSE bug 1122464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16846" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16846" ref_url="https://www.suse.com/security/cve/CVE-2018-16846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47Z6XDFYY65RXX57WUW3IMLYEY6ASYXC/#47Z6XDFYY65RXX57WUW3IMLYEY6ASYXC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PBU365BKTDZHLKZL2NDWGZPNQHYX4IW/#3PBU365BKTDZHLKZL2NDWGZPNQHYX4IW" source="SUSE-SU"/>
    <description>
    It was found in Ceph versions before 13.2.4 that authenticated ceph RGW users can cause a denial of service against OMAPs holding bucket indices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16846/">CVE-2018-16846 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16846">CVE-2018-16846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114710">SUSE bug 1114710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009335684" comment="librados2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335686" comment="librbd1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16847" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SK7PCNKWWMWQWMHRITP2OPED5MJPAKPU/#SK7PCNKWWMWQWMHRITP2OPED5MJPAKPU" source="SUSE-SU"/>
    <description>
    An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16847">CVE-2018-16847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114529">SUSE bug 1114529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114540">SUSE bug 1114540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW/#FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y/#KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16864">CVE-2018-16864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0054-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SYSTEM-DOWN-BLOG" ref_url="https://www.suse.com/c/stack-clashing-systemd-aka-system-down/" source="SUSE-SU"/>
		<reference ref_id="TID000019368" ref_url="https://www.suse.com/support/kb/doc/?id=000019368" source="SUSE-SU"/>
		<reference ref_id="TID7023611" ref_url="https://www.suse.com/support/kb/doc/?id=7023611" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0097-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW/#FUEAX66J6UOEYRBZGH3WL34NYPZVPEVW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y/#KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y" source="SUSE-SU"/>
    <description>
    An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16865">CVE-2018-16865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1108912">SUSE bug 1108912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120323">SUSE bug 1120323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122265">SUSE bug 1122265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16868" ref_url="https://www.suse.com/security/cve/CVE-2018-16868" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1351-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005638.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKRDUJCDYX67IJDQ2D543SJDEUE4K7MO/#JKRDUJCDYX67IJDQ2D543SJDEUE4K7MO" source="SUSE-SU"/>
    <description>
    A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16868/">CVE-2018-16868 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16868">CVE-2018-16868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118087">SUSE bug 1118087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134856">SUSE bug 1134856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16869" ref_url="https://www.suse.com/security/cve/CVE-2018-16869" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U/#E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U" source="SUSE-SU"/>
    <description>
    A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16869/">CVE-2018-16869 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16869">CVE-2018-16869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117951">SUSE bug 1117951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118086">SUSE bug 1118086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118087">SUSE bug 1118087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134856">SUSE bug 1134856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493118" comment="libhogweed4-3.4.1-4.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493121" comment="libnettle6-3.4.1-4.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16872" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG/#CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn't consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16872">CVE-2018-16872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119493">SUSE bug 1119493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119494">SUSE bug 1119494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16873" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI6YNL4BQVWU6QEI2HSDMZSMO7FDLI2/#HXI6YNL4BQVWU6QEI2HSDMZSMO7FDLI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3DQFSODZ5IN4PFEF32WURUM6TQEABL7/#U3DQFSODZ5IN4PFEF32WURUM6TQEABL7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQCKOJXUIQVNGUE6O6P6AS6YW4IXTGYC/#TQCKOJXUIQVNGUE6O6P6AS6YW4IXTGYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY/#K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWOQPNXXBRMZ3GUIAPIJWBLSX4C6UKIN/#XWOQPNXXBRMZ3GUIAPIJWBLSX4C6UKIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD/#VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBFTSNKGB464HWO65FTEXANGAGVXV4XW/#UBFTSNKGB464HWO65FTEXANGAGVXV4XW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK/#FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB/#CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3/#IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6FFITESF23XEYSCI7KTKZVCPQU2CMO/#HM6FFITESF23XEYSCI7KTKZVCPQU2CMO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JECNV3BMXBNMPC6CIX5BMOAPGIHSNLAI/#JECNV3BMXBNMPC6CIX5BMOAPGIHSNLAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" source="SUSE-SU"/>
    <description>
    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running "go get -u".
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-10-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882521" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16874" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI6YNL4BQVWU6QEI2HSDMZSMO7FDLI2/#HXI6YNL4BQVWU6QEI2HSDMZSMO7FDLI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3DQFSODZ5IN4PFEF32WURUM6TQEABL7/#U3DQFSODZ5IN4PFEF32WURUM6TQEABL7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQCKOJXUIQVNGUE6O6P6AS6YW4IXTGYC/#TQCKOJXUIQVNGUE6O6P6AS6YW4IXTGYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY/#K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWOQPNXXBRMZ3GUIAPIJWBLSX4C6UKIN/#XWOQPNXXBRMZ3GUIAPIJWBLSX4C6UKIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD/#VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBFTSNKGB464HWO65FTEXANGAGVXV4XW/#UBFTSNKGB464HWO65FTEXANGAGVXV4XW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK/#FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB/#CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3/#IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6FFITESF23XEYSCI7KTKZVCPQU2CMO/#HM6FFITESF23XEYSCI7KTKZVCPQU2CMO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JECNV3BMXBNMPC6CIX5BMOAPGIHSNLAI/#JECNV3BMXBNMPC6CIX5BMOAPGIHSNLAI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" source="SUSE-SU"/>
    <description>
    In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882521" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16875" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0048-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI6YNL4BQVWU6QEI2HSDMZSMO7FDLI2/#HXI6YNL4BQVWU6QEI2HSDMZSMO7FDLI2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3DQFSODZ5IN4PFEF32WURUM6TQEABL7/#U3DQFSODZ5IN4PFEF32WURUM6TQEABL7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQCKOJXUIQVNGUE6O6P6AS6YW4IXTGYC/#TQCKOJXUIQVNGUE6O6P6AS6YW4IXTGYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY/#K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWOQPNXXBRMZ3GUIAPIJWBLSX4C6UKIN/#XWOQPNXXBRMZ3GUIAPIJWBLSX4C6UKIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD/#VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBFTSNKGB464HWO65FTEXANGAGVXV4XW/#UBFTSNKGB464HWO65FTEXANGAGVXV4XW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK/#FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB/#CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3/#IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6FFITESF23XEYSCI7KTKZVCPQU2CMO/#HM6FFITESF23XEYSCI7KTKZVCPQU2CMO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1703-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JECNV3BMXBNMPC6CIX5BMOAPGIHSNLAI/#JECNV3BMXBNMPC6CIX5BMOAPGIHSNLAI" source="SUSE-SU"/>
    <description>
    The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882521" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.31.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659879" comment="cni-plugins is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16885" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16885" ref_url="https://www.suse.com/security/cve/CVE-2018-16885" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel that allows the userspace to call memcpy_fromiovecend() and similar functions with a zero offset and buffer length which causes the read beyond the buffer boundaries, in certain cases causing a memory access fault and a system halt by accessing invalid memory address. This issue only affects kernel version 3.10.x as shipped with Red Hat Enterprise Linux 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16885/">CVE-2018-16885 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16885">CVE-2018-16885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120258">SUSE bug 1120258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16889" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47Z6XDFYY65RXX57WUW3IMLYEY6ASYXC/#47Z6XDFYY65RXX57WUW3IMLYEY6ASYXC" source="SUSE-SU"/>
    <description>
    Ceph does not properly sanitize encryption keys in debug logging for v4 auth. This results in the leaking of encryption key information in log files via plaintext. Versions up to v13.2.4 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16889">CVE-2018-16889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121567">SUSE bug 1121567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009335684" comment="librados2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335686" comment="librbd1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201816890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-16890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-16890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EWG6XCI25R5UAT6SGZTOCSV5F6V7W2ZQ/#EWG6XCI25R5UAT6SGZTOCSV5F6V7W2ZQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRDOZ4FJSPSJNNQSD2FOPKFCVGMYT4J2/#DRDOZ4FJSPSJNNQSD2FOPKFCVGMYT4J2" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16890">CVE-2018-16890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123371">SUSE bug 1123371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17953" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3965-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183965-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JOOWEJKEHGJOD4WHUBC7KITCM5RIVIC/#2JOOWEJKEHGJOD4WHUBC7KITCM5RIVIC" source="SUSE-SU"/>
    <description>
    A incorrect variable in a SUSE specific patch for pam_access rule matching in PAM 1.3.0 in openSUSE Leap 15.0 and SUSE Linux Enterprise 15 could lead to pam_access rules not being applied (fail open).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17953">CVE-2018-17953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115640">SUSE bug 1115640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197654">SUSE bug 1197654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887067" comment="pam-1.3.0-6.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17958" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    Qemu has a Buffer Overflow in rtl8139_do_receive in hw/net/rtl8139.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17958">CVE-2018-17958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111006">SUSE bug 1111006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111007">SUSE bug 1111007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17962" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    Qemu has a Buffer Overflow in pcnet_receive in hw/net/pcnet.c because an incorrect integer data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17962">CVE-2018-17962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111010">SUSE bug 1111010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111011">SUSE bug 1111011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17963">CVE-2018-17963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111013">SUSE bug 1111013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111014">SUSE bug 1111014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18064" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18064" ref_url="https://www.suse.com/security/cve/CVE-2018-18064" source="SUSE CVE"/>
    <description>
    cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18064/">CVE-2018-18064 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18064">CVE-2018-18064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111329">SUSE bug 1111329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339036" comment="libcairo2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1754-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4YZMRNZWWKOM2PEZWI5CN25N5QCYGS/#MP4YZMRNZWWKOM2PEZWI5CN25N5QCYGS" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18074">CVE-2018-18074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111622">SUSE bug 1111622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897595" comment="python3-requests-2.20.1-6.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18310">CVE-2018-18310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1111973">SUSE bug 1111973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2264-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192264-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ/#45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18311">CVE-2018-18311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114674">SUSE bug 1114674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132018">SUSE bug 1132018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18312" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ/#45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18312">CVE-2018-18312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114675">SUSE bug 1114675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18313" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18313" ref_url="https://www.suse.com/security/cve/CVE-2018-18313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ/#45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18313/">CVE-2018-18313 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18313">CVE-2018-18313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114681">SUSE bug 1114681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18314" ref_url="https://www.suse.com/security/cve/CVE-2018-18314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004980.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ/#45XO6QPP5W6VXRMAEFMRBMHH2ATI7TMZ" source="SUSE-SU"/>
    <description>
    Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18314/">CVE-2018-18314 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18314">CVE-2018-18314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114686">SUSE bug 1114686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18438" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18438" ref_url="https://www.suse.com/security/cve/CVE-2018-18438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
    <description>
    Qemu has integer overflows because IOReadHandler and its associated functions use a signed integer data type for a size value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18438/">CVE-2018-18438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18438">CVE-2018-18438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112185">SUSE bug 1112185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112188">SUSE bug 1112188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AN4USN47JRBDAYTJ7ARVSFYOKEKTGTFV/" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.36.7 and before 3.41.1, a malformed signature can cause a crash due to a null dereference, resulting in a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18508">CVE-2018-18508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124571">SUSE bug 1124571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    An Invalid Memory Address Dereference exists in the function elf_end in libelf in elfutils through v0.174. Although eu-size is intended to support ar files inside ar files, handle_ar in size.c closes the outer ar file before handling all inner entries. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18520">CVE-2018-18520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112726">SUSE bug 1112726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    Divide-by-zero vulnerabilities in the function arlib_add_symbols() in arlib.c in elfutils 0.174 allow remote attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by eu-ranlib, because a zero sh_entsize is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18521">CVE-2018-18521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1112723">SUSE bug 1112723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18584" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
    <description>
    In mspack/cab.h in libmspack before 0.8alpha and cabextract before 1.8, the CAB block input buffer is one byte too small for the maximal Quantum block, leading to an out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18584">CVE-2018-18584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492057" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18585" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
    <description>
    chmd_read_headers in mspack/chmd.c in libmspack before 0.8alpha accepts a filename that has '\0' as its first or second character (such as the "/\0" name).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18585">CVE-2018-18585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492057" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18586" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18586" ref_url="https://www.suse.com/security/cve/CVE-2018-18586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0069-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0069-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IRYD4Y2CDUYSBVQUIDXTTBL6H6XYW54G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0069-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OUTOW52AMZBWLZJOXYYD2UOLF2KPJEKX/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** chmextract.c in the chmextract sample program, as distributed with libmspack before 0.8alpha, does not protect against absolute/relative pathnames in CHM files, leading to Directory Traversal. NOTE: the vendor disputes that this is a libmspack vulnerability, because chmextract.c was only intended as a source-code example, not a supported application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-18586/">CVE-2018-18586 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18586">CVE-2018-18586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113038">SUSE bug 1113038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113039">SUSE bug 1113039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113040">SUSE bug 1113040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667510" comment="libmspack0-0.6-3.14.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18751" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009904.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVQPRDUDYB6AZBSEMQV2LQS3SOCYDDH4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WRBK5ICGNNHUDYUGZ77D52LO6MVEHXEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLHFK26OHKQS4FLZJVNXTH3I2YQAMAR5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU gettext 0.19.8. There is a double free in default_add_message in read-catalog.c, related to an invalid free in po_gram_parse in po-gram-gen.y, as demonstrated by lt-msgfmt.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18751">CVE-2018-18751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904433" comment="gettext-runtime-0.19.8.1-4.11.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18849" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183973-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3975-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183975-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK/#FR4H7KPNHTMLWXKKW2DKOKA3SBOOKPWK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS/#5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJEWX3HJ455MJTYETI53ORG4PI73K72X/#HJEWX3HJ455MJTYETI53ORG4PI73K72X" source="SUSE-SU"/>
    <description>
    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18849">CVE-2018-18849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114422">SUSE bug 1114422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114423">SUSE bug 1114423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201818883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-18883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-18883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18883" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS/#5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-18883">CVE-2018-18883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114405">SUSE bug 1114405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3967-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183967-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YEMEK4D53DSV6S77Z5LXFKFK3KSF43EJ/#YEMEK4D53DSV6S77Z5LXFKFK3KSF43EJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4055-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RMI7VZTEYML5A6FZYR5SFA2EUXLTYC4S/#RMI7VZTEYML5A6FZYR5SFA2EUXLTYC4S" source="SUSE-SU"/>
    <description>
    In ncurses 6.1, there is a NULL pointer dereference at function _nc_parse_entry in parse_entry.c that will lead to a denial of service attack. The product proceeds to the dereference code path even after a "dubious character `*' in name or alias field" detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19211">CVE-2018-19211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115929">SUSE bug 1115929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131830">SUSE bug 1131830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490728" comment="libncurses6-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490731" comment="ncurses-utils-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490733" comment="terminfo-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490734" comment="terminfo-base-6.1-5.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19489" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19489" ref_url="https://www.suse.com/security/cve/CVE-2018-19489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG/#CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    v9fs_wstat in hw/9pfs/9p.c in QEMU allows guest OS users to cause a denial of service (crash) because of a race condition during file renaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19489/">CVE-2018-19489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19489">CVE-2018-19489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1117275">SUSE bug 1117275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117279">SUSE bug 1117279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19637" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ/#Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI/#WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI" source="SUSE-SU"/>
    <description>
    Supportutils, before version 3.1-5.7.1, wrote data to static file /tmp/supp_log, allowing local attackers to overwrite files on systems without symlink protection
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19637">CVE-2018-19637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117776">SUSE bug 1117776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904496" comment="supportutils-3.1.9-5.24.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19638" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ/#Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI/#WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI" source="SUSE-SU"/>
    <description>
    In supportutils, before version 3.1-5.7.1 and if pacemaker is installed on the system, an unprivileged user could have overwritten arbitrary files in the directory that is used by supportutils to collect the log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19638">CVE-2018-19638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904496" comment="supportutils-3.1.9-5.24.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ/#Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI/#WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI" source="SUSE-SU"/>
    <description>
    If supportutils before version 3.1-5.7.1 is run with -v to perform rpm verification and the attacker manages to manipulate the rpm listing (e.g. with CVE-2018-19638) he can execute arbitrary commands as root.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19639">CVE-2018-19639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118460">SUSE bug 1118460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118462">SUSE bug 1118462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904496" comment="supportutils-3.1.9-5.24.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ/#Z5E2WUVXXXU3W3CLLARFPLLJ3RLQTXDJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI/#WIT5E7ZSUGJQKIS75LHB3JUFT6DEKJEI" source="SUSE-SU"/>
    <description>
    If the attacker manages to create files in the directory used to collect log files in supportutils before version 3.1-5.7.1 (e.g. with CVE-2018-19638) he can kill arbitrary processes on the local machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19640">CVE-2018-19640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1063385">SUSE bug 1063385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118463">SUSE bug 1118463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904496" comment="supportutils-3.1.9-5.24.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0019-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005371.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A3CLHCXM7O3XLNRJSUWUZY6CXXN6U4L3/#A3CLHCXM7O3XLNRJSUWUZY6CXXN6U4L3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6OKC663KCCSTWAYHTLR6YG6QB4LCIPIQ/#6OKC663KCCSTWAYHTLR6YG6QB4LCIPIQ" source="SUSE-SU"/>
    <description>
    A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19788">CVE-2018-19788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118274">SUSE bug 1118274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118277">SUSE bug 1118277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119056">SUSE bug 1119056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19961" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS/#5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19961">CVE-2018-19961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19962" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS/#5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19962">CVE-2018-19962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115040">SUSE bug 1115040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19963" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19963">CVE-2018-19963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115043">SUSE bug 1115043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19964" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19964">CVE-2018-19964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115044">SUSE bug 1115044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19965" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS/#5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19965">CVE-2018-19965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115045">SUSE bug 1115045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19966" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/004952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS/#5XQXVEWKOTR3CPDXCFEJLKHPMKWKKXUS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19966">CVE-2018-19966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1115047">SUSE bug 1115047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201819967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-19967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-19967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19967" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13921-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913921-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEXMI5U3FAN3S2RZPTU25FNTZ232HXSH/#ZEXMI5U3FAN3S2RZPTU25FNTZ232HXSH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-19967">CVE-2018-19967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1114988">SUSE bug 1114988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20123" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123" source="SUSE CVE"/>
    <description>
    pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20123">CVE-2018-20123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119437">SUSE bug 1119437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119438">SUSE bug 1119438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20124" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124" source="SUSE CVE"/>
    <description>
    hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20124">CVE-2018-20124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119840">SUSE bug 1119840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119841">SUSE bug 1119841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20125" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125" source="SUSE CVE"/>
    <description>
    hw/rdma/vmw/pvrdma_cmd.c in QEMU allows attackers to cause a denial of service (NULL pointer dereference or excessive memory allocation) in create_cq_ring or create_qp_rings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20125">CVE-2018-20125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119989">SUSE bug 1119989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20126" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
    <description>
    hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20126">CVE-2018-20126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119991">SUSE bug 1119991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20191" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191" source="SUSE CVE"/>
    <description>
    hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20191">CVE-2018-20191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119979">SUSE bug 1119979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119980">SUSE bug 1119980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20216" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216" source="SUSE CVE"/>
    <description>
    QEMU can have an infinite loop in hw/rdma/vmw/pvrdma_dev_ring.c because return values are not checked (and -1 is mishandled).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20216">CVE-2018-20216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119984">SUSE bug 1119984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1119985">SUSE bug 1119985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20217" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0113-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005342.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPHHD47HJF3GUJVEDHEG7BT7M2YJ4GPH/#LPHHD47HJF3GUJVEDHEG7BT7M2YJ4GPH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0085-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KEX5K43EP6FXRT7SL2L6CCHHNMT27KFZ/#KEX5K43EP6FXRT7SL2L6CCHHNMT27KFZ" source="SUSE-SU"/>
    <description>
    A Reachable Assertion issue was discovered in the KDC in MIT Kerberos 5 (aka krb5) before 1.17. If an attacker can obtain a krbtgt ticket using an older encryption type (single-DES, triple-DES, or RC4), the attacker can crash the KDC by making an S4U2Self request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20217">CVE-2018-20217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120489">SUSE bug 1120489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20346" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0788-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190788-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOBVVHB5DPUC42UAITCIUSKYF4J77GTR/#XOBVVHB5DPUC42UAITCIUSKYF4J77GTR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RPNO34LBIGVWXJYOL7ETIMJNCZMGHOKA/#RPNO34LBIGVWXJYOL7ETIMJNCZMGHOKA" source="SUSE-SU"/>
    <description>
    SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20346">CVE-2018-20346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1119687">SUSE bug 1119687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120335">SUSE bug 1120335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131576">SUSE bug 1131576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131918">SUSE bug 1131918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148893">SUSE bug 1148893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169664">SUSE bug 1169664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490530" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20406" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL/#NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Modules/_pickle.c in Python before 3.7.1 has an integer overflow via a large LONG_BINPUT value that is mishandled during a "resize to twice the size" attempt. This issue might cause memory exhaustion, but is only relevant if the pickle format is used for serializing tens or hundreds of gigabytes of data. This issue is fixed in: v3.4.10, v3.4.10rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.7rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.7, v3.6.7rc1, v3.6.7rc2, v3.6.8, v3.6.8rc1, v3.6.9, v3.6.9rc1; v3.7.1, v3.7.1rc1, v3.7.1rc2, v3.7.2, v3.7.2rc1, v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20406">CVE-2018-20406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120644">SUSE bug 1120644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4J7MEOLQLFRA3ARNABFNLF2I4CI6U4D6/#4J7MEOLQLFRA3ARNABFNLF2I4CI6U4D6" source="SUSE-SU"/>
    <description>
    GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20482">CVE-2018-20482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705032" comment="tar-1.34-150000.3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20511" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20511" ref_url="https://www.suse.com/security/cve/CVE-2018-20511" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20511/">CVE-2018-20511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20511">CVE-2018-20511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120388">SUSE bug 1120388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20532" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5/#WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20532">CVE-2018-20532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120629">SUSE bug 1120629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904470" comment="libsolv-tools-0.7.16-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20533" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5/#WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5" source="SUSE-SU"/>
    <description>
    There is a NULL pointer dereference at ext/testcase.c (function testcase_str2dep_complex) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20533">CVE-2018-20533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120630">SUSE bug 1120630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904470" comment="libsolv-tools-0.7.16-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20534" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2265-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192265-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007438.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1927-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5/#WVIOCGRDOEPR6QZDWDWT4JR4KMYHLNX5" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** There is an illegal address access at ext/testcase.c in libsolv.a in libsolv through 0.7.2 that will cause a denial of service. NOTE: third parties dispute this issue stating that the issue affects the test suite and not the underlying library. It cannot be exploited in any real-world application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20534">CVE-2018-20534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1120631">SUSE bug 1120631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904470" comment="libsolv-tools-0.7.16-3.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20573" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20573" ref_url="https://www.suse.com/security/cve/CVE-2018-20573" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1740-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5JRSH3JEFDRI2LLKIUVXRRMZJAO5ZPH/" source="SUSE-SU"/>
    <description>
    The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20573/">CVE-2018-20573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20573">CVE-2018-20573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121227">SUSE bug 1121227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705024" comment="libyaml-cpp0_6-0.6.1-4.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20574" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20574" ref_url="https://www.suse.com/security/cve/CVE-2018-20574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1740-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5JRSH3JEFDRI2LLKIUVXRRMZJAO5ZPH/" source="SUSE-SU"/>
    <description>
    The SingleDocParser::HandleFlowMap function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20574/">CVE-2018-20574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20574">CVE-2018-20574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121230">SUSE bug 1121230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705024" comment="libyaml-cpp0_6-0.6.1-4.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3/#UIEBC5XKVMKKVG2FBX5VPRFS2CNKDSF3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
    <description>
    An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20669">CVE-2018-20669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122971">SUSE bug 1122971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20685">CVE-2018-20685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134932">SUSE bug 1134932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20699" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20699" ref_url="https://www.suse.com/security/cve/CVE-2018-20699" source="SUSE CVE"/>
    <description>
    Docker Engine before 18.09 allows attackers to cause a denial of service (dockerd memory consumption) via a large integer in a --cpuset-mems or --cpuset-cpus value, related to daemon/daemon_unix.go, pkg/parsers/parsers.go, and pkg/sysinfo/sysinfo.go.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20699/">CVE-2018-20699 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20699">CVE-2018-20699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121768">SUSE bug 1121768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20784" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20784" ref_url="https://www.suse.com/security/cve/CVE-2018-20784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 4.20.2, kernel/sched/fair.c mishandles leaf cfs_rq's, which allows attackers to cause a denial of service (infinite loop in update_blocked_averages) or possibly have unspecified other impact by inducing a high load.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20784/">CVE-2018-20784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20784">CVE-2018-20784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126703">SUSE bug 1126703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20796" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20796" ref_url="https://www.suse.com/security/cve/CVE-2018-20796" source="SUSE CVE"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\\1\\1|t1|\\\2537)+' in grep.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20796/">CVE-2018-20796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20796">CVE-2018-20796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127311">SUSE bug 1127311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182116">SUSE bug 1182116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334828" comment="glibc-locale is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339499" comment="glibc-locale-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20815" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK/#47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
    <description>
    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20815">CVE-2018-20815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130675">SUSE bug 1130675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130680">SUSE bug 1130680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138043">SUSE bug 1138043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005700.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KU4GXTAKQFS5PA6PCLDQBJZL3QVIVCA2/#KU4GXTAKQFS5PA6PCLDQBJZL3QVIVCA2" source="SUSE-SU"/>
    <description>
    In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139937">SUSE bug 1139937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FN4KSSOYAZVKWJ6LVNFARMICI7FNMU4U/#FN4KSSOYAZVKWJ6LVNFARMICI7FNMU4U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVPJ24WT4VQT4UAT45QHBIGS74L2XEU7/#QVPJ24WT4VQT4UAT45QHBIGS74L2XEU7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    http.cookiejar.DefaultPolicy.domain_return_ok in Lib/http/cookiejar.py in Python before 3.7.3 does not correctly validate the domain: it can be tricked into sending existing cookies to the wrong server. An attacker may abuse this flaw by using a server with a hostname that has another valid hostname as a suffix (e.g., pythonicexample.com to steal cookies for example.com). When a program uses http.cookiejar.DefaultPolicy and tries to do an HTTP connection to an attacker-controlled server, existing cookies can be leaked to the attacker. This affects 2.x through 2.7.16, 3.x before 3.4.10, 3.5.x before 3.5.7, 3.6.x before 3.6.9, and 3.7.x before 3.7.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20852">CVE-2018-20852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141853">SUSE bug 1141853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201820854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-20854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-20854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20854" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-20854" ref_url="https://www.suse.com/security/cve/CVE-2018-20854" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.20. drivers/phy/mscc/phy-ocelot-serdes.c has an off-by-one error with a resultant ctrl-&gt;phys out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-20854/">CVE-2018-20854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20854">CVE-2018-20854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143038">SUSE bug 1143038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201821029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-21029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-21029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21029" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-21029" ref_url="https://www.suse.com/security/cve/CVE-2018-21029" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-21029/">CVE-2018-21029 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21029">CVE-2018-21029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155539">SUSE bug 1155539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25015" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25015" ref_url="https://www.suse.com/security/cve/CVE-2018-25015" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 4.14.16. There is a use-after-free in net/sctp/socket.c for a held lock after a peel off, aka CID-a0ff660058b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25015/">CVE-2018-25015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25015">CVE-2018-25015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187046">SUSE bug 1187046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3URMJJJ2MKM4FNDYFMSSIEJDTNENDZRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3IAWI5KYTN2PXEFZY7OU7STBINLC3H6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14656-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA2YASY5GVVBWOWVKGZPCNZJI5WMPXEX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197893">SUSE bug 1197893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198667">SUSE bug 1198667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199104">SUSE bug 1199104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200049">SUSE bug 1200049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201732">SUSE bug 1201732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224427">SUSE bug 1224427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009676998" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639" source="SUSE CVE"/>
		<reference ref_id="BLOG-SPECTREV4" ref_url="https://www.suse.com/c/suse-addresses-spectre-variant-4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1362-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1377-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1699-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2973-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3064-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0049-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1211-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="TID000019189" ref_url="https://www.suse.com/support/kb/doc/?id=000019189" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022937" ref_url="https://www.suse.com/support/kb/doc/?id=7022937" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BCCQDPJW2OALB7V422FPMTSVLNT4SDK/#3BCCQDPJW2OALB7V422FPMTSVLNT4SDK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU/#EN4KK2FGUDUKZAKRD5IRYD6AZQXJA3AU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DTY7JAJYMYELBQLVDLRBKHCODMF4VR2X/#DTY7JAJYMYELBQLVDLRBKHCODMF4VR2X" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC/#5D5HCM6BTW7CSKI6FOYBLEEDAUENGGXC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSQV2LVBPYK6LXE7MQKJGQOAPCP5LUJR/#FSQV2LVBPYK6LXE7MQKJGQOAPCP5LUJR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD/#XUSB6PC7DAOIGXD55U5BIXS3XLAJSCAD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1628-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBPI2AXXFYB4AEHXIP57EMI675FERZLJ/#MBPI2AXXFYB4AEHXIP57EMI675FERZLJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCRPNJGUE3UBRNI24CJSLFLYA36U5YTK/#UCRPNJGUE3UBRNI24CJSLFLYA36U5YTK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D2PVS7GZZR7IJ5VTYMKLDALGNC6VIE7J/#D2PVS7GZZR7IJ5VTYMKLDALGNC6VIE7J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD/#USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV572SEMHY7W2BLBGHICX7YQUWOEXYOY/#LV572SEMHY7W2BLBGHICX7YQUWOEXYOY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PFA5BW2DAJTSU5WJ6XZHKPJGNFARXDO/#2PFA5BW2DAJTSU5WJ6XZHKPJGNFARXDO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3709-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC/#6QVAQ44FSYXJBEKJIEYZNJJDZMVYSMAC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB/#DNU7M5Z2B7TCVZ4AJHU2KUMRUBGPJNVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7O77T6GROGFAGVFEVEOJLXNTO37WYB7M/#7O77T6GROGFAGVFEVEOJLXNTO37WYB7M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE/#SRTWOMLHK3HQNCIFSWBLQE7M6MCMULOE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3639">CVE-2018-3639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085235">SUSE bug 1085235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085308">SUSE bug 1085308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092631">SUSE bug 1092631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092885">SUSE bug 1092885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098813">SUSE bug 1098813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102640">SUSE bug 1102640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105412">SUSE bug 1105412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111963">SUSE bug 1111963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173489">SUSE bug 1173489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1935-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="TID000019198" ref_url="https://www.suse.com/support/kb/doc/?id=000019198" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7022950" ref_url="https://www.suse.com/support/kb/doc/?id=7022950" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1904-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCRPNJGUE3UBRNI24CJSLFLYA36U5YTK/#UCRPNJGUE3UBRNI24CJSLFLYA36U5YTK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD/#USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3640">CVE-2018-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1074701">SUSE bug 1074701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087083">SUSE bug 1087083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094912">SUSE bug 1094912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098813">SUSE bug 1098813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100394">SUSE bug 1100394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175912">SUSE bug 1175912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646" source="SUSE CVE"/>
		<reference ref_id="L1TF-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2331-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2410-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2963-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182963-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-December/005008.html" source="SUSE-SU"/>
		<reference ref_id="TID000019216" ref_url="https://www.suse.com/support/kb/doc/?id=000019216" source="SUSE-SU"/>
		<reference ref_id="TID000019230" ref_url="https://www.suse.com/support/kb/doc/?id=000019230" source="SUSE-SU"/>
		<reference ref_id="TID000019335" ref_url="https://www.suse.com/support/kb/doc/?id=000019335" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7023077" ref_url="https://www.suse.com/support/kb/doc/?id=7023077" source="SUSE-SU"/>
		<reference ref_id="TID7023078" ref_url="https://www.suse.com/support/kb/doc/?id=7023078" source="SUSE-SU"/>
		<reference ref_id="TID7023312" ref_url="https://www.suse.com/support/kb/doc/?id=7023312" source="SUSE-SU"/>
		<reference ref_id="TID7023497" ref_url="https://www.suse.com/support/kb/doc/?id=7023497" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD/#USTMB5QHLNG2XPHOBRVR2A5AQTUUFTJD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN/#DHR6QOZXXCNSV77C5MHVLBK4DBFOQPCN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB/#6QZ6OW67VR3KFGN3MO3RPGU6G64AJTPB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6LYYJIDEGPPEFUUXEAYMPHFAQGR6NTGX/#6LYYJIDEGPPEFUUXEAYMPHFAQGR6NTGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2436-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNBQIEC4J7WNUVAS6GCDAN7EQNDPMLV/#LDNBQIEC4J7WNUVAS6GCDAN7EQNDPMLV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN/#ZGEUHNX43HCCBYABAIEDDEBPSLPX6CIN" source="SUSE-SU"/>
    <description>
    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3646">CVE-2018-3646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087081">SUSE bug 1087081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1089343">SUSE bug 1089343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091107">SUSE bug 1091107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099306">SUSE bug 1099306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104365">SUSE bug 1104365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1104894">SUSE bug 1104894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106548">SUSE bug 1106548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113534">SUSE bug 1113534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136865">SUSE bug 1136865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20183665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-3665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-3665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1855-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2081-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2099-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20182099-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004499.html" source="SUSE-SU"/>
		<reference ref_id="TID000019231" ref_url="https://www.suse.com/support/kb/doc/?id=000019231" source="SUSE-SU"/>
		<reference ref_id="TID000019261" ref_url="https://www.suse.com/support/kb/doc/?id=000019261" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID7022512" ref_url="https://www.suse.com/support/kb/doc/?id=7022512" source="SUSE-SU"/>
		<reference ref_id="TID7023076" ref_url="https://www.suse.com/support/kb/doc/?id=7023076" source="SUSE-SU"/>
		<reference ref_id="TID7023167" ref_url="https://www.suse.com/support/kb/doc/?id=7023167" source="SUSE-SU"/>
		<reference ref_id="TID7023836" ref_url="https://www.suse.com/support/kb/doc/?id=7023836" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1773-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC/#ID6PAFCJG4KPF2AULGBYPBQUFIOCIVYC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2116-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH/#N3OKO7RNL6JS24VQY6ENCPL3INPB4JPH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N/#5VZ33BMB7LZHYUFUTHA35O66BLP6RK4N" source="SUSE-SU"/>
    <description>
    System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-3665">CVE-2018-3665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087086">SUSE bug 1087086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090338">SUSE bug 1090338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095241">SUSE bug 1095241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095242">SUSE bug 1095242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1096740">SUSE bug 1096740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100091">SUSE bug 1100091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100555">SUSE bug 1100555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0737-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2ERK3TGYW22HRZWDX2VFIPJE55ML52P/#O2ERK3TGYW22HRZWDX2VFIPJE55ML52P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out of bounds memory write while processing Vorbis audio data was reported through the Pwn2Own contest. This vulnerability affects Firefox &lt; 59.0.1, Firefox ESR &lt; 52.7.2, and Thunderbird &lt; 52.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5146">CVE-2018-5146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085671">SUSE bug 1085671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085687">SUSE bug 1085687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180395">SUSE bug 1180395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009489365" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489366" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244" source="SUSE CVE"/>
    <description>
    In Xen 4.10, new infrastructure was introduced as part of an overhaul to how MSR emulation happens for guests. Unfortunately, one tracking structure isn't freed when a vcpu is destroyed. This allows guest OS administrators to cause a denial of service (host OS memory consumption) by rebooting many times.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5244">CVE-2018-5244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1073961">SUSE bug 1073961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1074966">SUSE bug 1074966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5344" ref_url="https://www.suse.com/security/cve/CVE-2018-5344" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 4.14.13, drivers/block/loop.c mishandles lo_release serialization, which allows attackers to cause a denial of service (__lock_acquire use-after-free) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5344/">CVE-2018-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5344">CVE-2018-5344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1075825">SUSE bug 1075825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5703" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5703" ref_url="https://www.suse.com/security/cve/CVE-2018-5703" source="SUSE CVE"/>
    <description>
    The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.14.11 allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via vectors involving TLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5703/">CVE-2018-5703 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5703">CVE-2018-5703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076200">SUSE bug 1076200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV/#SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to cause a denial of service (NULL pointer dereference) or bypass a DN container check by supplying tagged data that is internal to the database module.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5729">CVE-2018-5729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083926">SUSE bug 1083926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV/#SMD7M4ZIYICJIBXAT2O34XUCDIU6HRBV" source="SUSE-SU"/>
    <description>
    MIT krb5 1.6 or later allows an authenticated kadmin with permission to add principals to an LDAP Kerberos database to circumvent a DN containership check by supplying both a "linkdn" and "containerdn" database argument, or by supplying a DN string which is a left extension of a container DN string but is not hierarchically within the container DN.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5730">CVE-2018-5730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076211">SUSE bug 1076211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083927">SUSE bug 1083927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122468">SUSE bug 1122468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004357.html" source="SUSE-SU"/>
    <description>
    qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076500">SUSE bug 1076500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083625">SUSE bug 1083625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087887">SUSE bug 1087887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20185764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-5764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-5764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003619.html" source="SUSE-SU"/>
    <description>
    The parse_arguments function in options.c in rsyncd in rsync before 3.1.3 does not prevent multiple --protect-args uses, which allows remote attackers to bypass an argument-sanitization protection mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5764">CVE-2018-5764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076503">SUSE bug 1076503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887035" comment="rsync-3.1.3-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-January/003682.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6003">CVE-2018-6003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1076832">SUSE bug 1076832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490140" comment="libtasn1-4.13-4.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490141" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6485">CVE-2018-6485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123874">SUSE bug 1123874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-February/003758.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA/#CRF5MPDADQ4YUE6MODU4JUS5YDCKTOEA" source="SUSE-SU"/>
    <description>
    The malloc implementation in the GNU C Library (aka glibc or libc6), from version 2.24 to 2.26 on powerpc, and only in version 2.26 on i386, did not properly handle malloc calls with arguments close to SIZE_MAX and could return a pointer to a heap region that is smaller than requested, eventually leading to heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6551">CVE-2018-6551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1079036">SUSE bug 1079036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6829" ref_url="https://www.suse.com/security/cve/CVE-2018-6829" source="SUSE CVE"/>
    <description>
    cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6829/">CVE-2018-6829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6829">CVE-2018-6829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081684">SUSE bug 1081684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335465" comment="libgcrypt20 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6914">CVE-2018-6914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087441">SUSE bug 1087441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006839.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0704-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7HRHABTHHJKCUCCIG4MN5VYZ47BLAVKH/" source="SUSE-SU"/>
    <description>
    An issue was discovered in FreeType 2 through 2.9. A NULL pointer dereference in the Ins_GETVARIATION() function within ttinterp.c could lead to DoS via a crafted font file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6942">CVE-2018-6942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20186954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-6954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-6954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y/#KDEM25CHZWMRDGDYZ23LBZGMPWA63D2Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK/#CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK" source="SUSE-SU"/>
    <description>
    systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6954">CVE-2018-6954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080919">SUSE bug 1080919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7169" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003805.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7169">CVE-2018-7169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1081294">SUSE bug 1081294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491587" comment="shadow-4.6-3.5.6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7480" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7480" ref_url="https://www.suse.com/security/cve/CVE-2018-7480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:3003-1" ref_url="https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005035.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7/#56FCVMOU7EZPSBZAXDQQHKB5N5YI7KX7" source="SUSE-SU"/>
    <description>
    The blkcg_init_queue function in block/blk-cgroup.c in the Linux kernel before 4.11 allows local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7480/">CVE-2018-7480 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7480">CVE-2018-7480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1082863">SUSE bug 1082863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084536">SUSE bug 1084536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7540" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (host OS CPU hang) via non-preemptable L3/L4 pagetable freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7540">CVE-2018-7540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080635">SUSE bug 1080635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7541" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7541">CVE-2018-7541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080662">SUSE bug 1080662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7542" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7542">CVE-2018-7542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080634">SUSE bug 1080634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-March/003848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/004054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004424.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:0780-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7/#R3FRDROY2UV4WMIXYKNDNPPBXQOBE6U7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LV572SEMHY7W2BLBGHICX7YQUWOEXYOY/#LV572SEMHY7W2BLBGHICX7YQUWOEXYOY" source="SUSE-SU"/>
    <description>
    The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1083291">SUSE bug 1083291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1083292">SUSE bug 1083292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7685" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-August/004510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-September/004582.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2739-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXWDNGS7WA5EKGYYSESAPSWC6QAAJST3/#VXWDNGS7WA5EKGYYSESAPSWC6QAAJST3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FC72JMADPYY2LHNMDK3WQFQ2Y57HNX5I/#FC72JMADPYY2LHNMDK3WQFQ2Y57HNX5I" source="SUSE-SU"/>
    <description>
    The decoupled download and installation steps in libzypp before 17.5.0 could lead to a corrupted RPM being left in the cache, where a later call would not display the corrupted RPM warning and allow installation, a problem caused by malicious warnings only displayed during download.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7685">CVE-2018-7685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1045735">SUSE bug 1045735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088705">SUSE bug 1088705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091624">SUSE bug 1091624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904480" comment="libzypp-17.25.6-3.28.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-July/004317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017157.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2203-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOWZJUBUAZPRW4JOY2HXWJXSHJBPU4DZ/#DOWZJUBUAZPRW4JOY2HXWJXSHJBPU4DZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:2205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YDR2WLLPWV6LRUTDYP3NUJZYYQZ565S/#5YDR2WLLPWV6LRUTDYP3NUJZYYQZ565S" source="SUSE-SU"/>
    <description>
    In util-linux before 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7738">CVE-2018-7738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1080740">SUSE bug 1080740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084300">SUSE bug 1084300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213865">SUSE bug 1213865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904456" comment="libblkid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904457" comment="libfdisk1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904458" comment="libmount1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904459" comment="libsmartcols1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904460" comment="libuuid1-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904461" comment="util-linux-2.33.1-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904462" comment="util-linux-systemd-2.33.1-4.13.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
    <description>
    Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7858">CVE-2018-7858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084604">SUSE bug 1084604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7995" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7995" ref_url="https://www.suse.com/security/cve/CVE-2018-7995" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck&lt;cpu number&gt; directory. NOTE: a third party has indicated that this report is not security relevant.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7995/">CVE-2018-7995 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7995">CVE-2018-7995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084755">SUSE bug 1084755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20187999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-7999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-7999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7999" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-April/003860.html" source="SUSE-SU"/>
    <description>
    In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7999">CVE-2018-7999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1084850">SUSE bug 1084850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881851" comment="libgraphite2-3-1.3.11-2.12 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1426-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NM2THVUCTWFQMPC4R72NX6GPHFWPNXXW/#NM2THVUCTWFQMPC4R72NX6GPHFWPNXXW" source="SUSE-SU"/>
    <description>
    In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8740">CVE-2018-8740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085790">SUSE bug 1085790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131919">SUSE bug 1131919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490530" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8769" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8769" ref_url="https://www.suse.com/security/cve/CVE-2018-8769" source="SUSE CVE"/>
    <description>
    elfutils 0.170 has a buffer over-read in the ebl_dynamic_tag_name function of libebl/ebldynamictagname.c because SYMTAB_SHNDX is unsupported.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8769/">CVE-2018-8769 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8769">CVE-2018-8769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1085809">SUSE bug 1085809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335871" comment="libasm1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335872" comment="libdw1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659704" comment="libebl-plugins is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335876" comment="libelf1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8777">CVE-2018-8777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087436">SUSE bug 1087436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8778">CVE-2018-8778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087433">SUSE bug 1087433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8779">CVE-2018-8779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087440">SUSE bug 1087440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8780">CVE-2018-8780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087437">SUSE bug 1087437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136906">SUSE bug 1136906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20188897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-8897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-8897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2018:1171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1173-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-May/003998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-June/004180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004740.html" source="SUSE-SU"/>
		<reference ref_id="TID000019188" ref_url="https://www.suse.com/support/kb/doc/?id=000019188" source="SUSE-SU"/>
		<reference ref_id="TID7022916" ref_url="https://www.suse.com/support/kb/doc/?id=7022916" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG/#7XRHMUF55OX3PSZEXNERH3QX6AHU5QDG" source="SUSE-SU"/>
    <description>
    A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL &lt; 3, the debug exception is delivered after the transfer to CPL &lt; 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8897">CVE-2018-8897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087078">SUSE bug 1087078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1087088">SUSE bug 1087088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090368">SUSE bug 1090368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090820">SUSE bug 1090820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090869">SUSE bug 1090869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1092497">SUSE bug 1092497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093522">SUSE bug 1093522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093524">SUSE bug 1093524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1098813">SUSE bug 1098813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1100835">SUSE bug 1100835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115893">SUSE bug 1115893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9056" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9056" ref_url="https://www.suse.com/security/cve/CVE-2018-9056" source="SUSE CVE"/>
    <description>
    Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-9056/">CVE-2018-9056 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9056">CVE-2018-9056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1087110">SUSE bug 1087110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031800.html" source="SUSE-SU"/>
    <description>
    GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9234">CVE-2018-9234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088255">SUSE bug 1088255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090647">SUSE bug 1090647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217431">SUSE bug 1217431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217437">SUSE bug 1217437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899855" comment="gpg2-2.2.5-4.14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20189251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-9251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-9251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9251" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004657.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV/#ILYW2C6FGNAL4Q6R3GJ46OYV3767BZKV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3110-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM/#UGBO6EGVEWKLMPKEC5PS3Y7CFCSPFUUM" source="SUSE-SU"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-9251">CVE-2018-9251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1088279">SUSE bug 1088279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088601">SUSE bug 1088601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1105166">SUSE bug 1105166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0154">CVE-2019-0154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20190155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-0155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-0155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0155">CVE-2019-0155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135966">SUSE bug 1135966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135967">SUSE bug 1135967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173663">SUSE bug 1173663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191010305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1010305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1010305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6T5SQLZ2AFX7P4RLGAUWJ7UXHA563FA/" source="SUSE-SU"/>
    <description>
    libmspack 0.9.1alpha is affected by: Buffer Overflow. The impact is: Information Disclosure. The component is: function chmd_read_headers() in libmspack(file libmspack/mspack/chmd.c). The attack vector is: the victim must open a specially crafted chm file. The fixed version is: after commit 2f084136cfe0d05e5bf5703f3e83c6d955234b4d.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1010305">CVE-2019-1010305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141680">SUSE bug 1141680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492057" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10125" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10125" ref_url="https://www.suse.com/security/cve/CVE-2019-10125" source="SUSE CVE"/>
    <description>
    An issue was discovered in aio_poll() in fs/aio.c in the Linux kernel through 5.0.4. A file may be released by aio_poll_wake() if an expected event is triggered immediately (e.g., by the close of a pair of pipes) after the return of vfs_poll(), and this will cause a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10125/">CVE-2019-10125 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10125">CVE-2019-10125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130695">SUSE bug 1130695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10132" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libvirt &gt;= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10132">CVE-2019-10132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134348">SUSE bug 1134348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10140" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10140" ref_url="https://www.suse.com/security/cve/CVE-2019-10140" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Linux kernel's, versions up to 3.10, implementation of overlayfs. An attacker with local access can create a denial of service situation via NULL pointer dereference in ovl_posix_acl_create function in fs/overlayfs/dir.c. This can allow attackers with ability to create directories on overlayfs to crash the kernel creating a denial of service (DOS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10140/">CVE-2019-10140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10140">CVE-2019-10140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145701">SUSE bug 1145701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10142" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10142" ref_url="https://www.suse.com/security/cve/CVE-2019-10142" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's freescale hypervisor manager implementation, kernel versions 5.0.x up to, excluding 5.0.17. A parameter passed to an ioctl was incorrectly validated and used in size calculations for the page size calculation. An attacker can use this flaw to crash the system, corrupt memory, or create other adverse security affects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10142/">CVE-2019-10142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10142">CVE-2019-10142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135955">SUSE bug 1135955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10152" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC/#IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10152">CVE-2019-10152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136974">SUSE bug 1136974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904463" comment="libcontainers-common-20200727-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494403" comment="podman-2.1.1-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887139" comment="podman-cni-config-2.1.1-4.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2053-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUN2FYU6IS24OA6WO4U6AZW3MIX2AM5Y/#PUN2FYU6IS24OA6WO4U6AZW3MIX2AM5Y" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10160">CVE-2019-10160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ/#EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd before versions 4.10.1 and 5.4.1 would permit read-only clients to use the virDomainSaveImageGetXMLDesc() API, specifying an arbitrary path which would be accessed with the permissions of the libvirtd process. An attacker with access to the libvirtd socket could use this to probe the existence of arbitrary files, cause denial of service or cause libvirtd to execute arbitrary programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10161">CVE-2019-10161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ/#EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    It was discovered that libvirtd, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, would permit readonly clients to use the virDomainManagedSaveDefineXML() API, which would permit them to modify managed save state files. If a managed save had already been created by a privileged user, a local attacker could modify this file such that libvirtd would execute an arbitrary program when the domain was resumed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10166">CVE-2019-10166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138302">SUSE bug 1138302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2227-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005908.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ/#EX33W6SJQ2N6Y4VRWHLRPU5IT2Q2GTSQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    The virConnectGetDomainCapabilities() libvirt API, versions 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accepts an "emulatorbin" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10167">CVE-2019-10167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138303">SUSE bug 1138303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1753-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TBD5ULGUEZL4TZRROZSNLPUISO6DF45I/#TBD5ULGUEZL4TZRROZSNLPUISO6DF45I" source="SUSE-SU"/>
    <description>
    The virConnectBaselineHypervisorCPU() and virConnectCompareHypervisorCPU() libvirt APIs, 4.x.x before 4.10.1 and 5.x.x before 5.4.1, accept an "emulator" argument to specify the program providing emulation for a domain. Since v1.2.19, libvirt will execute that program to probe the domain's capabilities. Read-only clients could specify an arbitrary path for this argument, causing libvirtd to execute a crafted executable with its own privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10168">CVE-2019-10168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138305">SUSE bug 1138305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138582">SUSE bug 1138582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2368-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192368-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2369-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192369-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010404.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2137-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYG7RHRALJWSCP4Q446GPBV3Q3VXHPSA/#OYG7RHRALJWSCP4Q446GPBV3Q3VXHPSA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HZRTZCNPT7HWJWKCK6XQGBNBMNIAZ4G/#2HZRTZCNPT7HWJWKCK6XQGBNBMNIAZ4G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N762AZNFXJTSMPWTVZYETSLGO7DDQZ35/#N762AZNFXJTSMPWTVZYETSLGO7DDQZ35" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AC5ARDFVQN6NRV23HXFV6NEKEG3ENNBB/#AC5ARDFVQN6NRV23HXFV6NEKEG3ENNBB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ILBJ4PWG72SOBVPDNPC2K2KBEYLGL36/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7YYGMTZ4T4RLHDVCMQD3K6CDIAXO3O3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0310-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4DQSPUPKAZCPS5MQYTAYGS7YM76UIHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFIDXN6UAK2I4PPVFPBE4STNQH2FZQ4A/" source="SUSE-SU"/>
    <description>
    The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10214">CVE-2019-10214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144065">SUSE bug 1144065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494403" comment="podman-2.1.1-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887139" comment="podman-cni-config-2.1.1-4.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3019-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193019-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10220">CVE-2019-10220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153108">SUSE bug 1153108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10557" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10557" ref_url="https://www.suse.com/security/cve/CVE-2019-10557" source="SUSE CVE"/>
    <description>
    Out-of-bound read in the wireless driver in the Linux kernel due to lack of check of buffer length. in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music in APQ8009, APQ8017, APQ8053, APQ8096AU, MDM9206, MDM9207C, MDM9607, MDM9650, MSM8996AU, QCA6174A, QCA6574AU, QCA9377, QCA9379, QCN7605, QCS605, SDA660, SDA845, SDM630, SDM636, SDM660, SDX20, SDX55, SXR1130
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-10557/">CVE-2019-10557 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10557">CVE-2019-10557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159621">SUSE bug 1159621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201910906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-10906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-10906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E/#KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR/#4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10906">CVE-2019-10906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132323">SUSE bug 1132323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897127" comment="python3-Jinja2-2.10.1-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1221-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005772.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1428-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NC6JYCW6AOKCPY44BVDJEHAEZOST7HQ/#4NC6JYCW6AOKCPY44BVDJEHAEZOST7HQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XBZN5QJD3GQNVGWYVIV5ID4F4OJDRS5/#6XBZN5QJD3GQNVGWYVIV5ID4F4OJDRS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1433-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4VHP5XI7AOFECZTZP7RTWTCS7HV5U7LM/#4VHP5XI7AOFECZTZP7RTWTCS7HV5U7LM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IH56YOTZGFXNOIR75H2UYJCQOA2UAJA/#6IH56YOTZGFXNOIR75H2UYJCQOA2UAJA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1824-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NM2KMIISZ2FSHQKYLFT4WOLDJMPLTJJ7/#NM2KMIISZ2FSHQKYLFT4WOLDJMPLTJJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11068">CVE-2019-11068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132160">SUSE bug 1132160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154212">SUSE bug 1154212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091" source="SUSE CVE"/>
		<reference ref_id="MDS-BLOG-SUSE" ref_url="https://www.suse.com/c/suse-addresses-microarchitectural-data-sampling-vulnerabilities/" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="TID000019406" ref_url="https://www.suse.com/support/kb/doc/?id=000019406" source="SUSE-SU"/>
		<reference ref_id="TID000019455" ref_url="https://www.suse.com/support/kb/doc/?id=000019455" source="SUSE-SU"/>
		<reference ref_id="TID7023736" ref_url="https://www.suse.com/support/kb/doc/?id=7023736" source="SUSE-SU"/>
		<reference ref_id="TID7023881" ref_url="https://www.suse.com/support/kb/doc/?id=7023881" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX/#33MA77JSUFVKUR6Z5BDK3Q5WJV5TLMGX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1403-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G/#VXQE4RWMS56TBCJGRYUPTRMOPKA4W36G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH/#ZZ2FZBVA3Q7VOUC5KRK2EODJSBYJDCKH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S/#UMXCAWC5QTZVSPZOYUW3E3GVJJUKCQ2S" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H/#ZSE72NMUCLWUM5YDC3SFM4F3IBT36O4H" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1419-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ/#MBTX5PVRT77LNABRQZJWPEB5R2XII2HZ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS/#PHUAEI2S4AOFDWOX4LHSXMP4KM5BJRWS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU/#7TYDM6JT7REGY5GWV2QCHLGWEXWMFQXU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA/#EXK6FJ36C5QT4K2AAY7SESWBHLXITKIA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1805-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P/#YSPWDEAWE7P6Q74P7Y3X6GN4DTSDOX2P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C57DILLST76FNAJLKX2HCZ5LXACTE6OS/#C57DILLST76FNAJLKX2HCZ5LXACTE6OS" source="SUSE-SU"/>
    <description>
    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11091">CVE-2019-11091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1103186">SUSE bug 1103186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111331">SUSE bug 1111331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133319">SUSE bug 1133319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135394">SUSE bug 1135394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138043">SUSE bug 1138043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138534">SUSE bug 1138534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141977">SUSE bug 1141977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-TAA-IFU" ref_url="https://www.suse.com/c/suse-addresses-transactional-asynchronous-abort-and-machine-check-error-on-page-size-changes-issues/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="TID000019563" ref_url="https://www.suse.com/support/kb/doc/?id=000019563" source="SUSE-SU"/>
		<reference ref_id="TID7024251" ref_url="https://www.suse.com/support/kb/doc/?id=7024251" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E37URKMMJAKXS5WM65BEKIVDDLOSR6PW/#E37URKMMJAKXS5WM65BEKIVDDLOSR6PW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE/#M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GUK5H34U2XTLAIOJIQ7UDAHEDBJ2QCT/#4GUK5H34U2XTLAIOJIQ7UDAHEDBJ2QCT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILHYRTCJV4JB7GTI5KDDGCMTR5BWLJPM/#ILHYRTCJV4JB7GTI5KDDGCMTR5BWLJPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYX74HKOHWYW6GOJM3PN5OCIGQS4IP2/#VPYX74HKOHWYW6GOJM3PN5OCIGQS4IP2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2710-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75/#VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75" source="SUSE-SU"/>
    <description>
    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11135">CVE-2019-11135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139073">SUSE bug 1139073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152497">SUSE bug 1152497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152505">SUSE bug 1152505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152506">SUSE bug 1152506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160120">SUSE bug 1160120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11139" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2958-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2959-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006195.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2504-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE/#M3QLZVRJX73SZ6RSPQ7ODD7UC3C6F6FE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2509-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GUK5H34U2XTLAIOJIQ7UDAHEDBJ2QCT/#4GUK5H34U2XTLAIOJIQ7UDAHEDBJ2QCT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2527-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILHYRTCJV4JB7GTI5KDDGCMTR5BWLJPM/#ILHYRTCJV4JB7GTI5KDDGCMTR5BWLJPM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2528-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPYX74HKOHWYW6GOJM3PN5OCIGQS4IP2/#VPYX74HKOHWYW6GOJM3PN5OCIGQS4IP2" source="SUSE-SU"/>
    <description>
    Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11139">CVE-2019-11139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141035">SUSE bug 1141035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV/#H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11236">CVE-2019-11236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904486" comment="python3-urllib3-1.24-9.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV/#H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11324">CVE-2019-11324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132900">SUSE bug 1132900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904486" comment="python3-urllib3-1.24-9.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP_SKB_CB(skb)-&gt;tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11477">CVE-2019-11477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153242">SUSE bug 1153242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1851-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191851-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11478">CVE-2019-11478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143542">SUSE bug 1143542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019472" ref_url="https://www.suse.com/support/kb/doc/?id=000019472" source="SUSE-SU"/>
		<reference ref_id="TID7023928" ref_url="https://www.suse.com/support/kb/doc/?id=7023928" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1570-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N/#NJCQPY6KJMGUNOCG3VYC34NI2F6XUC3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1571-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV/#CDOL6RIYB7LA5CRMCAHJHNNPCUYRJAEV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GOX3GRSFJIOAQWX677KTNVAGGH653HWU/#GOX3GRSFJIOAQWX677KTNVAGGH653HWU" source="SUSE-SU"/>
    <description>
    Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11479">CVE-2019-11479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132686">SUSE bug 1132686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137586">SUSE bug 1137586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142129">SUSE bug 1142129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143542">SUSE bug 1143542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11555" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11555">CVE-2019-11555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11683" ref_url="https://www.suse.com/security/cve/CVE-2019-11683" source="SUSE CVE"/>
    <description>
    udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11683/">CVE-2019-11683 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11683">CVE-2019-11683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134021">SUSE bug 1134021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IT3UIP5O2QPRMJEIU4SZ6MBHNKBLUYZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AN4USN47JRBDAYTJ7ARVSFYOKEKTGTFV/" source="SUSE-SU"/>
    <description>
    When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158328">SUSE bug 1158328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158527">SUSE bug 1158527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201911922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-11922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-11922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2019:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QXHXFC7RU7NI42XMFKHE6KI6JEJOMZ3W/#QXHXFC7RU7NI42XMFKHE6KI6JEJOMZ3W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HT6YNXG36NBKEYPS62NKEGLNJE6LYX7J/#HT6YNXG36NBKEYPS62NKEGLNJE6LYX7J" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7K2UOXWEY5FAQGWUDI7235YCQ2R5UPH/#K7K2UOXWEY5FAQGWUDI7235YCQ2R5UPH" source="SUSE-SU"/>
    <description>
    A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11922">CVE-2019-11922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142941">SUSE bug 1142941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009489337" comment="libzstd1-1.4.4-1.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12067" ref_url="https://www.suse.com/security/cve/CVE-2019-12067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header 'ad-&gt;cur_cmd' is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12067/">CVE-2019-12067 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12067">CVE-2019-12067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145642">SUSE bug 1145642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145652">SUSE bug 1145652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
    <description>
    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's-&gt;dsp' index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12068">CVE-2019-12068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146873">SUSE bug 1146873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146874">SUSE bug 1146874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U" source="SUSE-SU"/>
    <description>
    interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12155">CVE-2019-12155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135902">SUSE bug 1135902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135905">SUSE bug 1135905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2611-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X7ZUBC27FFSQ6NLYE4F6HZ22CMNU2UJV/#X7ZUBC27FFSQ6NLYE4F6HZ22CMNU2UJV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRSAKATJHG3HSIHWNI5KWAI67IUCJBGE/#KRSAKATJHG3HSIHWNI5KWAI67IUCJBGE" source="SUSE-SU"/>
    <description>
    GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-12290">CVE-2019-12290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154884">SUSE bug 1154884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12378" ref_url="https://www.suse.com/security/cve/CVE-2019-12378" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in ip6_ra_control in net/ipv6/ipv6_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This has been disputed as not an issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12378/">CVE-2019-12378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12378">CVE-2019-12378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136588">SUSE bug 1136588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12379" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12379" ref_url="https://www.suse.com/security/cve/CVE-2019-12379" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in con_insert_unipair in drivers/tty/vt/consolemap.c in the Linux kernel through 5.1.5. There is a memory leak in a certain case of an ENOMEM outcome of kmalloc. NOTE: This id is disputed as not being an issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12379/">CVE-2019-12379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12379">CVE-2019-12379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136602">SUSE bug 1136602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12381" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12381" ref_url="https://www.suse.com/security/cve/CVE-2019-12381" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in ip_ra_control in net/ipv4/ip_sockglue.c in the Linux kernel through 5.1.5. There is an unchecked kmalloc of new_ra, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: this is disputed because new_ra is never used if it is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12381/">CVE-2019-12381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12381">CVE-2019-12381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136593">SUSE bug 1136593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005644.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1650-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3N6TDMIOTAGWJSCT36DZCQOTW6O7IHE/#X3N6TDMIOTAGWJSCT36DZCQOTW6O7IHE" source="SUSE-SU"/>
    <description>
    file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead, default permissions are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12450">CVE-2019-12450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137001">SUSE bug 1137001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139959">SUSE bug 1139959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142126">SUSE bug 1142126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904434" comment="glib2-tools-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904435" comment="libgio-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904436" comment="libglib-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904437" comment="libgmodule-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904438" comment="libgobject-2_0-0-2.62.6-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12454" ref_url="https://www.suse.com/security/cve/CVE-2019-12454" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in wcd9335_codec_enable_dec in sound/soc/codecs/wcd9335.c in the Linux kernel through 5.1.5. It uses kstrndup instead of kmemdup_nul, which allows attackers to have an unspecified impact via unknown vectors. NOTE: The vendor disputes this issues as not being a vulnerability because switching to kmemdup_nul() would only fix a security issue if the source string wasn't NUL-terminated, which is not the case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12454/">CVE-2019-12454 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12454">CVE-2019-12454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136963">SUSE bug 1136963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12455" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12455" ref_url="https://www.suse.com/security/cve/CVE-2019-12455" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in sunxi_divs_clk_setup in drivers/clk/sunxi/clk-sunxi.c in the Linux kernel through 5.1.5. There is an unchecked kstrndup of derived_name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash). NOTE: This id is disputed as not being an issue because "The memory allocation that was not checked is part of a code that only runs at boot time, before user processes are started. Therefore, there is no possibility for an unprivileged user to control it, and no denial of service.".
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12455/">CVE-2019-12455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12455">CVE-2019-12455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1136946">SUSE bug 1136946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12615" ref_url="https://www.suse.com/security/cve/CVE-2019-12615" source="SUSE CVE"/>
    <description>
    An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info-&gt;vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12615/">CVE-2019-12615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12615">CVE-2019-12615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137195">SUSE bug 1137195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYOETLXB2RD3GRLLDIZKE7UUWDK5TXBE/#TYOETLXB2RD3GRLLDIZKE7UUWDK5TXBE" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1561-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EA6FIRLDRZGR2FVSPZOUMCMXJLSQDFXI/#EA6FIRLDRZGR2FVSPZOUMCMXJLSQDFXI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1562-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5MZQAY5ITS7K633KSHC2D4DFRFAVJTWQ/#5MZQAY5ITS7K633KSHC2D4DFRFAVJTWQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVVBP77XXWO6UY6YS7QTWDVNSXCX6BNR/#JVVBP77XXWO6UY6YS7QTWDVNSXCX6BNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM/#Q6RJXM33RFU6CEU4RJBJ7IIU6ZU4ZYVM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O5Q6ECCW6N3P3VMFMCNJL5AQBTRSD4AI/#O5Q6ECCW6N3P3VMFMCNJL5AQBTRSD4AI" source="SUSE-SU"/>
    <description>
    getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">CVE-2019-12735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137443">SUSE bug 1137443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2820-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006978.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZVR64DPBS7J3FRD6GWGPW3Y54OBW62W/#XZVR64DPBS7J3FRD6GWGPW3Y54OBW62W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1671-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNHYN47AVCXFKCLHEOJ5O7FB65XSK7QL/#QNHYN47AVCXFKCLHEOJ5O7FB65XSK7QL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1750-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PGA7NJC7OHX4NMTM3JZ3FS42PFMMYLII/#PGA7NJC7OHX4NMTM3JZ3FS42PFMMYLII" source="SUSE-SU"/>
    <description>
    dbus before 1.10.28, 1.12.x before 1.12.16, and 1.13.x before 1.13.12, as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some, less common, uses of dbus-daemon), allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case, this could result in the DBusServer reusing a cookie that is known to the malicious client, and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid, allowing authentication bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12749">CVE-2019-12749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1137832">SUSE bug 1137832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009491500" comment="dbus-1-1.12.2-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009491503" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0733" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2004-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192004-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QO3HMQ66EQDMHR5SC3BGIUUVBMK7WYY/#4QO3HMQ66EQDMHR5SC3BGIUUVBMK7WYY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TTMWRHULG5RFJHAER2SONBPANE45JER/#7TTMWRHULG5RFJHAER2SONBPANE45JER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YQU33KHD533M6YFLZCXLG4HHJWYOHRXP/#YQU33KHD533M6YFLZCXLG4HHJWYOHRXP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6/#FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141513">SUSE bug 1141513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490359" comment="libbz2-1-1.0.6-5.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12904" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005751.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1792-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGEWFAF5J7VQL4GHXAYUK44DD2MT4ZUY/#UGEWFAF5J7VQL4GHXAYUK44DD2MT4ZUY" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12904">CVE-2019-12904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138939">SUSE bug 1138939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2006-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192006-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVUTE3ZKQA26CXKVOP2QDOBQY6Y2QIBF/#PVUTE3ZKQA26CXKVOP2QDOBQY6Y2QIBF" source="SUSE-SU"/>
    <description>
    Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13050">CVE-2019-13050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141093">SUSE bug 1141093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009899855" comment="gpg2-2.2.5-4.14.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46KFS6OC36UWKEJS7D2YUROL2323KWEB/#46KFS6OC36UWKEJS7D2YUROL2323KWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQYMYQN54XQCPQJJZEIGGCBW3W7U53IW/#TQYMYQN54XQCPQJJZEIGGCBW3W7U53IW" source="SUSE-SU"/>
    <description>
    An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13057">CVE-2019-13057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143273">SUSE bug 1143273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13115" ref_url="https://www.suse.com/security/cve/CVE-2019-13115" source="SUSE CVE"/>
    <description>
    In libssh2 before 1.9.0, kex_method_diffie_hellman_group_exchange_sha256_key_exchange in kex.c has an integer overflow that could lead to an out-of-bounds read in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. This is related to an _libssh2_check_length mistake, and is different from the various issues fixed in 1.8.1, such as CVE-2019-3855.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-13115/">CVE-2019-13115 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13115">CVE-2019-13115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335952" comment="libssh2-1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPMGA7XXHF73HETFZFL65FVIKUTCEITB/" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13117">CVE-2019-13117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140095">SUSE bug 1140095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13118" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPMGA7XXHF73HETFZFL65FVIKUTCEITB/" source="SUSE-SU"/>
    <description>
    In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13118">CVE-2019-13118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140101">SUSE bug 1140101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005675.html" source="SUSE-SU"/>
		<reference ref_id="TID000019475" ref_url="https://www.suse.com/support/kb/doc/?id=000019475" source="SUSE-SU"/>
		<reference ref_id="TID7023929" ref_url="https://www.suse.com/support/kb/doc/?id=7023929" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1767-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WW44T7PW5P7YDSJWNGOVW3TCKWG7Q2YT/#WW44T7PW5P7YDSJWNGOVW3TCKWG7Q2YT" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13132">CVE-2019-13132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140255">SUSE bug 1140255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13164" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U" source="SUSE-SU"/>
    <description>
    qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13164">CVE-2019-13164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1140402">SUSE bug 1140402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13377</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13377" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13377">CVE-2019-13377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13509" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK/#22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK" source="SUSE-SU"/>
    <description>
    In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10), Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13509">CVE-2019-13509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1142160">SUSE bug 1142160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006767.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46KFS6OC36UWKEJS7D2YUROL2323KWEB/#46KFS6OC36UWKEJS7D2YUROL2323KWEB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQYMYQN54XQCPQJJZEIGGCBW3W7U53IW/#TQYMYQN54XQCPQJJZEIGGCBW3W7U53IW" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13565">CVE-2019-13565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143194">SUSE bug 1143194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201913627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-13627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-13627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006291.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKEH3P7TVC5IAA2TW5RAKELX7XH72VVI/#PKEH3P7TVC5IAA2TW5RAKELX7XH72VVI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVVPKWUEKAT3WOCFQNAILE4UXBMBFT3/" source="SUSE-SU"/>
    <description>
    It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13627">CVE-2019-13627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148987">SUSE bug 1148987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882156" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14271" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK/#22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK" source="SUSE-SU"/>
    <description>
    In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14271">CVE-2019-14271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143409">SUSE bug 1143409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2656-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192656-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2316-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CZZAG7XSZAR6GDRIODAMMG67QVMCPCH/#5CZZAG7XSZAR6GDRIODAMMG67QVMCPCH" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSBNENZR57LOHEQOPC2JHBLICDY4PCZ5/#BSBNENZR57LOHEQOPC2JHBLICDY4PCZ5" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14287">CVE-2019-14287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153674">SUSE bug 1153674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156093">SUSE bug 1156093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U/#6SBK6URNJUYYH2QPGRG7N4UIGYSVXV6U" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
    <description>
    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14378">CVE-2019-14378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143794">SUSE bug 1143794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143797">SUSE bug 1143797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14513" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14513" ref_url="https://www.suse.com/security/cve/CVE-2019-14513" source="SUSE CVE"/>
    <description>
    Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14513/">CVE-2019-14513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14513">CVE-2019-14513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1143944">SUSE bug 1143944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338972" comment="dnsmasq is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14584" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7TLVCW5VHXA7SSOSARLTBRZWC5MH642/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Y57O2IBBHBOVJBEVV6JAOZWLGF53QFS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2IF5TPLLS7U2RNC42HXIHTRUMS4Q6YV/" source="SUSE-SU"/>
    <description>
    Null pointer dereference in Tianocore EDK2 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14584">CVE-2019-14584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009708029" comment="shim is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14615">CVE-2019-14615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160195">SUSE bug 1160195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14763" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14763" ref_url="https://www.suse.com/security/cve/CVE-2019-14763" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.16.4, a double-locking error in drivers/usb/dwc3/gadget.c may potentially cause a deadlock with f_hid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14763/">CVE-2019-14763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14763">CVE-2019-14763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1144918">SUSE bug 1144918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14814">CVE-2019-14814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146512">SUSE bug 1146512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173664">SUSE bug 1173664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14815">CVE-2019-14815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146514">SUSE bug 1146514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173665">SUSE bug 1173665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14816">CVE-2019-14816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146516">SUSE bug 1146516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173666">SUSE bug 1173666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2593-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6XCUOVCXNQ6F2SKISA7LWT5WFS5W7MT/#S6XCUOVCXNQ6F2SKISA7LWT5WFS5W7MT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2596-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAJR4QB4A2YQ5MYPKKBZWQZEHXTFQ2KX/#GAJR4QB4A2YQ5MYPKKBZWQZEHXTFQ2KX" source="SUSE-SU"/>
    <description>
    In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14866">CVE-2019-14866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155199">SUSE bug 1155199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490765" comment="cpio-2.12-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14889" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:21-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2689-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LTI7IUH36JNNJZJUF3OYTRJ35ZR26N75/#LTI7IUH36JNNJZJUF3OYTRJ35ZR26N75" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4OQAFK46VVG5CQGEEX5AH2BI6NVBPZO/" source="SUSE-SU"/>
    <description>
    A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14889">CVE-2019-14889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158095">SUSE bug 1158095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224871">SUSE bug 1224871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493127" comment="libssh4-0.8.7-10.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14895">CVE-2019-14895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157158">SUSE bug 1157158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173100">SUSE bug 1173100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173660">SUSE bug 1173660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14896">CVE-2019-14896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157157">SUSE bug 1157157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14897" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14897">CVE-2019-14897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157155">SUSE bug 1157155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160467">SUSE bug 1160467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160468">SUSE bug 1160468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14898" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14898" ref_url="https://www.suse.com/security/cve/CVE-2019-14898" source="SUSE CVE"/>
    <description>
    The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14898/">CVE-2019-14898 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14898">CVE-2019-14898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157905">SUSE bug 1157905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14901">CVE-2019-14901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157042">SUSE bug 1157042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173661">SUSE bug 1173661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15030">CVE-2019-15030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15031">CVE-2019-15031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149713">SUSE bug 1149713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15098">CVE-2019-15098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15099">CVE-2019-15099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146368">SUSE bug 1146368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15126" ref_url="https://www.suse.com/security/cve/CVE-2019-15126" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZGJOQCY3UVCSZY3XFCDUYHPVWB2IH7T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15126/">CVE-2019-15126 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15126">CVE-2019-15126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167162">SUSE bug 1167162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009658281" comment="kernel-firmware-20200107-3.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658282" comment="ucode-amd-20200107-3.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15223" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15223" ref_url="https://www.suse.com/security/cve/CVE-2019-15223" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/driver.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15223/">CVE-2019-15223 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15223">CVE-2019-15223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146535">SUSE bug 1146535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15290" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2738-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192738-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW/#4CEC37F4Q2EPQFGCPFIWQY5MJOYSR3WW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2181-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW/#VOAHRKDA7W6T2DPZV7YKHMSWYSGQCJCW" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15290">CVE-2019-15290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146378">SUSE bug 1146378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146543">SUSE bug 1146543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2651-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192651-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2658-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192658-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2706-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192706-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6/#O7FGUFIPLWDXYK7VLKXBJND7NJWBBYU6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2308-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX/#C647ZGMUBEKKW7XKI4MVE7QEHYRLVUIX" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15291">CVE-2019-15291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1146519">SUSE bug 1146519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146540">SUSE bug 1146540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005259.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4WYDW4VVS3XNMH6VCHL3MRMHZO6ZSO2/#H4WYDW4VVS3XNMH6VCHL3MRMHZO6ZSO2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1814-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN/#RTRWENR4KO4H3XNPBQUVKRGCPIDNAWUN" source="SUSE-SU"/>
    <description>
    ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1543">CVE-2019-1543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128189">SUSE bug 1128189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141801">SUSE bug 1141801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AMCXRNCU77JLRVAK627EL4AI2YZ5TC3A/#AMCXRNCU77JLRVAK627EL4AI2YZ5TC3A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RES4NNODOD7V3CCQTP62M4SF3BN6PUVI/#RES4NNODOD7V3CCQTP62M4SF3BN6PUVI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E7VIGAHWSFFPDB5QYJPOFDAMM2UVBBCD/#E7VIGAHWSFFPDB5QYJPOFDAMM2UVBBCD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56MWC6RDEYX7AOCRPAASEBS6KJZQLCHW/#56MWC6RDEYX7AOCRPAASEBS6KJZQLCHW" source="SUSE-SU"/>
    <description>
    Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1547">CVE-2019-1547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150003">SUSE bug 1150003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154166">SUSE bug 1154166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156430">SUSE bug 1156430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161085">SUSE bug 1161085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205621">SUSE bug 1205621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
    <description>
    OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1549">CVE-2019-1549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150247">SUSE bug 1150247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205621">SUSE bug 1205621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15504" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504" source="SUSE CVE"/>
    <description>
    drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15504">CVE-2019-15504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1147116">SUSE bug 1147116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185852">SUSE bug 1185852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006529.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GEPOG743X2GF2BEAQ76DNOUCQOP4UXQC/" source="SUSE-SU"/>
    <description>
    There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1551">CVE-2019-1551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158809">SUSE bug 1158809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205621">SUSE bug 1205621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20191563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-1563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-1563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2158-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AMCXRNCU77JLRVAK627EL4AI2YZ5TC3A/#AMCXRNCU77JLRVAK627EL4AI2YZ5TC3A" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RES4NNODOD7V3CCQTP62M4SF3BN6PUVI/#RES4NNODOD7V3CCQTP62M4SF3BN6PUVI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E7VIGAHWSFFPDB5QYJPOFDAMM2UVBBCD/#E7VIGAHWSFFPDB5QYJPOFDAMM2UVBBCD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/56MWC6RDEYX7AOCRPAASEBS6KJZQLCHW/#56MWC6RDEYX7AOCRPAASEBS6KJZQLCHW" source="SUSE-SU"/>
    <description>
    In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-1563">CVE-2019-1563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150250">SUSE bug 1150250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156430">SUSE bug 1156430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205621">SUSE bug 1205621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15791" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15791" ref_url="https://www.suse.com/security/cve/CVE-2019-15791" source="SUSE CVE"/>
    <description>
    In shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, shiftfs_btrfs_ioctl_fd_replace() installs an fd referencing a file from the lower filesystem without taking an additional reference to that file. After the btrfs ioctl completes this fd is closed, which then puts a reference to that file, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15791/">CVE-2019-15791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15791">CVE-2019-15791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156640">SUSE bug 1156640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15794" ref_url="https://www.suse.com/security/cve/CVE-2019-15794" source="SUSE CVE"/>
    <description>
    Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma-&gt;vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15794/">CVE-2019-15794 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15794">CVE-2019-15794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158156">SUSE bug 1158156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15845">CVE-2019-15845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152994">SUSE bug 1152994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15890" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2955-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-15890">CVE-2019-15890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149811">SUSE bug 1149811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2871-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192871-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2872-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192872-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CGA46HDWG2655GNXOETWDGQHCIJSDEK/#5CGA46HDWG2655GNXOETWDGQHCIJSDEK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7RUMUOQJYGFBCGNSCG4U4EJFLVOGMVS/#I7RUMUOQJYGFBCGNSCG4U4EJFLVOGMVS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3NWTA6MINHDECNVPEESVOI4YS5GWLB2W/#3NWTA6MINHDECNVPEESVOI4YS5GWLB2W" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2424-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PWAZQUNDL6EYARWSXF52VFRXI6QGOKQ5/#PWAZQUNDL6EYARWSXF52VFRXI6QGOKQ5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2425-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUHPSOYGL3R2UY6Q72GDJBKT62EGZHYF/#PUHPSOYGL3R2UY6Q72GDJBKT62EGZHYF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM/#QNJAWHUQKXHQBG3I7GI4ACW3CYHDJAHM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA/#V6ZXQOV37FDUBMBAJGH2RCLCL55J6IYA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2452-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB/#MOTGZDQMJE6HU6RXRSOTDTGAHLJOOFJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS/#LFFTUGZUT6RBMXE667KP6UIOCTQIRDNS" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2464-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX/#ISVN7BSIYJ7GDXZNJMHOFE6I6LYX7RUX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0010-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHWBJKQPSZZUXFRQCXMMXQYJB6ONVGNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149429">SUSE bug 1149429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154738">SUSE bug 1154738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154806">SUSE bug 1154806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490502" comment="libexpat1-2.2.5-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15922" ref_url="https://www.suse.com/security/cve/CVE-2019-15922" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a pf data structure if alloc_disk fails in drivers/block/paride/pf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15922/">CVE-2019-15922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15922">CVE-2019-15922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149607">SUSE bug 1149607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15923" ref_url="https://www.suse.com/security/cve/CVE-2019-15923" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.9. There is a NULL pointer dereference for a cd data structure if alloc_disk fails in drivers/block/paride/pf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15923/">CVE-2019-15923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15923">CVE-2019-15923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149609">SUSE bug 1149609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201915925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-15925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-15925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-15925" ref_url="https://www.suse.com/security/cve/CVE-2019-15925" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.2.3. An out of bounds access exists in the function hclge_tm_schd_mode_vnet_base_cfg in the file drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_tm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15925/">CVE-2019-15925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15925">CVE-2019-15925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149532">SUSE bug 1149532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:1342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008150.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF/#2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7/#DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G/#6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG5WELJTI6DYP26XUAUTB5URMEK2M7JU/#LG5WELJTI6DYP26XUAUTB5URMEK2M7JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16056">CVE-2019-16056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149955">SUSE bug 1149955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16168" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q5DFFGTODE2HQHIRGFUXPQORMI6ENAB/#5Q5DFFGTODE2HQHIRGFUXPQORMI6ENAB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOJI6OIA57HPKASWCXNQ6VZE3OG6FN6B/#BOJI6OIA57HPKASWCXNQ6VZE3OG6FN6B" source="SUSE-SU"/>
    <description>
    In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a "severe division by zero in the query planner."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16168">CVE-2019-16168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150137">SUSE bug 1150137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490530" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16201">CVE-2019-16201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152995">SUSE bug 1152995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16229" ref_url="https://www.suse.com/security/cve/CVE-2019-16229" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** drivers/gpu/drm/amd/amdkfd/kfd_interrupt.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference. NOTE: The security community disputes this issues as not being serious enough to be deserving a CVE id.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16229/">CVE-2019-16229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16229">CVE-2019-16229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150469">SUSE bug 1150469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ" source="SUSE-SU"/>
    <description>
    drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16231">CVE-2019-16231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150466">SUSE bug 1150466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16232" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16232">CVE-2019-16232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150465">SUSE bug 1150465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2503-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR" source="SUSE-SU"/>
    <description>
    drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16233">CVE-2019-16233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150457">SUSE bug 1150457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
    <description>
    drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16234">CVE-2019-16234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150452">SUSE bug 1150452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16254">CVE-2019-16254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152992">SUSE bug 1152992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165402">SUSE bug 1165402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16255">CVE-2019-16255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152990">SUSE bug 1152990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16275" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
    <description>
    hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16275">CVE-2019-16275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16714" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16714" ref_url="https://www.suse.com/security/cve/CVE-2019-16714" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16714/">CVE-2019-16714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16714">CVE-2019-16714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1151791">SUSE bug 1151791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16884" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2786-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192786-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XQUO7JWM2QDHYISZWKF27GHWQFEZNITO/#XQUO7JWM2QDHYISZWKF27GHWQFEZNITO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2434-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCB4TJ7VRHVOBIOYGLDTKVCWSLRC5IPU/#CCB4TJ7VRHVOBIOYGLDTKVCWSLRC5IPU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7SG42XULDNEP3QYZYRNN6W3EOIOR7RWW/" source="SUSE-SU"/>
    <description>
    runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16884">CVE-2019-16884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152308">SUSE bug 1152308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16921" ref_url="https://www.suse.com/security/cve/CVE-2019-16921" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-16921/">CVE-2019-16921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16921">CVE-2019-16921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152516">SUSE bug 1152516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201916935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-16935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-16935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2748-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF/#2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7/#DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G/#6PXOI3GEE52ZWA3KKGSYWWLSPBYOIN2G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2453-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG5WELJTI6DYP26XUAUTB5URMEK2M7JU/#LG5WELJTI6DYP26XUAUTB5URMEK2M7JU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-16935">CVE-2019-16935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153238">SUSE bug 1153238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0088-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200088-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AN4USN47JRBDAYTJ7ARVSFYOKEKTGTFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXBTGBKRMQSNENPDBPRN6BJXXF2PQMP4/" source="SUSE-SU"/>
    <description>
    In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17006">CVE-2019-17006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17052" ref_url="https://www.suse.com/security/cve/CVE-2019-17052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel 3.16 through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17052/">CVE-2019-17052 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17052">CVE-2019-17052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152779">SUSE bug 1152779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17053" ref_url="https://www.suse.com/security/cve/CVE-2019-17053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17053/">CVE-2019-17053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17053">CVE-2019-17053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152789">SUSE bug 1152789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17054" ref_url="https://www.suse.com/security/cve/CVE-2019-17054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
    <description>
    atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-17054/">CVE-2019-17054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-17054">CVE-2019-17054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152786">SUSE bug 1152786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2829-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192829-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2859-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192859-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006399.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17133">CVE-2019-17133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153158">SUSE bug 1153158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153161">SUSE bug 1153161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17346" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17346" ref_url="https://www.suse.com/security/cve/CVE-2019-17346" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17346/">CVE-2019-17346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17346">CVE-2019-17346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126198">SUSE bug 1126198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17347" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17347" ref_url="https://www.suse.com/security/cve/CVE-2019-17347" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17347/">CVE-2019-17347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17347">CVE-2019-17347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126201">SUSE bug 1126201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17348" ref_url="https://www.suse.com/security/cve/CVE-2019-17348" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006058.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17348/">CVE-2019-17348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17348">CVE-2019-17348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127400">SUSE bug 1127400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17349" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2019:2715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012836.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17349">CVE-2019-17349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138294">SUSE bug 1138294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17361" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17361" ref_url="https://www.suse.com/security/cve/CVE-2019-17361" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:0625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:0685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:14319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:14320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR2PQ3GKS2PLFHVBID4QWOIOSORFRWDH/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is vulnerable to command injection. This allows an unauthenticated attacker with network access to the API endpoint to execute arbitrary code on the salt-api host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17361/">CVE-2019-17361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17361">CVE-2019-17361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162504">SUSE bug 1162504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14226-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201914226-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2936-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192936-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY/#H3AQRXLVKQVS3DRKN3ELYECMDLVYDUBY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154862">SUSE bug 1154862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171566">SUSE bug 1171566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008776.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7YFHI6XFRGBVSXNEVWR4PPHMCTX5SO6/#K7YFHI6XFRGBVSXNEVWR4PPHMCTX5SO6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYYDWMO34OK7XA7H4QNW6VMAS3LHI33N/#WYYDWMO34OK7XA7H4QNW6VMAS3LHI33N" source="SUSE-SU"/>
    <description>
    LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states "only a few specific / uncommon usages of the API are at risk."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17543">CVE-2019-17543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1153936">SUSE bug 1153936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188549">SUSE bug 1188549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490606" comment="liblz4-1-1.8.0-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2550-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6FHEFDTN3LEEFN2RM3PLOTVQQE3AJWPT/#6FHEFDTN3LEEFN2RM3PLOTVQQE3AJWPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I46ISQG6CXQ6D4AYKNE7AG32Q5DHT3VW/#I46ISQG6CXQ6D4AYKNE7AG32Q5DHT3VW" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17594">CVE-2019-17594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154036">SUSE bug 1154036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490728" comment="libncurses6-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490731" comment="ncurses-utils-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490733" comment="terminfo-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490734" comment="terminfo-base-6.1-5.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2550-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6FHEFDTN3LEEFN2RM3PLOTVQQE3AJWPT/#6FHEFDTN3LEEFN2RM3PLOTVQQE3AJWPT" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2551-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I46ISQG6CXQ6D4AYKNE7AG32Q5DHT3VW/#I46ISQG6CXQ6D4AYKNE7AG32Q5DHT3VW" source="SUSE-SU"/>
    <description>
    There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17595">CVE-2019-17595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154037">SUSE bug 1154037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490728" comment="libncurses6-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490731" comment="ncurses-utils-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490733" comment="terminfo-6.1-5.6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490734" comment="terminfo-base-6.1-5.6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201917666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-17666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-17666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2946-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2947-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2953-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER/#Q4WWYJXXZCGVC2OIDWXE4ESZ2GFQW5ER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN/#NDCZ4VF2YAQG5WJDX6YMBFF67X36UMPN" source="SUSE-SU"/>
    <description>
    rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17666">CVE-2019-17666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154372">SUSE bug 1154372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0920-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006855.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPMGA7XXHF73HETFZFL65FVIKUTCEITB/" source="SUSE-SU"/>
    <description>
    In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18197">CVE-2019-18197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154609">SUSE bug 1154609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157028">SUSE bug 1157028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190108">SUSE bug 1190108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492051" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18198" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18198">CVE-2019-18198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154617">SUSE bug 1154617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0677-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KNKLNIB4ZMHA6GDNDLMUTNQRB6PVMFHG/" source="SUSE-SU"/>
    <description>
    cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18218">CVE-2019-18218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154661">SUSE bug 1154661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190368">SUSE bug 1190368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191838">SUSE bug 1191838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18224" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006193.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2611-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X7ZUBC27FFSQ6NLYE4F6HZ22CMNU2UJV/#X7ZUBC27FFSQ6NLYE4F6HZ22CMNU2UJV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRSAKATJHG3HSIHWNI5KWAI67IUCJBGE/#KRSAKATJHG3HSIHWNI5KWAI67IUCJBGE" source="SUSE-SU"/>
    <description>
    idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-18224">CVE-2019-18224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154887">SUSE bug 1154887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882169" comment="libidn2-0-2.2.0-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CLCTOYU6GVRRH3LEOSXEYTZNQQGAPQSM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18348">CVE-2019-18348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZCL5SFVY3UUL6OAEA6NXNQH5OUVW7I3/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via malformed commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18388">CVE-2019-18388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159479">SUSE bug 1159479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18389" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZCL5SFVY3UUL6OAEA6NXNQH5OUVW7I3/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18389">CVE-2019-18389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159482">SUSE bug 1159482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18390" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZCL5SFVY3UUL6OAEA6NXNQH5OUVW7I3/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in the vrend_blit_need_swizzle function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_BLIT commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18390">CVE-2019-18390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159478">SUSE bug 1159478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18391" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006300.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZCL5SFVY3UUL6OAEA6NXNQH5OUVW7I3/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18391">CVE-2019-18391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159486">SUSE bug 1159486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499082" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18397" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0763-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPZ3M35XR5IQLIBDLZFFWGW6Z6SM7YNW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NAPU2NE5KWWCW4NS2FW7DLCSMM442VDM/" source="SUSE-SU"/>
    <description>
    A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18397">CVE-2019-18397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704876" comment="libfribidi0-1.0.5-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18424" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18424" ref_url="https://www.suse.com/security/cve/CVE-2019-18424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2961-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18424/">CVE-2019-18424 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18424">CVE-2019-18424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154461">SUSE bug 1154461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006492.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUEBOEARZZHY5H3SPMWGMTOGOV3N2QV/" source="SUSE-SU"/>
    <description>
    In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18634">CVE-2019-18634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162202">SUSE bug 1162202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18660">CVE-2019-18660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157038">SUSE bug 1157038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157923">SUSE bug 1157923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18675" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18675" ref_url="https://www.suse.com/security/cve/CVE-2019-18675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18675/">CVE-2019-18675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18675">CVE-2019-18675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157804">SUSE bug 1157804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18680" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18680" ref_url="https://www.suse.com/security/cve/CVE-2019-18680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18680/">CVE-2019-18680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18680">CVE-2019-18680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155898">SUSE bug 1155898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173867">SUSE bug 1173867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18683">CVE-2019-18683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1155897">SUSE bug 1155897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173868">SUSE bug 1173868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18786" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.3.8, f-&gt;fmt.sdr.reserved is uninitialized in rcar_drif_g_fmt_sdr_cap in drivers/media/platform/rcar_drif.c, which could cause a memory disclosure problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18786">CVE-2019-18786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156043">SUSE bug 1156043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18802" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLLK3KOAIEI63Y32UDFY22C22W7KBQ4J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIUODYDMMPC4VZZIR4DRKRPVXGPEDZRO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14491-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFNKGR7EDSPJYW44XDCPTASFWUEKKDBC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18802">CVE-2019-18802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159003">SUSE bug 1159003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897519" comment="libnghttp2-14-1.40.0-1.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18807" ref_url="https://www.suse.com/security/cve/CVE-2019-18807" source="SUSE CVE"/>
    <description>
    Two memory leaks in the sja1105_static_config_upload() function in drivers/net/dsa/sja1105/sja1105_spi.c in the Linux kernel before 5.3.5 allow attackers to cause a denial of service (memory consumption) by triggering static_config_buf_prepare_for_upload() or sja1105_inhibit_tx() failures, aka CID-68501df92d11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18807/">CVE-2019-18807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18807">CVE-2019-18807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160881">SUSE bug 1160881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18808">CVE-2019-18808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156259">SUSE bug 1156259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18809">CVE-2019-18809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156258">SUSE bug 1156258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18810" ref_url="https://www.suse.com/security/cve/CVE-2019-18810" source="SUSE CVE"/>
    <description>
    A memory leak in the komeda_wb_connector_add() function in drivers/gpu/drm/arm/display/komeda/komeda_wb_connector.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering drm_writeback_connector_init() failures, aka CID-a0ecd6fdbf5d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18810/">CVE-2019-18810 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18810">CVE-2019-18810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156257">SUSE bug 1156257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18811" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811" source="SUSE CVE"/>
    <description>
    A memory leak in the sof_set_get_large_ctrl_data() function in sound/soc/sof/ipc.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering sof_get_ctrl_copy_params() failures, aka CID-45c1380358b1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18811">CVE-2019-18811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159374">SUSE bug 1159374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812" source="SUSE CVE"/>
    <description>
    A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18812">CVE-2019-18812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156277">SUSE bug 1156277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813" source="SUSE CVE"/>
    <description>
    A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18813">CVE-2019-18813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156278">SUSE bug 1156278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.3.9. There is a use-after-free when aa_label_parse() fails in aa_audit_rule_init() in security/apparmor/audit.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18814">CVE-2019-18814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18874" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18874" ref_url="https://www.suse.com/security/cve/CVE-2019-18874" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:2072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
    <description>
    psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18874/">CVE-2019-18874 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18874">CVE-2019-18874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156525">SUSE bug 1156525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655560" comment="python3-psutil is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18885" ref_url="https://www.suse.com/security/cve/CVE-2019-18885" source="SUSE CVE"/>
    <description>
    fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices-&gt;devices is mishandled within find_device, aka CID-09ba3bc9dd15.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18885/">CVE-2019-18885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18885">CVE-2019-18885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156901">SUSE bug 1156901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18897" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18897" ref_url="https://www.suse.com/security/cve/CVE-2019-18897" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:0625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:0685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:14319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:14320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR2PQ3GKS2PLFHVBID4QWOIOSORFRWDH/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of salt of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Factory allows local attackers to escalate privileges from user salt to root. This issue affects: SUSE Linux Enterprise Server 12 salt-master version 2019.2.0-46.83.1 and prior versions. SUSE Linux Enterprise Server 15 salt-master version 2019.2.0-6.21.1 and prior versions. openSUSE Factory salt-master version 2019.2.2-3.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18897/">CVE-2019-18897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18897">CVE-2019-18897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157465">SUSE bug 1157465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEU3QUUM7SDENWAOTTIKYJWY3DTE244N/" source="SUSE-SU"/>
    <description>
    : Incorrect Default Permissions vulnerability in libzypp of SUSE CaaS Platform 3.0, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15 allowed local attackers to read a cookie store used by libzypp, exposing private cookies. This issue affects: SUSE CaaS Platform 3.0 libzypp versions prior to 16.21.2-27.68.1. SUSE Linux Enterprise Server 12 libzypp versions prior to 16.21.2-2.45.1. SUSE Linux Enterprise Server 15 17.19.0-3.34.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18900">CVE-2019-18900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158763">SUSE bug 1158763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904480" comment="libzypp-17.25.6-3.28.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009373564" comment="zypper is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009654588" comment="zypper-needs-restarting is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18902" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0165-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55RNXZKH4PSOKZNDW22GXYEX3B5SP3I2/" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-3.5.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-3.21.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.6.1. openSUSE Factory wicked versions prior to 0.6.62.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18902">CVE-2019-18902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160903">SUSE bug 1160903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904499" comment="wicked-0.6.64-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904500" comment="wicked-service-0.6.64-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201918903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-18903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-18903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18903" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APEQDGP47KSKMMNLKISL5AFVZAWLHZQJ/" source="SUSE-SU"/>
    <description>
    A Use After Free vulnerability in wicked of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15; openSUSE Leap 15.1, Factory allows remote attackers to cause DoS or potentially code execution. This issue affects: SUSE Linux Enterprise Server 12 wicked versions prior to 0.6.60-2.18.1. SUSE Linux Enterprise Server 15 wicked versions prior to 0.6.60-28.26.1. openSUSE Leap 15.1 wicked versions prior to 0.6.60-lp151.2.9.1. openSUSE Factory wicked versions prior to 0.6.62.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18903">CVE-2019-18903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160904">SUSE bug 1160904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904499" comment="wicked-0.6.64-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904500" comment="wicked-service-0.6.64-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19037" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037" source="SUSE CVE"/>
    <description>
    ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19037">CVE-2019-19037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157717">SUSE bug 1157717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19039" ref_url="https://www.suse.com/security/cve/CVE-2019-19039" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** __btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because "1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19039/">CVE-2019-19039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19039">CVE-2019-19039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157719">SUSE bug 1157719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19043" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043" source="SUSE CVE"/>
    <description>
    A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19043">CVE-2019-19043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159375">SUSE bug 1159375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19044" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044" source="SUSE CVE"/>
    <description>
    Two memory leaks in the v3d_submit_cl_ioctl() function in drivers/gpu/drm/v3d/v3d_gem.c in the Linux kernel before 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering kcalloc() or v3d_job_init() failures, aka CID-29cd13cfd762.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19044">CVE-2019-19044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159370">SUSE bug 1159370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19045" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A memory leak in the mlx5_fpga_conn_create_cq() function in drivers/net/ethernet/mellanox/mlx5/core/fpga/conn.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_vector2eqn() failures, aka CID-c8c2a057fdc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19045">CVE-2019-19045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161522">SUSE bug 1161522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19046">CVE-2019-19046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157304">SUSE bug 1157304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19047" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047" source="SUSE CVE"/>
    <description>
    A memory leak in the mlx5_fw_fatal_reporter_dump() function in drivers/net/ethernet/mellanox/mlx5/core/health.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mlx5_crdump_collect() failures, aka CID-c7ed6d0183d5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19047">CVE-2019-19047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157715">SUSE bug 1157715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19048" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048" source="SUSE CVE"/>
    <description>
    A memory leak in the crypto_reportstat() function in drivers/virt/vboxguest/vboxguest_utils.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering copy_form_user() failures, aka CID-e0b0cb938864.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19048">CVE-2019-19048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157720">SUSE bug 1157720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19049" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19049">CVE-2019-19049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157173">SUSE bug 1157173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19050" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050" source="SUSE CVE"/>
    <description>
    A memory leak in the crypto_reportstat() function in crypto/crypto_user_stat.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_reportstat_alg() failures, aka CID-c03b04dcdba1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19050">CVE-2019-19050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157336">SUSE bug 1157336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19051" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19051">CVE-2019-19051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159024">SUSE bug 1159024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19052">CVE-2019-19052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157324">SUSE bug 1157324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19053" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053" source="SUSE CVE"/>
    <description>
    A memory leak in the rpmsg_eptdev_write_iter() function in drivers/rpmsg/rpmsg_char.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy_from_iter_full() failures, aka CID-bbe692e349e2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19053">CVE-2019-19053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161520">SUSE bug 1161520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19054">CVE-2019-19054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161518">SUSE bug 1161518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19055">CVE-2019-19055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157319">SUSE bug 1157319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19056">CVE-2019-19056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19057">CVE-2019-19057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157193">SUSE bug 1157193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157197">SUSE bug 1157197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19058">CVE-2019-19058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157145">SUSE bug 1157145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19059" ref_url="https://www.suse.com/security/cve/CVE-2019-19059" source="SUSE CVE"/>
    <description>
    Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19059/">CVE-2019-19059 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19059">CVE-2019-19059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157296">SUSE bug 1157296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19060">CVE-2019-19060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157178">SUSE bug 1157178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19061" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061" source="SUSE CVE"/>
    <description>
    A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19061">CVE-2019-19061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157192">SUSE bug 1157192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19062">CVE-2019-19062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157333">SUSE bug 1157333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19063">CVE-2019-19063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157298">SUSE bug 1157298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19064" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19064">CVE-2019-19064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157300">SUSE bug 1157300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because "rhashtable_init() can only fail if it is passed invalid values in the second parameter's struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem)."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19065">CVE-2019-19065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157191">SUSE bug 1157191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173961">SUSE bug 1173961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19066">CVE-2019-19066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157303">SUSE bug 1157303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19067">CVE-2019-19067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157180">SUSE bug 1157180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19068">CVE-2019-19068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157307">SUSE bug 1157307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19069" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069" source="SUSE CVE"/>
    <description>
    A memory leak in the fastrpc_dma_buf_attach() function in drivers/misc/fastrpc.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering dma_get_sgtable() failures, aka CID-fc739a058d99.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19069">CVE-2019-19069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157064">SUSE bug 1157064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19070" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the spi_gpio_probe() function in drivers/spi/spi-gpio.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering devm_add_action_or_reset() failures, aka CID-d3b0ffa1d75d. NOTE: third parties dispute the relevance of this because the system must have already been out of memory before the probe began.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19070">CVE-2019-19070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157294">SUSE bug 1157294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19071" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071" source="SUSE CVE"/>
    <description>
    A memory leak in the rsi_send_beacon() function in drivers/net/wireless/rsi/rsi_91x_mgmt.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering rsi_prepare_beacon() failures, aka CID-d563131ef23c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19071">CVE-2019-19071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157067">SUSE bug 1157067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19072" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072" source="SUSE CVE"/>
    <description>
    A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19072">CVE-2019-19072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157069">SUSE bug 1157069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19073">CVE-2019-19073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157070">SUSE bug 1157070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19074">CVE-2019-19074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157143">SUSE bug 1157143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19075">CVE-2019-19075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157162">SUSE bug 1157162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173958">SUSE bug 1173958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19076" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19076" ref_url="https://www.suse.com/security/cve/CVE-2019-19076" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19076/">CVE-2019-19076 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19076">CVE-2019-19076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157164">SUSE bug 1157164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19077">CVE-2019-19077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157171">SUSE bug 1157171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19078">CVE-2019-19078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157032">SUSE bug 1157032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19079" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19079" ref_url="https://www.suse.com/security/cve/CVE-2019-19079" source="SUSE CVE"/>
    <description>
    A memory leak in the qrtr_tun_write_iter() function in net/qrtr/tun.c in the Linux kernel before 5.3 allows attackers to cause a denial of service (memory consumption), aka CID-a21b7f0cff19.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19079/">CVE-2019-19079 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19079">CVE-2019-19079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157039">SUSE bug 1157039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19080">CVE-2019-19080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157044">SUSE bug 1157044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19081">CVE-2019-19081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157045">SUSE bug 1157045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19082">CVE-2019-19082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157046">SUSE bug 1157046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19083">CVE-2019-19083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157049">SUSE bug 1157049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006413.html" source="SUSE-SU"/>
    <description>
    On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19126">CVE-2019-19126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157292">SUSE bug 1157292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19234" ref_url="https://www.suse.com/security/cve/CVE-2019-19234" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19234/">CVE-2019-19234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19234">CVE-2019-19234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159616">SUSE bug 1159616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334290" comment="sudo is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19241" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.4.2, the io_uring feature leads to requests that inadvertently have UID 0 and full capabilities, aka CID-181e448d8709. This is related to fs/io-wq.c, fs/io_uring.c, and net/socket.c. For example, an attacker can bypass intended restrictions on adding an IPv4 address to the loopback interface. This occurs because IORING_OP_SENDMSG operations, although requested in the context of an unprivileged user, are sometimes performed by a kernel worker thread without considering that context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19241">CVE-2019-19241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159441">SUSE bug 1159441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19244">CVE-2019-19244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157817">SUSE bug 1157817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19252" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252" source="SUSE CVE"/>
    <description>
    vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19252">CVE-2019-19252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157813">SUSE bug 1157813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19317">CVE-2019-19317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196773">SUSE bug 1196773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196775">SUSE bug 1196775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel's KVM hypervisor handled the 'KVM_GET_EMULATED_CPUID' ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the '/dev/kvm' device could use this flaw to crash the system, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19332">CVE-2019-19332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158827">SUSE bug 1158827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19338" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19338">CVE-2019-19338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158954">SUSE bug 1158954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19378" ref_url="https://www.suse.com/security/cve/CVE-2019-19378" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image can lead to slab-out-of-bounds write access in index_rbio_pages in fs/btrfs/raid56.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19378/">CVE-2019-19378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19378">CVE-2019-19378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158270">SUSE bug 1158270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185853">SUSE bug 1185853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19447">CVE-2019-19447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158819">SUSE bug 1158819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173869">SUSE bug 1173869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19448" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19448" ref_url="https://www.suse.com/security/cve/CVE-2019-19448" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19448/">CVE-2019-19448 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19448">CVE-2019-19448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158820">SUSE bug 1158820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162369">SUSE bug 1162369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173871">SUSE bug 1173871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19449" ref_url="https://www.suse.com/security/cve/CVE-2019-19449" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19449/">CVE-2019-19449 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19449">CVE-2019-19449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158821">SUSE bug 1158821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19462">CVE-2019-19462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19523">CVE-2019-19523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19524">CVE-2019-19524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158413">SUSE bug 1158413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19525" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19525">CVE-2019-19525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158417">SUSE bug 1158417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19526" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19526">CVE-2019-19526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158893">SUSE bug 1158893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19528">CVE-2019-19528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158407">SUSE bug 1158407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19529" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19529">CVE-2019-19529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19532">CVE-2019-19532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158823">SUSE bug 1158823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158824">SUSE bug 1158824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19533">CVE-2019-19533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3372-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W/#ETQRKHU2REMA5EANI2CSGTNBUHZHYU3W" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19534">CVE-2019-19534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158381">SUSE bug 1158381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158398">SUSE bug 1158398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158834">SUSE bug 1158834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19579" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19579" ref_url="https://www.suse.com/security/cve/CVE-2019-19579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl's "assignable-add" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these "alternate" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19579/">CVE-2019-19579 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19579">CVE-2019-19579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157888">SUSE bug 1157888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19581" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19581" ref_url="https://www.suse.com/security/cve/CVE-2019-19581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19581/">CVE-2019-19581 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19581">CVE-2019-19581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19582" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19582" ref_url="https://www.suse.com/security/cve/CVE-2019-19582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006271.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On x86 accesses to bitmaps with a compile time known size of 64 may incur undefined behavior, which may in particular result in infinite loops. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. x86 systems with 64 or more nodes are vulnerable (there might not be any such systems that Xen would run on). x86 systems with less than 64 nodes are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19582/">CVE-2019-19582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19582">CVE-2019-19582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158003">SUSE bug 1158003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19602" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602" source="SUSE CVE"/>
    <description>
    fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstrated by mishandling of signal-based non-cooperative preemption in Go 1.14 prereleases on amd64, aka CID-59c4bd853abc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19602">CVE-2019-19602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158887">SUSE bug 1158887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19603">CVE-2019-19603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19645">CVE-2019-19645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19646" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19646">CVE-2019-19646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0093-1" ref_url="https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19767">CVE-2019-19767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159297">SUSE bug 1159297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19768">CVE-2019-19768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159285">SUSE bug 1159285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19769" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19769">CVE-2019-19769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJNUS3JX74DEJSKTRECNDTYTY3LURG2/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In the Linux kernel 4.19.83, there is a use-after-free (read) in the debugfs_remove function in fs/debugfs/inode.c (which is used to remove a file or directory in debugfs that was previously created with a call to another debugfs function such as debugfs_create_file). NOTE: Linux kernel developers dispute this issue as not being an issue with debugfs, instead this is an issue with misuse of debugfs within blktrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19770">CVE-2019-19770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159198">SUSE bug 1159198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.11, sound/core/timer.c has a use-after-free caused by erroneous code refactoring, aka CID-e7af6307a8a5. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19807">CVE-2019-19807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19814" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19814" ref_url="https://www.suse.com/security/cve/CVE-2019-19814" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19814/">CVE-2019-19814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19814">CVE-2019-19814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159437">SUSE bug 1159437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19815" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19815" ref_url="https://www.suse.com/security/cve/CVE-2019-19815" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause a NULL pointer dereference in f2fs_recover_fsync_data in fs/f2fs/recovery.c. This is related to F2FS_P_SB in fs/f2fs/f2fs.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19815/">CVE-2019-19815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19815">CVE-2019-19815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159438">SUSE bug 1159438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19880">CVE-2019-19880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19921" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0219-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HVIKLZGRTAEX4OALOIIAPGKXT3EJBHA/" source="SUSE-SU"/>
    <description>
    runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19921">CVE-2019-19921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160452">SUSE bug 1160452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208962">SUSE bug 1208962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19922" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922" source="SUSE CVE"/>
    <description>
    kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19922">CVE-2019-19922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159717">SUSE bug 1159717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19923">CVE-2019-19923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19924">CVE-2019-19924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19925" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19925">CVE-2019-19925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19926" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVRYLRPQE3DA7JXQF45EVKRHJ433WYL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAOUMLFZMVYH6TYWJSSQ6OXQGLVPDPJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7II7R5BUNZZ5ZN2QJ3UC33I67Y7HE4J2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19926">CVE-2019-19926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162833">SUSE bug 1162833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19947">CVE-2019-19947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159929">SUSE bug 1159929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1532-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75OUBX7RPPAARGW2FKOWVC52NVIH42S5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQPKJALN5664H5AAEJXKAEHG3AP5Y6RH/" source="SUSE-SU"/>
    <description>
    xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-&gt;oldNs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19956">CVE-2019-19956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159928">SUSE bug 1159928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19959" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19959">CVE-2019-19959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19965">CVE-2019-19965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159911">SUSE bug 1159911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201919977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-19977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-19977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19977" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2937-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1235-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXOIPTG34E6FHFZ5MRT6B4BEC5ETU6ML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGZ4L5IPYNOJTWC7WZTAMPSFHIGKXQAE/" source="SUSE-SU"/>
    <description>
    libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19977">CVE-2019-19977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190329">SUSE bug 1190329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191840">SUSE bug 1191840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192365">SUSE bug 1192365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193380">SUSE bug 1193380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193381">SUSE bug 1193381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009629441" comment="libesmtp-1.0.6-150.4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20218">CVE-2019-20218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189840">SUSE bug 1189840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190372">SUSE bug 1190372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192495">SUSE bug 1192495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193078">SUSE bug 1193078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20367" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20367" ref_url="https://www.suse.com/security/cve/CVE-2019-20367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006825.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0679-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I5YCPCNFXZXDGVBLPTUXA4KEHHRJUJWW/" source="SUSE-SU"/>
    <description>
    nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-20367/">CVE-2019-20367 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20367">CVE-2019-20367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160551">SUSE bug 1160551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492024" comment="libbsd0-0.8.7-3.3.17 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007072.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SLX2X3J4XZECXPBKC7QV2ZINGO53ABE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20386">CVE-2019-20386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161436">SUSE bug 1161436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75OUBX7RPPAARGW2FKOWVC52NVIH42S5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20388">CVE-2019-20388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161521">SUSE bug 1161521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20422" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.3.4, fib6_rule_lookup in net/ipv6/ip6_fib.c mishandles the RT6_LOOKUP_F_DST_NOREF flag in a reference-count decision, leading to (for example) a crash that was identified by syzkaller, aka CID-7b09c2d052db.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20422">CVE-2019-20422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161897">SUSE bug 1161897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2054" ref_url="https://www.suse.com/security/cve/CVE-2019-2054" source="SUSE CVE"/>
    <description>
    In the seccomp implementation prior to kernel version 4.8, there is a possible seccomp bypass due to seccomp policies that allow the use of ptrace. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-119769499
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2054/">CVE-2019-2054 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2054">CVE-2019-2054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1134561">SUSE bug 1134561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181039">SUSE bug 1181039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20794" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20794" ref_url="https://www.suse.com/security/cve/CVE-2019-20794" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20794/">CVE-2019-20794 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20794">CVE-2019-20794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171737">SUSE bug 1171737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20795" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20795" ref_url="https://www.suse.com/security/cve/CVE-2019-20795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009603.html" source="SUSE-SU"/>
    <description>
    iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20795/">CVE-2019-20795 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20795">CVE-2019-20795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171452">SUSE bug 1171452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339120" comment="iproute2 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006896.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0794-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PO7KU3LZCS7CIDBMXZNNIWTS66OAR3L/" source="SUSE-SU"/>
    <description>
    In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20807">CVE-2019-20807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904497" comment="vim-data-common-8.0.1568-5.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904498" comment="vim-small-8.0.1568-5.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20810">CVE-2019-20810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20812">CVE-2019-20812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
    <description>
    libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled, and \X or \R has more than one fixed quantifier, a related issue to CVE-2019-20454.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20838">CVE-2019-20838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189526">SUSE bug 1189526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193384">SUSE bug 1193384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704972" comment="libpcre1-8.45-20.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TG2EXCXRVU6CVJPO4YGOI5QI6ZYPE5MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L55Z4K254SOWYSZ2NJQQPAT7PFMYEWIR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1258-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RAREW56JQZJSWCPC4FGALUA3UC5IDC3E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1265-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MMY6CQR6V6UDNGDSNLCCA34KJTQQIHW2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20907">CVE-2019-20907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201920916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-20916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-20916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2021:2130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0516-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013882.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1598-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RAEVYJJYMY5RTYMCNI2TPKL6Z5Y4O6IO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZNJECZOYFETF5WEVEBW763UUD34HBGH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LG3I7MSGZF7WN3YNM7ML4QMO6MXYUU73/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2152-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KXU352TPOYPGUNSKDJRXFXWPD5NF32K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DKY5FFZVXAPBL5ATB6LJG4VYEF3GOLN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3AA6BSUJEGBBKUCQO6J25OSG7PA6ZKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2185-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOMPFK5R4IK4IFOQTL5NIJK6DKSYRSXT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E2GBJR7SZL3UIJETOGQDYOPIODBESJYI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/623Y5GJHFGANTQ36ECKXIXY3QVKGYSCE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EUMJS3WWV7Y2IVJFRMZNDUXZBSPWORBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The pip package before 19.2 for Python allows Directory Traversal when a URL is given in an install command, because a Content-Disposition header can have ../ in a filename, as demonstrated by overwriting the /root/.ssh/authorized_keys file. This occurs in _download_http_url in _internal/download.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20916">CVE-2019-20916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882473" comment="python3-setuptools-40.5.0-6.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2182" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2182" ref_url="https://www.suse.com/security/cve/CVE-2019-2182" source="SUSE CVE"/>
    <description>
    In the Android kernel in the kernel MMU code there is a possible execution path leaving some kernel text and rodata pages writable. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2182/">CVE-2019-2182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2182">CVE-2019-2182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150022">SUSE bug 1150022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006137.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INOPIJLV66EQVBG7CFBOXU75WYMV4OGB/#INOPIJLV66EQVBG7CFBOXU75WYMV4OGB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XY3KLKWY5RGBLIUHC5SRL3EWTGJZW7B2/#XY3KLKWY5RGBLIUHC5SRL3EWTGJZW7B2" source="SUSE-SU"/>
    <description>
    In generate_jsimd_ycc_rgb_convert_neon of jsimd_arm64_neon.S, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-120551338
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2201">CVE-2019-2201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2213" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2213" ref_url="https://www.suse.com/security/cve/CVE-2019-2213" source="SUSE CVE"/>
    <description>
    In binder_free_transaction of binder.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-133758011References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2213/">CVE-2019-2213 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2213">CVE-2019-2213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156185">SUSE bug 1156185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2214" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2214" ref_url="https://www.suse.com/security/cve/CVE-2019-2214" source="SUSE CVE"/>
    <description>
    In binder_transaction of binder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-136210786References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2214/">CVE-2019-2214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2214">CVE-2019-2214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156186">SUSE bug 1156186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20192215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-2215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-2215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-2215" ref_url="https://www.suse.com/security/cve/CVE-2019-2215" source="SUSE CVE"/>
    <description>
    A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2215/">CVE-2019-2215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-2215">CVE-2019-2215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164867">SUSE bug 1164867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25044" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25044" ref_url="https://www.suse.com/security/cve/CVE-2019-25044" source="SUSE CVE"/>
    <description>
    The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25044/">CVE-2019-25044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25044">CVE-2019-25044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186175">SUSE bug 1186175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25045" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25045" ref_url="https://www.suse.com/security/cve/CVE-2019-25045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.0.19. The XFRM subsystem has a use-after-free, related to an xfrm_state_fini panic, aka CID-dbb2483b2a46.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25045/">CVE-2019-25045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25045">CVE-2019-25045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187049">SUSE bug 1187049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3016" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016" source="SUSE CVE"/>
    <description>
    In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3016">CVE-2019-3016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161154">SUSE bug 1161154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3687" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFSFYZA4G7R3442IVOYMGCDA7OPFIWTA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The permission package in SUSE Linux Enterprise Server allowed all local users to run dumpcap in the "easy" permission profile and sniff network traffic. This issue affects: SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3687">CVE-2019-3687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148788">SUSE bug 1148788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180102">SUSE bug 1180102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494044" comment="permissions-20181224-23.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3688" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2540-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5B7VIBHEUXO2VYU6NZTEL6I7K4WUKD7G/#5B7VIBHEUXO2VYU6NZTEL6I7K4WUKD7G" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2541-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PLGSQEPKZX62EREA7UHDNEMHR3Z23A6/#2PLGSQEPKZX62EREA7UHDNEMHR3Z23A6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RG7IYFDNSRBUQ54SPQV4SRC2ACYCQLTV/#RG7IYFDNSRBUQ54SPQV4SRC2ACYCQLTV" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3688">CVE-2019-3688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1093414">SUSE bug 1093414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149108">SUSE bug 1149108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494044" comment="permissions-20181224-23.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3689" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2776-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192776-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2781-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2408-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DANISIKC2QA3XUD5Y4QUCFZE65LVNFWA/#DANISIKC2QA3XUD5Y4QUCFZE65LVNFWA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VRJ4FZYKCXQJYYW2SHUMRX7O3BYNNLH2/#VRJ4FZYKCXQJYYW2SHUMRX7O3BYNNLH2" source="SUSE-SU"/>
    <description>
    The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3689">CVE-2019-3689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150733">SUSE bug 1150733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882422" comment="nfs-client-2.1.1-10.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3690" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2672-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RG7IYFDNSRBUQ54SPQV4SRC2ACYCQLTV/#RG7IYFDNSRBUQ54SPQV4SRC2ACYCQLTV" source="SUSE-SU"/>
    <description>
    The chkstat tool in the permissions package followed symlinks before commit a9e1d26cd49ef9ee0c2060c859321128a6dd4230 (please also check the additional hardenings after this fix). This allowed local attackers with control over a path that is traversed by chkstat to escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3690">CVE-2019-3690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1148336">SUSE bug 1148336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150734">SUSE bug 1150734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157880">SUSE bug 1157880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160594">SUSE bug 1160594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160764">SUSE bug 1160764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494044" comment="permissions-20181224-23.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0231-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005094.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOYZQCCPVZTLRGKL5HJUTHZCJ6BLDEZI/#KOYZQCCPVZTLRGKL5HJUTHZCJ6BLDEZI" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IIDK2YHHVUM3VEAJGJZHJA6GVW4XZ2WA/#IIDK2YHHVUM3VEAJGJZHJA6GVW4XZ2WA" source="SUSE-SU"/>
    <description>
    Spice, versions 0.5.2 through 0.14.1, are vulnerable to an out-of-bounds read due to an off-by-one error in memslot_get_virt. This may lead to a denial of service, or, in the worst case, code-execution by unauthenticated attackers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3813">CVE-2019-3813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122706">SUSE bug 1122706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EWG6XCI25R5UAT6SGZTOCSV5F6V7W2ZQ/#EWG6XCI25R5UAT6SGZTOCSV5F6V7W2ZQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRDOZ4FJSPSJNNQSD2FOPKFCVGMYT4J2/#DRDOZ4FJSPSJNNQSD2FOPKFCVGMYT4J2" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3822">CVE-2019-3822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123377">SUSE bug 1123377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0249-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005111.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EWG6XCI25R5UAT6SGZTOCSV5F6V7W2ZQ/#EWG6XCI25R5UAT6SGZTOCSV5F6V7W2ZQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DRDOZ4FJSPSJNNQSD2FOPKFCVGMYT4J2/#DRDOZ4FJSPSJNNQSD2FOPKFCVGMYT4J2" source="SUSE-SU"/>
    <description>
    libcurl versions from 7.34.0 to before 7.64.0 are vulnerable to a heap out-of-bounds read in the code handling the end-of-response for SMTP. If the buffer passed to `smtp_endofresp()` isn't NUL terminated and contains no character ending the parsed number, and `len` is set to 5, then the `strtol()` call reads beyond the allocated buffer. The read contents will not be returned to the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3823">CVE-2019-3823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123378">SUSE bug 1123378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141798">SUSE bug 1141798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU" source="SUSE-SU"/>
    <description>
    A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3829">CVE-2019-3829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130681">SUSE bug 1130681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U54THELOIOH5SPZKOQO47AOLQUWXG7TU/#U54THELOIOH5SPZKOQO47AOLQUWXG7TU" source="SUSE-SU"/>
    <description>
    It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3836">CVE-2019-3836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130682">SUSE bug 1130682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3837" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3837" ref_url="https://www.suse.com/security/cve/CVE-2019-3837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-3837/">CVE-2019-3837 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3837">CVE-2019-3837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131430">SUSE bug 1131430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK/#CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK" source="SUSE-SU"/>
    <description>
    In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3842">CVE-2019-3842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132348">SUSE bug 1132348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3843" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
    <description>
    It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3843">CVE-2019-3843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133506">SUSE bug 1133506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3844" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
    <description>
    It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3844">CVE-2019-3844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133509">SUSE bug 1133509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3855">CVE-2019-3855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128471">SUSE bug 1128471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134329">SUSE bug 1134329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141850">SUSE bug 1141850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3856">CVE-2019-3856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128472">SUSE bug 1128472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3857">CVE-2019-3857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128474">SUSE bug 1128474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3858">CVE-2019-3858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128476">SUSE bug 1128476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1290-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTHXY46D3MXJF4YN7E5IMA7PVNCALW2F/#PTHXY46D3MXJF4YN7E5IMA7PVNCALW2F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEZRB5KSMSPW5ZOGSBMUN6V5GZCVXZ3N/#AEZRB5KSMSPW5ZOGSBMUN6V5GZCVXZ3N" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3859">CVE-2019-3859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128480">SUSE bug 1128480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1606-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1640-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SM2DWI45SN4RVBO2XJLLCZEBANUPJZJ6/#SM2DWI45SN4RVBO2XJLLCZEBANUPJZJ6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3860">CVE-2019-3860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128481">SUSE bug 1128481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136570">SUSE bug 1136570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3861">CVE-2019-3861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128490">SUSE bug 1128490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3862">CVE-2019-3862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128492">SUSE bug 1128492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13982-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-201913982-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6/#RT3KLE6OCATVJTFMDJJYTQWCFMJMLES6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1109-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P/#ZD25U3ME4BCNPHHDUMEWX4A2M5KJM34P" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VZ5CXNJKJVQFPMHVDXDS6F67TKZ3TJ7E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HAQH2P56QS5PVJGYRATVMCCAWSF5JABQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3863">CVE-2019-3863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128493">SUSE bug 1128493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135434">SUSE bug 1135434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3886" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005533.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55FH76FGRVJL2NG6ULO7FIH5PWHNCDN4/#55FH76FGRVJL2NG6ULO7FIH5PWHNCDN4" source="SUSE-SU"/>
    <description>
    An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent, which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3886">CVE-2019-3886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131595">SUSE bug 1131595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133150">SUSE bug 1133150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138301">SUSE bug 1138301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3896" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3896" ref_url="https://www.suse.com/security/cve/CVE-2019-3896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" source="SUSE-SU"/>
    <description>
    A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3896/">CVE-2019-3896 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3896">CVE-2019-3896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1138943">SUSE bug 1138943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156434">SUSE bug 1156434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173987">SUSE bug 1173987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20193901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-3901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-3901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-3901" ref_url="https://www.suse.com/security/cve/CVE-2019-3901" source="SUSE CVE"/>
    <description>
    A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs. As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3901/">CVE-2019-3901 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-3901">CVE-2019-3901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1132374">SUSE bug 1132374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133106">SUSE bug 1133106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5008" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005833.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2041-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG/#TUKWOBV7QSC7BRGVOAZZDM7P4VZESISG" source="SUSE-SU"/>
    <description>
    hw/sparc64/sun4u.c in QEMU 3.1.50 is vulnerable to a NULL pointer dereference, which allows the attacker to cause a denial of service via a device driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5008">CVE-2019-5008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133031">SUSE bug 1133031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0482-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL/#NY6OZIHZM76MZKDRQYP5AGGMPDVFH6AL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YSG6J77EBBTYJCB655ESSA3XS2MLQXEY/#YSG6J77EBBTYJCB655ESSA3XS2MLQXEY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5/#IXW4Q5XXH3FLRADKBIW4D7ORQVXQFZS5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.6.6. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5010">CVE-2019-5010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122191">SUSE bug 1122191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126909">SUSE bug 1126909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0111-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009451.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MPZBG4ALURSP3WFREL2VJEYLDL6LGCJ/" source="SUSE-SU"/>
    <description>
    An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5068">CVE-2019-5068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156015">SUSE bug 1156015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897189" comment="libgbm1-19.3.4-45.23 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2019:2677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2019-October/012745.html" source="SUSE-SU"/>
    <description>
    An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5094">CVE-2019-5094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1152101">SUSE bug 1152101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904430" comment="e2fsprogs-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904431" comment="libcom_err2-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904432" comment="libext2fs2-1.43.8-4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006471.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0166-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UAY64T4BPHMZUGCVF62LR4FNFISTO7DG/" source="SUSE-SU"/>
    <description>
    A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5188">CVE-2019-5188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160571">SUSE bug 1160571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904430" comment="e2fsprogs-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904431" comment="libcom_err2-1.43.8-4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904432" comment="libext2fs2-1.43.8-4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435" source="SUSE CVE"/>
    <description>
    An integer overflow in curl's URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5435">CVE-2019-5435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135176">SUSE bug 1135176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1357-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2009-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192009-1.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1492-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GTGSFLU55LI4HBELIVJXSI5XTJVBNXL4/#GTGSFLU55LI4HBELIVJXSI5XTJVBNXL4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1508-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWO3X5LYUW2TEQ63D4DELZMU4QQZVAWH/#WWO3X5LYUW2TEQ63D4DELZMU4QQZVAWH" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5436">CVE-2019-5436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1135170">SUSE bug 1135170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167096">SUSE bug 1167096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIKS45KSFVOLSIAG25BFXES44NWKE3CF/#NIKS45KSFVOLSIAG25BFXES44NWKE3CF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQDY2WY4IJ7RZNRIYSG6HVK76K77GK2/#2OQDY2WY4IJ7RZNRIYSG6HVK76K77GK2" source="SUSE-SU"/>
    <description>
    Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5481">CVE-2019-5481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149495">SUSE bug 1149495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2339-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192339-2.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2373-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192373-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005919.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIKS45KSFVOLSIAG25BFXES44NWKE3CF/#NIKS45KSFVOLSIAG25BFXES44NWKE3CF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2OQDY2WY4IJ7RZNRIYSG6HVK76K77GK2/#2OQDY2WY4IJ7RZNRIYSG6HVK76K77GK2" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5482">CVE-2019-5482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1149496">SUSE bug 1149496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156634">SUSE bug 1156634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5544" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5544" ref_url="https://www.suse.com/security/cve/CVE-2019-5544" source="SUSE CVE"/>
    <description>
    OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5544/">CVE-2019-5544 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5544">CVE-2019-5544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157869">SUSE bug 1157869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334285" comment="openslp is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20195736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-5736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-5736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5736" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1234-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="TID000019404" ref_url="https://www.suse.com/support/kb/doc/?id=000019404" source="SUSE-SU"/>
		<reference ref_id="TID7023708" ref_url="https://www.suse.com/support/kb/doc/?id=7023708" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY/#K5SY7VBRVPPL5WRVFFIC7CSECFNB3NGY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGHG2KTOO4CRNVPHPW4STYUUD2QVLBAR/#GGHG2KTOO4CRNVPHPW4STYUUD2QVLBAR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD/#VC6NILQ66VPYH6KMNXONQWSWQWZS3YDD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AI7D322XZTMFQDYTMYTY3DCVO2XVUVKB/#AI7D322XZTMFQDYTMYTY3DCVO2XVUVKB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0295-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBFTSNKGB464HWO65FTEXANGAGVXV4XW/#UBFTSNKGB464HWO65FTEXANGAGVXV4XW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK/#FLBC6WPCY3O2X54QVTTDJIKLYTBJ43PK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7UGXMWDCAJUCRFVZRWEYVPQASYUPVO4/#P7UGXMWDCAJUCRFVZRWEYVPQASYUPVO4" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BJSZ5D42JWJHGJ7ILFBWQ7TUHJTZDYJB/#BJSZ5D42JWJHGJ7ILFBWQ7TUHJTZDYJB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB/#CER2ESZ3IMKBBAWOVTY65MHSHQAI2UVB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXDMOUWCPZXYS5XEOXPTQ25H36J4WPGL/#WXDMOUWCPZXYS5XEOXPTQ25H36J4WPGL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1499-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3/#IF5UCHNMLYYGABZ53J2EKXLMRHH3UVO3" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HM6FFITESF23XEYSCI7KTKZVCPQU2CMO/#HM6FFITESF23XEYSCI7KTKZVCPQU2CMO" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK/#22XH5BZGCHAOESP2KM3ZT4XHBXIVMEZK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEKPXAULRUSJYU4B66UDTT35NKPZHFT6/#ZEKPXAULRUSJYU4B66UDTT35NKPZHFT6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2286-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VMNKFT3TORLGIZACMW6N6GUJJYTXUZZU/#VMNKFT3TORLGIZACMW6N6GUJJYTXUZZU" source="SUSE-SU"/>
    <description>
    runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-5736">CVE-2019-5736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121967">SUSE bug 1121967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122185">SUSE bug 1122185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173421">SUSE bug 1173421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494419" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S63AIPCO4O55HWF7CTXNRODVU5X3HLUD/#S63AIPCO4O55HWF7CTXNRODVU5X3HLUD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/362POC6TTSXVH3GN2FECATQBAMCINKKJ/#362POC6TTSXVH3GN2FECATQBAMCINKKJ" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6109">CVE-2019-6109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6110" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
    <description>
    In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6110">CVE-2019-6110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0125-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005565.html" source="SUSE-SU"/>
		<reference ref_id="TID000019375" ref_url="https://www.suse.com/support/kb/doc/?id=000019375" source="SUSE-SU"/>
		<reference ref_id="TID7023647" ref_url="https://www.suse.com/support/kb/doc/?id=7023647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU/#2MNLMLCJQ4RNIHX2VZUWA6ZK3G7XMXKU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF/#GPIFICMWUTG4MCRMGPSQ5GUJZRXYKKPF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S63AIPCO4O55HWF7CTXNRODVU5X3HLUD/#S63AIPCO4O55HWF7CTXNRODVU5X3HLUD" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/362POC6TTSXVH3GN2FECATQBAMCINKKJ/#362POC6TTSXVH3GN2FECATQBAMCINKKJ" source="SUSE-SU"/>
    <description>
    An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6111">CVE-2019-6111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121571">SUSE bug 1121571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121816">SUSE bug 1121816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121818">SUSE bug 1121818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121821">SUSE bug 1121821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123028">SUSE bug 1123028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123220">SUSE bug 1123220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131109">SUSE bug 1131109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138392">SUSE bug 1138392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144902">SUSE bug 1144902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144903">SUSE bug 1144903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148884">SUSE bug 1148884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2035-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1914-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WACL7CXBMNAPN66ZQLNZWBJ426BKAHKC/#WACL7CXBMNAPN66ZQLNZWBJ426BKAHKC" source="SUSE-SU"/>
    <description>
    In PolicyKit (aka polkit) 0.115, the "start time" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6133">CVE-2019-6133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1070943">SUSE bug 1070943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121826">SUSE bug 1121826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121872">SUSE bug 1121872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882287" comment="libpolkit0-0.116-1.51 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882288" comment="polkit-0.116-1.51 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6250" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-January/005037.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7I32QLHG2TLAPGQWXBENEC4ZUVOMLUW/#A7I32QLHG2TLAPGQWXBENEC4ZUVOMLUW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0087-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P7K4U26DZLA5IEAYWSLQTNH56WOFZX/#76P7K4U26DZLA5IEAYWSLQTNH56WOFZX" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6250">CVE-2019-6250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1121717">SUSE bug 1121717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122012">SUSE bug 1122012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6285" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6285" ref_url="https://www.suse.com/security/cve/CVE-2019-6285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1740-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5JRSH3JEFDRI2LLKIUVXRRMZJAO5ZPH/" source="SUSE-SU"/>
    <description>
    The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6285/">CVE-2019-6285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6285">CVE-2019-6285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122004">SUSE bug 1122004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122021">SUSE bug 1122021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129245">SUSE bug 1129245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705024" comment="libyaml-cpp0_6-0.6.1-4.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6292" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6292" ref_url="https://www.suse.com/security/cve/CVE-2019-6292" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1740-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1073-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5JRSH3JEFDRI2LLKIUVXRRMZJAO5ZPH/" source="SUSE-SU"/>
    <description>
    An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser, and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap, HandleMap, HandleFlowSequence, HandleSequence, HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6292/">CVE-2019-6292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6292">CVE-2019-6292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122021">SUSE bug 1122021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705024" comment="libyaml-cpp0_6-0.6.1-4.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1364-2" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0255-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PVC3OWGGMGT5GMZC57YPFU4GL6LK2NEL/#PVC3OWGGMGT5GMZC57YPFU4GL6LK2NEL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N5KJIVSQ6SIWIZCOPDW6ZUKGH3WJPYSM/#N5KJIVSQ6SIWIZCOPDW6ZUKGH3WJPYSM" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1450-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK/#CVI6HFZTM3O5G7YF7OPSQTP4HME7F7XK" source="SUSE-SU"/>
    <description>
    An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6454">CVE-2019-6454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125352">SUSE bug 1125352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6462" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035966.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c, related to _arc_max_angle_for_tolerance_normalized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2024-10-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335442" comment="libcairo2 is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6706" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6706" ref_url="https://www.suse.com/security/cve/CVE-2019-6706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0175-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WNFS4SVHRC2KCVWD37ND6TKGVC5LDK4/#2WNFS4SVHRC2KCVWD37ND6TKGVC5LDK4" source="SUSE-SU"/>
    <description>
    Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6706/">CVE-2019-6706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6706">CVE-2019-6706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123043">SUSE bug 1123043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490511" comment="liblua5_3-5-5.3.4-3.3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20196778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-6778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-6778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0471-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:13962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-February/005126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG/#CFHQEGEI3EZECFQN4HM6ST73KWNYQDTG" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q6DNNFUZSZUOD36332LAYVERA7GHAXUC/#Q6DNNFUZSZUOD36332LAYVERA7GHAXUC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC/#IPOWPMYYK3WJSOVNKFMAIQ3WHQED7KOC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
    <description>
    In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6778">CVE-2019-6778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123156">SUSE bug 1123156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1123157">SUSE bug 1123157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494397" comment="slirp4netns-0.4.7-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7146" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7146" ref_url="https://www.suse.com/security/cve/CVE-2019-7146" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-06"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7146/">CVE-2019-7146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7146">CVE-2019-7146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123545">SUSE bug 1123545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334073" comment="elfutils is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335871" comment="libasm1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335872" comment="libdw1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659704" comment="libebl-plugins is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335876" comment="libelf1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7150">CVE-2019-7150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1123685">SUSE bug 1123685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1398-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2002-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192002-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2036-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2291-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192291-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2371-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192371-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3060-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1484-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR/#CTZNURZG4U3I3C6SR6N64PNF5AQ2VWNR" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4HM5QQMXWECPZMLHD5SAWL5ZKD2JZWL/#Q4HM5QQMXWECPZMLHD5SAWL5ZKD2JZWL" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7/#YRJRSOQJ2HUXLMXMB5IAGC7CGYVG6MJ7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67/#ZFVBHHF6WMJDJB73NZDWFFGS6D23TB67" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1912-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O/#WLAA33SFC2BQWUMXROFQCWU3SJN2HD7O" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1916-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU/#7CWQDHDFTQ5TMYECHR6T3YTCURIWVTNU" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    png_image_free in png.c in libpng 1.6.x before 1.6.37 has a use-after-free because png_image_free_function is called under png_safe_execute.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7317">CVE-2019-7317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124211">SUSE bug 1124211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135824">SUSE bug 1135824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141780">SUSE bug 1141780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147021">SUSE bug 1147021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165297">SUSE bug 1165297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490148" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20197665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-7665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-7665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2614-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012057.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE/#Z5JKL6B32NFBYAZ26H2YW75ZH2O62BBE" source="SUSE-SU"/>
    <description>
    In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-7665">CVE-2019-7665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125007">SUSE bug 1125007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009490191" comment="elfutils-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490194" comment="libasm1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490196" comment="libdw1-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490199" comment="libebl-plugins-0.168-4.5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490202" comment="libelf1-0.168-4.5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8320" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8320">CVE-2019-8320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130627">SUSE bug 1130627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8321" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8321">CVE-2019-8321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130623">SUSE bug 1130623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8322">CVE-2019-8322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130622">SUSE bug 1130622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8323" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8323">CVE-2019-8323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130620">SUSE bug 1130620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8324">CVE-2019-8324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130617">SUSE bug 1130617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1771-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z/#DDFTKHWDUNIX327O4WIHXU2TIVV47W3Z" source="SUSE-SU"/>
    <description>
    An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8325">CVE-2019-8325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130611">SUSE bug 1130611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8341" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E/#KPV2O2QPXQEQ5BKRBRQ2RKA7RHVLTZ7E" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR/#4QG2AJ6CCSOAIRI2PJS5V7B5H7SPO3LR" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An issue was discovered in Jinja2 2.10. The from_string function is prone to Server Side Template Injection (SSTI) where it takes the "source" parameter as a template object, renders it, and then returns it. The attacker can exploit it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid because users shouldn't use untrusted templates without sandboxing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8341">CVE-2019-8341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125815">SUSE bug 1125815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897127" comment="python3-Jinja2-2.10.1-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8905" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L/#UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P23RB42Q226QTD5TC654YQ2P3E7EXSET/#P23RB42Q226QTD5TC654YQ2P3E7EXSET" source="SUSE-SU"/>
    <description>
    do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8905">CVE-2019-8905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126118">SUSE bug 1126118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8906" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L/#UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P23RB42Q226QTD5TC654YQ2P3E7EXSET/#P23RB42Q226QTD5TC654YQ2P3E7EXSET" source="SUSE-SU"/>
    <description>
    do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8906">CVE-2019-8906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126119">SUSE bug 1126119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8907" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0571-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190571-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005284.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L/#UQQSJOBQTS7ZNXZRM4RJ7J2R4FX7TI6L" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P23RB42Q226QTD5TC654YQ2P3E7EXSET/#P23RB42Q226QTD5TC654YQ2P3E7EXSET" source="SUSE-SU"/>
    <description>
    do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8907">CVE-2019-8907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1126117">SUSE bug 1126117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009887019" comment="file-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887021" comment="file-magic-5.32-7.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887022" comment="libmagic1-5.32-7.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8912" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0784-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0785-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005285.html" source="SUSE-SU"/>
		<reference ref_id="TID000019417" ref_url="https://www.suse.com/support/kb/doc/?id=000019417" source="SUSE-SU"/>
		<reference ref_id="TID7023740" ref_url="https://www.suse.com/support/kb/doc/?id=7023740" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB/#KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8912">CVE-2019-8912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1125907">SUSE bug 1125907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126284">SUSE bug 1126284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8934" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK/#47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
    <description>
    hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8934">CVE-2019-8934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126455">SUSE bug 1126455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20198956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-8956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-8956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8956" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-8956" ref_url="https://www.suse.com/security/cve/CVE-2019-8956" source="SUSE CVE"/>
    <description>
    In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-8956/">CVE-2019-8956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8956">CVE-2019-8956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1124136">SUSE bug 1124136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9162" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9162" ref_url="https://www.suse.com/security/cve/CVE-2019-9162" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 4.20.12, net/ipv4/netfilter/nf_nat_snmp_basic_main.c in the SNMP NAT module has insufficient ASN.1 length checks (aka an array index error), making out-of-bounds read and write operations possible, leading to an OOPS or local privilege escalation. This affects snmp_version and snmp_helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9162/">CVE-2019-9162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9162">CVE-2019-9162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127324">SUSE bug 1127324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1958-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005821.html" source="SUSE-SU"/>
    <description>
    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9169">CVE-2019-9169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1127308">SUSE bug 1127308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146392">SUSE bug 1146392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9445" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9445" ref_url="https://www.suse.com/security/cve/CVE-2019-9445" source="SUSE CVE"/>
    <description>
    In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9445/">CVE-2019-9445 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9445">CVE-2019-9445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172196">SUSE bug 1172196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9446" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9446" ref_url="https://www.suse.com/security/cve/CVE-2019-9446" source="SUSE CVE"/>
    <description>
    In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to improper input validation. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9446/">CVE-2019-9446 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9446">CVE-2019-9446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168313">SUSE bug 1168313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9447" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9447" ref_url="https://www.suse.com/security/cve/CVE-2019-9447" source="SUSE CVE"/>
    <description>
    In the Android kernel in the FingerTipS touchscreen driver there is a possible use-after-free due to improper locking. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9447/">CVE-2019-9447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9447">CVE-2019-9447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168311">SUSE bug 1168311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9448" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9448" ref_url="https://www.suse.com/security/cve/CVE-2019-9448" source="SUSE CVE"/>
    <description>
    In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9448/">CVE-2019-9448 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9448">CVE-2019-9448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168315">SUSE bug 1168315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9449" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9449" ref_url="https://www.suse.com/security/cve/CVE-2019-9449" source="SUSE CVE"/>
    <description>
    In the Android kernel in FingerTipS touchscreen driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9449/">CVE-2019-9449 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9449">CVE-2019-9449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168314">SUSE bug 1168314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9450" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9450" ref_url="https://www.suse.com/security/cve/CVE-2019-9450" source="SUSE CVE"/>
    <description>
    In the Android kernel in the FingerTipS touchscreen driver there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9450/">CVE-2019-9450 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9450">CVE-2019-9450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168316">SUSE bug 1168316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9453" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9453" ref_url="https://www.suse.com/security/cve/CVE-2019-9453" source="SUSE CVE"/>
    <description>
    In the Android kernel in F2FS touch driver there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9453/">CVE-2019-9453 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9453">CVE-2019-9453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150028">SUSE bug 1150028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9454" ref_url="https://www.suse.com/security/cve/CVE-2019-9454" source="SUSE CVE"/>
    <description>
    In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9454/">CVE-2019-9454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-9454">CVE-2019-9454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1150023">SUSE bug 1150023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9466" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9466" ref_url="https://www.suse.com/security/cve/CVE-2019-9466" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-9503. Reason: This candidate is a duplicate of CVE-2019-9503. Notes: All CVE users should reference CVE-2019-9503 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-9466/">CVE-2019-9466 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9466">CVE-2019-9466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156653">SUSE bug 1156653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9475" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9475" ref_url="https://www.suse.com/security/cve/CVE-2019-9475" source="SUSE CVE"/>
    <description>
    In /proc/net of the kernel filesystem, there is a possible information leak due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-9496886
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9475/">CVE-2019-9475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9475">CVE-2019-9475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189429">SUSE bug 1189429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9494" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9494">CVE-2019-9494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9495" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9495">CVE-2019-9495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131291">SUSE bug 1131291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9497" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9497">CVE-2019-9497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9498" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9498">CVE-2019-9498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9499" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="TID000019433" ref_url="https://www.suse.com/support/kb/doc/?id=000019433" source="SUSE-SU"/>
		<reference ref_id="TID7023818" ref_url="https://www.suse.com/support/kb/doc/?id=7023818" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q7B4Y5BPIVXIPXUAQX744IATOJBYNYP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2R3VXKTYLLUYFBZQ2NNAI5NSZOBXISJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5HDY6AZL2NYOKU57GM74M5JHC5SYA3IY/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9499">CVE-2019-9499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9511" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB/#BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2232-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPYQDVMMZX5VXCXM66MYQJ574WVQJKDC/#IPYQDVMMZX5VXCXM66MYQJ574WVQJKDC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7PIRR3MHAOSVUEBPTHIVLKMQOTQPTMA/#P7PIRR3MHAOSVUEBPTHIVLKMQOTQPTMA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6M6YZRK6MR47435MAIQXQNOA3CBEWYE/#T6M6YZRK6MR47435MAIQXQNOA3CBEWYE" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9511">CVE-2019-9511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145579">SUSE bug 1145579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146091">SUSE bug 1146091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146182">SUSE bug 1146182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202787">SUSE bug 1202787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897519" comment="libnghttp2-14-1.40.0-1.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9513" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC/#R3H4KAW53AW5JRYOIFARBV2NZCYA2XCC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK/#TLFKC75QWUPCRCPS6I4CH5LO7W5G2JQK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2120-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB/#BWXBLC3WM4NT33YQW6VEXFVCPFVQE7FB" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2232-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IPYQDVMMZX5VXCXM66MYQJ574WVQJKDC/#IPYQDVMMZX5VXCXM66MYQJ574WVQJKDC" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7PIRR3MHAOSVUEBPTHIVLKMQOTQPTMA/#P7PIRR3MHAOSVUEBPTHIVLKMQOTQPTMA" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2264-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6M6YZRK6MR47435MAIQXQNOA3CBEWYE/#T6M6YZRK6MR47435MAIQXQNOA3CBEWYE" source="SUSE-SU"/>
    <description>
    Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9513">CVE-2019-9513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1145580">SUSE bug 1145580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146094">SUSE bug 1146094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146184">SUSE bug 1146184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193427">SUSE bug 1193427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202787">SUSE bug 1202787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009897519" comment="libnghttp2-14-1.40.0-1.15 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1273-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYCAJPNWPU25JLCX2FYZZV2MBQ6FWPSK/#NYCAJPNWPU25JLCX2FYZZV2MBQ6FWPSK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DLHTVGZDK7ZGLTEXACMCPRLJRWDZY43F/#DLHTVGZDK7ZGLTEXACMCPRLJRWDZY43F" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5CNS37XWYNGXF5NIDQ74DESU2NNVQ2T6/#5CNS37XWYNGXF5NIDQ74DESU2NNVQ2T6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAG5CCYJAAO5BDYUK75Z6D5XHKZOD2J2/#VAG5CCYJAAO5BDYUK75Z6D5XHKZOD2J2" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
    <description>
    Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636">CVE-2019-9636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129346">SUSE bug 1129346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135433">SUSE bug 1135433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138459">SUSE bug 1138459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145004">SUSE bug 1145004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KM6NAXPFOSRYBXLYJ4E6REOSYLCOBSFU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0696-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CLCTOYU6GVRRH3LEOSXEYTZNQQGAPQSM/" source="SUSE-SU"/>
    <description>
    Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9674">CVE-2019-9674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162825">SUSE bug 1162825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2370-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192370-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-September/005931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V/#KFMC4LRB2CXRSDWEXN4Z4QWZ7YZ6RC4V" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV/#H6XIL4ESPB36DIYNSA6QU4ON4ME4EMKV" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9740">CVE-2019-9740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129071">SUSE bug 1129071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132663">SUSE bug 1132663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904486" comment="python3-urllib3-1.24-9.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:0825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005480.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW/#NQEJRRAMYLR3KYSMGDFZNQ2EVDLKC3JW" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK/#47V7NEB7OP2TDLKBJL5ONQDBZWODPPUK" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M/#QGG5FDRTW3N4DP7WJX4MDPGAOAXLSD6M" source="SUSE-SU"/>
    <description>
    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9824">CVE-2019-9824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1118900">SUSE bug 1118900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129622">SUSE bug 1129622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129623">SUSE bug 1129623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9836" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005683.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IBFCZJCARD575HACDC5NK3INX5NGEA32/#IBFCZJCARD575HACDC5NK3INX5NGEA32" source="SUSE-SU"/>
    <description>
    Secure Encrypted Virtualization (SEV) on Advanced Micro Devices (AMD) Platform Security Processor (PSP; aka AMD Secure Processor or AMD-SP) 0.17 build 11 and earlier has an insecure cryptographic implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9836">CVE-2019-9836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139383">SUSE bug 1139383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904451" comment="kernel-firmware-20200107-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9857" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9857" ref_url="https://www.suse.com/security/cve/CVE-2019-9857" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.0.2, the function inotify_update_existing_watch() in fs/notify/inotify/inotify_user.c neglects to call fsnotify_put_mark() with IN_MASK_CREATE after fsnotify_find_mark(), which will cause a memory leak (aka refcount leak). Finally, this will cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9857/">CVE-2019-9857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9857">CVE-2019-9857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1129896">SUSE bug 1129896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9893" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/005978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006108.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T6BTDMAAEMEE2KT356XYSAOY6YPXMQ6B/#T6BTDMAAEMEE2KT356XYSAOY6YPXMQ6B" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYDRQWJRBUZSB3DBB6RQ3QUB5GBSQN3T/#NYDRQWJRBUZSB3DBB6RQ3QUB5GBSQN3T" source="SUSE-SU"/>
    <description>
    libseccomp before 2.4.0 did not correctly generate 64-bit syscall argument comparisons using the arithmetic operators (LT, GT, LE, GE), which might able to lead to bypassing seccomp filters and potential privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9893">CVE-2019-9893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1128828">SUSE bug 1128828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490528" comment="libseccomp2-2.4.1-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-April/005322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4J7MEOLQLFRA3ARNABFNLF2I4CI6U4D6/#4J7MEOLQLFRA3ARNABFNLF2I4CI6U4D6" source="SUSE-SU"/>
    <description>
    pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9923">CVE-2019-9923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705032" comment="tar-1.34-150000.3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9928" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2019:14076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-June/005598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1300-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5FEMUSEWKKZDGEDDD4QJV3O6GC7P5L5/#J5FEMUSEWKKZDGEDDD4QJV3O6GC7P5L5" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDPK3IGGNO7POJBHVU5Q2IORECSTS4HQ/#LDPK3IGGNO7POJBHVU5Q2IORECSTS4HQ" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0678-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNWCEFRK4SWZUYPTV47AYSJUFUPXN2KE/" source="SUSE-SU"/>
    <description>
    GStreamer before 1.16.0 has a heap-based buffer overflow in the RTSP connection parser via a crafted response from a server, potentially allowing remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9928">CVE-2019-9928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1133375">SUSE bug 1133375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881867" comment="gstreamer-plugins-base-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881870" comment="libgstallocators-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881871" comment="libgstapp-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881872" comment="libgstaudio-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881874" comment="libgstgl-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881875" comment="libgstpbutils-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881876" comment="libgstriff-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881880" comment="libgsttag-1_0-0-1.16.2-2.12 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881881" comment="libgstvideo-1_0-0-1.16.2-2.12 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9936" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J7DCGW2ODM5NG4OPDL4YIFF2AJQHYWFM/#J7DCGW2ODM5NG4OPDL4YIFF2AJQHYWFM" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9936">CVE-2019-9936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130326">SUSE bug 1130326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490530" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9937" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J7DCGW2ODM5NG4OPDL4YIFF2AJQHYWFM/#J7DCGW2ODM5NG4OPDL4YIFF2AJQHYWFM" source="SUSE-SU"/>
    <description>
    In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9937">CVE-2019-9937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130325">SUSE bug 1130325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154162">SUSE bug 1154162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009490530" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20199947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-9947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-9947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9947" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-May/005497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1352-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-December/006249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-October/006041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2389-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF/#2RIZHQXVDEAO3HIKQR7NL3UVMHX36FKF" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7/#DUNCE6TBYMZ75QK6G6S6XVUETIWV7IX7" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SRKGGFVSV7DDWCMAOSO6E3F66U2CF5XR/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9947">CVE-2019-9947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1130840">SUSE bug 1130840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136184">SUSE bug 1136184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201559">SUSE bug 1201559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0030" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0030" ref_url="https://www.suse.com/security/cve/CVE-2020-0030" source="SUSE CVE"/>
    <description>
    In binder_thread_release of binder.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145286050References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0030/">CVE-2020-0030 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0030">CVE-2020-0030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164096">SUSE bug 1164096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0067" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0067" ref_url="https://www.suse.com/security/cve/CVE-2020-0067" source="SUSE CVE"/>
    <description>
    In f2fs_xattr_generic_list of xattr.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: Android. Versions: Android kernel. Android ID: A-120551147.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0067/">CVE-2020-0067 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0067">CVE-2020-0067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169391">SUSE bug 1169391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0110" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0110">CVE-2020-0110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171374">SUSE bug 1171374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174874">SUSE bug 1174874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0305">CVE-2020-0305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0404">CVE-2020-0404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0423" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0423" ref_url="https://www.suse.com/security/cve/CVE-2020-0423" source="SUSE CVE"/>
    <description>
    In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161151868References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-0423/">CVE-2020-0423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0423">CVE-2020-0423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178200">SUSE bug 1178200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0427">CVE-2020-0427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0431">CVE-2020-0431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176896">SUSE bug 1176896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0432" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0432">CVE-2020-0432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177165">SUSE bug 1177165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0435" ref_url="https://www.suse.com/security/cve/CVE-2020-0435" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-14615. Reason: This candidate is a duplicate of CVE-2018-14615. Notes: All CVE users should reference CVE-2018-14615 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0435/">CVE-2020-0435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-0435">CVE-2020-0435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176719">SUSE bug 1176719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196027">SUSE bug 1196027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0444">CVE-2020-0444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180028">SUSE bug 1180028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0465">CVE-2020-0465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0466">CVE-2020-0466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" source="SUSE-SU"/>
		<reference ref_id="TID000019439" ref_url="https://www.suse.com/support/kb/doc/?id=000019439" source="SUSE-SU"/>
		<reference ref_id="TID000019643" ref_url="https://www.suse.com/support/kb/doc/?id=000019643" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0818-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRJJ64XQBFNSNFR6IVUVZQQYKIPTZY7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0543">CVE-2020-0543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172206">SUSE bug 1172206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172207">SUSE bug 1172207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172770">SUSE bug 1172770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201877">SUSE bug 1201877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" source="SUSE-SU"/>
    <description>
    Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0548">CVE-2020-0548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006925.html" source="SUSE-SU"/>
		<reference ref_id="TID000019635" ref_url="https://www.suse.com/support/kb/doc/?id=000019635" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FEGYVZIAZERXLY4SF7SWJUPJOF7CD7LU/" source="SUSE-SU"/>
    <description>
    Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0549">CVE-2020-0549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1156353">SUSE bug 1156353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20200556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-0556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-0556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007858.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEBIYTTPN5SC3I7XNKFVKXTJO4HY7VAK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0872-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FH5J3K5JJQI5P652QACFCNPXGJ2FWZ3A/" source="SUSE-SU"/>
    <description>
    Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-0556">CVE-2020-0556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4NQA6XYK57K7QJFDG3CG3N6OY46L7Q2T/" source="SUSE-SU"/>
    <description>
    The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10029">CVE-2020-10029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165784">SUSE bug 1165784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10135">CVE-2020-10135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFKVQHG6H52DLWIOP6HAYWKPLPU5XGEA/" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10543">CVE-2020-10543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225627">SUSE bug 1225627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10663" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:2072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007124.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/777ZS5BJ5P7BY4TIIFV3VJR5I63NA7ZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10663">CVE-2020-10663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167244">SUSE bug 1167244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171517">SUSE bug 1171517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10690">CVE-2020-10690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170056">SUSE bug 1170056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10701" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701" source="SUSE CVE"/>
    <description>
    A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set, this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero, potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10701">CVE-2020-10701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168680">SUSE bug 1168680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702" source="SUSE CVE"/>
    <description>
    A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10702">CVE-2020-10702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168681">SUSE bug 1168681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10708" ref_url="https://www.suse.com/security/cve/CVE-2020-10708" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-10708/">CVE-2020-10708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-10708">CVE-2020-10708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169737">SUSE bug 1169737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10711">CVE-2020-10711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007421.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10713">CVE-2020-10713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173456">SUSE bug 1173456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199353">SUSE bug 1199353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10732">CVE-2020-10732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10742" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10742" ref_url="https://www.suse.com/security/cve/CVE-2020-10742" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel. An index buffer overflow during Direct IO write leading to the NFS client to crash. In some cases, a reach out of the index after one memory allocation by kmalloc will cause a kernel panic. The highest threat from this vulnerability is to data confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10742/">CVE-2020-10742 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10742">CVE-2020-10742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171984">SUSE bug 1171984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013051.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1049-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C2JOUC6WXDTN4XTZW27D2XR2FKVKS3CH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1050-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BA7FX35L3WKZN6K2V7HF7RSMUNSP7RWF/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in all versions of containernetworking/plugins before version 0.8.6, that allows malicious containers in Kubernetes clusters to perform man-in-the-middle (MitM) attacks. A malicious container can exploit this flaw by sending rogue IPv6 router advertisements to the host or other containers, to redirect traffic to the malicious container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10749">CVE-2020-10749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172375">SUSE bug 1172375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172410">SUSE bug 1172410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904428" comment="cni-plugins-0.8.6-3.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10751">CVE-2020-10751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174963">SUSE bug 1174963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10756" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0987-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H2LGQFHPBFDVZIRS6F36METAFQR7AE43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZEESKDWYGPLV3AB2MM3KZ2OSMVMZIFDO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the SLiRP networking implementation of the QEMU emulator. This flaw occurs in the icmp6_send_echoreply() routine while replying to an ICMP echo request, also known as ping. This flaw allows a malicious guest to leak the contents of the host memory, resulting in possible information disclosure. This flaw affects versions of libslirp before 4.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10756">CVE-2020-10756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184743">SUSE bug 1184743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494397" comment="slirp4netns-0.4.7-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10757">CVE-2020-10757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172317">SUSE bug 1172317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172437">SUSE bug 1172437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10761" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JODB34XICFSIXWBIUWT5YQVCLT2PVNQH/" source="SUSE-SU"/>
    <description>
    An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10761">CVE-2020-10761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10766">CVE-2020-10766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10767">CVE-2020-10767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10768">CVE-2020-10768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10773">CVE-2020-10773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10781">CVE-2020-10781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFKVQHG6H52DLWIOP6HAYWKPLPU5XGEA/" source="SUSE-SU"/>
    <description>
    Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10878">CVE-2020-10878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225627">SUSE bug 1225627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10933" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006711.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/777ZS5BJ5P7BY4TIIFV3VJR5I63NA7ZT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10933">CVE-2020-10933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168938">SUSE bug 1168938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJNUS3JX74DEJSKTRECNDTYTY3LURG2/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10942">CVE-2020-10942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167629">SUSE bug 1167629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11080" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008541.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQM2VNI6BXE7OOJSD4OI2KDH2ZTRUUCD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3FQEUDKQEBT4RUZ2JLDQBWSAYUJ4SCTW/" source="SUSE-SU"/>
    <description>
    In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., &gt; 32), then drop the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11080">CVE-2020-11080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172441">SUSE bug 1172441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705014" comment="libnghttp2-14-1.40.0-3.5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11102" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102" source="SUSE CVE"/>
    <description>
    hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11102">CVE-2020-11102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168713">SUSE bug 1168713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TIJNUS3JX74DEJSKTRECNDTYTY3LURG2/" source="SUSE-SU"/>
    <description>
    An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11494">CVE-2020-11494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168424">SUSE bug 1168424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11501" ref_url="https://www.suse.com/security/cve/CVE-2020-11501" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0948-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011542.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/77K4ZRRLY5AFFKTFNJ3G4BEYUWA7X2P6/" source="SUSE-SU"/>
    <description>
    GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11501/">CVE-2020-11501 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11501">CVE-2020-11501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168345">SUSE bug 1168345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints, aka CID-998912346c0d.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11608">CVE-2020-11608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168829">SUSE bug 1168829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019619" ref_url="https://www.suse.com/support/kb/doc/?id=000019619" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0564-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSOLZPKWSWDPR4VMI5Q3QMPA72BQNRCM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GW2K66LI6CQMXXR5ABJWHGQK64P5J5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class does not properly validate method calls. This allows a remote user to access some methods without authentication. These methods can be used to retrieve user tokens from the salt master and/or run arbitrary commands on salt minions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11651">CVE-2020-11651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170595">SUSE bug 1170595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019619" ref_url="https://www.suse.com/support/kb/doc/?id=000019619" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0564-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSOLZPKWSWDPR4VMI5Q3QMPA72BQNRCM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6GW2K66LI6CQMXXR5ABJWHGQK64P5J5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The salt-master process ClearFuncs class allows access to some methods that improperly sanitize paths. These methods allow arbitrary directory access to authenticated users.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11652">CVE-2020-11652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170595">SUSE bug 1170595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11668">CVE-2020-11668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173942">SUSE bug 1173942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11739" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOGIHSVHR5GUF43UV76QYSDRKANB2S5G/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processor is allowed to re-order the memory access with the preceding ones. In other words, the unlock may be seen by another processor before all the memory accesses within the "critical" section. As a consequence, it may be possible to have a writer executing a critical section at the same time as readers or another writer. In other words, many of the assumptions (e.g., a variable cannot be modified after a check) in the critical sections are not safe anymore. The read-write locks are used in hypercalls (such as grant-table ones), so a malicious guest could exploit the race. For instance, there is a small window where Xen can leak memory if XENMAPSPACE_grant_table is used concurrently. A malicious guest may be able to leak memory, or cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11739">CVE-2020-11739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168142">SUSE bug 1168142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11740" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOGIHSVHR5GUF43UV76QYSDRKANB2S5G/" source="SUSE-SU"/>
    <description>
    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11740">CVE-2020-11740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11741" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOGIHSVHR5GUF43UV76QYSDRKANB2S5G/" source="SUSE-SU"/>
    <description>
    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11741">CVE-2020-11741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168140">SUSE bug 1168140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11742" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOGIHSVHR5GUF43UV76QYSDRKANB2S5G/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11742">CVE-2020-11742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169392">SUSE bug 1169392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11743" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006957.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UOGIHSVHR5GUF43UV76QYSDRKANB2S5G/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one error path to return 1 instead of a negative value. The grant table code in Linux treats this condition as success, and proceeds with incorrectly initialised state. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to map a grant, it hits the incorrect error path. This will crash a Linux based dom0 or backend domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11743">CVE-2020-11743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168143">SUSE bug 1168143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11869" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869" source="SUSE CVE"/>
    <description>
    An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11869">CVE-2020-11869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170537">SUSE bug 1170537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11884" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884" source="SUSE CVE"/>
    <description>
    In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11884">CVE-2020-11884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170030">SUSE bug 1170030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173947">SUSE bug 1173947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11935" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11935" ref_url="https://www.suse.com/security/cve/CVE-2020-11935" source="SUSE CVE"/>
    <description>
    It was discovered that aufs improperly managed inode reference counts in the vfsub_dentry_open() method. A local attacker could use this vulnerability to cause a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-11935/">CVE-2020-11935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11935">CVE-2020-11935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173977">SUSE bug 1173977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11947" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11947">CVE-2020-11947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009330.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPUICUYAOLJREPLAWO5JOKCXD4HSH4KT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILND7MBTQAFIRZBI5CMERWHRUVEAKAOD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in dbus &gt;= 1.3.0 before 1.12.18. The DBusServer in libdbus, as used in dbus-daemon, leaks file descriptors when a message exceeds the per-message file descriptor limit. A local attacker with access to the D-Bus system bus or another system service's private AF_UNIX socket could use this to make the system service reach its file descriptor limit, denying service to subsequent D-Bus clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12049">CVE-2020-12049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704937" comment="dbus-1-1.12.2-8.11.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704938" comment="libdbus-1-3-1.12.2-8.11.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006801.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0647-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AH3RYISLVMAE2VXUYPS7XRVL5OOKGCKA/" source="SUSE-SU"/>
    <description>
    In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12243">CVE-2020-12243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170771">SUSE bug 1170771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007786.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1960-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SNZ3NYJWZSI2ISRG5U4RX3XMDBRHDRTX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WWOUPKVHO4A2R27BZDEYM2EMS4RXKDM4/" source="SUSE-SU"/>
    <description>
    Improper buffer restriction in some Intel(R) Wireless Bluetooth(R) products before version 21.110 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12321">CVE-2020-12321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904451" comment="kernel-firmware-20200107-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12351">CVE-2020-12351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178397">SUSE bug 1178397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12352">CVE-2020-12352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178398">SUSE bug 1178398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Integer overflow in the firmware for some Intel(R) Graphics Drivers for Windows * before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable an escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12362">CVE-2020-12362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182033">SUSE bug 1182033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Improper input validation in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12363">CVE-2020-12363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Null pointer reference in some Intel(R) Graphics Drivers for Windows* before version 26.20.100.7212 and before version Linux kernel version 5.5 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12364">CVE-2020-12364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0407-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KH2XS5MRKRSCX3I5AS4LGZH576PO6KUD/" source="SUSE-SU"/>
    <description>
    Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12373">CVE-2020-12373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0854-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXBTGBKRMQSNENPDBPRN6BJXXF2PQMP4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird &lt; 68.9.0, Firefox &lt; 77, and Firefox ESR &lt; 68.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12399">CVE-2020-12399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12400" ref_url="https://www.suse.com/security/cve/CVE-2020-12400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12400/">CVE-2020-12400 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12400">CVE-2020-12400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632956" comment="libfreebl3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632960" comment="libsoftokn3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632964" comment="mozilla-nspr-4.32-3.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632967" comment="mozilla-nss-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632969" comment="mozilla-nss-certs-3.68-3.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12401" ref_url="https://www.suse.com/security/cve/CVE-2020-12401" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12401/">CVE-2020-12401 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12401">CVE-2020-12401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632956" comment="libfreebl3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632960" comment="libsoftokn3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632964" comment="mozilla-nspr-4.32-3.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632967" comment="mozilla-nss-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632969" comment="mozilla-nss-certs-3.68-3.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007121.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZXP64DVK5MPY3Y7TIL5FD4NLLYB7IXH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0955-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/62SBXYYHCYQ7PZ2H2VC26CEXR66YDCCA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0983-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC6WAA3I6RVAR7RIOKVD5HFWG5AGB2TV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/I7VVAECKE6LOD5F2FZICEGZKYEAAKBWU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox &lt; 78.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12402">CVE-2020-12402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882144" comment="libfreebl3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882146" comment="libsoftokn3-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882148" comment="mozilla-nss-3.53.1-3.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882150" comment="mozilla-nss-certs-3.53.1-3.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12403" ref_url="https://www.suse.com/security/cve/CVE-2020-12403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-12403/">CVE-2020-12403 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12403">CVE-2020-12403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632956" comment="libfreebl3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632960" comment="libsoftokn3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632964" comment="mozilla-nspr-4.32-3.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632967" comment="mozilla-nss-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632969" comment="mozilla-nss-certs-3.68-3.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12413" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12413" ref_url="https://www.suse.com/security/cve/CVE-2020-12413" source="SUSE CVE"/>
		<reference ref_id="TID000019697" ref_url="https://www.suse.com/support/kb/doc/?id=000019697" source="SUSE-SU"/>
    <description>
    The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12413/">CVE-2020-12413 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12413">CVE-2020-12413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176332">SUSE bug 1176332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338955" comment="libfreebl3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338959" comment="libsoftokn3 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338881" comment="mozilla-nss is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338964" comment="mozilla-nss-certs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12430" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006819.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEZKWHJBBGGKIPJ6SR2VA5UMFQO2PBNJ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in qemuDomainGetStatsIOThread in qemu/qemu_driver.c in libvirt 4.10.0 though 6.x before 6.1.0. A memory leak was found in the virDomainListGetStats libvirt API that is responsible for retrieving domain statistics when managing QEMU guests. This flaw allows unprivileged users with a read-only connection to cause a memory leak in the domstats command, resulting in a potential denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12430">CVE-2020-12430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170765">SUSE bug 1170765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12464">CVE-2020-12464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170901">SUSE bug 1170901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12465" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465" source="SUSE CVE"/>
    <description>
    An array overflow was discovered in mt76_add_fragment in drivers/net/wireless/mediatek/mt76/dma.c in the Linux kernel before 5.5.10, aka CID-b102f0c522cf. An oversized packet with too many rx fragments can corrupt memory of adjacent pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12465">CVE-2020-12465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170828">SUSE bug 1170828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170888">SUSE bug 1170888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a "double fetch" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states "The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12652">CVE-2020-12652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171218">SUSE bug 1171218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12653">CVE-2020-12653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171195">SUSE bug 1171195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171254">SUSE bug 1171254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12654">CVE-2020-12654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171202">SUSE bug 1171202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171252">SUSE bug 1171252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12655">CVE-2020-12655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171217">SUSE bug 1171217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12656">CVE-2020-12656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12657" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12657">CVE-2020-12657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171205">SUSE bug 1171205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201585">SUSE bug 1201585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12659">CVE-2020-12659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171214">SUSE bug 1171214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1682-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007092.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0850-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFKVQHG6H52DLWIOP6HAYWKPLPU5XGEA/" source="SUSE-SU"/>
    <description>
    regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12723">CVE-2020-12723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225627">SUSE bug 1225627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LS5Y2M6XDX2JOBPPLIMAXXAXRPAU65ND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0184-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDXGYZS2VAIBN2IO5VQRKJVJGNOKHZF7/" source="SUSE-SU"/>
    <description>
    json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208644">SUSE bug 1208644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664167" comment="libjson-c3-0.13-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12769">CVE-2020-12769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJNPZLJQREMBO6RYZZN6PF57GZCBZPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12771">CVE-2020-12771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012482.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1294-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FYZZYH2MI4PFNRWE2NZ5CTA5TOHKDLPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WG6EJIK3ZOQTMMMAGVUCMM2QCK7CQQ77/" source="SUSE-SU"/>
    <description>
    libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any_core in cr-parser.c, leading to stack consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12825">CVE-2020-12825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203730">SUSE bug 1203730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208647">SUSE bug 1208647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704945" comment="libcroco-0_6-3-0.6.13-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12829">CVE-2020-12829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12888">CVE-2020-12888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1159281">SUSE bug 1159281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179612">SUSE bug 1179612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202012912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12912" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
    <description>
    A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178760">SUSE bug 1178760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0801-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13143">CVE-2020-13143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13253" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13253" ref_url="https://www.suse.com/security/cve/CVE-2020-13253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORE7QLMZXD7OV3HIKQUG3SXU2RG6ONFC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV2UU2CMT6KXSJ7THBLFDIVHI27MZFH/" source="SUSE-SU"/>
    <description>
    sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13253/">CVE-2020-13253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13253">CVE-2020-13253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172033">SUSE bug 1172033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705033" comment="qemu-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705034" comment="qemu-arm-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667529" comment="qemu-ipxe-1.0.0+-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667533" comment="qemu-seabios-1.12.1+-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667534" comment="qemu-sgabios-8-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705035" comment="qemu-tools-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667539" comment="qemu-vgabios-1.12.1+-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667540" comment="qemu-x86-4.2.1-11.34.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JODB34XICFSIXWBIUWT5YQVCLT2PVNQH/" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13361">CVE-2020-13361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13362" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JODB34XICFSIXWBIUWT5YQVCLT2PVNQH/" source="SUSE-SU"/>
    <description>
    In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13362">CVE-2020-13362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13401" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006968.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0846-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2UZVAYC6GTJS7NRPMF4ZQZYDIZUZH7AA/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13401">CVE-2020-13401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172375">SUSE bug 1172375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172377">SUSE bug 1172377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13434">CVE-2020-13434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13435">CVE-2020-13435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13630" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13630">CVE-2020-13630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13631">CVE-2020-13631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13632" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13632">CVE-2020-13632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42QNVR5Y3Z3YQLA2G7H66ZAGRYHVNWHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1554-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ALNGEQGJBIVTIE7PVRV4LMX5VCNHFOZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3944-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WJQDO7GLZV6KOOPFA2ZGLO6YGORWTRO/" source="SUSE-SU"/>
    <description>
    In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13645">CVE-2020-13645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705002" comment="glib-networking-2.62.4-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JODB34XICFSIXWBIUWT5YQVCLT2PVNQH/" source="SUSE-SU"/>
    <description>
    address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13659">CVE-2020-13659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006910.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0790-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AWWZAFHM4X4VDC2SELE3F2YGHU6D3KT/" source="SUSE-SU"/>
    <description>
    GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13777">CVE-2020-13777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172461">SUSE bug 1172461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172506">SUSE bug 1172506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13790" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007379.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/52QOQYR4PVDHN5TNNBKZFP3AO4TWOOJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1458-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QKR5P4LZGKKVQJWLSSC2P3H2MGGEO5I4/" source="SUSE-SU"/>
    <description>
    libjpeg-turbo 2.0.4, and mozjpeg 4.0.0, has a heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13790">CVE-2020-13790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13800" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1108-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JODB34XICFSIXWBIUWT5YQVCLT2PVNQH/" source="SUSE-SU"/>
    <description>
    ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13800">CVE-2020-13800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13844" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/57REXVKUA57FRN7SLQ76XSABQZPDODBX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1693-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VBPOTLDSYOVSFPHOQTKIX6LT32O5K234/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J4EOEHZ7Q27TTGN54YMFIIKDEJ5OS3SI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OIESM64GYREKLMRLTSQUIOYAUT6QG6A2/" source="SUSE-SU"/>
    <description>
    Arm Armv8-A core implementations utilizing speculative execution past unconditional changes in control flow may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka "straight-line speculation."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13844">CVE-2020-13844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492636" comment="libgcc_s1-10.2.1+git583-1.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492650" comment="libstdc++6-10.2.1+git583-1.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13974">CVE-2020-13974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13987" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13987" ref_url="https://www.suse.com/security/cve/CVE-2020-13987" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011912.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-13987/">CVE-2020-13987 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13987">CVE-2020-13987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193385">SUSE bug 1193385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705047" comment="iscsiuio-0.7.8.6-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705048" comment="libopeniscsiusr0_2_0-2.1.4-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705049" comment="open-iscsi-2.1.4-22.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202013988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-13988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-13988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13988" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-13988" ref_url="https://www.suse.com/security/cve/CVE-2020-13988" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011912.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in Contiki through 3.0. An Integer Overflow exists in the uIP TCP/IP Stack component when parsing TCP MSS options of IPv4 network packets in uip_process in net/ipv4/uip.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13988/">CVE-2020-13988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13988">CVE-2020-13988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193385">SUSE bug 1193385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705047" comment="iscsiuio-0.7.8.6-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705048" comment="libopeniscsiusr0_2_0-2.1.4-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705049" comment="open-iscsi-2.1.4-22.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2240-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OTSUNUWKKFI2BZV3IR5RLHAQFXINNKM7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D34ALFN2MMC67CCWTOANPH5DLTSAHLOG/" source="SUSE-SU"/>
    <description>
    The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14145">CVE-2020-14145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177569">SUSE bug 1177569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189078">SUSE bug 1189078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904481" comment="openssh-8.1p1-5.12.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009715.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1441-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ANBRV4PU5AWEEYUWZYBLJCQBG3AHEGD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3529-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DOG6FED4Y3TBAFL2V2XUUC43MKZLFGH3/" source="SUSE-SU"/>
    <description>
    libpcre in PCRE before 8.44 allows an integer overflow via a large number after a (?C substring.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14155">CVE-2020-14155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704972" comment="libpcre1-8.45-20.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14305" ref_url="https://www.suse.com/security/cve/CVE-2020-14305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in how the Linux kernel's Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14305/">CVE-2020-14305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14305">CVE-2020-14305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173346">SUSE bug 1173346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14308" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14308">CVE-2020-14308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14309" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14309">CVE-2020-14309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14310" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14310">CVE-2020-14310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14311">CVE-2020-14311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1426-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5SXZU2UVUXVIVOLI6OT32WIQ6OJBE5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DP73HQCB6UNPUB54KPOZEMBUQDVN6M6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the default configuration of dnsmasq, as shipped with Fedora versions prior to 31 and in all versions Red Hat Enterprise Linux, where it listens on any interface and accepts queries from addresses outside of its local subnet. In particular, the option `local-service` is not enabled. Running dnsmasq in this manner may inadvertently make it an open resolver accessible from any address on the internet. This flaw allows an attacker to conduct a Distributed Denial of Service (DDoS) against other systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14312">CVE-2020-14312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173646">SUSE bug 1173646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653320" comment="dnsmasq-2.86-7.14.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14314" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQA73YKYLNFVSY2PY7W2M2F3PSXXE566/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14314">CVE-2020-14314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14331">CVE-2020-14331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14339" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007278.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6YSRCTTQNE77LHQRZYURTMQLH7NRI2LT/" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt, where it leaked a file descriptor for `/dev/mapper/control` into the QEMU process. This file descriptor allows for privileged operations to happen against the device-mapper on the host. This flaw allows a malicious guest user or process to perform operations outside of their standard permissions, potentially causing serious damage to the host operating system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14339">CVE-2020-14339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174458">SUSE bug 1174458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14343" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14343" ref_url="https://www.suse.com/security/cve/CVE-2020-14343" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012200.html" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14343/">CVE-2020-14343 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14343">CVE-2020-14343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009511395" comment="python3-PyYAML-5.3.1-6.10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CF2UF5RQEZHLCYVS64TFYSSWORKY3YKS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1164-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55CU77DHHBATQUNLCRM6JMI3AWPFKLGV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LTOPHNM42TWX6TIAF2PPQ32BWM6IX2W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YV5KQYECZBOSWWBD6T2Y7PEFRM5EWYLG/" source="SUSE-SU"/>
    <description>
    An integer overflow leading to a heap-buffer overflow was found in The X Input Method (XIM) client was implemented in libX11 before version 1.6.10. As per upstream this is security relevant when setuid programs call XIM client functions while running with elevated privileges. No such programs are shipped with Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14344">CVE-2020-14344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175880">SUSE bug 1175880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492445" comment="libX11-6-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904453" comment="libX11-data-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492449" comment="libX11-xcb1-1.6.5-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14351">CVE-2020-14351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1905-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GVCKE5FRMM4RYS2S4SPPRMJHEPI5JLFH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1803-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2XB6BAWYCJNLY7DVH2MQKCOGF5V2QOKE/" source="SUSE-SU"/>
    <description>
    Multiple buffer overflow vulnerabilities were found in the QUIC image decoding process of the SPICE remote display system, before spice-0.14.2-1. Both the SPICE client (spice-gtk) and server are affected by these flaws. These flaws allow a malicious client or server to send specially crafted messages that, when processed by the QUIC image compression algorithm, result in a process crash or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14355">CVE-2020-14355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14356" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14356">CVE-2020-14356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176392">SUSE bug 1176392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2474-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2475-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007895.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/766DDRWQZZ4JN2FX3CT4S2CZ6SZQUZOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOZDBASQU5F6WB6XA5TE34NSNFRLX63O/" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14363">CVE-2020-14363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009492445" comment="libX11-6-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904453" comment="libX11-data-1.6.5-3.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492449" comment="libX11-xcb1-1.6.5-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVFXHYA5K5PLF3ZBKNJIJ5BFDWNHLJZM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14364">CVE-2020-14364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176494">SUSE bug 1176494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177130">SUSE bug 1177130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14367" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0845-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIUHNUKYNY5JRZHWXP7NXCJOMX4HEQMQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in chrony versions before 3.5.1 when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when it's opened for writing, chronyd does not check for an existing symbolic link with the same file name. This flaw allows an attacker with privileged access to create a symlink with the default PID file name pointing to any destination file in the system, resulting in data loss and a denial of service due to the path traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14367">CVE-2020-14367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202014370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4AHS44MM5VJQEFYSAEM4XLRKSPLU53H7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2063-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WEYG3UZ6PAJGRLA4U75IIT2HGWDPPZWR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability was found in containers/podman in versions before 2.0.5. When using the deprecated Varlink API or the Docker-compatible REST API, if multiple containers are created in a short duration, the environment variables from the first container will get leaked into subsequent containers. An attacker who has control over the subsequent containers could use this flaw to gain access to sensitive information stored in such variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14370">CVE-2020-14370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176804">SUSE bug 1176804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494403" comment="podman-2.1.1-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887139" comment="podman-cni-config-2.1.1-4.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14385">CVE-2020-14385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HS43TKSAE3ZYF4RLJ7FYEPUV7MJERAO2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZQA73YKYLNFVSY2PY7W2M2F3PSXXE566/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14386">CVE-2020-14386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14390">CVE-2020-14390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176253">SUSE bug 1176253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14394" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14394" ref_url="https://www.suse.com/security/cve/CVE-2020-14394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
    <description>
    An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14394/">CVE-2020-14394 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14394">CVE-2020-14394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180207">SUSE bug 1180207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0935-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.4.16, a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14416">CVE-2020-14416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202014422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-14422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0931-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EJ5YJ4DPLMATY2TORRUFGKKVWJH2NQVJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBB2F3ACCOHHRVALSQOWIIKEDKQJDF7R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GM3QZGSZPMW3D7HRZUC22RGSYILXCJAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3G3MHKIU5FV6NKK5GS7XEYQ6W3XV56Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14422">CVE-2020-14422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15157" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15157" ref_url="https://www.suse.com/security/cve/CVE-2020-15157" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    In containerd (an industry-standard container runtime) before version 1.2.14 there is a credential leaking vulnerability. If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a "foreign layer"), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the default containerd resolver will provide its authentication credentials if the server where the URL is located presents an HTTP 401 status code along with registry-specific HTTP headers. If an attacker publishes a public image with a manifest that directs one of the layers to be fetched from a web server they control and they trick a user or system into pulling the image, they can obtain the credentials used for pulling that image. In some cases, this may be the user's username and password for the registry. In other cases, this may be the credentials attached to the cloud virtual instance which can grant access to other cloud resources in the account. The default containerd resolver is used by the cri-containerd plugin (which can be used by Kubernetes), the ctr development tool, and other client programs that have explicitly linked against it. This vulnerability has been fixed in containerd 1.2.14. containerd 1.3 and later are not affected. If you are using containerd 1.3 or later, you are not affected. If you are using cri-containerd in the 1.2 series or prior, you should ensure you only pull images from trusted sources. Other container runtimes built on top of containerd but not using the default resolver (such as Docker) are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15157/">CVE-2020-15157 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15157">CVE-2020-15157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177598">SUSE bug 1177598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007741.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZFPGMWNYFF7TPILP2K22BE5SUUBZBMNS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1910-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PNPGMJDNXG4YN2UCUL54ZUIYNPJTE25F/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15166">CVE-2020-15166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176116">SUSE bug 1176116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15257" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKTLORCQ4MPZPDFGWKJEEPQRXFUTZYZ/" source="SUSE-SU"/>
    <description>
    containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim's API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise reduced privileges, to cause new processes to be run with elevated privileges. This vulnerability has been fixed in containerd 1.3.9 and 1.4.3. Users should update to these versions as soon as they are released. It should be noted that containers started with an old version of containerd-shim should be stopped and restarted, as running containers will continue to be vulnerable even after an upgrade. If you are not providing the ability for untrusted users to start containers in the same network namespace as the shim (typically the "host" network namespace, for example with docker run --net=host or hostNetwork: true in a Kubernetes pod) and run with an effective UID of 0, you are not vulnerable to this issue. If you are running containers with a vulnerable configuration, you can deny access to all abstract sockets with AppArmor by adding a line similar to deny unix addr=@**, to your policy. It is best practice to run containers with a reduced set of privileges, with a non-zero UID, and with isolated namespaces. The containerd maintainers strongly advise against sharing namespaces with the host. Reducing the set of isolation mechanisms used for a container necessarily increases that container's privilege, regardless of what container runtime is used for running that container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257 at SUSE</cve>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15257">CVE-2020-15257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178969">SUSE bug 1178969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887027" comment="docker-19.03.15_ce-6.46.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15358">CVE-2020-15358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJNPZLJQREMBO6RYZZN6PF57GZCBZPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15393">CVE-2020-15393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15436">CVE-2020-15436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-&gt;serial_in pointer which uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15437">CVE-2020-15437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    In QEMU 4.2.0, a MemoryRegionOps object may lack read/write callback methods, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15469">CVE-2020-15469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15563" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Xen versions from 4.8 onwards are affected. Xen versions 4.7 and earlier are not affected. Only x86 systems are affected. Arm systems are not affected. Only x86 HVM guests using shadow paging can leverage the vulnerability. In addition, there needs to be an entity actively monitoring a guest's video frame buffer (typically for display purposes) in order for such a guest to be able to leverage the vulnerability. x86 PV guests, as well as x86 HVM guests using hardware assisted paging (HAP), cannot leverage the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15564" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15564" ref_url="https://www.suse.com/security/cve/CVE-2020-15564" source="SUSE CVE"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared region with the hypervisor. The region will be mapped into Xen address space so it can be directly accessed. On Arm, the region is accessed with instructions that require a specific alignment. Unfortunately, there is no check that the address provided by the guest will be correctly aligned. As a result, a malicious guest could cause a hypervisor crash by passing a misaligned address. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). All Xen versions are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15564/">CVE-2020-15564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15564">CVE-2020-15564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173379">SUSE bug 1173379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15565" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs. Furthermore, IOMMUs may be non-coherent, and hence prior to flushing IOMMU TLBs, a CPU cache also needs writing back to memory after changes were made. Such writing back of cached data was missing in particular when splitting large page mappings into smaller granularity ones. A malicious guest may be able to retain read/write DMA access to frames returned to Xen's free pool, and later reused for another purpose. Host crashes (leading to a Denial of Service) and privilege escalation cannot be ruled out. Xen versions from at least 3.2 onwards are affected. Only x86 Intel systems are affected. x86 AMD as well as Arm systems are not affected. Only x86 HVM guests using hardware assisted paging (HAP), having a passed through PCI device assigned, and having page table sharing enabled can leverage the vulnerability. Note that page table sharing will be enabled (by default) only if Xen considers IOMMU and CPU large page size support compatible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, or (3) the port we try to allocate is higher than what is supported by the ABI (e.g., 2L or FIFO) used by the guest or the limit set by an administrator (max_event_channels in xl cfg). Due to the missing error checks, only (1) will be considered an error. All the other cases will provide a valid port and will result in a crash when trying to access the event channel. When the administrator configured a guest to allow more than 1023 event channels, that guest may be able to crash the host. When Xen is out-of-memory, allocation of new event channels will result in crashing the host rather than reporting an error. Xen versions 4.10 and later are affected. All architectures are affected. The default configuration, when guests are created with xl/libxl, is not vulnerable, because of the default event-channel limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15566">CVE-2020-15566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173376">SUSE bug 1173376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15567" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/INF4LPB5UI4GVQ3GIB2BQFBCEWY7ANGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0985-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6HXOTDBKTDVSG3RF4LKQV654JBFT3BZ/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes. Depending on the compiler version and optimisation flags, Xen might expose a dangerous partially written PTE to the hardware, which an attacker might be able to race to exploit. A guest administrator or perhaps even an unprivileged guest user might be able to cause denial of service, data corruption, or privilege escalation. Only systems using Intel CPUs are vulnerable. Systems using AMD CPUs, and Arm systems, are not vulnerable. Only systems using nested paging (hap, aka nested paging, aka in this case Intel EPT) are vulnerable. Only HVM and PVH guests can exploit the vulnerability. The presence and scope of the vulnerability depends on the precise optimisations performed by the compiler used to build Xen. If the compiler generates (a) a single 64-bit write, or (b) a series of read-modify-write operations in the same order as the source code, the hypervisor is not vulnerable. For example, in one test build using GCC 8.3 with normal settings, the compiler generated multiple (unlocked) read-modify-write operations in source-code order, which did not constitute a vulnerability. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code-generation options). The source code clearly violates the C rules, and thus should be considered vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1280-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VHOMHHK6YNMLF2MBP6E2P2NPYVKF47G6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKES3MGRD44EG6DD3EOHLZZXMVRVSC3/" source="SUSE-SU"/>
    <description>
    GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15705">CVE-2020-15705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182890">SUSE bug 1182890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15706" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15706">CVE-2020-15706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YF63ZYYQU7ZYKF6P6J247AYPUGDO5WQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFTCOW4BTAH2DDIZ2VU3J4FEJWO4JOO/" source="SUSE-SU"/>
    <description>
    Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15707">CVE-2020-15707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904442" comment="grub2-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904443" comment="grub2-arm64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904444" comment="grub2-i386-pc-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904445" comment="grub2-powerpc-ieee1275-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904446" comment="grub2-s390x-emu-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904447" comment="grub2-snapper-plugin-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904448" comment="grub2-x86_64-efi-2.04-9.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904449" comment="grub2-x86_64-xen-2.04-9.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15708" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OCPTCY4NDHTGHFZWIAO6KHGTLUQSXQ5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJK5HZ5F2H34L3UWADRCLKFCCF5KDLVY/" source="SUSE-SU"/>
    <description>
    Ubuntu's packaging of libvirt in 20.04 LTS created a control socket with world read and write permissions. An attacker could use this to overwrite arbitrary files or execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15708">CVE-2020-15708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15719" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1416-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MKFZ2UE2WJPNSQKBYJG67XZNETOETRTR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q62CVIVKWNRLR5JENI7ILPZ5KMCHM545/" source="SUSE-SU"/>
    <description>
    libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15719">CVE-2020-15719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174154">SUSE bug 1174154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780" source="SUSE CVE"/>
		<reference ref_id="BOOTHOLE-BLOG" ref_url="https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007353.html" source="SUSE-SU"/>
		<reference ref_id="TID000019673" ref_url="https://www.suse.com/support/kb/doc/?id=000019673" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15780">CVE-2020-15780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174186">SUSE bug 1174186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15852" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15852" ref_url="https://www.suse.com/security/cve/CVE-2020-15852" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15852/">CVE-2020-15852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15852">CVE-2020-15852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174063">SUSE bug 1174063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15859" ref_url="https://www.suse.com/security/cve/CVE-2020-15859" source="SUSE CVE"/>
    <description>
    QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15859/">CVE-2020-15859 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15859">CVE-2020-15859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174373">SUSE bug 1174373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVFXHYA5K5PLF3ZBKNJIJ5BFDWNHLJZM/" source="SUSE-SU"/>
    <description>
    hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15863">CVE-2020-15863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15888" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15888" ref_url="https://www.suse.com/security/cve/CVE-2020-15888" source="SUSE CVE"/>
    <description>
    Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15888/">CVE-2020-15888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15888">CVE-2020-15888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174367">SUSE bug 1174367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348261" comment="liblua5_3-5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202015999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-15999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-15999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007883.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1718-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7LKJ7B6IPZZV4TBLBONR7Y6JGZSXZCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VG25TUU6YQ4UT3RXGH7XVCZA5WYCJKQJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1734-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6MSPBOHA3QD3XDIF4K4XJIZRWNJYUFS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1737-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZPBMHSM2LSITBUOQWKXR2EMXHGLYG53Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1744-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWJNS362SMLJHC3QLIIPV6WEXDNB6S5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1829-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3H3IAURHPZWH2LAQL44ANHYEB6AFWZGW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZPDJYULXAMSZLQSDCDB6AOO535U72YK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LK7W6L42GLCUWLGKEJNDWSRASOS3CLIA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KX646YBHO2LBCWJZORVE6CWXY2DMCYHR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2096-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVMMW4XRNOGVJH2XZU4UUV2ATGSF6TJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JXIRQKYZLZFQPPH6RZY4V3IIMPGHUT5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2315-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76P3E35NHCSZCWGVU63J3OKJKJO3HUJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1134-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6MMS3NOFXF2TZBZ5M3EC6VOB65FRP4I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in Freetype in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15999">CVE-2020-15999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177936">SUSE bug 1177936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVFXHYA5K5PLF3ZBKNJIJ5BFDWNHLJZM/" source="SUSE-SU"/>
    <description>
    In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16092">CVE-2020-16092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16119" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16119" ref_url="https://www.suse.com/security/cve/CVE-2020-16119" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the Linux kernel exploitable by a local attacker due to reuse of a DCCP socket with an attached dccps_hc_tx_ccid object as a listener after being released. Fixed in Ubuntu Linux kernel 5.4.0-51.56, 5.3.0-68.63, 4.15.0-121.123, 4.4.0-193.224, 3.13.0.182.191 and 3.2.0-149.196.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16119/">CVE-2020-16119 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16119">CVE-2020-16119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177471">SUSE bug 1177471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177742">SUSE bug 1177742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16120" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef ("ovl: stack file ops"). This was fixed in kernel version 5.8 by commits 56230d9 ("ovl: verify permissions in ovl_path_open()"), 48bd024 ("ovl: switch to mounter creds in readdir") and 05acefb ("ovl: check permission to open real file"). Additionally, commits 130fdbc ("ovl: pass correct flags for opening real directory") and 292f902 ("ovl: call secutiry hook in ovl_real_ioctl()") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da ("ovl: do not fail because of O_NOATIMEi") in kernel 5.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16120">CVE-2020-16120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16155" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16155" ref_url="https://www.suse.com/security/cve/CVE-2020-16155" source="SUSE CVE"/>
    <description>
    The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16155/">CVE-2020-16155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16155">CVE-2020-16155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193811">SUSE bug 1193811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336057" comment="perl-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007426.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16166">CVE-2020-16166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202016846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-16846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-16846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16846" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:14536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W22H3YLCTB3S3UBN7YRWYRBMUPL5V5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB6DQ7QYY2NFKZFWBCHEOJR44RYJQMSN/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-16846">CVE-2020-16846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1711" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1711">CVE-2020-1711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1166240">SUSE bug 1166240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1712" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:46-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:47-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:48-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:98-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:99-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:0793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006464.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0208-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3SLX2X3J4XZECXPBKC7QV2ZINGO53ABE/" source="SUSE-SU"/>
    <description>
    A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1712">CVE-2020-1712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162108">SUSE bug 1162108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904471" comment="libsystemd0-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904472" comment="libudev1-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904473" comment="systemd-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904474" comment="systemd-sysvinit-246.10-2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904475" comment="udev-246.10-2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1726" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007476.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1552-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SQTQ7DAIC5RSKYJHFFDBAERIC5GGSB4J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1559-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4RRWLMM7REX4VHOLCPS6TP7RMNE6RGH/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to trigger the flaw and overwrite files in the volume.This issue was introduced in version 1.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1726">CVE-2020-1726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164090">SUSE bug 1164090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494403" comment="podman-2.1.1-4.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887139" comment="podman-cni-config-2.1.1-4.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1730" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FX2ZYCDJKC62FZGMUEJVQVEL5OG6CYNN/" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh versions before 0.8.9 and before 0.9.4 in the way it handled AES-CTR (or DES ciphers if enabled) ciphers. The server or client could crash when the connection hasn't been fully initialized and the system tries to cleanup the ciphers when closing the connection. The biggest threat from this vulnerability is system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1730">CVE-2020-1730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1168699">SUSE bug 1168699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493127" comment="libssh4-0.8.7-10.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17437" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17437" ref_url="https://www.suse.com/security/cve/CVE-2020-17437" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011958.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can point to memory that is way beyond the data buffer in uip_process in uip.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-17437/">CVE-2020-17437 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17437">CVE-2020-17437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705047" comment="iscsiuio-0.7.8.6-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705048" comment="libopeniscsiusr0_2_0-2.1.4-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705049" comment="open-iscsi-2.1.4-22.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17438" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17438" ref_url="https://www.suse.com/security/cve/CVE-2020-17438" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:1517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008619.html" source="SUSE-SU"/>
		<reference ref_id="TID000019813" ref_url="https://www.suse.com/support/kb/doc/?id=000019813" source="SUSE-SU"/>
    <description>
    An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that reassembles fragmented packets fails to properly validate the total length of an incoming packet specified in its IP header, as well as the fragmentation offset value specified in the IP header. By crafting a packet with specific values of the IP header length and the fragmentation offset, attackers can write into the .bss section of the program (past the statically allocated buffer that is used for storing the fragmented data) and cause a denial of service in uip_reass() in uip.c, or possibly execute arbitrary code on some target architectures.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-17438/">CVE-2020-17438 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17438">CVE-2020-17438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179907">SUSE bug 1179907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705047" comment="iscsiuio-0.7.8.6-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705048" comment="libopeniscsiusr0_2_0-2.1.4-22.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705049" comment="open-iscsi-2.1.4-22.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1747" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0507-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TCDKXSWEKNDBVHSMQWWQIFBNDUKAWME/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5RCRCB4N7SFWRVKNL5LEFDNZU5ZDJLT5/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747">CVE-2020-1747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165439">SUSE bug 1165439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174514">SUSE bug 1174514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493125" comment="python3-PyYAML-5.1.2-6.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR7IAIXMEHH4XQP5TC46UTZY6KWF5277/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1749">CVE-2020-1749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165629">SUSE bug 1165629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165631">SUSE bug 1165631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2020:14536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W22H3YLCTB3S3UBN7YRWYRBMUPL5V5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB6DQ7QYY2NFKZFWBCHEOJR44RYJQMSN/" source="SUSE-SU"/>
    <description>
    The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17490">CVE-2020-17490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1751">CVE-2020-1751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167630">SUSE bug 1167630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010664.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YCC4RD3YANYEBNBFX6B2TAZPVLRT3GPH/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1752">CVE-2020-1752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167631">SUSE bug 1167631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904439" comment="glibc-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904440" comment="glibc-locale-2.26-13.51.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904441" comment="glibc-locale-base-2.26-13.51.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0892-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5QFMY5PC6YGRRPOTKEDLIS6VQ2KCVUDF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEVT5FS4C2453YNMGNJH5GEW4YPAD5DS/" source="SUSE-SU"/>
    <description>
    Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17541">CVE-2020-17541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704903" comment="libjpeg8-8.1.2-5.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F5H7V5OW6UBVFHCH47YCKODMLJ7D63J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7Z5FNEN6ESZTK5WIFX2ODDNYYHFYUJ3Z/" source="SUSE-SU"/>
    <description>
    Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1967">CVE-2020-1967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1169407">SUSE bug 1169407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008175.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GMYUDIGG7RM42AIH4Q3WW4VZGFRAPLQ7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YDLYD3JFZSOPG5DPXOHFTMZTUOLPOK5J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DET3T3KBOIXDZC2VZ5XGHXVGQ54LOAI5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2269-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGJECGZC6A7C36WKBWL3FKK6U7IGO4OK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EIIX5B6YLG6I6J4WR546EWZU23BNUSV6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MAV3V72VVUTVO6VC6SN5XB5EYX3TJWK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ2RC7AEXMLHMCFO7K3XLJO5WMPQXS7V/" source="SUSE-SU"/>
    <description>
    The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1971">CVE-2020-1971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196179">SUSE bug 1196179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20201983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-1983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-1983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0636-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCDKP2JD5R6KY4I5SVS2BPLDEJ5IHIYN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0756-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODUWECA6HHYVEDIL3STBFAHJCJLTCAPV/" source="SUSE-SU"/>
    <description>
    A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1983">CVE-2020-1983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170940">SUSE bug 1170940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494397" comment="slirp4netns-0.4.7-3.12.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24352</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24352" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1664-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVFXHYA5K5PLF3ZBKNJIJ5BFDWNHLJZM/" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24352">CVE-2020-24352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175370">SUSE bug 1175370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24370">CVE-2020-24370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704904" comment="liblua5_3-5-5.3.6-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOVDNMRFDTKUTT25LOX5ABPHFFAREA4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2196-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EASBVV4MIBIGZHO5CD23ITJBJVVHVDEU/" source="SUSE-SU"/>
    <description>
    lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24371">CVE-2020-24371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704904" comment="liblua5_3-5-5.3.6-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24489">CVE-2020-24489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192359">SUSE bug 1192359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225680">SUSE bug 1225680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494035" comment="ucode-intel-20210525-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24490" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:4496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="TID000019735" ref_url="https://www.suse.com/support/kb/doc/?id=000019735" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24490">CVE-2020-24490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177727">SUSE bug 1177727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24502" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24502" ref_url="https://www.suse.com/security/cve/CVE-2020-24502" source="SUSE CVE"/>
    <description>
    Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 and before version 1.4.29.0 for Windows*, may allow an authenticated user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24502/">CVE-2020-24502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24502">CVE-2020-24502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182409">SUSE bug 1182409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24503" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24503" ref_url="https://www.suse.com/security/cve/CVE-2020-24503" source="SUSE CVE"/>
    <description>
    Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24503/">CVE-2020-24503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24503">CVE-2020-24503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182405">SUSE bug 1182405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24504" ref_url="https://www.suse.com/security/cve/CVE-2020-24504" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
    <description>
    Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux before version 1.0.4 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24504/">CVE-2020-24504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24504">CVE-2020-24504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182404">SUSE bug 1182404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24511">CVE-2020-24511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494035" comment="ucode-intel-20210525-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24512">CVE-2020-24512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494035" comment="ucode-intel-20210525-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVSPIXHZZESTI3IJTF7URWDUHHXIRWBP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JL4WBLDZZMRKCJPRBNYNFPGJBJE5OQZO/" source="SUSE-SU"/>
    <description>
    Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24513">CVE-2020-24513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192360">SUSE bug 1192360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199300">SUSE bug 1199300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201731">SUSE bug 1201731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494035" comment="ucode-intel-20210525-7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24586">CVE-2020-24586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24587">CVE-2020-24587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199701">SUSE bug 1199701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2864-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007605.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1724-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DZOEFOLTQAYGNTOZAN72WEMRDHFF2S77/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPLRKGVRA773WJWS5U7OBUZQFNCG4CNO/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">CVE-2020-24659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176181">SUSE bug 1176181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178057">SUSE bug 1178057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904464" comment="libgnutls30-3.6.7-14.7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202024977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-24977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-24977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B76ED5OFVWOL7NKZQFDCHSJ2XSVUGS5C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1465-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4SILBB7PKX6423U3CJRDKVS3JPM4SMQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24977">CVE-2020-24977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25084" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because the usb_packet_map return value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25084">CVE-2020-25084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25085" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25085">CVE-2020-25085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2521" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2521" ref_url="https://www.suse.com/security/cve/CVE-2020-2521" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-2521/">CVE-2020-2521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-2521">CVE-2020-2521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25211">CVE-2020-25211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192356">SUSE bug 1192356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25212" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25212">CVE-2020-25212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J7JDZHUFWENH4VEXEW5NBCIYIE2TGV4R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHT4BRJLYFL5MO7IUTNSV4E7WWYHA5LB/" source="SUSE-SU"/>
    <description>
    url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25219">CVE-2020-25219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492610" comment="libproxy1-0.4.15-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25220" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25220" ref_url="https://www.suse.com/security/cve/CVE-2020-25220" source="SUSE CVE"/>
    <description>
    The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before 4.19.140 has a use-after-free because skcd-&gt;no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25220/">CVE-2020-25220 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25220">CVE-2020-25220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176392">SUSE bug 1176392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25221" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25221" ref_url="https://www.suse.com/security/cve/CVE-2020-25221" source="SUSE CVE"/>
    <description>
    get_gate_page in mm/gup.c in the Linux kernel 5.7.x and 5.8.x before 5.8.7 allows privilege escalation because of incorrect reference counting (caused by gate page mishandling) of the struct page that backs the vsyscall page. The result is a refcount underflow. This can be triggered by any 64-bit process that can use ptrace() or process_vm_readv(), aka CID-9fa2dd946743.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25221/">CVE-2020-25221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25221">CVE-2020-25221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176286">SUSE bug 1176286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25284">CVE-2020-25284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25285">CVE-2020-25285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25592" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:14536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="TID000019775" ref_url="https://www.suse.com/support/kb/doc/?id=000019775" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2W22H3YLCTB3S3UBN7YRWYRBMUPL5V5B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MB6DQ7QYY2NFKZFWBCHEOJR44RYJQMSN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25592">CVE-2020-25592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25595" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specifications shouldn't be able to affect these registers, experience shows that it's very common for devices to have out-of-spec "backdoor" operations that can affect the result of these reads. A not fully trusted guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. Privilege escalation and information leaks cannot be excluded. All versions of Xen supporting PCI passthrough are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with passed through PCI devices may be able to leverage the vulnerability. Only systems passing through devices with out-of-spec ("backdoor") functionality can cause issues. Experience shows that such out-of-spec functionality is common; unless you have reason to believe that your device does not have such functionality, it's better to assume that it does.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25595">CVE-2020-25595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25596" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. This causes the guest kernel to observe a kernel-privilege #GP fault (typically fatal) rather than a user-privilege #GP fault (usually converted into SIGSEGV/etc.). Malicious or buggy userspace can crash the guest kernel, resulting in a VM Denial of Service. All versions of Xen from 3.2 onwards are vulnerable. Only x86 systems are vulnerable. ARM platforms are not vulnerable. Only x86 systems that support the SYSENTER instruction in 64bit mode are vulnerable. This is believed to be Intel, Centaur, and Shanghai CPUs. AMD and Hygon CPUs are not believed to be vulnerable. Only x86 PV guests can exploit the vulnerability. x86 PVH / HVM guests cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25596">CVE-2020-25596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25597" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. However, operations like the resetting of all event channels may involve decreasing one of the bounds checked when determining validity. This may lead to bug checks triggering, crashing the host. An unprivileged guest may be able to crash Xen, leading to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only systems with untrusted guests permitted to create more than the default number of event channels are vulnerable. This number depends on the architecture and type of guest. For 32-bit x86 PV guests, this is 1023; for 64-bit x86 PV guests, and for all ARM guests, this number is 4095. Systems where untrusted guests are limited to fewer than this number are not vulnerable. Note that xl and libxl limit max_event_channels to 1023 by default, so systems using exclusively xl, libvirt+libxl, or their own toolstack based on libxl, and not explicitly setting max_event_channels, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25597">CVE-2020-25597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25598" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.14.x. There is a missing unlock in the XENMEM_acquire_resource error path. The RCU (Read, Copy, Update) mechanism is a synchronisation primitive. A buggy error path in the XENMEM_acquire_resource exits without releasing an RCU reference, which is conceptually similar to forgetting to unlock a spinlock. A buggy or malicious HVM stubdomain can cause an RCU reference to be leaked. This causes subsequent administration operations, (e.g., CPU offline) to livelock, resulting in a host Denial of Service. The buggy codepath has been present since Xen 4.12. Xen 4.14 and later are vulnerable to the DoS. The side effects are believed to be benign on Xen 4.12 and 4.13, but patches are provided nevertheless. The vulnerability can generally only be exploited by x86 HVM VMs, as these are generally the only type of VM that have a Qemu stubdomain. x86 PV and PVH domains, as well as ARM VMs, typically don't use a stubdomain. Only VMs using HVM stubdomains can exploit the vulnerability. VMs using PV stubdomains, or with emulators running in dom0, cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25598">CVE-2020-25598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176341">SUSE bug 1176341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25599" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There are evtchn_reset() race conditions. Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. In particular, x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25599">CVE-2020-25599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25600" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ones. 32-bit x86 domains can use only 1023 channels, due to limited space in their shared (between guest and Xen) information structure, whereas all other domains can use up to 4095 in this model. The recording of the respective limit during domain initialization, however, has occurred at a time where domains are still deemed to be 64-bit ones, prior to actually honoring respective domain properties. At the point domains get recognized as 32-bit ones, the limit didn't get updated accordingly. Due to this misbehavior in Xen, 32-bit domains (including Domain 0) servicing other domains may observe event channel allocations to succeed when they should really fail. Subsequent use of such event channels would then possibly lead to corruption of other parts of the shared info structure. An unprivileged guest may cause another domain, in particular Domain 0, to misbehave. This may lead to a Denial of Service (DoS) for the entire system. All Xen versions from 4.4 onwards are vulnerable. Xen versions 4.3 and earlier are not vulnerable. Only x86 32-bit domains servicing other domains are vulnerable. Arm systems, as well as x86 64-bit domains, are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25600">CVE-2020-25600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25601" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is a lack of preemption in evtchn_reset() / evtchn_destroy(). In particular, the FIFO event channel model allows guests to have a large number of event channels active at a time. Closing all of these (when resetting all event channels or when cleaning up after the guest) may take extended periods of time. So far, there was no arrangement for preemption at suitable intervals, allowing a CPU to spend an almost unbounded amount of time in the processing of these operations. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. All Xen versions are vulnerable in principle. Whether versions 4.3 and older are vulnerable depends on underlying hardware characteristics.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25601">CVE-2020-25601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25602" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. An x86 PV guest can trigger a host OS crash when handling guest access to MSR_MISC_ENABLE. When a guest accesses certain Model Specific Registers, Xen first reads the value from hardware to use as the basis for auditing the guest access. For the MISC_ENABLE MSR, which is an Intel specific MSR, this MSR read is performed without error handling for a #GP fault, which is the consequence of trying to read this MSR on non-Intel hardware. A buggy or malicious PV guest administrator can crash Xen, resulting in a host Denial of Service. Only x86 systems are vulnerable. ARM systems are not vulnerable. Only Xen versions 4.11 and onwards are vulnerable. 4.10 and earlier are not vulnerable. Only x86 systems that do not implement the MISC_ENABLE MSR (0x1a0) are vulnerable. AMD and Hygon systems do not implement this MSR and are vulnerable. Intel systems do implement this MSR and are not vulnerable. Other manufacturers have not been checked. Only x86 PV guests can exploit the vulnerability. x86 HVM/PVH guests cannot exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25602">CVE-2020-25602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176339">SUSE bug 1176339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25603" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There are missing memory barriers when accessing/allocating an event channel. Event channels control structures can be accessed lockless as long as the port is considered to be valid. Such a sequence is missing an appropriate memory barrier (e.g., smp_*mb()) to prevent both the compiler and CPU from re-ordering access. A malicious guest may be able to cause a hypervisor crash resulting in a Denial of Service (DoS). Information leak and privilege escalation cannot be excluded. Systems running all versions of Xen are affected. Whether a system is vulnerable will depend on the CPU and compiler used to build Xen. For all systems, the presence and the scope of the vulnerability depend on the precise re-ordering performed by the compiler used to build Xen. We have not been able to survey compilers; consequently we cannot say which compiler(s) might produce vulnerable code (with which code generation options). GCC documentation clearly suggests that re-ordering is possible. Arm systems will also be vulnerable if the CPU is able to re-order memory access. Please consult your CPU vendor. x86 systems are only vulnerable if a compiler performs re-ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25603">CVE-2020-25603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25604" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1608-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. There is a race condition when migrating timers between x86 HVM vCPUs. When migrating timers of x86 HVM guests between its vCPUs, the locking model used allows for a second vCPU of the same guest (also operating on the timers) to release a lock that it didn't acquire. The most likely effect of the issue is a hang or crash of the hypervisor, i.e., a Denial of Service (DoS). All versions of Xen are affected. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only x86 HVM guests can leverage the vulnerability. x86 PV and PVH cannot leverage the vulnerability. Only guests with more than one vCPU can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25604">CVE-2020-25604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25613" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0471-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RPFN4SV4JCJUNCQC4PQZ6VEJN63VN2FS/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25613">CVE-2020-25613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009503809" comment="libruby2_5-2_5-2.5.8-4.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503810" comment="ruby2.5-2.5.8-4.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503813" comment="ruby2.5-stdlib-2.5.8-4.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25624" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer over-read via values obtained from the host controller driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25624">CVE-2020-25624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25625" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD list has a loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25625">CVE-2020-25625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25637" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3OCPTCY4NDHTGHFZWIAO6KHGTLUQSXQ5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TJK5HZ5F2H34L3UWADRCLKFCCF5KDLVY/" source="SUSE-SU"/>
    <description>
    A double free memory issue was found to occur in the libvirt API, in versions before 6.8.0, responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically, clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon, resulting in a denial of service, or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25637">CVE-2020-25637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25639" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25639">CVE-2020-25639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25641" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25641">CVE-2020-25641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25643" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25643">CVE-2020-25643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177226">SUSE bug 1177226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P7AP5V2WMODZLL2BP3KNT37XWNT7K5NX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1698-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ODIY42JEXH7RGWFLZMCA4RHYSA2XEWTJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25645">CVE-2020-25645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25648" ref_url="https://www.suse.com/security/cve/CVE-2020-25648" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25648/">CVE-2020-25648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25648">CVE-2020-25648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177917">SUSE bug 1177917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632956" comment="libfreebl3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632960" comment="libsoftokn3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632964" comment="mozilla-nspr-4.32-3.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632967" comment="mozilla-nss-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632969" comment="mozilla-nss-certs-3.68-3.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25656">CVE-2020-25656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25659" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6HSP2RSDCASVO7P7KBUV5GDZ6SYI6L7I/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25659">CVE-2020-25659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183152">SUSE bug 1183152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218043">SUSE bug 1218043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202025661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25661" ref_url="https://www.suse.com/security/cve/CVE-2020-25661" source="SUSE CVE"/>
    <description>
    A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25661/">CVE-2020-25661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25661">CVE-2020-25661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178397">SUSE bug 1178397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25662" ref_url="https://www.suse.com/security/cve/CVE-2020-25662" source="SUSE CVE"/>
    <description>
    A Red Hat only CVE-2020-12352 regression issue was found in the way the Linux kernel's Bluetooth stack implementation handled the initialization of stack memory when handling certain AMP packets. This flaw allows a remote attacker in an adjacent range to leak small portions of stack memory on the system by sending specially crafted AMP packets. The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25662/">CVE-2020-25662 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25662">CVE-2020-25662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178398">SUSE bug 1178398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25668" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25668">CVE-2020-25668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25669" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25669">CVE-2020-25669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel where refcount leak in llcp_sock_bind() causing use-after-free which might lead to privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25670">CVE-2020-25670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel, where a refcount leak in llcp_sock_connect() causing use-after-free which might lead to privilege escalations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25671">CVE-2020-25671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A memory leak vulnerability was found in Linux kernel in llcp_sock_connect
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25672">CVE-2020-25672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25673">CVE-2020-25673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007764.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VC65YBN4WMTACGDQE7SGD2ZBAJBKS3O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P5OV5ACOVPOXU3LAYTZRU6RI5XRK4L6W/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25692">CVE-2020-25692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25704">CVE-2020-25704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705" source="SUSE CVE"/>
		<reference ref_id="SADDNS-BLOG" ref_url="https://www.suse.com/c/suse-releases-fix-for-saddns-vulnerability/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="TID000019786" ref_url="https://www.suse.com/support/kb/doc/?id=000019786" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25705">CVE-2020-25705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25707" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate is a duplicate of CVE-2020-28916
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25707">CVE-2020-25707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP's slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25709">CVE-2020-25709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:22-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:23-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008207.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0102-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HXI5DVBGML6XRCQGGMOYKQFUJDZ2JPS6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0107-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DU5LAY3LI5VYENQTLYA5AGNA47GQHI2B/" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25710">CVE-2020-25710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202025723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-25723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-25723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25723" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25723">CVE-2020-25723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26088" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AEK7Q7ZWE4WXOTEGJF4TF2SYKEP43GGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TH734NYI5EZD4XQ2VE5Y7HNPWOK3EVXA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26088">CVE-2020-26088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008345.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZUR4GGWYLZ7VYS4RR7MJ7D7RHSBYJQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQJZUPSO3MIAIYJBX2VTZETYQSLUJQPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26116">CVE-2020-26116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192361">SUSE bug 1192361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009517.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3Y5UAWOTOHQRGI2VNSOUDC2SOAHGJLAH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2282-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VS7J7DOJY26YMLJIUVHRH7UQFVLGBWIQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6CAFSANHH6TU43VSKAJ5JA2EMHSREMKP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2817-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TOZI5ZFPFR2BACIE74HUJWDXC2ZWXNGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26137">CVE-2020-26137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009626945" comment="python3-asn1crypto-0.24.0-3.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704939" comment="python3-cffi-1.13.2-3.2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704940" comment="python3-cryptography-2.8-10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626950" comment="python3-pyOpenSSL-17.5.0-8.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626951" comment="python3-pyasn1-0.4.2-3.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626952" comment="python3-pycparser-2.17-3.2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626953" comment="python3-urllib3-1.25.10-9.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26139">CVE-2020-26139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26141">CVE-2020-26141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26145" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26145">CVE-2020-26145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="TID000020244" ref_url="https://www.suse.com/support/kb/doc/?id=000020244" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26147">CVE-2020-26147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233723">SUSE bug 1233723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26154" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1676-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J7JDZHUFWENH4VEXEW5NBCIYIE2TGV4R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1680-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHT4BRJLYFL5MO7IUTNSV4E7WWYHA5LB/" source="SUSE-SU"/>
    <description>
    url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26154">CVE-2020-26154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492610" comment="libproxy1-0.4.15-4.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26556" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26556" ref_url="https://www.suse.com/security/cve/CVE-2020-26556" source="SUSE CVE"/>
    <description>
    Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to conduct a successful brute-force attack on an insufficiently random AuthValue before the provisioning procedure times out, to complete authentication by leveraging Malleable Commitment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26556/">CVE-2020-26556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26556">CVE-2020-26556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215239">SUSE bug 1215239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26557" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26557" ref_url="https://www.suse.com/security/cve/CVE-2020-26557" source="SUSE CVE"/>
    <description>
    Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without possession of the AuthValue used in the provisioning protocol) to determine the AuthValue via a brute-force attack (unless the AuthValue is sufficiently random and changed each time).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26557/">CVE-2020-26557 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26557">CVE-2020-26557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215240">SUSE bug 1215240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26558" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26558">CVE-2020-26558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336474" comment="libbluetooth3 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26559" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26559" ref_url="https://www.suse.com/security/cve/CVE-2020-26559" source="SUSE CVE"/>
    <description>
    Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (participating in the provisioning protocol) to identify the AuthValue used given the Provisioner's public key, and the confirmation number and nonce provided by the provisioning device. This could permit a device without the AuthValue to complete provisioning without brute-forcing the AuthValue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-27"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26559/">CVE-2020-26559 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26559">CVE-2020-26559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215242">SUSE bug 1215242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26560" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26560" ref_url="https://www.suse.com/security/cve/CVE-2020-26560" source="SUSE CVE"/>
    <description>
    Bluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, reflecting the authentication evidence from a Provisioner, to complete authentication without possessing the AuthValue, and potentially acquire a NetKey and AppKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-27"/>
	<updated date="2024-04-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26560/">CVE-2020-26560 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26560">CVE-2020-26560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215243">SUSE bug 1215243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27068" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27068">CVE-2020-27068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27152" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27152" ref_url="https://www.suse.com/security/cve/CVE-2020-27152" source="SUSE CVE"/>
    <description>
    An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to improper interaction between a resampler and edge triggering, aka CID-77377064c3a9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27152/">CVE-2020-27152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27152">CVE-2020-27152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177785">SUSE bug 1177785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27153" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007701.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BB5UDM6QQQT6VWNYJOL6RFHSCCBGZ5N6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1880-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSK63TCYUXKST26JQJGEEJ3WMOAVBLVC/" source="SUSE-SU"/>
    <description>
    In BlueZ before 5.55, a double free was found in the gatttool disconnect_cb() routine from shared/att.c. A remote attacker could potentially cause a denial of service or code execution, during service discovery, due to a redundant disconnect MGMT event.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27153">CVE-2020-27153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27170">CVE-2020-27170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27171">CVE-2020-27171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27194" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27194" ref_url="https://www.suse.com/security/cve/CVE-2020-27194" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-27194/">CVE-2020-27194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27194">CVE-2020-27194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177889">SUSE bug 1177889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20202732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-2732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-2732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-2732">CVE-2020-2732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163971">SUSE bug 1163971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27418" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27418" ref_url="https://www.suse.com/security/cve/CVE-2020-27418" source="SUSE CVE"/>
    <description>
    A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27418/">CVE-2020-27418 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27418">CVE-2020-27418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214919">SUSE bug 1214919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27616" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27616" ref_url="https://www.suse.com/security/cve/CVE-2020-27616" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter an outside-limits situation in a calculation. A guest can crash the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27616/">CVE-2020-27616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27616">CVE-2020-27616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178400">SUSE bug 1178400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27617" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS users to trigger an assertion failure. A guest can crash the QEMU process via packet data that lacks a valid Layer 3 protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27617">CVE-2020-27617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
    <description>
    In Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27619">CVE-2020-27619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180254">SUSE bug 1180254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193386">SUSE bug 1193386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27670" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QALKR2UERMILIDYYTVQWAI5UURBP4QPO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZIOT3M77DFFZF3ASHBBUCOOBBI7UR6WR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27670">CVE-2020-27670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183925">SUSE bug 1183925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27671" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QALKR2UERMILIDYYTVQWAI5UURBP4QPO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZIOT3M77DFFZF3ASHBBUCOOBBI7UR6WR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27671">CVE-2020-27671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183925">SUSE bug 1183925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27672" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QALKR2UERMILIDYYTVQWAI5UURBP4QPO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZIOT3M77DFFZF3ASHBBUCOOBBI7UR6WR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27672">CVE-2020-27672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183925">SUSE bug 1183925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27673" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1783-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QALKR2UERMILIDYYTVQWAI5UURBP4QPO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZIOT3M77DFFZF3ASHBBUCOOBBI7UR6WR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27673">CVE-2020-27673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27674" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27674">CVE-2020-27674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27675" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27675" ref_url="https://www.suse.com/security/cve/CVE-2020-27675" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference, as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device, aka CID-073d0552ead5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27675/">CVE-2020-27675 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27675">CVE-2020-27675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27777">CVE-2020-27777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200343">SUSE bug 1200343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220060">SUSE bug 1220060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27784" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27784" ref_url="https://www.suse.com/security/cve/CVE-2020-27784" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27784/">CVE-2020-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27784">CVE-2020-27784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202895">SUSE bug 1202895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27786">CVE-2020-27786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179616">SUSE bug 1179616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27815" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27815">CVE-2020-27815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179458">SUSE bug 1179458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27820">CVE-2020-27820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27821" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27821">CVE-2020-27821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179686">SUSE bug 1179686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27825" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27825">CVE-2020-27825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179961">SUSE bug 1179961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27830" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27830">CVE-2020-27830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
    <description>
    A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27835">CVE-2020-27835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007792.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2CMUQ7G43OCIKDTP2ILYUJLUD37RPPA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2062-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O6PZTATZYCUQYKCJ6QBS7JJHNWPXIDNL/" source="SUSE-SU"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28196">CVE-2020-28196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183911">SUSE bug 1183911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28243" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28243">CVE-2020-28243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHV4EWRFFS4A6PZIGBZQ2KTQFUWF52LY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CK4ZVHN5CZEV5SEFNJFHEB2GTN3V6YCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4FGJHRZRKWQ2TYU34S47P4GNDICF6RCY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2192-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5GBNU2YMLJN6R7ACNKZML4MG7X35FZTY/" source="SUSE-SU"/>
    <description>
    Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28368">CVE-2020-28368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
    <description>
    In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28374">CVE-2020-28374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28588" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28588" ref_url="https://www.suse.com/security/cve/CVE-2020-28588" source="SUSE CVE"/>
    <description>
    An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it's likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28588/">CVE-2020-28588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28588">CVE-2020-28588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182806">SUSE bug 1182806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GIP2AYRG3VCHD6CCU4URBF5KVBKIT63/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28915">CVE-2020-28915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28916" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an RX descriptor with a NULL buffer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28916">CVE-2020-28916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28941" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28941">CVE-2020-28941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28972" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28972">CVE-2020-28972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-December/017242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28974">CVE-2020-28974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29129" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29129">CVE-2020-29129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0943-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014131.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0943-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBLIOF4HVH74MTJYI7P5QNH2RNAYWU5E/" source="SUSE-SU"/>
    <description>
    slirp.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29130">CVE-2020-29130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009672628" comment="slirp4netns-0.4.7-3.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010181.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1611-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZHKPKPZEQIHCU2R54QWFT3X2C4JOWBT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4154-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BWY3OJFF4O6KAVNTWISEXMD7X5Y2XL6I/" source="SUSE-SU"/>
    <description>
    An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29361">CVE-2020-29361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659809" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659810" comment="p11-kit-0.23.2-4.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659813" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29368" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29368">CVE-2020-29368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29369" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29369">CVE-2020-29369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179646">SUSE bug 1179646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182109">SUSE bug 1182109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29370" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29370">CVE-2020-29370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179648">SUSE bug 1179648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29371" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29371">CVE-2020-29371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29372" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29372" ref_url="https://www.suse.com/security/cve/CVE-2020-29372" source="SUSE CVE"/>
    <description>
    An issue was discovered in do_madvise in mm/madvise.c in the Linux kernel before 5.6.8. There is a race condition between coredump operations and the IORING_OP_MADVISE implementation, aka CID-bc0c4d1e176e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29372/">CVE-2020-29372 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29372">CVE-2020-29372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179433">SUSE bug 1179433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29373" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29373">CVE-2020-29373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.7.3, related to mm/gup.c and mm/huge_memory.c. The get_user_pages (aka gup) implementation, when used for a copy-on-write page, does not properly consider the semantics of read operations and therefore can grant unintended write access, aka CID-17839856fd58.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29374">CVE-2020-29374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
    <description>
    ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29443">CVE-2020-29443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29480" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every time a domain is created and destroyed. Data may include: number, type, and domids of other VMs; existence and domids of driver domains; numbers of virtual interfaces, block devices, vcpus; existence of virtual framebuffers and their backend style (e.g., existence of VNC service); Xen VM UUIDs for other domains; timing information about domain creation and device setup; and some hints at the backend provisioning of VMs and their devices. The watch events do not contain values stored in xenstore, only key names. A guest administrator can observe non-sensitive domain and device lifecycle events relating to other guests. This information allows some insight into overall system configuration (including the number and general nature of other guests), and configuration of other guests (including the number and general nature of other guests' devices). This information might be commercially interesting or might make other attacks easier. There is not believed to be exposure of sensitive data. Specifically, there is no exposure of VNC passwords, port numbers, pathnames in host and guest filesystems, cryptographic keys, or within-guest data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29480">CVE-2020-29480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29481" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Access rights of Xenstore nodes are per domid. Unfortunately, existing granted access rights are not removed when a domain is being destroyed. This means that a new domain created with the same domid will inherit the access rights to Xenstore nodes from the previous domain(s) with the same domid. Because all Xenstore entries of a guest below /local/domain/&lt;domid&gt; are being deleted by Xen tools when a guest is destroyed, only Xenstore entries of other guests still running are affected. For example, a newly created guest domain might be able to read sensitive information that had belonged to a previously existing guest domain. Both Xenstore implementations (C and Ocaml) are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29481">CVE-2020-29481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29483" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Xenstored and guests communicate via a shared memory page using a specific protocol. When a guest violates this protocol, xenstored will drop the connection to that guest. Unfortunately, this is done by just removing the guest from xenstored's internal management, resulting in the same actions as if the guest had been destroyed, including sending an @releaseDomain event. @releaseDomain events do not say that the guest has been removed. All watchers of this event must look at the states of all guests to find the guest that has been removed. When an @releaseDomain is generated due to a domain xenstored protocol violation, because the guest is still running, the watchers will not react. Later, when the guest is actually destroyed, xenstored will no longer have it stored in its internal data base, so no further @releaseDomain event will be sent. This can lead to a zombie domain; memory mappings of that guest's memory will not be removed, due to the missing event. This zombie domain will be cleaned up only after another domain is destroyed, as that will trigger another @releaseDomain event. If the device model of the guest that violated the Xenstore protocol is running in a stub-domain, a use-after-free case could happen in xenstored, after having removed the guest from its internal data base, possibly resulting in a crash of xenstored. A malicious guest can block resources of the host for a period after its own death. Guests with a stub domain device model can eventually crash xenstored, resulting in a more serious denial of service (the prevention of any further domain management operations). Only the C variant of Xenstore is affected; the Ocaml variant is not affected. Only HVM guests with a stubdom device model can cause a serious DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29483">CVE-2020-29483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29484" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When a Xenstore watch fires, the xenstore client that registered the watch will receive a Xenstore message containing the path of the modified Xenstore entry that triggered the watch, and the tag that was specified when registering the watch. Any communication with xenstored is done via Xenstore messages, consisting of a message header and the payload. The payload length is limited to 4096 bytes. Any request to xenstored resulting in a response with a payload longer than 4096 bytes will result in an error. When registering a watch, the payload length limit applies to the combined length of the watched path and the specified tag. Because watches for a specific path are also triggered for all nodes below that path, the payload of a watch event message can be longer than the payload needed to register the watch. A malicious guest that registers a watch using a very large tag (i.e., with a registration operation payload length close to the 4096 byte limit) can cause the generation of watch events with a payload length larger than 4096 bytes, by writing to Xenstore entries below the watched path. This will result in an error condition in xenstored. This error can result in a NULL pointer dereference, leading to a crash of xenstored. A malicious guest administrator can cause xenstored to crash, leading to a denial of service. Following a xenstored crash, domains may continue to run, but management operations will be impossible. Only C xenstored is affected, oxenstored is not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29484">CVE-2020-29484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29534" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29534" ref_url="https://www.suse.com/security/cve/CVE-2020-29534" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29534/">CVE-2020-29534 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29534">CVE-2020-29534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179598">SUSE bug 1179598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180564">SUSE bug 1180564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29566" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. When they require assistance from the device model, x86 HVM guests must be temporarily de-scheduled. The device model will signal Xen when it has completed its operation, via an event channel, so that the relevant vCPU is rescheduled. If the device model were to signal Xen without having actually completed the operation, the de-schedule / re-schedule cycle would repeat. If, in addition, Xen is resignalled very quickly, the re-schedule may occur before the de-schedule was fully complete, triggering a shortcut. This potentially repeating process uses ordinary recursive function calls, and thus could result in a stack overflow. A malicious or buggy stubdomain serving a HVM guest can cause Xen to crash, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are affected. Arm systems are not affected. Only x86 stubdomains serving HVM guests can exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29566">CVE-2020-29566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178658">SUSE bug 1178658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29568" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29568">CVE-2020-29568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29569" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring-&gt;xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29569">CVE-2020-29569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29570" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. Recording of the per-vCPU control block mapping maintained by Xen and that of pointers into the control block is reversed. The consumer assumes, seeing the former initialized, that the latter are also ready for use. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29570">CVE-2020-29570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29571" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008127.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2313-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORUQM2NUGI7GTGQ4QQYAXYCCBGXOCR55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLZB3TTBVYNCRCZSSEYYBTXS7RCM6NL7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen through 4.14.x. A bounds check common to most operation time functions specific to FIFO event channels depends on the CPU observing consistent state. While the producer side uses appropriately ordered writes, the consumer side isn't protected against re-ordered reads, and may hence end up de-referencing a NULL pointer. Malicious or buggy guest kernels can mount a Denial of Service (DoS) attack affecting the entire system. Only Arm systems may be vulnerable. Whether a system is vulnerable depends on the specific CPU. x86 systems are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29571">CVE-2020-29571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904501" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29651" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011928.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0851-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J5N5MI5XRBM5X46XPGTD3CVA6C5MMBQJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1859-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5MZ7NDWQ2PACIOK5L2D7CNODUCJCARI/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29651">CVE-2020-29651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494015" comment="python3-py-1.8.1-5.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:14663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29660">CVE-2020-29660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202029661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-29661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-29661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:14663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-29661">CVE-2020-29661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35499" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35499" ref_url="https://www.suse.com/security/cve/CVE-2020-35499" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference flaw in Linux kernel versions prior to 5.11 may be seen if sco_sock_getsockopt function in net/bluetooth/sco.c do not have a sanity check for a socket connection, when using BT_SNDMTU/BT_RCVMTU for SCO sockets. This could allow a local attacker with a special user privilege to crash the system (DOS) or leak kernel internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35499/">CVE-2020-35499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35499">CVE-2020-35499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180460">SUSE bug 1180460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35501" ref_url="https://www.suse.com/security/cve/CVE-2020-35501" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-35501/">CVE-2020-35501 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35501">CVE-2020-35501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182435">SUSE bug 1182435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35503" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35503">CVE-2020-35503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35504" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the SCSI emulation support of QEMU in versions before 6.0.0. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35504">CVE-2020-35504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35505" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35505">CVE-2020-35505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35506" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service or potential code execution with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35506">CVE-2020-35506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35508" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35508" ref_url="https://www.suse.com/security/cve/CVE-2020-35508" source="SUSE CVE"/>
    <description>
    A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35508/">CVE-2020-35508 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35508">CVE-2020-35508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180529">SUSE bug 1180529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011899.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SMJEHJSAVUMBFKW6O66TYUT5LCUVZD6Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YPWMH7OQGRFBQ2ZFL5Z3HCT443A45EIB/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in D-Bus Development branch &lt;= 1.13.16, dbus-1.12.x stable branch &lt;= 1.12.18, and dbus-1.10.x and older branches &lt;= 1.10.30 when a system has multiple usernames sharing the same UID. When a set of policy rules references these usernames, D-Bus may free some memory in the heap, which is still used by data structures necessary for the other usernames sharing the UID, possibly leading to a crash or other undefined behaviors
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35512">CVE-2020-35512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189662">SUSE bug 1189662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205052">SUSE bug 1205052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009615809" comment="dbus-1-1.12.2-8.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009615812" comment="libdbus-1-3-1.12.2-8.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35513" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35513" ref_url="https://www.suse.com/security/cve/CVE-2020-35513" source="SUSE CVE"/>
    <description>
    A flaw incorrect umask during file or directory modification in the Linux kernel NFS (network file system) functionality was found in the way user create and delete object using NFSv4.2 or newer if both simultaneously accessing the NFS by the other process that is not using new NFSv4.2. A user with access to the NFS could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35513/">CVE-2020-35513 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35513">CVE-2020-35513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181362">SUSE bug 1181362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35519" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory access flaw was found in x25_bind in net/x25/af_x25.c in the Linux kernel version v5.12-rc5. A bounds check failure allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35519">CVE-2020-35519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184953">SUSE bug 1184953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202035662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-35662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-35662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35662" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35662">CVE-2020-35662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/017944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36158">CVE-2020-36158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36310" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36310">CVE-2020-36310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36311" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36311">CVE-2020-36311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36312" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.10. virt/kvm/kvm_main.c has a kvm_io_bus_unregister_dev memory leak upon a kmalloc failure, aka CID-f65886606c2d.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36312">CVE-2020-36312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36313" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36313" ref_url="https://www.suse.com/security/cve/CVE-2020-36313" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.7. The KVM subsystem allows out-of-range access to memslots after a deletion, aka CID-0774a964ef56. This affects arch/s390/kvm/kvm-s390.c, include/linux/kvm_host.h, and virt/kvm/kvm_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-36313/">CVE-2020-36313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36313">CVE-2020-36313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184504">SUSE bug 1184504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the FUSE filesystem implementation in the Linux kernel before 5.10.6, aka CID-5d069dbe8aaf. fuse_do_getattr() calls make_bad_inode() in inappropriate situations, causing a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36322">CVE-2020-36322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36385">CVE-2020-36385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201734">SUSE bug 1201734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36386">CVE-2020-36386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36387" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36387" ref_url="https://www.suse.com/security/cve/CVE-2020-36387" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.8.2. fs/io_uring.c has a use-after-free related to io_async_task_func and ctx reference holding, aka CID-6d816e088c35.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36387/">CVE-2020-36387 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36387">CVE-2020-36387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187053">SUSE bug 1187053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36694" ref_url="https://www.suse.com/security/cve/CVE-2020-36694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36694/">CVE-2020-36694 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36694">CVE-2020-36694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211596">SUSE bug 1211596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36775" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36775" ref_url="https://www.suse.com/security/cve/CVE-2020-36775" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid potential deadlock

Using f2fs_trylock_op() in f2fs_write_compressed_pages() to avoid potential
deadlock like we did in f2fs_write_single_data_page().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36775/">CVE-2020-36775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36775">CVE-2020-36775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220412">SUSE bug 1220412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36776" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36776" ref_url="https://www.suse.com/security/cve/CVE-2020-36776" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/cpufreq_cooling: Fix slab OOB issue

Slab OOB issue is scanned by KASAN in cpu_power_to_freq().
If power is limited below the power of OPP0 in EM table,
it will cause slab out-of-bound issue with negative array
index.

Return the lowest frequency if limited power cannot found
a suitable OPP in EM table to fix this issue.

Backtrace:
[&lt;ffffffd02d2a37f0&gt;] die+0x104/0x5ac
[&lt;ffffffd02d2a5630&gt;] bug_handler+0x64/0xd0
[&lt;ffffffd02d288ce4&gt;] brk_handler+0x160/0x258
[&lt;ffffffd02d281e5c&gt;] do_debug_exception+0x248/0x3f0
[&lt;ffffffd02d284488&gt;] el1_dbg+0x14/0xbc
[&lt;ffffffd02d75d1d4&gt;] __kasan_report+0x1dc/0x1e0
[&lt;ffffffd02d75c2e0&gt;] kasan_report+0x10/0x20
[&lt;ffffffd02d75def8&gt;] __asan_report_load8_noabort+0x18/0x28
[&lt;ffffffd02e6fce5c&gt;] cpufreq_power2state+0x180/0x43c
[&lt;ffffffd02e6ead80&gt;] power_actor_set_power+0x114/0x1d4
[&lt;ffffffd02e6fac24&gt;] allocate_power+0xaec/0xde0
[&lt;ffffffd02e6f9f80&gt;] power_allocator_throttle+0x3ec/0x5a4
[&lt;ffffffd02e6ea888&gt;] handle_thermal_trip+0x160/0x294
[&lt;ffffffd02e6edd08&gt;] thermal_zone_device_check+0xe4/0x154
[&lt;ffffffd02d351cb4&gt;] process_one_work+0x5e4/0xe28
[&lt;ffffffd02d352f44&gt;] worker_thread+0xa4c/0xfac
[&lt;ffffffd02d360124&gt;] kthread+0x33c/0x358
[&lt;ffffffd02d289940&gt;] ret_from_fork+0xc/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-36776/">CVE-2020-36776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36776">CVE-2020-36776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220506">SUSE bug 1220506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36787" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36787" ref_url="https://www.suse.com/security/cve/CVE-2020-36787" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: aspeed: fix clock handling logic

Video engine uses eclk and vclk for its clock sources and its reset
control is coupled with eclk so the current clock enabling sequence works
like below.

 Enable eclk
 De-assert Video Engine reset
 10ms delay
 Enable vclk

It introduces improper reset on the Video Engine hardware and eventually
the hardware generates unexpected DMA memory transfers that can corrupt
memory region in random and sporadic patterns. This issue is observed
very rarely on some specific AST2500 SoCs but it causes a critical
kernel panic with making a various shape of signature so it's extremely
hard to debug. Moreover, the issue is observed even when the video
engine is not actively used because udevd turns on the video engine
hardware for a short time to make a query in every boot.

To fix this issue, this commit changes the clock handling logic to make
the reset de-assertion triggered after enabling both eclk and vclk. Also,
it adds clk_unprepare call for a case when probe fails.

clk: ast2600: fix reset settings for eclk and vclk
Video engine reset setting should be coupled with eclk to match it
with the setting for previous Aspeed SoCs which is defined in
clk-aspeed.c since all Aspeed SoCs are sharing a single video engine
driver. Also, reset bit 6 is defined as 'Video Engine' reset in
datasheet so it should be de-asserted when eclk is enabled. This
commit fixes the setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36787/">CVE-2020-36787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36787">CVE-2020-36787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220616">SUSE bug 1220616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: avoid a use-after-free when BO init fails

nouveau_bo_init() is backed by ttm_bo_init() and ferries its return code
back to the caller. On failures, ttm_bo_init() invokes the provided
destructor which should de-initialize and free the memory.

Thus, when nouveau_bo_init() returns an error the gem object has already
been released and the memory freed by nouveau_bo_del_ttm().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20203702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-3702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-3702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-3702">CVE-2020-3702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704954" comment="kernel-default-5.3.18-24.86.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704955" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704956" comment="kmod-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704957" comment="kmod-compat-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704958" comment="libkmod2-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704959" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20204788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-4788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-4788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ICEKZTGIQ6MSKDFOTIOJ2RLWAWJFPSYA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4YRSQJNKLIOJJTD3P2UKMHRFMCIG3JDN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYES3O2NEKKQXQ3R5CZOH5YCWJ3TJSKH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-4788">CVE-2020-4788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6750" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750" source="SUSE CVE"/>
    <description>
    GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so, because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity, even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6750">CVE-2020-6750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160668">SUSE bug 1160668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904434" comment="glib2-tools-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904435" comment="libgio-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904436" comment="libglib-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904437" comment="libgmodule-2_0-0-2.62.6-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904438" comment="libgobject-2_0-0-2.62.6-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20206829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-6829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-6829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-6829" ref_url="https://www.suse.com/security/cve/CVE-2020-6829" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox &lt; 80 and Firefox for Android &lt; 80.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-6829/">CVE-2020-6829 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-6829">CVE-2020-6829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174763">SUSE bug 1174763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009632956" comment="libfreebl3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632960" comment="libsoftokn3-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632964" comment="mozilla-nspr-4.32-3.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632967" comment="mozilla-nss-3.68-3.56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632969" comment="mozilla-nss-certs-3.68-3.56.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
    <description>
    tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7039">CVE-2020-7039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161066">SUSE bug 1161066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7216" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0165-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55RNXZKH4PSOKZNDW22GXYEX3B5SP3I2/" source="SUSE-SU"/>
    <description>
    An ni_dhcp4_parse_response memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets without a message type option.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7216">CVE-2020-7216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160905">SUSE bug 1160905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904499" comment="wicked-0.6.64-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904500" comment="wicked-service-0.6.64-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7217" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006499.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0207-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APEQDGP47KSKMMNLKISL5AFVZAWLHZQJ/" source="SUSE-SU"/>
    <description>
    An ni_dhcp4_fsm_process_dhcp4_packet memory leak in openSUSE wicked 0.6.55 and earlier allows network attackers to cause a denial of service by sending DHCP4 packets with a different client-id.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7217">CVE-2020-7217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1160906">SUSE bug 1160906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009904499" comment="wicked-0.6.64-3.3.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904500" comment="wicked-service-0.6.64-3.3.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0681-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75OUBX7RPPAARGW2FKOWVC52NVIH42S5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7595">CVE-2020-7595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1161517">SUSE bug 1161517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009882399" comment="libxml2-2-2.9.7-3.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009882402" comment="libxml2-tools-2.9.7-3.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7919" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7919" ref_url="https://www.suse.com/security/cve/CVE-2020-7919" source="SUSE CVE"/>
    <description>
    Go before 1.12.16 and 1.13.x before 1.13.7 (and the crypto/cryptobyte package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients (resulting in a panic) via a malformed X.509 certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-7919/">CVE-2020-7919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7919">CVE-2020-7919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164288">SUSE bug 1164288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334435" comment="docker is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8013" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:81-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:82-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:0603-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2020:14304-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-February/013970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HFSFYZA4G7R3442IVOYMGCDA7OPFIWTA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CDE67H3SKCA2N6SED6KU5T3MBX3UVI6N/" source="SUSE-SU"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in chkstat of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 15, SUSE Linux Enterprise Server 11 set permissions intended for specific binaries on other binaries because it erroneously followed symlinks. The symlinks can't be controlled by attackers on default systems, so exploitation is difficult. This issue affects: SUSE Linux Enterprise Server 12 permissions versions prior to 2015.09.28.1626-17.27.1. SUSE Linux Enterprise Server 15 permissions versions prior to 20181116-9.23.1. SUSE Linux Enterprise Server 11 permissions versions prior to 2013.1.7-0.6.12.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8013">CVE-2020-8013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163922">SUSE bug 1163922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494044" comment="permissions-20181224-23.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007077.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0956-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QHI6AX57YTPGVG6IBYNX62SQEVYD4FL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0976-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SY5CPNSTO2WSZ7XMVAJWQ743XLEQBEJE/" source="SUSE-SU"/>
    <description>
    A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of Sale 11-SP3, SUSE Linux Enterprise Server 11-SECURITY, SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 12-SP2, SUSE Linux Enterprise Server for SAP 12-SP3, SUSE Linux Enterprise Server for SAP 15, SUSE OpenStack Cloud 7, SUSE OpenStack Cloud 8, SUSE OpenStack Cloud Crowbar 8; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to escalate privileges from user ldap to root. This issue affects: SUSE Enterprise Storage 5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Debuginfo 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Debuginfo 11-SP4 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Point of Sale 11-SP3 openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 11-SECURITY openldap2-client-openssl1 versions prior to 2.4.26-0.74.13.1. SUSE Linux Enterprise Server 11-SP4-LTSS openldap2 versions prior to 2.4.26-0.74.13.1,. SUSE Linux Enterprise Server 12-SP2-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP2-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-BCL openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP3-LTSS openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP4 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 12-SP5 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.31.1. SUSE Linux Enterprise Server for SAP 12-SP2 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 12-SP3 openldap2 versions prior to 2.4.41-18.71.2. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.31.1. SUSE OpenStack Cloud 7 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud 8 openldap2 versions prior to 2.4.41-18.71.2. SUSE OpenStack Cloud Crowbar 8 openldap2 versions prior to 2.4.41-18.71.2. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.12.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8023">CVE-2020-8023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190347">SUSE bug 1190347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8025" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8025" ref_url="https://www.suse.com/security/cve/CVE-2020-8025" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:45-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:50-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:51-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011172.html" source="SUSE-SU"/>
    <description>
    A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the pcp package to unintended settings. This issue affects: SUSE Linux Enterprise Server 12-SP4 permissions versions prior to 20170707-3.24.1. SUSE Linux Enterprise Server 15-LTSS permissions versions prior to 20180125-3.27.1. SUSE Linux Enterprise Server for SAP 15 permissions versions prior to 20180125-3.27.1. openSUSE Leap 15.1 permissions versions prior to 20181116-lp151.4.24.1. openSUSE Tumbleweed permissions versions prior to 20200624.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8025/">CVE-2020-8025 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8025">CVE-2020-8025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171883">SUSE bug 1171883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494044" comment="permissions-20181224-23.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8027" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2712-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007612.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KQONWRP2PEBS6K5PPIEKL6SF4DZEIKQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PJEF2RARIR2A2UBOZISRED2S4SPC4S2E/" source="SUSE-SU"/>
    <description>
    A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to overwrite arbitrary files and gain access to the openldap2 configuration This issue affects: SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.37.1. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.37.1. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.18.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8027">CVE-2020-8027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175568">SUSE bug 1175568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904465" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8130" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8130" ref_url="https://www.suse.com/security/cve/CVE-2020-8130" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012195.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0395-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZJAMCVFC2KL342QI4W5HGYIZXTNBURQT/" source="SUSE-SU"/>
    <description>
    There is an OS command injection vulnerability in Ruby Rake &lt; 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8130/">CVE-2020-8130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8130">CVE-2020-8130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164804">SUSE bug 1164804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493132" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493133" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493136" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOMRJVNHOQXH3HGQNKNOII35LAMOSNKQ/" source="SUSE-SU"/>
    <description>
    curl 7.62.0 through 7.70.0 is vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8169">CVE-2020-8169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173026">SUSE bug 1173026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0883-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOMRJVNHOQXH3HGQNKNOII35LAMOSNKQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GFJDBNWLSCZKQ5JEJ2A4C3FF2CBGRWWA/" source="SUSE-SU"/>
    <description>
    curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8177">CVE-2020-8177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GYMJ253P5P56DA4D52GJARISIK23N3Z/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1359-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OYNSNHOY2FLBCRE3LL6P6WDS2PP7SJDE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6RLFHLNRH5DNEKWRVFQA5NSKVRZEQHR/" source="SUSE-SU"/>
    <description>
    Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8231">CVE-2020-8231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8284">CVE-2020-8284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8285">CVE-2020-8285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:10-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:11-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:12-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2238-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PRXMLUV5IZ4L22JUMUBU3FUW7BWHV7J7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7TJUGEIZONXKJD6DWVYASM2KTYWZ6RI/" source="SUSE-SU"/>
    <description>
    curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8286">CVE-2020-8286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179593">SUSE bug 1179593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186108">SUSE bug 1186108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8315" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8315" ref_url="https://www.suse.com/security/cve/CVE-2020-8315" source="SUSE CVE"/>
    <description>
    In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker's copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system's copy. Windows 8 and later are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-8315/">CVE-2020-8315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8315">CVE-2020-8315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173935">SUSE bug 1173935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334187" comment="python3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8428" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    fs/namei.c in the Linux kernel before 5.5 has a may_create_in_sticky use-after-free, which allows local users to cause a denial of service (OOPS) or possibly obtain sensitive information from kernel memory, aka CID-d0cb50185ae9. One attack vector may be an open system call for a UNIX domain socket, if the socket is being moved to a new parent directory and its old parent directory is being removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8428">CVE-2020-8428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162109">SUSE bug 1162109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2020:110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:13-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:17-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KM6NAXPFOSRYBXLYJ4E6REOSYLCOBSFU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2332-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S3JTHM6LLDKL7VPNRJUSRPNZAD2FZ25H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLGERALYYFTBIX3ZKPM6EQ2WJVUXLOXY/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8492">CVE-2020-8492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162367">SUSE bug 1162367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8608" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0468-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S5VG234WOT345KSVGE32CW6SK7I55AZP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8608">CVE-2020-8608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1163018">SUSE bug 1163018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8647">CVE-2020-8647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164078">SUSE bug 1164078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8648">CVE-2020-8648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162928">SUSE bug 1162928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8649">CVE-2020-8649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1162929">SUSE bug 1162929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162931">SUSE bug 1162931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7MTGDUP74HR4XORTRYN7I7MANTKWCGQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4EZ6GLHJ7GRNO5SFTV2VI7JJOEEIMD6U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0242-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" source="SUSE-SU"/>
    <description>
    Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179661">SUSE bug 1179661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<reference ref_id="TID000019778" ref_url="https://www.suse.com/support/kb/doc/?id=000019778" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8696">CVE-2020-8696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2020:14540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007857.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1915-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDFLVEOG7TX6Q4WKP6Q53CLGQ3KKC2GT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4M7N2LSLXLVXOCOXVRUDWN2YU7CBOGZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAVL7PXBHMY5MEXAKSQM6PTNW6CHJJC2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2098-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TF4HQIBGSJ2IFTYIDCJW5IFFEG62DCU5/" source="SUSE-SU"/>
    <description>
    Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8698">CVE-2020-8698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009887126" comment="ucode-intel-20210216-2.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8832" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8832" ref_url="https://www.suse.com/security/cve/CVE-2020-8832" source="SUSE CVE"/>
    <description>
    The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacker could use this vulnerability to expose sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8832/">CVE-2020-8832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8832">CVE-2020-8832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165881">SUSE bug 1165881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8835" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8835">CVE-2020-8835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1167722">SUSE bug 1167722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173755">SUSE bug 1173755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20208992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-8992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-8992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8992" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0336-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSSHQFX4IJH5UZIPQACYQ6RIWLLJPS6R/" source="SUSE-SU"/>
    <description>
    ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8992">CVE-2020-8992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164069">SUSE bug 1164069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9327" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009509.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1058-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SB6Z44NRR3L5O3VXGRWAB7XUKDS4TMFZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JD4EZ74IZ57MKTDKDVIUAIG6VCAEKMD5/" source="SUSE-SU"/>
    <description>
    In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9327">CVE-2020-9327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624167" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2020:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:0836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-May/006817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:14354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:0388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IRYS6743ISN3DBCZORC2AEZU7D7GZNC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9383">CVE-2020-9383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165111">SUSE bug 1165111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904452" comment="kernel-rt-5.3.18-8.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20209391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-9391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-9391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9391" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-9391" ref_url="https://www.suse.com/security/cve/CVE-2020-9391" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9391/">CVE-2020-9391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-9391">CVE-2020-9391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1165015">SUSE bug 1165015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0066" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0066">CVE-2021-0066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0072" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0072">CVE-2021-0072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0076" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0076">CVE-2021-0076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0089">CVE-2021-0089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0127" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0127">CVE-2021-0127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GJZ4RMNGAPDHTNV6KJGNPSEJH2RUZFKU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4PWFRJWECGAGZTBIOYHZ6KUMSA6KC43/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FGEHNTYN7DOZBN7IPNNCVSIU2JNPC226/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0129">CVE-2021-0129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0145">CVE-2021-0145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0146" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0146">CVE-2021-0146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193500">SUSE bug 1193500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200661">SUSE bug 1200661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200663">SUSE bug 1200663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205062">SUSE bug 1205062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0157" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0157" ref_url="https://www.suse.com/security/cve/CVE-2021-0157" source="SUSE CVE"/>
    <description>
    Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0157/">CVE-2021-0157 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0157">CVE-2021-0157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192791">SUSE bug 1192791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338728" comment="ucode-intel is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0158" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0158" ref_url="https://www.suse.com/security/cve/CVE-2021-0158" source="SUSE CVE"/>
    <description>
    Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0158/">CVE-2021-0158 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0158">CVE-2021-0158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192793">SUSE bug 1192793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338728" comment="ucode-intel is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0161" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0161">CVE-2021-0161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0164" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper access control in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0164">CVE-2021-0164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0165" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0165">CVE-2021-0165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0166" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0166">CVE-2021-0166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0168" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0168">CVE-2021-0168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0170" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0170">CVE-2021-0170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0172" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0172">CVE-2021-0172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0173" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper Validation of Consistency within input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0173">CVE-2021-0173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0174" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper Use of Validation Framework in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0174">CVE-2021-0174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0175" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0175">CVE-2021-0175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0176" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0176">CVE-2021-0176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0183" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper Validation of Specified Index, Position, or Offset in Input in software for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0183">CVE-2021-0183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0326</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0326" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008327.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0284-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI2F4UP2SUM3KDNM2O5RK57I3NEYBJ26/" source="SUSE-SU"/>
    <description>
    In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0326">CVE-2021-0326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0342" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. User interaction is not required for exploitation. Product: Android; Versions: Android kernel; Android ID: A-146554327.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0342">CVE-2021-0342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009202.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0512">CVE-2021-0512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In pfkey_dump of af_key.c, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-110373476
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0605">CVE-2021-0605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188381">SUSE bug 1188381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0606" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0606" ref_url="https://www.suse.com/security/cve/CVE-2021-0606" source="SUSE CVE"/>
    <description>
    In drm_syncobj_handle_to_fd of drm_syncobj.c, there is a possible use after free due to incorrect refcounting. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-168034487
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0606/">CVE-2021-0606 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0606">CVE-2021-0606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187602">SUSE bug 1187602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0707" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0707" ref_url="https://www.suse.com/security/cve/CVE-2021-0707" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
    <description>
    In dma_buf_release of dma-buf.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-155756045References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0707/">CVE-2021-0707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0707">CVE-2021-0707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198437">SUSE bug 1198437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199332">SUSE bug 1199332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0920">CVE-2021-0920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0924" ref_url="https://www.suse.com/security/cve/CVE-2021-0924" source="SUSE CVE"/>
    <description>
    In xhci_vendor_get_ops of xhci.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194461020References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0924/">CVE-2021-0924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0924">CVE-2021-0924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193792">SUSE bug 1193792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0929" ref_url="https://www.suse.com/security/cve/CVE-2021-0929" source="SUSE CVE"/>
    <description>
    In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0929/">CVE-2021-0929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0929">CVE-2021-0929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193794">SUSE bug 1193794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0938" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0938" ref_url="https://www.suse.com/security/cve/CVE-2021-0938" source="SUSE CVE"/>
    <description>
    In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0938/">CVE-2021-0938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0938">CVE-2021-0938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192039">SUSE bug 1192039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0939" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0939" ref_url="https://www.suse.com/security/cve/CVE-2021-0939" source="SUSE CVE"/>
    <description>
    In set_default_passthru_cfg of passthru.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-186026549References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0939/">CVE-2021-0939 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0939">CVE-2021-0939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192043">SUSE bug 1192043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0941" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009913.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0941">CVE-2021-0941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705000" comment="kernel-default-5.3.18-24.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705001" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0961" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0961" ref_url="https://www.suse.com/security/cve/CVE-2021-0961" source="SUSE CVE"/>
    <description>
    In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-0961/">CVE-2021-0961 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0961">CVE-2021-0961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193790">SUSE bug 1193790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1043" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1043" ref_url="https://www.suse.com/security/cve/CVE-2021-1043" source="SUSE CVE"/>
    <description>
    In TBD of TBD, there is a possible downgrade attack due to under utilized anti-rollback protections. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194697257References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-1043/">CVE-2021-1043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-1043">CVE-2021-1043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199357">SUSE bug 1199357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of string matching within a packet. A privileged user (with root or CAP_NET_ADMIN) when inserting iptables rules could insert a rule which can panic the system. Kernel before kernel 5.5-rc1 is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20177">CVE-2021-20177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20181">CVE-2021-20181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0494-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRDSUUE3LUKBDRLPB7GTT5QZRPV5J7O4/" source="SUSE-SU"/>
    <description>
    A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-10-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20193">CVE-2021-20193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705032" comment="tar-1.34-150000.3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20194" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20194" ref_url="https://www.suse.com/security/cve/CVE-2021-20194" source="SUSE CVE"/>
    <description>
    There is a vulnerability in the linux kernel versions higher than 5.2 (if kernel compiled with config params CONFIG_BPF_SYSCALL=y , CONFIG_BPF=y , CONFIG_CGROUPS=y , CONFIG_CGROUP_BPF=y , CONFIG_HARDENED_USERCOPY not set, and BPF hook to getsockopt is registered). As result of BPF execution, the local user can trigger bug in __cgroup_bpf_run_filter_getsockopt() function that can lead to heap overflow (because of non-hardened usercopy). The impact of attack could be deny of service or possibly privileges escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20194/">CVE-2021-20194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20194">CVE-2021-20194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182010">SUSE bug 1182010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182330">SUSE bug 1182330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20196" ref_url="https://www.suse.com/security/cve/CVE-2021-20196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XYIZAS6LJG7AX5XUIXPP347424BX5VK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ORE7QLMZXD7OV3HIKQUG3SXU2RG6ONFC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0210-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IUV2UU2CMT6KXSJ7THBLFDIVHI27MZFH/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the floppy disk emulator of QEMU. This issue occurs while processing read/write ioport commands if the selected floppy drive is not initialized with a block device. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20196/">CVE-2021-20196 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20196">CVE-2021-20196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181361">SUSE bug 1181361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705033" comment="qemu-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705034" comment="qemu-arm-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667529" comment="qemu-ipxe-1.0.0+-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667533" comment="qemu-seabios-1.12.1+-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667534" comment="qemu-sgabios-8-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705035" comment="qemu-tools-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667539" comment="qemu-vgabios-1.12.1+-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667540" comment="qemu-x86-4.2.1-11.34.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2881-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012041.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AINSWYQLD5FH4GUOEP5FWWA5CMFHTUDX/" source="SUSE-SU"/>
    <description>
    A flaw was found in spice in versions before 0.14.92. A DoS tool might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20201">CVE-2021-20201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704902" comment="libspice-server1-0.14.2-3.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20203">CVE-2021-20203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SDUPZEIOIEXWFR2ZTWFFOIO2ZA3AI3VM/" source="SUSE-SU"/>
    <description>
    An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20221">CVE-2021-20221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904487" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904488" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904489" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904490" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904491" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904492" comment="qemu-sgabios-8-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904493" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009904494" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20226" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20226" ref_url="https://www.suse.com/security/cve/CVE-2021-20226" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the io_uring in Linux kernel, where a local attacker with a user privilege could cause a denial of service problem on the system The issue results from the lack of validating the existence of an object prior to performing operations on the object by not incrementing the file reference counter while in use. The highest threat from this vulnerability is to data integrity, confidentiality and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20226/">CVE-2021-20226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20226">CVE-2021-20226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180564">SUSE bug 1180564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181846">SUSE bug 1181846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0470-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUDG7BXPVVVALM2YUCJ2EKIRBHFXMY75/" source="SUSE-SU"/>
    <description>
    A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20231">CVE-2021-20231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183457">SUSE bug 1183457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705015" comment="libgnutls30-3.6.7-14.10.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0470-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LUDG7BXPVVVALM2YUCJ2EKIRBHFXMY75/" source="SUSE-SU"/>
    <description>
    A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20232">CVE-2021-20232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183456">SUSE bug 1183456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705015" comment="libgnutls30-3.6.7-14.10.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20239" ref_url="https://www.suse.com/security/cve/CVE-2021-20239" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.4.92 in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20239/">CVE-2021-20239 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20239">CVE-2021-20239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182010">SUSE bug 1182010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182330">SUSE bug 1182330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20255" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A stack overflow via an infinite recursion vulnerability was found in the eepro100 i8255x device emulator of QEMU. This issue occurs while processing controller commands due to a DMA reentry issue. This flaw allows a guest user or process to consume CPU cycles or crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20255">CVE-2021-20255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182654">SUSE bug 1182654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20257" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
    <description>
    An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20257">CVE-2021-20257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20263" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20263" ref_url="https://www.suse.com/security/cve/CVE-2021-20263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new 'xattrmap' option may cause the 'security.capability' xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20263/">CVE-2021-20263 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20263">CVE-2021-20263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183373">SUSE bug 1183373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20265" ref_url="https://www.suse.com/security/cve/CVE-2021-20265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20265/">CVE-2021-20265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20265">CVE-2021-20265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183089">SUSE bug 1183089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704952" comment="python3-rpm-4.14.1-22.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704953" comment="rpm-4.14.1-22.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20268" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20268" ref_url="https://www.suse.com/security/cve/CVE-2021-20268" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20268/">CVE-2021-20268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20268">CVE-2021-20268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183077">SUSE bug 1183077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183095">SUSE bug 1183095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20269" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20269" ref_url="https://www.suse.com/security/cve/CVE-2021-20269" source="SUSE CVE"/>
    <description>
    A flaw was found in the permissions of a log file created by kexec-tools. This flaw allows a local unprivileged user to read this file and leak kernel internal information from a previous panic. The highest threat from this vulnerability is to confidentiality. This flaw affects kexec-tools shipped by Fedora versions prior to 2.0.21-8 and RHEL versions prior to 2.0.20-47.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20269/">CVE-2021-20269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20269">CVE-2021-20269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189468">SUSE bug 1189468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/" source="SUSE-SU"/>
    <description>
    A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704952" comment="python3-rpm-4.14.1-22.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704953" comment="rpm-4.14.1-22.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0635-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEQQBLTWQPDTYRTWQZSXENUU6TSCBJ5R/" source="SUSE-SU"/>
    <description>
    A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA &amp; ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20305">CVE-2021-20305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183835">SUSE bug 1183835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009503185" comment="libhogweed4-3.4.1-4.15.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503187" comment="libnettle6-3.4.1-4.15.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009913.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20322">CVE-2021-20322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193290">SUSE bug 1193290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705000" comment="kernel-default-5.3.18-24.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705001" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKTLORCQ4MPZPDFGWKJEEPQRXFUTZYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
    <description>
    In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/&lt;remapping&gt;" that cause writing files with extended privileges. Versions 20.10.3 and 19.03.15 contain patches that prevent privilege escalation from remapped user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21284">CVE-2021-21284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181732">SUSE bug 1181732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009504109" comment="containerd-1.4.4-5.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504110" comment="docker-20.10.6_ce-6.49.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504111" comment="runc-1.0.0~rc93-1.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21285" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UGKTLORCQ4MPZPDFGWKJEEPQRXFUTZYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
    <description>
    In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21285">CVE-2021-21285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181730">SUSE bug 1181730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009504109" comment="containerd-1.4.4-5.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504110" comment="docker-20.10.6_ce-6.49.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504111" comment="runc-1.0.0~rc93-1.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21334" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="TID000020328" ref_url="https://www.suse.com/support/kb/doc/?id=000020328" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
    <description>
    In containerd (an industry-standard container runtime) before versions 1.3.10 and 1.4.4, containers launched through containerd's CRI implementation (through Kubernetes, crictl, or any other pod/container client that uses the containerd CRI service) that share the same image may receive incorrect environment variables, including values that are defined for other containers. If the affected containers have different security contexts, this may allow sensitive information to be unintentionally shared. If you are not using containerd's CRI implementation (through one of the mechanisms described above), you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image which have different environment variables, you are not vulnerable to this issue. If you are not launching multiple containers or Kubernetes pods from the same image in rapid succession, you have reduced likelihood of being vulnerable to this issue This vulnerability has been fixed in containerd 1.3.10 and containerd 1.4.4. Users should update to these versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21334">CVE-2021-21334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183397">SUSE bug 1183397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009504109" comment="containerd-1.4.4-5.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504110" comment="docker-20.10.6_ce-6.49.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504111" comment="runc-1.0.0~rc93-1.14.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21781" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists in the ARM SIGPAGE functionality of Linux Kernel v5.4.66 and v5.4.54. The latest version (5.11-rc4) seems to still be vulnerable. A userland application can read the contents of the sigpage, which can leak kernel memory contents. An attacker can read a process's memory at a specific offset to trigger this vulnerability. This was fixed in kernel releases: 4.14.222 4.19.177 5.4.99 5.10.17 5.11
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21781">CVE-2021-21781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704932" comment="kernel-default-5.3.18-24.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704933" comment="kernel-default-base-5.3.18-24.78.1.9.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628046" comment="kernel-rt-5.3.18-48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21996" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009828.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YD2NL2DWHZHSXKKSMUAKRRR4DVAXJ6QS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3557-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R7B4SF25YMDBZ6THNOFMFVVX33VAXGND/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21996">CVE-2021-21996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210934">SUSE bug 1210934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704973" comment="python3-salt-3002.2-49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704974" comment="salt-3002.2-49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704975" comment="salt-minion-3002.2-49.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704976" comment="salt-transactional-update-3002.2-49.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22004" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22004" ref_url="https://www.suse.com/security/cve/CVE-2021-22004" source="SUSE CVE"/>
    <description>
    An issue was discovered in SaltStack Salt before 3003.3. The salt minion installer will accept and use a minion config file at C:\salt\conf if that file is in place before the installer is run. This allows for a malicious actor to subvert the proper behaviour of the given minion software.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22004/">CVE-2021-22004 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22004">CVE-2021-22004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196745">SUSE bug 1196745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009347405" comment="python3-salt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009347406" comment="salt is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009347413" comment="salt-minion is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009656852" comment="salt-transactional-update is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Linux: KVM through Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allows users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22543">CVE-2021-22543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704932" comment="kernel-default-5.3.18-24.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704933" comment="kernel-default-base-5.3.18-24.78.1.9.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628046" comment="kernel-rt-5.3.18-48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22555">CVE-2021-22555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188411">SUSE bug 1188411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704910" comment="kernel-default-5.3.18-24.75.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704911" comment="kernel-default-base-5.3.18-24.75.3.9.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626892" comment="kernel-rt-5.3.18-45.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1040-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1040-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0823-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYCKEL27LS2QTHCEAYFVLKKSZP4MBBJQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIWUQWCBEUJG4GQZ33E3U56DPOPU6GGL/" source="SUSE-SU"/>
    <description>
    Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22570">CVE-2021-22570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195258">SUSE bug 1195258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705023" comment="libprotobuf-lite20-3.9.2-4.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010329.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22600">CVE-2021-22600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HDAO4Q3JZASM6AK274RF74JN2GJOK5UE/" source="SUSE-SU"/>
    <description>
    curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22876">CVE-2021-22876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704853" comment="curl-7.66.0-4.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704854" comment="libcurl4-7.66.0-4.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008577.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0510-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HDAO4Q3JZASM6AK274RF74JN2GJOK5UE/" source="SUSE-SU"/>
    <description>
    curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22890">CVE-2021-22890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183934">SUSE bug 1183934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704853" comment="curl-7.66.0-4.14.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704854" comment="libcurl4-7.66.0-4.14.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008887.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0808-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ES6AKURDGLC4PDCDFLHOPWYDQA55NHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1762-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBJDOC5P7XCTDSENHRNLNXYRSHFI4CYU/" source="SUSE-SU"/>
    <description>
    curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22898">CVE-2021-22898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192450">SUSE bug 1192450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704879" comment="curl-7.66.0-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704880" comment="libcurl4-7.66.0-4.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22922">CVE-2021-22922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704912" comment="curl-7.66.0-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704913" comment="libcurl4-7.66.0-4.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22923">CVE-2021-22923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704912" comment="curl-7.66.0-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704913" comment="libcurl4-7.66.0-4.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22924">CVE-2021-22924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200196">SUSE bug 1200196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704912" comment="curl-7.66.0-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704913" comment="libcurl4-7.66.0-4.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009210.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1088-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZZR7BLPD5OE5IYY5QBKBYQGD4PESB24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2439-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZEKWBHHW6CCB43EQZT3OXNG7LXABDJB/" source="SUSE-SU"/>
    <description>
    curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables, libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22925">CVE-2021-22925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200196">SUSE bug 1200196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704912" comment="curl-7.66.0-4.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704913" comment="libcurl4-7.66.0-4.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22926" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22926" ref_url="https://www.suse.com/security/cve/CVE-2021-22926" source="SUSE CVE"/>
    <description>
    libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22926/">CVE-2021-22926 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22926">CVE-2021-22926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188510">SUSE bug 1188510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192447">SUSE bug 1192447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192757">SUSE bug 1192757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009570.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRVRDNRDONYRGYKCIS6D72VODPDQT3AB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJISG4GC22MLBYTQB5THWN4V2IFZC7P/" source="SUSE-SU"/>
    <description>
    A user can tell curl &gt;= 7.20.0 and &lt;= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22946">CVE-2021-22946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704950" comment="curl-7.66.0-4.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704951" comment="libcurl4-7.66.0-4.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009570.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1384-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRVRDNRDONYRGYKCIS6D72VODPDQT3AB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJISG4GC22MLBYTQB5THWN4V2IFZC7P/" source="SUSE-SU"/>
    <description>
    When curl &gt;= 7.20.0 and &lt;= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker's injected data comes from the TLS-protected server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22947">CVE-2021-22947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704950" comment="curl-7.66.0-4.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704951" comment="libcurl4-7.66.0-4.27.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    Use After Free vulnerability in nfc sockets in the Linux Kernel before 5.12.4 allows local attackers to elevate their privileges. In typical configurations, the issue can only be triggered by a privileged local user with the CAP_NET_RAW capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23134">CVE-2021-23134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220739">SUSE bug 1220739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23239">CVE-2021-23239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
    <description>
    selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23240">CVE-2021-23240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171722">SUSE bug 1171722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009227.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LBJTTJNYOY4PWTVR3WGVSEX33BCEYHGD/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23336">CVE-2021-23336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182179">SUSE bug 1182179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182433">SUSE bug 1182433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705016" comment="libpython3_6m1_0-3.6.13-3.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705017" comment="python3-3.6.13-3.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705018" comment="python3-base-3.6.13-3.78.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AVDCMNKQUTQBM7Z7BU2BQ23WG4Y66BOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKKO266WHY2YSFJAVHWNM4DQSX4W7YZG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23840">CVE-2021-23840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187743">SUSE bug 1187743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214334">SUSE bug 1214334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705007" comment="libopenssl1_1-1.1.1d-11.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705008" comment="openssl-1_1-1.1.1d-11.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:62-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008528.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5XENZGXQLBAUUDBFPY2BZB3VBUOBHXA3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WKXW7QBBUUWYW6GTJATRSAAWOQW7PBVU/" source="SUSE-SU"/>
    <description>
    The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a unique hash value based on the issuer and serial number data contained within an X509 certificate. However it fails to correctly handle any errors that may occur while parsing the issuer field (which might occur if the issuer field is maliciously constructed). This may subsequently result in a NULL pointer deref and a crash leading to a potential denial of service attack. The function X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so applications are only vulnerable if they use this function directly and they use it on certificates that may have been obtained from untrusted sources. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23841">CVE-2021-23841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187743">SUSE bug 1187743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214334">SUSE bug 1214334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705007" comment="libopenssl1_1-1.1.1d-11.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705008" comment="openssl-1_1-1.1.1d-11.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23981">CVE-2021-23981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503123" comment="mozilla-nspr-4.25.1-3.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23982">CVE-2021-23982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503123" comment="mozilla-nspr-4.25.1-3.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23984">CVE-2021-23984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503123" comment="mozilla-nspr-4.25.1-3.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSNSOUV5NJGXTPEDI5OM2FZY66FY5LH2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0580-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/46S264KIM7ZLJMHW66XPM4XKEAJEZUEJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 78.9, Firefox &lt; 87, and Thunderbird &lt; 78.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23987">CVE-2021-23987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503123" comment="mozilla-nspr-4.25.1-3.17.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24031" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24031" ref_url="https://www.suse.com/security/cve/CVE-2021-24031" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HYCURYHE4SZBA5XWHE6FDNCJ3JJDZS5S/" source="SUSE-SU"/>
    <description>
    In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24031/">CVE-2021-24031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24031">CVE-2021-24031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183371">SUSE bug 1183371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705019" comment="libzstd1-1.4.4-1.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202124032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-24032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-24032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24032" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-24032" ref_url="https://www.suse.com/security/cve/CVE-2021-24032" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HYCURYHE4SZBA5XWHE6FDNCJ3JJDZS5S/" source="SUSE-SU"/>
    <description>
    Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24032/">CVE-2021-24032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-24032">CVE-2021-24032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183370">SUSE bug 1183370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183371">SUSE bug 1183371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705019" comment="libzstd1-1.4.4-1.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25281" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25281">CVE-2021-25281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25282" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25282">CVE-2021-25282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25283" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25283">CVE-2021-25283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25284">CVE-2021-25284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25315" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009056.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25315">CVE-2021-25315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26318" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26318" ref_url="https://www.suse.com/security/cve/CVE-2021-26318" source="SUSE CVE"/>
    <description>
    A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26318/">CVE-2021-26318 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26318">CVE-2021-26318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191653">SUSE bug 1191653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26401">CVE-2021-26401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209630">SUSE bug 1209630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26708" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26708" ref_url="https://www.suse.com/security/cve/CVE-2021-26708" source="SUSE CVE"/>
    <description>
    A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26708/">CVE-2021-26708 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26708">CVE-2021-26708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181806">SUSE bug 1181806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183298">SUSE bug 1183298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.11 through 5.10.16, as used by Xen. To service requests to the PV backend, the driver maps grant references provided by the frontend. In this process, errors may be encountered. In one case, an error encountered earlier might be discarded by later processing, resulting in the caller assuming successful mapping, and hence subsequent operations trying to access space that wasn't mapped. In another case, internal state would be insufficiently updated, preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26930">CVE-2021-26930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26931">CVE-2021-26931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26932" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R5J7TLH5AZYERG7B3PW3ALPYSBMFCGV5/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel 3.2 through 5.10.16, as used by Xen. Grant mapping operations often occur in batch hypercalls, where a number of operations are done in a single hypercall, the success or failure of each one is reported to the backend driver, and the backend driver then loops over the results, performing follow-up actions based on the success or failure of each operation. Unfortunately, when running in PV mode, the Linux backend drivers mishandle this: Some errors are ignored, effectively implying their success from the success of related batch elements. In other cases, errors resulting from one batch element lead to further batch elements not being inspected, and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26932">CVE-2021-26932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705005" comment="kernel-default-5.3.18-24.52.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705006" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26934" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26934" ref_url="https://www.suse.com/security/cve/CVE-2021-26934" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 4.18 through 5.10.16, as used by Xen. The backend allocation (aka be-alloc) mode of the drm_xen_front drivers was not meant to be a supported configuration, but this wasn't stated accordingly in its support status entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26934/">CVE-2021-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26934">CVE-2021-26934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181755">SUSE bug 1181755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185892">SUSE bug 1185892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27218">CVE-2021-27218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705009" comment="glib2-tools-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705010" comment="libgio-2_0-0-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705011" comment="libglib-2_0-0-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705012" comment="libgmodule-2_0-0-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705013" comment="libgobject-2_0-0-2.62.6-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008532.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEADQWIHFVNLBWNNAJUQIPQTZZU5U5A4/" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27219">CVE-2021-27219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194015">SUSE bug 1194015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705009" comment="glib2-tools-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705010" comment="libgio-2_0-0-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705011" comment="libglib-2_0-0-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705012" comment="libgmodule-2_0-0-2.62.6-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705013" comment="libgobject-2_0-0-2.62.6-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system, at /sys/class/iscsi_transport/$TRANSPORT_NAME/handle. When read, the show_transport_handle function (in drivers/scsi/scsi_transport_iscsi.c) is called, which leaks the handle. This handle is actually the pointer to an iscsi_transport struct in the kernel module's global variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27363">CVE-2021-27363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27364">CVE-2021-27364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27365</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27365">CVE-2021-27365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27853" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27853" ref_url="https://www.suse.com/security/cve/CVE-2021-27853" source="SUSE CVE"/>
    <description>
    Layer 2 network filtering capabilities such as IPv6 RA guard or ARP inspection can be bypassed using combinations of VLAN 0 headers and LLC/SNAP headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-27853/">CVE-2021-27853 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27853">CVE-2021-27853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203840">SUSE bug 1203840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27854" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27854" ref_url="https://www.suse.com/security/cve/CVE-2021-27854" source="SUSE CVE"/>
    <description>
    Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using combinations of VLAN 0 headers, LLC/SNAP headers, and converting frames from Ethernet to Wifi and its reverse.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-27854/">CVE-2021-27854 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27854">CVE-2021-27854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203839">SUSE bug 1203839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27861" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27861" ref_url="https://www.suse.com/security/cve/CVE-2021-27861" source="SUSE CVE"/>
    <description>
    Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length (and optionally VLAN0 headers)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-27861/">CVE-2021-27861 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27861">CVE-2021-27861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203838">SUSE bug 1203838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202127862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-27862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-27862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27862" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-27862" ref_url="https://www.suse.com/security/cve/CVE-2021-27862" source="SUSE CVE"/>
    <description>
    Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length and Ethernet to Wifi frame conversion (and optionally VLAN0 headers).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-27862/">CVE-2021-27862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27862">CVE-2021-27862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182623">SUSE bug 1182623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203837">SUSE bug 1203837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28038" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.3, as used with Xen PV. A certain part of the netback driver lacks necessary treatment of errors such as failed memory allocations (as a result of changes to the handling of grant mapping errors). A host OS denial of service may occur during misbehavior of a networking frontend driver. NOTE: this issue exists because of an incomplete fix for CVE-2021-26931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28038">CVE-2021-28038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183069">SUSE bug 1183069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28039" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28039" ref_url="https://www.suse.com/security/cve/CVE-2021-28039" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 5.9.x through 5.11.3, as used with Xen. In some less-common configurations, an x86 PV guest OS user can crash a Dom0 or driver domain via a large amount of I/O activity. The issue relates to misuse of guest physical addresses when a configuration has CONFIG_XEN_UNPOPULATED_ALLOC but not CONFIG_XEN_BALLOON_MEMORY_HOTPLUG.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28039/">CVE-2021-28039 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28039">CVE-2021-28039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183035">SUSE bug 1183035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183071">SUSE bug 1183071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28041" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28041" ref_url="https://www.suse.com/security/cve/CVE-2021-28041" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUBQLVRKYJRPQIBMWLSE4P7CEU335GGW/" source="SUSE-SU"/>
    <description>
    ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28041/">CVE-2021-28041 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28041">CVE-2021-28041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183137">SUSE bug 1183137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333996" comment="openssh is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1455-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1758-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183533">SUSE bug 1183533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705027" comment="glib2-tools-2.62.6-150200.3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705028" comment="libgio-2_0-0-2.62.6-150200.3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705029" comment="libglib-2_0-0-2.62.6-150200.3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705030" comment="libgmodule-2_0-0-2.62.6-150200.3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705031" comment="libgobject-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28375" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.6. fastrpc_internal_invoke in drivers/misc/fastrpc.c does not prevent user applications from sending kernel RPC messages, aka CID-20c40794eb85. This is a related issue to CVE-2019-2308.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28375">CVE-2021-28375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184955">SUSE bug 1184955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28660" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    rtw_wx_set_scan in drivers/staging/rtl8188eu/os_dep/ioctl_linux.c in the Linux kernel through 5.11.6 allows writing beyond the end of the -&gt;ssid[] array. NOTE: from the perspective of kernel.org releases, CVE IDs are not normally used for drivers/staging/* (unfinished work); however, system integrators may have situations in which a drivers/staging issue is relevant to their own customer base.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28660">CVE-2021-28660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28687" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
    <description>
    HVM soft-reset crashes toolstack libxl requires all data structures passed across its public interface to be initialized before use and disposed of afterwards by calling a specific set of functions. Many internal data structures also require this initialize / dispose discipline, but not all of them. When the "soft reset" feature was implemented, the libxl__domain_suspend_state structure didn't require any initialization or disposal. At some point later, an initialization function was introduced for the structure; but the "soft reset" path wasn't refactored to call the initialization function. When a guest nwo initiates a "soft reboot", uninitialized data structure leads to an assert() when later code finds the structure in an unexpected state. The effect of this is to crash the process monitoring the guest. How this affects the system depends on the structure of the toolstack. For xl, this will have no security-relevant effect: every VM has its own independent monitoring process, which contains no state. The domain in question will hang in a crashed state, but can be destroyed by `xl destroy` just like any other non-cooperating domain. For daemon-based toolstacks linked against libxl, such as libvirt, this will crash the toolstack, losing the state of any in-progress operations (localized DoS), and preventing further administrator operations unless the daemon is configured to restart automatically (system-wide DoS). If crashes "leak" resources, then repeated crashes could use up resources, also causing a system-wide DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28687">CVE-2021-28687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183072">SUSE bug 1183072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493665" comment="xen-libs-4.13.2_08-3.25.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28688" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The fix for XSA-365 includes initialization of pointers such that subsequent cleanup code wouldn't use uninitialized or stale values. This initialization went too far and may under certain conditions also overwrite pointers which are in need of cleaning up. The lack of cleanup would result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. All Linux versions having the fix for XSA-365 applied are vulnerable. XSA-365 was classified to affect versions back to at least 3.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28688">CVE-2021-28688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28690" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28690">CVE-2021-28690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28691" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28691" ref_url="https://www.suse.com/security/cve/CVE-2021-28691" source="SUSE CVE"/>
    <description>
    Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. Such kernel thread termination will lead to a use-after-free in Linux netback when the backend is destroyed, as the kernel thread associated with queue 0 will have already exited and thus the call to kthread_stop will be performed against a stale pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28691/">CVE-2021-28691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28691">CVE-2021-28691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186430">SUSE bug 1186430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28692" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, the issuing CPU spin-waits for the completion of the most recently issued command(s). Some of these waiting loops try to apply a timeout to fail overly-slow commands. The course of action upon a perceived timeout actually being detected is inappropriate: - on Intel hardware guests which did not originally cause the timeout may be marked as crashed, - on AMD hardware higher layer callers would not be notified of the issue, making them continue as if the IOMMU operation succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28692">CVE-2021-28692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28693" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28693" ref_url="https://www.suse.com/security/cve/CVE-2021-28693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page over to the allocator. Unfortunately, it was discovered that modules will not be scrubbed on Arm.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28693/">CVE-2021-28693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28693">CVE-2021-28693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186428">SUSE bug 1186428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28694" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28694">CVE-2021-28694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28695" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28695">CVE-2021-28695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28696" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28696">CVE-2021-28696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189980">SUSE bug 1189980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28697" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28697">CVE-2021-28697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28698" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    long running loops in grant table handling In order to properly monitor resource use, Xen maintains information on the grant mappings a domain may create to map grants offered by other domains. In the process of carrying out certain actions, Xen would iterate over all such entries, including ones which aren't in use anymore and some which may have been created but never used. If the number of entries for a given domain is large enough, this iterating of the entire table may tie up a CPU for too long, starving other domains or causing issues in the hypervisor itself. Note that a domain may map its own grants, i.e. there is no need for multiple domains to be involved here. A pair of "cooperating" guests may, however, cause the effects to be more severe.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28698">CVE-2021-28698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28699" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    inadequate grant-v2 status frames array bounds check The v2 grant table interface separates grant attributes from grant status. That is, when operating in this mode, a guest has two tables. As a result, guests also need to be able to retrieve the addresses that the new status tracking table can be accessed through. For 32-bit guests on x86, translation of requests has to occur because the interface structure layouts commonly differ between 32- and 64-bit. The translation of the request to obtain the frame numbers of the grant status table involves translating the resulting array of frame numbers. Since the space used to carry out the translation is limited, the translation layer tells the core function the capacity of the array within translation space. Unfortunately the core function then only enforces array bounds to be below 8 times the specified value, and would write past the available space if enough frame numbers needed storing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28699">CVE-2021-28699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194306">SUSE bug 1194306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28700" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28700" ref_url="https://www.suse.com/security/cve/CVE-2021-28700" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009395.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1236-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VYJVCSKTOQY75TLGWH3HDYZAS33JTOTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JLC632KAG76ZVELO6CCNNSZVUXPDVXOQ/" source="SUSE-SU"/>
    <description>
    xen/arm: No memory limit for dom0less domUs The dom0less feature allows an administrator to create multiple unprivileged domains directly from Xen. Unfortunately, the memory limit from them is not set. This allow a domain to allocate memory beyond what an administrator originally configured.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28700/">CVE-2021-28700 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28700">CVE-2021-28700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189381">SUSE bug 1189381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28701" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3140-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1301-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOWOZIQD7FWDNFL7CQF3WO5KZFKYYTDP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W4HJ2XF2SFYPRBAICENTSEBE5KO7OY2G/" source="SUSE-SU"/>
    <description>
    Another race in XENMAPSPACE_grant_table handling Guests are permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, are de-allocated when a guest switches (back) from v2 to v1. Freeing such pages requires that the hypervisor enforce that no parallel request can result in the addition of a mapping of such a page to a guest. That enforcement was missing, allowing guests to retain access to pages that were freed and perhaps re-used for other purposes. Unfortunately, when XSA-379 was being prepared, this similar issue was not noticed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28701">CVE-2021-28701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633428" comment="xen-libs-4.13.3_04-3.37.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28702" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28702" ref_url="https://www.suse.com/security/cve/CVE-2021-28702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PCI devices with RMRRs not deassigned correctly Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR"). These are typically used for platform tasks such as legacy USB emulation. If such a device is passed through to a guest, then on guest shutdown the device is not properly deassigned. The IOMMU configuration for these devices which are not properly deassigned ends up pointing to a freed data structure, including the IO Pagetables. Subsequent DMA or interrupts from the device will have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28702/">CVE-2021-28702 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28702">CVE-2021-28702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191363">SUSE bug 1191363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28703" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28703" ref_url="https://www.suse.com/security/cve/CVE-2021-28703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
    <description>
    grant table v2 status pages may remain accessible after de-allocation (take two) Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes. This bug was fortuitously fixed by code cleanup in Xen 4.14, and backported to security-supported Xen branches as a prerequisite of the fix for XSA-378.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28703/">CVE-2021-28703 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28703">CVE-2021-28703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192555">SUSE bug 1192555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28704" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28704">CVE-2021-28704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28705" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28705">CVE-2021-28705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28706" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    guests may exceed their designated memory limit When a guest is permitted to have close to 16TiB of memory, it may be able to issue hypercalls to increase its memory allocation beyond the administrator established limit. This is a result of a calculation done with 32-bit precision, which may overflow. It would then only be the overflowed (and hence small) number which gets compared against the established upper bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28706">CVE-2021-28706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28707" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28707">CVE-2021-28707 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28708" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    PoD operations on misaligned GFNs T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). The implementation of some of these hypercalls for PoD does not enforce the base page frame number to be suitably aligned for the specified order, yet some code involved in PoD handling actually makes such an assumption. These operations are XENMEM_decrease_reservation (CVE-2021-28704) and XENMEM_populate_physmap (CVE-2021-28707), the latter usable only by domains controlling the guest, i.e. a de-privileged qemu or a stub domain. (Patch 1, combining the fix to both these two issues.) In addition handling of XENMEM_decrease_reservation can also trigger a host crash when the specified page order is neither 4k nor 2M nor 1G (CVE-2021-28708, patch 2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28708">CVE-2021-28708 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28709" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009874.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HUTTCXZ3RCSXYS25JPMTEXNGYRSDKJ26/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3968-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELAKLWY4EZXSLS4BS47VPF2URIP3BLNK/" source="SUSE-SU"/>
    <description>
    issues with partially successful P2M updates on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] x86 HVM and PVH guests may be started in populate-on-demand (PoD) mode, to provide a way for them to later easily have more memory assigned. Guests are permitted to control certain P2M aspects of individual pages via hypercalls. These hypercalls may act on ranges of pages specified via page orders (resulting in a power-of-2 number of pages). In some cases the hypervisor carries out the requests by splitting them into smaller chunks. Error handling in certain PoD cases has been insufficient in that in particular partial success of some operations was not properly accounted for. There are two code paths affected - page removal (CVE-2021-28705) and insertion of new pages (CVE-2021-28709). (We provide one patch which combines the fix to both issues.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28709">CVE-2021-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28710" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28710" ref_url="https://www.suse.com/security/cve/CVE-2021-28710" source="SUSE CVE"/>
    <description>
    certain VT-d IOMMUs may not work in shared page table mode For efficiency reasons, address translation control structures (page tables) may (and, on suitable hardware, by default will) be shared between CPUs, for second-level translation (EPT), and IOMMUs. These page tables are presently set up to always be 4 levels deep. However, an IOMMU may require the use of just 3 page table levels. In such a configuration the lop level table needs to be stripped before inserting the root table's address into the hardware pagetable base register. When sharing page tables, Xen erroneously skipped this stripping. Consequently, the guest is able to write to leaf page table entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28710/">CVE-2021-28710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28710">CVE-2021-28710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192888">SUSE bug 1192888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28711">CVE-2021-28711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28712">CVE-2021-28712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. There are three affected backends: * blkfront patch 1, CVE-2021-28711 * netfront patch 2, CVE-2021-28712 * hvc_xen (console) patch 3, CVE-2021-28713
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28713">CVE-2021-28713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28714" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28714">CVE-2021-28714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Guest can force Linux netback driver to hog large amounts of kernel memory T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There is a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. (CVE-2021-28714)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28715">CVE-2021-28715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28950" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/fuse/fuse_i.h in the Linux kernel before 5.11.8. A "stall on CPU" can occur because a retry loop continually finds the same bad inode, aka CID-775c5033a0d1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28950">CVE-2021-28950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28951" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28951" ref_url="https://www.suse.com/security/cve/CVE-2021-28951" source="SUSE CVE"/>
    <description>
    An issue was discovered in fs/io_uring.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (deadlock) because exit may be waiting to park a SQPOLL thread, but concurrently that SQPOLL thread is waiting for a signal to start, aka CID-3ebba796fa25.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28951/">CVE-2021-28951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28951">CVE-2021-28951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184195">SUSE bug 1184195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28952" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28952" ref_url="https://www.suse.com/security/cve/CVE-2021-28952" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.8. The sound/soc/qcom/sdm845.c soundwire device driver has a buffer overflow when an unexpected port ID number is encountered, aka CID-1c668e1c0a0f. (This has been fixed in 5.12-rc4.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28952/">CVE-2021-28952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28952">CVE-2021-28952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184197">SUSE bug 1184197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184199">SUSE bug 1184199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28964">CVE-2021-28964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28965" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008665.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0607-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMW3G6JZK6A7ZRJZ7VOMELHWOQBYPIOY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28965">CVE-2021-28965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184644">SUSE bug 1184644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704861" comment="libruby2_5-2_5-2.5.9-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704862" comment="ruby2.5-2.5.9-4.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704863" comment="ruby2.5-stdlib-2.5.9-4.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28971" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28971">CVE-2021-28971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In drivers/pci/hotplug/rpadlpar_sysfs.c in the Linux kernel through 5.11.8, the RPA PCI Hotplug driver has a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly. This occurs because add_slot_store and remove_slot_store mishandle drc_name '\0' termination, aka CID-cc7a0bb058b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28972">CVE-2021-28972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220060">SUSE bug 1220060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    BPF JIT compilers in the Linux kernel through 5.11.12 have incorrect computation of branch displacements, allowing them to execute arbitrary code within the kernel context. This affects arch/x86/net/bpf_jit_comp.c and arch/x86/net/bpf_jit_comp32.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29154">CVE-2021-29154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186408">SUSE bug 1186408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDF7UBOVWJVCBDNJIGAY445AXZJU4OOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THW3Z3CCX5HRFD2KJ3A4TDO27FGBEKNN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation is not correctly accounted for when restricting subsequent operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29155">CVE-2021-29155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704870" comment="kernel-default-5.3.18-24.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704871" comment="kernel-default-base-5.3.18-24.64.1.9.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498544" comment="kernel-rt-5.3.18-8.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29256" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29256" ref_url="https://www.suse.com/security/cve/CVE-2021-29256" source="SUSE CVE"/>
    <description>
    . The Arm Mali GPU kernel driver allows an unprivileged user to achieve access to freed memory, leading to information disclosure or root privilege escalation. This affects Bifrost r16p0 through r29p0 before r30p0, Valhall r19p0 through r29p0 before r30p0, and Midgard r28p0 through r30p0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29256/">CVE-2021-29256 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29256">CVE-2021-29256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186494">SUSE bug 1186494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29264" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.10. drivers/net/ethernet/freescale/gianfar.c in the Freescale Gianfar Ethernet driver allows attackers to cause a system crash because a negative fragment size is calculated in situations involving an rx queue overrun when jumbo packets are used and NAPI is enabled, aka CID-d8861bab48b6.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29264">CVE-2021-29264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.7. usbip_sockfd_store in drivers/usb/usbip/stub_dev.c allows attackers to cause a denial of service (GPF) because the stub-up sequence has race conditions during an update of the local and shared status, aka CID-9380afd6df70.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29265">CVE-2021-29265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29266" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29266" ref_url="https://www.suse.com/security/cve/CVE-2021-29266" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.9. drivers/vhost/vdpa.c has a use-after-free because v-&gt;config_ctx has an invalid value upon re-opening a character device, aka CID-f6bbf0010ba0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29266/">CVE-2021-29266 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29266">CVE-2021-29266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184166">SUSE bug 1184166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29646" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29646" ref_url="https://www.suse.com/security/cve/CVE-2021-29646" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. tipc_nl_retrieve_key in net/tipc/node.c does not properly validate certain data sizes, aka CID-0217ed2848e8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29646/">CVE-2021-29646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29646">CVE-2021-29646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184191">SUSE bug 1184191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29647" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29647">CVE-2021-29647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29648" ref_url="https://www.suse.com/security/cve/CVE-2021-29648" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The BPF subsystem does not properly consider that resolved_ids and resolved_sizes are intentionally uninitialized in the vmlinux BPF Type Format (BTF), which can cause a system crash upon an unexpected access attempt (in map_create in kernel/bpf/syscall.c or check_btf_info in kernel/bpf/verifier.c), aka CID-350a5c4dd245.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29648/">CVE-2021-29648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29648">CVE-2021-29648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184200">SUSE bug 1184200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29649" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29649" ref_url="https://www.suse.com/security/cve/CVE-2021-29649" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The user mode driver (UMD) has a copy_process() memory leak, related to a lack of cleanup steps in kernel/usermode_driver.c and kernel/bpf/preload/bpf_preload_kern.c, aka CID-f60a85cad677.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29649/">CVE-2021-29649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29649">CVE-2021-29649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184205">SUSE bug 1184205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDF7UBOVWJVCBDNJIGAY445AXZJU4OOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0873-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THW3Z3CCX5HRFD2KJ3A4TDO27FGBEKNN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.11. The netfilter subsystem allows attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value, aka CID-175e476b8cdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29650">CVE-2021-29650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704870" comment="kernel-default-5.3.18-24.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704871" comment="kernel-default-base-5.3.18-24.64.1.9.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498544" comment="kernel-rt-5.3.18-8.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29657" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29657" ref_url="https://www.suse.com/security/cve/CVE-2021-29657" source="SUSE CVE"/>
    <description>
    arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 double fetch in nested_svm_vmrun.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29657/">CVE-2021-29657 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29657">CVE-2021-29657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188637">SUSE bug 1188637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.11.3 when a webcam device exists. video_usercopy in drivers/media/v4l2-core/v4l2-ioctl.c has a memory leak for large arguments, aka CID-fb18802a338b.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30002">CVE-2021-30002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30004" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008618.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0519-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXT3Y5NEGCCPGZ7FTYURPUBTHNNJA6MF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0545-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7GHTARPJSUMITH7M3ESWRIZUIYW5UAM6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0563-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4XPNZHCXJ32COQGQ62HNGD6DHPO5E552/" source="SUSE-SU"/>
    <description>
    In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30004">CVE-2021-30004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184348">SUSE bug 1184348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704856" comment="wpa_supplicant-2.9-4.29.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30178" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30178" ref_url="https://www.suse.com/security/cve/CVE-2021-30178" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30178/">CVE-2021-30178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30178">CVE-2021-30178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184499">SUSE bug 1184499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202130465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-30465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-30465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30465" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0878-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G76UZ7FY6VFG73EC6UUCBE46L3TAKR6G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OX775QFGRPXXX7W5FDFKP3V5KCNZYD7F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
    <description>
    runc before 1.0.0-rc95 allows a Container Filesystem Breakout via Directory Traversal. To exploit the vulnerability, an attacker must be able to create multiple containers with a fairly specific mount configuration. The problem occurs via a symlink-exchange attack that relies on a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-30465">CVE-2021-30465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185405">SUSE bug 1185405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189161">SUSE bug 1189161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651737" comment="containerd-1.4.11-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651738" comment="docker-20.10.9_ce-156.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651739" comment="runc-1.0.2-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3144">CVE-2021-3144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31440" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31440" ref_url="https://www.suse.com/security/cve/CVE-2021-31440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
    <description>
    This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.11.15. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-13661.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31440/">CVE-2021-31440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31440">CVE-2021-31440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190126">SUSE bug 1190126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190127">SUSE bug 1190127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3148">CVE-2021-3148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008960.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IHKZVFIFHF623NYTHXHM7GHY5WE7LCHT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0857-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6WUBWGS6GPACWAIGOVLE7UDHZ4HSXZVC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3TE4MZKP3FOYVRFOKL6QQUC77PHP2K76/" source="SUSE-SU"/>
    <description>
    LookupCol.c in X.Org X through X11R7.7 and libX11 before 1.7.1 might allow remote attackers to execute arbitrary code. The libX11 XLookupColor request (intended for server-side color lookup) contains a flaw allowing a client to send color-name requests with a name longer than the maximum size allowed by the protocol (and also longer than the maximum packet size for normal-sized packets). The user-controlled data exceeding the maximum size is then interpreted by the server as additional X protocol requests and executed, e.g., to disable X server authorization completely. For example, if the victim encounters malicious terminal control sequences for color codes, then the attacker may be able to take full control of the running graphical session.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31535">CVE-2021-31535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191879">SUSE bug 1191879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205051">SUSE bug 1205051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009503414" comment="libX11-6-1.6.5-3.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494026" comment="libX11-data-1.6.5-3.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503416" comment="libX11-xcb1-1.6.5-3.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:4-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:6-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:7-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020038.html" source="SUSE-SU"/>
		<reference ref_id="TID000019841" ref_url="https://www.suse.com/support/kb/doc/?id=000019841" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OQJUG5Z7K425IKZS5GT4KPIBGTT4JMW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0170-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3O463OUKAXLCUM74AUHUPVMQFXLLVAEH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JTRDPRKO2NDRVSH5UJJKLBDYJXGUBK6P/" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3156">CVE-2021-3156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181506">SUSE bug 1181506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181657">SUSE bug 1181657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218863">SUSE bug 1218863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225623">SUSE bug 1225623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503164" comment="sudo-1.8.22-4.18.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0899-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6E3YAO2VV3WBUS7PMAT26ZYDS3AXW5VL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1951-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSSCTPCNB3RDCWJ6DOALIIRKDXUAVGPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU6P3NIODW6ZMC4HZLBROO6ZEOD5KAUX/" source="SUSE-SU"/>
    <description>
    In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31607">CVE-2021-31607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210934">SUSE bug 1210934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504114" comment="python3-salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504115" comment="salt-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504120" comment="salt-minion-3002.2-37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504125" comment="salt-transactional-update-3002.2-37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0270-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT6BSX5663NCXU3Y4KR3RA3RQHJMCFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3AKEBUCTPHZWXJGF6EWK7HBTO726SP2Y/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3177">CVE-2021-3177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31795" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31795" ref_url="https://www.suse.com/security/cve/CVE-2021-31795" source="SUSE CVE"/>
    <description>
    The PowerVR GPU kernel driver in pvrsrvkm.ko through 2021-04-24 for the Linux kernel, as used on Alcatel 1S phones, allows attackers to overwrite heap memory via PhysmemNewRamBackedPMR.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-31795/">CVE-2021-31795 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31795">CVE-2021-31795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185354">SUSE bug 1185354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31799" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31799">CVE-2021-31799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196771">SUSE bug 1196771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31810" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31810">CVE-2021-31810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193383">SUSE bug 1193383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205053">SUSE bug 1205053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31829" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31829" ref_url="https://www.suse.com/security/cve/CVE-2021-31829" source="SUSE CVE"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 5.12.1 performs undesirable speculative loads, leading to disclosure of stack content via side-channel attacks, aka CID-801c6058d14a. The specific concern is not protecting the BPF stack area against speculative loads. Also, the BPF stack can contain uninitialized data that might represent sensitive information previously operated on by the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31829/">CVE-2021-31829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31829">CVE-2021-31829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188561">SUSE bug 1188561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008991.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTUD7F7CVHXB4OCLI7OT4AVJTO6T64TM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1012-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2B2UD46YGBOYO64SOPMOM6DQAL6FGCHZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1819-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4DDS7NLC6D7UVP25OVRWIRK6Y44WZKCU/" source="SUSE-SU"/>
    <description>
    A flaw was found in the gstreamer h264 component of gst-plugins-bad before v1.18.1 where when parsing a h264 header, an attacker could cause the stack to be smashed, memory corruption and possibly code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3185">CVE-2021-3185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704883" comment="gstreamer-1.16.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704884" comment="gstreamer-plugins-base-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704885" comment="libgstallocators-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704886" comment="libgstapp-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704887" comment="libgstaudio-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704888" comment="libgstgl-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704889" comment="libgstpbutils-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704890" comment="libgstreamer-1_0-0-1.16.3-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704891" comment="libgstriff-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704892" comment="libgsttag-1_0-0-1.16.3-4.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704893" comment="libgstvideo-1_0-0-1.16.3-4.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202131916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-31916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-31916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-31916">CVE-2021-31916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705000" comment="kernel-default-5.3.18-24.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705001" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2021:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:0633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-February/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/019028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008813.html" source="SUSE-SU"/>
		<reference ref_id="TID000019887" ref_url="https://www.suse.com/support/kb/doc/?id=000019887" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0347-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYH7ONK65HNBANHLED5R64OBSM2EORYI/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3197">CVE-2021-3197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32066" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:15034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SFO6LZPCK3BJ6OA3FTD3UWQI47BKDQBA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3CHM25JITRX6N3UKVDBKNLWS6MYWFY3M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32066">CVE-2021-32066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196771">SUSE bug 1196771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205053">SUSE bug 1205053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32078" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32078" ref_url="https://www.suse.com/security/cve/CVE-2021-32078" source="SUSE CVE"/>
    <description>
    An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32078/">CVE-2021-32078 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32078">CVE-2021-32078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187489">SUSE bug 1187489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    net/bluetooth/hci_request.c in the Linux kernel through 5.12.2 has a race condition for removal of the HCI controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32399">CVE-2021-32399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196174">SUSE bug 1196174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201734">SUSE bug 1201734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32606" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32606" ref_url="https://www.suse.com/security/cve/CVE-2021-32606" source="SUSE CVE"/>
    <description>
    In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32606/">CVE-2021-32606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32606">CVE-2021-32606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185953">SUSE bug 1185953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32760" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOFB4OTX7BGTKOBQF2ZTPBP4VJT54IQS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KOVJMTDKAFMTONFNVO7Z327OFE52V7FK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
    <description>
    containerd is a container runtime. A bug was found in containerd versions prior to 1.4.8 and 1.5.4 where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host's filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in containerd 1.5.4 and 1.4.8. As a workaround, ensure that users only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with specific files.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32760">CVE-2021-32760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188282">SUSE bug 1188282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009651737" comment="containerd-1.4.11-56.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651738" comment="docker-20.10.9_ce-156.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651739" comment="runc-1.0.2-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33034">CVE-2021-33034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3308" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3308" ref_url="https://www.suse.com/security/cve/CVE-2021-3308" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Xen 4.12.3 through 4.12.4 and 4.13.1 through 4.14.x. An x86 HVM guest with PCI pass through devices can force the allocation of all IDT vectors on the system by rebooting itself with MSI or MSI-X capabilities enabled and entries setup. Such reboots will leak any vectors used by the MSI(-X) entries that the guest might had enabled, and hence will lead to vector exhaustion on the system, not allowing further PCI pass through devices to work properly. HVM guests with PCI pass through devices can mount a Denial of Service (DoS) attack affecting the pass through of PCI devices to other guests or the hardware domain. In the latter case, this would affect the entire host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3308/">CVE-2021-3308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3308">CVE-2021-3308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181254">SUSE bug 1181254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009493665" comment="xen-libs-4.13.2_08-3.25.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33098">CVE-2021-33098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33120" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0574-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W7QEMHXA4R2RUIQPQL2RSCQ7TBADKDOH/" source="SUSE-SU"/>
    <description>
    Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33120">CVE-2021-33120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33135" ref_url="https://www.suse.com/security/cve/CVE-2021-33135" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    Uncontrolled resource consumption in the Linux kernel drivers for Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33135/">CVE-2021-33135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33135">CVE-2021-33135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199515">SUSE bug 1199515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper conditions check in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33139">CVE-2021-33139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33155" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1065-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QNS2QRVZ2MWL6BB6UKZX6H5IFTGR7LZ2/" source="SUSE-SU"/>
    <description>
    Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33155">CVE-2021-33155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 5.12.7 enforces incorrect limits for pointer arithmetic operations, aka CID-bb01a1bba579. This can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation to root. In particular, there is a corner case where the off reg causes a masking direction change, which then results in an incorrect final aux-&gt;alu_limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33200">CVE-2021-33200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3347">CVE-2021-3347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3348" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008460.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0241-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZRN6BW22C4S3GVCJVPHDT4HHTLVGVZE/" source="SUSE-SU"/>
    <description>
    nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3348">CVE-2021-3348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009085.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PPALT4SBPXXPFJVTZN5FQCXMNVH4GXCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AOWBBOB3KB4MSVNKBUGK3UIYPYWCHNLS/" source="SUSE-SU"/>
    <description>
    Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33560">CVE-2021-33560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189854">SUSE bug 1189854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199664">SUSE bug 1199664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009504140" comment="libgcrypt20-1.8.2-8.39.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZGEXWUJCYCGR3DHTHHZAJYSGQP2SHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
    <description>
    The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33574">CVE-2021-33574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189426">SUSE bug 1189426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192788">SUSE bug 1192788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196766">SUSE bug 1196766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634576" comment="glibc-2.26-13.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634580" comment="glibc-locale-2.26-13.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634581" comment="glibc-locale-base-2.26-13.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33624">CVE-2021-33624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33630" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33630" ref_url="https://www.suse.com/security/cve/CVE-2021-33630" source="SUSE CVE"/>
    <description>
    NULL Pointer Dereference vulnerability in openEuler kernel on Linux (network modules) allows Pointer Manipulation. This vulnerability is associated with program files net/sched/sch_cbs.C.

This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33630/">CVE-2021-33630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33630">CVE-2021-33630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219402">SUSE bug 1219402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33805" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33805" ref_url="https://www.suse.com/security/cve/CVE-2021-33805" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-10906. Reason: This candidate is a duplicate of CVE-2018-10906. Notes: All CVE users should reference CVE-2018-10906 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-33805/">CVE-2021-33805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-33805">CVE-2021-33805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186801">SUSE bug 1186801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009477296" comment="libfuse3-3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="TID000020341" ref_url="https://www.suse.com/support/kb/doc/?id=000020341" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZY5AYK3E4EZBBTJOQXWCMRDFFYLM6EB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2415-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDV3DHS5VRBTZIQXVKQML4UNTSCPJZZA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33909">CVE-2021-33909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189302">SUSE bug 1189302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190859">SUSE bug 1190859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704910" comment="kernel-default-5.3.18-24.75.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704911" comment="kernel-default-base-5.3.18-24.75.3.9.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628046" comment="kernel-rt-5.3.18-48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3392" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3392" ref_url="https://www.suse.com/security/cve/CVE-2021-3392" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3392/">CVE-2021-3392 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3392">CVE-2021-3392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189236">SUSE bug 1189236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33928" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33928" ref_url="https://www.suse.com/security/cve/CVE-2021-33928" source="SUSE CVE"/>
    <description>
    Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33928/">CVE-2021-33928 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33928">CVE-2021-33928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190148">SUSE bug 1190148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33929" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33929" ref_url="https://www.suse.com/security/cve/CVE-2021-33929" source="SUSE CVE"/>
    <description>
    Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33929/">CVE-2021-33929 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33929">CVE-2021-33929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190149">SUSE bug 1190149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33930" ref_url="https://www.suse.com/security/cve/CVE-2021-33930" source="SUSE CVE"/>
    <description>
    Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33930/">CVE-2021-33930 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33930">CVE-2021-33930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190150">SUSE bug 1190150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33938" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33938" ref_url="https://www.suse.com/security/cve/CVE-2021-33938" source="SUSE CVE"/>
    <description>
    Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33938/">CVE-2021-33938 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33938">CVE-2021-33938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190147">SUSE bug 1190147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3409" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3409" ref_url="https://www.suse.com/security/cve/CVE-2021-3409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3409/">CVE-2021-3409 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3409">CVE-2021-3409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182282">SUSE bug 1182282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3411" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3411" ref_url="https://www.suse.com/security/cve/CVE-2021-3411" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3411/">CVE-2021-3411 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3411">CVE-2021-3411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182498">SUSE bug 1182498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0600-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATYM36RK6JXDXZ33F2KFHZHDZ3F3YD24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3416">CVE-2021-3416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186473">SUSE bug 1186473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704859" comment="qemu-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704860" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008990.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1942-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IEKBDJBTGKO53MSKM3SRYVUQDWIJ2N5I/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3419">CVE-2021-3419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704898" comment="qemu-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704899" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012871.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2682-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2685-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704952" comment="python3-rpm-4.14.1-22.4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704953" comment="rpm-4.14.1-22.4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3426" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    There's a flaw in Python 3's pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3426">CVE-2021-3426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009660091" comment="libpython3_6m1_0-3.6.15-3.91.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660092" comment="python3-3.6.15-3.91.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660093" comment="python3-base-3.6.15-3.91.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3428" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3428">CVE-2021-3428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34401" ref_url="https://www.suse.com/security/cve/CVE-2021-34401" source="SUSE CVE"/>
    <description>
    NVIDIA Linux kernel distributions contain a vulnerability in nvmap NVGPU_IOCTL_CHANNEL_SET_ERROR_NOTIFIER, where improper access control may lead to code execution, compromised integrity, or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34401/">CVE-2021-34401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34401">CVE-2021-34401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194896">SUSE bug 1194896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34402" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34402" ref_url="https://www.suse.com/security/cve/CVE-2021-34402" source="SUSE CVE"/>
    <description>
    NVIDIA Tegra kernel driver contains a vulnerability in NVIDIA NVDEC, where a user with high privileges might be able to read from or write to a memory location that is outside the intended boundary of the buffer, which may lead to denial of service, Information disclosure, loss of Integrity, or possible escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34402/">CVE-2021-34402 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34402">CVE-2021-34402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194894">SUSE bug 1194894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34403" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34403" ref_url="https://www.suse.com/security/cve/CVE-2021-34403" source="SUSE CVE"/>
    <description>
    NVIDIA Linux distributions contain a vulnerability in nvmap ioctl, which allows any user with a local account to exploit a use-after-free condition, leading to code privilege escalation, loss of confidentiality and integrity, or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34403/">CVE-2021-34403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34403">CVE-2021-34403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194897">SUSE bug 1194897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34406" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34406" ref_url="https://www.suse.com/security/cve/CVE-2021-34406" source="SUSE CVE"/>
    <description>
    NVIDIA Tegra kernel driver contains a vulnerability in NVHost, where a specific race condition can lead to a null pointer dereference, which may lead to a system reboot.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-34406/">CVE-2021-34406 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34406">CVE-2021-34406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194893">SUSE bug 1194893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZC652CKFCHQCNNU7MZKBTO27OZE22Q5U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The bpf verifier in the Linux kernel did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. This issue was addressed in the upstream kernel in commit 9b00f1b78809 ("bpf: Fix truncation handling for mod32 dst reg wrt zero") and in Linux stable kernels 5.11.2, 5.10.19, and 5.4.101.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3444">CVE-2021-3444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3448" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1426-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5SXZU2UVUXVIVOLI6OT32WIQ6OJBE5E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3530-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2DP73HQCB6UNPUB54KPOZEMBUQDVN6M6/" source="SUSE-SU"/>
    <description>
    A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3448">CVE-2021-3448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009653320" comment="dnsmasq-2.86-7.14.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:87-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:99-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0955-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0476-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRCNDGXHP3DJBJKDGVACNKEWGRZDKQRJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZO2DR7PIGZWRPXIGYAZCAL4X64BSDZJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SR22RRAXGLDTLSDJRAQ4O3Q67G2PNEGJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OFQOZ4RLN343RY5DDFVA2KWFMZHZD2KS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVLFLECFVPSHO4SQBVWDO2CBAU5LB7IS/" source="SUSE-SU"/>
    <description>
    An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3449">CVE-2021-3449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705020" comment="libopenssl1_1-1.1.1d-11.20.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705021" comment="openssl-1_1-1.1.1d-11.20.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34556">CVE-2021-34556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
    <description>
    net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34693">CVE-2021-34693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192868">SUSE bug 1192868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624613" comment="kernel-rt-4.12.14-10.49.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3483" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0579-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6PH44XSVUZTRLJSGALUUATIQLKQWL4C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BUQVIATUWQNZFSV6IFJENJSRWJSP2QHF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3483">CVE-2021-3483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704857" comment="kernel-default-5.3.18-24.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704858" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009620089" comment="kernel-rt-5.3.18-8.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34866" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34866" ref_url="https://www.suse.com/security/cve/CVE-2021-34866" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34866/">CVE-2021-34866 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34866">CVE-2021-34866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191645">SUSE bug 1191645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191646">SUSE bug 1191646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3489" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3489" ref_url="https://www.suse.com/security/cve/CVE-2021-3489" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee ("bpf, ringbuf: Deny reserve of buffers larger than ringbuf") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 ("bpf: Implement BPF ring buffer and verifier support for it") (v5.8-rc1).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3489/">CVE-2021-3489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3489">CVE-2021-3489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185640">SUSE bug 1185640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185856">SUSE bug 1185856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3490" ref_url="https://www.suse.com/security/cve/CVE-2021-3490" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009102.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e ("bpf: Fix alu32 const subreg bound tracking on bitwise operations") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 ("bpf: Verifier, do explicit ALU32 bounds tracking") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 ("bpf:Fix a verifier failure with xor") ( 5.10-rc1).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3490/">CVE-2021-3490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3490">CVE-2021-3490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185641">SUSE bug 1185641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185796">SUSE bug 1185796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QHZZYSYX2W3FJK73UGT72F2DQ37IKCJY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3WU4VH2HXVC3VLST5RWUW7LUFNSUEIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/42KHRU57J2OGM24I4AOZ7JW6VV2BOPCV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1977-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YMMFY2OXW23MB2M73JXBDJKJD5G5YCOX/" source="SUSE-SU"/>
    <description>
    The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/&lt;PID&gt;/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b ("io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c ("io_uring: add IORING_OP_PROVIDE_BUFFERS") (v5.7-rc1).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3491">CVE-2021-3491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187090">SUSE bug 1187090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704896" comment="kernel-default-5.3.18-24.67.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704897" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009498554" comment="kernel-rt-5.3.18-8.13.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3492" ref_url="https://www.suse.com/security/cve/CVE-2021-3492" source="SUSE CVE"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (kernel memory exhaustion) or gain privileges via executing arbitrary code. AKA ZDI-CAN-13562.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3492/">CVE-2021-3492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3492">CVE-2021-3492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184944">SUSE bug 1184944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3493" ref_url="https://www.suse.com/security/cve/CVE-2021-3493" source="SUSE CVE"/>
    <description>
    The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3493/">CVE-2021-3493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3493">CVE-2021-3493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184900">SUSE bug 1184900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UKZHKAOI6N3ILHMQUWDAPBQQORWN64SU/" source="SUSE-SU"/>
    <description>
    Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-34981">CVE-2021-34981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192595">SUSE bug 1192595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212298">SUSE bug 1212298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705000" comment="kernel-default-5.3.18-24.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705001" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3501" ref_url="https://www.suse.com/security/cve/CVE-2021-3501" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel in versions before 5.12. The value of internal.ndata, in the KVM API, is mapped to an array index, which can be updated by a user process at anytime which could lead to an out-of-bounds write. The highest threat from this vulnerability is to data integrity and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3501/">CVE-2021-3501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3501">CVE-2021-3501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185380">SUSE bug 1185380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35039" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    kernel/module.c in the Linux kernel before 5.12.14 mishandles Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, does not occur for a module.sig_enforce=1 command-line argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35039">CVE-2021-35039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188126">SUSE bug 1188126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704910" comment="kernel-default-5.3.18-24.75.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704911" comment="kernel-default-base-5.3.18-24.75.3.9.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626892" comment="kernel-rt-5.3.18-45.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008840.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CSGIA2DN2ELWOW2J5TFWNTMLKQDBQAH5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q55SWQQWWFLTPBSSMBPSJOSFUIHSY6H6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the hivex library in versions before 1.3.20. It is caused due to a lack of bounds check within the hivex_open function. An attacker could input a specially crafted Windows Registry (hive) file which would cause hivex to read memory beyond its normal bounds or cause the program to crash. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3504">CVE-2021-3504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704877" comment="libhivex0-1.3.14-5.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704878" comment="perl-Win-Hivex-1.3.14-5.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3506" ref_url="https://www.suse.com/security/cve/CVE-2021-3506" source="SUSE CVE"/>
    <description>
    An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3506/">CVE-2021-3506 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3506">CVE-2021-3506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184999">SUSE bug 1184999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3509" ref_url="https://www.suse.com/security/cve/CVE-2021-3509" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVZR2UDWM64LU6NNFZNHXJWWFA6W2ZDV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
    <description>
    A flaw was found in Red Hat Ceph Storage 4, in the Dashboard component. In response to CVE-2020-27839, the JWT token was moved from localStorage to an httpOnly cookie. However, token cookies are used in the body of the HTTP response for the documentation, which again makes it available to XSS.The greatest threat to the system is for confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3509/">CVE-2021-3509 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3509">CVE-2021-3509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186021">SUSE bug 1186021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009601181" comment="librados2-15.2.12.83+g528da226523-3.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009601182" comment="librbd1-15.2.12.83+g528da226523-3.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3516">CVE-2021-3516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704874" comment="libxml2-2-2.9.7-3.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704875" comment="libxml2-tools-2.9.7-3.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3517">CVE-2021-3517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194438">SUSE bug 1194438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196383">SUSE bug 1196383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704874" comment="libxml2-2-2.9.7-3.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704875" comment="libxml2-tools-2.9.7-3.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0692-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3518">CVE-2021-3518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191860">SUSE bug 1191860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704874" comment="libxml2-2-2.9.7-3.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704875" comment="libxml2-tools-2.9.7-3.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008909.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y6JSYGHG2J4E7C5MDUDUDEILIMZKTM7H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1825-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MA4LQPPDXUEKHDKVDM24RJVHSV2EC67P/" source="SUSE-SU"/>
    <description>
    There's a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3520">CVE-2021-3520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185438">SUSE bug 1185438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503309" comment="liblz4-1-1.8.0-3.8.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3524" ref_url="https://www.suse.com/security/cve/CVE-2021-3524" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVZR2UDWM64LU6NNFZNHXJWWFA6W2ZDV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Red Hat Ceph Storage RadosGW (Ceph Object Gateway) in versions before 14.2.21. The vulnerability is related to the injection of HTTP headers via a CORS ExposeHeader tag. The newline character in the ExposeHeader tag in the CORS configuration file generates a header injection in the response when the CORS request is made. In addition, the prior bug fix for CVE-2020-10753 did not account for the use of \r as a header separator, thus a new flaw has been created.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3524/">CVE-2021-3524 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3524">CVE-2021-3524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185619">SUSE bug 1185619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009601181" comment="librados2-15.2.12.83+g528da226523-3.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009601182" comment="librbd1-15.2.12.83+g528da226523-3.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3527">CVE-2021-3527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3531" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3531" ref_url="https://www.suse.com/security/cve/CVE-2021-3531" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008918.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0833-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVZR2UDWM64LU6NNFZNHXJWWFA6W2ZDV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1834-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OD76XLAQUNHRCX53LARPKA7IODR5MCPO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Red Hat Ceph Storage RGW in versions before 14.2.21. When processing a GET Request for a swift URL that ends with two slashes it can cause the rgw to crash, resulting in a denial of service. The greatest threat to the system is of availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3531/">CVE-2021-3531 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3531">CVE-2021-3531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186020">SUSE bug 1186020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009601181" comment="librados2-15.2.12.83+g528da226523-3.25.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009601182" comment="librbd1-15.2.12.83+g528da226523-3.25.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0764-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/32MGTWHTQRUPYHYIAVT6OVBDWQDI36DX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3537">CVE-2021-3537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704874" comment="libxml2-2-2.9.7-3.34.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704875" comment="libxml2-tools-2.9.7-3.34.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-June/019290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0886-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A7LMMGD465XPYHREX4OT47UCNFPO6QTF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1917-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AR6HBOC5J6QPVBH5GMPTQIK63SAT3C5S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3541">CVE-2021-3541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704900" comment="libxml2-2-2.9.7-3.37.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704901" comment="libxml2-tools-2.9.7-3.37.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3542">CVE-2021-3542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3543" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3543" ref_url="https://www.suse.com/security/cve/CVE-2021-3543" source="SUSE CVE"/>
    <description>
    A flaw null pointer dereference in the Nitro Enclaves kernel driver was found in the way that Enclaves VMs forces closures on the enclave file descriptor. A local user of a host machine could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3543/">CVE-2021-3543 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3543">CVE-2021-3543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185091">SUSE bug 1185091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
    <description>
    Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3544">CVE-2021-3544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186010">SUSE bug 1186010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704905" comment="qemu-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499926" comment="qemu-arm-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499934" comment="qemu-ipxe-1.0.0+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499940" comment="qemu-seabios-1.12.1+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499941" comment="qemu-sgabios-8-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704906" comment="qemu-tools-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499945" comment="qemu-vgabios-1.12.1+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499946" comment="qemu-x86-4.2.1-11.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3545" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3545">CVE-2021-3545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185990">SUSE bug 1185990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704905" comment="qemu-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499926" comment="qemu-arm-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499934" comment="qemu-ipxe-1.0.0+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499940" comment="qemu-seabios-1.12.1+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499941" comment="qemu-sgabios-8-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704906" comment="qemu-tools-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499945" comment="qemu-vgabios-1.12.1+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499946" comment="qemu-x86-4.2.1-11.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009107.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SVDDMT7IUGYOEFTYO3UWD73PJMJL4FSY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UIASIXLUG5DPOL6IUP6OEGC7XFEJQSHY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3546">CVE-2021-3546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704905" comment="qemu-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499926" comment="qemu-arm-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499934" comment="qemu-ipxe-1.0.0+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499940" comment="qemu-seabios-1.12.1+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499941" comment="qemu-sgabios-8-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704906" comment="qemu-tools-4.2.1-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499945" comment="qemu-vgabios-1.12.1+-11.22.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009499946" comment="qemu-x86-4.2.1-11.22.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35477">CVE-2021-35477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3556" ref_url="https://www.suse.com/security/cve/CVE-2021-3556" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: Assigned but a duplicate for CVE-2021-3559.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3556/">CVE-2021-3556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3556">CVE-2021-3556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191542">SUSE bug 1191542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336198" comment="libvirt-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3559" ref_url="https://www.suse.com/security/cve/CVE-2021-3559" source="SUSE CVE"/>
    <description>
    A flaw was found in libvirt in the virConnectListAllNodeDevices API in versions before 7.0.0. It only affects hosts with a PCI device and driver that supports mediated devices (e.g., GRID driver). This flaw could be used by an unprivileged client with a read-only connection to crash the libvirt daemon by executing the 'nodedev-list' virsh command. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3559/">CVE-2021-3559 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3559">CVE-2021-3559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191542">SUSE bug 1191542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334933" comment="libvirt-daemon is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334936" comment="libvirt-daemon-driver-interface is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334939" comment="libvirt-daemon-driver-network is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334940" comment="libvirt-daemon-driver-nodedev is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334941" comment="libvirt-daemon-driver-nwfilter is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334942" comment="libvirt-daemon-driver-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334943" comment="libvirt-daemon-driver-secret is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334944" comment="libvirt-daemon-driver-storage is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336191" comment="libvirt-daemon-driver-storage-core is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336192" comment="libvirt-daemon-driver-storage-disk is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336193" comment="libvirt-daemon-driver-storage-iscsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336194" comment="libvirt-daemon-driver-storage-logical is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336195" comment="libvirt-daemon-driver-storage-mpath is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336196" comment="libvirt-daemon-driver-storage-rbd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336197" comment="libvirt-daemon-driver-storage-scsi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334946" comment="libvirt-daemon-qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336198" comment="libvirt-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008926.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0838-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ABSE3IWWQYLOHOVCNFCOZVXFZAYMJYN4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NCYKG2YTUVFTW5R7DJWWWJGLDWU7XE5/" source="SUSE-SU"/>
    <description>
    It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3560">CVE-2021-3560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704894" comment="libpolkit0-0.116-3.3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704895" comment="polkit-0.116-3.3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BBGE5AIDX3NT46HPS2IYLFESAEFCTG6O/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GU2EJMYFONMKDLPFYPCAPSOFXO5ZISM/" source="SUSE-SU"/>
    <description>
    A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. This flaw affects the Linux kernel versions prior to 5.13-rc5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3573">CVE-2021-3573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704907" comment="kernel-default-5.3.18-24.70.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704908" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009079.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D4XGPKTRWLOEATNJNZGQZCO6BZTKIKJ6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZAR7UXBYGOSW57CMLBEWIM7KTCVMXFZ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3580">CVE-2021-3580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187892">SUSE bug 1187892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009503543" comment="libhogweed4-3.4.1-4.18.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009503545" comment="libnettle6-3.4.1-4.18.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3582" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a "PVRDMA_CMD_CREATE_MR" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3582">CVE-2021-3582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3588" ref_url="https://www.suse.com/security/cve/CVE-2021-3588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009204.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2459-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FD7KE3RMFCUKN7TQCYXDCNJGFVIORKJL/" source="SUSE-SU"/>
    <description>
    The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3588/">CVE-2021-3588 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3588">CVE-2021-3588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187165">SUSE bug 1187165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336474" comment="libbluetooth3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187369">SUSE bug 1187369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012010.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2941-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3NSGF4F642R2SF6X757XAA52XDMHLLL3/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3594" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZGEXWUJCYCGR3DHTHHZAJYSGQP2SHMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3291-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TYMYANBGPUFKQ7SIIB3PZLAAR35QYXOR/" source="SUSE-SU"/>
    <description>
    The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35942">CVE-2021-35942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192788">SUSE bug 1192788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009634576" comment="glibc-2.26-13.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634580" comment="glibc-locale-2.26-13.59.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009634581" comment="glibc-locale-base-2.26-13.59.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3595" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187376">SUSE bug 1187376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3601" ref_url="https://www.suse.com/security/cve/CVE-2021-3601" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. OpenSSL does not class this issue as a security vulnerability. The trusted CA store should not contain anything that the user does not trust to issue other certificates. Notes: https://github.com/openssl/openssl/issues/5236#issuecomment-1196460611
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3601/">CVE-2021-3601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3601">CVE-2021-3601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189259">SUSE bug 1189259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3607">CVE-2021-3607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3608" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a "PVRDMA_REG_DSRHIGH" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3608">CVE-2021-3608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJIMD6XIKYMKE35TUYXKKYPX4737LEVU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    .A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3609">CVE-2021-3609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188720">SUSE bug 1188720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704910" comment="kernel-default-5.3.18-24.75.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704911" comment="kernel-default-base-5.3.18-24.75.3.9.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626892" comment="kernel-rt-5.3.18-45.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193914">SUSE bug 1193914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704930" comment="qemu-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704931" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1076-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WT3TYNEJZ7FKJMTYO3DX3Z7B2YCYPEJZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3612">CVE-2021-3612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704910" comment="kernel-default-5.3.18-24.75.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704911" comment="kernel-default-base-5.3.18-24.75.3.9.34.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626892" comment="kernel-rt-5.3.18-45.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009502.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZUSEK4W6EWPU4TCOU42FNZFNKGMKOJLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5FC5F3EO3ROUN3SV32U3TNFWTKZ6B6TA/" source="SUSE-SU"/>
    <description>
    A flaw was found in the hivex library. This flaw allows an attacker to input a specially crafted Windows Registry (hive) file, which would cause hivex to recursively call the _get_children() function, leading to a stack overflow. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3622">CVE-2021-3622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704946" comment="libhivex0-1.3.14-5.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704947" comment="perl-Win-Hivex-1.3.14-5.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1182-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YD36VO3UYG3QGTYXP2IABP7W52ZZE6X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/22SNDEWZFK4UZGGV35YI72FNLVIRJTIF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0283-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72ZRNFZ3DE3TJA7HFCVV476YJN6I4B5M/" source="SUSE-SU"/>
    <description>
    ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36222">CVE-2021-36222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009626718" comment="krb5-1.16.3-3.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3631" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009329.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H5E4Y5JNZAR2C5I2WQMIIPVYTGLK5SBC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2812-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4QAQWSVV2PRNPOI4R3VBPRTRXS5NLQ5/" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt while it generates SELinux MCS category pairs for VMs' dynamic labels. This flaw allows one exploited guest to access files labeled for another guest, resulting in the breaking out of sVirt confinement. The highest threat from this vulnerability is to confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3631">CVE-2021-3631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187871">SUSE bug 1187871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704914" comment="libvirt-daemon-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704915" comment="libvirt-daemon-driver-interface-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704916" comment="libvirt-daemon-driver-network-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704917" comment="libvirt-daemon-driver-nodedev-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704918" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704919" comment="libvirt-daemon-driver-qemu-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704920" comment="libvirt-daemon-driver-secret-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704921" comment="libvirt-daemon-driver-storage-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704922" comment="libvirt-daemon-driver-storage-core-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704923" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704924" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704925" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704926" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624910" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704927" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704928" comment="libvirt-daemon-qemu-6.0.0-13.16.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704929" comment="libvirt-libs-6.0.0-13.16.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3634" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3634" ref_url="https://www.suse.com/security/cve/CVE-2021-3634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3634/">CVE-2021-3634 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3634">CVE-2021-3634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189608">SUSE bug 1189608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336436" comment="libssh4 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3635" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3635" ref_url="https://www.suse.com/security/cve/CVE-2021-3635" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel netfilter implementation in versions prior to 5.5-rc7. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3635/">CVE-2021-3635 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3635">CVE-2021-3635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189169">SUSE bug 1189169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191530">SUSE bug 1191530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3653">CVE-2021-3653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3655">CVE-2021-3655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3656">CVE-2021-3656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3659">CVE-2021-3659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704932" comment="kernel-default-5.3.18-24.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704933" comment="kernel-default-base-5.3.18-24.78.1.9.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628046" comment="kernel-rt-5.3.18-48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3667" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009684.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1451-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2CVWPLSZA7CNFAIOW3HV4ZWDNXKWJDSE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2812-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4QAQWSVV2PRNPOI4R3VBPRTRXS5NLQ5/" source="SUSE-SU"/>
    <description>
    An improper locking issue was found in the virStoragePoolLookupByTargetPath API of libvirt. It occurs in the storagePoolLookupByTargetPath function where a locked virStoragePoolObj object is not properly released on ACL permission failure. Clients connecting to the read-write socket with limited ACL permissions could use this flaw to acquire the lock and prevent other users from accessing storage pool/volume APIs, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3667">CVE-2021-3667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188843">SUSE bug 1188843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704977" comment="libvirt-daemon-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704978" comment="libvirt-daemon-driver-interface-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704979" comment="libvirt-daemon-driver-network-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704980" comment="libvirt-daemon-driver-nodedev-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704981" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704982" comment="libvirt-daemon-driver-qemu-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704983" comment="libvirt-daemon-driver-secret-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704984" comment="libvirt-daemon-driver-storage-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704985" comment="libvirt-daemon-driver-storage-core-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704986" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704987" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704988" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704989" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652326" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704990" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704991" comment="libvirt-daemon-qemu-6.0.0-13.21.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704992" comment="libvirt-libs-6.0.0-13.21.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3669">CVE-2021-3669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704954" comment="kernel-default-5.3.18-24.86.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704955" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704956" comment="kmod-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704957" comment="kmod-compat-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704958" comment="libkmod2-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704959" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202136770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-36770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-36770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36770" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-36770" ref_url="https://www.suse.com/security/cve/CVE-2021-36770" source="SUSE CVE"/>
    <description>
    Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-36770/">CVE-2021-36770 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-36770">CVE-2021-36770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188467">SUSE bug 1188467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334114" comment="perl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336057" comment="perl-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3679" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3679">CVE-2021-3679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3682" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2789-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE3MLTPF62745SPUUDQR6ROYVP4GG6DT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2858-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGOXRRBMGRJGBNXEGPCZ3JFLXCMIM6A3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682 at SUSE</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3682">CVE-2021-3682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704934" comment="qemu-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704935" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3700" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3700" ref_url="https://www.suse.com/security/cve/CVE-2021-3700" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability was found in usbredir in versions prior to 0.11.0 in the usbredirparser_serialize() in usbredirparser/usbredirparser.c. This issue occurs when serializing large amounts of buffered write data in the case of a slow or blocked destination.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3700/">CVE-2021-3700 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3700">CVE-2021-3700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189491">SUSE bug 1189491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009878275" comment="libusbredirparser1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
    <description>
    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-14"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3711">CVE-2021-3711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189520">SUSE bug 1189520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190129">SUSE bug 1190129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192100">SUSE bug 1192100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205663">SUSE bug 1205663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704941" comment="libopenssl1_1-1.1.1d-11.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704942" comment="openssl-1_1-1.1.1d-11.27.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:0445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2966-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009467.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1188-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YXBKWFNVQ5GSDMIZHMMOGHRWWUOWZMJE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JJMNXN2ETVF67Q4UKMXBSCF2LIA5HVUH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1248-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BTAMI3TGUD3BTSIO4MHIHCP2H4HJWRWI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1261-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UE6BERTPDDZTU2D7PHOS5VANHEPO7VG4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2827-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNTTGRCRZBMWGGU4UK4PHVAAZAFABI2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2830-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YOUNRN5SCBRRVEIYDG3G3PFLGVRXKDPG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZPO3HVVYNS6WITBZKOQFXIVLJOK24MR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2994-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O65IINGUXDYQLSV7GD7SXFUKFY5WYUTA/" source="SUSE-SU"/>
    <description>
    ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3712">CVE-2021-3712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190129">SUSE bug 1190129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191640">SUSE bug 1191640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192100">SUSE bug 1192100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192787">SUSE bug 1192787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194948">SUSE bug 1194948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704943" comment="libopenssl1_1-1.1.1d-11.30.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704944" comment="openssl-1_1-1.1.1d-11.30.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3713" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ANWCSILNO3HSV5PUK6VESGM76PNM5ND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VSD5Q5DPWCTYJNLRUS2DHTA3G6VDKLMV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POCCYWA7A3O442ZTZU3JW7O7VFGCLOEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice-&gt;data3 and UASDevice-&gt;status3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3713">CVE-2021-3713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704993" comment="qemu-4.2.1-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652933" comment="qemu-arm-4.2.1-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652941" comment="qemu-ipxe-1.0.0+-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652947" comment="qemu-seabios-1.12.1+-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652948" comment="qemu-sgabios-8-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704994" comment="qemu-tools-4.2.1-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652952" comment="qemu-vgabios-1.12.1+-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652953" comment="qemu-x86-4.2.1-11.31.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3715">CVE-2021-3715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190350">SUSE bug 1190350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37159">CVE-2021-37159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705000" comment="kernel-default-5.3.18-24.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705001" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3732" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3732">CVE-2021-3732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AF3KRDWJVTDRPTV5WLKDBFKVCOCN3FB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6W7MZS6RUFRYSZTBDYHTA2EBBSY2QJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
    <description>
    There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3733">CVE-2021-3733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009660091" comment="libpython3_6m1_0-3.6.15-3.91.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660092" comment="python3-3.6.15-3.91.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660093" comment="python3-base-3.6.15-3.91.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3735" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3735" ref_url="https://www.suse.com/security/cve/CVE-2021-3735" source="SUSE CVE"/>
    <description>
    A deadlock issue was found in the AHCI controller device of QEMU. It occurs on a software reset (ahci_reset_port) while handling a host-to-device Register FIS (Frame Information Structure) packet from the guest. A privileged user inside the guest could use this flaw to hang the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3735/">CVE-2021-3735 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3735">CVE-2021-3735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189886">SUSE bug 1189886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3736" ref_url="https://www.suse.com/security/cve/CVE-2021-3736" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel. A memory leak problem was found in mbochs_ioctl in samples/vfio-mdev/mbochs.c in Virtual Function I/O (VFIO) Mediated devices. This flaw could allow a local attacker to leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3736/">CVE-2021-3736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3736">CVE-2021-3736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192345">SUSE bug 1192345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4015-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010906.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7AF3KRDWJVTDRPTV5WLKDBFKVCOCN3FB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6W7MZS6RUFRYSZTBDYHTA2EBBSY2QJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KYXM7YGLJSNOU4FYI3M2QXACCQ4SO3AE/" source="SUSE-SU"/>
    <description>
    A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3737">CVE-2021-3737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009660091" comment="libpython3_6m1_0-3.6.15-3.91.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660092" comment="python3-3.6.15-3.91.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009660093" comment="python3-base-3.6.15-3.91.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires 'CAP_SYS_ADMIN'. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3739">CVE-2021-3739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3743" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3743">CVE-2021-3743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3744">CVE-2021-3744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704954" comment="kernel-default-5.3.18-24.86.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704955" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704956" comment="kmod-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704957" comment="kmod-compat-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704958" comment="libkmod2-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704959" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3748" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020738.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ANWCSILNO3HSV5PUK6VESGM76PNM5ND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3604-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VSD5Q5DPWCTYJNLRUS2DHTA3G6VDKLMV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3605-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POCCYWA7A3O442ZTZU3JW7O7VFGCLOEA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3614-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26KPX43RJBRTCX3JER7CN7MAT4QEGAED/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the virtio-net device of QEMU. It could occur when the descriptor's address belongs to the non direct access region, due to num_buffers being set after the virtqueue elem has been unmapped. A malicious guest could use this flaw to crash QEMU, resulting in a denial of service condition, or potentially execute code on the host with the privileges of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3748">CVE-2021-3748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704993" comment="qemu-4.2.1-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652933" comment="qemu-arm-4.2.1-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652941" comment="qemu-ipxe-1.0.0+-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652947" comment="qemu-seabios-1.12.1+-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652948" comment="qemu-sgabios-8-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704994" comment="qemu-tools-4.2.1-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652952" comment="qemu-vgabios-1.12.1+-11.31.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009652953" comment="qemu-x86-4.2.1-11.31.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3752">CVE-2021-3752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704954" comment="kernel-default-5.3.18-24.86.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704955" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704956" comment="kmod-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704957" comment="kmod-compat-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704958" comment="libkmod2-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704959" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3753">CVE-2021-3753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BN7VVRY72WW4I46CQCFBKXWN6CBHKRXO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2645-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2WMUIJQF7RUSXDRXECLPMVDE6YOS5WIN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2687-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GDBOWLDJQ4K7JKRHIM7AOCKTJO5BY6C5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37576">CVE-2021-37576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190276">SUSE bug 1190276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704932" comment="kernel-default-5.3.18-24.78.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704933" comment="kernel-default-base-5.3.18-24.78.1.9.36.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009628046" comment="kernel-rt-5.3.18-48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3759" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A memory overflow vulnerability was found in the Linux kernel's ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3759">CVE-2021-3759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3760" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3760">CVE-2021-3760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010651.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1440-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O37YZAXFT5P25MP6HADS7PSL7LUNUR45/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KLPFQQ775XYJFXYC4GI3EPDN5KR7OLG7/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37600">CVE-2021-37600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704965" comment="libblkid1-2.33.2-4.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704966" comment="libfdisk1-2.33.2-4.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704967" comment="libmount1-2.33.2-4.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704968" comment="libsmartcols1-2.33.2-4.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704969" comment="libuuid1-2.33.2-4.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704970" comment="util-linux-2.33.2-4.16.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704971" comment="util-linux-systemd-2.33.2-4.16.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel's ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3764">CVE-2021-3764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194518">SUSE bug 1194518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704954" comment="kernel-default-5.3.18-24.86.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704955" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704956" comment="kmod-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704957" comment="kmod-compat-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704958" comment="libkmod2-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704959" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3772">CVE-2021-3772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202137750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-37750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-37750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3454-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018557.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHCRV6M5JSBYECPOLQFCUXBYMZFVXKCU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3454-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LN5FUC4TZVB7GKLTDOBR7UQD6W4262A/" source="SUSE-SU"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37750">CVE-2021-37750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189929">SUSE bug 1189929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704960" comment="krb5-1.16.3-3.24.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3778">CVE-2021-3778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Use After Free
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3796">CVE-2021-3796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3800" ref_url="https://www.suse.com/security/cve/CVE-2021-3800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010435.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib before version 2.63.6. Due to random charset alias, pkexec can leak content from files owned by privileged users to unprivileged ones under the right condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3800/">CVE-2021-3800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3800">CVE-2021-3800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191489">SUSE bug 1191489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336707" comment="glib2-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336708" comment="libgio-2_0-0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336711" comment="libglib-2_0-0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336713" comment="libgmodule-2_0-0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336715" comment="libgobject-2_0-0 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    ** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38160">CVE-2021-38160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38166" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38166" ref_url="https://www.suse.com/security/cve/CVE-2021-38166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38166/">CVE-2021-38166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38166">CVE-2021-38166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189233">SUSE bug 1189233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:2779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2021:2780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009333.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2689-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XORUFH2I27QQWZXGSRUKWLXW5NX5KLXA/" source="SUSE-SU"/>
		<reference ref_id="unknown" ref_url="https://lists.suse.com/pipermail/neuvector-updates/2023-November/000021.html" source="SUSE-SU"/>
    <description>
    GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38185">CVE-2021-38185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189486">SUSE bug 1189486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192364">SUSE bug 1192364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193391">SUSE bug 1193391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200733">SUSE bug 1200733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009631310" comment="cpio-2.12-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38198">CVE-2021-38198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38199" ref_url="https://www.suse.com/security/cve/CVE-2021-38199" source="SUSE CVE"/>
    <description>
    fs/nfs/nfs4client.c in the Linux kernel before 5.13.4 has incorrect connection-setup ordering, which allows operators of remote NFSv4 servers to cause a denial of service (hanging of mounts) by arranging for those servers to be unreachable during trunking detection.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38199/">CVE-2021-38199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38199">CVE-2021-38199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189265">SUSE bug 1189265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38200" ref_url="https://www.suse.com/security/cve/CVE-2021-38200" source="SUSE CVE"/>
    <description>
    arch/powerpc/perf/core-book3s.c in the Linux kernel before 5.12.13, on systems with perf_event_paranoid=-1 and no specific PMU driver support registered, allows local users to cause a denial of service (perf_instruction_pointer NULL pointer dereference and OOPS) via a "perf record" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38200/">CVE-2021-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38200">CVE-2021-38200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189276">SUSE bug 1189276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38201" ref_url="https://www.suse.com/security/cve/CVE-2021-38201" source="SUSE CVE"/>
    <description>
    net/sunrpc/xdr.c in the Linux kernel before 5.13.4 allows remote attackers to cause a denial of service (xdr_set_page_base slab-out-of-bounds access) by performing many NFS 4.2 READ_PLUS operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38201/">CVE-2021-38201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38201">CVE-2021-38201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189288">SUSE bug 1189288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38202" ref_url="https://www.suse.com/security/cve/CVE-2021-38202" source="SUSE CVE"/>
    <description>
    fs/nfsd/trace.h in the Linux kernel before 5.13.4 might allow remote attackers to cause a denial of service (out-of-bounds read in strlen) by sending NFS traffic when the trace event framework is being used for nfsd.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38202/">CVE-2021-38202 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38202">CVE-2021-38202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189289">SUSE bug 1189289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38203" ref_url="https://www.suse.com/security/cve/CVE-2021-38203" source="SUSE CVE"/>
    <description>
    btrfs in the Linux kernel before 5.13.4 allows attackers to cause a denial of service (deadlock) via processes that trigger allocation of new system chunks during times when there is a shortage of free space in the system space_info.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38203/">CVE-2021-38203 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38203">CVE-2021-38203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189290">SUSE bug 1189290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38204">CVE-2021-38204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38205">CVE-2021-38205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38206" ref_url="https://www.suse.com/security/cve/CVE-2021-38206" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 5.12.13, when a device supporting only 5 GHz is used, allows attackers to cause a denial of service (NULL pointer dereference in the radiotap parser) by injecting a frame with 802.11a rates.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38206/">CVE-2021-38206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38206">CVE-2021-38206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189296">SUSE bug 1189296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38207">CVE-2021-38207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704948" comment="kernel-default-5.3.18-24.83.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704949" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38209" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38209" ref_url="https://www.suse.com/security/cve/CVE-2021-38209" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_conntrack_standalone.c in the Linux kernel before 5.12.2 allows observation of changes in any net namespace because these changes are leaked into all other net namespaces. This is related to the NF_SYSCTL_CT_MAX, NF_SYSCTL_CT_EXPECT_MAX, and NF_SYSCTL_CT_BUCKETS sysctls.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38209/">CVE-2021-38209 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38209">CVE-2021-38209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189393">SUSE bug 1189393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38300" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38300" ref_url="https://www.suse.com/security/cve/CVE-2021-38300" source="SUSE CVE"/>
    <description>
    arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-38300/">CVE-2021-38300 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38300">CVE-2021-38300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190427">SUSE bug 1190427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38604" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38604" ref_url="https://www.suse.com/security/cve/CVE-2021-38604" source="SUSE CVE"/>
    <description>
    In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38604/">CVE-2021-38604 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38604">CVE-2021-38604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189426">SUSE bug 1189426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334828" comment="glibc-locale is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339499" comment="glibc-locale-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3864" ref_url="https://www.suse.com/security/cve/CVE-2021-3864" source="SUSE CVE"/>
    <description>
    A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3864/">CVE-2021-3864 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3864">CVE-2021-3864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191281">SUSE bug 1191281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192449">SUSE bug 1192449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205059">SUSE bug 1205059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872">CVE-2021-3872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3892" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3892" ref_url="https://www.suse.com/security/cve/CVE-2021-3892" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-18198. Reason: This candidate is a reservation duplicate of CVE-2019-18198. Notes: All CVE users should reference CVE-2019-18198 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3892/">CVE-2021-3892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3892">CVE-2021-3892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192261">SUSE bug 1192261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3896" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-3896">CVE-2021-3896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3927">CVE-2021-3927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3928" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Use of Uninitialized Variable
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3928">CVE-2021-3928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3930" ref_url="https://www.suse.com/security/cve/CVE-2021-3930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:14848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0930-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010676.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VFLDWSRMX7BN3NXC6GXAFPJLCC5D5KIJ/" source="SUSE-SU"/>
    <description>
    An off-by-one error was found in the SCSI device emulation in QEMU. It could occur while processing MODE SELECT commands in mode_sense_page() if the 'page' argument was set to MODE_PAGE_ALLS (0x3f). A malicious guest could use this flaw to potentially crash QEMU, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3930/">CVE-2021-3930 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3930">CVE-2021-3930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192525">SUSE bug 1192525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192526">SUSE bug 1192526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3947" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3947" ref_url="https://www.suse.com/security/cve/CVE-2021-3947" source="SUSE CVE"/>
    <description>
    A stack-buffer-overflow was found in QEMU in the NVME component. The flaw lies in nvme_changed_nslist() where a malicious guest controlling certain input can read out of bounds memory. A malicious user could use this flaw leading to disclosure of sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3947/">CVE-2021-3947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3947">CVE-2021-3947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192706">SUSE bug 1192706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009632.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1417-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTS45TDORJPZD3OEON7W6CTYLNX6KQ3J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2IZOG455BIMQ6NKBIPOWITV4SHIG5YT7/" source="SUSE-SU"/>
    <description>
    An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39537">CVE-2021-39537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196626">SUSE bug 1196626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704961" comment="libncurses6-6.1-5.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704962" comment="ncurses-utils-6.1-5.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704963" comment="terminfo-6.1-5.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704964" comment="terminfo-base-6.1-5.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39636" ref_url="https://www.suse.com/security/cve/CVE-2021-39636" source="SUSE CVE"/>
    <description>
    In do_ipt_get_ctl and do_ipt_set_ctl of ip_tables.c, there is a possible way to leak kernel information due to uninitialized data. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-120612905References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39636/">CVE-2021-39636 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39636">CVE-2021-39636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193812">SUSE bug 1193812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39648">CVE-2021-39648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39656" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39656" ref_url="https://www.suse.com/security/cve/CVE-2021-39656" source="SUSE CVE"/>
    <description>
    In __configfs_open_file of file.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174049066References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39656/">CVE-2021-39656 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39656">CVE-2021-39656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193862">SUSE bug 1193862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39657" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39657">CVE-2021-39657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3968" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3968" ref_url="https://www.suse.com/security/cve/CVE-2021-3968" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3968/">CVE-2021-3968 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3968">CVE-2021-3968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192902">SUSE bug 1192902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208308">SUSE bug 1208308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39685" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39685" ref_url="https://www.suse.com/security/cve/CVE-2021-39685" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39685/">CVE-2021-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39685">CVE-2021-39685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193802">SUSE bug 1193802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194459">SUSE bug 1194459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39686" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39686" ref_url="https://www.suse.com/security/cve/CVE-2021-39686" source="SUSE CVE"/>
    <description>
    In several functions of binder.c, there is a possible way to represent the wrong domain to SELinux due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-200688826References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39686/">CVE-2021-39686 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39686">CVE-2021-39686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196954">SUSE bug 1196954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39698" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In aio_poll_complete_work of aio.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-185125206References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39714" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39714" ref_url="https://www.suse.com/security/cve/CVE-2021-39714" source="SUSE CVE"/>
    <description>
    In ion_buffer_kmap_get of ion.c, there is a possible use-after-free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205573273References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39714/">CVE-2021-39714 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39714">CVE-2021-39714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197214">SUSE bug 1197214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197218">SUSE bug 1197218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39715" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39715" ref_url="https://www.suse.com/security/cve/CVE-2021-39715" source="SUSE CVE"/>
    <description>
    In __show_regs of process.c, there is a possible leak of kernel memory and addresses due to log information disclosure. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-178379135References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39715/">CVE-2021-39715 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39715">CVE-2021-39715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197210">SUSE bug 1197210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39725" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39725" ref_url="https://www.suse.com/security/cve/CVE-2021-39725" source="SUSE CVE"/>
    <description>
    In gasket_free_coherent_memory_all of gasket_page_table.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151454974References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39725/">CVE-2021-39725 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39725">CVE-2021-39725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197206">SUSE bug 1197206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3973" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3973" ref_url="https://www.suse.com/security/cve/CVE-2021-3973" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-3973/">CVE-2021-3973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3973">CVE-2021-3973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192903">SUSE bug 1192903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208308">SUSE bug 1208308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39735" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39735" ref_url="https://www.suse.com/security/cve/CVE-2021-39735" source="SUSE CVE"/>
    <description>
    In gasket_alloc_coherent_memory of gasket_page_table.c, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-151455484References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39735/">CVE-2021-39735 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39735">CVE-2021-39735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197205">SUSE bug 1197205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3975" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0045-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010027.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in libvirt. The qemuMonitorUnregister() function in qemuProcessHandleMonitorEOF is called using multiple threads without being adequately protected by a monitor lock. This flaw could be triggered by the virConnectGetAllDomainStats API when the guest is shutting down. An unprivileged client with a read-only connection could use this flaw to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3975">CVE-2021-3975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662009" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662012" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662015" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662016" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662017" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662018" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662019" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662020" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662021" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662022" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662023" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662024" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662025" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662026" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662027" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662030" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662034" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39792" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39792" ref_url="https://www.suse.com/security/cve/CVE-2021-39792" source="SUSE CVE"/>
    <description>
    In usb_gadget_giveback_request of core.c, there is a possible use after free out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161010552References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39792/">CVE-2021-39792 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39792">CVE-2021-39792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197203">SUSE bug 1197203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39800" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39800" ref_url="https://www.suse.com/security/cve/CVE-2021-39800" source="SUSE CVE"/>
    <description>
    In ion_ioctl of ion-ioctl.c, there is a possible way to leak kernel head data due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-208277166References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39800/">CVE-2021-39800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39800">CVE-2021-39800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198444">SUSE bug 1198444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39801" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39801" ref_url="https://www.suse.com/security/cve/CVE-2021-39801" source="SUSE CVE"/>
    <description>
    In ion_ioctl of ion-ioctl.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-209791720References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39801/">CVE-2021-39801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39801">CVE-2021-39801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198443">SUSE bug 1198443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202139802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-39802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-39802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39802" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-39802" ref_url="https://www.suse.com/security/cve/CVE-2021-39802" source="SUSE CVE"/>
    <description>
    In change_pte_range of mprotect.c , there is a possible way to make a shared mmap writable due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213339151References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39802/">CVE-2021-39802 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39802">CVE-2021-39802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198445">SUSE bug 1198445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3981" ref_url="https://www.suse.com/security/cve/CVE-2021-3981" source="SUSE CVE"/>
    <description>
    A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3981/">CVE-2021-3981 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189644">SUSE bug 1189644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198244">SUSE bug 1198244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338902" comment="grub2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339065" comment="grub2-arm64-efi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338904" comment="grub2-i386-pc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338906" comment="grub2-snapper-plugin is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338908" comment="grub2-x86_64-efi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338909" comment="grub2-x86_64-xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3984">CVE-2021-3984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3995" ref_url="https://www.suse.com/security/cve/CVE-2021-3995" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0727-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0727-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUBUSLRBG42MLRL65HHMLIWQIKS3SKKP/" source="SUSE-SU"/>
    <description>
    A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3995/">CVE-2021-3995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3995">CVE-2021-3995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194976">SUSE bug 1194976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009337634" comment="libblkid1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664921" comment="libfdisk1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664923" comment="libmount1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664926" comment="libsmartcols1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337635" comment="libuuid1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334326" comment="util-linux is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3996" ref_url="https://www.suse.com/security/cve/CVE-2021-3996" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0727-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0727-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GUBUSLRBG42MLRL65HHMLIWQIKS3SKKP/" source="SUSE-SU"/>
    <description>
    A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3996/">CVE-2021-3996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3996">CVE-2021-3996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194976">SUSE bug 1194976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009337634" comment="libblkid1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664921" comment="libfdisk1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664923" comment="libmount1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664926" comment="libsmartcols1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337635" comment="libuuid1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334326" comment="util-linux is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3997" ref_url="https://www.suse.com/security/cve/CVE-2021-3997" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:39-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010281.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BMN5QRPEKDGOKDHBMC6SXHPA733I43MV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0539-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VLDAI5QR7ALPYFJ4GNL2TIX7IMLOLXUU/" source="SUSE-SU"/>
    <description>
    A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3997/">CVE-2021-3997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3997">CVE-2021-3997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194178">SUSE bug 1194178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009336434" comment="libsystemd0 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335309" comment="libudev1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334001" comment="systemd is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009624596" comment="systemd-container is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335313" comment="systemd-sysvinit is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335314" comment="udev is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3998" ref_url="https://www.suse.com/security/cve/CVE-2021-3998" source="SUSE CVE"/>
    <description>
    A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3998/">CVE-2021-3998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3998">CVE-2021-3998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194620">SUSE bug 1194620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333938" comment="glibc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334828" comment="glibc-locale is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339499" comment="glibc-locale-base is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
    <description>
    A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3999">CVE-2021-3999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196024">SUSE bug 1196024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196389">SUSE bug 1196389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199869">SUSE bug 1199869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200203">SUSE bug 1200203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669024" comment="glibc-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669032" comment="glibc-locale-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669033" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4001" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010553.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. This flaw affects kernel versions prior to 5.16 rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4001">CVE-2021-4001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192991">SUSE bug 1192991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A memory leak flaw in the Linux kernel's hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4002">CVE-2021-4002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192973">SUSE bug 1192973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4019">CVE-2021-4019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4023" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4023" ref_url="https://www.suse.com/security/cve/CVE-2021-4023" source="SUSE CVE"/>
    <description>
    A flaw was found in the io-workqueue implementation in the Linux kernel versions prior to 5.15-rc1. The kernel can panic when an improper cancellation operation triggers the submission of new io-uring operations during a shortage of free space. This flaw allows a local user with permissions to execute io-uring requests to possibly crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4023/">CVE-2021-4023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4023">CVE-2021-4023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193107">SUSE bug 1193107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10289" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193166">SUSE bug 1193166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009343329" comment="podman is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009343330" comment="podman-cni-config is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4028" ref_url="https://www.suse.com/security/cve/CVE-2021-4028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
    <description>
    A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4028/">CVE-2021-4028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4028">CVE-2021-4028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193167">SUSE bug 1193167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193529">SUSE bug 1193529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4032" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4032" ref_url="https://www.suse.com/security/cve/CVE-2021-4032" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the Linux kernel's KVM subsystem in arch/x86/kvm/lapic.c kvm_free_lapic when a failure allocation was detected. In this flaw the KVM subsystem may crash the kernel due to mishandling of memory errors that happens during VCPU construction, which allows an attacker with special user privilege to cause a denial of service. This flaw affects kernel versions prior to 5.15 rc7.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4032/">CVE-2021-4032 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4032">CVE-2021-4032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193187">SUSE bug 1193187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010075.html" source="SUSE-SU"/>
		<reference ref_id="TID000020564" ref_url="https://www.suse.com/support/kb/doc/?id=000020564" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0190-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGEROI6PUOTOXKFIH2MPKUQ3PI6VWLXQ/" source="SUSE-SU"/>
    <description>
    A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4034">CVE-2021-4034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195125">SUSE bug 1195125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195136">SUSE bug 1195136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195246">SUSE bug 1195246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195265">SUSE bug 1195265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195278">SUSE bug 1195278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195528">SUSE bug 1195528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195541">SUSE bug 1195541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196165">SUSE bug 1196165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196388">SUSE bug 1196388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225668">SUSE bug 1225668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664559" comment="libpolkit0-0.116-3.6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664560" comment="polkit-0.116-3.6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4044" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4044" ref_url="https://www.suse.com/security/cve/CVE-2021-4044" source="SUSE CVE"/>
    <description>
    Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4044/">CVE-2021-4044 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4044">CVE-2021-4044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193740">SUSE bug 1193740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1357-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SS5B6JL55TTUNHHOGTFHK5JQ6EZOF7ZV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JSK2K2OLYKIFCAMBX4QB7AGV6SKS3BTM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H64LCXMISTZ7YB7R4ABO2Y73X23DJFXU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MHXVHXC6JGHDS7W6EJQF3JKAPVYH3ES5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IAN74FTXJ7PFHCBV6YMLTPNW7VFYCPFV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40490">CVE-2021-40490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192775">SUSE bug 1192775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704954" comment="kernel-default-5.3.18-24.86.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704955" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704956" comment="kmod-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704957" comment="kmod-compat-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704958" comment="libkmod2-25-6.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704959" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system. This flaw affects Linux kernel versions prior to 5.16-rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4083">CVE-2021-4083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4090" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4090" ref_url="https://www.suse.com/security/cve/CVE-2021-4090" source="SUSE CVE"/>
    <description>
    An out-of-bounds (OOB) memory write flaw was found in the NFSD in the Linux kernel. Missing sanity may lead to a write beyond bmval[bmlen-1] in nfsd4_decode_bitmap4 in fs/nfsd/nfs4xdr.c. In this flaw, a local attacker with user privilege may gain access to out-of-bounds memory, leading to a system integrity and confidentiality threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4090/">CVE-2021-4090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4090">CVE-2021-4090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193663">SUSE bug 1193663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4093" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4093" ref_url="https://www.suse.com/security/cve/CVE-2021-4093" source="SUSE CVE"/>
    <description>
    A flaw was found in the KVM's AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4093/">CVE-2021-4093 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4093">CVE-2021-4093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193716">SUSE bug 1193716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4095" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4095" ref_url="https://www.suse.com/security/cve/CVE-2021-4095" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference was found in the Linux kernel's KVM when dirty ring logging is enabled without an active vCPU context. An unprivileged local attacker on the host may use this flaw to cause a kernel oops condition and thus a denial of service by issuing a KVM_XEN_HVM_SET_ATTR ioctl. This flaw affects Linux kernel versions prior to 5.17-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4095/">CVE-2021-4095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4095">CVE-2021-4095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193769">SUSE bug 1193769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41073" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41073" ref_url="https://www.suse.com/security/cve/CVE-2021-41073" source="SUSE CVE"/>
    <description>
    loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer, as demonstrated by using /proc/&lt;pid&gt;/maps for exploitation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41073/">CVE-2021-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41073">CVE-2021-41073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190664">SUSE bug 1190664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where attempting to copy files using `docker cp` into a specially-crafted container can result in Unix file permission changes for existing files in the host's filesystem, widening access to others. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers do not need to be restarted.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41089">CVE-2021-41089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191015">SUSE bug 1191015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705036" comment="containerd-1.4.12-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705037" comment="docker-20.10.12_ce-159.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651739" comment="runc-1.0.2-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where the data directory (typically `/var/lib/docker`) contained subdirectories with insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as `setuid`), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This bug has been fixed in Moby (Docker Engine) 20.10.9. Users should update to this version as soon as possible. Running containers should be stopped and restarted for the permissions to be fixed. For users unable to upgrade limit access to the host to trusted users. Limit access to host volumes to trusted containers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41091">CVE-2021-41091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191434">SUSE bug 1191434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705036" comment="containerd-1.4.12-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705037" comment="docker-20.10.12_ce-159.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651739" comment="runc-1.0.2-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41092" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41092">CVE-2021-41092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191334">SUSE bug 1191334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705036" comment="containerd-1.4.12-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705037" comment="docker-20.10.12_ce-159.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651739" comment="runc-1.0.2-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41103" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1404-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7ADRJZ4HKOCVZC5ZKIM4MD6EZEHBNB3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3506-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NP4XGHFKECRFSI6UYXER53KXVGP66EHQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
    <description>
    containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update directory permission on container bundles directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41103">CVE-2021-41103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191121">SUSE bug 1191121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705036" comment="containerd-1.4.12-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705037" comment="docker-20.10.12_ce-159.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651739" comment="runc-1.0.2-23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4115" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0525-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0525-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6R7S5GYVKZ4LZLTJ5KNEDZRGJISXBAZ/" source="SUSE-SU"/>
    <description>
    There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4115">CVE-2021-4115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195542">SUSE bug 1195542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705038" comment="libpolkit0-0.116-3.9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705039" comment="polkit-0.116-3.9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41190" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41190" ref_url="https://www.suse.com/security/cve/CVE-2021-41190" source="SUSE CVE"/>
		<reference ref_id="GHSA-qq97-vm5h-rrhg" ref_url="https://github.com/distribution/distribution/security/advisories//GHSA-qq97-vm5h-rrhg" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1525-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L3AGIEOXZIUUEYYMWKJCJCQI7V235UTR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULRUJXC3YBVKDKJAERWLY6BKJ7U3246G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both "manifests" and "layers" fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently. The OCI Distribution Specification has been updated to require that a mediaType value present in a manifest or index match the Content-Type header used during the push and pull operations. Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both "manifests" and "layers" fields or "manifests" and "config" fields if they are unable to update to version 1.0.1 of the spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41190/">CVE-2021-41190 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41190">CVE-2021-41190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193273">SUSE bug 1193273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705036" comment="containerd-1.4.12-60.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705037" comment="docker-20.10.12_ce-159.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4122" ref_url="https://www.suse.com/security/cve/CVE-2021-4122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0144-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ILTMKWZNQBSX2H2MPF3XKXVDEDPDYAIB/" source="SUSE-SU"/>
    <description>
    It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4122/">CVE-2021-4122 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4122">CVE-2021-4122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194469">SUSE bug 1194469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009339165" comment="cryptsetup is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339166" comment="libcryptsetup12 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41229" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41229" ref_url="https://www.suse.com/security/cve/CVE-2021-41229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
    <description>
    BlueZ is a Bluetooth protocol stack for Linux. In affected versions a vulnerability exists in sdp_cstate_alloc_buf which allocates memory which will always be hung in the singly linked list of cstates and will not be freed. This will cause a memory leak over time. The data can be a very large object, which can be caused by an attacker continuously sending sdp packets and this may cause the service of the target device to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41229/">CVE-2021-41229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41229">CVE-2021-41229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192760">SUSE bug 1192760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336474" comment="libbluetooth3 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A memory leak vulnerability was found in the Linux kernel's eBPF for the Simulated networking device driver in the way user uses BPF for the device such that function nsim_map_alloc_elem being called. A local user could use this flaw to get unauthorized access to some data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4135">CVE-2021-4135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4136" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4136" ref_url="https://www.suse.com/security/cve/CVE-2021-4136" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4136/">CVE-2021-4136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4136">CVE-2021-4136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193905">SUSE bug 1193905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208308">SUSE bug 1208308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4145" ref_url="https://www.suse.com/security/cve/CVE-2021-4145" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference issue was found in the block mirror layer of QEMU in versions prior to 6.2.0. The `self` pointer is dereferenced in mirror_wait_on_conflicts() without ensuring that it's not NULL. A malicious unprivileged user within the guest could use this flaw to crash the QEMU process on the host when writing data reaches the threshold of mirroring node.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4145/">CVE-2021-4145 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4145">CVE-2021-4145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193995">SUSE bug 1193995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0045-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4GRZCYHIJFWN3FE3P7JJYRY7F7UO2HTA/" source="SUSE-SU"/>
    <description>
    A flaw was found in the libvirt libxl driver. A malicious guest could continuously reboot itself and cause libvirtd on the host to deadlock or crash, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4147">CVE-2021-4147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194313">SUSE bug 1194313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009662009" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662012" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662015" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662016" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662017" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662018" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662019" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662020" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662021" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662022" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662023" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662024" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662025" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662026" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662027" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662030" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662034" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel's block_invalidatepage in fs/buffer.c in the filesystem. A missing sanity check may allow a local attacker with user privilege to cause a denial of service (DOS) problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4149">CVE-2021-4149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4150" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4150" ref_url="https://www.suse.com/security/cve/CVE-2021-4150" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the add_partition in block/partitions/core.c in the Linux kernel. A local attacker with user privileges could cause a denial of service on the system. The issue results from the lack of code cleanup when device_add call fails when adding a partition to the disk.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4150/">CVE-2021-4150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4150">CVE-2021-4150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193994">SUSE bug 1193994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v1.c in the Linux kernel's cgroup v1 parser. A local attacker with a user privilege could cause a privilege escalation by exploiting the fsconfig syscall parameter leading to a container breakout and a denial of service on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4154">CVE-2021-4154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193842">SUSE bug 1193842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4158" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4158" ref_url="https://www.suse.com/security/cve/CVE-2021-4158" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4158/">CVE-2021-4158 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4158">CVE-2021-4158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194063">SUSE bug 1194063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4160" ref_url="https://www.suse.com/security/cve/CVE-2021-4160" source="SUSE CVE"/>
    <description>
    There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4160/">CVE-2021-4160 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4160">CVE-2021-4160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195379">SUSE bug 1195379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BEK24NI33V77MMNQQN72LO2RGAF23X76/" source="SUSE-SU"/>
    <description>
    sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41617">CVE-2021-41617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193497">SUSE bug 1193497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196721">SUSE bug 1196721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200782">SUSE bug 1200782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205056">SUSE bug 1205056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212247">SUSE bug 1212247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212281">SUSE bug 1212281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671497" comment="openssh-8.1p1-5.21.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4173" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4173" ref_url="https://www.suse.com/security/cve/CVE-2021-4173" source="SUSE CVE"/>
    <description>
    vim is vulnerable to Use After Free
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4173/">CVE-2021-4173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4173">CVE-2021-4173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194108">SUSE bug 1194108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41816" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41816" ref_url="https://www.suse.com/security/cve/CVE-2021-41816" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41816/">CVE-2021-41816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41816">CVE-2021-41816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193080">SUSE bug 1193080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009348236" comment="libruby2_5-2_5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348228" comment="ruby2.5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348239" comment="ruby2.5-stdlib is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41817" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41864">CVE-2021-41864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4187" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4187" ref_url="https://www.suse.com/security/cve/CVE-2021-4187" source="SUSE CVE"/>
    <description>
    vim is vulnerable to Use After Free
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-4187/">CVE-2021-4187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4187">CVE-2021-4187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194301">SUSE bug 1194301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Out-of-bounds Read
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193">CVE-2021-4193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4197">CVE-2021-4197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42008" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42008">CVE-2021-42008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191660">SUSE bug 1191660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nci_request in net/nfc/nci/core.c in NFC Controller Interface (NCI) in the Linux kernel. This flaw could allow a local attacker with user privileges to cause a data race problem while the device is getting removed, leading to a privilege escalation problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4202">CVE-2021-4202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4204" ref_url="https://www.suse.com/security/cve/CVE-2021-4204" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4204/">CVE-2021-4204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4206" ref_url="https://www.suse.com/security/cve/CVE-2021-4206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015047.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QXL display device emulation in QEMU. An integer overflow in the cursor_alloc() function can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. This flaw allows a malicious privileged guest user to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4206/">CVE-2021-4206 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4206">CVE-2021-4206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198035">SUSE bug 1198035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211582">SUSE bug 1211582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4207" ref_url="https://www.suse.com/security/cve/CVE-2021-4207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030627.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QXL display device emulation in QEMU. A double fetch of guest controlled values `cursor-&gt;header.width` and `cursor-&gt;header.height` can lead to the allocation of a small cursor object followed by a subsequent heap-based buffer overflow. A malicious privileged guest user could use this flaw to crash the QEMU process on the host or potentially execute arbitrary code within the context of the QEMU process.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4207/">CVE-2021-4207 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4207">CVE-2021-4207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198037">SUSE bug 1198037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334819" comment="xen-libs is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4209" ref_url="https://www.suse.com/security/cve/CVE-2021-4209" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011930.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0717-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RI5PFWTNO6UDYFJ3HLMKV5PQYAJ77E46/" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4209/">CVE-2021-4209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4209">CVE-2021-4209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196167">SUSE bug 1196167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705040" comment="libgnutls30-3.6.7-14.16.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4218" ref_url="https://www.suse.com/security/cve/CVE-2021-4218" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's implementation of reading the SVC RDMA counters. Reading the counter sysctl panics the system. This flaw allows a local attacker with local access to cause a denial of service while the system reboots. The issue is specific to CentOS/RHEL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4218/">CVE-2021-4218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4218">CVE-2021-4218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195374">SUSE bug 1195374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42252" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42252">CVE-2021-42252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192444">SUSE bug 1192444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42327" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42327" ref_url="https://www.suse.com/security/cve/CVE-2021-42327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    dp_link_settings_write in drivers/gpu/drm/amd/display/amdgpu_dm/amdgpu_dm_debugfs.c in the Linux kernel through 5.14.14 allows a heap-based buffer overflow by an attacker who can write a string to the AMD GPU display drivers debug filesystem. There are no checks on size within parse_write_buffer_into_params when it uses the size of copy_from_user to copy a userspace buffer into a 40-byte heap buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42327/">CVE-2021-42327 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010184.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42739">CVE-2021-42739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196722">SUSE bug 1196722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42771" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012537.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1553-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAKYSLN4RPESEDQ7LN7KPRMYQUFA4SYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3M6C27L6BK2YIQKO3YT5OHAJOGRYCEHB/" source="SUSE-SU"/>
    <description>
    Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42771">CVE-2021-42771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658530" comment="python3-Babel-2.8.0-3.3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MLGTNISZMAYBWA26GZHGZYQYWHM3VSZI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1477-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J325P6NPH7BF7P7B3LO6FGQNCTFNGKEW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDPFUBRGNGPD3YZQTYFCSNGZKH75ZKUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3655-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ET2XZDZ74SKULHCBR4GCFG3KJRMSHJQQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009704995" comment="kernel-default-5.3.18-24.93.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009704996" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43057" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43057" ref_url="https://www.suse.com/security/cve/CVE-2021-43057" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.14.8. A use-after-free in selinux_ptrace_traceme (aka the SELinux handler for PTRACE_TRACEME) could be used by local attackers to cause memory corruption and escalate privileges, aka CID-a3727a8bac0a. This occurs because of an attempt to access the subjective credentials of another task.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43057/">CVE-2021-43057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43057">CVE-2021-43057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192260">SUSE bug 1192260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43085" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43085" ref_url="https://www.suse.com/security/cve/CVE-2021-43085" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43085/">CVE-2021-43085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-43085">CVE-2021-43085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197505">SUSE bug 1197505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43267" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43267" ref_url="https://www.suse.com/security/cve/CVE-2021-43267" source="SUSE CVE"/>
    <description>
    An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16. The Transparent Inter-Process Communication (TIPC) functionality allows remote attackers to exploit insufficient validation of user-supplied sizes for the MSG_CRYPTO message type.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43267/">CVE-2021-43267 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43267">CVE-2021-43267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192341">SUSE bug 1192341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43389" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1501-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3675-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3806-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43389">CVE-2021-43389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009705000" comment="kernel-default-5.3.18-24.96.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705001" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43519" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43519" ref_url="https://www.suse.com/security/cve/CVE-2021-43519" source="SUSE CVE"/>
    <description>
    Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43519/">CVE-2021-43519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43519">CVE-2021-43519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192613">SUSE bug 1192613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348261" comment="liblua5_3-5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011639.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SZRKUBO5D2JZTQ5VCQBSEGXEMFC4D5FB/" source="SUSE-SU"/>
    <description>
    NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS &lt; 3.73 and NSS &lt; 3.68.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193331">SUSE bug 1193331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193378">SUSE bug 1193378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199301">SUSE bug 1199301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225630">SUSE bug 1225630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009659044" comment="libfreebl3-3.68.1-3.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659046" comment="libsoftokn3-3.68.1-3.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659048" comment="mozilla-nss-3.68.1-3.61.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659049" comment="mozilla-nss-certs-3.68.1-3.61.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:33-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:34-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:35-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:38-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PH3Q2TLVW235XFTNU2563GON62BFYPLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0526-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4HOBR6WV7O5C5LLCJ6DZK4KZKG37EDV4/" source="SUSE-SU"/>
    <description>
    The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43565">CVE-2021-43565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681381" comment="containerd-1.5.11-150000.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681382" comment="docker-20.10.14_ce-150000.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:27-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1569-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B57NW5VYILA46TZMVY3NWIAZTPRTGTXJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R45QGO5IGOQU6FDWBSNSZHXXXTFJHN5O/" source="SUSE-SU"/>
    <description>
    GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705003" comment="libgmp10-6.1.2-4.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCIUJE3F5UEWI5TYYL5CQ7SCQZU5V76Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6DD7LA7CG2OYZJT2SOA3MHVO7GOW3ANO/" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">CVE-2021-43784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193436">SUSE bug 1193436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009659270" comment="runc-1.0.3-27.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43816" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43816" ref_url="https://www.suse.com/security/cve/CVE-2021-43816" source="SUSE CVE"/>
    <description>
    containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43816/">CVE-2021-43816 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43816">CVE-2021-43816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194359">SUSE bug 1194359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009663792" comment="containerd is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43975">CVE-2021-43975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43976">CVE-2021-43976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4440" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4440" ref_url="https://www.suse.com/security/cve/CVE-2021-4440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/xen: Drop USERGS_SYSRET64 paravirt call

commit afd30525a659ac0ae0904f0cb4a2ca75522c3123 upstream.

USERGS_SYSRET64 is used to return from a syscall via SYSRET, but
a Xen PV guest will nevertheless use the IRET hypercall, as there
is no sysret PV hypercall defined.

So instead of testing all the prerequisites for doing a sysret and
then mangling the stack for Xen PV again for doing an iret just use
the iret exit from the beginning.

This can easily be done via an ALTERNATIVE like it is done for the
sysenter compat case already.

It should be noted that this drops the optimization in Xen for not
restoring a few registers when returning to user mode, but it seems
as if the saved instructions in the kernel more than compensate for
this drop (a kernel build in a Xen PV guest was slightly faster with
this patch applied).

While at it remove the stale sysret32 remnants.

  [ pawan: Brad Spengler and Salvatore Bonaccorso &lt;carnil@debian.org&gt;
	   reported a problem with the 5.10 backport commit edc702b4a820
	   ("x86/entry_64: Add VERW just before userspace transition").

	   When CONFIG_PARAVIRT_XXL=y, CLEAR_CPU_BUFFERS is not executed in
	   syscall_return_via_sysret path as USERGS_SYSRET64 is runtime
	   patched to:

	.cpu_usergs_sysret64    = { 0x0f, 0x01, 0xf8,
				    0x48, 0x0f, 0x07 }, // swapgs; sysretq

	   which is missing CLEAR_CPU_BUFFERS. It turns out dropping
	   USERGS_SYSRET64 simplifies the code, allowing CLEAR_CPU_BUFFERS
	   to be explicitly added to syscall_return_via_sysret path. Below
	   is with CONFIG_PARAVIRT_XXL=y and this patch applied:

	   syscall_return_via_sysret:
	   ...
	   &lt;+342&gt;:   swapgs
	   &lt;+345&gt;:   xchg   %ax,%ax
	   &lt;+347&gt;:   verw   -0x1a2(%rip)  &lt;------
	   &lt;+354&gt;:   sysretq
  ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4440/">CVE-2021-4440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-4440">CVE-2021-4440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227069">SUSE bug 1227069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()

In zynq_qspi_exec_mem_op(), kzalloc() is directly used in memset(),
which could lead to a NULL pointer dereference on failure of
kzalloc().

Fix this bug by adding a check of tmpbuf.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_SPI_ZYNQ_QSPI=m show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4442" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4442" ref_url="https://www.suse.com/security/cve/CVE-2021-4442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: add sanity tests to TCP_QUEUE_SEQ

Qingyu Li reported a syzkaller bug where the repro
changes RCV SEQ _after_ restoring data in the receive queue.

mprotect(0x4aa000, 12288, PROT_READ)    = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
socket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3
setsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0
connect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, "::1", &amp;sin6_addr), sin6_scope_id=0}, 28) = 0
setsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0
sendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="0x0000000000000003\0\0", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20
setsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0
setsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0
recvfrom(3, NULL, 20, 0, NULL, NULL)    = -1 ECONNRESET (Connection reset by peer)

syslog shows:
[  111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0
[  111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0

This should not be allowed. TCP_QUEUE_SEQ should only be used
when queues are empty.

This patch fixes this case, and the tx path as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2024-10-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4442/">CVE-2021-4442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4442">CVE-2021-4442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229912">SUSE bug 1229912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44568" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44568" ref_url="https://www.suse.com/security/cve/CVE-2021-44568" source="SUSE CVE"/>
    <description>
    Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 &amp; line 1995), which could cause a remote Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44568/">CVE-2021-44568 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44568">CVE-2021-44568 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44569" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44569" ref_url="https://www.suse.com/security/cve/CVE-2021-44569" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44569/">CVE-2021-44569 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44569">CVE-2021-44569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44570" ref_url="https://www.suse.com/security/cve/CVE-2021-44570" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44570/">CVE-2021-44570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44570">CVE-2021-44570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44571" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44571" ref_url="https://www.suse.com/security/cve/CVE-2021-44571" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44571/">CVE-2021-44571 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44571">CVE-2021-44571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44573" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44573" ref_url="https://www.suse.com/security/cve/CVE-2021-44573" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44573/">CVE-2021-44573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44573">CVE-2021-44573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44574" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44574" ref_url="https://www.suse.com/security/cve/CVE-2021-44574" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44574/">CVE-2021-44574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44574">CVE-2021-44574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44575" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44575" ref_url="https://www.suse.com/security/cve/CVE-2021-44575" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44575/">CVE-2021-44575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44575">CVE-2021-44575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44576" ref_url="https://www.suse.com/security/cve/CVE-2021-44576" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44576/">CVE-2021-44576 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44576">CVE-2021-44576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44577" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44577" ref_url="https://www.suse.com/security/cve/CVE-2021-44577" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-3200 Reason: This candidate is a duplicate of CVE-2021-3200. Notes: All CVE users should reference CVE-2021-3200 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-44577/">CVE-2021-44577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44577">CVE-2021-44577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196288">SUSE bug 1196288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009336106" comment="libsolv-tools is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44647" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44647" ref_url="https://www.suse.com/security/cve/CVE-2021-44647" source="SUSE CVE"/>
    <description>
    Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-44647/">CVE-2021-44647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44647">CVE-2021-44647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194575">SUSE bug 1194575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348261" comment="liblua5_3-5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44733" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44733">CVE-2021-44733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44879" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44879">CVE-2021-44879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44964" ref_url="https://www.suse.com/security/cve/CVE-2021-44964" source="SUSE CVE"/>
    <description>
    Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44964/">CVE-2021-44964 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44964">CVE-2021-44964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197165">SUSE bug 1197165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348261" comment="liblua5_3-5 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45095" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45095">CVE-2021-45095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45100" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45100" ref_url="https://www.suse.com/security/cve/CVE-2021-45100" source="SUSE CVE"/>
    <description>
    The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-45100/">CVE-2021-45100 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45100">CVE-2021-45100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193865">SUSE bug 1193865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45402" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45402" ref_url="https://www.suse.com/security/cve/CVE-2021-45402" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a "pointer leak."
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45402/">CVE-2021-45402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45402">CVE-2021-45402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196130">SUSE bug 1196130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45469" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45469" ref_url="https://www.suse.com/security/cve/CVE-2021-45469" source="SUSE CVE"/>
    <description>
    In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11, there is an out-of-bounds memory access when an inode has an invalid last xattr entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45469/">CVE-2021-45469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45469">CVE-2021-45469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194060">SUSE bug 1194060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194462">SUSE bug 1194462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45480" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45480" ref_url="https://www.suse.com/security/cve/CVE-2021-45480" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45480/">CVE-2021-45480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45480">CVE-2021-45480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194090">SUSE bug 1194090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
    <description>
    In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45485">CVE-2021-45485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6QFPACQDVZMSNEBMXPO5WA2LCCPKDKR2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZDQSQYHYML6BZRVAEZ7TDW2LFGCJEZO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    In the IPv4 implementation in the Linux kernel before 5.12.4, net/ipv4/route.c has an information leak because the hash table is very small.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45486">CVE-2021-45486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45868">CVE-2021-45868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45931" ref_url="https://www.suse.com/security/cve/CVE-2021-45931" source="SUSE CVE"/>
    <description>
    HarfBuzz 2.9.0 has an out-of-bounds write in hb_bit_set_invertible_t::set (called from hb_sparseset_t&lt;hb_bit_set_invertible_t&gt;::set and hb_set_copy).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45931/">CVE-2021-45931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45931">CVE-2021-45931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194218">SUSE bug 1194218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338893" comment="libharfbuzz0 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45960">CVE-2021-45960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46059" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46059">CVE-2021-46059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46143">CVE-2021-46143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196387">SUSE bug 1196387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46283" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46283" ref_url="https://www.suse.com/security/cve/CVE-2021-46283" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
    <description>
    nf_tables_newset in net/netfilter/nf_tables_api.c in the Linux kernel before 5.12.13 allows local users to cause a denial of service (NULL pointer dereference and general protection fault) because of the missing initialization for nft_set_elem_expr_alloc. A local user can set a netfilter table expression in their own namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46283/">CVE-2021-46283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46283">CVE-2021-46283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194518">SUSE bug 1194518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46705" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46705" ref_url="https://www.suse.com/security/cve/CVE-2021-46705" source="SUSE CVE"/>
    <description>
    A Insecure Temporary File vulnerability in grub-once of grub2 in SUSE Linux Enterprise Server 15 SP4, openSUSE Factory allows local attackers to truncate arbitrary files. This issue affects: SUSE Linux Enterprise Server 15 SP4 grub2 versions prior to 2.06-150400.7.1. SUSE openSUSE Factory grub2 versions prior to 2.06-18.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46705/">CVE-2021-46705 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46705">CVE-2021-46705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190474">SUSE bug 1190474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338902" comment="grub2 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009339065" comment="grub2-arm64-efi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338904" comment="grub2-i386-pc is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338906" comment="grub2-snapper-plugin is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338908" comment="grub2-x86_64-efi is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338909" comment="grub2-x86_64-xen is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46905" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46905" ref_url="https://www.suse.com/security/cve/CVE-2021-46905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hso: fix NULL-deref on disconnect regression

Commit 8a12f8836145 ("net: hso: fix null-ptr-deref during tty device
unregistration") fixed the racy minor allocation reported by syzbot, but
introduced an unconditional NULL-pointer dereference on every disconnect
instead.

Specifically, the serial device table must no longer be accessed after
the minor has been released by hso_serial_tty_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46905/">CVE-2021-46905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46905">CVE-2021-46905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220418">SUSE bug 1220418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46907" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46907" ref_url="https://www.suse.com/security/cve/CVE-2021-46907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46907/">CVE-2021-46907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46907">CVE-2021-46907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220422">SUSE bug 1220422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46908" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46908" ref_url="https://www.suse.com/security/cve/CVE-2021-46908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Use correct permission flag for mixed signed bounds arithmetic

We forbid adding unknown scalars with mixed signed bounds due to the
spectre v1 masking mitigation. Hence this also needs bypass_spec_v1
flag instead of allow_ptr_leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46908/">CVE-2021-46908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46908">CVE-2021-46908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220425">SUSE bug 1220425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46909" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46909" ref_url="https://www.suse.com/security/cve/CVE-2021-46909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: footbridge: fix PCI interrupt mapping

Since commit 30fdfb929e82 ("PCI: Add a call to pci_assign_irq() in
pci_device_probe()"), the PCI code will call the IRQ mapping function
whenever a PCI driver is probed. If these are marked as __init, this
causes an oops if a PCI driver is loaded or bound after the kernel has
initialised.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46909/">CVE-2021-46909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46909">CVE-2021-46909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220442">SUSE bug 1220442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46910" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46910" ref_url="https://www.suse.com/security/cve/CVE-2021-46910" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled

The debugging code for kmap_local() doubles the number of per-CPU fixmap
slots allocated for kmap_local(), in order to use half of them as guard
regions. This causes the fixmap region to grow downwards beyond the start
of its reserved window if the supported number of CPUs is large, and collide
with the newly added virtual DT mapping right below it, which is obviously
not good.

One manifestation of this is EFI boot on a kernel built with NR_CPUS=32
and CONFIG_DEBUG_KMAP_LOCAL=y, which may pass the FDT in highmem, resulting
in block entries below the fixmap region that the fixmap code misidentifies
as fixmap table entries, and subsequently tries to dereference using a
phys-to-virt translation that is only valid for lowmem. This results in a
cryptic splat such as the one below.

  ftrace: allocating 45548 entries in 89 pages
  8&lt;--- cut here ---
  Unable to handle kernel paging request at virtual address fc6006f0
  pgd = (ptrval)
  [fc6006f0] *pgd=80000040207003, *pmd=00000000
  Internal error: Oops: a06 [#1] SMP ARM
  Modules linked in:
  CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382
  Hardware name: Generic DT based system
  PC is at cpu_ca15_set_pte_ext+0x24/0x30
  LR is at __set_fixmap+0xe4/0x118
  pc : [&lt;c041ac9c&gt;]    lr : [&lt;c04189d8&gt;]    psr: 400000d3
  sp : c1601ed8  ip : 00400000  fp : 00800000
  r10: 0000071f  r9 : 00421000  r8 : 00c00000
  r7 : 00c00000  r6 : 0000071f  r5 : ffade000  r4 : 4040171f
  r3 : 00c00000  r2 : 4040171f  r1 : c041ac78  r0 : fc6006f0
  Flags: nZcv  IRQs off  FIQs off  Mode SVC_32  ISA ARM  Segment none
  Control: 30c5387d  Table: 40203000  DAC: 00000001
  Process swapper (pid: 0, stack limit = 0x(ptrval))

So let's limit CONFIG_NR_CPUS to 16 when CONFIG_DEBUG_KMAP_LOCAL=y. Also,
fix the BUILD_BUG_ON() check that was supposed to catch this, by checking
whether the region grows below the start address rather than above the end
address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46910/">CVE-2021-46910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46910">CVE-2021-46910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220446">SUSE bug 1220446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46911" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46911" ref_url="https://www.suse.com/security/cve/CVE-2021-46911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ch_ktls: Fix kernel panic

Taking page refcount is not ideal and causes kernel panic
sometimes. It's better to take tx_ctx lock for the complete
skb transmit, to avoid page cleanup if ACK received in middle.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46911/">CVE-2021-46911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46911">CVE-2021-46911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220400">SUSE bug 1220400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46912" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46912" ref_url="https://www.suse.com/security/cve/CVE-2021-46912" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Make tcp_allowed_congestion_control readonly in non-init netns

Currently, tcp_allowed_congestion_control is global and writable;
writing to it in any net namespace will leak into all other net
namespaces.

tcp_available_congestion_control and tcp_allowed_congestion_control are
the only sysctls in ipv4_net_table (the per-netns sysctl table) with a
NULL data pointer; their handlers (proc_tcp_available_congestion_control
and proc_allowed_congestion_control) have no other way of referencing a
struct net. Thus, they operate globally.

Because ipv4_net_table does not use designated initializers, there is no
easy way to fix up this one "bad" table entry. However, the data pointer
updating logic shouldn't be applied to NULL pointers anyway, so we
instead force these entries to be read-only.

These sysctls used to exist in ipv4_table (init-net only), but they were
moved to the per-net ipv4_net_table, presumably without realizing that
tcp_allowed_congestion_control was writable and thus introduced a leak.

Because the intent of that commit was only to know (i.e. read) "which
congestion algorithms are available or allowed", this read-only solution
should be sufficient.

The logic added in recent commit
31c4d2f160eb: ("net: Ensure net namespace isolation of sysctls")
does not and cannot check for NULL data pointers, because
other table entries (e.g. /proc/sys/net/netfilter/nf_log/) have
.data=NULL but use other methods (.extra2) to access the struct net.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-46912/">CVE-2021-46912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46912">CVE-2021-46912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220461">SUSE bug 1220461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46913" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46913" ref_url="https://www.suse.com/security/cve/CVE-2021-46913" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: clone set element expression template

memcpy() breaks when using connlimit in set elements. Use
nft_expr_clone() to initialize the connlimit expression list, otherwise
connlimit garbage collector crashes when walking on the list head copy.

[  493.064656] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]
[  493.064685] RIP: 0010:find_or_evict+0x5a/0x90 [nf_conncount]
[  493.064694] Code: 2b 43 40 83 f8 01 77 0d 48 c7 c0 f5 ff ff ff 44 39 63 3c 75 df 83 6d 18 01 48 8b 43 08 48 89 de 48 8b 13 48 8b 3d ee 2f 00 00 &lt;48&gt; 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 03 48 83
[  493.064699] RSP: 0018:ffffc90000417dc0 EFLAGS: 00010297
[  493.064704] RAX: 0000000000000000 RBX: ffff888134f38410 RCX: 0000000000000000
[  493.064708] RDX: 0000000000000000 RSI: ffff888134f38410 RDI: ffff888100060cc0
[  493.064711] RBP: ffff88812ce594a8 R08: ffff888134f38438 R09: 00000000ebb9025c
[  493.064714] R10: ffffffff8219f838 R11: 0000000000000017 R12: 0000000000000001
[  493.064718] R13: ffffffff82146740 R14: ffff888134f38410 R15: 0000000000000000
[  493.064721] FS:  0000000000000000(0000) GS:ffff88840e440000(0000) knlGS:0000000000000000
[  493.064725] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  493.064729] CR2: 0000000000000008 CR3: 00000001330aa002 CR4: 00000000001706e0
[  493.064733] Call Trace:
[  493.064737]  nf_conncount_gc_list+0x8f/0x150 [nf_conncount]
[  493.064746]  nft_rhash_gc+0x106/0x390 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46913/">CVE-2021-46913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46913">CVE-2021-46913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220462">SUSE bug 1220462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46914" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46914" ref_url="https://www.suse.com/security/cve/CVE-2021-46914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix unbalanced device enable/disable in suspend/resume

pci_disable_device() called in __ixgbe_shutdown() decreases
dev-&gt;enable_cnt by 1. pci_enable_device_mem() which increases
dev-&gt;enable_cnt by 1, was removed from ixgbe_resume() in commit
6f82b2558735 ("ixgbe: use generic power management"). This caused
unbalanced increase/decrease. So add pci_enable_device_mem() back.

Fix the following call trace.

  ixgbe 0000:17:00.1: disabling already-disabled device
  Call Trace:
   __ixgbe_shutdown+0x10a/0x1e0 [ixgbe]
   ixgbe_suspend+0x32/0x70 [ixgbe]
   pci_pm_suspend+0x87/0x160
   ? pci_pm_freeze+0xd0/0xd0
   dpm_run_callback+0x42/0x170
   __device_suspend+0x114/0x460
   async_suspend+0x1f/0xa0
   async_run_entry_fn+0x3c/0xf0
   process_one_work+0x1dd/0x410
   worker_thread+0x34/0x3f0
   ? cancel_delayed_work+0x90/0x90
   kthread+0x14c/0x170
   ? kthread_park+0x90/0x90
   ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46914/">CVE-2021-46914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46914">CVE-2021-46914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220465">SUSE bug 1220465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46915" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46915" ref_url="https://www.suse.com/security/cve/CVE-2021-46915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_limit: avoid possible divide error in nft_limit_init

div_u64() divides u64 by u32.

nft_limit_init() wants to divide u64 by u64, use the appropriate
math function (div64_u64)

divide error: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 8390 Comm: syz-executor188 Not tainted 5.12.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:div_u64_rem include/linux/math64.h:28 [inline]
RIP: 0010:div_u64 include/linux/math64.h:127 [inline]
RIP: 0010:nft_limit_init+0x2a2/0x5e0 net/netfilter/nft_limit.c:85
Code: ef 4c 01 eb 41 0f 92 c7 48 89 de e8 38 a5 22 fa 4d 85 ff 0f 85 97 02 00 00 e8 ea 9e 22 fa 4c 0f af f3 45 89 ed 31 d2 4c 89 f0 &lt;49&gt; f7 f5 49 89 c6 e8 d3 9e 22 fa 48 8d 7d 48 48 b8 00 00 00 00 00
RSP: 0018:ffffc90009447198 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000200000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff875152e6 RDI: 0000000000000003
RBP: ffff888020f80908 R08: 0000200000000000 R09: 0000000000000000
R10: ffffffff875152d8 R11: 0000000000000000 R12: ffffc90009447270
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  000000000097a300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200001c4 CR3: 0000000026a52000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 nf_tables_newexpr net/netfilter/nf_tables_api.c:2675 [inline]
 nft_expr_init+0x145/0x2d0 net/netfilter/nf_tables_api.c:2713
 nft_set_elem_expr_alloc+0x27/0x280 net/netfilter/nf_tables_api.c:5160
 nf_tables_newset+0x1997/0x3150 net/netfilter/nf_tables_api.c:4321
 nfnetlink_rcv_batch+0x85a/0x21b0 net/netfilter/nfnetlink.c:456
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:580 [inline]
 nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:598
 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338
 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927
 sock_sendmsg_nosec net/socket.c:654 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:674
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2404
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46915/">CVE-2021-46915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46915">CVE-2021-46915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220436">SUSE bug 1220436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46916" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46916" ref_url="https://www.suse.com/security/cve/CVE-2021-46916" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix NULL pointer dereference in ethtool loopback test

The ixgbe driver currently generates a NULL pointer dereference when
performing the ethtool loopback test. This is due to the fact that there
isn't a q_vector associated with the test ring when it is setup as
interrupts are not normally added to the test rings.

To address this I have added code that will check for a q_vector before
returning a napi_id value. If a q_vector is not present it will return a
value of 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46916/">CVE-2021-46916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46916">CVE-2021-46916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220435">SUSE bug 1220435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46917" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46917" ref_url="https://www.suse.com/security/cve/CVE-2021-46917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: fix wq cleanup of WQCFG registers

A pre-release silicon erratum workaround where wq reset does not clear
WQCFG registers was leaked into upstream code. Use wq reset command
instead of blasting the MMIO region. This also address an issue where
we clobber registers in future devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46917/">CVE-2021-46917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46917">CVE-2021-46917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220432">SUSE bug 1220432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46918" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46918" ref_url="https://www.suse.com/security/cve/CVE-2021-46918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: clear MSIX permission entry on shutdown

Add disabling/clearing of MSIX permission entries on device shutdown to
mirror the enabling of the MSIX entries on probe. Current code left the
MSIX enabled and the pasid entries still programmed at device shutdown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46918/">CVE-2021-46918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46918">CVE-2021-46918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220429">SUSE bug 1220429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46919" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46919" ref_url="https://www.suse.com/security/cve/CVE-2021-46919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: fix wq size store permission state

WQ size can only be changed when the device is disabled. Current code
allows change when device is enabled but wq is disabled. Change the check
to detect device state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46919/">CVE-2021-46919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46919">CVE-2021-46919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220414">SUSE bug 1220414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46920" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46920" ref_url="https://www.suse.com/security/cve/CVE-2021-46920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback

Current code blindly writes over the SWERR and the OVERFLOW bits. Write
back the bits actually read instead so the driver avoids clobbering the
OVERFLOW bit that comes after the register is read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46920/">CVE-2021-46920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46920">CVE-2021-46920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220426">SUSE bug 1220426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46922" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46922" ref_url="https://www.suse.com/security/cve/CVE-2021-46922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix TPM reservation for seal/unseal

The original patch 8c657a0590de ("KEYS: trusted: Reserve TPM for seal
and unseal operations") was correct on the mailing list:

https://lore.kernel.org/linux-integrity/20210128235621.127925-4-jarkko@kernel.org/

But somehow got rebased so that the tpm_try_get_ops() in
tpm2_seal_trusted() got lost.  This causes an imbalanced put of the
TPM ops and causes oopses on TIS based hardware.

This fix puts back the lost tpm_try_get_ops()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46922/">CVE-2021-46922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46922">CVE-2021-46922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220475">SUSE bug 1220475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46923" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/mount_setattr: always cleanup mount_kattr

Make sure that finish_mount_kattr() is called after mount_kattr was
succesfully built in both the success and failure case to prevent
leaking any references we took when we built it.  We returned early if
path lookup failed thereby risking to leak an additional reference we
took when building mount_kattr when an idmapped mount was requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46924" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: st21nfca: Fix memory leak in device probe and remove

'phy-&gt;pending_skb' is alloced when device probe, but forgot to free
in the error handling path and remove path, this cause memory leak
as follows:

unreferenced object 0xffff88800bc06800 (size 512):
  comm "8", pid 11775, jiffies 4295159829 (age 9.032s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000d66c09ce&gt;] __kmalloc_node_track_caller+0x1ed/0x450
    [&lt;00000000c93382b3&gt;] kmalloc_reserve+0x37/0xd0
    [&lt;000000005fea522c&gt;] __alloc_skb+0x124/0x380
    [&lt;0000000019f29f9a&gt;] st21nfca_hci_i2c_probe+0x170/0x8f2

Fix it by freeing 'pending_skb' in error and remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46926" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: intel-sdw-acpi: harden detection of controller

The existing code currently sets a pointer to an ACPI handle before
checking that it's actually a SoundWire controller. This can lead to
issues where the graph walk continues and eventually fails, but the
pointer was set already.

This patch changes the logic so that the information provided to
the caller is set when a controller is found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46927" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert

After commit 5b78ed24e8ec ("mm/pagemap: add mmap_assert_locked()
annotations to find_vma*()"), the call to get_user_pages() will trigger
the mmap assert.

static inline void mmap_assert_locked(struct mm_struct *mm)
{
	lockdep_assert_held(&amp;mm-&gt;mmap_lock);
	VM_BUG_ON_MM(!rwsem_is_locked(&amp;mm-&gt;mmap_lock), mm);
}

[   62.521410] kernel BUG at include/linux/mmap_lock.h:156!
...........................................................
[   62.538938] RIP: 0010:find_vma+0x32/0x80
...........................................................
[   62.605889] Call Trace:
[   62.608502]  &lt;TASK&gt;
[   62.610956]  ? lock_timer_base+0x61/0x80
[   62.614106]  find_extend_vma+0x19/0x80
[   62.617195]  __get_user_pages+0x9b/0x6a0
[   62.620356]  __gup_longterm_locked+0x42d/0x450
[   62.623721]  ? finish_wait+0x41/0x80
[   62.626748]  ? __kmalloc+0x178/0x2f0
[   62.629768]  ne_set_user_memory_region_ioctl.isra.0+0x225/0x6a0 [nitro_enclaves]
[   62.635776]  ne_enclave_ioctl+0x1cf/0x6d7 [nitro_enclaves]
[   62.639541]  __x64_sys_ioctl+0x82/0xb0
[   62.642620]  do_syscall_64+0x3b/0x90
[   62.645642]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Use get_user_pages_unlocked() when setting the enclave memory regions.
That's a similar pattern as mmap_read_lock() used together with
get_user_pages().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46928" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46928" ref_url="https://www.suse.com/security/cve/CVE-2021-46928" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: Clear stale IIR value on instruction access rights trap

When a trap 7 (Instruction access rights) occurs, this means the CPU
couldn't execute an instruction due to missing execute permissions on
the memory region.  In this case it seems the CPU didn't even fetched
the instruction from memory and thus did not store it in the cr19 (IIR)
register before calling the trap handler. So, the trap handler will find
some random old stale value in cr19.

This patch simply overwrites the stale IIR value with a constant magic
"bad food" value (0xbaadf00d), in the hope people don't start to try to
understand the various random IIR values in trap 7 dumps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46928/">CVE-2021-46928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46928">CVE-2021-46928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220480">SUSE bug 1220480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46930" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: mtu3: fix list_head check warning

This is caused by uninitialization of list_head.

BUG: KASAN: use-after-free in __list_del_entry_valid+0x34/0xe4

Call trace:
dump_backtrace+0x0/0x298
show_stack+0x24/0x34
dump_stack+0x130/0x1a8
print_address_description+0x88/0x56c
__kasan_report+0x1b8/0x2a0
kasan_report+0x14/0x20
__asan_load8+0x9c/0xa0
__list_del_entry_valid+0x34/0xe4
mtu3_req_complete+0x4c/0x300 [mtu3]
mtu3_gadget_stop+0x168/0x448 [mtu3]
usb_gadget_unregister_driver+0x204/0x3a0
unregister_gadget_item+0x44/0xa4
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46931" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Wrap the tx reporter dump callback to extract the sq

Function mlx5e_tx_reporter_dump_sq() casts its void * argument to struct
mlx5e_txqsq *, but in TX-timeout-recovery flow the argument is actually
of type struct mlx5e_tx_timeout_ctx *.

 mlx5_core 0000:08:00.1 enp8s0f1: TX timeout detected
 mlx5_core 0000:08:00.1 enp8s0f1: TX timeout on queue: 1, SQ: 0x11ec, CQ: 0x146d, SQ Cons: 0x0 SQ Prod: 0x1, usecs since last trans: 21565000
 BUG: stack guard page was hit at 0000000093f1a2de (stack is 00000000b66ea0dc..000000004d932dae)
 kernel stack overflow (page fault): 0000 [#1] SMP NOPTI
 CPU: 5 PID: 95 Comm: kworker/u20:1 Tainted: G W OE 5.13.0_mlnx #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Workqueue: mlx5e mlx5e_tx_timeout_work [mlx5_core]
 RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180
 [mlx5_core]
 Call Trace:
 mlx5e_tx_reporter_dump+0x43/0x1c0 [mlx5_core]
 devlink_health_do_dump.part.91+0x71/0xd0
 devlink_health_report+0x157/0x1b0
 mlx5e_reporter_tx_timeout+0xb9/0xf0 [mlx5_core]
 ? mlx5e_tx_reporter_err_cqe_recover+0x1d0/0x1d0
 [mlx5_core]
 ? mlx5e_health_queue_dump+0xd0/0xd0 [mlx5_core]
 ? update_load_avg+0x19b/0x550
 ? set_next_entity+0x72/0x80
 ? pick_next_task_fair+0x227/0x340
 ? finish_task_switch+0xa2/0x280
   mlx5e_tx_timeout_work+0x83/0xb0 [mlx5_core]
   process_one_work+0x1de/0x3a0
   worker_thread+0x2d/0x3c0
 ? process_one_work+0x3a0/0x3a0
   kthread+0x115/0x130
 ? kthread_park+0x90/0x90
   ret_from_fork+0x1f/0x30
 --[ end trace 51ccabea504edaff ]---
 RIP: 0010:mlx5e_tx_reporter_dump_sq+0xd3/0x180
 PKRU: 55555554
 Kernel panic - not syncing: Fatal exception
 Kernel Offset: disabled
 end Kernel panic - not syncing: Fatal exception

To fix this bug add a wrapper for mlx5e_tx_reporter_dump_sq() which
extracts the sq from struct mlx5e_tx_timeout_ctx and set it as the
TX-timeout-recovery flow dump callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46933" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.

ffs_data_clear is indirectly called from both ffs_fs_kill_sb and
ffs_ep0_release, so it ends up being called twice when userland closes ep0
and then unmounts f_fs.
If userland provided an eventfd along with function's USB descriptors, it
ends up calling eventfd_ctx_put as many times, causing a refcount
underflow.
NULL-ify ffs_eventfd to prevent these extraneous eventfd_ctx_put calls.

Also, set epfiles to NULL right after de-allocating it, for readability.

For completeness, ffs_data_clear actually ends up being called thrice, the
last call being before the whole ffs structure gets freed, so when this
specific sequence happens there is a second underflow happening (but not
being reported):

/sys/kernel/debug/tracing# modprobe usb_f_fs
/sys/kernel/debug/tracing# echo ffs_data_clear &gt; set_ftrace_filter
/sys/kernel/debug/tracing# echo function &gt; current_tracer
/sys/kernel/debug/tracing# echo 1 &gt; tracing_on
(setup gadget, run and kill function userland process, teardown gadget)
/sys/kernel/debug/tracing# echo 0 &gt; tracing_on
/sys/kernel/debug/tracing# cat trace
 smartcard-openp-436     [000] .....  1946.208786: ffs_data_clear &lt;-ffs_data_closed
 smartcard-openp-431     [000] .....  1946.279147: ffs_data_clear &lt;-ffs_data_closed
 smartcard-openp-431     [000] .n...  1946.905512: ffs_data_clear &lt;-ffs_data_put

Warning output corresponding to above trace:
[ 1946.284139] WARNING: CPU: 0 PID: 431 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15c
[ 1946.293094] refcount_t: underflow; use-after-free.
[ 1946.298164] Modules linked in: usb_f_ncm(E) u_ether(E) usb_f_fs(E) hci_uart(E) btqca(E) btrtl(E) btbcm(E) btintel(E) bluetooth(E) nls_ascii(E) nls_cp437(E) vfat(E) fat(E) bcm2835_v4l2(CE) bcm2835_mmal_vchiq(CE) videobuf2_vmalloc(E) videobuf2_memops(E) sha512_generic(E) videobuf2_v4l2(E) sha512_arm(E) videobuf2_common(E) videodev(E) cpufreq_dt(E) snd_bcm2835(CE) brcmfmac(E) mc(E) vc4(E) ctr(E) brcmutil(E) snd_soc_core(E) snd_pcm_dmaengine(E) drbg(E) snd_pcm(E) snd_timer(E) snd(E) soundcore(E) drm_kms_helper(E) cec(E) ansi_cprng(E) rc_core(E) syscopyarea(E) raspberrypi_cpufreq(E) sysfillrect(E) sysimgblt(E) cfg80211(E) max17040_battery(OE) raspberrypi_hwmon(E) fb_sys_fops(E) regmap_i2c(E) ecdh_generic(E) rfkill(E) ecc(E) bcm2835_rng(E) rng_core(E) vchiq(CE) leds_gpio(E) libcomposite(E) fuse(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc16(E) mbcache(E) jbd2(E) crc32c_generic(E) sdhci_iproc(E) sdhci_pltfm(E) sdhci(E)
[ 1946.399633] CPU: 0 PID: 431 Comm: smartcard-openp Tainted: G         C OE     5.15.0-1-rpi #1  Debian 5.15.3-1
[ 1946.417950] Hardware name: BCM2835
[ 1946.425442] Backtrace:
[ 1946.432048] [&lt;c08d60a0&gt;] (dump_backtrace) from [&lt;c08d62ec&gt;] (show_stack+0x20/0x24)
[ 1946.448226]  r7:00000009 r6:0000001c r5:c04a948c r4:c0a64e2c
[ 1946.458412] [&lt;c08d62cc&gt;] (show_stack) from [&lt;c08d9ae0&gt;] (dump_stack+0x28/0x30)
[ 1946.470380] [&lt;c08d9ab8&gt;] (dump_stack) from [&lt;c0123500&gt;] (__warn+0xe8/0x154)
[ 1946.482067]  r5:c04a948c r4:c0a71dc8
[ 1946.490184] [&lt;c0123418&gt;] (__warn) from [&lt;c08d6948&gt;] (warn_slowpath_fmt+0xa0/0xe4)
[ 1946.506758]  r7:00000009 r6:0000001c r5:c0a71dc8 r4:c0a71e04
[ 1946.517070] [&lt;c08d68ac&gt;] (warn_slowpath_fmt) from [&lt;c04a948c&gt;] (refcount_warn_saturate+0x110/0x15c)
[ 1946.535309]  r8:c0100224 r7:c0dfcb84 r6:ffffffff r5:c3b84c00 r4:c24a17c0
[ 1946.546708] [&lt;c04a937c&gt;] (refcount_warn_saturate) from [&lt;c0380134&gt;] (eventfd_ctx_put+0x48/0x74)
[ 1946.564476] [&lt;c03800ec&gt;] (eventfd_ctx_put) from [&lt;bf5464e8&gt;] (ffs_data_clear+0xd0/0x118 [usb_f_fs])
[ 1946.582664]  r5:c3b84c00 r4:c2695b00
[ 1946.590668] [&lt;bf546418&gt;] (ffs_data_clear [usb_f_fs]) from [&lt;bf547cc0&gt;] (ffs_data_closed+0x9c/0x150 [usb_f_fs])
[ 1946.609608]  r5:bf54d014 r4:c2695b00
[ 1946.617522] [&lt;bf547c24&gt;] (ffs_data_closed [usb_f_fs]) from [&lt;bf547da0&gt;] (ffs_fs_kill_sb+0x2c/0x30 [usb_f_fs])
[ 1946.636217]  r7:c0dfcb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46934" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: validate user data in compat ioctl

Wrong user data may cause warning in i2c_transfer(), ex: zero msgs.
Userspace should not be able to trigger warnings, so this patch adds
validation checks for user data in compact ioctl to prevent reported
warnings
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46935" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46935" ref_url="https://www.suse.com/security/cve/CVE-2021-46935" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix async_free_space accounting for empty parcels

In 4.13, commit 74310e06be4d ("android: binder: Move buffer out of area shared with user space")
fixed a kernel structure visibility issue. As part of that patch,
sizeof(void *) was used as the buffer size for 0-length data payloads so
the driver could detect abusive clients sending 0-length asynchronous
transactions to a server by enforcing limits on async_free_size.

Unfortunately, on the "free" side, the accounting of async_free_space
did not add the sizeof(void *) back. The result was that up to 8-bytes of
async_free_space were leaked on every async transaction of 8-bytes or
less.  These small transactions are uncommon, so this accounting issue
has gone undetected for several years.

The fix is to use "buffer_size" (the allocated buffer size) instead of
"size" (the logical buffer size) when updating the async_free_space
during the free operation. These are the same except for this
corner case of asynchronous transactions with payloads &lt; 8 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46935/">CVE-2021-46935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46935">CVE-2021-46935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220438">SUSE bug 1220438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46936" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix use-after-free in tw_timer_handler

A real world panic issue was found as follow in Linux 5.4.

    BUG: unable to handle page fault for address: ffffde49a863de28
    PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0
    RIP: 0010:tw_timer_handler+0x20/0x40
    Call Trace:
     &lt;IRQ&gt;
     call_timer_fn+0x2b/0x120
     run_timer_softirq+0x1ef/0x450
     __do_softirq+0x10d/0x2b8
     irq_exit+0xc7/0xd0
     smp_apic_timer_interrupt+0x68/0x120
     apic_timer_interrupt+0xf/0x20

This issue was also reported since 2017 in the thread [1],
unfortunately, the issue was still can be reproduced after fixing
DCCP.

The ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net
namespace is destroyed since tcp_sk_ops is registered befrore
ipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops
in the list of pernet_list. There will be a use-after-free on
net-&gt;mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net
if there are some inflight time-wait timers.

This bug is not introduced by commit f2bf415cfed7 ("mib: add net to
NET_ADD_STATS_BH") since the net_statistics is a global variable
instead of dynamic allocation and freeing. Actually, commit
61a7e26028b9 ("mib: put net statistics on struct net") introduces
the bug since it put net statistics on struct net and free it when
net namespace is destroyed.

Moving init_ipv4_mibs() to the front of tcp_init() to fix this bug
and replace pr_crit() with panic() since continuing is meaningless
when init_ipv4_mibs() fails.

[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46937" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46937" ref_url="https://www.suse.com/security/cve/CVE-2021-46937" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'

DAMON debugfs interface increases the reference counts of 'struct pid's
for targets from the 'target_ids' file write callback
('dbgfs_target_ids_write()'), but decreases the counts only in DAMON
monitoring termination callback ('dbgfs_before_terminate()').

Therefore, when 'target_ids' file is repeatedly written without DAMON
monitoring start/termination, the reference count is not decreased and
therefore memory for the 'struct pid' cannot be freed.  This commit
fixes this issue by decreasing the reference counts when 'target_ids' is
written.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46937/">CVE-2021-46937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46937">CVE-2021-46937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220488">SUSE bug 1220488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46938" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46938" ref_url="https://www.suse.com/security/cve/CVE-2021-46938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails

When loading a device-mapper table for a request-based mapped device,
and the allocation/initialization of the blk_mq_tag_set for the device
fails, a following device remove will cause a double free.

E.g. (dmesg):
  device-mapper: core: Cannot initialize queue for request-based dm-mq mapped device
  device-mapper: ioctl: unable to set up device queue for new table.
  Unable to handle kernel pointer dereference in virtual kernel address space
  Failing address: 0305e098835de000 TEID: 0305e098835de803
  Fault in home space mode while using kernel ASCE.
  AS:000000025efe0007 R3:0000000000000024
  Oops: 0038 ilc:3 [#1] SMP
  Modules linked in: ... lots of modules ...
  Supported: Yes, External
  CPU: 0 PID: 7348 Comm: multipathd Kdump: loaded Tainted: G        W      X    5.3.18-53-default #1 SLE15-SP3
  Hardware name: IBM 8561 T01 7I2 (LPAR)
  Krnl PSW : 0704e00180000000 000000025e368eca (kfree+0x42/0x330)
             R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
  Krnl GPRS: 000000000000004a 000000025efe5230 c1773200d779968d 0000000000000000
             000000025e520270 000000025e8d1b40 0000000000000003 00000007aae10000
             000000025e5202a2 0000000000000001 c1773200d779968d 0305e098835de640
             00000007a8170000 000003ff80138650 000000025e5202a2 000003e00396faa8
  Krnl Code: 000000025e368eb8: c4180041e100       lgrl    %r1,25eba50b8
             000000025e368ebe: ecba06b93a55       risbg   %r11,%r10,6,185,58
            #000000025e368ec4: e3b010000008       ag      %r11,0(%r1)
            &gt;000000025e368eca: e310b0080004       lg      %r1,8(%r11)
             000000025e368ed0: a7110001           tmll    %r1,1
             000000025e368ed4: a7740129           brc     7,25e369126
             000000025e368ed8: e320b0080004       lg      %r2,8(%r11)
             000000025e368ede: b904001b           lgr     %r1,%r11
  Call Trace:
   [&lt;000000025e368eca&gt;] kfree+0x42/0x330
   [&lt;000000025e5202a2&gt;] blk_mq_free_tag_set+0x72/0xb8
   [&lt;000003ff801316a8&gt;] dm_mq_cleanup_mapped_device+0x38/0x50 [dm_mod]
   [&lt;000003ff80120082&gt;] free_dev+0x52/0xd0 [dm_mod]
   [&lt;000003ff801233f0&gt;] __dm_destroy+0x150/0x1d0 [dm_mod]
   [&lt;000003ff8012bb9a&gt;] dev_remove+0x162/0x1c0 [dm_mod]
   [&lt;000003ff8012a988&gt;] ctl_ioctl+0x198/0x478 [dm_mod]
   [&lt;000003ff8012ac8a&gt;] dm_ctl_ioctl+0x22/0x38 [dm_mod]
   [&lt;000000025e3b11ee&gt;] ksys_ioctl+0xbe/0xe0
   [&lt;000000025e3b127a&gt;] __s390x_sys_ioctl+0x2a/0x40
   [&lt;000000025e8c15ac&gt;] system_call+0xd8/0x2c8
  Last Breaking-Event-Address:
   [&lt;000000025e52029c&gt;] blk_mq_free_tag_set+0x6c/0xb8
  Kernel panic - not syncing: Fatal exception: panic_on_oops

When allocation/initialization of the blk_mq_tag_set fails in
dm_mq_init_request_queue(), it is uninitialized/freed, but the pointer
is not reset to NULL; so when dev_remove() later gets into
dm_mq_cleanup_mapped_device() it sees the pointer and tries to
uninitialize and free it again.

Fix this by setting the pointer to NULL in dm_mq_init_request_queue()
error-handling. Also set it to NULL in dm_mq_cleanup_mapped_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-46938/">CVE-2021-46938 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46938">CVE-2021-46938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220554">SUSE bug 1220554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46940" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46940" ref_url="https://www.suse.com/security/cve/CVE-2021-46940" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tools/power turbostat: Fix offset overflow issue in index converting

The idx_to_offset() function returns type int (32-bit signed), but
MSR_PKG_ENERGY_STAT is u32 and would be interpreted as a negative number.
The end result is that it hits the if (offset &lt; 0) check in update_msr_sum()
which prevents the timer callback from updating the stat in the background when
long durations are used. The similar issue exists in offset_to_idx() and
update_msr_sum(). Fix this issue by converting the 'int' to 'off_t' accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46940/">CVE-2021-46940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46940">CVE-2021-46940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220624">SUSE bug 1220624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46941" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46941" ref_url="https://www.suse.com/security/cve/CVE-2021-46941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: Do core softreset when switch mode


According to the programming guide, to switch mode for DRD controller,
the driver needs to do the following.

To switch from device to host:
1. Reset controller with GCTL.CoreSoftReset
2. Set GCTL.PrtCapDir(host mode)
3. Reset the host with USBCMD.HCRESET
4. Then follow up with the initializing host registers sequence

To switch from host to device:
1. Reset controller with GCTL.CoreSoftReset
2. Set GCTL.PrtCapDir(device mode)
3. Reset the device with DCTL.CSftRst
4. Then follow up with the initializing registers sequence

Currently we're missing step 1) to do GCTL.CoreSoftReset and step 3) of
switching from host to device. John Stult reported a lockup issue seen
with HiKey960 platform without these steps[1]. Similar issue is observed
with Ferry's testing platform[2].

So, apply the required steps along with some fixes to Yu Chen's and John
Stultz's version. The main fixes to their versions are the missing wait
for clocks synchronization before clearing GCTL.CoreSoftReset and only
apply DCTL.CSftRst when switching from host to device.

[1] https://lore.kernel.org/linux-usb/20210108015115.27920-1-john.stultz@linaro.org/
[2] https://lore.kernel.org/linux-usb/0ba7a6ba-e6a7-9cd4-0695-64fc927e01f1@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46941/">CVE-2021-46941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46941">CVE-2021-46941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220628">SUSE bug 1220628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46942" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46942" ref_url="https://www.suse.com/security/cve/CVE-2021-46942" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix shared sqpoll cancellation hangs

[  736.982891] INFO: task iou-sqp-4294:4295 blocked for more than 122 seconds.
[  736.982897] Call Trace:
[  736.982901]  schedule+0x68/0xe0
[  736.982903]  io_uring_cancel_sqpoll+0xdb/0x110
[  736.982908]  io_sqpoll_cancel_cb+0x24/0x30
[  736.982911]  io_run_task_work_head+0x28/0x50
[  736.982913]  io_sq_thread+0x4e3/0x720

We call io_uring_cancel_sqpoll() one by one for each ctx either in
sq_thread() itself or via task works, and it's intended to cancel all
requests of a specified context. However the function uses per-task
counters to track the number of inflight requests, so it counts more
requests than available via currect io_uring ctx and goes to sleep for
them to appear (e.g. from IRQ), that will never happen.

Cancel a bit more than before, i.e. all ctxs that share sqpoll
and continue to use shared counters. Don't forget that we should not
remove ctx from the list before running that task_work sqpoll-cancel,
otherwise the function wouldn't be able to find the context and will
hang.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46942/">CVE-2021-46942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46942">CVE-2021-46942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220602">SUSE bug 1220602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46945" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46945" ref_url="https://www.suse.com/security/cve/CVE-2021-46945" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: always panic when errors=panic is specified

Before commit 014c9caa29d3 ("ext4: make ext4_abort() use
__ext4_error()"), the following series of commands would trigger a
panic:

1. mount /dev/sda -o ro,errors=panic test
2. mount /dev/sda -o remount,abort test

After commit 014c9caa29d3, remounting a file system using the test
mount option "abort" will no longer trigger a panic.  This commit will
restore the behaviour immediately before commit 014c9caa29d3.
(However, note that the Linux kernel's behavior has not been
consistent; some previous kernel versions, including 5.4 and 4.19
similarly did not panic after using the mount option "abort".)

This also makes a change to long-standing behaviour; namely, the
following series commands will now cause a panic, when previously it
did not:

1. mount /dev/sda -o ro,errors=panic test
2. echo test &gt; /sys/fs/ext4/sda/trigger_fs_error

However, this makes ext4's behaviour much more consistent, so this is
a good thing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46945/">CVE-2021-46945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46945">CVE-2021-46945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220504">SUSE bug 1220504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46947" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46947" ref_url="https://www.suse.com/security/cve/CVE-2021-46947" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: adjust efx-&gt;xdp_tx_queue_count with the real number of initialized queues

efx-&gt;xdp_tx_queue_count is initially initialized to num_possible_cpus() and is
later used to allocate and traverse efx-&gt;xdp_tx_queues lookup array. However,
we may end up not initializing all the array slots with real queues during
probing. This results, for example, in a NULL pointer dereference, when running
"# ethtool -S &lt;iface&gt;", similar to below

[2570283.664955][T4126959] BUG: kernel NULL pointer dereference, address: 00000000000000f8
[2570283.681283][T4126959] #PF: supervisor read access in kernel mode
[2570283.695678][T4126959] #PF: error_code(0x0000) - not-present page
[2570283.710013][T4126959] PGD 0 P4D 0
[2570283.721649][T4126959] Oops: 0000 [#1] SMP PTI
[2570283.734108][T4126959] CPU: 23 PID: 4126959 Comm: ethtool Tainted: G           O      5.10.20-cloudflare-2021.3.1 #1
[2570283.752641][T4126959] Hardware name: &lt;redacted&gt;
[2570283.781408][T4126959] RIP: 0010:efx_ethtool_get_stats+0x2ca/0x330 [sfc]
[2570283.796073][T4126959] Code: 00 85 c0 74 39 48 8b 95 a8 0f 00 00 48 85 d2 74 2d 31 c0 eb 07 48 8b 95 a8 0f 00 00 48 63 c8 49 83 c4 08 83 c0 01 48 8b 14 ca &lt;48&gt; 8b 92 f8 00 00 00 49 89 54 24 f8 39 85 a0 0f 00 00 77 d7 48 8b
[2570283.831259][T4126959] RSP: 0018:ffffb79a77657ce8 EFLAGS: 00010202
[2570283.845121][T4126959] RAX: 0000000000000019 RBX: ffffb799cd0c9280 RCX: 0000000000000018
[2570283.860872][T4126959] RDX: 0000000000000000 RSI: ffff96dd970ce000 RDI: 0000000000000005
[2570283.876525][T4126959] RBP: ffff96dd86f0a000 R08: ffff96dd970ce480 R09: 000000000000005f
[2570283.892014][T4126959] R10: ffffb799cd0c9fff R11: ffffb799cd0c9000 R12: ffffb799cd0c94f8
[2570283.907406][T4126959] R13: ffffffffc11b1090 R14: ffff96dd970ce000 R15: ffffffffc11cd66c
[2570283.922705][T4126959] FS:  00007fa7723f8740(0000) GS:ffff96f51fac0000(0000) knlGS:0000000000000000
[2570283.938848][T4126959] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2570283.952524][T4126959] CR2: 00000000000000f8 CR3: 0000001a73e6e006 CR4: 00000000007706e0
[2570283.967529][T4126959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[2570283.982400][T4126959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[2570283.997308][T4126959] PKRU: 55555554
[2570284.007649][T4126959] Call Trace:
[2570284.017598][T4126959]  dev_ethtool+0x1832/0x2830

Fix this by adjusting efx-&gt;xdp_tx_queue_count after probing to reflect the true
value of initialized slots in efx-&gt;xdp_tx_queues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46947/">CVE-2021-46947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46947">CVE-2021-46947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220614">SUSE bug 1220614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46948" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46948" ref_url="https://www.suse.com/security/cve/CVE-2021-46948" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: farch: fix TX queue lookup in TX event handling

We're starting from a TXQ label, not a TXQ type, so
 efx_channel_get_tx_queue() is inappropriate (and could return NULL,
 leading to panics).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46948/">CVE-2021-46948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46948">CVE-2021-46948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220642">SUSE bug 1220642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46949" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46949" ref_url="https://www.suse.com/security/cve/CVE-2021-46949" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: farch: fix TX queue lookup in TX flush done handling

We're starting from a TXQ instance number ('qid'), not a TXQ type, so
 efx_get_tx_queue() is inappropriate (and could return NULL, leading
 to panics).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46949/">CVE-2021-46949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46949">CVE-2021-46949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220645">SUSE bug 1220645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46950" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46950" ref_url="https://www.suse.com/security/cve/CVE-2021-46950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid1: properly indicate failure when ending a failed write request

This patch addresses a data corruption bug in raid1 arrays using bitmaps.
Without this fix, the bitmap bits for the failed I/O end up being cleared.

Since we are in the failure leg of raid1_end_write_request, the request
either needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-46950/">CVE-2021-46950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46950">CVE-2021-46950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220662">SUSE bug 1220662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46951" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46951" ref_url="https://www.suse.com/security/cve/CVE-2021-46951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: efi: Use local variable for calculating final log size

When tpm_read_log_efi is called multiple times, which happens when
one loads and unloads a TPM2 driver multiple times, then the global
variable efi_tpm_final_log_size will at some point become a negative
number due to the subtraction of final_events_preboot_size occurring
each time. Use a local variable to avoid this integer underflow.

The following issue is now resolved:

Mar  8 15:35:12 hibinst kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
Mar  8 15:35:12 hibinst kernel: Workqueue: tpm-vtpm vtpm_proxy_work [tpm_vtpm_proxy]
Mar  8 15:35:12 hibinst kernel: RIP: 0010:__memcpy+0x12/0x20
Mar  8 15:35:12 hibinst kernel: Code: 00 b8 01 00 00 00 85 d2 74 0a c7 05 44 7b ef 00 0f 00 00 00 c3 cc cc cc 66 66 90 66 90 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 &lt;f3&gt; 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 f3 a4
Mar  8 15:35:12 hibinst kernel: RSP: 0018:ffff9ac4c0fcfde0 EFLAGS: 00010206
Mar  8 15:35:12 hibinst kernel: RAX: ffff88f878cefed5 RBX: ffff88f878ce9000 RCX: 1ffffffffffffe0f
Mar  8 15:35:12 hibinst kernel: RDX: 0000000000000003 RSI: ffff9ac4c003bff9 RDI: ffff88f878cf0e4d
Mar  8 15:35:12 hibinst kernel: RBP: ffff9ac4c003b000 R08: 0000000000001000 R09: 000000007e9d6073
Mar  8 15:35:12 hibinst kernel: R10: ffff9ac4c003b000 R11: ffff88f879ad3500 R12: 0000000000000ed5
Mar  8 15:35:12 hibinst kernel: R13: ffff88f878ce9760 R14: 0000000000000002 R15: ffff88f77de7f018
Mar  8 15:35:12 hibinst kernel: FS:  0000000000000000(0000) GS:ffff88f87bd00000(0000) knlGS:0000000000000000
Mar  8 15:35:12 hibinst kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Mar  8 15:35:12 hibinst kernel: CR2: ffff9ac4c003c000 CR3: 00000001785a6004 CR4: 0000000000060ee0
Mar  8 15:35:12 hibinst kernel: Call Trace:
Mar  8 15:35:12 hibinst kernel: tpm_read_log_efi+0x152/0x1a7
Mar  8 15:35:12 hibinst kernel: tpm_bios_log_setup+0xc8/0x1c0
Mar  8 15:35:12 hibinst kernel: tpm_chip_register+0x8f/0x260
Mar  8 15:35:12 hibinst kernel: vtpm_proxy_work+0x16/0x60 [tpm_vtpm_proxy]
Mar  8 15:35:12 hibinst kernel: process_one_work+0x1b4/0x370
Mar  8 15:35:12 hibinst kernel: worker_thread+0x53/0x3e0
Mar  8 15:35:12 hibinst kernel: ? process_one_work+0x370/0x370
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46951/">CVE-2021-46951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46951">CVE-2021-46951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220615">SUSE bug 1220615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46954" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46954" ref_url="https://www.suse.com/security/cve/CVE-2021-46954" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets

when 'act_mirred' tries to fragment IPv4 packets that had been previously
re-assembled using 'act_ct', splats like the following can be observed on
kernels built with KASAN:

 BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60
 Read of size 1 at addr ffff888147009574 by task ping/947

 CPU: 0 PID: 947 Comm: ping Not tainted 5.12.0-rc6+ #418
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 Call Trace:
  &lt;IRQ&gt;
  dump_stack+0x92/0xc1
  print_address_description.constprop.7+0x1a/0x150
  kasan_report.cold.13+0x7f/0x111
  ip_do_fragment+0x1b03/0x1f60
  sch_fragment+0x4bf/0xe40
  tcf_mirred_act+0xc3d/0x11a0 [act_mirred]
  tcf_action_exec+0x104/0x3e0
  fl_classify+0x49a/0x5e0 [cls_flower]
  tcf_classify_ingress+0x18a/0x820
  __netif_receive_skb_core+0xae7/0x3340
  __netif_receive_skb_one_core+0xb6/0x1b0
  process_backlog+0x1ef/0x6c0
  __napi_poll+0xaa/0x500
  net_rx_action+0x702/0xac0
  __do_softirq+0x1e4/0x97f
  do_softirq+0x71/0x90
  &lt;/IRQ&gt;
  __local_bh_enable_ip+0xdb/0xf0
  ip_finish_output2+0x760/0x2120
  ip_do_fragment+0x15a5/0x1f60
  __ip_finish_output+0x4c2/0xea0
  ip_output+0x1ca/0x4d0
  ip_send_skb+0x37/0xa0
  raw_sendmsg+0x1c4b/0x2d00
  sock_sendmsg+0xdb/0x110
  __sys_sendto+0x1d7/0x2b0
  __x64_sys_sendto+0xdd/0x1b0
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f82e13853eb
 Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 75 42 2c 00 41 89 ca 8b 00 85 c0 75 14 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 41 57 4d 89 c7 41 56 41 89
 RSP: 002b:00007ffe01fad888 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
 RAX: ffffffffffffffda RBX: 00005571aac13700 RCX: 00007f82e13853eb
 RDX: 0000000000002330 RSI: 00005571aac13700 RDI: 0000000000000003
 RBP: 0000000000002330 R08: 00005571aac10500 R09: 0000000000000010
 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe01faefb0
 R13: 00007ffe01fad890 R14: 00007ffe01fad980 R15: 00005571aac0f0a0

 The buggy address belongs to the page:
 page:000000001dff2e03 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x147009
 flags: 0x17ffffc0001000(reserved)
 raw: 0017ffffc0001000 ffffea00051c0248 ffffea00051c0248 0000000000000000
 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
 page dumped because: kasan: bad access detected

 Memory state around the buggy address:
  ffff888147009400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff888147009480: f1 f1 f1 f1 04 f2 f2 f2 f2 f2 f2 f2 00 00 00 00
 &gt;ffff888147009500: 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2
                                                              ^
  ffff888147009580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff888147009600: 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2

for IPv4 packets, sch_fragment() uses a temporary struct dst_entry. Then,
in the following call graph:

  ip_do_fragment()
    ip_skb_dst_mtu()
      ip_dst_mtu_maybe_forward()
        ip_mtu_locked()

the pointer to struct dst_entry is used as pointer to struct rtable: this
turns the access to struct members like rt_mtu_locked into an OOB read in
the stack. Fix this changing the temporary variable used for IPv4 packets
in sch_fragment(), similarly to what is done for IPv6 few lines below.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46954/">CVE-2021-46954 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46954">CVE-2021-46954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220511">SUSE bug 1220511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46955" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46955" ref_url="https://www.suse.com/security/cve/CVE-2021-46955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

openvswitch: fix stack OOB read while fragmenting IPv4 packets

running openvswitch on kernels built with KASAN, it's possible to see the
following splat while testing fragmentation of IPv4 packets:

 BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60
 Read of size 1 at addr ffff888112fc713c by task handler2/1367

 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 Call Trace:
  dump_stack+0x92/0xc1
  print_address_description.constprop.7+0x1a/0x150
  kasan_report.cold.13+0x7f/0x111
  ip_do_fragment+0x1b03/0x1f60
  ovs_fragment+0x5bf/0x840 [openvswitch]
  do_execute_actions+0x1bd5/0x2400 [openvswitch]
  ovs_execute_actions+0xc8/0x3d0 [openvswitch]
  ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch]
  genl_family_rcv_msg_doit.isra.15+0x227/0x2d0
  genl_rcv_msg+0x287/0x490
  netlink_rcv_skb+0x120/0x380
  genl_rcv+0x24/0x40
  netlink_unicast+0x439/0x630
  netlink_sendmsg+0x719/0xbf0
  sock_sendmsg+0xe2/0x110
  ____sys_sendmsg+0x5ba/0x890
  ___sys_sendmsg+0xe9/0x160
  __sys_sendmsg+0xd3/0x170
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f957079db07
 Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 eb ec ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 24 ed ff ff 48
 RSP: 002b:00007f956ce35a50 EFLAGS: 00000293 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 00007f957079db07
 RDX: 0000000000000000 RSI: 00007f956ce35ae0 RDI: 0000000000000019
 RBP: 00007f956ce35ae0 R08: 0000000000000000 R09: 00007f9558006730
 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
 R13: 00007f956ce37308 R14: 00007f956ce35f80 R15: 00007f956ce35ae0

 The buggy address belongs to the page:
 page:00000000af2a1d93 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x112fc7
 flags: 0x17ffffc0000000()
 raw: 0017ffffc0000000 0000000000000000 dead000000000122 0000000000000000
 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
 page dumped because: kasan: bad access detected

 addr ffff888112fc713c is located in stack of task handler2/1367 at offset 180 in frame:
  ovs_fragment+0x0/0x840 [openvswitch]

 this frame has 2 objects:
  [32, 144) 'ovs_dst'
  [192, 424) 'ovs_rt'

 Memory state around the buggy address:
  ffff888112fc7000: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff888112fc7080: 00 f1 f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00
 &gt;ffff888112fc7100: 00 00 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00
                                         ^
  ffff888112fc7180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff888112fc7200: 00 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00

for IPv4 packets, ovs_fragment() uses a temporary struct dst_entry. Then,
in the following call graph:

  ip_do_fragment()
    ip_skb_dst_mtu()
      ip_dst_mtu_maybe_forward()
        ip_mtu_locked()

the pointer to struct dst_entry is used as pointer to struct rtable: this
turns the access to struct members like rt_mtu_locked into an OOB read in
the stack. Fix this changing the temporary variable used for IPv4 packets
in ovs_fragment(), similarly to what is done for IPv6 few lines below.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46955/">CVE-2021-46955 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46955">CVE-2021-46955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220513">SUSE bug 1220513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220537">SUSE bug 1220537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46956" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46956" ref_url="https://www.suse.com/security/cve/CVE-2021-46956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtiofs: fix memory leak in virtio_fs_probe()

When accidentally passing twice the same tag to qemu, kmemleak ended up
reporting a memory leak in virtiofs.  Also, looking at the log I saw the
following error (that's when I realised the duplicated tag):

  virtiofs: probe of virtio5 failed with error -17

Here's the kmemleak log for reference:

unreferenced object 0xffff888103d47800 (size 1024):
  comm "systemd-udevd", pid 118, jiffies 4294893780 (age 18.340s)
  hex dump (first 32 bytes):
    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........
    ff ff ff ff ff ff ff ff 80 90 02 a0 ff ff ff ff  ................
  backtrace:
    [&lt;000000000ebb87c1&gt;] virtio_fs_probe+0x171/0x7ae [virtiofs]
    [&lt;00000000f8aca419&gt;] virtio_dev_probe+0x15f/0x210
    [&lt;000000004d6baf3c&gt;] really_probe+0xea/0x430
    [&lt;00000000a6ceeac8&gt;] device_driver_attach+0xa8/0xb0
    [&lt;00000000196f47a7&gt;] __driver_attach+0x98/0x140
    [&lt;000000000b20601d&gt;] bus_for_each_dev+0x7b/0xc0
    [&lt;00000000399c7b7f&gt;] bus_add_driver+0x11b/0x1f0
    [&lt;0000000032b09ba7&gt;] driver_register+0x8f/0xe0
    [&lt;00000000cdd55998&gt;] 0xffffffffa002c013
    [&lt;000000000ea196a2&gt;] do_one_initcall+0x64/0x2e0
    [&lt;0000000008f727ce&gt;] do_init_module+0x5c/0x260
    [&lt;000000003cdedab6&gt;] __do_sys_finit_module+0xb5/0x120
    [&lt;00000000ad2f48c6&gt;] do_syscall_64+0x33/0x40
    [&lt;00000000809526b5&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46956/">CVE-2021-46956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46956">CVE-2021-46956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220516">SUSE bug 1220516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46957" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46957" ref_url="https://www.suse.com/security/cve/CVE-2021-46957" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe

The execution of sys_read end up hitting a BUG_ON() in __find_get_block
after installing kprobe at sys_read, the BUG message like the following:

[   65.708663] ------------[ cut here ]------------
[   65.709987] kernel BUG at fs/buffer.c:1251!
[   65.711283] Kernel BUG [#1]
[   65.712032] Modules linked in:
[   65.712925] CPU: 0 PID: 51 Comm: sh Not tainted 5.12.0-rc4 #1
[   65.714407] Hardware name: riscv-virtio,qemu (DT)
[   65.715696] epc : __find_get_block+0x218/0x2c8
[   65.716835]  ra : __getblk_gfp+0x1c/0x4a
[   65.717831] epc : ffffffe00019f11e ra : ffffffe00019f56a sp : ffffffe002437930
[   65.719553]  gp : ffffffe000f06030 tp : ffffffe0015abc00 t0 : ffffffe00191e038
[   65.721290]  t1 : ffffffe00191e038 t2 : 000000000000000a s0 : ffffffe002437960
[   65.723051]  s1 : ffffffe00160ad00 a0 : ffffffe00160ad00 a1 : 000000000000012a
[   65.724772]  a2 : 0000000000000400 a3 : 0000000000000008 a4 : 0000000000000040
[   65.726545]  a5 : 0000000000000000 a6 : ffffffe00191e000 a7 : 0000000000000000
[   65.728308]  s2 : 000000000000012a s3 : 0000000000000400 s4 : 0000000000000008
[   65.730049]  s5 : 000000000000006c s6 : ffffffe00240f800 s7 : ffffffe000f080a8
[   65.731802]  s8 : 0000000000000001 s9 : 000000000000012a s10: 0000000000000008
[   65.733516]  s11: 0000000000000008 t3 : 00000000000003ff t4 : 000000000000000f
[   65.734434]  t5 : 00000000000003ff t6 : 0000000000040000
[   65.734613] status: 0000000000000100 badaddr: 0000000000000000 cause: 0000000000000003
[   65.734901] Call Trace:
[   65.735076] [&lt;ffffffe00019f11e&gt;] __find_get_block+0x218/0x2c8
[   65.735417] [&lt;ffffffe00020017a&gt;] __ext4_get_inode_loc+0xb2/0x2f6
[   65.735618] [&lt;ffffffe000201b6c&gt;] ext4_get_inode_loc+0x3a/0x8a
[   65.735802] [&lt;ffffffe000203380&gt;] ext4_reserve_inode_write+0x2e/0x8c
[   65.735999] [&lt;ffffffe00020357a&gt;] __ext4_mark_inode_dirty+0x4c/0x18e
[   65.736208] [&lt;ffffffe000206bb0&gt;] ext4_dirty_inode+0x46/0x66
[   65.736387] [&lt;ffffffe000192914&gt;] __mark_inode_dirty+0x12c/0x3da
[   65.736576] [&lt;ffffffe000180dd2&gt;] touch_atime+0x146/0x150
[   65.736748] [&lt;ffffffe00010d762&gt;] filemap_read+0x234/0x246
[   65.736920] [&lt;ffffffe00010d834&gt;] generic_file_read_iter+0xc0/0x114
[   65.737114] [&lt;ffffffe0001f5d7a&gt;] ext4_file_read_iter+0x42/0xea
[   65.737310] [&lt;ffffffe000163f2c&gt;] new_sync_read+0xe2/0x15a
[   65.737483] [&lt;ffffffe000165814&gt;] vfs_read+0xca/0xf2
[   65.737641] [&lt;ffffffe000165bae&gt;] ksys_read+0x5e/0xc8
[   65.737816] [&lt;ffffffe000165c26&gt;] sys_read+0xe/0x16
[   65.737973] [&lt;ffffffe000003972&gt;] ret_from_syscall+0x0/0x2
[   65.738858] ---[ end trace fe93f985456c935d ]---

A simple reproducer looks like:
	echo 'p:myprobe sys_read fd=%a0 buf=%a1 count=%a2' &gt; /sys/kernel/debug/tracing/kprobe_events
	echo 1 &gt; /sys/kernel/debug/tracing/events/kprobes/myprobe/enable
	cat /sys/kernel/debug/tracing/trace

Here's what happens to hit that BUG_ON():

1) After installing kprobe at entry of sys_read, the first instruction
   is replaced by 'ebreak' instruction on riscv64 platform.

2) Once kernel reach the 'ebreak' instruction at the entry of sys_read,
   it trap into the riscv breakpoint handler, where it do something to
   setup for coming single-step of origin instruction, including backup
   the 'sstatus' in pt_regs, followed by disable interrupt during single
   stepping via clear 'SIE' bit of 'sstatus' in pt_regs.

3) Then kernel restore to the instruction slot contains two instructions,
   one is original instruction at entry of sys_read, the other is 'ebreak'.
   Here it trigger a 'Instruction page fault' exception (value at 'scause'
   is '0xc'), if PF is not filled into PageTabe for that slot yet.

4) Again kernel trap into page fault exception handler, where it choose
   different policy according to the state of running kprobe. Because
   afte 2) the state is KPROBE_HIT_SS, so kernel reset the current kp
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46957/">CVE-2021-46957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46957">CVE-2021-46957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220518">SUSE bug 1220518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46958" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46958" ref_url="https://www.suse.com/security/cve/CVE-2021-46958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race between transaction aborts and fsyncs leading to use-after-free

There is a race between a task aborting a transaction during a commit,
a task doing an fsync and the transaction kthread, which leads to an
use-after-free of the log root tree. When this happens, it results in a
stack trace like the following:

  BTRFS info (device dm-0): forced readonly
  BTRFS warning (device dm-0): Skipping commit of aborted transaction.
  BTRFS: error (device dm-0) in cleanup_transaction:1958: errno=-5 IO failure
  BTRFS warning (device dm-0): lost page write due to IO error on /dev/mapper/error-test (-5)
  BTRFS warning (device dm-0): Skipping commit of aborted transaction.
  BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0xa4e8 len 4096 err no 10
  BTRFS error (device dm-0): error writing primary super block to device 1
  BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0x12e000 len 4096 err no 10
  BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0x12e008 len 4096 err no 10
  BTRFS warning (device dm-0): direct IO failed ino 261 rw 0,0 sector 0x12e010 len 4096 err no 10
  BTRFS: error (device dm-0) in write_all_supers:4110: errno=-5 IO failure (1 errors while writing supers)
  BTRFS: error (device dm-0) in btrfs_sync_log:3308: errno=-5 IO failure
  general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b68: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI
  CPU: 2 PID: 2458471 Comm: fsstress Not tainted 5.12.0-rc5-btrfs-next-84 #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  RIP: 0010:__mutex_lock+0x139/0xa40
  Code: c0 74 19 (...)
  RSP: 0018:ffff9f18830d7b00 EFLAGS: 00010202
  RAX: 6b6b6b6b6b6b6b68 RBX: 0000000000000001 RCX: 0000000000000002
  RDX: ffffffffb9c54d13 RSI: 0000000000000000 RDI: 0000000000000000
  RBP: ffff9f18830d7bc0 R08: 0000000000000000 R09: 0000000000000000
  R10: ffff9f18830d7be0 R11: 0000000000000001 R12: ffff8c6cd199c040
  R13: ffff8c6c95821358 R14: 00000000fffffffb R15: ffff8c6cbcf01358
  FS:  00007fa9140c2b80(0000) GS:ffff8c6fac600000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fa913d52000 CR3: 000000013d2b4003 CR4: 0000000000370ee0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   ? __btrfs_handle_fs_error+0xde/0x146 [btrfs]
   ? btrfs_sync_log+0x7c1/0xf20 [btrfs]
   ? btrfs_sync_log+0x7c1/0xf20 [btrfs]
   btrfs_sync_log+0x7c1/0xf20 [btrfs]
   btrfs_sync_file+0x40c/0x580 [btrfs]
   do_fsync+0x38/0x70
   __x64_sys_fsync+0x10/0x20
   do_syscall_64+0x33/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7fa9142a55c3
  Code: 8b 15 09 (...)
  RSP: 002b:00007fff26278d48 EFLAGS: 00000246 ORIG_RAX: 000000000000004a
  RAX: ffffffffffffffda RBX: 0000563c83cb4560 RCX: 00007fa9142a55c3
  RDX: 00007fff26278cb0 RSI: 00007fff26278cb0 RDI: 0000000000000005
  RBP: 0000000000000005 R08: 0000000000000001 R09: 00007fff26278d5c
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000340
  R13: 00007fff26278de0 R14: 00007fff26278d96 R15: 0000563c83ca57c0
  Modules linked in: btrfs dm_zero dm_snapshot dm_thin_pool (...)
  ---[ end trace ee2f1b19327d791d ]---

The steps that lead to this crash are the following:

1) We are at transaction N;

2) We have two tasks with a transaction handle attached to transaction N.
   Task A and Task B. Task B is doing an fsync;

3) Task B is at btrfs_sync_log(), and has saved fs_info-&gt;log_root_tree
   into a local variable named 'log_root_tree' at the top of
   btrfs_sync_log(). Task B is about to call write_all_supers(), but
   before that...

4) Task A calls btrfs_commit_transaction(), and after it sets the
   transaction state to TRANS_STATE_COMMIT_START, an error happens before
   it w
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46958/">CVE-2021-46958 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46958">CVE-2021-46958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220521">SUSE bug 1220521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46959" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46959" ref_url="https://www.suse.com/security/cve/CVE-2021-46959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: Fix use-after-free with devm_spi_alloc_*

We can't rely on the contents of the devres list during
spi_unregister_controller(), as the list is already torn down at the
time we perform devres_find() for devm_spi_release_controller. This
causes devices registered with devm_spi_alloc_{master,slave}() to be
mistakenly identified as legacy, non-devm managed devices and have their
reference counters decremented below 0.

------------[ cut here ]------------
WARNING: CPU: 1 PID: 660 at lib/refcount.c:28 refcount_warn_saturate+0x108/0x174
[&lt;b0396f04&gt;] (refcount_warn_saturate) from [&lt;b03c56a4&gt;] (kobject_put+0x90/0x98)
[&lt;b03c5614&gt;] (kobject_put) from [&lt;b0447b4c&gt;] (put_device+0x20/0x24)
 r4:b6700140
[&lt;b0447b2c&gt;] (put_device) from [&lt;b07515e8&gt;] (devm_spi_release_controller+0x3c/0x40)
[&lt;b07515ac&gt;] (devm_spi_release_controller) from [&lt;b045343c&gt;] (release_nodes+0x84/0xc4)
 r5:b6700180 r4:b6700100
[&lt;b04533b8&gt;] (release_nodes) from [&lt;b0454160&gt;] (devres_release_all+0x5c/0x60)
 r8:b1638c54 r7:b117ad94 r6:b1638c10 r5:b117ad94 r4:b163dc10
[&lt;b0454104&gt;] (devres_release_all) from [&lt;b044e41c&gt;] (__device_release_driver+0x144/0x1ec)
 r5:b117ad94 r4:b163dc10
[&lt;b044e2d8&gt;] (__device_release_driver) from [&lt;b044f70c&gt;] (device_driver_detach+0x84/0xa0)
 r9:00000000 r8:00000000 r7:b117ad94 r6:b163dc54 r5:b1638c10 r4:b163dc10
[&lt;b044f688&gt;] (device_driver_detach) from [&lt;b044d274&gt;] (unbind_store+0xe4/0xf8)

Instead, determine the devm allocation state as a flag on the
controller which is guaranteed to be stable during cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46959/">CVE-2021-46959 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46959">CVE-2021-46959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220734">SUSE bug 1220734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46960" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46960" ref_url="https://www.suse.com/security/cve/CVE-2021-46960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Return correct error code from smb2_get_enc_key

Avoid a warning if the error percolates back up:

[440700.376476] CIFS VFS: \\otters.example.com crypt_message: Could not get encryption key
[440700.386947] ------------[ cut here ]------------
[440700.386948] err = 1
[440700.386977] WARNING: CPU: 11 PID: 2733 at /build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70
...
[440700.397304] CPU: 11 PID: 2733 Comm: tar Tainted: G           OE     5.4.0-70-generic #78~18.04.1-Ubuntu
...
[440700.397334] Call Trace:
[440700.397346]  __filemap_set_wb_err+0x1a/0x70
[440700.397419]  cifs_writepages+0x9c7/0xb30 [cifs]
[440700.397426]  do_writepages+0x4b/0xe0
[440700.397444]  __filemap_fdatawrite_range+0xcb/0x100
[440700.397455]  filemap_write_and_wait+0x42/0xa0
[440700.397486]  cifs_setattr+0x68b/0xf30 [cifs]
[440700.397493]  notify_change+0x358/0x4a0
[440700.397500]  utimes_common+0xe9/0x1c0
[440700.397510]  do_utimes+0xc5/0x150
[440700.397520]  __x64_sys_utimensat+0x88/0xd0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46960/">CVE-2021-46960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46960">CVE-2021-46960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220528">SUSE bug 1220528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46961" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46961" ref_url="https://www.suse.com/security/cve/CVE-2021-46961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3: Do not enable irqs when handling spurious interrups

We triggered the following error while running our 4.19 kernel
with the pseudo-NMI patches backported to it:

[   14.816231] ------------[ cut here ]------------
[   14.816231] kernel BUG at irq.c:99!
[   14.816232] Internal error: Oops - BUG: 0 [#1] SMP
[   14.816232] Process swapper/0 (pid: 0, stack limit = 0x(____ptrval____))
[   14.816233] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           O      4.19.95.aarch64 #14
[   14.816233] Hardware name: evb (DT)
[   14.816234] pstate: 80400085 (Nzcv daIf +PAN -UAO)
[   14.816234] pc : asm_nmi_enter+0x94/0x98
[   14.816235] lr : asm_nmi_enter+0x18/0x98
[   14.816235] sp : ffff000008003c50
[   14.816235] pmr_save: 00000070
[   14.816237] x29: ffff000008003c50 x28: ffff0000095f56c0
[   14.816238] x27: 0000000000000000 x26: ffff000008004000
[   14.816239] x25: 00000000015e0000 x24: ffff8008fb916000
[   14.816240] x23: 0000000020400005 x22: ffff0000080817cc
[   14.816241] x21: ffff000008003da0 x20: 0000000000000060
[   14.816242] x19: 00000000000003ff x18: ffffffffffffffff
[   14.816243] x17: 0000000000000008 x16: 003d090000000000
[   14.816244] x15: ffff0000095ea6c8 x14: ffff8008fff5ab40
[   14.816244] x13: ffff8008fff58b9d x12: 0000000000000000
[   14.816245] x11: ffff000008c8a200 x10: 000000008e31fca5
[   14.816246] x9 : ffff000008c8a208 x8 : 000000000000000f
[   14.816247] x7 : 0000000000000004 x6 : ffff8008fff58b9e
[   14.816248] x5 : 0000000000000000 x4 : 0000000080000000
[   14.816249] x3 : 0000000000000000 x2 : 0000000080000000
[   14.816250] x1 : 0000000000120000 x0 : ffff0000095f56c0
[   14.816251] Call trace:
[   14.816251]  asm_nmi_enter+0x94/0x98
[   14.816251]  el1_irq+0x8c/0x180                    (IRQ C)
[   14.816252]  gic_handle_irq+0xbc/0x2e4
[   14.816252]  el1_irq+0xcc/0x180                    (IRQ B)
[   14.816253]  arch_timer_handler_virt+0x38/0x58
[   14.816253]  handle_percpu_devid_irq+0x90/0x240
[   14.816253]  generic_handle_irq+0x34/0x50
[   14.816254]  __handle_domain_irq+0x68/0xc0
[   14.816254]  gic_handle_irq+0xf8/0x2e4
[   14.816255]  el1_irq+0xcc/0x180                    (IRQ A)
[   14.816255]  arch_cpu_idle+0x34/0x1c8
[   14.816255]  default_idle_call+0x24/0x44
[   14.816256]  do_idle+0x1d0/0x2c8
[   14.816256]  cpu_startup_entry+0x28/0x30
[   14.816256]  rest_init+0xb8/0xc8
[   14.816257]  start_kernel+0x4c8/0x4f4
[   14.816257] Code: 940587f1 d5384100 b9401001 36a7fd01 (d4210000)
[   14.816258] Modules linked in: start_dp(O) smeth(O)
[   15.103092] ---[ end trace 701753956cb14aa8 ]---
[   15.103093] Kernel panic - not syncing: Fatal exception in interrupt
[   15.103099] SMP: stopping secondary CPUs
[   15.103100] Kernel Offset: disabled
[   15.103100] CPU features: 0x36,a2400218
[   15.103100] Memory Limit: none

which is cause by a 'BUG_ON(in_nmi())' in nmi_enter().

From the call trace, we can find three interrupts (noted A, B, C above):
interrupt (A) is preempted by (B), which is further interrupted by (C).

Subsequent investigations show that (B) results in nmi_enter() being
called, but that it actually is a spurious interrupt. Furthermore,
interrupts are reenabled in the context of (B), and (C) fires with
NMI priority. We end-up with a nested NMI situation, something
we definitely do not want to (and cannot) handle.

The bug here is that spurious interrupts should never result in any
state change, and we should just return to the interrupted context.
Moving the handling of spurious interrupts as early as possible in
the GICv3 handler fixes this issue.

[maz: rewrote commit message, corrected Fixes: tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46961/">CVE-2021-46961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46961">CVE-2021-46961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220529">SUSE bug 1220529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46962" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46962" ref_url="https://www.suse.com/security/cve/CVE-2021-46962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: uniphier-sd: Fix a resource leak in the remove function

A 'tmio_mmc_host_free()' call is missing in the remove function, in order
to balance a 'tmio_mmc_host_alloc()' call in the probe.
This is done in the error handling path of the probe, but not in the remove
function.

Add the missing call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46962/">CVE-2021-46962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46962">CVE-2021-46962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220532">SUSE bug 1220532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46964" ref_url="https://www.suse.com/security/cve/CVE-2021-46964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Reserve extra IRQ vectors

Commit a6dcfe08487e ("scsi: qla2xxx: Limit interrupt vectors to number of
CPUs") lowers the number of allocated MSI-X vectors to the number of CPUs.

That breaks vector allocation assumptions in qla83xx_iospace_config(),
qla24xx_enable_msix() and qla2x00_iospace_config(). Either of the functions
computes maximum number of qpairs as:

  ha-&gt;max_qpairs = ha-&gt;msix_count - 1 (MB interrupt) - 1 (default
                   response queue) - 1 (ATIO, in dual or pure target mode)

max_qpairs is set to zero in case of two CPUs and initiator mode. The
number is then used to allocate ha-&gt;queue_pair_map inside
qla2x00_alloc_queues(). No allocation happens and ha-&gt;queue_pair_map is
left NULL but the driver thinks there are queue pairs available.

qla2xxx_queuecommand() tries to find a qpair in the map and crashes:

  if (ha-&gt;mqenable) {
          uint32_t tag;
          uint16_t hwq;
          struct qla_qpair *qpair = NULL;

          tag = blk_mq_unique_tag(cmd-&gt;request);
          hwq = blk_mq_unique_tag_to_hwq(tag);
          qpair = ha-&gt;queue_pair_map[hwq]; # &lt;- HERE

          if (qpair)
                  return qla2xxx_mqueuecommand(host, cmd, qpair);
  }

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 0 PID: 72 Comm: kworker/u4:3 Tainted: G        W         5.10.0-rc1+ #25
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014
  Workqueue: scsi_wq_7 fc_scsi_scan_rport [scsi_transport_fc]
  RIP: 0010:qla2xxx_queuecommand+0x16b/0x3f0 [qla2xxx]
  Call Trace:
   scsi_queue_rq+0x58c/0xa60
   blk_mq_dispatch_rq_list+0x2b7/0x6f0
   ? __sbitmap_get_word+0x2a/0x80
   __blk_mq_sched_dispatch_requests+0xb8/0x170
   blk_mq_sched_dispatch_requests+0x2b/0x50
   __blk_mq_run_hw_queue+0x49/0xb0
   __blk_mq_delay_run_hw_queue+0xfb/0x150
   blk_mq_sched_insert_request+0xbe/0x110
   blk_execute_rq+0x45/0x70
   __scsi_execute+0x10e/0x250
   scsi_probe_and_add_lun+0x228/0xda0
   __scsi_scan_target+0xf4/0x620
   ? __pm_runtime_resume+0x4f/0x70
   scsi_scan_target+0x100/0x110
   fc_scsi_scan_rport+0xa1/0xb0 [scsi_transport_fc]
   process_one_work+0x1ea/0x3b0
   worker_thread+0x28/0x3b0
   ? process_one_work+0x3b0/0x3b0
   kthread+0x112/0x130
   ? kthread_park+0x80/0x80
   ret_from_fork+0x22/0x30

The driver should allocate enough vectors to provide every CPU it's own HW
queue and still handle reserved (MB, RSP, ATIO) interrupts.

The change fixes the crash on dual core VM and prevents unbalanced QP
allocation where nr_hw_queues is two less than the number of CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46964/">CVE-2021-46964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46964">CVE-2021-46964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220538">SUSE bug 1220538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46965" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46965" ref_url="https://www.suse.com/security/cve/CVE-2021-46965" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: physmap: physmap-bt1-rom: Fix unintentional stack access

Cast &amp;data to (char *) in order to avoid unintentionally accessing
the stack.

Notice that data is of type u32, so any increment to &amp;data
will be in the order of 4-byte chunks, and this piece of code
is actually intended to be a byte offset.

Addresses-Coverity-ID: 1497765 ("Out-of-bounds access")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46965/">CVE-2021-46965 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46965">CVE-2021-46965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220510">SUSE bug 1220510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46967" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46967" ref_url="https://www.suse.com/security/cve/CVE-2021-46967" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost-vdpa: fix vm_flags for virtqueue doorbell mapping

The virtqueue doorbell is usually implemented via registeres but we
don't provide the necessary vma-&gt;flags like VM_PFNMAP. This may cause
several issues e.g when userspace tries to map the doorbell via vhost
IOTLB, kernel may panic due to the page is not backed by page
structure. This patch fixes this by setting the necessary
vm_flags. With this patch, try to map doorbell via IOTLB will fail
with bad address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46967/">CVE-2021-46967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46967">CVE-2021-46967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220527">SUSE bug 1220527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46968" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46968" ref_url="https://www.suse.com/security/cve/CVE-2021-46968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/zcrypt: fix zcard and zqueue hot-unplug memleak

Tests with kvm and a kmemdebug kernel showed, that on hot unplug the
zcard and zqueue structs for the unplugged card or queue are not
properly freed because of a mismatch with get/put for the embedded
kref counter.

This fix now adjusts the handling of the kref counters. With init the
kref counter starts with 1. This initial value needs to drop to zero
with the unregister of the card or queue to trigger the release and
free the object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46968/">CVE-2021-46968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46968">CVE-2021-46968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220689">SUSE bug 1220689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46969" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46969" ref_url="https://www.suse.com/security/cve/CVE-2021-46969" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: core: Fix invalid error returning in mhi_queue

mhi_queue returns an error when the doorbell is not accessible in
the current state. This can happen when the device is in non M0
state, like M3, and needs to be waken-up prior ringing the DB. This
case is managed earlier by triggering an asynchronous M3 exit via
controller resume/suspend callbacks, that in turn will cause M0
transition and DB update.

So, since it's not an error but just delaying of doorbell update, there
is no reason to return an error.

This also fixes a use after free error for skb case, indeed a caller
queuing skb will try to free the skb if the queueing fails, but in
that case queueing has been done.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46969/">CVE-2021-46969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46969">CVE-2021-46969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220694">SUSE bug 1220694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46970" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46970" ref_url="https://www.suse.com/security/cve/CVE-2021-46970" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue

A recent change created a dedicated workqueue for the state-change work
with WQ_HIGHPRI (no strong reason for that) and WQ_MEM_RECLAIM flags,
but the state-change work (mhi_pm_st_worker) does not guarantee forward
progress under memory pressure, and will even wait on various memory
allocations when e.g. creating devices, loading firmware, etc... The
work is then not part of a memory reclaim path...

Moreover, this causes a warning in check_flush_dependency() since we end
up in code that flushes a non-reclaim workqueue:

[   40.969601] workqueue: WQ_MEM_RECLAIM mhi_hiprio_wq:mhi_pm_st_worker [mhi] is flushing !WQ_MEM_RECLAIM events_highpri:flush_backlog
[   40.969612] WARNING: CPU: 4 PID: 158 at kernel/workqueue.c:2607 check_flush_dependency+0x11c/0x140
[   40.969733] Call Trace:
[   40.969740]  __flush_work+0x97/0x1d0
[   40.969745]  ? wake_up_process+0x15/0x20
[   40.969749]  ? insert_work+0x70/0x80
[   40.969750]  ? __queue_work+0x14a/0x3e0
[   40.969753]  flush_work+0x10/0x20
[   40.969756]  rollback_registered_many+0x1c9/0x510
[   40.969759]  unregister_netdevice_queue+0x94/0x120
[   40.969761]  unregister_netdev+0x1d/0x30
[   40.969765]  mhi_net_remove+0x1a/0x40 [mhi_net]
[   40.969770]  mhi_driver_remove+0x124/0x250 [mhi]
[   40.969776]  device_release_driver_internal+0xf0/0x1d0
[   40.969778]  device_release_driver+0x12/0x20
[   40.969782]  bus_remove_device+0xe1/0x150
[   40.969786]  device_del+0x17b/0x3e0
[   40.969791]  mhi_destroy_device+0x9a/0x100 [mhi]
[   40.969796]  ? mhi_unmap_single_use_bb+0x50/0x50 [mhi]
[   40.969799]  device_for_each_child+0x5e/0xa0
[   40.969804]  mhi_pm_st_worker+0x921/0xf50 [mhi]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46970/">CVE-2021-46970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46970">CVE-2021-46970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220601">SUSE bug 1220601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46971" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46971" ref_url="https://www.suse.com/security/cve/CVE-2021-46971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Fix unconditional security_locked_down() call

Currently, the lockdown state is queried unconditionally, even though
its result is used only if the PERF_SAMPLE_REGS_INTR bit is set in
attr.sample_type. While that doesn't matter in case of the Lockdown LSM,
it causes trouble with the SELinux's lockdown hook implementation.

SELinux implements the locked_down hook with a check whether the current
task's type has the corresponding "lockdown" class permission
("integrity" or "confidentiality") allowed in the policy. This means
that calling the hook when the access control decision would be ignored
generates a bogus permission check and audit record.

Fix this by checking sample_type first and only calling the hook when
its result would be honored.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46971/">CVE-2021-46971 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46971">CVE-2021-46971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220697">SUSE bug 1220697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46972" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46972" ref_url="https://www.suse.com/security/cve/CVE-2021-46972" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix leaked dentry

Since commit 6815f479ca90 ("ovl: use only uppermetacopy state in
ovl_lookup()"), overlayfs doesn't put temporary dentry when there is a
metacopy error, which leads to dentry leaks when shutting down the related
superblock:

  overlayfs: refusing to follow metacopy origin for (/file0)
  ...
  BUG: Dentry (____ptrval____){i=3f33,n=file3}  still in use (1) [unmount of overlay overlay]
  ...
  WARNING: CPU: 1 PID: 432 at umount_check.cold+0x107/0x14d
  CPU: 1 PID: 432 Comm: unmount-overlay Not tainted 5.12.0-rc5 #1
  ...
  RIP: 0010:umount_check.cold+0x107/0x14d
  ...
  Call Trace:
   d_walk+0x28c/0x950
   ? dentry_lru_isolate+0x2b0/0x2b0
   ? __kasan_slab_free+0x12/0x20
   do_one_tree+0x33/0x60
   shrink_dcache_for_umount+0x78/0x1d0
   generic_shutdown_super+0x70/0x440
   kill_anon_super+0x3e/0x70
   deactivate_locked_super+0xc4/0x160
   deactivate_super+0xfa/0x140
   cleanup_mnt+0x22e/0x370
   __cleanup_mnt+0x1a/0x30
   task_work_run+0x139/0x210
   do_exit+0xb0c/0x2820
   ? __kasan_check_read+0x1d/0x30
   ? find_held_lock+0x35/0x160
   ? lock_release+0x1b6/0x660
   ? mm_update_next_owner+0xa20/0xa20
   ? reacquire_held_locks+0x3f0/0x3f0
   ? __sanitizer_cov_trace_const_cmp4+0x22/0x30
   do_group_exit+0x135/0x380
   __do_sys_exit_group.isra.0+0x20/0x20
   __x64_sys_exit_group+0x3c/0x50
   do_syscall_64+0x45/0x70
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  ...
  VFS: Busy inodes after unmount of overlay. Self-destruct in 5 seconds.  Have a nice day...

This fix has been tested with a syzkaller reproducer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46972/">CVE-2021-46972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46972">CVE-2021-46972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220609">SUSE bug 1220609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46973" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46973" ref_url="https://www.suse.com/security/cve/CVE-2021-46973" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: Avoid potential use after free in MHI send

It is possible that the MHI ul_callback will be invoked immediately
following the queueing of the skb for transmission, leading to the
callback decrementing the refcount of the associated sk and freeing the
skb.

As such the dereference of skb and the increment of the sk refcount must
happen before the skb is queued, to avoid the skb to be used after free
and potentially the sk to drop its last refcount..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46973/">CVE-2021-46973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46973">CVE-2021-46973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220699">SUSE bug 1220699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46975" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46975" ref_url="https://www.suse.com/security/cve/CVE-2021-46975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-05-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46975/">CVE-2021-46975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46975">CVE-2021-46975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220505">SUSE bug 1220505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46976" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46976" ref_url="https://www.suse.com/security/cve/CVE-2021-46976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix crash in auto_retire

The retire logic uses the 2 lower bits of the pointer to the retire
function to store flags. However, the auto_retire function is not
guaranteed to be aligned to a multiple of 4, which causes crashes as
we jump to the wrong address, for example like this:

2021-04-24T18:03:53.804300Z WARNING kernel: [  516.876901] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
2021-04-24T18:03:53.804310Z WARNING kernel: [  516.876906] CPU: 7 PID: 146 Comm: kworker/u16:6 Tainted: G     U            5.4.105-13595-g3cd84167b2df #1
2021-04-24T18:03:53.804311Z WARNING kernel: [  516.876907] Hardware name: Google Volteer2/Volteer2, BIOS Google_Volteer2.13672.76.0 02/22/2021
2021-04-24T18:03:53.804312Z WARNING kernel: [  516.876911] Workqueue: events_unbound active_work
2021-04-24T18:03:53.804313Z WARNING kernel: [  516.876914] RIP: 0010:auto_retire+0x1/0x20
2021-04-24T18:03:53.804314Z WARNING kernel: [  516.876916] Code: e8 01 f2 ff ff eb 02 31 db 48 89 d8 5b 5d c3 0f 1f 44 00 00 55 48 89 e5 f0 ff 87 c8 00 00 00 0f 88 ab 47 4a 00 31 c0 5d c3 0f &lt;1f&gt; 44 00 00 55 48 89 e5 f0 ff 8f c8 00 00 00 0f 88 9a 47 4a 00 74
2021-04-24T18:03:53.804319Z WARNING kernel: [  516.876918] RSP: 0018:ffff9b4d809fbe38 EFLAGS: 00010286
2021-04-24T18:03:53.804320Z WARNING kernel: [  516.876919] RAX: 0000000000000007 RBX: ffff927915079600 RCX: 0000000000000007
2021-04-24T18:03:53.804320Z WARNING kernel: [  516.876921] RDX: ffff9b4d809fbe40 RSI: 0000000000000286 RDI: ffff927915079600
2021-04-24T18:03:53.804321Z WARNING kernel: [  516.876922] RBP: ffff9b4d809fbe68 R08: 8080808080808080 R09: fefefefefefefeff
2021-04-24T18:03:53.804321Z WARNING kernel: [  516.876924] R10: 0000000000000010 R11: ffffffff92e44bd8 R12: ffff9279150796a0
2021-04-24T18:03:53.804322Z WARNING kernel: [  516.876925] R13: ffff92791c368180 R14: ffff927915079640 R15: 000000001c867605
2021-04-24T18:03:53.804323Z WARNING kernel: [  516.876926] FS:  0000000000000000(0000) GS:ffff92791ffc0000(0000) knlGS:0000000000000000
2021-04-24T18:03:53.804323Z WARNING kernel: [  516.876928] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
2021-04-24T18:03:53.804324Z WARNING kernel: [  516.876929] CR2: 0000239514955000 CR3: 00000007f82da001 CR4: 0000000000760ee0
2021-04-24T18:03:53.804325Z WARNING kernel: [  516.876930] PKRU: 55555554
2021-04-24T18:03:53.804325Z WARNING kernel: [  516.876931] Call Trace:
2021-04-24T18:03:53.804326Z WARNING kernel: [  516.876935]  __active_retire+0x77/0xcf
2021-04-24T18:03:53.804326Z WARNING kernel: [  516.876939]  process_one_work+0x1da/0x394
2021-04-24T18:03:53.804327Z WARNING kernel: [  516.876941]  worker_thread+0x216/0x375
2021-04-24T18:03:53.804327Z WARNING kernel: [  516.876944]  kthread+0x147/0x156
2021-04-24T18:03:53.804335Z WARNING kernel: [  516.876946]  ? pr_cont_work+0x58/0x58
2021-04-24T18:03:53.804335Z WARNING kernel: [  516.876948]  ? kthread_blkcg+0x2e/0x2e
2021-04-24T18:03:53.804336Z WARNING kernel: [  516.876950]  ret_from_fork+0x1f/0x40
2021-04-24T18:03:53.804336Z WARNING kernel: [  516.876952] Modules linked in: cdc_mbim cdc_ncm cdc_wdm xt_cgroup rfcomm cmac algif_hash algif_skcipher af_alg xt_MASQUERADE uinput snd_soc_rt5682_sdw snd_soc_rt5682 snd_soc_max98373_sdw snd_soc_max98373 snd_soc_rl6231 regmap_sdw snd_soc_sof_sdw snd_soc_hdac_hdmi snd_soc_dmic snd_hda_codec_hdmi snd_sof_pci snd_sof_intel_hda_common intel_ipu6_psys snd_sof_xtensa_dsp soundwire_intel soundwire_generic_allocation soundwire_cadence snd_sof_intel_hda snd_sof snd_soc_hdac_hda snd_soc_acpi_intel_match snd_soc_acpi snd_hda_ext_core soundwire_bus snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hwdep snd_hda_core intel_ipu6_isys videobuf2_dma_contig videobuf2_v4l2 videobuf2_common videobuf2_memops mei_hdcp intel_ipu6 ov2740 ov8856 at24 sx9310 dw9768 v4l2_fwnode cros_ec_typec intel_pmc_mux roles acpi_als typec fuse iio_trig_sysfs cros_ec_light_prox cros_ec_lid_angle cros_ec_sensors cros
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46976/">CVE-2021-46976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46976">CVE-2021-46976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220621">SUSE bug 1220621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46977" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46977" ref_url="https://www.suse.com/security/cve/CVE-2021-46977" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Disable preemption when probing user return MSRs

Disable preemption when probing a user return MSR via RDSMR/WRMSR.  If
the MSR holds a different value per logical CPU, the WRMSR could corrupt
the host's value if KVM is preempted between the RDMSR and WRMSR, and
then rescheduled on a different CPU.

Opportunistically land the helper in common x86, SVM will use the helper
in a future commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46977/">CVE-2021-46977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46977">CVE-2021-46977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220606">SUSE bug 1220606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46978" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46978" ref_url="https://www.suse.com/security/cve/CVE-2021-46978" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: nVMX: Always make an attempt to map eVMCS after migration

When enlightened VMCS is in use and nested state is migrated with
vmx_get_nested_state()/vmx_set_nested_state() KVM can't map evmcs
page right away: evmcs gpa is not 'struct kvm_vmx_nested_state_hdr'
and we can't read it from VP assist page because userspace may decide
to restore HV_X64_MSR_VP_ASSIST_PAGE after restoring nested state
(and QEMU, for example, does exactly that). To make sure eVMCS is
mapped /vmx_set_nested_state() raises KVM_REQ_GET_NESTED_STATE_PAGES
request.

Commit f2c7ef3ba955 ("KVM: nSVM: cancel KVM_REQ_GET_NESTED_STATE_PAGES
on nested vmexit") added KVM_REQ_GET_NESTED_STATE_PAGES clearing to
nested_vmx_vmexit() to make sure MSR permission bitmap is not switched
when an immediate exit from L2 to L1 happens right after migration (caused
by a pending event, for example). Unfortunately, in the exact same
situation we still need to have eVMCS mapped so
nested_sync_vmcs12_to_shadow() reflects changes in VMCS12 to eVMCS.

As a band-aid, restore nested_get_evmcs_page() when clearing
KVM_REQ_GET_NESTED_STATE_PAGES in nested_vmx_vmexit(). The 'fix' is far
from being ideal as we can't easily propagate possible failures and even if
we could, this is most likely already too late to do so. The whole
'KVM_REQ_GET_NESTED_STATE_PAGES' idea for mapping eVMCS after migration
seems to be fragile as we diverge too much from the 'native' path when
vmptr loading happens on vmx_set_nested_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46978/">CVE-2021-46978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46978">CVE-2021-46978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220610">SUSE bug 1220610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46979" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46979" ref_url="https://www.suse.com/security/cve/CVE-2021-46979" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: core: fix ioctl handlers removal

Currently ioctl handlers are removed twice. For the first time during
iio_device_unregister() then later on inside
iio_device_unregister_eventset() and iio_buffers_free_sysfs_and_mask().
Double free leads to kernel panic.

Fix this by not touching ioctl handlers list directly but rather
letting code responsible for registration call the matching cleanup
routine itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46979/">CVE-2021-46979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46979">CVE-2021-46979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220623">SUSE bug 1220623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46980" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46980" ref_url="https://www.suse.com/security/cve/CVE-2021-46980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4

commit 4dbc6a4ef06d ("usb: typec: ucsi: save power data objects
in PD mode") introduced retrieval of the PDOs when connected to a
PD-capable source. But only the first 4 PDOs are received since
that is the maximum number that can be fetched at a time given the
MESSAGE_IN length limitation (16 bytes). However, as per the PD spec
a connected source may advertise up to a maximum of 7 PDOs.

If such a source is connected it's possible the PPM could have
negotiated a power contract with one of the PDOs at index greater
than 4, and would be reflected in the request data object's (RDO)
object position field. This would result in an out-of-bounds access
when the rdo_index() is used to index into the src_pdos array in
ucsi_psy_get_voltage_now().

With the help of the UBSAN -fsanitize=array-bounds checker enabled
this exact issue is revealed when connecting to a PD source adapter
that advertise 5 PDOs and the PPM enters a contract having selected
the 5th one.

[  151.545106][   T70] Unexpected kernel BRK exception at EL1
[  151.545112][   T70] Internal error: BRK handler: f2005512 [#1] PREEMPT SMP
...
[  151.545499][   T70] pc : ucsi_psy_get_prop+0x208/0x20c
[  151.545507][   T70] lr : power_supply_show_property+0xc0/0x328
...
[  151.545542][   T70] Call trace:
[  151.545544][   T70]  ucsi_psy_get_prop+0x208/0x20c
[  151.545546][   T70]  power_supply_uevent+0x1a4/0x2f0
[  151.545550][   T70]  dev_uevent+0x200/0x384
[  151.545555][   T70]  kobject_uevent_env+0x1d4/0x7e8
[  151.545557][   T70]  power_supply_changed_work+0x174/0x31c
[  151.545562][   T70]  process_one_work+0x244/0x6f0
[  151.545564][   T70]  worker_thread+0x3e0/0xa64

We can resolve this by instead retrieving and storing up to the
maximum of 7 PDOs in the con-&gt;src_pdos array. This would involve
two calls to the GET_PDOS command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46980/">CVE-2021-46980 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46980">CVE-2021-46980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220663">SUSE bug 1220663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46981" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46981" ref_url="https://www.suse.com/security/cve/CVE-2021-46981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: Fix NULL pointer in flush_workqueue

Open /dev/nbdX first, the config_refs will be 1 and
the pointers in nbd_device are still null. Disconnect
/dev/nbdX, then reference a null recv_workq. The
protection by config_refs in nbd_genl_disconnect is useless.

[  656.366194] BUG: kernel NULL pointer dereference, address: 0000000000000020
[  656.368943] #PF: supervisor write access in kernel mode
[  656.369844] #PF: error_code(0x0002) - not-present page
[  656.370717] PGD 10cc87067 P4D 10cc87067 PUD 1074b4067 PMD 0
[  656.371693] Oops: 0002 [#1] SMP
[  656.372242] CPU: 5 PID: 7977 Comm: nbd-client Not tainted 5.11.0-rc5-00040-g76c057c84d28 #1
[  656.373661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014
[  656.375904] RIP: 0010:mutex_lock+0x29/0x60
[  656.376627] Code: 00 0f 1f 44 00 00 55 48 89 fd 48 83 05 6f d7 fe 08 01 e8 7a c3 ff ff 48 83 05 6a d7 fe 08 01 31 c0 65 48 8b 14 25 00 6d 01 00 &lt;f0&gt; 48 0f b1 55 d
[  656.378934] RSP: 0018:ffffc900005eb9b0 EFLAGS: 00010246
[  656.379350] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  656.379915] RDX: ffff888104cf2600 RSI: ffffffffaae8f452 RDI: 0000000000000020
[  656.380473] RBP: 0000000000000020 R08: 0000000000000000 R09: ffff88813bd6b318
[  656.381039] R10: 00000000000000c7 R11: fefefefefefefeff R12: ffff888102710b40
[  656.381599] R13: ffffc900005eb9e0 R14: ffffffffb2930680 R15: ffff88810770ef00
[  656.382166] FS:  00007fdf117ebb40(0000) GS:ffff88813bd40000(0000) knlGS:0000000000000000
[  656.382806] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  656.383261] CR2: 0000000000000020 CR3: 0000000100c84000 CR4: 00000000000006e0
[  656.383819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  656.384370] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  656.384927] Call Trace:
[  656.385111]  flush_workqueue+0x92/0x6c0
[  656.385395]  nbd_disconnect_and_put+0x81/0xd0
[  656.385716]  nbd_genl_disconnect+0x125/0x2a0
[  656.386034]  genl_family_rcv_msg_doit.isra.0+0x102/0x1b0
[  656.386422]  genl_rcv_msg+0xfc/0x2b0
[  656.386685]  ? nbd_ioctl+0x490/0x490
[  656.386954]  ? genl_family_rcv_msg_doit.isra.0+0x1b0/0x1b0
[  656.387354]  netlink_rcv_skb+0x62/0x180
[  656.387638]  genl_rcv+0x34/0x60
[  656.387874]  netlink_unicast+0x26d/0x590
[  656.388162]  netlink_sendmsg+0x398/0x6c0
[  656.388451]  ? netlink_rcv_skb+0x180/0x180
[  656.388750]  ____sys_sendmsg+0x1da/0x320
[  656.389038]  ? ____sys_recvmsg+0x130/0x220
[  656.389334]  ___sys_sendmsg+0x8e/0xf0
[  656.389605]  ? ___sys_recvmsg+0xa2/0xf0
[  656.389889]  ? handle_mm_fault+0x1671/0x21d0
[  656.390201]  __sys_sendmsg+0x6d/0xe0
[  656.390464]  __x64_sys_sendmsg+0x23/0x30
[  656.390751]  do_syscall_64+0x45/0x70
[  656.391017]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

To fix it, just add if (nbd-&gt;recv_workq) to nbd_disconnect_and_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46981/">CVE-2021-46981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46981">CVE-2021-46981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220611">SUSE bug 1220611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46982" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46982" ref_url="https://www.suse.com/security/cve/CVE-2021-46982" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix race condition of overwrite vs truncate

pos_fsstress testcase complains a panic as belew:

------------[ cut here ]------------
kernel BUG at fs/f2fs/compress.c:1082!
invalid opcode: 0000 [#1] SMP PTI
CPU: 4 PID: 2753477 Comm: kworker/u16:2 Tainted: G           OE     5.12.0-rc1-custom #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
Workqueue: writeback wb_workfn (flush-252:16)
RIP: 0010:prepare_compress_overwrite+0x4c0/0x760 [f2fs]
Call Trace:
 f2fs_prepare_compress_overwrite+0x5f/0x80 [f2fs]
 f2fs_write_cache_pages+0x468/0x8a0 [f2fs]
 f2fs_write_data_pages+0x2a4/0x2f0 [f2fs]
 do_writepages+0x38/0xc0
 __writeback_single_inode+0x44/0x2a0
 writeback_sb_inodes+0x223/0x4d0
 __writeback_inodes_wb+0x56/0xf0
 wb_writeback+0x1dd/0x290
 wb_workfn+0x309/0x500
 process_one_work+0x220/0x3c0
 worker_thread+0x53/0x420
 kthread+0x12f/0x150
 ret_from_fork+0x22/0x30

The root cause is truncate() may race with overwrite as below,
so that one reference count left in page can not guarantee the
page attaching in mapping tree all the time, after truncation,
later find_lock_page() may return NULL pointer.

- prepare_compress_overwrite
 - f2fs_pagecache_get_page
 - unlock_page
					- f2fs_setattr
					 - truncate_setsize
					  - truncate_inode_page
					   - delete_from_page_cache
 - find_lock_page

Fix this by avoiding referencing updated page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46982/">CVE-2021-46982 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46982">CVE-2021-46982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220617">SUSE bug 1220617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46983" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46983" ref_url="https://www.suse.com/security/cve/CVE-2021-46983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-rdma: Fix NULL deref when SEND is completed with error

When running some traffic and taking down the link on peer, a
retry counter exceeded error is received. This leads to
nvmet_rdma_error_comp which tried accessing the cq_context to
obtain the queue. The cq_context is no longer valid after the
fix to use shared CQ mechanism and should be obtained similar
to how it is obtained in other functions from the wc-&gt;qp.

[ 905.786331] nvmet_rdma: SEND for CQE 0x00000000e3337f90 failed with status transport retry counter exceeded (12).
[ 905.832048] BUG: unable to handle kernel NULL pointer dereference at 0000000000000048
[ 905.839919] PGD 0 P4D 0
[ 905.842464] Oops: 0000 1 SMP NOPTI
[ 905.846144] CPU: 13 PID: 1557 Comm: kworker/13:1H Kdump: loaded Tainted: G OE --------- - - 4.18.0-304.el8.x86_64 #1
[ 905.872135] RIP: 0010:nvmet_rdma_error_comp+0x5/0x1b [nvmet_rdma]
[ 905.878259] Code: 19 4f c0 e8 89 b3 a5 f6 e9 5b e0 ff ff 0f b7 75 14 4c 89 ea 48 c7 c7 08 1a 4f c0 e8 71 b3 a5 f6 e9 4b e0 ff ff 0f 1f 44 00 00 &lt;48&gt; 8b 47 48 48 85 c0 74 08 48 89 c7 e9 98 bf 49 00 e9 c3 e3 ff ff
[ 905.897135] RSP: 0018:ffffab601c45fe28 EFLAGS: 00010246
[ 905.902387] RAX: 0000000000000065 RBX: ffff9e729ea2f800 RCX: 0000000000000000
[ 905.909558] RDX: 0000000000000000 RSI: ffff9e72df9567c8 RDI: 0000000000000000
[ 905.916731] RBP: ffff9e729ea2b400 R08: 000000000000074d R09: 0000000000000074
[ 905.923903] R10: 0000000000000000 R11: ffffab601c45fcc0 R12: 0000000000000010
[ 905.931074] R13: 0000000000000000 R14: 0000000000000010 R15: ffff9e729ea2f400
[ 905.938247] FS: 0000000000000000(0000) GS:ffff9e72df940000(0000) knlGS:0000000000000000
[ 905.938249] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 905.950067] nvmet_rdma: SEND for CQE 0x00000000c7356cca failed with status transport retry counter exceeded (12).
[ 905.961855] CR2: 0000000000000048 CR3: 000000678d010004 CR4: 00000000007706e0
[ 905.961855] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 905.961856] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 905.961857] PKRU: 55555554
[ 906.010315] Call Trace:
[ 906.012778] __ib_process_cq+0x89/0x170 [ib_core]
[ 906.017509] ib_cq_poll_work+0x26/0x80 [ib_core]
[ 906.022152] process_one_work+0x1a7/0x360
[ 906.026182] ? create_worker+0x1a0/0x1a0
[ 906.030123] worker_thread+0x30/0x390
[ 906.033802] ? create_worker+0x1a0/0x1a0
[ 906.037744] kthread+0x116/0x130
[ 906.040988] ? kthread_flush_work_fn+0x10/0x10
[ 906.045456] ret_from_fork+0x1f/0x40
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46983/">CVE-2021-46983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46983">CVE-2021-46983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220639">SUSE bug 1220639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46984" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46984" ref_url="https://www.suse.com/security/cve/CVE-2021-46984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kyber: fix out of bounds access when preempted

__blk_mq_sched_bio_merge() gets the ctx and hctx for the current CPU and
passes the hctx to -&gt;bio_merge(). kyber_bio_merge() then gets the ctx
for the current CPU again and uses that to get the corresponding Kyber
context in the passed hctx. However, the thread may be preempted between
the two calls to blk_mq_get_ctx(), and the ctx returned the second time
may no longer correspond to the passed hctx. This "works" accidentally
most of the time, but it can cause us to read garbage if the second ctx
came from an hctx with more ctx's than the first one (i.e., if
ctx-&gt;index_hw[hctx-&gt;type] &gt; hctx-&gt;nr_ctx).

This manifested as this UBSAN array index out of bounds error reported
by Jakub:

UBSAN: array-index-out-of-bounds in ../kernel/locking/qspinlock.c:130:9
index 13106 is out of range for type 'long unsigned int [128]'
Call Trace:
 dump_stack+0xa4/0xe5
 ubsan_epilogue+0x5/0x40
 __ubsan_handle_out_of_bounds.cold.13+0x2a/0x34
 queued_spin_lock_slowpath+0x476/0x480
 do_raw_spin_lock+0x1c2/0x1d0
 kyber_bio_merge+0x112/0x180
 blk_mq_submit_bio+0x1f5/0x1100
 submit_bio_noacct+0x7b0/0x870
 submit_bio+0xc2/0x3a0
 btrfs_map_bio+0x4f0/0x9d0
 btrfs_submit_data_bio+0x24e/0x310
 submit_one_bio+0x7f/0xb0
 submit_extent_page+0xc4/0x440
 __extent_writepage_io+0x2b8/0x5e0
 __extent_writepage+0x28d/0x6e0
 extent_write_cache_pages+0x4d7/0x7a0
 extent_writepages+0xa2/0x110
 do_writepages+0x8f/0x180
 __writeback_single_inode+0x99/0x7f0
 writeback_sb_inodes+0x34e/0x790
 __writeback_inodes_wb+0x9e/0x120
 wb_writeback+0x4d2/0x660
 wb_workfn+0x64d/0xa10
 process_one_work+0x53a/0xa80
 worker_thread+0x69/0x5b0
 kthread+0x20b/0x240
 ret_from_fork+0x1f/0x30

Only Kyber uses the hctx, so fix it by passing the request_queue to
-&gt;bio_merge() instead. BFQ and mq-deadline just use that, and Kyber can
map the queues itself to avoid the mismatch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46984/">CVE-2021-46984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46984">CVE-2021-46984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220631">SUSE bug 1220631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46985" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46985" ref_url="https://www.suse.com/security/cve/CVE-2021-46985" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: scan: Fix a memory leak in an error handling path

If 'acpi_device_set_name()' fails, we must free
'acpi_device_bus_id-&gt;bus_id' or there is a (potential) memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46985/">CVE-2021-46985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46985">CVE-2021-46985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220620">SUSE bug 1220620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46986" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46986" ref_url="https://www.suse.com/security/cve/CVE-2021-46986" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Free gadget structure only after freeing endpoints

As part of commit e81a7018d93a ("usb: dwc3: allocate gadget structure
dynamically") the dwc3_gadget_release() was added which will free
the dwc-&gt;gadget structure upon the device's removal when
usb_del_gadget_udc() is called in dwc3_gadget_exit().

However, simply freeing the gadget results a dangling pointer
situation: the endpoints created in dwc3_gadget_init_endpoints()
have their dep-&gt;endpoint.ep_list members chained off the list_head
anchored at dwc-&gt;gadget-&gt;ep_list.  Thus when dwc-&gt;gadget is freed,
the first dwc3_ep in the list now has a dangling prev pointer and
likewise for the next pointer of the dwc3_ep at the tail of the list.
The dwc3_gadget_free_endpoints() that follows will result in a
use-after-free when it calls list_del().

This was caught by enabling KASAN and performing a driver unbind.
The recent commit 568262bf5492 ("usb: dwc3: core: Add shutdown
callback for dwc3") also exposes this as a panic during shutdown.

There are a few possibilities to fix this.  One could be to perform
a list_del() of the gadget-&gt;ep_list itself which removes it from
the rest of the dwc3_ep chain.

Another approach is what this patch does, by splitting up the
usb_del_gadget_udc() call into its separate "del" and "put"
components.  This allows dwc3_gadget_free_endpoints() to be
called before the gadget is finally freed with usb_put_gadget().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46986/">CVE-2021-46986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46986">CVE-2021-46986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220701">SUSE bug 1220701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46987" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46987" ref_url="https://www.suse.com/security/cve/CVE-2021-46987" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock when cloning inline extents and using qgroups

There are a few exceptional cases where cloning an inline extent needs to
copy the inline extent data into a page of the destination inode.

When this happens, we end up starting a transaction while having a dirty
page for the destination inode and while having the range locked in the
destination's inode iotree too. Because when reserving metadata space
for a transaction we may need to flush existing delalloc in case there is
not enough free space, we have a mechanism in place to prevent a deadlock,
which was introduced in commit 3d45f221ce627d ("btrfs: fix deadlock when
cloning inline extent and low on free metadata space").

However when using qgroups, a transaction also reserves metadata qgroup
space, which can also result in flushing delalloc in case there is not
enough available space at the moment. When this happens we deadlock, since
flushing delalloc requires locking the file range in the inode's iotree
and the range was already locked at the very beginning of the clone
operation, before attempting to start the transaction.

When this issue happens, stack traces like the following are reported:

  [72747.556262] task:kworker/u81:9   state:D stack:    0 pid:  225 ppid:     2 flags:0x00004000
  [72747.556268] Workqueue: writeback wb_workfn (flush-btrfs-1142)
  [72747.556271] Call Trace:
  [72747.556273]  __schedule+0x296/0x760
  [72747.556277]  schedule+0x3c/0xa0
  [72747.556279]  io_schedule+0x12/0x40
  [72747.556284]  __lock_page+0x13c/0x280
  [72747.556287]  ? generic_file_readonly_mmap+0x70/0x70
  [72747.556325]  extent_write_cache_pages+0x22a/0x440 [btrfs]
  [72747.556331]  ? __set_page_dirty_nobuffers+0xe7/0x160
  [72747.556358]  ? set_extent_buffer_dirty+0x5e/0x80 [btrfs]
  [72747.556362]  ? update_group_capacity+0x25/0x210
  [72747.556366]  ? cpumask_next_and+0x1a/0x20
  [72747.556391]  extent_writepages+0x44/0xa0 [btrfs]
  [72747.556394]  do_writepages+0x41/0xd0
  [72747.556398]  __writeback_single_inode+0x39/0x2a0
  [72747.556403]  writeback_sb_inodes+0x1ea/0x440
  [72747.556407]  __writeback_inodes_wb+0x5f/0xc0
  [72747.556410]  wb_writeback+0x235/0x2b0
  [72747.556414]  ? get_nr_inodes+0x35/0x50
  [72747.556417]  wb_workfn+0x354/0x490
  [72747.556420]  ? newidle_balance+0x2c5/0x3e0
  [72747.556424]  process_one_work+0x1aa/0x340
  [72747.556426]  worker_thread+0x30/0x390
  [72747.556429]  ? create_worker+0x1a0/0x1a0
  [72747.556432]  kthread+0x116/0x130
  [72747.556435]  ? kthread_park+0x80/0x80
  [72747.556438]  ret_from_fork+0x1f/0x30

  [72747.566958] Workqueue: btrfs-flush_delalloc btrfs_work_helper [btrfs]
  [72747.566961] Call Trace:
  [72747.566964]  __schedule+0x296/0x760
  [72747.566968]  ? finish_wait+0x80/0x80
  [72747.566970]  schedule+0x3c/0xa0
  [72747.566995]  wait_extent_bit.constprop.68+0x13b/0x1c0 [btrfs]
  [72747.566999]  ? finish_wait+0x80/0x80
  [72747.567024]  lock_extent_bits+0x37/0x90 [btrfs]
  [72747.567047]  btrfs_invalidatepage+0x299/0x2c0 [btrfs]
  [72747.567051]  ? find_get_pages_range_tag+0x2cd/0x380
  [72747.567076]  __extent_writepage+0x203/0x320 [btrfs]
  [72747.567102]  extent_write_cache_pages+0x2bb/0x440 [btrfs]
  [72747.567106]  ? update_load_avg+0x7e/0x5f0
  [72747.567109]  ? enqueue_entity+0xf4/0x6f0
  [72747.567134]  extent_writepages+0x44/0xa0 [btrfs]
  [72747.567137]  ? enqueue_task_fair+0x93/0x6f0
  [72747.567140]  do_writepages+0x41/0xd0
  [72747.567144]  __filemap_fdatawrite_range+0xc7/0x100
  [72747.567167]  btrfs_run_delalloc_work+0x17/0x40 [btrfs]
  [72747.567195]  btrfs_work_helper+0xc2/0x300 [btrfs]
  [72747.567200]  process_one_work+0x1aa/0x340
  [72747.567202]  worker_thread+0x30/0x390
  [72747.567205]  ? create_worker+0x1a0/0x1a0
  [72747.567208]  kthread+0x116/0x130
  [72747.567211]  ? kthread_park+0x80/0x80
  [72747.567214]  ret_from_fork+0x1f/0x30

  [72747.569686] task:fsstress        state:D stack:    
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46987/">CVE-2021-46987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46987">CVE-2021-46987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220704">SUSE bug 1220704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46988" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46988" ref_url="https://www.suse.com/security/cve/CVE-2021-46988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: release page in error path to avoid BUG_ON

Consider the following sequence of events:

1. Userspace issues a UFFD ioctl, which ends up calling into
   shmem_mfill_atomic_pte(). We successfully account the blocks, we
   shmem_alloc_page(), but then the copy_from_user() fails. We return
   -ENOENT. We don't release the page we allocated.
2. Our caller detects this error code, tries the copy_from_user() after
   dropping the mmap_lock, and retries, calling back into
   shmem_mfill_atomic_pte().
3. Meanwhile, let's say another process filled up the tmpfs being used.
4. So shmem_mfill_atomic_pte() fails to account blocks this time, and
   immediately returns - without releasing the page.

This triggers a BUG_ON in our caller, which asserts that the page
should always be consumed, unless -ENOENT is returned.

To fix this, detect if we have such a "dangling" page when accounting
fails, and if so, release it before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46988/">CVE-2021-46988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46988">CVE-2021-46988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220706">SUSE bug 1220706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46989" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46989" ref_url="https://www.suse.com/security/cve/CVE-2021-46989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: prevent corruption in shrinking truncate

I believe there are some issues introduced by commit 31651c607151
("hfsplus: avoid deadlock on file truncation")

HFS+ has extent records which always contains 8 extents.  In case the
first extent record in catalog file gets full, new ones are allocated from
extents overflow file.

In case shrinking truncate happens to middle of an extent record which
locates in extents overflow file, the logic in hfsplus_file_truncate() was
changed so that call to hfs_brec_remove() is not guarded any more.

Right action would be just freeing the extents that exceed the new size
inside extent record by calling hfsplus_free_extents(), and then check if
the whole extent record should be removed.  However since the guard
(blk_cnt &gt; start) is now after the call to hfs_brec_remove(), this has
unfortunate effect that the last matching extent record is removed
unconditionally.

To reproduce this issue, create a file which has at least 10 extents, and
then perform shrinking truncate into middle of the last extent record, so
that the number of remaining extents is not under or divisible by 8.  This
causes the last extent record (8 extents) to be removed totally instead of
truncating into middle of it.  Thus this causes corruption, and lost data.

Fix for this is simply checking if the new truncated end is below the
start of this extent record, making it safe to remove the full extent
record.  However call to hfs_brec_remove() can't be moved to it's previous
place since we're dropping -&gt;tree_lock and it can cause a race condition
and the cached info being invalidated possibly corrupting the node data.

Another issue is related to this one.  When entering into the block
(blk_cnt &gt; start) we are not holding the -&gt;tree_lock.  We break out from
the loop not holding the lock, but hfs_find_exit() does unlock it.  Not
sure if it's possible for someone else to take the lock under our feet,
but it can cause hard to debug errors and premature unlocking.  Even if
there's no real risk of it, the locking should still always be kept in
balance.  Thus taking the lock now just before the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46989/">CVE-2021-46989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-46989">CVE-2021-46989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220737">SUSE bug 1220737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46992" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46992" ref_url="https://www.suse.com/security/cve/CVE-2021-46992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: avoid overflows in nft_hash_buckets()

Number of buckets being stored in 32bit variables, we have to
ensure that no overflows occur in nft_hash_buckets()

syzbot injected a size == 0x40000000 and reported:

UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13
shift exponent 64 is too large for 64-bit type 'long unsigned int'
CPU: 1 PID: 29539 Comm: syz-executor.4 Not tainted 5.12.0-rc7-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:79 [inline]
 dump_stack+0x141/0x1d7 lib/dump_stack.c:120
 ubsan_epilogue+0xb/0x5a lib/ubsan.c:148
 __ubsan_handle_shift_out_of_bounds.cold+0xb1/0x181 lib/ubsan.c:327
 __roundup_pow_of_two include/linux/log2.h:57 [inline]
 nft_hash_buckets net/netfilter/nft_set_hash.c:411 [inline]
 nft_hash_estimate.cold+0x19/0x1e net/netfilter/nft_set_hash.c:652
 nft_select_set_ops net/netfilter/nf_tables_api.c:3586 [inline]
 nf_tables_newset+0xe62/0x3110 net/netfilter/nf_tables_api.c:4322
 nfnetlink_rcv_batch+0xa09/0x24b0 net/netfilter/nfnetlink.c:488
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:612 [inline]
 nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:630
 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338
 netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927
 sock_sendmsg_nosec net/socket.c:654 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:674
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2404
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46992/">CVE-2021-46992 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46992">CVE-2021-46992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220638">SUSE bug 1220638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46993" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46993" ref_url="https://www.suse.com/security/cve/CVE-2021-46993" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: Fix out-of-bound access in uclamp

Util-clamp places tasks in different buckets based on their clamp values
for performance reasons. However, the size of buckets is currently
computed using a rounding division, which can lead to an off-by-one
error in some configurations.

For instance, with 20 buckets, the bucket size will be 1024/20=51. A
task with a clamp of 1024 will be mapped to bucket id 1024/51=20. Sadly,
correct indexes are in range [0,19], hence leading to an out of bound
memory access.

Clamp the bucket id to fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46993/">CVE-2021-46993 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46993">CVE-2021-46993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220622">SUSE bug 1220622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46994" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46994" ref_url="https://www.suse.com/security/cve/CVE-2021-46994" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcp251x: fix resume from sleep before interface was brought up

Since 8ce8c0abcba3 the driver queues work via priv-&gt;restart_work when
resuming after suspend, even when the interface was not previously
enabled. This causes a null dereference error as the workqueue is only
allocated and initialized in mcp251x_open().

To fix this we move the workqueue init to mcp251x_can_probe() as there
is no reason to do it later and repeat it whenever mcp251x_open() is
called.

[mkl: fix error handling in mcp251x_stop()]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-09"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46994/">CVE-2021-46994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46994">CVE-2021-46994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220654">SUSE bug 1220654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46995" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46995" ref_url="https://www.suse.com/security/cve/CVE-2021-46995" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe

When we converted this code to use dev_err_probe() we accidentally
removed a return. It means that if devm_clk_get() it will lead to an
Oops when we call clk_get_rate() on the next line.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46995/">CVE-2021-46995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46995">CVE-2021-46995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220655">SUSE bug 1220655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46996" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46996" ref_url="https://www.suse.com/security/cve/CVE-2021-46996" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: Fix a memleak from userdata error path in new objects

Release object name if userdata allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46996/">CVE-2021-46996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46996">CVE-2021-46996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220652">SUSE bug 1220652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46997" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46997" ref_url="https://www.suse.com/security/cve/CVE-2021-46997" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: entry: always set GIC_PRIO_PSR_I_SET during entry

Zenghui reports that booting a kernel with "irqchip.gicv3_pseudo_nmi=1"
on the command line hits a warning during kernel entry, due to the way
we manipulate the PMR.

Early in the entry sequence, we call lockdep_hardirqs_off() to inform
lockdep that interrupts have been masked (as the HW sets DAIF wqhen
entering an exception). Architecturally PMR_EL1 is not affected by
exception entry, and we don't set GIC_PRIO_PSR_I_SET in the PMR early in
the exception entry sequence, so early in exception entry the PMR can
indicate that interrupts are unmasked even though they are masked by
DAIF.

If DEBUG_LOCKDEP is selected, lockdep_hardirqs_off() will check that
interrupts are masked, before we set GIC_PRIO_PSR_I_SET in any of the
exception entry paths, and hence lockdep_hardirqs_off() will WARN() that
something is amiss.

We can avoid this by consistently setting GIC_PRIO_PSR_I_SET during
exception entry so that kernel code sees a consistent environment. We
must also update local_daif_inherit() to undo this, as currently only
touches DAIF. For other paths, local_daif_restore() will update both
DAIF and the PMR. With this done, we can remove the existing special
cases which set this later in the entry code.

We always use (GIC_PRIO_IRQON | GIC_PRIO_PSR_I_SET) for consistency with
local_daif_save(), as this will warn if it ever encounters
(GIC_PRIO_IRQOFF | GIC_PRIO_PSR_I_SET), and never sets this itself. This
matches the gic_prio_kentry_setup that we have to retain for
ret_to_user.

The original splat from Zenghui's report was:

| DEBUG_LOCKS_WARN_ON(!irqs_disabled())
| WARNING: CPU: 3 PID: 125 at kernel/locking/lockdep.c:4258 lockdep_hardirqs_off+0xd4/0xe8
| Modules linked in:
| CPU: 3 PID: 125 Comm: modprobe Tainted: G        W         5.12.0-rc8+ #463
| Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
| pstate: 604003c5 (nZCv DAIF +PAN -UAO -TCO BTYPE=--)
| pc : lockdep_hardirqs_off+0xd4/0xe8
| lr : lockdep_hardirqs_off+0xd4/0xe8
| sp : ffff80002a39bad0
| pmr_save: 000000e0
| x29: ffff80002a39bad0 x28: ffff0000de214bc0
| x27: ffff0000de1c0400 x26: 000000000049b328
| x25: 0000000000406f30 x24: ffff0000de1c00a0
| x23: 0000000020400005 x22: ffff8000105f747c
| x21: 0000000096000044 x20: 0000000000498ef9
| x19: ffff80002a39bc88 x18: ffffffffffffffff
| x17: 0000000000000000 x16: ffff800011c61eb0
| x15: ffff800011700a88 x14: 0720072007200720
| x13: 0720072007200720 x12: 0720072007200720
| x11: 0720072007200720 x10: 0720072007200720
| x9 : ffff80002a39bad0 x8 : ffff80002a39bad0
| x7 : ffff8000119f0800 x6 : c0000000ffff7fff
| x5 : ffff8000119f07a8 x4 : 0000000000000001
| x3 : 9bcdab23f2432800 x2 : ffff800011730538
| x1 : 9bcdab23f2432800 x0 : 0000000000000000
| Call trace:
|  lockdep_hardirqs_off+0xd4/0xe8
|  enter_from_kernel_mode.isra.5+0x7c/0xa8
|  el1_abort+0x24/0x100
|  el1_sync_handler+0x80/0xd0
|  el1_sync+0x6c/0x100
|  __arch_clear_user+0xc/0x90
|  load_elf_binary+0x9fc/0x1450
|  bprm_execve+0x404/0x880
|  kernel_execve+0x180/0x188
|  call_usermodehelper_exec_async+0xdc/0x158
|  ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46997/">CVE-2021-46997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46997">CVE-2021-46997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220748">SUSE bug 1220748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46998" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46998" ref_url="https://www.suse.com/security/cve/CVE-2021-46998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet:enic: Fix a use after free bug in enic_hard_start_xmit

In enic_hard_start_xmit, it calls enic_queue_wq_skb(). Inside
enic_queue_wq_skb, if some error happens, the skb will be freed
by dev_kfree_skb(skb). But the freed skb is still used in
skb_tx_timestamp(skb).

My patch makes enic_queue_wq_skb() return error and goto spin_unlock()
incase of error. The solution is provided by Govind.
See https://lkml.org/lkml/2021/4/30/961.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46998/">CVE-2021-46998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46998">CVE-2021-46998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220625">SUSE bug 1220625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46999" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46999" ref_url="https://www.suse.com/security/cve/CVE-2021-46999" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: do asoc update earlier in sctp_sf_do_dupcook_a

There's a panic that occurs in a few of envs, the call trace is as below:

  [] general protection fault, ... 0x29acd70f1000a: 0000 [#1] SMP PTI
  [] RIP: 0010:sctp_ulpevent_notify_peer_addr_change+0x4b/0x1fa [sctp]
  []  sctp_assoc_control_transport+0x1b9/0x210 [sctp]
  []  sctp_do_8_2_transport_strike.isra.16+0x15c/0x220 [sctp]
  []  sctp_cmd_interpreter.isra.21+0x1231/0x1a10 [sctp]
  []  sctp_do_sm+0xc3/0x2a0 [sctp]
  []  sctp_generate_timeout_event+0x81/0xf0 [sctp]

This is caused by a transport use-after-free issue. When processing a
duplicate COOKIE-ECHO chunk in sctp_sf_do_dupcook_a(), both COOKIE-ACK
and SHUTDOWN chunks are allocated with the transort from the new asoc.
However, later in the sideeffect machine, the old asoc is used to send
them out and old asoc's shutdown_last_sent_to is set to the transport
that SHUTDOWN chunk attached to in sctp_cmd_setup_t2(), which actually
belongs to the new asoc. After the new_asoc is freed and the old asoc
T2 timeout, the old asoc's shutdown_last_sent_to that is already freed
would be accessed in sctp_sf_t2_timer_expire().

Thanks Alexander and Jere for helping dig into this issue.

To fix it, this patch is to do the asoc update first, then allocate
the COOKIE-ACK and SHUTDOWN chunks with the 'updated' old asoc. This
would make more sense, as a chunk from an asoc shouldn't be sent out
with another asoc. We had fixed quite a few issues caused by this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46999/">CVE-2021-46999 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46999">CVE-2021-46999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220667">SUSE bug 1220667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47000" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47000" ref_url="https://www.suse.com/security/cve/CVE-2021-47000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix inode leak on getattr error in __fh_to_dentry
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47000/">CVE-2021-47000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47000">CVE-2021-47000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220669">SUSE bug 1220669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47001" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47001" ref_url="https://www.suse.com/security/cve/CVE-2021-47001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: Fix cwnd update ordering

After a reconnect, the reply handler is opening the cwnd (and thus
enabling more RPC Calls to be sent) /before/ rpcrdma_post_recvs()
can post enough Receive WRs to receive their replies. This causes an
RNR and the new connection is lost immediately.

The race is most clearly exposed when KASAN and disconnect injection
are enabled. This slows down rpcrdma_rep_create() enough to allow
the send side to post a bunch of RPC Calls before the Receive
completion handler can invoke ib_post_recv().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47001/">CVE-2021-47001 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47001">CVE-2021-47001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220670">SUSE bug 1220670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47002" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47002" ref_url="https://www.suse.com/security/cve/CVE-2021-47002" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix null pointer dereference in svc_rqst_free()

When alloc_pages_node() returns null in svc_rqst_alloc(), the
null rq_scratch_page pointer will be dereferenced when calling
put_page() in svc_rqst_free(). Fix it by adding a null check.

Addresses-Coverity: ("Dereference after null check")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47002/">CVE-2021-47002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47002">CVE-2021-47002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220676">SUSE bug 1220676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47003" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47003" ref_url="https://www.suse.com/security/cve/CVE-2021-47003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix potential null dereference on pointer status

There are calls to idxd_cmd_exec that pass a null status pointer however
a recent commit has added an assignment to *status that can end up
with a null pointer dereference.  The function expects a null status
pointer sometimes as there is a later assignment to *status where
status is first null checked.  Fix the issue by null checking status
before making the assignment.

Addresses-Coverity: ("Explicit null dereferenced")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47003/">CVE-2021-47003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47003">CVE-2021-47003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220677">SUSE bug 1220677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47004" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47004" ref_url="https://www.suse.com/security/cve/CVE-2021-47004" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid touching checkpointed data in get_victim()

In CP disabling mode, there are two issues when using LFS or SSR | AT_SSR
mode to select victim:

1. LFS is set to find source section during GC, the victim should have
no checkpointed data, since after GC, section could not be set free for
reuse.

Previously, we only check valid chpt blocks in current segment rather
than section, fix it.

2. SSR | AT_SSR are set to find target segment for writes which can be
fully filled by checkpointed and newly written blocks, we should never
select such segment, otherwise it can cause panic or data corruption
during allocation, potential case is described as below:

 a) target segment has 'n' (n &lt; 512) ckpt valid blocks
 b) GC migrates 'n' valid blocks to other segment (segment is still
    in dirty list)
 c) GC migrates '512 - n' blocks to target segment (segment has 'n'
    cp_vblocks and '512 - n' vblocks)
 d) If GC selects target segment via {AT,}SSR allocator, however there
    is no free space in targe segment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47004/">CVE-2021-47004 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47004">CVE-2021-47004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220653">SUSE bug 1220653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47005" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47005" ref_url="https://www.suse.com/security/cve/CVE-2021-47005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix NULL pointer dereference for -&gt;get_features()

get_features ops of pci_epc_ops may return NULL, causing NULL pointer
dereference in pci_epf_test_alloc_space function. Let us add a check for
pci_epc_feature pointer in pci_epf_test_bind before we access it to avoid
any such NULL pointer dereference and return -ENOTSUPP in case
pci_epc_feature is not found.

When the patch is not applied and EPC features is not implemented in the
platform driver, we see the following dump due to kernel NULL pointer
dereference.

Call trace:
 pci_epf_test_bind+0xf4/0x388
 pci_epf_bind+0x3c/0x80
 pci_epc_epf_link+0xa8/0xcc
 configfs_symlink+0x1a4/0x48c
 vfs_symlink+0x104/0x184
 do_symlinkat+0x80/0xd4
 __arm64_sys_symlinkat+0x1c/0x24
 el0_svc_common.constprop.3+0xb8/0x170
 el0_svc_handler+0x70/0x88
 el0_svc+0x8/0x640
Code: d2800581 b9403ab9 f9404ebb 8b394f60 (f9400400)
---[ end trace a438e3c5a24f9df0 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47005/">CVE-2021-47005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47005">CVE-2021-47005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220660">SUSE bug 1220660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47006" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47006" ref_url="https://www.suse.com/security/cve/CVE-2021-47006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook

The commit 1879445dfa7b ("perf/core: Set event's default
::overflow_handler()") set a default event-&gt;overflow_handler in
perf_event_alloc(), and replace the check event-&gt;overflow_handler with
is_default_overflow_handler(), but one is missing.

Currently, the bp-&gt;overflow_handler can not be NULL. As a result,
enable_single_step() is always not invoked.

Comments from Zhen Lei:

 https://patchwork.kernel.org/project/linux-arm-kernel/patch/20210207105934.2001-1-thunder.leizhen@huawei.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47006/">CVE-2021-47006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47006">CVE-2021-47006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220751">SUSE bug 1220751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47007" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47007" ref_url="https://www.suse.com/security/cve/CVE-2021-47007" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix panic during f2fs_resize_fs()

f2fs_resize_fs() hangs in below callstack with testcase:
- mkfs 16GB image &amp; mount image
- dd 8GB fileA
- dd 8GB fileB
- sync
- rm fileA
- sync
- resize filesystem to 8GB

kernel BUG at segment.c:2484!
Call Trace:
 allocate_segment_by_default+0x92/0xf0 [f2fs]
 f2fs_allocate_data_block+0x44b/0x7e0 [f2fs]
 do_write_page+0x5a/0x110 [f2fs]
 f2fs_outplace_write_data+0x55/0x100 [f2fs]
 f2fs_do_write_data_page+0x392/0x850 [f2fs]
 move_data_page+0x233/0x320 [f2fs]
 do_garbage_collect+0x14d9/0x1660 [f2fs]
 free_segment_range+0x1f7/0x310 [f2fs]
 f2fs_resize_fs+0x118/0x330 [f2fs]
 __f2fs_ioctl+0x487/0x3680 [f2fs]
 __x64_sys_ioctl+0x8e/0xd0
 do_syscall_64+0x33/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

The root cause is we forgot to check that whether we have enough space
in resized filesystem to store all valid blocks in before-resizing
filesystem, then allocator will run out-of-space during block migration
in free_segment_range().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47007/">CVE-2021-47007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47007">CVE-2021-47007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220691">SUSE bug 1220691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47009" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47009" ref_url="https://www.suse.com/security/cve/CVE-2021-47009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix memory leak on object td

Two error return paths are neglecting to free allocated object td,
causing a memory leak. Fix this by returning via the error return
path that securely kfree's td.

Fixes clang scan-build warning:
security/keys/trusted-keys/trusted_tpm1.c:496:10: warning: Potential
memory leak [unix.Malloc]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47009/">CVE-2021-47009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47009">CVE-2021-47009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220733">SUSE bug 1220733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47010" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47010" ref_url="https://www.suse.com/security/cve/CVE-2021-47010" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Only allow init netns to set default tcp cong to a restricted algo

tcp_set_default_congestion_control() is netns-safe in that it writes
to &amp;net-&gt;ipv4.tcp_congestion_control, but it also sets
ca-&gt;flags |= TCP_CONG_NON_RESTRICTED which is not namespaced.
This has the unintended side-effect of changing the global
net.ipv4.tcp_allowed_congestion_control sysctl, despite the fact that it
is read-only: 97684f0970f6 ("net: Make tcp_allowed_congestion_control
readonly in non-init netns")

Resolve this netns "leak" by only allowing the init netns to set the
default algorithm to one that is restricted. This restriction could be
removed if tcp_allowed_congestion_control were namespace-ified in the
future.

This bug was uncovered with
https://github.com/JonathonReinhart/linux-netns-sysctl-verify
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-47010/">CVE-2021-47010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47010">CVE-2021-47010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220791">SUSE bug 1220791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47011" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47011" ref_url="https://www.suse.com/security/cve/CVE-2021-47011" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: memcontrol: slab: fix obtain a reference to a freeing memcg

Patch series "Use obj_cgroup APIs to charge kmem pages", v5.

Since Roman's series "The new cgroup slab memory controller" applied.
All slab objects are charged with the new APIs of obj_cgroup.  The new
APIs introduce a struct obj_cgroup to charge slab objects.  It prevents
long-living objects from pinning the original memory cgroup in the
memory.  But there are still some corner objects (e.g.  allocations
larger than order-1 page on SLUB) which are not charged with the new
APIs.  Those objects (include the pages which are allocated from buddy
allocator directly) are charged as kmem pages which still hold a
reference to the memory cgroup.

E.g.  We know that the kernel stack is charged as kmem pages because the
size of the kernel stack can be greater than 2 pages (e.g.  16KB on
x86_64 or arm64).  If we create a thread (suppose the thread stack is
charged to memory cgroup A) and then move it from memory cgroup A to
memory cgroup B.  Because the kernel stack of the thread hold a
reference to the memory cgroup A.  The thread can pin the memory cgroup
A in the memory even if we remove the cgroup A.  If we want to see this
scenario by using the following script.  We can see that the system has
added 500 dying cgroups (This is not a real world issue, just a script
to show that the large kmallocs are charged as kmem pages which can pin
the memory cgroup in the memory).

	#!/bin/bash

	cat /proc/cgroups | grep memory

	cd /sys/fs/cgroup/memory
	echo 1 &gt; memory.move_charge_at_immigrate

	for i in range{1..500}
	do
		mkdir kmem_test
		echo $$ &gt; kmem_test/cgroup.procs
		sleep 3600 &amp;
		echo $$ &gt; cgroup.procs
		echo `cat kmem_test/cgroup.procs` &gt; cgroup.procs
		rmdir kmem_test
	done

	cat /proc/cgroups | grep memory

This patchset aims to make those kmem pages to drop the reference to
memory cgroup by using the APIs of obj_cgroup.  Finally, we can see that
the number of the dying cgroups will not increase if we run the above test
script.

This patch (of 7):

The rcu_read_lock/unlock only can guarantee that the memcg will not be
freed, but it cannot guarantee the success of css_get (which is in the
refill_stock when cached memcg changed) to memcg.

  rcu_read_lock()
  memcg = obj_cgroup_memcg(old)
  __memcg_kmem_uncharge(memcg)
      refill_stock(memcg)
          if (stock-&gt;cached != memcg)
              // css_get can change the ref counter from 0 back to 1.
              css_get(&amp;memcg-&gt;css)
  rcu_read_unlock()

This fix is very like the commit:

  eefbfa7fd678 ("mm: memcg/slab: fix use after free in obj_cgroup_charge")

Fix this by holding a reference to the memcg which is passed to the
__memcg_kmem_uncharge() before calling __memcg_kmem_uncharge().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47011/">CVE-2021-47011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47011">CVE-2021-47011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220793">SUSE bug 1220793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47012" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47012" ref_url="https://www.suse.com/security/cve/CVE-2021-47012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix a use after free in siw_alloc_mr

Our code analyzer reported a UAF.

In siw_alloc_mr(), it calls siw_mr_add_mem(mr,..). In the implementation of
siw_mr_add_mem(), mem is assigned to mr-&gt;mem and then mem is freed via
kfree(mem) if xa_alloc_cyclic() failed. Here, mr-&gt;mem still point to a
freed object. After, the execution continue up to the err_out branch of
siw_alloc_mr, and the freed mr-&gt;mem is used in siw_mr_drop_mem(mr).

My patch moves "mr-&gt;mem = mem" behind the if (xa_alloc_cyclic(..)&lt;0) {}
section, to avoid the uaf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47012/">CVE-2021-47012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47012">CVE-2021-47012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220627">SUSE bug 1220627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47013" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47013" ref_url="https://www.suse.com/security/cve/CVE-2021-47013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send

In emac_mac_tx_buf_send, it calls emac_tx_fill_tpd(..,skb,..).
If some error happens in emac_tx_fill_tpd(), the skb will be freed via
dev_kfree_skb(skb) in error branch of emac_tx_fill_tpd().
But the freed skb is still used via skb-&gt;len by netdev_sent_queue(,skb-&gt;len).

As i observed that emac_tx_fill_tpd() haven't modified the value of skb-&gt;len,
thus my patch assigns skb-&gt;len to 'len' before the possible free and
use 'len' instead of skb-&gt;len later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47013/">CVE-2021-47013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47013">CVE-2021-47013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220641">SUSE bug 1220641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47014" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47014" ref_url="https://www.suse.com/security/cve/CVE-2021-47014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ct: fix wild memory access when clearing fragments

while testing re-assembly/re-fragmentation using act_ct, it's possible to
observe a crash like the following one:

 KASAN: maybe wild-memory-access in range [0x0001000000000448-0x000100000000044f]
 CPU: 50 PID: 0 Comm: swapper/50 Tainted: G S                5.12.0-rc7+ #424
 Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017
 RIP: 0010:inet_frag_rbtree_purge+0x50/0xc0
 Code: 00 fc ff df 48 89 c3 31 ed 48 89 df e8 a9 7a 38 ff 4c 89 fe 48 89 df 49 89 c6 e8 5b 3a 38 ff 48 8d 7b 40 48 89 f8 48 c1 e8 03 &lt;42&gt; 80 3c 20 00 75 59 48 8d bb d0 00 00 00 4c 8b 6b 40 48 89 f8 48
 RSP: 0018:ffff888c31449db8 EFLAGS: 00010203
 RAX: 0000200000000089 RBX: 000100000000040e RCX: ffffffff989eb960
 RDX: 0000000000000140 RSI: ffffffff97cfb977 RDI: 000100000000044e
 RBP: 0000000000000900 R08: 0000000000000000 R09: ffffed1186289350
 R10: 0000000000000003 R11: ffffed1186289350 R12: dffffc0000000000
 R13: 000100000000040e R14: 0000000000000000 R15: ffff888155e02160
 FS:  0000000000000000(0000) GS:ffff888c31440000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00005600cb70a5b8 CR3: 0000000a2c014005 CR4: 00000000003706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  inet_frag_destroy+0xa9/0x150
  call_timer_fn+0x2d/0x180
  run_timer_softirq+0x4fe/0xe70
  __do_softirq+0x197/0x5a0
  irq_exit_rcu+0x1de/0x200
  sysvec_apic_timer_interrupt+0x6b/0x80
  &lt;/IRQ&gt;

when act_ct temporarily stores an IP fragment, restoring the skb qdisc cb
results in putting random data in FRAG_CB(), and this causes those "wild"
memory accesses later, when the rbtree is purged. Never overwrite the skb
cb in case tcf_ct_handle_fragments() returns -EINPROGRESS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47014/">CVE-2021-47014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47014">CVE-2021-47014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220630">SUSE bug 1220630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47015" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47015" ref_url="https://www.suse.com/security/cve/CVE-2021-47015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix RX consumer index logic in the error path.

In bnxt_rx_pkt(), the RX buffers are expected to complete in order.
If the RX consumer index indicates an out of order buffer completion,
it means we are hitting a hardware bug and the driver will abort all
remaining RX packets and reset the RX ring.  The RX consumer index
that we pass to bnxt_discard_rx() is not correct.  We should be
passing the current index (tmp_raw_cons) instead of the old index
(raw_cons).  This bug can cause us to be at the wrong index when
trying to abort the next RX packet.  It can crash like this:

 #0 [ffff9bbcdf5c39a8] machine_kexec at ffffffff9b05e007
 #1 [ffff9bbcdf5c3a00] __crash_kexec at ffffffff9b111232
 #2 [ffff9bbcdf5c3ad0] panic at ffffffff9b07d61e
 #3 [ffff9bbcdf5c3b50] oops_end at ffffffff9b030978
 #4 [ffff9bbcdf5c3b78] no_context at ffffffff9b06aaf0
 #5 [ffff9bbcdf5c3bd8] __bad_area_nosemaphore at ffffffff9b06ae2e
 #6 [ffff9bbcdf5c3c28] bad_area_nosemaphore at ffffffff9b06af24
 #7 [ffff9bbcdf5c3c38] __do_page_fault at ffffffff9b06b67e
 #8 [ffff9bbcdf5c3cb0] do_page_fault at ffffffff9b06bb12
 #9 [ffff9bbcdf5c3ce0] page_fault at ffffffff9bc015c5
    [exception RIP: bnxt_rx_pkt+237]
    RIP: ffffffffc0259cdd  RSP: ffff9bbcdf5c3d98  RFLAGS: 00010213
    RAX: 000000005dd8097f  RBX: ffff9ba4cb11b7e0  RCX: ffffa923cf6e9000
    RDX: 0000000000000fff  RSI: 0000000000000627  RDI: 0000000000001000
    RBP: ffff9bbcdf5c3e60   R8: 0000000000420003   R9: 000000000000020d
    R10: ffffa923cf6ec138  R11: ffff9bbcdf5c3e83  R12: ffff9ba4d6f928c0
    R13: ffff9ba4cac28080  R14: ffff9ba4cb11b7f0  R15: ffff9ba4d5a30000
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47015/">CVE-2021-47015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47015">CVE-2021-47015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220794">SUSE bug 1220794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47016" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47016" ref_url="https://www.suse.com/security/cve/CVE-2021-47016" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

m68k: mvme147,mvme16x: Don't wipe PCC timer config bits

Don't clear the timer 1 configuration bits when clearing the interrupt flag
and counter overflow. As Michael reported, "This results in no timer
interrupts being delivered after the first. Initialization then hangs
in calibrate_delay as the jiffies counter is not updated."

On mvme16x, enable the timer after requesting the irq, consistent with
mvme147.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47016/">CVE-2021-47016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47016">CVE-2021-47016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220760">SUSE bug 1220760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47017" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47017" ref_url="https://www.suse.com/security/cve/CVE-2021-47017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath10k: Fix a use after free in ath10k_htc_send_bundle

In ath10k_htc_send_bundle, the bundle_skb could be freed by
dev_kfree_skb_any(bundle_skb). But the bundle_skb is used later
by bundle_skb-&gt;len.

As skb_len = bundle_skb-&gt;len, my patch replaces bundle_skb-&gt;len to
skb_len after the bundle_skb was freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47017/">CVE-2021-47017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47017">CVE-2021-47017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220678">SUSE bug 1220678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47018" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47018" ref_url="https://www.suse.com/security/cve/CVE-2021-47018" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64: Fix the definition of the fixmap area

At the time being, the fixmap area is defined at the top of
the address space or just below KASAN.

This definition is not valid for PPC64.

For PPC64, use the top of the I/O space.

Because of circular dependencies, it is not possible to include
asm/fixmap.h in asm/book3s/64/pgtable.h , so define a fixed size
AREA at the top of the I/O space for fixmap and ensure during
build that the size is big enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-47018/">CVE-2021-47018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47018">CVE-2021-47018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220774">SUSE bug 1220774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47019" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47019" ref_url="https://www.suse.com/security/cve/CVE-2021-47019" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7921: fix possible invalid register access

Disable the interrupt and synchronze for the pending irq handlers to ensure
the irq tasklet is not being scheduled after the suspend to avoid the
possible invalid register access acts when the host pcie controller is
suspended.

[17932.910534] mt7921e 0000:01:00.0: pci_pm_suspend+0x0/0x22c returned 0 after 21375 usecs
[17932.910590] pcieport 0000:00:00.0: calling pci_pm_suspend+0x0/0x22c @ 18565, parent: pci0000:00
[17932.910602] pcieport 0000:00:00.0: pci_pm_suspend+0x0/0x22c returned 0 after 8 usecs
[17932.910671] mtk-pcie 11230000.pcie: calling platform_pm_suspend+0x0/0x60 @ 22783, parent: soc
[17932.910674] mtk-pcie 11230000.pcie: platform_pm_suspend+0x0/0x60 returned 0 after 0 usecs

...

17933.615352] x1 : 00000000000d4200 x0 : ffffff8269ca2300
[17933.620666] Call trace:
[17933.623127]  mt76_mmio_rr+0x28/0xf0 [mt76]
[17933.627234]  mt7921_rr+0x38/0x44 [mt7921e]
[17933.631339]  mt7921_irq_tasklet+0x54/0x1d8 [mt7921e]
[17933.636309]  tasklet_action_common+0x12c/0x16c
[17933.640754]  tasklet_action+0x24/0x2c
[17933.644418]  __do_softirq+0x16c/0x344
[17933.648082]  irq_exit+0xa8/0xac
[17933.651224]  scheduler_ipi+0xd4/0x148
[17933.654890]  handle_IPI+0x164/0x2d4
[17933.658379]  gic_handle_irq+0x140/0x178
[17933.662216]  el1_irq+0xb8/0x180
[17933.665361]  cpuidle_enter_state+0xf8/0x204
[17933.669544]  cpuidle_enter+0x38/0x4c
[17933.673122]  do_idle+0x1a4/0x2a8
[17933.676352]  cpu_startup_entry+0x24/0x28
[17933.680276]  rest_init+0xd4/0xe0
[17933.683508]  arch_call_rest_init+0x10/0x18
[17933.687606]  start_kernel+0x340/0x3b4
[17933.691279] Code: aa0003f5 d503201f f953eaa8 8b344108 (b9400113)
[17933.697373] ---[ end trace a24b8e26ffbda3c5 ]---
[17933.767846] Kernel panic - not syncing: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47019/">CVE-2021-47019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47019">CVE-2021-47019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220629">SUSE bug 1220629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47020" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47020" ref_url="https://www.suse.com/security/cve/CVE-2021-47020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: stream: fix memory leak in stream config error path

When stream config is failed, master runtime will release all
slave runtime in the slave_rt_list, but slave runtime is not
added to the list at this time. This patch frees slave runtime
in the config error path to fix the memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47020/">CVE-2021-47020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47020">CVE-2021-47020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220785">SUSE bug 1220785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47021" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47021" ref_url="https://www.suse.com/security/cve/CVE-2021-47021" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: fix memleak when mt7915_unregister_device()

mt7915_tx_token_put() should get call before mt76_free_pending_txwi().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47021/">CVE-2021-47021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47021">CVE-2021-47021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220634">SUSE bug 1220634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47022" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47022" ref_url="https://www.suse.com/security/cve/CVE-2021-47022" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7615: fix memleak when mt7615_unregister_device()

mt7615_tx_token_put() should get call before mt76_free_pending_txwi().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47022/">CVE-2021-47022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47022">CVE-2021-47022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220635">SUSE bug 1220635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47023" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47023" ref_url="https://www.suse.com/security/cve/CVE-2021-47023" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix port event handling on init

For some reason there might be a crash during ports creation if port
events are handling at the same time  because fw may send initial
port event with down state.

The crash points to cancel_delayed_work() which is called when port went
is down.  Currently I did not find out the real cause of the issue, so
fixed it by cancel port stats work only if previous port's state was up
&amp; runnig.

The following is the crash which can be triggered:

[   28.311104] Unable to handle kernel paging request at virtual address
000071775f776600
[   28.319097] Mem abort info:
[   28.321914]   ESR = 0x96000004
[   28.324996]   EC = 0x25: DABT (current EL), IL = 32 bits
[   28.330350]   SET = 0, FnV = 0
[   28.333430]   EA = 0, S1PTW = 0
[   28.336597] Data abort info:
[   28.339499]   ISV = 0, ISS = 0x00000004
[   28.343362]   CM = 0, WnR = 0
[   28.346354] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000100bf7000
[   28.352842] [000071775f776600] pgd=0000000000000000,
p4d=0000000000000000
[   28.359695] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[   28.365310] Modules linked in: prestera_pci(+) prestera
uio_pdrv_genirq
[   28.372005] CPU: 0 PID: 1291 Comm: kworker/0:1H Not tainted
5.11.0-rc4 #1
[   28.378846] Hardware name: DNI AmazonGo1 A7040 board (DT)
[   28.384283] Workqueue: prestera_fw_wq prestera_fw_evt_work_fn
[prestera_pci]
[   28.391413] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--)
[   28.397468] pc : get_work_pool+0x48/0x60
[   28.401442] lr : try_to_grab_pending+0x6c/0x1b0
[   28.406018] sp : ffff80001391bc60
[   28.409358] x29: ffff80001391bc60 x28: 0000000000000000
[   28.414725] x27: ffff000104fc8b40 x26: ffff80001127de88
[   28.420089] x25: 0000000000000000 x24: ffff000106119760
[   28.425452] x23: ffff00010775dd60 x22: ffff00010567e000
[   28.430814] x21: 0000000000000000 x20: ffff80001391bcb0
[   28.436175] x19: ffff00010775deb8 x18: 00000000000000c0
[   28.441537] x17: 0000000000000000 x16: 000000008d9b0e88
[   28.446898] x15: 0000000000000001 x14: 00000000000002ba
[   28.452261] x13: 80a3002c00000002 x12: 00000000000005f4
[   28.457622] x11: 0000000000000030 x10: 000000000000000c
[   28.462985] x9 : 000000000000000c x8 : 0000000000000030
[   28.468346] x7 : ffff800014400000 x6 : ffff000106119758
[   28.473708] x5 : 0000000000000003 x4 : ffff00010775dc60
[   28.479068] x3 : 0000000000000000 x2 : 0000000000000060
[   28.484429] x1 : 000071775f776600 x0 : ffff00010775deb8
[   28.489791] Call trace:
[   28.492259]  get_work_pool+0x48/0x60
[   28.495874]  cancel_delayed_work+0x38/0xb0
[   28.500011]  prestera_port_handle_event+0x90/0xa0 [prestera]
[   28.505743]  prestera_evt_recv+0x98/0xe0 [prestera]
[   28.510683]  prestera_fw_evt_work_fn+0x180/0x228 [prestera_pci]
[   28.516660]  process_one_work+0x1e8/0x360
[   28.520710]  worker_thread+0x44/0x480
[   28.524412]  kthread+0x154/0x160
[   28.527670]  ret_from_fork+0x10/0x38
[   28.531290] Code: a8c17bfd d50323bf d65f03c0 9278dc21 (f9400020)
[   28.537429] ---[ end trace 5eced933df3a080b ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47023/">CVE-2021-47023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47023">CVE-2021-47023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220786">SUSE bug 1220786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47024" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47024" ref_url="https://www.suse.com/security/cve/CVE-2021-47024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: free queued packets when closing socket

As reported by syzbot [1], there is a memory leak while closing the
socket. We partially solved this issue with commit ac03046ece2b
("vsock/virtio: free packets during the socket release"), but we
forgot to drain the RX queue when the socket is definitely closed by
the scheduled work.

To avoid future issues, let's use the new virtio_transport_remove_sock()
to drain the RX queue before removing the socket from the af_vsock lists
calling vsock_remove_sock().

[1] https://syzkaller.appspot.com/bug?extid=24452624fc4c571eedd9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47024/">CVE-2021-47024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47024">CVE-2021-47024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220637">SUSE bug 1220637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47025" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47025" ref_url="https://www.suse.com/security/cve/CVE-2021-47025" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: Always enable the clk on resume

In mtk_iommu_runtime_resume always enable the clk, even
if m4u_dom is null. Otherwise the 'suspend' cb might
disable the clk which is already disabled causing the warning:

[    1.586104] infra_m4u already disabled
[    1.586133] WARNING: CPU: 0 PID: 121 at drivers/clk/clk.c:952 clk_core_disable+0xb0/0xb8
[    1.594391] mtk-iommu 10205000.iommu: bound 18001000.larb (ops mtk_smi_larb_component_ops)
[    1.598108] Modules linked in:
[    1.598114] CPU: 0 PID: 121 Comm: kworker/0:2 Not tainted 5.12.0-rc5 #69
[    1.609246] mtk-iommu 10205000.iommu: bound 14027000.larb (ops mtk_smi_larb_component_ops)
[    1.617487] Hardware name: Google Elm (DT)
[    1.617491] Workqueue: pm pm_runtime_work
[    1.620545] mtk-iommu 10205000.iommu: bound 19001000.larb (ops mtk_smi_larb_component_ops)

[    1.627229] pstate: 60000085 (nZCv daIf -PAN -UAO -TCO BTYPE=--)
[    1.659297] pc : clk_core_disable+0xb0/0xb8
[    1.663475] lr : clk_core_disable+0xb0/0xb8
[    1.667652] sp : ffff800011b9bbe0
[    1.670959] x29: ffff800011b9bbe0 x28: 0000000000000000
[    1.676267] x27: ffff800011448000 x26: ffff8000100cfd98
[    1.681574] x25: ffff800011b9bd48 x24: 0000000000000000
[    1.686882] x23: 0000000000000000 x22: ffff8000106fad90
[    1.692189] x21: 000000000000000a x20: ffff0000c0048500
[    1.697496] x19: ffff0000c0048500 x18: ffffffffffffffff
[    1.702804] x17: 0000000000000000 x16: 0000000000000000
[    1.708112] x15: ffff800011460300 x14: fffffffffffe0000
[    1.713420] x13: ffff8000114602d8 x12: 0720072007200720
[    1.718727] x11: 0720072007200720 x10: 0720072007200720
[    1.724035] x9 : ffff800011b9bbe0 x8 : ffff800011b9bbe0
[    1.729342] x7 : 0000000000000009 x6 : ffff8000114b8328
[    1.734649] x5 : 0000000000000000 x4 : 0000000000000000
[    1.739956] x3 : 00000000ffffffff x2 : ffff800011460298
[    1.745263] x1 : 1af1d7de276f4500 x0 : 0000000000000000
[    1.750572] Call trace:
[    1.753010]  clk_core_disable+0xb0/0xb8
[    1.756840]  clk_core_disable_lock+0x24/0x40
[    1.761105]  clk_disable+0x20/0x30
[    1.764501]  mtk_iommu_runtime_suspend+0x88/0xa8
[    1.769114]  pm_generic_runtime_suspend+0x2c/0x48
[    1.773815]  __rpm_callback+0xe0/0x178
[    1.777559]  rpm_callback+0x24/0x88
[    1.781041]  rpm_suspend+0xdc/0x470
[    1.784523]  rpm_idle+0x12c/0x170
[    1.787831]  pm_runtime_work+0xa8/0xc0
[    1.791573]  process_one_work+0x1e8/0x360
[    1.795580]  worker_thread+0x44/0x478
[    1.799237]  kthread+0x150/0x158
[    1.802460]  ret_from_fork+0x10/0x30
[    1.806034] ---[ end trace 82402920ef64573b ]---
[    1.810728] ------------[ cut here ]------------

In addition, we now don't need to enable the clock from the
function mtk_iommu_hw_init since it is already enabled by the resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47025/">CVE-2021-47025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47025">CVE-2021-47025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220788">SUSE bug 1220788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47026" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47026" ref_url="https://www.suse.com/security/cve/CVE-2021-47026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-clt: destroy sysfs after removing session from active list

A session can be removed dynamically by sysfs interface "remove_path" that
eventually calls rtrs_clt_remove_path_from_sysfs function.  The current
rtrs_clt_remove_path_from_sysfs first removes the sysfs interfaces and
frees sess-&gt;stats object. Second it removes the session from the active
list.

Therefore some functions could access non-connected session and access the
freed sess-&gt;stats object even-if they check the session status before
accessing the session.

For instance rtrs_clt_request and get_next_path_min_inflight check the
session status and try to send IO to the session.  The session status
could be changed when they are trying to send IO but they could not catch
the change and update the statistics information in sess-&gt;stats object,
and generate use-after-free problem.
(see: "RDMA/rtrs-clt: Check state of the rtrs_clt_sess before reading its
stats")

This patch changes the rtrs_clt_remove_path_from_sysfs to remove the
session from the active session list and then destroy the sysfs
interfaces.

Each function still should check the session status because closing or
error recovery paths can change the status.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47026/">CVE-2021-47026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47026">CVE-2021-47026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220685">SUSE bug 1220685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47027" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47027" ref_url="https://www.suse.com/security/cve/CVE-2021-47027" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7921: fix kernel crash when the firmware fails to download

Fix kernel crash when the firmware is missing or fails to download.

[    9.444758] kernel BUG at drivers/pci/msi.c:375!
[    9.449363] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[    9.501033] pstate: a0400009 (NzCv daif +PAN -UAO)
[    9.505814] pc : free_msi_irqs+0x180/0x184
[    9.509897] lr : free_msi_irqs+0x40/0x184
[    9.513893] sp : ffffffc015193870
[    9.517194] x29: ffffffc015193870 x28: 00000000f0e94fa2
[    9.522492] x27: 0000000000000acd x26: 000000000000009a
[    9.527790] x25: ffffffc0152cee58 x24: ffffffdbb383e0d8
[    9.533087] x23: ffffffdbb38628d0 x22: 0000000000040200
[    9.538384] x21: ffffff8cf7de7318 x20: ffffff8cd65a2480
[    9.543681] x19: ffffff8cf7de7000 x18: 0000000000000000
[    9.548979] x17: ffffff8cf9ca03b4 x16: ffffffdc13ad9a34
[    9.554277] x15: 0000000000000000 x14: 0000000000080800
[    9.559575] x13: ffffff8cd65a2980 x12: 0000000000000000
[    9.564873] x11: ffffff8cfa45d820 x10: ffffff8cfa45d6d0
[    9.570171] x9 : 0000000000000040 x8 : ffffff8ccef1b780
[    9.575469] x7 : aaaaaaaaaaaaaaaa x6 : 0000000000000000
[    9.580766] x5 : ffffffdc13824900 x4 : ffffff8ccefe0000
[    9.586063] x3 : 0000000000000000 x2 : 0000000000000000
[    9.591362] x1 : 0000000000000125 x0 : ffffff8ccefe0000
[    9.596660] Call trace:
[    9.599095]  free_msi_irqs+0x180/0x184
[    9.602831]  pci_disable_msi+0x100/0x130
[    9.606740]  pci_free_irq_vectors+0x24/0x30
[    9.610915]  mt7921_pci_probe+0xbc/0x250 [mt7921e]
[    9.615693]  pci_device_probe+0xd4/0x14c
[    9.619604]  really_probe+0x134/0x2ec
[    9.623252]  driver_probe_device+0x64/0xfc
[    9.627335]  device_driver_attach+0x4c/0x6c
[    9.631506]  __driver_attach+0xac/0xc0
[    9.635243]  bus_for_each_dev+0x8c/0xd4
[    9.639066]  driver_attach+0x2c/0x38
[    9.642628]  bus_add_driver+0xfc/0x1d0
[    9.646365]  driver_register+0x64/0xf8
[    9.650101]  __pci_register_driver+0x6c/0x7c
[    9.654360]  init_module+0x28/0xfdc [mt7921e]
[    9.658704]  do_one_initcall+0x13c/0x2d0
[    9.662615]  do_init_module+0x58/0x1e8
[    9.666351]  load_module+0xd80/0xeb4
[    9.669912]  __arm64_sys_finit_module+0xa8/0xe0
[    9.674430]  el0_svc_common+0xa4/0x16c
[    9.678168]  el0_svc_compat_handler+0x2c/0x40
[    9.682511]  el0_svc_compat+0x8/0x10
[    9.686076] Code: a94257f6 f9400bf7 a8c47bfd d65f03c0 (d4210000)
[    9.692155] ---[ end trace 7621f966afbf0a29 ]---
[    9.697385] Kernel panic - not syncing: Fatal exception
[    9.702599] SMP: stopping secondary CPUs
[    9.706549] Kernel Offset: 0x1c03600000 from 0xffffffc010000000
[    9.712456] PHYS_OFFSET: 0xfffffff440000000
[    9.716625] CPU features: 0x080026,2a80aa18
[    9.720795] Memory Limit: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47027/">CVE-2021-47027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47027">CVE-2021-47027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220633">SUSE bug 1220633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47028" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47028" ref_url="https://www.suse.com/security/cve/CVE-2021-47028" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: fix txrate reporting

Properly check rate_info to fix unexpected reporting.

[ 1215.161863] Call trace:
[ 1215.164307]  cfg80211_calculate_bitrate+0x124/0x200 [cfg80211]
[ 1215.170139]  ieee80211s_update_metric+0x80/0xc0 [mac80211]
[ 1215.175624]  ieee80211_tx_status_ext+0x508/0x838 [mac80211]
[ 1215.181190]  mt7915_mcu_get_rx_rate+0x28c/0x8d0 [mt7915e]
[ 1215.186580]  mt7915_mac_tx_free+0x324/0x7c0 [mt7915e]
[ 1215.191623]  mt7915_queue_rx_skb+0xa8/0xd0 [mt7915e]
[ 1215.196582]  mt76_dma_cleanup+0x7b0/0x11d0 [mt76]
[ 1215.201276]  __napi_poll+0x38/0xf8
[ 1215.204668]  napi_workfn+0x40/0x80
[ 1215.208062]  process_one_work+0x1fc/0x390
[ 1215.212062]  worker_thread+0x48/0x4d0
[ 1215.215715]  kthread+0x120/0x128
[ 1215.218935]  ret_from_fork+0x10/0x1c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-07"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47028/">CVE-2021-47028 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47028">CVE-2021-47028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220686">SUSE bug 1220686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47029" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47029" ref_url="https://www.suse.com/security/cve/CVE-2021-47029" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: connac: fix kernel warning adding monitor interface

Fix the following kernel warning adding a monitor interface in
mt76_connac_mcu_uni_add_dev routine.

[  507.984882] ------------[ cut here ]------------
[  507.989515] WARNING: CPU: 1 PID: 3017 at mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]
[  508.059379] CPU: 1 PID: 3017 Comm: ifconfig Not tainted 5.4.98 #0
[  508.065461] Hardware name: MT7622_MT7531 RFB (DT)
[  508.070156] pstate: 80000005 (Nzcv daif -PAN -UAO)
[  508.074939] pc : mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]
[  508.081806] lr : mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]
[  508.087367] sp : ffffffc013a33930
[  508.090671] x29: ffffffc013a33930 x28: ffffff801e628ac0
[  508.095973] x27: ffffff801c7f1200 x26: ffffff801c7eb008
[  508.101275] x25: ffffff801c7eaef0 x24: ffffff801d025610
[  508.106577] x23: ffffff801d022990 x22: ffffff801d024de8
[  508.111879] x21: ffffff801d0226a0 x20: ffffff801c7eaee8
[  508.117181] x19: ffffff801d0226a0 x18: 000000005d00b000
[  508.122482] x17: 00000000ffffffff x16: 0000000000000000
[  508.127785] x15: 0000000000000080 x14: ffffff801d704000
[  508.133087] x13: 0000000000000040 x12: 0000000000000002
[  508.138389] x11: 000000000000000c x10: 0000000000000000
[  508.143691] x9 : 0000000000000020 x8 : 0000000000000001
[  508.148992] x7 : 0000000000000000 x6 : 0000000000000000
[  508.154294] x5 : ffffff801c7eaee8 x4 : 0000000000000006
[  508.159596] x3 : 0000000000000001 x2 : 0000000000000000
[  508.164898] x1 : ffffff801c7eac08 x0 : ffffff801d0226a0
[  508.170200] Call trace:
[  508.172640]  mt76_connac_mcu_uni_add_dev+0x178/0x190 [mt76_connac_lib]
[  508.179159]  mt7921_eeprom_init+0x1288/0x1cb8 [mt7921e]
[  508.184394]  drv_add_interface+0x34/0x88 [mac80211]
[  508.189271]  ieee80211_add_virtual_monitor+0xe0/0xb48 [mac80211]
[  508.195277]  ieee80211_do_open+0x86c/0x918 [mac80211]
[  508.200328]  ieee80211_do_open+0x900/0x918 [mac80211]
[  508.205372]  __dev_open+0xcc/0x150
[  508.208763]  __dev_change_flags+0x134/0x198
[  508.212937]  dev_change_flags+0x20/0x60
[  508.216764]  devinet_ioctl+0x3e8/0x748
[  508.220503]  inet_ioctl+0x1e4/0x350
[  508.223983]  sock_do_ioctl+0x48/0x2a0
[  508.227635]  sock_ioctl+0x310/0x4f8
[  508.231116]  do_vfs_ioctl+0xa4/0xac0
[  508.234681]  ksys_ioctl+0x44/0x90
[  508.237985]  __arm64_sys_ioctl+0x1c/0x48
[  508.241901]  el0_svc_common.constprop.1+0x7c/0x100
[  508.246681]  el0_svc_handler+0x18/0x20
[  508.250421]  el0_svc+0x8/0x1c8
[  508.253465] ---[ end trace c7b90fee13d72c39 ]---
[  508.261278] ------------[ cut here ]------------
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47029/">CVE-2021-47029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47029">CVE-2021-47029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220650">SUSE bug 1220650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47030" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47030" ref_url="https://www.suse.com/security/cve/CVE-2021-47030" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7615: fix memory leak in mt7615_coredump_work

Similar to the issue fixed in mt7921_coredump_work, fix a possible memory
leak in mt7615_coredump_work routine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47030/">CVE-2021-47030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47030">CVE-2021-47030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220656">SUSE bug 1220656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47031" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47031" ref_url="https://www.suse.com/security/cve/CVE-2021-47031" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7921: fix memory leak in mt7921_coredump_work

Fix possible memory leak in mt7921_coredump_work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47031/">CVE-2021-47031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47031">CVE-2021-47031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220657">SUSE bug 1220657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47032" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47032" ref_url="https://www.suse.com/security/cve/CVE-2021-47032" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: fix tx skb dma unmap

The first pointer in the txp needs to be unmapped as well, otherwise it will
leak DMA mapping entries
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47032/">CVE-2021-47032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47032">CVE-2021-47032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220658">SUSE bug 1220658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47033" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47033" ref_url="https://www.suse.com/security/cve/CVE-2021-47033" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7615: fix tx skb dma unmap

The first pointer in the txp needs to be unmapped as well, otherwise it will
leak DMA mapping entries
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47033/">CVE-2021-47033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47033">CVE-2021-47033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220659">SUSE bug 1220659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47034" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47034" ref_url="https://www.suse.com/security/cve/CVE-2021-47034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: Fix pte update for kernel memory on radix

When adding a PTE a ptesync is needed to order the update of the PTE
with subsequent accesses otherwise a spurious fault may be raised.

radix__set_pte_at() does not do this for performance gains. For
non-kernel memory this is not an issue as any faults of this kind are
corrected by the page fault handler. For kernel memory these faults
are not handled. The current solution is that there is a ptesync in
flush_cache_vmap() which should be called when mapping from the
vmalloc region.

However, map_kernel_page() does not call flush_cache_vmap(). This is
troublesome in particular for code patching with Strict RWX on radix.
In do_patch_instruction() the page frame that contains the instruction
to be patched is mapped and then immediately patched. With no ordering
or synchronization between setting up the PTE and writing to the page
it is possible for faults.

As the code patching is done using __put_user_asm_goto() the resulting
fault is obscured - but using a normal store instead it can be seen:

  BUG: Unable to handle kernel data access on write at 0xc008000008f24a3c
  Faulting instruction address: 0xc00000000008bd74
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
  Modules linked in: nop_module(PO+) [last unloaded: nop_module]
  CPU: 4 PID: 757 Comm: sh Tainted: P           O      5.10.0-rc5-01361-ge3c1b78c8440-dirty #43
  NIP:  c00000000008bd74 LR: c00000000008bd50 CTR: c000000000025810
  REGS: c000000016f634a0 TRAP: 0300   Tainted: P           O       (5.10.0-rc5-01361-ge3c1b78c8440-dirty)
  MSR:  9000000000009033 &lt;SF,HV,EE,ME,IR,DR,RI,LE&gt;  CR: 44002884  XER: 00000000
  CFAR: c00000000007c68c DAR: c008000008f24a3c DSISR: 42000000 IRQMASK: 1

This results in the kind of issue reported here:
  https://lore.kernel.org/linuxppc-dev/15AC5B0E-A221-4B8C-9039-FA96B8EF7C88@lca.pw/

Chris Riedl suggested a reliable way to reproduce the issue:
  $ mount -t debugfs none /sys/kernel/debug
  $ (while true; do echo function &gt; /sys/kernel/debug/tracing/current_tracer ; echo nop &gt; /sys/kernel/debug/tracing/current_tracer ; done) &amp;

Turning ftrace on and off does a large amount of code patching which
in usually less then 5min will crash giving a trace like:

   ftrace-powerpc: (____ptrval____): replaced (4b473b11) != old (60000000)
   ------------[ ftrace bug ]------------
   ftrace failed to modify
   [&lt;c000000000bf8e5c&gt;] napi_busy_loop+0xc/0x390
    actual:   11:3b:47:4b
   Setting ftrace call site to call ftrace function
   ftrace record flags: 80000001
    (1)
    expected tramp: c00000000006c96c
   ------------[ cut here ]------------
   WARNING: CPU: 4 PID: 809 at kernel/trace/ftrace.c:2065 ftrace_bug+0x28c/0x2e8
   Modules linked in: nop_module(PO-) [last unloaded: nop_module]
   CPU: 4 PID: 809 Comm: sh Tainted: P           O      5.10.0-rc5-01360-gf878ccaf250a #1
   NIP:  c00000000024f334 LR: c00000000024f330 CTR: c0000000001a5af0
   REGS: c000000004c8b760 TRAP: 0700   Tainted: P           O       (5.10.0-rc5-01360-gf878ccaf250a)
   MSR:  900000000282b033 &lt;SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE&gt;  CR: 28008848  XER: 20040000
   CFAR: c0000000001a9c98 IRQMASK: 0
   GPR00: c00000000024f330 c000000004c8b9f0 c000000002770600 0000000000000022
   GPR04: 00000000ffff7fff c000000004c8b6d0 0000000000000027 c0000007fe9bcdd8
   GPR08: 0000000000000023 ffffffffffffffd8 0000000000000027 c000000002613118
   GPR12: 0000000000008000 c0000007fffdca00 0000000000000000 0000000000000000
   GPR16: 0000000023ec37c5 0000000000000000 0000000000000000 0000000000000008
   GPR20: c000000004c8bc90 c0000000027a2d20 c000000004c8bcd0 c000000002612fe8
   GPR24: 0000000000000038 0000000000000030 0000000000000028 0000000000000020
   GPR28: c000000000ff1b68 c000000000bf8e5c c00000000312f700 c000000000fbb9b0
   NIP ftrace_bug+0x28c/0x2e8
   LR  ftrace_bug+0x288/0x2e8
   Call T
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47034/">CVE-2021-47034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47034">CVE-2021-47034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220687">SUSE bug 1220687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47035" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47035" ref_url="https://www.suse.com/security/cve/CVE-2021-47035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Remove WO permissions on second-level paging entries

When the first level page table is used for IOVA translation, it only
supports Read-Only and Read-Write permissions. The Write-Only permission
is not supported as the PRESENT bit (implying Read permission) should
always set. When using second level, we still give separate permissions
that allows WriteOnly which seems inconsistent and awkward. We want to
have consistent behavior. After moving to 1st level, we don't want things
to work sometimes, and break if we use 2nd level for the same mappings.
Hence remove this configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47035/">CVE-2021-47035 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47035">CVE-2021-47035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220688">SUSE bug 1220688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47036" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47036" ref_url="https://www.suse.com/security/cve/CVE-2021-47036" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: skip L4 aggregation for UDP tunnel packets

If NETIF_F_GRO_FRAGLIST or NETIF_F_GRO_UDP_FWD are enabled, and there
are UDP tunnels available in the system, udp_gro_receive() could end-up
doing L4 aggregation (either SKB_GSO_UDP_L4 or SKB_GSO_FRAGLIST) at
the outer UDP tunnel level for packets effectively carrying and UDP
tunnel header.

That could cause inner protocol corruption. If e.g. the relevant
packets carry a vxlan header, different vxlan ids will be ignored/
aggregated to the same GSO packet. Inner headers will be ignored, too,
so that e.g. TCP over vxlan push packets will be held in the GRO
engine till the next flush, etc.

Just skip the SKB_GSO_UDP_L4 and SKB_GSO_FRAGLIST code path if the
current packet could land in a UDP tunnel, and let udp_gro_receive()
do GRO via udp_sk(sk)-&gt;gro_receive.

The check implemented in this patch is broader than what is strictly
needed, as the existing UDP tunnel could be e.g. configured on top of
a different device: we could end-up skipping GRO at-all for some packets.

Anyhow, that is a very thin corner case and covering it will add quite
a bit of complexity.

v1 -&gt; v2:
 - hopefully clarify the commit message
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47036/">CVE-2021-47036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47036">CVE-2021-47036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220671">SUSE bug 1220671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47037" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47037" ref_url="https://www.suse.com/security/cve/CVE-2021-47037" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: q6afe-clocks: fix reprobing of the driver

Q6afe-clocks driver can get reprobed. For example if the APR services
are restarted after the firmware crash. However currently Q6afe-clocks
driver will oops because hw.init will get cleared during first _probe
call. Rewrite the driver to fill the clock data at runtime rather than
using big static array of clocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47037/">CVE-2021-47037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47037">CVE-2021-47037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220752">SUSE bug 1220752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47038" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47038" ref_url="https://www.suse.com/security/cve/CVE-2021-47038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: avoid deadlock between hci_dev-&gt;lock and socket lock

Commit eab2404ba798 ("Bluetooth: Add BT_PHY socket option") added a
dependency between socket lock and hci_dev-&gt;lock that could lead to
deadlock.

It turns out that hci_conn_get_phy() is not in any way relying on hdev
being immutable during the runtime of this function, neither does it even
look at any of the members of hdev, and as such there is no need to hold
that lock.

This fixes the lockdep splat below:

 ======================================================
 WARNING: possible circular locking dependency detected
 5.12.0-rc1-00026-g73d464503354 #10 Not tainted
 ------------------------------------------------------
 bluetoothd/1118 is trying to acquire lock:
 ffff8f078383c078 (&amp;hdev-&gt;lock){+.+.}-{3:3}, at: hci_conn_get_phy+0x1c/0x150 [bluetooth]

 but task is already holding lock:
 ffff8f07e831d920 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}, at: l2cap_sock_getsockopt+0x8b/0x610

 which lock already depends on the new lock.

 the existing dependency chain (in reverse order) is:

 -&gt; #3 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}:
        lock_sock_nested+0x72/0xa0
        l2cap_sock_ready_cb+0x18/0x70 [bluetooth]
        l2cap_config_rsp+0x27a/0x520 [bluetooth]
        l2cap_sig_channel+0x658/0x1330 [bluetooth]
        l2cap_recv_frame+0x1ba/0x310 [bluetooth]
        hci_rx_work+0x1cc/0x640 [bluetooth]
        process_one_work+0x244/0x5f0
        worker_thread+0x3c/0x380
        kthread+0x13e/0x160
        ret_from_fork+0x22/0x30

 -&gt; #2 (&amp;chan-&gt;lock#2/1){+.+.}-{3:3}:
        __mutex_lock+0xa3/0xa10
        l2cap_chan_connect+0x33a/0x940 [bluetooth]
        l2cap_sock_connect+0x141/0x2a0 [bluetooth]
        __sys_connect+0x9b/0xc0
        __x64_sys_connect+0x16/0x20
        do_syscall_64+0x33/0x80
        entry_SYSCALL_64_after_hwframe+0x44/0xae

 -&gt; #1 (&amp;conn-&gt;chan_lock){+.+.}-{3:3}:
        __mutex_lock+0xa3/0xa10
        l2cap_chan_connect+0x322/0x940 [bluetooth]
        l2cap_sock_connect+0x141/0x2a0 [bluetooth]
        __sys_connect+0x9b/0xc0
        __x64_sys_connect+0x16/0x20
        do_syscall_64+0x33/0x80
        entry_SYSCALL_64_after_hwframe+0x44/0xae

 -&gt; #0 (&amp;hdev-&gt;lock){+.+.}-{3:3}:
        __lock_acquire+0x147a/0x1a50
        lock_acquire+0x277/0x3d0
        __mutex_lock+0xa3/0xa10
        hci_conn_get_phy+0x1c/0x150 [bluetooth]
        l2cap_sock_getsockopt+0x5a9/0x610 [bluetooth]
        __sys_getsockopt+0xcc/0x200
        __x64_sys_getsockopt+0x20/0x30
        do_syscall_64+0x33/0x80
        entry_SYSCALL_64_after_hwframe+0x44/0xae

 other info that might help us debug this:

 Chain exists of:
   &amp;hdev-&gt;lock --&gt; &amp;chan-&gt;lock#2/1 --&gt; sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP

  Possible unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
   lock(sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP);
                                lock(&amp;chan-&gt;lock#2/1);
                                lock(sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP);
   lock(&amp;hdev-&gt;lock);

  *** DEADLOCK ***

 1 lock held by bluetoothd/1118:
  #0: ffff8f07e831d920 (sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP){+.+.}-{0:0}, at: l2cap_sock_getsockopt+0x8b/0x610 [bluetooth]

 stack backtrace:
 CPU: 3 PID: 1118 Comm: bluetoothd Not tainted 5.12.0-rc1-00026-g73d464503354 #10
 Hardware name: LENOVO 20K5S22R00/20K5S22R00, BIOS R0IET38W (1.16 ) 05/31/2017
 Call Trace:
  dump_stack+0x7f/0xa1
  check_noncircular+0x105/0x120
  ? __lock_acquire+0x147a/0x1a50
  __lock_acquire+0x147a/0x1a50
  lock_acquire+0x277/0x3d0
  ? hci_conn_get_phy+0x1c/0x150 [bluetooth]
  ? __lock_acquire+0x2e1/0x1a50
  ? lock_is_held_type+0xb4/0x120
  ? hci_conn_get_phy+0x1c/0x150 [bluetooth]
  __mutex_lock+0xa3/0xa10
  ? hci_conn_get_phy+0x1c/0x150 [bluetooth]
  ? lock_acquire+0x277/0x3d0
  ? mark_held_locks+0x49/0x70
  ? mark_held_locks+0x49/0x70
  ? hci_conn_get_phy+0x1c/0x150 [bluetooth]
  hci_conn_get_phy+0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47038/">CVE-2021-47038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47038">CVE-2021-47038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220753">SUSE bug 1220753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47039" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47039" ref_url="https://www.suse.com/security/cve/CVE-2021-47039" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ataflop: potential out of bounds in do_format()

The function uses "type" as an array index:

	q = unit[drive].disk[type]-&gt;queue;

Unfortunately the bounds check on "type" isn't done until later in the
function.  Fix this by moving the bounds check to the start.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47039/">CVE-2021-47039 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47039">CVE-2021-47039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220647">SUSE bug 1220647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47040" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47040" ref_url="https://www.suse.com/security/cve/CVE-2021-47040" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix overflows checks in provide buffers

Colin reported before possible overflow and sign extension problems in
io_provide_buffers_prep(). As Linus pointed out previous attempt did nothing
useful, see d81269fecb8ce ("io_uring: fix provide_buffers sign extension").

Do that with help of check_&lt;op&gt;_overflow helpers. And fix struct
io_provide_buf::len type, as it doesn't make much sense to keep it
signed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47040/">CVE-2021-47040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47040">CVE-2021-47040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220754">SUSE bug 1220754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47041" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47041" ref_url="https://www.suse.com/security/cve/CVE-2021-47041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fix incorrect locking in state_change sk callback

We are not changing anything in the TCP connection state so
we should not take a write_lock but rather a read lock.

This caused a deadlock when running nvmet-tcp and nvme-tcp
on the same system, where state_change callbacks on the
host and on the controller side have causal relationship
and made lockdep report on this with blktests:

================================
WARNING: inconsistent lock state
5.12.0-rc3 #1 Tainted: G          I
--------------------------------
inconsistent {IN-SOFTIRQ-W} -&gt; {SOFTIRQ-ON-R} usage.
nvme/1324 [HC0[0]:SC0[0]:HE1:SE1] takes:
ffff888363151000 (clock-AF_INET){++-?}-{2:2}, at: nvme_tcp_state_change+0x21/0x150 [nvme_tcp]
{IN-SOFTIRQ-W} state was registered at:
  __lock_acquire+0x79b/0x18d0
  lock_acquire+0x1ca/0x480
  _raw_write_lock_bh+0x39/0x80
  nvmet_tcp_state_change+0x21/0x170 [nvmet_tcp]
  tcp_fin+0x2a8/0x780
  tcp_data_queue+0xf94/0x1f20
  tcp_rcv_established+0x6ba/0x1f00
  tcp_v4_do_rcv+0x502/0x760
  tcp_v4_rcv+0x257e/0x3430
  ip_protocol_deliver_rcu+0x69/0x6a0
  ip_local_deliver_finish+0x1e2/0x2f0
  ip_local_deliver+0x1a2/0x420
  ip_rcv+0x4fb/0x6b0
  __netif_receive_skb_one_core+0x162/0x1b0
  process_backlog+0x1ff/0x770
  __napi_poll.constprop.0+0xa9/0x5c0
  net_rx_action+0x7b3/0xb30
  __do_softirq+0x1f0/0x940
  do_softirq+0xa1/0xd0
  __local_bh_enable_ip+0xd8/0x100
  ip_finish_output2+0x6b7/0x18a0
  __ip_queue_xmit+0x706/0x1aa0
  __tcp_transmit_skb+0x2068/0x2e20
  tcp_write_xmit+0xc9e/0x2bb0
  __tcp_push_pending_frames+0x92/0x310
  inet_shutdown+0x158/0x300
  __nvme_tcp_stop_queue+0x36/0x270 [nvme_tcp]
  nvme_tcp_stop_queue+0x87/0xb0 [nvme_tcp]
  nvme_tcp_teardown_admin_queue+0x69/0xe0 [nvme_tcp]
  nvme_do_delete_ctrl+0x100/0x10c [nvme_core]
  nvme_sysfs_delete.cold+0x8/0xd [nvme_core]
  kernfs_fop_write_iter+0x2c7/0x460
  new_sync_write+0x36c/0x610
  vfs_write+0x5c0/0x870
  ksys_write+0xf9/0x1d0
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xae
irq event stamp: 10687
hardirqs last  enabled at (10687): [&lt;ffffffff9ec376bd&gt;] _raw_spin_unlock_irqrestore+0x2d/0x40
hardirqs last disabled at (10686): [&lt;ffffffff9ec374d8&gt;] _raw_spin_lock_irqsave+0x68/0x90
softirqs last  enabled at (10684): [&lt;ffffffff9f000608&gt;] __do_softirq+0x608/0x940
softirqs last disabled at (10649): [&lt;ffffffff9cdedd31&gt;] do_softirq+0xa1/0xd0

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(clock-AF_INET);
  &lt;Interrupt&gt;
    lock(clock-AF_INET);

 *** DEADLOCK ***

5 locks held by nvme/1324:
 #0: ffff8884a01fe470 (sb_writers#4){.+.+}-{0:0}, at: ksys_write+0xf9/0x1d0
 #1: ffff8886e435c090 (&amp;of-&gt;mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x216/0x460
 #2: ffff888104d90c38 (kn-&gt;active#255){++++}-{0:0}, at: kernfs_remove_self+0x22d/0x330
 #3: ffff8884634538d0 (&amp;queue-&gt;queue_lock){+.+.}-{3:3}, at: nvme_tcp_stop_queue+0x52/0xb0 [nvme_tcp]
 #4: ffff888363150d30 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_shutdown+0x59/0x300

stack backtrace:
CPU: 26 PID: 1324 Comm: nvme Tainted: G          I       5.12.0-rc3 #1
Hardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.10.0 11/12/2020
Call Trace:
 dump_stack+0x93/0xc2
 mark_lock_irq.cold+0x2c/0xb3
 ? verify_lock_unused+0x390/0x390
 ? stack_trace_consume_entry+0x160/0x160
 ? lock_downgrade+0x100/0x100
 ? save_trace+0x88/0x5e0
 ? _raw_spin_unlock_irqrestore+0x2d/0x40
 mark_lock+0x530/0x1470
 ? mark_lock_irq+0x1d10/0x1d10
 ? enqueue_timer+0x660/0x660
 mark_usage+0x215/0x2a0
 __lock_acquire+0x79b/0x18d0
 ? tcp_schedule_loss_probe.part.0+0x38c/0x520
 lock_acquire+0x1ca/0x480
 ? nvme_tcp_state_change+0x21/0x150 [nvme_tcp]
 ? rcu_read_unlock+0x40/0x40
 ? tcp_mtu_probe+0x1ae0/0x1ae0
 ? kmalloc_reserve+0xa0/0xa0
 ? sysfs_file_ops+0x170/0x170
 _raw_read_lock+0x3d/0xa0
 ? nvme_tcp_state_change+0x21/0x150 [nvme_tcp]
 nvme_tcp_state_change+0x21/0x150 [nvme_tcp]
 ? sysfs_file_ops
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47041/">CVE-2021-47041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47041">CVE-2021-47041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220755">SUSE bug 1220755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47042" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47042" ref_url="https://www.suse.com/security/cve/CVE-2021-47042" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Free local data after use

Fixes the following memory leak in dc_link_construct():

unreferenced object 0xffffa03e81471400 (size 1024):
comm "amd_module_load", pid 2486, jiffies 4294946026 (age 10.544s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[&lt;000000000bdf5c4a&gt;] kmem_cache_alloc_trace+0x30a/0x4a0
[&lt;00000000e7c59f0e&gt;] link_create+0xce/0xac0 [amdgpu]
[&lt;000000002fb6c072&gt;] dc_create+0x370/0x720 [amdgpu]
[&lt;000000000094d1f3&gt;] amdgpu_dm_init+0x18e/0x17a0 [amdgpu]
[&lt;00000000bec048fd&gt;] dm_hw_init+0x12/0x20 [amdgpu]
[&lt;00000000a2bb7cf6&gt;] amdgpu_device_init+0x1463/0x1e60 [amdgpu]
[&lt;0000000032d3bb13&gt;] amdgpu_driver_load_kms+0x5b/0x330 [amdgpu]
[&lt;00000000a27834f9&gt;] amdgpu_pci_probe+0x192/0x280 [amdgpu]
[&lt;00000000fec7d291&gt;] local_pci_probe+0x47/0xa0
[&lt;0000000055dbbfa7&gt;] pci_device_probe+0xe3/0x180
[&lt;00000000815da970&gt;] really_probe+0x1c4/0x4e0
[&lt;00000000b4b6974b&gt;] driver_probe_device+0x62/0x150
[&lt;000000000f9ecc61&gt;] device_driver_attach+0x58/0x60
[&lt;000000000f65c843&gt;] __driver_attach+0xd6/0x150
[&lt;000000002f5e3683&gt;] bus_for_each_dev+0x6a/0xc0
[&lt;00000000a1cfc897&gt;] driver_attach+0x1e/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47042/">CVE-2021-47042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47042">CVE-2021-47042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220756">SUSE bug 1220756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47043" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47043" ref_url="https://www.suse.com/security/cve/CVE-2021-47043" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'

If an error occurs after a successful 'of_icc_get()' call, it must be
undone.

Use 'devm_of_icc_get()' instead of 'of_icc_get()' to avoid the leak.
Update the remove function accordingly and axe the now unneeded
'icc_put()' calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47043/">CVE-2021-47043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47043">CVE-2021-47043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220757">SUSE bug 1220757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47044" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47044" ref_url="https://www.suse.com/security/cve/CVE-2021-47044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix shift-out-of-bounds in load_balance()

Syzbot reported a handful of occurrences where an sd-&gt;nr_balance_failed can
grow to much higher values than one would expect.

A successful load_balance() resets it to 0; a failed one increments
it. Once it gets to sd-&gt;cache_nice_tries + 3, this *should* trigger an
active balance, which will either set it to sd-&gt;cache_nice_tries+1 or reset
it to 0. However, in case the to-be-active-balanced task is not allowed to
run on env-&gt;dst_cpu, then the increment is done without any further
modification.

This could then be repeated ad nauseam, and would explain the absurdly high
values reported by syzbot (86, 149). VincentG noted there is value in
letting sd-&gt;cache_nice_tries grow, so the shift itself should be
fixed. That means preventing:

  """
  If the value of the right operand is negative or is greater than or equal
  to the width of the promoted left operand, the behavior is undefined.
  """

Thus we need to cap the shift exponent to
  BITS_PER_TYPE(typeof(lefthand)) - 1.

I had a look around for other similar cases via coccinelle:

  @expr@
  position pos;
  expression E1;
  expression E2;
  @@
  (
  E1 &gt;&gt; E2@pos
  |
  E1 &gt;&gt; E2@pos
  )

  @cst depends on expr@
  position pos;
  expression expr.E1;
  constant cst;
  @@
  (
  E1 &gt;&gt; cst@pos
  |
  E1 &lt;&lt; cst@pos
  )

  @script:python depends on !cst@
  pos &lt;&lt; expr.pos;
  exp &lt;&lt; expr.E2;
  @@
  # Dirty hack to ignore constexpr
  if exp.upper() != exp:
     coccilib.report.print_report(pos[0], "Possible UB shift here")

The only other match in kernel/sched is rq_clock_thermal() which employs
sched_thermal_decay_shift, and that exponent is already capped to 10, so
that one is fine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47044/">CVE-2021-47044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47044">CVE-2021-47044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220759">SUSE bug 1220759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47045" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47045" ref_url="https://www.suse.com/security/cve/CVE-2021-47045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()

It is possible to call lpfc_issue_els_plogi() passing a did for which no
matching ndlp is found. A call is then made to lpfc_prep_els_iocb() with a
null pointer to a lpfc_nodelist structure resulting in a null pointer
dereference.

Fix by returning an error status if no valid ndlp is found. Fix up comments
regarding ndlp reference counting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47045/">CVE-2021-47045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47045">CVE-2021-47045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220640">SUSE bug 1220640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47046" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47046" ref_url="https://www.suse.com/security/cve/CVE-2021-47046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix off by one in hdmi_14_process_transaction()

The hdcp_i2c_offsets[] array did not have an entry for
HDCP_MESSAGE_ID_WRITE_CONTENT_STREAM_TYPE so it led to an off by one
read overflow.  I added an entry and copied the 0x0 value for the offset
from similar code in drivers/gpu/drm/amd/display/modules/hdcp/hdcp_ddc.c.

I also declared several of these arrays as having HDCP_MESSAGE_ID_MAX
entries.  This doesn't change the code, but it's just a belt and
suspenders approach to try future proof the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47046/">CVE-2021-47046 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47046">CVE-2021-47046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220758">SUSE bug 1220758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47047" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails

The spi controller supports 44-bit address space on AXI in DMA mode,
so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.
In addition, if dma_map_single fails, it should return immediately
instead of continuing doing the DMA operation which bases on invalid
address.

This fixes the following crash which occurs in reading a big block
from flash:

[  123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)
[  123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped
[  123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0
[  123.792536] Mem abort info:
[  123.795313]   ESR = 0x96000145
[  123.798351]   EC = 0x25: DABT (current EL), IL = 32 bits
[  123.803655]   SET = 0, FnV = 0
[  123.806693]   EA = 0, S1PTW = 0
[  123.809818] Data abort info:
[  123.812683]   ISV = 0, ISS = 0x00000145
[  123.816503]   CM = 1, WnR = 1
[  123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000
[  123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000
[  123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47049" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47049" ref_url="https://www.suse.com/security/cve/CVE-2021-47049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Use after free in __vmbus_open()

The "open_info" variable is added to the &amp;vmbus_connection.chn_msg_list,
but the error handling frees "open_info" without removing it from the
list.  This will result in a use after free.  First remove it from the
list, and then free it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47049/">CVE-2021-47049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47049">CVE-2021-47049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220692">SUSE bug 1220692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47050" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47050" ref_url="https://www.suse.com/security/cve/CVE-2021-47050" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memory: renesas-rpc-if: fix possible NULL pointer dereference of resource

The platform_get_resource_byname() can return NULL which would be
immediately dereferenced by resource_size().  Instead dereference it
after validating the resource.

Addresses-Coverity: Dereference null return value
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47050/">CVE-2021-47050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47050">CVE-2021-47050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220762">SUSE bug 1220762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47051" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47051" ref_url="https://www.suse.com/security/cve/CVE-2021-47051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()

pm_runtime_get_sync will increment pm usage counter even it failed.
Forgetting to putting operation will result in reference leak here.
Fix it by replacing it with pm_runtime_resume_and_get to keep usage
counter balanced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47051/">CVE-2021-47051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47051">CVE-2021-47051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220764">SUSE bug 1220764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47052" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47052" ref_url="https://www.suse.com/security/cve/CVE-2021-47052" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sa2ul - Fix memory leak of rxd

There are two error return paths that are not freeing rxd and causing
memory leaks.  Fix these.

Addresses-Coverity: ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47052/">CVE-2021-47052 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47052">CVE-2021-47052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220765">SUSE bug 1220765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47053" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47053" ref_url="https://www.suse.com/security/cve/CVE-2021-47053" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ss - Fix memory leak of pad

It appears there are several failure return paths that don't seem
to be free'ing pad. Fix these.

Addresses-Coverity: ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47053/">CVE-2021-47053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47053">CVE-2021-47053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220766">SUSE bug 1220766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47054" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47054" ref_url="https://www.suse.com/security/cve/CVE-2021-47054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: qcom: Put child node before return

Put child node before return to fix potential reference count leak.
Generally, the reference count of child is incremented and decremented
automatically in the macro for_each_available_child_of_node() and should
be decremented manually if the loop is broken in loop body.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47054/">CVE-2021-47054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47054">CVE-2021-47054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220767">SUSE bug 1220767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47055" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47055" ref_url="https://www.suse.com/security/cve/CVE-2021-47055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: require write permissions for locking and badblock ioctls

MEMLOCK, MEMUNLOCK and OTPLOCK modify protection bits. Thus require
write permission. Depending on the hardware MEMLOCK might even be
write-once, e.g. for SPI-NOR flashes with their WP# tied to GND. OTPLOCK
is always write-once.

MEMSETBADBLOCK modifies the bad block table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47055/">CVE-2021-47055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47055">CVE-2021-47055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220768">SUSE bug 1220768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47056" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47056" ref_url="https://www.suse.com/security/cve/CVE-2021-47056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init

ADF_STATUS_PF_RUNNING is (only) used and checked by adf_vf2pf_shutdown()
before calling adf_iov_putmsg()-&gt;mutex_lock(vf2pf_lock), however the
vf2pf_lock is initialized in adf_dev_init(), which can fail and when it
fail, the vf2pf_lock is either not initialized or destroyed, a subsequent
use of vf2pf_lock will cause issue.
To fix this issue, only set this flag if adf_dev_init() returns 0.

[    7.178404] BUG: KASAN: user-memory-access in __mutex_lock.isra.0+0x1ac/0x7c0
[    7.180345] Call Trace:
[    7.182576]  mutex_lock+0xc9/0xd0
[    7.183257]  adf_iov_putmsg+0x118/0x1a0 [intel_qat]
[    7.183541]  adf_vf2pf_shutdown+0x4d/0x7b [intel_qat]
[    7.183834]  adf_dev_shutdown+0x172/0x2b0 [intel_qat]
[    7.184127]  adf_probe+0x5e9/0x600 [qat_dh895xccvf]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47056/">CVE-2021-47056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47056">CVE-2021-47056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220769">SUSE bug 1220769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47057" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47057" ref_url="https://www.suse.com/security/cve/CVE-2021-47057" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map

In the case where the dma_iv mapping fails, the return error path leaks
the memory allocated to object d.  Fix this by adding a new error return
label and jumping to this to ensure d is free'd before the return.

Addresses-Coverity: ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47057/">CVE-2021-47057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47057">CVE-2021-47057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220780">SUSE bug 1220780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47058" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47058" ref_url="https://www.suse.com/security/cve/CVE-2021-47058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: set debugfs_name to NULL after it is freed

There is a upstream commit cffa4b2122f5("regmap:debugfs:
Fix a memory leak when calling regmap_attach_dev") that
adds a if condition when create name for debugfs_name.
With below function invoking logical, debugfs_name is
freed in regmap_debugfs_exit(), but it is not created again
because of the if condition introduced by above commit.
regmap_reinit_cache()
	regmap_debugfs_exit()
	...
	regmap_debugfs_init()
So, set debugfs_name to NULL after it is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47058/">CVE-2021-47058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47058">CVE-2021-47058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220779">SUSE bug 1220779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47059" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47059" ref_url="https://www.suse.com/security/cve/CVE-2021-47059" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ss - fix result memory leak on error path

This patch fixes a memory leak on an error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47059/">CVE-2021-47059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47059">CVE-2021-47059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220781">SUSE bug 1220781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47062" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47062" ref_url="https://www.suse.com/security/cve/CVE-2021-47062" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs

Use the kvm_for_each_vcpu() helper to iterate over vCPUs when encrypting
VMSAs for SEV, which effectively switches to use online_vcpus instead of
created_vcpus.  This fixes a possible null-pointer dereference as
created_vcpus does not guarantee a vCPU exists, since it is updated at
the very beginning of KVM_CREATE_VCPU.  created_vcpus exists to allow the
bulk of vCPU creation to run in parallel, while still correctly
restricting the max number of max vCPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47062/">CVE-2021-47062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47062">CVE-2021-47062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220747">SUSE bug 1220747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47063" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47063" ref_url="https://www.suse.com/security/cve/CVE-2021-47063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge/panel: Cleanup connector on bridge detach

If we don't call drm_connector_cleanup() manually in
panel_bridge_detach(), the connector will be cleaned up with the other
DRM objects in the call to drm_mode_config_cleanup(). However, since our
drm_connector is devm-allocated, by the time drm_mode_config_cleanup()
will be called, our connector will be long gone. Therefore, the
connector must be cleaned up when the bridge is detached to avoid
use-after-free conditions.

v2: Cleanup connector only if it was created

v3: Add FIXME

v4: (Use connector-&gt;dev) directly in if() block
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47063/">CVE-2021-47063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47063">CVE-2021-47063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220777">SUSE bug 1220777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47064" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47064" ref_url="https://www.suse.com/security/cve/CVE-2021-47064" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: fix potential DMA mapping leak

With buf uninitialized in mt76_dma_tx_queue_skb_raw, its field skip_unmap
could potentially inherit a non-zero value from stack garbage.
If this happens, it will cause DMA mappings for MCU command frames to not be
unmapped after completion
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47064/">CVE-2021-47064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47064">CVE-2021-47064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220741">SUSE bug 1220741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47065" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47065" ref_url="https://www.suse.com/security/cve/CVE-2021-47065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtw88: Fix array overrun in rtw_get_tx_power_params()

Using a kernel with the Undefined Behaviour Sanity Checker (UBSAN) enabled, the
following array overrun is logged:

================================================================================
UBSAN: array-index-out-of-bounds in /home/finger/wireless-drivers-next/drivers/net/wireless/realtek/rtw88/phy.c:1789:34
index 5 is out of range for type 'u8 [5]'
CPU: 2 PID: 84 Comm: kworker/u16:3 Tainted: G           O      5.12.0-rc5-00086-gd88bba47038e-dirty #651
Hardware name: TOSHIBA TECRA A50-A/TECRA A50-A, BIOS Version 4.50   09/29/2014
Workqueue: phy0 ieee80211_scan_work [mac80211]
Call Trace:
 dump_stack+0x64/0x7c
 ubsan_epilogue+0x5/0x40
 __ubsan_handle_out_of_bounds.cold+0x43/0x48
 rtw_get_tx_power_params+0x83a/drivers/net/wireless/realtek/rtw88/0xad0 [rtw_core]
 ? rtw_pci_read16+0x20/0x20 [rtw_pci]
 ? check_hw_ready+0x50/0x90 [rtw_core]
 rtw_phy_get_tx_power_index+0x4d/0xd0 [rtw_core]
 rtw_phy_set_tx_power_level+0xee/0x1b0 [rtw_core]
 rtw_set_channel+0xab/0x110 [rtw_core]
 rtw_ops_config+0x87/0xc0 [rtw_core]
 ieee80211_hw_config+0x9d/0x130 [mac80211]
 ieee80211_scan_state_set_channel+0x81/0x170 [mac80211]
 ieee80211_scan_work+0x19f/0x2a0 [mac80211]
 process_one_work+0x1dd/0x3a0
 worker_thread+0x49/0x330
 ? rescuer_thread+0x3a0/0x3a0
 kthread+0x134/0x150
 ? kthread_create_worker_on_cpu+0x70/0x70
 ret_from_fork+0x22/0x30
================================================================================

The statement where an array is being overrun is shown in the following snippet:

	if (rate &lt;= DESC_RATE11M)
		tx_power = pwr_idx_2g-&gt;cck_base[group];
	else
====&gt;		tx_power = pwr_idx_2g-&gt;bw40_base[group];

The associated arrays are defined in main.h as follows:

struct rtw_2g_txpwr_idx {
	u8 cck_base[6];
	u8 bw40_base[5];
	struct rtw_2g_1s_pwr_idx_diff ht_1s_diff;
	struct rtw_2g_ns_pwr_idx_diff ht_2s_diff;
	struct rtw_2g_ns_pwr_idx_diff ht_3s_diff;
	struct rtw_2g_ns_pwr_idx_diff ht_4s_diff;
};

The problem arises because the value of group is 5 for channel 14. The trivial
increase in the dimension of bw40_base fails as this struct must match the layout of
efuse. The fix is to add the rate as an argument to rtw_get_channel_group() and set
the group for channel 14 to 4 if rate &lt;= DESC_RATE11M.

This patch fixes commit fa6dfe6bff24 ("rtw88: resolve order of tx power setting routines")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47065/">CVE-2021-47065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47065">CVE-2021-47065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220749">SUSE bug 1220749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47066" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47066" ref_url="https://www.suse.com/security/cve/CVE-2021-47066" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

async_xor: increase src_offs when dropping destination page

Now we support sharing one page if PAGE_SIZE is not equal stripe size. To
support this, it needs to support calculating xor value with different
offsets for each r5dev. One offset array is used to record those offsets.

In RMW mode, parity page is used as a source page. It sets
ASYNC_TX_XOR_DROP_DST before calculating xor value in ops_run_prexor5.
So it needs to add src_list and src_offs at the same time. Now it only
needs src_list. So the xor value which is calculated is wrong. It can
cause data corruption problem.

I can reproduce this problem 100% on a POWER8 machine. The steps are:

  mdadm -CR /dev/md0 -l5 -n3 /dev/sdb1 /dev/sdc1 /dev/sdd1 --size=3G
  mkfs.xfs /dev/md0
  mount /dev/md0 /mnt/test
  mount: /mnt/test: mount(2) system call failed: Structure needs cleaning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47066/">CVE-2021-47066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47066">CVE-2021-47066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220782">SUSE bug 1220782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47067" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47067" ref_url="https://www.suse.com/security/cve/CVE-2021-47067" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc/tegra: regulators: Fix locking up when voltage-spread is out of range

Fix voltage coupler lockup which happens when voltage-spread is out
of range due to a bug in the code. The max-spread requirement shall be
accounted when CPU regulator doesn't have consumers. This problem is
observed on Tegra30 Ouya game console once system-wide DVFS is enabled
in a device-tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47067/">CVE-2021-47067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47067">CVE-2021-47067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220750">SUSE bug 1220750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47069" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47069" ref_url="https://www.suse.com/security/cve/CVE-2021-47069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry

do_mq_timedreceive calls wq_sleep with a stack local address.  The
sender (do_mq_timedsend) uses this address to later call pipelined_send.

This leads to a very hard to trigger race where a do_mq_timedreceive
call might return and leave do_mq_timedsend to rely on an invalid
address, causing the following crash:

  RIP: 0010:wake_q_add_safe+0x13/0x60
  Call Trace:
   __x64_sys_mq_timedsend+0x2a9/0x490
   do_syscall_64+0x80/0x680
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7f5928e40343

The race occurs as:

1. do_mq_timedreceive calls wq_sleep with the address of `struct
   ext_wait_queue` on function stack (aliased as `ewq_addr` here) - it
   holds a valid `struct ext_wait_queue *` as long as the stack has not
   been overwritten.

2. `ewq_addr` gets added to info-&gt;e_wait_q[RECV].list in wq_add, and
   do_mq_timedsend receives it via wq_get_first_waiter(info, RECV) to call
   __pipelined_op.

3. Sender calls __pipelined_op::smp_store_release(&amp;this-&gt;state,
   STATE_READY).  Here is where the race window begins.  (`this` is
   `ewq_addr`.)

4. If the receiver wakes up now in do_mq_timedreceive::wq_sleep, it
   will see `state == STATE_READY` and break.

5. do_mq_timedreceive returns, and `ewq_addr` is no longer guaranteed
   to be a `struct ext_wait_queue *` since it was on do_mq_timedreceive's
   stack.  (Although the address may not get overwritten until another
   function happens to touch it, which means it can persist around for an
   indefinite time.)

6. do_mq_timedsend::__pipelined_op() still believes `ewq_addr` is a
   `struct ext_wait_queue *`, and uses it to find a task_struct to pass to
   the wake_q_add_safe call.  In the lucky case where nothing has
   overwritten `ewq_addr` yet, `ewq_addr-&gt;task` is the right task_struct.
   In the unlucky case, __pipelined_op::wake_q_add_safe gets handed a
   bogus address as the receiver's task_struct causing the crash.

do_mq_timedsend::__pipelined_op() should not dereference `this` after
setting STATE_READY, as the receiver counterpart is now free to return.
Change __pipelined_op to call wake_q_add_safe on the receiver's
task_struct returned by get_task_struct, instead of dereferencing `this`
which sits on the receiver's stack.

As Manfred pointed out, the race potentially also exists in
ipc/msg.c::expunge_all and ipc/sem.c::wake_up_sem_queue_prepare.  Fix
those in the same way.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47069/">CVE-2021-47069 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47069">CVE-2021-47069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220826">SUSE bug 1220826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47070" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47070" ref_url="https://www.suse.com/security/cve/CVE-2021-47070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix another memory leak in error handling paths

Memory allocated by 'vmbus_alloc_ring()' at the beginning of the probe
function is never freed in the error handling path.

Add the missing 'vmbus_free_ring()' call.

Note that it is already freed in the .remove function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47070/">CVE-2021-47070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47070">CVE-2021-47070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220829">SUSE bug 1220829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47071" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47071" ref_url="https://www.suse.com/security/cve/CVE-2021-47071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix a memory leak in error handling paths

If 'vmbus_establish_gpadl()' fails, the (recv|send)_gpadl will not be
updated and 'hv_uio_cleanup()' in the error handling path will not be
able to free the corresponding buffer.

In such a case, we need to free the buffer explicitly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47071/">CVE-2021-47071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47071">CVE-2021-47071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220846">SUSE bug 1220846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47072" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47072" ref_url="https://www.suse.com/security/cve/CVE-2021-47072" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix removed dentries still existing after log is synced

When we move one inode from one directory to another and both the inode
and its previous parent directory were logged before, we are not supposed
to have the dentry for the old parent if we have a power failure after the
log is synced. Only the new dentry is supposed to exist.

Generally this works correctly, however there is a scenario where this is
not currently working, because the old parent of the file/directory that
was moved is not authoritative for a range that includes the dir index and
dir item keys of the old dentry. This case is better explained with the
following example and reproducer:

  # The test requires a very specific layout of keys and items in the
  # fs/subvolume btree to trigger the bug. So we want to make sure that
  # on whatever platform we are, we have the same leaf/node size.
  #
  # Currently in btrfs the node/leaf size can not be smaller than the page
  # size (but it can be greater than the page size). So use the largest
  # supported node/leaf size (64K).

  $ mkfs.btrfs -f -n 65536 /dev/sdc
  $ mount /dev/sdc /mnt

  # "testdir" is inode 257.
  $ mkdir /mnt/testdir
  $ chmod 755 /mnt/testdir

  # Create several empty files to have the directory "testdir" with its
  # items spread over several leaves (7 in this case).
  $ for ((i = 1; i &lt;= 1200; i++)); do
       echo -n &gt; /mnt/testdir/file$i
    done

  # Create our test directory "dira", inode number 1458, which gets all
  # its items in leaf 7.
  #
  # The BTRFS_DIR_ITEM_KEY item for inode 257 ("testdir") that points to
  # the entry named "dira" is in leaf 2, while the BTRFS_DIR_INDEX_KEY
  # item that points to that entry is in leaf 3.
  #
  # For this particular filesystem node size (64K), file count and file
  # names, we endup with the directory entry items from inode 257 in
  # leaves 2 and 3, as previously mentioned - what matters for triggering
  # the bug exercised by this test case is that those items are not placed
  # in leaf 1, they must be placed in a leaf different from the one
  # containing the inode item for inode 257.
  #
  # The corresponding BTRFS_DIR_ITEM_KEY and BTRFS_DIR_INDEX_KEY items for
  # the parent inode (257) are the following:
  #
  #    item 460 key (257 DIR_ITEM 3724298081) itemoff 48344 itemsize 34
  #         location key (1458 INODE_ITEM 0) type DIR
  #         transid 6 data_len 0 name_len 4
  #         name: dira
  #
  # and:
  #
  #    item 771 key (257 DIR_INDEX 1202) itemoff 36673 itemsize 34
  #         location key (1458 INODE_ITEM 0) type DIR
  #         transid 6 data_len 0 name_len 4
  #         name: dira

  $ mkdir /mnt/testdir/dira

  # Make sure everything done so far is durably persisted.
  $ sync

  # Now do a change to inode 257 ("testdir") that does not result in
  # COWing leaves 2 and 3 - the leaves that contain the directory items
  # pointing to inode 1458 (directory "dira").
  #
  # Changing permissions, the owner/group, updating or adding a xattr,
  # etc, will not change (COW) leaves 2 and 3. So for the sake of
  # simplicity change the permissions of inode 257, which results in
  # updating its inode item and therefore change (COW) only leaf 1.

  $ chmod 700 /mnt/testdir

  # Now fsync directory inode 257.
  #
  # Since only the first leaf was changed/COWed, we log the inode item of
  # inode 257 and only the dentries found in the first leaf, all have a
  # key type of BTRFS_DIR_ITEM_KEY, and no keys of type
  # BTRFS_DIR_INDEX_KEY, because they sort after the former type and none
  # exist in the first leaf.
  #
  # We also log 3 items that represent ranges for dir items and dir
  # indexes for which the log is authoritative:
  #
  # 1) a key of type BTRFS_DIR_LOG_ITEM_KEY, which indicates the log is
  #    authoritative for all BTRFS_DIR_ITEM_KEY keys that have an offset
  #    in the range [0, 2285968570] (the offset here is th
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47072/">CVE-2021-47072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47072">CVE-2021-47072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220847">SUSE bug 1220847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47073" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47073" ref_url="https://www.suse.com/security/cve/CVE-2021-47073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios

init_dell_smbios_wmi() only registers the dell_smbios_wmi_driver on systems
where the Dell WMI interface is supported. While exit_dell_smbios_wmi()
unregisters it unconditionally, this leads to the following oops:

[  175.722921] ------------[ cut here ]------------
[  175.722925] Unexpected driver unregister!
[  175.722939] WARNING: CPU: 1 PID: 3630 at drivers/base/driver.c:194 driver_unregister+0x38/0x40
...
[  175.723089] Call Trace:
[  175.723094]  cleanup_module+0x5/0xedd [dell_smbios]
...
[  175.723148] ---[ end trace 064c34e1ad49509d ]---

Make the unregister happen on the same condition the register happens
to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47073/">CVE-2021-47073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47073">CVE-2021-47073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220850">SUSE bug 1220850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47074" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47074" ref_url="https://www.suse.com/security/cve/CVE-2021-47074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-loop: fix memory leak in nvme_loop_create_ctrl()

When creating loop ctrl in nvme_loop_create_ctrl(), if nvme_init_ctrl()
fails, the loop ctrl should be freed before jumping to the "out" label.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47074/">CVE-2021-47074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47074">CVE-2021-47074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220854">SUSE bug 1220854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47075" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47075" ref_url="https://www.suse.com/security/cve/CVE-2021-47075" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix memory leak in nvmet_alloc_ctrl()

When creating ctrl in nvmet_alloc_ctrl(), if the cntlid_min is larger
than cntlid_max of the subsystem, and jumps to the
"out_free_changed_ns_list" label, but the ctrl-&gt;sqs lack of be freed.
Fix this by jumping to the "out_free_sqs" label.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47075/">CVE-2021-47075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47075">CVE-2021-47075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220856">SUSE bug 1220856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47076" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47076" ref_url="https://www.suse.com/security/cve/CVE-2021-47076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Return CQE error if invalid lkey was supplied

RXE is missing update of WQE status in LOCAL_WRITE failures.  This caused
the following kernel panic if someone sent an atomic operation with an
explicitly wrong lkey.

[leonro@vm ~]$ mkt test
test_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...
 WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]
 Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core
 CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]
 Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff &lt;0f&gt; 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff
 RSP: 0018:ffff8880158af090 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652
 RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210
 RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b
 R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8
 R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c
 FS:  00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  rxe_do_task+0x130/0x230 [rdma_rxe]
  rxe_rcv+0xb11/0x1df0 [rdma_rxe]
  rxe_loopback+0x157/0x1e0 [rdma_rxe]
  rxe_responder+0x5532/0x7620 [rdma_rxe]
  rxe_do_task+0x130/0x230 [rdma_rxe]
  rxe_rcv+0x9c8/0x1df0 [rdma_rxe]
  rxe_loopback+0x157/0x1e0 [rdma_rxe]
  rxe_requester+0x1efd/0x58c0 [rdma_rxe]
  rxe_do_task+0x130/0x230 [rdma_rxe]
  rxe_post_send+0x998/0x1860 [rdma_rxe]
  ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]
  ib_uverbs_write+0x847/0xc80 [ib_uverbs]
  vfs_write+0x1c5/0x840
  ksys_write+0x176/0x1d0
  do_syscall_64+0x3f/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47076/">CVE-2021-47076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47076">CVE-2021-47076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220860">SUSE bug 1220860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47077" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47077" ref_url="https://www.suse.com/security/cve/CVE-2021-47077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Add pointer checks in qedf_update_link_speed()

The following trace was observed:

 [   14.042059] Call Trace:
 [   14.042061]  &lt;IRQ&gt;
 [   14.042068]  qedf_link_update+0x144/0x1f0 [qedf]
 [   14.042117]  qed_link_update+0x5c/0x80 [qed]
 [   14.042135]  qed_mcp_handle_link_change+0x2d2/0x410 [qed]
 [   14.042155]  ? qed_set_ptt+0x70/0x80 [qed]
 [   14.042170]  ? qed_set_ptt+0x70/0x80 [qed]
 [   14.042186]  ? qed_rd+0x13/0x40 [qed]
 [   14.042205]  qed_mcp_handle_events+0x437/0x690 [qed]
 [   14.042221]  ? qed_set_ptt+0x70/0x80 [qed]
 [   14.042239]  qed_int_sp_dpc+0x3a6/0x3e0 [qed]
 [   14.042245]  tasklet_action_common.isra.14+0x5a/0x100
 [   14.042250]  __do_softirq+0xe4/0x2f8
 [   14.042253]  irq_exit+0xf7/0x100
 [   14.042255]  do_IRQ+0x7f/0xd0
 [   14.042257]  common_interrupt+0xf/0xf
 [   14.042259]  &lt;/IRQ&gt;

API qedf_link_update() is getting called from QED but by that time
shost_data is not initialised. This results in a NULL pointer dereference
when we try to dereference shost_data while updating supported_speeds.

Add a NULL pointer check before dereferencing shost_data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47077/">CVE-2021-47077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47077">CVE-2021-47077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220861">SUSE bug 1220861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47078" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47078" ref_url="https://www.suse.com/security/cve/CVE-2021-47078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Clear all QP fields if creation failed

rxe_qp_do_cleanup() relies on valid pointer values in QP for the properly
created ones, but in case rxe_qp_from_init() failed it was filled with
garbage and caused tot the following error.

  refcount_t: underflow; use-after-free.
  WARNING: CPU: 1 PID: 12560 at lib/refcount.c:28 refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28
  Modules linked in:
  CPU: 1 PID: 12560 Comm: syz-executor.4 Not tainted 5.12.0-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:refcount_warn_saturate+0x1d1/0x1e0 lib/refcount.c:28
  Code: e9 db fe ff ff 48 89 df e8 2c c2 ea fd e9 8a fe ff ff e8 72 6a a7 fd 48 c7 c7 e0 b2 c1 89 c6 05 dc 3a e6 09 01 e8 ee 74 fb 04 &lt;0f&gt; 0b e9 af fe ff ff 0f 1f 84 00 00 00 00 00 41 56 41 55 41 54 55
  RSP: 0018:ffffc900097ceba8 EFLAGS: 00010286
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
  RDX: 0000000000040000 RSI: ffffffff815bb075 RDI: fffff520012f9d67
  RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000
  R10: ffffffff815b4eae R11: 0000000000000000 R12: ffff8880322a4800
  R13: ffff8880322a4940 R14: ffff888033044e00 R15: 0000000000000000
  FS:  00007f6eb2be3700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fdbe5d41000 CR3: 000000001d181000 CR4: 00000000001506e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   __refcount_sub_and_test include/linux/refcount.h:283 [inline]
   __refcount_dec_and_test include/linux/refcount.h:315 [inline]
   refcount_dec_and_test include/linux/refcount.h:333 [inline]
   kref_put include/linux/kref.h:64 [inline]
   rxe_qp_do_cleanup+0x96f/0xaf0 drivers/infiniband/sw/rxe/rxe_qp.c:805
   execute_in_process_context+0x37/0x150 kernel/workqueue.c:3327
   rxe_elem_release+0x9f/0x180 drivers/infiniband/sw/rxe/rxe_pool.c:391
   kref_put include/linux/kref.h:65 [inline]
   rxe_create_qp+0x2cd/0x310 drivers/infiniband/sw/rxe/rxe_verbs.c:425
   _ib_create_qp drivers/infiniband/core/core_priv.h:331 [inline]
   ib_create_named_qp+0x2ad/0x1370 drivers/infiniband/core/verbs.c:1231
   ib_create_qp include/rdma/ib_verbs.h:3644 [inline]
   create_mad_qp+0x177/0x2d0 drivers/infiniband/core/mad.c:2920
   ib_mad_port_open drivers/infiniband/core/mad.c:3001 [inline]
   ib_mad_init_device+0xd6f/0x1400 drivers/infiniband/core/mad.c:3092
   add_client_context+0x405/0x5e0 drivers/infiniband/core/device.c:717
   enable_device_and_get+0x1cd/0x3b0 drivers/infiniband/core/device.c:1331
   ib_register_device drivers/infiniband/core/device.c:1413 [inline]
   ib_register_device+0x7c7/0xa50 drivers/infiniband/core/device.c:1365
   rxe_register_device+0x3d5/0x4a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1147
   rxe_add+0x12fe/0x16d0 drivers/infiniband/sw/rxe/rxe.c:247
   rxe_net_add+0x8c/0xe0 drivers/infiniband/sw/rxe/rxe_net.c:503
   rxe_newlink drivers/infiniband/sw/rxe/rxe.c:269 [inline]
   rxe_newlink+0xb7/0xe0 drivers/infiniband/sw/rxe/rxe.c:250
   nldev_newlink+0x30e/0x550 drivers/infiniband/core/nldev.c:1555
   rdma_nl_rcv_msg+0x36d/0x690 drivers/infiniband/core/netlink.c:195
   rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]
   rdma_nl_rcv+0x2ee/0x430 drivers/infiniband/core/netlink.c:259
   netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]
   netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1338
   netlink_sendmsg+0x856/0xd90 net/netlink/af_netlink.c:1927
   sock_sendmsg_nosec net/socket.c:654 [inline]
   sock_sendmsg+0xcf/0x120 net/socket.c:674
   ____sys_sendmsg+0x6e8/0x810 net/socket.c:2350
   ___sys_sendmsg+0xf3/0x170 net/socket.c:2404
   __sys_sendmsg+0xe5/0x1b0 net/socket.c:2433
   do_syscall_64+0x3a/0xb0 arch/x86/entry/common.c:47
   entry_SYSCALL_64_after_hwframe+0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47078/">CVE-2021-47078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47078">CVE-2021-47078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220863">SUSE bug 1220863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47079" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47079" ref_url="https://www.suse.com/security/cve/CVE-2021-47079" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: ideapad-laptop: fix a NULL pointer dereference

The third parameter of dytc_cql_command should not be NULL since it will
be dereferenced immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47079/">CVE-2021-47079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47079">CVE-2021-47079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220841">SUSE bug 1220841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47080" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47080" ref_url="https://www.suse.com/security/cve/CVE-2021-47080" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Prevent divide-by-zero error triggered by the user

The user_entry_size is supplied by the user and later used as a
denominator to calculate number of entries. The zero supplied by the user
will trigger the following divide-by-zero error:

 divide error: 0000 [#1] SMP KASAN PTI
 CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510
 Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff &lt;49&gt; f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b
 RSP: 0018:ffff88810416f828 EFLAGS: 00010246
 RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d
 RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000
 RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f
 R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0
 FS:  00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0
  ib_uverbs_cmd_verbs+0x1546/0x1940
  ib_uverbs_ioctl+0x186/0x240
  __x64_sys_ioctl+0x38a/0x1220
  do_syscall_64+0x3f/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47080/">CVE-2021-47080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47080">CVE-2021-47080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220842">SUSE bug 1220842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47081" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47081" ref_url="https://www.suse.com/security/cve/CVE-2021-47081" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory

Our code analyzer reported a uaf.

In gaudi_memset_device_memory, cb is get via hl_cb_kernel_create()
with 2 refcount.
If hl_cs_allocate_job() failed, the execution runs into release_cb
branch. One ref of cb is dropped by hl_cb_put(cb) and could be freed
if other thread also drops one ref. Then cb is used by cb-&gt;id later,
which is a potential uaf.

My patch add a variable 'id' to accept the value of cb-&gt;id before the
hl_cb_put(cb) is called, to avoid the potential uaf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47081/">CVE-2021-47081 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47081">CVE-2021-47081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220844">SUSE bug 1220844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47082" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: avoid double free in tun_free_netdev

Avoid double free in tun_free_netdev() by moving the
dev-&gt;tstats and tun-&gt;security allocs to a new ndo_init routine
(tun_net_init()) that will be called by register_netdevice().
ndo_init is paired with the desctructor (tun_free_netdev()),
so if there's an error in register_netdevice() the destructor
will handle the frees.

BUG: KASAN: double-free or invalid-free in selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605

CPU: 0 PID: 25750 Comm: syz-executor416 Not tainted 5.16.0-rc2-syzk #1
Hardware name: Red Hat KVM, BIOS
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:247
kasan_report_invalid_free+0x55/0x80 mm/kasan/report.c:372
____kasan_slab_free mm/kasan/common.c:346 [inline]
__kasan_slab_free+0x107/0x120 mm/kasan/common.c:374
kasan_slab_free include/linux/kasan.h:235 [inline]
slab_free_hook mm/slub.c:1723 [inline]
slab_free_freelist_hook mm/slub.c:1749 [inline]
slab_free mm/slub.c:3513 [inline]
kfree+0xac/0x2d0 mm/slub.c:4561
selinux_tun_dev_free_security+0x1a/0x20 security/selinux/hooks.c:5605
security_tun_dev_free_security+0x4f/0x90 security/security.c:2342
tun_free_netdev+0xe6/0x150 drivers/net/tun.c:2215
netdev_run_todo+0x4df/0x840 net/core/dev.c:10627
rtnl_unlock+0x13/0x20 net/core/rtnetlink.c:112
__tun_chr_ioctl+0x80c/0x2870 drivers/net/tun.c:3302
tun_chr_ioctl+0x2f/0x40 drivers/net/tun.c:3311
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:874 [inline]
__se_sys_ioctl fs/ioctl.c:860 [inline]
__x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47083" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: mediatek: fix global-out-of-bounds issue

When eint virtual eint number is greater than gpio number,
it maybe produce 'desc[eint_n]' size globle-out-of-bounds issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47084" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47084" ref_url="https://www.suse.com/security/cve/CVE-2021-47084" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47084/">CVE-2021-47084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47084">CVE-2021-47084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220922">SUSE bug 1220922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47086" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47086" ref_url="https://www.suse.com/security/cve/CVE-2021-47086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phonet/pep: refuse to enable an unbound pipe

This ioctl() implicitly assumed that the socket was already bound to
a valid local socket name, i.e. Phonet object. If the socket was not
bound, two separate problems would occur:

1) We'd send an pipe enablement request with an invalid source object.
2) Later socket calls could BUG on the socket unexpectedly being
   connected yet not bound to a valid object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47086/">CVE-2021-47086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47086">CVE-2021-47086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220952">SUSE bug 1220952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47087" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: optee: Fix incorrect page free bug

Pointer to the allocated pages (struct page *page) has already
progressed towards the end of allocation. It is incorrect to perform
__free_pages(page, order) using this pointer as we would free any
arbitrary pages. Fix this by stop modifying the page pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47088" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47088" ref_url="https://www.suse.com/security/cve/CVE-2021-47088" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/dbgfs: protect targets destructions with kdamond_lock

DAMON debugfs interface iterates current monitoring targets in
'dbgfs_target_ids_read()' while holding the corresponding
'kdamond_lock'.  However, it also destructs the monitoring targets in
'dbgfs_before_terminate()' without holding the lock.  This can result in
a use_after_free bug.  This commit avoids the race by protecting the
destruction with the corresponding 'kdamond_lock'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47088/">CVE-2021-47088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47088">CVE-2021-47088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220956">SUSE bug 1220956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47089" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47089" ref_url="https://www.suse.com/security/cve/CVE-2021-47089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kfence: fix memory leak when cat kfence objects

Hulk robot reported a kmemleak problem:

    unreferenced object 0xffff93d1d8cc02e8 (size 248):
      comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
      hex dump (first 32 bytes):
        00 40 85 19 d4 93 ff ff 00 10 00 00 00 00 00 00  .@..............
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      backtrace:
         seq_open+0x2a/0x80
         full_proxy_open+0x167/0x1e0
         do_dentry_open+0x1e1/0x3a0
         path_openat+0x961/0xa20
         do_filp_open+0xae/0x120
         do_sys_openat2+0x216/0x2f0
         do_sys_open+0x57/0x80
         do_syscall_64+0x33/0x40
         entry_SYSCALL_64_after_hwframe+0x44/0xa9
    unreferenced object 0xffff93d419854000 (size 4096):
      comm "cat", pid 23327, jiffies 4624670141 (age 495992.217s)
      hex dump (first 32 bytes):
        6b 66 65 6e 63 65 2d 23 32 35 30 3a 20 30 78 30  kfence-#250: 0x0
        30 30 30 30 30 30 30 37 35 34 62 64 61 31 32 2d  0000000754bda12-
      backtrace:
         seq_read_iter+0x313/0x440
         seq_read+0x14b/0x1a0
         full_proxy_read+0x56/0x80
         vfs_read+0xa5/0x1b0
         ksys_read+0xa0/0xf0
         do_syscall_64+0x33/0x40
         entry_SYSCALL_64_after_hwframe+0x44/0xa9

I find that we can easily reproduce this problem with the following
commands:

	cat /sys/kernel/debug/kfence/objects
	echo scan &gt; /sys/kernel/debug/kmemleak
	cat /sys/kernel/debug/kmemleak

The leaked memory is allocated in the stack below:

    do_syscall_64
      do_sys_open
        do_dentry_open
          full_proxy_open
            seq_open            ---&gt; alloc seq_file
      vfs_read
        full_proxy_read
          seq_read
            seq_read_iter
              traverse          ---&gt; alloc seq_buf

And it should have been released in the following process:

    do_syscall_64
      syscall_exit_to_user_mode
        exit_to_user_mode_prepare
          task_work_run
            ____fput
              __fput
                full_proxy_release  ---&gt; free here

However, the release function corresponding to file_operations is not
implemented in kfence.  As a result, a memory leak occurs.  Therefore,
the solution to this problem is to implement the corresponding release
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47089/">CVE-2021-47089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47089">CVE-2021-47089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220958">SUSE bug 1220958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47090" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47090" ref_url="https://www.suse.com/security/cve/CVE-2021-47090" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()

Hulk Robot reported a panic in put_page_testzero() when testing
madvise() with MADV_SOFT_OFFLINE.  The BUG() is triggered when retrying
get_any_page().  This is because we keep MF_COUNT_INCREASED flag in
second try but the refcnt is not increased.

    page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0)
    ------------[ cut here ]------------
    kernel BUG at include/linux/mm.h:737!
    invalid opcode: 0000 [#1] PREEMPT SMP
    CPU: 5 PID: 2135 Comm: sshd Tainted: G    B             5.16.0-rc6-dirty #373
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
    RIP: release_pages+0x53f/0x840
    Call Trace:
      free_pages_and_swap_cache+0x64/0x80
      tlb_flush_mmu+0x6f/0x220
      unmap_page_range+0xe6c/0x12c0
      unmap_single_vma+0x90/0x170
      unmap_vmas+0xc4/0x180
      exit_mmap+0xde/0x3a0
      mmput+0xa3/0x250
      do_exit+0x564/0x1470
      do_group_exit+0x3b/0x100
      __do_sys_exit_group+0x13/0x20
      __x64_sys_exit_group+0x16/0x20
      do_syscall_64+0x34/0x80
      entry_SYSCALL_64_after_hwframe+0x44/0xae
    Modules linked in:
    ---[ end trace e99579b570fe0649 ]---
    RIP: 0010:release_pages+0x53f/0x840
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47090/">CVE-2021-47090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47090">CVE-2021-47090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220948">SUSE bug 1220948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47091" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix locking in ieee80211_start_ap error path

We need to hold the local-&gt;mtx to release the channel context,
as even encoded by the lockdep_assert_held() there. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47092" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47092" ref_url="https://www.suse.com/security/cve/CVE-2021-47092" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Always clear vmx-&gt;fail on emulation_required

Revert a relatively recent change that set vmx-&gt;fail if the vCPU is in L2
and emulation_required is true, as that behavior is completely bogus.
Setting vmx-&gt;fail and synthesizing a VM-Exit is contradictory and wrong:

  (a) it's impossible to have both a VM-Fail and VM-Exit
  (b) vmcs.EXIT_REASON is not modified on VM-Fail
  (c) emulation_required refers to guest state and guest state checks are
      always VM-Exits, not VM-Fails.

For KVM specifically, emulation_required is handled before nested exits
in __vmx_handle_exit(), thus setting vmx-&gt;fail has no immediate effect,
i.e. KVM calls into handle_invalid_guest_state() and vmx-&gt;fail is ignored.
Setting vmx-&gt;fail can ultimately result in a WARN in nested_vmx_vmexit()
firing when tearing down the VM as KVM never expects vmx-&gt;fail to be set
when L2 is active, KVM always reflects those errors into L1.

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 21158 at arch/x86/kvm/vmx/nested.c:4548
                                nested_vmx_vmexit+0x16bd/0x17e0
                                arch/x86/kvm/vmx/nested.c:4547
  Modules linked in:
  CPU: 0 PID: 21158 Comm: syz-executor.1 Not tainted 5.16.0-rc3-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:nested_vmx_vmexit+0x16bd/0x17e0 arch/x86/kvm/vmx/nested.c:4547
  Code: &lt;0f&gt; 0b e9 2e f8 ff ff e8 57 b3 5d 00 0f 0b e9 00 f1 ff ff 89 e9 80
  Call Trace:
   vmx_leave_nested arch/x86/kvm/vmx/nested.c:6220 [inline]
   nested_vmx_free_vcpu+0x83/0xc0 arch/x86/kvm/vmx/nested.c:330
   vmx_free_vcpu+0x11f/0x2a0 arch/x86/kvm/vmx/vmx.c:6799
   kvm_arch_vcpu_destroy+0x6b/0x240 arch/x86/kvm/x86.c:10989
   kvm_vcpu_destroy+0x29/0x90 arch/x86/kvm/../../../virt/kvm/kvm_main.c:441
   kvm_free_vcpus arch/x86/kvm/x86.c:11426 [inline]
   kvm_arch_destroy_vm+0x3ef/0x6b0 arch/x86/kvm/x86.c:11545
   kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:1189 [inline]
   kvm_put_kvm+0x751/0xe40 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1220
   kvm_vcpu_release+0x53/0x60 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3489
   __fput+0x3fc/0x870 fs/file_table.c:280
   task_work_run+0x146/0x1c0 kernel/task_work.c:164
   exit_task_work include/linux/task_work.h:32 [inline]
   do_exit+0x705/0x24f0 kernel/exit.c:832
   do_group_exit+0x168/0x2d0 kernel/exit.c:929
   get_signal+0x1740/0x2120 kernel/signal.c:2852
   arch_do_signal_or_restart+0x9c/0x730 arch/x86/kernel/signal.c:868
   handle_signal_work kernel/entry/common.c:148 [inline]
   exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
   exit_to_user_mode_prepare+0x191/0x220 kernel/entry/common.c:207
   __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
   syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300
   do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47092/">CVE-2021-47092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47092">CVE-2021-47092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220950">SUSE bug 1220950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47093" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel_pmc_core: fix memleak on registration failure

In case device registration fails during module initialisation, the
platform device structure needs to be freed using platform_device_put()
to properly free all resources (e.g. the device name).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47094" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Don't advance iterator after restart due to yielding

After dropping mmu_lock in the TDP MMU, restart the iterator during
tdp_iter_next() and do not advance the iterator.  Advancing the iterator
results in skipping the top-level SPTE and all its children, which is
fatal if any of the skipped SPTEs were not visited before yielding.

When zapping all SPTEs, i.e. when min_level == root_level, restarting the
iter and then invoking tdp_iter_next() is always fatal if the current gfn
has as a valid SPTE, as advancing the iterator results in try_step_side()
skipping the current gfn, which wasn't visited before yielding.

Sprinkle WARNs on iter-&gt;yielded being true in various helpers that are
often used in conjunction with yielding, and tag the helper with
__must_check to reduce the probabily of improper usage.

Failing to zap a top-level SPTE manifests in one of two ways.  If a valid
SPTE is skipped by both kvm_tdp_mmu_zap_all() and kvm_tdp_mmu_put_root(),
the shadow page will be leaked and KVM will WARN accordingly.

  WARNING: CPU: 1 PID: 3509 at arch/x86/kvm/mmu/tdp_mmu.c:46 [kvm]
  RIP: 0010:kvm_mmu_uninit_tdp_mmu+0x3e/0x50 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_destroy_vm+0x130/0x1b0 [kvm]
   kvm_destroy_vm+0x162/0x2a0 [kvm]
   kvm_vcpu_release+0x34/0x60 [kvm]
   __fput+0x82/0x240
   task_work_run+0x5c/0x90
   do_exit+0x364/0xa10
   ? futex_unqueue+0x38/0x60
   do_group_exit+0x33/0xa0
   get_signal+0x155/0x850
   arch_do_signal_or_restart+0xed/0x750
   exit_to_user_mode_prepare+0xc5/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x48/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae

If kvm_tdp_mmu_zap_all() skips a gfn/SPTE but that SPTE is then zapped by
kvm_tdp_mmu_put_root(), KVM triggers a use-after-free in the form of
marking a struct page as dirty/accessed after it has been put back on the
free list.  This directly triggers a WARN due to encountering a page with
page_count() == 0, but it can also lead to data corruption and additional
errors in the kernel.

  WARNING: CPU: 7 PID: 1995658 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:171
  RIP: 0010:kvm_is_zone_device_pfn.part.0+0x9e/0xd0 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_set_pfn_dirty+0x120/0x1d0 [kvm]
   __handle_changed_spte+0x92e/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   __handle_changed_spte+0x63c/0xca0 [kvm]
   zap_gfn_range+0x549/0x620 [kvm]
   kvm_tdp_mmu_put_root+0x1b6/0x270 [kvm]
   mmu_free_root_page+0x219/0x2c0 [kvm]
   kvm_mmu_free_roots+0x1b4/0x4e0 [kvm]
   kvm_mmu_unload+0x1c/0xa0 [kvm]
   kvm_arch_destroy_vm+0x1f2/0x5c0 [kvm]
   kvm_put_kvm+0x3b1/0x8b0 [kvm]
   kvm_vcpu_release+0x4e/0x70 [kvm]
   __fput+0x1f7/0x8c0
   task_work_run+0xf8/0x1a0
   do_exit+0x97b/0x2230
   do_group_exit+0xda/0x2a0
   get_signal+0x3be/0x1e50
   arch_do_signal_or_restart+0x244/0x17f0
   exit_to_user_mode_prepare+0xcb/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x4d/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Note, the underlying bug existed even before commit 1af4a96025b3 ("KVM:
x86/mmu: Yield in TDU MMU iter even if no SPTES changed") moved calls to
tdp_mmu_iter_cond_resched() to the beginning of loops, as KVM could still
incorrectly advance past a top-level entry when yielding on a lower-level
entry.  But with respect to leaking shadow pages, the bug was introduced
by yielding before processing the current gfn.

Alternatively, tdp_mmu_iter_cond_resched() could simply fall through, or
callers could jump to their "retry" label.  The downside of that approach
is that tdp_mmu_iter_cond_resched() _must_ be called before anything else
in the loop, and there's no easy way to enfornce that requirement.

Ideally, KVM would handling the cond_resched() fully within the iterator
macro (the code is actually quite clean) and avoid this entire class of
bugs, but that is extremely difficult do wh
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-05-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222401">SUSE bug 1222401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47095" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: ssif: initialize ssif_info-&gt;client early

During probe ssif_info-&gt;client is dereferenced in error path. However,
it is set when some of the error checking has already been done. This
causes following kernel crash if an error path is taken:

[   30.645593][  T674] ipmi_ssif 0-000e: ipmi_ssif: Not probing, Interface already present
[   30.657616][  T674] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000088
...
[   30.657723][  T674] pc : __dev_printk+0x28/0xa0
[   30.657732][  T674] lr : _dev_err+0x7c/0xa0
...
[   30.657772][  T674] Call trace:
[   30.657775][  T674]  __dev_printk+0x28/0xa0
[   30.657778][  T674]  _dev_err+0x7c/0xa0
[   30.657781][  T674]  ssif_probe+0x548/0x900 [ipmi_ssif 62ce4b08badc1458fd896206d9ef69a3c31f3d3e]
[   30.657791][  T674]  i2c_device_probe+0x37c/0x3c0
...

Initialize ssif_info-&gt;client before any error path can be taken. Clear
i2c_client data in the error path to prevent the dangling pointer from
leaking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47096" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: rawmidi - fix the uninitalized user_pversion

The user_pversion was uninitialized for the user space file structure
in the open function, because the file private structure use
kmalloc for the allocation.

The kernel ALSA sequencer code clears the file structure, so no additional
fixes are required.

BugLink: https://github.com/alsa-project/alsa-lib/issues/178
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47097" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: elantech - fix stack out of bound access in elantech_change_report_id()

The array param[] in elantech_change_report_id() must be at least 3
bytes, because elantech_read_reg_params() is calling ps2_command() with
PSMOUSE_CMD_GETINFO, that is going to access 3 bytes from param[], but
it's defined in the stack as an array of 2 bytes, therefore we have a
potential stack out-of-bounds access here, also confirmed by KASAN:

[    6.512374] BUG: KASAN: stack-out-of-bounds in __ps2_command+0x372/0x7e0
[    6.512397] Read of size 1 at addr ffff8881024d77c2 by task kworker/2:1/118

[    6.512416] CPU: 2 PID: 118 Comm: kworker/2:1 Not tainted 5.13.0-22-generic #22+arighi20211110
[    6.512428] Hardware name: LENOVO 20T8000QGE/20T8000QGE, BIOS R1AET32W (1.08 ) 08/14/2020
[    6.512436] Workqueue: events_long serio_handle_event
[    6.512453] Call Trace:
[    6.512462]  show_stack+0x52/0x58
[    6.512474]  dump_stack+0xa1/0xd3
[    6.512487]  print_address_description.constprop.0+0x1d/0x140
[    6.512502]  ? __ps2_command+0x372/0x7e0
[    6.512516]  __kasan_report.cold+0x7d/0x112
[    6.512527]  ? _raw_write_lock_irq+0x20/0xd0
[    6.512539]  ? __ps2_command+0x372/0x7e0
[    6.512552]  kasan_report+0x3c/0x50
[    6.512564]  __asan_load1+0x6a/0x70
[    6.512575]  __ps2_command+0x372/0x7e0
[    6.512589]  ? ps2_drain+0x240/0x240
[    6.512601]  ? dev_printk_emit+0xa2/0xd3
[    6.512612]  ? dev_vprintk_emit+0xc5/0xc5
[    6.512621]  ? __kasan_check_write+0x14/0x20
[    6.512634]  ? mutex_lock+0x8f/0xe0
[    6.512643]  ? __mutex_lock_slowpath+0x20/0x20
[    6.512655]  ps2_command+0x52/0x90
[    6.512670]  elantech_ps2_command+0x4f/0xc0 [psmouse]
[    6.512734]  elantech_change_report_id+0x1e6/0x256 [psmouse]
[    6.512799]  ? elantech_report_trackpoint.constprop.0.cold+0xd/0xd [psmouse]
[    6.512863]  ? ps2_command+0x7f/0x90
[    6.512877]  elantech_query_info.cold+0x6bd/0x9ed [psmouse]
[    6.512943]  ? elantech_setup_ps2+0x460/0x460 [psmouse]
[    6.513005]  ? psmouse_reset+0x69/0xb0 [psmouse]
[    6.513064]  ? psmouse_attr_set_helper+0x2a0/0x2a0 [psmouse]
[    6.513122]  ? phys_pmd_init+0x30e/0x521
[    6.513137]  elantech_init+0x8a/0x200 [psmouse]
[    6.513200]  ? elantech_init_ps2+0xf0/0xf0 [psmouse]
[    6.513249]  ? elantech_query_info+0x440/0x440 [psmouse]
[    6.513296]  ? synaptics_send_cmd+0x60/0x60 [psmouse]
[    6.513342]  ? elantech_query_info+0x440/0x440 [psmouse]
[    6.513388]  ? psmouse_try_protocol+0x11e/0x170 [psmouse]
[    6.513432]  psmouse_extensions+0x65d/0x6e0 [psmouse]
[    6.513476]  ? psmouse_try_protocol+0x170/0x170 [psmouse]
[    6.513519]  ? mutex_unlock+0x22/0x40
[    6.513526]  ? ps2_command+0x7f/0x90
[    6.513536]  ? psmouse_probe+0xa3/0xf0 [psmouse]
[    6.513580]  psmouse_switch_protocol+0x27d/0x2e0 [psmouse]
[    6.513624]  psmouse_connect+0x272/0x530 [psmouse]
[    6.513669]  serio_driver_probe+0x55/0x70
[    6.513679]  really_probe+0x190/0x720
[    6.513689]  driver_probe_device+0x160/0x1f0
[    6.513697]  device_driver_attach+0x119/0x130
[    6.513705]  ? device_driver_attach+0x130/0x130
[    6.513713]  __driver_attach+0xe7/0x1a0
[    6.513720]  ? device_driver_attach+0x130/0x130
[    6.513728]  bus_for_each_dev+0xfb/0x150
[    6.513738]  ? subsys_dev_iter_exit+0x10/0x10
[    6.513748]  ? _raw_write_unlock_bh+0x30/0x30
[    6.513757]  driver_attach+0x2d/0x40
[    6.513764]  serio_handle_event+0x199/0x3d0
[    6.513775]  process_one_work+0x471/0x740
[    6.513785]  worker_thread+0x2d2/0x790
[    6.513794]  ? process_one_work+0x740/0x740
[    6.513802]  kthread+0x1b4/0x1e0
[    6.513809]  ? set_kthread_struct+0x80/0x80
[    6.513816]  ret_from_fork+0x22/0x30

[    6.513832] The buggy address belongs to the page:
[    6.513838] page:00000000bc35e189 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024d7
[    6.513847] flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)
[    6.513860] raw: 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47098" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations

Commit b50aa49638c7 ("hwmon: (lm90) Prevent integer underflows of
temperature calculations") addressed a number of underflow situations
when writing temperature limits. However, it missed one situation, seen
when an attempt is made to set the hysteresis value to MAX_LONG and the
critical temperature limit is negative.

Use clamp_val() when setting the hysteresis temperature to ensure that
the provided value can never overflow or underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47099" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: ensure skb entering GRO are not cloned.

After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"),
if GRO is enabled on a veth device and TSO is disabled on the peer
device, TCP skbs will go through the NAPI callback. If there is no XDP
program attached, the veth code does not perform any share check, and
shared/cloned skbs could enter the GRO engine.

Ignat reported a BUG triggered later-on due to the above condition:

[   53.970529][    C1] kernel BUG at net/core/skbuff.c:3574!
[   53.981755][    C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
[   53.982634][    C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25
[   53.982634][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[   53.982634][    C1] RIP: 0010:skb_shift+0x13ef/0x23b0
[   53.982634][    C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0
7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f
85 74 f5 ff ff &lt;0f&gt; 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89
f7 4c 89 8c
[   53.982634][    C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246
[   53.982634][    C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000
[   53.982634][    C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2
[   53.982634][    C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0
[   53.982634][    C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590
[   53.982634][    C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0
[   53.982634][    C1] FS:  0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000
[   53.982634][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   53.982634][    C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0
[   53.982634][    C1] Call Trace:
[   53.982634][    C1]  &lt;TASK&gt;
[   53.982634][    C1]  tcp_sacktag_walk+0xaba/0x18e0
[   53.982634][    C1]  tcp_sacktag_write_queue+0xe7b/0x3460
[   53.982634][    C1]  tcp_ack+0x2666/0x54b0
[   53.982634][    C1]  tcp_rcv_established+0x4d9/0x20f0
[   53.982634][    C1]  tcp_v4_do_rcv+0x551/0x810
[   53.982634][    C1]  tcp_v4_rcv+0x22ed/0x2ed0
[   53.982634][    C1]  ip_protocol_deliver_rcu+0x96/0xaf0
[   53.982634][    C1]  ip_local_deliver_finish+0x1e0/0x2f0
[   53.982634][    C1]  ip_sublist_rcv_finish+0x211/0x440
[   53.982634][    C1]  ip_list_rcv_finish.constprop.0+0x424/0x660
[   53.982634][    C1]  ip_list_rcv+0x2c8/0x410
[   53.982634][    C1]  __netif_receive_skb_list_core+0x65c/0x910
[   53.982634][    C1]  netif_receive_skb_list_internal+0x5f9/0xcb0
[   53.982634][    C1]  napi_complete_done+0x188/0x6e0
[   53.982634][    C1]  gro_cell_poll+0x10c/0x1d0
[   53.982634][    C1]  __napi_poll+0xa1/0x530
[   53.982634][    C1]  net_rx_action+0x567/0x1270
[   53.982634][    C1]  __do_softirq+0x28a/0x9ba
[   53.982634][    C1]  run_ksoftirqd+0x32/0x60
[   53.982634][    C1]  smpboot_thread_fn+0x559/0x8c0
[   53.982634][    C1]  kthread+0x3b9/0x490
[   53.982634][    C1]  ret_from_fork+0x22/0x30
[   53.982634][    C1]  &lt;/TASK&gt;

Address the issue by skipping the GRO stage for shared or cloned skbs.
To reduce the chance of OoO, try to unclone the skbs before giving up.

v1 -&gt; v2:
 - use avoid skb_copy and fallback to netif_receive_skb  - Eric
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47100" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module

Hi,

When testing install and uninstall of ipmi_si.ko and ipmi_msghandler.ko,
the system crashed.

The log as follows:
[  141.087026] BUG: unable to handle kernel paging request at ffffffffc09b3a5a
[  141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0
[  141.087464] Oops: 0010 [#1] SMP NOPTI
[  141.087580] CPU: 67 PID: 668 Comm: kworker/67:1 Kdump: loaded Not tainted 4.18.0.x86_64 #47
[  141.088009] Workqueue: events 0xffffffffc09b3a40
[  141.088009] RIP: 0010:0xffffffffc09b3a5a
[  141.088009] Code: Bad RIP value.
[  141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246
[  141.088009] RAX: 0000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000
[  141.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[  141.088009] RBP: 0000000000000000 R08: ffff9abfffee3cb8 R09: 00000000000002e1
[  141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700
[  141.088009] R13: 0000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8
[  141.088009] FS:  0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000
[  141.088009] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0
[  141.088009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  141.088009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  141.088009] PKRU: 55555554
[  141.088009] Call Trace:
[  141.088009]  ? process_one_work+0x195/0x390
[  141.088009]  ? worker_thread+0x30/0x390
[  141.088009]  ? process_one_work+0x390/0x390
[  141.088009]  ? kthread+0x10d/0x130
[  141.088009]  ? kthread_flush_work_fn+0x10/0x10
[  141.088009]  ? ret_from_fork+0x35/0x40] BUG: unable to handle kernel paging request at ffffffffc0b28a5a
[  200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0
[  200.223464] Oops: 0010 [#1] SMP NOPTI
[  200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: loaded Not tainted 4.18.0.x86_64 #46
[  200.224008] Workqueue: events 0xffffffffc0b28a40
[  200.224008] RIP: 0010:0xffffffffc0b28a5a
[  200.224008] Code: Bad RIP value.
[  200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246
[  200.224008] RAX: 0000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000
[  200.224008] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
[  200.224008] RBP: 0000000000000000 R08: ffff9fe43fde3cb8 R09: 00000000000000d5
[  200.224008] R10: ffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700
[  200.224008] R13: 0000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8
[  200.224008] FS:  0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:0000000000000000
[  200.224008] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0
[  200.224008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  200.224008] PKRU: 55555554
[  200.224008] Call Trace:
[  200.224008]  ? process_one_work+0x195/0x390
[  200.224008]  ? worker_thread+0x30/0x390
[  200.224008]  ? process_one_work+0x390/0x390
[  200.224008]  ? kthread+0x10d/0x130
[  200.224008]  ? kthread_flush_work_fn+0x10/0x10
[  200.224008]  ? ret_from_fork+0x35/0x40
[  200.224008] kernel fault(0x1) notification starting on CPU 63
[  200.224008] kernel fault(0x1) notification finished on CPU 63
[  200.224008] CR2: ffffffffc0b28a5a
[  200.224008] ---[ end trace c82a412d93f57412 ]---

The reason is as follows:
T1: rmmod ipmi_si.
    -&gt;ipmi_unregister_smi()
        -&gt; ipmi_bmc_unregister()
            -&gt; __ipmi_bmc_unregister()
                -&gt; kref_put(&amp;bmc-&gt;usecount, cleanup_bmc_device);
                    -&gt; schedule_work(&amp;bmc-&gt;remove_work);

T2: rmmod ipmi_msghandl
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47101" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

asix: fix uninit-value in asix_mdio_read()

asix_read_cmd() may read less than sizeof(smsr) bytes and in this case
smsr will be uninitialized.

Fail log:
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
BUG: KMSAN: uninit-value in asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
BUG: KMSAN: uninit-value in asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline]
 asix_check_host_enable drivers/net/usb/asix_common.c:82 [inline] drivers/net/usb/asix_common.c:497
 asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47102" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix incorrect structure access

In line:
	upper = info-&gt;upper_dev;
We access upper_dev field, which is related only for particular events
(e.g. event == NETDEV_CHANGEUPPER). So, this line cause invalid memory
access for another events,
when ptr is not netdev_notifier_changeupper_info.

The KASAN logs are as follows:

[   30.123165] BUG: KASAN: stack-out-of-bounds in prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]
[   30.133336] Read of size 8 at addr ffff80000cf772b0 by task udevd/778
[   30.139866]
[   30.141398] CPU: 0 PID: 778 Comm: udevd Not tainted 5.16.0-rc3 #6
[   30.147588] Hardware name: DNI AmazonGo1 A7040 board (DT)
[   30.153056] Call trace:
[   30.155547]  dump_backtrace+0x0/0x2c0
[   30.159320]  show_stack+0x18/0x30
[   30.162729]  dump_stack_lvl+0x68/0x84
[   30.166491]  print_address_description.constprop.0+0x74/0x2b8
[   30.172346]  kasan_report+0x1e8/0x250
[   30.176102]  __asan_load8+0x98/0xe0
[   30.179682]  prestera_netdev_port_event.constprop.0+0x68/0x538 [prestera]
[   30.186847]  prestera_netdev_event_handler+0x1b4/0x1c0 [prestera]
[   30.193313]  raw_notifier_call_chain+0x74/0xa0
[   30.197860]  call_netdevice_notifiers_info+0x68/0xc0
[   30.202924]  register_netdevice+0x3cc/0x760
[   30.207190]  register_netdev+0x24/0x50
[   30.211015]  prestera_device_register+0x8a0/0xba0 [prestera]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: fully convert sk-&gt;sk_rx_dst to RCU rules

syzbot reported various issues around early demux,
one being included in this changelog [1]

sk-&gt;sk_rx_dst is using RCU protection without clearly
documenting it.

And following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv()
are not following standard RCU rules.

[a]    dst_release(dst);
[b]    sk-&gt;sk_rx_dst = NULL;

They look wrong because a delete operation of RCU protected
pointer is supposed to clear the pointer before
the call_rcu()/synchronize_rcu() guarding actual memory freeing.

In some cases indeed, dst could be freed before [b] is done.

We could cheat by clearing sk_rx_dst before calling
dst_release(), but this seems the right time to stick
to standard RCU annotations and debugging facilities.

[1]
BUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline]
BUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792
Read of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204

CPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
 dst_check include/net/dst.h:470 [inline]
 tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792
 ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340
 ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583
 ip_sublist_rcv net/ipv4/ip_input.c:609 [inline]
 ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644
 __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline]
 __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556
 __netif_receive_skb_list net/core/dev.c:5608 [inline]
 netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699
 gro_normal_list net/core/dev.c:5853 [inline]
 gro_normal_list net/core/dev.c:5849 [inline]
 napi_complete_done+0x1f1/0x880 net/core/dev.c:6590
 virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline]
 virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557
 __napi_poll+0xaf/0x440 net/core/dev.c:7023
 napi_poll net/core/dev.c:7090 [inline]
 net_rx_action+0x801/0xb40 net/core/dev.c:7177
 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558
 invoke_softirq kernel/softirq.c:432 [inline]
 __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
 common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240
 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629
RIP: 0033:0x7f5e972bfd57
Code: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e &lt;48&gt; 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73
RSP: 002b:00007fff8a413210 EFLAGS: 00000283
RAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45
RDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45
RBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9
R10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0
R13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019
 &lt;/TASK&gt;

Allocated by task 13:
 kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:46 [inline]
 set_alloc_info mm/kasan/common.c:434 [inline]
 __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467
 kasan_slab_alloc include/linux/kasan.h:259 [inline]
 slab_post_alloc_hook mm/slab.h:519 [inline]
 slab_alloc_node mm/slub.c:3234 [inline]
 slab_alloc mm/slub.c:3242 [inline]
 kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247
 dst_alloc+0x146/0x1f0 net/core/dst.c:92
 rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613
 ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221010">SUSE bug 1221010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47104" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()

The wrong goto label was used for the error case and missed cleanup of the
pkt allocation.

Addresses-Coverity-ID: 1493352 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47105" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: xsk: return xsk buffers back to pool when cleaning the ring

Currently we only NULL the xdp_buff pointer in the internal SW ring but
we never give it back to the xsk buffer pool. This means that buffers
can be leaked out of the buff pool and never be used again.

Add missing xsk_buff_free() call to the routine that is supposed to
clean the entries that are left in the ring so that these buffers in the
umem can be used by other sockets.

Also, only go through the space that is actually left to be cleaned
instead of a whole ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47106" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47106" ref_url="https://www.suse.com/security/cve/CVE-2021-47106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()

We need to use list_for_each_entry_safe() iterator
because we can not access @catchall after kfree_rcu() call.

syzbot reported:

BUG: KASAN: use-after-free in nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]
BUG: KASAN: use-after-free in nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]
BUG: KASAN: use-after-free in nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493
Read of size 8 at addr ffff8880716e5b80 by task syz-executor.3/8871

CPU: 1 PID: 8871 Comm: syz-executor.3 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x2ed mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
 nft_set_catchall_destroy net/netfilter/nf_tables_api.c:4486 [inline]
 nft_set_destroy net/netfilter/nf_tables_api.c:4504 [inline]
 nft_set_destroy+0x3fd/0x4f0 net/netfilter/nf_tables_api.c:4493
 __nft_release_table+0x79f/0xcd0 net/netfilter/nf_tables_api.c:9626
 nft_rcv_nl_event+0x4f8/0x670 net/netfilter/nf_tables_api.c:9688
 notifier_call_chain+0xb5/0x200 kernel/notifier.c:83
 blocking_notifier_call_chain kernel/notifier.c:318 [inline]
 blocking_notifier_call_chain+0x67/0x90 kernel/notifier.c:306
 netlink_release+0xcb6/0x1dd0 net/netlink/af_netlink.c:788
 __sock_release+0xcd/0x280 net/socket.c:649
 sock_close+0x18/0x20 net/socket.c:1314
 __fput+0x286/0x9f0 fs/file_table.c:280
 task_work_run+0xdd/0x1a0 kernel/task_work.c:164
 tracehook_notify_resume include/linux/tracehook.h:189 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:175 [inline]
 exit_to_user_mode_prepare+0x27e/0x290 kernel/entry/common.c:207
 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
 syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f75fbf28adb
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffd8da7ec10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007f75fbf28adb
RDX: 00007f75fc08e828 RSI: ffffffffffffffff RDI: 0000000000000003
RBP: 00007f75fc08a960 R08: 0000000000000000 R09: 00007f75fc08e830
R10: 00007ffd8da7ed10 R11: 0000000000000293 R12: 00000000002067c3
R13: 00007ffd8da7ed10 R14: 00007f75fc088f60 R15: 0000000000000032
 &lt;/TASK&gt;

Allocated by task 8886:
 kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:46 [inline]
 set_alloc_info mm/kasan/common.c:434 [inline]
 ____kasan_kmalloc mm/kasan/common.c:513 [inline]
 ____kasan_kmalloc mm/kasan/common.c:472 [inline]
 __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:522
 kasan_kmalloc include/linux/kasan.h:269 [inline]
 kmem_cache_alloc_trace+0x1ea/0x4a0 mm/slab.c:3575
 kmalloc include/linux/slab.h:590 [inline]
 nft_setelem_catchall_insert net/netfilter/nf_tables_api.c:5544 [inline]
 nft_setelem_insert net/netfilter/nf_tables_api.c:5562 [inline]
 nft_add_set_elem+0x232e/0x2f40 net/netfilter/nf_tables_api.c:5936
 nf_tables_newsetelem+0x6ff/0xbb0 net/netfilter/nf_tables_api.c:6032
 nfnetlink_rcv_batch+0x1710/0x25f0 net/netfilter/nfnetlink.c:513
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline]
 nfnetlink_rcv+0x3af/0x420 net/netfilter/nfnetlink.c:652
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47106/">CVE-2021-47106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47106">CVE-2021-47106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220962">SUSE bug 1220962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47107" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix READDIR buffer overflow

If a client sends a READDIR count argument that is too small (say,
zero), then the buffer size calculation in the new init_dirlist
helper functions results in an underflow, allowing the XDR stream
functions to write beyond the actual buffer.

This calculation has always been suspect. NFSD has never sanity-
checked the READDIR count argument, but the old entry encoders
managed the problem correctly.

With the commits below, entry encoding changed, exposing the
underflow to the pointer arithmetic in xdr_reserve_space().

Modern NFS clients attempt to retrieve as much data as possible
for each READDIR request. Also, we have no unit tests that
exercise the behavior of READDIR at the lower bound of @count
values. Thus this case was missed during testing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47108" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf

In commit 41ca9caaae0b
("drm/mediatek: hdmi: Add check for CEA modes only") a check
for CEA modes was added to function mtk_hdmi_bridge_mode_valid()
in order to address possible issues on MT8167;
moreover, with commit c91026a938c2
("drm/mediatek: hdmi: Add optional limit on maximal HDMI mode clock")
another similar check was introduced.

Unfortunately though, at the time of writing, MT8173 does not provide
any mtk_hdmi_conf structure and this is crashing the kernel with NULL
pointer upon entering mtk_hdmi_bridge_mode_valid(), which happens as
soon as a HDMI cable gets plugged in.

To fix this regression, add a NULL pointer check for hdmi-&gt;conf in the
said function, restoring HDMI functionality and avoiding NULL pointer
kernel panics.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47109" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47109" ref_url="https://www.suse.com/security/cve/CVE-2021-47109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

neighbour: allow NUD_NOARP entries to be forced GCed

IFF_POINTOPOINT interfaces use NUD_NOARP entries for IPv6. It's possible to
fill up the neighbour table with enough entries that it will overflow for
valid connections after that.

This behaviour is more prevalent after commit 58956317c8de ("neighbor:
Improve garbage collection") is applied, as it prevents removal from
entries that are not NUD_FAILED, unless they are more than 5s old.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47109/">CVE-2021-47109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47109">CVE-2021-47109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221534">SUSE bug 1221534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47110" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47110" ref_url="https://www.suse.com/security/cve/CVE-2021-47110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/kvm: Disable kvmclock on all CPUs on shutdown

Currenly, we disable kvmclock from machine_shutdown() hook and this
only happens for boot CPU. We need to disable it for all CPUs to
guard against memory corruption e.g. on restore from hibernate.

Note, writing '0' to kvmclock MSR doesn't clear memory location, it
just prevents hypervisor from updating the location so for the short
while after write and while CPU is still alive, the clock remains usable
and correct so we don't need to switch to some other clocksource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47110/">CVE-2021-47110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47110">CVE-2021-47110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221532">SUSE bug 1221532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47111" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47111" ref_url="https://www.suse.com/security/cve/CVE-2021-47111" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen-netback: take a reference to the RX task thread

Do this in order to prevent the task from being freed if the thread
returns (which can be triggered by the frontend) before the call to
kthread_stop done as part of the backend tear down. Not taking the
reference will lead to a use-after-free in that scenario. Such
reference was taken before but dropped as part of the rework done in
2ac061ce97f4.

Reintroduce the reference taking and add a comment this time
explaining why it's needed.

This is XSA-374 / CVE-2021-28691.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47111/">CVE-2021-47111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47111">CVE-2021-47111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221536">SUSE bug 1221536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47112" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47112" ref_url="https://www.suse.com/security/cve/CVE-2021-47112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/kvm: Teardown PV features on boot CPU as well

Various PV features (Async PF, PV EOI, steal time) work through memory
shared with hypervisor and when we restore from hibernation we must
properly teardown all these features to make sure hypervisor doesn't
write to stale locations after we jump to the previously hibernated kernel
(which can try to place anything there). For secondary CPUs the job is
already done by kvm_cpu_down_prepare(), register syscore ops to do
the same for boot CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47112/">CVE-2021-47112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47112">CVE-2021-47112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221541">SUSE bug 1221541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47113" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47113" ref_url="https://www.suse.com/security/cve/CVE-2021-47113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: abort in rename_exchange if we fail to insert the second ref

Error injection stress uncovered a problem where we'd leave a dangling
inode ref if we failed during a rename_exchange.  This happens because
we insert the inode ref for one side of the rename, and then for the
other side.  If this second inode ref insert fails we'll leave the first
one dangling and leave a corrupt file system behind.  Fix this by
aborting if we did the insert for the first inode ref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47113/">CVE-2021-47113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47113">CVE-2021-47113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221543">SUSE bug 1221543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47114" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47114" ref_url="https://www.suse.com/security/cve/CVE-2021-47114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix data corruption by fallocate

When fallocate punches holes out of inode size, if original isize is in
the middle of last cluster, then the part from isize to the end of the
cluster will be zeroed with buffer write, at that time isize is not yet
updated to match the new size, if writeback is kicked in, it will invoke
ocfs2_writepage()-&gt;block_write_full_page() where the pages out of inode
size will be dropped.  That will cause file corruption.  Fix this by
zero out eof blocks when extending the inode size.

Running the following command with qemu-image 4.2.1 can get a corrupted
coverted image file easily.

    qemu-img convert -p -t none -T none -f qcow2 $qcow_image \
             -O qcow2 -o compat=1.1 $qcow_image.conv

The usage of fallocate in qemu is like this, it first punches holes out
of inode size, then extend the inode size.

    fallocate(11, FALLOC_FL_KEEP_SIZE|FALLOC_FL_PUNCH_HOLE, 2276196352, 65536) = 0
    fallocate(11, 0, 2276196352, 65536) = 0

v1: https://www.spinics.net/lists/linux-fsdevel/msg193999.html
v2: https://lore.kernel.org/linux-fsdevel/20210525093034.GB4112@quack2.suse.cz/T/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47114/">CVE-2021-47114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47114">CVE-2021-47114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221548">SUSE bug 1221548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47116" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47116" ref_url="https://www.suse.com/security/cve/CVE-2021-47116" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix memory leak in ext4_mb_init_backend on error path.

Fix a memory leak discovered by syzbot when a file system is corrupted
with an illegally large s_log_groups_per_flex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47116/">CVE-2021-47116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47116">CVE-2021-47116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221574">SUSE bug 1221574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47117" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47117" ref_url="https://www.suse.com/security/cve/CVE-2021-47117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed

We got follow bug_on when run fsstress with injecting IO fault:
[130747.323114] kernel BUG at fs/ext4/extents_status.c:762!
[130747.323117] Internal error: Oops - BUG: 0 [#1] SMP
......
[130747.334329] Call trace:
[130747.334553]  ext4_es_cache_extent+0x150/0x168 [ext4]
[130747.334975]  ext4_cache_extents+0x64/0xe8 [ext4]
[130747.335368]  ext4_find_extent+0x300/0x330 [ext4]
[130747.335759]  ext4_ext_map_blocks+0x74/0x1178 [ext4]
[130747.336179]  ext4_map_blocks+0x2f4/0x5f0 [ext4]
[130747.336567]  ext4_mpage_readpages+0x4a8/0x7a8 [ext4]
[130747.336995]  ext4_readpage+0x54/0x100 [ext4]
[130747.337359]  generic_file_buffered_read+0x410/0xae8
[130747.337767]  generic_file_read_iter+0x114/0x190
[130747.338152]  ext4_file_read_iter+0x5c/0x140 [ext4]
[130747.338556]  __vfs_read+0x11c/0x188
[130747.338851]  vfs_read+0x94/0x150
[130747.339110]  ksys_read+0x74/0xf0

This patch's modification is according to Jan Kara's suggestion in:
https://patchwork.ozlabs.org/project/linux-ext4/patch/20210428085158.3728201-1-yebin10@huawei.com/
"I see. Now I understand your patch. Honestly, seeing how fragile is trying
to fix extent tree after split has failed in the middle, I would probably
go even further and make sure we fix the tree properly in case of ENOSPC
and EDQUOT (those are easily user triggerable).  Anything else indicates a
HW problem or fs corruption so I'd rather leave the extent tree as is and
don't try to fix it (which also means we will not create overlapping
extents)."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47117/">CVE-2021-47117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47117">CVE-2021-47117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221575">SUSE bug 1221575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47118" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47118" ref_url="https://www.suse.com/security/cve/CVE-2021-47118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pid: take a reference when initializing `cad_pid`

During boot, kernel_init_freeable() initializes `cad_pid` to the init
task's struct pid.  Later on, we may change `cad_pid` via a sysctl, and
when this happens proc_do_cad_pid() will increment the refcount on the
new pid via get_pid(), and will decrement the refcount on the old pid
via put_pid().  As we never called get_pid() when we initialized
`cad_pid`, we decrement a reference we never incremented, can therefore
free the init task's struct pid early.  As there can be dangling
references to the struct pid, we can later encounter a use-after-free
(e.g.  when delivering signals).

This was spotted when fuzzing v5.13-rc3 with Syzkaller, but seems to
have been around since the conversion of `cad_pid` to struct pid in
commit 9ec52099e4b8 ("[PATCH] replace cad_pid by a struct pid") from the
pre-KASAN stone age of v2.6.19.

Fix this by getting a reference to the init task's struct pid when we
assign it to `cad_pid`.

Full KASAN splat below.

   ==================================================================
   BUG: KASAN: use-after-free in ns_of_pid include/linux/pid.h:153 [inline]
   BUG: KASAN: use-after-free in task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509
   Read of size 4 at addr ffff23794dda0004 by task syz-executor.0/273

   CPU: 1 PID: 273 Comm: syz-executor.0 Not tainted 5.12.0-00001-g9aef892b2d15 #1
   Hardware name: linux,dummy-virt (DT)
   Call trace:
    ns_of_pid include/linux/pid.h:153 [inline]
    task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509
    do_notify_parent+0x308/0xe60 kernel/signal.c:1950
    exit_notify kernel/exit.c:682 [inline]
    do_exit+0x2334/0x2bd0 kernel/exit.c:845
    do_group_exit+0x108/0x2c8 kernel/exit.c:922
    get_signal+0x4e4/0x2a88 kernel/signal.c:2781
    do_signal arch/arm64/kernel/signal.c:882 [inline]
    do_notify_resume+0x300/0x970 arch/arm64/kernel/signal.c:936
    work_pending+0xc/0x2dc

   Allocated by task 0:
    slab_post_alloc_hook+0x50/0x5c0 mm/slab.h:516
    slab_alloc_node mm/slub.c:2907 [inline]
    slab_alloc mm/slub.c:2915 [inline]
    kmem_cache_alloc+0x1f4/0x4c0 mm/slub.c:2920
    alloc_pid+0xdc/0xc00 kernel/pid.c:180
    copy_process+0x2794/0x5e18 kernel/fork.c:2129
    kernel_clone+0x194/0x13c8 kernel/fork.c:2500
    kernel_thread+0xd4/0x110 kernel/fork.c:2552
    rest_init+0x44/0x4a0 init/main.c:687
    arch_call_rest_init+0x1c/0x28
    start_kernel+0x520/0x554 init/main.c:1064
    0x0

   Freed by task 270:
    slab_free_hook mm/slub.c:1562 [inline]
    slab_free_freelist_hook+0x98/0x260 mm/slub.c:1600
    slab_free mm/slub.c:3161 [inline]
    kmem_cache_free+0x224/0x8e0 mm/slub.c:3177
    put_pid.part.4+0xe0/0x1a8 kernel/pid.c:114
    put_pid+0x30/0x48 kernel/pid.c:109
    proc_do_cad_pid+0x190/0x1b0 kernel/sysctl.c:1401
    proc_sys_call_handler+0x338/0x4b0 fs/proc/proc_sysctl.c:591
    proc_sys_write+0x34/0x48 fs/proc/proc_sysctl.c:617
    call_write_iter include/linux/fs.h:1977 [inline]
    new_sync_write+0x3ac/0x510 fs/read_write.c:518
    vfs_write fs/read_write.c:605 [inline]
    vfs_write+0x9c4/0x1018 fs/read_write.c:585
    ksys_write+0x124/0x240 fs/read_write.c:658
    __do_sys_write fs/read_write.c:670 [inline]
    __se_sys_write fs/read_write.c:667 [inline]
    __arm64_sys_write+0x78/0xb0 fs/read_write.c:667
    __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]
    invoke_syscall arch/arm64/kernel/syscall.c:49 [inline]
    el0_svc_common.constprop.1+0x16c/0x388 arch/arm64/kernel/syscall.c:129
    do_el0_svc+0xf8/0x150 arch/arm64/kernel/syscall.c:168
    el0_svc+0x28/0x38 arch/arm64/kernel/entry-common.c:416
    el0_sync_handler+0x134/0x180 arch/arm64/kernel/entry-common.c:432
    el0_sync+0x154/0x180 arch/arm64/kernel/entry.S:701

   The buggy address belongs to the object at ffff23794dda0000
    which belongs to the cache pid of size 224
   The buggy address is located 4 bytes inside of
    224-byte region [ff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47118/">CVE-2021-47118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47118">CVE-2021-47118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221605">SUSE bug 1221605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47120" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47120" ref_url="https://www.suse.com/security/cve/CVE-2021-47120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: magicmouse: fix NULL-deref on disconnect

Commit 9d7b18668956 ("HID: magicmouse: add support for Apple Magic
Trackpad 2") added a sanity check for an Apple trackpad but returned
success instead of -ENODEV when the check failed. This means that the
remove callback will dereference the never-initialised driver data
pointer when the driver is later unbound (e.g. on USB disconnect).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47120/">CVE-2021-47120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47120">CVE-2021-47120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221606">SUSE bug 1221606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47121" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47121" ref_url="https://www.suse.com/security/cve/CVE-2021-47121" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: caif: fix memory leak in cfusbl_device_notify

In case of caif_enroll_dev() fail, allocated
link_support won't be assigned to the corresponding
structure. So simply free allocated pointer in case
of error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47121/">CVE-2021-47121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47121">CVE-2021-47121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221535">SUSE bug 1221535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47122" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47122" ref_url="https://www.suse.com/security/cve/CVE-2021-47122" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: caif: fix memory leak in caif_device_notify

In case of caif_enroll_dev() fail, allocated
link_support won't be assigned to the corresponding
structure. So simply free allocated pointer in case
of error
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47122/">CVE-2021-47122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47122">CVE-2021-47122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221537">SUSE bug 1221537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47123" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47123" ref_url="https://www.suse.com/security/cve/CVE-2021-47123" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix ltout double free on completion race

Always remove linked timeout on io_link_timeout_fn() from the master
request link list, otherwise we may get use-after-free when first
io_link_timeout_fn() puts linked timeout in the fail path, and then
will be found and put on master's free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47123/">CVE-2021-47123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47123">CVE-2021-47123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221547">SUSE bug 1221547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221758">SUSE bug 1221758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47124" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47124" ref_url="https://www.suse.com/security/cve/CVE-2021-47124" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix link timeout refs

WARNING: CPU: 0 PID: 10242 at lib/refcount.c:28 refcount_warn_saturate+0x15b/0x1a0 lib/refcount.c:28
RIP: 0010:refcount_warn_saturate+0x15b/0x1a0 lib/refcount.c:28
Call Trace:
 __refcount_sub_and_test include/linux/refcount.h:283 [inline]
 __refcount_dec_and_test include/linux/refcount.h:315 [inline]
 refcount_dec_and_test include/linux/refcount.h:333 [inline]
 io_put_req fs/io_uring.c:2140 [inline]
 io_queue_linked_timeout fs/io_uring.c:6300 [inline]
 __io_queue_sqe+0xbef/0xec0 fs/io_uring.c:6354
 io_submit_sqe fs/io_uring.c:6534 [inline]
 io_submit_sqes+0x2bbd/0x7c50 fs/io_uring.c:6660
 __do_sys_io_uring_enter fs/io_uring.c:9240 [inline]
 __se_sys_io_uring_enter+0x256/0x1d60 fs/io_uring.c:9182

io_link_timeout_fn() should put only one reference of the linked timeout
request, however in case of racing with the master request's completion
first io_req_complete() puts one and then io_put_req_deferred() is
called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47124/">CVE-2021-47124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47124">CVE-2021-47124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221549">SUSE bug 1221549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47125" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47125" ref_url="https://www.suse.com/security/cve/CVE-2021-47125" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_htb: fix refcount leak in htb_parent_to_leaf_offload

The commit ae81feb7338c ("sch_htb: fix null pointer dereference
on a null new_q") fixes a NULL pointer dereference bug, but it
is not correct.

Because htb_graft_helper properly handles the case when new_q
is NULL, and after the previous patch by skipping this call
which creates an inconsistency : dev_queue-&gt;qdisc will still
point to the old qdisc, but cl-&gt;parent-&gt;leaf.q will point to
the new one (which will be noop_qdisc, because new_q was NULL).
The code is based on an assumption that these two pointers are
the same, so it can lead to refcount leaks.

The correct fix is to add a NULL pointer check to protect
qdisc_refcount_inc inside htb_parent_to_leaf_offload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47125/">CVE-2021-47125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47125">CVE-2021-47125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221554">SUSE bug 1221554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47126" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47126" ref_url="https://www.suse.com/security/cve/CVE-2021-47126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions

Reported by syzbot:
HEAD commit:    90c911ad Merge tag 'fixes' of git://git.kernel.org/pub/scm..
git tree:       git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
dashboard link: https://syzkaller.appspot.com/bug?extid=123aa35098fd3c000eb7
compiler:       Debian clang version 11.0.1-2

==================================================================
BUG: KASAN: slab-out-of-bounds in fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]
BUG: KASAN: slab-out-of-bounds in fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732
Read of size 8 at addr ffff8880145c78f8 by task syz-executor.4/17760

CPU: 0 PID: 17760 Comm: syz-executor.4 Not tainted 5.12.0-rc8-syzkaller #0
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:79 [inline]
 dump_stack+0x202/0x31e lib/dump_stack.c:120
 print_address_description+0x5f/0x3b0 mm/kasan/report.c:232
 __kasan_report mm/kasan/report.c:399 [inline]
 kasan_report+0x15c/0x200 mm/kasan/report.c:416
 fib6_nh_get_excptn_bucket net/ipv6/route.c:1604 [inline]
 fib6_nh_flush_exceptions+0xbd/0x360 net/ipv6/route.c:1732
 fib6_nh_release+0x9a/0x430 net/ipv6/route.c:3536
 fib6_info_destroy_rcu+0xcb/0x1c0 net/ipv6/ip6_fib.c:174
 rcu_do_batch kernel/rcu/tree.c:2559 [inline]
 rcu_core+0x8f6/0x1450 kernel/rcu/tree.c:2794
 __do_softirq+0x372/0x7a6 kernel/softirq.c:345
 invoke_softirq kernel/softirq.c:221 [inline]
 __irq_exit_rcu+0x22c/0x260 kernel/softirq.c:422
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:434
 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1100
 &lt;/IRQ&gt;
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:632
RIP: 0010:lock_acquire+0x1f6/0x720 kernel/locking/lockdep.c:5515
Code: f6 84 24 a1 00 00 00 02 0f 85 8d 02 00 00 f7 c3 00 02 00 00 49 bd 00 00 00 00 00 fc ff df 74 01 fb 48 c7 44 24 40 0e 36 e0 45 &lt;4b&gt; c7 44 3d 00 00 00 00 00 4b c7 44 3d 09 00 00 00 00 43 c7 44 3d
RSP: 0018:ffffc90009e06560 EFLAGS: 00000206
RAX: 1ffff920013c0cc0 RBX: 0000000000000246 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90009e066e0 R08: dffffc0000000000 R09: fffffbfff1f992b1
R10: fffffbfff1f992b1 R11: 0000000000000000 R12: 0000000000000000
R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff920013c0cb4
 rcu_lock_acquire+0x2a/0x30 include/linux/rcupdate.h:267
 rcu_read_lock include/linux/rcupdate.h:656 [inline]
 ext4_get_group_info+0xea/0x340 fs/ext4/ext4.h:3231
 ext4_mb_prefetch+0x123/0x5d0 fs/ext4/mballoc.c:2212
 ext4_mb_regular_allocator+0x8a5/0x28f0 fs/ext4/mballoc.c:2379
 ext4_mb_new_blocks+0xc6e/0x24f0 fs/ext4/mballoc.c:4982
 ext4_ext_map_blocks+0x2be3/0x7210 fs/ext4/extents.c:4238
 ext4_map_blocks+0xab3/0x1cb0 fs/ext4/inode.c:638
 ext4_getblk+0x187/0x6c0 fs/ext4/inode.c:848
 ext4_bread+0x2a/0x1c0 fs/ext4/inode.c:900
 ext4_append+0x1a4/0x360 fs/ext4/namei.c:67
 ext4_init_new_dir+0x337/0xa10 fs/ext4/namei.c:2768
 ext4_mkdir+0x4b8/0xc00 fs/ext4/namei.c:2814
 vfs_mkdir+0x45b/0x640 fs/namei.c:3819
 ovl_do_mkdir fs/overlayfs/overlayfs.h:161 [inline]
 ovl_mkdir_real+0x53/0x1a0 fs/overlayfs/dir.c:146
 ovl_create_real+0x280/0x490 fs/overlayfs/dir.c:193
 ovl_workdir_create+0x425/0x600 fs/overlayfs/super.c:788
 ovl_make_workdir+0xed/0x1140 fs/overlayfs/super.c:1355
 ovl_get_workdir fs/overlayfs/super.c:1492 [inline]
 ovl_fill_super+0x39ee/0x5370 fs/overlayfs/super.c:2035
 mount_nodev+0x52/0xe0 fs/super.c:1413
 legacy_get_tree+0xea/0x180 fs/fs_context.c:592
 vfs_get_tree+0x86/0x270 fs/super.c:1497
 do_new_mount fs/namespace.c:2903 [inline]
 path_mount+0x196f/0x2be0 fs/namespace.c:3233
 do_mount fs/namespace.c:3246 [inline]
 __do_sys_mount fs/namespace.c:3454 [inline]
 __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3431
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47126/">CVE-2021-47126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47126">CVE-2021-47126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221539">SUSE bug 1221539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47127" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47127" ref_url="https://www.suse.com/security/cve/CVE-2021-47127" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: track AF_XDP ZC enabled queues in bitmap

Commit c7a219048e45 ("ice: Remove xsk_buff_pool from VSI structure")
silently introduced a regression and broke the Tx side of AF_XDP in copy
mode. xsk_pool on ice_ring is set only based on the existence of the XDP
prog on the VSI which in turn picks ice_clean_tx_irq_zc to be executed.
That is not something that should happen for copy mode as it should use
the regular data path ice_clean_tx_irq.

This results in a following splat when xdpsock is run in txonly or l2fwd
scenarios in copy mode:

&lt;snip&gt;
[  106.050195] BUG: kernel NULL pointer dereference, address: 0000000000000030
[  106.057269] #PF: supervisor read access in kernel mode
[  106.062493] #PF: error_code(0x0000) - not-present page
[  106.067709] PGD 0 P4D 0
[  106.070293] Oops: 0000 [#1] PREEMPT SMP NOPTI
[  106.074721] CPU: 61 PID: 0 Comm: swapper/61 Not tainted 5.12.0-rc2+ #45
[  106.081436] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[  106.092027] RIP: 0010:xp_raw_get_dma+0x36/0x50
[  106.096551] Code: 74 14 48 b8 ff ff ff ff ff ff 00 00 48 21 f0 48 c1 ee 30 48 01 c6 48 8b 87 90 00 00 00 48 89 f2 81 e6 ff 0f 00 00 48 c1 ea 0c &lt;48&gt; 8b 04 d0 48 83 e0 fe 48 01 f0 c3 66 66 2e 0f 1f 84 00 00 00 00
[  106.115588] RSP: 0018:ffffc9000d694e50 EFLAGS: 00010206
[  106.120893] RAX: 0000000000000000 RBX: ffff88984b8c8a00 RCX: ffff889852581800
[  106.128137] RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffff88984cd8b800
[  106.135383] RBP: ffff888123b50001 R08: ffff889896800000 R09: 0000000000000800
[  106.142628] R10: 0000000000000000 R11: ffffffff826060c0 R12: 00000000000000ff
[  106.149872] R13: 0000000000000000 R14: 0000000000000040 R15: ffff888123b50018
[  106.157117] FS:  0000000000000000(0000) GS:ffff8897e0f40000(0000) knlGS:0000000000000000
[  106.165332] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  106.171163] CR2: 0000000000000030 CR3: 000000000560a004 CR4: 00000000007706e0
[  106.178408] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  106.185653] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  106.192898] PKRU: 55555554
[  106.195653] Call Trace:
[  106.198143]  &lt;IRQ&gt;
[  106.200196]  ice_clean_tx_irq_zc+0x183/0x2a0 [ice]
[  106.205087]  ice_napi_poll+0x3e/0x590 [ice]
[  106.209356]  __napi_poll+0x2a/0x160
[  106.212911]  net_rx_action+0xd6/0x200
[  106.216634]  __do_softirq+0xbf/0x29b
[  106.220274]  irq_exit_rcu+0x88/0xc0
[  106.223819]  common_interrupt+0x7b/0xa0
[  106.227719]  &lt;/IRQ&gt;
[  106.229857]  asm_common_interrupt+0x1e/0x40
&lt;/snip&gt;

Fix this by introducing the bitmap of queues that are zero-copy enabled,
where each bit, corresponding to a queue id that xsk pool is being
configured on, will be set/cleared within ice_xsk_pool_{en,dis}able and
checked within ice_xsk_pool(). The latter is a function used for
deciding which napi poll routine is executed.
Idea is being taken from our other drivers such as i40e and ixgbe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47127/">CVE-2021-47127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47127">CVE-2021-47127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221558">SUSE bug 1221558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47128" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47128" ref_url="https://www.suse.com/security/cve/CVE-2021-47128" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks

Commit 59438b46471a ("security,lockdown,selinux: implement SELinux lockdown")
added an implementation of the locked_down LSM hook to SELinux, with the aim
to restrict which domains are allowed to perform operations that would breach
lockdown. This is indirectly also getting audit subsystem involved to report
events. The latter is problematic, as reported by Ondrej and Serhei, since it
can bring down the whole system via audit:

  1) The audit events that are triggered due to calls to security_locked_down()
     can OOM kill a machine, see below details [0].

  2) It also seems to be causing a deadlock via avc_has_perm()/slow_avc_audit()
     when trying to wake up kauditd, for example, when using trace_sched_switch()
     tracepoint, see details in [1]. Triggering this was not via some hypothetical
     corner case, but with existing tools like runqlat &amp; runqslower from bcc, for
     example, which make use of this tracepoint. Rough call sequence goes like:

     rq_lock(rq) -&gt; -------------------------+
       trace_sched_switch() -&gt;               |
         bpf_prog_xyz() -&gt;                   +-&gt; deadlock
           selinux_lockdown() -&gt;             |
             audit_log_end() -&gt;              |
               wake_up_interruptible() -&gt;    |
                 try_to_wake_up() -&gt;         |
                   rq_lock(rq) --------------+

What's worse is that the intention of 59438b46471a to further restrict lockdown
settings for specific applications in respect to the global lockdown policy is
completely broken for BPF. The SELinux policy rule for the current lockdown check
looks something like this:

  allow &lt;who&gt; &lt;who&gt; : lockdown { &lt;reason&gt; };

However, this doesn't match with the 'current' task where the security_locked_down()
is executed, example: httpd does a syscall. There is a tracing program attached
to the syscall which triggers a BPF program to run, which ends up doing a
bpf_probe_read_kernel{,_str}() helper call. The selinux_lockdown() hook does
the permission check against 'current', that is, httpd in this example. httpd
has literally zero relation to this tracing program, and it would be nonsensical
having to write an SELinux policy rule against httpd to let the tracing helper
pass. The policy in this case needs to be against the entity that is installing
the BPF program. For example, if bpftrace would generate a histogram of syscall
counts by user space application:

  bpftrace -e 'tracepoint:raw_syscalls:sys_enter { @[comm] = count(); }'

bpftrace would then go and generate a BPF program from this internally. One way
of doing it [for the sake of the example] could be to call bpf_get_current_task()
helper and then access current-&gt;comm via one of bpf_probe_read_kernel{,_str}()
helpers. So the program itself has nothing to do with httpd or any other random
app doing a syscall here. The BPF program _explicitly initiated_ the lockdown
check. The allow/deny policy belongs in the context of bpftrace: meaning, you
want to grant bpftrace access to use these helpers, but other tracers on the
system like my_random_tracer _not_.

Therefore fix all three issues at the same time by taking a completely different
approach for the security_locked_down() hook, that is, move the check into the
program verification phase where we actually retrieve the BPF func proto. This
also reliably gets the task (current) that is trying to install the BPF tracing
program, e.g. bpftrace/bcc/perf/systemtap/etc, and it also fixes the OOM since
we're moving this out of the BPF helper's fast-path which can be called several
millions of times per second.

The check is then also in line with other security_locked_down() hooks in the
system where the enforcement is performed at open/load time, for example,
open_kcore() for /proc/kcore access or module_sig_check() for module signatures
just to pick f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47128/">CVE-2021-47128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47128">CVE-2021-47128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221559">SUSE bug 1221559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47129" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47129" ref_url="https://www.suse.com/security/cve/CVE-2021-47129" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: skip expectations for confirmed conntrack

nft_ct_expect_obj_eval() calls nf_ct_ext_add() for a confirmed
conntrack entry. However, nf_ct_ext_add() can only be called for
!nf_ct_is_confirmed().

[ 1825.349056] WARNING: CPU: 0 PID: 1279 at net/netfilter/nf_conntrack_extend.c:48 nf_ct_xt_add+0x18e/0x1a0 [nf_conntrack]
[ 1825.351391] RIP: 0010:nf_ct_ext_add+0x18e/0x1a0 [nf_conntrack]
[ 1825.351493] Code: 41 5c 41 5d 41 5e 41 5f c3 41 bc 0a 00 00 00 e9 15 ff ff ff ba 09 00 00 00 31 f6 4c 89 ff e8 69 6c 3d e9 eb 96 45 31 ed eb cd &lt;0f&gt; 0b e9 b1 fe ff ff e8 86 79 14 e9 eb bf 0f 1f 40 00 0f 1f 44 00
[ 1825.351721] RSP: 0018:ffffc90002e1f1e8 EFLAGS: 00010202
[ 1825.351790] RAX: 000000000000000e RBX: ffff88814f5783c0 RCX: ffffffffc0e4f887
[ 1825.351881] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88814f578440
[ 1825.351971] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88814f578447
[ 1825.352060] R10: ffffed1029eaf088 R11: 0000000000000001 R12: ffff88814f578440
[ 1825.352150] R13: ffff8882053f3a00 R14: 0000000000000000 R15: 0000000000000a20
[ 1825.352240] FS:  00007f992261c900(0000) GS:ffff889faec00000(0000) knlGS:0000000000000000
[ 1825.352343] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1825.352417] CR2: 000056070a4d1158 CR3: 000000015efe0000 CR4: 0000000000350ee0
[ 1825.352508] Call Trace:
[ 1825.352544]  nf_ct_helper_ext_add+0x10/0x60 [nf_conntrack]
[ 1825.352641]  nft_ct_expect_obj_eval+0x1b8/0x1e0 [nft_ct]
[ 1825.352716]  nft_do_chain+0x232/0x850 [nf_tables]

Add the ct helper extension only for unconfirmed conntrack. Skip rule
evaluation if the ct helper extension does not exist. Thus, you can
only create expectations from the first packet.

It should be possible to remove this limitation by adding a new action
to attach a generic ct helper to the first packet. Then, use this ct
helper extension from follow up packets to create the ct expectation.

While at it, add a missing check to skip the template conntrack too
and remove check for IPCT_UNTRACK which is implicit to !ct.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47129/">CVE-2021-47129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47129">CVE-2021-47129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221569">SUSE bug 1221569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47130" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47130" ref_url="https://www.suse.com/security/cve/CVE-2021-47130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix freeing unallocated p2pmem

In case p2p device was found but the p2p pool is empty, the nvme target
is still trying to free the sgl from the p2p pool instead of the
regular sgl pool and causing a crash (BUG() is called). Instead, assign
the p2p_dev for the request only if it was allocated from p2p pool.

This is the crash that was caused:

[Sun May 30 19:13:53 2021] ------------[ cut here ]------------
[Sun May 30 19:13:53 2021] kernel BUG at lib/genalloc.c:518!
[Sun May 30 19:13:53 2021] invalid opcode: 0000 [#1] SMP PTI
...
[Sun May 30 19:13:53 2021] kernel BUG at lib/genalloc.c:518!
...
[Sun May 30 19:13:53 2021] RIP: 0010:gen_pool_free_owner+0xa8/0xb0
...
[Sun May 30 19:13:53 2021] Call Trace:
[Sun May 30 19:13:53 2021] ------------[ cut here ]------------
[Sun May 30 19:13:53 2021]  pci_free_p2pmem+0x2b/0x70
[Sun May 30 19:13:53 2021]  pci_p2pmem_free_sgl+0x4f/0x80
[Sun May 30 19:13:53 2021]  nvmet_req_free_sgls+0x1e/0x80 [nvmet]
[Sun May 30 19:13:53 2021] kernel BUG at lib/genalloc.c:518!
[Sun May 30 19:13:53 2021]  nvmet_rdma_release_rsp+0x4e/0x1f0 [nvmet_rdma]
[Sun May 30 19:13:53 2021]  nvmet_rdma_send_done+0x1c/0x60 [nvmet_rdma]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47130/">CVE-2021-47130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47130">CVE-2021-47130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221552">SUSE bug 1221552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47131" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47131" ref_url="https://www.suse.com/security/cve/CVE-2021-47131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tls: Fix use-after-free after the TLS device goes down and up

When a netdev with active TLS offload goes down, tls_device_down is
called to stop the offload and tear down the TLS context. However, the
socket stays alive, and it still points to the TLS context, which is now
deallocated. If a netdev goes up, while the connection is still active,
and the data flow resumes after a number of TCP retransmissions, it will
lead to a use-after-free of the TLS context.

This commit addresses this bug by keeping the context alive until its
normal destruction, and implements the necessary fallbacks, so that the
connection can resume in software (non-offloaded) kTLS mode.

On the TX side tls_sw_fallback is used to encrypt all packets. The RX
side already has all the necessary fallbacks, because receiving
non-decrypted packets is supported. The thing needed on the RX side is
to block resync requests, which are normally produced after receiving
non-decrypted packets.

The necessary synchronization is implemented for a graceful teardown:
first the fallbacks are deployed, then the driver resources are released
(it used to be possible to have a tls_dev_resync after tls_dev_del).

A new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback
mode. It's used to skip the RX resync logic completely, as it becomes
useless, and some objects may be released (for example, resync_async,
which is allocated and freed by the driver).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-06-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47131/">CVE-2021-47131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47131">CVE-2021-47131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221545">SUSE bug 1221545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222402">SUSE bug 1222402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47132" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47132" ref_url="https://www.suse.com/security/cve/CVE-2021-47132" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix sk_forward_memory corruption on retransmission

MPTCP sk_forward_memory handling is a bit special, as such field
is protected by the msk socket spin_lock, instead of the plain
socket lock.

Currently we have a code path updating such field without handling
the relevant lock:

__mptcp_retrans() -&gt; __mptcp_clean_una_wakeup()

Several helpers in __mptcp_clean_una_wakeup() will update
sk_forward_alloc, possibly causing such field corruption, as reported
by Matthieu.

Address the issue providing and using a new variant of blamed function
which explicitly acquires the msk spin lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47132/">CVE-2021-47132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47132">CVE-2021-47132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221550">SUSE bug 1221550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47133" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47133" ref_url="https://www.suse.com/security/cve/CVE-2021-47133" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Fix memory leak in amd_sfh_work

Kmemleak tool detected a memory leak in the amd_sfh driver.

====================
unreferenced object 0xffff88810228ada0 (size 32):
  comm "insmod", pid 3968, jiffies 4295056001 (age 775.792s)
  hex dump (first 32 bytes):
    00 20 73 1f 81 88 ff ff 00 01 00 00 00 00 ad de  . s.............
    22 01 00 00 00 00 ad de 01 00 02 00 00 00 00 00  "...............
  backtrace:
    [&lt;000000007b4c8799&gt;] kmem_cache_alloc_trace+0x163/0x4f0
    [&lt;0000000005326893&gt;] amd_sfh_get_report+0xa4/0x1d0 [amd_sfh]
    [&lt;000000002a9e5ec4&gt;] amdtp_hid_request+0x62/0x80 [amd_sfh]
    [&lt;00000000b8a95807&gt;] sensor_hub_get_feature+0x145/0x270 [hid_sensor_hub]
    [&lt;00000000fda054ee&gt;] hid_sensor_parse_common_attributes+0x215/0x460 [hid_sensor_iio_common]
    [&lt;0000000021279ecf&gt;] hid_accel_3d_probe+0xff/0x4a0 [hid_sensor_accel_3d]
    [&lt;00000000915760ce&gt;] platform_probe+0x6a/0xd0
    [&lt;0000000060258a1f&gt;] really_probe+0x192/0x620
    [&lt;00000000fa812f2d&gt;] driver_probe_device+0x14a/0x1d0
    [&lt;000000005e79f7fd&gt;] __device_attach_driver+0xbd/0x110
    [&lt;0000000070d15018&gt;] bus_for_each_drv+0xfd/0x160
    [&lt;0000000013a3c312&gt;] __device_attach+0x18b/0x220
    [&lt;000000008c7b4afc&gt;] device_initial_probe+0x13/0x20
    [&lt;00000000e6e99665&gt;] bus_probe_device+0xfe/0x120
    [&lt;00000000833fa90b&gt;] device_add+0x6a6/0xe00
    [&lt;00000000fa901078&gt;] platform_device_add+0x180/0x380
====================

The fix is to freeing request_list entry once the processed entry is
removed from the request_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47133/">CVE-2021-47133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47133">CVE-2021-47133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221542">SUSE bug 1221542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47134" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47134" ref_url="https://www.suse.com/security/cve/CVE-2021-47134" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/fdt: fix panic when no valid fdt found

setup_arch() would invoke efi_init()-&gt;efi_get_fdt_params(). If no
valid fdt found then initial_boot_params will be null. So we
should stop further fdt processing here. I encountered this
issue on risc-v.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47134/">CVE-2021-47134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47134">CVE-2021-47134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221540">SUSE bug 1221540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47135" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47135" ref_url="https://www.suse.com/security/cve/CVE-2021-47135" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report

Fix possible array out of bound access in mt7921_mcu_tx_rate_report.
Remove unnecessary varibable in mt7921_mcu_tx_rate_report
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47135/">CVE-2021-47135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47135">CVE-2021-47135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221560">SUSE bug 1221560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47136" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47136" ref_url="https://www.suse.com/security/cve/CVE-2021-47136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: zero-initialize tc skb extension on allocation

Function skb_ext_add() doesn't initialize created skb extension with any
value and leaves it up to the user. However, since extension of type
TC_SKB_EXT originally contained only single value tc_skb_ext-&gt;chain its
users used to just assign the chain value without setting whole extension
memory to zero first. This assumption changed when TC_SKB_EXT extension was
extended with additional fields but not all users were updated to
initialize the new fields which leads to use of uninitialized memory
afterwards. UBSAN log:

[  778.299821] UBSAN: invalid-load in net/openvswitch/flow.c:899:28
[  778.301495] load of value 107 is not a valid value for type '_Bool'
[  778.303215] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.12.0-rc7+ #2
[  778.304933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  778.307901] Call Trace:
[  778.308680]  &lt;IRQ&gt;
[  778.309358]  dump_stack+0xbb/0x107
[  778.310307]  ubsan_epilogue+0x5/0x40
[  778.311167]  __ubsan_handle_load_invalid_value.cold+0x43/0x48
[  778.312454]  ? memset+0x20/0x40
[  778.313230]  ovs_flow_key_extract.cold+0xf/0x14 [openvswitch]
[  778.314532]  ovs_vport_receive+0x19e/0x2e0 [openvswitch]
[  778.315749]  ? ovs_vport_find_upcall_portid+0x330/0x330 [openvswitch]
[  778.317188]  ? create_prof_cpu_mask+0x20/0x20
[  778.318220]  ? arch_stack_walk+0x82/0xf0
[  778.319153]  ? secondary_startup_64_no_verify+0xb0/0xbb
[  778.320399]  ? stack_trace_save+0x91/0xc0
[  778.321362]  ? stack_trace_consume_entry+0x160/0x160
[  778.322517]  ? lock_release+0x52e/0x760
[  778.323444]  netdev_frame_hook+0x323/0x610 [openvswitch]
[  778.324668]  ? ovs_netdev_get_vport+0xe0/0xe0 [openvswitch]
[  778.325950]  __netif_receive_skb_core+0x771/0x2db0
[  778.327067]  ? lock_downgrade+0x6e0/0x6f0
[  778.328021]  ? lock_acquire+0x565/0x720
[  778.328940]  ? generic_xdp_tx+0x4f0/0x4f0
[  778.329902]  ? inet_gro_receive+0x2a7/0x10a0
[  778.330914]  ? lock_downgrade+0x6f0/0x6f0
[  778.331867]  ? udp4_gro_receive+0x4c4/0x13e0
[  778.332876]  ? lock_release+0x52e/0x760
[  778.333808]  ? dev_gro_receive+0xcc8/0x2380
[  778.334810]  ? lock_downgrade+0x6f0/0x6f0
[  778.335769]  __netif_receive_skb_list_core+0x295/0x820
[  778.336955]  ? process_backlog+0x780/0x780
[  778.337941]  ? mlx5e_rep_tc_netdevice_event_unregister+0x20/0x20 [mlx5_core]
[  778.339613]  ? seqcount_lockdep_reader_access.constprop.0+0xa7/0xc0
[  778.341033]  ? kvm_clock_get_cycles+0x14/0x20
[  778.342072]  netif_receive_skb_list_internal+0x5f5/0xcb0
[  778.343288]  ? __kasan_kmalloc+0x7a/0x90
[  778.344234]  ? mlx5e_handle_rx_cqe_mpwrq+0x9e0/0x9e0 [mlx5_core]
[  778.345676]  ? mlx5e_xmit_xdp_frame_mpwqe+0x14d0/0x14d0 [mlx5_core]
[  778.347140]  ? __netif_receive_skb_list_core+0x820/0x820
[  778.348351]  ? mlx5e_post_rx_mpwqes+0xa6/0x25d0 [mlx5_core]
[  778.349688]  ? napi_gro_flush+0x26c/0x3c0
[  778.350641]  napi_complete_done+0x188/0x6b0
[  778.351627]  mlx5e_napi_poll+0x373/0x1b80 [mlx5_core]
[  778.352853]  __napi_poll+0x9f/0x510
[  778.353704]  ? mlx5_flow_namespace_set_mode+0x260/0x260 [mlx5_core]
[  778.355158]  net_rx_action+0x34c/0xa40
[  778.356060]  ? napi_threaded_poll+0x3d0/0x3d0
[  778.357083]  ? sched_clock_cpu+0x18/0x190
[  778.358041]  ? __common_interrupt+0x8e/0x1a0
[  778.359045]  __do_softirq+0x1ce/0x984
[  778.359938]  __irq_exit_rcu+0x137/0x1d0
[  778.360865]  irq_exit_rcu+0xa/0x20
[  778.361708]  common_interrupt+0x80/0xa0
[  778.362640]  &lt;/IRQ&gt;
[  778.363212]  asm_common_interrupt+0x1e/0x40
[  778.364204] RIP: 0010:native_safe_halt+0xe/0x10
[  778.365273] Code: 4f ff ff ff 4c 89 e7 e8 50 3f 40 fe e9 dc fe ff ff 48 89 df e8 43 3f 40 fe eb 90 cc e9 07 00 00 00 0f 00 2d 74 05 62 00 fb f4 &lt;c3&gt; 90 e9 07 00 00 00 0f 00 2d 64 05 62 00 f4 c3 cc cc 0f 1f 44 00
[  778.369355] RSP: 0018:ffffffff84407e48 EFLAGS: 00000246
[  778.370570] RAX
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47136/">CVE-2021-47136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47136">CVE-2021-47136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221931">SUSE bug 1221931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47137" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47137" ref_url="https://www.suse.com/security/cve/CVE-2021-47137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: lantiq: fix memory corruption in RX ring

In a situation where memory allocation or dma mapping fails, an
invalid address is programmed into the descriptor. This can lead
to memory corruption. If the memory allocation fails, DMA should
reuse the previous skb and mapping and drop the packet. This patch
also increments rx drop counter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47137/">CVE-2021-47137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47137">CVE-2021-47137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221932">SUSE bug 1221932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47138" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47138" ref_url="https://www.suse.com/security/cve/CVE-2021-47138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxgb4: avoid accessing registers when clearing filters

Hardware register having the server TID base can contain
invalid values when adapter is in bad state (for example,
due to AER fatal error). Reading these invalid values in the
register can lead to out-of-bound memory access. So, fix
by using the saved server TID base when clearing filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47138/">CVE-2021-47138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47138">CVE-2021-47138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221934">SUSE bug 1221934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47139" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47139" ref_url="https://www.suse.com/security/cve/CVE-2021-47139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: put off calling register_netdev() until client initialize complete

Currently, the netdevice is registered before client initializing
complete. So there is a timewindow between netdevice available
and usable. In this case, if user try to change the channel number
or ring param, it may cause the hns3_set_rx_cpu_rmap() being called
twice, and report bug.

[47199.416502] hns3 0000:35:00.0 eth1: set channels: tqp_num=1, rxfh=0
[47199.430340] hns3 0000:35:00.0 eth1: already uninitialized
[47199.438554] hns3 0000:35:00.0: rss changes from 4 to 1
[47199.511854] hns3 0000:35:00.0: Channels changed, rss_size from 4 to 1, tqps from 4 to 1
[47200.163524] ------------[ cut here ]------------
[47200.171674] kernel BUG at lib/cpu_rmap.c:142!
[47200.177847] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[47200.185259] Modules linked in: hclge(+) hns3(-) hns3_cae(O) hns_roce_hw_v2 hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O) [last unloaded: hclge]
[47200.205912] CPU: 1 PID: 8260 Comm: ethtool Tainted: G           O      5.11.0-rc3+ #1
[47200.215601] Hardware name:  , xxxxxx 02/04/2021
[47200.223052] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)
[47200.230188] pc : cpu_rmap_add+0x38/0x40
[47200.237472] lr : irq_cpu_rmap_add+0x84/0x140
[47200.243291] sp : ffff800010e93a30
[47200.247295] x29: ffff800010e93a30 x28: ffff082100584880
[47200.254155] x27: 0000000000000000 x26: 0000000000000000
[47200.260712] x25: 0000000000000000 x24: 0000000000000004
[47200.267241] x23: ffff08209ba03000 x22: ffff08209ba038c0
[47200.273789] x21: 000000000000003f x20: ffff0820e2bc1680
[47200.280400] x19: ffff0820c970ec80 x18: 00000000000000c0
[47200.286944] x17: 0000000000000000 x16: ffffb43debe4a0d0
[47200.293456] x15: fffffc2082990600 x14: dead000000000122
[47200.300059] x13: ffffffffffffffff x12: 000000000000003e
[47200.306606] x11: ffff0820815b8080 x10: ffff53e411988000
[47200.313171] x9 : 0000000000000000 x8 : ffff0820e2bc1700
[47200.319682] x7 : 0000000000000000 x6 : 000000000000003f
[47200.326170] x5 : 0000000000000040 x4 : ffff800010e93a20
[47200.332656] x3 : 0000000000000004 x2 : ffff0820c970ec80
[47200.339168] x1 : ffff0820e2bc1680 x0 : 0000000000000004
[47200.346058] Call trace:
[47200.349324]  cpu_rmap_add+0x38/0x40
[47200.354300]  hns3_set_rx_cpu_rmap+0x6c/0xe0 [hns3]
[47200.362294]  hns3_reset_notify_init_enet+0x1cc/0x340 [hns3]
[47200.370049]  hns3_change_channels+0x40/0xb0 [hns3]
[47200.376770]  hns3_set_channels+0x12c/0x2a0 [hns3]
[47200.383353]  ethtool_set_channels+0x140/0x250
[47200.389772]  dev_ethtool+0x714/0x23d0
[47200.394440]  dev_ioctl+0x4cc/0x640
[47200.399277]  sock_do_ioctl+0x100/0x2a0
[47200.404574]  sock_ioctl+0x28c/0x470
[47200.409079]  __arm64_sys_ioctl+0xb4/0x100
[47200.415217]  el0_svc_common.constprop.0+0x84/0x210
[47200.422088]  do_el0_svc+0x28/0x34
[47200.426387]  el0_svc+0x28/0x70
[47200.431308]  el0_sync_handler+0x1a4/0x1b0
[47200.436477]  el0_sync+0x174/0x180
[47200.441562] Code: 11000405 79000c45 f8247861 d65f03c0 (d4210000)
[47200.448869] ---[ end trace a01efe4ce42e5f34 ]---

The process is like below:
excuting hns3_client_init
|
register_netdev()
|                           hns3_set_channels()
|                           |
hns3_set_rx_cpu_rmap()      hns3_reset_notify_uninit_enet()
|                               |
|                            quit without calling function
|                            hns3_free_rx_cpu_rmap for flag
|                            HNS3_NIC_STATE_INITED is unset.
|                           |
|                           hns3_reset_notify_init_enet()
|                               |
set HNS3_NIC_STATE_INITED    call hns3_set_rx_cpu_rmap()-- crash

Fix it by calling register_netdev() at the end of function
hns3_client_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47139/">CVE-2021-47139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47139">CVE-2021-47139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221935">SUSE bug 1221935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47140" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47140" ref_url="https://www.suse.com/security/cve/CVE-2021-47140" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Clear DMA ops when switching domain

Since commit 08a27c1c3ecf ("iommu: Add support to change default domain
of an iommu group") a user can switch a device between IOMMU and direct
DMA through sysfs. This doesn't work for AMD IOMMU at the moment because
dev-&gt;dma_ops is not cleared when switching from a DMA to an identity
IOMMU domain. The DMA layer thus attempts to use the dma-iommu ops on an
identity domain, causing an oops:

  # echo 0000:00:05.0 &gt; /sys/sys/bus/pci/drivers/e1000e/unbind
  # echo identity &gt; /sys/bus/pci/devices/0000:00:05.0/iommu_group/type
  # echo 0000:00:05.0 &gt; /sys/sys/bus/pci/drivers/e1000e/bind
   ...
  BUG: kernel NULL pointer dereference, address: 0000000000000028
   ...
   Call Trace:
    iommu_dma_alloc
    e1000e_setup_tx_resources
    e1000e_open

Since iommu_change_dev_def_domain() calls probe_finalize() again, clear
the dma_ops there like Vt-d does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47140/">CVE-2021-47140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47140">CVE-2021-47140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221930">SUSE bug 1221930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47142" ref_url="https://www.suse.com/security/cve/CVE-2021-47142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a use-after-free

looks like we forget to set ttm-&gt;sg to NULL.
Hit panic below

[ 1235.844104] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b7b4b: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI
[ 1235.989074] Call Trace:
[ 1235.991751]  sg_free_table+0x17/0x20
[ 1235.995667]  amdgpu_ttm_backend_unbind.cold+0x4d/0xf7 [amdgpu]
[ 1236.002288]  amdgpu_ttm_backend_destroy+0x29/0x130 [amdgpu]
[ 1236.008464]  ttm_tt_destroy+0x1e/0x30 [ttm]
[ 1236.013066]  ttm_bo_cleanup_memtype_use+0x51/0xa0 [ttm]
[ 1236.018783]  ttm_bo_release+0x262/0xa50 [ttm]
[ 1236.023547]  ttm_bo_put+0x82/0xd0 [ttm]
[ 1236.027766]  amdgpu_bo_unref+0x26/0x50 [amdgpu]
[ 1236.032809]  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x7aa/0xd90 [amdgpu]
[ 1236.040400]  kfd_ioctl_alloc_memory_of_gpu+0xe2/0x330 [amdgpu]
[ 1236.046912]  kfd_ioctl+0x463/0x690 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47142/">CVE-2021-47142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47142">CVE-2021-47142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221952">SUSE bug 1221952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47143" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47143" ref_url="https://www.suse.com/security/cve/CVE-2021-47143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: remove device from smcd_dev_list after failed device_add()

If the device_add() for a smcd_dev fails, there's no cleanup step that
rolls back the earlier list_add(). The device subsequently gets freed,
and we end up with a corrupted list.

Add some error handling that removes the device from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47143/">CVE-2021-47143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47143">CVE-2021-47143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221988">SUSE bug 1221988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47144" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47144" ref_url="https://www.suse.com/security/cve/CVE-2021-47144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: fix refcount leak

[Why]
the gem object rfb-&gt;base.obj[0] is get according to num_planes
in amdgpufb_create, but is not put according to num_planes

[How]
put rfb-&gt;base.obj[0] in amdgpu_fbdev_destroy according to num_planes
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47144/">CVE-2021-47144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47144">CVE-2021-47144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221989">SUSE bug 1221989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47145" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47145" ref_url="https://www.suse.com/security/cve/CVE-2021-47145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not BUG_ON in link_to_fixup_dir

While doing error injection testing I got the following panic

  kernel BUG at fs/btrfs/tree-log.c:1862!
  invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
  RIP: 0010:link_to_fixup_dir+0xd5/0xe0
  RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216
  RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0
  RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000
  RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001
  R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800
  R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065
  FS:  00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0
  Call Trace:
   replay_one_buffer+0x409/0x470
   ? btree_read_extent_buffer_pages+0xd0/0x110
   walk_up_log_tree+0x157/0x1e0
   walk_log_tree+0xa6/0x1d0
   btrfs_recover_log_trees+0x1da/0x360
   ? replay_one_extent+0x7b0/0x7b0
   open_ctree+0x1486/0x1720
   btrfs_mount_root.cold+0x12/0xea
   ? __kmalloc_track_caller+0x12f/0x240
   legacy_get_tree+0x24/0x40
   vfs_get_tree+0x22/0xb0
   vfs_kern_mount.part.0+0x71/0xb0
   btrfs_mount+0x10d/0x380
   ? vfs_parse_fs_string+0x4d/0x90
   legacy_get_tree+0x24/0x40
   vfs_get_tree+0x22/0xb0
   path_mount+0x433/0xa10
   __x64_sys_mount+0xe3/0x120
   do_syscall_64+0x3d/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

We can get -EIO or any number of legitimate errors from
btrfs_search_slot(), panicing here is not the appropriate response.  The
error path for this code handles errors properly, simply return the
error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47145/">CVE-2021-47145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47145">CVE-2021-47145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222005">SUSE bug 1222005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47147" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47147" ref_url="https://www.suse.com/security/cve/CVE-2021-47147" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: ocp: Fix a resource leak in an error handling path

If an error occurs after a successful 'pci_ioremap_bar()' call, it must be
undone by a corresponding 'pci_iounmap()' call, as already done in the
remove function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47147/">CVE-2021-47147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47147">CVE-2021-47147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221975">SUSE bug 1221975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47148" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47148" ref_url="https://www.suse.com/security/cve/CVE-2021-47148" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()

This function is called from ethtool_set_rxfh() and "*rss_context"
comes from the user.  Add some bounds checking to prevent memory
corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47148/">CVE-2021-47148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47148">CVE-2021-47148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221976">SUSE bug 1221976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47149" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47149" ref_url="https://www.suse.com/security/cve/CVE-2021-47149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fujitsu: fix potential null-ptr-deref

In fmvj18x_get_hwinfo(), if ioremap fails there will be NULL pointer
deref. To fix this, check the return value of ioremap and return -1
to the caller in case of failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47149/">CVE-2021-47149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47149">CVE-2021-47149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221972">SUSE bug 1221972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47150" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47150" ref_url="https://www.suse.com/security/cve/CVE-2021-47150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fec: fix the potential memory leak in fec_enet_init()

If the memory allocated for cbd_base is failed, it should
free the memory allocated for the queues, otherwise it causes
memory leak.

And if the memory allocated for the queues is failed, it can
return error directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47150/">CVE-2021-47150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47150">CVE-2021-47150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221973">SUSE bug 1221973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47151" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47151" ref_url="https://www.suse.com/security/cve/CVE-2021-47151" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

interconnect: qcom: bcm-voter: add a missing of_node_put()

Add a missing of_node_put() in of_bcm_voter_get() to avoid the
reference leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47151/">CVE-2021-47151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47151">CVE-2021-47151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221971">SUSE bug 1221971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47152" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47152" ref_url="https://www.suse.com/security/cve/CVE-2021-47152" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix data stream corruption

Maxim reported several issues when forcing a TCP transparent proxy
to use the MPTCP protocol for the inbound connections. He also
provided a clean reproducer.

The problem boils down to 'mptcp_frag_can_collapse_to()' assuming
that only MPTCP will use the given page_frag.

If others - e.g. the plain TCP protocol - allocate page fragments,
we can end-up re-using already allocated memory for mptcp_data_frag.

Fix the issue ensuring that the to-be-expanded data fragment is
located at the current page frag end.

v1 -&gt; v2:
 - added missing fixes tag (Mat)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47152/">CVE-2021-47152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47152">CVE-2021-47152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221968">SUSE bug 1221968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47153" ref_url="https://www.suse.com/security/cve/CVE-2021-47153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: i801: Don't generate an interrupt on bus reset

Now that the i2c-i801 driver supports interrupts, setting the KILL bit
in a attempt to recover from a timed out transaction triggers an
interrupt. Unfortunately, the interrupt handler (i801_isr) is not
prepared for this situation and will try to process the interrupt as
if it was signaling the end of a successful transaction. In the case
of a block transaction, this can result in an out-of-range memory
access.

This condition was reproduced several times by syzbot:
https://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e
https://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e
https://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e
https://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb
https://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a
https://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79

So disable interrupts while trying to reset the bus. Interrupts will
be enabled again for the following transaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47153/">CVE-2021-47153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47153">CVE-2021-47153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221969">SUSE bug 1221969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47158" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47158" ref_url="https://www.suse.com/security/cve/CVE-2021-47158" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: sja1105: add error handling in sja1105_setup()

If any of sja1105_static_config_load(), sja1105_clocking_setup() or
sja1105_devlink_setup() fails, we can't just return in the middle of
sja1105_setup() or memory will leak. Add a cleanup path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47158/">CVE-2021-47158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47158">CVE-2021-47158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221970">SUSE bug 1221970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47159" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47159" ref_url="https://www.suse.com/security/cve/CVE-2021-47159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: fix a crash if -&gt;get_sset_count() fails

If ds-&gt;ops-&gt;get_sset_count() fails then it "count" is a negative error
code such as -EOPNOTSUPP.  Because "i" is an unsigned int, the negative
error code is type promoted to a very high value and the loop will
corrupt memory until the system crashes.

Fix this by checking for error codes and changing the type of "i" to
just int.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47159/">CVE-2021-47159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47159">CVE-2021-47159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221967">SUSE bug 1221967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47160" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47160" ref_url="https://www.suse.com/security/cve/CVE-2021-47160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mt7530: fix VLAN traffic leaks

PCR_MATRIX field was set to all 1's when VLAN filtering is enabled, but
was not reset when it is disabled, which may cause traffic leaks:

	ip link add br0 type bridge vlan_filtering 1
	ip link add br1 type bridge vlan_filtering 1
	ip link set swp0 master br0
	ip link set swp1 master br1
	ip link set br0 type bridge vlan_filtering 0
	ip link set br1 type bridge vlan_filtering 0
	# traffic in br0 and br1 will start leaking to each other

As port_bridge_{add,del} have set up PCR_MATRIX properly, remove the
PCR_MATRIX write from mt7530_port_set_vlan_aware.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47160/">CVE-2021-47160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47160">CVE-2021-47160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221974">SUSE bug 1221974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47161" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47161" ref_url="https://www.suse.com/security/cve/CVE-2021-47161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-fsl-dspi: Fix a resource leak in an error handling path

'dspi_request_dma()' should be undone by a 'dspi_release_dma()' call in the
error handling path of the probe function, as already done in the remove
function
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47161/">CVE-2021-47161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47161">CVE-2021-47161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221966">SUSE bug 1221966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47162" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47162" ref_url="https://www.suse.com/security/cve/CVE-2021-47162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: skb_linearize the head skb when reassembling msgs

It's not a good idea to append the frag skb to a skb's frag_list if
the frag_list already has skbs from elsewhere, such as this skb was
created by pskb_copy() where the frag_list was cloned (all the skbs
in it were skb_get'ed) and shared by multiple skbs.

However, the new appended frag skb should have been only seen by the
current skb. Otherwise, it will cause use after free crashes as this
appended frag skb are seen by multiple skbs but it only got skb_get
called once.

The same thing happens with a skb updated by pskb_may_pull() with a
skb_cloned skb. Li Shuang has reported quite a few crashes caused
by this when doing testing over macvlan devices:

  [] kernel BUG at net/core/skbuff.c:1970!
  [] Call Trace:
  []  skb_clone+0x4d/0xb0
  []  macvlan_broadcast+0xd8/0x160 [macvlan]
  []  macvlan_process_broadcast+0x148/0x150 [macvlan]
  []  process_one_work+0x1a7/0x360
  []  worker_thread+0x30/0x390

  [] kernel BUG at mm/usercopy.c:102!
  [] Call Trace:
  []  __check_heap_object+0xd3/0x100
  []  __check_object_size+0xff/0x16b
  []  simple_copy_to_iter+0x1c/0x30
  []  __skb_datagram_iter+0x7d/0x310
  []  __skb_datagram_iter+0x2a5/0x310
  []  skb_copy_datagram_iter+0x3b/0x90
  []  tipc_recvmsg+0x14a/0x3a0 [tipc]
  []  ____sys_recvmsg+0x91/0x150
  []  ___sys_recvmsg+0x7b/0xc0

  [] kernel BUG at mm/slub.c:305!
  [] Call Trace:
  []  &lt;IRQ&gt;
  []  kmem_cache_free+0x3ff/0x400
  []  __netif_receive_skb_core+0x12c/0xc40
  []  ? kmem_cache_alloc+0x12e/0x270
  []  netif_receive_skb_internal+0x3d/0xb0
  []  ? get_rx_page_info+0x8e/0xa0 [be2net]
  []  be_poll+0x6ef/0xd00 [be2net]
  []  ? irq_exit+0x4f/0x100
  []  net_rx_action+0x149/0x3b0

  ...

This patch is to fix it by linearizing the head skb if it has frag_list
set in tipc_buf_append(). Note that we choose to do this before calling
skb_unshare(), as __skb_linearize() will avoid skb_copy(). Also, we can
not just drop the frag_list either as the early time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47162/">CVE-2021-47162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47162">CVE-2021-47162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221977">SUSE bug 1221977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47164" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47164" ref_url="https://www.suse.com/security/cve/CVE-2021-47164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix null deref accessing lag dev

It could be the lag dev is null so stop processing the event.
In bond_enslave() the active/backup slave being set before setting the
upper dev so first event is without an upper dev.
After setting the upper dev with bond_master_upper_dev_link() there is
a second event and in that event we have an upper dev.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47164/">CVE-2021-47164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47164">CVE-2021-47164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221978">SUSE bug 1221978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47165" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47165" ref_url="https://www.suse.com/security/cve/CVE-2021-47165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/meson: fix shutdown crash when component not probed

When main component is not probed, by example when the dw-hdmi module is
not loaded yet or in probe defer, the following crash appears on shutdown:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000038
...
pc : meson_drv_shutdown+0x24/0x50
lr : platform_drv_shutdown+0x20/0x30
...
Call trace:
meson_drv_shutdown+0x24/0x50
platform_drv_shutdown+0x20/0x30
device_shutdown+0x158/0x360
kernel_restart_prepare+0x38/0x48
kernel_restart+0x18/0x68
__do_sys_reboot+0x224/0x250
__arm64_sys_reboot+0x24/0x30
...

Simply check if the priv struct has been allocated before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47165/">CVE-2021-47165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47165">CVE-2021-47165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221965">SUSE bug 1221965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47166" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47166" ref_url="https://www.suse.com/security/cve/CVE-2021-47166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()

The value of mirror-&gt;pg_bytes_written should only be updated after a
successful attempt to flush out the requests on the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47166/">CVE-2021-47166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47166">CVE-2021-47166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221998">SUSE bug 1221998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224785">SUSE bug 1224785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47167" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47167" ref_url="https://www.suse.com/security/cve/CVE-2021-47167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix an Oopsable condition in __nfs_pageio_add_request()

Ensure that nfs_pageio_error_cleanup() resets the mirror array contents,
so that the structure reflects the fact that it is now empty.
Also change the test in nfs_pageio_do_add_request() to be more robust by
checking whether or not the list is empty rather than relying on the
value of pg_count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47167/">CVE-2021-47167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47167">CVE-2021-47167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221991">SUSE bug 1221991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224785">SUSE bug 1224785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47168" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47168" ref_url="https://www.suse.com/security/cve/CVE-2021-47168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: fix an incorrect limit in filelayout_decode_layout()

The "sizeof(struct nfs_fh)" is two bytes too large and could lead to
memory corruption.  It should be NFS_MAXFHSIZE because that's the size
of the -&gt;data[] buffer.

I reversed the size of the arguments to put the variable on the left.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47168/">CVE-2021-47168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47168">CVE-2021-47168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222002">SUSE bug 1222002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47169" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47169" ref_url="https://www.suse.com/security/cve/CVE-2021-47169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'

In 'rp2_probe', the driver registers 'rp2_uart_interrupt' then calls
'rp2_fw_cb' through 'request_firmware_nowait'. In 'rp2_fw_cb', if the
firmware don't exists, function just return without initializing ports
of 'rp2_card'. But now the interrupt handler function has been
registered, and when an interrupt comes, 'rp2_uart_interrupt' may access
those ports then causing NULL pointer dereference or other bugs.

Because the driver does some initialization work in 'rp2_fw_cb', in
order to make the driver ready to handle interrupts, 'request_firmware'
should be used instead of asynchronous 'request_firmware_nowait'.

This report reveals it:

INFO: trying to register non-static key.
the code is fine but needs lockdep annotation.
turning off the locking correctness validator.
CPU: 2 PID: 0 Comm: swapper/2 Not tainted 4.19.177-gdba4159c14ef-dirty #45
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-
gc9ba5276e321-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xec/0x156 lib/dump_stack.c:118
 assign_lock_key kernel/locking/lockdep.c:727 [inline]
 register_lock_class+0x14e5/0x1ba0 kernel/locking/lockdep.c:753
 __lock_acquire+0x187/0x3750 kernel/locking/lockdep.c:3303
 lock_acquire+0x124/0x340 kernel/locking/lockdep.c:3907
 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]
 _raw_spin_lock+0x32/0x50 kernel/locking/spinlock.c:144
 spin_lock include/linux/spinlock.h:329 [inline]
 rp2_ch_interrupt drivers/tty/serial/rp2.c:466 [inline]
 rp2_asic_interrupt.isra.9+0x15d/0x990 drivers/tty/serial/rp2.c:493
 rp2_uart_interrupt+0x49/0xe0 drivers/tty/serial/rp2.c:504
 __handle_irq_event_percpu+0xfb/0x770 kernel/irq/handle.c:149
 handle_irq_event_percpu+0x79/0x150 kernel/irq/handle.c:189
 handle_irq_event+0xac/0x140 kernel/irq/handle.c:206
 handle_fasteoi_irq+0x232/0x5c0 kernel/irq/chip.c:725
 generic_handle_irq_desc include/linux/irqdesc.h:155 [inline]
 handle_irq+0x230/0x3a0 arch/x86/kernel/irq_64.c:87
 do_IRQ+0xa7/0x1e0 arch/x86/kernel/irq.c:247
 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670
 &lt;/IRQ&gt;
RIP: 0010:native_safe_halt+0x28/0x30 arch/x86/include/asm/irqflags.h:61
Code: 00 00 55 be 04 00 00 00 48 c7 c7 00 c2 2f 8c 48 89 e5 e8 fb 31 e7 f8
8b 05 75 af 8d 03 85 c0 7e 07 0f 00 2d 8a 61 65 00 fb f4 &lt;5d&gt; c3 90 90 90
90 90 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41
RSP: 0018:ffff88806b71fcc8 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffde
RAX: 0000000000000000 RBX: ffffffff8bde7e48 RCX: ffffffff88a21285
RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff8c2fc200
RBP: ffff88806b71fcc8 R08: fffffbfff185f840 R09: fffffbfff185f840
R10: 0000000000000001 R11: fffffbfff185f840 R12: 0000000000000002
R13: ffffffff8bea18a0 R14: 0000000000000000 R15: 0000000000000000
 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline]
 default_idle+0x6f/0x360 arch/x86/kernel/process.c:557
 arch_cpu_idle+0xf/0x20 arch/x86/kernel/process.c:548
 default_idle_call+0x3b/0x60 kernel/sched/idle.c:93
 cpuidle_idle_call kernel/sched/idle.c:153 [inline]
 do_idle+0x2ab/0x3c0 kernel/sched/idle.c:263
 cpu_startup_entry+0xcb/0xe0 kernel/sched/idle.c:369
 start_secondary+0x3b8/0x4e0 arch/x86/kernel/smpboot.c:271
 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243
BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
PGD 8000000056d27067 P4D 8000000056d27067 PUD 56d28067 PMD 0
Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 2 PID: 0 Comm: swapper/2 Not tainted 4.19.177-gdba4159c14ef-dirty #45
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-
gc9ba5276e321-prebuilt.qemu.org 04/01/2014
RIP: 0010:readl arch/x86/include/asm/io.h:59 [inline]
RIP: 0010:rp2_ch_interrupt drivers/tty/serial/rp2.c:472 [inline]
RIP: 0010:rp2_asic_interrupt.isra.9+0x181/0x990 drivers/tty/serial/rp2.c:
493
Co
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47169/">CVE-2021-47169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47169">CVE-2021-47169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222000">SUSE bug 1222000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47170" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47170" ref_url="https://www.suse.com/security/cve/CVE-2021-47170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: usbfs: Don't WARN about excessively large memory allocations

Syzbot found that the kernel generates a WARNing if the user tries to
submit a bulk transfer through usbfs with a buffer that is way too
large.  This isn't a bug in the kernel; it's merely an invalid request
from the user and the usbfs code does handle it correctly.

In theory the same thing can happen with async transfers, or with the
packet descriptor table for isochronous transfers.

To prevent the MM subsystem from complaining about these bad
allocation requests, add the __GFP_NOWARN flag to the kmalloc calls
for these buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47170/">CVE-2021-47170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47170">CVE-2021-47170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222004">SUSE bug 1222004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47171" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47171" ref_url="https://www.suse.com/security/cve/CVE-2021-47171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: fix memory leak in smsc75xx_bind

Syzbot reported memory leak in smsc75xx_bind().
The problem was is non-freed memory in case of
errors after memory allocation.

backtrace:
  [&lt;ffffffff84245b62&gt;] kmalloc include/linux/slab.h:556 [inline]
  [&lt;ffffffff84245b62&gt;] kzalloc include/linux/slab.h:686 [inline]
  [&lt;ffffffff84245b62&gt;] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460
  [&lt;ffffffff82b5b2e6&gt;] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47171/">CVE-2021-47171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47171">CVE-2021-47171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221994">SUSE bug 1221994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47172" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47172" ref_url="https://www.suse.com/security/cve/CVE-2021-47172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers

Channel numbering must start at 0 and then not have any holes, or
it is possible to overflow the available storage.  Note this bug was
introduced as part of a fix to ensure we didn't rely on the ordering
of child nodes.  So we need to support arbitrary ordering but they all
need to be there somewhere.

Note I hit this when using qemu to test the rest of this series.
Arguably this isn't the best fix, but it is probably the most minimal
option for backporting etc.

Alexandru's sign-off is here because he carried this patch in a larger
set that Jonathan then applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47172/">CVE-2021-47172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47172">CVE-2021-47172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221992">SUSE bug 1221992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47173" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47173" ref_url="https://www.suse.com/security/cve/CVE-2021-47173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc/uss720: fix memory leak in uss720_probe

uss720_probe forgets to decrease the refcount of usbdev in uss720_probe.
Fix this by decreasing the refcount of usbdev by usb_put_dev.

BUG: memory leak
unreferenced object 0xffff888101113800 (size 2048):
  comm "kworker/0:1", pid 7, jiffies 4294956777 (age 28.870s)
  hex dump (first 32 bytes):
    ff ff ff ff 31 00 00 00 00 00 00 00 00 00 00 00  ....1...........
    00 00 00 00 00 00 00 00 00 00 00 00 03 00 00 00  ................
  backtrace:
    [&lt;ffffffff82b8e822&gt;] kmalloc include/linux/slab.h:554 [inline]
    [&lt;ffffffff82b8e822&gt;] kzalloc include/linux/slab.h:684 [inline]
    [&lt;ffffffff82b8e822&gt;] usb_alloc_dev+0x32/0x450 drivers/usb/core/usb.c:582
    [&lt;ffffffff82b98441&gt;] hub_port_connect drivers/usb/core/hub.c:5129 [inline]
    [&lt;ffffffff82b98441&gt;] hub_port_connect_change drivers/usb/core/hub.c:5363 [inline]
    [&lt;ffffffff82b98441&gt;] port_event drivers/usb/core/hub.c:5509 [inline]
    [&lt;ffffffff82b98441&gt;] hub_event+0x1171/0x20c0 drivers/usb/core/hub.c:5591
    [&lt;ffffffff81259229&gt;] process_one_work+0x2c9/0x600 kernel/workqueue.c:2275
    [&lt;ffffffff81259b19&gt;] worker_thread+0x59/0x5d0 kernel/workqueue.c:2421
    [&lt;ffffffff81261228&gt;] kthread+0x178/0x1b0 kernel/kthread.c:292
    [&lt;ffffffff8100227f&gt;] ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47173/">CVE-2021-47173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47173">CVE-2021-47173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221993">SUSE bug 1221993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47174" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47174" ref_url="https://www.suse.com/security/cve/CVE-2021-47174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version

Arturo reported this backtrace:

[709732.358791] WARNING: CPU: 3 PID: 456 at arch/x86/kernel/fpu/core.c:128 kernel_fpu_begin_mask+0xae/0xe0
[709732.358793] Modules linked in: binfmt_misc nft_nat nft_chain_nat nf_nat nft_counter nft_ct nf_tables nf_conntrack_netlink nfnetlink 8021q garp stp mrp llc vrf intel_rapl_msr intel_rapl_common skx_edac nfit libnvdimm ipmi_ssif x86_pkg_temp_thermal intel_powerclamp coretemp crc32_pclmul mgag200 ghash_clmulni_intel drm_kms_helper cec aesni_intel drm libaes crypto_simd cryptd glue_helper mei_me dell_smbios iTCO_wdt evdev intel_pmc_bxt iTCO_vendor_support dcdbas pcspkr rapl dell_wmi_descriptor wmi_bmof sg i2c_algo_bit watchdog mei acpi_ipmi ipmi_si button nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ipmi_devintf ipmi_msghandler ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 dm_mod raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor sd_mod t10_pi crc_t10dif crct10dif_generic raid6_pq libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod ahci libahci tg3 libata xhci_pci libphy xhci_hcd ptp usbcore crct10dif_pclmul crct10dif_common bnxt_en crc32c_intel scsi_mod
[709732.358941]  pps_core i2c_i801 lpc_ich i2c_smbus wmi usb_common
[709732.358957] CPU: 3 PID: 456 Comm: jbd2/dm-0-8 Not tainted 5.10.0-0.bpo.5-amd64 #1 Debian 5.10.24-1~bpo10+1
[709732.358959] Hardware name: Dell Inc. PowerEdge R440/04JN2K, BIOS 2.9.3 09/23/2020
[709732.358964] RIP: 0010:kernel_fpu_begin_mask+0xae/0xe0
[709732.358969] Code: ae 54 24 04 83 e3 01 75 38 48 8b 44 24 08 65 48 33 04 25 28 00 00 00 75 33 48 83 c4 10 5b c3 65 8a 05 5e 21 5e 76 84 c0 74 92 &lt;0f&gt; 0b eb 8e f0 80 4f 01 40 48 81 c7 00 14 00 00 e8 dd fb ff ff eb
[709732.358972] RSP: 0018:ffffbb9700304740 EFLAGS: 00010202
[709732.358976] RAX: 0000000000000001 RBX: 0000000000000003 RCX: 0000000000000001
[709732.358979] RDX: ffffbb9700304970 RSI: ffff922fe1952e00 RDI: 0000000000000003
[709732.358981] RBP: ffffbb9700304970 R08: ffff922fc868a600 R09: ffff922fc711e462
[709732.358984] R10: 000000000000005f R11: ffff922ff0b27180 R12: ffffbb9700304960
[709732.358987] R13: ffffbb9700304b08 R14: ffff922fc664b6c8 R15: ffff922fc664b660
[709732.358990] FS:  0000000000000000(0000) GS:ffff92371fec0000(0000) knlGS:0000000000000000
[709732.358993] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[709732.358996] CR2: 0000557a6655bdd0 CR3: 000000026020a001 CR4: 00000000007706e0
[709732.358999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[709732.359001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[709732.359003] PKRU: 55555554
[709732.359005] Call Trace:
[709732.359009]  &lt;IRQ&gt;
[709732.359035]  nft_pipapo_avx2_lookup+0x4c/0x1cba [nf_tables]
[709732.359046]  ? sched_clock+0x5/0x10
[709732.359054]  ? sched_clock_cpu+0xc/0xb0
[709732.359061]  ? record_times+0x16/0x80
[709732.359068]  ? plist_add+0xc1/0x100
[709732.359073]  ? psi_group_change+0x47/0x230
[709732.359079]  ? skb_clone+0x4d/0xb0
[709732.359085]  ? enqueue_task_rt+0x22b/0x310
[709732.359098]  ? bnxt_start_xmit+0x1e8/0xaf0 [bnxt_en]
[709732.359102]  ? packet_rcv+0x40/0x4a0
[709732.359121]  nft_lookup_eval+0x59/0x160 [nf_tables]
[709732.359133]  nft_do_chain+0x350/0x500 [nf_tables]
[709732.359152]  ? nft_lookup_eval+0x59/0x160 [nf_tables]
[709732.359163]  ? nft_do_chain+0x364/0x500 [nf_tables]
[709732.359172]  ? fib4_rule_action+0x6d/0x80
[709732.359178]  ? fib_rules_lookup+0x107/0x250
[709732.359184]  nft_nat_do_chain+0x8a/0xf2 [nft_chain_nat]
[709732.359193]  nf_nat_inet_fn+0xea/0x210 [nf_nat]
[709732.359202]  nf_nat_ipv4_out+0x14/0xa0 [nf_nat]
[709732.359207]  nf_hook_slow+0x44/0xc0
[709732.359214]  ip_output+0xd2/0x100
[709732.359221]  ? __ip_finish_output+0x210/0x210
[709732.359226]  ip_forward+0x37d/0x4a0
[709732.359232]  ? ip4_key_hashfn+0xb0/0xb0
[709732.359238]  ip_subli
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47174/">CVE-2021-47174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47174">CVE-2021-47174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221990">SUSE bug 1221990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47175" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47175" ref_url="https://www.suse.com/security/cve/CVE-2021-47175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fq_pie: fix OOB access in the traffic path

the following script:

  # tc qdisc add dev eth0 handle 0x1 root fq_pie flows 2
  # tc qdisc add dev eth0 clsact
  # tc filter add dev eth0 egress matchall action skbedit priority 0x10002
  # ping 192.0.2.2 -I eth0 -c2 -w1 -q

produces the following splat:

 BUG: KASAN: slab-out-of-bounds in fq_pie_qdisc_enqueue+0x1314/0x19d0 [sch_fq_pie]
 Read of size 4 at addr ffff888171306924 by task ping/942

 CPU: 3 PID: 942 Comm: ping Not tainted 5.12.0+ #441
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 Call Trace:
  dump_stack+0x92/0xc1
  print_address_description.constprop.7+0x1a/0x150
  kasan_report.cold.13+0x7f/0x111
  fq_pie_qdisc_enqueue+0x1314/0x19d0 [sch_fq_pie]
  __dev_queue_xmit+0x1034/0x2b10
  ip_finish_output2+0xc62/0x2120
  __ip_finish_output+0x553/0xea0
  ip_output+0x1ca/0x4d0
  ip_send_skb+0x37/0xa0
  raw_sendmsg+0x1c4b/0x2d00
  sock_sendmsg+0xdb/0x110
  __sys_sendto+0x1d7/0x2b0
  __x64_sys_sendto+0xdd/0x1b0
  do_syscall_64+0x3c/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7fe69735c3eb
 Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 48 8d 05 75 42 2c 00 41 89 ca 8b 00 85 c0 75 14 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 75 c3 0f 1f 40 00 41 57 4d 89 c7 41 56 41 89
 RSP: 002b:00007fff06d7fb38 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
 RAX: ffffffffffffffda RBX: 000055e961413700 RCX: 00007fe69735c3eb
 RDX: 0000000000000040 RSI: 000055e961413700 RDI: 0000000000000003
 RBP: 0000000000000040 R08: 000055e961410500 R09: 0000000000000010
 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff06d81260
 R13: 00007fff06d7fb40 R14: 00007fff06d7fc30 R15: 000055e96140f0a0

 Allocated by task 917:
  kasan_save_stack+0x19/0x40
  __kasan_kmalloc+0x7f/0xa0
  __kmalloc_node+0x139/0x280
  fq_pie_init+0x555/0x8e8 [sch_fq_pie]
  qdisc_create+0x407/0x11b0
  tc_modify_qdisc+0x3c2/0x17e0
  rtnetlink_rcv_msg+0x346/0x8e0
  netlink_rcv_skb+0x120/0x380
  netlink_unicast+0x439/0x630
  netlink_sendmsg+0x719/0xbf0
  sock_sendmsg+0xe2/0x110
  ____sys_sendmsg+0x5ba/0x890
  ___sys_sendmsg+0xe9/0x160
  __sys_sendmsg+0xd3/0x170
  do_syscall_64+0x3c/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 The buggy address belongs to the object at ffff888171306800
  which belongs to the cache kmalloc-256 of size 256
 The buggy address is located 36 bytes to the right of
  256-byte region [ffff888171306800, ffff888171306900)
 The buggy address belongs to the page:
 page:00000000bcfb624e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x171306
 head:00000000bcfb624e order:1 compound_mapcount:0
 flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff)
 raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042b40
 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
 page dumped because: kasan: bad access detected

 Memory state around the buggy address:
  ffff888171306800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff888171306880: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
 &gt;ffff888171306900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                ^
  ffff888171306980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  ffff888171306a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb

fix fq_pie traffic path to avoid selecting 'q-&gt;flows + q-&gt;flows_cnt' as a
valid flow: it's an address beyond the allocated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47175/">CVE-2021-47175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47175">CVE-2021-47175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222003">SUSE bug 1222003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47176" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47176" ref_url="https://www.suse.com/security/cve/CVE-2021-47176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: add missing discipline function

Fix crash with illegal operation exception in dasd_device_tasklet.
Commit b72949328869 ("s390/dasd: Prepare for additional path event handling")
renamed the verify_path function for ECKD but not for FBA and DIAG.
This leads to a panic when the path verification function is called for a
FBA or DIAG device.

Fix by defining a wrapper function for dasd_generic_verify_path().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47176/">CVE-2021-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47176">CVE-2021-47176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221996">SUSE bug 1221996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47177" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47177" ref_url="https://www.suse.com/security/cve/CVE-2021-47177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix sysfs leak in alloc_iommu()

iommu_device_sysfs_add() is called before, so is has to be cleaned on subsequent
errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47177/">CVE-2021-47177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47177">CVE-2021-47177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221997">SUSE bug 1221997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47178" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47178" ref_url="https://www.suse.com/security/cve/CVE-2021-47178" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Avoid smp_processor_id() in preemptible code

The BUG message "BUG: using smp_processor_id() in preemptible [00000000]
code" was observed for TCMU devices with kernel config DEBUG_PREEMPT.

The message was observed when blktests block/005 was run on TCMU devices
with fileio backend or user:zbc backend [1]. The commit 1130b499b4a7
("scsi: target: tcm_loop: Use LIO wq cmd submission helper") triggered the
symptom. The commit modified work queue to handle commands and changed
'current-&gt;nr_cpu_allowed' at smp_processor_id() call.

The message was also observed at system shutdown when TCMU devices were not
cleaned up [2]. The function smp_processor_id() was called in SCSI host
work queue for abort handling, and triggered the BUG message. This symptom
was observed regardless of the commit 1130b499b4a7 ("scsi: target:
tcm_loop: Use LIO wq cmd submission helper").

To avoid the preemptible code check at smp_processor_id(), get CPU ID with
raw_smp_processor_id() instead. The CPU ID is used for performance
improvement then thread move to other CPU will not affect the code.

[1]

[   56.468103] run blktests block/005 at 2021-05-12 14:16:38
[   57.369473] check_preemption_disabled: 85 callbacks suppressed
[   57.369480] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1511
[   57.369506] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1510
[   57.369512] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1506
[   57.369552] caller is __target_init_cmd+0x157/0x170 [target_core_mod]
[   57.369606] CPU: 4 PID: 1506 Comm: fio Not tainted 5.13.0-rc1+ #34
[   57.369613] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018
[   57.369617] Call Trace:
[   57.369621] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1507
[   57.369628]  dump_stack+0x6d/0x89
[   57.369642]  check_preemption_disabled+0xc8/0xd0
[   57.369628] caller is __target_init_cmd+0x157/0x170 [target_core_mod]
[   57.369655]  __target_init_cmd+0x157/0x170 [target_core_mod]
[   57.369695]  target_init_cmd+0x76/0x90 [target_core_mod]
[   57.369732]  tcm_loop_queuecommand+0x109/0x210 [tcm_loop]
[   57.369744]  scsi_queue_rq+0x38e/0xc40
[   57.369761]  __blk_mq_try_issue_directly+0x109/0x1c0
[   57.369779]  blk_mq_try_issue_directly+0x43/0x90
[   57.369790]  blk_mq_submit_bio+0x4e5/0x5d0
[   57.369812]  submit_bio_noacct+0x46e/0x4e0
[   57.369830]  __blkdev_direct_IO_simple+0x1a3/0x2d0
[   57.369859]  ? set_init_blocksize.isra.0+0x60/0x60
[   57.369880]  generic_file_read_iter+0x89/0x160
[   57.369898]  blkdev_read_iter+0x44/0x60
[   57.369906]  new_sync_read+0x102/0x170
[   57.369929]  vfs_read+0xd4/0x160
[   57.369941]  __x64_sys_pread64+0x6e/0xa0
[   57.369946]  ? lockdep_hardirqs_on+0x79/0x100
[   57.369958]  do_syscall_64+0x3a/0x70
[   57.369965]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   57.369973] RIP: 0033:0x7f7ed4c1399f
[   57.369979] Code: 08 89 3c 24 48 89 4c 24 18 e8 7d f3 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 11 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 cd f3 ff ff 48 8b
[   57.369983] RSP: 002b:00007ffd7918c580 EFLAGS: 00000293 ORIG_RAX: 0000000000000011
[   57.369990] RAX: ffffffffffffffda RBX: 00000000015b4540 RCX: 00007f7ed4c1399f
[   57.369993] RDX: 0000000000001000 RSI: 00000000015de000 RDI: 0000000000000009
[   57.369996] RBP: 00000000015b4540 R08: 0000000000000000 R09: 0000000000000001
[   57.369999] R10: 0000000000e5c000 R11: 0000000000000293 R12: 00007f7eb5269a70
[   57.370002] R13: 0000000000000000 R14: 0000000000001000 R15: 00000000015b4568
[   57.370031] CPU: 7 PID: 1507 Comm: fio Not tainted 5.13.0-rc1+ #34
[   57.370036] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018
[   57.370039] Call Trace:
[   57.370045]  dump_stack+0x6d/0x89
[   57.370056]  ch
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47178/">CVE-2021-47178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47178">CVE-2021-47178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221995">SUSE bug 1221995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47179" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47179" ref_url="https://www.suse.com/security/cve/CVE-2021-47179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()

Commit de144ff4234f changes _pnfs_return_layout() to call
pnfs_mark_matching_lsegs_return() passing NULL as the struct
pnfs_layout_range argument. Unfortunately,
pnfs_mark_matching_lsegs_return() doesn't check if we have a value here
before dereferencing it, causing an oops.

I'm able to hit this crash consistently when running connectathon basic
tests on NFS v4.1/v4.2 against Ontap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47179/">CVE-2021-47179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47179">CVE-2021-47179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222001">SUSE bug 1222001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224785">SUSE bug 1224785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47180" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47180" ref_url="https://www.suse.com/security/cve/CVE-2021-47180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: nci: fix memory leak in nci_allocate_device

nfcmrvl_disconnect fails to free the hci_dev field in struct nci_dev.
Fix this by freeing hci_dev in nci_free_device.

BUG: memory leak
unreferenced object 0xffff888111ea6800 (size 1024):
  comm "kworker/1:0", pid 19, jiffies 4294942308 (age 13.580s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 60 fd 0c 81 88 ff ff  .........`......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;000000004bc25d43&gt;] kmalloc include/linux/slab.h:552 [inline]
    [&lt;000000004bc25d43&gt;] kzalloc include/linux/slab.h:682 [inline]
    [&lt;000000004bc25d43&gt;] nci_hci_allocate+0x21/0xd0 net/nfc/nci/hci.c:784
    [&lt;00000000c59cff92&gt;] nci_allocate_device net/nfc/nci/core.c:1170 [inline]
    [&lt;00000000c59cff92&gt;] nci_allocate_device+0x10b/0x160 net/nfc/nci/core.c:1132
    [&lt;00000000006e0a8e&gt;] nfcmrvl_nci_register_dev+0x10a/0x1c0 drivers/nfc/nfcmrvl/main.c:153
    [&lt;000000004da1b57e&gt;] nfcmrvl_probe+0x223/0x290 drivers/nfc/nfcmrvl/usb.c:345
    [&lt;00000000d506aed9&gt;] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396
    [&lt;00000000bc632c92&gt;] really_probe+0x159/0x4a0 drivers/base/dd.c:554
    [&lt;00000000f5009125&gt;] driver_probe_device+0x84/0x100 drivers/base/dd.c:740
    [&lt;000000000ce658ca&gt;] __device_attach_driver+0xee/0x110 drivers/base/dd.c:846
    [&lt;000000007067d05f&gt;] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:431
    [&lt;00000000f8e13372&gt;] __device_attach+0x122/0x250 drivers/base/dd.c:914
    [&lt;000000009cf68860&gt;] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:491
    [&lt;00000000359c965a&gt;] device_add+0x5be/0xc30 drivers/base/core.c:3109
    [&lt;00000000086e4bd3&gt;] usb_set_configuration+0x9d9/0xb90 drivers/usb/core/message.c:2164
    [&lt;00000000ca036872&gt;] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238
    [&lt;00000000d40d36f6&gt;] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293
    [&lt;00000000bc632c92&gt;] really_probe+0x159/0x4a0 drivers/base/dd.c:554
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47180/">CVE-2021-47180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47180">CVE-2021-47180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221999">SUSE bug 1221999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47181" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: tusb6010: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47182" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix scsi_mode_sense() buffer length handling

Several problems exist with scsi_mode_sense() buffer length handling:

 1) The allocation length field of the MODE SENSE(10) command is 16-bits,
    occupying bytes 7 and 8 of the CDB. With this command, access to mode
    pages larger than 255 bytes is thus possible. However, the CDB
    allocation length field is set by assigning len to byte 8 only, thus
    truncating buffer length larger than 255.

 2) If scsi_mode_sense() is called with len smaller than 8 with
    sdev-&gt;use_10_for_ms set, or smaller than 4 otherwise, the buffer length
    is increased to 8 and 4 respectively, and the buffer is zero filled
    with these increased values, thus corrupting the memory following the
    buffer.

Fix these 2 problems by using put_unaligned_be16() to set the allocation
length field of MODE SENSE(10) CDB and by returning an error when len is
too small.

Furthermore, if len is larger than 255B, always try MODE SENSE(10) first,
even if the device driver did not set sdev-&gt;use_10_for_ms. In case of
invalid opcode error for MODE SENSE(10), access to mode pages larger than
255 bytes are not retried using MODE SENSE(6). To avoid buffer length
overflows for the MODE_SENSE(10) case, check that len is smaller than 65535
bytes.

While at it, also fix the folowing:

 * Use get_unaligned_be16() to retrieve the mode data length and block
   descriptor length fields of the mode sense reply header instead of using
   an open coded calculation.

 * Fix the kdoc dbd argument explanation: the DBD bit stands for Disable
   Block Descriptor, which is the opposite of what the dbd argument
   description was.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47183" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix link down processing to address NULL pointer dereference

If an FC link down transition while PLOGIs are outstanding to fabric well
known addresses, outstanding ABTS requests may result in a NULL pointer
dereference. Driver unload requests may hang with repeated "2878" log
messages.

The Link down processing results in ABTS requests for outstanding ELS
requests. The Abort WQEs are sent for the ELSs before the driver had set
the link state to down. Thus the driver is sending the Abort with the
expectation that an ABTS will be sent on the wire. The Abort request is
stalled waiting for the link to come up. In some conditions the driver may
auto-complete the ELSs thus if the link does come up, the Abort completions
may reference an invalid structure.

Fix by ensuring that Abort set the flag to avoid link traffic if issued due
to conditions where the link failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47185" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc

When running ltp testcase(ltp/testcases/kernel/pty/pty04.c) with arm64, there is a soft lockup,
which look like this one:

  Workqueue: events_unbound flush_to_ldisc
  Call trace:
   dump_backtrace+0x0/0x1ec
   show_stack+0x24/0x30
   dump_stack+0xd0/0x128
   panic+0x15c/0x374
   watchdog_timer_fn+0x2b8/0x304
   __run_hrtimer+0x88/0x2c0
   __hrtimer_run_queues+0xa4/0x120
   hrtimer_interrupt+0xfc/0x270
   arch_timer_handler_phys+0x40/0x50
   handle_percpu_devid_irq+0x94/0x220
   __handle_domain_irq+0x88/0xf0
   gic_handle_irq+0x84/0xfc
   el1_irq+0xc8/0x180
   slip_unesc+0x80/0x214 [slip]
   tty_ldisc_receive_buf+0x64/0x80
   tty_port_default_receive_buf+0x50/0x90
   flush_to_ldisc+0xbc/0x110
   process_one_work+0x1d4/0x4b0
   worker_thread+0x180/0x430
   kthread+0x11c/0x120

In the testcase pty04, The first process call the write syscall to send
data to the pty master. At the same time, the workqueue will do the
flush_to_ldisc to pop data in a loop until there is no more data left.
When the sender and workqueue running in different core, the sender sends
data fastly in full time which will result in workqueue doing work in loop
for a long time and occuring softlockup in flush_to_ldisc with kernel
configured without preempt. So I add need_resched check and cond_resched
in the flush_to_ldisc loop to avoid it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47186" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47186" ref_url="https://www.suse.com/security/cve/CVE-2021-47186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: check for null after calling kmemdup

kmemdup can return a null pointer so need to check for it, otherwise
the null key will be dereferenced later in tipc_crypto_key_xmit as
can be seen in the trace [1].


[1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47186/">CVE-2021-47186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47186">CVE-2021-47186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222702">SUSE bug 1222702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47187" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency

The entry/exit latency and minimum residency in state for the idle
states of MSM8998 were ..bad: first of all, for all of them the
timings were written for CPU sleep but the min-residency-us param
was miscalculated (supposedly, while porting this from downstream);
Then, the power collapse states are setting PC on both the CPU
cluster *and* the L2 cache, which have different timings: in the
specific case of L2 the times are higher so these ones should be
taken into account instead of the CPU ones.

This parameter misconfiguration was not giving particular issues
because on MSM8998 there was no CPU scaling at all, so cluster/L2
power collapse was rarely (if ever) hit.
When CPU scaling is enabled, though, the wrong timings will produce
SoC unstability shown to the user as random, apparently error-less,
sudden reboots and/or lockups.

This set of parameters are stabilizing the SoC when CPU scaling is
ON and when power collapse is frequently hit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47188" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Improve SCSI abort handling

The following has been observed on a test setup:

WARNING: CPU: 4 PID: 250 at drivers/scsi/ufs/ufshcd.c:2737 ufshcd_queuecommand+0x468/0x65c
Call trace:
 ufshcd_queuecommand+0x468/0x65c
 scsi_send_eh_cmnd+0x224/0x6a0
 scsi_eh_test_devices+0x248/0x418
 scsi_eh_ready_devs+0xc34/0xe58
 scsi_error_handler+0x204/0x80c
 kthread+0x150/0x1b4
 ret_from_fork+0x10/0x30

That warning is triggered by the following statement:

	WARN_ON(lrbp-&gt;cmd);

Fix this warning by clearing lrbp-&gt;cmd from the abort handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47189" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory ordering between normal and ordered work functions

Ordered work functions aren't guaranteed to be handled by the same thread
which executed the normal work functions. The only way execution between
normal/ordered functions is synchronized is via the WORK_DONE_BIT,
unfortunately the used bitops don't guarantee any ordering whatsoever.

This manifested as seemingly inexplicable crashes on ARM64, where
async_chunk::inode is seen as non-null in async_cow_submit which causes
submit_compressed_extents to be called and crash occurs because
async_chunk::inode suddenly became NULL. The call trace was similar to:

    pc : submit_compressed_extents+0x38/0x3d0
    lr : async_cow_submit+0x50/0xd0
    sp : ffff800015d4bc20

    &lt;registers omitted for brevity&gt;

    Call trace:
     submit_compressed_extents+0x38/0x3d0
     async_cow_submit+0x50/0xd0
     run_ordered_work+0xc8/0x280
     btrfs_work_helper+0x98/0x250
     process_one_work+0x1f0/0x4ac
     worker_thread+0x188/0x504
     kthread+0x110/0x114
     ret_from_fork+0x10/0x18

Fix this by adding respective barrier calls which ensure that all
accesses preceding setting of WORK_DONE_BIT are strictly ordered before
setting the flag. At the same time add a read barrier after reading of
WORK_DONE_BIT in run_ordered_work which ensures all subsequent loads
would be strictly ordered after reading the bit. This in turn ensures
are all accesses before WORK_DONE_BIT are going to be strictly ordered
before any access that can occur in ordered_func.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47190" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47190" ref_url="https://www.suse.com/security/cve/CVE-2021-47190" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf bpf: Avoid memory leak from perf_env__insert_btf()

perf_env__insert_btf() doesn't insert if a duplicate BTF id is
encountered and this causes a memory leak. Modify the function to return
a success/error value and then free the memory if insertion didn't
happen.

v2. Adds a return -1 when the insertion error occurs in
    perf_env__fetch_btf. This doesn't affect anything as the result is
    never checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47190/">CVE-2021-47190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47190">CVE-2021-47190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222708">SUSE bug 1222708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47191" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()

The following warning was observed running syzkaller:

[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;
[ 3813.830724]    program syz-executor not setting count and/or reply_len properly
[ 3813.836956] ==================================================================
[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0
[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549
[ 3813.846612] Call Trace:
[ 3813.846995]  dump_stack+0x108/0x15f
[ 3813.847524]  print_address_description+0xa5/0x372
[ 3813.848243]  kasan_report.cold+0x236/0x2a8
[ 3813.849439]  check_memory_region+0x240/0x270
[ 3813.850094]  memcpy+0x30/0x80
[ 3813.850553]  sg_copy_buffer+0x157/0x1e0
[ 3813.853032]  sg_copy_from_buffer+0x13/0x20
[ 3813.853660]  fill_from_dev_buffer+0x135/0x370
[ 3813.854329]  resp_readcap16+0x1ac/0x280
[ 3813.856917]  schedule_resp+0x41f/0x1630
[ 3813.858203]  scsi_debug_queuecommand+0xb32/0x17e0
[ 3813.862699]  scsi_dispatch_cmd+0x330/0x950
[ 3813.863329]  scsi_request_fn+0xd8e/0x1710
[ 3813.863946]  __blk_run_queue+0x10b/0x230
[ 3813.864544]  blk_execute_rq_nowait+0x1d8/0x400
[ 3813.865220]  sg_common_write.isra.0+0xe61/0x2420
[ 3813.871637]  sg_write+0x6c8/0xef0
[ 3813.878853]  __vfs_write+0xe4/0x800
[ 3813.883487]  vfs_write+0x17b/0x530
[ 3813.884008]  ksys_write+0x103/0x270
[ 3813.886268]  __x64_sys_write+0x77/0xc0
[ 3813.886841]  do_syscall_64+0x106/0x360
[ 3813.887415]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

This issue can be reproduced with the following syzkaller log:

r0 = openat(0xffffffffffffff9c, &amp;(0x7f0000000040)='./file0\x00', 0x26e1, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &amp;(0x7f0000000000)='fd/3\x00')
open_by_handle_at(r1, &amp;(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)
r2 = syz_open_dev$sg(&amp;(0x7f0000000000), 0x0, 0x40782)
write$binfmt_aout(r2, &amp;(0x7f0000000340)=ANY=[@ANYBLOB="00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d"], 0x126)

In resp_readcap16() we get "int alloc_len" value -1104926854, and then pass
the huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This
leads to OOB in sg_copy_buffer().

To solve this issue, define alloc_len as u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47192" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: sysfs: Fix hang when device state is set via sysfs

This fixes a regression added with:

commit f0f82e2476f6 ("scsi: core: Fix capacity set to zero after
offlinining device")

The problem is that after iSCSI recovery, iscsid will call into the kernel
to set the dev's state to running, and with that patch we now call
scsi_rescan_device() with the state_mutex held. If the SCSI error handler
thread is just starting to test the device in scsi_send_eh_cmnd() then it's
going to try to grab the state_mutex.

We are then stuck, because when scsi_rescan_device() tries to send its I/O
scsi_queue_rq() calls -&gt; scsi_host_queue_ready() -&gt; scsi_host_in_recovery()
which will return true (the host state is still in recovery) and I/O will
just be requeued. scsi_send_eh_cmnd() will then never be able to grab the
state_mutex to finish error handling.

To prevent the deadlock move the rescan-related code to after we drop the
state_mutex.

This also adds a check for if we are already in the running state. This
prevents extra scans and helps the iscsid case where if the transport class
has already onlined the device during its recovery process then we don't
need userspace to do it again plus possibly block that daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47193" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Fix memory leak during rmmod

Driver failed to release all memory allocated. This would lead to memory
leak during driver removal.

Properly free memory when the module is removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47194" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: call cfg80211_stop_ap when switch from P2P_GO type

If the userspace tools switch from NL80211_IFTYPE_P2P_GO to
NL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it
does not call the cleanup cfg80211_stop_ap(), this leads to the
initialization of in-use data. For example, this path re-init the
sdata-&gt;assigned_chanctx_list while it is still an element of
assigned_vifs list, and makes that linked list corrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fix use-after-free of the add_lock mutex

Commit 6098475d4cb4 ("spi: Fix deadlock when adding SPI controllers on
SPI buses") introduced a per-controller mutex. But mutex_unlock() of
said lock is called after the controller is already freed:

  spi_unregister_controller(ctlr)
  -&gt; put_device(&amp;ctlr-&gt;dev)
    -&gt; spi_controller_release(dev)
  -&gt; mutex_unlock(&amp;ctrl-&gt;add_lock)

Move the put_device() after the mutex_unlock().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47196" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Set send and receive CQ before forwarding to the driver

Preset both receive and send CQ pointers prior to call to the drivers and
overwrite it later again till the mlx4 is going to be changed do not
overwrite ibqp properties.

This change is needed for mlx5, because in case of QP creation failure, it
will go to the path of QP destroy which relies on proper CQ pointers.

 BUG: KASAN: use-after-free in create_qp.cold+0x164/0x16e [mlx5_ib]
 Write of size 8 at addr ffff8880064c55c0 by task a.out/246

 CPU: 0 PID: 246 Comm: a.out Not tainted 5.15.0+ #291
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Call Trace:
  dump_stack_lvl+0x45/0x59
  print_address_description.constprop.0+0x1f/0x140
  kasan_report.cold+0x83/0xdf
  create_qp.cold+0x164/0x16e [mlx5_ib]
  mlx5_ib_create_qp+0x358/0x28a0 [mlx5_ib]
  create_qp.part.0+0x45b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Allocated by task 246:
  kasan_save_stack+0x1b/0x40
  __kasan_kmalloc+0xa4/0xd0
  create_qp.part.0+0x92/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 Freed by task 246:
  kasan_save_stack+0x1b/0x40
  kasan_set_track+0x1c/0x30
  kasan_set_free_info+0x20/0x30
  __kasan_slab_free+0x10c/0x150
  slab_free_freelist_hook+0xb4/0x1b0
  kfree+0xe7/0x2a0
  create_qp.part.0+0x52b/0x6a0 [ib_core]
  ib_create_qp_user+0x97/0x150 [ib_core]
  ib_uverbs_handler_UVERBS_METHOD_QP_CREATE+0x92c/0x1250 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x1c38/0x3150 [ib_uverbs]
  ib_uverbs_ioctl+0x169/0x260 [ib_uverbs]
  __x64_sys_ioctl+0x866/0x14d0
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: nullify cq-&gt;dbg pointer in mlx5_debug_cq_remove()

Prior to this patch in case mlx5_core_destroy_cq() failed it proceeds
to rest of destroy operations. mlx5_core_destroy_cq() could be called again
by user and cause additional call of mlx5_debug_cq_remove().
cq-&gt;dbg was not nullify in previous call and cause the crash.

Fix it by nullify cq-&gt;dbg pointer after removal.

Also proceed to destroy operations only if FW return 0
for MLX5_CMD_OP_DESTROY_CQ command.

general protection fault, probably for non-canonical address 0x2000300004058: 0000 [#1] SMP PTI
CPU: 5 PID: 1228 Comm: python Not tainted 5.15.0-rc5_for_upstream_min_debug_2021_10_14_11_06 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:lockref_get+0x1/0x60
Code: 5d e9 53 ff ff ff 48 8d 7f 70 e8 0a 2e 48 00 c7 85 d0 00 00 00 02
00 00 00 c6 45 70 00 fb 5d c3 c3 cc cc cc cc cc cc cc cc 53 &lt;48&gt; 8b 17
48 89 fb 85 d2 75 3d 48 89 d0 bf 64 00 00 00 48 89 c1 48
RSP: 0018:ffff888137dd7a38 EFLAGS: 00010206
RAX: 0000000000000000 RBX: ffff888107d5f458 RCX: 00000000fffffffe
RDX: 000000000002c2b0 RSI: ffffffff8155e2e0 RDI: 0002000300004058
RBP: ffff888137dd7a88 R08: 0002000300004058 R09: ffff8881144a9f88
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881141d4000
R13: ffff888137dd7c68 R14: ffff888137dd7d58 R15: ffff888137dd7cc0
FS:  00007f4644f2a4c0(0000) GS:ffff8887a2d40000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055b4500f4380 CR3: 0000000114f7a003 CR4: 0000000000170ea0
Call Trace:
  simple_recursive_removal+0x33/0x2e0
  ? debugfs_remove+0x60/0x60
  debugfs_remove+0x40/0x60
  mlx5_debug_cq_remove+0x32/0x70 [mlx5_core]
  mlx5_core_destroy_cq+0x41/0x1d0 [mlx5_core]
  devx_obj_cleanup+0x151/0x330 [mlx5_ib]
  ? __pollwait+0xd0/0xd0
  ? xas_load+0x5/0x70
  ? xa_load+0x62/0xa0
  destroy_hw_idr_uobject+0x20/0x80 [ib_uverbs]
  uverbs_destroy_uobject+0x3b/0x360 [ib_uverbs]
  uobj_destroy+0x54/0xa0 [ib_uverbs]
  ib_uverbs_cmd_verbs+0xaf2/0x1160 [ib_uverbs]
  ? uverbs_finalize_object+0xd0/0xd0 [ib_uverbs]
  ib_uverbs_ioctl+0xc4/0x1b0 [ib_uverbs]
  __x64_sys_ioctl+0x3e4/0x8e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine

An error is detected with the following report when unloading the driver:
  "KASAN: use-after-free in lpfc_unreg_rpi+0x1b1b"

The NLP_REG_LOGIN_SEND nlp_flag is set in lpfc_reg_fab_ctrl_node(), but the
flag is not cleared upon completion of the login.

This allows a second call to lpfc_unreg_rpi() to proceed with nlp_rpi set
to LPFC_RPI_ALLOW_ERROR.  This results in a use after free access when used
as an rpi_ids array index.

Fix by clearing the NLP_REG_LOGIN_SEND nlp_flag in
lpfc_mbx_cmpl_fc_reg_login().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT, Fix multiple allocations and memleak of mod acts

CT clear action offload adds additional mod hdr actions to the
flow's original mod actions in order to clear the registers which
hold ct_state.
When such flow also includes encap action, a neigh update event
can cause the driver to unoffload the flow and then reoffload it.

Each time this happens, the ct clear handling adds that same set
of mod hdr actions to reset ct_state until the max of mod hdr
actions is reached.

Also the driver never releases the allocated mod hdr actions and
causing a memleak.

Fix above two issues by moving CT clear mod acts allocation
into the parsing actions phase and only use it when offloading the rule.
The release of mod acts will be done in the normal flow_put().

 backtrace:
    [&lt;000000007316e2f3&gt;] krealloc+0x83/0xd0
    [&lt;00000000ef157de1&gt;] mlx5e_mod_hdr_alloc+0x147/0x300 [mlx5_core]
    [&lt;00000000970ce4ae&gt;] mlx5e_tc_match_to_reg_set_and_get_id+0xd7/0x240 [mlx5_core]
    [&lt;0000000067c5fa17&gt;] mlx5e_tc_match_to_reg_set+0xa/0x20 [mlx5_core]
    [&lt;00000000d032eb98&gt;] mlx5_tc_ct_entry_set_registers.isra.0+0x36/0xc0 [mlx5_core]
    [&lt;00000000fd23b869&gt;] mlx5_tc_ct_flow_offload+0x272/0x1f10 [mlx5_core]
    [&lt;000000004fc24acc&gt;] mlx5e_tc_offload_fdb_rules.part.0+0x150/0x620 [mlx5_core]
    [&lt;00000000dc741c17&gt;] mlx5e_tc_encap_flows_add+0x489/0x690 [mlx5_core]
    [&lt;00000000e92e49d7&gt;] mlx5e_rep_update_flows+0x6e4/0x9b0 [mlx5_core]
    [&lt;00000000f60f5602&gt;] mlx5e_rep_neigh_update+0x39a/0x5d0 [mlx5_core]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47200" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap

drm_gem_ttm_mmap() drops a reference to the gem object on success. If
the gem object's refcount == 1 on entry to drm_gem_prime_mmap(), that
drop will free the gem object, and the subsequent drm_gem_object_get()
will be a UAF. Fix by grabbing a reference before calling the mmap
helper.

This issue was forseen when the reference dropping was adding in
commit 9786b65bc61ac ("drm/ttm: fix mmap refcounting"):
  "For that to work properly the drm_gem_object_get() call in
  drm_gem_ttm_mmap() must be moved so it happens before calling
  obj-&gt;funcs-&gt;mmap(), otherwise the gem refcount would go down
  to zero."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47201" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: free q_vectors before queues in iavf_disable_vf

iavf_free_queues() clears adapter-&gt;num_active_queues, which
iavf_free_q_vectors() relies on, so swap the order of these two function
calls in iavf_disable_vf(). This resolves a panic encountered when the
interface is disabled and then later brought up again after PF
communication is restored.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47202" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: Fix NULL pointer dereferences in of_thermal_ functions

of_parse_thermal_zones() parses the thermal-zones node and registers a
thermal_zone device for each subnode. However, if a thermal zone is
consuming a thermal sensor and that thermal sensor device hasn't probed
yet, an attempt to set trip_point_*_temp for that thermal zone device
can cause a NULL pointer dereference. Fix it.

 console:/sys/class/thermal/thermal_zone87 # echo 120000 &gt; trip_point_0_temp
 ...
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
 ...
 Call trace:
  of_thermal_set_trip_temp+0x40/0xc4
  trip_point_temp_store+0xc0/0x1dc
  dev_attr_store+0x38/0x88
  sysfs_kf_write+0x64/0xc0
  kernfs_fop_write_iter+0x108/0x1d0
  vfs_write+0x2f4/0x368
  ksys_write+0x7c/0xec
  __arm64_sys_write+0x20/0x30
  el0_svc_common.llvm.7279915941325364641+0xbc/0x1bc
  do_el0_svc+0x28/0xa0
  el0_svc+0x14/0x24
  el0_sync_handler+0x88/0xec
  el0_sync+0x1c0/0x200

While at it, fix the possible NULL pointer dereference in other
functions as well: of_thermal_get_temp(), of_thermal_set_emul_temp(),
of_thermal_get_trend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-28"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47203" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()

When parsing the txq list in lpfc_drain_txq(), the driver attempts to pass
the requests to the adapter. If such an attempt fails, a local "fail_msg"
string is set and a log message output.  The job is then added to a
completions list for cancellation.

Processing of any further jobs from the txq list continues, but since
"fail_msg" remains set, jobs are added to the completions list regardless
of whether a wqe was passed to the adapter.  If successfully added to
txcmplq, jobs are added to both lists resulting in list corruption.

Fix by clearing the fail_msg string after adding a job to the completions
list. This stops the subsequent jobs from being added to the completions
list unless they had an appropriate failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-29"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47204" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove

Access to netdev after free_netdev() will cause use-after-free bug.
Move debug log before free_netdev() call to avoid it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47205" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: Unregister clocks/resets when unbinding

Currently, unbinding a CCU driver unmaps the device's MMIO region, while
leaving its clocks/resets and their providers registered. This can cause
a page fault later when some clock operation tries to perform MMIO. Fix
this by separating the CCU initialization from the memory allocation,
and then using a devres callback to unregister the clocks and resets.

This also fixes a memory leak of the `struct ccu_reset`, and uses the
correct owner (the specific platform driver) for the clocks and resets.

Early OF clock providers are never unregistered, and limited error
handling is possible, so they are mostly unchanged. The error reporting
is made more consistent by moving the message inside of_sunxi_ccu_probe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47206" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: ohci-tmio: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47207" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: gus: fix null pointer dereference on pointer block

The pointer block return from snd_gf1_dma_next_block could be
null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47209" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Prevent dead task groups from regaining cfs_rq's

Kevin is reporting crashes which point to a use-after-free of a cfs_rq
in update_blocked_averages(). Initial debugging revealed that we've
live cfs_rq's (on_list=1) in an about to be kfree()'d task group in
free_fair_sched_group(). However, it was unclear how that can happen.

His kernel config happened to lead to a layout of struct sched_entity
that put the 'my_q' member directly into the middle of the object
which makes it incidentally overlap with SLUB's freelist pointer.
That, in combination with SLAB_FREELIST_HARDENED's freelist pointer
mangling, leads to a reliable access violation in form of a #GP which
made the UAF fail fast.

Michal seems to have run into the same issue[1]. He already correctly
diagnosed that commit a7b359fc6a37 ("sched/fair: Correctly insert
cfs_rq's to list on unthrottle") is causing the preconditions for the
UAF to happen by re-adding cfs_rq's also to task groups that have no
more running tasks, i.e. also to dead ones. His analysis, however,
misses the real root cause and it cannot be seen from the crash
backtrace only, as the real offender is tg_unthrottle_up() getting
called via sched_cfs_period_timer() via the timer interrupt at an
inconvenient time.

When unregister_fair_sched_group() unlinks all cfs_rq's from the dying
task group, it doesn't protect itself from getting interrupted. If the
timer interrupt triggers while we iterate over all CPUs or after
unregister_fair_sched_group() has finished but prior to unlinking the
task group, sched_cfs_period_timer() will execute and walk the list of
task groups, trying to unthrottle cfs_rq's, i.e. re-add them to the
dying task group. These will later -- in free_fair_sched_group() -- be
kfree()'ed while still being linked, leading to the fireworks Kevin
and Michal are seeing.

To fix this race, ensure the dying task group gets unlinked first.
However, simply switching the order of unregistering and unlinking the
task group isn't sufficient, as concurrent RCU walkers might still see
it, as can be seen below:

    CPU1:                                      CPU2:
      :                                        timer IRQ:
      :                                          do_sched_cfs_period_timer():
      :                                            :
      :                                            distribute_cfs_runtime():
      :                                              rcu_read_lock();
      :                                              :
      :                                              unthrottle_cfs_rq():
    sched_offline_group():                             :
      :                                                walk_tg_tree_from(…,tg_unthrottle_up,…):
      list_del_rcu(&amp;tg-&gt;list);                           :
 (1)  :                                                  list_for_each_entry_rcu(child, &amp;parent-&gt;children, siblings)
      :                                                    :
 (2)  list_del_rcu(&amp;tg-&gt;siblings);                         :
      :                                                    tg_unthrottle_up():
      unregister_fair_sched_group():                         struct cfs_rq *cfs_rq = tg-&gt;cfs_rq[cpu_of(rq)];
        :                                                    :
        list_del_leaf_cfs_rq(tg-&gt;cfs_rq[cpu]);               :
        :                                                    :
        :                                                    if (!cfs_rq_is_decayed(cfs_rq) || cfs_rq-&gt;nr_running)
 (3)    :                                                        list_add_leaf_cfs_rq(cfs_rq);
      :                                                      :
      :                                                    :
      :                                                  :
      :                                                :
      :                           
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47210" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Remove WARN_ON in tps6598x_block_read

Calling tps6598x_block_read with a higher than allowed len can be
handled by just returning an error. There's no need to crash systems
with panic-on-warn enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47211" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: fix null pointer dereference on pointer cs_desc

The pointer cs_desc return from snd_usb_find_clock_source could
be null, so there is a potential null pointer dereference issue.
Fix this by adding a null check before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47212" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Update error handler for UCTX and UMEM

In the fast unload flow, the device state is set to internal error,
which indicates that the driver started the destroy process.
In this case, when a destroy command is being executed, it should return
MLX5_CMD_STAT_OK.
Fix MLX5_CMD_OP_DESTROY_UCTX and MLX5_CMD_OP_DESTROY_UMEM to return OK
instead of EIO.

This fixes a call trace in the umem release process -
[ 2633.536695] Call Trace:
[ 2633.537518]  ib_uverbs_remove_one+0xc3/0x140 [ib_uverbs]
[ 2633.538596]  remove_client_context+0x8b/0xd0 [ib_core]
[ 2633.539641]  disable_device+0x8c/0x130 [ib_core]
[ 2633.540615]  __ib_unregister_device+0x35/0xa0 [ib_core]
[ 2633.541640]  ib_unregister_device+0x21/0x30 [ib_core]
[ 2633.542663]  __mlx5_ib_remove+0x38/0x90 [mlx5_ib]
[ 2633.543640]  auxiliary_bus_remove+0x1e/0x30 [auxiliary]
[ 2633.544661]  device_release_driver_internal+0x103/0x1f0
[ 2633.545679]  bus_remove_device+0xf7/0x170
[ 2633.546640]  device_del+0x181/0x410
[ 2633.547606]  mlx5_rescan_drivers_locked.part.10+0x63/0x160 [mlx5_core]
[ 2633.548777]  mlx5_unregister_device+0x27/0x40 [mlx5_core]
[ 2633.549841]  mlx5_uninit_one+0x21/0xc0 [mlx5_core]
[ 2633.550864]  remove_one+0x69/0xe0 [mlx5_core]
[ 2633.551819]  pci_device_remove+0x3b/0xc0
[ 2633.552731]  device_release_driver_internal+0x103/0x1f0
[ 2633.553746]  unbind_store+0xf6/0x130
[ 2633.554657]  kernfs_fop_write+0x116/0x190
[ 2633.555567]  vfs_write+0xa5/0x1a0
[ 2633.556407]  ksys_write+0x4f/0xb0
[ 2633.557233]  do_syscall_64+0x5b/0x1a0
[ 2633.558071]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 2633.559018] RIP: 0033:0x7f9977132648
[ 2633.559821] Code: 89 02 48 c7 c0 ff ff ff ff eb b3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 55 6f 2d 00 8b 00 85 c0 75 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 49 89 d4 55
[ 2633.562332] RSP: 002b:00007fffb1a83888 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 2633.563472] RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007f9977132648
[ 2633.564541] RDX: 000000000000000c RSI: 000055b90546e230 RDI: 0000000000000001
[ 2633.565596] RBP: 000055b90546e230 R08: 00007f9977406860 R09: 00007f9977a54740
[ 2633.566653] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f99774056e0
[ 2633.567692] R13: 000000000000000c R14: 00007f9977400880 R15: 000000000000000c
[ 2633.568725] ---[ end trace 10b4fe52945e544d ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47213" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47213" ref_url="https://www.suse.com/security/cve/CVE-2021-47213" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47213/">CVE-2021-47213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47213">CVE-2021-47213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230902">SUSE bug 1230902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47214" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47214" ref_url="https://www.suse.com/security/cve/CVE-2021-47214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hugetlb, userfaultfd: fix reservation restore on userfaultfd error

Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we
bail out using "goto out_release_unlock;" in the cases where idx &gt;=
size, or !huge_pte_none(), the code will detect that new_pagecache_page
== false, and so call restore_reserve_on_error().  In this case I see
restore_reserve_on_error() delete the reservation, and the following
call to remove_inode_hugepages() will increment h-&gt;resv_hugepages
causing a 100% reproducible leak.

We should treat the is_continue case similar to adding a page into the
pagecache and set new_pagecache_page to true, to indicate that there is
no reservation to restore on the error path, and we need not call
restore_reserve_on_error().  Rename new_pagecache_page to
page_in_pagecache to make that clear.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47214/">CVE-2021-47214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47214">CVE-2021-47214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222710">SUSE bug 1222710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47215" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: kTLS, Fix crash in RX resync flow

For the TLS RX resync flow, we maintain a list of TLS contexts
that require some attention, to communicate their resync information
to the HW.
Here we fix list corruptions, by protecting the entries against
movements coming from resync_handle_seq_match(), until their resync
handling in napi is fully completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47216" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: advansys: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long' and printed with %lx.

Change %lx to %p to print the hashed pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47217" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails

Check for a valid hv_vp_index array prior to derefencing hv_vp_index when
setting Hyper-V's TSC change callback.  If Hyper-V setup failed in
hyperv_init(), the kernel will still report that it's running under
Hyper-V, but will have silently disabled nearly all functionality.

  BUG: kernel NULL pointer dereference, address: 0000000000000010
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 4 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc2+ #75
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:set_hv_tscchange_cb+0x15/0xa0
  Code: &lt;8b&gt; 04 82 8b 15 12 17 85 01 48 c1 e0 20 48 0d ee 00 01 00 f6 c6 08
  ...
  Call Trace:
   kvm_arch_init+0x17c/0x280
   kvm_init+0x31/0x330
   vmx_init+0xba/0x13a
   do_one_initcall+0x41/0x1c0
   kernel_init_freeable+0x1f2/0x23b
   kernel_init+0x16/0x120
   ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47218" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: fix NULL-pointer dereference when hashtab allocation fails

When the hash table slot array allocation fails in hashtab_init(),
h-&gt;size is left initialized with a non-zero value, but the h-&gt;htable
pointer is NULL. This may then cause a NULL pointer dereference, since
the policydb code relies on the assumption that even after a failed
hashtab_init(), hashtab_map() and hashtab_destroy() can be safely called
on it. Yet, these detect an empty hashtab only by looking at the size.

Fix this by making sure that hashtab_init() always leaves behind a valid
empty hashtab when the allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47219" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()

The following issue was observed running syzkaller:

BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]
BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
Read of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815

CPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0xe4/0x14a lib/dump_stack.c:118
 print_address_description+0x73/0x280 mm/kasan/report.c:253
 kasan_report_error mm/kasan/report.c:352 [inline]
 kasan_report+0x272/0x370 mm/kasan/report.c:410
 memcpy+0x1f/0x50 mm/kasan/kasan.c:302
 memcpy include/linux/string.h:377 [inline]
 sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831
 fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021
 resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772
 schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429
 scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835
 scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896
 scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034
 __blk_run_queue_uncond block/blk-core.c:464 [inline]
 __blk_run_queue+0x1a4/0x380 block/blk-core.c:484
 blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78
 sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847
 sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716
 sg_write+0x64/0xa0 drivers/scsi/sg.c:622
 __vfs_write+0xed/0x690 fs/read_write.c:485
kill_bdev:block_device:00000000e138492c
 vfs_write+0x184/0x4c0 fs/read_write.c:549
 ksys_write+0x107/0x240 fs/read_write.c:599
 do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293
 entry_SYSCALL_64_after_hwframe+0x49/0xbe

We get 'alen' from command its type is int. If userspace passes a large
length we will get a negative 'alen'.

Switch n, alen, and rlen to u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47220" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47220" ref_url="https://www.suse.com/security/cve/CVE-2021-47220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47220/">CVE-2021-47220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47220">CVE-2021-47220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224859">SUSE bug 1224859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47221" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47221" ref_url="https://www.suse.com/security/cve/CVE-2021-47221" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: actually fix freelist pointer vs redzoning

It turns out that SLUB redzoning ("slub_debug=Z") checks from
s-&gt;object_size rather than from s-&gt;inuse (which is normally bumped to
make room for the freelist pointer), so a cache created with an object
size less than 24 would have the freelist pointer written beyond
s-&gt;object_size, causing the redzone to be corrupted by the freelist
pointer.  This was very visible with "slub_debug=ZF":

  BUG test (Tainted: G    B            ): Right Redzone overwritten
  -----------------------------------------------------------------------------

  INFO: 0xffff957ead1c05de-0xffff957ead1c05df @offset=1502. First byte 0x1a instead of 0xbb
  INFO: Slab 0xffffef3950b47000 objects=170 used=170 fp=0x0000000000000000 flags=0x8000000000000200
  INFO: Object 0xffff957ead1c05d8 @offset=1496 fp=0xffff957ead1c0620

  Redzone  (____ptrval____): bb bb bb bb bb bb bb bb               ........
  Object   (____ptrval____): 00 00 00 00 00 f6 f4 a5               ........
  Redzone  (____ptrval____): 40 1d e8 1a aa                        @....
  Padding  (____ptrval____): 00 00 00 00 00 00 00 00               ........

Adjust the offset to stay within s-&gt;object_size.

(Note that no caches of in this size range are known to exist in the
kernel currently.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47221/">CVE-2021-47221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47221">CVE-2021-47221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224858">SUSE bug 1224858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47222" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47222" ref_url="https://www.suse.com/security/cve/CVE-2021-47222" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix vlan tunnel dst refcnt when egressing

The egress tunnel code uses dst_clone() and directly sets the result
which is wrong because the entry might have 0 refcnt or be already deleted,
causing number of problems. It also triggers the WARN_ON() in dst_hold()[1]
when a refcnt couldn't be taken. Fix it by using dst_hold_safe() and
checking if a reference was actually taken before setting the dst.

[1] dmesg WARN_ON log and following refcnt errors
 WARNING: CPU: 5 PID: 38 at include/net/dst.h:230 br_handle_egress_vlan_tunnel+0x10b/0x134 [bridge]
 Modules linked in: 8021q garp mrp bridge stp llc bonding ipv6 virtio_net
 CPU: 5 PID: 38 Comm: ksoftirqd/5 Kdump: loaded Tainted: G        W         5.13.0-rc3+ #360
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014
 RIP: 0010:br_handle_egress_vlan_tunnel+0x10b/0x134 [bridge]
 Code: e8 85 bc 01 e1 45 84 f6 74 90 45 31 f6 85 db 48 c7 c7 a0 02 19 a0 41 0f 94 c6 31 c9 31 d2 44 89 f6 e8 64 bc 01 e1 85 db 75 02 &lt;0f&gt; 0b 31 c9 31 d2 44 89 f6 48 c7 c7 70 02 19 a0 e8 4b bc 01 e1 49
 RSP: 0018:ffff8881003d39e8 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffffa01902a0
 RBP: ffff8881040c6700 R08: 0000000000000000 R09: 0000000000000001
 R10: 2ce93d0054fe0d00 R11: 54fe0d00000e0000 R12: ffff888109515000
 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000401
 FS:  0000000000000000(0000) GS:ffff88822bf40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f42ba70f030 CR3: 0000000109926000 CR4: 00000000000006e0
 Call Trace:
  br_handle_vlan+0xbc/0xca [bridge]
  __br_forward+0x23/0x164 [bridge]
  deliver_clone+0x41/0x48 [bridge]
  br_handle_frame_finish+0x36f/0x3aa [bridge]
  ? skb_dst+0x2e/0x38 [bridge]
  ? br_handle_ingress_vlan_tunnel+0x3e/0x1c8 [bridge]
  ? br_handle_frame_finish+0x3aa/0x3aa [bridge]
  br_handle_frame+0x2c3/0x377 [bridge]
  ? __skb_pull+0x33/0x51
  ? vlan_do_receive+0x4f/0x36a
  ? br_handle_frame_finish+0x3aa/0x3aa [bridge]
  __netif_receive_skb_core+0x539/0x7c6
  ? __list_del_entry_valid+0x16e/0x1c2
  __netif_receive_skb_list_core+0x6d/0xd6
  netif_receive_skb_list_internal+0x1d9/0x1fa
  gro_normal_list+0x22/0x3e
  dev_gro_receive+0x55b/0x600
  ? detach_buf_split+0x58/0x140
  napi_gro_receive+0x94/0x12e
  virtnet_poll+0x15d/0x315 [virtio_net]
  __napi_poll+0x2c/0x1c9
  net_rx_action+0xe6/0x1fb
  __do_softirq+0x115/0x2d8
  run_ksoftirqd+0x18/0x20
  smpboot_thread_fn+0x183/0x19c
  ? smpboot_unregister_percpu_thread+0x66/0x66
  kthread+0x10a/0x10f
  ? kthread_mod_delayed_work+0xb6/0xb6
  ret_from_fork+0x22/0x30
 ---[ end trace 49f61b07f775fd2b ]---
 dst_release: dst:00000000c02d677a refcnt:-1
 dst_release underflow
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47222/">CVE-2021-47222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47222">CVE-2021-47222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224857">SUSE bug 1224857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47223" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47223" ref_url="https://www.suse.com/security/cve/CVE-2021-47223" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix vlan tunnel dst null pointer dereference

This patch fixes a tunnel_dst null pointer dereference due to lockless
access in the tunnel egress path. When deleting a vlan tunnel the
tunnel_dst pointer is set to NULL without waiting a grace period (i.e.
while it's still usable) and packets egressing are dereferencing it
without checking. Use READ/WRITE_ONCE to annotate the lockless use of
tunnel_id, use RCU for accessing tunnel_dst and make sure it is read
only once and checked in the egress path. The dst is already properly RCU
protected so we don't need to do anything fancy than to make sure
tunnel_id and tunnel_dst are read only once and checked in the egress path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47223/">CVE-2021-47223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47223">CVE-2021-47223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224856">SUSE bug 1224856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47224" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47224" ref_url="https://www.suse.com/security/cve/CVE-2021-47224" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ll_temac: Make sure to free skb when it is completely used

With the skb pointer piggy-backed on the TX BD, we have a simple and
efficient way to free the skb buffer when the frame has been transmitted.
But in order to avoid freeing the skb while there are still fragments from
the skb in use, we need to piggy-back on the TX BD of the skb, not the
first.

Without this, we are doing use-after-free on the DMA side, when the first
BD of a multi TX BD packet is seen as completed in xmit_done, and the
remaining BDs are still being processed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47224/">CVE-2021-47224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47224">CVE-2021-47224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224855">SUSE bug 1224855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47225" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47225" ref_url="https://www.suse.com/security/cve/CVE-2021-47225" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix deadlock in AP/VLAN handling

Syzbot reports that when you have AP_VLAN interfaces that are up
and close the AP interface they belong to, we get a deadlock. No
surprise - since we dev_close() them with the wiphy mutex held,
which goes back into the netdev notifier in cfg80211 and tries to
acquire the wiphy mutex there.

To fix this, we need to do two things:
 1) prevent changing iftype while AP_VLANs are up, we can't
    easily fix this case since cfg80211 already calls us with
    the wiphy mutex held, but change_interface() is relatively
    rare in drivers anyway, so changing iftype isn't used much
    (and userspace has to fall back to down/change/up anyway)
 2) pull the dev_close() loop over VLANs out of the wiphy mutex
    section in the normal stop case
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47225/">CVE-2021-47225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47225">CVE-2021-47225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224828">SUSE bug 1224828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47226" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47226" ref_url="https://www.suse.com/security/cve/CVE-2021-47226" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer

Both Intel and AMD consider it to be architecturally valid for XRSTOR to
fail with #PF but nonetheless change the register state.  The actual
conditions under which this might occur are unclear [1], but it seems
plausible that this might be triggered if one sibling thread unmaps a page
and invalidates the shared TLB while another sibling thread is executing
XRSTOR on the page in question.

__fpu__restore_sig() can execute XRSTOR while the hardware registers
are preserved on behalf of a different victim task (using the
fpu_fpregs_owner_ctx mechanism), and, in theory, XRSTOR could fail but
modify the registers.

If this happens, then there is a window in which __fpu__restore_sig()
could schedule out and the victim task could schedule back in without
reloading its own FPU registers. This would result in part of the FPU
state that __fpu__restore_sig() was attempting to load leaking into the
victim task's user-visible state.

Invalidate preserved FPU registers on XRSTOR failure to prevent this
situation from corrupting any state.

[1] Frequent readers of the errata lists might imagine "complex
    microarchitectural conditions".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47226/">CVE-2021-47226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47226">CVE-2021-47226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224851">SUSE bug 1224851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47227" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47227" ref_url="https://www.suse.com/security/cve/CVE-2021-47227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Prevent state corruption in __fpu__restore_sig()

The non-compacted slowpath uses __copy_from_user() and copies the entire
user buffer into the kernel buffer, verbatim.  This means that the kernel
buffer may now contain entirely invalid state on which XRSTOR will #GP.
validate_user_xstate_header() can detect some of that corruption, but that
leaves the onus on callers to clear the buffer.

Prior to XSAVES support, it was possible just to reinitialize the buffer,
completely, but with supervisor states that is not longer possible as the
buffer clearing code split got it backwards. Fixing that is possible but
not corrupting the state in the first place is more robust.

Avoid corruption of the kernel XSAVE buffer by using copy_user_to_xstate()
which validates the XSAVE header contents before copying the actual states
to the kernel. copy_user_to_xstate() was previously only called for
compacted-format kernel buffers, but it works for both compacted and
non-compacted forms.

Using it for the non-compacted form is slower because of multiple
__copy_from_user() operations, but that cost is less important than robust
code in an already slow path.

[ Changelog polished by Dave Hansen ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47227/">CVE-2021-47227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47227">CVE-2021-47227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224852">SUSE bug 1224852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47228" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47228" ref_url="https://www.suse.com/security/cve/CVE-2021-47228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/ioremap: Map EFI-reserved memory as encrypted for SEV

Some drivers require memory that is marked as EFI boot services
data. In order for this memory to not be re-used by the kernel
after ExitBootServices(), efi_mem_reserve() is used to preserve it
by inserting a new EFI memory descriptor and marking it with the
EFI_MEMORY_RUNTIME attribute.

Under SEV, memory marked with the EFI_MEMORY_RUNTIME attribute needs to
be mapped encrypted by Linux, otherwise the kernel might crash at boot
like below:

  EFI Variables Facility v0.08 2004-May-17
  general protection fault, probably for non-canonical address 0x3597688770a868b2: 0000 [#1] SMP NOPTI
  CPU: 13 PID: 1 Comm: swapper/0 Not tainted 5.12.4-2-default #1 openSUSE Tumbleweed
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:efi_mokvar_entry_next
  [...]
  Call Trace:
   efi_mokvar_sysfs_init
   ? efi_mokvar_table_init
   do_one_initcall
   ? __kmalloc
   kernel_init_freeable
   ? rest_init
   kernel_init
   ret_from_fork

Expand the __ioremap_check_other() function to additionally check for
this other type of boot data reserved at runtime and indicate that it
should be mapped encrypted for an SEV guest.

 [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47228/">CVE-2021-47228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47228">CVE-2021-47228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224826">SUSE bug 1224826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47229" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47229" ref_url="https://www.suse.com/security/cve/CVE-2021-47229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: aardvark: Fix kernel panic during PIO transfer

Trying to start a new PIO transfer by writing value 0 in PIO_START register
when previous transfer has not yet completed (which is indicated by value 1
in PIO_START) causes an External Abort on CPU, which results in kernel
panic:

    SError Interrupt on CPU0, code 0xbf000002 -- SError
    Kernel panic - not syncing: Asynchronous SError Interrupt

To prevent kernel panic, it is required to reject a new PIO transfer when
previous one has not finished yet.

If previous PIO transfer is not finished yet, the kernel may issue a new
PIO request only if the previous PIO transfer timed out.

In the past the root cause of this issue was incorrectly identified (as it
often happens during link retraining or after link down event) and special
hack was implemented in Trusted Firmware to catch all SError events in EL3,
to ignore errors with code 0xbf000002 and not forwarding any other errors
to kernel and instead throw panic from EL3 Trusted Firmware handler.

Links to discussion and patches about this issue:
https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git/commit/?id=3c7dcdac5c50
https://lore.kernel.org/linux-pci/20190316161243.29517-1-repk@triplefau.lt/
https://lore.kernel.org/linux-pci/971be151d24312cc533989a64bd454b4@www.loen.fr/
https://review.trustedfirmware.org/c/TF-A/trusted-firmware-a/+/1541

But the real cause was the fact that during link retraining or after link
down event the PIO transfer may take longer time, up to the 1.44s until it
times out. This increased probability that a new PIO transfer would be
issued by kernel while previous one has not finished yet.

After applying this change into the kernel, it is possible to revert the
mentioned TF-A hack and SError events do not have to be caught in TF-A EL3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47229/">CVE-2021-47229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47229">CVE-2021-47229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224854">SUSE bug 1224854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47230" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47230" ref_url="https://www.suse.com/security/cve/CVE-2021-47230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Immediately reset the MMU context when the SMM flag is cleared

Immediately reset the MMU context when the vCPU's SMM flag is cleared so
that the SMM flag in the MMU role is always synchronized with the vCPU's
flag.  If RSM fails (which isn't correctly emulated), KVM will bail
without calling post_leave_smm() and leave the MMU in a bad state.

The bad MMU role can lead to a NULL pointer dereference when grabbing a
shadow page's rmap for a page fault as the initial lookups for the gfn
will happen with the vCPU's SMM flag (=0), whereas the rmap lookup will
use the shadow page's SMM flag, which comes from the MMU (=1).  SMM has
an entirely different set of memslots, and so the initial lookup can find
a memslot (SMM=0) and then explode on the rmap memslot lookup (SMM=1).

  general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  CPU: 1 PID: 8410 Comm: syz-executor382 Not tainted 5.13.0-rc5-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:__gfn_to_rmap arch/x86/kvm/mmu/mmu.c:935 [inline]
  RIP: 0010:gfn_to_rmap+0x2b0/0x4d0 arch/x86/kvm/mmu/mmu.c:947
  Code: &lt;42&gt; 80 3c 20 00 74 08 4c 89 ff e8 f1 79 a9 00 4c 89 fb 4d 8b 37 44
  RSP: 0018:ffffc90000ffef98 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff888015b9f414 RCX: ffff888019669c40
  RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
  RBP: 0000000000000001 R08: ffffffff811d9cdb R09: ffffed10065a6002
  R10: ffffed10065a6002 R11: 0000000000000000 R12: dffffc0000000000
  R13: 0000000000000003 R14: 0000000000000001 R15: 0000000000000000
  FS:  000000000124b300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000028e31000 CR4: 00000000001526e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   rmap_add arch/x86/kvm/mmu/mmu.c:965 [inline]
   mmu_set_spte+0x862/0xe60 arch/x86/kvm/mmu/mmu.c:2604
   __direct_map arch/x86/kvm/mmu/mmu.c:2862 [inline]
   direct_page_fault+0x1f74/0x2b70 arch/x86/kvm/mmu/mmu.c:3769
   kvm_mmu_do_page_fault arch/x86/kvm/mmu.h:124 [inline]
   kvm_mmu_page_fault+0x199/0x1440 arch/x86/kvm/mmu/mmu.c:5065
   vmx_handle_exit+0x26/0x160 arch/x86/kvm/vmx/vmx.c:6122
   vcpu_enter_guest+0x3bdd/0x9630 arch/x86/kvm/x86.c:9428
   vcpu_run+0x416/0xc20 arch/x86/kvm/x86.c:9494
   kvm_arch_vcpu_ioctl_run+0x4e8/0xa40 arch/x86/kvm/x86.c:9722
   kvm_vcpu_ioctl+0x70f/0xbb0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3460
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:1069 [inline]
   __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:1055
   do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x440ce9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47230/">CVE-2021-47230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47230">CVE-2021-47230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224853">SUSE bug 1224853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47231" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47231" ref_url="https://www.suse.com/security/cve/CVE-2021-47231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcba_usb: fix memory leak in mcba_usb

Syzbot reported memory leak in SocketCAN driver for Microchip CAN BUS
Analyzer Tool. The problem was in unfreed usb_coherent.

In mcba_usb_start() 20 coherent buffers are allocated and there is
nothing, that frees them:

1) In callback function the urb is resubmitted and that's all
2) In disconnect function urbs are simply killed, but URB_FREE_BUFFER
   is not set (see mcba_usb_start) and this flag cannot be used with
   coherent buffers.

Fail log:
| [ 1354.053291][ T8413] mcba_usb 1-1:0.0 can0: device disconnected
| [ 1367.059384][ T8420] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmem)

So, all allocated buffers should be freed with usb_free_coherent()
explicitly

NOTE:
The same pattern for allocating and freeing coherent buffers
is used in drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47231/">CVE-2021-47231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47231">CVE-2021-47231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224849">SUSE bug 1224849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47232" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47232" ref_url="https://www.suse.com/security/cve/CVE-2021-47232" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: fix Use-after-Free, hold skb ref while in use

This patch fixes a Use-after-Free found by the syzbot.

The problem is that a skb is taken from the per-session skb queue,
without incrementing the ref count. This leads to a Use-after-Free if
the skb is taken concurrently from the session queue due to a CTS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47232/">CVE-2021-47232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47232">CVE-2021-47232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224848">SUSE bug 1224848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47233" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47233" ref_url="https://www.suse.com/security/cve/CVE-2021-47233" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: rt4801: Fix NULL pointer dereference if priv-&gt;enable_gpios is NULL

devm_gpiod_get_array_optional may return NULL if no GPIO was assigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47233/">CVE-2021-47233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47233">CVE-2021-47233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224850">SUSE bug 1224850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47234" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47234" ref_url="https://www.suse.com/security/cve/CVE-2021-47234" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init()

Use clk_disable_unprepare() in the error path of mtk_phy_init() to fix
some resource leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47234/">CVE-2021-47234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47234">CVE-2021-47234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224840">SUSE bug 1224840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47235" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47235" ref_url="https://www.suse.com/security/cve/CVE-2021-47235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: fix potential use-after-free in ec_bhf_remove

static void ec_bhf_remove(struct pci_dev *dev)
{
...
	struct ec_bhf_priv *priv = netdev_priv(net_dev);

	unregister_netdev(net_dev);
	free_netdev(net_dev);

	pci_iounmap(dev, priv-&gt;dma_io);
	pci_iounmap(dev, priv-&gt;io);
...
}

priv is netdev private data, but it is used
after free_netdev(). It can cause use-after-free when accessing priv
pointer. So, fix it by moving free_netdev() after pci_iounmap()
calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47235/">CVE-2021-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47235">CVE-2021-47235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224844">SUSE bug 1224844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47236" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47236" ref_url="https://www.suse.com/security/cve/CVE-2021-47236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: cdc_eem: fix tx fixup skb leak

when usbnet transmit a skb, eem fixup it in eem_tx_fixup(),
if skb_copy_expand() failed, it return NULL,
usbnet_start_xmit() will have no chance to free original skb.

fix it by free orginal skb in eem_tx_fixup() first,
then check skb clone status, if failed, return NULL to usbnet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47236/">CVE-2021-47236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47236">CVE-2021-47236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224841">SUSE bug 1224841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47237" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47237" ref_url="https://www.suse.com/security/cve/CVE-2021-47237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hamradio: fix memory leak in mkiss_close

My local syzbot instance hit memory leak in
mkiss_open()[1]. The problem was in missing
free_netdev() in mkiss_close().

In mkiss_open() netdevice is allocated and then
registered, but in mkiss_close() netdevice was
only unregistered, but not freed.

Fail log:

BUG: memory leak
unreferenced object 0xffff8880281ba000 (size 4096):
  comm "syz-executor.1", pid 11443, jiffies 4295046091 (age 17.660s)
  hex dump (first 32 bytes):
    61 78 30 00 00 00 00 00 00 00 00 00 00 00 00 00  ax0.............
    00 27 fa 2a 80 88 ff ff 00 00 00 00 00 00 00 00  .'.*............
  backtrace:
    [&lt;ffffffff81a27201&gt;] kvmalloc_node+0x61/0xf0
    [&lt;ffffffff8706e7e8&gt;] alloc_netdev_mqs+0x98/0xe80
    [&lt;ffffffff84e64192&gt;] mkiss_open+0xb2/0x6f0 [1]
    [&lt;ffffffff842355db&gt;] tty_ldisc_open+0x9b/0x110
    [&lt;ffffffff84236488&gt;] tty_set_ldisc+0x2e8/0x670
    [&lt;ffffffff8421f7f3&gt;] tty_ioctl+0xda3/0x1440
    [&lt;ffffffff81c9f273&gt;] __x64_sys_ioctl+0x193/0x200
    [&lt;ffffffff8911263a&gt;] do_syscall_64+0x3a/0xb0
    [&lt;ffffffff89200068&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8880141a9a00 (size 96):
  comm "syz-executor.1", pid 11443, jiffies 4295046091 (age 17.660s)
  hex dump (first 32 bytes):
    e8 a2 1b 28 80 88 ff ff e8 a2 1b 28 80 88 ff ff  ...(.......(....
    98 92 9c aa b0 40 02 00 00 00 00 00 00 00 00 00  .....@..........
  backtrace:
    [&lt;ffffffff8709f68b&gt;] __hw_addr_create_ex+0x5b/0x310
    [&lt;ffffffff8709fb38&gt;] __hw_addr_add_ex+0x1f8/0x2b0
    [&lt;ffffffff870a0c7b&gt;] dev_addr_init+0x10b/0x1f0
    [&lt;ffffffff8706e88b&gt;] alloc_netdev_mqs+0x13b/0xe80
    [&lt;ffffffff84e64192&gt;] mkiss_open+0xb2/0x6f0 [1]
    [&lt;ffffffff842355db&gt;] tty_ldisc_open+0x9b/0x110
    [&lt;ffffffff84236488&gt;] tty_set_ldisc+0x2e8/0x670
    [&lt;ffffffff8421f7f3&gt;] tty_ioctl+0xda3/0x1440
    [&lt;ffffffff81c9f273&gt;] __x64_sys_ioctl+0x193/0x200
    [&lt;ffffffff8911263a&gt;] do_syscall_64+0x3a/0xb0
    [&lt;ffffffff89200068&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff8880219bfc00 (size 512):
  comm "syz-executor.1", pid 11443, jiffies 4295046091 (age 17.660s)
  hex dump (first 32 bytes):
    00 a0 1b 28 80 88 ff ff 80 8f b1 8d ff ff ff ff  ...(............
    80 8f b1 8d ff ff ff ff 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff81a27201&gt;] kvmalloc_node+0x61/0xf0
    [&lt;ffffffff8706eec7&gt;] alloc_netdev_mqs+0x777/0xe80
    [&lt;ffffffff84e64192&gt;] mkiss_open+0xb2/0x6f0 [1]
    [&lt;ffffffff842355db&gt;] tty_ldisc_open+0x9b/0x110
    [&lt;ffffffff84236488&gt;] tty_set_ldisc+0x2e8/0x670
    [&lt;ffffffff8421f7f3&gt;] tty_ioctl+0xda3/0x1440
    [&lt;ffffffff81c9f273&gt;] __x64_sys_ioctl+0x193/0x200
    [&lt;ffffffff8911263a&gt;] do_syscall_64+0x3a/0xb0
    [&lt;ffffffff89200068&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae

BUG: memory leak
unreferenced object 0xffff888029b2b200 (size 256):
  comm "syz-executor.1", pid 11443, jiffies 4295046091 (age 17.660s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff81a27201&gt;] kvmalloc_node+0x61/0xf0
    [&lt;ffffffff8706f062&gt;] alloc_netdev_mqs+0x912/0xe80
    [&lt;ffffffff84e64192&gt;] mkiss_open+0xb2/0x6f0 [1]
    [&lt;ffffffff842355db&gt;] tty_ldisc_open+0x9b/0x110
    [&lt;ffffffff84236488&gt;] tty_set_ldisc+0x2e8/0x670
    [&lt;ffffffff8421f7f3&gt;] tty_ioctl+0xda3/0x1440
    [&lt;ffffffff81c9f273&gt;] __x64_sys_ioctl+0x193/0x200
    [&lt;ffffffff8911263a&gt;] do_syscall_64+0x3a/0xb0
    [&lt;ffffffff89200068&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47237/">CVE-2021-47237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47237">CVE-2021-47237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224830">SUSE bug 1224830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47238" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47238" ref_url="https://www.suse.com/security/cve/CVE-2021-47238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv4: fix memory leak in ip_mc_add1_src

BUG: memory leak
unreferenced object 0xffff888101bc4c00 (size 32):
  comm "syz-executor527", pid 360, jiffies 4294807421 (age 19.329s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    01 00 00 00 00 00 00 00 ac 14 14 bb 00 00 02 00 ................
  backtrace:
    [&lt;00000000f17c5244&gt;] kmalloc include/linux/slab.h:558 [inline]
    [&lt;00000000f17c5244&gt;] kzalloc include/linux/slab.h:688 [inline]
    [&lt;00000000f17c5244&gt;] ip_mc_add1_src net/ipv4/igmp.c:1971 [inline]
    [&lt;00000000f17c5244&gt;] ip_mc_add_src+0x95f/0xdb0 net/ipv4/igmp.c:2095
    [&lt;000000001cb99709&gt;] ip_mc_source+0x84c/0xea0 net/ipv4/igmp.c:2416
    [&lt;0000000052cf19ed&gt;] do_ip_setsockopt net/ipv4/ip_sockglue.c:1294 [inline]
    [&lt;0000000052cf19ed&gt;] ip_setsockopt+0x114b/0x30c0 net/ipv4/ip_sockglue.c:1423
    [&lt;00000000477edfbc&gt;] raw_setsockopt+0x13d/0x170 net/ipv4/raw.c:857
    [&lt;00000000e75ca9bb&gt;] __sys_setsockopt+0x158/0x270 net/socket.c:2117
    [&lt;00000000bdb993a8&gt;] __do_sys_setsockopt net/socket.c:2128 [inline]
    [&lt;00000000bdb993a8&gt;] __se_sys_setsockopt net/socket.c:2125 [inline]
    [&lt;00000000bdb993a8&gt;] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2125
    [&lt;000000006a1ffdbd&gt;] do_syscall_64+0x40/0x80 arch/x86/entry/common.c:47
    [&lt;00000000b11467c4&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae

In commit 24803f38a5c0 ("igmp: do not remove igmp souce list info when set
link down"), the ip_mc_clear_src() in ip_mc_destroy_dev() was removed,
because it was also called in igmpv3_clear_delrec().

Rough callgraph:

inetdev_destroy
-&gt; ip_mc_destroy_dev
     -&gt; igmpv3_clear_delrec
        -&gt; ip_mc_clear_src
-&gt; RCU_INIT_POINTER(dev-&gt;ip_ptr, NULL)

However, ip_mc_clear_src() called in igmpv3_clear_delrec() doesn't
release in_dev-&gt;mc_list-&gt;sources. And RCU_INIT_POINTER() assigns the
NULL to dev-&gt;ip_ptr. As a result, in_dev cannot be obtained through
inetdev_by_index() and then in_dev-&gt;mc_list-&gt;sources cannot be released
by ip_mc_del1_src() in the sock_close. Rough call sequence goes like:

sock_close
-&gt; __sock_release
   -&gt; inet_release
      -&gt; ip_mc_drop_socket
         -&gt; inetdev_by_index
         -&gt; ip_mc_leave_src
            -&gt; ip_mc_del_src
               -&gt; ip_mc_del1_src

So we still need to call ip_mc_clear_src() in ip_mc_destroy_dev() to free
in_dev-&gt;mc_list-&gt;sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47238/">CVE-2021-47238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47238">CVE-2021-47238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224847">SUSE bug 1224847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47239" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47239" ref_url="https://www.suse.com/security/cve/CVE-2021-47239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: fix possible use-after-free in smsc75xx_bind

The commit 46a8b29c6306 ("net: usb: fix memory leak in smsc75xx_bind")
fails to clean up the work scheduled in smsc75xx_reset-&gt;
smsc75xx_set_multicast, which leads to use-after-free if the work is
scheduled to start after the deallocation. In addition, this patch
also removes a dangling pointer - dev-&gt;data[0].

This patch calls cancel_work_sync to cancel the scheduled work and set
the dangling pointer to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47239/">CVE-2021-47239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47239">CVE-2021-47239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224846">SUSE bug 1224846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47240" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47240" ref_url="https://www.suse.com/security/cve/CVE-2021-47240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: fix OOB Read in qrtr_endpoint_post

Syzbot reported slab-out-of-bounds Read in
qrtr_endpoint_post. The problem was in wrong
_size_ type:

	if (len != ALIGN(size, 4) + hdrlen)
		goto err;

If size from qrtr_hdr is 4294967293 (0xfffffffd), the result of
ALIGN(size, 4) will be 0. In case of len == hdrlen and size == 4294967293
in header this check won't fail and

	skb_put_data(skb, data + hdrlen, size);

will read out of bound from data, which is hdrlen allocated block.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47240/">CVE-2021-47240 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47240">CVE-2021-47240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224843">SUSE bug 1224843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47241" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47241" ref_url="https://www.suse.com/security/cve/CVE-2021-47241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: strset: fix message length calculation

Outer nest for ETHTOOL_A_STRSET_STRINGSETS is not accounted for.
This may result in ETHTOOL_MSG_STRSET_GET producing a warning like:

    calculated message payload length (684) not sufficient
    WARNING: CPU: 0 PID: 30967 at net/ethtool/netlink.c:369 ethnl_default_doit+0x87a/0xa20

and a splat.

As usually with such warnings three conditions must be met for the warning
to trigger:
 - there must be no skb size rounding up (e.g. reply_size of 684);
 - string set must be per-device (so that the header gets populated);
 - the device name must be at least 12 characters long.

all in all with current user space it looks like reading priv flags
is the only place this could potentially happen. Or with syzbot :)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47241/">CVE-2021-47241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47241">CVE-2021-47241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224842">SUSE bug 1224842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47242" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47242" ref_url="https://www.suse.com/security/cve/CVE-2021-47242" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix soft lookup in subflow_error_report()

Maxim reported a soft lookup in subflow_error_report():

 watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper/0:0]
 RIP: 0010:native_queued_spin_lock_slowpath
 RSP: 0018:ffffa859c0003bc0 EFLAGS: 00000202
 RAX: 0000000000000101 RBX: 0000000000000001 RCX: 0000000000000000
 RDX: ffff9195c2772d88 RSI: 0000000000000000 RDI: ffff9195c2772d88
 RBP: ffff9195c2772d00 R08: 00000000000067b0 R09: c6e31da9eb1e44f4
 R10: ffff9195ef379700 R11: ffff9195edb50710 R12: ffff9195c2772d88
 R13: ffff9195f500e3d0 R14: ffff9195ef379700 R15: ffff9195ef379700
 FS:  0000000000000000(0000) GS:ffff91961f400000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000c000407000 CR3: 0000000002988000 CR4: 00000000000006f0
 Call Trace:
  &lt;IRQ&gt;
 _raw_spin_lock_bh
 subflow_error_report
 mptcp_subflow_data_available
 __mptcp_move_skbs_from_subflow
 mptcp_data_ready
 tcp_data_queue
 tcp_rcv_established
 tcp_v4_do_rcv
 tcp_v4_rcv
 ip_protocol_deliver_rcu
 ip_local_deliver_finish
 __netif_receive_skb_one_core
 netif_receive_skb
 rtl8139_poll 8139too
 __napi_poll
 net_rx_action
 __do_softirq
 __irq_exit_rcu
 common_interrupt
  &lt;/IRQ&gt;

The calling function - mptcp_subflow_data_available() - can be invoked
from different contexts:
- plain ssk socket lock
- ssk socket lock + mptcp_data_lock
- ssk socket lock + mptcp_data_lock + msk socket lock.

Since subflow_error_report() tries to acquire the mptcp_data_lock, the
latter two call chains will cause soft lookup.

This change addresses the issue moving the error reporting call to
outer functions, where the held locks list is known and the we can
acquire only the needed one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47242/">CVE-2021-47242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47242">CVE-2021-47242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224829">SUSE bug 1224829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47243" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47243" ref_url="https://www.suse.com/security/cve/CVE-2021-47243" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_cake: Fix out of bounds when parsing TCP options and header

The TCP option parser in cake qdisc (cake_get_tcpopt and
cake_tcph_may_drop) could read one byte out of bounds. When the length
is 1, the execution flow gets into the loop, reads one byte of the
opcode, and if the opcode is neither TCPOPT_EOL nor TCPOPT_NOP, it reads
one more byte, which exceeds the length of 1.

This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack
out of bounds when parsing TCP options.").

v2 changes:

Added doff validation in cake_get_tcphdr to avoid parsing garbage as TCP
header. Although it wasn't strictly an out-of-bounds access (memory was
allocated), garbage values could be read where CAKE expected the TCP
header if doff was smaller than 5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47243/">CVE-2021-47243 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47243">CVE-2021-47243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224845">SUSE bug 1224845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47244" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47244" ref_url="https://www.suse.com/security/cve/CVE-2021-47244" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Fix out of bounds when parsing TCP options

The TCP option parser in mptcp (mptcp_get_options) could read one byte
out of bounds. When the length is 1, the execution flow gets into the
loop, reads one byte of the opcode, and if the opcode is neither
TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds the
length of 1.

This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack
out of bounds when parsing TCP options.").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47244/">CVE-2021-47244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47244">CVE-2021-47244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224839">SUSE bug 1224839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47245" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47245" ref_url="https://www.suse.com/security/cve/CVE-2021-47245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: synproxy: Fix out of bounds when parsing TCP options

The TCP option parser in synproxy (synproxy_parse_options) could read
one byte out of bounds. When the length is 1, the execution flow gets
into the loop, reads one byte of the opcode, and if the opcode is
neither TCPOPT_EOL nor TCPOPT_NOP, it reads one more byte, which exceeds
the length of 1.

This fix is inspired by commit 9609dad263f8 ("ipv4: tcp_input: fix stack
out of bounds when parsing TCP options.").

v2 changes:

Added an early return when length &lt; 0 to avoid calling
skb_header_pointer with negative length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47245/">CVE-2021-47245 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47245">CVE-2021-47245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224838">SUSE bug 1224838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47246" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47246" ref_url="https://www.suse.com/security/cve/CVE-2021-47246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix page reclaim for dead peer hairpin

When adding a hairpin flow, a firmware-side send queue is created for
the peer net device, which claims some host memory pages for its
internal ring buffer. If the peer net device is removed/unbound before
the hairpin flow is deleted, then the send queue is not destroyed which
leads to a stack trace on pci device remove:

[ 748.005230] mlx5_core 0000:08:00.2: wait_func:1094:(pid 12985): MANAGE_PAGES(0x108) timeout. Will cause a leak of a command resource
[ 748.005231] mlx5_core 0000:08:00.2: reclaim_pages:514:(pid 12985): failed reclaiming pages: err -110
[ 748.001835] mlx5_core 0000:08:00.2: mlx5_reclaim_root_pages:653:(pid 12985): failed reclaiming pages (-110) for func id 0x0
[ 748.002171] ------------[ cut here ]------------
[ 748.001177] FW pages counter is 4 after reclaiming all pages
[ 748.001186] WARNING: CPU: 1 PID: 12985 at drivers/net/ethernet/mellanox/mlx5/core/pagealloc.c:685 mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]                      [  +0.002771] Modules linked in: cls_flower mlx5_ib mlx5_core ptp pps_core act_mirred sch_ingress openvswitch nsh xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_umad ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay fuse [last unloaded: pps_core]
[ 748.007225] CPU: 1 PID: 12985 Comm: tee Not tainted 5.12.0+ #1
[ 748.001376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 748.002315] RIP: 0010:mlx5_reclaim_startup_pages+0x34b/0x460 [mlx5_core]
[ 748.001679] Code: 28 00 00 00 0f 85 22 01 00 00 48 81 c4 b0 00 00 00 31 c0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 c7 c7 40 cc 19 a1 e8 9f 71 0e e2 &lt;0f&gt; 0b e9 30 ff ff ff 48 c7 c7 a0 cc 19 a1 e8 8c 71 0e e2 0f 0b e9
[ 748.003781] RSP: 0018:ffff88815220faf8 EFLAGS: 00010286
[ 748.001149] RAX: 0000000000000000 RBX: ffff8881b4900280 RCX: 0000000000000000
[ 748.001445] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffed102a441f51
[ 748.001614] RBP: 00000000000032b9 R08: 0000000000000001 R09: ffffed1054a15ee8
[ 748.001446] R10: ffff8882a50af73b R11: ffffed1054a15ee7 R12: fffffbfff07c1e30
[ 748.001447] R13: dffffc0000000000 R14: ffff8881b492cba8 R15: 0000000000000000
[ 748.001429] FS:  00007f58bd08b580(0000) GS:ffff8882a5080000(0000) knlGS:0000000000000000
[ 748.001695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 748.001309] CR2: 000055a026351740 CR3: 00000001d3b48006 CR4: 0000000000370ea0
[ 748.001506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 748.001483] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 748.001654] Call Trace:
[ 748.000576]  ? mlx5_satisfy_startup_pages+0x290/0x290 [mlx5_core]
[ 748.001416]  ? mlx5_cmd_teardown_hca+0xa2/0xd0 [mlx5_core]
[ 748.001354]  ? mlx5_cmd_init_hca+0x280/0x280 [mlx5_core]
[ 748.001203]  mlx5_function_teardown+0x30/0x60 [mlx5_core]
[ 748.001275]  mlx5_uninit_one+0xa7/0xc0 [mlx5_core]
[ 748.001200]  remove_one+0x5f/0xc0 [mlx5_core]
[ 748.001075]  pci_device_remove+0x9f/0x1d0
[ 748.000833]  device_release_driver_internal+0x1e0/0x490
[ 748.001207]  unbind_store+0x19f/0x200
[ 748.000942]  ? sysfs_file_ops+0x170/0x170
[ 748.001000]  kernfs_fop_write_iter+0x2bc/0x450
[ 748.000970]  new_sync_write+0x373/0x610
[ 748.001124]  ? new_sync_read+0x600/0x600
[ 748.001057]  ? lock_acquire+0x4d6/0x700
[ 748.000908]  ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 748.001126]  ? fd_install+0x1c9/0x4d0
[ 748.000951]  vfs_write+0x4d0/0x800
[ 748.000804]  ksys_write+0xf9/0x1d0
[ 748.000868]  ? __x64_sys_read+0xb0/0xb0
[ 748.000811]  ? filp_open+0x50/0x50
[ 748.000919]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 748.001223]  do_syscall_64+0x3f/0x80
[ 748.000892]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 748.00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47246/">CVE-2021-47246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47246">CVE-2021-47246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224831">SUSE bug 1224831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47247" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47247" ref_url="https://www.suse.com/security/cve/CVE-2021-47247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix use-after-free of encap entry in neigh update handler

Function mlx5e_rep_neigh_update() wasn't updated to accommodate rtnl lock
removal from TC filter update path and properly handle concurrent encap
entry insertion/deletion which can lead to following use-after-free:

 [23827.464923] ==================================================================
 [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core]
 [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635
 [23827.472251]
 [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5
 [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core]
 [23827.476731] Call Trace:
 [23827.477260]  dump_stack+0xbb/0x107
 [23827.477906]  print_address_description.constprop.0+0x18/0x140
 [23827.478896]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]
 [23827.479879]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]
 [23827.480905]  kasan_report.cold+0x7c/0xd8
 [23827.481701]  ? mlx5e_encap_take+0x72/0x140 [mlx5_core]
 [23827.482744]  kasan_check_range+0x145/0x1a0
 [23827.493112]  mlx5e_encap_take+0x72/0x140 [mlx5_core]
 [23827.494054]  ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core]
 [23827.495296]  mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core]
 [23827.496338]  ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core]
 [23827.497486]  ? read_word_at_a_time+0xe/0x20
 [23827.498250]  ? strscpy+0xa0/0x2a0
 [23827.498889]  process_one_work+0x8ac/0x14e0
 [23827.499638]  ? lockdep_hardirqs_on_prepare+0x400/0x400
 [23827.500537]  ? pwq_dec_nr_in_flight+0x2c0/0x2c0
 [23827.501359]  ? rwlock_bug.part.0+0x90/0x90
 [23827.502116]  worker_thread+0x53b/0x1220
 [23827.502831]  ? process_one_work+0x14e0/0x14e0
 [23827.503627]  kthread+0x328/0x3f0
 [23827.504254]  ? _raw_spin_unlock_irq+0x24/0x40
 [23827.505065]  ? __kthread_bind_mask+0x90/0x90
 [23827.505912]  ret_from_fork+0x1f/0x30
 [23827.506621]
 [23827.506987] Allocated by task 28248:
 [23827.507694]  kasan_save_stack+0x1b/0x40
 [23827.508476]  __kasan_kmalloc+0x7c/0x90
 [23827.509197]  mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core]
 [23827.510194]  mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core]
 [23827.511218]  __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core]
 [23827.512234]  mlx5e_configure_flower+0x191c/0x4870 [mlx5_core]
 [23827.513298]  tc_setup_cb_add+0x1d5/0x420
 [23827.514023]  fl_hw_replace_filter+0x382/0x6a0 [cls_flower]
 [23827.514975]  fl_change+0x2ceb/0x4a51 [cls_flower]
 [23827.515821]  tc_new_tfilter+0x89a/0x2070
 [23827.516548]  rtnetlink_rcv_msg+0x644/0x8c0
 [23827.517300]  netlink_rcv_skb+0x11d/0x340
 [23827.518021]  netlink_unicast+0x42b/0x700
 [23827.518742]  netlink_sendmsg+0x743/0xc20
 [23827.519467]  sock_sendmsg+0xb2/0xe0
 [23827.520131]  ____sys_sendmsg+0x590/0x770
 [23827.520851]  ___sys_sendmsg+0xd8/0x160
 [23827.521552]  __sys_sendmsg+0xb7/0x140
 [23827.522238]  do_syscall_64+0x3a/0x70
 [23827.522907]  entry_SYSCALL_64_after_hwframe+0x44/0xae
 [23827.523797]
 [23827.524163] Freed by task 25948:
 [23827.524780]  kasan_save_stack+0x1b/0x40
 [23827.525488]  kasan_set_track+0x1c/0x30
 [23827.526187]  kasan_set_free_info+0x20/0x30
 [23827.526968]  __kasan_slab_free+0xed/0x130
 [23827.527709]  slab_free_freelist_hook+0xcf/0x1d0
 [23827.528528]  kmem_cache_free_bulk+0x33a/0x6e0
 [23827.529317]  kfree_rcu_work+0x55f/0xb70
 [23827.530024]  process_one_work+0x8ac/0x14e0
 [23827.530770]  worker_thread+0x53b/0x1220
 [23827.531480]  kthread+0x328/0x3f0
 [23827.532114]  ret_from_fork+0x1f/0x30
 [23827.532785]
 [23827.533147] Last potentially related work creation:
 [23827.534007]  kasan_save_stack+0x1b/0x40
 [23827.534710]  kasan_record_aux_stack+0xab/0xc0
 [23827.535492]  kvfree_call_rcu+0x31/0x7b0
 [23827.536206]  mlx5e_tc_del
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47247/">CVE-2021-47247 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47247">CVE-2021-47247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224865">SUSE bug 1224865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227500">SUSE bug 1227500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47248" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47248" ref_url="https://www.suse.com/security/cve/CVE-2021-47248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: fix race between close() and udp_abort()

Kaustubh reported and diagnosed a panic in udp_lib_lookup().
The root cause is udp_abort() racing with close(). Both
racing functions acquire the socket lock, but udp{v6}_destroy_sock()
release it before performing destructive actions.

We can't easily extend the socket lock scope to avoid the race,
instead use the SOCK_DEAD flag to prevent udp_abort from doing
any action when the critical race happens.

Diagnosed-and-tested-by: Kaustubh Pandey &lt;kapandey@codeaurora.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47248/">CVE-2021-47248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47248">CVE-2021-47248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224867">SUSE bug 1224867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47249" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47249" ref_url="https://www.suse.com/security/cve/CVE-2021-47249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rds: fix memory leak in rds_recvmsg

Syzbot reported memory leak in rds. The problem
was in unputted refcount in case of error.

int rds_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
		int msg_flags)
{
...

	if (!rds_next_incoming(rs, &amp;inc)) {
		...
	}

After this "if" inc refcount incremented and

	if (rds_cmsg_recv(inc, msg, rs)) {
		ret = -EFAULT;
		goto out;
	}
...
out:
	return ret;
}

in case of rds_cmsg_recv() fail the refcount won't be
decremented. And it's easy to see from ftrace log, that
rds_inc_addref() don't have rds_inc_put() pair in
rds_recvmsg() after rds_cmsg_recv()

 1)               |  rds_recvmsg() {
 1)   3.721 us    |    rds_inc_addref();
 1)   3.853 us    |    rds_message_inc_copy_to_user();
 1) + 10.395 us   |    rds_cmsg_recv();
 1) + 34.260 us   |  }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47249/">CVE-2021-47249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47249">CVE-2021-47249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224880">SUSE bug 1224880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47250" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47250" ref_url="https://www.suse.com/security/cve/CVE-2021-47250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv4: fix memory leak in netlbl_cipsov4_add_std

Reported by syzkaller:
BUG: memory leak
unreferenced object 0xffff888105df7000 (size 64):
comm "syz-executor842", pid 360, jiffies 4294824824 (age 22.546s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[&lt;00000000e67ed558&gt;] kmalloc include/linux/slab.h:590 [inline]
[&lt;00000000e67ed558&gt;] kzalloc include/linux/slab.h:720 [inline]
[&lt;00000000e67ed558&gt;] netlbl_cipsov4_add_std net/netlabel/netlabel_cipso_v4.c:145 [inline]
[&lt;00000000e67ed558&gt;] netlbl_cipsov4_add+0x390/0x2340 net/netlabel/netlabel_cipso_v4.c:416
[&lt;0000000006040154&gt;] genl_family_rcv_msg_doit.isra.0+0x20e/0x320 net/netlink/genetlink.c:739
[&lt;00000000204d7a1c&gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
[&lt;00000000204d7a1c&gt;] genl_rcv_msg+0x2bf/0x4f0 net/netlink/genetlink.c:800
[&lt;00000000c0d6a995&gt;] netlink_rcv_skb+0x134/0x3d0 net/netlink/af_netlink.c:2504
[&lt;00000000d78b9d2c&gt;] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811
[&lt;000000009733081b&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
[&lt;000000009733081b&gt;] netlink_unicast+0x4a0/0x6a0 net/netlink/af_netlink.c:1340
[&lt;00000000d5fd43b8&gt;] netlink_sendmsg+0x789/0xc70 net/netlink/af_netlink.c:1929
[&lt;000000000a2d1e40&gt;] sock_sendmsg_nosec net/socket.c:654 [inline]
[&lt;000000000a2d1e40&gt;] sock_sendmsg+0x139/0x170 net/socket.c:674
[&lt;00000000321d1969&gt;] ____sys_sendmsg+0x658/0x7d0 net/socket.c:2350
[&lt;00000000964e16bc&gt;] ___sys_sendmsg+0xf8/0x170 net/socket.c:2404
[&lt;000000001615e288&gt;] __sys_sendmsg+0xd3/0x190 net/socket.c:2433
[&lt;000000004ee8b6a5&gt;] do_syscall_64+0x37/0x90 arch/x86/entry/common.c:47
[&lt;00000000171c7cee&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae

The memory of doi_def-&gt;map.std pointing is allocated in
netlbl_cipsov4_add_std, but no place has freed it. It should be
freed in cipso_v4_doi_free which frees the cipso DOI resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47250/">CVE-2021-47250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47250">CVE-2021-47250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224827">SUSE bug 1224827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47251" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47251" ref_url="https://www.suse.com/security/cve/CVE-2021-47251" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix skb length check in ieee80211_scan_rx()

Replace hard-coded compile-time constants for header length check
with dynamic determination based on the frame type. Otherwise, we
hit a validation WARN_ON in cfg80211 later.

[style fixes, reword commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47251/">CVE-2021-47251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47251">CVE-2021-47251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224881">SUSE bug 1224881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47253" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47253" ref_url="https://www.suse.com/security/cve/CVE-2021-47253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential memory leak in DMUB hw_init

[Why]
On resume we perform DMUB hw_init which allocates memory:
dm_resume-&gt;dm_dmub_hw_init-&gt;dc_dmub_srv_create-&gt;kzalloc
That results in memory leak in suspend/resume scenarios.

[How]
Allocate memory for the DC wrapper to DMUB only if it was not
allocated before.
No need to reallocate it on suspend/resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47253/">CVE-2021-47253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47253">CVE-2021-47253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224886">SUSE bug 1224886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47254" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47254" ref_url="https://www.suse.com/security/cve/CVE-2021-47254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix use-after-free in gfs2_glock_shrink_scan

The GLF_LRU flag is checked under lru_lock in gfs2_glock_remove_from_lru() to
remove the glock from the lru list in __gfs2_glock_put().

On the shrink scan path, the same flag is cleared under lru_lock but because
of cond_resched_lock(&amp;lru_lock) in gfs2_dispose_glock_lru(), progress on the
put side can be made without deleting the glock from the lru list.

Keep GLF_LRU across the race window opened by cond_resched_lock(&amp;lru_lock) to
ensure correct behavior on both sides - clear GLF_LRU after list_del under
lru_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47254/">CVE-2021-47254 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47254">CVE-2021-47254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224888">SUSE bug 1224888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227559">SUSE bug 1227559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47255" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47255" ref_url="https://www.suse.com/security/cve/CVE-2021-47255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kvm: LAPIC: Restore guard to prevent illegal APIC register access

Per the SDM, "any access that touches bytes 4 through 15 of an APIC
register may cause undefined behavior and must not be executed."
Worse, such an access in kvm_lapic_reg_read can result in a leak of
kernel stack contents. Prior to commit 01402cf81051 ("kvm: LAPIC:
write down valid APIC registers"), such an access was explicitly
disallowed. Restore the guard that was removed in that commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47255/">CVE-2021-47255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47255">CVE-2021-47255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224832">SUSE bug 1224832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47257" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47257" ref_url="https://www.suse.com/security/cve/CVE-2021-47257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: fix null deref in parse dev addr

Fix a logic error that could result in a null deref if the user sets
the mode incorrectly for the given addr type.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47257/">CVE-2021-47257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47257">CVE-2021-47257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224896">SUSE bug 1224896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47258" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47258" ref_url="https://www.suse.com/security/cve/CVE-2021-47258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix error handling of scsi_host_alloc()

After device is initialized via device_initialize(), or its name is set via
dev_set_name(), the device has to be freed via put_device().  Otherwise
device name will be leaked because it is allocated dynamically in
dev_set_name().

Fix the leak by replacing kfree() with put_device(). Since
scsi_host_dev_release() properly handles IDA and kthread removal, remove
special-casing these from the error handling as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47258/">CVE-2021-47258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47258">CVE-2021-47258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224899">SUSE bug 1224899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47259" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47259" ref_url="https://www.suse.com/security/cve/CVE-2021-47259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix use-after-free in nfs4_init_client()

KASAN reports a use-after-free when attempting to mount two different
exports through two different NICs that belong to the same server.

Olga was able to hit this with kernels starting somewhere between 5.7
and 5.10, but I traced the patch that introduced the clear_bit() call to
4.13. So something must have changed in the refcounting of the clp
pointer to make this call to nfs_put_client() the very last one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47259/">CVE-2021-47259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47259">CVE-2021-47259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224953">SUSE bug 1224953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227653">SUSE bug 1227653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47260" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47260" ref_url="https://www.suse.com/security/cve/CVE-2021-47260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a potential NULL dereference in nfs_get_client()

None of the callers are expecting NULL returns from nfs_get_client() so
this code will lead to an Oops.  It's better to return an error
pointer.  I expect that this is dead code so hopefully no one is
affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47260/">CVE-2021-47260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47260">CVE-2021-47260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224834">SUSE bug 1224834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47261" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47261" ref_url="https://www.suse.com/security/cve/CVE-2021-47261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mlx5: Fix initializing CQ fragments buffer

The function init_cq_frag_buf() can be called to initialize the current CQ
fragments buffer cq-&gt;buf, or the temporary cq-&gt;resize_buf that is filled
during CQ resize operation.

However, the offending commit started to use function get_cqe() for
getting the CQEs, the issue with this change is that get_cqe() always
returns CQEs from cq-&gt;buf, which leads us to initialize the wrong buffer,
and in case of enlarging the CQ we try to access elements beyond the size
of the current cq-&gt;buf and eventually hit a kernel panic.

 [exception RIP: init_cq_frag_buf+103]
  [ffff9f799ddcbcd8] mlx5_ib_resize_cq at ffffffffc0835d60 [mlx5_ib]
  [ffff9f799ddcbdb0] ib_resize_cq at ffffffffc05270df [ib_core]
  [ffff9f799ddcbdc0] llt_rdma_setup_qp at ffffffffc0a6a712 [llt]
  [ffff9f799ddcbe10] llt_rdma_cc_event_action at ffffffffc0a6b411 [llt]
  [ffff9f799ddcbe98] llt_rdma_client_conn_thread at ffffffffc0a6bb75 [llt]
  [ffff9f799ddcbec8] kthread at ffffffffa66c5da1
  [ffff9f799ddcbf50] ret_from_fork_nospec_begin at ffffffffa6d95ddd

Fix it by getting the needed CQE by calling mlx5_frag_buf_get_wqe() that
takes the correct source buffer as a parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47261/">CVE-2021-47261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47261">CVE-2021-47261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224954">SUSE bug 1224954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227751">SUSE bug 1227751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47262" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47262" ref_url="https://www.suse.com/security/cve/CVE-2021-47262" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message

Use the __string() machinery provided by the tracing subystem to make a
copy of the string literals consumed by the "nested VM-Enter failed"
tracepoint.  A complete copy is necessary to ensure that the tracepoint
can't outlive the data/memory it consumes and deference stale memory.

Because the tracepoint itself is defined by kvm, if kvm-intel and/or
kvm-amd are built as modules, the memory holding the string literals
defined by the vendor modules will be freed when the module is unloaded,
whereas the tracepoint and its data in the ring buffer will live until
kvm is unloaded (or "indefinitely" if kvm is built-in).

This bug has existed since the tracepoint was added, but was recently
exposed by a new check in tracing to detect exactly this type of bug.

  fmt: '%s%s
  ' current_buffer: ' vmx_dirty_log_t-140127  [003] ....  kvm_nested_vmenter_failed: '
  WARNING: CPU: 3 PID: 140134 at kernel/trace/trace.c:3759 trace_check_vprintf+0x3be/0x3e0
  CPU: 3 PID: 140134 Comm: less Not tainted 5.13.0-rc1-ce2e73ce600a-req #184
  Hardware name: ASUS Q87M-E/Q87M-E, BIOS 1102 03/03/2014
  RIP: 0010:trace_check_vprintf+0x3be/0x3e0
  Code: &lt;0f&gt; 0b 44 8b 4c 24 1c e9 a9 fe ff ff c6 44 02 ff 00 49 8b 97 b0 20
  RSP: 0018:ffffa895cc37bcb0 EFLAGS: 00010282
  RAX: 0000000000000000 RBX: ffffa895cc37bd08 RCX: 0000000000000027
  RDX: 0000000000000027 RSI: 00000000ffffdfff RDI: ffff9766cfad74f8
  RBP: ffffffffc0a041d4 R08: ffff9766cfad74f0 R09: ffffa895cc37bad8
  R10: 0000000000000001 R11: 0000000000000001 R12: ffffffffc0a041d4
  R13: ffffffffc0f4dba8 R14: 0000000000000000 R15: ffff976409f2c000
  FS:  00007f92fa200740(0000) GS:ffff9766cfac0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000559bd11b0000 CR3: 000000019fbaa002 CR4: 00000000001726e0
  Call Trace:
   trace_event_printf+0x5e/0x80
   trace_raw_output_kvm_nested_vmenter_failed+0x3a/0x60 [kvm]
   print_trace_line+0x1dd/0x4e0
   s_show+0x45/0x150
   seq_read_iter+0x2d5/0x4c0
   seq_read+0x106/0x150
   vfs_read+0x98/0x180
   ksys_read+0x5f/0xe0
   do_syscall_64+0x40/0xb0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47262/">CVE-2021-47262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47262">CVE-2021-47262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224836">SUSE bug 1224836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47263" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47263" ref_url="https://www.suse.com/security/cve/CVE-2021-47263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: wcd934x: Fix shift-out-of-bounds error

bit-mask for pins 0 to 4 is BIT(0) to BIT(4) however we ended up with BIT(n - 1)
which is not right, and this was caught by below usban check

UBSAN: shift-out-of-bounds in drivers/gpio/gpio-wcd934x.c:34:14
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47263/">CVE-2021-47263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47263">CVE-2021-47263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224955">SUSE bug 1224955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47264" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47264" ref_url="https://www.suse.com/security/cve/CVE-2021-47264" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: core: Fix Null-point-dereference in fmt_single_name()

Check the return value of devm_kstrdup() in case of
Null-point-dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47264/">CVE-2021-47264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47264">CVE-2021-47264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224887">SUSE bug 1224887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47265" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47265" ref_url="https://www.suse.com/security/cve/CVE-2021-47265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA: Verify port when creating flow rule

Validate port value provided by the user and with that remove no longer
needed validation by the driver.  The missing check in the mlx5_ib driver
could cause to the below oops.

Call trace:
  _create_flow_rule+0x2d4/0xf28 [mlx5_ib]
  mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib]
  ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs]
  ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x150 [ib_uverbs]
  ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs]
  ib_uverbs_ioctl+0x158/0x1d0 [ib_uverbs]
  do_vfs_ioctl+0xd0/0xaf0
  ksys_ioctl+0x84/0xb4
  __arm64_sys_ioctl+0x28/0xc4
  el0_svc_common.constprop.3+0xa4/0x254
  el0_svc_handler+0x84/0xa0
  el0_svc+0x10/0x26c
 Code: b9401260 f9615681 51000400 8b001c20 (f9403c1a)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47265/">CVE-2021-47265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47265">CVE-2021-47265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224957">SUSE bug 1224957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47266" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47266" ref_url="https://www.suse.com/security/cve/CVE-2021-47266" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/ipoib: Fix warning caused by destroying non-initial netns

After the commit 5ce2dced8e95 ("RDMA/ipoib: Set rtnl_link_ops for ipoib
interfaces"), if the IPoIB device is moved to non-initial netns,
destroying that netns lets the device vanish instead of moving it back to
the initial netns, This is happening because default_device_exit() skips
the interfaces due to having rtnl_link_ops set.

Steps to reporoduce:
  ip netns add foo
  ip link set mlx5_ib0 netns foo
  ip netns delete foo

WARNING: CPU: 1 PID: 704 at net/core/dev.c:11435 netdev_exit+0x3f/0x50
Modules linked in: xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT
nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack
nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink tun d
 fuse
CPU: 1 PID: 704 Comm: kworker/u64:3 Tainted: G S      W  5.13.0-rc1+ #1
Hardware name: Dell Inc. PowerEdge R630/02C2CP, BIOS 2.1.5 04/11/2016
Workqueue: netns cleanup_net
RIP: 0010:netdev_exit+0x3f/0x50
Code: 48 8b bb 30 01 00 00 e8 ef 81 b1 ff 48 81 fb c0 3a 54 a1 74 13 48
8b 83 90 00 00 00 48 81 c3 90 00 00 00 48 39 d8 75 02 5b c3 &lt;0f&gt; 0b 5b
c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 0f 1f 44 00
RSP: 0018:ffffb297079d7e08 EFLAGS: 00010206
RAX: ffff8eb542c00040 RBX: ffff8eb541333150 RCX: 000000008010000d
RDX: 000000008010000e RSI: 000000008010000d RDI: ffff8eb440042c00
RBP: ffffb297079d7e48 R08: 0000000000000001 R09: ffffffff9fdeac00
R10: ffff8eb5003be000 R11: 0000000000000001 R12: ffffffffa1545620
R13: ffffffffa1545628 R14: 0000000000000000 R15: ffffffffa1543b20
FS:  0000000000000000(0000) GS:ffff8ed37fa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005601b5f4c2e8 CR3: 0000001fc8c10002 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 ops_exit_list.isra.9+0x36/0x70
 cleanup_net+0x234/0x390
 process_one_work+0x1cb/0x360
 ? process_one_work+0x360/0x360
 worker_thread+0x30/0x370
 ? process_one_work+0x360/0x360
 kthread+0x116/0x130
 ? kthread_park+0x80/0x80
 ret_from_fork+0x22/0x30

To avoid the above warning and later on the kernel panic that could happen
on shutdown due to a NULL pointer dereference, make sure to set the
netns_refund flag that was introduced by commit 3a5ca857079e ("can: dev:
Move device back to init netns on owning netns delete") to properly
restore the IPoIB interfaces to the initial netns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47266/">CVE-2021-47266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47266">CVE-2021-47266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224958">SUSE bug 1224958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47267" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47267" ref_url="https://www.suse.com/security/cve/CVE-2021-47267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: fix various gadget panics on 10gbps cabling

usb_assign_descriptors() is called with 5 parameters,
the last 4 of which are the usb_descriptor_header for:
  full-speed (USB1.1 - 12Mbps [including USB1.0 low-speed @ 1.5Mbps),
  high-speed (USB2.0 - 480Mbps),
  super-speed (USB3.0 - 5Gbps),
  super-speed-plus (USB3.1 - 10Gbps).

The differences between full/high/super-speed descriptors are usually
substantial (due to changes in the maximum usb block size from 64 to 512
to 1024 bytes and other differences in the specs), while the difference
between 5 and 10Gbps descriptors may be as little as nothing
(in many cases the same tuning is simply good enough).

However if a gadget driver calls usb_assign_descriptors() with
a NULL descriptor for super-speed-plus and is then used on a max 10gbps
configuration, the kernel will crash with a null pointer dereference,
when a 10gbps capable device port + cable + host port combination shows up.
(This wouldn't happen if the gadget max-speed was set to 5gbps, but
it of course defaults to the maximum, and there's no real reason to
artificially limit it)

The fix is to simply use the 5gbps descriptor as the 10gbps descriptor,
if a 10gbps descriptor wasn't provided.

Obviously this won't fix the problem if the 5gbps descriptor is also
NULL, but such cases can't be so trivially solved (and any such gadgets
are unlikely to be used with USB3 ports any way).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47267/">CVE-2021-47267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47267">CVE-2021-47267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224993">SUSE bug 1224993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47268" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47268" ref_url="https://www.suse.com/security/cve/CVE-2021-47268" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port

A pending hrtimer may expire after the kthread_worker of tcpm port
is destroyed, see below kernel dump when do module unload, fix it
by cancel the 2 hrtimers.

[  111.517018] Unable to handle kernel paging request at virtual address ffff8000118cb880
[  111.518786] blk_update_request: I/O error, dev sda, sector 60061185 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[  111.526594] Mem abort info:
[  111.526597]   ESR = 0x96000047
[  111.526600]   EC = 0x25: DABT (current EL), IL = 32 bits
[  111.526604]   SET = 0, FnV = 0
[  111.526607]   EA = 0, S1PTW = 0
[  111.526610] Data abort info:
[  111.526612]   ISV = 0, ISS = 0x00000047
[  111.526615]   CM = 0, WnR = 1
[  111.526619] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000041d75000
[  111.526623] [ffff8000118cb880] pgd=10000001bffff003, p4d=10000001bffff003, pud=10000001bfffe003, pmd=10000001bfffa003, pte=0000000000000000
[  111.526642] Internal error: Oops: 96000047 [#1] PREEMPT SMP
[  111.526647] Modules linked in: dwc3_imx8mp dwc3 phy_fsl_imx8mq_usb [last unloaded: tcpci]
[  111.526663] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc4-00927-gebbe9dbd802c-dirty #36
[  111.526670] Hardware name: NXP i.MX8MPlus EVK board (DT)
[  111.526674] pstate: 800000c5 (Nzcv daIF -PAN -UAO -TCO BTYPE=--)
[  111.526681] pc : queued_spin_lock_slowpath+0x1a0/0x390
[  111.526695] lr : _raw_spin_lock_irqsave+0x88/0xb4
[  111.526703] sp : ffff800010003e20
[  111.526706] x29: ffff800010003e20 x28: ffff00017f380180
[  111.537156] buffer_io_error: 6 callbacks suppressed
[  111.537162] Buffer I/O error on dev sda1, logical block 60040704, async page read
[  111.539932]  x27: ffff00017f3801c0
[  111.539938] x26: ffff800010ba2490 x25: 0000000000000000 x24: 0000000000000001
[  111.543025] blk_update_request: I/O error, dev sda, sector 60061186 op 0x0:(READ) flags 0x0 phys_seg 7 prio class 0
[  111.548304]
[  111.548306] x23: 00000000000000c0 x22: ffff0000c2a9f184 x21: ffff00017f380180
[  111.551374] Buffer I/O error on dev sda1, logical block 60040705, async page read
[  111.554499]
[  111.554503] x20: ffff0000c5f14210 x19: 00000000000000c0 x18: 0000000000000000
[  111.557391] Buffer I/O error on dev sda1, logical block 60040706, async page read
[  111.561218]
[  111.561222] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  111.564205] Buffer I/O error on dev sda1, logical block 60040707, async page read
[  111.570887] x14: 00000000000000f5 x13: 0000000000000001 x12: 0000000000000040
[  111.570902] x11: ffff0000c05ac6d8
[  111.583420] Buffer I/O error on dev sda1, logical block 60040708, async page read
[  111.588978]  x10: 0000000000000000 x9 : 0000000000040000
[  111.588988] x8 : 0000000000000000
[  111.597173] Buffer I/O error on dev sda1, logical block 60040709, async page read
[  111.605766]  x7 : ffff00017f384880 x6 : ffff8000118cb880
[  111.605777] x5 : ffff00017f384880
[  111.611094] Buffer I/O error on dev sda1, logical block 60040710, async page read
[  111.617086]  x4 : 0000000000000000 x3 : ffff0000c2a9f184
[  111.617096] x2 : ffff8000118cb880
[  111.622242] Buffer I/O error on dev sda1, logical block 60040711, async page read
[  111.626927]  x1 : ffff8000118cb880 x0 : ffff00017f384888
[  111.626938] Call trace:
[  111.626942]  queued_spin_lock_slowpath+0x1a0/0x390
[  111.795809]  kthread_queue_work+0x30/0xc0
[  111.799828]  state_machine_timer_handler+0x20/0x30
[  111.804624]  __hrtimer_run_queues+0x140/0x1e0
[  111.808990]  hrtimer_interrupt+0xec/0x2c0
[  111.813004]  arch_timer_handler_phys+0x38/0x50
[  111.817456]  handle_percpu_devid_irq+0x88/0x150
[  111.821991]  __handle_domain_irq+0x80/0xe0
[  111.826093]  gic_handle_irq+0xc0/0x140
[  111.829848]  el1_irq+0xbc/0x154
[  111.832991]  arch_cpu_idle+0x1c/0x2c
[  111.836572]  default_idle_call+0x24/0x6c
[  111.840497]  do_idle+0x238/0x2ac
[  1
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47268/">CVE-2021-47268 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47268">CVE-2021-47268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224994">SUSE bug 1224994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47269" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47269" ref_url="https://www.suse.com/security/cve/CVE-2021-47269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: ep0: fix NULL pointer exception

There is no validation of the index from dwc3_wIndex_to_dep() and we might
be referring a non-existing ep and trigger a NULL pointer exception. In
certain configurations we might use fewer eps and the index might wrongly
indicate a larger ep index than existing.

By adding this validation from the patch we can actually report a wrong
index back to the caller.

In our usecase we are using a composite device on an older kernel, but
upstream might use this fix also. Unfortunately, I cannot describe the
hardware for others to reproduce the issue as it is a proprietary
implementation.

[   82.958261] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a4
[   82.966891] Mem abort info:
[   82.969663]   ESR = 0x96000006
[   82.972703]   Exception class = DABT (current EL), IL = 32 bits
[   82.978603]   SET = 0, FnV = 0
[   82.981642]   EA = 0, S1PTW = 0
[   82.984765] Data abort info:
[   82.987631]   ISV = 0, ISS = 0x00000006
[   82.991449]   CM = 0, WnR = 0
[   82.994409] user pgtable: 4k pages, 39-bit VAs, pgdp = 00000000c6210ccc
[   83.000999] [00000000000000a4] pgd=0000000053aa5003, pud=0000000053aa5003, pmd=0000000000000000
[   83.009685] Internal error: Oops: 96000006 [#1] PREEMPT SMP
[   83.026433] Process irq/62-dwc3 (pid: 303, stack limit = 0x000000003985154c)
[   83.033470] CPU: 0 PID: 303 Comm: irq/62-dwc3 Not tainted 4.19.124 #1
[   83.044836] pstate: 60000085 (nZCv daIf -PAN -UAO)
[   83.049628] pc : dwc3_ep0_handle_feature+0x414/0x43c
[   83.054558] lr : dwc3_ep0_interrupt+0x3b4/0xc94

...

[   83.141788] Call trace:
[   83.144227]  dwc3_ep0_handle_feature+0x414/0x43c
[   83.148823]  dwc3_ep0_interrupt+0x3b4/0xc94
[   83.181546] ---[ end trace aac6b5267d84c32f ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47269/">CVE-2021-47269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47269">CVE-2021-47269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224996">SUSE bug 1224996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47270" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47270" ref_url="https://www.suse.com/security/cve/CVE-2021-47270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: fix various gadgets null ptr deref on 10gbps cabling.

This avoids a null pointer dereference in
f_{ecm,eem,hid,loopback,printer,rndis,serial,sourcesink,subset,tcm}
by simply reusing the 5gbps config for 10gbps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47270/">CVE-2021-47270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47270">CVE-2021-47270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224997">SUSE bug 1224997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47271" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47271" ref_url="https://www.suse.com/security/cve/CVE-2021-47271" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdnsp: Fix deadlock issue in cdnsp_thread_irq_handler

Patch fixes the following critical issue caused by deadlock which has been
detected during testing NCM class:

smp: csd: Detected non-responsive CSD lock (#1) on CPU#0
smp:     csd: CSD lock (#1) unresponsive.
....
RIP: 0010:native_queued_spin_lock_slowpath+0x61/0x1d0
RSP: 0018:ffffbc494011cde0 EFLAGS: 00000002
RAX: 0000000000000101 RBX: ffff9ee8116b4a68 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff9ee8116b4658
RBP: ffffbc494011cde0 R08: 0000000000000001 R09: 0000000000000000
R10: ffff9ee8116b4670 R11: 0000000000000000 R12: ffff9ee8116b4658
R13: ffff9ee8116b4670 R14: 0000000000000246 R15: ffff9ee8116b4658
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7bcc41a830 CR3: 000000007a612003 CR4: 00000000001706e0
Call Trace:
 &lt;IRQ&gt;
 do_raw_spin_lock+0xc0/0xd0
 _raw_spin_lock_irqsave+0x95/0xa0
 cdnsp_gadget_ep_queue.cold+0x88/0x107 [cdnsp_udc_pci]
 usb_ep_queue+0x35/0x110
 eth_start_xmit+0x220/0x3d0 [u_ether]
 ncm_tx_timeout+0x34/0x40 [usb_f_ncm]
 ? ncm_free_inst+0x50/0x50 [usb_f_ncm]
 __hrtimer_run_queues+0xac/0x440
 hrtimer_run_softirq+0x8c/0xb0
 __do_softirq+0xcf/0x428
 asm_call_irq_on_stack+0x12/0x20
 &lt;/IRQ&gt;
 do_softirq_own_stack+0x61/0x70
 irq_exit_rcu+0xc1/0xd0
 sysvec_apic_timer_interrupt+0x52/0xb0
 asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:do_raw_spin_trylock+0x18/0x40
RSP: 0018:ffffbc494138bda8 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff9ee8116b4658 RCX: 0000000000000000
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9ee8116b4658
RBP: ffffbc494138bda8 R08: 0000000000000001 R09: 0000000000000000
R10: ffff9ee8116b4670 R11: 0000000000000000 R12: ffff9ee8116b4658
R13: ffff9ee8116b4670 R14: ffff9ee7b5c73d80 R15: ffff9ee8116b4000
 _raw_spin_lock+0x3d/0x70
 ? cdnsp_thread_irq_handler.cold+0x32/0x112c [cdnsp_udc_pci]
 cdnsp_thread_irq_handler.cold+0x32/0x112c [cdnsp_udc_pci]
 ? cdnsp_remove_request+0x1f0/0x1f0 [cdnsp_udc_pci]
 ? cdnsp_thread_irq_handler+0x5/0xa0 [cdnsp_udc_pci]
 ? irq_thread+0xa0/0x1c0
 irq_thread_fn+0x28/0x60
 irq_thread+0x105/0x1c0
 ? __kthread_parkme+0x42/0x90
 ? irq_forced_thread_fn+0x90/0x90
 ? wake_threads_waitq+0x30/0x30
 ? irq_thread_check_affinity+0xe0/0xe0
 kthread+0x12a/0x160
 ? kthread_park+0x90/0x90
 ret_from_fork+0x22/0x30

The root cause of issue is spin_lock/spin_unlock instruction instead
spin_lock_irqsave/spin_lock_irqrestore in cdnsp_thread_irq_handler
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47271/">CVE-2021-47271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47271">CVE-2021-47271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224999">SUSE bug 1224999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47272" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47272" ref_url="https://www.suse.com/security/cve/CVE-2021-47272" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc-&gt;gadget is NULL

There exists a possible scenario in which dwc3_gadget_init() can fail:
during during host -&gt; peripheral mode switch in dwc3_set_mode(), and
a pending gadget driver fails to bind.  Then, if the DRD undergoes
another mode switch from peripheral-&gt;host the resulting
dwc3_gadget_exit() will attempt to reference an invalid and dangling
dwc-&gt;gadget pointer as well as call dma_free_coherent() on unmapped
DMA pointers.

The exact scenario can be reproduced as follows:
 - Start DWC3 in peripheral mode
 - Configure ConfigFS gadget with FunctionFS instance (or use g_ffs)
 - Run FunctionFS userspace application (open EPs, write descriptors, etc)
 - Bind gadget driver to DWC3's UDC
 - Switch DWC3 to host mode
   =&gt; dwc3_gadget_exit() is called. usb_del_gadget() will put the
	ConfigFS driver instance on the gadget_driver_pending_list
 - Stop FunctionFS application (closes the ep files)
 - Switch DWC3 to peripheral mode
   =&gt; dwc3_gadget_init() fails as usb_add_gadget() calls
	check_pending_gadget_drivers() and attempts to rebind the UDC
	to the ConfigFS gadget but fails with -19 (-ENODEV) because the
	FFS instance is not in FFS_ACTIVE state (userspace has not
	re-opened and written the descriptors yet, i.e. desc_ready!=0).
 - Switch DWC3 back to host mode
   =&gt; dwc3_gadget_exit() is called again, but this time dwc-&gt;gadget
	is invalid.

Although it can be argued that userspace should take responsibility
for ensuring that the FunctionFS application be ready prior to
allowing the composite driver bind to the UDC, failure to do so
should not result in a panic from the kernel driver.

Fix this by setting dwc-&gt;gadget to NULL in the failure path of
dwc3_gadget_init() and add a check to dwc3_gadget_exit() to bail out
unless the gadget pointer is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47272/">CVE-2021-47272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47272">CVE-2021-47272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224970">SUSE bug 1224970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47273" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47273" ref_url="https://www.suse.com/security/cve/CVE-2021-47273" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled

When only PHY1 is used (for example on Odroid-HC4), the regmap init code
uses the usb2 ports when doesn't initialize the PHY1 regmap entry.

This fixes:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
...
pc : regmap_update_bits_base+0x40/0xa0
lr : dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8
...
Call trace:
regmap_update_bits_base+0x40/0xa0
dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8
dwc3_meson_g12a_usb2_init+0x7c/0xc8
dwc3_meson_g12a_usb_init+0x28/0x48
dwc3_meson_g12a_probe+0x298/0x540
platform_probe+0x70/0xe0
really_probe+0xf0/0x4d8
driver_probe_device+0xfc/0x168
...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47273/">CVE-2021-47273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47273">CVE-2021-47273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224885">SUSE bug 1224885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47274" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47274" ref_url="https://www.suse.com/security/cve/CVE-2021-47274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Correct the length check which causes memory corruption

We've suffered from severe kernel crashes due to memory corruption on
our production environment, like,

Call Trace:
[1640542.554277] general protection fault: 0000 [#1] SMP PTI
[1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G
[1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190
[1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286
[1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX:
0000000006e931bf
[1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI:
ffff9a45ff004300
[1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09:
0000000000000000
[1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12:
ffffffff9a20608d
[1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15:
696c662f65636976
[1640542.563128] FS:  00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000)
knlGS:0000000000000000
[1640542.563937] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4:
00000000003606e0
[1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[1640542.566742] Call Trace:
[1640542.567009]  anon_vma_clone+0x5d/0x170
[1640542.567417]  __split_vma+0x91/0x1a0
[1640542.567777]  do_munmap+0x2c6/0x320
[1640542.568128]  vm_munmap+0x54/0x70
[1640542.569990]  __x64_sys_munmap+0x22/0x30
[1640542.572005]  do_syscall_64+0x5b/0x1b0
[1640542.573724]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[1640542.575642] RIP: 0033:0x7f45d6e61e27

James Wang has reproduced it stably on the latest 4.19 LTS.
After some debugging, we finally proved that it's due to ftrace
buffer out-of-bound access using a debug tool as follows:
[   86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000
[   86.780806]  no_context+0xdf/0x3c0
[   86.784327]  __do_page_fault+0x252/0x470
[   86.788367]  do_page_fault+0x32/0x140
[   86.792145]  page_fault+0x1e/0x30
[   86.795576]  strncpy_from_unsafe+0x66/0xb0
[   86.799789]  fetch_memory_string+0x25/0x40
[   86.804002]  fetch_deref_string+0x51/0x60
[   86.808134]  kprobe_trace_func+0x32d/0x3a0
[   86.812347]  kprobe_dispatcher+0x45/0x50
[   86.816385]  kprobe_ftrace_handler+0x90/0xf0
[   86.820779]  ftrace_ops_assist_func+0xa1/0x140
[   86.825340]  0xffffffffc00750bf
[   86.828603]  do_sys_open+0x5/0x1f0
[   86.832124]  do_syscall_64+0x5b/0x1b0
[   86.835900]  entry_SYSCALL_64_after_hwframe+0x44/0xa9

commit b220c049d519 ("tracing: Check length before giving out
the filter buffer") adds length check to protect trace data
overflow introduced in 0fc1b09ff1ff, seems that this fix can't prevent
overflow entirely, the length check should also take the sizeof
entry-&gt;array[0] into account, since this array[0] is filled the
length of trace data and occupy addtional space and risk overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47274/">CVE-2021-47274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47274">CVE-2021-47274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224990">SUSE bug 1224990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47275" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47275" ref_url="https://www.suse.com/security/cve/CVE-2021-47275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: avoid oversized read request in cache missing code path

In the cache missing code path of cached device, if a proper location
from the internal B+ tree is matched for a cache miss range, function
cached_dev_cache_miss() will be called in cache_lookup_fn() in the
following code block,
[code block 1]
  526         unsigned int sectors = KEY_INODE(k) == s-&gt;iop.inode
  527                 ? min_t(uint64_t, INT_MAX,
  528                         KEY_START(k) - bio-&gt;bi_iter.bi_sector)
  529                 : INT_MAX;
  530         int ret = s-&gt;d-&gt;cache_miss(b, s, bio, sectors);

Here s-&gt;d-&gt;cache_miss() is the call backfunction pointer initialized as
cached_dev_cache_miss(), the last parameter 'sectors' is an important
hint to calculate the size of read request to backing device of the
missing cache data.

Current calculation in above code block may generate oversized value of
'sectors', which consequently may trigger 2 different potential kernel
panics by BUG() or BUG_ON() as listed below,

1) BUG_ON() inside bch_btree_insert_key(),
[code block 2]
   886         BUG_ON(b-&gt;ops-&gt;is_extents &amp;&amp; !KEY_SIZE(k));
2) BUG() inside biovec_slab(),
[code block 3]
   51         default:
   52                 BUG();
   53                 return NULL;

All the above panics are original from cached_dev_cache_miss() by the
oversized parameter 'sectors'.

Inside cached_dev_cache_miss(), parameter 'sectors' is used to calculate
the size of data read from backing device for the cache missing. This
size is stored in s-&gt;insert_bio_sectors by the following lines of code,
[code block 4]
  909    s-&gt;insert_bio_sectors = min(sectors, bio_sectors(bio) + reada);

Then the actual key inserting to the internal B+ tree is generated and
stored in s-&gt;iop.replace_key by the following lines of code,
[code block 5]
  911   s-&gt;iop.replace_key = KEY(s-&gt;iop.inode,
  912                    bio-&gt;bi_iter.bi_sector + s-&gt;insert_bio_sectors,
  913                    s-&gt;insert_bio_sectors);
The oversized parameter 'sectors' may trigger panic 1) by BUG_ON() from
the above code block.

And the bio sending to backing device for the missing data is allocated
with hint from s-&gt;insert_bio_sectors by the following lines of code,
[code block 6]
  926    cache_bio = bio_alloc_bioset(GFP_NOWAIT,
  927                 DIV_ROUND_UP(s-&gt;insert_bio_sectors, PAGE_SECTORS),
  928                 &amp;dc-&gt;disk.bio_split);
The oversized parameter 'sectors' may trigger panic 2) by BUG() from the
agove code block.

Now let me explain how the panics happen with the oversized 'sectors'.
In code block 5, replace_key is generated by macro KEY(). From the
definition of macro KEY(),
[code block 7]
  71 #define KEY(inode, offset, size)                                  \
  72 ((struct bkey) {                                                  \
  73      .high = (1ULL &lt;&lt; 63) | ((__u64) (size) &lt;&lt; 20) | (inode),     \
  74      .low = (offset)                                              \
  75 })

Here 'size' is 16bits width embedded in 64bits member 'high' of struct
bkey. But in code block 1, if "KEY_START(k) - bio-&gt;bi_iter.bi_sector" is
very probably to be larger than (1&lt;&lt;16) - 1, which makes the bkey size
calculation in code block 5 is overflowed. In one bug report the value
of parameter 'sectors' is 131072 (= 1 &lt;&lt; 17), the overflowed 'sectors'
results the overflowed s-&gt;insert_bio_sectors in code block 4, then makes
size field of s-&gt;iop.replace_key to be 0 in code block 5. Then the 0-
sized s-&gt;iop.replace_key is inserted into the internal B+ tree as cache
missing check key (a special key to detect and avoid a racing between
normal write request and cache missing read request) as,
[code block 8]
  915   ret = bch_btree_insert_check_key(b, &amp;s-&gt;op, &amp;s-&gt;iop.replace_key);

Then the 0-sized s-&gt;iop.replace_key as 3rd parameter triggers the bkey
size check BUG_ON() in code block 2, and causes the kernel panic 1).

Another ke
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47275/">CVE-2021-47275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47275">CVE-2021-47275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224965">SUSE bug 1224965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47276" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47276" ref_url="https://www.suse.com/security/cve/CVE-2021-47276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Do not blindly read the ip address in ftrace_bug()

It was reported that a bug on arm64 caused a bad ip address to be used for
updating into a nop in ftrace_init(), but the error path (rightfully)
returned -EINVAL and not -EFAULT, as the bug caused more than one error to
occur. But because -EINVAL was returned, the ftrace_bug() tried to report
what was at the location of the ip address, and read it directly. This
caused the machine to panic, as the ip was not pointing to a valid memory
address.

Instead, read the ip address with copy_from_kernel_nofault() to safely
access the memory, and if it faults, report that the address faulted,
otherwise report what was in that location.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47276/">CVE-2021-47276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47276">CVE-2021-47276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224966">SUSE bug 1224966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47277" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47277" ref_url="https://www.suse.com/security/cve/CVE-2021-47277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kvm: avoid speculation-based attacks from out-of-range memslot accesses

KVM's mechanism for accessing guest memory translates a guest physical
address (gpa) to a host virtual address using the right-shifted gpa
(also known as gfn) and a struct kvm_memory_slot.  The translation is
performed in __gfn_to_hva_memslot using the following formula:

      hva = slot-&gt;userspace_addr + (gfn - slot-&gt;base_gfn) * PAGE_SIZE

It is expected that gfn falls within the boundaries of the guest's
physical memory.  However, a guest can access invalid physical addresses
in such a way that the gfn is invalid.

__gfn_to_hva_memslot is called from kvm_vcpu_gfn_to_hva_prot, which first
retrieves a memslot through __gfn_to_memslot.  While __gfn_to_memslot
does check that the gfn falls within the boundaries of the guest's
physical memory or not, a CPU can speculate the result of the check and
continue execution speculatively using an illegal gfn. The speculation
can result in calculating an out-of-bounds hva.  If the resulting host
virtual address is used to load another guest physical address, this
is effectively a Spectre gadget consisting of two consecutive reads,
the second of which is data dependent on the first.

Right now it's not clear if there are any cases in which this is
exploitable.  One interesting case was reported by the original author
of this patch, and involves visiting guest page tables on x86.  Right
now these are not vulnerable because the hva read goes through get_user(),
which contains an LFENCE speculation barrier.  However, there are
patches in progress for x86 uaccess.h to mask kernel addresses instead of
using LFENCE; once these land, a guest could use speculation to read
from the VMM's ring 3 address space.  Other architectures such as ARM
already use the address masking method, and would be susceptible to
this same kind of data-dependent access gadgets.  Therefore, this patch
proactively protects from these attacks by masking out-of-bounds gfns
in __gfn_to_hva_memslot, which blocks speculation of invalid hvas.

Sean Christopherson noted that this patch does not cover
kvm_read_guest_offset_cached.  This however is limited to a few bytes
past the end of the cache, and therefore it is unlikely to be useful in
the context of building a chain of data dependent accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47277/">CVE-2021-47277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47277">CVE-2021-47277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224960">SUSE bug 1224960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47278" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47278" ref_url="https://www.suse.com/security/cve/CVE-2021-47278" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove()

This driver's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47278/">CVE-2021-47278 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47278">CVE-2021-47278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224919">SUSE bug 1224919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47279" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47279" ref_url="https://www.suse.com/security/cve/CVE-2021-47279" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47279/">CVE-2021-47279 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47279">CVE-2021-47279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224964">SUSE bug 1224964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47280" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47280" ref_url="https://www.suse.com/security/cve/CVE-2021-47280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Fix use-after-free read in drm_getunique()

There is a time-of-check-to-time-of-use error in drm_getunique() due
to retrieving file_priv-&gt;master prior to locking the device's master
mutex.

An example can be seen in the crash report of the use-after-free error
found by Syzbot:
https://syzkaller.appspot.com/bug?id=148d2f1dfac64af52ffd27b661981a540724f803

In the report, the master pointer was used after being freed. This is
because another process had acquired the device's master mutex in
drm_setmaster_ioctl(), then overwrote fpriv-&gt;master in
drm_new_set_master(). The old value of fpriv-&gt;master was subsequently
freed before the mutex was unlocked.

To fix this, we lock the device's master mutex before retrieving the
pointer from from fpriv-&gt;master. This patch passes the Syzbot
reproducer test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47280/">CVE-2021-47280 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47280">CVE-2021-47280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224982">SUSE bug 1224982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47281" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47281" ref_url="https://www.suse.com/security/cve/CVE-2021-47281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: seq: Fix race of snd_seq_timer_open()

The timer instance per queue is exclusive, and snd_seq_timer_open()
should have managed the concurrent accesses.  It looks as if it's
checking the already existing timer instance at the beginning, but
it's not right, because there is no protection, hence any later
concurrent call of snd_seq_timer_open() may override the timer
instance easily.  This may result in UAF, as the leftover timer
instance can keep running while the queue itself gets closed, as
spotted by syzkaller recently.

For avoiding the race, add a proper check at the assignment of
tmr-&gt;timeri again, and return -EBUSY if it's been already registered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47281/">CVE-2021-47281 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47281">CVE-2021-47281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224983">SUSE bug 1224983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47282" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47282" ref_url="https://www.suse.com/security/cve/CVE-2021-47282" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: bcm2835: Fix out-of-bounds access with more than 4 slaves

Commit 571e31fa60b3 ("spi: bcm2835: Cache CS register value for
-&gt;prepare_message()") limited the number of slaves to 3 at compile-time.
The limitation was necessitated by a statically-sized array prepare_cs[]
in the driver private data which contains a per-slave register value.

The commit sought to enforce the limitation at run-time by setting the
controller's num_chipselect to 3:  Slaves with a higher chipselect are
rejected by spi_add_device().

However the commit neglected that num_chipselect only limits the number
of *native* chipselects.  If GPIO chipselects are specified in the
device tree for more than 3 slaves, num_chipselect is silently raised by
of_spi_get_gpio_numbers() and the result are out-of-bounds accesses to
the statically-sized array prepare_cs[].

As a bandaid fix which is backportable to stable, raise the number of
allowed slaves to 24 (which "ought to be enough for anybody"), enforce
the limitation on slave -&gt;setup and revert num_chipselect to 3 (which is
the number of native chipselects supported by the controller).
An upcoming for-next commit will allow an arbitrary number of slaves.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47282/">CVE-2021-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47282">CVE-2021-47282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224986">SUSE bug 1224986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47283" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47283" ref_url="https://www.suse.com/security/cve/CVE-2021-47283" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net:sfc: fix non-freed irq in legacy irq mode

SFC driver can be configured via modparam to work using MSI-X, MSI or
legacy IRQ interrupts. In the last one, the interrupt was not properly
released on module remove.

It was not freed because the flag irqs_hooked was not set during
initialization in the case of using legacy IRQ.

Example of (trimmed) trace during module remove without this fix:

remove_proc_entry: removing non-empty directory 'irq/125', leaking at least '0000:3b:00.1'
WARNING: CPU: 39 PID: 3658 at fs/proc/generic.c:715 remove_proc_entry+0x15c/0x170
...trimmed...
Call Trace:
 unregister_irq_proc+0xe3/0x100
 free_desc+0x29/0x70
 irq_free_descs+0x47/0x70
 mp_unmap_irq+0x58/0x60
 acpi_unregister_gsi_ioapic+0x2a/0x40
 acpi_pci_irq_disable+0x78/0xb0
 pci_disable_device+0xd1/0x100
 efx_pci_remove+0xa1/0x1e0 [sfc]
 pci_device_remove+0x38/0xa0
 __device_release_driver+0x177/0x230
 driver_detach+0xcb/0x110
 bus_remove_driver+0x58/0xd0
 pci_unregister_driver+0x2a/0xb0
 efx_exit_module+0x24/0xf40 [sfc]
 __do_sys_delete_module.constprop.0+0x171/0x280
 ? exit_to_user_mode_prepare+0x83/0x1d0
 do_syscall_64+0x3d/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f9f9385800b
...trimmed...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47283/">CVE-2021-47283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47283">CVE-2021-47283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224980">SUSE bug 1224980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47284" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47284" ref_url="https://www.suse.com/security/cve/CVE-2021-47284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isdn: mISDN: netjet: Fix crash in nj_probe:

'nj_setup' in netjet.c might fail with -EIO and in this case
'card-&gt;irq' is initialized and is bigger than zero. A subsequent call to
'nj_release' will free the irq that has not been requested.

Fix this bug by deleting the previous assignment to 'card-&gt;irq' and just
keep the assignment before 'request_irq'.

The KASAN's log reveals it:

[    3.354615 ] WARNING: CPU: 0 PID: 1 at kernel/irq/manage.c:1826
free_irq+0x100/0x480
[    3.355112 ] Modules linked in:
[    3.355310 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted
5.13.0-rc1-00144-g25a1298726e #13
[    3.355816 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[    3.356552 ] RIP: 0010:free_irq+0x100/0x480
[    3.356820 ] Code: 6e 08 74 6f 4d 89 f4 e8 5e ac 09 00 4d 8b 74 24 18
4d 85 f6 75 e3 e8 4f ac 09 00 8b 75 c8 48 c7 c7 78 c1 2e 85 e8 e0 cf f5
ff &lt;0f&gt; 0b 48 8b 75 c0 4c 89 ff e8 72 33 0b 03 48 8b 43 40 4c 8b a0 80
[    3.358012 ] RSP: 0000:ffffc90000017b48 EFLAGS: 00010082
[    3.358357 ] RAX: 0000000000000000 RBX: ffff888104dc8000 RCX:
0000000000000000
[    3.358814 ] RDX: ffff8881003c8000 RSI: ffffffff8124a9e6 RDI:
00000000ffffffff
[    3.359272 ] RBP: ffffc90000017b88 R08: 0000000000000000 R09:
0000000000000000
[    3.359732 ] R10: ffffc900000179f0 R11: 0000000000001d04 R12:
0000000000000000
[    3.360195 ] R13: ffff888107dc6000 R14: ffff888107dc6928 R15:
ffff888104dc80a8
[    3.360652 ] FS:  0000000000000000(0000) GS:ffff88817bc00000(0000)
knlGS:0000000000000000
[    3.361170 ] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    3.361538 ] CR2: 0000000000000000 CR3: 000000000582e000 CR4:
00000000000006f0
[    3.362003 ] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[    3.362175 ] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[    3.362175 ] Call Trace:
[    3.362175 ]  nj_release+0x51/0x1e0
[    3.362175 ]  nj_probe+0x450/0x950
[    3.362175 ]  ? pci_device_remove+0x110/0x110
[    3.362175 ]  local_pci_probe+0x45/0xa0
[    3.362175 ]  pci_device_probe+0x12b/0x1d0
[    3.362175 ]  really_probe+0x2a9/0x610
[    3.362175 ]  driver_probe_device+0x90/0x1d0
[    3.362175 ]  ? mutex_lock_nested+0x1b/0x20
[    3.362175 ]  device_driver_attach+0x68/0x70
[    3.362175 ]  __driver_attach+0x124/0x1b0
[    3.362175 ]  ? device_driver_attach+0x70/0x70
[    3.362175 ]  bus_for_each_dev+0xbb/0x110
[    3.362175 ]  ? rdinit_setup+0x45/0x45
[    3.362175 ]  driver_attach+0x27/0x30
[    3.362175 ]  bus_add_driver+0x1eb/0x2a0
[    3.362175 ]  driver_register+0xa9/0x180
[    3.362175 ]  __pci_register_driver+0x82/0x90
[    3.362175 ]  ? w6692_init+0x38/0x38
[    3.362175 ]  nj_init+0x36/0x38
[    3.362175 ]  do_one_initcall+0x7f/0x3d0
[    3.362175 ]  ? rdinit_setup+0x45/0x45
[    3.362175 ]  ? rcu_read_lock_sched_held+0x4f/0x80
[    3.362175 ]  kernel_init_freeable+0x2aa/0x301
[    3.362175 ]  ? rest_init+0x2c0/0x2c0
[    3.362175 ]  kernel_init+0x18/0x190
[    3.362175 ]  ? rest_init+0x2c0/0x2c0
[    3.362175 ]  ? rest_init+0x2c0/0x2c0
[    3.362175 ]  ret_from_fork+0x1f/0x30
[    3.362175 ] Kernel panic - not syncing: panic_on_warn set ...
[    3.362175 ] CPU: 0 PID: 1 Comm: swapper/0 Not tainted
5.13.0-rc1-00144-g25a1298726e #13
[    3.362175 ] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[    3.362175 ] Call Trace:
[    3.362175 ]  dump_stack+0xba/0xf5
[    3.362175 ]  ? free_irq+0x100/0x480
[    3.362175 ]  panic+0x15a/0x3f2
[    3.362175 ]  ? __warn+0xf2/0x150
[    3.362175 ]  ? free_irq+0x100/0x480
[    3.362175 ]  __warn+0x108/0x150
[    3.362175 ]  ? free_irq+0x100/0x480
[    3.362175 ]  report_bug+0x119/0x1c0
[    3.362175 ]  handle_bug+0x3b/0x80
[    3.362175 ]  exc_invalid_op+0x18/0x70
[    3.362175 ]  asm_exc_invalid_op+0x12/0x20
[    3.362175 ] RIP: 0010:free_irq+0x100
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47284/">CVE-2021-47284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47284">CVE-2021-47284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224987">SUSE bug 1224987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47286" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47286" ref_url="https://www.suse.com/security/cve/CVE-2021-47286" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: core: Validate channel ID when processing command completions

MHI reads the channel ID from the event ring element sent by the
device which can be any value between 0 and 255. In order to
prevent any out of bound accesses, add a check against the maximum
number of channels supported by the controller and those channels
not configured yet so as to skip processing of that event ring
element.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47286/">CVE-2021-47286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47286">CVE-2021-47286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224890">SUSE bug 1224890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47287" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47287" ref_url="https://www.suse.com/security/cve/CVE-2021-47287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: auxiliary bus: Fix memory leak when driver_register() fail

If driver_register() returns with error we need to free the memory
allocated for auxdrv-&gt;driver.name before returning from
__auxiliary_driver_register()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47287/">CVE-2021-47287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47287">CVE-2021-47287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224985">SUSE bug 1224985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47288" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47288" ref_url="https://www.suse.com/security/cve/CVE-2021-47288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()

Fix an 11-year old bug in ngene_command_config_free_buf() while
addressing the following warnings caught with -Warray-bounds:

arch/alpha/include/asm/string.h:22:16: warning: '__builtin_memcpy' offset [12, 16] from the object at 'com' is out of the bounds of referenced subobject 'config' with type 'unsigned char' at offset 10 [-Warray-bounds]
arch/x86/include/asm/string_32.h:182:25: warning: '__builtin_memcpy' offset [12, 16] from the object at 'com' is out of the bounds of referenced subobject 'config' with type 'unsigned char' at offset 10 [-Warray-bounds]

The problem is that the original code is trying to copy 6 bytes of
data into a one-byte size member _config_ of the wrong structue
FW_CONFIGURE_BUFFERS, in a single call to memcpy(). This causes a
legitimate compiler warning because memcpy() overruns the length
of &amp;com.cmd.ConfigureBuffers.config. It seems that the right
structure is FW_CONFIGURE_FREE_BUFFERS, instead, because it contains
6 more members apart from the header _hdr_. Also, the name of
the function ngene_command_config_free_buf() suggests that the actual
intention is to ConfigureFreeBuffers, instead of ConfigureBuffers
(which takes place in the function ngene_command_config_buf(), above).

Fix this by enclosing those 6 members of struct FW_CONFIGURE_FREE_BUFFERS
into new struct config, and use &amp;com.cmd.ConfigureFreeBuffers.config as
the destination address, instead of &amp;com.cmd.ConfigureBuffers.config,
when calling memcpy().

This also helps with the ongoing efforts to globally enable
-Warray-bounds and get us closer to being able to tighten the
FORTIFY_SOURCE routines on memcpy().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47288/">CVE-2021-47288 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47288">CVE-2021-47288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224889">SUSE bug 1224889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47289" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47289" ref_url="https://www.suse.com/security/cve/CVE-2021-47289" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: fix NULL pointer dereference

Commit 71f642833284 ("ACPI: utils: Fix reference counting in
for_each_acpi_dev_match()") started doing "acpi_dev_put()" on a pointer
that was possibly NULL.  That fails miserably, because that helper
inline function is not set up to handle that case.

Just make acpi_dev_put() silently accept a NULL pointer, rather than
calling down to put_device() with an invalid offset off that NULL
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-13"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47289/">CVE-2021-47289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47289">CVE-2021-47289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224984">SUSE bug 1224984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47290" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47290" ref_url="https://www.suse.com/security/cve/CVE-2021-47290" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix NULL dereference on XCOPY completion

CPU affinity control added with commit 39ae3edda325 ("scsi: target: core:
Make completion affinity configurable") makes target_complete_cmd() queue
work on a CPU based on se_tpg-&gt;se_tpg_wwn-&gt;cmd_compl_affinity state.

LIO's EXTENDED COPY worker is a special case in that read/write cmds are
dispatched using the global xcopy_pt_tpg, which carries a NULL se_tpg_wwn
pointer following initialization in target_xcopy_setup_pt().

The NULL xcopy_pt_tpg-&gt;se_tpg_wwn pointer is dereferenced on completion of
any EXTENDED COPY initiated read/write cmds. E.g using the libiscsi
SCSI.ExtendedCopy.Simple test:

  BUG: kernel NULL pointer dereference, address: 00000000000001a8
  RIP: 0010:target_complete_cmd+0x9d/0x130 [target_core_mod]
  Call Trace:
   fd_execute_rw+0x148/0x42a [target_core_file]
   ? __dynamic_pr_debug+0xa7/0xe0
   ? target_check_reservation+0x5b/0x940 [target_core_mod]
   __target_execute_cmd+0x1e/0x90 [target_core_mod]
   transport_generic_new_cmd+0x17c/0x330 [target_core_mod]
   target_xcopy_issue_pt_cmd+0x9/0x60 [target_core_mod]
   target_xcopy_read_source.isra.7+0x10b/0x1b0 [target_core_mod]
   ? target_check_fua+0x40/0x40 [target_core_mod]
   ? transport_complete_task_attr+0x130/0x130 [target_core_mod]
   target_xcopy_do_work+0x61f/0xc00 [target_core_mod]

This fix makes target_complete_cmd() queue work on se_cmd-&gt;cpuid if
se_tpg_wwn is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47290/">CVE-2021-47290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47290">CVE-2021-47290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224884">SUSE bug 1224884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47291" ref_url="https://www.suse.com/security/cve/CVE-2021-47291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions

While running the self-tests on a KASAN enabled kernel, I observed a
slab-out-of-bounds splat very similar to the one reported in
commit 821bbf79fe46 ("ipv6: Fix KASAN: slab-out-of-bounds Read in
 fib6_nh_flush_exceptions").

We additionally need to take care of fib6_metrics initialization
failure when the caller provides an nh.

The fix is similar, explicitly free the route instead of calling
fib6_info_release on a half-initialized object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47291/">CVE-2021-47291 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47291">CVE-2021-47291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224918">SUSE bug 1224918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227651">SUSE bug 1227651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47292" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47292" ref_url="https://www.suse.com/security/cve/CVE-2021-47292" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix memleak in io_init_wq_offload()

I got memory leak report when doing fuzz test:

BUG: memory leak
unreferenced object 0xffff888107310a80 (size 96):
comm "syz-executor.6", pid 4610, jiffies 4295140240 (age 20.135s)
hex dump (first 32 bytes):
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
backtrace:
[&lt;000000001974933b&gt;] kmalloc include/linux/slab.h:591 [inline]
[&lt;000000001974933b&gt;] kzalloc include/linux/slab.h:721 [inline]
[&lt;000000001974933b&gt;] io_init_wq_offload fs/io_uring.c:7920 [inline]
[&lt;000000001974933b&gt;] io_uring_alloc_task_context+0x466/0x640 fs/io_uring.c:7955
[&lt;0000000039d0800d&gt;] __io_uring_add_tctx_node+0x256/0x360 fs/io_uring.c:9016
[&lt;000000008482e78c&gt;] io_uring_add_tctx_node fs/io_uring.c:9052 [inline]
[&lt;000000008482e78c&gt;] __do_sys_io_uring_enter fs/io_uring.c:9354 [inline]
[&lt;000000008482e78c&gt;] __se_sys_io_uring_enter fs/io_uring.c:9301 [inline]
[&lt;000000008482e78c&gt;] __x64_sys_io_uring_enter+0xabc/0xc20 fs/io_uring.c:9301
[&lt;00000000b875f18f&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[&lt;00000000b875f18f&gt;] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
[&lt;000000006b0a8484&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae

CPU0                          CPU1
io_uring_enter                io_uring_enter
io_uring_add_tctx_node        io_uring_add_tctx_node
__io_uring_add_tctx_node      __io_uring_add_tctx_node
io_uring_alloc_task_context   io_uring_alloc_task_context
io_init_wq_offload            io_init_wq_offload
hash = kzalloc                hash = kzalloc
ctx-&gt;hash_map = hash          ctx-&gt;hash_map = hash &lt;- one of the hash is leaked

When calling io_uring_enter() in parallel, the 'hash_map' will be leaked,
add uring_lock to protect 'hash_map'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47292/">CVE-2021-47292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47292">CVE-2021-47292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224979">SUSE bug 1224979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47293" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47293" ref_url="https://www.suse.com/security/cve/CVE-2021-47293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_skbmod: Skip non-Ethernet packets

Currently tcf_skbmod_act() assumes that packets use Ethernet as their L2
protocol, which is not always the case.  As an example, for CAN devices:

	$ ip link add dev vcan0 type vcan
	$ ip link set up vcan0
	$ tc qdisc add dev vcan0 root handle 1: htb
	$ tc filter add dev vcan0 parent 1: protocol ip prio 10 \
		matchall action skbmod swap mac

Doing the above silently corrupts all the packets.  Do not perform skbmod
actions for non-Ethernet packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47293/">CVE-2021-47293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47293">CVE-2021-47293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224978">SUSE bug 1224978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47294" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47294" ref_url="https://www.suse.com/security/cve/CVE-2021-47294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netrom: Decrease sock refcount when sock timers expire

Commit 63346650c1a9 ("netrom: switch to sock timer API") switched to use
sock timer API. It replaces mod_timer() by sk_reset_timer(), and
del_timer() by sk_stop_timer().

Function sk_reset_timer() will increase the refcount of sock if it is
called on an inactive timer, hence, in case the timer expires, we need to
decrease the refcount ourselves in the handler, otherwise, the sock
refcount will be unbalanced and the sock will never be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47294/">CVE-2021-47294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47294">CVE-2021-47294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224977">SUSE bug 1224977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47295" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47295" ref_url="https://www.suse.com/security/cve/CVE-2021-47295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="TID000021588" ref_url="https://www.suse.com/support/kb/doc/?id=000021588" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix memory leak in tcindex_partial_destroy_work

Syzbot reported memory leak in tcindex_set_parms(). The problem was in
non-freed perfect hash in tcindex_partial_destroy_work().

In tcindex_set_parms() new tcindex_data is allocated and some fields from
old one are copied to new one, but not the perfect hash. Since
tcindex_partial_destroy_work() is the destroy function for old
tcindex_data, we need to free perfect hash to avoid memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-10-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47295/">CVE-2021-47295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47295">CVE-2021-47295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224975">SUSE bug 1224975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47296" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47296" ref_url="https://www.suse.com/security/cve/CVE-2021-47296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak

vcpu_put is not called if the user copy fails. This can result in preempt
notifier corruption and crashes, among other issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47296/">CVE-2021-47296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47296">CVE-2021-47296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224891">SUSE bug 1224891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47297" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47297" ref_url="https://www.suse.com/security/cve/CVE-2021-47297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix uninit-value in caif_seqpkt_sendmsg

When nr_segs equal to zero in iovec_from_user, the object
msg-&gt;msg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg
which is defined in ___sys_sendmsg. So we cann't just judge
msg-&gt;msg_iter.iov-&gt;base directlly. We can use nr_segs to judge
msg in caif_seqpkt_sendmsg whether has data buffers.

=====================================================
BUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1c9/0x220 lib/dump_stack.c:118
 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118
 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215
 caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542
 sock_sendmsg_nosec net/socket.c:652 [inline]
 sock_sendmsg net/socket.c:672 [inline]
 ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343
 ___sys_sendmsg net/socket.c:2397 [inline]
 __sys_sendmmsg+0x808/0xc90 net/socket.c:2480
 __compat_sys_sendmmsg net/compat.c:656 [inline]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47297/">CVE-2021-47297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47297">CVE-2021-47297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224976">SUSE bug 1224976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47298" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47298" ref_url="https://www.suse.com/security/cve/CVE-2021-47298" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix potential memory leak on unlikely error case

If skb_linearize is needed and fails we could leak a msg on the error
handling. To fix ensure we kfree the msg block before returning error.
Found during code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47298/">CVE-2021-47298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47298">CVE-2021-47298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224974">SUSE bug 1224974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47299" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47299" ref_url="https://www.suse.com/security/cve/CVE-2021-47299" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp, net: Fix use-after-free in bpf_xdp_link_release

The problem occurs between dev_get_by_index() and dev_xdp_attach_link().
At this point, dev_xdp_uninstall() is called. Then xdp link will not be
detached automatically when dev is released. But link-&gt;dev already
points to dev, when xdp link is released, dev will still be accessed,
but dev has been released.

dev_get_by_index()        |
link-&gt;dev = dev           |
                          |      rtnl_lock()
                          |      unregister_netdevice_many()
                          |          dev_xdp_uninstall()
                          |      rtnl_unlock()
rtnl_lock();              |
dev_xdp_attach_link()     |
rtnl_unlock();            |
                          |      netdev_run_todo() // dev released
bpf_xdp_link_release()    |
    /* access dev.        |
       use-after-free */  |

[   45.966867] BUG: KASAN: use-after-free in bpf_xdp_link_release+0x3b8/0x3d0
[   45.967619] Read of size 8 at addr ffff00000f9980c8 by task a.out/732
[   45.968297]
[   45.968502] CPU: 1 PID: 732 Comm: a.out Not tainted 5.13.0+ #22
[   45.969222] Hardware name: linux,dummy-virt (DT)
[   45.969795] Call trace:
[   45.970106]  dump_backtrace+0x0/0x4c8
[   45.970564]  show_stack+0x30/0x40
[   45.970981]  dump_stack_lvl+0x120/0x18c
[   45.971470]  print_address_description.constprop.0+0x74/0x30c
[   45.972182]  kasan_report+0x1e8/0x200
[   45.972659]  __asan_report_load8_noabort+0x2c/0x50
[   45.973273]  bpf_xdp_link_release+0x3b8/0x3d0
[   45.973834]  bpf_link_free+0xd0/0x188
[   45.974315]  bpf_link_put+0x1d0/0x218
[   45.974790]  bpf_link_release+0x3c/0x58
[   45.975291]  __fput+0x20c/0x7e8
[   45.975706]  ____fput+0x24/0x30
[   45.976117]  task_work_run+0x104/0x258
[   45.976609]  do_notify_resume+0x894/0xaf8
[   45.977121]  work_pending+0xc/0x328
[   45.977575]
[   45.977775] The buggy address belongs to the page:
[   45.978369] page:fffffc00003e6600 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4f998
[   45.979522] flags: 0x7fffe0000000000(node=0|zone=0|lastcpupid=0x3ffff)
[   45.980349] raw: 07fffe0000000000 fffffc00003e6708 ffff0000dac3c010 0000000000000000
[   45.981309] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   45.982259] page dumped because: kasan: bad access detected
[   45.982948]
[   45.983153] Memory state around the buggy address:
[   45.983753]  ffff00000f997f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   45.984645]  ffff00000f998000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.985533] &gt;ffff00000f998080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.986419]                                               ^
[   45.987112]  ffff00000f998100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.988006]  ffff00000f998180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   45.988895] ==================================================================
[   45.989773] Disabling lock debugging due to kernel taint
[   45.990552] Kernel panic - not syncing: panic_on_warn set ...
[   45.991166] CPU: 1 PID: 732 Comm: a.out Tainted: G    B             5.13.0+ #22
[   45.991929] Hardware name: linux,dummy-virt (DT)
[   45.992448] Call trace:
[   45.992753]  dump_backtrace+0x0/0x4c8
[   45.993208]  show_stack+0x30/0x40
[   45.993627]  dump_stack_lvl+0x120/0x18c
[   45.994113]  dump_stack+0x1c/0x34
[   45.994530]  panic+0x3a4/0x7d8
[   45.994930]  end_report+0x194/0x198
[   45.995380]  kasan_report+0x134/0x200
[   45.995850]  __asan_report_load8_noabort+0x2c/0x50
[   45.996453]  bpf_xdp_link_release+0x3b8/0x3d0
[   45.997007]  bpf_link_free+0xd0/0x188
[   45.997474]  bpf_link_put+0x1d0/0x218
[   45.997942]  bpf_link_release+0x3c/0x58
[   45.998429]  __fput+0x20c/0x7e8
[   45.998833]  ____fput+0x24/0x30
[   45.999247]  task_work_run+0x104/0x258
[   45.999731]  do_notify_resume+0x894/0xaf8
[   46.000236]  work_pending
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47299/">CVE-2021-47299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47299">CVE-2021-47299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224973">SUSE bug 1224973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47300" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47300" ref_url="https://www.suse.com/security/cve/CVE-2021-47300" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix tail_call_reachable rejection for interpreter when jit failed

During testing of f263a81451c1 ("bpf: Track subprog poke descriptors correctly
and fix use-after-free") under various failure conditions, for example, when
jit_subprogs() fails and tries to clean up the program to be run under the
interpreter, we ran into the following freeze:

  [...]
  #127/8 tailcall_bpf2bpf_3:FAIL
  [...]
  [   92.041251] BUG: KASAN: slab-out-of-bounds in ___bpf_prog_run+0x1b9d/0x2e20
  [   92.042408] Read of size 8 at addr ffff88800da67f68 by task test_progs/682
  [   92.043707]
  [   92.044030] CPU: 1 PID: 682 Comm: test_progs Tainted: G   O   5.13.0-53301-ge6c08cb33a30-dirty #87
  [   92.045542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014
  [   92.046785] Call Trace:
  [   92.047171]  ? __bpf_prog_run_args64+0xc0/0xc0
  [   92.047773]  ? __bpf_prog_run_args32+0x8b/0xb0
  [   92.048389]  ? __bpf_prog_run_args64+0xc0/0xc0
  [   92.049019]  ? ktime_get+0x117/0x130
  [...] // few hundred [similar] lines more
  [   92.659025]  ? ktime_get+0x117/0x130
  [   92.659845]  ? __bpf_prog_run_args64+0xc0/0xc0
  [   92.660738]  ? __bpf_prog_run_args32+0x8b/0xb0
  [   92.661528]  ? __bpf_prog_run_args64+0xc0/0xc0
  [   92.662378]  ? print_usage_bug+0x50/0x50
  [   92.663221]  ? print_usage_bug+0x50/0x50
  [   92.664077]  ? bpf_ksym_find+0x9c/0xe0
  [   92.664887]  ? ktime_get+0x117/0x130
  [   92.665624]  ? kernel_text_address+0xf5/0x100
  [   92.666529]  ? __kernel_text_address+0xe/0x30
  [   92.667725]  ? unwind_get_return_address+0x2f/0x50
  [   92.668854]  ? ___bpf_prog_run+0x15d4/0x2e20
  [   92.670185]  ? ktime_get+0x117/0x130
  [   92.671130]  ? __bpf_prog_run_args64+0xc0/0xc0
  [   92.672020]  ? __bpf_prog_run_args32+0x8b/0xb0
  [   92.672860]  ? __bpf_prog_run_args64+0xc0/0xc0
  [   92.675159]  ? ktime_get+0x117/0x130
  [   92.677074]  ? lock_is_held_type+0xd5/0x130
  [   92.678662]  ? ___bpf_prog_run+0x15d4/0x2e20
  [   92.680046]  ? ktime_get+0x117/0x130
  [   92.681285]  ? __bpf_prog_run32+0x6b/0x90
  [   92.682601]  ? __bpf_prog_run64+0x90/0x90
  [   92.683636]  ? lock_downgrade+0x370/0x370
  [   92.684647]  ? mark_held_locks+0x44/0x90
  [   92.685652]  ? ktime_get+0x117/0x130
  [   92.686752]  ? lockdep_hardirqs_on+0x79/0x100
  [   92.688004]  ? ktime_get+0x117/0x130
  [   92.688573]  ? __cant_migrate+0x2b/0x80
  [   92.689192]  ? bpf_test_run+0x2f4/0x510
  [   92.689869]  ? bpf_test_timer_continue+0x1c0/0x1c0
  [   92.690856]  ? rcu_read_lock_bh_held+0x90/0x90
  [   92.691506]  ? __kasan_slab_alloc+0x61/0x80
  [   92.692128]  ? eth_type_trans+0x128/0x240
  [   92.692737]  ? __build_skb+0x46/0x50
  [   92.693252]  ? bpf_prog_test_run_skb+0x65e/0xc50
  [   92.693954]  ? bpf_prog_test_run_raw_tp+0x2d0/0x2d0
  [   92.694639]  ? __fget_light+0xa1/0x100
  [   92.695162]  ? bpf_prog_inc+0x23/0x30
  [   92.695685]  ? __sys_bpf+0xb40/0x2c80
  [   92.696324]  ? bpf_link_get_from_fd+0x90/0x90
  [   92.697150]  ? mark_held_locks+0x24/0x90
  [   92.698007]  ? lockdep_hardirqs_on_prepare+0x124/0x220
  [   92.699045]  ? finish_task_switch+0xe6/0x370
  [   92.700072]  ? lockdep_hardirqs_on+0x79/0x100
  [   92.701233]  ? finish_task_switch+0x11d/0x370
  [   92.702264]  ? __switch_to+0x2c0/0x740
  [   92.703148]  ? mark_held_locks+0x24/0x90
  [   92.704155]  ? __x64_sys_bpf+0x45/0x50
  [   92.705146]  ? do_syscall_64+0x35/0x80
  [   92.706953]  ? entry_SYSCALL_64_after_hwframe+0x44/0xae
  [...]

Turns out that the program rejection from e411901c0b77 ("bpf: allow for tailcalls
in BPF subprograms for x64 JIT") is buggy since env-&gt;prog-&gt;aux-&gt;tail_call_reachable
is never true. Commit ebf7d1f508a7 ("bpf, x64: rework pro/epilogue and tailcall
handling in JIT") added a tracker into check_max_stack_depth() which propagates
the tail_call_reachable condition throughout the subprograms. This info is then
assigned to the subprogram's 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47300/">CVE-2021-47300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47300">CVE-2021-47300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224972">SUSE bug 1224972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47301" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47301" ref_url="https://www.suse.com/security/cve/CVE-2021-47301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix use-after-free error during reset

Cleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.

Failure to do so can cause invalid memory accesses. If igb_poll() runs
while the controller is reset this can lead to the driver try to free
a skb that was already freed.

(The crash is harder to reproduce with the igb driver, but the same
potential problem exists as the code is identical to igc)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47301/">CVE-2021-47301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47301">CVE-2021-47301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224916">SUSE bug 1224916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47302" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47302" ref_url="https://www.suse.com/security/cve/CVE-2021-47302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: Fix use-after-free error during reset

Cleans the next descriptor to watch (next_to_watch) when cleaning the
TX ring.

Failure to do so can cause invalid memory accesses. If igc_poll() runs
while the controller is being reset this can lead to the driver try to
free a skb that was already freed.

Log message:

 [  101.525242] refcount_t: underflow; use-after-free.
 [  101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0
 [  101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E)
 x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E)
 ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E)
 rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E)
 soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E)
 iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E)
 soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E)
 autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E)
 i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E)
 [  101.525303]  drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E)
 e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E)
 usbcore(E) drm(E) button(E) video(E)
 [  101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G            E     5.10.30-rt37-tsn1-rt-ipipe #ipipe
 [  101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017
 [  101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0
 [  101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48
 44 01 01 e8 d1 c6 42 00 &lt;0f&gt; 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3
 [  101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286
 [  101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001
 [  101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff
 [  101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50
 [  101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00
 [  101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40
 [  101.525337] FS:  0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000
 [  101.525339] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [  101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0
 [  101.525343] Call Trace:
 [  101.525346]  sock_wfree+0x9c/0xa0
 [  101.525353]  unix_destruct_scm+0x7b/0xa0
 [  101.525358]  skb_release_head_state+0x40/0x90
 [  101.525362]  skb_release_all+0xe/0x30
 [  101.525364]  napi_consume_skb+0x57/0x160
 [  101.525367]  igc_poll+0xb7/0xc80 [igc]
 [  101.525376]  ? sched_clock+0x5/0x10
 [  101.525381]  ? sched_clock_cpu+0xe/0x100
 [  101.525385]  net_rx_action+0x14c/0x410
 [  101.525388]  __do_softirq+0xe9/0x2f4
 [  101.525391]  __local_bh_enable_ip+0xe3/0x110
 [  101.525395]  ? irq_finalize_oneshot.part.47+0xe0/0xe0
 [  101.525398]  irq_forced_thread_fn+0x6a/0x80
 [  101.525401]  irq_thread+0xe8/0x180
 [  101.525403]  ? wake_threads_waitq+0x30/0x30
 [  101.525406]  ? irq_thread_check_affinity+0xd0/0xd0
 [  101.525408]  kthread+0x183/0x1a0
 [  101.525412]  ? kthread_park+0x80/0x80
 [  101.525415]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47302/">CVE-2021-47302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47302">CVE-2021-47302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224917">SUSE bug 1224917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47303" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47303" ref_url="https://www.suse.com/security/cve/CVE-2021-47303" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Track subprog poke descriptors correctly and fix use-after-free

Subprograms are calling map_poke_track(), but on program release there is no
hook to call map_poke_untrack(). However, on program release, the aux memory
(and poke descriptor table) is freed even though we still have a reference to
it in the element list of the map aux data. When we run map_poke_run(), we then
end up accessing free'd memory, triggering KASAN in prog_array_map_poke_run():

  [...]
  [  402.824689] BUG: KASAN: use-after-free in prog_array_map_poke_run+0xc2/0x34e
  [  402.824698] Read of size 4 at addr ffff8881905a7940 by task hubble-fgs/4337
  [  402.824705] CPU: 1 PID: 4337 Comm: hubble-fgs Tainted: G          I       5.12.0+ #399
  [  402.824715] Call Trace:
  [  402.824719]  dump_stack+0x93/0xc2
  [  402.824727]  print_address_description.constprop.0+0x1a/0x140
  [  402.824736]  ? prog_array_map_poke_run+0xc2/0x34e
  [  402.824740]  ? prog_array_map_poke_run+0xc2/0x34e
  [  402.824744]  kasan_report.cold+0x7c/0xd8
  [  402.824752]  ? prog_array_map_poke_run+0xc2/0x34e
  [  402.824757]  prog_array_map_poke_run+0xc2/0x34e
  [  402.824765]  bpf_fd_array_map_update_elem+0x124/0x1a0
  [...]

The elements concerned are walked as follows:

    for (i = 0; i &lt; elem-&gt;aux-&gt;size_poke_tab; i++) {
           poke = &amp;elem-&gt;aux-&gt;poke_tab[i];
    [...]

The access to size_poke_tab is a 4 byte read, verified by checking offsets
in the KASAN dump:

  [  402.825004] The buggy address belongs to the object at ffff8881905a7800
                 which belongs to the cache kmalloc-1k of size 1024
  [  402.825008] The buggy address is located 320 bytes inside of
                 1024-byte region [ffff8881905a7800, ffff8881905a7c00)

The pahole output of bpf_prog_aux:

  struct bpf_prog_aux {
    [...]
    /* --- cacheline 5 boundary (320 bytes) --- */
    u32                        size_poke_tab;        /*   320     4 */
    [...]

In general, subprograms do not necessarily manage their own data structures.
For example, BTF func_info and linfo are just pointers to the main program
structure. This allows reference counting and cleanup to be done on the latter
which simplifies their management a bit. The aux-&gt;poke_tab struct, however,
did not follow this logic. The initial proposed fix for this use-after-free
bug further embedded poke data tracking into the subprogram with proper
reference counting. However, Daniel and Alexei questioned why we were treating
these objects special; I agree, its unnecessary. The fix here removes the per
subprogram poke table allocation and map tracking and instead simply points
the aux-&gt;poke_tab pointer at the main programs poke table. This way, map
tracking is simplified to the main program and we do not need to manage them
per subprogram.

This also means, bpf_prog_free_deferred(), which unwinds the program reference
counting and kfrees objects, needs to ensure that we don't try to double free
the poke_tab when free'ing the subprog structures. This is easily solved by
NULL'ing the poke_tab pointer. The second detail is to ensure that per
subprogram JIT logic only does fixups on poke_tab[] entries it owns. To do
this, we add a pointer in the poke structure to point at the subprogram value
so JITs can easily check while walking the poke_tab structure if the current
entry belongs to the current program. The aux pointer is stable and therefore
suitable for such comparison. On the jit_subprogs() error path, we omit
cleaning up the poke-&gt;aux field because these are only ever referenced from
the JIT side, but on error we will never make it to the JIT, so its fine to
leave them dangling. Removing these pointers would complicate the error path
for no reason. However, we do need to untrack all poke descriptors from the
main program as otherwise they could race with the freeing of JIT memory from
the subprograms. Lastly, a748c6975dea3 ("bpf: propagate poke des
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47303/">CVE-2021-47303 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47303">CVE-2021-47303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224962">SUSE bug 1224962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47304" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47304" ref_url="https://www.suse.com/security/cve/CVE-2021-47304" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized

This commit fixes a bug (found by syzkaller) that could cause spurious
double-initializations for congestion control modules, which could cause
memory leaks or other problems for congestion control modules (like CDG)
that allocate memory in their init functions.

The buggy scenario constructed by syzkaller was something like:

(1) create a TCP socket
(2) initiate a TFO connect via sendto()
(3) while socket is in TCP_SYN_SENT, call setsockopt(TCP_CONGESTION),
    which calls:
       tcp_set_congestion_control() -&gt;
         tcp_reinit_congestion_control() -&gt;
           tcp_init_congestion_control()
(4) receive ACK, connection is established, call tcp_init_transfer(),
    set icsk_ca_initialized=0 (without first calling cc-&gt;release()),
    call tcp_init_congestion_control() again.

Note that in this sequence tcp_init_congestion_control() is called
twice without a cc-&gt;release() call in between. Thus, for CC modules
that allocate memory in their init() function, e.g, CDG, a memory leak
may occur. The syzkaller tool managed to find a reproducer that
triggered such a leak in CDG.

The bug was introduced when that commit 8919a9b31eb4 ("tcp: Only init
congestion control if not initialized already")
introduced icsk_ca_initialized and set icsk_ca_initialized to 0 in
tcp_init_transfer(), missing the possibility for a sequence like the
one above, where a process could call setsockopt(TCP_CONGESTION) in
state TCP_SYN_SENT (i.e. after the connect() or TFO open sendmsg()),
which would call tcp_init_congestion_control(). It did not intend to
reset any initialization that the user had already explicitly made;
it just missed the possibility of that particular sequence (which
syzkaller managed to find).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47304/">CVE-2021-47304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47304">CVE-2021-47304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224971">SUSE bug 1224971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47305" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47305" ref_url="https://www.suse.com/security/cve/CVE-2021-47305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf/sync_file: Don't leak fences on merge failure

Each add_fence() call does a dma_fence_get() on the relevant fence.  In
the error path, we weren't calling dma_fence_put() so all those fences
got leaked.  Also, in the krealloc_array failure case, we weren't
freeing the fences array.  Instead, ensure that i and fences are always
zero-initialized and dma_fence_put() all the fences and kfree(fences) on
every error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47305/">CVE-2021-47305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47305">CVE-2021-47305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224968">SUSE bug 1224968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47306" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47306" ref_url="https://www.suse.com/security/cve/CVE-2021-47306" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fddi: fix UAF in fza_probe

fp is netdev private data and it cannot be
used after free_netdev() call. Using fp after free_netdev()
can cause UAF bug. Fix it by moving free_netdev() after error message.

TURBOchannel adapter")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47306/">CVE-2021-47306 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47306">CVE-2021-47306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224969">SUSE bug 1224969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47307" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47307" ref_url="https://www.suse.com/security/cve/CVE-2021-47307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: prevent NULL deref in cifs_compose_mount_options()

The optional @ref parameter might contain an NULL node_name, so
prevent dereferencing it in cifs_compose_mount_options().

Addresses-Coverity: 1476408 ("Explicit null dereferenced")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47307/">CVE-2021-47307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47307">CVE-2021-47307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224961">SUSE bug 1224961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47309" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47309" ref_url="https://www.suse.com/security/cve/CVE-2021-47309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: validate lwtstate-&gt;data before returning from skb_tunnel_info()

skb_tunnel_info() returns pointer of lwtstate-&gt;data as ip_tunnel_info
type without validation. lwtstate-&gt;data can have various types such as
mpls_iptunnel_encap, etc and these are not compatible.
So skb_tunnel_info() should validate before returning that pointer.

Splat looks like:
BUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan]
Read of size 2 at addr ffff888106ec2698 by task ping/811

CPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195
Call Trace:
 dump_stack_lvl+0x56/0x7b
 print_address_description.constprop.8.cold.13+0x13/0x2ee
 ? vxlan_get_route+0x418/0x4b0 [vxlan]
 ? vxlan_get_route+0x418/0x4b0 [vxlan]
 kasan_report.cold.14+0x83/0xdf
 ? vxlan_get_route+0x418/0x4b0 [vxlan]
 vxlan_get_route+0x418/0x4b0 [vxlan]
 [ ... ]
 vxlan_xmit_one+0x148b/0x32b0 [vxlan]
 [ ... ]
 vxlan_xmit+0x25c5/0x4780 [vxlan]
 [ ... ]
 dev_hard_start_xmit+0x1ae/0x6e0
 __dev_queue_xmit+0x1f39/0x31a0
 [ ... ]
 neigh_xmit+0x2f9/0x940
 mpls_xmit+0x911/0x1600 [mpls_iptunnel]
 lwtunnel_xmit+0x18f/0x450
 ip_finish_output2+0x867/0x2040
 [ ... ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47309/">CVE-2021-47309 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47309">CVE-2021-47309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224967">SUSE bug 1224967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47310" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47310" ref_url="https://www.suse.com/security/cve/CVE-2021-47310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ti: fix UAF in tlan_remove_one

priv is netdev private data and it cannot be
used after free_netdev() call. Using priv after free_netdev()
can cause UAF bug. Fix it by moving free_netdev() at the end of the
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47310/">CVE-2021-47310 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47310">CVE-2021-47310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224959">SUSE bug 1224959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47311" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47311" ref_url="https://www.suse.com/security/cve/CVE-2021-47311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qcom/emac: fix UAF in emac_remove

adpt is netdev private data and it cannot be
used after free_netdev() call. Using adpt after free_netdev()
can cause UAF bug. Fix it by moving free_netdev() at the end of the
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47311/">CVE-2021-47311 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47311">CVE-2021-47311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225010">SUSE bug 1225010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227752">SUSE bug 1227752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47312" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47312" ref_url="https://www.suse.com/security/cve/CVE-2021-47312" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix dereference of null pointer flow

In the case where chain-&gt;flags &amp; NFT_CHAIN_HW_OFFLOAD is false then
nft_flow_rule_create is not called and flow is NULL. The subsequent
error handling execution via label err_destroy_flow_rule will lead
to a null pointer dereference on flow when calling nft_flow_rule_destroy.
Since the error path to err_destroy_flow_rule has to cater for null
and non-null flows, only call nft_flow_rule_destroy if flow is non-null
to fix this issue.

Addresses-Coverity: ("Explicity null dereference")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47312/">CVE-2021-47312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47312">CVE-2021-47312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225048">SUSE bug 1225048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47313" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47313" ref_url="https://www.suse.com/security/cve/CVE-2021-47313" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init

It's a classic example of memleak, we allocate something, we fail and
never free the resources.

Make sure we free all resources on policy -&gt;init() failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47313/">CVE-2021-47313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47313">CVE-2021-47313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225051">SUSE bug 1225051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47314" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47314" ref_url="https://www.suse.com/security/cve/CVE-2021-47314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memory: fsl_ifc: fix leak of private memory on probe failure

On probe error the driver should free the memory allocated for private
structure.  Fix this by using resource-managed allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47314/">CVE-2021-47314 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47314">CVE-2021-47314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224893">SUSE bug 1224893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47315" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47315" ref_url="https://www.suse.com/security/cve/CVE-2021-47315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memory: fsl_ifc: fix leak of IO mapping on probe failure

On probe error the driver should unmap the IO memory.  Smatch reports:

  drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: 'fsl_ifc_ctrl_dev-&gt;gregs' not released on lines: 298.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47315/">CVE-2021-47315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47315">CVE-2021-47315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224892">SUSE bug 1224892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47316" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47316" ref_url="https://www.suse.com/security/cve/CVE-2021-47316" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix NULL dereference in nfs3svc_encode_getaclres

In error cases the dentry may be NULL.

Before 20798dfe249a, the encoder also checked dentry and
d_really_is_positive(dentry), but that looks like overkill to me--zero
status should be enough to guarantee a positive dentry.

This isn't the first time we've seen an error-case NULL dereference
hidden in the initialization of a local variable in an xdr encoder.  But
I went back through the other recent rewrites and didn't spot any
similar bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47316/">CVE-2021-47316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47316">CVE-2021-47316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225052">SUSE bug 1225052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47317" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47317" ref_url="https://www.suse.com/security/cve/CVE-2021-47317" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/bpf: Fix detecting BPF atomic instructions

Commit 91c960b0056672 ("bpf: Rename BPF_XADD and prepare to encode other
atomics in .imm") converted BPF_XADD to BPF_ATOMIC and added a way to
distinguish instructions based on the immediate field. Existing JIT
implementations were updated to check for the immediate field and to
reject programs utilizing anything more than BPF_ADD (such as BPF_FETCH)
in the immediate field.

However, the check added to powerpc64 JIT did not look at the correct
BPF instruction. Due to this, such programs would be accepted and
incorrectly JIT'ed resulting in soft lockups, as seen with the atomic
bounds test. Fix this by looking at the correct immediate value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47317/">CVE-2021-47317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47317">CVE-2021-47317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225055">SUSE bug 1225055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47318" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47318" ref_url="https://www.suse.com/security/cve/CVE-2021-47318" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arch_topology: Avoid use-after-free for scale_freq_data

Currently topology_scale_freq_tick() (which gets called from
scheduler_tick()) may end up using a pointer to "struct
scale_freq_data", which was previously cleared by
topology_clear_scale_freq_source(), as there is no protection in place
here. The users of topology_clear_scale_freq_source() though needs a
guarantee that the previously cleared scale_freq_data isn't used
anymore, so they can free the related resources.

Since topology_scale_freq_tick() is called from scheduler tick, we don't
want to add locking in there. Use the RCU update mechanism instead
(which is already used by the scheduler's utilization update path) to
guarantee race free updates here.

synchronize_rcu() makes sure that all RCU critical sections that started
before it is called, will finish before it returns. And so the callers
of topology_clear_scale_freq_source() don't need to worry about their
callback getting called anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47318/">CVE-2021-47318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47318">CVE-2021-47318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225057">SUSE bug 1225057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227499">SUSE bug 1227499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47319" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47319" ref_url="https://www.suse.com/security/cve/CVE-2021-47319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-blk: Fix memory leak among suspend/resume procedure

The vblk-&gt;vqs should be freed before we call init_vqs()
in virtblk_restore().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47319/">CVE-2021-47319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47319">CVE-2021-47319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225054">SUSE bug 1225054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47321" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47321" ref_url="https://www.suse.com/security/cve/CVE-2021-47321" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watchdog: Fix possible use-after-free by calling del_timer_sync()

This driver's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47321/">CVE-2021-47321 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47321">CVE-2021-47321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225060">SUSE bug 1225060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47322" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47322" ref_url="https://www.suse.com/security/cve/CVE-2021-47322" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT

Fix an Oopsable condition in pnfs_mark_request_commit() when we're
putting a set of writes on the commit list to reschedule them after a
failed pNFS attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47322/">CVE-2021-47322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47322">CVE-2021-47322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225061">SUSE bug 1225061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47323</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47323" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47323" ref_url="https://www.suse.com/security/cve/CVE-2021-47323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()

This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47323/">CVE-2021-47323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47323">CVE-2021-47323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225026">SUSE bug 1225026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227557">SUSE bug 1227557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47324</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47324" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47324" ref_url="https://www.suse.com/security/cve/CVE-2021-47324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watchdog: Fix possible use-after-free in wdt_startup()

This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47324/">CVE-2021-47324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47324">CVE-2021-47324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225030">SUSE bug 1225030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225038">SUSE bug 1225038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47325</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47325" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47325" ref_url="https://www.suse.com/security/cve/CVE-2021-47325" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation

The reference counting issue happens in several exception handling paths
of arm_smmu_iova_to_phys_hard(). When those error scenarios occur, the
function forgets to decrease the refcount of "smmu" increased by
arm_smmu_rpm_get(), causing a refcount leak.

Fix this issue by jumping to "out" label when those error scenarios
occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47325/">CVE-2021-47325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47325">CVE-2021-47325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225043">SUSE bug 1225043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47327" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47327" ref_url="https://www.suse.com/security/cve/CVE-2021-47327" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails

arm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the
refcount of the "smmu" even though the return value is less than 0.

The reference counting issue happens in some error handling paths of
arm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get()
fails, the caller functions forget to decrease the refcount of "smmu"
increased by arm_smmu_rpm_get(), causing a refcount leak.

Fix this issue by calling pm_runtime_resume_and_get() instead of
pm_runtime_get_sync() in arm_smmu_rpm_get(), which can keep the refcount
balanced in case of failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47327/">CVE-2021-47327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47327">CVE-2021-47327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225046">SUSE bug 1225046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47328</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47328" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47328" ref_url="https://www.suse.com/security/cve/CVE-2021-47328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: Fix conn use after free during resets

If we haven't done a unbind target call we can race where
iscsi_conn_teardown wakes up the EH thread and then frees the conn while
those threads are still accessing the conn ehwait.

We can only do one TMF per session so this just moves the TMF fields from
the conn to the session. We can then rely on the
iscsi_session_teardown-&gt;iscsi_remove_session-&gt;__iscsi_unbind_session call
to remove the target and it's devices, and know after that point there is
no device or scsi-ml callout trying to access the session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47328/">CVE-2021-47328 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47328">CVE-2021-47328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225047">SUSE bug 1225047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225080">SUSE bug 1225080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47329</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47329" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47329" ref_url="https://www.suse.com/security/cve/CVE-2021-47329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: megaraid_sas: Fix resource leak in case of probe failure

The driver doesn't clean up all the allocated resources properly when
scsi_add_host(), megasas_start_aen() function fails during the PCI device
probe.

Clean up all those resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47329/">CVE-2021-47329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47329">CVE-2021-47329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225083">SUSE bug 1225083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47330" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47330" ref_url="https://www.suse.com/security/cve/CVE-2021-47330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: 8250: serial_cs: Fix a memory leak in error handling path

In the probe function, if the final 'serial_config()' fails, 'info' is
leaking.

Add a resource handling path to free this memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47330/">CVE-2021-47330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47330">CVE-2021-47330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225084">SUSE bug 1225084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47331</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47331" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47331" ref_url="https://www.suse.com/security/cve/CVE-2021-47331" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: common: usb-conn-gpio: fix NULL pointer dereference of charger

When power on system with OTG cable, IDDIG's interrupt arises before
the charger registration, it will cause a NULL pointer dereference,
fix the issue by registering the power supply before requesting
IDDIG/VBUS irq.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47331/">CVE-2021-47331 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47331">CVE-2021-47331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225087">SUSE bug 1225087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47332" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47332" ref_url="https://www.suse.com/security/cve/CVE-2021-47332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usx2y: Don't call free_pages_exact() with NULL address

Unlike some other functions, we can't pass NULL pointer to
free_pages_exact().  Add a proper NULL check for avoiding possible
Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47332/">CVE-2021-47332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47332">CVE-2021-47332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225091">SUSE bug 1225091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47333</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47333" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47333" ref_url="https://www.suse.com/security/cve/CVE-2021-47333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge

There is an issue with the ASPM(optional) capability checking function.
A device might be attached to root complex directly, in this case,
bus-&gt;self(bridge) will be NULL, thus priv-&gt;parent_pdev is NULL.
Since alcor_pci_init_check_aspm(priv-&gt;parent_pdev) checks the PCI link's
ASPM capability and populate parent_cap_off, which will be used later by
alcor_pci_aspm_ctrl() to dynamically turn on/off device, what we can do
here is to avoid checking the capability if we are on the root complex.
This will make pdev_cap_off 0 and alcor_pci_aspm_ctrl() will simply
return when bring called, effectively disable ASPM for the device.

[    1.246492] BUG: kernel NULL pointer dereference, address: 00000000000000c0
[    1.248731] RIP: 0010:pci_read_config_byte+0x5/0x40
[    1.253998] Call Trace:
[    1.254131]  ? alcor_pci_find_cap_offset.isra.0+0x3a/0x100 [alcor_pci]
[    1.254476]  alcor_pci_probe+0x169/0x2d5 [alcor_pci]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47333/">CVE-2021-47333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47333">CVE-2021-47333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225113">SUSE bug 1225113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47334</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47334" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47334" ref_url="https://www.suse.com/security/cve/CVE-2021-47334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc/libmasm/module: Fix two use after free in ibmasm_init_one

In ibmasm_init_one, it calls ibmasm_init_remote_input_dev().
Inside ibmasm_init_remote_input_dev, mouse_dev and keybd_dev are
allocated by input_allocate_device(), and assigned to
sp-&gt;remote.mouse_dev and sp-&gt;remote.keybd_dev respectively.

In the err_free_devices error branch of ibmasm_init_one,
mouse_dev and keybd_dev are freed by input_free_device(), and return
error. Then the execution runs into error_send_message error branch
of ibmasm_init_one, where ibmasm_free_remote_input_dev(sp) is called
to unregister the freed sp-&gt;remote.mouse_dev and sp-&gt;remote.keybd_dev.

My patch add a "error_init_remote" label to handle the error of
ibmasm_init_remote_input_dev(), to avoid the uaf bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47334/">CVE-2021-47334 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47334">CVE-2021-47334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225112">SUSE bug 1225112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47335</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47335" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47335" ref_url="https://www.suse.com/security/cve/CVE-2021-47335" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances

As syzbot reported, there is an use-after-free issue during f2fs recovery:

Use-after-free write at 0xffff88823bc16040 (in kfence-#10):
 kmem_cache_destroy+0x1f/0x120 mm/slab_common.c:486
 f2fs_recover_fsync_data+0x75b0/0x8380 fs/f2fs/recovery.c:869
 f2fs_fill_super+0x9393/0xa420 fs/f2fs/super.c:3945
 mount_bdev+0x26c/0x3a0 fs/super.c:1367
 legacy_get_tree+0xea/0x180 fs/fs_context.c:592
 vfs_get_tree+0x86/0x270 fs/super.c:1497
 do_new_mount fs/namespace.c:2905 [inline]
 path_mount+0x196f/0x2be0 fs/namespace.c:3235
 do_mount fs/namespace.c:3248 [inline]
 __do_sys_mount fs/namespace.c:3456 [inline]
 __se_sys_mount+0x2f9/0x3b0 fs/namespace.c:3433
 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47
 entry_SYSCALL_64_after_hwframe+0x44/0xae

The root cause is multi f2fs filesystem instances can race on accessing
global fsync_entry_slab pointer, result in use-after-free issue of slab
cache, fixes to init/destroy this slab cache only once during module
init/destroy procedure to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47335/">CVE-2021-47335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47335">CVE-2021-47335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224927">SUSE bug 1224927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47336</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47336" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47336" ref_url="https://www.suse.com/security/cve/CVE-2021-47336" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smackfs: restrict bytes count in smk_set_cipso()

Oops, I failed to update subject line.

From 07571157c91b98ce1a4aa70967531e64b78e8346 Mon Sep 17 00:00:00 2001
Date: Mon, 12 Apr 2021 22:25:06 +0900
Subject: [PATCH] smackfs: restrict bytes count in smk_set_cipso()

Commit 7ef4c19d245f3dc2 ("smackfs: restrict bytes count in smackfs write
functions") missed that count &gt; SMK_CIPSOMAX check applies to only
format == SMK_FIXED24_FMT case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47336/">CVE-2021-47336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47336">CVE-2021-47336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225111">SUSE bug 1225111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47337</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47337" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47337" ref_url="https://www.suse.com/security/cve/CVE-2021-47337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix bad pointer dereference when ehandler kthread is invalid

Commit 66a834d09293 ("scsi: core: Fix error handling of scsi_host_alloc()")
changed the allocation logic to call put_device() to perform host cleanup
with the assumption that IDA removal and stopping the kthread would
properly be performed in scsi_host_dev_release(). However, in the unlikely
case that the error handler thread fails to spawn, shost-&gt;ehandler is set
to ERR_PTR(-ENOMEM).

The error handler cleanup code in scsi_host_dev_release() will call
kthread_stop() if shost-&gt;ehandler != NULL which will always be the case
whether the kthread was successfully spawned or not. In the case that it
failed to spawn this has the nasty side effect of trying to dereference an
invalid pointer when kthread_stop() is called. The following splat provides
an example of this behavior in the wild:

scsi host11: error handler thread failed to spawn, error = -4
Kernel attempted to read user page (10c) - exploit attempt? (uid: 0)
BUG: Kernel NULL pointer dereference on read at 0x0000010c
Faulting instruction address: 0xc00000000818e9a8
Oops: Kernel access of bad area, sig: 11 [#1]
LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: ibmvscsi(+) scsi_transport_srp dm_multipath dm_mirror dm_region
 hash dm_log dm_mod fuse overlay squashfs loop
CPU: 12 PID: 274 Comm: systemd-udevd Not tainted 5.13.0-rc7 #1
NIP:  c00000000818e9a8 LR: c0000000089846e8 CTR: 0000000000007ee8
REGS: c000000037d12ea0 TRAP: 0300   Not tainted  (5.13.0-rc7)
MSR:  800000000280b033 &amp;lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE&amp;gt;  CR: 28228228
XER: 20040001
CFAR: c0000000089846e4 DAR: 000000000000010c DSISR: 40000000 IRQMASK: 0
GPR00: c0000000089846e8 c000000037d13140 c000000009cc1100 fffffffffffffffc
GPR04: 0000000000000001 0000000000000000 0000000000000000 c000000037dc0000
GPR08: 0000000000000000 c000000037dc0000 0000000000000001 00000000fffff7ff
GPR12: 0000000000008000 c00000000a049000 c000000037d13d00 000000011134d5a0
GPR16: 0000000000001740 c0080000190d0000 c0080000190d1740 c000000009129288
GPR20: c000000037d13bc0 0000000000000001 c000000037d13bc0 c0080000190b7898
GPR24: c0080000190b7708 0000000000000000 c000000033bb2c48 0000000000000000
GPR28: c000000046b28280 0000000000000000 000000000000010c fffffffffffffffc
NIP [c00000000818e9a8] kthread_stop+0x38/0x230
LR [c0000000089846e8] scsi_host_dev_release+0x98/0x160
Call Trace:
[c000000033bb2c48] 0xc000000033bb2c48 (unreliable)
[c0000000089846e8] scsi_host_dev_release+0x98/0x160
[c00000000891e960] device_release+0x60/0x100
[c0000000087e55c4] kobject_release+0x84/0x210
[c00000000891ec78] put_device+0x28/0x40
[c000000008984ea4] scsi_host_alloc+0x314/0x430
[c0080000190b38bc] ibmvscsi_probe+0x54/0xad0 [ibmvscsi]
[c000000008110104] vio_bus_probe+0xa4/0x4b0
[c00000000892a860] really_probe+0x140/0x680
[c00000000892aefc] driver_probe_device+0x15c/0x200
[c00000000892b63c] device_driver_attach+0xcc/0xe0
[c00000000892b740] __driver_attach+0xf0/0x200
[c000000008926f28] bus_for_each_dev+0xa8/0x130
[c000000008929ce4] driver_attach+0x34/0x50
[c000000008928fc0] bus_add_driver+0x1b0/0x300
[c00000000892c798] driver_register+0x98/0x1a0
[c00000000810eb60] __vio_register_driver+0x80/0xe0
[c0080000190b4a30] ibmvscsi_module_init+0x9c/0xdc [ibmvscsi]
[c0000000080121d0] do_one_initcall+0x60/0x2d0
[c000000008261abc] do_init_module+0x7c/0x320
[c000000008265700] load_module+0x2350/0x25b0
[c000000008265cb4] __do_sys_finit_module+0xd4/0x160
[c000000008031110] system_call_exception+0x150/0x2d0
[c00000000800d35c] system_call_common+0xec/0x278

Fix this be nulling shost-&gt;ehandler when the kthread fails to spawn.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47337/">CVE-2021-47337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47337">CVE-2021-47337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224926">SUSE bug 1224926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47338</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47338" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47338" ref_url="https://www.suse.com/security/cve/CVE-2021-47338" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbmem: Do not delete the mode that is still in use

The execution of fb_delete_videomode() is not based on the result of the
previous fbcon_mode_deleted(). As a result, the mode is directly deleted,
regardless of whether it is still in use, which may cause UAF.

==================================================================
BUG: KASAN: use-after-free in fb_mode_is_equal+0x36e/0x5e0 \
drivers/video/fbdev/core/modedb.c:924
Read of size 4 at addr ffff88807e0ddb1c by task syz-executor.0/18962

CPU: 2 PID: 18962 Comm: syz-executor.0 Not tainted 5.10.45-rc1+ #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ...
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x137/0x1be lib/dump_stack.c:118
 print_address_description+0x6c/0x640 mm/kasan/report.c:385
 __kasan_report mm/kasan/report.c:545 [inline]
 kasan_report+0x13d/0x1e0 mm/kasan/report.c:562
 fb_mode_is_equal+0x36e/0x5e0 drivers/video/fbdev/core/modedb.c:924
 fbcon_mode_deleted+0x16a/0x220 drivers/video/fbdev/core/fbcon.c:2746
 fb_set_var+0x1e1/0xdb0 drivers/video/fbdev/core/fbmem.c:975
 do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Freed by task 18960:
 kasan_save_stack mm/kasan/common.c:48 [inline]
 kasan_set_track+0x3d/0x70 mm/kasan/common.c:56
 kasan_set_free_info+0x17/0x30 mm/kasan/generic.c:355
 __kasan_slab_free+0x108/0x140 mm/kasan/common.c:422
 slab_free_hook mm/slub.c:1541 [inline]
 slab_free_freelist_hook+0xd6/0x1a0 mm/slub.c:1574
 slab_free mm/slub.c:3139 [inline]
 kfree+0xca/0x3d0 mm/slub.c:4121
 fb_delete_videomode+0x56a/0x820 drivers/video/fbdev/core/modedb.c:1104
 fb_set_var+0x1f3/0xdb0 drivers/video/fbdev/core/fbmem.c:978
 do_fb_ioctl+0x4d9/0x6e0 drivers/video/fbdev/core/fbmem.c:1108
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:739
 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47338/">CVE-2021-47338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47338">CVE-2021-47338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224924">SUSE bug 1224924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47339</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47339" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47339" ref_url="https://www.suse.com/security/cve/CVE-2021-47339" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-core: explicitly clear ioctl input data

As seen from a recent syzbot bug report, mistakes in the compat ioctl
implementation can lead to uninitialized kernel stack data getting used
as input for driver ioctl handlers.

The reported bug is now fixed, but it's possible that other related
bugs are still present or get added in the future. As the drivers need
to check user input already, the possible impact is fairly low, but it
might still cause an information leak.

To be on the safe side, always clear the entire ioctl buffer before
calling the conversion handler functions that are meant to initialize
them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-05-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47339/">CVE-2021-47339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47339">CVE-2021-47339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225102">SUSE bug 1225102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47340" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47340" ref_url="https://www.suse.com/security/cve/CVE-2021-47340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix GPF in diFree

Avoid passing inode with
JFS_SBI(inode-&gt;i_sb)-&gt;ipimap == NULL to
diFree()[1]. GFP will appear:

	struct inode *ipimap = JFS_SBI(ip-&gt;i_sb)-&gt;ipimap;
	struct inomap *imap = JFS_IP(ipimap)-&gt;i_imap;

JFS_IP() will return invalid pointer when ipimap == NULL

Call Trace:
 diFree+0x13d/0x2dc0 fs/jfs/jfs_imap.c:853 [1]
 jfs_evict_inode+0x2c9/0x370 fs/jfs/inode.c:154
 evict+0x2ed/0x750 fs/inode.c:578
 iput_final fs/inode.c:1654 [inline]
 iput.part.0+0x3fe/0x820 fs/inode.c:1680
 iput+0x58/0x70 fs/inode.c:1670
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47340/">CVE-2021-47340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47340">CVE-2021-47340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225148">SUSE bug 1225148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47341</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47341" ref_url="https://www.suse.com/security/cve/CVE-2021-47341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio

BUG: KASAN: use-after-free in kvm_vm_ioctl_unregister_coalesced_mmio+0x7c/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:183
Read of size 8 at addr ffff0000c03a2500 by task syz-executor083/4269

CPU: 5 PID: 4269 Comm: syz-executor083 Not tainted 5.10.0 #7
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace+0x0/0x2d0 arch/arm64/kernel/stacktrace.c:132
 show_stack+0x28/0x34 arch/arm64/kernel/stacktrace.c:196
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x110/0x164 lib/dump_stack.c:118
 print_address_description+0x78/0x5c8 mm/kasan/report.c:385
 __kasan_report mm/kasan/report.c:545 [inline]
 kasan_report+0x148/0x1e4 mm/kasan/report.c:562
 check_memory_region_inline mm/kasan/generic.c:183 [inline]
 __asan_load8+0xb4/0xbc mm/kasan/generic.c:252
 kvm_vm_ioctl_unregister_coalesced_mmio+0x7c/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:183
 kvm_vm_ioctl+0xe30/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3755
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739
 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:48 [inline]
 el0_svc_common arch/arm64/kernel/syscall.c:158 [inline]
 do_el0_svc+0x120/0x290 arch/arm64/kernel/syscall.c:220
 el0_svc+0x1c/0x28 arch/arm64/kernel/entry-common.c:367
 el0_sync_handler+0x98/0x170 arch/arm64/kernel/entry-common.c:383
 el0_sync+0x140/0x180 arch/arm64/kernel/entry.S:670

Allocated by task 4269:
 stack_trace_save+0x80/0xb8 kernel/stacktrace.c:121
 kasan_save_stack mm/kasan/common.c:48 [inline]
 kasan_set_track mm/kasan/common.c:56 [inline]
 __kasan_kmalloc+0xdc/0x120 mm/kasan/common.c:461
 kasan_kmalloc+0xc/0x14 mm/kasan/common.c:475
 kmem_cache_alloc_trace include/linux/slab.h:450 [inline]
 kmalloc include/linux/slab.h:552 [inline]
 kzalloc include/linux/slab.h:664 [inline]
 kvm_vm_ioctl_register_coalesced_mmio+0x78/0x1cc arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:146
 kvm_vm_ioctl+0x7e8/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3746
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739
 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:48 [inline]
 el0_svc_common arch/arm64/kernel/syscall.c:158 [inline]
 do_el0_svc+0x120/0x290 arch/arm64/kernel/syscall.c:220
 el0_svc+0x1c/0x28 arch/arm64/kernel/entry-common.c:367
 el0_sync_handler+0x98/0x170 arch/arm64/kernel/entry-common.c:383
 el0_sync+0x140/0x180 arch/arm64/kernel/entry.S:670

Freed by task 4269:
 stack_trace_save+0x80/0xb8 kernel/stacktrace.c:121
 kasan_save_stack mm/kasan/common.c:48 [inline]
 kasan_set_track+0x38/0x6c mm/kasan/common.c:56
 kasan_set_free_info+0x20/0x40 mm/kasan/generic.c:355
 __kasan_slab_free+0x124/0x150 mm/kasan/common.c:422
 kasan_slab_free+0x10/0x1c mm/kasan/common.c:431
 slab_free_hook mm/slub.c:1544 [inline]
 slab_free_freelist_hook mm/slub.c:1577 [inline]
 slab_free mm/slub.c:3142 [inline]
 kfree+0x104/0x38c mm/slub.c:4124
 coalesced_mmio_destructor+0x94/0xa4 arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:102
 kvm_iodevice_destructor include/kvm/iodev.h:61 [inline]
 kvm_io_bus_unregister_dev+0x248/0x280 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:4374
 kvm_vm_ioctl_unregister_coalesced_mmio+0x158/0x1ec arch/arm64/kvm/../../../virt/kvm/coalesced_mmio.c:186
 kvm_vm_ioctl+0xe30/0x14c4 arch/arm64/kvm/../../../virt/kvm/kvm_main.c:3755
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __arm64_sys_ioctl+0xf88/0x131c fs/ioctl.c:739
 __invoke_syscall arch/arm64/kernel/syscall.c:36 [inline]
 invoke_syscall arch/arm64/kernel/sys
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47341/">CVE-2021-47341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47341">CVE-2021-47341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224923">SUSE bug 1224923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47342</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47342" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47342" ref_url="https://www.suse.com/security/cve/CVE-2021-47342" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix possible UAF when remounting r/o a mmp-protected file system

After commit 618f003199c6 ("ext4: fix memory leak in
ext4_fill_super"), after the file system is remounted read-only, there
is a race where the kmmpd thread can exit, causing sbi-&gt;s_mmp_tsk to
point at freed memory, which the call to ext4_stop_mmpd() can trip
over.

Fix this by only allowing kmmpd() to exit when it is stopped via
ext4_stop_mmpd().

Bug-Report-Link: &lt;20210629143603.2166962-1-yebin10@huawei.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47342/">CVE-2021-47342 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47342">CVE-2021-47342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225149">SUSE bug 1225149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225154">SUSE bug 1225154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47343" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47343" ref_url="https://www.suse.com/security/cve/CVE-2021-47343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm btree remove: assign new_root only when removal succeeds

remove_raw() in dm_btree_remove() may fail due to IO read error
(e.g. read the content of origin block fails during shadowing),
and the value of shadow_spine::root is uninitialized, but
the uninitialized value is still assign to new_root in the
end of dm_btree_remove().

For dm-thin, the value of pmd-&gt;details_root or pmd-&gt;root will become
an uninitialized value, so if trying to read details_info tree again
out-of-bound memory may occur as showed below:

  general protection fault, probably for non-canonical address 0x3fdcb14c8d7520
  CPU: 4 PID: 515 Comm: dmsetup Not tainted 5.13.0-rc6
  Hardware name: QEMU Standard PC
  RIP: 0010:metadata_ll_load_ie+0x14/0x30
  Call Trace:
   sm_metadata_count_is_more_than_one+0xb9/0xe0
   dm_tm_shadow_block+0x52/0x1c0
   shadow_step+0x59/0xf0
   remove_raw+0xb2/0x170
   dm_btree_remove+0xf4/0x1c0
   dm_pool_delete_thin_device+0xc3/0x140
   pool_message+0x218/0x2b0
   target_message+0x251/0x290
   ctl_ioctl+0x1c4/0x4d0
   dm_ctl_ioctl+0xe/0x20
   __x64_sys_ioctl+0x7b/0xb0
   do_syscall_64+0x40/0xb0
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Fixing it by only assign new_root when removal succeeds
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47343/">CVE-2021-47343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47343">CVE-2021-47343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225155">SUSE bug 1225155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47344" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47344" ref_url="https://www.suse.com/security/cve/CVE-2021-47344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: zr364xx: fix memory leak in zr364xx_start_readpipe

syzbot reported memory leak in zr364xx driver.
The problem was in non-freed urb in case of
usb_submit_urb() fail.

backtrace:
  [&lt;ffffffff82baedf6&gt;] kmalloc include/linux/slab.h:561 [inline]
  [&lt;ffffffff82baedf6&gt;] usb_alloc_urb+0x66/0xe0 drivers/usb/core/urb.c:74
  [&lt;ffffffff82f7cce8&gt;] zr364xx_start_readpipe+0x78/0x130 drivers/media/usb/zr364xx/zr364xx.c:1022
  [&lt;ffffffff84251dfc&gt;] zr364xx_board_init drivers/media/usb/zr364xx/zr364xx.c:1383 [inline]
  [&lt;ffffffff84251dfc&gt;] zr364xx_probe+0x6a3/0x851 drivers/media/usb/zr364xx/zr364xx.c:1516
  [&lt;ffffffff82bb6507&gt;] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396
  [&lt;ffffffff826018a9&gt;] really_probe+0x159/0x500 drivers/base/dd.c:576
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47344/">CVE-2021-47344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47344">CVE-2021-47344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224922">SUSE bug 1224922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47345" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47345" ref_url="https://www.suse.com/security/cve/CVE-2021-47345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix rdma_resolve_route() memory leak

Fix a memory leak when "mda_resolve_route() is called more than once on
the same "rdma_cm_id".

This is possible if cma_query_handler() triggers the
RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and
allows rdma_resolve_route() to be called again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47345/">CVE-2021-47345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47345">CVE-2021-47345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225157">SUSE bug 1225157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47346</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47346" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47346" ref_url="https://www.suse.com/security/cve/CVE-2021-47346" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()

commit 6f755e85c332 ("coresight: Add helper for inserting synchronization
packets") removed trailing '\0' from barrier_pkt array and updated the
call sites like etb_update_buffer() to have proper checks for barrier_pkt
size before read but missed updating tmc_update_etf_buffer() which still
reads barrier_pkt past the array size resulting in KASAN out-of-bounds
bug. Fix this by adding a check for barrier_pkt size before accessing
like it is done in etb_update_buffer().

 BUG: KASAN: global-out-of-bounds in tmc_update_etf_buffer+0x4b8/0x698
 Read of size 4 at addr ffffffd05b7d1030 by task perf/2629

 Call trace:
  dump_backtrace+0x0/0x27c
  show_stack+0x20/0x2c
  dump_stack+0x11c/0x188
  print_address_description+0x3c/0x4a4
  __kasan_report+0x140/0x164
  kasan_report+0x10/0x18
  __asan_report_load4_noabort+0x1c/0x24
  tmc_update_etf_buffer+0x4b8/0x698
  etm_event_stop+0x248/0x2d8
  etm_event_del+0x20/0x2c
  event_sched_out+0x214/0x6f0
  group_sched_out+0xd0/0x270
  ctx_sched_out+0x2ec/0x518
  __perf_event_task_sched_out+0x4fc/0xe6c
  __schedule+0x1094/0x16a0
  preempt_schedule_irq+0x88/0x170
  arm64_preempt_schedule_irq+0xf0/0x18c
  el1_irq+0xe8/0x180
  perf_event_exec+0x4d8/0x56c
  setup_new_exec+0x204/0x400
  load_elf_binary+0x72c/0x18c0
  search_binary_handler+0x13c/0x420
  load_script+0x500/0x6c4
  search_binary_handler+0x13c/0x420
  exec_binprm+0x118/0x654
  __do_execve_file+0x77c/0xba4
  __arm64_compat_sys_execve+0x98/0xac
  el0_svc_common+0x1f8/0x5e0
  el0_svc_compat_handler+0x84/0xb0
  el0_svc_compat+0x10/0x50

 The buggy address belongs to the variable:
  barrier_pkt+0x10/0x40

 Memory state around the buggy address:
  ffffffd05b7d0f00: fa fa fa fa 04 fa fa fa fa fa fa fa 00 00 00 00
  ffffffd05b7d0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 &gt;ffffffd05b7d1000: 00 00 00 00 00 00 fa fa fa fa fa fa 00 00 00 03
                                      ^
  ffffffd05b7d1080: fa fa fa fa 00 02 fa fa fa fa fa fa 03 fa fa fa
  ffffffd05b7d1100: fa fa fa fa 00 00 00 00 05 fa fa fa fa fa fa fa
 ==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47346/">CVE-2021-47346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47346">CVE-2021-47346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224921">SUSE bug 1224921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47347</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47347" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47347" ref_url="https://www.suse.com/security/cve/CVE-2021-47347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wl1251: Fix possible buffer overflow in wl1251_cmd_scan

Function wl1251_cmd_scan calls memcpy without checking the length.
Harden by checking the length is within the maximum allowed size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47347/">CVE-2021-47347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47347">CVE-2021-47347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225177">SUSE bug 1225177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225305">SUSE bug 1225305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47348" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47348" ref_url="https://www.suse.com/security/cve/CVE-2021-47348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid HDCP over-read and corruption

Instead of reading the desired 5 bytes of the actual target field,
the code was reading 8. This could result in a corrupted value if the
trailing 3 bytes were non-zero, so instead use an appropriately sized
and zero-initialized bounce buffer, and read only 5 bytes before casting
to u64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47348/">CVE-2021-47348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47348">CVE-2021-47348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225178">SUSE bug 1225178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47349" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47349" ref_url="https://www.suse.com/security/cve/CVE-2021-47349" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mwifiex: bring down link before deleting interface

We can deadlock when rmmod'ing the driver or going through firmware
reset, because the cfg80211_unregister_wdev() has to bring down the link
for us, ... which then grab the same wiphy lock.

nl80211_del_interface() already handles a very similar case, with a nice
description:

        /*
         * We hold RTNL, so this is safe, without RTNL opencount cannot
         * reach 0, and thus the rdev cannot be deleted.
         *
         * We need to do it for the dev_close(), since that will call
         * the netdev notifiers, and we need to acquire the mutex there
         * but don't know if we get there from here or from some other
         * place (e.g. "ip link set ... down").
         */
        mutex_unlock(&amp;rdev-&gt;wiphy.mtx);
...

Do similarly for mwifiex teardown, by ensuring we bring the link down
first.

Sample deadlock trace:

[  247.103516] INFO: task rmmod:2119 blocked for more than 123 seconds.
[  247.110630]       Not tainted 5.12.4 #5
[  247.115796] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  247.124557] task:rmmod           state:D stack:    0 pid: 2119 ppid:  2114 flags:0x00400208
[  247.133905] Call trace:
[  247.136644]  __switch_to+0x130/0x170
[  247.140643]  __schedule+0x714/0xa0c
[  247.144548]  schedule_preempt_disabled+0x88/0xf4
[  247.149714]  __mutex_lock_common+0x43c/0x750
[  247.154496]  mutex_lock_nested+0x5c/0x68
[  247.158884]  cfg80211_netdev_notifier_call+0x280/0x4e0 [cfg80211]
[  247.165769]  raw_notifier_call_chain+0x4c/0x78
[  247.170742]  call_netdevice_notifiers_info+0x68/0xa4
[  247.176305]  __dev_close_many+0x7c/0x138
[  247.180693]  dev_close_many+0x7c/0x10c
[  247.184893]  unregister_netdevice_many+0xfc/0x654
[  247.190158]  unregister_netdevice_queue+0xb4/0xe0
[  247.195424]  _cfg80211_unregister_wdev+0xa4/0x204 [cfg80211]
[  247.201816]  cfg80211_unregister_wdev+0x20/0x2c [cfg80211]
[  247.208016]  mwifiex_del_virtual_intf+0xc8/0x188 [mwifiex]
[  247.214174]  mwifiex_uninit_sw+0x158/0x1b0 [mwifiex]
[  247.219747]  mwifiex_remove_card+0x38/0xa0 [mwifiex]
[  247.225316]  mwifiex_pcie_remove+0xd0/0xe0 [mwifiex_pcie]
[  247.231451]  pci_device_remove+0x50/0xe0
[  247.235849]  device_release_driver_internal+0x110/0x1b0
[  247.241701]  driver_detach+0x5c/0x9c
[  247.245704]  bus_remove_driver+0x84/0xb8
[  247.250095]  driver_unregister+0x3c/0x60
[  247.254486]  pci_unregister_driver+0x2c/0x90
[  247.259267]  cleanup_module+0x18/0xcdc [mwifiex_pcie]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47349/">CVE-2021-47349 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47349">CVE-2021-47349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225179">SUSE bug 1225179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47350" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47350" ref_url="https://www.suse.com/security/cve/CVE-2021-47350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/mm: Fix lockup on kernel exec fault

The powerpc kernel is not prepared to handle exec faults from kernel.
Especially, the function is_exec_fault() will return 'false' when an
exec fault is taken by kernel, because the check is based on reading
current-&gt;thread.regs-&gt;trap which contains the trap from user.

For instance, when provoking a LKDTM EXEC_USERSPACE test,
current-&gt;thread.regs-&gt;trap is set to SYSCALL trap (0xc00), and
the fault taken by the kernel is not seen as an exec fault by
set_access_flags_filter().

Commit d7df2443cd5f ("powerpc/mm: Fix spurious segfaults on radix
with autonuma") made it clear and handled it properly. But later on
commit d3ca587404b3 ("powerpc/mm: Fix reporting of kernel execute
faults") removed that handling, introducing test based on error_code.
And here is the problem, because on the 603 all upper bits of SRR1
get cleared when the TLB instruction miss handler bails out to ISI.

Until commit cbd7e6ca0210 ("powerpc/fault: Avoid heavy
search_exception_tables() verification"), an exec fault from kernel
at a userspace address was indirectly caught by the lack of entry for
that address in the exception tables. But after that commit the
kernel mainly relies on KUAP or on core mm handling to catch wrong
user accesses. Here the access is not wrong, so mm handles it.
It is a minor fault because PAGE_EXEC is not set,
set_access_flags_filter() should set PAGE_EXEC and voila.
But as is_exec_fault() returns false as explained in the beginning,
set_access_flags_filter() bails out without setting PAGE_EXEC flag,
which leads to a forever minor exec fault.

As the kernel is not prepared to handle such exec faults, the thing to
do is to fire in bad_kernel_fault() for any exec fault taken by the
kernel, as it was prior to commit d3ca587404b3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47350/">CVE-2021-47350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47350">CVE-2021-47350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225181">SUSE bug 1225181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47351" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47351" ref_url="https://www.suse.com/security/cve/CVE-2021-47351" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubifs: Fix races between xattr_{set|get} and listxattr operations

UBIFS may occur some problems with concurrent xattr_{set|get} and
listxattr operations, such as assertion failure, memory corruption,
stale xattr value[1].

Fix it by importing a new rw-lock in @ubifs_inode to serilize write
operations on xattr, concurrent read operations are still effective,
just like ext4.

[1] https://lore.kernel.org/linux-mtd/20200630130438.141649-1-houtao1@huawei.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-05-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47351/">CVE-2021-47351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47351">CVE-2021-47351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225182">SUSE bug 1225182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47353" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47353" ref_url="https://www.suse.com/security/cve/CVE-2021-47353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Fix NULL pointer dereference in udf_symlink function

In function udf_symlink, epos.bh is assigned with the value returned
by udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c
and returns the value of sb_getblk function that could be NULL.
Then, epos.bh is used without any check, causing a possible
NULL pointer dereference when sb_getblk fails.

This fix adds a check to validate the value of epos.bh.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47353/">CVE-2021-47353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47353">CVE-2021-47353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225128">SUSE bug 1225128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47354" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47354" ref_url="https://www.suse.com/security/cve/CVE-2021-47354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Avoid data corruptions

Wait for all dependencies of a job  to complete before
killing it to avoid data corruptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47354/">CVE-2021-47354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47354">CVE-2021-47354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225140">SUSE bug 1225140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47356" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47356" ref_url="https://www.suse.com/security/cve/CVE-2021-47356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: fix possible use-after-free in HFC_cleanup()

This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47356/">CVE-2021-47356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47356">CVE-2021-47356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225143">SUSE bug 1225143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47357" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47357" ref_url="https://www.suse.com/security/cve/CVE-2021-47357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: iphase: fix possible use-after-free in ia_module_exit()

This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47357/">CVE-2021-47357 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47357">CVE-2021-47357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225144">SUSE bug 1225144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47358" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: greybus: uart: fix tty use after free

User space can hold a tty open indefinitely and tty drivers must not
release the underlying structures until the last user is gone.

Switch to using the tty-port reference counter to manage the life time
of the greybus tty state to avoid use after free after a disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47359" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix soft lockup during fsstress

Below traces are observed during fsstress and system got hung.
[  130.698396] watchdog: BUG: soft lockup - CPU#6 stuck for 26s!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47360" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: make sure fd closes complete

During BC_FREE_BUFFER processing, the BINDER_TYPE_FDA object
cleanup may close 1 or more fds. The close operations are
completed using the task work mechanism -- which means the thread
needs to return to userspace or the file object may never be
dereferenced -- which can lead to hung processes.

Force the binder thread back to userspace if an fd is closed during
BC_FREE_BUFFER handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47361" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mcb: fix error handling in mcb_alloc_bus()

There are two bugs:
1) If ida_simple_get() fails then this code calls put_device(carrier)
   but we haven't yet called get_device(carrier) and probably that
   leads to a use after free.
2) After device_initialize() then we need to use put_device() to
   release the bus.  This will free the internal resources tied to the
   device and call mcb_free_bus() which will free the rest.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47362</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47362" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Update intermediate power state for SI

Update the current state as boot state during dpm initialization.
During the subsequent initialization, set_power_state gets called to
transition to the final power state. set_power_state refers to values
from the current state and without current state populated, it could
result in NULL pointer dereference.

For ex: on platforms where PCI speed change is supported through ACPI
ATCS method, the link speed of current state needs to be queried before
deciding on changing to final power state's link speed. The logic to query
ATCS-support was broken on certain platforms. The issue became visible
when broken ATCS-support logic got fixed with commit
f9b7f3703ff9 ("drm/amdgpu/acpi: make ATPX/ATCS structures global (v2)").

Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/1698
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47363</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47363" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix division by zero while replacing a resilient group

The resilient nexthop group torture tests in fib_nexthop.sh exposed a
possible division by zero while replacing a resilient group [1]. The
division by zero occurs when the data path sees a resilient nexthop
group with zero buckets.

The tests replace a resilient nexthop group in a loop while traffic is
forwarded through it. The tests do not specify the number of buckets
while performing the replacement, resulting in the kernel allocating a
stub resilient table (i.e, 'struct nh_res_table') with zero buckets.

This table should never be visible to the data path, but the old nexthop
group (i.e., 'oldg') might still be used by the data path when the stub
table is assigned to it.

Fix this by only assigning the stub table to the old nexthop group after
making sure the group is no longer used by the data path.

Tested with fib_nexthops.sh:

Tests passed: 222
Tests failed:   0

[1]
 divide error: 0000 [#1] PREEMPT SMP KASAN
 CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:nexthop_select_path+0x2d2/0x1a80
[...]
 Call Trace:
  fib_select_multipath+0x79b/0x1530
  fib_select_path+0x8fb/0x1c10
  ip_route_output_key_hash_rcu+0x1198/0x2da0
  ip_route_output_key_hash+0x190/0x340
  ip_route_output_flow+0x21/0x120
  raw_sendmsg+0x91d/0x2e10
  inet_sendmsg+0x9e/0xe0
  __sys_sendto+0x23d/0x360
  __x64_sys_sendto+0xe1/0x1b0
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47364</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47364" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix memory leak in compat_insnlist()

`compat_insnlist()` handles the 32-bit version of the `COMEDI_INSNLIST`
ioctl (whenwhen `CONFIG_COMPAT` is enabled).  It allocates memory to
temporarily hold an array of `struct comedi_insn` converted from the
32-bit version in user space.  This memory is only being freed if there
is a fault while filling the array, otherwise it is leaked.

Add a call to `kfree()` to fix the leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47366</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47366" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server

AFS-3 has two data fetch RPC variants, FS.FetchData and FS.FetchData64, and
Linux's afs client switches between them when talking to a non-YFS server
if the read size, the file position or the sum of the two have the upper 32
bits set of the 64-bit value.

This is a problem, however, since the file position and length fields of
FS.FetchData are *signed* 32-bit values.

Fix this by capturing the capability bits obtained from the fileserver when
it's sent an FS.GetCapabilities RPC, rather than just discarding them, and
then picking out the VICED_CAPABILITY_64BITFILES flag.  This can then be
used to decide whether to use FS.FetchData or FS.FetchData64 - and also
FS.StoreData or FS.StoreData64 - rather than using upper_32_bits() to
switch on the parameter values.

This capabilities flag could also be used to limit the maximum size of the
file, but all servers must be checked for that.

Note that the issue does not exist with FS.StoreData - that uses *unsigned*
32-bit values.  It's also not a problem with Auristor servers as its
YFS.FetchData64 op uses unsigned 64-bit values.

This can be tested by cloning a git repo through an OpenAFS client to an
OpenAFS server and then doing "git status" on it from a Linux afs
client[1].  Provided the clone has a pack file that's in the 2G-4G range,
the git status will show errors like:

	error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index
	error: packfile .git/objects/pack/pack-5e813c51d12b6847bbc0fcd97c2bca66da50079c.pack does not match index

This can be observed in the server's FileLog with something like the
following appearing:

Sun Aug 29 19:31:39 2021 SRXAFS_FetchData, Fid = 2303380852.491776.3263114, Host 192.168.11.201:7001, Id 1001
Sun Aug 29 19:31:39 2021 CheckRights: len=0, for host=192.168.11.201:7001
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: Pos 18446744071815340032, Len 3154
Sun Aug 29 19:31:39 2021 FetchData_RXStyle: file size 2400758866
...
Sun Aug 29 19:31:40 2021 SRXAFS_FetchData returns 5

Note the file position of 18446744071815340032.  This is the requested file
position sign-extended.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47367</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47367" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix pages leaking when building skb in big mode

We try to use build_skb() if we had sufficient tailroom. But we forget
to release the unused pages chained via private in big mode which will
leak pages. Fixing this by release the pages after building the skb in
big mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47368" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

enetc: Fix illegal access when reading affinity_hint

irq_set_affinity_hit() stores a reference to the cpumask_t
parameter in the irq descriptor, and that reference can be
accessed later from irq_affinity_hint_proc_show(). Since
the cpu_mask parameter passed to irq_set_affinity_hit() has
only temporary storage (it's on the stack memory), later
accesses to it are illegal. Thus reads from the corresponding
procfs affinity_hint file can result in paging request oops.

The issue is fixed by the get_cpu_mask() helper, which provides
a permanent storage for the cpumask_t parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47369" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix NULL deref in qeth_clear_working_pool_list()

When qeth_set_online() calls qeth_clear_working_pool_list() to roll
back after an error exit from qeth_hardsetup_card(), we are at risk of
accessing card-&gt;qdio.in_q before it was allocated by
qeth_alloc_qdio_queues() via qeth_mpc_initialize().

qeth_clear_working_pool_list() then dereferences NULL, and by writing to
queue-&gt;bufs[i].pool_entry scribbles all over the CPU's lowcore.
Resulting in a crash when those lowcore areas are used next (eg. on
the next machine-check interrupt).

Such a scenario would typically happen when the device is first set
online and its queues aren't allocated yet. An early IO error or certain
misconfigs (eg. mismatched transport mode, bad portno) then cause us to
error out from qeth_hardsetup_card() with card-&gt;qdio.in_q still being
NULL.

Fix it by checking the pointer for NULL before accessing it.

Note that we also have (rare) paths inside qeth_mpc_initialize() where
a configuration change can cause us to free the existing queues,
expecting that subsequent code will allocate them again. If we then
error out before that re-allocation happens, the same bug occurs.

Root-caused-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-07-04"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227324">SUSE bug 1227324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47370</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47370" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure tx skbs always have the MPTCP ext

Due to signed/unsigned comparison, the expression:

	info-&gt;size_goal - skb-&gt;len &gt; 0

evaluates to true when the size goal is smaller than the
skb size. That results in lack of tx cache refill, so that
the skb allocated by the core TCP code lacks the required
MPTCP skb extensions.

Due to the above, syzbot is able to trigger the following WARN_ON():

WARNING: CPU: 1 PID: 810 at net/mptcp/protocol.c:1366 mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Modules linked in:
CPU: 1 PID: 810 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:mptcp_sendmsg_frag+0x1362/0x1bc0 net/mptcp/protocol.c:1366
Code: ff 4c 8b 74 24 50 48 8b 5c 24 58 e9 0f fb ff ff e8 13 44 8b f8 4c 89 e7 45 31 ed e8 98 57 2e fe e9 81 f4 ff ff e8 fe 43 8b f8 &lt;0f&gt; 0b 41 bd ea ff ff ff e9 6f f4 ff ff 4c 89 e7 e8 b9 8e d2 f8 e9
RSP: 0018:ffffc9000531f6a0 EFLAGS: 00010216
RAX: 000000000000697f RBX: 0000000000000000 RCX: ffffc90012107000
RDX: 0000000000040000 RSI: ffffffff88eac9e2 RDI: 0000000000000003
RBP: ffff888078b15780 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff88eac017 R11: 0000000000000000 R12: ffff88801de0a280
R13: 0000000000006b58 R14: ffff888066278280 R15: ffff88803c2fe9c0
FS:  00007fd9f866e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faebcb2f718 CR3: 00000000267cb000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __mptcp_push_pending+0x1fb/0x6b0 net/mptcp/protocol.c:1547
 mptcp_release_cb+0xfe/0x210 net/mptcp/protocol.c:3003
 release_sock+0xb4/0x1b0 net/core/sock.c:3206
 sk_stream_wait_memory+0x604/0xed0 net/core/stream.c:145
 mptcp_sendmsg+0xc39/0x1bc0 net/mptcp/protocol.c:1749
 inet6_sendmsg+0x99/0xe0 net/ipv6/af_inet6.c:643
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 sock_write_iter+0x2a0/0x3e0 net/socket.c:1057
 call_write_iter include/linux/fs.h:2163 [inline]
 new_sync_write+0x40b/0x640 fs/read_write.c:507
 vfs_write+0x7cf/0xae0 fs/read_write.c:594
 ksys_write+0x1ee/0x250 fs/read_write.c:647
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd9f866e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9
RDX: 00000000000e7b78 RSI: 0000000020000000 RDI: 0000000000000003
RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038
R13: 0000000000a9fb1f R14: 00007fd9f866e300 R15: 0000000000022000

Fix the issue rewriting the relevant expression to avoid
sign-related problems - note: size_goal is always &gt;= 0.

Additionally, ensure that the skb in the tx cache always carries
the relevant extension.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47371" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix memory leaks in nexthop notification chain listeners

syzkaller discovered memory leaks [1] that can be reduced to the
following commands:

 # ip nexthop add id 1 blackhole
 # devlink dev reload pci/0000:06:00.0

As part of the reload flow, mlxsw will unregister its netdevs and then
unregister from the nexthop notification chain. Before unregistering
from the notification chain, mlxsw will receive delete notifications for
nexthop objects using netdevs registered by mlxsw or their uppers. mlxsw
will not receive notifications for nexthops using netdevs that are not
dismantled as part of the reload flow. For example, the blackhole
nexthop above that internally uses the loopback netdev as its nexthop
device.

One way to fix this problem is to have listeners flush their nexthop
tables after unregistering from the notification chain. This is
error-prone as evident by this patch and also not symmetric with the
registration path where a listener receives a dump of all the existing
nexthops.

Therefore, fix this problem by replaying delete notifications for the
listener being unregistered. This is symmetric to the registration path
and also consistent with the netdev notification chain.

The above means that unregister_nexthop_notifier(), like
register_nexthop_notifier(), will have to take RTNL in order to iterate
over the existing nexthops and that any callers of the function cannot
hold RTNL. This is true for mlxsw and netdevsim, but not for the VXLAN
driver. To avoid a deadlock, change the latter to unregister its nexthop
listener without holding RTNL, making it symmetric to the registration
path.

[1]
unreferenced object 0xffff88806173d600 (size 512):
  comm "syz-executor.0", pid 1290, jiffies 4295583142 (age 143.507s)
  hex dump (first 32 bytes):
    41 9d 1e 60 80 88 ff ff 08 d6 73 61 80 88 ff ff  A..`......sa....
    08 d6 73 61 80 88 ff ff 01 00 00 00 00 00 00 00  ..sa............
  backtrace:
    [&lt;ffffffff81a6b576&gt;] kmemleak_alloc_recursive include/linux/kmemleak.h:43 [inline]
    [&lt;ffffffff81a6b576&gt;] slab_post_alloc_hook+0x96/0x490 mm/slab.h:522
    [&lt;ffffffff81a716d3&gt;] slab_alloc_node mm/slub.c:3206 [inline]
    [&lt;ffffffff81a716d3&gt;] slab_alloc mm/slub.c:3214 [inline]
    [&lt;ffffffff81a716d3&gt;] kmem_cache_alloc_trace+0x163/0x370 mm/slub.c:3231
    [&lt;ffffffff82e8681a&gt;] kmalloc include/linux/slab.h:591 [inline]
    [&lt;ffffffff82e8681a&gt;] kzalloc include/linux/slab.h:721 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_group_create drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:4918 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_new drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5054 [inline]
    [&lt;ffffffff82e8681a&gt;] mlxsw_sp_nexthop_obj_event+0x59a/0x2910 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:5239
    [&lt;ffffffff813ef67d&gt;] notifier_call_chain+0xbd/0x210 kernel/notifier.c:83
    [&lt;ffffffff813f0662&gt;] blocking_notifier_call_chain kernel/notifier.c:318 [inline]
    [&lt;ffffffff813f0662&gt;] blocking_notifier_call_chain+0x72/0xa0 kernel/notifier.c:306
    [&lt;ffffffff8384b9c6&gt;] call_nexthop_notifiers+0x156/0x310 net/ipv4/nexthop.c:244
    [&lt;ffffffff83852bd8&gt;] insert_nexthop net/ipv4/nexthop.c:2336 [inline]
    [&lt;ffffffff83852bd8&gt;] nexthop_add net/ipv4/nexthop.c:2644 [inline]
    [&lt;ffffffff83852bd8&gt;] rtm_new_nexthop+0x14e8/0x4d10 net/ipv4/nexthop.c:2913
    [&lt;ffffffff833e9a78&gt;] rtnetlink_rcv_msg+0x448/0xbf0 net/core/rtnetlink.c:5572
    [&lt;ffffffff83608703&gt;] netlink_rcv_skb+0x173/0x480 net/netlink/af_netlink.c:2504
    [&lt;ffffffff833de032&gt;] rtnetlink_rcv+0x22/0x30 net/core/rtnetlink.c:5590
    [&lt;ffffffff836069de&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
    [&lt;ffffffff836069de&gt;] netlink_unicast+0x5ae/0x7f0 net/netlink/af_netlink.c:1340
    [&lt;ffffffff83607501&gt;] netlink_sendmsg+0x8e1/0xe30 net/netlink/af_netlink.c:1929
    [&lt;ffffffff832fde84&gt;] sock_sendmsg_nosec net/socket.c:704 [inline
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47372" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macb: fix use after free on rmmod

plat_dev-&gt;dev-&gt;platform_data is released by platform_device_unregister(),
use of pclk and hclk is a use-after-free. Since device unregister won't
need a clk device we adjust the function call sequence to fix this issue.

[   31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]
[   31.275563] Freed by task 306:
[   30.276782]  platform_device_release+0x25/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229946">SUSE bug 1229946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47373</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Fix potential VPE leak on error

In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,
there is an off-by-one in the number of VPEs to be freed.

Fix it by simply passing the number of VPEs allocated, which is the
index of the loop iterating over the VPEs.

[maz: fixed commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47374</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47374" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-debug: prevent an error message from causing runtime problems

For some drivers, that use the DMA API. This error message can be reached
several millions of times per second, causing spam to the kernel's printk
buffer and bringing the CPU usage up to 100% (so, it should be rate
limited). However, since there is at least one driver that is in the
mainline and suffers from the error condition, it is more useful to
err_printk() here instead of just rate limiting the error message (in hopes
that it will make it easier for other drivers that suffer from this issue
to be spotted).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47375" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blktrace: Fix uaf in blk_trace access after removing by sysfs

There is an use-after-free problem triggered by following process:

      P1(sda)				P2(sdb)
			echo 0 &gt; /sys/block/sdb/trace/enable
			  blk_trace_remove_queue
			    synchronize_rcu
			    blk_trace_free
			      relay_close
rcu_read_lock
__blk_add_trace
  trace_note_tsk
  (Iterate running_trace_list)
			        relay_close_buf
				  relay_destroy_buf
				    kfree(buf)
    trace_note(sdb's bt)
      relay_reserve
        buf-&gt;offset &lt;- nullptr deference (use-after-free) !!!
rcu_read_unlock

[  502.714379] BUG: kernel NULL pointer dereference, address:
0000000000000010
[  502.715260] #PF: supervisor read access in kernel mode
[  502.715903] #PF: error_code(0x0000) - not-present page
[  502.716546] PGD 103984067 P4D 103984067 PUD 17592b067 PMD 0
[  502.717252] Oops: 0000 [#1] SMP
[  502.720308] RIP: 0010:trace_note.isra.0+0x86/0x360
[  502.732872] Call Trace:
[  502.733193]  __blk_add_trace.cold+0x137/0x1a3
[  502.733734]  blk_add_trace_rq+0x7b/0xd0
[  502.734207]  blk_add_trace_rq_issue+0x54/0xa0
[  502.734755]  blk_mq_start_request+0xde/0x1b0
[  502.735287]  scsi_queue_rq+0x528/0x1140
...
[  502.742704]  sg_new_write.isra.0+0x16e/0x3e0
[  502.747501]  sg_ioctl+0x466/0x1100

Reproduce method:
  ioctl(/dev/sda, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])
  ioctl(/dev/sda, BLKTRACESTART)
  ioctl(/dev/sdb, BLKTRACESETUP, blk_user_trace_setup[buf_size=127])
  ioctl(/dev/sdb, BLKTRACESTART)

  echo 0 &gt; /sys/block/sdb/trace/enable &amp;
  // Add delay(mdelay/msleep) before kernel enters blk_trace_free()

  ioctl$SG_IO(/dev/sda, SG_IO, ...)
  // Enters trace_note_tsk() after blk_trace_free() returned
  // Use mdelay in rcu region rather than msleep(which may schedule out)

Remove blk_trace from running_list before calling blk_trace_free() by
sysfs if blk_trace is at Blktrace_running state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225194">SUSE bug 1225194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47376</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47376" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add oversize check before call kvcalloc()

Commit 7661809d493b ("mm: don't allow oversized kvmalloc() calls") add the
oversize check. When the allocation is larger than what kmalloc() supports,
the following warning triggered:

WARNING: CPU: 0 PID: 8408 at mm/util.c:597 kvmalloc_node+0x108/0x110 mm/util.c:597
Modules linked in:
CPU: 0 PID: 8408 Comm: syz-executor221 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:kvmalloc_node+0x108/0x110 mm/util.c:597
Call Trace:
 kvmalloc include/linux/mm.h:806 [inline]
 kvmalloc_array include/linux/mm.h:824 [inline]
 kvcalloc include/linux/mm.h:829 [inline]
 check_btf_line kernel/bpf/verifier.c:9925 [inline]
 check_btf_info kernel/bpf/verifier.c:10049 [inline]
 bpf_check+0xd634/0x150d0 kernel/bpf/verifier.c:13759
 bpf_prog_load kernel/bpf/syscall.c:2301 [inline]
 __sys_bpf+0x11181/0x126e0 kernel/bpf/syscall.c:4587
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47378</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: destroy cm id before destroy qp to avoid use after free

We should always destroy cm_id before destroy qp to avoid to get cma
event after qp was destroyed, which may lead to use after free.
In RDMA connection establishment error flow, don't destroy qp in cm
event handler.Just report cm_error to upper level, qp will be destroy
in nvme_rdma_alloc_queue() after destroy cm id.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225202">SUSE bug 1225202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47379" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd

KASAN reports a use-after-free report when doing fuzz test:

[693354.104835] ==================================================================
[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160
[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338

[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147
[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018
[693354.105612] Call Trace:
[693354.105621]  dump_stack+0xf1/0x19b
[693354.105626]  ? show_regs_print_info+0x5/0x5
[693354.105634]  ? printk+0x9c/0xc3
[693354.105638]  ? cpumask_weight+0x1f/0x1f
[693354.105648]  print_address_description+0x70/0x360
[693354.105654]  kasan_report+0x1b2/0x330
[693354.105659]  ? bfq_io_set_weight_legacy+0xd3/0x160
[693354.105665]  ? bfq_io_set_weight_legacy+0xd3/0x160
[693354.105670]  bfq_io_set_weight_legacy+0xd3/0x160
[693354.105675]  ? bfq_cpd_init+0x20/0x20
[693354.105683]  cgroup_file_write+0x3aa/0x510
[693354.105693]  ? ___slab_alloc+0x507/0x540
[693354.105698]  ? cgroup_file_poll+0x60/0x60
[693354.105702]  ? 0xffffffff89600000
[693354.105708]  ? usercopy_abort+0x90/0x90
[693354.105716]  ? mutex_lock+0xef/0x180
[693354.105726]  kernfs_fop_write+0x1ab/0x280
[693354.105732]  ? cgroup_file_poll+0x60/0x60
[693354.105738]  vfs_write+0xe7/0x230
[693354.105744]  ksys_write+0xb0/0x140
[693354.105749]  ? __ia32_sys_read+0x50/0x50
[693354.105760]  do_syscall_64+0x112/0x370
[693354.105766]  ? syscall_return_slowpath+0x260/0x260
[693354.105772]  ? do_page_fault+0x9b/0x270
[693354.105779]  ? prepare_exit_to_usermode+0xf9/0x1a0
[693354.105784]  ? enter_from_user_mode+0x30/0x30
[693354.105793]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.105875] Allocated by task 1453337:
[693354.106001]  kasan_kmalloc+0xa0/0xd0
[693354.106006]  kmem_cache_alloc_node_trace+0x108/0x220
[693354.106010]  bfq_pd_alloc+0x96/0x120
[693354.106015]  blkcg_activate_policy+0x1b7/0x2b0
[693354.106020]  bfq_create_group_hierarchy+0x1e/0x80
[693354.106026]  bfq_init_queue+0x678/0x8c0
[693354.106031]  blk_mq_init_sched+0x1f8/0x460
[693354.106037]  elevator_switch_mq+0xe1/0x240
[693354.106041]  elevator_switch+0x25/0x40
[693354.106045]  elv_iosched_store+0x1a1/0x230
[693354.106049]  queue_attr_store+0x78/0xb0
[693354.106053]  kernfs_fop_write+0x1ab/0x280
[693354.106056]  vfs_write+0xe7/0x230
[693354.106060]  ksys_write+0xb0/0x140
[693354.106064]  do_syscall_64+0x112/0x370
[693354.106069]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.106114] Freed by task 1453336:
[693354.106225]  __kasan_slab_free+0x130/0x180
[693354.106229]  kfree+0x90/0x1b0
[693354.106233]  blkcg_deactivate_policy+0x12c/0x220
[693354.106238]  bfq_exit_queue+0xf5/0x110
[693354.106241]  blk_mq_exit_sched+0x104/0x130
[693354.106245]  __elevator_exit+0x45/0x60
[693354.106249]  elevator_switch_mq+0xd6/0x240
[693354.106253]  elevator_switch+0x25/0x40
[693354.106257]  elv_iosched_store+0x1a1/0x230
[693354.106261]  queue_attr_store+0x78/0xb0
[693354.106264]  kernfs_fop_write+0x1ab/0x280
[693354.106268]  vfs_write+0xe7/0x230
[693354.106271]  ksys_write+0xb0/0x140
[693354.106275]  do_syscall_64+0x112/0x370
[693354.106280]  entry_SYSCALL_64_after_hwframe+0x65/0xca

[693354.106329] The buggy address belongs to the object at ffff888be0a35580
                 which belongs to the cache kmalloc-1k of size 1024
[693354.106736] The buggy address is located 228 bytes inside of
                 1024-byte region [ffff888be0a35580, ffff888be0a35980)
[693354.107114] The buggy address belongs to the page:
[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0
[693354.107606] flags: 0x17ffffc0008100(slab|head)
[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080
[693354.108020] r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225204">SUSE bug 1225204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47380" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Fix potential NULL pointer dereference

devm_add_action_or_reset() can suddenly invoke amd_mp2_pci_remove() at
registration that will cause NULL pointer dereference since
corresponding data is not initialized yet. The patch moves
initialization of data before devm_add_action_or_reset().

Found by Linux Driver Verification project (linuxtesting.org).

[jkosina@suse.cz: rebase]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47381" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Fix DSP oops stack dump output contents

Fix @buf arg given to hex_dump_to_buffer() and stack address used
in dump error output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47382" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix deadlock during failing recovery

Commit 0b9902c1fcc5 ("s390/qeth: fix deadlock during recovery") removed
taking discipline_mutex inside qeth_do_reset(), fixing potential
deadlocks. An error path was missed though, that still takes
discipline_mutex and thus has the original deadlock potential.

Intermittent deadlocks were seen when a qeth channel path is configured
offline, causing a race between qeth_do_reset and ccwgroup_remove.
Call qeth_set_offline() directly in the qeth_do_reset() error case and
then a new variant of ccwgroup_set_offline(), without taking
discipline_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47383</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: Fix out-of-bound vmalloc access in imageblit

This issue happens when a userspace program does an ioctl
FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct
containing only the fields xres, yres, and bits_per_pixel
with values.

If this struct is the same as the previous ioctl, the
vc_resize() detects it and doesn't call the resize_screen(),
leaving the fb_var_screeninfo incomplete. And this leads to
the updatescrollmode() calculates a wrong value to
fbcon_display-&gt;vrows, which makes the real_y() return a
wrong value of y, and that value, eventually, causes
the imageblit to access an out-of-bound address value.

To solve this issue I made the resize_screen() be called
even if the screen does not need any resizing, so it will
"fix and fill" the fb_var_screeninfo independently.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225211">SUSE bug 1225211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47384" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field

If driver read tmp value sufficient for
(tmp &amp; 0x08) &amp;&amp; (!(tmp &amp; 0x80)) &amp;&amp; ((tmp &amp; 0x7) == ((tmp &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multi-line alignments]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47385" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47386" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multi-line alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47387</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47387" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: schedutil: Use kobject release() method to free sugov_tunables

The struct sugov_tunables is protected by the kobject, so we can't free
it directly. Otherwise we would get a call trace like this:
  ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x30
  WARNING: CPU: 3 PID: 720 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100
  Modules linked in:
  CPU: 3 PID: 720 Comm: a.sh Tainted: G        W         5.14.0-rc1-next-20210715-yocto-standard+ #507
  Hardware name: Marvell OcteonTX CN96XX board (DT)
  pstate: 40400009 (nZcv daif +PAN -UAO -TCO BTYPE=--)
  pc : debug_print_object+0xb8/0x100
  lr : debug_print_object+0xb8/0x100
  sp : ffff80001ecaf910
  x29: ffff80001ecaf910 x28: ffff00011b10b8d0 x27: ffff800011043d80
  x26: ffff00011a8f0000 x25: ffff800013cb3ff0 x24: 0000000000000000
  x23: ffff80001142aa68 x22: ffff800011043d80 x21: ffff00010de46f20
  x20: ffff800013c0c520 x19: ffff800011d8f5b0 x18: 0000000000000010
  x17: 6e6968207473696c x16: 5f72656d6974203a x15: 6570797420746365
  x14: 6a626f2029302065 x13: 303378302f307830 x12: 2b6e665f72656d69
  x11: ffff8000124b1560 x10: ffff800012331520 x9 : ffff8000100ca6b0
  x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 0000000000000001
  x5 : ffff800011d8c000 x4 : ffff800011d8c740 x3 : 0000000000000000
  x2 : ffff0001108301c0 x1 : ab3c90eedf9c0f00 x0 : 0000000000000000
  Call trace:
   debug_print_object+0xb8/0x100
   __debug_check_no_obj_freed+0x1c0/0x230
   debug_check_no_obj_freed+0x20/0x88
   slab_free_freelist_hook+0x154/0x1c8
   kfree+0x114/0x5d0
   sugov_exit+0xbc/0xc0
   cpufreq_exit_governor+0x44/0x90
   cpufreq_set_policy+0x268/0x4a8
   store_scaling_governor+0xe0/0x128
   store+0xc0/0xf0
   sysfs_kf_write+0x54/0x80
   kernfs_fop_write_iter+0x128/0x1c0
   new_sync_write+0xf0/0x190
   vfs_write+0x2d4/0x478
   ksys_write+0x74/0x100
   __arm64_sys_write+0x24/0x30
   invoke_syscall.constprop.0+0x54/0xe0
   do_el0_svc+0x64/0x158
   el0_svc+0x2c/0xb0
   el0t_64_sync_handler+0xb0/0xb8
   el0t_64_sync+0x198/0x19c
  irq event stamp: 5518
  hardirqs last  enabled at (5517): [&lt;ffff8000100cbd7c&gt;] console_unlock+0x554/0x6c8
  hardirqs last disabled at (5518): [&lt;ffff800010fc0638&gt;] el1_dbg+0x28/0xa0
  softirqs last  enabled at (5504): [&lt;ffff8000100106e0&gt;] __do_softirq+0x4d0/0x6c0
  softirqs last disabled at (5483): [&lt;ffff800010049548&gt;] irq_exit+0x1b0/0x1b8

So split the original sugov_tunables_free() into two functions,
sugov_clear_global_tunables() is just used to clear the global_tunables
and the new sugov_tunables_free() is used as kobj_type::release to
release the sugov_tunables safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47388" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix use-after-free in CCMP/GCMP RX

When PN checking is done in mac80211, for fragmentation we need
to copy the PN to the RX struct so we can later use it to do a
comparison, since commit bf30ca922a0c ("mac80211: check defrag
PN against current frame").

Unfortunately, in that commit I used the 'hdr' variable without
it being necessarily valid, so use-after-free could occur if it
was necessary to reallocate (parts of) the frame.

Fix this by reloading the variable after the code that results
in the reallocations, if any.

This fixes https://bugzilla.kernel.org/show_bug.cgi?id=214401.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47389" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: fix missing sev_decommission in sev_receive_start

DECOMMISSION the current SEV context if binding an ASID fails after
RECEIVE_START.  Per AMD's SEV API, RECEIVE_START generates a new guest
context and thus needs to be paired with DECOMMISSION:

     The RECEIVE_START command is the only command other than the LAUNCH_START
     command that generates a new guest context and guest handle.

The missing DECOMMISSION can result in subsequent SEV launch failures,
as the firmware leaks memory and might not able to allocate more SEV
guest contexts in the future.

Note, LAUNCH_START suffered the same bug, but was previously fixed by
commit 934002cd660b ("KVM: SVM: Call SEV Guest Decommission if ASID
binding fails").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47390" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()

KASAN reports the following issue:

 BUG: KASAN: stack-out-of-bounds in kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
 Read of size 8 at addr ffffc9001364f638 by task qemu-kvm/4798

 CPU: 0 PID: 4798 Comm: qemu-kvm Tainted: G               X --------- ---
 Hardware name: AMD Corporation DAYTONA_X/DAYTONA_X, BIOS RYM0081C 07/13/2020
 Call Trace:
  dump_stack+0xa5/0xe6
  print_address_description.constprop.0+0x18/0x130
  ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  __kasan_report.cold+0x7f/0x114
  ? kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  kasan_report+0x38/0x50
  kasan_check_range+0xf5/0x1d0
  kvm_make_vcpus_request_mask+0x174/0x440 [kvm]
  kvm_make_scan_ioapic_request_mask+0x84/0xc0 [kvm]
  ? kvm_arch_exit+0x110/0x110 [kvm]
  ? sched_clock+0x5/0x10
  ioapic_write_indirect+0x59f/0x9e0 [kvm]
  ? static_obj+0xc0/0xc0
  ? __lock_acquired+0x1d2/0x8c0
  ? kvm_ioapic_eoi_inject_work+0x120/0x120 [kvm]

The problem appears to be that 'vcpu_bitmap' is allocated as a single long
on stack and it should really be KVM_MAX_VCPUS long. We also seem to clear
the lower 16 bits of it with bitmap_zero() for no particular reason (my
guess would be that 'bitmap' and 'vcpu_bitmap' variables in
kvm_bitmap_or_dest_vcpus() caused the confusion: while the later is indeed
16-bit long, the later should accommodate all possible vCPUs).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47392" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure

If cma_listen_on_all() fails it leaves the per-device ID still on the
listen_list but the state is not set to RDMA_CM_ADDR_BOUND.

When the cmid is eventually destroyed cma_cancel_listens() is not called
due to the wrong state, however the per-device IDs are still holding the
refcount preventing the ID from being destroyed, thus deadlocking:

 task:rping state:D stack:   0 pid:19605 ppid: 47036 flags:0x00000084
 Call Trace:
  __schedule+0x29a/0x780
  ? free_unref_page_commit+0x9b/0x110
  schedule+0x3c/0xa0
  schedule_timeout+0x215/0x2b0
  ? __flush_work+0x19e/0x1e0
  wait_for_completion+0x8d/0xf0
  _destroy_id+0x144/0x210 [rdma_cm]
  ucma_close_id+0x2b/0x40 [rdma_ucm]
  __destroy_id+0x93/0x2c0 [rdma_ucm]
  ? __xa_erase+0x4a/0xa0
  ucma_destroy_id+0x9a/0x120 [rdma_ucm]
  ucma_write+0xb8/0x130 [rdma_ucm]
  vfs_write+0xb4/0x250
  ksys_write+0xb5/0xd0
  ? syscall_trace_enter.isra.19+0x123/0x190
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xa9

Ensure that cma_listen_on_all() atomically unwinds its action under the
lock during error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47393" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs

Fan speed minimum can be enforced from sysfs. For example, setting
current fan speed to 20 is used to enforce fan speed to be at 100%
speed, 19 - to be not below 90% speed, etcetera. This feature provides
ability to limit fan speed according to some system wise
considerations, like absence of some replaceable units or high system
ambient temperature.

Request for changing fan minimum speed is configuration request and can
be set only through 'sysfs' write procedure. In this situation value of
argument 'state' is above nominal fan speed maximum.

Return non-zero code in this case to avoid
thermal_cooling_device_stats_update() call, because in this case
statistics update violates thermal statistics table range.
The issues is observed in case kernel is configured with option
CONFIG_THERMAL_STATISTICS.

Here is the trace from KASAN:
[  159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0
[  159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444
[  159.545625] Call Trace:
[  159.548366]  dump_stack+0x92/0xc1
[  159.552084]  ? thermal_cooling_device_stats_update+0x7d/0xb0
[  159.635869]  thermal_zone_device_update+0x345/0x780
[  159.688711]  thermal_zone_device_set_mode+0x7d/0xc0
[  159.694174]  mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]
[  159.700972]  ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]
[  159.731827]  mlxsw_thermal_init+0x763/0x880 [mlxsw_core]
[  160.070233] RIP: 0033:0x7fd995909970
[  160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ..
[  160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970
[  160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001
[  160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700
[  160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013
[  160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013
[  160.143671]
[  160.145338] Allocated by task 2924:
[  160.149242]  kasan_save_stack+0x19/0x40
[  160.153541]  __kasan_kmalloc+0x7f/0xa0
[  160.157743]  __kmalloc+0x1a2/0x2b0
[  160.161552]  thermal_cooling_device_setup_sysfs+0xf9/0x1a0
[  160.167687]  __thermal_cooling_device_register+0x1b5/0x500
[  160.173833]  devm_thermal_of_cooling_device_register+0x60/0xa0
[  160.180356]  mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]
[  160.248140]
[  160.249807] The buggy address belongs to the object at ffff888116163400
[  160.249807]  which belongs to the cache kmalloc-1k of size 1024
[  160.263814] The buggy address is located 64 bytes to the right of
[  160.263814]  1024-byte region [ffff888116163400, ffff888116163800)
[  160.277536] The buggy address belongs to the page:
[  160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160
[  160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0
[  160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)
[  160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0
[  160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000
[  160.327033] page dumped because: kasan: bad access detected
[  160.333270]
[  160.334937] Memory state around the buggy address:
[  160.356469] &gt;ffff888116163800: fc ..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47394" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unlink table before deleting it

syzbot reports following UAF:
BUG: KASAN: use-after-free in memcmp+0x18f/0x1c0 lib/string.c:955
 nla_strcmp+0xf2/0x130 lib/nlattr.c:836
 nft_table_lookup.part.0+0x1a2/0x460 net/netfilter/nf_tables_api.c:570
 nft_table_lookup net/netfilter/nf_tables_api.c:4064 [inline]
 nf_tables_getset+0x1b3/0x860 net/netfilter/nf_tables_api.c:4064
 nfnetlink_rcv_msg+0x659/0x13f0 net/netfilter/nfnetlink.c:285
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504

Problem is that all get operations are lockless, so the commit_mutex
held by nft_rcv_nl_event() isn't enough to stop a parallel GET request
from doing read-accesses to the table object even after synchronize_rcu().

To avoid this, unlink the table first and store the table objects in
on-stack scratch space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227906">SUSE bug 1227906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47395" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap

Limit max values for vht mcs and nss in ieee80211_parse_tx_radiotap
routine in order to fix the following warning reported by syzbot:

WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
Modules linked in:
CPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
RIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
RSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216
RAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000
RDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100
R10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8
R13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004
FS:  00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740
 netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089
 __dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165
 __bpf_tx_skb net/core/filter.c:2114 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2139 [inline]
 __bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162
 ____bpf_clone_redirect net/core/filter.c:2429 [inline]
 bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401
 bpf_prog_eeb6f53a69e5c6a2+0x59/0x234
 bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]
 __bpf_prog_run include/linux/filter.h:624 [inline]
 bpf_prog_run include/linux/filter.h:631 [inline]
 bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119
 bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663
 bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]
 __sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605
 __do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
 __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47396" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211-hwsim: fix late beacon hrtimer handling

Thomas explained in https://lore.kernel.org/r/87mtoeb4hb.ffs@tglx
that our handling of the hrtimer here is wrong: If the timer fires
late (e.g. due to vCPU scheduling, as reported by Dmitry/syzbot)
then it tries to actually rearm the timer at the next deadline,
which might be in the past already:

 1          2          3          N          N+1
 |          |          |   ...    |          |

 ^ intended to fire here (1)
            ^ next deadline here (2)
                                      ^ actually fired here

The next time it fires, it's later, but will still try to schedule
for the next deadline (now 3), etc. until it catches up with N,
but that might take a long time, causing stalls etc.

Now, all of this is simulation, so we just have to fix it, but
note that the behaviour is wrong even per spec, since there's no
value then in sending all those beacons unaligned - they should be
aligned to the TBTT (1, 2, 3, ... in the picture), and if we're a
bit (or a lot) late, then just resume at that point.

Therefore, change the code to use hrtimer_forward_now() which will
ensure that the next firing of the timer would be at N+1 (in the
picture), i.e. the next interval point after the current time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47397</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47397" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb

We should always check if skb_header_pointer's return is NULL before
using it, otherwise it may cause null-ptr-deref, as syzbot reported:

  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  RIP: 0010:sctp_rcv_ootb net/sctp/input.c:705 [inline]
  RIP: 0010:sctp_rcv+0x1d84/0x3220 net/sctp/input.c:196
  Call Trace:
  &lt;IRQ&gt;
   sctp6_rcv+0x38/0x60 net/sctp/ipv6.c:1109
   ip6_protocol_deliver_rcu+0x2e9/0x1ca0 net/ipv6/ip6_input.c:422
   ip6_input_finish+0x62/0x170 net/ipv6/ip6_input.c:463
   NF_HOOK include/linux/netfilter.h:307 [inline]
   NF_HOOK include/linux/netfilter.h:301 [inline]
   ip6_input+0x9c/0xd0 net/ipv6/ip6_input.c:472
   dst_input include/net/dst.h:460 [inline]
   ip6_rcv_finish net/ipv6/ip6_input.c:76 [inline]
   NF_HOOK include/linux/netfilter.h:307 [inline]
   NF_HOOK include/linux/netfilter.h:301 [inline]
   ipv6_rcv+0x28c/0x3c0 net/ipv6/ip6_input.c:297
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47398" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hfi1: Fix kernel pointer leak

Pointers should be printed with %p or %px rather than cast to 'unsigned
long long' and printed with %llx.  Change %llx to %p to print the secured
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47399" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup

The ixgbe driver currently generates a NULL pointer dereference with
some machine (online cpus &lt; 63). This is due to the fact that the
maximum value of num_xdp_queues is nr_cpu_ids. Code is in
"ixgbe_set_rss_queues"".

Here's how the problem repeats itself:
Some machine (online cpus &lt; 63), And user set num_queues to 63 through
ethtool. Code is in the "ixgbe_set_channels",
	adapter-&gt;ring_feature[RING_F_FDIR].limit = count;

It becomes 63.

When user use xdp, "ixgbe_set_rss_queues" will set queues num.
	adapter-&gt;num_rx_queues = rss_i;
	adapter-&gt;num_tx_queues = rss_i;
	adapter-&gt;num_xdp_queues = ixgbe_xdp_queues(adapter);

And rss_i's value is from
	f = &amp;adapter-&gt;ring_feature[RING_F_FDIR];
	rss_i = f-&gt;indices = f-&gt;limit;

So "num_rx_queues" &gt; "num_xdp_queues", when run to "ixgbe_xdp_setup",
	for (i = 0; i &lt; adapter-&gt;num_rx_queues; i++)
		if (adapter-&gt;xdp_ring[i]-&gt;xsk_umem)

It leads to panic.

Call trace:
[exception RIP: ixgbe_xdp+368]
RIP: ffffffffc02a76a0  RSP: ffff9fe16202f8d0  RFLAGS: 00010297
RAX: 0000000000000000  RBX: 0000000000000020  RCX: 0000000000000000
RDX: 0000000000000000  RSI: 000000000000001c  RDI: ffffffffa94ead90
RBP: ffff92f8f24c0c18   R8: 0000000000000000   R9: 0000000000000000
R10: ffff9fe16202f830  R11: 0000000000000000  R12: ffff92f8f24c0000
R13: ffff9fe16202fc01  R14: 000000000000000a  R15: ffffffffc02a7530
ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 7 [ffff9fe16202f8f0] dev_xdp_install at ffffffffa89fbbcc
 8 [ffff9fe16202f920] dev_change_xdp_fd at ffffffffa8a08808
 9 [ffff9fe16202f960] do_setlink at ffffffffa8a20235
10 [ffff9fe16202fa88] rtnl_setlink at ffffffffa8a20384
11 [ffff9fe16202fc78] rtnetlink_rcv_msg at ffffffffa8a1a8dd
12 [ffff9fe16202fcf0] netlink_rcv_skb at ffffffffa8a717eb
13 [ffff9fe16202fd40] netlink_unicast at ffffffffa8a70f88
14 [ffff9fe16202fd80] netlink_sendmsg at ffffffffa8a71319
15 [ffff9fe16202fdf0] sock_sendmsg at ffffffffa89df290
16 [ffff9fe16202fe08] __sys_sendto at ffffffffa89e19c8
17 [ffff9fe16202ff30] __x64_sys_sendto at ffffffffa89e1a64
18 [ffff9fe16202ff38] do_syscall_64 at ffffffffa84042b9
19 [ffff9fe16202ff50] entry_SYSCALL_64_after_hwframe at ffffffffa8c0008c

So I fix ixgbe_max_channels so that it will not allow a setting of queues
to be higher than the num_online_cpus(). And when run to ixgbe_xdp_setup,
take the smaller value of num_rx_queues and num_xdp_queues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-12-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: do not allow call hns3_nic_net_open repeatedly

hns3_nic_net_open() is not allowed to called repeatly, but there
is no checking for this. When doing device reset and setup tc
concurrently, there is a small oppotunity to call hns3_nic_net_open
repeatedly, and cause kernel bug by calling napi_enable twice.

The calltrace information is like below:
[ 3078.222780] ------------[ cut here ]------------
[ 3078.230255] kernel BUG at net/core/dev.c:6991!
[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)
[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G           O      5.14.0-rc4+ #1
[ 3078.269102] Hardware name:  , BIOS KpxxxFPGA 1P B600 V181 08/12/2021
[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]
[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)
[ 3078.296168] pc : napi_enable+0x80/0x84
tc qdisc sho[w  3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]

[ 3078.314771] sp : ffff8000108abb20
[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300
[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000
[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880
[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000
[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930
[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4
[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8
[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344
[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938
[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0
[ 3078.414657] Call trace:
[ 3078.418517]  napi_enable+0x80/0x84
[ 3078.424626]  hns3_reset_notify_up_enet+0x78/0xd0 [hns3]
[ 3078.433469]  hns3_reset_notify+0x64/0x80 [hns3]
[ 3078.441430]  hclge_notify_client+0x68/0xb0 [hclge]
[ 3078.450511]  hclge_reset_rebuild+0x524/0x884 [hclge]
[ 3078.458879]  hclge_reset_service_task+0x3c4/0x680 [hclge]
[ 3078.467470]  hclge_service_task+0xb0/0xb54 [hclge]
[ 3078.475675]  process_one_work+0x1dc/0x48c
[ 3078.481888]  worker_thread+0x15c/0x464
[ 3078.487104]  kthread+0x160/0x170
[ 3078.492479]  ret_from_fork+0x10/0x18
[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)
[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---

Once hns3_nic_net_open() is excute success, the flag
HNS3_NIC_STATE_DOWN will be cleared. So add checking for this
flag, directly return when HNS3_NIC_STATE_DOWN is no set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47401</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47401" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix stack information leak

The tty driver name is used also after registering the driver and must
specifically not be allocated on the stack to avoid leaking information
to user space (or triggering an oops).

Drivers should not try to encode topology information in the tty device
name but this one snuck in through staging without anyone noticing and
another driver has since copied this malpractice.

Fixing the ABI is a separate issue, but this at least plugs the security
hole.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47402" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: flower: protect fl_walk() with rcu

Patch that refactored fl_walk() to use idr_for_each_entry_continue_ul()
also removed rcu protection of individual filters which causes following
use-after-free when filter is deleted concurrently. Fix fl_walk() to obtain
rcu read lock while iterating and taking the filter reference and temporary
release the lock while calling arg-&gt;fn() callback that can sleep.

KASAN trace:

[  352.773640] ==================================================================
[  352.775041] BUG: KASAN: use-after-free in fl_walk+0x159/0x240 [cls_flower]
[  352.776304] Read of size 4 at addr ffff8881c8251480 by task tc/2987

[  352.777862] CPU: 3 PID: 2987 Comm: tc Not tainted 5.15.0-rc2+ #2
[  352.778980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  352.781022] Call Trace:
[  352.781573]  dump_stack_lvl+0x46/0x5a
[  352.782332]  print_address_description.constprop.0+0x1f/0x140
[  352.783400]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.784292]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.785138]  kasan_report.cold+0x83/0xdf
[  352.785851]  ? fl_walk+0x159/0x240 [cls_flower]
[  352.786587]  kasan_check_range+0x145/0x1a0
[  352.787337]  fl_walk+0x159/0x240 [cls_flower]
[  352.788163]  ? fl_put+0x10/0x10 [cls_flower]
[  352.789007]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.790102]  tcf_chain_dump+0x231/0x450
[  352.790878]  ? tcf_chain_tp_delete_empty+0x170/0x170
[  352.791833]  ? __might_sleep+0x2e/0xc0
[  352.792594]  ? tfilter_notify+0x170/0x170
[  352.793400]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.794477]  tc_dump_tfilter+0x385/0x4b0
[  352.795262]  ? tc_new_tfilter+0x1180/0x1180
[  352.796103]  ? __mod_node_page_state+0x1f/0xc0
[  352.796974]  ? __build_skb_around+0x10e/0x130
[  352.797826]  netlink_dump+0x2c0/0x560
[  352.798563]  ? netlink_getsockopt+0x430/0x430
[  352.799433]  ? __mutex_unlock_slowpath.constprop.0+0x220/0x220
[  352.800542]  __netlink_dump_start+0x356/0x440
[  352.801397]  rtnetlink_rcv_msg+0x3ff/0x550
[  352.802190]  ? tc_new_tfilter+0x1180/0x1180
[  352.802872]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  352.803668]  ? tc_new_tfilter+0x1180/0x1180
[  352.804344]  ? _copy_from_iter_nocache+0x800/0x800
[  352.805202]  ? kasan_set_track+0x1c/0x30
[  352.805900]  netlink_rcv_skb+0xc6/0x1f0
[  352.806587]  ? rht_deferred_worker+0x6b0/0x6b0
[  352.807455]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  352.808324]  ? netlink_ack+0x4d0/0x4d0
[  352.809086]  ? netlink_deliver_tap+0x62/0x3d0
[  352.809951]  netlink_unicast+0x353/0x480
[  352.810744]  ? netlink_attachskb+0x430/0x430
[  352.811586]  ? __alloc_skb+0xd7/0x200
[  352.812349]  netlink_sendmsg+0x396/0x680
[  352.813132]  ? netlink_unicast+0x480/0x480
[  352.813952]  ? __import_iovec+0x192/0x210
[  352.814759]  ? netlink_unicast+0x480/0x480
[  352.815580]  sock_sendmsg+0x6c/0x80
[  352.816299]  ____sys_sendmsg+0x3a5/0x3c0
[  352.817096]  ? kernel_sendmsg+0x30/0x30
[  352.817873]  ? __ia32_sys_recvmmsg+0x150/0x150
[  352.818753]  ___sys_sendmsg+0xd8/0x140
[  352.819518]  ? sendmsg_copy_msghdr+0x110/0x110
[  352.820402]  ? ___sys_recvmsg+0xf4/0x1a0
[  352.821110]  ? __copy_msghdr_from_user+0x260/0x260
[  352.821934]  ? _raw_spin_lock+0x81/0xd0
[  352.822680]  ? __handle_mm_fault+0xef3/0x1b20
[  352.823549]  ? rb_insert_color+0x2a/0x270
[  352.824373]  ? copy_page_range+0x16b0/0x16b0
[  352.825209]  ? perf_event_update_userpage+0x2d0/0x2d0
[  352.826190]  ? __fget_light+0xd9/0xf0
[  352.826941]  __sys_sendmsg+0xb3/0x130
[  352.827613]  ? __sys_sendmsg_sock+0x20/0x20
[  352.828377]  ? do_user_addr_fault+0x2c5/0x8a0
[  352.829184]  ? fpregs_assert_state_consistent+0x52/0x60
[  352.830001]  ? exit_to_user_mode_prepare+0x32/0x160
[  352.830845]  do_syscall_64+0x35/0x80
[  352.831445]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  352.832331] RIP: 0033:0x7f7bee973c17
[ 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225302">SUSE bug 1225302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47403" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipack: ipoctal: fix module reference leak

A reference to the carrier module was taken on every open but was only
released once when the final reference to the tty struct was dropped.

Fix this by taking the module reference and initialising the tty driver
data when installing the tty.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47405" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: free raw_report buffers in usbhid_stop

Free the unsent raw_report buffers when the device is removed.

Fixes a memory leak reported by syzbot at:
https://syzkaller.appspot.com/bug?id=7b4fa7cb1a7c2d3342a2a8a6c53371c8c418ab47
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47406" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add error checking to ext4_ext_replay_set_iblocks()

If the call to ext4_map_blocks() fails due to an corrupted file
system, ext4_ext_replay_set_iblocks() can get stuck in an infinite
loop.  This could be reproduced by running generic/526 with a file
system that has inline_data and fast_commit enabled.  The system will
repeatedly log to the console:

EXT4-fs warning (device dm-3): ext4_block_to_path:105: block 1074800922 &gt; max in inode 131076

and the stack that it gets stuck in is:

   ext4_block_to_path+0xe3/0x130
   ext4_ind_map_blocks+0x93/0x690
   ext4_map_blocks+0x100/0x660
   skip_hole+0x47/0x70
   ext4_ext_replay_set_iblocks+0x223/0x440
   ext4_fc_replay_inode+0x29e/0x3b0
   ext4_fc_replay+0x278/0x550
   do_one_pass+0x646/0xc10
   jbd2_journal_recover+0x14a/0x270
   jbd2_journal_load+0xc4/0x150
   ext4_load_journal+0x1f3/0x490
   ext4_fill_super+0x22d4/0x2c00

With this patch, generic/526 still fails, but system is no longer
locking up in a tight loop.  It's likely the root casue is that
fast_commit replay is corrupting file systems with inline_data, and we
probably need to add better error handling in the fast commit replay
code path beyond what is done here, which essentially just breaks the
infinite loop without reporting the to the higher levels of the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47407" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Handle SRCU initialization failure during page track init

Check the return of init_srcu_struct(), which can fail due to OOM, when
initializing the page track mechanism.  Lack of checking leads to a NULL
pointer deref found by a modified syzkaller.

[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47408" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: serialize hash resizes and cleanups

Syzbot was able to trigger the following warning [1]

No repro found by syzbot yet but I was able to trigger similar issue
by having 2 scripts running in parallel, changing conntrack hash sizes,
and:

for j in `seq 1 1000` ; do unshare -n /bin/true &gt;/dev/null ; done

It would take more than 5 minutes for net_namespace structures
to be cleaned up.

This is because nf_ct_iterate_cleanup() has to restart everytime
a resize happened.

By adding a mutex, we can serialize hash resizes and cleanups
and also make get_next_corpse() faster by skipping over empty
buckets.

Even without resizes in the picture, this patch considerably
speeds up network namespace dismantles.

[1]
INFO: task syz-executor.0:8312 can't die for more than 144 seconds.
task:syz-executor.0  state:R  running task     stack:25672 pid: 8312 ppid:  6573 flags:0x00004006
Call Trace:
 context_switch kernel/sched/core.c:4955 [inline]
 __schedule+0x940/0x26f0 kernel/sched/core.c:6236
 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6408
 preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:35
 __local_bh_enable_ip+0x109/0x120 kernel/softirq.c:390
 local_bh_enable include/linux/bottom_half.h:32 [inline]
 get_next_corpse net/netfilter/nf_conntrack_core.c:2252 [inline]
 nf_ct_iterate_cleanup+0x15a/0x450 net/netfilter/nf_conntrack_core.c:2275
 nf_conntrack_cleanup_net_list+0x14c/0x4f0 net/netfilter/nf_conntrack_core.c:2469
 ops_exit_list+0x10d/0x160 net/core/net_namespace.c:171
 setup_net+0x639/0xa30 net/core/net_namespace.c:349
 copy_net_ns+0x319/0x760 net/core/net_namespace.c:470
 create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0xc1/0x1f0 kernel/nsproxy.c:226
 ksys_unshare+0x445/0x920 kernel/fork.c:3128
 __do_sys_unshare kernel/fork.c:3202 [inline]
 __se_sys_unshare kernel/fork.c:3200 [inline]
 __x64_sys_unshare+0x2d/0x40 kernel/fork.c:3200
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f63da68e739
RSP: 002b:00007f63d7c05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f63da792f80 RCX: 00007f63da68e739
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000
RBP: 00007f63da6e8cc4 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f63da792f80
R13: 00007fff50b75d3f R14: 00007f63d7c05300 R15: 0000000000022000

Showing all locks held in the system:
1 lock held by khungtaskd/27:
 #0: ffffffff8b980020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446
2 locks held by kworker/u4:2/153:
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: arch_atomic_long_set include/linux/atomic/atomic-long.h:41 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: atomic_long_set include/linux/atomic/atomic-instrumented.h:1198 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:634 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:661 [inline]
 #0: ffff888010c69138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x896/0x1690 kernel/workqueue.c:2268
 #1: ffffc9000140fdb0 ((kfence_timer).work){+.+.}-{0:0}, at: process_one_work+0x8ca/0x1690 kernel/workqueue.c:2272
1 lock held by systemd-udevd/2970:
1 lock held by in:imklog/6258:
 #0: ffff88807f970ff0 (&amp;f-&gt;f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
3 locks held by kworker/1:6/8158:
1 lock held by syz-executor.0/8312:
2 locks held by kworker/u4:13/9320:
1 lock held by
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47409" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47410" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix svm_migrate_fini warning

Device manager releases device-specific resources when a driver
disconnects from a device, devm_memunmap_pages and
devm_release_mem_region calls in svm_migrate_fini are redundant.

It causes below warning trace after patch "drm/amdgpu: Split
amdgpu_device_fini into early and late", so remove function
svm_migrate_fini.

BUG: https://gitlab.freedesktop.org/drm/amd/-/issues/1718

WARNING: CPU: 1 PID: 3646 at drivers/base/devres.c:795
devm_release_action+0x51/0x60
Call Trace:
    ? memunmap_pages+0x360/0x360
    svm_migrate_fini+0x2d/0x60 [amdgpu]
    kgd2kfd_device_exit+0x23/0xa0 [amdgpu]
    amdgpu_amdkfd_device_fini_sw+0x1d/0x30 [amdgpu]
    amdgpu_device_fini_sw+0x45/0x290 [amdgpu]
    amdgpu_driver_release_kms+0x12/0x30 [amdgpu]
    drm_dev_release+0x20/0x40 [drm]
    release_nodes+0x196/0x1e0
    device_release_driver_internal+0x104/0x1d0
    driver_detach+0x47/0x90
    bus_remove_driver+0x7a/0xd0
    pci_unregister_driver+0x3d/0x90
    amdgpu_exit+0x11/0x20 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47412" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't call rq_qos_ops-&gt;done_bio if the bio isn't tracked

rq_qos framework is only applied on request based driver, so:

1) rq_qos_done_bio() needn't to be called for bio based driver

2) rq_qos_done_bio() needn't to be called for bio which isn't tracked,
such as bios ended from error handling code.

Especially in bio_endio():

1) request queue is referred via bio-&gt;bi_bdev-&gt;bd_disk-&gt;queue, which
may be gone since request queue refcount may not be held in above two
cases

2) q-&gt;rq_qos may be freed in blk_cleanup_queue() when calling into
__rq_qos_done_bio()

Fix the potential kernel panic by not calling rq_qos_ops-&gt;done_bio if
the bio isn't tracked. This way is safe because both ioc_rqos_done_bio()
and blkcg_iolatency_done_bio() are nop if the bio isn't tracked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47413" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle

When passing 'phys' in the devicetree to describe the USB PHY phandle
(which is the recommended way according to
Documentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the
following NULL pointer dereference is observed on i.MX7 and i.MX8MM:

[    1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098
[    1.498170] Mem abort info:
[    1.500966]   ESR = 0x96000044
[    1.504030]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.509356]   SET = 0, FnV = 0
[    1.512416]   EA = 0, S1PTW = 0
[    1.515569]   FSC = 0x04: level 0 translation fault
[    1.520458] Data abort info:
[    1.523349]   ISV = 0, ISS = 0x00000044
[    1.527196]   CM = 0, WnR = 1
[    1.530176] [0000000000000098] user address but active_mm is swapper
[    1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[    1.542125] Modules linked in:
[    1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3
[    1.551901] Hardware name: Kontron i.MX8MM N801X S (DT)
[    1.557133] Workqueue: events_unbound deferred_probe_work_func
[    1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)
[    1.568998] pc : imx7d_charger_detection+0x3f0/0x510
[    1.573973] lr : imx7d_charger_detection+0x22c/0x510

This happens because the charger functions check for the phy presence
inside the imx_usbmisc_data structure (data-&gt;usb_phy), but the chipidea
core populates the usb_phy passed via 'phys' inside 'struct ci_hdrc'
(ci-&gt;usb_phy) instead.

This causes the NULL pointer dereference inside imx7d_charger_detection().

Fix it by also searching for 'phys' in case 'fsl,usbphy' is not found.

Tested on a imx7s-warp board.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47414" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Flush current cpu icache before other cpus

On SiFive Unmatched, I recently fell onto the following BUG when booting:

[    0.000000] ftrace: allocating 36610 entries in 144 pages
[    0.000000] Oops - illegal instruction [#1]
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.13.1+ #5
[    0.000000] Hardware name: SiFive HiFive Unmatched A00 (DT)
[    0.000000] epc : riscv_cpuid_to_hartid_mask+0x6/0xae
[    0.000000]  ra : __sbi_rfence_v02+0xc8/0x10a
[    0.000000] epc : ffffffff80007240 ra : ffffffff80009964 sp : ffffffff81803e10
[    0.000000]  gp : ffffffff81a1ea70 tp : ffffffff8180f500 t0 : ffffffe07fe30000
[    0.000000]  t1 : 0000000000000004 t2 : 0000000000000000 s0 : ffffffff81803e60
[    0.000000]  s1 : 0000000000000000 a0 : ffffffff81a22238 a1 : ffffffff81803e10
[    0.000000]  a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
[    0.000000]  a5 : 0000000000000000 a6 : ffffffff8000989c a7 : 0000000052464e43
[    0.000000]  s2 : ffffffff81a220c8 s3 : 0000000000000000 s4 : 0000000000000000
[    0.000000]  s5 : 0000000000000000 s6 : 0000000200000100 s7 : 0000000000000001
[    0.000000]  s8 : ffffffe07fe04040 s9 : ffffffff81a22c80 s10: 0000000000001000
[    0.000000]  s11: 0000000000000004 t3 : 0000000000000001 t4 : 0000000000000008
[    0.000000]  t5 : ffffffcf04000808 t6 : ffffffe3ffddf188
[    0.000000] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000002
[    0.000000] [&lt;ffffffff80007240&gt;] riscv_cpuid_to_hartid_mask+0x6/0xae
[    0.000000] [&lt;ffffffff80009474&gt;] sbi_remote_fence_i+0x1e/0x26
[    0.000000] [&lt;ffffffff8000b8f4&gt;] flush_icache_all+0x12/0x1a
[    0.000000] [&lt;ffffffff8000666c&gt;] patch_text_nosync+0x26/0x32
[    0.000000] [&lt;ffffffff8000884e&gt;] ftrace_init_nop+0x52/0x8c
[    0.000000] [&lt;ffffffff800f051e&gt;] ftrace_process_locs.isra.0+0x29c/0x360
[    0.000000] [&lt;ffffffff80a0e3c6&gt;] ftrace_init+0x80/0x130
[    0.000000] [&lt;ffffffff80a00f8c&gt;] start_kernel+0x5c4/0x8f6
[    0.000000] ---[ end trace f67eb9af4d8d492b ]---
[    0.000000] Kernel panic - not syncing: Attempted to kill the idle task!
[    0.000000] ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

While ftrace is looping over a list of addresses to patch, it always failed
when patching the same function: riscv_cpuid_to_hartid_mask. Looking at the
backtrace, the illegal instruction is encountered in this same function.
However, patch_text_nosync, after patching the instructions, calls
flush_icache_range. But looking at what happens in this function:

flush_icache_range -&gt; flush_icache_all
                   -&gt; sbi_remote_fence_i
                   -&gt; __sbi_rfence_v02
                   -&gt; riscv_cpuid_to_hartid_mask

The icache and dcache of the current cpu are never synchronized between the
patching of riscv_cpuid_to_hartid_mask and calling this same function.

So fix this by flushing the current cpu's icache before asking for the other
cpus to do the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47415" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mvm: Fix possible NULL dereference

In __iwl_mvm_remove_time_event() check that 'te_data-&gt;vif' is NULL
before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47416" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: mdio: fix memory leak

Syzbot reported memory leak in MDIO bus interface, the problem was in
wrong state logic.

MDIOBUS_ALLOCATED indicates 2 states:
	1. Bus is only allocated
	2. Bus allocated and __mdiobus_register() fails, but
	   device_register() was called

In case of device_register() has been called we should call put_device()
to correctly free the memory allocated for this device, but mdiobus_free()
calls just kfree(dev) in case of MDIOBUS_ALLOCATED state

To avoid this behaviour we need to set bus-&gt;state to MDIOBUS_UNREGISTERED
_before_ calling device_register(), because put_device() should be
called even in case of device_register() failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47417" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libbpf: Fix memory leak in strset

Free struct strset itself, not just its internal parts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47418" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: fix NULL deref in fifo_set_limit()

syzbot reported another NULL deref in fifo_set_limit() [1]

I could repro the issue with :

unshare -n
tc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit
tc qd replace dev lo parent 1:0 pfifo_fast
tc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit

pfifo_fast does not have a change() operation.
Make fifo_set_limit() more robust about this.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0
Oops: 0010 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:0x0
Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
RSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000
RBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947
R10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910
R13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800
FS:  00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 fifo_set_limit net/sched/sch_fifo.c:242 [inline]
 fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227
 tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418
 qdisc_change net/sched/sch_api.c:1332 [inline]
 tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47419</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47419" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_taprio: properly cancel timer from taprio_destroy()

There is a comment in qdisc_create() about us not calling ops-&gt;reset()
in some cases.

err_out4:
	/*
	 * Any broken qdiscs that would require a ops-&gt;reset() here?
	 * The qdisc was never in action so it shouldn't be necessary.
	 */

As taprio sets a timer before actually receiving a packet, we need
to cancel it from ops-&gt;destroy, just in case ops-&gt;reset has not
been called.

syzbot reported:

ODEBUG: free active (active state 0) object type: hrtimer hint: advance_sched+0x0/0x9a0 arch/x86/include/asm/atomic64_64.h:22
WARNING: CPU: 0 PID: 8441 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Modules linked in:
CPU: 0 PID: 8441 Comm: syz-executor813 Not tainted 5.14.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 d3 e3 89 4c 89 ee 48 c7 c7 e0 c7 e3 89 e8 5b 86 11 05 &lt;0f&gt; 0b 83 05 85 03 92 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3
RSP: 0018:ffffc9000130f330 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000
RDX: ffff88802baeb880 RSI: ffffffff815d87b5 RDI: fffff52000261e58
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815d25ee R11: 0000000000000000 R12: ffffffff898dd020
R13: ffffffff89e3ce20 R14: ffffffff81653630 R15: dffffc0000000000
FS:  0000000000f0d300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffb64b3e000 CR3: 0000000036557000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 __debug_check_no_obj_freed lib/debugobjects.c:987 [inline]
 debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1018
 slab_free_hook mm/slub.c:1603 [inline]
 slab_free_freelist_hook+0x171/0x240 mm/slub.c:1653
 slab_free mm/slub.c:3213 [inline]
 kfree+0xe4/0x540 mm/slub.c:4267
 qdisc_create+0xbcf/0x1320 net/sched/sch_api.c:1299
 tc_modify_qdisc+0x4c8/0x1a60 net/sched/sch_api.c:1663
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504
 netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340
 netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2403
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2457
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2486
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47420" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix a potential ttm-&gt;sg memory leak

Memory is allocated for ttm-&gt;sg by kmalloc in kfd_mem_dmamap_userptr,
but isn't freed by kfree in kfd_mem_dmaunmap_userptr. Free it!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47421</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47421" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume

In current code, when a PCI error state pci_channel_io_normal is detectd,
it will report PCI_ERS_RESULT_CAN_RECOVER status to PCI driver, and PCI
driver will continue the execution of PCI resume callback report_resume by
pci_walk_bridge, and the callback will go into amdgpu_pci_resume
finally, where write lock is releasd unconditionally without acquiring
such lock first. In this case, a deadlock will happen when other threads
start to acquire the read lock.

To fix this, add a member in amdgpu_device strucutre to cache
pci_channel_state, and only continue the execution in amdgpu_pci_resume
when it's pci_channel_io_frozen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47422</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47422" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/kms/nv50-: fix file release memory leak

When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47423" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/debugfs: fix file release memory leak

When using single_open() for opening, single_release() should be
called, otherwise the 'op' allocated in single_open() will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47424" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix freeing of uninitialized misc IRQ vector

When VSI set up failed in i40e_probe() as part of PF switch set up
driver was trying to free misc IRQ vectors in
i40e_clear_interrupt_scheme and produced a kernel Oops:

   Trying to free already-free IRQ 266
   WARNING: CPU: 0 PID: 5 at kernel/irq/manage.c:1731 __free_irq+0x9a/0x300
   Workqueue: events work_for_cpu_fn
   RIP: 0010:__free_irq+0x9a/0x300
   Call Trace:
   ? synchronize_irq+0x3a/0xa0
   free_irq+0x2e/0x60
   i40e_clear_interrupt_scheme+0x53/0x190 [i40e]
   i40e_probe.part.108+0x134b/0x1a40 [i40e]
   ? kmem_cache_alloc+0x158/0x1c0
   ? acpi_ut_update_ref_count.part.1+0x8e/0x345
   ? acpi_ut_update_object_reference+0x15e/0x1e2
   ? strstr+0x21/0x70
   ? irq_get_irq_data+0xa/0x20
   ? mp_check_pin_attr+0x13/0xc0
   ? irq_get_irq_data+0xa/0x20
   ? mp_map_pin_to_irq+0xd3/0x2f0
   ? acpi_register_gsi_ioapic+0x93/0x170
   ? pci_conf1_read+0xa4/0x100
   ? pci_bus_read_config_word+0x49/0x70
   ? do_pci_enable_device+0xcc/0x100
   local_pci_probe+0x41/0x90
   work_for_cpu_fn+0x16/0x20
   process_one_work+0x1a7/0x360
   worker_thread+0x1cf/0x390
   ? create_worker+0x1a0/0x1a0
   kthread+0x112/0x130
   ? kthread_flush_work_fn+0x10/0x10
   ret_from_fork+0x1f/0x40

The problem is that at that point misc IRQ vectors
were not allocated yet and we get a call trace
that driver is trying to free already free IRQ vectors.

Add a check in i40e_clear_interrupt_scheme for __I40E_MISC_IRQ_REQUESTED
PF state before calling i40e_free_misc_vector. This state is set only if
misc IRQ vectors were properly initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47425" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: acpi: fix resource leak in reconfiguration device addition

acpi_i2c_find_adapter_by_handle() calls bus_find_device() which takes a
reference on the adapter which is never released which will result in a
reference count leak and render the adapter unremovable.  Make sure to
put the adapter after creating the client in the same manner that we do
for OF.

[wsa: fixed title]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47426" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, s390: Fix potential memory leak about jit_data

Make sure to free jit_data through kfree() in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47427" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: Fix iscsi_task use after free

Commit d39df158518c ("scsi: iscsi: Have abort handler get ref to conn")
added iscsi_get_conn()/iscsi_put_conn() calls during abort handling but
then also changed the handling of the case where we detect an already
completed task where we now end up doing a goto to the common put/cleanup
code. This results in a iscsi_task use after free, because the common
cleanup code will do a put on the iscsi_task.

This reverts the goto and moves the iscsi_get_conn() to after we've checked
if the iscsi_task is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47428" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: fix program check interrupt emergency stack path

Emergency stack path was jumping into a 3: label inside the
__GEN_COMMON_BODY macro for the normal path after it had finished,
rather than jumping over it. By a small miracle this is the correct
place to build up a new interrupt frame with the existing stack
pointer, so things basically worked okay with an added weird looking
700 trap frame on top (which had the wrong -&gt;nip so it didn't decode
bug messages either).

Fix this by avoiding using numeric labels when jumping over non-trivial
macros.

Before:

 LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
 Modules linked in:
 CPU: 0 PID: 88 Comm: sh Not tainted 5.15.0-rc2-00034-ge057cdade6e5 #2637
 NIP:  7265677368657265 LR: c00000000006c0c8 CTR: c0000000000097f0
 REGS: c0000000fffb3a50 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 00000700  XER: 20040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006c964 c0000000fffb3cf0 c000000001513800 0000000000000000
 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
 NIP [7265677368657265] 0x7265677368657265
 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
 Call Trace:
 [c0000000fffb3cf0] [c00000000000bdac] soft_nmi_common+0x13c/0x1d0 (unreliable)
 --- interrupt: 700 at decrementer_common_virt+0xb8/0x230
 NIP:  c0000000000098b8 LR: c00000000006c0c8 CTR: c0000000000097f0
 REGS: c0000000fffb3d60 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 22424282  XER: 20040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006c964 0000000000002400 c000000001513800 0000000000000000
 GPR04: 0000000048ab0778 0000000042000000 0000000000000000 0000000000001299
 GPR08: 000001e447c718ec 0000000022424282 0000000000002710 c00000000006bee8
 GPR12: 9000000000009033 c0000000016b0000 00000000000000b0 0000000000000001
 GPR16: 0000000000000000 0000000000000002 0000000000000000 0000000000000ff8
 GPR20: 0000000000001fff 0000000000000007 0000000000000080 00007fff89d90158
 GPR24: 0000000002000000 0000000002000000 0000000000000255 0000000000000300
 GPR28: c000000001270000 0000000042000000 0000000048ab0778 c000000080647e80
 NIP [c0000000000098b8] decrementer_common_virt+0xb8/0x230
 LR [c00000000006c0c8] ___do_page_fault+0x3f8/0xb10
 --- interrupt: 700
 Instruction dump:
 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
 XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
 ---[ end trace 6d28218e0cc3c949 ]---

After:

 ------------[ cut here ]------------
 kernel BUG at arch/powerpc/kernel/exceptions-64s.S:491!
 Oops: Exception in kernel mode, sig: 5 [#1]
 LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
 Modules linked in:
 CPU: 0 PID: 88 Comm: login Not tainted 5.15.0-rc2-00034-ge057cdade6e5-dirty #2638
 NIP:  c0000000000098b8 LR: c00000000006bf04 CTR: c0000000000097f0
 REGS: c0000000fffb3d60 TRAP: 0700   Not tainted
 MSR:  9000000000021031 &lt;SF,HV,ME,IR,DR,LE&gt;  CR: 24482227  XER: 00040000
 CFAR: c0000000000098b0 IRQMASK: 0
 GPR00: c00000000006bf04 0000000000002400 c000000001513800 c000000001271868
 GPR04: 00000000100f0d29 0000000042000000 0000000000000007 0000000000000009
 GPR08: 00000000100f0d29 0000000024482227 0000000000002710 c000000000181b3c
 GPR12: 9000000000009033 c0000000016b0000 00000000100f0d29 c000000005b22f00
 GPR16: 00000000ffff0000 0000000000000001 0000000000000009 00000000100eed90
 GPR20: 00000000100eed90 00000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47429" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: Fix unrecoverable MCE calling async handler from NMI

The machine check handler is not considered NMI on 64s. The early
handler is the true NMI handler, and then it schedules the
machine_check_exception handler to run when interrupts are enabled.

This works fine except the case of an unrecoverable MCE, where the true
NMI is taken when MSR[RI] is clear, it can not recover, so it calls
machine_check_exception directly so something might be done about it.

Calling an async handler from NMI context can result in irq state and
other things getting corrupted. This can also trigger the BUG at
  arch/powerpc/include/asm/interrupt.h:168
  BUG_ON(!arch_irq_disabled_regs(regs) &amp;&amp; !(regs-&gt;msr &amp; MSR_EE));

Fix this by making an _async version of the handler which is called
in the normal case, and a NMI version that is called for unrecoverable
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227553">SUSE bug 1227553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47430" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n

Commit

  3c73b81a9164 ("x86/entry, selftests: Further improve user entry sanity checks")

added a warning if AC is set when in the kernel.

Commit

  662a0221893a3d ("x86/entry: Fix AC assertion")

changed the warning to only fire if the CPU supports SMAP.

However, the warning can still trigger on a machine that supports SMAP
but where it's disabled in the kernel config and when running the
syscall_nt selftest, for example:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 49 at irqentry_enter_from_user_mode
  CPU: 0 PID: 49 Comm: init Tainted: G                T 5.15.0-rc4+ #98 e6202628ee053b4f310759978284bd8bb0ce6905
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
  RIP: 0010:irqentry_enter_from_user_mode
  ...
  Call Trace:
   ? irqentry_enter
   ? exc_general_protection
   ? asm_exc_general_protection
   ? asm_exc_general_protectio

IS_ENABLED(CONFIG_X86_SMAP) could be added to the warning condition, but
even this would not be enough in case SMAP is disabled at boot time with
the "nosmap" parameter.

To be consistent with "nosmap" behaviour, clear X86_FEATURE_SMAP when
!CONFIG_X86_SMAP.

Found using entry-fuzz + satrandconfig.

 [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47431" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix gart.bo pin_count leak

gmc_v{9,10}_0_gart_disable() isn't called matched with
correspoding gart_enbale function in SRIOV case. This will
lead to gart.bo pin_count leak on driver unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47432" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/generic-radix-tree.c: Don't overflow in peek()

When we started spreading new inode numbers throughout most of the 64
bit inode space, that triggered some corner case bugs, in particular
some integer overflows related to the radix tree code. Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225391">SUSE bug 1225391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47433" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix abort logic in btrfs_replace_file_extents

Error injection testing uncovered a case where we'd end up with a
corrupt file system with a missing extent in the middle of a file.  This
occurs because the if statement to decide if we should abort is wrong.

The only way we would abort in this case is if we got a ret !=
-EOPNOTSUPP and we called from the file clone code.  However the
prealloc code uses this path too.  Instead we need to abort if there is
an error, and the only error we _don't_ abort on is -EOPNOTSUPP and only
if we came from the clone file code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47434" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix command ring pointer corruption while aborting a command

The command ring pointer is located at [6:63] bits of the command
ring control register (CRCR). All the control bits like command stop,
abort are located at [0:3] bits. While aborting a command, we read the
CRCR and set the abort bit and write to the CRCR. The read will always
give command ring pointer as all zeros. So we essentially write only
the control bits. Since we split the 64 bit write into two 32 bit writes,
there is a possibility of xHC command ring stopped before the upper
dword (all zeros) is written. If that happens, xHC updates the upper
dword of its internal command ring pointer with all zeros. Next time,
when the command ring is restarted, we see xHC memory access failures.
Fix this issue by only writing to the lower dword of CRCR where all
control bits are located.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47436" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: dsps: Fix the probe error path

Commit 7c75bde329d7 ("usb: musb: musb_dsps: request_irq() after
initializing musb") has inverted the calls to
dsps_setup_optional_vbus_irq() and dsps_create_musb_pdev() without
updating correctly the error path. dsps_create_musb_pdev() allocates and
registers a new platform device which must be unregistered and freed
with platform_device_unregister(), and this is missing upon
dsps_setup_optional_vbus_irq() error.

While on the master branch it seems not to trigger any issue, I observed
a kernel crash because of a NULL pointer dereference with a v5.10.70
stable kernel where the patch mentioned above was backported. With this
kernel version, -EPROBE_DEFER is returned the first time
dsps_setup_optional_vbus_irq() is called which triggers the probe to
error out without unregistering the platform device. Unfortunately, on
the Beagle Bone Black Wireless, the platform device still living in the
system is being used by the USB Ethernet gadget driver, which during the
boot phase triggers the crash.

My limited knowledge of the musb world prevents me to revert this commit
which was sent to silence a robot warning which, as far as I understand,
does not make sense. The goal of this patch was to prevent an IRQ to
fire before the platform device being registered. I think this cannot
ever happen due to the fact that enabling the interrupts is done by the
-&gt;enable() callback of the platform musb device, and this platform
device must be already registered in order for the core or any other
user to use this callback.

Hence, I decided to fix the error path, which might prevent future
errors on mainline kernels while also fixing older ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47437" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adis16475: fix deadlock on frequency set

With commit 39c024b51b560
("iio: adis16475: improve sync scale mode handling"), two deadlocks were
introduced:
 1) The call to 'adis_write_reg_16()' was not changed to it's unlocked
    version.
 2) The lock was not being released on the success path of the function.

This change fixes both these issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47438" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path

Prior to this patch in case mlx5_core_destroy_cq() failed it returns
without completing all destroy operations and that leads to memory leak.
Instead, complete the destroy flow before return error.

Also move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()
to be symmetrical with mlx5_core_create_cq().

kmemleak complains on:

unreferenced object 0xc000000038625100 (size 64):
  comm "ethtool", pid 28301, jiffies 4298062946 (age 785.380s)
  hex dump (first 32 bytes):
    60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0  `.H.......4.....
    02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0  ..........}.....
  backtrace:
    [&lt;000000009e8643cb&gt;] add_res_tree+0xd0/0x270 [mlx5_core]
    [&lt;00000000e7cb8e6c&gt;] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]
    [&lt;000000002a12918f&gt;] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]
    [&lt;00000000cef0a696&gt;] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]
    [&lt;000000009c642c26&gt;] mlx5e_open_cq+0xb4/0x130 [mlx5_core]
    [&lt;0000000058dfa578&gt;] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]
    [&lt;0000000081839561&gt;] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]
    [&lt;0000000009cf05d4&gt;] mlx5e_switch_priv_channels+0xa4/0x230
[mlx5_core]
    [&lt;0000000042bbedd8&gt;] mlx5e_safe_switch_params+0x14c/0x300
[mlx5_core]
    [&lt;0000000004bc9db8&gt;] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]
    [&lt;00000000a0553443&gt;] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]
    [&lt;00000000a8f3d84b&gt;] ethnl_set_privflags+0x234/0x2d0
    [&lt;00000000fd27f27c&gt;] genl_family_rcv_msg_doit+0x108/0x1d0
    [&lt;00000000f495e2bb&gt;] genl_family_rcv_msg+0xe4/0x1f0
    [&lt;00000000646c5c2c&gt;] genl_rcv_msg+0x78/0x120
    [&lt;00000000d53e384e&gt;] netlink_rcv_skb+0x74/0x1a0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47439" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work

When the ksz module is installed and removed using rmmod, kernel crashes
with null pointer dereferrence error. During rmmod, ksz_switch_remove
function tries to cancel the mib_read_workqueue using
cancel_delayed_work_sync routine and unregister switch from dsa.

During dsa_unregister_switch it calls ksz_mac_link_down, which in turn
reschedules the workqueue since mib_interval is non-zero.
Due to which queue executed after mib_interval and it tries to access
dp-&gt;slave. But the slave is unregistered in the ksz_switch_remove
function. Hence kernel crashes.

To avoid this crash, before canceling the workqueue, resetted the
mib_interval to 0.

v1 -&gt; v2:
-Removed the if condition in ksz_mib_read_work
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47440" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: encx24j600: check error in devm_regmap_init_encx24j600

devm_regmap_init may return error which caused by like out of memory,
this will results in null pointer dereference later when reading
or writing register:

general protection fault in encx24j600_spi_probe
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
CPU: 0 PID: 286 Comm: spi-encx24j600- Not tainted 5.15.0-rc2-00142-g9978db750e31-dirty #11 9c53a778c1306b1b02359f3c2bbedc0222cba652
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:regcache_cache_bypass drivers/base/regmap/regcache.c:540
Code: 54 41 89 f4 55 53 48 89 fb 48 83 ec 08 e8 26 94 a8 fe 48 8d bb a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4a 03 00 00 4c 8d ab b0 00 00 00 48 8b ab a0 00
RSP: 0018:ffffc900010476b8 EFLAGS: 00010207
RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: 0000000000000000
RDX: 0000000000000012 RSI: ffff888002de0000 RDI: 0000000000000094
RBP: ffff888013c9a000 R08: 0000000000000000 R09: fffffbfff3f9cc6a
R10: ffffc900010476e8 R11: fffffbfff3f9cc69 R12: 0000000000000001
R13: 000000000000000a R14: ffff888013c9af54 R15: ffff888013c9ad08
FS:  00007ffa984ab580(0000) GS:ffff88801fe00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055a6384136c8 CR3: 000000003bbe6003 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 encx24j600_spi_probe drivers/net/ethernet/microchip/encx24j600.c:459
 spi_probe drivers/spi/spi.c:397
 really_probe drivers/base/dd.c:517
 __driver_probe_device drivers/base/dd.c:751
 driver_probe_device drivers/base/dd.c:782
 __device_attach_driver drivers/base/dd.c:899
 bus_for_each_drv drivers/base/bus.c:427
 __device_attach drivers/base/dd.c:971
 bus_probe_device drivers/base/bus.c:487
 device_add drivers/base/core.c:3364
 __spi_add_device drivers/spi/spi.c:599
 spi_add_device drivers/spi/spi.c:641
 spi_new_device drivers/spi/spi.c:717
 new_device_store+0x18c/0x1f1 [spi_stub 4e02719357f1ff33f5a43d00630982840568e85e]
 dev_attr_store drivers/base/core.c:2074
 sysfs_kf_write fs/sysfs/file.c:139
 kernfs_fop_write_iter fs/kernfs/file.c:300
 new_sync_write fs/read_write.c:508 (discriminator 4)
 vfs_write fs/read_write.c:594
 ksys_write fs/read_write.c:648
 do_syscall_64 arch/x86/entry/common.c:50
 entry_SYSCALL_64_after_hwframe arch/x86/entry/entry_64.S:113

Add error check in devm_regmap_init_encx24j600 to avoid this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: thermal: Fix out-of-bounds memory accesses

Currently, mlxsw allows cooling states to be set above the maximum
cooling state supported by the driver:

 # cat /sys/class/thermal/thermal_zone2/cdev0/type
 mlxsw_fan
 # cat /sys/class/thermal/thermal_zone2/cdev0/max_state
 10
 # echo 18 &gt; /sys/class/thermal/thermal_zone2/cdev0/cur_state
 # echo $?
 0

This results in out-of-bounds memory accesses when thermal state
transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the
transition table is accessed with a too large index (state) [1].

According to the thermal maintainer, it is the responsibility of the
driver to reject such operations [2].

Therefore, return an error when the state to be set exceeds the maximum
cooling state supported by the driver.

To avoid dead code, as suggested by the thermal maintainer [3],
partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling
device with cooling levels") that tried to interpret these invalid
cooling states (above the maximum) in a special way. The cooling levels
array is not removed in order to prevent the fans going below 20% PWM,
which would cause them to get stuck at 0% PWM.

[1]
BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290
Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5

CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122
Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016
Workqueue: events_freezable_power_ thermal_zone_device_check
Call Trace:
 dump_stack_lvl+0x8b/0xb3
 print_address_description.constprop.0+0x1f/0x140
 kasan_report.cold+0x7f/0x11b
 thermal_cooling_device_stats_update+0x271/0x290
 __thermal_cdev_update+0x15e/0x4e0
 thermal_cdev_update+0x9f/0xe0
 step_wise_throttle+0x770/0xee0
 thermal_zone_device_update+0x3f6/0xdf0
 process_one_work+0xa42/0x1770
 worker_thread+0x62f/0x13e0
 kthread+0x3ee/0x4e0
 ret_from_fork+0x1f/0x30

Allocated by task 1:
 kasan_save_stack+0x1b/0x40
 __kasan_kmalloc+0x7c/0x90
 thermal_cooling_device_setup_sysfs+0x153/0x2c0
 __thermal_cooling_device_register.part.0+0x25b/0x9c0
 thermal_cooling_device_register+0xb3/0x100
 mlxsw_thermal_init+0x5c5/0x7e0
 __mlxsw_core_bus_device_register+0xcb3/0x19c0
 mlxsw_core_bus_device_register+0x56/0xb0
 mlxsw_pci_probe+0x54f/0x710
 local_pci_probe+0xc6/0x170
 pci_device_probe+0x2b2/0x4d0
 really_probe+0x293/0xd10
 __driver_probe_device+0x2af/0x440
 driver_probe_device+0x51/0x1e0
 __driver_attach+0x21b/0x530
 bus_for_each_dev+0x14c/0x1d0
 bus_add_driver+0x3ac/0x650
 driver_register+0x241/0x3d0
 mlxsw_sp_module_init+0xa2/0x174
 do_one_initcall+0xee/0x5f0
 kernel_init_freeable+0x45a/0x4de
 kernel_init+0x1f/0x210
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff8881052f7800
 which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 1016 bytes inside of
 1024-byte region [ffff8881052f7800, ffff8881052f7c00)
The buggy address belongs to the page:
page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0
head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x200000000010200(slab|head|node=0|zone=2)
raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
 ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                                                ^
 ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc

[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47442" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: digital: fix possible memory leak in digital_in_send_sdd_req()

'skb' is allocated in digital_in_send_sdd_req(), but not free when
digital_in_send_cmd() failed, which will cause memory leak. Fix it
by freeing 'skb' if digital_in_send_cmd() return failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47443" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()

'params' is allocated in digital_tg_listen_mdaa(), but not free when
digital_send_cmd() failed, which will cause memory leak. Fix it by
freeing 'params' if digital_send_cmd() return failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47444" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read

In commit e11f5bd8228f ("drm: Add support for DP 1.4 Compliance edid
corruption test") the function connector_bad_edid() started assuming
that the memory for the EDID passed to it was big enough to hold
`edid[0x7e] + 1` blocks of data (1 extra for the base block). It
completely ignored the fact that the function was passed `num_blocks`
which indicated how much memory had been allocated for the EDID.

Let's fix this by adding a bounds check.

This is important for handling the case where there's an error in the
first block of the EDID. In that case we will call
connector_bad_edid() without having re-allocated memory based on
`edid[0x7e]`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47445</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47445" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix null pointer dereference on pointer edp

The initialization of pointer dev dereferences pointer edp before
edp is null checked, so there is a potential null pointer deference
issue. Fix this by only dereferencing edp after edp has been null
checked.

Addresses-Coverity: ("Dereference before null check")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47446" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a4xx: fix error handling in a4xx_gpu_init()

This code returns 1 on error instead of a negative error.  It leads to
an Oops in the caller.  A second problem is that the check for
"if (ret != -ENODATA)" cannot be true because "ret" is set to 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47447" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a3xx: fix error handling in a3xx_gpu_init()

These error paths returned 1 on failure, instead of a negative error
code.  This would lead to an Oops in the caller.  A second problem is
that the check for "if (ret != -ENODATA)" did not work because "ret" was
set to 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47448" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix possible stall on recvmsg()

recvmsg() can enter an infinite loop if the caller provides the
MSG_WAITALL, the data present in the receive queue is not sufficient to
fulfill the request, and no more data is received by the peer.

When the above happens, mptcp_wait_data() will always return with
no wait, as the MPTCP_DATA_READY flag checked by such function is
set and never cleared in such code path.

Leveraging the above syzbot was able to trigger an RCU stall:

rcu: INFO: rcu_preempt self-detected stall on CPU
rcu:    0-...!: (10499 ticks this GP) idle=0af/1/0x4000000000000000 softirq=10678/10678 fqs=1
        (t=10500 jiffies g=13089 q=109)
rcu: rcu_preempt kthread starved for 10497 jiffies! g13089 f0x0 RCU_GP_WAIT_FQS(5) -&gt;state=0x0 -&gt;cpu=1
rcu:    Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:28696 pid:   14 ppid:     2 flags:0x00004000
Call Trace:
 context_switch kernel/sched/core.c:4955 [inline]
 __schedule+0x940/0x26f0 kernel/sched/core.c:6236
 schedule+0xd3/0x270 kernel/sched/core.c:6315
 schedule_timeout+0x14a/0x2a0 kernel/time/timer.c:1881
 rcu_gp_fqs_loop+0x186/0x810 kernel/rcu/tree.c:1955
 rcu_gp_kthread+0x1de/0x320 kernel/rcu/tree.c:2128
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 8510 Comm: syz-executor827 Not tainted 5.15.0-rc2-next-20210920-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:84 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:102 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0xc8/0x180 mm/kasan/generic.c:189
Code: 38 00 74 ed 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 7a 80 38 00 74 f2 48 89 c2 b8 01 00 00 00 48 85 d2 75 56 5b 5d 41 5c c3 &lt;48&gt; 85 d2 74 5e 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 50 80 38 00
RSP: 0018:ffffc9000cd676c8 EFLAGS: 00000283
RAX: ffffed100e9a110e RBX: ffffed100e9a110f RCX: ffffffff88ea062a
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff888074d08870
RBP: ffffed100e9a110e R08: 0000000000000001 R09: ffff888074d08877
R10: ffffed100e9a110e R11: 0000000000000000 R12: ffff888074d08000
R13: ffff888074d08000 R14: ffff888074d08088 R15: ffff888074d08000
FS:  0000555556d8e300(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
S:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000180 CR3: 0000000068909000 CR4: 00000000001506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 instrument_atomic_read_write include/linux/instrumented.h:101 [inline]
 test_and_clear_bit include/asm-generic/bitops/instrumented-atomic.h:83 [inline]
 mptcp_release_cb+0x14a/0x210 net/mptcp/protocol.c:3016
 release_sock+0xb4/0x1b0 net/core/sock.c:3204
 mptcp_wait_data net/mptcp/protocol.c:1770 [inline]
 mptcp_recvmsg+0xfd1/0x27b0 net/mptcp/protocol.c:2080
 inet6_recvmsg+0x11b/0x5e0 net/ipv6/af_inet6.c:659
 sock_recvmsg_nosec net/socket.c:944 [inline]
 ____sys_recvmsg+0x527/0x600 net/socket.c:2626
 ___sys_recvmsg+0x127/0x200 net/socket.c:2670
 do_recvmmsg+0x24d/0x6d0 net/socket.c:2764
 __sys_recvmmsg net/socket.c:2843 [inline]
 __do_sys_recvmmsg net/socket.c:2866 [inline]
 __se_sys_recvmmsg net/socket.c:2859 [inline]
 __x64_sys_recvmmsg+0x20b/0x260 net/socket.c:2859
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fc200d2
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47449</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47449" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix locking for Tx timestamp tracking flush

Commit 4dd0d5c33c3e ("ice: add lock around Tx timestamp tracker flush")
added a lock around the Tx timestamp tracker flow which is used to
cleanup any left over SKBs and prepare for device removal.

This lock is problematic because it is being held around a call to
ice_clear_phy_tstamp. The clear function takes a mutex to send a PHY
write command to firmware. This could lead to a deadlock if the mutex
actually sleeps, and causes the following warning on a kernel with
preemption debugging enabled:

[  715.419426] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:573
[  715.427900] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3100, name: rmmod
[  715.435652] INFO: lockdep is turned off.
[  715.439591] Preemption disabled at:
[  715.439594] [&lt;0000000000000000&gt;] 0x0
[  715.446678] CPU: 52 PID: 3100 Comm: rmmod Tainted: G        W  OE     5.15.0-rc4+ #42 bdd7ec3018e725f159ca0d372ce8c2c0e784891c
[  715.458058] Hardware name: Intel Corporation S2600STQ/S2600STQ, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  715.468483] Call Trace:
[  715.470940]  dump_stack_lvl+0x6a/0x9a
[  715.474613]  ___might_sleep.cold+0x224/0x26a
[  715.478895]  __mutex_lock+0xb3/0x1440
[  715.482569]  ? stack_depot_save+0x378/0x500
[  715.486763]  ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.494979]  ? kfree+0xc1/0x520
[  715.498128]  ? mutex_lock_io_nested+0x12a0/0x12a0
[  715.502837]  ? kasan_set_free_info+0x20/0x30
[  715.507110]  ? __kasan_slab_free+0x10b/0x140
[  715.511385]  ? slab_free_freelist_hook+0xc7/0x220
[  715.516092]  ? kfree+0xc1/0x520
[  715.519235]  ? ice_deinit_lag+0x16c/0x220 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.527359]  ? ice_remove+0x1cf/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.535133]  ? pci_device_remove+0xab/0x1d0
[  715.539318]  ? __device_release_driver+0x35b/0x690
[  715.544110]  ? driver_detach+0x214/0x2f0
[  715.548035]  ? bus_remove_driver+0x11d/0x2f0
[  715.552309]  ? pci_unregister_driver+0x26/0x250
[  715.556840]  ? ice_module_exit+0xc/0x2f [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.564799]  ? __do_sys_delete_module.constprop.0+0x2d8/0x4e0
[  715.570554]  ? do_syscall_64+0x3b/0x90
[  715.574303]  ? entry_SYSCALL_64_after_hwframe+0x44/0xae
[  715.579529]  ? start_flush_work+0x542/0x8f0
[  715.583719]  ? ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.591923]  ice_sq_send_cmd+0x78/0x14c0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.599960]  ? wait_for_completion_io+0x250/0x250
[  715.604662]  ? lock_acquire+0x196/0x200
[  715.608504]  ? do_raw_spin_trylock+0xa5/0x160
[  715.612864]  ice_sbq_rw_reg+0x1e6/0x2f0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.620813]  ? ice_reset+0x130/0x130 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.628497]  ? __debug_check_no_obj_freed+0x1e8/0x3c0
[  715.633550]  ? trace_hardirqs_on+0x1c/0x130
[  715.637748]  ice_write_phy_reg_e810+0x70/0xf0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.646220]  ? do_raw_spin_trylock+0xa5/0x160
[  715.650581]  ? ice_ptp_release+0x910/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.658797]  ? ice_ptp_release+0x255/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.667013]  ice_clear_phy_tstamp+0x2c/0x110 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.675403]  ice_ptp_release+0x408/0x910 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.683440]  ice_remove+0x560/0x6a0 [ice 9a7e1ec00971c89ecd3fe0d4dc7da2b3786a421d]
[  715.691037]  ? _raw_spin_unlock_irqrestore+0x46/0x73
[  715.696005]  pci_device_remove+0xab/0x1d0
[  715.700018]  __device_release_driver+0x35b/0x690
[  715.704637]  driver_detach+0x214/0x2f0
[  715.708389]  bus_remove_driver+0x11d/0x2f0
[  715.712489]  pci_unregister_driver+0x26/0x250
[  71
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47450" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix host stage-2 PGD refcount

The KVM page-table library refcounts the pages of concatenated stage-2
PGDs individually. However, when running KVM in protected mode, the
host's stage-2 PGD is currently managed by EL2 as a single high-order
compound page, which can cause the refcount of the tail pages to reach 0
when they shouldn't, hence corrupting the page-table.

Fix this by introducing a new hyp_split_page() helper in the EL2 page
allocator (matching the kernel's split_page() function), and make use of
it from host_s2_zalloc_pages_exact().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47451</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47451" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value

Currently, when the rule related to IDLETIMER is added, idletimer_tg timer
structure is initialized by kmalloc on executing idletimer_tg_create
function. However, in this process timer-&gt;timer_type is not defined to
a specific value. Thus, timer-&gt;timer_type has garbage value and it occurs
kernel panic. So, this commit fixes the panic by initializing
timer-&gt;timer_type using kzalloc instead of kmalloc.

Test commands:
    # iptables -A OUTPUT -j IDLETIMER --timeout 1 --label test
    $ cat /sys/class/xt_idletimer/timers/test
      Killed

Splat looks like:
    BUG: KASAN: user-memory-access in alarm_expires_remaining+0x49/0x70
    Read of size 8 at addr 0000002e8c7bc4c8 by task cat/917
    CPU: 12 PID: 917 Comm: cat Not tainted 5.14.0+ #3 79940a339f71eb14fc81aee1757a20d5bf13eb0e
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014
    Call Trace:
     dump_stack_lvl+0x6e/0x9c
     kasan_report.cold+0x112/0x117
     ? alarm_expires_remaining+0x49/0x70
     __asan_load8+0x86/0xb0
     alarm_expires_remaining+0x49/0x70
     idletimer_tg_show+0xe5/0x19b [xt_IDLETIMER 11219304af9316a21bee5ba9d58f76a6b9bccc6d]
     dev_attr_show+0x3c/0x60
     sysfs_kf_seq_show+0x11d/0x1f0
     ? device_remove_bin_file+0x20/0x20
     kernfs_seq_show+0xa4/0xb0
     seq_read_iter+0x29c/0x750
     kernfs_fop_read_iter+0x25a/0x2c0
     ? __fsnotify_parent+0x3d1/0x570
     ? iov_iter_init+0x70/0x90
     new_sync_read+0x2a7/0x3d0
     ? __x64_sys_llseek+0x230/0x230
     ? rw_verify_area+0x81/0x150
     vfs_read+0x17b/0x240
     ksys_read+0xd9/0x180
     ? vfs_write+0x460/0x460
     ? do_syscall_64+0x16/0xc0
     ? lockdep_hardirqs_on+0x79/0x120
     __x64_sys_read+0x43/0x50
     do_syscall_64+0x3b/0xc0
     entry_SYSCALL_64_after_hwframe+0x44/0xae
    RIP: 0033:0x7f0cdc819142
    Code: c0 e9 c2 fe ff ff 50 48 8d 3d 3a ca 0a 00 e8 f5 19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24
    RSP: 002b:00007fff28eee5b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
    RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f0cdc819142
    RDX: 0000000000020000 RSI: 00007f0cdc032000 RDI: 0000000000000003
    RBP: 00007f0cdc032000 R08: 00007f0cdc031010 R09: 0000000000000000
    R10: 0000000000000022 R11: 0000000000000246 R12: 00005607e9ee31f0
    R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47452" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: skip netdev events generated on netns removal

syzbot reported following (harmless) WARN:

 WARNING: CPU: 1 PID: 2648 at net/netfilter/core.c:468
  nft_netdev_unregister_hooks net/netfilter/nf_tables_api.c:230 [inline]
  nf_tables_unregister_hook include/net/netfilter/nf_tables.h:1090 [inline]
  __nft_release_basechain+0x138/0x640 net/netfilter/nf_tables_api.c:9524
  nft_netdev_event net/netfilter/nft_chain_filter.c:351 [inline]
  nf_tables_netdev_event+0x521/0x8a0 net/netfilter/nft_chain_filter.c:382

reproducer:
unshare -n bash -c 'ip link add br0 type bridge; nft add table netdev t ; \
 nft add chain netdev t ingress \{ type filter hook ingress device "br0" \
 priority 0\; policy drop\; \}'

Problem is that when netns device exit hooks create the UNREGISTER
event, the .pre_exit hook for nf_tables core has already removed the
base hook.  Notifier attempts to do this again.

The need to do base hook unregister unconditionally was needed in the past,
because notifier was last stage where reg-&gt;dev dereference was safe.

Now that nf_tables does the hook removal in .pre_exit, this isn't
needed anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47453" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Avoid crash from unnecessary IDA free

In the remove path, there is an attempt to free the aux_idx IDA whether
it was allocated or not.  This can potentially cause a crash when
unloading the driver on systems that do not initialize support for RDMA.
But, this free cannot be gated by the status bit for RDMA, since it is
allocated if the driver detects support for RDMA at probe time, but the
driver can enter into a state where RDMA is not supported after the IDA
has been allocated at probe time and this would lead to a memory leak.

Initialize aux_idx to an invalid value and check for a valid value when
unloading to determine if an IDA free is necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47454" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/smp: do not decrement idle task preempt count in CPU offline

With PREEMPT_COUNT=y, when a CPU is offlined and then onlined again, we
get:

BUG: scheduling while atomic: swapper/1/0/0x00000000
no locks held by swapper/1/0.
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.15.0-rc2+ #100
Call Trace:
 dump_stack_lvl+0xac/0x108
 __schedule_bug+0xac/0xe0
 __schedule+0xcf8/0x10d0
 schedule_idle+0x3c/0x70
 do_idle+0x2d8/0x4a0
 cpu_startup_entry+0x38/0x40
 start_secondary+0x2ec/0x3a0
 start_secondary_prolog+0x10/0x14

This is because powerpc's arch_cpu_idle_dead() decrements the idle task's
preempt count, for reasons explained in commit a7c2bb8279d2 ("powerpc:
Re-enable preemption before cpu_die()"), specifically "start_secondary()
expects a preempt_count() of 0."

However, since commit 2c669ef6979c ("powerpc/preempt: Don't touch the idle
task's preempt_count during hotplug") and commit f1a0a376ca0c ("sched/core:
Initialize the idle task with preemption disabled"), that justification no
longer holds.

The idle task isn't supposed to re-enable preemption, so remove the
vestigial preempt_enable() from the CPU offline path.

Tested with pseries and powernv in qemu, and pseries on PowerVM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: Fix possible memory leak in ptp_clock_register()

I got memory leak as follows when doing fault injection test:

unreferenced object 0xffff88800906c618 (size 8):
  comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s)
  hex dump (first 8 bytes):
    70 74 70 30 00 00 00 00                          ptp0....
  backtrace:
    [&lt;00000000312ed458&gt;] __kmalloc_track_caller+0x19f/0x3a0
    [&lt;0000000079f6e2ff&gt;] kvasprintf+0xb5/0x150
    [&lt;0000000026aae54f&gt;] kvasprintf_const+0x60/0x190
    [&lt;00000000f323a5f7&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;000000004e35abdd&gt;] dev_set_name+0xc0/0x100
    [&lt;00000000f20cfe25&gt;] ptp_clock_register+0x9f4/0xd30 [ptp]
    [&lt;000000008bb9f0de&gt;] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]

When posix_clock_register() returns an error, the name allocated
in dev_set_name() will be leaked, the put_device() should be used
to give up the device reference, then the name will be freed in
kobject_cleanup() and other memory will be freed in ptp_clock_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47456" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: peak_pci: peak_pci_remove(): fix UAF

When remove the module peek_pci, referencing 'chan' again after
releasing 'dev' will cause UAF.

Fix this by releasing 'dev' later.

The following log reveals it:

[   35.961814 ] BUG: KASAN: use-after-free in peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.963414 ] Read of size 8 at addr ffff888136998ee8 by task modprobe/5537
[   35.965513 ] Call Trace:
[   35.965718 ]  dump_stack_lvl+0xa8/0xd1
[   35.966028 ]  print_address_description+0x87/0x3b0
[   35.966420 ]  kasan_report+0x172/0x1c0
[   35.966725 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.967137 ]  ? trace_irq_enable_rcuidle+0x10/0x170
[   35.967529 ]  ? peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.967945 ]  __asan_report_load8_noabort+0x14/0x20
[   35.968346 ]  peak_pci_remove+0x16f/0x270 [peak_pci]
[   35.968752 ]  pci_device_remove+0xa9/0x250
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47457" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()

Using wait_event_interruptible() to wait for complete transmission,
but do not check the result of wait_event_interruptible() which can be
interrupted. It will result in TX buffer has multiple accessors and
the later process interferes with the previous process.

Following is one of the problems reported by syzbot.

=============================================================
WARNING: CPU: 0 PID: 0 at net/can/isotp.c:840 isotp_tx_timer_handler+0x2e0/0x4c0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.13.0-rc7+ #68
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1 04/01/2014
RIP: 0010:isotp_tx_timer_handler+0x2e0/0x4c0
Call Trace:
 &lt;IRQ&gt;
 ? isotp_setsockopt+0x390/0x390
 __hrtimer_run_queues+0xb8/0x610
 hrtimer_run_softirq+0x91/0xd0
 ? rcu_read_lock_sched_held+0x4d/0x80
 __do_softirq+0xe8/0x553
 irq_exit_rcu+0xf8/0x100
 sysvec_apic_timer_interrupt+0x9e/0xc0
 &lt;/IRQ&gt;
 asm_sysvec_apic_timer_interrupt+0x12/0x20

Add result check for wait_event_interruptible() in isotp_sendmsg()
to avoid multiple accessers for tx buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47458" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: mount fails with buffer overflow in strlen

Starting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an
ocfs2 filesystem with either o2cb or pcmk cluster stack fails with the
trace below.  Problem seems to be that strings for cluster stack and
cluster name are not guaranteed to be null terminated in the disk
representation, while strlcpy assumes that the source string is always
null terminated.  This causes a read outside of the source string
triggering the buffer overflow detection.

  detected buffer overflow in strlen
  ------------[ cut here ]------------
  kernel BUG at lib/string.c:1149!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1
    Debian 5.14.6-2
  RIP: 0010:fortify_panic+0xf/0x11
  ...
  Call Trace:
   ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]
   ocfs2_fill_super+0x359/0x19b0 [ocfs2]
   mount_bdev+0x185/0x1b0
   legacy_get_tree+0x27/0x40
   vfs_get_tree+0x25/0xb0
   path_mount+0x454/0xa20
   __x64_sys_mount+0x103/0x140
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47459" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv

It will trigger UAF for rx_kref of j1939_priv as following.

        cpu0                                    cpu1
j1939_sk_bind(socket0, ndev0, ...)
j1939_netdev_start
                                        j1939_sk_bind(socket1, ndev0, ...)
                                        j1939_netdev_start
j1939_priv_set
                                        j1939_priv_get_by_ndev_locked
j1939_jsk_add
.....
j1939_netdev_stop
kref_put_lock(&amp;priv-&gt;rx_kref, ...)
                                        kref_get(&amp;priv-&gt;rx_kref, ...)
                                        REFCOUNT_WARN("addition on 0;...")

====================================================
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0
RIP: 0010:refcount_warn_saturate+0x169/0x1e0
Call Trace:
 j1939_netdev_start+0x68b/0x920
 j1939_sk_bind+0x426/0xeb0
 ? security_socket_bind+0x83/0xb0

The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to
protect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47460" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix data corruption after conversion from inline format

Commit 6dbf7bb55598 ("fs: Don't invalidate page buffers in
block_write_full_page()") uncovered a latent bug in ocfs2 conversion
from inline inode format to a normal inode format.

The code in ocfs2_convert_inline_data_to_extents() attempts to zero out
the whole cluster allocated for file data by grabbing, zeroing, and
dirtying all pages covering this cluster.  However these pages are
beyond i_size, thus writeback code generally ignores these dirty pages
and no blocks were ever actually zeroed on the disk.

This oversight was fixed by commit 693c241a5f6a ("ocfs2: No need to zero
pages past i_size.") for standard ocfs2 write path, inline conversion
path was apparently forgotten; the commit log also has a reasoning why
the zeroing actually is not needed.

After commit 6dbf7bb55598, things became worse as writeback code stopped
invalidating buffers on pages beyond i_size and thus these pages end up
with clean PageDirty bit but with buffers attached to these pages being
still dirty.  So when a file is converted from inline format, then
writeback triggers, and then the file is grown so that these pages
become valid, the invalid dirtiness state is preserved,
mark_buffer_dirty() does nothing on these pages (buffers are already
dirty) but page is never written back because it is clean.  So data
written to these pages is lost once pages are reclaimed.

Simple reproducer for the problem is:

  xfs_io -f -c "pwrite 0 2000" -c "pwrite 2000 2000" -c "fsync" \
    -c "pwrite 4000 2000" ocfs2_file

After unmounting and mounting the fs again, you can observe that end of
'ocfs2_file' has lost its contents.

Fix the problem by not doing the pointless zeroing during conversion
from inline format similarly as in the standard write path.

[akpm@linux-foundation.org: fix whitespace, per Joseph]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47461" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix a race between writeprotect and exit_mmap()

A race is possible when a process exits, its VMAs are removed by
exit_mmap() and at the same time userfaultfd_writeprotect() is called.

The race was detected by KASAN on a development kernel, but it appears
to be possible on vanilla kernels as well.

Use mmget_not_zero() to prevent the race as done in other userfaultfd
operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47462" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()

syzbot reported access to unitialized memory in mbind() [1]

Issue came with commit bda420b98505 ("numa balancing: migrate on fault
among multiple bound nodes")

This commit added a new bit in MPOL_MODE_FLAGS, but only checked valid
combination (MPOL_F_NUMA_BALANCING can only be used with MPOL_BIND) in
do_set_mempolicy()

This patch moves the check in sanitize_mpol_flags() so that it is also
used by mbind()

  [1]
  BUG: KMSAN: uninit-value in __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   mpol_equal include/linux/mempolicy.h:105 [inline]
   vma_merge+0x4a1/0x1e60 mm/mmap.c:1190
   mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811
   do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  Uninit was created at:
   slab_alloc_node mm/slub.c:3221 [inline]
   slab_alloc mm/slub.c:3230 [inline]
   kmem_cache_alloc+0x751/0xff0 mm/slub.c:3235
   mpol_new mm/mempolicy.c:293 [inline]
   do_mbind+0x912/0x15f0 mm/mempolicy.c:1289
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  =====================================================
  Kernel panic - not syncing: panic_on_kmsan set ...
  CPU: 0 PID: 15049 Comm: syz-executor.0 Tainted: G    B             5.15.0-rc2-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x1ff/0x28e lib/dump_stack.c:106
   dump_stack+0x25/0x28 lib/dump_stack.c:113
   panic+0x44f/0xdeb kernel/panic.c:232
   kmsan_report+0x2ee/0x300 mm/kmsan/report.c:186
   __msan_warning+0xd7/0x150 mm/kmsan/instrumentation.c:208
   __mpol_equal+0x567/0x590 mm/mempolicy.c:2260
   mpol_equal include/linux/mempolicy.h:105 [inline]
   vma_merge+0x4a1/0x1e60 mm/mmap.c:1190
   mbind_range+0xcc8/0x1e80 mm/mempolicy.c:811
   do_mbind+0xf42/0x15f0 mm/mempolicy.c:1333
   kernel_mbind mm/mempolicy.c:1483 [inline]
   __do_sys_mbind mm/mempolicy.c:1490 [inline]
   __se_sys_mbind+0x437/0xb80 mm/mempolicy.c:1486
   __x64_sys_mbind+0x19d/0x200 mm/mempolicy.c:1486
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47463" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix NULL page-&gt;mapping dereference in page_is_secretmem()

Check for a NULL page-&gt;mapping before dereferencing the mapping in
page_is_secretmem(), as the page's mapping can be nullified while gup()
is running, e.g.  by reclaim or truncation.

  BUG: kernel NULL pointer dereference, address: 0000000000000068
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G        W
  RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0
  Code: &lt;48&gt; 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be
  RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046
  RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900
  ...
  CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0
  Call Trace:
   get_user_pages_fast_only+0x13/0x20
   hva_to_pfn+0xa9/0x3e0
   try_async_pf+0xa1/0x270
   direct_page_fault+0x113/0xad0
   kvm_mmu_page_fault+0x69/0x680
   vmx_handle_exit+0xe1/0x5d0
   kvm_arch_vcpu_ioctl_run+0xd81/0x1c70
   kvm_vcpu_ioctl+0x267/0x670
   __x64_sys_ioctl+0x83/0xa0
   do_syscall_64+0x56/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47464" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: fix possible null-pointer dereference in audit_filter_rules

Fix  possible null-pointer dereference in audit_filter_rules.

audit_filter_rules() error: we previously assumed 'ctx' could be null
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47465" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()

In commit 10d91611f426 ("powerpc/64s: Reimplement book3s idle code in
C") kvm_start_guest() became idle_kvm_start_guest(). The old code
allocated a stack frame on the emergency stack, but didn't use the
frame to store anything, and also didn't store anything in its caller's
frame.

idle_kvm_start_guest() on the other hand is written more like a normal C
function, it creates a frame on entry, and also stores CR/LR into its
callers frame (per the ABI). The problem is that there is no caller
frame on the emergency stack.

The emergency stack for a given CPU is allocated with:

  paca_ptrs[i]-&gt;emergency_sp = alloc_stack(limit, i) + THREAD_SIZE;

So emergency_sp actually points to the first address above the emergency
stack allocation for a given CPU, we must not store above it without
first decrementing it to create a frame. This is different to the
regular kernel stack, paca-&gt;kstack, which is initialised to point at an
initial frame that is ready to use.

idle_kvm_start_guest() stores the backchain, CR and LR all of which
write outside the allocation for the emergency stack. It then creates a
stack frame and saves the non-volatile registers. Unfortunately the
frame it creates is not large enough to fit the non-volatiles, and so
the saving of the non-volatile registers also writes outside the
emergency stack allocation.

The end result is that we corrupt whatever is at 0-24 bytes, and 112-248
bytes above the emergency stack allocation.

In practice this has gone unnoticed because the memory immediately above
the emergency stack happens to be used for other stack allocations,
either another CPUs mc_emergency_sp or an IRQ stack. See the order of
calls to irqstack_early_init() and emergency_stack_init().

The low addresses of another stack are the top of that stack, and so are
only used if that stack is under extreme pressue, which essentially
never happens in practice - and if it did there's a high likelyhood we'd
crash due to that stack overflowing.

Still, we shouldn't be corrupting someone else's stack, and it is purely
luck that we aren't corrupting something else.

To fix it we save CR/LR into the caller's frame using the existing r1 on
entry, we then create a SWITCH_FRAME_SIZE frame (which has space for
pt_regs) on the emergency stack with the backchain pointing to the
existing stack, and then finally we switch to the new frame on the
emergency stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227904">SUSE bug 1227904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47467" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit: fix reference count leak in kfree_at_end

The reference counting issue happens in the normal path of
kfree_at_end(). When kunit_alloc_and_get_resource() is invoked, the
function forgets to handle the returned resource object, whose refcount
increased inside, causing a refcount leak.

Fix this issue by calling kunit_alloc_resource() instead of
kunit_alloc_and_get_resource().

Fixed the following when applying:
Shuah Khan &lt;skhan@linuxfoundation.org&gt;

CHECK: Alignment should match open parenthesis
+	kunit_alloc_resource(test, NULL, kfree_res_free, GFP_KERNEL,
 				     (void *)to_free);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47468" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isdn: mISDN: Fix sleeping function called from invalid context

The driver can call card-&gt;isac.release() function from an atomic
context.

Fix this by calling this function after releasing the lock.

The following log reveals it:

[   44.168226 ] BUG: sleeping function called from invalid context at kernel/workqueue.c:3018
[   44.168941 ] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 5475, name: modprobe
[   44.169574 ] INFO: lockdep is turned off.
[   44.169899 ] irq event stamp: 0
[   44.170160 ] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.170627 ] hardirqs last disabled at (0): [&lt;ffffffff814209ed&gt;] copy_process+0x132d/0x3e00
[   44.171240 ] softirqs last  enabled at (0): [&lt;ffffffff81420a1a&gt;] copy_process+0x135a/0x3e00
[   44.171852 ] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[   44.172318 ] Preemption disabled at:
[   44.172320 ] [&lt;ffffffffa009b0a9&gt;] nj_release+0x69/0x500 [netjet]
[   44.174441 ] Call Trace:
[   44.174630 ]  dump_stack_lvl+0xa8/0xd1
[   44.174912 ]  dump_stack+0x15/0x17
[   44.175166 ]  ___might_sleep+0x3a2/0x510
[   44.175459 ]  ? nj_release+0x69/0x500 [netjet]
[   44.175791 ]  __might_sleep+0x82/0xe0
[   44.176063 ]  ? start_flush_work+0x20/0x7b0
[   44.176375 ]  start_flush_work+0x33/0x7b0
[   44.176672 ]  ? trace_irq_enable_rcuidle+0x85/0x170
[   44.177034 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177372 ]  ? kasan_quarantine_put+0xaa/0x1f0
[   44.177711 ]  __flush_work+0x11a/0x1a0
[   44.177991 ]  ? flush_work+0x20/0x20
[   44.178257 ]  ? lock_release+0x13c/0x8f0
[   44.178550 ]  ? __kasan_check_write+0x14/0x20
[   44.178872 ]  ? do_raw_spin_lock+0x148/0x360
[   44.179187 ]  ? read_lock_is_recursive+0x20/0x20
[   44.179530 ]  ? __kasan_check_read+0x11/0x20
[   44.179846 ]  ? do_raw_spin_unlock+0x55/0x900
[   44.180168 ]  ? ____kasan_slab_free+0x116/0x140
[   44.180505 ]  ? _raw_spin_unlock_irqrestore+0x41/0x60
[   44.180878 ]  ? skb_queue_purge+0x1a3/0x1c0
[   44.181189 ]  ? kfree+0x13e/0x290
[   44.181438 ]  flush_work+0x17/0x20
[   44.181695 ]  mISDN_freedchannel+0xe8/0x100
[   44.182006 ]  isac_release+0x210/0x260 [mISDNipac]
[   44.182366 ]  nj_release+0xf6/0x500 [netjet]
[   44.182685 ]  nj_remove+0x48/0x70 [netjet]
[   44.182989 ]  pci_device_remove+0xa9/0x250
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47470" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: fix potential use-after-free in slab_debugfs_fops

When sysfs_slab_add failed, we shouldn't call debugfs_slab_add() for s
because s will be freed soon.  And slab_debugfs_fops will use s later
leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47471" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: mxsfb: Fix NULL pointer dereference crash on unload

The mxsfb-&gt;crtc.funcs may already be NULL when unloading the driver,
in which case calling mxsfb_irq_disable() via drm_irq_uninstall() from
mxsfb_unload() leads to NULL pointer dereference.

Since all we care about is masking the IRQ and mxsfb-&gt;base is still
valid, just use that to clear and mask the IRQ.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47473" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()

Commit 8c0eb596baa5 ("[SCSI] qla2xxx: Fix a memory leak in an error path of
qla2x00_process_els()"), intended to change:

        bsg_job-&gt;request-&gt;msgcode == FC_BSG_HST_ELS_NOLOGIN


        bsg_job-&gt;request-&gt;msgcode != FC_BSG_RPT_ELS

but changed it to:

        bsg_job-&gt;request-&gt;msgcode == FC_BSG_RPT_ELS

instead.

Change the == to a != to avoid leaking the fcport structure or freeing
unallocated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47474" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix bulk-buffer overflow

The driver is using endpoint-sized buffers but must not assume that the
tx and rx buffers are of equal size or a malicious device could overflow
the slab-allocated receive buffer when doing bulk transfers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47475" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: vmk80xx: fix transfer-buffer overflows

The driver uses endpoint-sized USB transfer buffers but up until
recently had no sanity checks on the sizes.

Commit e1f13c879a7c ("staging: comedi: check validity of wMaxPacketSize
of usb endpoints found") inadvertently fixed NULL-pointer dereferences
when accessing the transfer buffers in case a malicious device has a
zero wMaxPacketSize.

Make sure to allocate buffers large enough to handle also the other
accesses that are done without a size check (e.g. byte 18 in
vmk80xx_cnt_insn_read() for the VMK8061_MODEL) to avoid writing beyond
the buffers, for example, when doing descriptor fuzzing.

The original driver was for a low-speed device with 8-byte buffers.
Support was later added for a device that uses bulk transfers and is
presumably a full-speed device with a maximum 64-byte wMaxPacketSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47476" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: ni_usb6501: fix NULL-deref in command paths

The driver uses endpoint-sized USB transfer buffers but had no sanity
checks on the sizes. This can lead to zero-size-pointer dereferences or
overflowed transfer buffers in ni6501_port_command() and
ni6501_counter_command() if a (malicious) device has smaller max-packet
sizes than expected (or when doing descriptor fuzz testing).

Add the missing sanity checks to probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47477" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: dt9812: fix DMA buffers on stack

USB transfer buffers are typically mapped for DMA and must not be
allocated on the stack or transfers will fail.

Allocate proper transfer buffers in the various command helpers and
return an error on short transfers instead of acting on random stack
data.

Note that this also fixes a stack info leak on systems where DMA is not
used as 32 bytes are always sent to the device regardless of how short
the command is.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47478" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

isofs: Fix out of bound access for corrupted isofs image

When isofs image is suitably corrupted isofs_read_inode() can read data
beyond the end of buffer. Sanity-check the directory entry length before
using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47479" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8712: fix use-after-free in rtl8712_dl_fw

Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in
race condition between r871xu_dev_remove() -&gt;ndo_open() callback.

It's easy to see from crash log, that driver accesses released firmware
in -&gt;ndo_open() callback. It may happen, since driver was releasing
firmware _before_ unregistering netdev. Fix it by moving
unregister_netdev() before cleaning up resources.

Call Trace:
...
 rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline]
 rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170
 rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline]
 rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394
 netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380
 __dev_open+0x2bc/0x4d0 net/core/dev.c:1484

Freed by task 1306:
...
 release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053
 r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599
 usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47480" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Put LLD module refcnt after SCSI device is released

SCSI host release is triggered when SCSI device is freed. We have to make
sure that the low-level device driver module won't be unloaded before SCSI
host instance is released because shost-&gt;hostt is required in the release
handler.

Make sure to put LLD module refcnt after SCSI device is released.

Fixes a kernel panic of 'BUG: unable to handle page fault for address'
reported by Changhui and Yi.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47481" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR

Normally the zero fill would hide the missing initialization, but an
errant set to desc_size in reg_create() causes a crash:

  BUG: unable to handle page fault for address: 0000000800000000
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 5 PID: 890 Comm: ib_write_bw Not tainted 5.15.0-rc4+ #47
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:mlx5_ib_dereg_mr+0x14/0x3b0 [mlx5_ib]
  Code: 48 63 cd 4c 89 f7 48 89 0c 24 e8 37 30 03 e1 48 8b 0c 24 eb a0 90 0f 1f 44 00 00 41 56 41 55 41 54 55 53 48 89 fb 48 83 ec 30 &lt;48&gt; 8b 2f 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 8b 87 c8
  RSP: 0018:ffff88811afa3a60 EFLAGS: 00010286
  RAX: 000000000000001c RBX: 0000000800000000 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000800000000
  RBP: 0000000800000000 R08: 0000000000000000 R09: c0000000fffff7ff
  R10: ffff88811afa38f8 R11: ffff88811afa38f0 R12: ffffffffa02c7ac0
  R13: 0000000000000000 R14: ffff88811afa3cd8 R15: ffff88810772fa00
  FS:  00007f47b9080740(0000) GS:ffff88852cd40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000800000000 CR3: 000000010761e003 CR4: 0000000000370ea0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   mlx5_ib_free_odp_mr+0x95/0xc0 [mlx5_ib]
   mlx5_ib_dereg_mr+0x128/0x3b0 [mlx5_ib]
   ib_dereg_mr_user+0x45/0xb0 [ib_core]
   ? xas_load+0x8/0x80
   destroy_hw_idr_uobject+0x1a/0x50 [ib_uverbs]
   uverbs_destroy_uobject+0x2f/0x150 [ib_uverbs]
   uobj_destroy+0x3c/0x70 [ib_uverbs]
   ib_uverbs_cmd_verbs+0x467/0xb00 [ib_uverbs]
   ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]
   ? ttwu_queue_wakelist+0xa9/0xe0
   ? pty_write+0x85/0x90
   ? file_tty_write.isra.33+0x214/0x330
   ? process_echoes+0x60/0x60
   ib_uverbs_ioctl+0xa7/0x110 [ib_uverbs]
   __x64_sys_ioctl+0x10d/0x8e0
   ? vfs_write+0x17f/0x260
   do_syscall_64+0x3c/0x80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Add the missing xarray initialization and remove the desc_size set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47482" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: batman-adv: fix error handling

Syzbot reported ODEBUG warning in batadv_nc_mesh_free(). The problem was
in wrong error handling in batadv_mesh_init().

Before this patch batadv_mesh_init() was calling batadv_mesh_free() in case
of any batadv_*_init() calls failure. This approach may work well, when
there is some kind of indicator, which can tell which parts of batadv are
initialized; but there isn't any.

All written above lead to cleaning up uninitialized fields. Even if we hide
ODEBUG warning by initializing bat_priv-&gt;nc.work, syzbot was able to hit
GPF in batadv_nc_purge_paths(), because hash pointer in still NULL. [1]

To fix these bugs we can unwind batadv_*_init() calls one by one.
It is good approach for 2 reasons: 1) It fixes bugs on error handling
path 2) It improves the performance, since we won't call unneeded
batadv_*_free() functions.

So, this patch makes all batadv_*_init() clean up all allocated memory
before returning with an error to no call correspoing batadv_*_free()
and open-codes batadv_mesh_free() with proper order to avoid touching
uninitialized fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47484" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Fix possible null pointer dereference.

This patch fixes possible null pointer dereference in files
"rvu_debugfs.c" and "rvu_nix.c"
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47485" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields

Overflowing either addrlimit or bytes_togo can allow userspace to trigger
a buffer overflow of kernel memory. Check for overflows in all the places
doing math on user controlled buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47486" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv, bpf: Fix potential NULL dereference

The bpf_jit_binary_free() function requires a non-NULL argument. When
the RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,
jit_data-&gt;header will be NULL, which triggers a NULL
dereference. Avoid this by checking the argument, prior calling the
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47488" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47489" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix even more out of bound writes from debugfs

CVE-2021-42327 was fixed by:

commit f23750b5b3d98653b31d4469592935ef6364ad67
Author: Thelford Williams &lt;tdwilliamsiv@gmail.com&gt;
Date:   Wed Oct 13 16:04:13 2021 -0400

    drm/amdgpu: fix out of bounds write

but amdgpu_dm_debugfs.c contains more of the same issue so fix the
remaining ones.

v2:
	* Add missing fix in dp_max_bpc_write (Harry Wentland)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47490" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: fix memleak in ttm_transfered_destroy

We need to cleanup the fences for ghost objects as well.

Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214029
Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214447
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47491" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: khugepaged: skip huge page collapse for special files

The read-only THP for filesystems will collapse THP for files opened
readonly and mapped with VM_EXEC.  The intended usecase is to avoid TLB
misses for large text segments.  But it doesn't restrict the file types
so a THP could be collapsed for a non-regular file, for example, block
device, if it is opened readonly and mapped with EXEC permission.  This
may cause bugs, like [1] and [2].

This is definitely not the intended usecase, so just collapse THP for
regular files in order to close the attack surface.

[shy828301@gmail.com: fix vm_file check [3]]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47492" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, thp: bail out early in collapse_file for writeback page

Currently collapse_file does not explicitly check PG_writeback, instead,
page_has_private and try_to_release_page are used to filter writeback
pages.  This does not work for xfs with blocksize equal to or larger
than pagesize, because in such case xfs has no page-&gt;private.

This makes collapse_file bail out early for writeback page.  Otherwise,
xfs end_page_writeback will panic as follows.

  page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32
  aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:"libtest.so"
  flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)
  raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8
  raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000
  page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u &lt;= 127u))
  page-&gt;mem_cgroup:ffff0000c3e9a000
  ------------[ cut here ]------------
  kernel BUG at include/linux/mm.h:1212!
  Internal error: Oops - BUG: 0 [#1] SMP
  Modules linked in:
  BUG: Bad page state in process khugepaged  pfn:84ef32
   xfs(E)
  page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32
   libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...
  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)
  Call trace:
    end_page_writeback+0x1c0/0x214
    iomap_finish_page_writeback+0x13c/0x204
    iomap_finish_ioend+0xe8/0x19c
    iomap_writepage_end_bio+0x38/0x50
    bio_endio+0x168/0x1ec
    blk_update_request+0x278/0x3f0
    blk_mq_end_request+0x34/0x15c
    virtblk_request_done+0x38/0x74 [virtio_blk]
    blk_done_softirq+0xc4/0x110
    __do_softirq+0x128/0x38c
    __irq_exit_rcu+0x118/0x150
    irq_exit+0x1c/0x30
    __handle_domain_irq+0x8c/0xf0
    gic_handle_irq+0x84/0x108
    el1_irq+0xcc/0x180
    arch_cpu_idle+0x18/0x40
    default_idle_call+0x4c/0x1a0
    cpuidle_idle_call+0x168/0x1e0
    do_idle+0xb4/0x104
    cpu_startup_entry+0x30/0x9c
    secondary_start_kernel+0x104/0x180
  Code: d4210000 b0006161 910c8021 94013f4d (d4210000)
  ---[ end trace 4a88c6a074082f8c ]---
  Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47493" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix race between searching chunks and release journal_head from buffer_head

Encountered a race between ocfs2_test_bg_bit_allocatable() and
jbd2_journal_put_journal_head() resulting in the below vmcore.

  PID: 106879  TASK: ffff880244ba9c00  CPU: 2   COMMAND: "loop3"
  Call trace:
    panic
    oops_end
    no_context
    __bad_area_nosemaphore
    bad_area_nosemaphore
    __do_page_fault
    do_page_fault
    page_fault
      [exception RIP: ocfs2_block_group_find_clear_bits+316]
    ocfs2_block_group_find_clear_bits [ocfs2]
    ocfs2_cluster_group_search [ocfs2]
    ocfs2_search_chain [ocfs2]
    ocfs2_claim_suballoc_bits [ocfs2]
    __ocfs2_claim_clusters [ocfs2]
    ocfs2_claim_clusters [ocfs2]
    ocfs2_local_alloc_slide_window [ocfs2]
    ocfs2_reserve_local_alloc_bits [ocfs2]
    ocfs2_reserve_clusters_with_limit [ocfs2]
    ocfs2_reserve_clusters [ocfs2]
    ocfs2_lock_refcount_allocators [ocfs2]
    ocfs2_make_clusters_writable [ocfs2]
    ocfs2_replace_cow [ocfs2]
    ocfs2_refcount_cow [ocfs2]
    ocfs2_file_write_iter [ocfs2]
    lo_rw_aio
    loop_queue_work
    kthread_worker_fn
    kthread
    ret_from_fork

When ocfs2_test_bg_bit_allocatable() called bh2jh(bg_bh), the
bg_bh-&gt;b_private NULL as jbd2_journal_put_journal_head() raced and
released the jounal head from the buffer head.  Needed to take bit lock
for the bit 'BH_JournalHead' to fix this race.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47494" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: fix management registrations locking

The management registrations locking was broken, the list was
locked for each wdev, but cfg80211_mgmt_registrations_update()
iterated it without holding all the correct spinlocks, causing
list corruption.

Rather than trying to fix it with fine-grained locking, just
move the lock to the wiphy/rdev (still need the list on each
wdev), we already need to hold the wdev lock to change it, so
there's no contention on the lock in any case. This trivially
fixes the bug since we hold one wdev's lock already, and now
will hold the lock that protects all lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47495" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: sanity check for maxpacket

maxpacket of 0 makes no sense and oopses as we need to divide
by it. Give up.

V2: fixed typo in log and stylistic issues
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47496" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tls: Fix flipped sign in tls_err_abort() calls

sk-&gt;sk_err appears to expect a positive value, a convention that ktls
doesn't always follow and that leads to memory corruption in other code.
For instance,

    [kworker]
    tls_encrypt_done(..., err=&lt;negative error from crypto request&gt;)
      tls_err_abort(.., err)
        sk-&gt;sk_err = err;

    [task]
    splice_from_pipe_feed
      ...
        tls_sw_do_sendpage
          if (sk-&gt;sk_err) {
            ret = -sk-&gt;sk_err;  // ret is positive

    splice_from_pipe_feed (continued)
      ret = actor(...)  // ret is still positive and interpreted as bytes
                        // written, resulting in underflow of buf-&gt;len and
                        // sd-&gt;len, leading to huge buf-&gt;offset and bogus
                        // addresses computed in later calls to actor()

Fix all tls_err_abort() callers to pass a negative error code
consistently and centralize the error-prone sign flip there, throwing in
a warning to catch future misuse and uninlining the function so it
really does only warn once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227656">SUSE bug 1227656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47497" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells

If a cell has 'nbits' equal to a multiple of BITS_PER_BYTE the logic

 *p &amp;= GENMASK((cell-&gt;nbits%BITS_PER_BYTE) - 1, 0);

will become undefined behavior because nbits modulo BITS_PER_BYTE is 0, and we
subtract one from that making a large number that is then shifted more than the
number of bits that fit into an unsigned long.

UBSAN reports this problem:

 UBSAN: shift-out-of-bounds in drivers/nvmem/core.c:1386:8
 shift exponent 64 is too large for 64-bit type 'unsigned long'
 CPU: 6 PID: 7 Comm: kworker/u16:0 Not tainted 5.15.0-rc3+ #9
 Hardware name: Google Lazor (rev3+) with KB Backlight (DT)
 Workqueue: events_unbound deferred_probe_work_func
 Call trace:
  dump_backtrace+0x0/0x170
  show_stack+0x24/0x30
  dump_stack_lvl+0x64/0x7c
  dump_stack+0x18/0x38
  ubsan_epilogue+0x10/0x54
  __ubsan_handle_shift_out_of_bounds+0x180/0x194
  __nvmem_cell_read+0x1ec/0x21c
  nvmem_cell_read+0x58/0x94
  nvmem_cell_read_variable_common+0x4c/0xb0
  nvmem_cell_read_variable_le_u32+0x40/0x100
  a6xx_gpu_init+0x170/0x2f4
  adreno_bind+0x174/0x284
  component_bind_all+0xf0/0x264
  msm_drm_bind+0x1d8/0x7a0
  try_to_bring_up_master+0x164/0x1ac
  __component_add+0xbc/0x13c
  component_add+0x20/0x2c
  dp_display_probe+0x340/0x384
  platform_probe+0xc0/0x100
  really_probe+0x110/0x304
  __driver_probe_device+0xb8/0x120
  driver_probe_device+0x4c/0xfc
  __device_attach_driver+0xb0/0x128
  bus_for_each_drv+0x90/0xdc
  __device_attach+0xc8/0x174
  device_initial_probe+0x20/0x2c
  bus_probe_device+0x40/0xa4
  deferred_probe_work_func+0x7c/0xb8
  process_one_work+0x128/0x21c
  process_scheduled_works+0x40/0x54
  worker_thread+0x1ec/0x2a8
  kthread+0x138/0x158
  ret_from_fork+0x10/0x20

Fix it by making sure there are any bits to mask out.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227655">SUSE bug 1227655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47498" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm rq: don't queue request to blk-mq during DM suspend

DM uses blk-mq's quiesce/unquiesce to stop/start device mapper queue.

But blk-mq's unquiesce may come from outside events, such as elevator
switch, updating nr_requests or others, and request may come during
suspend, so simply ask for blk-mq to requeue it.

Fixes one kernel panic issue when running updating nr_requests and
dm-mpath suspend/resume stress test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47499" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove

When ACPI type is ACPI_SMO8500, the data-&gt;dready_trig will not be set, the
memory allocated by iio_triggered_buffer_setup() will not be freed, and cause
memory leak as follows:

unreferenced object 0xffff888009551400 (size 512):
  comm "i2c-SMO8500-125", pid 911, jiffies 4294911787 (age 83.852s)
  hex dump (first 32 bytes):
    02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 20 e2 e5 c0 ff ff ff ff  ........ .......
  backtrace:
    [&lt;0000000041ce75ee&gt;] kmem_cache_alloc_trace+0x16d/0x360
    [&lt;000000000aeb17b0&gt;] iio_kfifo_allocate+0x41/0x130 [kfifo_buf]
    [&lt;000000004b40c1f5&gt;] iio_triggered_buffer_setup_ext+0x2c/0x210 [industrialio_triggered_buffer]
    [&lt;000000004375b15f&gt;] kxcjk1013_probe+0x10c3/0x1d81 [kxcjk_1013]

Fix it by remove data-&gt;dready_trig condition in probe and remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47500" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: mma8452: Fix trigger reference couting

The mma8452 driver directly assigns a trigger to the struct iio_dev. The
IIO core when done using this trigger will call `iio_trigger_put()` to drop
the reference count by 1.

Without the matching `iio_trigger_get()` in the driver the reference count
can reach 0 too early, the trigger gets freed while still in use and a
use-after-free occurs.

Fix this by getting a reference to the trigger before assigning it to the
IIO device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227698">SUSE bug 1227698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47501" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc

When trying to dump VFs VSI RX/TX descriptors
using debugfs there was a crash
due to NULL pointer dereference in i40e_dbg_dump_desc.
Added a check to i40e_dbg_dump_desc that checks if
VSI type is correct for dumping RX/TX descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd934x: handle channel mappping list correctly

Currently each channel is added as list to dai channel list, however
there is danger of adding same channel to multiple dai channel list
which endups corrupting the other list where its already added.

This patch ensures that the channel is actually free before adding to
the dai channel list and also ensures that the channel is on the list
before deleting it.

This check was missing previously, and we did not hit this issue as
we were testing very simple usecases with sequence of amixer commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227699">SUSE bug 1227699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47503" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Do not call scsi_remove_host() in pm8001_alloc()

Calling scsi_remove_host() before scsi_add_host() results in a crash:

 BUG: kernel NULL pointer dereference, address: 0000000000000108
 RIP: 0010:device_del+0x63/0x440
 Call Trace:
  device_unregister+0x17/0x60
  scsi_remove_host+0xee/0x2a0
  pm8001_pci_probe+0x6ef/0x1b90 [pm80xx]
  local_pci_probe+0x3f/0x90

We cannot call scsi_remove_host() in pm8001_alloc() because scsi_add_host()
has not been called yet at that point in time.

Function call tree:

  pm8001_pci_probe()
  |
  `- pm8001_pci_alloc()
  |  |
  |  `- pm8001_alloc()
  |     |
  |     `- scsi_remove_host()
  |
  `- scsi_add_host()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47504" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47504" ref_url="https://www.suse.com/security/cve/CVE-2021-47504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: ensure task_work gets run as part of cancelations

If we successfully cancel a work item but that work item needs to be
processed through task_work, then we can be sleeping uninterruptibly
in io_uring_cancel_generic() and never process it. Hence we don't
make forward progress and we end up with an uninterruptible sleep
warning.

While in there, correct a comment that should be IFF, not IIF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47504/">CVE-2021-47504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47504">CVE-2021-47504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225382">SUSE bug 1225382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47505" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aio: fix use-after-free due to missing POLLFREE handling

signalfd_poll() and binder_poll() are special in that they use a
waitqueue whose lifetime is the current task, rather than the struct
file as is normally the case.  This is okay for blocking polls, since a
blocking poll occurs within one task; however, non-blocking polls
require another solution.  This solution is for the queue to be cleared
before it is freed, by sending a POLLFREE notification to all waiters.

Unfortunately, only eventpoll handles POLLFREE.  A second type of
non-blocking poll, aio poll, was added in kernel v4.18, and it doesn't
handle POLLFREE.  This allows a use-after-free to occur if a signalfd or
binder fd is polled with aio poll, and the waitqueue gets freed.

Fix this by making aio poll handle POLLFREE.

A patch by Ramji Jiyani &lt;ramjiyani@google.com&gt;
(https://lore.kernel.org/r/20211027011834.2497484-1-ramjiyani@google.com)
tried to do this by making aio_poll_wake() always complete the request
inline if POLLFREE is seen.  However, that solution had two bugs.
First, it introduced a deadlock, as it unconditionally locked the aio
context while holding the waitqueue lock, which inverts the normal
locking order.  Second, it didn't consider that POLLFREE notifications
are missed while the request has been temporarily de-queued.

The second problem was solved by my previous patch.  This patch then
properly fixes the use-after-free by handling POLLFREE in a
deadlock-free way.  It does this by taking advantage of the fact that
freeing of the waitqueue is RCU-delayed, similar to what eventpoll does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227652">SUSE bug 1227652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47506" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix use-after-free due to delegation race

A delegation break could arrive as soon as we've called vfs_setlease.  A
delegation break runs a callback which immediately (in
nfsd4_cb_recall_prepare) adds the delegation to del_recall_lru.  If we
then exit nfs4_set_delegation without hashing the delegation, it will be
freed as soon as the callback is done with it, without ever being
removed from del_recall_lru.

Symptoms show up later as use-after-free or list corruption warnings,
usually in the laundromat thread.

I suspect aba2072f4523 "nfsd: grant read delegations to clients holding
writes" made this bug easier to hit, but I looked as far back as v3.0
and it looks to me it already had the same problem.  So I'm not sure
where the bug was introduced; it may have been there from the beginning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227497">SUSE bug 1227497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix nsfd startup race (again)

Commit bd5ae9288d64 ("nfsd: register pernet ops last, unregister first")
has re-opened rpc_pipefs_event() race against nfsd_net_id registration
(register_pernet_subsys()) which has been fixed by commit bb7ffbf29e76
("nfsd: fix nsfd startup race triggering BUG_ON").

Restore the order of register_pernet_subsys() vs register_cld_notifier().
Add WARN_ON() to prevent a future regression.

Crash info:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000012
CPU: 8 PID: 345 Comm: mount Not tainted 5.4.144-... #1
pc : rpc_pipefs_event+0x54/0x120 [nfsd]
lr : rpc_pipefs_event+0x48/0x120 [nfsd]
Call trace:
 rpc_pipefs_event+0x54/0x120 [nfsd]
 blocking_notifier_call_chain
 rpc_fill_super
 get_tree_keyed
 rpc_fs_get_tree
 vfs_get_tree
 do_mount
 ksys_mount
 __arm64_sys_mount
 el0_svc_handler
 el0_svc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47508" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47508" ref_url="https://www.suse.com/security/cve/CVE-2021-47508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: free exchange changeset on failures

Fstests runs on my VMs have show several kmemleak reports like the following.

  unreferenced object 0xffff88811ae59080 (size 64):
    comm "xfs_io", pid 12124, jiffies 4294987392 (age 6.368s)
    hex dump (first 32 bytes):
      00 c0 1c 00 00 00 00 00 ff cf 1c 00 00 00 00 00  ................
      90 97 e5 1a 81 88 ff ff 90 97 e5 1a 81 88 ff ff  ................
    backtrace:
      [&lt;00000000ac0176d2&gt;] ulist_add_merge+0x60/0x150 [btrfs]
      [&lt;0000000076e9f312&gt;] set_state_bits+0x86/0xc0 [btrfs]
      [&lt;0000000014fe73d6&gt;] set_extent_bit+0x270/0x690 [btrfs]
      [&lt;000000004f675208&gt;] set_record_extent_bits+0x19/0x20 [btrfs]
      [&lt;00000000b96137b1&gt;] qgroup_reserve_data+0x274/0x310 [btrfs]
      [&lt;0000000057e9dcbb&gt;] btrfs_check_data_free_space+0x5c/0xa0 [btrfs]
      [&lt;0000000019c4511d&gt;] btrfs_delalloc_reserve_space+0x1b/0xa0 [btrfs]
      [&lt;000000006d37e007&gt;] btrfs_dio_iomap_begin+0x415/0x970 [btrfs]
      [&lt;00000000fb8a74b8&gt;] iomap_iter+0x161/0x1e0
      [&lt;0000000071dff6ff&gt;] __iomap_dio_rw+0x1df/0x700
      [&lt;000000002567ba53&gt;] iomap_dio_rw+0x5/0x20
      [&lt;0000000072e555f8&gt;] btrfs_file_write_iter+0x290/0x530 [btrfs]
      [&lt;000000005eb3d845&gt;] new_sync_write+0x106/0x180
      [&lt;000000003fb505bf&gt;] vfs_write+0x24d/0x2f0
      [&lt;000000009bb57d37&gt;] __x64_sys_pwrite64+0x69/0xa0
      [&lt;000000003eba3fdf&gt;] do_syscall_64+0x43/0x90

In case brtfs_qgroup_reserve_data() or btrfs_delalloc_reserve_metadata()
fail the allocated extent_changeset will not be freed.

So in btrfs_check_data_free_space() and btrfs_delalloc_reserve_space()
free the allocated extent_changeset to get rid of the allocated memory.

The issue currently only happens in the direct IO write path, but only
after 65b3c08606e5 ("btrfs: fix ENOSPC failure when attempting direct IO
write into NOCOW range"), and also at defrag_one_locked_target(). Every
other place is always calling extent_changeset_free() even if its call
to btrfs_delalloc_reserve_space() or btrfs_check_data_free_space() has
failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47508/">CVE-2021-47508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47508">CVE-2021-47508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225408">SUSE bug 1225408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47509" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: oss: Limit the period size to 16MB

Set the practical limit to the period size (the fragment shift in OSS)
instead of a full 31bit; a too large value could lead to the exhaust
of memory as we allocate temporary buffers of the period size, too.

As of this patch, we set to 16MB limit, which should cover all use
cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47510" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix re-dirty process of tree-log nodes

There is a report of a transaction abort of -EAGAIN with the following
script.

  #!/bin/sh

  for d in sda sdb; do
          mkfs.btrfs -d single -m single -f /dev/\${d}
  done

  mount /dev/sda /mnt/test
  mount /dev/sdb /mnt/scratch

  for dir in test scratch; do
          echo 3 &gt;/proc/sys/vm/drop_caches
          fio --directory=/mnt/\${dir} --name=fio.\${dir} --rw=read --size=50G --bs=64m \
                  --numjobs=$(nproc) --time_based --ramp_time=5 --runtime=480 \
                  --group_reporting |&amp; tee /dev/shm/fio.\${dir}
          echo 3 &gt;/proc/sys/vm/drop_caches
  done

  for d in sda sdb; do
          umount /dev/\${d}
  done

The stack trace is shown in below.

  [3310.967991] BTRFS: error (device sda) in btrfs_commit_transaction:2341: errno=-11 unknown (Error while writing out transaction)
  [3310.968060] BTRFS info (device sda): forced readonly
  [3310.968064] BTRFS warning (device sda): Skipping commit of aborted transaction.
  [3310.968065] ------------[ cut here ]------------
  [3310.968066] BTRFS: Transaction aborted (error -11)
  [3310.968074] WARNING: CPU: 14 PID: 1684 at fs/btrfs/transaction.c:1946 btrfs_commit_transaction.cold+0x209/0x2c8
  [3310.968131] CPU: 14 PID: 1684 Comm: fio Not tainted 5.14.10-300.fc35.x86_64 #1
  [3310.968135] Hardware name: DIAWAY Tartu/Tartu, BIOS V2.01.B10 04/08/2021
  [3310.968137] RIP: 0010:btrfs_commit_transaction.cold+0x209/0x2c8
  [3310.968144] RSP: 0018:ffffb284ce393e10 EFLAGS: 00010282
  [3310.968147] RAX: 0000000000000026 RBX: ffff973f147b0f60 RCX: 0000000000000027
  [3310.968149] RDX: ffff974ecf098a08 RSI: 0000000000000001 RDI: ffff974ecf098a00
  [3310.968150] RBP: ffff973f147b0f08 R08: 0000000000000000 R09: ffffb284ce393c48
  [3310.968151] R10: ffffb284ce393c40 R11: ffffffff84f47468 R12: ffff973f101bfc00
  [3310.968153] R13: ffff971f20cf2000 R14: 00000000fffffff5 R15: ffff973f147b0e58
  [3310.968154] FS:  00007efe65468740(0000) GS:ffff974ecf080000(0000) knlGS:0000000000000000
  [3310.968157] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [3310.968158] CR2: 000055691bcbe260 CR3: 000000105cfa4001 CR4: 0000000000770ee0
  [3310.968160] PKRU: 55555554
  [3310.968161] Call Trace:
  [3310.968167]  ? dput+0xd4/0x300
  [3310.968174]  btrfs_sync_file+0x3f1/0x490
  [3310.968180]  __x64_sys_fsync+0x33/0x60
  [3310.968185]  do_syscall_64+0x3b/0x90
  [3310.968190]  entry_SYSCALL_64_after_hwframe+0x44/0xae
  [3310.968194] RIP: 0033:0x7efe6557329b
  [3310.968200] RSP: 002b:00007ffe0236ebc0 EFLAGS: 00000293 ORIG_RAX: 000000000000004a
  [3310.968203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe6557329b
  [3310.968204] RDX: 0000000000000000 RSI: 00007efe58d77010 RDI: 0000000000000006
  [3310.968205] RBP: 0000000004000000 R08: 0000000000000000 R09: 00007efe58d77010
  [3310.968207] R10: 0000000016cacc0c R11: 0000000000000293 R12: 00007efe5ce95980
  [3310.968208] R13: 0000000000000000 R14: 00007efe6447c790 R15: 0000000c80000000
  [3310.968212] ---[ end trace 1a346f4d3c0d96ba ]---
  [3310.968214] BTRFS: error (device sda) in cleanup_transaction:1946: errno=-11 unknown

The abort occurs because of a write hole while writing out freeing tree
nodes of a tree-log tree. For zoned btrfs, we re-dirty a freed tree
node to ensure btrfs can write the region and does not leave a hole on
write on a zoned device. The current code fails to re-dirty a node
when the tree-log tree's depth is greater or equal to 2. That leads to
a transaction abort with -EAGAIN.

Fix the issue by properly re-dirtying a node on walking up the tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47511" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: oss: Fix negative period/buffer sizes

The period size calculation in OSS layer may receive a negative value
as an error, but the code there assumes only the positive values and
handle them with size_t.  Due to that, a too big value may be passed
to the lower layers.

This patch changes the code to handle with ssize_t and adds the proper
error checks appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227700">SUSE bug 1227700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47512" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47512" ref_url="https://www.suse.com/security/cve/CVE-2021-47512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fq_pie: prevent dismantle issue

For some reason, fq_pie_destroy() did not copy
working code from pie_destroy() and other qdiscs,
thus causing elusive bug.

Before calling del_timer_sync(&amp;q-&gt;adapt_timer),
we need to ensure timer will not rearm itself.

rcu: INFO: rcu_preempt self-detected stall on CPU
rcu:    0-....: (4416 ticks this GP) idle=60d/1/0x4000000000000000 softirq=10433/10434 fqs=2579
        (t=10501 jiffies g=13085 q=3989)
NMI backtrace for cpu 0
CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62
 trigger_single_cpu_backtrace include/linux/nmi.h:164 [inline]
 rcu_dump_cpu_stacks+0x25e/0x3f0 kernel/rcu/tree_stall.h:343
 print_cpu_stall kernel/rcu/tree_stall.h:627 [inline]
 check_cpu_stall kernel/rcu/tree_stall.h:711 [inline]
 rcu_pending kernel/rcu/tree.c:3878 [inline]
 rcu_sched_clock_irq.cold+0x9d/0x746 kernel/rcu/tree.c:2597
 update_process_times+0x16d/0x200 kernel/time/timer.c:1785
 tick_sched_handle+0x9b/0x180 kernel/time/tick-sched.c:226
 tick_sched_timer+0x1b0/0x2d0 kernel/time/tick-sched.c:1428
 __run_hrtimer kernel/time/hrtimer.c:1685 [inline]
 __hrtimer_run_queues+0x1c0/0xe50 kernel/time/hrtimer.c:1749
 hrtimer_interrupt+0x31c/0x790 kernel/time/hrtimer.c:1811
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1086 [inline]
 __sysvec_apic_timer_interrupt+0x146/0x530 arch/x86/kernel/apic/apic.c:1103
 sysvec_apic_timer_interrupt+0x8e/0xc0 arch/x86/kernel/apic/apic.c:1097
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638
RIP: 0010:write_comp_data kernel/kcov.c:221 [inline]
RIP: 0010:__sanitizer_cov_trace_const_cmp1+0x1d/0x80 kernel/kcov.c:273
Code: 54 c8 20 48 89 10 c3 66 0f 1f 44 00 00 53 41 89 fb 41 89 f1 bf 03 00 00 00 65 48 8b 0c 25 40 70 02 00 48 89 ce 4c 8b 54 24 08 &lt;e8&gt; 4e f7 ff ff 84 c0 74 51 48 8b 81 88 15 00 00 44 8b 81 84 15 00
RSP: 0018:ffffc90000d27b28 EFLAGS: 00000246
RAX: 0000000000000000 RBX: ffff888064bf1bf0 RCX: ffff888011928000
RDX: ffff888011928000 RSI: ffff888011928000 RDI: 0000000000000003
RBP: ffff888064bf1c28 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff875d8295 R11: 0000000000000000 R12: 0000000000000000
R13: ffff8880783dd300 R14: 0000000000000000 R15: 0000000000000000
 pie_calculate_probability+0x405/0x7c0 net/sched/sch_pie.c:418
 fq_pie_timer+0x170/0x2a0 net/sched/sch_fq_pie.c:383
 call_timer_fn+0x1a5/0x6b0 kernel/time/timer.c:1421
 expire_timers kernel/time/timer.c:1466 [inline]
 __run_timers.part.0+0x675/0xa20 kernel/time/timer.c:1734
 __run_timers kernel/time/timer.c:1715 [inline]
 run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1747
 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558
 run_ksoftirqd kernel/softirq.c:921 [inline]
 run_ksoftirqd+0x2d/0x60 kernel/softirq.c:913
 smpboot_thread_fn+0x645/0x9c0 kernel/smpboot.c:164
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47512/">CVE-2021-47512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47512">CVE-2021-47512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225424">SUSE bug 1225424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47513" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering

Avoid a memory leak if there is not a CPU port defined.

Addresses-Coverity-ID: 1492897 ("Resource leak")
Addresses-Coverity-ID: 1492899 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47514</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47514" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: fix netns refcount leak in devlink_nl_cmd_reload()

While preparing my patch series adding netns refcount tracking,
I spotted bugs in devlink_nl_cmd_reload()

Some error paths forgot to release a refcount on a netns.

To fix this, we can reduce the scope of get_net()/put_net()
section around the call to devlink_reload().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

seg6: fix the iif in the IPv6 socket control block

When an IPv4 packet is received, the ip_rcv_core(...) sets the receiving
interface index into the IPv4 socket control block (v5.16-rc4,
net/ipv4/ip_input.c line 510):

    IPCB(skb)-&gt;iif = skb-&gt;skb_iif;

If that IPv4 packet is meant to be encapsulated in an outer IPv6+SRH
header, the seg6_do_srh_encap(...) performs the required encapsulation.
In this case, the seg6_do_srh_encap function clears the IPv6 socket control
block (v5.16-rc4 net/ipv6/seg6_iptunnel.c line 163):

    memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));

The memset(...) was introduced in commit ef489749aae5 ("ipv6: sr: clear
IP6CB(skb) on SRH ip4ip6 encapsulation") a long time ago (2019-01-29).

Since the IPv6 socket control block and the IPv4 socket control block share
the same memory area (skb-&gt;cb), the receiving interface index info is lost
(IP6CB(skb)-&gt;iif is set to zero).

As a side effect, that condition triggers a NULL pointer dereference if
commit 0857d6f8c759 ("ipv6: When forwarding count rx stats on the orig
netdev") is applied.

To fix that issue, we set the IP6CB(skb)-&gt;iif with the index of the
receiving interface once again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225426">SUSE bug 1225426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47516" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: Fix memory leak in nfp_cpp_area_cache_add()

In line 800 (#1), nfp_cpp_area_alloc() allocates and initializes a
CPP area structure. But in line 807 (#2), when the cache is allocated
failed, this CPP area structure is not freed, which will result in
memory leak.

We can fix it by freeing the CPP area when the cache is allocated
failed (#2).

792 int nfp_cpp_area_cache_add(struct nfp_cpp *cpp, size_t size)
793 {
794 	struct nfp_cpp_area_cache *cache;
795 	struct nfp_cpp_area *area;

800	area = nfp_cpp_area_alloc(cpp, NFP_CPP_ID(7, NFP_CPP_ACTION_RW, 0),
801 				  0, size);
	// #1: allocates and initializes

802 	if (!area)
803 		return -ENOMEM;

805 	cache = kzalloc(sizeof(*cache), GFP_KERNEL);
806 	if (!cache)
807 		return -ENOMEM; // #2: missing free

817	return 0;
818 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47517" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47517" ref_url="https://www.suse.com/security/cve/CVE-2021-47517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: do not perform operations on net devices being unregistered

There is a short period between a net device starts to be unregistered
and when it is actually gone. In that time frame ethtool operations
could still be performed, which might end up in unwanted or undefined
behaviours[1].

Do not allow ethtool operations after a net device starts its
unregistration. This patch targets the netlink part as the ioctl one
isn't affected: the reference to the net device is taken and the
operation is executed within an rtnl lock section and the net device
won't be found after unregister.

[1] For example adding Tx queues after unregister ends up in NULL
    pointer exceptions and UaFs, such as:

      BUG: KASAN: use-after-free in kobject_get+0x14/0x90
      Read of size 1 at addr ffff88801961248c by task ethtool/755

      CPU: 0 PID: 755 Comm: ethtool Not tainted 5.15.0-rc6+ #778
      Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/014
      Call Trace:
       dump_stack_lvl+0x57/0x72
       print_address_description.constprop.0+0x1f/0x140
       kasan_report.cold+0x7f/0x11b
       kobject_get+0x14/0x90
       kobject_add_internal+0x3d1/0x450
       kobject_init_and_add+0xba/0xf0
       netdev_queue_update_kobjects+0xcf/0x200
       netif_set_real_num_tx_queues+0xb4/0x310
       veth_set_channels+0x1c3/0x550
       ethnl_set_channels+0x524/0x610
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47517/">CVE-2021-47517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47517">CVE-2021-47517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225428">SUSE bug 1225428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47518" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done

The done() netlink callback nfc_genl_dump_ses_done() should check if
received argument is non-NULL, because its allocation could fail earlier
in dumpit() (nfc_genl_dump_ses()).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47519" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47519" ref_url="https://www.suse.com/security/cve/CVE-2021-47519" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: m_can: m_can_read_fifo: fix memory leak in error branch

In m_can_read_fifo(), if the second call to m_can_fifo_read() fails,
the function jump to the out_fail label and returns without calling
m_can_receive_skb(). This means that the skb previously allocated by
alloc_can_skb() is not freed. In other terms, this is a memory leak.

This patch adds a goto label to destroy the skb if an error occurs.

Issue was found with GCC -fanalyzer, please follow the link below for
details.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47519/">CVE-2021-47519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47519">CVE-2021-47519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225430">SUSE bug 1225430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47520" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: pch_can: pch_can_rx_normal: fix use after free

After calling netif_receive_skb(skb), dereferencing skb is unsafe.
Especially, the can_frame cf which aliases skb memory is dereferenced
just after the call netif_receive_skb(skb).

Reordering the lines solves the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227905">SUSE bug 1227905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47521" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: sja1000: fix use after free in ems_pcmcia_add_card()

If the last channel is not available then "dev" is freed.  Fortunately,
we can just use "pdev-&gt;irq" instead.

Also we should check if at least one channel was set up.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227696">SUSE bug 1227696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47522" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: bigbenff: prevent null pointer dereference

When emulating the device through uhid, there is a chance we don't have
output reports and so report_field is null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47523" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr

This buffer is currently allocated in hfi1_init():

	if (reinit)
		ret = init_after_reset(dd);
	else
		ret = loadtime_init(dd);
	if (ret)
		goto done;

	/* allocate dummy tail memory for all receive contexts */
	dd-&gt;rcvhdrtail_dummy_kvaddr = dma_alloc_coherent(&amp;dd-&gt;pcidev-&gt;dev,
							 sizeof(u64),
							 &amp;dd-&gt;rcvhdrtail_dummy_dma,
							 GFP_KERNEL);

	if (!dd-&gt;rcvhdrtail_dummy_kvaddr) {
		dd_dev_err(dd, "cannot allocate dummy tail memory\n");
		ret = -ENOMEM;
		goto done;
	}

The reinit triggered path will overwrite the old allocation and leak it.

Fix by moving the allocation to hfi1_alloc_devdata() and the deallocation
to hfi1_free_devdata().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47524" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: fix minor-number leak on probe errors

Make sure to release the allocated minor number before returning on
probe errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47525" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: fix use-after-free and memleak on unbind

Deregister the port when unbinding the driver to prevent it from being
used after releasing the driver data and leaking memory allocated by
serial core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227697">SUSE bug 1227697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47526" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: liteuart: Fix NULL pointer dereference in -&gt;remove()

drvdata has to be set in _probe() - otherwise platform_get_drvdata()
causes null pointer dereference BUG in _remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47528" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()

In cdnsp_endpoint_init(), cdnsp_ring_alloc() is assigned to pep-&gt;ring
and there is a dereference of it in cdnsp_endpoint_init(), which could
lead to a NULL pointer dereference on failure of cdnsp_ring_alloc().

Fix this bug by adding a check of pep-&gt;ring.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_USB_CDNSP_GADGET=y show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47529" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: Fix memory leaks in error handling path

Should an error occur (invalid TLV len or memory allocation failure), the
memory already allocated in 'reduce_power_data' should be freed before
returning, otherwise it is leaking.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47530" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47530" ref_url="https://www.suse.com/security/cve/CVE-2021-47530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix wait_fence submitqueue leak

We weren't dropping the submitqueue reference in all paths.  In
particular, when the fence has already been signalled. Split out
a helper to simplify handling this in the various different return
paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47530/">CVE-2021-47530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47530">CVE-2021-47530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225442">SUSE bug 1225442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47531" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47531" ref_url="https://www.suse.com/security/cve/CVE-2021-47531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP

In commit 510410bfc034 ("drm/msm: Implement mmap as GEM object
function") we switched to a new/cleaner method of doing things. That's
good, but we missed a little bit.

Before that commit, we used to _first_ run through the
drm_gem_mmap_obj() case where `obj-&gt;funcs-&gt;mmap()` was NULL. That meant
that we ran:

  vma-&gt;vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
  vma-&gt;vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma-&gt;vm_flags));
  vma-&gt;vm_page_prot = pgprot_decrypted(vma-&gt;vm_page_prot);

...and _then_ we modified those mappings with our own. Now that
`obj-&gt;funcs-&gt;mmap()` is no longer NULL we don't run the default
code. It looks like the fact that the vm_flags got VM_IO / VM_DONTDUMP
was important because we're now getting crashes on Chromebooks that
use ARC++ while logging out. Specifically a crash that looks like this
(this is on a 5.10 kernel w/ relevant backports but also seen on a
5.15 kernel):

  Unable to handle kernel paging request at virtual address ffffffc008000000
  Mem abort info:
    ESR = 0x96000006
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
  Data abort info:
    ISV = 0, ISS = 0x00000006
    CM = 0, WnR = 0
  swapper pgtable: 4k pages, 39-bit VAs, pgdp=000000008293d000
  [ffffffc008000000] pgd=00000001002b3003, p4d=00000001002b3003,
                     pud=00000001002b3003, pmd=0000000000000000
  Internal error: Oops: 96000006 [#1] PREEMPT SMP
  [...]
  CPU: 7 PID: 15734 Comm: crash_dump64 Tainted: G W 5.10.67 #1 [...]
  Hardware name: Qualcomm Technologies, Inc. sc7280 IDP SKU2 platform (DT)
  pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--)
  pc : __arch_copy_to_user+0xc0/0x30c
  lr : copyout+0xac/0x14c
  [...]
  Call trace:
   __arch_copy_to_user+0xc0/0x30c
   copy_page_to_iter+0x1a0/0x294
   process_vm_rw_core+0x240/0x408
   process_vm_rw+0x110/0x16c
   __arm64_sys_process_vm_readv+0x30/0x3c
   el0_svc_common+0xf8/0x250
   do_el0_svc+0x30/0x80
   el0_svc+0x10/0x1c
   el0_sync_handler+0x78/0x108
   el0_sync+0x184/0x1c0
  Code: f8408423 f80008c3 910020c6 36100082 (b8404423)

Let's add the two flags back in.

While we're at it, the fact that we aren't running the default means
that we _don't_ need to clear out VM_PFNMAP, so remove that and save
an instruction.

NOTE: it was confirmed that VM_IO was the important flag to fix the
problem I was seeing, but adding back VM_DONTDUMP seems like a sane
thing to do so I'm doing that too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47531/">CVE-2021-47531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47531">CVE-2021-47531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225443">SUSE bug 1225443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47532" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47532" ref_url="https://www.suse.com/security/cve/CVE-2021-47532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/devfreq: Fix OPP refcnt leak
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47532/">CVE-2021-47532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47532">CVE-2021-47532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225444">SUSE bug 1225444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47533" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Clear the HVS FIFO commit pointer once done

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a wait on the previous commit done on a given HVS
FIFO.

However, we never cleared that pointer once done. Since
drm_crtc_commit_put can free the drm_crtc_commit structure directly if
we were the last user, this means that it can lead to a use-after free
if we were to duplicate the state, and that stale pointer would even be
copied to the new state.

Set the pointer to NULL once we're done with the wait so that we don't
carry over a pointer to a free'd structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227498">SUSE bug 1227498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47534" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: kms: Add missing drm_crtc_commit_put

Commit 9ec03d7f1ed3 ("drm/vc4: kms: Wait on previous FIFO users before a
commit") introduced a global state for the HVS, with each FIFO storing
the current CRTC commit so that we can properly synchronize commits.

However, the refcounting was off and we thus ended up leaking the
drm_crtc_commit structure every commit. Add a drm_crtc_commit_put to
prevent the leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-08"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47535" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Allocate enough space for GMU registers

In commit 142639a52a01 ("drm/msm/a6xx: fix crashstate capture for
A650") we changed a6xx_get_gmu_registers() to read 3 sets of
registers. Unfortunately, we didn't change the memory allocation for
the array. That leads to a KASAN warning (this was on the chromeos-5.4
kernel, which has the problematic commit backported to it):

  BUG: KASAN: slab-out-of-bounds in _a6xx_get_gmu_registers+0x144/0x430
  Write of size 8 at addr ffffff80c89432b0 by task A618-worker/209
  CPU: 5 PID: 209 Comm: A618-worker Tainted: G        W         5.4.156-lockdep #22
  Hardware name: Google Lazor Limozeen without Touchscreen (rev5 - rev8) (DT)
  Call trace:
   dump_backtrace+0x0/0x248
   show_stack+0x20/0x2c
   dump_stack+0x128/0x1ec
   print_address_description+0x88/0x4a0
   __kasan_report+0xfc/0x120
   kasan_report+0x10/0x18
   __asan_report_store8_noabort+0x1c/0x24
   _a6xx_get_gmu_registers+0x144/0x430
   a6xx_gpu_state_get+0x330/0x25d4
   msm_gpu_crashstate_capture+0xa0/0x84c
   recover_worker+0x328/0x838
   kthread_worker_fn+0x32c/0x574
   kthread+0x2dc/0x39c
   ret_from_fork+0x10/0x18

  Allocated by task 209:
   __kasan_kmalloc+0xfc/0x1c4
   kasan_kmalloc+0xc/0x14
   kmem_cache_alloc_trace+0x1f0/0x2a0
   a6xx_gpu_state_get+0x164/0x25d4
   msm_gpu_crashstate_capture+0xa0/0x84c
   recover_worker+0x328/0x838
   kthread_worker_fn+0x32c/0x574
   kthread+0x2dc/0x39c
   ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47536" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix wrong list_del in smc_lgr_cleanup_early

smc_lgr_cleanup_early() meant to delete the link
group from the link group list, but it deleted
the list head by mistake.

This may cause memory corruption since we didn't
remove the real link group from the list and later
memseted the link group structure.
We got a list corruption panic when testing:

[  231.277259] list_del corruption. prev-&gt;next should be ffff8881398a8000, but was 0000000000000000
[  231.278222] ------------[ cut here ]------------
[  231.278726] kernel BUG at lib/list_debug.c:53!
[  231.279326] invalid opcode: 0000 [#1] SMP NOPTI
[  231.279803] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.10.46+ #435
[  231.280466] Hardware name: Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014
[  231.281248] Workqueue: events smc_link_down_work
[  231.281732] RIP: 0010:__list_del_entry_valid+0x70/0x90
[  231.282258] Code: 4c 60 82 e8 7d cc 6a 00 0f 0b 48 89 fe 48 c7 c7 88 4c
60 82 e8 6c cc 6a 00 0f 0b 48 89 fe 48 c7 c7 c0 4c 60 82 e8 5b cc 6a 00 &lt;0f&gt;
0b 48 89 fe 48 c7 c7 00 4d 60 82 e8 4a cc 6a 00 0f 0b cc cc cc
[  231.284146] RSP: 0018:ffffc90000033d58 EFLAGS: 00010292
[  231.284685] RAX: 0000000000000054 RBX: ffff8881398a8000 RCX: 0000000000000000
[  231.285415] RDX: 0000000000000001 RSI: ffff88813bc18040 RDI: ffff88813bc18040
[  231.286141] RBP: ffffffff8305ad40 R08: 0000000000000003 R09: 0000000000000001
[  231.286873] R10: ffffffff82803da0 R11: ffffc90000033b90 R12: 0000000000000001
[  231.287606] R13: 0000000000000000 R14: ffff8881398a8000 R15: 0000000000000003
[  231.288337] FS:  0000000000000000(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
[  231.289160] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.289754] CR2: 0000000000e72058 CR3: 000000010fa96006 CR4: 00000000003706f0
[  231.290485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  231.291211] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  231.291940] Call Trace:
[  231.292211]  smc_lgr_terminate_sched+0x53/0xa0
[  231.292677]  smc_switch_conns+0x75/0x6b0
[  231.293085]  ? update_load_avg+0x1a6/0x590
[  231.293517]  ? ttwu_do_wakeup+0x17/0x150
[  231.293907]  ? update_load_avg+0x1a6/0x590
[  231.294317]  ? newidle_balance+0xca/0x3d0
[  231.294716]  smcr_link_down+0x50/0x1a0
[  231.295090]  ? __wake_up_common_lock+0x77/0x90
[  231.295534]  smc_link_down_work+0x46/0x60
[  231.295933]  process_one_work+0x18b/0x350
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47537" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Fix a memleak bug in rvu_mbox_init()

In rvu_mbox_init(), mbox_regions is not freed or passed out
under the switch-default region, which could lead to a memory leak.

Fix this bug by changing 'return err' to 'goto free_regions'.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_OCTEONTX2_AF=y show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47538" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47538" ref_url="https://www.suse.com/security/cve/CVE-2021-47538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()

Need to call rxrpc_put_local() for peer candidate before kfree() as it
holds a ref to rxrpc_local.

[DH: v2: Changed to abstract the peer freeing code out into a function]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47538/">CVE-2021-47538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47538">CVE-2021-47538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225448">SUSE bug 1225448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47539" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47539" ref_url="https://www.suse.com/security/cve/CVE-2021-47539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()

Need to call rxrpc_put_peer() for bundle candidate before kfree() as it
holds a ref to rxrpc_peer.

[DH: v2: Changed to abstract out the bundle freeing code into a function]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47539/">CVE-2021-47539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47539">CVE-2021-47539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225452">SUSE bug 1225452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47540" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode

Fix the following NULL pointer dereference in mt7915_get_phy_mode
routine adding an ibss interface to the mt7915 driver.

[  101.137097] wlan0: Trigger new scan to find an IBSS to join
[  102.827039] wlan0: Creating new IBSS network, BSSID 26:a4:50:1a:6e:69
[  103.064756] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  103.073670] Mem abort info:
[  103.076520]   ESR = 0x96000005
[  103.079614]   EC = 0x25: DABT (current EL), IL = 32 bits
[  103.084934]   SET = 0, FnV = 0
[  103.088042]   EA = 0, S1PTW = 0
[  103.091215] Data abort info:
[  103.094104]   ISV = 0, ISS = 0x00000005
[  103.098041]   CM = 0, WnR = 0
[  103.101044] user pgtable: 4k pages, 39-bit VAs, pgdp=00000000460b1000
[  103.107565] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[  103.116590] Internal error: Oops: 96000005 [#1] SMP
[  103.189066] CPU: 1 PID: 333 Comm: kworker/u4:3 Not tainted 5.10.75 #0
[  103.195498] Hardware name: MediaTek MT7622 RFB1 board (DT)
[  103.201124] Workqueue: phy0 ieee80211_iface_work [mac80211]
[  103.206695] pstate: 20000005 (nzCv daif -PAN -UAO -TCO BTYPE=--)
[  103.212705] pc : mt7915_get_phy_mode+0x68/0x120 [mt7915e]
[  103.218103] lr : mt7915_mcu_add_bss_info+0x11c/0x760 [mt7915e]
[  103.223927] sp : ffffffc011cdb9e0
[  103.227235] x29: ffffffc011cdb9e0 x28: ffffff8006563098
[  103.232545] x27: ffffff8005f4da22 x26: ffffff800685ac40
[  103.237855] x25: 0000000000000001 x24: 000000000000011f
[  103.243165] x23: ffffff8005f4e260 x22: ffffff8006567918
[  103.248475] x21: ffffff8005f4df80 x20: ffffff800685ac58
[  103.253785] x19: ffffff8006744400 x18: 0000000000000000
[  103.259094] x17: 0000000000000000 x16: 0000000000000001
[  103.264403] x15: 000899c3a2d9d2e4 x14: 000899bdc3c3a1c8
[  103.269713] x13: 0000000000000000 x12: 0000000000000000
[  103.275024] x11: ffffffc010e30c20 x10: 0000000000000000
[  103.280333] x9 : 0000000000000050 x8 : ffffff8006567d88
[  103.285642] x7 : ffffff8006563b5c x6 : ffffff8006563b44
[  103.290952] x5 : 0000000000000002 x4 : 0000000000000001
[  103.296262] x3 : 0000000000000001 x2 : 0000000000000001
[  103.301572] x1 : 0000000000000000 x0 : 0000000000000011
[  103.306882] Call trace:
[  103.309328]  mt7915_get_phy_mode+0x68/0x120 [mt7915e]
[  103.314378]  mt7915_bss_info_changed+0x198/0x200 [mt7915e]
[  103.319941]  ieee80211_bss_info_change_notify+0x128/0x290 [mac80211]
[  103.326360]  __ieee80211_sta_join_ibss+0x308/0x6c4 [mac80211]
[  103.332171]  ieee80211_sta_create_ibss+0x8c/0x10c [mac80211]
[  103.337895]  ieee80211_ibss_work+0x3dc/0x614 [mac80211]
[  103.343185]  ieee80211_iface_work+0x388/0x3f0 [mac80211]
[  103.348495]  process_one_work+0x288/0x690
[  103.352499]  worker_thread+0x70/0x464
[  103.356157]  kthread+0x144/0x150
[  103.359380]  ret_from_fork+0x10/0x18
[  103.362952] Code: 394008c3 52800220 394000e4 7100007f (39400023)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47541" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()

In mlx4_en_try_alloc_resources(), mlx4_en_copy_priv() is called and
tmp-&gt;tx_cq will be freed on the error path of mlx4_en_copy_priv().
After that mlx4_en_alloc_resources() is called and there is a dereference
of &amp;tmp-&gt;tx_cq[t][i] in mlx4_en_alloc_resources(), which could lead to
a use after free problem on failure of mlx4_en_copy_priv().

Fix this bug by adding a check of mlx4_en_copy_priv()

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_MLX4_EN=m show no new warnings,
and our static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225454">SUSE bug 1225454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47542" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()

In qlcnic_83xx_add_rings(), the indirect function of
ahw-&gt;hw_ops-&gt;alloc_mbx_args will be called to allocate memory for
cmd.req.arg, and there is a dereference of it in qlcnic_83xx_add_rings(),
which could lead to a NULL pointer dereference on failure of the
indirect function like qlcnic_83xx_alloc_mbx_args().

Fix this bug by adding a check of alloc_mbx_args(), this patch
imitates the logic of mbx_cmd()'s failure handling.

This bug was found by a static analyzer. The analysis employs
differential checking to identify inconsistent security operations
(e.g., checks or kfrees) between two code paths and confirms that the
inconsistent operations are not recovered in the current function or
the callers, so they constitute bugs.

Note that, as a bug found by static analysis, it can be a false
positive or hard to trigger. Multiple researchers have cross-reviewed
the bug.

Builds with CONFIG_QLCNIC=m show no new warnings, and our
static analyzer no longer warns about this code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47544" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix page frag corruption on page fault

Steffen reported a TCP stream corruption for HTTP requests
served by the apache web-server using a cifs mount-point
and memory mapping the relevant file.

The root cause is quite similar to the one addressed by
commit 20eb4f29b602 ("net: fix sk_page_frag() recursion from
memory reclaim"). Here the nested access to the task page frag
is caused by a page fault on the (mmapped) user-space memory
buffer coming from the cifs file.

The page fault handler performs an smb transaction on a different
socket, inside the same process context. Since sk-&gt;sk_allaction
for such socket does not prevent the usage for the task_frag,
the nested allocation modify "under the hood" the page frag
in use by the outer sendmsg call, corrupting the stream.

The overall relevant stack trace looks like the following:

httpd 78268 [001] 3461630.850950:      probe:tcp_sendmsg_locked:
        ffffffff91461d91 tcp_sendmsg_locked+0x1
        ffffffff91462b57 tcp_sendmsg+0x27
        ffffffff9139814e sock_sendmsg+0x3e
        ffffffffc06dfe1d smb_send_kvec+0x28
        [...]
        ffffffffc06cfaf8 cifs_readpages+0x213
        ffffffff90e83c4b read_pages+0x6b
        ffffffff90e83f31 __do_page_cache_readahead+0x1c1
        ffffffff90e79e98 filemap_fault+0x788
        ffffffff90eb0458 __do_fault+0x38
        ffffffff90eb5280 do_fault+0x1a0
        ffffffff90eb7c84 __handle_mm_fault+0x4d4
        ffffffff90eb8093 handle_mm_fault+0xc3
        ffffffff90c74f6d __do_page_fault+0x1ed
        ffffffff90c75277 do_page_fault+0x37
        ffffffff9160111e page_fault+0x1e
        ffffffff9109e7b5 copyin+0x25
        ffffffff9109eb40 _copy_from_iter_full+0xe0
        ffffffff91462370 tcp_sendmsg_locked+0x5e0
        ffffffff91462370 tcp_sendmsg_locked+0x5e0
        ffffffff91462b57 tcp_sendmsg+0x27
        ffffffff9139815c sock_sendmsg+0x4c
        ffffffff913981f7 sock_write_iter+0x97
        ffffffff90f2cc56 do_iter_readv_writev+0x156
        ffffffff90f2dff0 do_iter_write+0x80
        ffffffff90f2e1c3 vfs_writev+0xa3
        ffffffff90f2e27c do_writev+0x5c
        ffffffff90c042bb do_syscall_64+0x5b
        ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65

The cifs filesystem rightfully sets sk_allocations to GFP_NOFS,
we can avoid the nesting using the sk page frag for allocation
lacking the __GFP_FS flag. Do not define an additional mm-helper
for that, as this is strictly tied to the sk page frag usage.

v1 -&gt; v2:
 - use a stricted sk_page_frag() check instead of reordering the
   code (Eric)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47546" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix memory leak in fib6_rule_suppress

The kernel leaks memory when a `fib` rule is present in IPv6 nftables
firewall rules and a suppress_prefix rule is present in the IPv6 routing
rules (used by certain tools such as wg-quick). In such scenarios, every
incoming packet will leak an allocation in `ip6_dst_cache` slab cache.

After some hours of `bpftrace`-ing and source code reading, I tracked
down the issue to ca7a03c41753 ("ipv6: do not free rt if
FIB_LOOKUP_NOREF is set on suppress rule").

The problem with that change is that the generic `args-&gt;flags` always have
`FIB_LOOKUP_NOREF` set[1][2] but the IPv6-specific flag
`RT6_LOOKUP_F_DST_NOREF` might not be, leading to `fib6_rule_suppress` not
decreasing the refcount when needed.

How to reproduce:
 - Add the following nftables rule to a prerouting chain:
     meta nfproto ipv6 fib saddr . mark . iif oif missing drop
   This can be done with:
     sudo nft create table inet test
     sudo nft create chain inet test test_chain '{ type filter hook prerouting priority filter + 10; policy accept; }'
     sudo nft add rule inet test test_chain meta nfproto ipv6 fib saddr . mark . iif oif missing drop
 - Run:
     sudo ip -6 rule add table main suppress_prefixlength 0
 - Watch `sudo slabtop -o | grep ip6_dst_cache` to see memory usage increase
   with every incoming ipv6 packet.

This patch exposes the protocol-specific flags to the protocol
specific `suppress` function, and check the protocol-specific `flags`
argument for RT6_LOOKUP_F_DST_NOREF instead of the generic
FIB_LOOKUP_NOREF when decreasing the refcount, like this.

[1]: https://github.com/torvalds/linux/blob/ca7a03c4175366a92cee0ccc4fec0038c3266e26/net/ipv6/fib6_rules.c#L71
[2]: https://github.com/torvalds/linux/blob/ca7a03c4175366a92cee0ccc4fec0038c3266e26/net/ipv6/fib6_rules.c#L99
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225504">SUSE bug 1225504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47547" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47547" ref_url="https://www.suse.com/security/cve/CVE-2021-47547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy[8]' may be out of bound

In line 5001, if all id in the array 'lp-&gt;phy[8]' is not 0, when the
'for' end, the 'k' is 8.

At this time, the array 'lp-&gt;phy[8]' may be out of bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47547/">CVE-2021-47547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47547">CVE-2021-47547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225505">SUSE bug 1225505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47548" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()

The if statement:
  if (port &gt;= DSAF_GE_NUM)
        return;

limits the value of port less than DSAF_GE_NUM (i.e., 8).
However, if the value of port is 6 or 7, an array overflow could occur:
  port_rst_off = dsaf_dev-&gt;mac_cb[port]-&gt;port_rst_off;

because the length of dsaf_dev-&gt;mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).

To fix this possible array overflow, we first check port and if it is
greater than or equal to DSAF_MAX_PORT_NUM, the function returns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225506">SUSE bug 1225506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47549" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl

When the `rmmod sata_fsl.ko` command is executed in the PPC64 GNU/Linux,
a bug is reported:
 ==================================================================
 BUG: Unable to handle kernel data access on read at 0x80000800805b502c
 Oops: Kernel access of bad area, sig: 11 [#1]
 NIP [c0000000000388a4] .ioread32+0x4/0x20
 LR [80000000000c6034] .sata_fsl_port_stop+0x44/0xe0 [sata_fsl]
 Call Trace:
  .free_irq+0x1c/0x4e0 (unreliable)
  .ata_host_stop+0x74/0xd0 [libata]
  .release_nodes+0x330/0x3f0
  .device_release_driver_internal+0x178/0x2c0
  .driver_detach+0x64/0xd0
  .bus_remove_driver+0x70/0xf0
  .driver_unregister+0x38/0x80
  .platform_driver_unregister+0x14/0x30
  .fsl_sata_driver_exit+0x18/0xa20 [sata_fsl]
  .__se_sys_delete_module+0x1ec/0x2d0
  .system_call_exception+0xfc/0x1f0
  system_call_common+0xf8/0x200
 ==================================================================

The triggering of the BUG is shown in the following stack:

driver_detach
  device_release_driver_internal
    __device_release_driver
      drv-&gt;remove(dev) --&gt; platform_drv_remove/platform_remove
        drv-&gt;remove(dev) --&gt; sata_fsl_remove
          iounmap(host_priv-&gt;hcr_base);			&lt;---- unmap
          kfree(host_priv);                             &lt;---- free
      devres_release_all
        release_nodes
          dr-&gt;node.release(dev, dr-&gt;data) --&gt; ata_host_stop
            ap-&gt;ops-&gt;port_stop(ap) --&gt; sata_fsl_port_stop
                ioread32(hcr_base + HCONTROL)           &lt;---- UAF
            host-&gt;ops-&gt;host_stop(host)

The iounmap(host_priv-&gt;hcr_base) and kfree(host_priv) functions should
not be executed in drv-&gt;remove. These functions should be executed in
host_stop after port_stop. Therefore, we move these functions to the
new function sata_fsl_host_stop and bind the new function to host_stop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227654">SUSE bug 1227654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47550" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: fix potential memleak

In function amdgpu_get_xgmi_hive, when kobject_init_and_add failed
There is a potential memleak if not call kobject_put.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47551" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again

In SRIOV configuration, the reset may failed to bring asic back to normal but stop cpsch
already been called, the start_cpsch will not be called since there is no resume in this
case.  When reset been triggered again, driver should avoid to do uninitialization again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47552" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47552" ref_url="https://www.suse.com/security/cve/CVE-2021-47552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()

For avoiding to slow down queue destroy, we don't call
blk_mq_quiesce_queue() in blk_cleanup_queue(), instead of delaying to
cancel dispatch work in blk_release_queue().

However, this way has caused kernel oops[1], reported by Changhui. The log
shows that scsi_device can be freed before running blk_release_queue(),
which is expected too since scsi_device is released after the scsi disk
is closed and the scsi_device is removed.

Fixes the issue by canceling blk-mq dispatch work in both blk_cleanup_queue()
and disk_release():

1) when disk_release() is run, the disk has been closed, and any sync
dispatch activities have been done, so canceling dispatch work is enough to
quiesce filesystem I/O dispatch activity.

2) in blk_cleanup_queue(), we only focus on passthrough request, and
passthrough request is always explicitly allocated &amp; freed by
its caller, so once queue is frozen, all sync dispatch activity
for passthrough request has been done, then it is enough to just cancel
dispatch work for avoiding any dispatch activity.

[1] kernel panic log
[12622.769416] BUG: kernel NULL pointer dereference, address: 0000000000000300
[12622.777186] #PF: supervisor read access in kernel mode
[12622.782918] #PF: error_code(0x0000) - not-present page
[12622.788649] PGD 0 P4D 0
[12622.791474] Oops: 0000 [#1] PREEMPT SMP PTI
[12622.796138] CPU: 10 PID: 744 Comm: kworker/10:1H Kdump: loaded Not tainted 5.15.0+ #1
[12622.804877] Hardware name: Dell Inc. PowerEdge R730/0H21J3, BIOS 1.5.4 10/002/2015
[12622.813321] Workqueue: kblockd blk_mq_run_work_fn
[12622.818572] RIP: 0010:sbitmap_get+0x75/0x190
[12622.823336] Code: 85 80 00 00 00 41 8b 57 08 85 d2 0f 84 b1 00 00 00 45 31 e4 48 63 cd 48 8d 1c 49 48 c1 e3 06 49 03 5f 10 4c 8d 6b 40 83 f0 01 &lt;48&gt; 8b 33 44 89 f2 4c 89 ef 0f b6 c8 e8 fa f3 ff ff 83 f8 ff 75 58
[12622.844290] RSP: 0018:ffffb00a446dbd40 EFLAGS: 00010202
[12622.850120] RAX: 0000000000000001 RBX: 0000000000000300 RCX: 0000000000000004
[12622.858082] RDX: 0000000000000006 RSI: 0000000000000082 RDI: ffffa0b7a2dfe030
[12622.866042] RBP: 0000000000000004 R08: 0000000000000001 R09: ffffa0b742721334
[12622.874003] R10: 0000000000000008 R11: 0000000000000008 R12: 0000000000000000
[12622.881964] R13: 0000000000000340 R14: 0000000000000000 R15: ffffa0b7a2dfe030
[12622.889926] FS:  0000000000000000(0000) GS:ffffa0baafb40000(0000) knlGS:0000000000000000
[12622.898956] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[12622.905367] CR2: 0000000000000300 CR3: 0000000641210001 CR4: 00000000001706e0
[12622.913328] Call Trace:
[12622.916055]  &lt;TASK&gt;
[12622.918394]  scsi_mq_get_budget+0x1a/0x110
[12622.922969]  __blk_mq_do_dispatch_sched+0x1d4/0x320
[12622.928404]  ? pick_next_task_fair+0x39/0x390
[12622.933268]  __blk_mq_sched_dispatch_requests+0xf4/0x140
[12622.939194]  blk_mq_sched_dispatch_requests+0x30/0x60
[12622.944829]  __blk_mq_run_hw_queue+0x30/0xa0
[12622.949593]  process_one_work+0x1e8/0x3c0
[12622.954059]  worker_thread+0x50/0x3b0
[12622.958144]  ? rescuer_thread+0x370/0x370
[12622.962616]  kthread+0x158/0x180
[12622.966218]  ? set_kthread_struct+0x40/0x40
[12622.970884]  ret_from_fork+0x22/0x30
[12622.974875]  &lt;/TASK&gt;
[12622.977309] Modules linked in: scsi_debug rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs sunrpc dm_multipath intel_rapl_msr intel_rapl_common dell_wmi_descriptor sb_edac rfkill video x86_pkg_temp_thermal intel_powerclamp dcdbas coretemp kvm_intel kvm mgag200 irqbypass i2c_algo_bit rapl drm_kms_helper ipmi_ssif intel_cstate intel_uncore syscopyarea sysfillrect sysimgblt fb_sys_fops pcspkr cec mei_me lpc_ich mei ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter drm fuse xfs libcrc32c sr_mod cdrom sd_mod t10_pi sg ixgbe ahci libahci crct10dif_pclmul crc32_pclmul crc32c_intel libata megaraid_sas ghash_clmulni_intel tg3 wdat_w
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47552/">CVE-2021-47552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47552">CVE-2021-47552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225513">SUSE bug 1225513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47553" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/scs: Reset task stack state in bringup_cpu()

To hot unplug a CPU, the idle task on that CPU calls a few layers of C
code before finally leaving the kernel. When KASAN is in use, poisoned
shadow is left around for each of the active stack frames, and when
shadow call stacks are in use. When shadow call stacks (SCS) are in use
the task's saved SCS SP is left pointing at an arbitrary point within
the task's shadow call stack.

When a CPU is offlined than onlined back into the kernel, this stale
state can adversely affect execution. Stale KASAN shadow can alias new
stackframes and result in bogus KASAN warnings. A stale SCS SP is
effectively a memory leak, and prevents a portion of the shadow call
stack being used. Across a number of hotplug cycles the idle task's
entire shadow call stack can become unusable.

We previously fixed the KASAN issue in commit:

  e1b77c92981a5222 ("sched/kasan: remove stale KASAN poison after hotplug")

... by removing any stale KASAN stack poison immediately prior to
onlining a CPU.

Subsequently in commit:

  f1a0a376ca0c4ef1 ("sched/core: Initialize the idle task with preemption disabled")

... the refactoring left the KASAN and SCS cleanup in one-time idle
thread initialization code rather than something invoked prior to each
CPU being onlined, breaking both as above.

We fixed SCS (but not KASAN) in commit:

  63acd42c0d4942f7 ("sched/scs: Reset the shadow stack when idle_task_exit")

... but as this runs in the context of the idle task being offlined it's
potentially fragile.

To fix these consistently and more robustly, reset the SCS SP and KASAN
shadow of a CPU's idle task immediately before we online that CPU in
bringup_cpu(). This ensures the idle task always has a consistent state
when it is running, and removes the need to so so when exiting an idle
task.

Whenever any thread is created, dup_task_struct() will give the task a
stack which is free of KASAN shadow, and initialize the task's SCS SP,
so there's no need to specially initialize either for idle thread within
init_idle(), as this was only necessary to handle hotplug cycles.

I've tested this on arm64 with:

* gcc 11.1.0, defconfig +KASAN_INLINE, KASAN_STACK
* clang 12.0.0, defconfig +KASAN_INLINE, KASAN_STACK, SHADOW_CALL_STACK

... offlining and onlining CPUS with:

| while true; do
|   for C in /sys/devices/system/cpu/cpu*/online; do
|     echo 0 &gt; $C;
|     echo 1 &gt; $C;
|   done
| done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227558">SUSE bug 1227558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47554" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim: avoid putting an uninitialized iova_domain

The system will crash if we put an uninitialized iova_domain, this
could happen when an error occurs before initializing the iova_domain
in vdpasim_create().

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
RIP: 0010:__cpuhp_state_remove_instance+0x96/0x1c0
...
Call Trace:
 &lt;TASK&gt;
 put_iova_domain+0x29/0x220
 vdpasim_free+0xd1/0x120 [vdpa_sim]
 vdpa_release_dev+0x21/0x40 [vdpa]
 device_release+0x33/0x90
 kobject_release+0x63/0x160
 vdpasim_create+0x127/0x2a0 [vdpa_sim]
 vdpasim_net_dev_add+0x7d/0xfe [vdpa_sim_net]
 vdpa_nl_cmd_dev_add_set_doit+0xe1/0x1a0 [vdpa]
 genl_family_rcv_msg_doit+0x112/0x140
 genl_rcv_msg+0xdf/0x1d0
 ...

So we must make sure the iova_domain is already initialized before
put it.

In addition, we may get the following warning in this case:
WARNING: ... drivers/iommu/iova.c:344 iova_cache_put+0x58/0x70

So we must make sure the iova_cache_put() is invoked only if the
iova_cache_get() is already invoked. Let's fix it together.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47555" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix underflow for the real_dev refcnt

Inject error before dev_hold(real_dev) in register_vlan_dev(),
and execute the following testcase:

ip link add dev dummy1 type dummy
ip link add name dummy1.100 link dummy1 type vlan id 100
ip link del dev dummy1

When the dummy netdevice is removed, we will get a WARNING as following:

=======================================================================
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 2 PID: 0 at lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0

and an endless loop of:

=======================================================================
unregister_netdevice: waiting for dummy1 to become free. Usage count = -1073741824

That is because dev_put(real_dev) in vlan_dev_free() be called without
dev_hold(real_dev) in register_vlan_dev(). It makes the refcnt of real_dev
underflow.

Move the dev_hold(real_dev) to vlan_dev_init() which is the call-back of
ndo_init(). That makes dev_hold() and dev_put() for vlan's real_dev
symmetrical.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()

ethtool_set_coalesce() now uses both the .get_coalesce() and
.set_coalesce() callbacks. But the check for their availability is
buggy, so changing the coalesce settings on a device where the driver
provides only _one_ of the callbacks results in a NULL pointer
dereference instead of an -EOPNOTSUPP.

Fix the condition so that the availability of both callbacks is
ensured. This also matches the netlink code.

Note that reproducing this requires some effort - it only affects the
legacy ioctl path, and needs a specific combination of driver options:
- have .get_coalesce() and .coalesce_supported but no
 .set_coalesce(), or
- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn't
  cause the crash as it first attempts to call ethtool_get_coalesce()
  and bails out on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47557" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_ets: don't peek at classes beyond 'nbands'

when the number of DRR classes decreases, the round-robin active list can
contain elements that have already been freed in ets_qdisc_change(). As a
consequence, it's possible to see a NULL dereference crash, caused by the
attempt to call cl-&gt;qdisc-&gt;ops-&gt;peek(cl-&gt;qdisc) when cl-&gt;qdisc is NULL:

 BUG: kernel NULL pointer dereference, address: 0000000000000018
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 1 PID: 910 Comm: mausezahn Not tainted 5.16.0-rc1+ #475
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 RIP: 0010:ets_qdisc_dequeue+0x129/0x2c0 [sch_ets]
 Code: c5 01 41 39 ad e4 02 00 00 0f 87 18 ff ff ff 49 8b 85 c0 02 00 00 49 39 c4 0f 84 ba 00 00 00 49 8b ad c0 02 00 00 48 8b 7d 10 &lt;48&gt; 8b 47 18 48 8b 40 38 0f ae e8 ff d0 48 89 c3 48 85 c0 0f 84 9d
 RSP: 0000:ffffbb36c0b5fdd8 EFLAGS: 00010287
 RAX: ffff956678efed30 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: ffffffff9b938dc9 RDI: 0000000000000000
 RBP: ffff956678efed30 R08: e2f3207fe360129c R09: 0000000000000000
 R10: 0000000000000001 R11: 0000000000000001 R12: ffff956678efeac0
 R13: ffff956678efe800 R14: ffff956611545000 R15: ffff95667ac8f100
 FS:  00007f2aa9120740(0000) GS:ffff95667b800000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000018 CR3: 000000011070c000 CR4: 0000000000350ee0
 Call Trace:
  &lt;TASK&gt;
  qdisc_peek_dequeued+0x29/0x70 [sch_ets]
  tbf_dequeue+0x22/0x260 [sch_tbf]
  __qdisc_run+0x7f/0x630
  net_tx_action+0x290/0x4c0
  __do_softirq+0xee/0x4f8
  irq_exit_rcu+0xf4/0x130
  sysvec_apic_timer_interrupt+0x52/0xc0
  asm_sysvec_apic_timer_interrupt+0x12/0x20
 RIP: 0033:0x7f2aa7fc9ad4
 Code: b9 ff ff 48 8b 54 24 18 48 83 c4 08 48 89 ee 48 89 df 5b 5d e9 ed fc ff ff 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa &lt;53&gt; 48 83 ec 10 48 8b 05 10 64 33 00 48 8b 00 48 85 c0 0f 85 84 00
 RSP: 002b:00007ffe5d33fab8 EFLAGS: 00000202
 RAX: 0000000000000002 RBX: 0000561f72c31460 RCX: 0000561f72c31720
 RDX: 0000000000000002 RSI: 0000561f72c31722 RDI: 0000561f72c31720
 RBP: 000000000000002a R08: 00007ffe5d33fa40 R09: 0000000000000014
 R10: 0000000000000000 R11: 0000000000000246 R12: 0000561f7187e380
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000561f72c31460
  &lt;/TASK&gt;
 Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt intel_rapl_msr iTCO_vendor_support intel_rapl_common joydev virtio_balloon lpc_ich i2c_i801 i2c_smbus pcspkr ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel ahci libahci ghash_clmulni_intel serio_raw libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod
 CR2: 0000000000000018

Ensuring that 'alist' was never zeroed [1] was not sufficient, we need to
remove from the active list those elements that are no more SP nor DRR.

[1] https://lore.kernel.org/netdev/60d274838bf09777f0371253416e8af71360bc08.1633609148.git.dcaratti@redhat.com/

v3: fix race between ets_qdisc_change() and ets_qdisc_dequeue() delisting
    DRR classes beyond 'nbands' in ets_qdisc_change() with the qdisc lock
    acquired, thanks to Cong Wang.

v2: when a NULL qdisc is found in the DRR active list, try to dequeue skb
    from the next list item.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47558" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Disable Tx queues when reconfiguring the interface

The Tx queues were not disabled in situations where the driver needed to
stop the interface to apply a new configuration. This could result in a
kernel panic when doing any of the 3 following actions:
* reconfiguring the number of queues (ethtool -L)
* reconfiguring the size of the ring buffers (ethtool -G)
* installing/removing an XDP program (ip l set dev ethX xdp)

Prevent the panic by making sure netif_tx_disable is called when stopping
an interface.

Without this patch, the following kernel panic can be observed when doing
any of the actions above:

Unable to handle kernel paging request at virtual address ffff80001238d040
[....]
 Call trace:
  dwmac4_set_addr+0x8/0x10
  dev_hard_start_xmit+0xe4/0x1ac
  sch_direct_xmit+0xe8/0x39c
  __dev_queue_xmit+0x3ec/0xaf0
  dev_queue_xmit+0x14/0x20
[...]
[ end trace 0000000000000002 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47559" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()

Coverity reports a possible NULL dereferencing problem:

in smc_vlan_by_tcpsk():
6. returned_null: netdev_lower_get_next returns NULL (checked 29 out of 30 times).
7. var_assigned: Assigning: ndev = NULL return value from netdev_lower_get_next.
1623                ndev = (struct net_device *)netdev_lower_get_next(ndev, &amp;lower);
CID 1468509 (#1 of 1): Dereference null return value (NULL_RETURNS)
8. dereference: Dereferencing a pointer that might be NULL ndev when calling is_vlan_dev.
1624                if (is_vlan_dev(ndev)) {

Remove the manual implementation and use netdev_walk_all_lower_dev() to
iterate over the lower devices. While on it remove an obsolete function
parameter comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum: Protect driver from buggy firmware

When processing port up/down events generated by the device's firmware,
the driver protects itself from events reported for non-existent local
ports, but not the CPU port (local port 0), which exists, but lacks a
netdev.

This can result in a NULL pointer dereference when calling
netif_carrier_{on,off}().

Fix this by bailing early when processing an event reported for the CPU
port. Problem was only observed when running on top of a buggy emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47561" ref_url="https://www.suse.com/security/cve/CVE-2021-47561" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: virtio: disable timeout handling

If a timeout is hit, it can result is incorrect data on the I2C bus
and/or memory corruptions in the guest since the device can still be
operating on the buffers it was given while the guest has freed them.

Here is, for example, the start of a slub_debug splat which was
triggered on the next transfer after one transfer was forced to timeout
by setting a breakpoint in the backend (rust-vmm/vhost-device):

 BUG kmalloc-1k (Not tainted): Poison overwritten
 First byte 0x1 instead of 0x6b
 Allocated in virtio_i2c_xfer+0x65/0x35c age=350 cpu=0 pid=29
 	__kmalloc+0xc2/0x1c9
 	virtio_i2c_xfer+0x65/0x35c
 	__i2c_transfer+0x429/0x57d
 	i2c_transfer+0x115/0x134
 	i2cdev_ioctl_rdwr+0x16a/0x1de
 	i2cdev_ioctl+0x247/0x2ed
 	vfs_ioctl+0x21/0x30
 	sys_ioctl+0xb18/0xb41
 Freed in virtio_i2c_xfer+0x32e/0x35c age=244 cpu=0 pid=29
 	kfree+0x1bd/0x1cc
 	virtio_i2c_xfer+0x32e/0x35c
 	__i2c_transfer+0x429/0x57d
 	i2c_transfer+0x115/0x134
 	i2cdev_ioctl_rdwr+0x16a/0x1de
 	i2cdev_ioctl+0x247/0x2ed
 	vfs_ioctl+0x21/0x30
 	sys_ioctl+0xb18/0xb41

There is no simple fix for this (the driver would have to always create
bounce buffers and hold on to them until the device eventually returns
the buffers), so just disable the timeout support for now.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47561/">CVE-2021-47561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47561">CVE-2021-47561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225496">SUSE bug 1225496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227701">SUSE bug 1227701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47562" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix vsi-&gt;txq_map sizing

The approach of having XDP queue per CPU regardless of user's setting
exposed a hidden bug that could occur in case when Rx queue count differ
from Tx queue count. Currently vsi-&gt;txq_map's size is equal to the
doubled vsi-&gt;alloc_txq, which is not correct due to the fact that XDP
rings were previously based on the Rx queue count. Below splat can be
seen when ethtool -L is used and XDP rings are configured:

[  682.875339] BUG: kernel NULL pointer dereference, address: 000000000000000f
[  682.883403] #PF: supervisor read access in kernel mode
[  682.889345] #PF: error_code(0x0000) - not-present page
[  682.895289] PGD 0 P4D 0
[  682.898218] Oops: 0000 [#1] PREEMPT SMP PTI
[  682.903055] CPU: 42 PID: 2878 Comm: ethtool Tainted: G           OE     5.15.0-rc5+ #1
[  682.912214] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016
[  682.923380] RIP: 0010:devres_remove+0x44/0x130
[  682.928527] Code: 49 89 f4 55 48 89 fd 4c 89 ff 53 48 83 ec 10 e8 92 b9 49 00 48 8b 9d a8 02 00 00 48 8d 8d a0 02 00 00 49 89 c2 48 39 cb 74 0f &lt;4c&gt; 3b 63 10 74 25 48 8b 5b 08 48 39 cb 75 f1 4c 89 ff 4c 89 d6 e8
[  682.950237] RSP: 0018:ffffc90006a679f0 EFLAGS: 00010002
[  682.956285] RAX: 0000000000000286 RBX: ffffffffffffffff RCX: ffff88908343a370
[  682.964538] RDX: 0000000000000001 RSI: ffffffff81690d60 RDI: 0000000000000000
[  682.972789] RBP: ffff88908343a0d0 R08: 0000000000000000 R09: 0000000000000000
[  682.981040] R10: 0000000000000286 R11: 3fffffffffffffff R12: ffffffff81690d60
[  682.989282] R13: ffffffff81690a00 R14: ffff8890819807a8 R15: ffff88908343a36c
[  682.997535] FS:  00007f08c7bfa740(0000) GS:ffff88a03fd00000(0000) knlGS:0000000000000000
[  683.006910] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  683.013557] CR2: 000000000000000f CR3: 0000001080a66003 CR4: 00000000003706e0
[  683.021819] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  683.030075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  683.038336] Call Trace:
[  683.041167]  devm_kfree+0x33/0x50
[  683.045004]  ice_vsi_free_arrays+0x5e/0xc0 [ice]
[  683.050380]  ice_vsi_rebuild+0x4c8/0x750 [ice]
[  683.055543]  ice_vsi_recfg_qs+0x9a/0x110 [ice]
[  683.060697]  ice_set_channels+0x14f/0x290 [ice]
[  683.065962]  ethnl_set_channels+0x333/0x3f0
[  683.070807]  genl_family_rcv_msg_doit+0xea/0x150
[  683.076152]  genl_rcv_msg+0xde/0x1d0
[  683.080289]  ? channels_prepare_data+0x60/0x60
[  683.085432]  ? genl_get_cmd+0xd0/0xd0
[  683.089667]  netlink_rcv_skb+0x50/0xf0
[  683.094006]  genl_rcv+0x24/0x40
[  683.097638]  netlink_unicast+0x239/0x340
[  683.102177]  netlink_sendmsg+0x22e/0x470
[  683.106717]  sock_sendmsg+0x5e/0x60
[  683.110756]  __sys_sendto+0xee/0x150
[  683.114894]  ? handle_mm_fault+0xd0/0x2a0
[  683.119535]  ? do_user_addr_fault+0x1f3/0x690
[  683.134173]  __x64_sys_sendto+0x25/0x30
[  683.148231]  do_syscall_64+0x3b/0xc0
[  683.161992]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Fix this by taking into account the value that num_possible_cpus()
yields in addition to vsi-&gt;alloc_txq instead of doubling the latter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47563" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: avoid bpf_prog refcount underflow

Ice driver has the routines for managing XDP resources that are shared
between ndo_bpf op and VSI rebuild flow. The latter takes place for
example when user changes queue count on an interface via ethtool's
set_channels().

There is an issue around the bpf_prog refcounting when VSI is being
rebuilt - since ice_prepare_xdp_rings() is called with vsi-&gt;xdp_prog as
an argument that is used later on by ice_vsi_assign_bpf_prog(), same
bpf_prog pointers are swapped with each other. Then it is also
interpreted as an 'old_prog' which in turn causes us to call
bpf_prog_put on it that will decrement its refcount.

Below splat can be interpreted in a way that due to zero refcount of a
bpf_prog it is wiped out from the system while kernel still tries to
refer to it:

[  481.069429] BUG: unable to handle page fault for address: ffffc9000640f038
[  481.077390] #PF: supervisor read access in kernel mode
[  481.083335] #PF: error_code(0x0000) - not-present page
[  481.089276] PGD 100000067 P4D 100000067 PUD 1001cb067 PMD 106d2b067 PTE 0
[  481.097141] Oops: 0000 [#1] PREEMPT SMP PTI
[  481.101980] CPU: 12 PID: 3339 Comm: sudo Tainted: G           OE     5.15.0-rc5+ #1
[  481.110840] Hardware name: Intel Corp. GRANTLEY/GRANTLEY, BIOS GRRFCRB1.86B.0276.D07.1605190235 05/19/2016
[  481.122021] RIP: 0010:dev_xdp_prog_id+0x25/0x40
[  481.127265] Code: 80 00 00 00 00 0f 1f 44 00 00 89 f6 48 c1 e6 04 48 01 fe 48 8b 86 98 08 00 00 48 85 c0 74 13 48 8b 50 18 31 c0 48 85 d2 74 07 &lt;48&gt; 8b 42 38 8b 40 20 c3 48 8b 96 90 08 00 00 eb e8 66 2e 0f 1f 84
[  481.148991] RSP: 0018:ffffc90007b63868 EFLAGS: 00010286
[  481.155034] RAX: 0000000000000000 RBX: ffff889080824000 RCX: 0000000000000000
[  481.163278] RDX: ffffc9000640f000 RSI: ffff889080824010 RDI: ffff889080824000
[  481.171527] RBP: ffff888107af7d00 R08: 0000000000000000 R09: ffff88810db5f6e0
[  481.179776] R10: 0000000000000000 R11: ffff8890885b9988 R12: ffff88810db5f4bc
[  481.188026] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  481.196276] FS:  00007f5466d5bec0(0000) GS:ffff88903fb00000(0000) knlGS:0000000000000000
[  481.205633] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  481.212279] CR2: ffffc9000640f038 CR3: 000000014429c006 CR4: 00000000003706e0
[  481.220530] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  481.228771] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  481.237029] Call Trace:
[  481.239856]  rtnl_fill_ifinfo+0x768/0x12e0
[  481.244602]  rtnl_dump_ifinfo+0x525/0x650
[  481.249246]  ? __alloc_skb+0xa5/0x280
[  481.253484]  netlink_dump+0x168/0x3c0
[  481.257725]  netlink_recvmsg+0x21e/0x3e0
[  481.262263]  ____sys_recvmsg+0x87/0x170
[  481.266707]  ? __might_fault+0x20/0x30
[  481.271046]  ? _copy_from_user+0x66/0xa0
[  481.275591]  ? iovec_from_user+0xf6/0x1c0
[  481.280226]  ___sys_recvmsg+0x82/0x100
[  481.284566]  ? sock_sendmsg+0x5e/0x60
[  481.288791]  ? __sys_sendto+0xee/0x150
[  481.293129]  __sys_recvmsg+0x56/0xa0
[  481.297267]  do_syscall_64+0x3b/0xc0
[  481.301395]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  481.307238] RIP: 0033:0x7f5466f39617
[  481.311373] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb bd 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2f 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[  481.342944] RSP: 002b:00007ffedc7f4308 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
[  481.361783] RAX: ffffffffffffffda RBX: 00007ffedc7f5460 RCX: 00007f5466f39617
[  481.380278] RDX: 0000000000000000 RSI: 00007ffedc7f5360 RDI: 0000000000000003
[  481.398500] RBP: 00007ffedc7f53f0 R08: 0000000000000000 R09: 000055d556f04d50
[  481.416463] R10: 0000000000000077 R11: 0000000000000246 R12: 00007ffedc7f5360
[  481.434131] R13: 00007ffedc7f5350 R14: 00007ffedc7f5344 R15: 0000000000000e98
[  481.451520] Modules linked in: ice
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227695">SUSE bug 1227695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47564" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: fix double free issue on err path

fix error path handling in prestera_bridge_port_join() that
cases prestera driver to crash (see below).

 Trace:
   Internal error: Oops: 96000044 [#1] SMP
   Modules linked in: prestera_pci prestera uio_pdrv_genirq
   CPU: 1 PID: 881 Comm: ip Not tainted 5.15.0 #1
   pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
   pc : prestera_bridge_destroy+0x2c/0xb0 [prestera]
   lr : prestera_bridge_port_join+0x2cc/0x350 [prestera]
   sp : ffff800011a1b0f0
   ...
   x2 : ffff000109ca6c80 x1 : dead000000000100 x0 : dead000000000122
    Call trace:
   prestera_bridge_destroy+0x2c/0xb0 [prestera]
   prestera_bridge_port_join+0x2cc/0x350 [prestera]
   prestera_netdev_port_event.constprop.0+0x3c4/0x450 [prestera]
   prestera_netdev_event_handler+0xf4/0x110 [prestera]
   raw_notifier_call_chain+0x54/0x80
   call_netdevice_notifiers_info+0x54/0xa0
   __netdev_upper_dev_link+0x19c/0x380
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47565" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix kernel panic during drive powercycle test

While looping over shost's sdev list it is possible that one
of the drives is getting removed and its sas_target object is
freed but its sdev object remains intact.

Consequently, a kernel panic can occur while the driver is trying to access
the sas_address field of sas_target object without also checking the
sas_target object for NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47566" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47566" ref_url="https://www.suse.com/security/cve/CVE-2021-47566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

proc/vmcore: fix clearing user buffer by properly using clear_user()

To clear a user buffer we cannot simply use memset, we have to use
clear_user().  With a virtio-mem device that registers a vmcore_cb and
has some logically unplugged memory inside an added Linux memory block,
I can easily trigger a BUG by copying the vmcore via "cp":

  systemd[1]: Starting Kdump Vmcore Save Service...
  kdump[420]: Kdump is using the default log level(3).
  kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/
  kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/
  kdump[465]: saving vmcore-dmesg.txt complete
  kdump[467]: saving vmcore
  BUG: unable to handle page fault for address: 00007f2374e01000
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0003) - permissions violation
  PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867
  Oops: 0003 [#1] PREEMPT SMP NOPTI
  CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014
  RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86
  Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 &lt;49&gt; c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81
  RSP: 0018:ffffc9000073be08 EFLAGS: 00010212
  RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000
  RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008
  RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50
  R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000
  R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8
  FS:  00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0
  Call Trace:
   read_vmcore+0x236/0x2c0
   proc_reg_read+0x55/0xa0
   vfs_read+0x95/0x190
   ksys_read+0x4f/0xc0
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Some x86-64 CPUs have a CPU feature called "Supervisor Mode Access
Prevention (SMAP)", which is used to detect wrong access from the kernel
to user buffers like this: SMAP triggers a permissions violation on
wrong access.  In the x86-64 variant of clear_user(), SMAP is properly
handled via clac()+stac().

To fix, properly use clear_user() when we're dealing with a user buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47566/">CVE-2021-47566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47566">CVE-2021-47566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225514">SUSE bug 1225514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47567" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47567" ref_url="https://www.suse.com/security/cve/CVE-2021-47567" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/32: Fix hardlockup on vmap stack overflow

Since the commit c118c7303ad5 ("powerpc/32: Fix vmap stack - Do not
activate MMU before reading task struct") a vmap stack overflow
results in a hard lockup. This is because emergency_ctx is still
addressed with its virtual address allthough data MMU is not active
anymore at that time.

Fix it by using a physical address instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-05-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47567/">CVE-2021-47567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47567">CVE-2021-47567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225399">SUSE bug 1225399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47568" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47568" ref_url="https://www.suse.com/security/cve/CVE-2021-47568" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix memleak in get_file_stream_info()

Fix memleak in get_file_stream_info()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47568/">CVE-2021-47568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47568">CVE-2021-47568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225395">SUSE bug 1225395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47569" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47569" ref_url="https://www.suse.com/security/cve/CVE-2021-47569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fail cancellation for EXITING tasks

WARNING: CPU: 1 PID: 20 at fs/io_uring.c:6269 io_try_cancel_userdata+0x3c5/0x640 fs/io_uring.c:6269
CPU: 1 PID: 20 Comm: kworker/1:0 Not tainted 5.16.0-rc1-syzkaller #0
Workqueue: events io_fallback_req_func
RIP: 0010:io_try_cancel_userdata+0x3c5/0x640 fs/io_uring.c:6269
Call Trace:
 &lt;TASK&gt;
 io_req_task_link_timeout+0x6b/0x1e0 fs/io_uring.c:6886
 io_fallback_req_func+0xf9/0x1ae fs/io_uring.c:1334
 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298
 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445
 kthread+0x405/0x4f0 kernel/kthread.c:327
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 &lt;/TASK&gt;

We need original task's context to do cancellations, so if it's dying
and the callback is executed in a fallback mode, fail the cancellation
attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47569/">CVE-2021-47569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47569">CVE-2021-47569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225515">SUSE bug 1225515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47570" ref_url="https://www.suse.com/security/cve/CVE-2021-47570" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: r8188eu: fix a memory leak in rtw_wx_read32()

Free "ptmp" before returning -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47570/">CVE-2021-47570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47570">CVE-2021-47570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225516">SUSE bug 1225516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47571" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()

The free_rtllib() function frees the "dev" pointer so there is use
after free on the next line.  Re-arrange things to avoid that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227551">SUSE bug 1227551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: fix null pointer dereference when IPv6 is not enabled

When we try to add an IPv6 nexthop and IPv6 is not enabled
(!CONFIG_IPV6) we'll hit a NULL pointer dereference[1] in the error path
of nh_create_ipv6() due to calling ipv6_stub-&gt;fib6_nh_release. The bug
has been present since the beginning of IPv6 nexthop gateway support.
Commit 1aefd3de7bc6 ("ipv6: Add fib6_nh_init and release to stubs") tells
us that only fib6_nh_init has a dummy stub because fib6_nh_release should
not be called if fib6_nh_init returns an error, but the commit below added
a call to ipv6_stub-&gt;fib6_nh_release in its error path. To fix it return
the dummy stub's -EAFNOSUPPORT error directly without calling
ipv6_stub-&gt;fib6_nh_release in nh_create_ipv6()'s error path.

[1]
 Output is a bit truncated, but it clearly shows the error.
 BUG: kernel NULL pointer dereference, address: 000000000000000000
 #PF: supervisor instruction fetch in kernel modede
 #PF: error_code(0x0010) - not-present pagege
 PGD 0 P4D 0
 Oops: 0010 [#1] PREEMPT SMP NOPTI
 CPU: 4 PID: 638 Comm: ip Kdump: loaded Not tainted 5.16.0-rc1+ #446
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:0x0
 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
 RSP: 0018:ffff888109f5b8f0 EFLAGS: 00010286^Ac
 RAX: 0000000000000000 RBX: ffff888109f5ba28 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881008a2860
 RBP: ffff888109f5b9d8 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff888109f5b978 R11: ffff888109f5b948 R12: 00000000ffffff9f
 R13: ffff8881008a2a80 R14: ffff8881008a2860 R15: ffff8881008a2840
 FS:  00007f98de70f100(0000) GS:ffff88822bf00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffffffffffd6 CR3: 0000000100efc000 CR4: 00000000000006e0
 Call Trace:
  &lt;TASK&gt;
  nh_create_ipv6+0xed/0x10c
  rtm_new_nexthop+0x6d7/0x13f3
  ? check_preemption_disabled+0x3d/0xf2
  ? lock_is_held_type+0xbe/0xfd
  rtnetlink_rcv_msg+0x23f/0x26a
  ? check_preemption_disabled+0x3d/0xf2
  ? rtnl_calcit.isra.0+0x147/0x147
  netlink_rcv_skb+0x61/0xb2
  netlink_unicast+0x100/0x187
  netlink_sendmsg+0x37f/0x3a0
  ? netlink_unicast+0x187/0x187
  sock_sendmsg_nosec+0x67/0x9b
  ____sys_sendmsg+0x19d/0x1f9
  ? copy_msghdr_from_user+0x4c/0x5e
  ? rcu_read_lock_any_held+0x2a/0x78
  ___sys_sendmsg+0x6c/0x8c
  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
  ? lockdep_hardirqs_on+0xd9/0x102
  ? sockfd_lookup_light+0x69/0x99
  __sys_sendmsg+0x50/0x6e
  do_syscall_64+0xcb/0xf2
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f98dea28914
 Code: 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 48 8d 05 e9 5d 0c 00 8b 00 85 c0 75 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 41 54 41 89 d4 55 48 89 f5 53
 RSP: 002b:00007fff859f5e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e2e
 RAX: ffffffffffffffda RBX: 00000000619cb810 RCX: 00007f98dea28914
 RDX: 0000000000000000 RSI: 00007fff859f5ed0 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000008
 R10: fffffffffffffce6 R11: 0000000000000246 R12: 0000000000000001
 R13: 000055c0097ae520 R14: 000055c0097957fd R15: 00007fff859f63a0
 &lt;/TASK&gt;
 Modules linked in: bridge stp llc bonding virtio_net
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225389">SUSE bug 1225389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47576" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()

In resp_mode_select() sanity check the block descriptor len to avoid UAF.

BUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509
Read of size 1 at addr ffff888026670f50 by task scsicmd/15032

CPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443
 __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306
 resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509
 schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483
 scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537
 scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50
 entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47577" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47577" ref_url="https://www.suse.com/security/cve/CVE-2021-47577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io-wq: check for wq exit after adding new worker task_work

We check IO_WQ_BIT_EXIT before attempting to create a new worker, and
wq exit cancels pending work if we have any. But it's possible to have
a race between the two, where creation checks exit finding it not set,
but we're in the process of exiting. The exit side will cancel pending
creation task_work, but there's a gap where we add task_work after we've
canceled existing creations at exit time.

Fix this by checking the EXIT bit post adding the creation task_work.
If it's set, run the same cancelation that exit does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47577/">CVE-2021-47577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47577">CVE-2021-47577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226538">SUSE bug 1226538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Don't call kcalloc() if size arg is zero

If the size arg to kcalloc() is zero, it returns ZERO_SIZE_PTR.  Because of
that, for a following NULL pointer check to work on the returned pointer,
kcalloc() must not be called with the size arg equal to zero. Return early
without error before the kcalloc() call if size arg is zero.

BUG: KASAN: null-ptr-deref in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: null-ptr-deref in sg_copy_buffer+0x138/0x240 lib/scatterlist.c:974
Write of size 4 at addr 0000000000000010 by task syz-executor.1/22789

CPU: 1 PID: 22789 Comm: syz-executor.1 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 __kasan_report mm/kasan/report.c:446 [inline]
 kasan_report.cold.14+0x112/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x3b/0x60 mm/kasan/shadow.c:66
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x138/0x240 lib/scatterlist.c:974
 do_dout_fetch drivers/scsi/scsi_debug.c:2954 [inline]
 do_dout_fetch drivers/scsi/scsi_debug.c:2946 [inline]
 resp_verify+0x49e/0x930 drivers/scsi/scsi_debug.c:4276
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 blk_execute_rq+0xdb/0x360 block/blk-exec.c:102
 sg_scsi_ioctl drivers/scsi/scsi_ioctl.c:621 [inline]
 scsi_ioctl+0x8bb/0x15c0 drivers/scsi/scsi_ioctl.c:930
 sg_ioctl_common+0x172d/0x2710 drivers/scsi/sg.c:1112
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47579" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47579" ref_url="https://www.suse.com/security/cve/CVE-2021-47579" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix warning in ovl_create_real()

Syzbot triggered the following warning in ovl_workdir_create() -&gt;
ovl_create_real():

	if (!err &amp;&amp; WARN_ON(!newdentry-&gt;d_inode)) {

The reason is that the cgroup2 filesystem returns from mkdir without
instantiating the new dentry.

Weird filesystems such as this will be rejected by overlayfs at a later
stage during setup, but to prevent such a warning, call ovl_mkdir_real()
directly from ovl_workdir_create() and reject this case early.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-06-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47579/">CVE-2021-47579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47579">CVE-2021-47579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226540">SUSE bug 1226540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix type in min_t to avoid stack OOB

Change min_t() to use type "u32" instead of type "int" to avoid stack out
of bounds. With min_t() type "int" the values get sign extended and the
larger value gets used causing stack out of bounds.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
Read of size 127 at addr ffff888072607128 by task syz-executor.7/18707

CPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x23/0x60 mm/kasan/shadow.c:65
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
 sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000
 fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162
 fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]
 resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227611">SUSE bug 1227611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47581" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47581" ref_url="https://www.suse.com/security/cve/CVE-2021-47581" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-47581/">CVE-2021-47581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47581">CVE-2021-47581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226573">SUSE bug 1226573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47582" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Make do_proc_control() and do_proc_bulk() killable

The USBDEVFS_CONTROL and USBDEVFS_BULK ioctls invoke
usb_start_wait_urb(), which contains an uninterruptible wait with a
user-specified timeout value.  If timeout value is very large and the
device being accessed does not respond in a reasonable amount of time,
the kernel will complain about "Task X blocked for more than N
seconds", as found in testing by syzbot:

INFO: task syz-executor.0:8700 blocked for more than 143 seconds.
      Not tainted 5.14.0-rc7-syzkaller #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.0  state:D stack:23192 pid: 8700 ppid:  8455 flags:0x00004004
Call Trace:
 context_switch kernel/sched/core.c:4681 [inline]
 __schedule+0xc07/0x11f0 kernel/sched/core.c:5938
 schedule+0x14b/0x210 kernel/sched/core.c:6017
 schedule_timeout+0x98/0x2f0 kernel/time/timer.c:1857
 do_wait_for_common+0x2da/0x480 kernel/sched/completion.c:85
 __wait_for_common kernel/sched/completion.c:106 [inline]
 wait_for_common kernel/sched/completion.c:117 [inline]
 wait_for_completion_timeout+0x46/0x60 kernel/sched/completion.c:157
 usb_start_wait_urb+0x167/0x550 drivers/usb/core/message.c:63
 do_proc_bulk+0x978/0x1080 drivers/usb/core/devio.c:1236
 proc_bulk drivers/usb/core/devio.c:1273 [inline]
 usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline]
 usbdev_ioctl+0x3441/0x6b10 drivers/usb/core/devio.c:2713
...

To fix this problem, this patch replaces usbfs's calls to
usb_control_msg() and usb_bulk_msg() with special-purpose code that
does essentially the same thing (as recommended in the comment for
usb_start_wait_urb()), except that it always uses a killable wait and
it uses GFP_KERNEL rather than GFP_NOIO.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47583" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mxl111sf: change mutex_init() location

Syzbot reported, that mxl111sf_ctrl_msg() uses uninitialized
mutex. The problem was in wrong mutex_init() location.

Previous mutex_init(&amp;state-&gt;msg_lock) call was in -&gt;init() function, but
dvb_usbv2_init() has this order of calls:

	dvb_usbv2_init()
	  dvb_usbv2_adapter_init()
	    dvb_usbv2_adapter_frontend_init()
	      props-&gt;frontend_attach()

	  props-&gt;init()

Since mxl111sf_* devices call mxl111sf_ctrl_msg() in -&gt;frontend_attach()
internally we need to initialize state-&gt;msg_lock before
frontend_attach(). To achieve it, -&gt;probe() call added to all mxl111sf_*
devices, which will simply initiaize mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47584" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iocost: Fix divide-by-zero on donation from low hweight cgroup

The donation calculation logic assumes that the donor has non-zero
after-donation hweight, so the lowest active hweight a donating cgroup can
have is 2 so that it can donate 1 while keeping the other 1 for itself.
Earlier, we only donated from cgroups with sizable surpluses so this
condition was always true. However, with the precise donation algorithm
implemented, f1de2439ec43 ("blk-iocost: revamp donation amount
determination") made the donation amount calculation exact enabling even low
hweight cgroups to donate.

This means that in rare occasions, a cgroup with active hweight of 1 can
enter donation calculation triggering the following warning and then a
divide-by-zero oops.

 WARNING: CPU: 4 PID: 0 at block/blk-iocost.c:1928 transfer_surpluses.cold+0x0/0x53 [884/94867]
 ...
 RIP: 0010:transfer_surpluses.cold+0x0/0x53
 Code: 92 ff 48 c7 c7 28 d1 ab b5 65 48 8b 34 25 00 ae 01 00 48 81 c6 90 06 00 00 e8 8b 3f fe ff 48 c7 c0 ea ff ff ff e9 95 ff 92 ff &lt;0f&gt; 0b 48 c7 c7 30 da ab b5 e8 71 3f fe ff 4c 89 e8 4d 85 ed 74 0
4
 ...
 Call Trace:
  &lt;IRQ&gt;
  ioc_timer_fn+0x1043/0x1390
  call_timer_fn+0xa1/0x2c0
  __run_timers.part.0+0x1ec/0x2e0
  run_timer_softirq+0x35/0x70
 ...
 iocg: invalid donation weights in /a/b: active=1 donating=1 after=0

Fix it by excluding cgroups w/ active hweight &lt; 2 from donating. Excluding
these extreme low hweight donations shouldn't affect work conservation in
any meaningful way.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47585" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leak in __add_inode_ref()

Line 1169 (#3) allocates a memory chunk for victim_name by kmalloc(),
but  when the function returns in line 1184 (#4) victim_name allocated
by line 1169 (#3) is not freed, which will lead to a memory leak.
There is a similar snippet of code in this function as allocating a memory
chunk for victim_name in line 1104 (#1) as well as releasing the memory
in line 1116 (#2).

We should kfree() victim_name when the return value of backref_in_log()
is less than zero and before the function returns in line 1184 (#4).

1057 static inline int __add_inode_ref(struct btrfs_trans_handle *trans,
1058 				  struct btrfs_root *root,
1059 				  struct btrfs_path *path,
1060 				  struct btrfs_root *log_root,
1061 				  struct btrfs_inode *dir,
1062 				  struct btrfs_inode *inode,
1063 				  u64 inode_objectid, u64 parent_objectid,
1064 				  u64 ref_index, char *name, int namelen,
1065 				  int *search_done)
1066 {

1104 	victim_name = kmalloc(victim_name_len, GFP_NOFS);
	// #1: kmalloc (victim_name-1)
1105 	if (!victim_name)
1106 		return -ENOMEM;

1112	ret = backref_in_log(log_root, &amp;search_key,
1113			parent_objectid, victim_name,
1114			victim_name_len);
1115	if (ret &lt; 0) {
1116		kfree(victim_name); // #2: kfree (victim_name-1)
1117		return ret;
1118	} else if (!ret) {

1169 	victim_name = kmalloc(victim_name_len, GFP_NOFS);
	// #3: kmalloc (victim_name-2)
1170 	if (!victim_name)
1171 		return -ENOMEM;

1180 	ret = backref_in_log(log_root, &amp;search_key,
1181 			parent_objectid, victim_name,
1182 			victim_name_len);
1183 	if (ret &lt; 0) {
1184 		return ret; // #4: missing kfree (victim_name-2)
1185 	} else if (!ret) {

1241 	return 0;
1242 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47586" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup

KASAN reports an out-of-bounds read in rk_gmac_setup on the line:

	while (ops-&gt;regs[i]) {

This happens for most platforms since the regs flexible array member is
empty, so the memory after the ops structure is being read here.  It
seems that mostly this happens to contain zero anyway, so we get lucky
and everything still works.

To avoid adding redundant data to nearly all the ops structures, add a
new flag to indicate whether the regs field is valid and avoid this loop
when it is not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47587" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: systemport: Add global locking for descriptor lifecycle

The descriptor list is a shared resource across all of the transmit queues, and
the locking mechanism used today only protects concurrency across a given
transmit queue between the transmit and reclaiming. This creates an opportunity
for the SYSTEMPORT hardware to work on corrupted descriptors if we have
multiple producers at once which is the case when using multiple transmit
queues.

This was particularly noticeable when using multiple flows/transmit queues and
it showed up in interesting ways in that UDP packets would get a correct UDP
header checksum being calculated over an incorrect packet length. Similarly TCP
packets would get an equally correct checksum computed by the hardware over an
incorrect packet length.

The SYSTEMPORT hardware maintains an internal descriptor list that it re-arranges
when the driver produces a new descriptor anytime it writes to the
WRITE_PORT_{HI,LO} registers, there is however some delay in the hardware to
re-organize its descriptors and it is possible that concurrent TX queues
eventually break this internal allocation scheme to the point where the
length/status part of the descriptor gets used for an incorrect data buffer.

The fix is to impose a global serialization for all TX queues in the short
section where we are writing to the WRITE_PORT_{HI,LO} registers which solves
the corruption even with multiple concurrent TX queues being used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47588" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47588" ref_url="https://www.suse.com/security/cve/CVE-2021-47588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sit: do not call ipip6_dev_free() from sit_init_net()

ipip6_dev_free is sit dev-&gt;priv_destructor, already called
by register_netdevice() if something goes wrong.

Alternative would be to make ipip6_dev_free() robust against
multiple invocations, but other drivers do not implement this
strategy.

syzbot reported:

dst_release underflow
WARNING: CPU: 0 PID: 5059 at net/core/dst.c:173 dst_release+0xd8/0xe0 net/core/dst.c:173
Modules linked in:
CPU: 1 PID: 5059 Comm: syz-executor.4 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:dst_release+0xd8/0xe0 net/core/dst.c:173
Code: 4c 89 f2 89 d9 31 c0 5b 41 5e 5d e9 da d5 44 f9 e8 1d 90 5f f9 c6 05 87 48 c6 05 01 48 c7 c7 80 44 99 8b 31 c0 e8 e8 67 29 f9 &lt;0f&gt; 0b eb 85 0f 1f 40 00 53 48 89 fb e8 f7 8f 5f f9 48 83 c3 a8 48
RSP: 0018:ffffc9000aa5faa0 EFLAGS: 00010246
RAX: d6894a925dd15a00 RBX: 00000000ffffffff RCX: 0000000000040000
RDX: ffffc90005e19000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: 0000000000000000 R08: ffffffff816a1f42 R09: ffffed1017344f2c
R10: ffffed1017344f2c R11: 0000000000000000 R12: 0000607f462b1358
R13: 1ffffffff1bfd305 R14: ffffe8ffffcb1358 R15: dffffc0000000000
FS:  00007f66c71a2700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f88aaed5058 CR3: 0000000023e0f000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dst_cache_destroy+0x107/0x1e0 net/core/dst_cache.c:160
 ipip6_dev_free net/ipv6/sit.c:1414 [inline]
 sit_init_net+0x229/0x550 net/ipv6/sit.c:1936
 ops_init+0x313/0x430 net/core/net_namespace.c:140
 setup_net+0x35b/0x9d0 net/core/net_namespace.c:326
 copy_net_ns+0x359/0x5c0 net/core/net_namespace.c:470
 create_new_namespaces+0x4ce/0xa00 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0x11e/0x180 kernel/nsproxy.c:226
 ksys_unshare+0x57d/0xb50 kernel/fork.c:3075
 __do_sys_unshare kernel/fork.c:3146 [inline]
 __se_sys_unshare kernel/fork.c:3144 [inline]
 __x64_sys_unshare+0x34/0x40 kernel/fork.c:3144
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f66c882ce99
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f66c71a2168 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00007f66c893ff60 RCX: 00007f66c882ce99
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000048040200
RBP: 00007f66c8886ff1 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff6634832f R14: 00007f66c71a2300 R15: 0000000000022000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47588/">CVE-2021-47588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47588">CVE-2021-47588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226568">SUSE bug 1226568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47589" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igbvf: fix double free in `igbvf_probe`

In `igbvf_probe`, if register_netdev() fails, the program will go to
label err_hw_init, and then to label err_ioremap. In free_netdev() which
is just below label err_ioremap, there is `list_for_each_entry_safe` and
`netif_napi_del` which aims to delete all entries in `dev-&gt;napi_list`.
The program has added an entry `adapter-&gt;rx_ring-&gt;napi` which is added by
`netif_napi_add` in igbvf_alloc_queues(). However, adapter-&gt;rx_ring has
been freed below label err_hw_init. So this a UAF.

In terms of how to patch the problem, we can refer to igbvf_remove() and
delete the entry before `adapter-&gt;rx_ring`.

The KASAN logs are as follows:

[   35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450
[   35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366
[   35.128360]
[   35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14
[   35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[   35.131749] Call Trace:
[   35.132199]  dump_stack_lvl+0x59/0x7b
[   35.132865]  print_address_description+0x7c/0x3b0
[   35.133707]  ? free_netdev+0x1fd/0x450
[   35.134378]  __kasan_report+0x160/0x1c0
[   35.135063]  ? free_netdev+0x1fd/0x450
[   35.135738]  kasan_report+0x4b/0x70
[   35.136367]  free_netdev+0x1fd/0x450
[   35.137006]  igbvf_probe+0x121d/0x1a10 [igbvf]
[   35.137808]  ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]
[   35.138751]  local_pci_probe+0x13c/0x1f0
[   35.139461]  pci_device_probe+0x37e/0x6c0
[   35.165526]
[   35.165806] Allocated by task 366:
[   35.166414]  ____kasan_kmalloc+0xc4/0xf0
[   35.167117]  foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]
[   35.168078]  igbvf_probe+0x9c5/0x1a10 [igbvf]
[   35.168866]  local_pci_probe+0x13c/0x1f0
[   35.169565]  pci_device_probe+0x37e/0x6c0
[   35.179713]
[   35.179993] Freed by task 366:
[   35.180539]  kasan_set_track+0x4c/0x80
[   35.181211]  kasan_set_free_info+0x1f/0x40
[   35.181942]  ____kasan_slab_free+0x103/0x140
[   35.182703]  kfree+0xe3/0x250
[   35.183239]  igbvf_probe+0x1173/0x1a10 [igbvf]
[   35.184040]  local_pci_probe+0x13c/0x1f0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47590" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47590" ref_url="https://www.suse.com/security/cve/CVE-2021-47590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix deadlock in __mptcp_push_pending()

__mptcp_push_pending() may call mptcp_flush_join_list() with subflow
socket lock held. If such call hits mptcp_sockopt_sync_all() then
subsequently __mptcp_sockopt_sync() could try to lock the subflow
socket for itself, causing a deadlock.

sysrq: Show Blocked State
task:ss-server       state:D stack:    0 pid:  938 ppid:     1 flags:0x00000000
Call Trace:
 &lt;TASK&gt;
 __schedule+0x2d6/0x10c0
 ? __mod_memcg_state+0x4d/0x70
 ? csum_partial+0xd/0x20
 ? _raw_spin_lock_irqsave+0x26/0x50
 schedule+0x4e/0xc0
 __lock_sock+0x69/0x90
 ? do_wait_intr_irq+0xa0/0xa0
 __lock_sock_fast+0x35/0x50
 mptcp_sockopt_sync_all+0x38/0xc0
 __mptcp_push_pending+0x105/0x200
 mptcp_sendmsg+0x466/0x490
 sock_sendmsg+0x57/0x60
 __sys_sendto+0xf0/0x160
 ? do_wait_intr_irq+0xa0/0xa0
 ? fpregs_restore_userregs+0x12/0xd0
 __x64_sys_sendto+0x20/0x30
 do_syscall_64+0x38/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f9ba546c2d0
RSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0
RDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234
RBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060
R13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8
 &lt;/TASK&gt;

Fix the issue by using __mptcp_flush_join_list() instead of plain
mptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by
Florian. The sockopt sync will be deferred to the workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47590/">CVE-2021-47590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47590">CVE-2021-47590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226565">SUSE bug 1226565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47591" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47591" ref_url="https://www.suse.com/security/cve/CVE-2021-47591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: remove tcp ulp setsockopt support

TCP_ULP setsockopt cannot be used for mptcp because its already
used internally to plumb subflow (tcp) sockets to the mptcp layer.

syzbot managed to trigger a crash for mptcp connections that are
in fallback mode:

KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
CPU: 1 PID: 1083 Comm: syz-executor.3 Not tainted 5.16.0-rc2-syzkaller #0
RIP: 0010:tls_build_proto net/tls/tls_main.c:776 [inline]
[..]
 __tcp_set_ulp net/ipv4/tcp_ulp.c:139 [inline]
 tcp_set_ulp+0x428/0x4c0 net/ipv4/tcp_ulp.c:160
 do_tcp_setsockopt+0x455/0x37c0 net/ipv4/tcp.c:3391
 mptcp_setsockopt+0x1b47/0x2400 net/mptcp/sockopt.c:638

Remove support for TCP_ULP setsockopt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47591/">CVE-2021-47591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47591">CVE-2021-47591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226570">SUSE bug 1226570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix tc flower deletion for VLAN priority Rx steering

To replicate the issue:-

1) Add 1 flower filter for VLAN Priority based frame steering:-
$ IFDEVNAME=eth0
$ tc qdisc add dev $IFDEVNAME ingress
$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \
   map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \
   queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \
   flower vlan_prio 0 hw_tc 0

2) Get the 'pref' id
$ tc filter show dev $IFDEVNAME ingress

3) Delete a specific tc flower record (say pref 49151)
$ tc filter del dev $IFDEVNAME parent ffff: pref 49151

From dmesg, we will observe kernel NULL pointer ooops

[  197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  197.171367] #PF: supervisor read access in kernel mode
[  197.171367] #PF: error_code(0x0000) - not-present page
[  197.171367] PGD 0 P4D 0
[  197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI

&lt;snip&gt;

[  197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]

&lt;snip&gt;

[  197.171367] Call Trace:
[  197.171367]  &lt;TASK&gt;
[  197.171367]  ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]
[  197.171367]  stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]
[  197.171367]  tc_setup_cb_destroy+0xb3/0x180
[  197.171367]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]

The above issue is due to previous incorrect implementation of
tc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()
to get struct flow_rule *rule which is no longer valid for tc filter
delete operation.

  struct flow_rule *rule = flow_cls_offload_flow_rule(cls);
  struct flow_dissector *dissector = rule-&gt;match.dissector;

So, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for
earlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),
this patch introduces stmmac_rfs_entry as driver-side flow_cls_offload
record for 'RX frame steering' tc flower, currently used for VLAN
priority. The implementation has taken consideration for future extension
to include other type RX frame steering such as EtherType based.

v2:
 - Clean up overly extensive backtrace and rewrite git message to better
   explain the kernel NULL pointer issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47593" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47593" ref_url="https://www.suse.com/security/cve/CVE-2021-47593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: clear 'kern' flag from fallback sockets

The mptcp ULP extension relies on sk-&gt;sk_sock_kern being set correctly:
It prevents setsockopt(fd, IPPROTO_TCP, TCP_ULP, "mptcp", 6); from
working for plain tcp sockets (any userspace-exposed socket).

But in case of fallback, accept() can return a plain tcp sk.
In such case, sk is still tagged as 'kernel' and setsockopt will work.

This will crash the kernel, The subflow extension has a NULL ctx-&gt;conn
mptcp socket:

BUG: KASAN: null-ptr-deref in subflow_data_ready+0x181/0x2b0
Call Trace:
 tcp_data_ready+0xf8/0x370
 [..]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47593/">CVE-2021-47593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47593">CVE-2021-47593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226551">SUSE bug 1226551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47594" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47594" ref_url="https://www.suse.com/security/cve/CVE-2021-47594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: never allow the PM to close a listener subflow

Currently, when deleting an endpoint the netlink PM treverses
all the local MPTCP sockets, regardless of their status.

If an MPTCP listener socket is bound to the IP matching the
delete endpoint, the listener TCP socket will be closed.
That is unexpected, the PM should only affect data subflows.

Additionally, syzbot was able to trigger a NULL ptr dereference
due to the above:

general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 1 PID: 6550 Comm: syz-executor122 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__lock_acquire+0xd7d/0x54a0 kernel/locking/lockdep.c:4897
Code: 0f 0e 41 be 01 00 00 00 0f 86 c8 00 00 00 89 05 69 cc 0f 0e e9 bd 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 f3 2f 00 00 48 81 3b 20 75 17 8f 0f 84 52 f3 ff
RSP: 0018:ffffc90001f2f818 EFLAGS: 00010016
RAX: dffffc0000000000 RBX: 0000000000000018 RCX: 0000000000000000
RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000000 R11: 000000000000000a R12: 0000000000000000
R13: ffff88801b98d700 R14: 0000000000000000 R15: 0000000000000001
FS:  00007f177cd3d700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f177cd1b268 CR3: 000000001dd55000 CR4: 0000000000350ee0
Call Trace:
 &lt;TASK&gt;
 lock_acquire kernel/locking/lockdep.c:5637 [inline]
 lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162
 finish_wait+0xc0/0x270 kernel/sched/wait.c:400
 inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:464 [inline]
 inet_csk_accept+0x7de/0x9d0 net/ipv4/inet_connection_sock.c:497
 mptcp_accept+0xe5/0x500 net/mptcp/protocol.c:2865
 inet_accept+0xe4/0x7b0 net/ipv4/af_inet.c:739
 mptcp_stream_accept+0x2e7/0x10e0 net/mptcp/protocol.c:3345
 do_accept+0x382/0x510 net/socket.c:1773
 __sys_accept4_file+0x7e/0xe0 net/socket.c:1816
 __sys_accept4+0xb0/0x100 net/socket.c:1846
 __do_sys_accept net/socket.c:1864 [inline]
 __se_sys_accept net/socket.c:1861 [inline]
 __x64_sys_accept+0x71/0xb0 net/socket.c:1861
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f177cd8b8e9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f177cd3d308 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 00007f177ce13408 RCX: 00007f177cd8b8e9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007f177ce13400 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f177ce1340c
R13: 00007f177cde1004 R14: 6d705f706374706d R15: 0000000000022000
 &lt;/TASK&gt;

Fix the issue explicitly skipping MPTCP socket in TCP_LISTEN
status.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47594/">CVE-2021-47594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47594">CVE-2021-47594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226560">SUSE bug 1226560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47595" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_ets: don't remove idle classes from the round-robin list

Shuang reported that the following script:

 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7
 2) mausezahn ddd0  -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp &amp;
 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3

crashes systematically when line 2) is commented:

 list_del corruption, ffff8e028404bd30-&gt;next is LIST_POISON1 (dead000000000100)
 ------------[ cut here ]------------
 kernel BUG at lib/list_debug.c:47!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478
 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014
 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47
 Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff &lt;0f&gt; 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe
 RSP: 0018:ffffae46807a3888 EFLAGS: 00010246
 RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202
 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff
 RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff
 R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800
 R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400
 FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0
 Call Trace:
  &lt;TASK&gt;
  ets_qdisc_change+0x58b/0xa70 [sch_ets]
  tc_modify_qdisc+0x323/0x880
  rtnetlink_rcv_msg+0x169/0x4a0
  netlink_rcv_skb+0x50/0x100
  netlink_unicast+0x1a5/0x280
  netlink_sendmsg+0x257/0x4d0
  sock_sendmsg+0x5b/0x60
  ____sys_sendmsg+0x1f2/0x260
  ___sys_sendmsg+0x7c/0xc0
  __sys_sendmsg+0x57/0xa0
  do_syscall_64+0x3a/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7efdc8031338
 Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55
 RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338
 RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940
 R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001
 R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]
 ---[ end trace f35878d1912655c2 ]---
 RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47
 Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff &lt;0f&gt; 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe
 RSP: 0018:ffffae46807a3888 EFLAGS: 00010246
 RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202
 RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff
 RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff
 R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800
 R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400
 FS:  00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47596" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg

Currently, the hns3_remove function firstly uninstall client instance,
and then uninstall acceletion engine device. The netdevice is freed in
client instance uninstall process, but acceletion engine device uninstall
process still use it to trace runtime information. This causes a use after
free problem.

So fixes it by check the instance register state to avoid use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47597" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet_diag: fix kernel-infoleak for UDP sockets

KMSAN reported a kernel-infoleak [1], that can exploited
by unpriv users.

After analysis it turned out UDP was not initializing
r-&gt;idiag_expires. Other users of inet_sk_diag_fill()
might make the same mistake in the future, so fix this
in inet_sk_diag_fill().

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:156 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:156 [inline]
 _copy_to_iter+0x69d/0x25c0 lib/iov_iter.c:670
 copy_to_iter include/linux/uio.h:155 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2cb/0x1280 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3657 [inline]
 netlink_recvmsg+0x660/0x1c60 net/netlink/af_netlink.c:1974
 sock_recvmsg_nosec net/socket.c:944 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 sock_read_iter+0x5a9/0x630 net/socket.c:1035
 call_read_iter include/linux/fs.h:2156 [inline]
 new_sync_read fs/read_write.c:400 [inline]
 vfs_read+0x1631/0x1980 fs/read_write.c:481
 ksys_read+0x28c/0x520 fs/read_write.c:619
 __do_sys_read fs/read_write.c:629 [inline]
 __se_sys_read fs/read_write.c:627 [inline]
 __x64_sys_read+0xdb/0x120 fs/read_write.c:627
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1126 [inline]
 netlink_dump+0x3d5/0x16a0 net/netlink/af_netlink.c:2245
 __netlink_dump_start+0xd1c/0xee0 net/netlink/af_netlink.c:2370
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1343
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x447/0x800 net/netlink/af_netlink.c:2491
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:276
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x1095/0x1360 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x16f3/0x1870 net/netlink/af_netlink.c:1916
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg net/socket.c:724 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1057
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x63f/0xe30 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 312 are uninitialized
Memory access of size 312 starts at ffff88812ab54000
Data copied to user address 0000000020001440

CPU: 1 PID: 6365 Comm: syz-executor801 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47598" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_cake: do not call cake_destroy() from cake_init()

qdiscs are not supposed to call their own destroy() method
from init(), because core stack already does that.

syzbot was able to trigger use after free:

DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [inline]
WARNING: CPU: 0 PID: 21902 at kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740
Modules linked in:
CPU: 0 PID: 21902 Comm: syz-executor189 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [inline]
RIP: 0010:__mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740
Code: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff &lt;0f&gt; 0b e9 0d f7 ff ff 48 8b 44 24 40 48 8d b8 c8 08 00 00 48 89 f8
RSP: 0018:ffffc9000627f290 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88802315d700 RSI: ffffffff815f1db8 RDI: fffff52000c4fe44
RBP: ffff88818f28e000 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815ebb5e R11: 0000000000000000 R12: 0000000000000000
R13: dffffc0000000000 R14: ffffc9000627f458 R15: 0000000093c30000
FS:  0000555556abc400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fda689c3303 CR3: 000000001cfbb000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 tcf_chain0_head_change_cb_del+0x2e/0x3d0 net/sched/cls_api.c:810
 tcf_block_put_ext net/sched/cls_api.c:1381 [inline]
 tcf_block_put_ext net/sched/cls_api.c:1376 [inline]
 tcf_block_put+0xbc/0x130 net/sched/cls_api.c:1394
 cake_destroy+0x3f/0x80 net/sched/sch_cake.c:2695
 qdisc_create.constprop.0+0x9da/0x10f0 net/sched/sch_api.c:1293
 tc_modify_qdisc+0x4c5/0x1980 net/sched/sch_api.c:1660
 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571
 netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2496
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:704 [inline]
 sock_sendmsg+0xcf/0x120 net/socket.c:724
 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1bb06badb9
Code: Unable to access opcode bytes at RIP 0x7f1bb06bad8f.
RSP: 002b:00007fff3012a658 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1bb06badb9
RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000003
R10: 0000000000000003 R11: 0000000000000246 R12: 00007fff3012a688
R13: 00007fff3012a6a0 R14: 00007fff3012a6e0 R15: 00000000000013c2
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227471">SUSE bug 1227471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47599" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47599" ref_url="https://www.suse.com/security/cve/CVE-2021-47599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: use latest_dev in btrfs_show_devname

The test case btrfs/238 reports the warning below:

 WARNING: CPU: 3 PID: 481 at fs/btrfs/super.c:2509 btrfs_show_devname+0x104/0x1e8 [btrfs]
 CPU: 2 PID: 1 Comm: systemd Tainted: G        W  O 5.14.0-rc1-custom #72
 Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
 Call trace:
   btrfs_show_devname+0x108/0x1b4 [btrfs]
   show_mountinfo+0x234/0x2c4
   m_show+0x28/0x34
   seq_read_iter+0x12c/0x3c4
   vfs_read+0x29c/0x2c8
   ksys_read+0x80/0xec
   __arm64_sys_read+0x28/0x34
   invoke_syscall+0x50/0xf8
   do_el0_svc+0x88/0x138
   el0_svc+0x2c/0x8c
   el0t_64_sync_handler+0x84/0xe4
   el0t_64_sync+0x198/0x19c

Reason:
While btrfs_prepare_sprout() moves the fs_devices::devices into
fs_devices::seed_list, the btrfs_show_devname() searches for the devices
and found none, leading to the warning as in above.

Fix:
latest_dev is updated according to the changes to the device list.
That means we could use the latest_dev-&gt;name to show the device name in
/proc/self/mounts, the pointer will be always valid as it's assigned
before the device is deleted from the list in remove or replace.
The RCU protection is sufficient as the device structure is freed after
synchronization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47599/">CVE-2021-47599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47599">CVE-2021-47599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226571">SUSE bug 1226571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47600" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm btree remove: fix use after free in rebalance_children()

Move dm_tm_unlock() after dm_tm_dec().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227472">SUSE bug 1227472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47601" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix an IS_ERR() vs NULL bug

The __get_free_pages() function does not return error pointers it returns
NULL so fix this condition to avoid a NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47602" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: track only QoS data frames for admission control

For admission control, obviously all of that only works for
QoS data frames, otherwise we cannot even access the QoS
field in the header.

Syzbot reported (see below) an uninitialized value here due
to a status of a non-QoS nullfunc packet, which isn't even
long enough to contain the QoS header.

Fix this to only do anything for QoS data packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47603" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: improve robustness of the audit queue handling

If the audit daemon were ever to get stuck in a stopped state the
kernel's kauditd_thread() could get blocked attempting to send audit
records to the userspace audit daemon.  With the kernel thread
blocked it is possible that the audit queue could grow unbounded as
certain audit record generating events must be exempt from the queue
limits else the system enter a deadlock state.

This patch resolves this problem by lowering the kernel thread's
socket sending timeout from MAX_SCHEDULE_TIMEOUT to HZ/10 and tweaks
the kauditd_send_queue() function to better manage the various audit
queues when connection problems occur between the kernel and the
audit daemon.  With this patch, the backlog may temporarily grow
beyond the defined limits when the audit daemon is stopped and the
system is under heavy audit pressure, but kauditd_thread() will
continue to make progress and drain the queues as it would for other
connection problems.  For example, with the audit daemon put into a
stopped state and the system configured to audit every syscall it
was still possible to shutdown the system without a kernel panic,
deadlock, etc.; granted, the system was slow to shutdown but that is
to be expected given the extreme pressure of recording every syscall.

The timeout value of HZ/10 was chosen primarily through
experimentation and this developer's "gut feeling".  There is likely
no one perfect value, but as this scenario is limited in scope (root
privileges would be needed to send SIGSTOP to the audit daemon), it
is likely not worth exposing this as a tunable at present.  This can
always be done at a later date if it proves necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47604" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47604" ref_url="https://www.suse.com/security/cve/CVE-2021-47604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vduse: check that offset is within bounds in get_config()

This condition checks "len" but it does not check "offset" and that
could result in an out of bounds read if "offset &gt; dev-&gt;config_size".
The problem is that since both variables are unsigned the
"dev-&gt;config_size - offset" subtraction would result in a very high
unsigned value.

I think these checks might not be necessary because "len" and "offset"
are supposed to already have been validated using the
vhost_vdpa_config_validate() function.  But I do not know the code
perfectly, and I like to be safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47604/">CVE-2021-47604 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47604">CVE-2021-47604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226566">SUSE bug 1226566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47605" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47605" ref_url="https://www.suse.com/security/cve/CVE-2021-47605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vduse: fix memory corruption in vduse_dev_ioctl()

The "config.offset" comes from the user.  There needs to a check to
prevent it being out of bounds.  The "config.offset" and
"dev-&gt;config_size" variables are both type u32.  So if the offset if
out of bounds then the "dev-&gt;config_size - config.offset" subtraction
results in a very high u32 value.  The out of bounds offset can result
in memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47605/">CVE-2021-47605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47605">CVE-2021-47605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226579">SUSE bug 1226579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227550">SUSE bug 1227550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netlink: af_netlink: Prevent empty skb by adding a check on len.

Adding a check on len parameter to avoid empty skb. This prevents a
division error in netem_enqueue function which is caused when skb-&gt;len=0
and skb-&gt;data_len=0 in the randomized corruption step as shown below.

skb-&gt;data[prandom_u32() % skb_headlen(skb)] ^= 1&lt;&lt;(prandom_u32() % 8);

Crash Report:
[  343.170349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family
0 port 6081 - 0
[  343.216110] netem: version 1.3
[  343.235841] divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  343.236680] CPU: 3 PID: 4288 Comm: reproducer Not tainted 5.16.0-rc1+
[  343.237569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS 1.11.0-2.el7 04/01/2014
[  343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem]
[  343.239499] Code: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff
ff 8b 8d 50 ff ff ff 8b 85 58 ff ff ff 48 8b bd 70 ff ff ff 31 d2 2b 4f
74 &lt;f7&gt; f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03
[  343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 00010246
[  343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX:
0000000000000000
[  343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI:
ffff88800f8eda40
[  343.244474] RBP: ffff88800bcd7458 R08: 0000000000000000 R09:
ffffffff94fb8445
[  343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12:
0000000000000000
[  343.246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15:
0000000000000020
[  343.247291] FS:  00007fdde2bd7700(0000) GS:ffff888109780000(0000)
knlGS:0000000000000000
[  343.248350] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4:
00000000000006e0
[  343.250076] Call Trace:
[  343.250423]  &lt;TASK&gt;
[  343.250713]  ? memcpy+0x4d/0x60
[  343.251162]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.251795]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.252443]  netem_enqueue+0xe28/0x33c0 [sch_netem]
[  343.253102]  ? stack_trace_save+0x87/0xb0
[  343.253655]  ? filter_irq_stacks+0xb0/0xb0
[  343.254220]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.254837]  ? __kasan_check_write+0x14/0x20
[  343.255418]  ? _raw_spin_lock+0x88/0xd6
[  343.255953]  dev_qdisc_enqueue+0x50/0x180
[  343.256508]  __dev_queue_xmit+0x1a7e/0x3090
[  343.257083]  ? netdev_core_pick_tx+0x300/0x300
[  343.257690]  ? check_kcov_mode+0x10/0x40
[  343.258219]  ? _raw_spin_unlock_irqrestore+0x29/0x40
[  343.258899]  ? __kasan_init_slab_obj+0x24/0x30
[  343.259529]  ? setup_object.isra.71+0x23/0x90
[  343.260121]  ? new_slab+0x26e/0x4b0
[  343.260609]  ? kasan_poison+0x3a/0x50
[  343.261118]  ? kasan_unpoison+0x28/0x50
[  343.261637]  ? __kasan_slab_alloc+0x71/0x90
[  343.262214]  ? memcpy+0x4d/0x60
[  343.262674]  ? write_comp_data+0x2f/0x90
[  343.263209]  ? __kasan_check_write+0x14/0x20
[  343.263802]  ? __skb_clone+0x5d6/0x840
[  343.264329]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.264958]  dev_queue_xmit+0x1c/0x20
[  343.265470]  netlink_deliver_tap+0x652/0x9c0
[  343.266067]  netlink_unicast+0x5a0/0x7f0
[  343.266608]  ? netlink_attachskb+0x860/0x860
[  343.267183]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.267820]  ? write_comp_data+0x2f/0x90
[  343.268367]  netlink_sendmsg+0x922/0xe80
[  343.268899]  ? netlink_unicast+0x7f0/0x7f0
[  343.269472]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.270099]  ? write_comp_data+0x2f/0x90
[  343.270644]  ? netlink_unicast+0x7f0/0x7f0
[  343.271210]  sock_sendmsg+0x155/0x190
[  343.271721]  ____sys_sendmsg+0x75f/0x8f0
[  343.272262]  ? kernel_sendmsg+0x60/0x60
[  343.272788]  ? write_comp_data+0x2f/0x90
[  343.273332]  ? write_comp_data+0x2f/0x90
[  343.273869]  ___sys_sendmsg+0x10f/0x190
[  343.274405]  ? sendmsg_copy_msghdr+0x80/0x80
[  343.274984]  ? slab_post_alloc_hook+0x70/0x230
[  343.275597]  ? futex_wait_setup+0x240/0x240
[  343.276175]  ? security_file_alloc+0x3e/0x170
[  343.276779]  ? write_comp_d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226555">SUSE bug 1226555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47607" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg

The implementation of BPF_CMPXCHG on a high level has the following parameters:

  .-[old-val]                                          .-[new-val]
  BPF_R0 = cmpxchg{32,64}(DST_REG + insn-&gt;off, BPF_R0, SRC_REG)
                          `-[mem-loc]          `-[old-val]

Given a BPF insn can only have two registers (dst, src), the R0 is fixed and
used as an auxilliary register for input (old value) as well as output (returning
old value from memory location). While the verifier performs a number of safety
checks, it misses to reject unprivileged programs where R0 contains a pointer as
old value.

Through brute-forcing it takes about ~16sec on my machine to leak a kernel pointer
with BPF_CMPXCHG. The PoC is basically probing for kernel addresses by storing the
guessed address into the map slot as a scalar, and using the map value pointer as
R0 while SRC_REG has a canary value to detect a matching address.

Fix it by checking R0 for pointers, and reject if that's the case for unprivileged
programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47608" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix kernel address leakage in atomic fetch

The change in commit 37086bfdc737 ("bpf: Propagate stack bounds to registers
in atomics w/ BPF_FETCH") around check_mem_access() handling is buggy since
this would allow for unprivileged users to leak kernel pointers. For example,
an atomic fetch/and with -1 on a stack destination which holds a spilled
pointer will migrate the spilled register type into a scalar, which can then
be exported out of the program (since scalar != pointer) by dumping it into
a map value.

The original implementation of XADD was preventing this situation by using
a double call to check_mem_access() one with BPF_READ and a subsequent one
with BPF_WRITE, in both cases passing -1 as a placeholder value instead of
register as per XADD semantics since it didn't contain a value fetch. The
BPF_READ also included a check in check_stack_read_fixed_off() which rejects
the program if the stack slot is of __is_pointer_value() if dst_regno &lt; 0.
The latter is to distinguish whether we're dealing with a regular stack spill/
fill or some arithmetical operation which is disallowed on non-scalars, see
also 6e7e63cbb023 ("bpf: Forbid XADD on spilled pointers for unprivileged
users") for more context on check_mem_access() and its handling of placeholder
value -1.

One minimally intrusive option to fix the leak is for the BPF_FETCH case to
initially check the BPF_READ case via check_mem_access() with -1 as register,
followed by the actual load case with non-negative load_reg to propagate
stack bounds to registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47609" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Fix string overflow in SCPI genpd driver

Without the bound checks for scpi_pd-&gt;name, it could result in the buffer
overflow when copying the SCPI device name from the corresponding device
tree node as the name string is set at maximum size of 30.

Let us fix it by using devm_kasprintf so that the string buffer is
allocated dynamically.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: validate extended element ID is present

Before attempting to parse an extended element, verify that
the extended element ID is present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47612" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: fix segfault in nfc_genl_dump_devices_done

When kmalloc in nfc_genl_dump_devices() fails then
nfc_genl_dump_devices_done() segfaults as below

KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:klist_iter_exit+0x26/0x80
Call Trace:
&lt;TASK&gt;
class_dev_iter_exit+0x15/0x20
nfc_genl_dump_devices_done+0x3b/0x50
genl_lock_done+0x84/0xd0
netlink_sock_destruct+0x8f/0x270
__sk_destruct+0x64/0x3b0
sk_destruct+0xa8/0xd0
__sk_free+0x2e8/0x3d0
sk_free+0x51/0x90
netlink_sock_destruct_work+0x1c/0x20
process_one_work+0x411/0x710
worker_thread+0x6fd/0xa80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47613" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47613" ref_url="https://www.suse.com/security/cve/CVE-2021-47613" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: virtio: fix completion handling

The driver currently assumes that the notify callback is only received
when the device is done with all the queued buffers.

However, this is not true, since the notify callback could be called
without any of the queued buffers being completed (for example, with
virtio-pci and shared interrupts) or with only some of the buffers being
completed (since the driver makes them available to the device in
multiple separate virtqueue_add_sgs() calls).

This can lead to incorrect data on the I2C bus or memory corruption in
the guest if the device operates on buffers which are have been freed by
the driver.  (The WARN_ON in the driver is also triggered.)

 BUG kmalloc-128 (Tainted: G        W        ): Poison overwritten
 First byte 0x0 instead of 0x6b
 Allocated in i2cdev_ioctl_rdwr+0x9d/0x1de age=243 cpu=0 pid=28
 	memdup_user+0x2e/0xbd
 	i2cdev_ioctl_rdwr+0x9d/0x1de
 	i2cdev_ioctl+0x247/0x2ed
 	vfs_ioctl+0x21/0x30
 	sys_ioctl+0xb18/0xb41
 Freed in i2cdev_ioctl_rdwr+0x1bb/0x1de age=68 cpu=0 pid=28
 	kfree+0x1bd/0x1cc
 	i2cdev_ioctl_rdwr+0x1bb/0x1de
 	i2cdev_ioctl+0x247/0x2ed
 	vfs_ioctl+0x21/0x30
 	sys_ioctl+0xb18/0xb41

Fix this by calling virtio_get_buf() from the notify handler like other
virtio drivers and by actually waiting for all the buffers to be
completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47613/">CVE-2021-47613 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47613">CVE-2021-47613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226600">SUSE bug 1226600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47614" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix a user-after-free in add_pble_prm

When irdma_hmc_sd_one fails, 'chunk' is freed while its still on the PBLE
info list.

Add the chunk entry to the PBLE info list only after successful setting of
the SD in irdma_hmc_sd_one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47615" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47616" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA: Fix use-after-free in rxe_queue_cleanup

On error handling path in rxe_qp_from_init() qp-&gt;sq.queue is freed and
then rxe_create_qp() will drop last reference to this object. qp clean up
function will try to free this queue one time and it causes UAF bug.

Fix it by zeroing queue pointer after freeing queue in rxe_qp_from_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47617" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: pciehp: Fix infinite loop in IRQ handler upon power fault

The Power Fault Detected bit in the Slot Status register differs from
all other hotplug events in that it is sticky:  It can only be cleared
after turning off slot power.  Per PCIe r5.0, sec. 6.7.1.8:

  If a power controller detects a main power fault on the hot-plug slot,
  it must automatically set its internal main power fault latch [...].
  The main power fault latch is cleared when software turns off power to
  the hot-plug slot.

The stickiness used to cause interrupt storms and infinite loops which
were fixed in 2009 by commits 5651c48cfafe ("PCI pciehp: fix power fault
interrupt storm problem") and 99f0169c17f3 ("PCI: pciehp: enable
software notification on empty slots").

Unfortunately in 2020 the infinite loop issue was inadvertently
reintroduced by commit 8edf5332c393 ("PCI: pciehp: Fix MSI interrupt
race"):  The hardirq handler pciehp_isr() clears the PFD bit until
pciehp's power_fault_detected flag is set.  That happens in the IRQ
thread pciehp_ist(), which never learns of the event because the hardirq
handler is stuck in an infinite loop.  Fix by setting the
power_fault_detected flag already in the hardirq handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9170/1: fix panic when kasan and kprobe are enabled

arm32 uses software to simulate the instruction replaced
by kprobe. some instructions may be simulated by constructing
assembly functions. therefore, before executing instruction
simulation, it is necessary to construct assembly function
execution environment in C language through binding registers.
after kasan is enabled, the register binding relationship will
be destroyed, resulting in instruction simulation errors and
causing kernel panic.

the kprobe emulate instruction function is distributed in three
files: actions-common.c actions-arm.c actions-thumb.c, so disable
KASAN when compiling these files.

for example, use kprobe insert on cap_capable+20 after kasan
enabled, the cap_capable assembly code is as follows:
&lt;cap_capable&gt;:
e92d47f0	push	{r4, r5, r6, r7, r8, r9, sl, lr}
e1a05000	mov	r5, r0
e280006c	add	r0, r0, #108    ; 0x6c
e1a04001	mov	r4, r1
e1a06002	mov	r6, r2
e59fa090	ldr	sl, [pc, #144]  ;
ebfc7bf8	bl	c03aa4b4 &lt;__asan_load4&gt;
e595706c	ldr	r7, [r5, #108]  ; 0x6c
e2859014	add	r9, r5, #20
......
The emulate_ldr assembly code after enabling kasan is as follows:
c06f1384 &lt;emulate_ldr&gt;:
e92d47f0	push	{r4, r5, r6, r7, r8, r9, sl, lr}
e282803c	add	r8, r2, #60     ; 0x3c
e1a05000	mov	r5, r0
e7e37855	ubfx	r7, r5, #16, #4
e1a00008	mov	r0, r8
e1a09001	mov	r9, r1
e1a04002	mov	r4, r2
ebf35462	bl	c03c6530 &lt;__asan_load4&gt;
e357000f	cmp	r7, #15
e7e36655	ubfx	r6, r5, #12, #4
e205a00f	and	sl, r5, #15
0a000001	beq	c06f13bc &lt;emulate_ldr+0x38&gt;
e0840107	add	r0, r4, r7, lsl #2
ebf3545c	bl	c03c6530 &lt;__asan_load4&gt;
e084010a	add	r0, r4, sl, lsl #2
ebf3545a	bl	c03c6530 &lt;__asan_load4&gt;
e2890010	add	r0, r9, #16
ebf35458	bl	c03c6530 &lt;__asan_load4&gt;
e5990010	ldr	r0, [r9, #16]
e12fff30	blx	r0
e356000f	cm	r6, #15
1a000014	bne	c06f1430 &lt;emulate_ldr+0xac&gt;
e1a06000	mov	r6, r0
e2840040	add	r0, r4, #64     ; 0x40
......

when running in emulate_ldr to simulate the ldr instruction, panic
occurred, and the log is as follows:
Unable to handle kernel NULL pointer dereference at virtual address
00000090
pgd = ecb46400
[00000090] *pgd=2e0fa003, *pmd=00000000
Internal error: Oops: 206 [#1] SMP ARM
PC is at cap_capable+0x14/0xb0
LR is at emulate_ldr+0x50/0xc0
psr: 600d0293 sp : ecd63af8  ip : 00000004  fp : c0a7c30c
r10: 00000000  r9 : c30897f4  r8 : ecd63cd4
r7 : 0000000f  r6 : 0000000a  r5 : e59fa090  r4 : ecd63c98
r3 : c06ae294  r2 : 00000000  r1 : b7611300  r0 : bf4ec008
Flags: nZCv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
Control: 32c5387d  Table: 2d546400  DAC: 55555555
Process bash (pid: 1643, stack limit = 0xecd60190)
(cap_capable) from (kprobe_handler+0x218/0x340)
(kprobe_handler) from (kprobe_trap_handler+0x24/0x48)
(kprobe_trap_handler) from (do_undefinstr+0x13c/0x364)
(do_undefinstr) from (__und_svc_finish+0x0/0x30)
(__und_svc_finish) from (cap_capable+0x18/0xb0)
(cap_capable) from (cap_vm_enough_memory+0x38/0x48)
(cap_vm_enough_memory) from
(security_vm_enough_memory_mm+0x48/0x6c)
(security_vm_enough_memory_mm) from
(copy_process.constprop.5+0x16b4/0x25c8)
(copy_process.constprop.5) from (_do_fork+0xe8/0x55c)
(_do_fork) from (SyS_clone+0x1c/0x24)
(SyS_clone) from (__sys_trace_return+0x0/0x10)
Code: 0050a0e1 6c0080e2 0140a0e1 0260a0e1 (f801f0e7)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47619" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix queues reservation for XDP

When XDP was configured on a system with large number of CPUs
and X722 NIC there was a call trace with NULL pointer dereference.

i40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12
i40e 0000:87:00.0: setup of MAIN VSI failed

BUG: kernel NULL pointer dereference, address: 0000000000000000
RIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]
Call Trace:
? i40e_reconfig_rss_queues+0x130/0x130 [i40e]
dev_xdp_install+0x61/0xe0
dev_xdp_attach+0x18a/0x4c0
dev_change_xdp_fd+0x1e6/0x220
do_setlink+0x616/0x1030
? ahci_port_stop+0x80/0x80
? ata_qc_issue+0x107/0x1e0
? lock_timer_base+0x61/0x80
? __mod_timer+0x202/0x380
rtnl_setlink+0xe5/0x170
? bpf_lsm_binder_transaction+0x10/0x10
? security_capable+0x36/0x50
rtnetlink_rcv_msg+0x121/0x350
? rtnl_calcit.isra.0+0x100/0x100
netlink_rcv_skb+0x50/0xf0
netlink_unicast+0x1d3/0x2a0
netlink_sendmsg+0x22a/0x440
sock_sendmsg+0x5e/0x60
__sys_sendto+0xf0/0x160
? __sys_getsockname+0x7e/0xc0
? _copy_from_user+0x3c/0x80
? __sys_setsockopt+0xc8/0x1a0
__x64_sys_sendto+0x20/0x30
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f83fa7a39e0

This was caused by PF queue pile fragmentation due to
flow director VSI queue being placed right after main VSI.
Because of this main VSI was not able to resize its
queue allocation for XDP resulting in no queues allocated
for main VSI when XDP was turned on.

Fix this by always allocating last queue in PF queue pile
for a flow director VSI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47620" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: refactor malicious adv data check

Check for out-of-bound read was being performed at the end of while
num_reports loop, and would fill journal with false positives. Added
check to beginning of loop processing so that it doesn't get checked
after ptr has been advanced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-10-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47622" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: Fix a deadlock in the error handler

The following deadlock has been observed on a test setup:

 - All tags allocated

 - The SCSI error handler calls ufshcd_eh_host_reset_handler()

 - ufshcd_eh_host_reset_handler() queues work that calls
   ufshcd_err_handler()

 - ufshcd_err_handler() locks up as follows:

Workqueue: ufs_eh_wq_0 ufshcd_err_handler.cfi_jt
Call trace:
 __switch_to+0x298/0x5d8
 __schedule+0x6cc/0xa94
 schedule+0x12c/0x298
 blk_mq_get_tag+0x210/0x480
 __blk_mq_alloc_request+0x1c8/0x284
 blk_get_request+0x74/0x134
 ufshcd_exec_dev_cmd+0x68/0x640
 ufshcd_verify_dev_init+0x68/0x35c
 ufshcd_probe_hba+0x12c/0x1cb8
 ufshcd_host_reset_and_restore+0x88/0x254
 ufshcd_reset_and_restore+0xd0/0x354
 ufshcd_err_handler+0x408/0xc58
 process_one_work+0x24c/0x66c
 worker_thread+0x3e8/0xa4c
 kthread+0x150/0x1b4
 ret_from_fork+0x10/0x30

Fix this lockup by making ufshcd_exec_dev_cmd() allocate a reserved
request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47623" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47623" ref_url="https://www.suse.com/security/cve/CVE-2021-47623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/fixmap: Fix VM debug warning on unmap

Unmapping a fixmap entry is done by calling __set_fixmap()
with FIXMAP_PAGE_CLEAR as flags.

Today, powerpc __set_fixmap() calls map_kernel_page().

map_kernel_page() is not happy when called a second time
for the same page.

	WARNING: CPU: 0 PID: 1 at arch/powerpc/mm/pgtable.c:194 set_pte_at+0xc/0x1e8
	CPU: 0 PID: 1 Comm: swapper Not tainted 5.16.0-rc3-s3k-dev-01993-g350ff07feb7d-dirty #682
	NIP:  c0017cd4 LR: c00187f0 CTR: 00000010
	REGS: e1011d50 TRAP: 0700   Not tainted  (5.16.0-rc3-s3k-dev-01993-g350ff07feb7d-dirty)
	MSR:  00029032 &lt;EE,ME,IR,DR,RI&gt;  CR: 42000208  XER: 00000000

	GPR00: c0165fec e1011e10 c14c0000 c0ee2550 ff800000 c0f3d000 00000000 c001686c
	GPR08: 00001000 b00045a9 00000001 c0f58460 c0f50000 00000000 c0007e10 00000000
	GPR16: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
	GPR24: 00000000 00000000 c0ee2550 00000000 c0f57000 00000ff8 00000000 ff800000
	NIP [c0017cd4] set_pte_at+0xc/0x1e8
	LR [c00187f0] map_kernel_page+0x9c/0x100
	Call Trace:
	[e1011e10] [c0736c68] vsnprintf+0x358/0x6c8 (unreliable)
	[e1011e30] [c0165fec] __set_fixmap+0x30/0x44
	[e1011e40] [c0c13bdc] early_iounmap+0x11c/0x170
	[e1011e70] [c0c06cb0] ioremap_legacy_serial_console+0x88/0xc0
	[e1011e90] [c0c03634] do_one_initcall+0x80/0x178
	[e1011ef0] [c0c0385c] kernel_init_freeable+0xb4/0x250
	[e1011f20] [c0007e34] kernel_init+0x24/0x140
	[e1011f30] [c0016268] ret_from_kernel_thread+0x5c/0x64
	Instruction dump:
	7fe3fb78 48019689 80010014 7c630034 83e1000c 5463d97e 7c0803a6 38210010
	4e800020 81250000 712a0001 41820008 &lt;0fe00000&gt; 9421ffe0 93e1001c 48000030

Implement unmap_kernel_page() which clears an existing pte.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47623/">CVE-2021-47623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47623">CVE-2021-47623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227919">SUSE bug 1227919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47624" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change

The refcount leak issues take place in an error handling path. When the
3rd argument buf doesn't match with "offline", "online" or "remove", the
function simply returns -EINVAL and forgets to decrease the reference
count of a rpc_xprt object and a rpc_xprt_switch object increased by
rpc_sysfs_xprt_kobj_get_xprt() and
rpc_sysfs_xprt_kobj_get_xprt_switch(), causing reference count leaks of
both unused objects.

Fix this issue by jumping to the error handling path labelled with
out_put when buf matches none of "offline", "online" or "remove".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0001">CVE-2022-0001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671417" comment="kernel-rt-5.3.18-76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="TID000020607" ref_url="https://www.suse.com/support/kb/doc/?id=000020607" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0940-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NXODJTCX5G5LLTBOEFVBOCIWYKEGYAMP/" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0002">CVE-2022-0002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671417" comment="kernel-rt-5.3.18-76.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0128" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0128" ref_url="https://www.suse.com/security/cve/CVE-2022-0128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Out-of-bounds Read
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0128/">CVE-2022-0128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0128">CVE-2022-0128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194388">SUSE bug 1194388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0135" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011545.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0479-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EQXVEUIFIMFD6G5N2JBQ2A6XUYVZBCSY/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was found in the VirGL virtual OpenGL renderer (virglrenderer). This flaw allows a malicious guest to create a specially crafted virgil resource and then issue a VIRTGPU_EXECBUFFER ioctl, leading to a denial of service or possible code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0135">CVE-2022-0135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196396">SUSE bug 1196396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667314" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0156" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0156" ref_url="https://www.suse.com/security/cve/CVE-2022-0156" source="SUSE CVE"/>
    <description>
    vim is vulnerable to Use After Free
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0156/">CVE-2022-0156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0156">CVE-2022-0156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194559">SUSE bug 1194559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0158" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0158" ref_url="https://www.suse.com/security/cve/CVE-2022-0158" source="SUSE CVE"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0158/">CVE-2022-0158 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0158">CVE-2022-0158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194553">SUSE bug 1194553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A denial of service (DOS) issue was found in the Linux kernel's smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0171" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0171" ref_url="https://www.suse.com/security/cve/CVE-2022-0171" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0171/">CVE-2022-0171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0171">CVE-2022-0171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199509">SUSE bug 1199509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0175" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0175" ref_url="https://www.suse.com/security/cve/CVE-2022-0175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0110-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010020.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNFLD35UGUIRPTGF3HA3JP2MXLLHWPIX/" source="SUSE-SU"/>
    <description>
    A flaw was found in the VirGL virtual OpenGL renderer (virglrenderer). The virgl did not properly initialize memory when allocating a host-backed memory resource. A malicious guest could use this flaw to mmap from the guest kernel and read this uninitialized memory from the host, possibly leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0175/">CVE-2022-0175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0175">CVE-2022-0175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194601">SUSE bug 1194601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705025" comment="libvirglrenderer0-0.6.0-4.6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0185" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021589.html" source="SUSE-SU"/>
		<reference ref_id="TID000020565" ref_url="https://www.suse.com/support/kb/doc/?id=000020565" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185 at SUSE</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0185">CVE-2022-0185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0264" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0264" ref_url="https://www.suse.com/security/cve/CVE-2022-0264" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions &lt; v5.16-rc6
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0264/">CVE-2022-0264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0264">CVE-2022-0264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194826">SUSE bug 1194826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0286" ref_url="https://www.suse.com/security/cve/CVE-2022-0286" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0286/">CVE-2022-0286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0286">CVE-2022-0286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195371">SUSE bug 1195371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0318">CVE-2022-0318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0319">CVE-2022-0319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0322" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0169-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S44U3IKMS3KZS626YQ5ZYDHA2HLKQNER/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JVCSEXTJ2SI3QLMCUUQNNUT3HNZQJIML/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
    <description>
    A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0322">CVE-2022-0322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0330</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010991.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFUCZRWH2IP7FOHVYO3TO3G5PFWQXLP6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A random memory access flaw was found in the Linux kernel's GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0330">CVE-2022-0330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195950">SUSE bug 1195950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0351</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351">CVE-2022-0351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0358" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0358" ref_url="https://www.suse.com/security/cve/CVE-2022-0358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0930-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010778.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0930-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VFLDWSRMX7BN3NXC6GXAFPJLCC5D5KIJ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group, potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0358/">CVE-2022-0358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0358">CVE-2022-0358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195161">SUSE bug 1195161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0361" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0361">CVE-2022-0361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0368" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0368" ref_url="https://www.suse.com/security/cve/CVE-2022-0368" source="SUSE CVE"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0368/">CVE-2022-0368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0368">CVE-2022-0368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195205">SUSE bug 1195205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0382" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0382" ref_url="https://www.suse.com/security/cve/CVE-2022-0382" source="SUSE CVE"/>
    <description>
    An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0382/">CVE-2022-0382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0382">CVE-2022-0382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195199">SUSE bug 1195199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0393" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0393" ref_url="https://www.suse.com/security/cve/CVE-2022-0393" source="SUSE CVE"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0393/">CVE-2022-0393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0393">CVE-2022-0393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195336">SUSE bug 1195336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0407" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0407" ref_url="https://www.suse.com/security/cve/CVE-2022-0407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0407/">CVE-2022-0407 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0407">CVE-2022-0407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195354">SUSE bug 1195354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208308">SUSE bug 1208308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208649">SUSE bug 1208649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0408" ref_url="https://www.suse.com/security/cve/CVE-2022-0408" source="SUSE CVE"/>
    <description>
    Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0408/">CVE-2022-0408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0408">CVE-2022-0408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195459">SUSE bug 1195459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0413" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0736-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0736-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FDNZ3N5S7UGKPUUKPGOQQGPJJK3YTW37/" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0413">CVE-2022-0413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208308">SUSE bug 1208308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208651">SUSE bug 1208651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705042" comment="vim-small-8.0.1568-5.17.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0417" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0417" ref_url="https://www.suse.com/security/cve/CVE-2022-0417" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0417/">CVE-2022-0417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0417">CVE-2022-0417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195499">SUSE bug 1195499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0433" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0433" ref_url="https://www.suse.com/security/cve/CVE-2022-0433" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's BPF subsystem in the way a user triggers the map_get_next_key function of the BPF bloom filter. This flaw allows a local user to crash the system. This flaw affects Linux kernel versions prior to 5.17-rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0433/">CVE-2022-0433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0433">CVE-2022-0433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195373">SUSE bug 1195373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="TID000020580" ref_url="https://www.suse.com/support/kb/doc/?id=000020580" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0435">CVE-2022-0435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0443" ref_url="https://www.suse.com/security/cve/CVE-2022-0443" source="SUSE CVE"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0443/">CVE-2022-0443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0443">CVE-2022-0443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195509">SUSE bug 1195509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0487" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove in drivers/memstick/host/rtsx_usb_ms.c in memstick in the Linux kernel. In this flaw, a local attacker with a user privilege may impact system Confidentiality. This flaw affects kernel versions prior to 5.14 rc1.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0487">CVE-2022-0487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198615">SUSE bug 1198615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Linux kernel's cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0492">CVE-2022-0492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198615">SUSE bug 1198615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199255">SUSE bug 1199255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199615">SUSE bug 1199615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200084">SUSE bug 1200084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0494" ref_url="https://www.suse.com/security/cve/CVE-2022-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0494/">CVE-2022-0494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197386">SUSE bug 1197386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207783">SUSE bug 1207783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0500" ref_url="https://www.suse.com/security/cve/CVE-2022-0500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A flaw was found in unrestricted eBPF usage by the BPF_BTF_LOAD, leading to a possible out-of-bounds memory write in the Linux kernel's BPF subsystem due to the way a user loads BTF. This flaw allows a local user to crash or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0500/">CVE-2022-0500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196811">SUSE bug 1196811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0516" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. This flaw affects Linux kernel versions prior to 5.17-rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0516">CVE-2022-0516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0554" ref_url="https://www.suse.com/security/cve/CVE-2022-0554" source="SUSE CVE"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0554/">CVE-2022-0554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">CVE-2022-0554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195846">SUSE bug 1195846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0563" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0563" ref_url="https://www.suse.com/security/cve/CVE-2022-0563" source="SUSE CVE"/>
    <description>
    A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0563/">CVE-2022-0563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0563">CVE-2022-0563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196241">SUSE bug 1196241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009337634" comment="libblkid1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664921" comment="libfdisk1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664923" comment="libmount1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664926" comment="libsmartcols1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009337635" comment="libuuid1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334326" comment="util-linux is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0572" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0572" ref_url="https://www.suse.com/security/cve/CVE-2022-0572" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0572/">CVE-2022-0572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0572">CVE-2022-0572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196023">SUSE bug 1196023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0615" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0615" ref_url="https://www.suse.com/security/cve/CVE-2022-0615" source="SUSE CVE"/>
    <description>
    Use-after-free in eset_rtp kernel module used in ESET products for Linux allows potential attacker to trigger denial-of-service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0615/">CVE-2022-0615 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0615">CVE-2022-0615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196541">SUSE bug 1196541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0629" ref_url="https://www.suse.com/security/cve/CVE-2022-0629" source="SUSE CVE"/>
    <description>
    Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0629/">CVE-2022-0629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629">CVE-2022-0629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196226">SUSE bug 1196226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0644" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-0644">CVE-2022-0644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0646" ref_url="https://www.suse.com/security/cve/CVE-2022-0646" source="SUSE CVE"/>
    <description>
    A flaw use after free in the Linux kernel Management Component Transport Protocol (MCTP) subsystem was found in the way user triggers cancel_work_sync after the unregister_netdev during removing device. A local user could use this flaw to crash the system or escalate their privileges on the system. It is actual from Linux Kernel 5.17-rc1 (when mctp-serial.c introduced) till 5.17-rc5.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0646/">CVE-2022-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0646">CVE-2022-0646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196090">SUSE bug 1196090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0685" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0685" ref_url="https://www.suse.com/security/cve/CVE-2022-0685" source="SUSE CVE"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0685/">CVE-2022-0685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0685">CVE-2022-0685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196227">SUSE bug 1196227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0696" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0696" ref_url="https://www.suse.com/security/cve/CVE-2022-0696" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0696/">CVE-2022-0696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696">CVE-2022-0696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196361">SUSE bug 1196361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205395">SUSE bug 1205395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0714" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0714" ref_url="https://www.suse.com/security/cve/CVE-2022-0714" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0714/">CVE-2022-0714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0714">CVE-2022-0714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196358">SUSE bug 1196358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0729" ref_url="https://www.suse.com/security/cve/CVE-2022-0729" source="SUSE CVE"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0729/">CVE-2022-0729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0729">CVE-2022-0729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196437">SUSE bug 1196437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0742" ref_url="https://www.suse.com/security/cve/CVE-2022-0742" source="SUSE CVE"/>
    <description>
    Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0742/">CVE-2022-0742 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0742">CVE-2022-0742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197128">SUSE bug 1197128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197129">SUSE bug 1197129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7FRPEEZ7WUHWJ2PK7C5GZJJTXRGWJB2/" source="SUSE-SU"/>
    <description>
    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197328">SUSE bug 1197328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197340">SUSE bug 1197340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199100">SUSE bug 1199100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199254">SUSE bug 1199254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199339">SUSE bug 1199339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200090">SUSE bug 1200090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225670">SUSE bug 1225670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009673279" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009673282" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847" source="SUSE CVE"/>
		<reference ref_id="SUSE-BLOG-DIRTY-PIPE" ref_url="https://www.suse.com/c/suse-statement-on-dirty-pipe-attack/" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="TID000020603" ref_url="https://www.suse.com/support/kb/doc/?id=000020603" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
    <description>
    A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847">CVE-2022-0847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671417" comment="kernel-rt-5.3.18-76.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0850">CVE-2022-0850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
    <description>
    A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679488" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0943" ref_url="https://www.suse.com/security/cve/CVE-2022-0943" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0943/">CVE-2022-0943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197225">SUSE bug 1197225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0995" ref_url="https://www.suse.com/security/cve/CVE-2022-0995" source="SUSE CVE"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    An out-of-bounds (OOB) memory write flaw was found in the Linux kernel's watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0995/">CVE-2022-0995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0995">CVE-2022-0995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197337">SUSE bug 1197337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0998" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0998" ref_url="https://www.suse.com/security/cve/CVE-2022-0998" source="SUSE CVE"/>
    <description>
    An integer overflow flaw was found in the Linux kernel's virtio device driver code in the way a user triggers the vhost_vdpa_config_validate function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0998/">CVE-2022-0998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0998">CVE-2022-0998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197247">SUSE bug 1197247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197338">SUSE bug 1197338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1043" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1043" ref_url="https://www.suse.com/security/cve/CVE-2022-1043" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory, crash the system or escalate privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1043/">CVE-2022-1043 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1043">CVE-2022-1043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197393">SUSE bug 1197393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197596">SUSE bug 1197596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200041">SUSE bug 1200041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212325">SUSE bug 1212325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010859.html" source="SUSE-SU"/>
    <description>
    A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1127-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/76BLKP3BHKRBWFX4VJKKQJQXQTYEOOSX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    &lt;code&gt;NSSToken&lt;/code&gt; objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.8, Firefox &lt; 99, and Firefox ESR &lt; 91.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1097">CVE-2022-1097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009678060" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678062" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678064" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009678065" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1116" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1116" ref_url="https://www.suse.com/security/cve/CVE-2022-1116" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012083.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in io_uring of Linux Kernel allows local attacker to cause memory corruption and escalate privileges to root. This issue affects: Linux Kernel versions prior to 5.4.189; version 5.4.24 and later versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1116/">CVE-2022-1116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1116">CVE-2022-1116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199647">SUSE bug 1199647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199648">SUSE bug 1199648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1154" ref_url="https://www.suse.com/security/cve/CVE-2022-1154" source="SUSE CVE"/>
    <description>
    Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1154/">CVE-2022-1154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197813">SUSE bug 1197813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198133">SUSE bug 1198133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1160" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1160" ref_url="https://www.suse.com/security/cve/CVE-2022-1160" source="SUSE CVE"/>
    <description>
    heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1160/">CVE-2022-1160 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1160">CVE-2022-1160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197814">SUSE bug 1197814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1195" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1195" ref_url="https://www.suse.com/security/cve/CVE-2022-1195" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the Linux kernel in drivers/net/hamradio. This flaw allows a local attacker with a user privilege to cause a denial of service (DOS) when the mkiss or sixpack device is detached and reclaim resources early.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1195/">CVE-2022-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1195">CVE-2022-1195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198029">SUSE bug 1198029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1198" ref_url="https://www.suse.com/security/cve/CVE-2022-1198" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1198/">CVE-2022-1198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1198">CVE-2022-1198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198030">SUSE bug 1198030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1199" ref_url="https://www.suse.com/security/cve/CVE-2022-1199" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space, resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1199/">CVE-2022-1199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1199">CVE-2022-1199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198028">SUSE bug 1198028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1204" ref_url="https://www.suse.com/security/cve/CVE-2022-1204" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1204/">CVE-2022-1204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1204">CVE-2022-1204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198025">SUSE bug 1198025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1205" ref_url="https://www.suse.com/security/cve/CVE-2022-1205" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1205/">CVE-2022-1205 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1205">CVE-2022-1205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198027">SUSE bug 1198027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1247" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1247" ref_url="https://www.suse.com/security/cve/CVE-2022-1247" source="SUSE CVE"/>
    <description>
    An issue found in linux-kernel that leads to a race condition in rose_connect(). The rose driver uses rose_neigh-&gt;use to represent how many objects are using the rose_neigh. When a user wants to delete a rose_route via rose_ioctl(), the rose driver calls rose_del_node() and removes neighbours only if their "count" and "use" are zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1247/">CVE-2022-1247 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1247">CVE-2022-1247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199434">SUSE bug 1199434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199696">SUSE bug 1199696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1263" ref_url="https://www.suse.com/security/cve/CVE-2022-1263" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1263/">CVE-2022-1263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198189">SUSE bug 1198189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010979.html" source="SUSE-SU"/>
    <description>
    An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198812">SUSE bug 1198812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199107">SUSE bug 1199107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199108">SUSE bug 1199108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682445" comment="gzip-1.10-150200.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679181" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679182" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1280">CVE-2022-1280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198590">SUSE bug 1198590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011468.html" source="SUSE-SU"/>
    <description>
    The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200650">SUSE bug 1200650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200758">SUSE bug 1200758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011061.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201130">SUSE bug 1201130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009682231" comment="e2fsprogs-1.43.8-150000.4.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682235" comment="libcom_err2-1.43.8-150000.4.33.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009682238" comment="libext2fs2-1.43.8-150000.4.33.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1343</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1343" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1343" ref_url="https://www.suse.com/security/cve/CVE-2022-1343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
    <description>
    The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1343/">CVE-2022-1343 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199167">SUSE bug 1199167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1348" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1348" ref_url="https://www.suse.com/security/cve/CVE-2022-1348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011547.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1348/">CVE-2022-1348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199652">SUSE bug 1199652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009684924" comment="logrotate is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1381" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1381" ref_url="https://www.suse.com/security/cve/CVE-2022-1381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1381/">CVE-2022-1381 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1381">CVE-2022-1381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198596">SUSE bug 1198596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1420</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198748">SUSE bug 1198748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1434" ref_url="https://www.suse.com/security/cve/CVE-2022-1434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
    <description>
    The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such that the modified data would still pass the MAC integrity check. Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 endpoint will always be rejected by the recipient and the connection will fail at that point. Many application protocols require data to be sent from the client to the server first. Therefore, in such a case, only an OpenSSL 3.0 server would be impacted when talking to a non-OpenSSL 3.0 client. If both endpoints are OpenSSL 3.0 then the attacker could modify data being sent in both directions. In this case both clients and servers could be affected, regardless of the application protocol. Note that in the absence of an attacker this bug means that an OpenSSL 3.0 endpoint communicating with a non-OpenSSL 3.0 endpoint will fail to complete the handshake when using this ciphersuite. The confidentiality of data is not impacted by this issue, i.e. an attacker cannot decrypt data that has been encrypted using this ciphersuite - they can only modify it. In order for this attack to work both endpoints must legitimately negotiate the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in OpenSSL 3.0, and is not available within the default provider or the default ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been negotiated. In order for an OpenSSL 3.0 endpoint to use this ciphersuite the following must have occurred: 1) OpenSSL must have been compiled with the (non-default) compile time option enable-weak-ssl-ciphers 2) OpenSSL must have had the legacy provider explicitly loaded (either through application code or via configuration) 3) The ciphersuite must have been explicitly added to the ciphersuite list 4) The libssl security level must have been set to 0 (default is 1) 5) A version of SSL/TLS below TLSv1.3 must have been negotiated 6) Both endpoints must negotiate the RC4-MD5 ciphersuite in preference to any others that both endpoints have in common Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1434/">CVE-2022-1434 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1434">CVE-2022-1434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199168">SUSE bug 1199168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1473" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1473" ref_url="https://www.suse.com/security/cve/CVE-2022-1473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
    <description>
    The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1473/">CVE-2022-1473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199168">SUSE bug 1199168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199169">SUSE bug 1199169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333942" comment="openssl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334866" comment="libopenssl1_1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009333944" comment="openssl-1_1 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1508" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1508" ref_url="https://www.suse.com/security/cve/CVE-2022-1508" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in the Linux kernel's io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1508/">CVE-2022-1508 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1508">CVE-2022-1508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198968">SUSE bug 1198968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVHVSVNKKW7CC77JRUJ23MMS76WXHBBU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199235">SUSE bug 1199235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201754">SUSE bug 1201754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203032">SUSE bug 1203032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335823" comment="libpcre1 is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1619" ref_url="https://www.suse.com/security/cve/CVE-2022-1619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1619/">CVE-2022-1619 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619">CVE-2022-1619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199333">SUSE bug 1199333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1621" ref_url="https://www.suse.com/security/cve/CVE-2022-1621" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1621/">CVE-2022-1621 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199435">SUSE bug 1199435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1629" ref_url="https://www.suse.com/security/cve/CVE-2022-1629" source="SUSE CVE"/>
    <description>
    Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1629/">CVE-2022-1629 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199436">SUSE bug 1199436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1651" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1651" ref_url="https://www.suse.com/security/cve/CVE-2022-1651" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1651/">CVE-2022-1651 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1651">CVE-2022-1651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199433">SUSE bug 1199433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1671" ref_url="https://www.suse.com/security/cve/CVE-2022-1671" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1671/">CVE-2022-1671 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1671">CVE-2022-1671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199439">SUSE bug 1199439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1674" ref_url="https://www.suse.com/security/cve/CVE-2022-1674" source="SUSE CVE"/>
    <description>
    NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1674/">CVE-2022-1674 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674">CVE-2022-1674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199502">SUSE bug 1199502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1678" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1678" ref_url="https://www.suse.com/security/cve/CVE-2022-1678" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1678/">CVE-2022-1678 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1678">CVE-2022-1678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199939">SUSE bug 1199939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1733" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1733" ref_url="https://www.suse.com/security/cve/CVE-2022-1733" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1733/">CVE-2022-1733 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733">CVE-2022-1733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199655">SUSE bug 1199655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1769" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1769" ref_url="https://www.suse.com/security/cve/CVE-2022-1769" source="SUSE CVE"/>
    <description>
    Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1769/">CVE-2022-1769 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1769">CVE-2022-1769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199658">SUSE bug 1199658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1789" ref_url="https://www.suse.com/security/cve/CVE-2022-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1789/">CVE-2022-1789 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199674">SUSE bug 1199674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1851" ref_url="https://www.suse.com/security/cve/CVE-2022-1851" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1851/">CVE-2022-1851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851">CVE-2022-1851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199936">SUSE bug 1199936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199875">SUSE bug 1199875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1882" ref_url="https://www.suse.com/security/cve/CVE-2022-1882" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1882/">CVE-2022-1882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199904">SUSE bug 1199904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200058">SUSE bug 1200058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1886" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1886" ref_url="https://www.suse.com/security/cve/CVE-2022-1886" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1886/">CVE-2022-1886 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1886">CVE-2022-1886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199969">SUSE bug 1199969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Buffer Over-read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200012">SUSE bug 1200012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009475442" comment="vim-data-common is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009655960" comment="vim-small is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1943" ref_url="https://www.suse.com/security/cve/CVE-2022-1943" source="SUSE CVE"/>
    <description>
    A flaw out of bounds memory write in the Linux kernel UDF file system functionality was found in the way user triggers some file operation which triggers udf_write_fi(). A local user could use this flaw to crash the system or potentially
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1943/">CVE-2022-1943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1943">CVE-2022-1943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200055">SUSE bug 1200055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200529">SUSE bug 1200529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1972" ref_url="https://www.suse.com/security/cve/CVE-2022-1972" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1972/">CVE-2022-1972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-1972">CVE-2022-1972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200019">SUSE bug 1200019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200266">SUSE bug 1200266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1973" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1973" ref_url="https://www.suse.com/security/cve/CVE-2022-1973" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1973/">CVE-2022-1973 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1973">CVE-2022-1973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200023">SUSE bug 1200023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1998" ref_url="https://www.suse.com/security/cve/CVE-2022-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1998/">CVE-2022-1998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200284">SUSE bug 1200284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20009" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20009" ref_url="https://www.suse.com/security/cve/CVE-2022-20009" source="SUSE CVE"/>
    <description>
    In various functions of the USB gadget subsystem, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213172319References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20009/">CVE-2022-20009 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20009">CVE-2022-20009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199566">SUSE bug 1199566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20117" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20117" ref_url="https://www.suse.com/security/cve/CVE-2022-20117" source="SUSE CVE"/>
    <description>
    In (TBD) of (TBD), there is a possible way to decrypt local data encrypted by the GSC due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-217475903References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-20117/">CVE-2022-20117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20117">CVE-2022-20117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199569">SUSE bug 1199569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20118" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20118" ref_url="https://www.suse.com/security/cve/CVE-2022-20118" source="SUSE CVE"/>
    <description>
    In ion_ioctl and related functions of ion.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-205707793References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-20118/">CVE-2022-20118 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20118">CVE-2022-20118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199570">SUSE bug 1199570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20119" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20119" ref_url="https://www.suse.com/security/cve/CVE-2022-20119" source="SUSE CVE"/>
    <description>
    In private_handle_t of mali_gralloc_buffer.h, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-213170715References: N/A
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-20119/">CVE-2022-20119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20119">CVE-2022-20119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199563">SUSE bug 1199563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20148" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20148" ref_url="https://www.suse.com/security/cve/CVE-2022-20148" source="SUSE CVE"/>
    <description>
    In TBD of TBD, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-219513976References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20148/">CVE-2022-20148 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20148">CVE-2022-20148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200610">SUSE bug 1200610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20153" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20153" ref_url="https://www.suse.com/security/cve/CVE-2022-20153" source="SUSE CVE"/>
    <description>
    In rcu_cblist_dequeue of rcu_segcblist.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-222091980References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20153/">CVE-2022-20153 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20153">CVE-2022-20153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200609">SUSE bug 1200609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20158" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20158" ref_url="https://www.suse.com/security/cve/CVE-2022-20158" source="SUSE CVE"/>
    <description>
    In bdi_put and bdi_unregister of backing-dev.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182815710References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20158/">CVE-2022-20158 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20158">CVE-2022-20158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202345">SUSE bug 1202345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20371" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20371" ref_url="https://www.suse.com/security/cve/CVE-2022-20371" source="SUSE CVE"/>
    <description>
    In dm_bow_dtr and related functions of dm-bow.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-195565510References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20371/">CVE-2022-20371 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20371">CVE-2022-20371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202348">SUSE bug 1202348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20382" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20382" ref_url="https://www.suse.com/security/cve/CVE-2022-20382" source="SUSE CVE"/>
    <description>
    In (TBD) of (TBD), there is a possible out of bounds write due to kernel stack overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-214245176References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20382/">CVE-2022-20382 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20382">CVE-2022-20382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202349">SUSE bug 1202349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2078" ref_url="https://www.suse.com/security/cve/CVE-2022-2078" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2078/">CVE-2022-2078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200522">SUSE bug 1200522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21131" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21131" ref_url="https://www.suse.com/security/cve/CVE-2022-21131" source="SUSE CVE"/>
    <description>
    Improper access control for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-05-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21131/">CVE-2022-21131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21131">CVE-2022-21131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199633">SUSE bug 1199633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338728" comment="ucode-intel is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21136" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21136" ref_url="https://www.suse.com/security/cve/CVE-2022-21136" source="SUSE CVE"/>
    <description>
    Improper input validation for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-05-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21136/">CVE-2022-21136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21136">CVE-2022-21136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199632">SUSE bug 1199632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338728" comment="ucode-intel is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
    <description>
    In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-10"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201458">SUSE bug 1201458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a

    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-11"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22058" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22058" ref_url="https://www.suse.com/security/cve/CVE-2022-22058" source="SUSE CVE"/>
    <description>
    Memory corruption due to use after free issue in kernel while processing ION handles in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice &amp; Music, Snapdragon Wearables
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-22058/">CVE-2022-22058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22058">CVE-2022-22058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203777">SUSE bug 1203777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22075" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22075" ref_url="https://www.suse.com/security/cve/CVE-2022-22075" source="SUSE CVE"/>
    <description>
    Information Disclosure in Graphics during GPU context switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22075/">CVE-2022-22075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22075">CVE-2022-22075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209195">SUSE bug 1209195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2209" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2209" ref_url="https://www.suse.com/security/cve/CVE-2022-2209" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This CVE has been rejected as it was incorrectly assigned. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2209/">CVE-2022-2209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-2209">CVE-2022-2209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201828">SUSE bug 1201828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22822">CVE-2022-22822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22823">CVE-2022-22823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22824">CVE-2022-22824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22825">CVE-2022-22825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22826">CVE-2022-22826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:58-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:60-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5POFOWWCWJ3SLTEUIQRMKXQB4GOECNOP/" source="SUSE-SU"/>
    <description>
    storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22827">CVE-2022-22827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195327">SUSE bug 1195327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:14987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:14989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6VBWD2MJTOPNB6DMK7CF6TQJ4N7ZFUD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion's public key, which can result in attackers substituting arbitrary pillar data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22934">CVE-2022-22934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197765">SUSE bug 1197765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680833" comment="python3-salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680834" comment="salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680841" comment="salt-minion-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681002" comment="salt-transactional-update-3002.2-150200.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22935" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:14987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:14989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6VBWD2MJTOPNB6DMK7CF6TQJ4N7ZFUD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. A minion authentication denial of service can cause a MiTM attacker to force a minion process to stop by impersonating a master.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22935">CVE-2022-22935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197765">SUSE bug 1197765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680833" comment="python3-salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680834" comment="salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680841" comment="salt-minion-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681002" comment="salt-transactional-update-3002.2-150200.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22936" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:14987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:14989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6VBWD2MJTOPNB6DMK7CF6TQJ4N7ZFUD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Job publishes and file server replies are susceptible to replay attacks, which can result in an attacker replaying job publishes causing minions to run old jobs. File server replies can also be re-played. A sufficient craft attacker could gain root access on minion under certain scenarios.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22936">CVE-2022-22936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197765">SUSE bug 1197765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680833" comment="python3-salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680834" comment="salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680841" comment="salt-minion-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681002" comment="salt-transactional-update-3002.2-150200.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22941" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2022:14987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:14989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:14946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M6VBWD2MJTOPNB6DMK7CF6TQJ4N7ZFUD/" source="SUSE-SU"/>
    <description>
    An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. When configured as a Master-of-Masters, with a publisher_acl, if a user configured in the publisher_acl targets any minion connected to the Syndic, the Salt Master incorrectly interpreted no valid targets as valid, allowing configured users to target any of the minions connected to the syndic with their configured commands. This requires a syndic master combined with publisher_acl configured on the Master-of-Masters, allowing users specified in the publisher_acl to bypass permissions, publishing authorized commands to any configured minion.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22941">CVE-2022-22941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197765">SUSE bug 1197765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680833" comment="python3-salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680834" comment="salt-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680841" comment="salt-minion-3002.2-150200.64.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681002" comment="salt-transactional-update-3002.2-150200.64.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASMTCFCDULHGAOBQUFJH4PHVCQSTF7S6/" source="SUSE-SU"/>
    <description>
    The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling 'file' pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22942">CVE-2022-22942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23033" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIM2A32O55DKEA5CCA7L5EE2KL4DYQJF/" source="SUSE-SU"/>
    <description>
    arm: guest_physmap_remove_page not removing the p2m mappings The functions to remove one or more entries from a guest p2m pagetable on Arm (p2m_remove_mapping, guest_physmap_remove_page, and p2m_set_entry with mfn set to INVALID_MFN) do not actually clear the pagetable entry if the entry doesn't have the valid bit set. It is possible to have a valid pagetable entry without the valid bit set when a guest operating system uses set/way cache maintenance instructions. For instance, a guest issuing a set/way cache maintenance instruction, then calling the XENMEM_decrease_reservation hypercall to give back memory pages to Xen, might be able to retain access to those pages even after Xen started reusing them for other purposes.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23033">CVE-2022-23033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIM2A32O55DKEA5CCA7L5EE2KL4DYQJF/" source="SUSE-SU"/>
    <description>
    A PV guest could DoS Xen while unmapping a grant To address XSA-380, reference counting was introduced for grant mappings for the case where a PV guest would have the IOMMU enabled. PV guests can request two forms of mappings. When both are in use for any individual mapping, unmapping of such a mapping can be requested in two steps. The reference count for such a mapping would then mistakenly be decremented twice. Underflow of the counters gets detected, resulting in the triggering of a hypervisor bug check.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23034">CVE-2022-23034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23035" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010240.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0333-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIM2A32O55DKEA5CCA7L5EE2KL4DYQJF/" source="SUSE-SU"/>
    <description>
    Insufficient cleanup of passed-through device IRQs The management of IRQs associated with physical devices exposed to x86 HVM guests involves an iterative operation in particular when cleaning up after the guest's use of the device. In the case where an interrupt is not quiescent yet at the time this cleanup gets invoked, the cleanup attempt may be scheduled to be retried. When multiple interrupts are involved, this scheduling of a retry may get erroneously skipped. At the same time pointers may get cleared (resulting in a de-reference of NULL) and freed (resulting in a use-after-free), while other code would continue to assume them to be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23035">CVE-2022-23035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23036">CVE-2022-23036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23037">CVE-2022-23037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23038">CVE-2022-23038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23039">CVE-2022-23039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23040">CVE-2022-23040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23041">CVE-2022-23041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    Linux PV device frontends vulnerable to attacks by backends T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Several Linux PV device frontends are using the grant table interfaces for removing access rights of the backends in ways being subject to race conditions, resulting in potential data leaks, data corruption by malicious backends, and denial of service triggered by malicious backends: blkfront, netfront, scsifront and the gntalloc driver are testing whether a grant reference is still in use. If this is not the case, they assume that a following removal of the granted access will always succeed, which is not true in case the backend has mapped the granted page between those two operations. As a result the backend can keep access to the memory page of the guest no matter how the page will be used after the frontend I/O has finished. The xenbus driver has a similar problem, as it doesn't check the success of removing the granted access of a shared ring buffer. blkfront: CVE-2022-23036 netfront: CVE-2022-23037 scsifront: CVE-2022-23038 gntalloc: CVE-2022-23039 xenbus: CVE-2022-23040 blkfront, netfront, scsifront, usbfront, dmabuf, xenbus, 9p, kbdfront, and pvcalls are using a functionality to delay freeing a grant reference until it is no longer in use, but the freeing of the related data page is not synchronized with dropping the granted access. As a result the backend can keep access to the memory page even after it has been freed and then re-used for a different purpose. CVE-2022-23041 netfront will fail a BUG_ON() assertion if it fails to revoke access in the rx path. This will result in a Denial of Service (DoS) situation of the guest which can be triggered by the backend. CVE-2022-23042
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23042">CVE-2022-23042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199099">SUSE bug 1199099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199141">SUSE bug 1199141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2308" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2308" ref_url="https://www.suse.com/security/cve/CVE-2022-2308" source="SUSE CVE"/>
    <description>
    A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2308/">CVE-2022-2308 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2308">CVE-2022-2308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202573">SUSE bug 1202573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
    <description>
    The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23218">CVE-2022-23218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199869">SUSE bug 1199869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200036">SUSE bug 1200036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669024" comment="glibc-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669032" comment="glibc-locale-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669033" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010489.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0330-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUNMTSOEM6LU65NFICFVIHBARFG7LVO7/" source="SUSE-SU"/>
    <description>
    The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23219">CVE-2022-23219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199869">SUSE bug 1199869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200036">SUSE bug 1200036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669024" comment="glibc-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669032" comment="glibc-locale-2.26-13.65.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669033" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23222" ref_url="https://www.suse.com/security/cve/CVE-2022-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23222/">CVE-2022-23222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2327" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2327" ref_url="https://www.suse.com/security/cve/CVE-2022-2327" source="SUSE CVE"/>
    <description>
    io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2327/">CVE-2022-2327 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2327">CVE-2022-2327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201829">SUSE bug 1201829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZLUSHYXTE7JA3KCOVKZ5L36DTZE7VZM/" source="SUSE-SU"/>
    <description>
    The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23303">CVE-2022-23303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205064">SUSE bug 1205064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669199" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0716-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011164.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0716-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YZLUSHYXTE7JA3KCOVKZ5L36DTZE7VZM/" source="SUSE-SU"/>
    <description>
    The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23304">CVE-2022-23304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205064">SUSE bug 1205064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669199" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23648" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23648" ref_url="https://www.suse.com/security/cve/CVE-2022-23648" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0720-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0720-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZII6Q7ZAGJJ37CB2SMGVMILNG766D3EX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/43ATI5PP2NX5LEC336CTPYZBZIQPNK2B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFXT5GO737TPBRXIUOZS7A3WOJKWSJAX/" source="SUSE-SU"/>
    <description>
    containerd is a container runtime available as a daemon for Linux and Windows. A bug was found in containerd prior to versions 1.6.1, 1.5.10, and 1.14.12 where containers launched through containerd's CRI implementation on Linux with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kubernetes Pod Security Policy) and expose potentially sensitive information. Kubernetes and crictl can both be configured to use containerd's CRI implementation. This bug has been fixed in containerd 1.6.1, 1.5.10, and 1.4.12. Users should update to these versions to resolve the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23648/">CVE-2022-23648 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23648">CVE-2022-23648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196441">SUSE bug 1196441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681381" comment="containerd-1.5.11-150000.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681382" comment="docker-20.10.14_ce-150000.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2380</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2380" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2380" ref_url="https://www.suse.com/security/cve/CVE-2022-2380" source="SUSE CVE"/>
    <description>
    The Linux kernel was found vulnerable out of bounds memory access in the drivers/video/fbdev/sm712fb.c:smtcfb_read() function. The vulnerability could result in local attackers being able to crash the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2380/">CVE-2022-2380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2380">CVE-2022-2380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201378">SUSE bug 1201378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201456">SUSE bug 1201456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<reference ref_id="TID000020633" ref_url="https://www.suse.com/support/kb/doc/?id=000020633" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BCJZG2PLWMYBP7YS7O3T6NSE3AKSEBB/" source="SUSE-SU"/>
    <description>
    Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23852">CVE-2022-23852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196480">SUSE bug 1196480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009665462" comment="libexpat1-2.2.5-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010199.html" source="SUSE-SU"/>
		<reference ref_id="TID000020633" ref_url="https://www.suse.com/support/kb/doc/?id=000020633" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0498-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2BCJZG2PLWMYBP7YS7O3T6NSE3AKSEBB/" source="SUSE-SU"/>
    <description>
    Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23990">CVE-2022-23990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196480">SUSE bug 1196480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009665462" comment="libexpat1-2.2.5-3.12.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24122" ref_url="https://www.suse.com/security/cve/CVE-2022-24122" source="SUSE CVE"/>
    <description>
    kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24122/">CVE-2022-24122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24122">CVE-2022-24122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195306">SUSE bug 1195306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196028">SUSE bug 1196028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0743-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0743-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BPABQLPWLWVSDVE54YNNZUHMKWEV6F3X/" source="SUSE-SU"/>
    <description>
    In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-07-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24407">CVE-2022-24407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198600">SUSE bug 1198600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199112">SUSE bug 1199112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199494">SUSE bug 1199494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200197">SUSE bug 1200197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200200">SUSE bug 1200200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225034">SUSE bug 1225034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225669">SUSE bug 1225669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009669200" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669205" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669214" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24769" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24769" ref_url="https://www.suse.com/security/cve/CVE-2022-24769" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
    <description>
    Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executable programs have specified permitted file capabilities, otherwise unprivileged users and processes can execute those programs and gain the specified file capabilities up to the bounding set. Due to this bug, containers which included executable programs with inheritable file capabilities allowed otherwise unprivileged users and processes to additionally gain these inheritable file capabilities up to the container's bounding set. Containers which use Linux users and groups to perform privilege separation inside the container are most directly impacted. This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in Moby (Docker Engine) 20.10.14. Running containers should be stopped, deleted, and recreated for the inheritable capabilities to be reset. This fix changes Moby (Docker Engine) behavior such that containers are started with a more typical Linux environment. As a workaround, the entry point of a container can be modified to use a utility like `capsh(1)` to drop inheritable capabilities prior to the primary process starting.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-24769/">CVE-2022-24769 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24769">CVE-2022-24769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197517">SUSE bug 1197517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681381" comment="containerd-1.5.11-150000.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681382" comment="docker-20.10.14_ce-150000.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-&gt;buf release.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24958">CVE-2022-24958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24959">CVE-2022-24959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25235">CVE-2022-25235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201735">SUSE bug 1201735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669765" comment="libexpat1-2.2.5-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0844-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0844-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAE6CSZY5X5K62OKNSD5W35BIQQRELP4/" source="SUSE-SU"/>
    <description>
    xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-05-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201735">SUSE bug 1201735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671238" comment="libexpat1-2.2.5-3.19.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25258" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25258">CVE-2022-25258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202225265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25265" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25265" ref_url="https://www.suse.com/security/cve/CVE-2022-25265" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-25265/">CVE-2022-25265 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25265">CVE-2022-25265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196134">SUSE bug 1196134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009625089" comment="libgcc_s1 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009625100" comment="libstdc++6 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669765" comment="libexpat1-2.2.5-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199096">SUSE bug 1199096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669765" comment="libexpat1-2.2.5-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25315">CVE-2022-25315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201735">SUSE bug 1201735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009669765" comment="libexpat1-2.2.5-3.15.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25375</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PDLUIZF7VQIB7OV6GCQHOPOBN2UU2POW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIEQJF6RAZADJBWJQFLIHOBULB4E2C7K/" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25375">CVE-2022-25375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25636" ref_url="https://www.suse.com/security/cve/CVE-2022-25636" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="TID000020615" ref_url="https://www.suse.com/support/kb/doc/?id=000020615" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25636/">CVE-2022-25636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25636">CVE-2022-25636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196299">SUSE bug 1196299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196301">SUSE bug 1196301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
    <description>
    It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202094">SUSE bug 1202094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202163">SUSE bug 1202163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2590" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2590" ref_url="https://www.suse.com/security/cve/CVE-2022-2590" source="SUSE CVE"/>
    <description>
    A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2590/">CVE-2022-2590 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2590">CVE-2022-2590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202013">SUSE bug 1202013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202089">SUSE bug 1202089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2602" ref_url="https://www.suse.com/security/cve/CVE-2022-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013718.html" source="SUSE-SU"/>
    <description>
    io_uring UAF, Unix SCM garbage collection
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-10"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2602/">CVE-2022-2602 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2602">CVE-2022-2602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204228">SUSE bug 1204228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205186">SUSE bug 1205186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26353</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26353" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26353" ref_url="https://www.suse.com/security/cve/CVE-2022-26353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011391.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26353/">CVE-2022-26353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198711">SUSE bug 1198711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333988" comment="qemu is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335414" comment="qemu-arm is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335214" comment="qemu-ipxe is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335244" comment="qemu-seabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335245" comment="qemu-sgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335217" comment="qemu-tools is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335218" comment="qemu-vgabios is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335246" comment="qemu-x86 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26356" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
    <description>
    Racy interactions between dirty vram tracking and paging log dirty hypercalls Activation of log dirty mode done by XEN_DMOP_track_dirty_vram (was named HVMOP_track_dirty_vram before Xen 4.9) is racy with ongoing log dirty hypercalls. A suitably timed call to XEN_DMOP_track_dirty_vram can enable log dirty while another CPU is still in the process of tearing down the structures related to a previously enabled log dirty mode (XEN_DOMCTL_SHADOW_OP_OFF). This is due to lack of mutually exclusive locking between both operations and can lead to entries being added in already freed slots, resulting in a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26356">CVE-2022-26356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26357" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
    <description>
    race in VT-d domain ID cleanup Xen domain IDs are up to 15 bits wide. VT-d hardware may allow for only less than 15 bits to hold a domain ID associating a physical device with a particular domain. Therefore internally Xen domain IDs are mapped to the smaller value range. The cleaning up of the housekeeping structures has a race, allowing for VT-d domain IDs to be leaked and flushes to be bypassed.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26357">CVE-2022-26357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26358</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26358" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26358">CVE-2022-26358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26359" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26359">CVE-2022-26359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26360</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26360" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26360">CVE-2022-26360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26361</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26361" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011336.html" source="SUSE-SU"/>
    <description>
    IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Certain PCI devices in a system might be assigned Reserved Memory Regions (specified via Reserved Memory Region Reporting, "RMRR") for Intel VT-d or Unity Mapping ranges for AMD-Vi. These are typically used for platform tasks such as legacy USB emulation. Since the precise purpose of these regions is unknown, once a device associated with such a region is active, the mappings of these regions need to remain continuouly accessible by the device. This requirement has been violated. Subsequent DMA or interrupts from the device may have unpredictable behaviour, ranging from IOMMU faults to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26361">CVE-2022-26361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26490">CVE-2022-26490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201656">SUSE bug 1201656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201969">SUSE bug 1201969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26878" ref_url="https://www.suse.com/security/cve/CVE-2022-26878" source="SUSE CVE"/>
    <description>
    drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26878/">CVE-2022-26878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26878">CVE-2022-26878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197035">SUSE bug 1197035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.16.12. drivers/net/usb/sr9700.c allows attackers to obtain sensitive information from heap memory via crafted frame lengths from a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26966">CVE-2022-26966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/" source="SUSE-SU"/>
    <description>
    The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009681381" comment="containerd-1.5.11-150000.68.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009681382" comment="docker-20.10.14_ce-150000.163.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27223" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27223" ref_url="https://www.suse.com/security/cve/CVE-2022-27223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
    <description>
    In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27223/">CVE-2022-27223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27223">CVE-2022-27223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197245">SUSE bug 1197245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197131">SUSE bug 1197131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27778" ref_url="https://www.suse.com/security/cve/CVE-2022-27778" source="SUSE CVE"/>
    <description>
    A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-27778/">CVE-2022-27778 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27778">CVE-2022-27778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199220">SUSE bug 1199220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27779" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27779" ref_url="https://www.suse.com/security/cve/CVE-2022-27779" source="SUSE CVE"/>
    <description>
    libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27779/">CVE-2022-27779 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27779">CVE-2022-27779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199221">SUSE bug 1199221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27780" ref_url="https://www.suse.com/security/cve/CVE-2022-27780" source="SUSE CVE"/>
    <description>
    The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-27780/">CVE-2022-27780 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27780">CVE-2022-27780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199222">SUSE bug 1199222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2785" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2785" ref_url="https://www.suse.com/security/cve/CVE-2022-2785" source="SUSE CVE"/>
    <description>
    There exists an arbitrary memory read within the Linux Kernel BPF - Constants provided to fill pointers in structs passed in to bpf_sys_bpf are not verified and can point anywhere, including memory not owned by BPF. An attacker with CAP_BPF can arbitrarily read memory from anywhere on the system. We recommend upgrading past commit 86f44fcec22c
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2785/">CVE-2022-2785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2785">CVE-2022-2785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203734">SUSE bug 1203734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27950" ref_url="https://www.suse.com/security/cve/CVE-2022-27950" source="SUSE CVE"/>
    <description>
    In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27950/">CVE-2022-27950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27950">CVE-2022-27950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197646">SUSE bug 1197646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28348</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28348" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28348" ref_url="https://www.suse.com/security/cve/CVE-2022-28348" source="SUSE CVE"/>
    <description>
    Arm Mali GPU Kernel Driver (Midgard r4p0 through r31p0, Bifrost r0p0 through r36p0 before r37p0, and Valhall r19p0 through r36p0 before r37p0) allows improper GPU memory operations to reach a use-after-free situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28348/">CVE-2022-28348 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28348">CVE-2022-28348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199720">SUSE bug 1199720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28349</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28349" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28349" ref_url="https://www.suse.com/security/cve/CVE-2022-28349" source="SUSE CVE"/>
    <description>
    Arm Mali GPU Kernel Driver has a use-after-free: Midgard r28p0 through r29p0 before r30p0, Bifrost r17p0 through r23p0 before r24p0, and Valhall r19p0 through r23p0 before r24p0.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28349/">CVE-2022-28349 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28349">CVE-2022-28349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199761">SUSE bug 1199761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28350</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28350" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28350" ref_url="https://www.suse.com/security/cve/CVE-2022-28350" source="SUSE CVE"/>
    <description>
    Arm Mali GPU Kernel Driver allows improper GPU operations in Valhall r29p0 through r36p0 before r37p0 to reach a use-after-free situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28350/">CVE-2022-28350 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28350">CVE-2022-28350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199762">SUSE bug 1199762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
    <description>
    usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
    <description>
    mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28389">CVE-2022-28389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201657">SUSE bug 1201657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
    <description>
    ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201517">SUSE bug 1201517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207969">SUSE bug 1207969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2873" ref_url="https://www.suse.com/security/cve/CVE-2022-2873" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-20"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2873/">CVE-2022-2873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202558">SUSE bug 1202558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198440">SUSE bug 1198440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009348236" comment="libruby2_5-2_5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348228" comment="ruby2.5 is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009348239" comment="ruby2.5-stdlib is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-10-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28748">CVE-2022-28748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28796" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28796" ref_url="https://www.suse.com/security/cve/CVE-2022-28796" source="SUSE CVE"/>
    <description>
    jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28796/">CVE-2022-28796 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28796">CVE-2022-28796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198325">SUSE bug 1198325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198594">SUSE bug 1198594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
    <description>
    The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198330">SUSE bug 1198330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2905" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2905" ref_url="https://www.suse.com/security/cve/CVE-2022-2905" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in the Linux kernel's BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-30"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2905/">CVE-2022-2905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2905">CVE-2022-2905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202860">SUSE bug 1202860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29156" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29156" ref_url="https://www.suse.com/security/cve/CVE-2022-29156" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
    <description>
    drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29156/">CVE-2022-29156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29156">CVE-2022-29156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198515">SUSE bug 1198515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2938" ref_url="https://www.suse.com/security/cve/CVE-2022-2938" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-24"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2938/">CVE-2022-2938 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2938">CVE-2022-2938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202623">SUSE bug 1202623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29582" ref_url="https://www.suse.com/security/cve/CVE-2022-29582" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29582/">CVE-2022-29582 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29582">CVE-2022-29582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198811">SUSE bug 1198811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199750">SUSE bug 1199750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2959" ref_url="https://www.suse.com/security/cve/CVE-2022-2959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2959/">CVE-2022-2959 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202681">SUSE bug 1202681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202685">SUSE bug 1202685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2961" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2961" ref_url="https://www.suse.com/security/cve/CVE-2022-2961" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's PLP Rose functionality in the way a user triggers a race condition by calling bind while simultaneously triggering the rose_bind() function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-08"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2961/">CVE-2022-2961 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2961">CVE-2022-2961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202660">SUSE bug 1202660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2978" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2978" ref_url="https://www.suse.com/security/cve/CVE-2022-2978" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2978/">CVE-2022-2978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2978">CVE-2022-2978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202700">SUSE bug 1202700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204745">SUSE bug 1204745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29968" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29968" ref_url="https://www.suse.com/security/cve/CVE-2022-29968" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-&gt;private.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29968/">CVE-2022-29968 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29968">CVE-2022-29968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199087">SUSE bug 1199087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30115" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30115" ref_url="https://www.suse.com/security/cve/CVE-2022-30115" source="SUSE CVE"/>
    <description>
    Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30115/">CVE-2022-30115 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30115">CVE-2022-30115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199225">SUSE bug 1199225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204386">SUSE bug 1204386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206308">SUSE bug 1206308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3061" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3061" ref_url="https://www.suse.com/security/cve/CVE-2022-3061" source="SUSE CVE"/>
    <description>
    Found Linux Kernel flaw in the i740 driver. The Userspace program could pass any values to the driver through ioctl() interface. The driver doesn't check the value of 'pixclock', so it may cause a divide by zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-31"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3061/">CVE-2022-3061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3061">CVE-2022-3061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202913">SUSE bug 1202913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222765">SUSE bug 1222765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222770">SUSE bug 1222770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3077" ref_url="https://www.suse.com/security/cve/CVE-2022-3077" source="SUSE CVE"/>
    <description>
    A buffer overflow vulnerability was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2024-06-05"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3077/">CVE-2022-3077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3077">CVE-2022-3077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203040">SUSE bug 1203040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3078" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3078" ref_url="https://www.suse.com/security/cve/CVE-2022-3078" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. There is a lack of check after calling vzalloc() and lack of free after allocation in drivers/media/test-drivers/vidtv/vidtv_s302m.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-02"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3078/">CVE-2022-3078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3078">CVE-2022-3078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203041">SUSE bug 1203041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3103" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3103" ref_url="https://www.suse.com/security/cve/CVE-2022-3103" source="SUSE CVE"/>
    <description>
    off-by-one in io_uring module.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-29"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3103/">CVE-2022-3103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3103">CVE-2022-3103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203801">SUSE bug 1203801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3104" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3104" ref_url="https://www.suse.com/security/cve/CVE-2022-3104" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3104/">CVE-2022-3104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3104">CVE-2022-3104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206396">SUSE bug 1206396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3105" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3105" ref_url="https://www.suse.com/security/cve/CVE-2022-3105" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3105/">CVE-2022-3105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3105">CVE-2022-3105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206398">SUSE bug 1206398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3106" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3106" ref_url="https://www.suse.com/security/cve/CVE-2022-3106" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3106/">CVE-2022-3106 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3106">CVE-2022-3106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206397">SUSE bug 1206397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3111" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3111" ref_url="https://www.suse.com/security/cve/CVE-2022-3111" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3111/">CVE-2022-3111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3111">CVE-2022-3111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206394">SUSE bug 1206394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3112" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3112" ref_url="https://www.suse.com/security/cve/CVE-2022-3112" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3112/">CVE-2022-3112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3112">CVE-2022-3112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206399">SUSE bug 1206399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3113" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3113" ref_url="https://www.suse.com/security/cve/CVE-2022-3113" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3113/">CVE-2022-3113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3113">CVE-2022-3113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206390">SUSE bug 1206390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227890">SUSE bug 1227890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3114" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3114" ref_url="https://www.suse.com/security/cve/CVE-2022-3114" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3114/">CVE-2022-3114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3114">CVE-2022-3114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206391">SUSE bug 1206391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3115" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3115" ref_url="https://www.suse.com/security/cve/CVE-2022-3115" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3115/">CVE-2022-3115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3115">CVE-2022-3115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206393">SUSE bug 1206393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3170" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3170" ref_url="https://www.suse.com/security/cve/CVE-2022-3170" source="SUSE CVE"/>
    <description>
    An out-of-bounds access issue was found in the Linux kernel sound subsystem. It could occur when the 'id-&gt;name' provided by the user did not end with '\0'. A privileged local user could pass a specially crafted name through ioctl() interface and crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3170/">CVE-2022-3170 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3170">CVE-2022-3170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203321">SUSE bug 1203321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3176" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3176" ref_url="https://www.suse.com/security/cve/CVE-2022-3176" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    There exists a use-after-free in io_uring in the Linux kernel. Signalfd_poll() and binder_poll() use a waitqueue whose lifetime is the current task. It will send a POLLFREE notification to all waiters before the queue is freed. Unfortunately, the io_uring poll doesn't handle POLLFREE. This allows a use-after-free to occur if a signalfd or binder fd is polled with io_uring poll, and the waitqueue gets freed. We recommend upgrading past commit fc78b2fc21f10c4c9c4d5d659a685710ffa63659
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-01"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3176/">CVE-2022-3176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3176">CVE-2022-3176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203391">SUSE bug 1203391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203511">SUSE bug 1203511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3202" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3202" ref_url="https://www.suse.com/security/cve/CVE-2022-3202" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw in diFree in fs/jfs/inode.c in Journaled File System (JFS)in the Linux kernel. This could allow a local attacker to crash the system or leak kernel internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3202/">CVE-2022-3202 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3202">CVE-2022-3202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203389">SUSE bug 1203389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-21"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202992">SUSE bug 1202992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202993">SUSE bug 1202993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203002">SUSE bug 1203002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3238" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3238" ref_url="https://www.suse.com/security/cve/CVE-2022-3238" source="SUSE CVE"/>
    <description>
    A double-free flaw was found in the Linux kernel's NTFS3 subsystem in how a user triggers remount and umount simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-16"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3238/">CVE-2022-3238 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3238">CVE-2022-3238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204655">SUSE bug 1204655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32981" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32981" ref_url="https://www.suse.com/security/cve/CVE-2022-32981" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 5.18.3 on powerpc 32-bit platforms. There is a buffer overflow in ptrace PEEKUSER and POKEUSER (aka PEEKUSR and POKEUSR) when accessing floating point registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32981/">CVE-2022-32981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32981">CVE-2022-32981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200470">SUSE bug 1200470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3344</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3344" ref_url="https://www.suse.com/security/cve/CVE-2022-3344" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3344/">CVE-2022-3344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3344">CVE-2022-3344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204652">SUSE bug 1204652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-12"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34494" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34494" ref_url="https://www.suse.com/security/cve/CVE-2022-34494" source="SUSE CVE"/>
    <description>
    rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34494/">CVE-2022-34494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34494">CVE-2022-34494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201158">SUSE bug 1201158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34495" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34495" ref_url="https://www.suse.com/security/cve/CVE-2022-34495" source="SUSE CVE"/>
    <description>
    rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-34495/">CVE-2022-34495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34495">CVE-2022-34495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201159">SUSE bug 1201159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201171">SUSE bug 1201171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201177">SUSE bug 1201177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201222">SUSE bug 1201222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3526" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3526" ref_url="https://www.suse.com/security/cve/CVE-2022-3526" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in Linux Kernel. This vulnerability affects the function macvlan_handle_frame of the file drivers/net/macvlan.c of the component skb. The manipulation leads to memory leak. The attack can be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211024.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3526/">CVE-2022-3526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3526">CVE-2022-3526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204353">SUSE bug 1204353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3531" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3531" ref_url="https://www.suse.com/security/cve/CVE-2022-3531" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3531/">CVE-2022-3531 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3531">CVE-2022-3531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204420">SUSE bug 1204420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3532" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3532" ref_url="https://www.suse.com/security/cve/CVE-2022-3532" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3532/">CVE-2022-3532 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3532">CVE-2022-3532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204418">SUSE bug 1204418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3533" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3533" ref_url="https://www.suse.com/security/cve/CVE-2022-3533" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects the function parse_usdt_arg of the file tools/lib/bpf/usdt.c of the component BPF. The manipulation of the argument reg_name leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211031.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3533/">CVE-2022-3533 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3533">CVE-2022-3533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204393">SUSE bug 1204393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3534" ref_url="https://www.suse.com/security/cve/CVE-2022-3534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013756.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3534/">CVE-2022-3534 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3534">CVE-2022-3534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204391">SUSE bug 1204391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3535" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3535" ref_url="https://www.suse.com/security/cve/CVE-2022-3535" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3535/">CVE-2022-3535 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3535">CVE-2022-3535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204417">SUSE bug 1204417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3541" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3541" ref_url="https://www.suse.com/security/cve/CVE-2022-3541" source="SUSE CVE"/>
    <description>
    A vulnerability classified as critical has been found in Linux Kernel. This affects the function spl2sw_nvmem_get_mac_address of the file drivers/net/ethernet/sunplus/spl2sw_driver.c of the component BPF. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211041 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3541/">CVE-2022-3541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3541">CVE-2022-3541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204403">SUSE bug 1204403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3543" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3543" ref_url="https://www.suse.com/security/cve/CVE-2022-3543" source="SUSE CVE"/>
    <description>
    A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function unix_sock_destructor/unix_release_sock of the file net/unix/af_unix.c of the component BPF. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211043.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3543/">CVE-2022-3543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3543">CVE-2022-3543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204401">SUSE bug 1204401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3544" ref_url="https://www.suse.com/security/cve/CVE-2022-3544" source="SUSE CVE"/>
    <description>
    A vulnerability, which was classified as problematic, was found in Linux Kernel. Affected is the function damon_sysfs_add_target of the file mm/damon/sysfs.c of the component Netfilter. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211044.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3544/">CVE-2022-3544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3544">CVE-2022-3544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204404">SUSE bug 1204404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217458">SUSE bug 1217458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3577" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3577" ref_url="https://www.suse.com/security/cve/CVE-2022-3577" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory write flaw was found in the Linux kernel's Kid-friendly Wired Controller driver. This flaw allows a local user to crash or potentially escalate their privileges on the system. It is in bigben_probe of drivers/hid/hid-bigbenff.c. The reason is incorrect assumption - bigben devices all have inputs. However, malicious devices can break this assumption, leaking to out-of-bound write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3577/">CVE-2022-3577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3577">CVE-2022-3577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204470">SUSE bug 1204470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204486">SUSE bug 1204486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3595" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3595" ref_url="https://www.suse.com/security/cve/CVE-2022-3595" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been rated as problematic. Affected by this issue is the function sess_free_buffer of the file fs/cifs/sess.c of the component CIFS Handler. The manipulation leads to double free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211364.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3595/">CVE-2022-3595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3595">CVE-2022-3595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204476">SUSE bug 1204476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3606" ref_url="https://www.suse.com/security/cve/CVE-2022-3606" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3606/">CVE-2022-3606 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3606">CVE-2022-3606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204502">SUSE bug 1204502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36123" ref_url="https://www.suse.com/security/cve/CVE-2022-36123" source="SUSE CVE"/>
    <description>
    The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-08-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-36123/">CVE-2022-36123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36123">CVE-2022-36123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202010">SUSE bug 1202010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202583">SUSE bug 1202583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3619" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204569">SUSE bug 1204569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3623" ref_url="https://www.suse.com/security/cve/CVE-2022-3623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3623/">CVE-2022-3623 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204575">SUSE bug 1204575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3624" ref_url="https://www.suse.com/security/cve/CVE-2022-3624" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Linux Kernel and classified as problematic. Affected by this issue is the function rlb_arp_xmit of the file drivers/net/bonding/bond_alb.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211928.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3624/">CVE-2022-3624 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3624">CVE-2022-3624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204639">SUSE bug 1204639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204637">SUSE bug 1204637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3630" ref_url="https://www.suse.com/security/cve/CVE-2022-3630" source="SUSE CVE"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been rated as problematic. This issue affects some unknown processing of the file fs/fscache/cookie.c of the component IPsec. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211931.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3630/">CVE-2022-3630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3630">CVE-2022-3630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204634">SUSE bug 1204634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3633" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3633" ref_url="https://www.suse.com/security/cve/CVE-2022-3633" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-25"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3633/">CVE-2022-3633 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3633">CVE-2022-3633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204650">SUSE bug 1204650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3636" ref_url="https://www.suse.com/security/cve/CVE-2022-3636" source="SUSE CVE"/>
    <description>
    A vulnerability, which was classified as critical, was found in Linux Kernel. This affects the function __mtk_ppe_check_skb of the file drivers/net/ethernet/mediatek/mtk_ppe.c of the component Ethernet Handler. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211935.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3636/">CVE-2022-3636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3636">CVE-2022-3636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204638">SUSE bug 1204638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204624">SUSE bug 1204624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3642" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3642" ref_url="https://www.suse.com/security/cve/CVE-2022-3642" source="SUSE CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-3642/">CVE-2022-3642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3642">CVE-2022-3642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204626">SUSE bug 1204626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-29"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204780">SUSE bug 1204780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3910" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3910" ref_url="https://www.suse.com/security/cve/CVE-2022-3910" source="SUSE CVE"/>
    <description>
    Use After Free vulnerability in Linux Kernel allows Privilege Escalation. An improper Update of Reference Count in io_uring leads to Use-After-Free and Local Privilege Escalation. When io_msg_ring was invoked with a fixed file, it called io_fput_file() which improperly decreased its reference count (leading to Use-After-Free and Local Privilege Escalation). Fixed files are permanently registered to the ring, and should not be put separately. We recommend upgrading past commit https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679 https://github.com/torvalds/linux/commit/fc7222c3a9f56271fba02aabbfbae999042f1679
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3910/">CVE-2022-3910 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3910">CVE-2022-3910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205670">SUSE bug 1205670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203066">SUSE bug 1203066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203067">SUSE bug 1203067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39190" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203117">SUSE bug 1203117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3977" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3977" ref_url="https://www.suse.com/security/cve/CVE-2022-3977" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel MCTP (Management Component Transport Protocol) functionality. This issue occurs when a user simultaneously calls DROPTAG ioctl and socket close happens, which could allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3977/">CVE-2022-3977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3977">CVE-2022-3977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207048">SUSE bug 1207048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39842" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39842" ref_url="https://www.suse.com/security/cve/CVE-2022-39842" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in the Linux kernel before 5.19. In pxa3xx_gcu_write in drivers/video/fbdev/pxa3xx-gcu.c, the count parameter has a type conflict of size_t versus int, causing an integer overflow and bypassing the size check. After that, because it is used as the third argument to copy_from_user(), a heap overflow may occur. NOTE: the original discoverer disputes that the overflow can actually happen.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-06"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39842/">CVE-2022-39842 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39842">CVE-2022-39842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203124">SUSE bug 1203124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40476" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40476" ref_url="https://www.suse.com/security/cve/CVE-2022-40476" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was discovered in fs/io_uring.c in the Linux kernel before 5.15.62. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40476/">CVE-2022-40476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40476">CVE-2022-40476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203435">SUSE bug 1203435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40540" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40540" ref_url="https://www.suse.com/security/cve/CVE-2022-40540" source="SUSE CVE"/>
    <description>
    Memory corruption due to buffer copy without checking the size of input while loading firmware in Linux Kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40540/">CVE-2022-40540 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40540">CVE-2022-40540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209597">SUSE bug 1209597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41222" ref_url="https://www.suse.com/security/cve/CVE-2022-41222" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
    <description>
    mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-09-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41222/">CVE-2022-41222 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41222">CVE-2022-41222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203622">SUSE bug 1203622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203624">SUSE bug 1203624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209476">SUSE bug 1209476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4127" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4127" ref_url="https://www.suse.com/security/cve/CVE-2022-4127" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference issue was discovered in the Linux kernel in io_files_update_with_index_alloc. A local user could use this flaw to potentially crash the system causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4127/">CVE-2022-4127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4127">CVE-2022-4127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205703">SUSE bug 1205703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4128" ref_url="https://www.suse.com/security/cve/CVE-2022-4128" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4128/">CVE-2022-4128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4128">CVE-2022-4128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205704">SUSE bug 1205704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An incorrect TLB flush issue was found in the Linux kernel's GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-17"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205700">SUSE bug 1205700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205815">SUSE bug 1205815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203770">SUSE bug 1203770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203994">SUSE bug 1203994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41808" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41808" ref_url="https://www.suse.com/security/cve/CVE-2022-41808" source="SUSE CVE"/>
    <description>
    Improper buffer restriction in software for the Intel QAT Driver for Linux before version 1.7.l.4.12 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41808/">CVE-2022-41808 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41808">CVE-2022-41808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211315">SUSE bug 1211315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41849" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41849" ref_url="https://www.suse.com/security/cve/CVE-2022-41849" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41849/">CVE-2022-41849 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41849">CVE-2022-41849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203992">SUSE bug 1203992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217458">SUSE bug 1217458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42432" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42432" ref_url="https://www.suse.com/security/cve/CVE-2022-42432" source="SUSE CVE"/>
    <description>
    This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42432/">CVE-2022-42432 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42432">CVE-2022-42432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204614">SUSE bug 1204614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42719" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42719" ref_url="https://www.suse.com/security/cve/CVE-2022-42719" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42719/">CVE-2022-42719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42719">CVE-2022-42719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204051">SUSE bug 1204051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204292">SUSE bug 1204292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204059">SUSE bug 1204059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204291">SUSE bug 1204291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-18"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204060">SUSE bug 1204060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204290">SUSE bug 1204290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204125">SUSE bug 1204125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204289">SUSE bug 1204289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42916" ref_url="https://www.suse.com/security/cve/CVE-2022-42916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012718.html" source="SUSE-SU"/>
    <description>
    In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-10-27"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42916/">CVE-2022-42916 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42916">CVE-2022-42916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204386">SUSE bug 1204386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206308">SUSE bug 1206308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43551" ref_url="https://www.suse.com/security/cve/CVE-2022-43551" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013302.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in curl &lt;7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-22"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-43551/">CVE-2022-43551 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43551">CVE-2022-43551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206308">SUSE bug 1206308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009333977" comment="curl is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009335173" comment="libcurl4 is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4379</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-23"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206209">SUSE bug 1206209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206373">SUSE bug 1206373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4382" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4382" ref_url="https://www.suse.com/security/cve/CVE-2022-4382" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw caused by a race among the superblock operations in the gadgetfs Linux driver was found. It could be triggered by yanking out a device that is running the gadgetfs side.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4382/">CVE-2022-4382 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206363">SUSE bug 1206363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44032" ref_url="https://www.suse.com/security/cve/CVE-2022-44032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44032/">CVE-2022-44032 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44032">CVE-2022-44032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204894">SUSE bug 1204894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212290">SUSE bug 1212290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44033" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44033" ref_url="https://www.suse.com/security/cve/CVE-2022-44033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44033/">CVE-2022-44033 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44033">CVE-2022-44033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204922">SUSE bug 1204922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212306">SUSE bug 1212306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44034" ref_url="https://www.suse.com/security/cve/CVE-2022-44034" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-01"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44034/">CVE-2022-44034 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44034">CVE-2022-44034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204901">SUSE bug 1204901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45869" ref_url="https://www.suse.com/security/cve/CVE-2022-45869" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45869/">CVE-2022-45869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205882">SUSE bug 1205882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45888" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45888" ref_url="https://www.suse.com/security/cve/CVE-2022-45888" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-11-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45888/">CVE-2022-45888 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45888">CVE-2022-45888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205764">SUSE bug 1205764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46781" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46781" ref_url="https://www.suse.com/security/cve/CVE-2022-46781" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU memory processing operations to access a limited amount outside of buffer bounds. This affects Valhall r29p0 through r41p0 before r42p0 and Avalon r41p0 before r42p0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46781/">CVE-2022-46781 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46781">CVE-2022-46781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210235">SUSE bug 1210235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4696" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4696" ref_url="https://www.suse.com/security/cve/CVE-2022-4696" source="SUSE CVE"/>
    <description>
    There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag, which signals that the operation won't use current-&gt;nsproxy, so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current-&gt;nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4696/">CVE-2022-4696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4696">CVE-2022-4696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207118">SUSE bug 1207118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    A double-free flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-24"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209672">SUSE bug 1209672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47518" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47518" ref_url="https://www.suse.com/security/cve/CVE-2022-47518" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47518/">CVE-2022-47518 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47518">CVE-2022-47518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206511">SUSE bug 1206511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47519" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47519" ref_url="https://www.suse.com/security/cve/CVE-2022-47519" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47519/">CVE-2022-47519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47519">CVE-2022-47519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206512">SUSE bug 1206512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47520" ref_url="https://www.suse.com/security/cve/CVE-2022-47520" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-47520/">CVE-2022-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47520">CVE-2022-47520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206515">SUSE bug 1206515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207823">SUSE bug 1207823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47521" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47521" ref_url="https://www.suse.com/security/cve/CVE-2022-47521" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-47521/">CVE-2022-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47521">CVE-2022-47521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206516">SUSE bug 1206516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47938" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47938" ref_url="https://www.suse.com/security/cve/CVE-2022-47938" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47938/">CVE-2022-47938 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47938">CVE-2022-47938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206658">SUSE bug 1206658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47939" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47939" ref_url="https://www.suse.com/security/cve/CVE-2022-47939" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2024-04-18"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47939/">CVE-2022-47939 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47939">CVE-2022-47939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206654">SUSE bug 1206654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47940" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47940" ref_url="https://www.suse.com/security/cve/CVE-2022-47940" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.18 before 5.18.18. fs/ksmbd/smb2pdu.c lacks length validation in the non-padding case in smb2_write.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-26"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47940/">CVE-2022-47940 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47940">CVE-2022-47940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206679">SUSE bug 1206679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47941" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47941" ref_url="https://www.suse.com/security/cve/CVE-2022-47941" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47941/">CVE-2022-47941 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47941">CVE-2022-47941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206656">SUSE bug 1206656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47942" ref_url="https://www.suse.com/security/cve/CVE-2022-47942" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl, related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47942/">CVE-2022-47942 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47942">CVE-2022-47942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206657">SUSE bug 1206657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47943" ref_url="https://www.suse.com/security/cve/CVE-2022-47943" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE, when there is a large length in the zero DataOffset case.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-24"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47943/">CVE-2022-47943 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47943">CVE-2022-47943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206655">SUSE bug 1206655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47946" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47946" ref_url="https://www.suse.com/security/cve/CVE-2022-47946" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47946/">CVE-2022-47946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47946">CVE-2022-47946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206714">SUSE bug 1206714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4842" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4842" ref_url="https://www.suse.com/security/cve/CVE-2022-4842" source="SUSE CVE"/>
    <description>
    A flaw NULL Pointer Dereference in the Linux kernel NTFS3 driver function attr_punch_hole() was found. A local user could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2022-12-31"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4842/">CVE-2022-4842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4842">CVE-2022-4842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206749">SUSE bug 1206749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48423</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48423" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48423" ref_url="https://www.suse.com/security/cve/CVE-2022-48423" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 6.1.3, fs/ntfs3/record.c does not validate resident attribute names. An out-of-bounds write may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48423/">CVE-2022-48423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48423">CVE-2022-48423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209479">SUSE bug 1209479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48424</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48424" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48424" ref_url="https://www.suse.com/security/cve/CVE-2022-48424" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 6.1.3, fs/ntfs3/inode.c does not validate the attribute name offset. An unhandled page fault may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48424/">CVE-2022-48424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48424">CVE-2022-48424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209475">SUSE bug 1209475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48425</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48425" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48425" ref_url="https://www.suse.com/security/cve/CVE-2022-48425" source="SUSE CVE"/>
    <description>
    In the Linux kernel through 6.2.7, fs/ntfs3/inode.c has an invalid kfree because it does not validate MFT flags before replaying logs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48425/">CVE-2022-48425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48425">CVE-2022-48425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209501">SUSE bug 1209501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48502" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48502" ref_url="https://www.suse.com/security/cve/CVE-2022-48502" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads, leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48502/">CVE-2022-48502 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48502">CVE-2022-48502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211887">SUSE bug 1211887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix memory overlapping when deleting chars in the buffer

A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.

Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: drop messages from MDS when unmounting

When unmounting all the dirty buffers will be flushed and after
the last osd request is finished the last reference of the i_count
will be released. Then it will flush the dirty cap/snap to MDSs,
and the unmounting won't wait the possible acks, which will ihold
the inodes when updating the metadata locally but makes no sense
any more, of this. This will make the evict_inodes() to skip these
inodes.

If encrypt is enabled the kernel generate a warning when removing
the encrypt keys when the skipped inodes still hold the keyring:

WARNING: CPU: 4 PID: 168846 at fs/crypto/keyring.c:242 fscrypt_destroy_keyring+0x7e/0xd0
CPU: 4 PID: 168846 Comm: umount Tainted: G S  6.1.0-rc5-ceph-g72ead199864c #1
Hardware name: Supermicro SYS-5018R-WR/X10SRW-F, BIOS 2.0 12/17/2015
RIP: 0010:fscrypt_destroy_keyring+0x7e/0xd0
RSP: 0018:ffffc9000b277e28 EFLAGS: 00010202
RAX: 0000000000000002 RBX: ffff88810d52ac00 RCX: ffff88810b56aa00
RDX: 0000000080000000 RSI: ffffffff822f3a09 RDI: ffff888108f59000
RBP: ffff8881d394fb88 R08: 0000000000000028 R09: 0000000000000000
R10: 0000000000000001 R11: 11ff4fe6834fcd91 R12: ffff8881d394fc40
R13: ffff888108f59000 R14: ffff8881d394f800 R15: 0000000000000000
FS:  00007fd83f6f1080(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f918d417000 CR3: 000000017f89a005 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
generic_shutdown_super+0x47/0x120
kill_anon_super+0x14/0x30
ceph_kill_sb+0x36/0x90 [ceph]
deactivate_locked_super+0x29/0x60
cleanup_mnt+0xb8/0x140
task_work_run+0x67/0xb0
exit_to_user_mode_prepare+0x23d/0x240
syscall_exit_to_user_mode+0x25/0x60
do_syscall_64+0x40/0x80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fd83dc39e9b

Later the kernel will crash when iput() the inodes and dereferencing
the "sb-&gt;s_master_keys", which has been released by the
generic_shutdown_super().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220848">SUSE bug 1220848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qcom-rng - ensure buffer for generate is completely filled

The generate function in struct rng_alg expects that the destination
buffer is completely filled if the function returns 0. qcom_rng_read()
can run into a situation where the buffer is partially filled with
randomness and the remaining part of the buffer is zeroed since
qcom_rng_generate() doesn't check the return value. This issue can
be reproduced by running the following from libkcapi:

    kcapi-rng -b 9000000 &gt; OUTFILE

The generated OUTFILE will have three huge sections that contain all
zeros, and this is caused by the code where the test
'val &amp; PRNG_STATUS_DATA_AVAIL' fails.

Let's fix this issue by ensuring that qcom_rng_read() always returns
with a full buffer if the function returns success. Let's also have
qcom_rng_generate() return the correct value.

Here's some statistics from the ent project
(https://www.fourmilab.ch/random/) that shows information about the
quality of the generated numbers:

    $ ent -c qcom-random-before
    Value Char Occurrences Fraction
      0           606748   0.067416
      1            33104   0.003678
      2            33001   0.003667
    ...
    253   �        32883   0.003654
    254   �        33035   0.003671
    255   �        33239   0.003693

    Total:       9000000   1.000000

    Entropy = 7.811590 bits per byte.

    Optimum compression would reduce the size
    of this 9000000 byte file by 2 percent.

    Chi square distribution for 9000000 samples is 9329962.81, and
    randomly would exceed this value less than 0.01 percent of the
    times.

    Arithmetic mean value of data bytes is 119.3731 (127.5 = random).
    Monte Carlo value for Pi is 3.197293333 (error 1.77 percent).
    Serial correlation coefficient is 0.159130 (totally uncorrelated =
    0.0).

Without this patch, the results of the chi-square test is 0.01%, and
the numbers are certainly not random according to ent's project page.
The results improve with this patch:

    $ ent -c qcom-random-after
    Value Char Occurrences Fraction
      0            35432   0.003937
      1            35127   0.003903
      2            35424   0.003936
    ...
    253   �        35201   0.003911
    254   �        34835   0.003871
    255   �        35368   0.003930

    Total:       9000000   1.000000

    Entropy = 7.999979 bits per byte.

    Optimum compression would reduce the size
    of this 9000000 byte file by 0 percent.

    Chi square distribution for 9000000 samples is 258.77, and randomly
    would exceed this value 42.24 percent of the times.

    Arithmetic mean value of data bytes is 127.5006 (127.5 = random).
    Monte Carlo value for Pi is 3.141277333 (error 0.01 percent).
    Serial correlation coefficient is 0.000468 (totally uncorrelated =
    0.0).

This change was tested on a Nexus 5 phone (msm8974 SoC).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ

The commit referenced in the Fixes tag removed the 'break' from the else
branch in qcom_rng_read(), causing an infinite loop whenever 'max' is
not a multiple of WORD_SZ. This can be reproduced e.g. by running:

    kcapi-rng -b 67 &gt;/dev/null

There are many ways to fix this without adding back the 'break', but
they all seem more awkward than simply adding it back, so do just that.

Tested on a machine with Qualcomm Amberwing processor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48631" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0

When walking through an inode extents, the ext4_ext_binsearch_idx() function
assumes that the extent header has been previously validated.  However, there
are no checks that verify that the number of entries (eh-&gt;eh_entries) is
non-zero when depth is &gt; 0.  And this will lead to problems because the
EXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:

[  135.245946] ------------[ cut here ]------------
[  135.247579] kernel BUG at fs/ext4/extents.c:2258!
[  135.249045] invalid opcode: 0000 [#1] PREEMPT SMP
[  135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4
[  135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014
[  135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0
[  135.256475] Code:
[  135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246
[  135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023
[  135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c
[  135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c
[  135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024
[  135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000
[  135.272394] FS:  00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
[  135.274510] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0
[  135.277952] Call Trace:
[  135.278635]  &lt;TASK&gt;
[  135.279247]  ? preempt_count_add+0x6d/0xa0
[  135.280358]  ? percpu_counter_add_batch+0x55/0xb0
[  135.281612]  ? _raw_read_unlock+0x18/0x30
[  135.282704]  ext4_map_blocks+0x294/0x5a0
[  135.283745]  ? xa_load+0x6f/0xa0
[  135.284562]  ext4_mpage_readpages+0x3d6/0x770
[  135.285646]  read_pages+0x67/0x1d0
[  135.286492]  ? folio_add_lru+0x51/0x80
[  135.287441]  page_cache_ra_unbounded+0x124/0x170
[  135.288510]  filemap_get_pages+0x23d/0x5a0
[  135.289457]  ? path_openat+0xa72/0xdd0
[  135.290332]  filemap_read+0xbf/0x300
[  135.291158]  ? _raw_spin_lock_irqsave+0x17/0x40
[  135.292192]  new_sync_read+0x103/0x170
[  135.293014]  vfs_read+0x15d/0x180
[  135.293745]  ksys_read+0xa1/0xe0
[  135.294461]  do_syscall_64+0x3c/0x80
[  135.295284]  entry_SYSCALL_64_after_hwframe+0x46/0xb0

This patch simply adds an extra check in __ext4_ext_check(), verifying that
eh_entries is not 0 when eh_depth is &gt; 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()

memcpy() is called in a loop while 'operation-&gt;length' upper bound
is not checked and 'data_idx' also increments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48633" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48633" ref_url="https://www.suse.com/security/cve/CVE-2022-48633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix WARN_ON(lock-&gt;magic != lock) error

psb_gem_unpin() calls dma_resv_lock() but the underlying ww_mutex
gets destroyed by drm_gem_object_release() move the
drm_gem_object_release() call in psb_gem_free_object() to after
the unpin to fix the below warning:

[   79.693962] ------------[ cut here ]------------
[   79.693992] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
[   79.694015] WARNING: CPU: 0 PID: 240 at kernel/locking/mutex.c:582 __ww_mutex_lock.constprop.0+0x569/0xfb0
[   79.694052] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer qrtr bnep ath9k ath9k_common ath9k_hw snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel ath3k snd_intel_dspcfg mac80211 snd_intel_sdw_acpi btusb snd_hda_codec btrtl btbcm btintel btmtk bluetooth at24 snd_hda_core snd_hwdep uvcvideo snd_seq libarc4 videobuf2_vmalloc ath videobuf2_memops videobuf2_v4l2 videobuf2_common snd_seq_device videodev acer_wmi intel_powerclamp coretemp mc snd_pcm joydev sparse_keymap ecdh_generic pcspkr wmi_bmof cfg80211 i2c_i801 i2c_smbus snd_timer snd r8169 rfkill lpc_ich soundcore acpi_cpufreq zram rtsx_pci_sdmmc mmc_core serio_raw rtsx_pci gma500_gfx(E) video wmi ip6_tables ip_tables i2c_dev fuse
[   79.694436] CPU: 0 PID: 240 Comm: plymouthd Tainted: G        W   E      6.0.0-rc3+ #490
[   79.694457] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013
[   79.694469] RIP: 0010:__ww_mutex_lock.constprop.0+0x569/0xfb0
[   79.694496] Code: ff 85 c0 0f 84 15 fb ff ff 8b 05 ca 3c 11 01 85 c0 0f 85 07 fb ff ff 48 c7 c6 30 cb 84 aa 48 c7 c7 a3 e1 82 aa e8 ac 29 f8 ff &lt;0f&gt; 0b e9 ed fa ff ff e8 5b 83 8a ff 85 c0 74 10 44 8b 0d 98 3c 11
[   79.694513] RSP: 0018:ffffad1dc048bbe0 EFLAGS: 00010282
[   79.694623] RAX: 0000000000000028 RBX: 0000000000000000 RCX: 0000000000000000
[   79.694636] RDX: 0000000000000001 RSI: ffffffffaa8b0ffc RDI: 00000000ffffffff
[   79.694650] RBP: ffffad1dc048bc80 R08: 0000000000000000 R09: ffffad1dc048ba90
[   79.694662] R10: 0000000000000003 R11: ffffffffaad62fe8 R12: ffff9ff302103138
[   79.694675] R13: ffff9ff306ec8000 R14: ffff9ff307779078 R15: ffff9ff3014c0270
[   79.694690] FS:  00007ff1cccf1740(0000) GS:ffff9ff3bc200000(0000) knlGS:0000000000000000
[   79.694705] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   79.694719] CR2: 0000559ecbcb4420 CR3: 0000000013210000 CR4: 00000000000006f0
[   79.694734] Call Trace:
[   79.694749]  &lt;TASK&gt;
[   79.694761]  ? __schedule+0x47f/0x1670
[   79.694796]  ? psb_gem_unpin+0x27/0x1a0 [gma500_gfx]
[   79.694830]  ? lock_is_held_type+0xe3/0x140
[   79.694864]  ? ww_mutex_lock+0x38/0xa0
[   79.694885]  ? __cond_resched+0x1c/0x30
[   79.694902]  ww_mutex_lock+0x38/0xa0
[   79.694925]  psb_gem_unpin+0x27/0x1a0 [gma500_gfx]
[   79.694964]  psb_gem_unpin+0x199/0x1a0 [gma500_gfx]
[   79.694996]  drm_gem_object_release_handle+0x50/0x60
[   79.695020]  ? drm_gem_object_handle_put_unlocked+0xf0/0xf0
[   79.695042]  idr_for_each+0x4b/0xb0
[   79.695066]  ? _raw_spin_unlock_irqrestore+0x30/0x60
[   79.695095]  drm_gem_release+0x1c/0x30
[   79.695118]  drm_file_free.part.0+0x1ea/0x260
[   79.695150]  drm_release+0x6a/0x120
[   79.695175]  __fput+0x9f/0x260
[   79.695203]  task_work_run+0x59/0xa0
[   79.695227]  do_exit+0x387/0xbe0
[   79.695250]  ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90
[   79.695275]  ? lockdep_hardirqs_on+0x7d/0x100
[   79.695304]  do_group_exit+0x33/0xb0
[   79.695331]  __x64_sys_exit_group+0x14/0x20
[   79.695353]  do_syscall_64+0x58/0x80
[   79.695376]  ? up_read+0x17/0x20
[   79.695401]  ? lock_is_held_type+0xe3/0x140
[   79.695429]  ? asm_exc_page_fault+0x22/0x30
[   79.695450]  ? lockdep_hardirqs_on+0x7d/0x100
[   79.695473]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   79.695493] RIP: 0033:0x7ff1ccefe3f1
[   79.695516] Code: Unable to access opcode bytes at RIP 0x7ff1ccefe3c7.
[   79.695607] RSP: 002b:00007ffed4413378 EFLAGS: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48633/">CVE-2022-48633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48633">CVE-2022-48633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223489">SUSE bug 1223489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48634" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix BUG: sleeping function called from invalid context errors

gma_crtc_page_flip() was holding the event_lock spinlock while calling
crtc_funcs-&gt;mode_set_base() which takes ww_mutex.

The only reason to hold event_lock is to clear gma_crtc-&gt;page_flip_event
on mode_set_base() errors.

Instead unlock it after setting gma_crtc-&gt;page_flip_event and on
errors re-take the lock and clear gma_crtc-&gt;page_flip_event it
it is still set.

This fixes the following WARN/stacktrace:

[  512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870
[  512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell
[  512.123031] preempt_count: 1, expected: 0
[  512.123048] RCU nest depth: 0, expected: 0
[  512.123066] INFO: lockdep is turned off.
[  512.123080] irq event stamp: 0
[  512.123094] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123134] hardirqs last disabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123176] softirqs last  enabled at (0): [&lt;ffffffff8d0ec28c&gt;] copy_process+0x9fc/0x1de0
[  512.123207] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[  512.123233] Preemption disabled at:
[  512.123241] [&lt;0000000000000000&gt;] 0x0
[  512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G        W         5.19.0+ #1
[  512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013
[  512.123323] Call Trace:
[  512.123346]  &lt;TASK&gt;
[  512.123370]  dump_stack_lvl+0x5b/0x77
[  512.123412]  __might_resched.cold+0xff/0x13a
[  512.123458]  ww_mutex_lock+0x1e/0xa0
[  512.123495]  psb_gem_pin+0x2c/0x150 [gma500_gfx]
[  512.123601]  gma_pipe_set_base+0x76/0x240 [gma500_gfx]
[  512.123708]  gma_crtc_page_flip+0x95/0x130 [gma500_gfx]
[  512.123808]  drm_mode_page_flip_ioctl+0x57d/0x5d0
[  512.123897]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.123936]  drm_ioctl_kernel+0xa1/0x150
[  512.123984]  drm_ioctl+0x21f/0x420
[  512.124025]  ? drm_mode_cursor2_ioctl+0x10/0x10
[  512.124070]  ? rcu_read_lock_bh_held+0xb/0x60
[  512.124104]  ? lock_release+0x1ef/0x2d0
[  512.124161]  __x64_sys_ioctl+0x8d/0xd0
[  512.124203]  do_syscall_64+0x58/0x80
[  512.124239]  ? do_syscall_64+0x67/0x80
[  512.124267]  ? trace_hardirqs_on_prepare+0x55/0xe0
[  512.124300]  ? do_syscall_64+0x67/0x80
[  512.124340]  ? rcu_read_lock_sched_held+0x10/0x80
[  512.124377]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  512.124411] RIP: 0033:0x7fcc4a70740f
[  512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00
[  512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f
[  512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009
[  512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034
[  512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0
[  512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0
[  512.124647]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48635" ref_url="https://www.suse.com/security/cve/CVE-2022-48635" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsdax: Fix infinite loop in dax_iomap_rw()

I got an infinite loop and a WARNING report when executing a tail command
in virtiofs.

  WARNING: CPU: 10 PID: 964 at fs/iomap/iter.c:34 iomap_iter+0x3a2/0x3d0
  Modules linked in:
  CPU: 10 PID: 964 Comm: tail Not tainted 5.19.0-rc7
  Call Trace:
  &lt;TASK&gt;
  dax_iomap_rw+0xea/0x620
  ? __this_cpu_preempt_check+0x13/0x20
  fuse_dax_read_iter+0x47/0x80
  fuse_file_read_iter+0xae/0xd0
  new_sync_read+0xfe/0x180
  ? 0xffffffff81000000
  vfs_read+0x14d/0x1a0
  ksys_read+0x6d/0xf0
  __x64_sys_read+0x1a/0x20
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

The tail command will call read() with a count of 0. In this case,
iomap_iter() will report this WARNING, and always return 1 which casuing
the infinite loop in dax_iomap_rw().

Fixing by checking count whether is 0 in dax_iomap_rw().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48635/">CVE-2022-48635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48635">CVE-2022-48635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223497">SUSE bug 1223497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup

Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup
pointer being NULL.

The pavgroup pointer is checked on the entrance of the function but
without the lcu-&gt;lock being held. Therefore there is a race window
between dasd_alias_get_start_dev() and _lcu_update() which sets
pavgroup to NULL with the lcu-&gt;lock held.

Fix by checking the pavgroup pointer with lcu-&gt;lock held.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: prevent skb UAF after handing over to PTP worker

When reading the timestamp is required bnxt_tx_int() hands
over the ownership of the completed skb to the PTP worker.
The skb should not be used afterwards, as the worker may
run before the rest of our code and free the skb, leading
to a use-after-free.

Since dev_kfree_skb_any() accepts NULL make the loss of
ownership more obvious and set skb to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: cgroup_get_from_id() must check the looked-up kn is a directory

cgroup has to be one kernfs dir, otherwise kernel panic is caused,
especially cgroup id is provide from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48639" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48639" ref_url="https://www.suse.com/security/cve/CVE-2022-48639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix possible refcount leak in tc_new_tfilter()

tfilter_put need to be called to put the refount got by tp-&gt;ops-&gt;get to
avoid possible refcount leak when chain-&gt;tmplt_ops != NULL and
chain-&gt;tmplt_ops != tp-&gt;ops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48639/">CVE-2022-48639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48639">CVE-2022-48639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223490">SUSE bug 1223490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48640" ref_url="https://www.suse.com/security/cve/CVE-2022-48640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix NULL deref in bond_rr_gen_slave_id

Fix a NULL dereference of the struct bonding.rr_tx_counter member because
if a bond is initially created with an initial mode != zero (Round Robin)
the memory required for the counter is never created and when the mode is
changed there is never any attempt to verify the memory is allocated upon
switching modes.

This causes the following Oops on an aarch64 machine:
    [  334.686773] Unable to handle kernel paging request at virtual address ffff2c91ac905000
    [  334.694703] Mem abort info:
    [  334.697486]   ESR = 0x0000000096000004
    [  334.701234]   EC = 0x25: DABT (current EL), IL = 32 bits
    [  334.706536]   SET = 0, FnV = 0
    [  334.709579]   EA = 0, S1PTW = 0
    [  334.712719]   FSC = 0x04: level 0 translation fault
    [  334.717586] Data abort info:
    [  334.720454]   ISV = 0, ISS = 0x00000004
    [  334.724288]   CM = 0, WnR = 0
    [  334.727244] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008044d662000
    [  334.733944] [ffff2c91ac905000] pgd=0000000000000000, p4d=0000000000000000
    [  334.740734] Internal error: Oops: 96000004 [#1] SMP
    [  334.745602] Modules linked in: bonding tls veth rfkill sunrpc arm_spe_pmu vfat fat acpi_ipmi ipmi_ssif ixgbe igb i40e mdio ipmi_devintf ipmi_msghandler arm_cmn arm_dsu_pmu cppc_cpufreq acpi_tad fuse zram crct10dif_ce ast ghash_ce sbsa_gwdt nvme drm_vram_helper drm_ttm_helper nvme_core ttm xgene_hwmon
    [  334.772217] CPU: 7 PID: 2214 Comm: ping Not tainted 6.0.0-rc4-00133-g64ae13ed4784 #4
    [  334.779950] Hardware name: GIGABYTE R272-P31-00/MP32-AR1-00, BIOS F18v (SCP: 1.08.20211002) 12/01/2021
    [  334.789244] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    [  334.796196] pc : bond_rr_gen_slave_id+0x40/0x124 [bonding]
    [  334.801691] lr : bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]
    [  334.807962] sp : ffff8000221733e0
    [  334.811265] x29: ffff8000221733e0 x28: ffffdbac8572d198 x27: ffff80002217357c
    [  334.818392] x26: 000000000000002a x25: ffffdbacb33ee000 x24: ffff07ff980fa000
    [  334.825519] x23: ffffdbacb2e398ba x22: ffff07ff98102000 x21: ffff07ff981029c0
    [  334.832646] x20: 0000000000000001 x19: ffff07ff981029c0 x18: 0000000000000014
    [  334.839773] x17: 0000000000000000 x16: ffffdbacb1004364 x15: 0000aaaabe2f5a62
    [  334.846899] x14: ffff07ff8e55d968 x13: ffff07ff8e55db30 x12: 0000000000000000
    [  334.854026] x11: ffffdbacb21532e8 x10: 0000000000000001 x9 : ffffdbac857178ec
    [  334.861153] x8 : ffff07ff9f6e5a28 x7 : 0000000000000000 x6 : 000000007c2b3742
    [  334.868279] x5 : ffff2c91ac905000 x4 : ffff2c91ac905000 x3 : ffff07ff9f554400
    [  334.875406] x2 : ffff2c91ac905000 x1 : 0000000000000001 x0 : ffff07ff981029c0
    [  334.882532] Call trace:
    [  334.884967]  bond_rr_gen_slave_id+0x40/0x124 [bonding]
    [  334.890109]  bond_xmit_roundrobin_slave_get+0x38/0xdc [bonding]
    [  334.896033]  __bond_start_xmit+0x128/0x3a0 [bonding]
    [  334.901001]  bond_start_xmit+0x54/0xb0 [bonding]
    [  334.905622]  dev_hard_start_xmit+0xb4/0x220
    [  334.909798]  __dev_queue_xmit+0x1a0/0x720
    [  334.913799]  arp_xmit+0x3c/0xbc
    [  334.916932]  arp_send_dst+0x98/0xd0
    [  334.920410]  arp_solicit+0xe8/0x230
    [  334.923888]  neigh_probe+0x60/0xb0
    [  334.927279]  __neigh_event_send+0x3b0/0x470
    [  334.931453]  neigh_resolve_output+0x70/0x90
    [  334.935626]  ip_finish_output2+0x158/0x514
    [  334.939714]  __ip_finish_output+0xac/0x1a4
    [  334.943800]  ip_finish_output+0x40/0xfc
    [  334.947626]  ip_output+0xf8/0x1a4
    [  334.950931]  ip_send_skb+0x5c/0x100
    [  334.954410]  ip_push_pending_frames+0x3c/0x60
    [  334.958758]  raw_sendmsg+0x458/0x6d0
    [  334.962325]  inet_sendmsg+0x50/0x80
    [  334.965805]  sock_sendmsg+0x60/0x6c
    [  334.969286]  __sys_sendto+0xc8/0x134
    [  334.972853]  __arm64_sys_sendto+0x34/0x4c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48640/">CVE-2022-48640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48640">CVE-2022-48640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223499">SUSE bug 1223499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48641" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48641" ref_url="https://www.suse.com/security/cve/CVE-2022-48641" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ebtables: fix memory leak when blob is malformed

The bug fix was incomplete, it "replaced" crash with a memory leak.
The old code had an assignment to "ret" embedded into the conditional,
restore this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48641/">CVE-2022-48641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48641">CVE-2022-48641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223476">SUSE bug 1223476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48642" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48642" ref_url="https://www.suse.com/security/cve/CVE-2022-48642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()

It seems to me that percpu memory for chain stats started leaking since
commit 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority to
hardware priority") when nft_chain_offload_priority() returned an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48642/">CVE-2022-48642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48642">CVE-2022-48642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223478">SUSE bug 1223478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48643" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48643" ref_url="https://www.suse.com/security/cve/CVE-2022-48643" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain()

syzbot is reporting underflow of nft_counters_enabled counter at
nf_tables_addchain() [1], for commit 43eb8949cfdffa76 ("netfilter:
nf_tables: do not leave chain stats enabled on error") missed that
nf_tables_chain_destroy() after nft_basechain_init() in the error path of
nf_tables_addchain() decrements the counter because nft_basechain_init()
makes nft_is_base_chain() return true by setting NFT_CHAIN_BASE flag.

Increment the counter immediately after returning from
nft_basechain_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48643/">CVE-2022-48643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48643">CVE-2022-48643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223480">SUSE bug 1223480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48644" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48644" ref_url="https://www.suse.com/security/cve/CVE-2022-48644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: avoid disabling offload when it was never enabled

In an incredibly strange API design decision, qdisc-&gt;destroy() gets
called even if qdisc-&gt;init() never succeeded, not exclusively since
commit 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation"),
but apparently also earlier (in the case of qdisc_create_dflt()).

The taprio qdisc does not fully acknowledge this when it attempts full
offload, because it starts off with q-&gt;flags = TAPRIO_FLAGS_INVALID in
taprio_init(), then it replaces q-&gt;flags with TCA_TAPRIO_ATTR_FLAGS
parsed from netlink (in taprio_change(), tail called from taprio_init()).

But in taprio_destroy(), we call taprio_disable_offload(), and this
determines what to do based on FULL_OFFLOAD_IS_ENABLED(q-&gt;flags).

But looking at the implementation of FULL_OFFLOAD_IS_ENABLED()
(a bitwise check of bit 1 in q-&gt;flags), it is invalid to call this macro
on q-&gt;flags when it contains TAPRIO_FLAGS_INVALID, because that is set
to U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on
an invalid set of flags.

As a result, it is possible to crash the kernel if user space forces an
error between setting q-&gt;flags = TAPRIO_FLAGS_INVALID, and the calling
of taprio_enable_offload(). This is because drivers do not expect the
offload to be disabled when it was never enabled.

The error that we force here is to attach taprio as a non-root qdisc,
but instead as child of an mqprio root qdisc:

$ tc qdisc add dev swp0 root handle 1: \
	mqprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc qdisc replace dev swp0 parent 1:1 \
	taprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \
	sched-entry S 0x7f 990000 sched-entry S 0x80 100000 \
	flags 0x0 clockid CLOCK_TAI
Unable to handle kernel paging request at virtual address fffffffffffffff8
[fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 96000004 [#1] PREEMPT SMP
Call trace:
 taprio_dump+0x27c/0x310
 vsc9959_port_setup_tc+0x1f4/0x460
 felix_port_setup_tc+0x24/0x3c
 dsa_slave_setup_tc+0x54/0x27c
 taprio_disable_offload.isra.0+0x58/0xe0
 taprio_destroy+0x80/0x104
 qdisc_create+0x240/0x470
 tc_modify_qdisc+0x1fc/0x6b0
 rtnetlink_rcv_msg+0x12c/0x390
 netlink_rcv_skb+0x5c/0x130
 rtnetlink_rcv+0x1c/0x2c

Fix this by keeping track of the operations we made, and undo the
offload only if we actually did it.

I've added "bool offloaded" inside a 4 byte hole between "int clockid"
and "atomic64_t picos_per_byte". Now the first cache line looks like
below:

$ pahole -C taprio_sched net/sched/sch_taprio.o
struct taprio_sched {
        struct Qdisc * *           qdiscs;               /*     0     8 */
        struct Qdisc *             root;                 /*     8     8 */
        u32                        flags;                /*    16     4 */
        enum tk_offsets            tk_offset;            /*    20     4 */
        int                        clockid;              /*    24     4 */
        bool                       offloaded;            /*    28     1 */

        /* XXX 3 bytes hole, try to pack */

        atomic64_t                 picos_per_byte;       /*    32     0 */

        /* XXX 8 bytes hole, try to pack */

        spinlock_t                 current_entry_lock;   /*    40     0 */

        /* XXX 8 bytes hole, try to pack */

        struct sched_entry *       current_entry;        /*    48     8 */
        struct sched_gate_list *   oper_sched;           /*    56     8 */
        /* --- cacheline 1 boundary (64 bytes) --- */
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48644/">CVE-2022-48644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48644">CVE-2022-48644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223511">SUSE bug 1223511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48645" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48645" ref_url="https://www.suse.com/security/cve/CVE-2022-48645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: deny offload of tc-based TSN features on VF interfaces

TSN features on the ENETC (taprio, cbs, gate, police) are configured
through a mix of command BD ring messages and port registers:
enetc_port_rd(), enetc_port_wr().

Port registers are a region of the ENETC memory map which are only
accessible from the PCIe Physical Function. They are not accessible from
the Virtual Functions.

Moreover, attempting to access these registers crashes the kernel:

$ echo 1 &gt; /sys/bus/pci/devices/0000\:00\:00.0/sriov_numvfs
pci 0000:00:01.0: [1957:ef00] type 00 class 0x020001
fsl_enetc_vf 0000:00:01.0: Adding to iommu group 15
fsl_enetc_vf 0000:00:01.0: enabling device (0000 -&gt; 0002)
fsl_enetc_vf 0000:00:01.0 eno0vf0: renamed from eth0
$ tc qdisc replace dev eno0vf0 root taprio num_tc 8 map 0 1 2 3 4 5 6 7 \
	queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \
	sched-entry S 0x7f 900000 sched-entry S 0x80 100000 flags 0x2
Unable to handle kernel paging request at virtual address ffff800009551a08
Internal error: Oops: 96000007 [#1] PREEMPT SMP
pc : enetc_setup_tc_taprio+0x170/0x47c
lr : enetc_setup_tc_taprio+0x16c/0x47c
Call trace:
 enetc_setup_tc_taprio+0x170/0x47c
 enetc_setup_tc+0x38/0x2dc
 taprio_change+0x43c/0x970
 taprio_init+0x188/0x1e0
 qdisc_create+0x114/0x470
 tc_modify_qdisc+0x1fc/0x6c0
 rtnetlink_rcv_msg+0x12c/0x390

Split enetc_setup_tc() into separate functions for the PF and for the
VF drivers. Also remove enetc_qos.o from being included into
enetc-vf.ko, since it serves absolutely no purpose there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48645/">CVE-2022-48645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48645">CVE-2022-48645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223508">SUSE bug 1223508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48646" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48646" ref_url="https://www.suse.com/security/cve/CVE-2022-48646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc/siena: fix null pointer dereference in efx_hard_start_xmit

Like in previous patch for sfc, prevent potential (but unlikely) NULL
pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48646/">CVE-2022-48646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48646">CVE-2022-48646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223502">SUSE bug 1223502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48647" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix TX channel offset when using legacy interrupts

In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but
that's not correct if efx_sepparate_tx_channels is false. In that case,
the offset is 0 because the tx queues are in the single existing channel
at index 0, together with the rx queue.

Without this fix, as soon as you try to send any traffic, it tries to
get the tx queues from an uninitialized channel getting these errors:
  WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
  [...]
  Call Trace:
   &lt;IRQ&gt;
   dev_hard_start_xmit+0xd7/0x230
   sch_direct_xmit+0x9f/0x360
   __dev_queue_xmit+0x890/0xa40
  [...]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48648" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix null pointer dereference in efx_hard_start_xmit

Trying to get the channel from the tx_queue variable here is wrong
because we can only be here if tx_queue is NULL, so we shouldn't
dereference it. As the above comment in the code says, this is very
unlikely to happen, but it's wrong anyway so let's fix it.

I hit this issue because of a different bug that caused tx_queue to be
NULL. If that happens, this is the error message that we get here:
  BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
  [...]
  RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48649" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48649" ref_url="https://www.suse.com/security/cve/CVE-2022-48649" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slab_common: fix possible double free of kmem_cache

When doing slub_debug test, kfence's 'test_memcache_typesafe_by_rcu'
kunit test case cause a use-after-free error:

  BUG: KASAN: use-after-free in kobject_del+0x14/0x30
  Read of size 8 at addr ffff888007679090 by task kunit_try_catch/261

  CPU: 1 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.0.0-rc5-next-20220916 #17
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x48
   print_address_description.constprop.0+0x87/0x2a5
   print_report+0x103/0x1ed
   kasan_report+0xb7/0x140
   kobject_del+0x14/0x30
   kmem_cache_destroy+0x130/0x170
   test_exit+0x1a/0x30
   kunit_try_run_case+0xad/0xc0
   kunit_generic_run_threadfn_adapter+0x26/0x50
   kthread+0x17b/0x1b0
   &lt;/TASK&gt;

The cause is inside kmem_cache_destroy():

kmem_cache_destroy
    acquire lock/mutex
    shutdown_cache
        schedule_work(kmem_cache_release) (if RCU flag set)
    release lock/mutex
    kmem_cache_release (if RCU flag not set)

In some certain timing, the scheduled work could be run before
the next RCU flag checking, which can then get a wrong value
and lead to double kmem_cache_release().

Fix it by caching the RCU flag inside protected area, just like 'refcnt'
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48649/">CVE-2022-48649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48649">CVE-2022-48649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223500">SUSE bug 1223500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48651" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Fix out-of-bound bugs caused by unset skb-&gt;mac_header

If an AF_PACKET socket is used to send packets through ipvlan and the
default xmit function of the AF_PACKET socket is changed from
dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option
name of PACKET_QDISC_BYPASS, the skb-&gt;mac_header may not be reset and
remains as the initial value of 65535, this may trigger slab-out-of-bounds
bugs as following:

=================================================================
UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6
ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33
all Trace:
print_address_description.constprop.0+0x1d/0x160
print_report.cold+0x4f/0x112
kasan_report+0xa3/0x130
ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]
ipvlan_start_xmit+0x29/0xa0 [ipvlan]
__dev_direct_xmit+0x2e2/0x380
packet_direct_xmit+0x22/0x60
packet_snd+0x7c9/0xc40
sock_sendmsg+0x9a/0xa0
__sys_sendto+0x18a/0x230
__x64_sys_sendto+0x74/0x90
do_syscall_64+0x3b/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The root cause is:
  1. packet_snd() only reset skb-&gt;mac_header when sock-&gt;type is SOCK_RAW
     and skb-&gt;protocol is not specified as in packet_parse_headers()

  2. packet_direct_xmit() doesn't reset skb-&gt;mac_header as dev_queue_xmit()

In this case, skb-&gt;mac_header is 65535 when ipvlan_xmit_mode_l2() is
called. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which
use "skb-&gt;head + skb-&gt;mac_header", out-of-bound access occurs.

This patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()
and reset mac header in multicast to solve this out-of-bound bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223514">SUSE bug 1223514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48652" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix crash by keep old cfg when update TCs more than queues

There are problems if allocated queues less than Traffic Classes.

Commit a632b2a4c920 ("ice: ethtool: Prohibit improper channel config
for DCB") already disallow setting less queues than TCs.

Another case is if we first set less queues, and later update more TCs
config due to LLDP, ice_vsi_cfg_tc() will failed but left dirty
num_txq/rxq and tc_cfg in vsi, that will cause invalid pointer access.

[   95.968089] ice 0000:3b:00.1: More TCs defined than queues/rings allocated.
[   95.968092] ice 0000:3b:00.1: Trying to use more Rx queues (8), than were allocated (1)!
[   95.968093] ice 0000:3b:00.1: Failed to config TC for VSI index: 0
[   95.969621] general protection fault: 0000 [#1] SMP NOPTI
[   95.969705] CPU: 1 PID: 58405 Comm: lldpad Kdump: loaded Tainted: G     U  W  O     --------- -t - 4.18.0 #1
[   95.969867] Hardware name: O.E.M/BC11SPSCB10, BIOS 8.23 12/30/2021
[   95.969992] RIP: 0010:devm_kmalloc+0xa/0x60
[   95.970052] Code: 5c ff ff ff 31 c0 5b 5d 41 5c c3 b8 f4 ff ff ff eb f4 0f 1f 40 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 89 d1 &lt;8b&gt; 97 60 02 00 00 48 8d 7e 18 48 39 f7 72 3f 55 89 ce 53 48 8b 4c
[   95.970344] RSP: 0018:ffffc9003f553888 EFLAGS: 00010206
[   95.970425] RAX: dead000000000200 RBX: ffffea003c425b00 RCX: 00000000006080c0
[   95.970536] RDX: 00000000006080c0 RSI: 0000000000000200 RDI: dead000000000200
[   95.970648] RBP: dead000000000200 R08: 00000000000463c0 R09: ffff888ffa900000
[   95.970760] R10: 0000000000000000 R11: 0000000000000002 R12: ffff888ff6b40100
[   95.970870] R13: ffff888ff6a55018 R14: 0000000000000000 R15: ffff888ff6a55460
[   95.970981] FS:  00007f51b7d24700(0000) GS:ffff88903ee80000(0000) knlGS:0000000000000000
[   95.971108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.971197] CR2: 00007fac5410d710 CR3: 0000000f2c1de002 CR4: 00000000007606e0
[   95.971309] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   95.971419] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   95.971530] PKRU: 55555554
[   95.971573] Call Trace:
[   95.971622]  ice_setup_rx_ring+0x39/0x110 [ice]
[   95.971695]  ice_vsi_setup_rx_rings+0x54/0x90 [ice]
[   95.971774]  ice_vsi_open+0x25/0x120 [ice]
[   95.971843]  ice_open_internal+0xb8/0x1f0 [ice]
[   95.971919]  ice_ena_vsi+0x4f/0xd0 [ice]
[   95.971987]  ice_dcb_ena_dis_vsi.constprop.5+0x29/0x90 [ice]
[   95.972082]  ice_pf_dcb_cfg+0x29a/0x380 [ice]
[   95.972154]  ice_dcbnl_setets+0x174/0x1b0 [ice]
[   95.972220]  dcbnl_ieee_set+0x89/0x230
[   95.972279]  ? dcbnl_ieee_del+0x150/0x150
[   95.972341]  dcb_doit+0x124/0x1b0
[   95.972392]  rtnetlink_rcv_msg+0x243/0x2f0
[   95.972457]  ? dcb_doit+0x14d/0x1b0
[   95.972510]  ? __kmalloc_node_track_caller+0x1d3/0x280
[   95.972591]  ? rtnl_calcit.isra.31+0x100/0x100
[   95.972661]  netlink_rcv_skb+0xcf/0xf0
[   95.972720]  netlink_unicast+0x16d/0x220
[   95.972781]  netlink_sendmsg+0x2ba/0x3a0
[   95.975891]  sock_sendmsg+0x4c/0x50
[   95.979032]  ___sys_sendmsg+0x2e4/0x300
[   95.982147]  ? kmem_cache_alloc+0x13e/0x190
[   95.985242]  ? __wake_up_common_lock+0x79/0x90
[   95.988338]  ? __check_object_size+0xac/0x1b0
[   95.991440]  ? _copy_to_user+0x22/0x30
[   95.994539]  ? move_addr_to_user+0xbb/0xd0
[   95.997619]  ? __sys_sendmsg+0x53/0x80
[   96.000664]  __sys_sendmsg+0x53/0x80
[   96.003747]  do_syscall_64+0x5b/0x1d0
[   96.006862]  entry_SYSCALL_64_after_hwframe+0x65/0xca

Only update num_txq/rxq when passed check, and restore tc_cfg if setup
queue map failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48653" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Don't double unplug aux on peer initiated reset

In the IDC callback that is accessed when the aux drivers request a reset,
the function to unplug the aux devices is called.  This function is also
called in the ice_prepare_for_reset function. This double call is causing
a "scheduling while atomic" BUG.

[  662.676430] ice 0000:4c:00.0 rocep76s0: cqp opcode = 0x1 maj_err_code = 0xffff min_err_code = 0x8003

[  662.676609] ice 0000:4c:00.0 rocep76s0: [Modify QP Cmd Error][op_code=8] status=-29 waiting=1 completion_err=1 maj=0xffff min=0x8003

[  662.815006] ice 0000:4c:00.0 rocep76s0: ICE OICR event notification: oicr = 0x10000003

[  662.815014] ice 0000:4c:00.0 rocep76s0: critical PE Error, GLPE_CRITERR=0x00011424

[  662.815017] ice 0000:4c:00.0 rocep76s0: Requesting a reset

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002

[  662.815475] BUG: scheduling while atomic: swapper/37/0/0x00010002
[  662.815477] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs rfkill 8021q garp mrp stp llc vfat fat rpcrdma intel_rapl_msr intel_rapl_common sunrpc i10nm_edac rdma_ucm nfit ib_srpt libnvdimm ib_isert iscsi_target_mod x86_pkg_temp_thermal intel_powerclamp coretemp target_core_mod snd_hda_intel ib_iser snd_intel_dspcfg libiscsi snd_intel_sdw_acpi scsi_transport_iscsi kvm_intel iTCO_wdt rdma_cm snd_hda_codec kvm iw_cm ipmi_ssif iTCO_vendor_support snd_hda_core irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel snd_hwdep snd_seq snd_seq_device rapl snd_pcm snd_timer isst_if_mbox_pci pcspkr isst_if_mmio irdma intel_uncore idxd acpi_ipmi joydev isst_if_common snd mei_me idxd_bus ipmi_si soundcore i2c_i801 mei ipmi_devintf i2c_smbus i2c_ismt ipmi_msghandler acpi_power_meter acpi_pad rv(OE) ib_uverbs ib_cm ib_core xfs libcrc32c ast i2c_algo_bit drm_vram_helper drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm_ttm_helpe
 r ttm
[  662.815546]  nvme nvme_core ice drm crc32c_intel i40e t10_pi wmi pinctrl_emmitsburg dm_mirror dm_region_hash dm_log dm_mod fuse
[  662.815557] Preemption disabled at:
[  662.815558] [&lt;0000000000000000&gt;] 0x0
[  662.815563] CPU: 37 PID: 0 Comm: swapper/37 Kdump: loaded Tainted: G S         OE     5.17.1 #2
[  662.815566] Hardware name: Intel Corporation D50DNP/D50DNP, BIOS SE5C6301.86B.6624.D18.2111021741 11/02/2021
[  662.815568] Call Trace:
[  662.815572]  &lt;IRQ&gt;
[  662.815574]  dump_stack_lvl+0x33/0x42
[  662.815581]  __schedule_bug.cold.147+0x7d/0x8a
[  662.815588]  __schedule+0x798/0x990
[  662.815595]  schedule+0x44/0xc0
[  662.815597]  schedule_preempt_disabled+0x14/0x20
[  662.815600]  __mutex_lock.isra.11+0x46c/0x490
[  662.815603]  ? __ibdev_printk+0x76/0xc0 [ib_core]
[  662.815633]  device_del+0x37/0x3d0
[  662.815639]  ice_unplug_aux_dev+0x1a/0x40 [ice]
[  662.815674]  ice_schedule_reset+0x3c/0xd0 [ice]
[  662.815693]  irdma_iidc_event_handler.cold.7+0xb6/0xd3 [irdma]
[  662.815712]  ? bitmap_find_next_zero_area_off+0x45/0xa0
[  662.815719]  ice_send_event_to_aux+0x54/0x70 [ice]
[  662.815741]  ice_misc_intr+0x21d/0x2d0 [ice]
[  662.815756]  __handle_irq_event_percpu+0x4c/0x180
[  662.815762]  handle_irq_event_percpu+0xf/0x40
[  662.815764]  handle_irq_event+0x34/0x60
[  662.815766]  handle_edge_irq+0x9a/0x1c0
[  662.815770]  __common_interrupt+0x62/0x100
[  662.815774]  common_interrupt+0xb4/0xd0
[  662.815779]  &lt;/IRQ&gt;
[  662.815780]  &lt;TASK&gt;
[  662.815780]  asm_common_interrupt+0x1e/0x40
[  662.815785] RIP: 0010:cpuidle_enter_state+0xd6/0x380
[  662.815789] Code: 49 89 c4 0f 1f 44 00 00 31 ff e8 65 d7 95 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 64 02 00 00 31 ff e8 ae c5 9c ff fb 45 85 f6 &lt;0f&gt; 88 12 01 00 00 49 63 d6 4c 2b 24 24 48 8d 04 52 48 8d 04 82 49
[  662.815791] RSP: 0018:ff2c2c4f18edbe80 EFLAGS: 00000202
[  662.815793] RAX: ff280805df140000 RBX: 0000000000000002 RCX: 000000000000001f
[  662.815795] RDX: 0000009a52da2d08 R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48654" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_osf: fix possible bogus match in nf_osf_find()

nf_osf_find() incorrectly returns true on mismatch, this leads to
copying uninitialized memory area in nft_osf which can be used to leak
stale kernel stack data to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48655" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Harden accesses to the reset domains

Accessing reset domains descriptors by the index upon the SCMI drivers
requests through the SCMI reset operations interface can potentially
lead to out-of-bound violations if the SCMI driver misbehave.

Add an internal consistency check before any such domains descriptors
accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48656" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()

We should call of_node_put() for the reference returned by
of_parse_phandle() in fail path or when it is not used anymore.
Here we only need to move the of_node_put() before the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48657" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: topology: fix possible overflow in amu_fie_setup()

cpufreq_get_hw_max_freq() returns max frequency in kHz as *unsigned int*,
while freq_inv_set_max_ratio() gets passed this frequency in Hz as 'u64'.
Multiplying max frequency by 1000 can potentially result in overflow --
multiplying by 1000ULL instead should avoid that...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48658" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48658" ref_url="https://www.suse.com/security/cve/CVE-2022-48658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: slub: fix flush_cpu_slab()/__free_slab() invocations in task context.

Commit 5a836bf6b09f ("mm: slub: move flush_cpu_slab() invocations
__free_slab() invocations out of IRQ context") moved all flush_cpu_slab()
invocations to the global workqueue to avoid a problem related
with deactivate_slab()/__free_slab() being called from an IRQ context
on PREEMPT_RT kernels.

When the flush_all_cpu_locked() function is called from a task context
it may happen that a workqueue with WQ_MEM_RECLAIM bit set ends up
flushing the global workqueue, this will cause a dependency issue.

 workqueue: WQ_MEM_RECLAIM nvme-delete-wq:nvme_delete_ctrl_work [nvme_core]
   is flushing !WQ_MEM_RECLAIM events:flush_cpu_slab
 WARNING: CPU: 37 PID: 410 at kernel/workqueue.c:2637
   check_flush_dependency+0x10a/0x120
 Workqueue: nvme-delete-wq nvme_delete_ctrl_work [nvme_core]
 RIP: 0010:check_flush_dependency+0x10a/0x120[  453.262125] Call Trace:
 __flush_work.isra.0+0xbf/0x220
 ? __queue_work+0x1dc/0x420
 flush_all_cpus_locked+0xfb/0x120
 __kmem_cache_shutdown+0x2b/0x320
 kmem_cache_destroy+0x49/0x100
 bioset_exit+0x143/0x190
 blk_release_queue+0xb9/0x100
 kobject_cleanup+0x37/0x130
 nvme_fc_ctrl_free+0xc6/0x150 [nvme_fc]
 nvme_free_ctrl+0x1ac/0x2b0 [nvme_core]

Fix this bug by creating a workqueue for the flush operation with
the WQ_MEM_RECLAIM bit set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48658/">CVE-2022-48658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48658">CVE-2022-48658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223496">SUSE bug 1223496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48659" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48659" ref_url="https://www.suse.com/security/cve/CVE-2022-48659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: fix to return errno if kmalloc() fails

In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to
out-of-memory, if it fails, return errno correctly rather than
triggering panic via BUG_ON();

kernel BUG at mm/slub.c:5893!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP

Call trace:
 sysfs_slab_add+0x258/0x260 mm/slub.c:5973
 __kmem_cache_create+0x60/0x118 mm/slub.c:4899
 create_cache mm/slab_common.c:229 [inline]
 kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335
 kmem_cache_create+0x1c/0x28 mm/slab_common.c:390
 f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]
 f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808
 f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149
 mount_bdev+0x1b8/0x210 fs/super.c:1400
 f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512
 legacy_get_tree+0x30/0x74 fs/fs_context.c:610
 vfs_get_tree+0x40/0x140 fs/super.c:1530
 do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040
 path_mount+0x358/0x914 fs/namespace.c:3370
 do_mount fs/namespace.c:3383 [inline]
 __do_sys_mount fs/namespace.c:3591 [inline]
 __se_sys_mount fs/namespace.c:3568 [inline]
 __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48659/">CVE-2022-48659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48659">CVE-2022-48659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223498">SUSE bug 1223498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48660" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully

When running gpio test on nxp-ls1028 platform with below command
gpiomon --num-events=3 --rising-edge gpiochip1 25
There will be a warning trace as below:
Call trace:
free_irq+0x204/0x360
lineevent_free+0x64/0x70
gpio_ioctl+0x598/0x6a0
__arm64_sys_ioctl+0xb4/0x100
invoke_syscall+0x5c/0x130
......
el0t_64_sync+0x1a0/0x1a4
The reason of this issue is that calling request_threaded_irq()
function failed, and then lineevent_free() is invoked to release
the resource. Since the lineevent_state::irq was already set, so
the subsequent invocation of free_irq() would trigger the above
warning call trace. To fix this issue, set the lineevent_state::irq
after the IRQ register successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48661" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48661" ref_url="https://www.suse.com/security/cve/CVE-2022-48661" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: mockup: Fix potential resource leakage when register a chip

If creation of software node fails, the locally allocated string
array is left unfreed. Free it on error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-05-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48661/">CVE-2022-48661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48661">CVE-2022-48661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223488">SUSE bug 1223488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48662" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Really move i915_gem_context.link under ref protection

i915_perf assumes that it can use the i915_gem_context reference to
protect its i915-&gt;gem.contexts.list iteration. However, this requires
that we do not remove the context from the list until after we drop the
final reference and release the struct. If, as currently, we remove the
context from the list during context_close(), the link.next pointer may
be poisoned while we are holding the context reference and cause a GPF:

[ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff
[ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP
[ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G            E     5.17.9 #180
[ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017
[ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]
[ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 &lt;49&gt; 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff
[ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202
[ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000
[ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68
[ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc
[ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860
[ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc
[ 4070.575016] FS:  00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000
[ 4070.575021] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0
[ 4070.575029] Call Trace:
[ 4070.575033]  &lt;TASK&gt;
[ 4070.575037]  lrc_configure_all_contexts+0x13e/0x150 [i915]
[ 4070.575103]  gen8_enable_metric_set+0x4d/0x90 [i915]
[ 4070.575164]  i915_perf_open_ioctl+0xbc0/0x1500 [i915]
[ 4070.575224]  ? asm_common_interrupt+0x1e/0x40
[ 4070.575232]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575290]  drm_ioctl_kernel+0x85/0x110
[ 4070.575296]  ? update_load_avg+0x5f/0x5e0
[ 4070.575302]  drm_ioctl+0x1d3/0x370
[ 4070.575307]  ? i915_oa_init_reg_state+0x110/0x110 [i915]
[ 4070.575382]  ? gen8_gt_irq_handler+0x46/0x130 [i915]
[ 4070.575445]  __x64_sys_ioctl+0x3c4/0x8d0
[ 4070.575451]  ? __do_softirq+0xaa/0x1d2
[ 4070.575456]  do_syscall_64+0x35/0x80
[ 4070.575461]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 4070.575467] RIP: 0033:0x7f1ed5c10397
[ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48
[ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397
[ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006
[ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005
[ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a
[ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0
[ 4070.575505]  &lt;/TASK&gt;
[ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223521">SUSE bug 1223521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: mockup: fix NULL pointer dereference when removing debugfs

We now remove the device's debugfs entries when unbinding the driver.
This now causes a NULL-pointer dereference on module exit because the
platform devices are unregistered *after* the global debugfs directory
has been recursively removed. Fix it by unregistering the devices first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48664" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix hang during unmount when stopping a space reclaim worker

Often when running generic/562 from fstests we can hang during unmount,
resulting in a trace like this:

  Sep 07 11:52:00 debian9 unknown: run fstests generic/562 at 2022-09-07 11:52:00
  Sep 07 11:55:32 debian9 kernel: INFO: task umount:49438 blocked for more than 120 seconds.
  Sep 07 11:55:32 debian9 kernel:       Not tainted 6.0.0-rc2-btrfs-next-122 #1
  Sep 07 11:55:32 debian9 kernel: "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  Sep 07 11:55:32 debian9 kernel: task:umount          state:D stack:    0 pid:49438 ppid: 25683 flags:0x00004000
  Sep 07 11:55:32 debian9 kernel: Call Trace:
  Sep 07 11:55:32 debian9 kernel:  &lt;TASK&gt;
  Sep 07 11:55:32 debian9 kernel:  __schedule+0x3c8/0xec0
  Sep 07 11:55:32 debian9 kernel:  ? rcu_read_lock_sched_held+0x12/0x70
  Sep 07 11:55:32 debian9 kernel:  schedule+0x5d/0xf0
  Sep 07 11:55:32 debian9 kernel:  schedule_timeout+0xf1/0x130
  Sep 07 11:55:32 debian9 kernel:  ? lock_release+0x224/0x4a0
  Sep 07 11:55:32 debian9 kernel:  ? lock_acquired+0x1a0/0x420
  Sep 07 11:55:32 debian9 kernel:  ? trace_hardirqs_on+0x2c/0xd0
  Sep 07 11:55:32 debian9 kernel:  __wait_for_common+0xac/0x200
  Sep 07 11:55:32 debian9 kernel:  ? usleep_range_state+0xb0/0xb0
  Sep 07 11:55:32 debian9 kernel:  __flush_work+0x26d/0x530
  Sep 07 11:55:32 debian9 kernel:  ? flush_workqueue_prep_pwqs+0x140/0x140
  Sep 07 11:55:32 debian9 kernel:  ? trace_clock_local+0xc/0x30
  Sep 07 11:55:32 debian9 kernel:  __cancel_work_timer+0x11f/0x1b0
  Sep 07 11:55:32 debian9 kernel:  ? close_ctree+0x12b/0x5b3 [btrfs]
  Sep 07 11:55:32 debian9 kernel:  ? __trace_bputs+0x10b/0x170
  Sep 07 11:55:32 debian9 kernel:  close_ctree+0x152/0x5b3 [btrfs]
  Sep 07 11:55:32 debian9 kernel:  ? evict_inodes+0x166/0x1c0
  Sep 07 11:55:32 debian9 kernel:  generic_shutdown_super+0x71/0x120
  Sep 07 11:55:32 debian9 kernel:  kill_anon_super+0x14/0x30
  Sep 07 11:55:32 debian9 kernel:  btrfs_kill_super+0x12/0x20 [btrfs]
  Sep 07 11:55:32 debian9 kernel:  deactivate_locked_super+0x2e/0xa0
  Sep 07 11:55:32 debian9 kernel:  cleanup_mnt+0x100/0x160
  Sep 07 11:55:32 debian9 kernel:  task_work_run+0x59/0xa0
  Sep 07 11:55:32 debian9 kernel:  exit_to_user_mode_prepare+0x1a6/0x1b0
  Sep 07 11:55:32 debian9 kernel:  syscall_exit_to_user_mode+0x16/0x40
  Sep 07 11:55:32 debian9 kernel:  do_syscall_64+0x48/0x90
  Sep 07 11:55:32 debian9 kernel:  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  Sep 07 11:55:32 debian9 kernel: RIP: 0033:0x7fcde59a57a7
  Sep 07 11:55:32 debian9 kernel: RSP: 002b:00007ffe914217c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
  Sep 07 11:55:32 debian9 kernel: RAX: 0000000000000000 RBX: 00007fcde5ae8264 RCX: 00007fcde59a57a7
  Sep 07 11:55:32 debian9 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055b57556cdd0
  Sep 07 11:55:32 debian9 kernel: RBP: 000055b57556cba0 R08: 0000000000000000 R09: 00007ffe91420570
  Sep 07 11:55:32 debian9 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  Sep 07 11:55:32 debian9 kernel: R13: 000055b57556cdd0 R14: 000055b57556ccb8 R15: 0000000000000000
  Sep 07 11:55:32 debian9 kernel:  &lt;/TASK&gt;

What happens is the following:

1) The cleaner kthread tries to start a transaction to delete an unused
   block group, but the metadata reservation can not be satisfied right
   away, so a reservation ticket is created and it starts the async
   metadata reclaim task (fs_info-&gt;async_reclaim_work);

2) Writeback for all the filler inodes with an i_size of 2K starts
   (generic/562 creates a lot of 2K files with the goal of filling
   metadata space). We try to create an inline extent for them, but we
   fail when trying to insert the inline extent with -ENOSPC (at
   cow_file_range_inline()) - since this is not critical, we fallback
   to non-inline mode (back to cow_file_range()), reserve extents
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48665" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48665" ref_url="https://www.suse.com/security/cve/CVE-2022-48665" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix overflow for large capacity partition

Using int type for sector index, there will be overflow in a large
capacity partition.

For example, if storage with sector size of 512 bytes and partition
capacity is larger than 2TB, there will be overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48665/">CVE-2022-48665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48665">CVE-2022-48665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223526">SUSE bug 1223526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48666" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48666" ref_url="https://www.suse.com/security/cve/CVE-2022-48666" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix a use-after-free

There are two .exit_cmd_priv implementations. Both implementations use
resources associated with the SCSI host. Make sure that these resources are
still available when .exit_cmd_priv is called by waiting inside
scsi_remove_host() until the tag set has been freed.

This commit fixes the following use-after-free:

==================================================================
BUG: KASAN: use-after-free in srp_exit_cmd_priv+0x27/0xd0 [ib_srp]
Read of size 8 at addr ffff888100337000 by task multipathd/16727
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x34/0x44
 print_report.cold+0x5e/0x5db
 kasan_report+0xab/0x120
 srp_exit_cmd_priv+0x27/0xd0 [ib_srp]
 scsi_mq_exit_request+0x4d/0x70
 blk_mq_free_rqs+0x143/0x410
 __blk_mq_free_map_and_rqs+0x6e/0x100
 blk_mq_free_tag_set+0x2b/0x160
 scsi_host_dev_release+0xf3/0x1a0
 device_release+0x54/0xe0
 kobject_put+0xa5/0x120
 device_release+0x54/0xe0
 kobject_put+0xa5/0x120
 scsi_device_dev_release_usercontext+0x4c1/0x4e0
 execute_in_process_context+0x23/0x90
 device_release+0x54/0xe0
 kobject_put+0xa5/0x120
 scsi_disk_release+0x3f/0x50
 device_release+0x54/0xe0
 kobject_put+0xa5/0x120
 disk_release+0x17f/0x1b0
 device_release+0x54/0xe0
 kobject_put+0xa5/0x120
 dm_put_table_device+0xa3/0x160 [dm_mod]
 dm_put_device+0xd0/0x140 [dm_mod]
 free_priority_group+0xd8/0x110 [dm_multipath]
 free_multipath+0x94/0xe0 [dm_multipath]
 dm_table_destroy+0xa2/0x1e0 [dm_mod]
 __dm_destroy+0x196/0x350 [dm_mod]
 dev_remove+0x10c/0x160 [dm_mod]
 ctl_ioctl+0x2c2/0x590 [dm_mod]
 dm_ctl_ioctl+0x5/0x10 [dm_mod]
 __x64_sys_ioctl+0xb4/0xf0
 dm_ctl_ioctl+0x5/0x10 [dm_mod]
 __x64_sys_ioctl+0xb4/0xf0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48666/">CVE-2022-48666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48666">CVE-2022-48666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223527">SUSE bug 1223527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48667" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in insert range

insert range doesn't discard the affected cached region
so can risk temporarily corrupting file data.

Also includes some minor cleanup (avoiding rereading
inode size repeatedly unnecessarily) to make it clearer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48668" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix temporary data corruption in collapse range

collapse range doesn't discard the affected cached region
so can risk temporarily corrupting the file data. This
fixes xfstest generic/031

I also decided to merge a minor cleanup to this into the same patch
(avoiding rereading inode size repeatedly unnecessarily) to make it
clearer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48669" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Fix potential memleak in papr_get_attr()

`buf` is allocated in papr_get_attr(), and krealloc() of `buf`
could fail. We need to free the original `buf` in the case of failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223756">SUSE bug 1223756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48670" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48670" ref_url="https://www.suse.com/security/cve/CVE-2022-48670" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

peci: cpu: Fix use-after-free in adev_release()

When auxiliary_device_add() returns an error, auxiliary_device_uninit()
is called, which causes refcount for device to be decremented and
.release callback will be triggered.

Because adev_release() re-calls auxiliary_device_uninit(), it will cause
use-after-free:
[ 1269.455172] WARNING: CPU: 0 PID: 14267 at lib/refcount.c:28 refcount_warn_saturate+0x110/0x15
[ 1269.464007] refcount_t: underflow; use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48670/">CVE-2022-48670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48670">CVE-2022-48670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223893">SUSE bug 1223893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: Add missing cpus_read_lock() to cgroup_attach_task_all()

syzbot is hitting percpu_rwsem_assert_held(&amp;cpu_hotplug_lock) warning at
cpuset_attach() [1], for commit 4f7e7236435ca0ab ("cgroup: Fix
threadgroup_rwsem &lt;-&gt; cpus_read_lock() deadlock") missed that
cpuset_attach() is also called from cgroup_attach_task_all().
Add cpus_read_lock() like what cgroup_procs_write_start() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48672" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: fdt: fix off-by-one error in unflatten_dt_nodes()

Commit 78c44d910d3e ("drivers/of: Fix depth when unflattening devicetree")
forgot to fix up the depth check in the loop body in unflatten_dt_nodes()
which makes it possible to overflow the nps[] buffer...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix possible access to freed memory in link clear

After modifying the QP to the Error state, all RX WR would be completed
with WC in IB_WC_WR_FLUSH_ERR status. Current implementation does not
wait for it is done, but destroy the QP and free the link group directly.
So there is a risk that accessing the freed memory in tasklet context.

Here is a crash example:

 BUG: unable to handle page fault for address: ffffffff8f220860
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD f7300e067 P4D f7300e067 PUD f7300f063 PMD 8c4e45063 PTE 800ffff08c9df060
 Oops: 0002 [#1] SMP PTI
 CPU: 1 PID: 0 Comm: swapper/1 Kdump: loaded Tainted: G S         OE     5.10.0-0607+ #23
 Hardware name: Inspur NF5280M4/YZMB-00689-101, BIOS 4.1.20 07/09/2018
 RIP: 0010:native_queued_spin_lock_slowpath+0x176/0x1b0
 Code: f3 90 48 8b 32 48 85 f6 74 f6 eb d5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 05 48 63 f6 48 05 00 c8 02 00 48 03 04 f5 00 09 98 8e &lt;48&gt; 89 10 8b 42 08 85 c0 75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 32
 RSP: 0018:ffffb3b6c001ebd8 EFLAGS: 00010086
 RAX: ffffffff8f220860 RBX: 0000000000000246 RCX: 0000000000080000
 RDX: ffff91db1f86c800 RSI: 000000000000173c RDI: ffff91db62bace00
 RBP: ffff91db62bacc00 R08: 0000000000000000 R09: c00000010000028b
 R10: 0000000000055198 R11: ffffb3b6c001ea58 R12: ffff91db80e05010
 R13: 000000000000000a R14: 0000000000000006 R15: 0000000000000040
 FS:  0000000000000000(0000) GS:ffff91db1f840000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff8f220860 CR3: 00000001f9580004 CR4: 00000000003706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  _raw_spin_lock_irqsave+0x30/0x40
  mlx5_ib_poll_cq+0x4c/0xc50 [mlx5_ib]
  smc_wr_rx_tasklet_fn+0x56/0xa0 [smc]
  tasklet_action_common.isra.21+0x66/0x100
  __do_softirq+0xd5/0x29c
  asm_call_irq_on_stack+0x12/0x20
  &lt;/IRQ&gt;
  do_softirq_own_stack+0x37/0x40
  irq_exit_rcu+0x9d/0xa0
  sysvec_call_function_single+0x34/0x80
  asm_sysvec_call_function_single+0x12/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223940">SUSE bug 1223940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48674" ref_url="https://www.suse.com/security/cve/CVE-2022-48674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix pcluster use-after-free on UP platforms

During stress testing with CONFIG_SMP disabled, KASAN reports as below:

==================================================================
BUG: KASAN: use-after-free in __mutex_lock+0xe5/0xc30
Read of size 8 at addr ffff8881094223f8 by task stress/7789

CPU: 0 PID: 7789 Comm: stress Not tainted 6.0.0-rc1-00002-g0d53d2e882f9 #3
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
Call Trace:
 &lt;TASK&gt;
..
 __mutex_lock+0xe5/0xc30
..
 z_erofs_do_read_page+0x8ce/0x1560
..
 z_erofs_readahead+0x31c/0x580
..
Freed by task 7787
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x20/0x30
 kasan_set_free_info+0x20/0x40
 __kasan_slab_free+0x10c/0x190
 kmem_cache_free+0xed/0x380
 rcu_core+0x3d5/0xc90
 __do_softirq+0x12d/0x389

Last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x97/0xb0
 call_rcu+0x3d/0x3f0
 erofs_shrink_workstation+0x11f/0x210
 erofs_shrink_scan+0xdc/0x170
 shrink_slab.constprop.0+0x296/0x530
 drop_slab+0x1c/0x70
 drop_caches_sysctl_handler+0x70/0x80
 proc_sys_call_handler+0x20a/0x2f0
 vfs_write+0x555/0x6c0
 ksys_write+0xbe/0x160
 do_syscall_64+0x3b/0x90

The root cause is that erofs_workgroup_unfreeze() doesn't reset to
orig_val thus it causes a race that the pcluster reuses unexpectedly
before freeing.

Since UP platforms are quite rare now, such path becomes unnecessary.
Let's drop such specific-designed path directly instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48674/">CVE-2022-48674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48674">CVE-2022-48674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223942">SUSE bug 1223942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48675" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix a nested dead lock as part of ODP flow

Fix a nested dead lock as part of ODP flow by using mmput_async().

From the below call trace [1] can see that calling mmput() once we have
the umem_odp-&gt;umem_mutex locked as required by
ib_umem_odp_map_dma_and_lock() might trigger in the same task the
exit_mmap()-&gt;__mmu_notifier_release()-&gt;mlx5_ib_invalidate_range() which
may dead lock when trying to lock the same mutex.

Moving to use mmput_async() will solve the problem as the above
exit_mmap() flow will be called in other task and will be executed once
the lock will be available.

[1]
[64843.077665] task:kworker/u133:2  state:D stack:    0 pid:80906 ppid:
2 flags:0x00004000
[64843.077672] Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]
[64843.077719] Call Trace:
[64843.077722]  &lt;TASK&gt;
[64843.077724]  __schedule+0x23d/0x590
[64843.077729]  schedule+0x4e/0xb0
[64843.077735]  schedule_preempt_disabled+0xe/0x10
[64843.077740]  __mutex_lock.constprop.0+0x263/0x490
[64843.077747]  __mutex_lock_slowpath+0x13/0x20
[64843.077752]  mutex_lock+0x34/0x40
[64843.077758]  mlx5_ib_invalidate_range+0x48/0x270 [mlx5_ib]
[64843.077808]  __mmu_notifier_release+0x1a4/0x200
[64843.077816]  exit_mmap+0x1bc/0x200
[64843.077822]  ? walk_page_range+0x9c/0x120
[64843.077828]  ? __cond_resched+0x1a/0x50
[64843.077833]  ? mutex_lock+0x13/0x40
[64843.077839]  ? uprobe_clear_state+0xac/0x120
[64843.077860]  mmput+0x5f/0x140
[64843.077867]  ib_umem_odp_map_dma_and_lock+0x21b/0x580 [ib_core]
[64843.077931]  pagefault_real_mr+0x9a/0x140 [mlx5_ib]
[64843.077962]  pagefault_mr+0xb4/0x550 [mlx5_ib]
[64843.077992]  pagefault_single_data_segment.constprop.0+0x2ac/0x560
[mlx5_ib]
[64843.078022]  mlx5_ib_eqe_pf_action+0x528/0x780 [mlx5_ib]
[64843.078051]  process_one_work+0x22b/0x3d0
[64843.078059]  worker_thread+0x53/0x410
[64843.078065]  ? process_one_work+0x3d0/0x3d0
[64843.078073]  kthread+0x12a/0x150
[64843.078079]  ? set_kthread_struct+0x50/0x50
[64843.078085]  ret_from_fork+0x22/0x30
[64843.078093]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48686" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix UAF when detecting digest errors

We should also bail from the io_work loop when we set rd_enabled to true,
so we don't attempt to read data from the socket when the TCP stream is
already out-of-sync or corrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226337">SUSE bug 1226337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48688" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix kernel crash during module removal

The driver incorrectly frees client instance and subsequent
i40e module removal leads to kernel crash.

Reproducer:
1. Do ethtool offline test followed immediately by another one
host# ethtool -t eth0 offline; ethtool -t eth0 offline
2. Remove recursively irdma module that also removes i40e module
host# modprobe -r irdma

Result:
[ 8675.035651] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.193774] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.201316] i40e 0000:3d:00.0 eno1: offline testing starting
[ 8675.358921] i40e 0000:3d:00.0 eno1: testing finished
[ 8675.496921] i40e 0000:3d:00.0: IRDMA hardware initialization FAILED init_state=2 status=-110
[ 8686.188955] i40e 0000:3d:00.1: i40e_ptp_stop: removed PHC on eno2
[ 8686.943890] i40e 0000:3d:00.1: Deleted LAN device PF1 bus=0x3d dev=0x00 func=0x01
[ 8686.952669] i40e 0000:3d:00.0: i40e_ptp_stop: removed PHC on eno1
[ 8687.761787] BUG: kernel NULL pointer dereference, address: 0000000000000030
[ 8687.768755] #PF: supervisor read access in kernel mode
[ 8687.773895] #PF: error_code(0x0000) - not-present page
[ 8687.779034] PGD 0 P4D 0
[ 8687.781575] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 8687.785935] CPU: 51 PID: 172891 Comm: rmmod Kdump: loaded Tainted: G        W I        5.19.0+ #2
[ 8687.794800] Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.0X.02.0001.051420190324 05/14/2019
[ 8687.805222] RIP: 0010:i40e_lan_del_device+0x13/0xb0 [i40e]
[ 8687.810719] Code: d4 84 c0 0f 84 b8 25 01 00 e9 9c 25 01 00 41 bc f4 ff ff ff eb 91 90 0f 1f 44 00 00 41 54 55 53 48 8b 87 58 08 00 00 48 89 fb &lt;48&gt; 8b 68 30 48 89 ef e8 21 8a 0f d5 48 89 ef e8 a9 78 0f d5 48 8b
[ 8687.829462] RSP: 0018:ffffa604072efce0 EFLAGS: 00010202
[ 8687.834689] RAX: 0000000000000000 RBX: ffff8f43833b2000 RCX: 0000000000000000
[ 8687.841821] RDX: 0000000000000000 RSI: ffff8f4b0545b298 RDI: ffff8f43833b2000
[ 8687.848955] RBP: ffff8f43833b2000 R08: 0000000000000001 R09: 0000000000000000
[ 8687.856086] R10: 0000000000000000 R11: 000ffffffffff000 R12: ffff8f43833b2ef0
[ 8687.863218] R13: ffff8f43833b2ef0 R14: ffff915103966000 R15: ffff8f43833b2008
[ 8687.870342] FS:  00007f79501c3740(0000) GS:ffff8f4adffc0000(0000) knlGS:0000000000000000
[ 8687.878427] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 8687.884174] CR2: 0000000000000030 CR3: 000000014276e004 CR4: 00000000007706e0
[ 8687.891306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 8687.898441] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 8687.905572] PKRU: 55555554
[ 8687.908286] Call Trace:
[ 8687.910737]  &lt;TASK&gt;
[ 8687.912843]  i40e_remove+0x2c0/0x330 [i40e]
[ 8687.917040]  pci_device_remove+0x33/0xa0
[ 8687.920962]  device_release_driver_internal+0x1aa/0x230
[ 8687.926188]  driver_detach+0x44/0x90
[ 8687.929770]  bus_remove_driver+0x55/0xe0
[ 8687.933693]  pci_unregister_driver+0x2a/0xb0
[ 8687.937967]  i40e_exit_module+0xc/0xf48 [i40e]

Two offline tests cause IRDMA driver failure (ETIMEDOUT) and this
failure is indicated back to i40e_client_subtask() that calls
i40e_client_del_instance() to free client instance referenced
by pf-&gt;cinst and sets this pointer to NULL. During the module
removal i40e_remove() calls i40e_lan_del_device() that dereferences
pf-&gt;cinst that is NULL -&gt; crash.
Do not remove client instance when client open callbacks fails and
just clear __I40E_CLIENT_INSTANCE_OPENED bit. The driver also needs
to take care about this situation (when netdev is up and client
is NOT opened) in i40e_notify_client_of_netdev_close() and
calls client close callback only when __I40E_CLIENT_INSTANCE_OPENED
is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48689" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48689" ref_url="https://www.suse.com/security/cve/CVE-2022-48689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: TX zerocopy should not sense pfmemalloc status

We got a recent syzbot report [1] showing a possible misuse
of pfmemalloc page status in TCP zerocopy paths.

Indeed, for pages coming from user space or other layers,
using page_is_pfmemalloc() is moot, and possibly could give
false positives.

There has been attempts to make page_is_pfmemalloc() more robust,
but not using it in the first place in this context is probably better,
removing cpu cycles.

Note to stable teams :

You need to backport 84ce071e38a6 ("net: introduce
__skb_fill_page_desc_noacc") as a prereq.

Race is more probable after commit c07aea3ef4d4
("mm: add a signature in struct page") because page_is_pfmemalloc()
is now using low order bit from page-&gt;lru.next, which can change
more often than page-&gt;index.

Low order bit should never be set for lru.next (when used as an anchor
in LRU list), so KCSAN report is mostly a false positive.

Backporting to older kernel versions seems not necessary.

[1]
BUG: KCSAN: data-race in lru_add_fn / tcp_build_frag

write to 0xffffea0004a1d2c8 of 8 bytes by task 18600 on cpu 0:
__list_add include/linux/list.h:73 [inline]
list_add include/linux/list.h:88 [inline]
lruvec_add_folio include/linux/mm_inline.h:105 [inline]
lru_add_fn+0x440/0x520 mm/swap.c:228
folio_batch_move_lru+0x1e1/0x2a0 mm/swap.c:246
folio_batch_add_and_move mm/swap.c:263 [inline]
folio_add_lru+0xf1/0x140 mm/swap.c:490
filemap_add_folio+0xf8/0x150 mm/filemap.c:948
__filemap_get_folio+0x510/0x6d0 mm/filemap.c:1981
pagecache_get_page+0x26/0x190 mm/folio-compat.c:104
grab_cache_page_write_begin+0x2a/0x30 mm/folio-compat.c:116
ext4_da_write_begin+0x2dd/0x5f0 fs/ext4/inode.c:2988
generic_perform_write+0x1d4/0x3f0 mm/filemap.c:3738
ext4_buffered_write_iter+0x235/0x3e0 fs/ext4/file.c:270
ext4_file_write_iter+0x2e3/0x1210
call_write_iter include/linux/fs.h:2187 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x468/0x760 fs/read_write.c:578
ksys_write+0xe8/0x1a0 fs/read_write.c:631
__do_sys_write fs/read_write.c:643 [inline]
__se_sys_write fs/read_write.c:640 [inline]
__x64_sys_write+0x3e/0x50 fs/read_write.c:640
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

read to 0xffffea0004a1d2c8 of 8 bytes by task 18611 on cpu 1:
page_is_pfmemalloc include/linux/mm.h:1740 [inline]
__skb_fill_page_desc include/linux/skbuff.h:2422 [inline]
skb_fill_page_desc include/linux/skbuff.h:2443 [inline]
tcp_build_frag+0x613/0xb20 net/ipv4/tcp.c:1018
do_tcp_sendpages+0x3e8/0xaf0 net/ipv4/tcp.c:1075
tcp_sendpage_locked net/ipv4/tcp.c:1140 [inline]
tcp_sendpage+0x89/0xb0 net/ipv4/tcp.c:1150
inet_sendpage+0x7f/0xc0 net/ipv4/af_inet.c:833
kernel_sendpage+0x184/0x300 net/socket.c:3561
sock_sendpage+0x5a/0x70 net/socket.c:1054
pipe_to_sendpage+0x128/0x160 fs/splice.c:361
splice_from_pipe_feed fs/splice.c:415 [inline]
__splice_from_pipe+0x222/0x4d0 fs/splice.c:559
splice_from_pipe fs/splice.c:594 [inline]
generic_splice_sendpage+0x89/0xc0 fs/splice.c:743
do_splice_from fs/splice.c:764 [inline]
direct_splice_actor+0x80/0xa0 fs/splice.c:931
splice_direct_to_actor+0x305/0x620 fs/splice.c:886
do_splice_direct+0xfb/0x180 fs/splice.c:974
do_sendfile+0x3bf/0x910 fs/read_write.c:1249
__do_sys_sendfile64 fs/read_write.c:1317 [inline]
__se_sys_sendfile64 fs/read_write.c:1303 [inline]
__x64_sys_sendfile64+0x10c/0x150 fs/read_write.c:1303
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0x0000000000000000 -&gt; 0xffffea0004a1d288

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 18611 Comm: syz-executor.4 Not tainted 6.0.0-rc2-syzkaller-00248-ge022620b5d05-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48689/">CVE-2022-48689 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48689">CVE-2022-48689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223959">SUSE bug 1223959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48690" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48690" ref_url="https://www.suse.com/security/cve/CVE-2022-48690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix DMA mappings leak

Fix leak, when user changes ring parameters.
During reallocation of RX buffers, new DMA mappings are created for
those buffers. New buffers with different RX ring count should
substitute older ones, but those buffers were freed in ice_vsi_cfg_rxq
and reallocated again with ice_alloc_rx_buf. kfree on rx_buf caused
leak of already mapped DMA.
Reallocate ZC with xdp_buf struct, when BPF program loads. Reallocate
back to rx_buf, when BPF program unloads.
If BPF program is loaded/unloaded and XSK pools are created, reallocate
RX queues accordingly in XDP_SETUP_XSK_POOL handler.

Steps for reproduction:
while :
do
	for ((i=0; i&lt;=8160; i=i+32))
	do
		ethtool -G enp130s0f0 rx $i tx $i
		sleep 0.5
		ethtool -g enp130s0f0
	done
done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48690/">CVE-2022-48690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48690">CVE-2022-48690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223960">SUSE bug 1223960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48691" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48691" ref_url="https://www.suse.com/security/cve/CVE-2022-48691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: clean up hook list when offload flags check fails

splice back the hook list so nft_chain_release_hook() has a chance to
release the hooks.

BUG: memory leak
unreferenced object 0xffff88810180b100 (size 96):
  comm "syz-executor133", pid 3619, jiffies 4294945714 (age 12.690s)
  hex dump (first 32 bytes):
    28 64 23 02 81 88 ff ff 28 64 23 02 81 88 ff ff  (d#.....(d#.....
    90 a8 aa 83 ff ff ff ff 00 00 b5 0f 81 88 ff ff  ................
  backtrace:
    [&lt;ffffffff83a8c59b&gt;] kmalloc include/linux/slab.h:600 [inline]
    [&lt;ffffffff83a8c59b&gt;] nft_netdev_hook_alloc+0x3b/0xc0 net/netfilter/nf_tables_api.c:1901
    [&lt;ffffffff83a9239a&gt;] nft_chain_parse_netdev net/netfilter/nf_tables_api.c:1998 [inline]
    [&lt;ffffffff83a9239a&gt;] nft_chain_parse_hook+0x33a/0x530 net/netfilter/nf_tables_api.c:2073
    [&lt;ffffffff83a9b14b&gt;] nf_tables_addchain.constprop.0+0x10b/0x950 net/netfilter/nf_tables_api.c:2218
    [&lt;ffffffff83a9c41b&gt;] nf_tables_newchain+0xa8b/0xc60 net/netfilter/nf_tables_api.c:2593
    [&lt;ffffffff83a3d6a6&gt;] nfnetlink_rcv_batch+0xa46/0xd20 net/netfilter/nfnetlink.c:517
    [&lt;ffffffff83a3db79&gt;] nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:638 [inline]
    [&lt;ffffffff83a3db79&gt;] nfnetlink_rcv+0x1f9/0x220 net/netfilter/nfnetlink.c:656
    [&lt;ffffffff83a13b17&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
    [&lt;ffffffff83a13b17&gt;] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345
    [&lt;ffffffff83a13fd6&gt;] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921
    [&lt;ffffffff83865ab6&gt;] sock_sendmsg_nosec net/socket.c:714 [inline]
    [&lt;ffffffff83865ab6&gt;] sock_sendmsg+0x56/0x80 net/socket.c:734
    [&lt;ffffffff8386601c&gt;] ____sys_sendmsg+0x36c/0x390 net/socket.c:2482
    [&lt;ffffffff8386a918&gt;] ___sys_sendmsg+0xa8/0x110 net/socket.c:2536
    [&lt;ffffffff8386aaa8&gt;] __sys_sendmsg+0x88/0x100 net/socket.c:2565
    [&lt;ffffffff845e5955&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845e5955&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84800087&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48691/">CVE-2022-48691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48691">CVE-2022-48691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223961">SUSE bug 1223961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48692" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Set scmnd-&gt;result only when scmnd is not NULL

This change fixes the following kernel NULL pointer dereference
which is reproduced by blktests srp/007 occasionally.

BUG: kernel NULL pointer dereference, address: 0000000000000170
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1H Kdump: loaded Not tainted 6.0.0-rc1+ #37
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-29-g6a62e0cb0dfe-prebuilt.qemu.org 04/01/2014
Workqueue:  0x0 (kblockd)
RIP: 0010:srp_recv_done+0x176/0x500 [ib_srp]
Code: 00 4d 85 ff 0f 84 52 02 00 00 48 c7 82 80 02 00 00 00 00 00 00 4c 89 df 4c 89 14 24 e8 53 d3 4a f6 4c 8b 14 24 41 0f b6 42 13 &lt;41&gt; 89 87 70 01 00 00 41 0f b6 52 12 f6 c2 02 74 44 41 8b 42 1c b9
RSP: 0018:ffffaef7c0003e28 EFLAGS: 00000282
RAX: 0000000000000000 RBX: ffff9bc9486dea60 RCX: 0000000000000000
RDX: 0000000000000102 RSI: ffffffffb76bbd0e RDI: 00000000ffffffff
RBP: ffff9bc980099a00 R08: 0000000000000001 R09: 0000000000000001
R10: ffff9bca53ef0000 R11: ffff9bc980099a10 R12: ffff9bc956e14000
R13: ffff9bc9836b9cb0 R14: ffff9bc9557b4480 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9bc97ec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000170 CR3: 0000000007e04000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
 __ib_process_cq+0xb7/0x280 [ib_core]
 ib_poll_handler+0x2b/0x130 [ib_core]
 irq_poll_softirq+0x93/0x150
 __do_softirq+0xee/0x4b8
 irq_exit_rcu+0xf7/0x130
 sysvec_apic_timer_interrupt+0x8e/0xc0
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48693" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: brcmstb: pm-arm: Fix refcount leak and __iomem leak bugs

In brcmstb_pm_probe(), there are two kinds of leak bugs:

(1) we need to add of_node_put() when for_each__matching_node() breaks
(2) we need to add iounmap() for each iomap in fail path
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48694" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix drain SQ hang with no completion

SW generated completions for outstanding WRs posted on SQ
after QP is in error target the wrong CQ. This causes the
ib_drain_sq to hang with no completion.

Fix this to generate completions on the right CQ.

[  863.969340] INFO: task kworker/u52:2:671 blocked for more than 122 seconds.
[  863.979224]       Not tainted 5.14.0-130.el9.x86_64 #1
[  863.986588] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  863.996997] task:kworker/u52:2   state:D stack:    0 pid:  671 ppid:     2 flags:0x00004000
[  864.007272] Workqueue: xprtiod xprt_autoclose [sunrpc]
[  864.014056] Call Trace:
[  864.017575]  __schedule+0x206/0x580
[  864.022296]  schedule+0x43/0xa0
[  864.026736]  schedule_timeout+0x115/0x150
[  864.032185]  __wait_for_common+0x93/0x1d0
[  864.037717]  ? usleep_range_state+0x90/0x90
[  864.043368]  __ib_drain_sq+0xf6/0x170 [ib_core]
[  864.049371]  ? __rdma_block_iter_next+0x80/0x80 [ib_core]
[  864.056240]  ib_drain_sq+0x66/0x70 [ib_core]
[  864.062003]  rpcrdma_xprt_disconnect+0x82/0x3b0 [rpcrdma]
[  864.069365]  ? xprt_prepare_transmit+0x5d/0xc0 [sunrpc]
[  864.076386]  xprt_rdma_close+0xe/0x30 [rpcrdma]
[  864.082593]  xprt_autoclose+0x52/0x100 [sunrpc]
[  864.088718]  process_one_work+0x1e8/0x3c0
[  864.094170]  worker_thread+0x50/0x3b0
[  864.099109]  ? rescuer_thread+0x370/0x370
[  864.104473]  kthread+0x149/0x170
[  864.109022]  ? set_kthread_struct+0x40/0x40
[  864.114713]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during
controller reset:

refcount_t: underflow; use-after-free.
WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48696" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48696" ref_url="https://www.suse.com/security/cve/CVE-2022-48696" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: spi: Reserve space for register address/padding

Currently the max_raw_read and max_raw_write limits in regmap_spi struct
do not take into account the additional size of the transmitted register
address and padding.  This may result in exceeding the maximum permitted
SPI message size, which could cause undefined behaviour, e.g. data
corruption.

Fix regmap_get_spi_bus() to properly adjust the above mentioned limits
by reserving space for the register address/padding as set in the regmap
configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-05-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48696/">CVE-2022-48696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48696">CVE-2022-48696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223920">SUSE bug 1223920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48697" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a use-after-free

Fix the following use-after-free complaint triggered by blktests nvme/004:

BUG: KASAN: user-memory-access in blk_mq_complete_request_remote+0xac/0x350
Read of size 4 at addr 0000607bd1835943 by task kworker/13:1/460
Workqueue: nvmet-wq nvme_loop_execute_work [nvme_loop]
Call Trace:
 show_stack+0x52/0x58
 dump_stack_lvl+0x49/0x5e
 print_report.cold+0x36/0x1e2
 kasan_report+0xb9/0xf0
 __asan_load4+0x6b/0x80
 blk_mq_complete_request_remote+0xac/0x350
 nvme_loop_queue_response+0x1df/0x275 [nvme_loop]
 __nvmet_req_complete+0x132/0x4f0 [nvmet]
 nvmet_req_complete+0x15/0x40 [nvmet]
 nvmet_execute_io_connect+0x18a/0x1f0 [nvmet]
 nvme_loop_execute_work+0x20/0x30 [nvme_loop]
 process_one_work+0x56e/0xa70
 worker_thread+0x2d1/0x640
 kthread+0x183/0x1c0
 ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48698" ref_url="https://www.suse.com/security/cve/CVE-2022-48698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix memory leak when using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  Fix this up by properly
calling dput().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48698/">CVE-2022-48698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48698">CVE-2022-48698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223956">SUSE bug 1223956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/debug: fix dentry leak in update_sched_domain_debugfs

Kuyo reports that the pattern of using debugfs_remove(debugfs_lookup())
leaks a dentry and with a hotplug stress test, the machine eventually
runs out of memory.

Fix this up by using the newly created debugfs_lookup_and_remove() call
instead which properly handles the dentry reference counting logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()

There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.

Fix this by checking the number of interfaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48702" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()

The voice allocator sometimes begins allocating from near the end of the
array and then wraps around, however snd_emu10k1_pcm_channel_alloc()
accesses the newly allocated voices as if it never wrapped around.

This results in out of bounds access if the first voice has a high enough
index so that first_voice + requested_voice_count &gt; NUM_G (64).
The more voices are requested, the more likely it is for this to occur.

This was initially discovered using PipeWire, however it can be reproduced
by calling aplay multiple times with 16 channels:
aplay -r 48000 -D plughw:CARD=Live,DEV=3 -c 16 /dev/zero

UBSAN: array-index-out-of-bounds in sound/pci/emu10k1/emupcm.c:127:40
index 65 is out of range for type 'snd_emu10k1_voice [64]'
CPU: 1 PID: 31977 Comm: aplay Tainted: G        W IOE      6.0.0-rc2-emu10k1+ #7
Hardware name: ASUSTEK COMPUTER INC P5W DH Deluxe/P5W DH Deluxe, BIOS 3002    07/22/2010
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
ubsan_epilogue+0x9/0x3f
__ubsan_handle_out_of_bounds.cold+0x44/0x49
snd_emu10k1_playback_hw_params+0x3bc/0x420 [snd_emu10k1]
snd_pcm_hw_params+0x29f/0x600 [snd_pcm]
snd_pcm_common_ioctl+0x188/0x1410 [snd_pcm]
? exit_to_user_mode_prepare+0x35/0x170
? do_syscall_64+0x69/0x90
? syscall_exit_to_user_mode+0x26/0x50
? do_syscall_64+0x69/0x90
? exit_to_user_mode_prepare+0x35/0x170
snd_pcm_ioctl+0x27/0x40 [snd_pcm]
__x64_sys_ioctl+0x95/0xd0
do_syscall_64+0x5c/0x90
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/int340x_thermal: handle data_vault when the value is ZERO_SIZE_PTR

In some case, the GDDV returns a package with a buffer which has
zero length. It causes that kmemdup() returns ZERO_SIZE_PTR (0x10).

Then the data_vault_read() got NULL point dereference problem when
accessing the 0x10 value in data_vault.

[   71.024560] BUG: kernel NULL pointer dereference, address:
0000000000000010

This patch uses ZERO_OR_NULL_PTR() for checking ZERO_SIZE_PTR or
NULL value in data_vault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48704" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: add a force flush to delay work when radeon

Although radeon card fence and wait for gpu to finish processing current batch rings,
there is still a corner case that radeon lockup work queue may not be fully flushed,
and meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to
put device in D3hot state.
Per PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.
&gt; Configuration and Message requests are the only TLPs accepted by a Function in
&gt; the D3hot state. All other received Requests must be handled as Unsupported Requests,
&gt; and all received Completions may optionally be handled as Unexpected Completions.
This issue will happen in following logs:
Unable to handle kernel paging request at virtual address 00008800e0008010
CPU 0 kworker/0:3(131): Oops 0
pc = [&lt;ffffffff811bea5c&gt;]  ra = [&lt;ffffffff81240844&gt;]  ps = 0000 Tainted: G        W
pc is at si_gpu_check_soft_reset+0x3c/0x240
ra is at si_dma_is_lockup+0x34/0xd0
v0 = 0000000000000000  t0 = fff08800e0008010  t1 = 0000000000010000
t2 = 0000000000008010  t3 = fff00007e3c00000  t4 = fff00007e3c00258
t5 = 000000000000ffff  t6 = 0000000000000001  t7 = fff00007ef078000
s0 = fff00007e3c016e8  s1 = fff00007e3c00000  s2 = fff00007e3c00018
s3 = fff00007e3c00000  s4 = fff00007fff59d80  s5 = 0000000000000000
s6 = fff00007ef07bd98
a0 = fff00007e3c00000  a1 = fff00007e3c016e8  a2 = 0000000000000008
a3 = 0000000000000001  a4 = 8f5c28f5c28f5c29  a5 = ffffffff810f4338
t8 = 0000000000000275  t9 = ffffffff809b66f8  t10 = ff6769c5d964b800
t11= 000000000000b886  pv = ffffffff811bea20  at = 0000000000000000
gp = ffffffff81d89690  sp = 00000000aa814126
Disabling lock debugging due to kernel taint
Trace:
[&lt;ffffffff81240844&gt;] si_dma_is_lockup+0x34/0xd0
[&lt;ffffffff81119610&gt;] radeon_fence_check_lockup+0xd0/0x290
[&lt;ffffffff80977010&gt;] process_one_work+0x280/0x550
[&lt;ffffffff80977350&gt;] worker_thread+0x70/0x7c0
[&lt;ffffffff80977410&gt;] worker_thread+0x130/0x7c0
[&lt;ffffffff80982040&gt;] kthread+0x200/0x210
[&lt;ffffffff809772e0&gt;] worker_thread+0x0/0x7c0
[&lt;ffffffff80981f8c&gt;] kthread+0x14c/0x210
[&lt;ffffffff80911658&gt;] ret_from_kernel_thread+0x18/0x20
[&lt;ffffffff80981e40&gt;] kthread+0x0/0x210
 Code: ad3e0008  43f0074a  ad7e0018  ad9e0020  8c3001e8  40230101
 &lt;88210000&gt; 4821ed21
So force lockup work queue flush to fix this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48705" ref_url="https://www.suse.com/security/cve/CVE-2022-48705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix crash in chip reset fail

In case of drv own fail in reset, we may need to run mac_reset several
times. The sequence would trigger system crash as the log below.

Because we do not re-enable/schedule "tx_napi" before disable it again,
the process would keep waiting for state change in napi_diable(). To
avoid the problem and keep status synchronize for each run, goto final
resource handling if drv own failed.

[ 5857.353423] mt7921e 0000:3b:00.0: driver own failed
[ 5858.433427] mt7921e 0000:3b:00.0: Timeout for driver own
[ 5859.633430] mt7921e 0000:3b:00.0: driver own failed
[ 5859.633444] ------------[ cut here ]------------
[ 5859.633446] WARNING: CPU: 6 at kernel/kthread.c:659 kthread_park+0x11d
[ 5859.633717] Workqueue: mt76 mt7921_mac_reset_work [mt7921_common]
[ 5859.633728] RIP: 0010:kthread_park+0x11d/0x150
[ 5859.633736] RSP: 0018:ffff8881b676fc68 EFLAGS: 00010202
......
[ 5859.633766] Call Trace:
[ 5859.633768]  &lt;TASK&gt;
[ 5859.633771]  mt7921e_mac_reset+0x176/0x6f0 [mt7921e]
[ 5859.633778]  mt7921_mac_reset_work+0x184/0x3a0 [mt7921_common]
[ 5859.633785]  ? mt7921_mac_set_timing+0x520/0x520 [mt7921_common]
[ 5859.633794]  ? __kasan_check_read+0x11/0x20
[ 5859.633802]  process_one_work+0x7ee/0x1320
[ 5859.633810]  worker_thread+0x53c/0x1240
[ 5859.633818]  kthread+0x2b8/0x370
[ 5859.633824]  ? process_one_work+0x1320/0x1320
[ 5859.633828]  ? kthread_complete_and_exit+0x30/0x30
[ 5859.633834]  ret_from_fork+0x1f/0x30
[ 5859.633842]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48705/">CVE-2022-48705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48705">CVE-2022-48705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223895">SUSE bug 1223895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48706" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48706" ref_url="https://www.suse.com/security/cve/CVE-2022-48706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: ifcvf: Do proper cleanup if IFCVF init fails

ifcvf_mgmt_dev leaks memory if it is not freed before
returning. Call is made to correct return statement
so memory does not leak. ifcvf_init_hw does not take
care of this so it is needed to do it here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48706/">CVE-2022-48706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48706">CVE-2022-48706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225524">SUSE bug 1225524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48707" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48707" ref_url="https://www.suse.com/security/cve/CVE-2022-48707" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/region: Fix null pointer dereference for resetting decoder

Not all decoders have a reset callback.

The CXL specification allows a host bridge with a single root port to
have no explicit HDM decoders. Currently the region driver assumes there
are none.  As such the CXL core creates a special pass through decoder
instance without a commit/reset callback.

Prior to this patch, the -&gt;reset() callback was called unconditionally when
calling cxl_region_decode_reset. Thus a configuration with 1 Host Bridge,
1 Root Port, and one directly attached CXL type 3 device or multiple CXL
type 3 devices attached to downstream ports of a switch can cause a null
pointer dereference.

Before the fix, a kernel crash was observed when we destroy the region, and
a pass through decoder is reset.

The issue can be reproduced as below,
    1) create a region with a CXL setup which includes a HB with a
    single root port under which a memdev is attached directly.
    2) destroy the region with cxl destroy-region regionX -f.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48707/">CVE-2022-48707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48707">CVE-2022-48707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225519">SUSE bug 1225519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48708" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: single: fix potential NULL dereference

Added checking of pointer "function" in pcs_set_mux().
pinmux_generic_get_function() can return NULL and the pointer
"function" was dereferenced without checking against NULL.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48709" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: switch: fix potential memleak in ice_add_adv_recipe()

When ice_add_special_words() fails, the 'rm' is not released, which will
lead to a memory leak. Fix this up by going to 'err_unroll' label.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix a possible null pointer dereference

In radeon_fp_native_mode(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.

The failure status of drm_cvt_mode() on the other path is checked too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48712" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix error handling in ext4_fc_record_modified_inode()

Current code does not fully takes care of krealloc() error case, which
could lead to silent memory corruption or a kernel bug.  This patch
fixes that.

Also it cleans up some duplicated error handling logic from various
functions in fast_commit.c file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48713" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/pt: Fix crash with stop filters in single-range mode

Add a check for !buf-&gt;single before calling pt_buffer_region_size in a
place where a missing check can cause a kernel crash.

Fixes a bug introduced by commit 670638477aed ("perf/x86/intel/pt:
Opportunistically use single range output mode"), which added a
support for PT single-range output mode. Since that commit if a PT
stop filter range is hit while tracing, the kernel will crash because
of a null pointer dereference in pt_handle_status due to calling
pt_buffer_region_size without a ToPA configured.

The commit which introduced single-range mode guarded almost all uses of
the ToPA buffer variables with checks of the buf-&gt;single variable, but
missed the case where tracing was stopped by the PT hardware, which
happens when execution hits a configured stop filter.

Tested that hitting a stop filter while PT recording successfully
records a trace with this patch but crashes without this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227549">SUSE bug 1227549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48714" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48714" ref_url="https://www.suse.com/security/cve/CVE-2022-48714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Use VM_MAP instead of VM_ALLOC for ringbuf

After commit 2fd3fb0be1d1 ("kasan, vmalloc: unpoison VM_ALLOC pages
after mapping"), non-VM_ALLOC mappings will be marked as accessible
in __get_vm_area_node() when KASAN is enabled. But now the flag for
ringbuf area is VM_ALLOC, so KASAN will complain out-of-bound access
after vmap() returns. Because the ringbuf area is created by mapping
allocated pages, so use VM_MAP instead.

After the change, info in /proc/vmallocinfo also changes from
  [start]-[end]   24576 ringbuf_map_alloc+0x171/0x290 vmalloc user
to
  [start]-[end]   24576 ringbuf_map_alloc+0x171/0x290 vmap user
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48714/">CVE-2022-48714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48714">CVE-2022-48714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226622">SUSE bug 1226622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe

Running tests with a debug kernel shows that bnx2fc_recv_frame() is
modifying the per_cpu lport stats counters in a non-mpsafe way.  Just boot
a debug kernel and run the bnx2fc driver with the hardware enabled.

[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_
[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]
[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G    B
[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013
[ 1391.699183] Call Trace:
[ 1391.699188]  dump_stack_lvl+0x57/0x7d
[ 1391.699198]  check_preemption_disabled+0xc8/0xd0
[ 1391.699205]  bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]
[ 1391.699215]  ? do_raw_spin_trylock+0xb5/0x180
[ 1391.699221]  ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]
[ 1391.699229]  ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]
[ 1391.699240]  bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]
[ 1391.699250]  ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]
[ 1391.699258]  kthread+0x364/0x420
[ 1391.699263]  ? _raw_spin_unlock_irq+0x24/0x50
[ 1391.699268]  ? set_kthread_struct+0x100/0x100
[ 1391.699273]  ret_from_fork+0x22/0x30

Restore the old get_cpu/put_cpu code with some modifications to reduce the
size of the critical section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48716" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48716" ref_url="https://www.suse.com/security/cve/CVE-2022-48716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd938x: fix incorrect used of portid

Mixer controls have the channel id in mixer-&gt;reg, which is not same
as port id. port id should be derived from chan_info array.
So fix this. Without this, its possible that we could corrupt
struct wcd938x_sdw_priv by accessing port_map array out of range
with channel id instead of port id.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48716/">CVE-2022-48716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48716">CVE-2022-48716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226678">SUSE bug 1226678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48717" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: max9759: fix underflow in speaker_gain_control_put()

Check for negative values of "priv-&gt;gain" to prevent an out of bounds
access.  The concern is that these might come from the user via:
  -&gt; snd_ctl_elem_write_user()
    -&gt; snd_ctl_elem_write()
      -&gt; kctl-&gt;put()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48718" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48718" ref_url="https://www.suse.com/security/cve/CVE-2022-48718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: mxsfb: Fix NULL pointer dereference

mxsfb should not ever dereference the NULL pointer which
drm_atomic_get_new_bridge_state is allowed to return.
Assume a fixed format instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48718/">CVE-2022-48718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48718">CVE-2022-48718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226616">SUSE bug 1226616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48719" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48719" ref_url="https://www.suse.com/security/cve/CVE-2022-48719" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work

syzkaller was able to trigger a deadlock for NTF_MANAGED entries [0]:

  kworker/0:16/14617 is trying to acquire lock:
  ffffffff8d4dd370 (&amp;tbl-&gt;lock){++-.}-{2:2}, at: ___neigh_create+0x9e1/0x2990 net/core/neighbour.c:652
  [...]
  but task is already holding lock:
  ffffffff8d4dd370 (&amp;tbl-&gt;lock){++-.}-{2:2}, at: neigh_managed_work+0x35/0x250 net/core/neighbour.c:1572

The neighbor entry turned to NUD_FAILED state, where __neigh_event_send()
triggered an immediate probe as per commit cd28ca0a3dd1 ("neigh: reduce
arp latency") via neigh_probe() given table lock was held.

One option to fix this situation is to defer the neigh_probe() back to
the neigh_timer_handler() similarly as pre cd28ca0a3dd1. For the case
of NTF_MANAGED, this deferral is acceptable given this only happens on
actual failure state and regular / expected state is NUD_VALID with the
entry already present.

The fix adds a parameter to __neigh_event_send() in order to communicate
whether immediate probe is allowed or disallowed. Existing call-sites
of neigh_event_send() default as-is to immediate probe. However, the
neigh_managed_work() disables it via use of neigh_event_send_probe().

[0] &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
  print_deadlock_bug kernel/locking/lockdep.c:2956 [inline]
  check_deadlock kernel/locking/lockdep.c:2999 [inline]
  validate_chain kernel/locking/lockdep.c:3788 [inline]
  __lock_acquire.cold+0x149/0x3ab kernel/locking/lockdep.c:5027
  lock_acquire kernel/locking/lockdep.c:5639 [inline]
  lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5604
  __raw_write_lock_bh include/linux/rwlock_api_smp.h:202 [inline]
  _raw_write_lock_bh+0x2f/0x40 kernel/locking/spinlock.c:334
  ___neigh_create+0x9e1/0x2990 net/core/neighbour.c:652
  ip6_finish_output2+0x1070/0x14f0 net/ipv6/ip6_output.c:123
  __ip6_finish_output net/ipv6/ip6_output.c:191 [inline]
  __ip6_finish_output+0x61e/0xe90 net/ipv6/ip6_output.c:170
  ip6_finish_output+0x32/0x200 net/ipv6/ip6_output.c:201
  NF_HOOK_COND include/linux/netfilter.h:296 [inline]
  ip6_output+0x1e4/0x530 net/ipv6/ip6_output.c:224
  dst_output include/net/dst.h:451 [inline]
  NF_HOOK include/linux/netfilter.h:307 [inline]
  ndisc_send_skb+0xa99/0x17f0 net/ipv6/ndisc.c:508
  ndisc_send_ns+0x3a9/0x840 net/ipv6/ndisc.c:650
  ndisc_solicit+0x2cd/0x4f0 net/ipv6/ndisc.c:742
  neigh_probe+0xc2/0x110 net/core/neighbour.c:1040
  __neigh_event_send+0x37d/0x1570 net/core/neighbour.c:1201
  neigh_event_send include/net/neighbour.h:470 [inline]
  neigh_managed_work+0x162/0x250 net/core/neighbour.c:1574
  process_one_work+0x9ac/0x1650 kernel/workqueue.c:2307
  worker_thread+0x657/0x1110 kernel/workqueue.c:2454
  kthread+0x2e9/0x3a0 kernel/kthread.c:377
  ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48719/">CVE-2022-48719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48719">CVE-2022-48719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226682">SUSE bug 1226682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macsec: Fix offload support for NETDEV_UNREGISTER event

Current macsec netdev notify handler handles NETDEV_UNREGISTER event by
releasing relevant SW resources only, this causes resources leak in case
of macsec HW offload, as the underlay driver was not notified to clean
it's macsec offload resources.

Fix by calling the underlay driver to clean it's relevant resources
by moving offload handling from macsec_dellink() to macsec_common_dellink()
when handling NETDEV_UNREGISTER event.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Forward wakeup to smc socket waitqueue after fallback

When we replace TCP with SMC and a fallback occurs, there may be
some socket waitqueue entries remaining in smc socket-&gt;wq, such
as eppoll_entries inserted by userspace applications.

After the fallback, data flows over TCP/IP and only clcsocket-&gt;wq
will be woken up. Applications can't be notified by the entries
which were inserted in smc socket-&gt;wq before fallback. So we need
a mechanism to wake up smc socket-&gt;wq at the same time if some
entries remaining in it.

The current workaround is to transfer the entries from smc socket-&gt;wq
to clcsock-&gt;wq during the fallback. But this may cause a crash
like this:

 general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP PTI
 CPU: 3 PID: 0 Comm: swapper/3 Kdump: loaded Tainted: G E     5.16.0+ #107
 RIP: 0010:__wake_up_common+0x65/0x170
 Call Trace:
  &lt;IRQ&gt;
  __wake_up_common_lock+0x7a/0xc0
  sock_def_readable+0x3c/0x70
  tcp_data_queue+0x4a7/0xc40
  tcp_rcv_established+0x32f/0x660
  ? sk_filter_trim_cap+0xcb/0x2e0
  tcp_v4_do_rcv+0x10b/0x260
  tcp_v4_rcv+0xd2a/0xde0
  ip_protocol_deliver_rcu+0x3b/0x1d0
  ip_local_deliver_finish+0x54/0x60
  ip_local_deliver+0x6a/0x110
  ? tcp_v4_early_demux+0xa2/0x140
  ? tcp_v4_early_demux+0x10d/0x140
  ip_sublist_rcv_finish+0x49/0x60
  ip_sublist_rcv+0x19d/0x230
  ip_list_rcv+0x13e/0x170
  __netif_receive_skb_list_core+0x1c2/0x240
  netif_receive_skb_list_internal+0x1e6/0x320
  napi_complete_done+0x11d/0x190
  mlx5e_napi_poll+0x163/0x6b0 [mlx5_core]
  __napi_poll+0x3c/0x1b0
  net_rx_action+0x27c/0x300
  __do_softirq+0x114/0x2d2
  irq_exit_rcu+0xb4/0xe0
  common_interrupt+0xba/0xe0
  &lt;/IRQ&gt;
  &lt;TASK&gt;

The crash is caused by privately transferring waitqueue entries from
smc socket-&gt;wq to clcsock-&gt;wq. The owners of these entries, such as
epoll, have no idea that the entries have been transferred to a
different socket wait queue and still use original waitqueue spinlock
(smc socket-&gt;wq.wait.lock) to make the entries operation exclusive,
but it doesn't work. The operations to the entries, such as removing
from the waitqueue (now is clcsock-&gt;wq after fallback), may cause a
crash when clcsock waitqueue is being iterated over at the moment.

This patch tries to fix this by no longer transferring wait queue
entries privately, but introducing own implementations of clcsock's
callback functions in fallback situation. The callback functions will
forward the wakeup to smc socket-&gt;wq if clcsock-&gt;wq is actually woken
up and smc socket-&gt;wq has remaining entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48722" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: ca8210: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. We then leak the skb
structure.

Free the skb structure upon error before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48723" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: uniphier: fix reference count leak in uniphier_spi_probe()

The issue happens in several error paths in uniphier_spi_probe().
When either dma_get_slave_caps() or devm_spi_register_master() returns
an error code, the function forgets to decrease the refcount of both
`dma_rx` and `dma_tx` objects, which may lead to refcount leaks.

Fix it by decrementing the reference count of specific objects in
those error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48724" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()

After commit e3beca48a45b ("irqdomain/treewide: Keep firmware node
unconditionally allocated"). For tear down scenario, fn is only freed
after fail to allocate ir_domain, though it also should be freed in case
dmar_enable_qi returns error.

Besides free fn, irq_domain and ir_msi_domain need to be removed as well
if intel_setup_irq_remapping fails to enable queued invalidation.

Improve the rewinding path by add out_free_ir_domain and out_free_fwnode
lables per Baolu's suggestion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48725" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix refcounting leak in siw_create_qp()

The atomic_inc() needs to be paired with an atomic_dec() on the error
path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48726" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/ucma: Protect mc during concurrent multicast leaves

Partially revert the commit mentioned in the Fixes line to make sure that
allocation and erasing multicast struct are locked.

  BUG: KASAN: use-after-free in ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]
  BUG: KASAN: use-after-free in ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579
  Read of size 8 at addr ffff88801bb74b00 by task syz-executor.1/25529
  CPU: 0 PID: 25529 Comm: syz-executor.1 Not tainted 5.16.0-rc7-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
   print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247
   __kasan_report mm/kasan/report.c:433 [inline]
   kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
   ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]
   ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579
   ucma_destroy_id+0x1e6/0x280 drivers/infiniband/core/ucma.c:614
   ucma_write+0x25c/0x350 drivers/infiniband/core/ucma.c:1732
   vfs_write+0x28e/0xae0 fs/read_write.c:588
   ksys_write+0x1ee/0x250 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

Currently the xarray search can touch a concurrently freeing mc as the
xa_for_each() is not surrounded by any lock. Rather than hold the lock for
a full scan hold it only for the effected items, which is usually an empty
list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227552">SUSE bug 1227552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48727" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Avoid consuming a stale esr value when SError occur

When any exception other than an IRQ occurs, the CPU updates the ESR_EL2
register with the exception syndrome. An SError may also become pending,
and will be synchronised by KVM. KVM notes the exception type, and whether
an SError was synchronised in exit_code.

When an exception other than an IRQ occurs, fixup_guest_exit() updates
vcpu-&gt;arch.fault.esr_el2 from the hardware register. When an SError was
synchronised, the vcpu esr value is used to determine if the exception
was due to an HVC. If so, ELR_EL2 is moved back one instruction. This
is so that KVM can process the SError first, and re-execute the HVC if
the guest survives the SError.

But if an IRQ synchronises an SError, the vcpu's esr value is stale.
If the previous non-IRQ exception was an HVC, KVM will corrupt ELR_EL2,
causing an unrelated guest instruction to be executed twice.

Check ARM_EXCEPTION_CODE() before messing with ELR_EL2, IRQs don't
update this register so don't need to check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48728" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix AIP early init panic

An early failure in hfi1_ipoib_setup_rn() can lead to the following panic:

  BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0
  PGD 0 P4D 0
  Oops: 0002 [#1] SMP NOPTI
  Workqueue: events work_for_cpu_fn
  RIP: 0010:try_to_grab_pending+0x2b/0x140
  Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 &lt;f0&gt; 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c
  RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046
  RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000
  RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0
  RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001
  R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
  R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690
  FS:  0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   __cancel_work_timer+0x42/0x190
   ? dev_printk_emit+0x4e/0x70
   iowait_cancel_work+0x15/0x30 [hfi1]
   hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]
   ? dev_err+0x6c/0x90
   hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]
   hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]
   rdma_init_netdev+0x5a/0x80 [ib_core]
   ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]
   ipoib_intf_init+0x6c/0x350 [ib_ipoib]
   ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]
   ipoib_add_one+0xbe/0x300 [ib_ipoib]
   add_client_context+0x12c/0x1a0 [ib_core]
   enable_device_and_get+0xdc/0x1d0 [ib_core]
   ib_register_device+0x572/0x6b0 [ib_core]
   rvt_register_device+0x11b/0x220 [rdmavt]
   hfi1_register_ib_device+0x6b4/0x770 [hfi1]
   do_init_one.isra.20+0x3e3/0x680 [hfi1]
   local_pci_probe+0x41/0x90
   work_for_cpu_fn+0x16/0x20
   process_one_work+0x1a7/0x360
   ? create_worker+0x1a0/0x1a0
   worker_thread+0x1cf/0x390
   ? create_worker+0x1a0/0x1a0
   kthread+0x116/0x130
   ? kthread_flush_work_fn+0x10/0x10
   ret_from_fork+0x1f/0x40

The panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL
deref when hfi1_ipoib_netdev_dtor() is called in this error case.

hfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so
fix by adjusting the error paths accordingly.

Other changes:
- hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()
  since the netdev core code deletes calls free_netdev()
- The switch to the accelerated entrances is moved to the success path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix panic with larger ipoib send_queue_size

When the ipoib send_queue_size is increased from the default the following
panic happens:

  RIP: 0010:hfi1_ipoib_drain_tx_ring+0x45/0xf0 [hfi1]
  Code: 31 e4 eb 0f 8b 85 c8 02 00 00 41 83 c4 01 44 39 e0 76 60 8b 8d cc 02 00 00 44 89 e3 be 01 00 00 00 d3 e3 48 03 9d c0 02 00 00 &lt;c7&gt; 83 18 01 00 00 00 00 00 00 48 8b bb 30 01 00 00 e8 25 af a7 e0
  RSP: 0018:ffffc9000798f4a0 EFLAGS: 00010286
  RAX: 0000000000008000 RBX: ffffc9000aa0f000 RCX: 000000000000000f
  RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
  RBP: ffff88810ff08000 R08: ffff88889476d900 R09: 0000000000000101
  R10: 0000000000000000 R11: ffffc90006590ff8 R12: 0000000000000200
  R13: ffffc9000798fba8 R14: 0000000000000000 R15: 0000000000000001
  FS:  00007fd0f79cc3c0(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffc9000aa0f118 CR3: 0000000889c84001 CR4: 00000000001706e0
  Call Trace:
   &lt;TASK&gt;
   hfi1_ipoib_napi_tx_disable+0x45/0x60 [hfi1]
   hfi1_ipoib_dev_stop+0x18/0x80 [hfi1]
   ipoib_ib_dev_stop+0x1d/0x40 [ib_ipoib]
   ipoib_stop+0x48/0xc0 [ib_ipoib]
   __dev_close_many+0x9e/0x110
   __dev_change_flags+0xd9/0x210
   dev_change_flags+0x21/0x60
   do_setlink+0x31c/0x10f0
   ? __nla_validate_parse+0x12d/0x1a0
   ? __nla_parse+0x21/0x30
   ? inet6_validate_link_af+0x5e/0xf0
   ? cpumask_next+0x1f/0x20
   ? __snmp6_fill_stats64.isra.53+0xbb/0x140
   ? __nla_validate_parse+0x47/0x1a0
   __rtnl_newlink+0x530/0x910
   ? pskb_expand_head+0x73/0x300
   ? __kmalloc_node_track_caller+0x109/0x280
   ? __nla_put+0xc/0x20
   ? cpumask_next_and+0x20/0x30
   ? update_sd_lb_stats.constprop.144+0xd3/0x820
   ? _raw_spin_unlock_irqrestore+0x25/0x37
   ? __wake_up_common_lock+0x87/0xc0
   ? kmem_cache_alloc_trace+0x3d/0x3d0
   rtnl_newlink+0x43/0x60

The issue happens when the shift that should have been a function of the
txq item size mistakenly used the ring size.

Fix by using the item size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48730" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf: heaps: Fix potential spectre v1 gadget

It appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.

 [sumits: added fixes and cc: stable tags]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48731" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48731" ref_url="https://www.suse.com/security/cve/CVE-2022-48731" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid scanning potential huge holes

When using devm_request_free_mem_region() and devm_memremap_pages() to
add ZONE_DEVICE memory, if requested free mem region's end pfn were
huge(e.g., 0x400000000), the node_end_pfn() will be also huge (see
move_pfn_range_to_zone()).  Thus it creates a huge hole between
node_start_pfn() and node_end_pfn().

We found on some AMD APUs, amdkfd requested such a free mem region and
created a huge hole.  In such a case, following code snippet was just
doing busy test_bit() looping on the huge hole.

  for (pfn = start_pfn; pfn &lt; end_pfn; pfn++) {
	struct page *page = pfn_to_online_page(pfn);
		if (!page)
			continue;
	...
  }

So we got a soft lockup:

  watchdog: BUG: soft lockup - CPU#6 stuck for 26s! [bash:1221]
  CPU: 6 PID: 1221 Comm: bash Not tainted 5.15.0-custom #1
  RIP: 0010:pfn_to_online_page+0x5/0xd0
  Call Trace:
    ? kmemleak_scan+0x16a/0x440
    kmemleak_write+0x306/0x3a0
    ? common_file_perm+0x72/0x170
    full_proxy_write+0x5c/0x90
    vfs_write+0xb9/0x260
    ksys_write+0x67/0xe0
    __x64_sys_write+0x1a/0x20
    do_syscall_64+0x3b/0xc0
    entry_SYSCALL_64_after_hwframe+0x44/0xae

I did some tests with the patch.

(1) amdgpu module unloaded

before the patch:

  real    0m0.976s
  user    0m0.000s
  sys     0m0.968s

after the patch:

  real    0m0.981s
  user    0m0.000s
  sys     0m0.973s

(2) amdgpu module loaded

before the patch:

  real    0m35.365s
  user    0m0.000s
  sys     0m35.354s

after the patch:

  real    0m1.049s
  user    0m0.000s
  sys     0m1.042s
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48731/">CVE-2022-48731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48731">CVE-2022-48731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226620">SUSE bug 1226620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48732" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix off by one in BIOS boundary checking

Bounds checking when parsing init scripts embedded in the BIOS reject
access to the last byte. This causes driver initialization to fail on
Apple eMac's with GeForce 2 MX GPUs, leaving the system with no working
console.

This is probably only seen on OpenFirmware machines like PowerPC Macs
because the BIOS image provided by OF is only the used parts of the ROM,
not a power-of-two blocks read from PCI directly so PCs always have
empty bytes at the end that are never accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48733" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48733" ref_url="https://www.suse.com/security/cve/CVE-2022-48733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free after failure to create a snapshot

At ioctl.c:create_snapshot(), we allocate a pending snapshot structure and
then attach it to the transaction's list of pending snapshots. After that
we call btrfs_commit_transaction(), and if that returns an error we jump
to 'fail' label, where we kfree() the pending snapshot structure. This can
result in a later use-after-free of the pending snapshot:

1) We allocated the pending snapshot and added it to the transaction's
   list of pending snapshots;

2) We call btrfs_commit_transaction(), and it fails either at the first
   call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups().
   In both cases, we don't abort the transaction and we release our
   transaction handle. We jump to the 'fail' label and free the pending
   snapshot structure. We return with the pending snapshot still in the
   transaction's list;

3) Another task commits the transaction. This time there's no error at
   all, and then during the transaction commit it accesses a pointer
   to the pending snapshot structure that the snapshot creation task
   has already freed, resulting in a user-after-free.

This issue could actually be detected by smatch, which produced the
following warning:

  fs/btrfs/ioctl.c:843 create_snapshot() warn: '&amp;pending_snapshot-&gt;list' not removed from list

So fix this by not having the snapshot creation ioctl directly add the
pending snapshot to the transaction's list. Instead add the pending
snapshot to the transaction handle, and then at btrfs_commit_transaction()
we add the snapshot to the list only when we can guarantee that any error
returned after that point will result in a transaction abort, in which
case the ioctl code can safely free the pending snapshot and no one can
access it anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48733/">CVE-2022-48733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48733">CVE-2022-48733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226718">SUSE bug 1226718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48734" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock between quota disable and qgroup rescan worker

Quota disable ioctl starts a transaction before waiting for the qgroup
rescan worker completes. However, this wait can be infinite and results
in deadlock because of circular dependency among the quota disable
ioctl, the qgroup rescan worker and the other task with transaction such
as block group relocation task.

The deadlock happens with the steps following:

1) Task A calls ioctl to disable quota. It starts a transaction and
   waits for qgroup rescan worker completes.
2) Task B such as block group relocation task starts a transaction and
   joins to the transaction that task A started. Then task B commits to
   the transaction. In this commit, task B waits for a commit by task A.
3) Task C as the qgroup rescan worker starts its job and starts a
   transaction. In this transaction start, task C waits for completion
   of the transaction that task A started and task B committed.

This deadlock was found with fstests test case btrfs/115 and a zoned
null_blk device. The test case enables and disables quota, and the
block group reclaim was triggered during the quota disable by chance.
The deadlock was also observed by running quota enable and disable in
parallel with 'btrfs balance' command on regular null_blk devices.

An example report of the deadlock:

  [372.469894] INFO: task kworker/u16:6:103 blocked for more than 122 seconds.
  [372.479944]       Not tainted 5.16.0-rc8 #7
  [372.485067] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  [372.493898] task:kworker/u16:6   state:D stack:    0 pid:  103 ppid:     2 flags:0x00004000
  [372.503285] Workqueue: btrfs-qgroup-rescan btrfs_work_helper [btrfs]
  [372.510782] Call Trace:
  [372.514092]  &lt;TASK&gt;
  [372.521684]  __schedule+0xb56/0x4850
  [372.530104]  ? io_schedule_timeout+0x190/0x190
  [372.538842]  ? lockdep_hardirqs_on+0x7e/0x100
  [372.547092]  ? _raw_spin_unlock_irqrestore+0x3e/0x60
  [372.555591]  schedule+0xe0/0x270
  [372.561894]  btrfs_commit_transaction+0x18bb/0x2610 [btrfs]
  [372.570506]  ? btrfs_apply_pending_changes+0x50/0x50 [btrfs]
  [372.578875]  ? free_unref_page+0x3f2/0x650
  [372.585484]  ? finish_wait+0x270/0x270
  [372.591594]  ? release_extent_buffer+0x224/0x420 [btrfs]
  [372.599264]  btrfs_qgroup_rescan_worker+0xc13/0x10c0 [btrfs]
  [372.607157]  ? lock_release+0x3a9/0x6d0
  [372.613054]  ? btrfs_qgroup_account_extent+0xda0/0xda0 [btrfs]
  [372.620960]  ? do_raw_spin_lock+0x11e/0x250
  [372.627137]  ? rwlock_bug.part.0+0x90/0x90
  [372.633215]  ? lock_is_held_type+0xe4/0x140
  [372.639404]  btrfs_work_helper+0x1ae/0xa90 [btrfs]
  [372.646268]  process_one_work+0x7e9/0x1320
  [372.652321]  ? lock_release+0x6d0/0x6d0
  [372.658081]  ? pwq_dec_nr_in_flight+0x230/0x230
  [372.664513]  ? rwlock_bug.part.0+0x90/0x90
  [372.670529]  worker_thread+0x59e/0xf90
  [372.676172]  ? process_one_work+0x1320/0x1320
  [372.682440]  kthread+0x3b9/0x490
  [372.687550]  ? _raw_spin_unlock_irq+0x24/0x50
  [372.693811]  ? set_kthread_struct+0x100/0x100
  [372.700052]  ret_from_fork+0x22/0x30
  [372.705517]  &lt;/TASK&gt;
  [372.709747] INFO: task btrfs-transacti:2347 blocked for more than 123 seconds.
  [372.729827]       Not tainted 5.16.0-rc8 #7
  [372.745907] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
  [372.767106] task:btrfs-transacti state:D stack:    0 pid: 2347 ppid:     2 flags:0x00004000
  [372.787776] Call Trace:
  [372.801652]  &lt;TASK&gt;
  [372.812961]  __schedule+0xb56/0x4850
  [372.830011]  ? io_schedule_timeout+0x190/0x190
  [372.852547]  ? lockdep_hardirqs_on+0x7e/0x100
  [372.871761]  ? _raw_spin_unlock_irqrestore+0x3e/0x60
  [372.886792]  schedule+0xe0/0x270
  [372.901685]  wait_current_trans+0x22c/0x310 [btrfs]
  [372.919743]  ? btrfs_put_transaction+0x3d0/0x3d0 [btrfs]
  [372.938923]  ? finish_wait+0x270/0x270
  [372.959085]  ? join_transaction+0xc7
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()

We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: hdmi-codec: Fix OOB memory accesses

Correct size of iec_status array by changing it to the size of status
array of the struct snd_aes_iec958. This fixes out-of-bounds slab
read accesses made by memcpy() of the hdmi-codec driver. This problem
is reported by KASAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: fix double free of cond_list on error paths

On error path from cond_read_list() and duplicate_policydb_cond_list()
the cond_list_destroy() gets called a second time in caller functions,
resulting in NULL pointer deref.  Fix this by resetting the
cond_list_len to 0 in cond_list_destroy(), making subsequent calls a
noop.

Also consistently reset the cond_list pointer to NULL after freeing.

[PM: fix line lengths in the description]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48741" ref_url="https://www.suse.com/security/cve/CVE-2022-48741" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix NULL pointer dereference in copy up warning

This patch is fixing a NULL pointer dereference to get a recently
introduced warning message working.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48741/">CVE-2022-48741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48741">CVE-2022-48741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226625">SUSE bug 1226625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48742" ref_url="https://www.suse.com/security/cve/CVE-2022-48742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()

While looking at one unrelated syzbot bug, I found the replay logic
in __rtnl_newlink() to potentially trigger use-after-free.

It is better to clear master_dev and m_ops inside the loop,
in case we have to replay it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48742/">CVE-2022-48742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48742">CVE-2022-48742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226694">SUSE bug 1226694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: amd-xgbe: Fix skb data length underflow

There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.

Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Avoid field-overflowing memcpy()

In preparation for FORTIFY_SOURCE performing compile-time and run-time
field bounds checking for memcpy(), memmove(), and memset(), avoid
intentionally writing across neighboring fields.

Use flexible arrays instead of zero-element arrays (which look like they
are always overflowing) and split the cross-field memcpy() into two halves
that can be appropriately bounds-checked by the compiler.

We were doing:

	#define ETH_HLEN  14
	#define VLAN_HLEN  4
	...
	#define MLX5E_XDP_MIN_INLINE (ETH_HLEN + VLAN_HLEN)
	...
        struct mlx5e_tx_wqe      *wqe  = mlx5_wq_cyc_get_wqe(wq, pi);
	...
        struct mlx5_wqe_eth_seg  *eseg = &amp;wqe-&gt;eth;
        struct mlx5_wqe_data_seg *dseg = wqe-&gt;data;
	...
	memcpy(eseg-&gt;inline_hdr.start, xdptxd-&gt;data, MLX5E_XDP_MIN_INLINE);

target is wqe-&gt;eth.inline_hdr.start (which the compiler sees as being
2 bytes in size), but copying 18, intending to write across start
(really vlan_tci, 2 bytes). The remaining 16 bytes get written into
wqe-&gt;data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr
(8 bytes).

struct mlx5e_tx_wqe {
        struct mlx5_wqe_ctrl_seg   ctrl;                 /*     0    16 */
        struct mlx5_wqe_eth_seg    eth;                  /*    16    16 */
        struct mlx5_wqe_data_seg   data[];               /*    32     0 */

        /* size: 32, cachelines: 1, members: 3 */
        /* last cacheline: 32 bytes */
};

struct mlx5_wqe_eth_seg {
        u8                         swp_outer_l4_offset;  /*     0     1 */
        u8                         swp_outer_l3_offset;  /*     1     1 */
        u8                         swp_inner_l4_offset;  /*     2     1 */
        u8                         swp_inner_l3_offset;  /*     3     1 */
        u8                         cs_flags;             /*     4     1 */
        u8                         swp_flags;            /*     5     1 */
        __be16                     mss;                  /*     6     2 */
        __be32                     flow_table_metadata;  /*     8     4 */
        union {
                struct {
                        __be16     sz;                   /*    12     2 */
                        u8         start[2];             /*    14     2 */
                } inline_hdr;                            /*    12     4 */
                struct {
                        __be16     type;                 /*    12     2 */
                        __be16     vlan_tci;             /*    14     2 */
                } insert;                                /*    12     4 */
                __be32             trailer;              /*    12     4 */
        };                                               /*    12     4 */

        /* size: 16, cachelines: 1, members: 9 */
        /* last cacheline: 16 bytes */
};

struct mlx5_wqe_data_seg {
        __be32                     byte_count;           /*     0     4 */
        __be32                     lkey;                 /*     4     4 */
        __be64                     addr;                 /*     8     8 */

        /* size: 16, cachelines: 1, members: 3 */
        /* last cacheline: 16 bytes */
};

So, split the memcpy() so the compiler can reason about the buffer
sizes.

"pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe
nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object
code changes (i.e. only source line number induced differences and
optimizations).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48745" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Use del_timer_sync in fw reset flow of halting poll

Substitute del_timer() with del_timer_sync() in fw reset polling
deactivation flow, in order to prevent a race condition which occurs
when del_timer() is called and timer is deactivated while another
process is handling the timer interrupt. A situation that led to
the following call trace:
	RIP: 0010:run_timer_softirq+0x137/0x420
	&lt;IRQ&gt;
	recalibrate_cpu_khz+0x10/0x10
	ktime_get+0x3e/0xa0
	? sched_clock_cpu+0xb/0xc0
	__do_softirq+0xf5/0x2ea
	irq_exit_rcu+0xc1/0xf0
	sysvec_apic_timer_interrupt+0x9e/0xc0
	asm_sysvec_apic_timer_interrupt+0x12/0x20
	&lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix handling of wrong devices during bond netevent

Current implementation of bond netevent handler only check if
the handled netdev is VF representor and it missing a check if
the VF representor is on the same phys device of the bond handling
the netevent.

Fix by adding the missing check and optimizing the check if
the netdev is VF representor so it will not access uninitialized
private data and crashes.

BUG: kernel NULL pointer dereference, address: 000000000000036c
PGD 0 P4D 0
Oops: 0000 [#1] SMP NOPTI
Workqueue: eth3bond0 bond_mii_monitor [bonding]
RIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core]
RSP: 0018:ffff88812d69fd60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000
RDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880
RBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008
R10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10
R13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core]
 mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core]
 mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core]
 raw_notifier_call_chain+0x41/0x60
 call_netdevice_notifiers_info+0x34/0x80
 netdev_lower_state_changed+0x4e/0xa0
 bond_mii_monitor+0x56b/0x640 [bonding]
 process_one_work+0x1b9/0x390
 worker_thread+0x4d/0x3d0
 ? rescuer_thread+0x350/0x350
 kthread+0x124/0x150
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix wrong offset in bio_truncate()

bio_truncate() clears the buffer outside of last block of bdev, however
current bio_truncate() is using the wrong offset of page. So it can
return the uninitialized data.

This happened when both of truncated/corrupted FS and userspace (via
bdev) are trying to read the last of bdev.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48748" ref_url="https://www.suse.com/security/cve/CVE-2022-48748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: vlan: fix memory leak in __allowed_ingress

When using per-vlan state, if vlan snooping and stats are disabled,
untagged or priority-tagged ingress frame will go to check pvid state.
If the port state is forwarding and the pvid state is not
learning/forwarding, untagged or priority-tagged frame will be dropped
but skb memory is not freed.
Should free skb when __allowed_ingress returns false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48748/">CVE-2022-48748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48748">CVE-2022-48748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226647">SUSE bug 1226647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48749" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc

The function performs a check on the "ctx" input parameter, however, it
is used before the check.

Initialize the "base" variable after the sanity check to avoid a
possible NULL pointer dereference.

Addresses-Coverity-ID: 1493866 ("Null pointer dereference")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48750" ref_url="https://www.suse.com/security/cve/CVE-2022-48750" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (nct6775) Fix crash in clear_caseopen

Paweł Marciniak reports the following crash, observed when clearing
the chassis intrusion alarm.

BUG: kernel NULL pointer dereference, address: 0000000000000028
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 3 PID: 4815 Comm: bash Tainted: G S                5.16.2-200.fc35.x86_64 #1
Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z97 Extreme4, BIOS P2.60A 05/03/2018
RIP: 0010:clear_caseopen+0x5a/0x120 [nct6775]
Code: 68 70 e8 e9 32 b1 e3 85 c0 0f 85 d2 00 00 00 48 83 7c 24 ...
RSP: 0018:ffffabcb02803dd8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
RDX: ffff8e8808192880 RSI: 0000000000000000 RDI: ffff8e87c7509a68
RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000000000a
R10: 000000000000000a R11: f000000000000000 R12: 000000000000001f
R13: ffff8e87c7509828 R14: ffff8e87c7509a68 R15: ffff8e88494527a0
FS:  00007f4db9151740(0000) GS:ffff8e8ebfec0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000028 CR3: 0000000166b66001 CR4: 00000000001706e0
Call Trace:
 &lt;TASK&gt;
 kernfs_fop_write_iter+0x11c/0x1b0
 new_sync_write+0x10b/0x180
 vfs_write+0x209/0x2a0
 ksys_write+0x4f/0xc0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae

The problem is that the device passed to clear_caseopen() is the hwmon
device, not the platform device, and the platform data is not set in the
hwmon device. Store the pointer to sio_data in struct nct6775_data and
get if from there if needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48750/">CVE-2022-48750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48750">CVE-2022-48750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226651">SUSE bug 1226651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48751" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Transitional solution for clcsock race issue

We encountered a crash in smc_setsockopt() and it is caused by
accessing smc-&gt;clcsock after clcsock was released.

 BUG: kernel NULL pointer dereference, address: 0000000000000020
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 50309 Comm: nginx Kdump: loaded Tainted: G E     5.16.0-rc4+ #53
 RIP: 0010:smc_setsockopt+0x59/0x280 [smc]
 Call Trace:
  &lt;TASK&gt;
  __sys_setsockopt+0xfc/0x190
  __x64_sys_setsockopt+0x20/0x30
  do_syscall_64+0x34/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f16ba83918e
  &lt;/TASK&gt;

This patch tries to fix it by holding clcsock_release_lock and
checking whether clcsock has already been released before access.

In case that a crash of the same reason happens in smc_getsockopt()
or smc_switch_to_fallback(), this patch also checkes smc-&gt;clcsock
in them too. And the caller of smc_switch_to_fallback() will identify
whether fallback succeeds according to the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48752" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending

Running selftest with CONFIG_PPC_IRQ_SOFT_MASK_DEBUG enabled in kernel
triggered below warning:

[  172.851380] ------------[ cut here ]------------
[  172.851391] WARNING: CPU: 8 PID: 2901 at arch/powerpc/include/asm/hw_irq.h:246 power_pmu_disable+0x270/0x280
[  172.851402] Modules linked in: dm_mod bonding nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc xfs libcrc32c pseries_rng xts vmx_crypto uio_pdrv_genirq uio sch_fq_codel ip_tables ext4 mbcache jbd2 sd_mod t10_pi sg ibmvscsi ibmveth scsi_transport_srp fuse
[  172.851442] CPU: 8 PID: 2901 Comm: lost_exception_ Not tainted 5.16.0-rc5-03218-g798527287598 #2
[  172.851451] NIP:  c00000000013d600 LR: c00000000013d5a4 CTR: c00000000013b180
[  172.851458] REGS: c000000017687860 TRAP: 0700   Not tainted  (5.16.0-rc5-03218-g798527287598)
[  172.851465] MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 48004884  XER: 20040000
[  172.851482] CFAR: c00000000013d5b4 IRQMASK: 1
[  172.851482] GPR00: c00000000013d5a4 c000000017687b00 c000000002a10600 0000000000000004
[  172.851482] GPR04: 0000000082004000 c0000008ba08f0a8 0000000000000000 00000008b7ed0000
[  172.851482] GPR08: 00000000446194f6 0000000000008000 c00000000013b118 c000000000d58e68
[  172.851482] GPR12: c00000000013d390 c00000001ec54a80 0000000000000000 0000000000000000
[  172.851482] GPR16: 0000000000000000 0000000000000000 c000000015d5c708 c0000000025396d0
[  172.851482] GPR20: 0000000000000000 0000000000000000 c00000000a3bbf40 0000000000000003
[  172.851482] GPR24: 0000000000000000 c0000008ba097400 c0000000161e0d00 c00000000a3bb600
[  172.851482] GPR28: c000000015d5c700 0000000000000001 0000000082384090 c0000008ba0020d8
[  172.851549] NIP [c00000000013d600] power_pmu_disable+0x270/0x280
[  172.851557] LR [c00000000013d5a4] power_pmu_disable+0x214/0x280
[  172.851565] Call Trace:
[  172.851568] [c000000017687b00] [c00000000013d5a4] power_pmu_disable+0x214/0x280 (unreliable)
[  172.851579] [c000000017687b40] [c0000000003403ac] perf_pmu_disable+0x4c/0x60
[  172.851588] [c000000017687b60] [c0000000003445e4] __perf_event_task_sched_out+0x1d4/0x660
[  172.851596] [c000000017687c50] [c000000000d1175c] __schedule+0xbcc/0x12a0
[  172.851602] [c000000017687d60] [c000000000d11ea8] schedule+0x78/0x140
[  172.851608] [c000000017687d90] [c0000000001a8080] sys_sched_yield+0x20/0x40
[  172.851615] [c000000017687db0] [c0000000000334dc] system_call_exception+0x18c/0x380
[  172.851622] [c000000017687e10] [c00000000000c74c] system_call_common+0xec/0x268

The warning indicates that MSR_EE being set(interrupt enabled) when
there was an overflown PMC detected. This could happen in
power_pmu_disable since it runs under interrupt soft disable
condition ( local_irq_save ) and not with interrupts hard disabled.
commit 2c9ac51b850d ("powerpc/perf: Fix PMU callbacks to clear
pending PMI before resetting an overflown PMC") intended to clear
PMI pending bit in Paca when disabling the PMU. It could happen
that PMC gets overflown while code is in power_pmu_disable
callback function. Hence add a check to see if PMI pending bit
is set in Paca before clearing it via clear_pmi_pending.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48753" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48753" ref_url="https://www.suse.com/security/cve/CVE-2022-48753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix memory leak in disk_register_independent_access_ranges

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add()

   If this function returns an error, kobject_put() must be called to
   properly clean up the memory associated with the object.

Fix this issue by adding kobject_put().
Callback function blk_ia_ranges_sysfs_release() in kobject_put()
can handle the pointer "iars" properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48753/">CVE-2022-48753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48753">CVE-2022-48753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226693">SUSE bug 1226693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48754" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phylib: fix potential use-after-free

Commit bafbdd527d56 ("phylib: Add device reset GPIO support") added call
to phy_device_reset(phydev) after the put_device() call in phy_detach().

The comment before the put_device() call says that the phydev might go
away with put_device().

Fix potential use-after-free by calling phy_device_reset() before
put_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48755" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48755" ref_url="https://www.suse.com/security/cve/CVE-2022-48755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06

Johan reported the below crash with test_bpf on ppc64 e5500:

  test_bpf: #296 ALU_END_FROM_LE 64: 0x0123456789abcdef -&gt; 0x67452301 jited:1
  Oops: Exception in kernel mode, sig: 4 [#1]
  BE PAGE_SIZE=4K SMP NR_CPUS=24 QEMU e500
  Modules linked in: test_bpf(+)
  CPU: 0 PID: 76 Comm: insmod Not tainted 5.14.0-03771-g98c2059e008a-dirty #1
  NIP:  8000000000061c3c LR: 80000000006dea64 CTR: 8000000000061c18
  REGS: c0000000032d3420 TRAP: 0700   Not tainted (5.14.0-03771-g98c2059e008a-dirty)
  MSR:  0000000080089000 &lt;EE,ME&gt;  CR: 88002822  XER: 20000000 IRQMASK: 0
  &lt;...&gt;
  NIP [8000000000061c3c] 0x8000000000061c3c
  LR [80000000006dea64] .__run_one+0x104/0x17c [test_bpf]
  Call Trace:
   .__run_one+0x60/0x17c [test_bpf] (unreliable)
   .test_bpf_init+0x6a8/0xdc8 [test_bpf]
   .do_one_initcall+0x6c/0x28c
   .do_init_module+0x68/0x28c
   .load_module+0x2460/0x2abc
   .__do_sys_init_module+0x120/0x18c
   .system_call_exception+0x110/0x1b8
   system_call_common+0xf0/0x210
  --- interrupt: c00 at 0x101d0acc
  &lt;...&gt;
  ---[ end trace 47b2bf19090bb3d0 ]---

  Illegal instruction

The illegal instruction turned out to be 'ldbrx' emitted for
BPF_FROM_[L|B]E, which was only introduced in ISA v2.06. Guard use of
the same and implement an alternative approach for older processors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48755/">CVE-2022-48755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48755">CVE-2022-48755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226706">SUSE bug 1226706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48756" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable

The function performs a check on the "phy" input parameter, however, it
is used before the check.

Initialize the "dev" variable after the sanity check to avoid a possible
NULL pointer dereference.

Addresses-Coverity-ID: 1493860 ("Null pointer dereference")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48757" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48757" ref_url="https://www.suse.com/security/cve/CVE-2022-48757" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix information leakage in /proc/net/ptype

In one net namespace, after creating a packet socket without binding
it to a device, users in other net namespaces can observe the new
`packet_type` added by this packet socket by reading `/proc/net/ptype`
file. This is minor information leakage as packet socket is
namespace aware.

Add a net pointer in `packet_type` to keep the net namespace of
of corresponding packet socket. In `ptype_seq_show`, this net pointer
must be checked when it is not NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48757/">CVE-2022-48757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48757">CVE-2022-48757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226695">SUSE bug 1226695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48758" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()

The bnx2fc_destroy() functions are removing the interface before calling
destroy_work. This results multiple WARNings from sysfs_remove_group() as
the controller rport device attributes are removed too early.

Replace the fcoe_port's destroy_work queue. It's not needed.

The problem is easily reproducible with the following steps.

Example:

  $ dmesg -w &amp;
  $ systemctl enable --now fcoe
  $ fipvlan -s -c ens2f1
  $ fcoeadm -d ens2f1.802
  [  583.464488] host2: libfc: Link down on port (7500a1)
  [  583.472651] bnx2fc: 7500a1 - rport not created Yet!!
  [  583.490468] ------------[ cut here ]------------
  [  583.538725] sysfs group 'power' not found for kobject 'rport-2:0-0'
  [  583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80
  [  583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...
  [  583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1
  [  583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013
  [  584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]
  [  584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80
  [  584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...
  [  584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282
  [  584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000
  [  584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0
  [  584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00
  [  584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400
  [  584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004
  [  584.355379] FS:  0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000
  [  584.394419] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [  584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0
  [  584.454888] Call Trace:
  [  584.466108]  device_del+0xb2/0x3e0
  [  584.481701]  device_unregister+0x13/0x60
  [  584.501306]  bsg_unregister_queue+0x5b/0x80
  [  584.522029]  bsg_remove_queue+0x1c/0x40
  [  584.541884]  fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]
  [  584.573823]  process_one_work+0x1e3/0x3b0
  [  584.592396]  worker_thread+0x50/0x3b0
  [  584.609256]  ? rescuer_thread+0x370/0x370
  [  584.628877]  kthread+0x149/0x170
  [  584.643673]  ? set_kthread_struct+0x40/0x40
  [  584.662909]  ret_from_fork+0x22/0x30
  [  584.680002] ---[ end trace 53575ecefa942ece ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48759" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev

struct rpmsg_ctrldev contains a struct cdev. The current code frees
the rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the
cdev is a managed object, therefore its release is not predictable
and the rpmsg_ctrldev could be freed before the cdev is entirely
released, as in the backtrace below.

[   93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c
[   93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0
[   93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v
[   93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G    B             5.4.163-lockdep #26
[   93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)
[   93.730055] Workqueue: events kobject_delayed_cleanup
[   93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)
[   93.740216] pc : debug_print_object+0x13c/0x1b0
[   93.744890] lr : debug_print_object+0x13c/0x1b0
[   93.749555] sp : ffffffacf5bc7940
[   93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000
[   93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000
[   93.763916] x25: ffffffd0734f856c x24: dfffffd000000000
[   93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0
[   93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0
[   93.780338] x19: ffffffd075199100 x18: 00000000000276e0
[   93.785814] x17: 0000000000000000 x16: dfffffd000000000
[   93.791291] x15: ffffffffffffffff x14: 6e6968207473696c
[   93.796768] x13: 0000000000000000 x12: ffffffd075e2b000
[   93.802244] x11: 0000000000000001 x10: 0000000000000000
[   93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900
[   93.813200] x7 : 0000000000000000 x6 : 0000000000000000
[   93.818676] x5 : 0000000000000080 x4 : 0000000000000000
[   93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001
[   93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061
[   93.835104] Call trace:
[   93.837644]  debug_print_object+0x13c/0x1b0
[   93.841963]  __debug_check_no_obj_freed+0x25c/0x3c0
[   93.846987]  debug_check_no_obj_freed+0x18/0x20
[   93.851669]  slab_free_freelist_hook+0xbc/0x1e4
[   93.856346]  kfree+0xfc/0x2f4
[   93.859416]  rpmsg_ctrldev_release_device+0x78/0xb8
[   93.864445]  device_release+0x84/0x168
[   93.868310]  kobject_cleanup+0x12c/0x298
[   93.872356]  kobject_delayed_cleanup+0x10/0x18
[   93.876948]  process_one_work+0x578/0x92c
[   93.881086]  worker_thread+0x804/0xcf8
[   93.884963]  kthread+0x2a8/0x314
[   93.888303]  ret_from_fork+0x10/0x18

The cdev_device_add/del() API was created to address this issue (see
commit '233ed09d7fda ("chardev: add helper function to register char
devs with a struct device")'), use it instead of cdev add/del().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix hang in usb_kill_urb by adding memory barriers

The syzbot fuzzer has identified a bug in which processes hang waiting
for usb_kill_urb() to return.  It turns out the issue is not unlinking
the URB; that works just fine.  Rather, the problem arises when the
wakeup notification that the URB has completed is not received.

The reason is memory-access ordering on SMP systems.  In outline form,
usb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on
different CPUs perform the following actions:

CPU 0					CPU 1
----------------------------		---------------------------------
usb_kill_urb():				__usb_hcd_giveback_urb():
  ...					  ...
  atomic_inc(&amp;urb-&gt;reject);		  atomic_dec(&amp;urb-&gt;use_count);
  ...					  ...
  wait_event(usb_kill_urb_queue,
	atomic_read(&amp;urb-&gt;use_count) == 0);
					  if (atomic_read(&amp;urb-&gt;reject))
						wake_up(&amp;usb_kill_urb_queue);

Confining your attention to urb-&gt;reject and urb-&gt;use_count, you can
see that the overall pattern of accesses on CPU 0 is:

	write urb-&gt;reject, then read urb-&gt;use_count;

whereas the overall pattern of accesses on CPU 1 is:

	write urb-&gt;use_count, then read urb-&gt;reject.

This pattern is referred to in memory-model circles as SB (for "Store
Buffering"), and it is well known that without suitable enforcement of
the desired order of accesses -- in the form of memory barriers -- it
is entirely possible for one or both CPUs to execute their reads ahead
of their writes.  The end result will be that sometimes CPU 0 sees the
old un-decremented value of urb-&gt;use_count while CPU 1 sees the old
un-incremented value of urb-&gt;reject.  Consequently CPU 0 ends up on
the wait queue and never gets woken up, leading to the observed hang
in usb_kill_urb().

The same pattern of accesses occurs in usb_poison_urb() and the
failure pathway of usb_hcd_submit_urb().

The problem is fixed by adding suitable memory barriers.  To provide
proper memory-access ordering in the SB pattern, a full barrier is
required on both CPUs.  The atomic_inc() and atomic_dec() accesses
themselves don't provide any memory ordering, but since they are
present, we can use the optimized smp_mb__after_atomic() memory
barrier in the various routines to obtain the desired effect.

This patch adds the necessary memory barriers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48761" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci-plat: fix crash when suspend if remote wake enable

Crashed at i.mx8qm platform when suspend if enable remote wakeup

Internal error: synchronous external abort: 96000210 [#1] PREEMPT SMP
Modules linked in:
CPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12
Hardware name: Freescale i.MX8QM MEK (DT)
Workqueue: events_unbound async_run_entry_fn
pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8
lr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8
sp : ffff80001394bbf0
x29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578
x26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000
x23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001
x20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0
x8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453
x5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c
x2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620
Call trace:
 xhci_disable_hub_port_wake.isra.62+0x60/0xf8
 xhci_suspend+0x58/0x510
 xhci_plat_suspend+0x50/0x78
 platform_pm_suspend+0x2c/0x78
 dpm_run_callback.isra.25+0x50/0xe8
 __device_suspend+0x108/0x3c0

The basic flow:
	1. run time suspend call xhci_suspend, xhci parent devices gate the clock.
        2. echo mem &gt;/sys/power/state, system _device_suspend call xhci_suspend
        3. xhci_suspend call xhci_disable_hub_port_wake, which access register,
	   but clock already gated by run time suspend.

This problem was hidden by power domain driver, which call run time resume before it.

But the below commit remove it and make this issue happen.
	commit c1df456d0f06e ("PM: domains: Don't runtime resume devices at genpd_prepare()")

This patch call run time resume before suspend to make sure clock is on
before access register.

Testeb-by: Abel Vesa &lt;abel.vesa@nxp.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48762" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48762" ref_url="https://www.suse.com/security/cve/CVE-2022-48762" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: extable: fix load_unaligned_zeropad() reg indices

In ex_handler_load_unaligned_zeropad() we erroneously extract the data and
addr register indices from ex-&gt;type rather than ex-&gt;data. As ex-&gt;type will
contain EX_TYPE_LOAD_UNALIGNED_ZEROPAD (i.e. 4):
 * We'll always treat X0 as the address register, since EX_DATA_REG_ADDR is
   extracted from bits [9:5]. Thus, we may attempt to dereference an
   arbitrary address as X0 may hold an arbitrary value.
 * We'll always treat X4 as the data register, since EX_DATA_REG_DATA is
   extracted from bits [4:0]. Thus we will corrupt X4 and cause arbitrary
   behaviour within load_unaligned_zeropad() and its caller.

Fix this by extracting both values from ex-&gt;data as originally intended.

On an MTE-enabled QEMU image we are hitting the following crash:
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
 Call trace:
  fixup_exception+0xc4/0x108
  __do_kernel_fault+0x3c/0x268
  do_tag_check_fault+0x3c/0x104
  do_mem_abort+0x44/0xf4
  el1_abort+0x40/0x64
  el1h_64_sync_handler+0x60/0xa0
  el1h_64_sync+0x7c/0x80
  link_path_walk+0x150/0x344
  path_openat+0xa0/0x7dc
  do_filp_open+0xb8/0x168
  do_sys_openat2+0x88/0x17c
  __arm64_sys_openat+0x74/0xa0
  invoke_syscall+0x48/0x148
  el0_svc_common+0xb8/0xf8
  do_el0_svc+0x28/0x88
  el0_svc+0x24/0x84
  el0t_64_sync_handler+0x88/0xec
  el0t_64_sync+0x1b4/0x1b8
 Code: f8695a69 71007d1f 540000e0 927df12a (f940014a)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48762/">CVE-2022-48762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48762">CVE-2022-48762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226707">SUSE bug 1226707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48763" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Forcibly leave nested virt when SMM state is toggled

Forcibly leave nested virtualization operation if userspace toggles SMM
state via KVM_SET_VCPU_EVENTS or KVM_SYNC_X86_EVENTS.  If userspace
forces the vCPU out of SMM while it's post-VMXON and then injects an SMI,
vmx_enter_smm() will overwrite vmx-&gt;nested.smm.vmxon and end up with both
vmxon=false and smm.vmxon=false, but all other nVMX state allocated.

Don't attempt to gracefully handle the transition as (a) most transitions
are nonsencial, e.g. forcing SMM while L2 is running, (b) there isn't
sufficient information to handle all transitions, e.g. SVM wants access
to the SMRAM save state, and (c) KVM_SET_VCPU_EVENTS must precede
KVM_SET_NESTED_STATE during state restore as the latter disallows putting
the vCPU into L2 if SMM is active, and disallows tagging the vCPU as
being post-VMXON in SMM if SMM is not active.

Abuse of KVM_SET_VCPU_EVENTS manifests as a WARN and memory leak in nVMX
due to failure to free vmcs01's shadow VMCS, but the bug goes far beyond
just a memory leak, e.g. toggling SMM on while L2 is active puts the vCPU
in an architecturally impossible state.

  WARNING: CPU: 0 PID: 3606 at free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2665 [inline]
  WARNING: CPU: 0 PID: 3606 at free_loaded_vmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656
  Modules linked in:
  CPU: 1 PID: 3606 Comm: syz-executor725 Not tainted 5.17.0-rc1-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:free_loaded_vmcs arch/x86/kvm/vmx/vmx.c:2665 [inline]
  RIP: 0010:free_loaded_vmcs+0x158/0x1a0 arch/x86/kvm/vmx/vmx.c:2656
  Code: &lt;0f&gt; 0b eb b3 e8 8f 4d 9f 00 e9 f7 fe ff ff 48 89 df e8 92 4d 9f 00
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_vcpu_destroy+0x72/0x2f0 arch/x86/kvm/x86.c:11123
   kvm_vcpu_destroy arch/x86/kvm/../../../virt/kvm/kvm_main.c:441 [inline]
   kvm_destroy_vcpus+0x11f/0x290 arch/x86/kvm/../../../virt/kvm/kvm_main.c:460
   kvm_free_vcpus arch/x86/kvm/x86.c:11564 [inline]
   kvm_arch_destroy_vm+0x2e8/0x470 arch/x86/kvm/x86.c:11676
   kvm_destroy_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:1217 [inline]
   kvm_put_kvm+0x4fa/0xb00 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1250
   kvm_vm_release+0x3f/0x50 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1273
   __fput+0x286/0x9f0 fs/file_table.c:311
   task_work_run+0xdd/0x1a0 kernel/task_work.c:164
   exit_task_work include/linux/task_work.h:32 [inline]
   do_exit+0xb29/0x2a30 kernel/exit.c:806
   do_group_exit+0xd2/0x2f0 kernel/exit.c:935
   get_signal+0x4b0/0x28c0 kernel/signal.c:2862
   arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
   handle_signal_work kernel/entry/common.c:148 [inline]
   exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
   exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
   __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
   syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
   do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48764" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48764" ref_url="https://www.suse.com/security/cve/CVE-2022-48764" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}

Free the "struct kvm_cpuid_entry2" array on successful post-KVM_RUN
KVM_SET_CPUID{,2} to fix a memory leak, the callers of kvm_set_cpuid()
free the array only on failure.

 BUG: memory leak
 unreferenced object 0xffff88810963a800 (size 2048):
  comm "syz-executor025", pid 3610, jiffies 4294944928 (age 8.080s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 0d 00 00 00  ................
    47 65 6e 75 6e 74 65 6c 69 6e 65 49 00 00 00 00  GenuntelineI....
  backtrace:
    [&lt;ffffffff814948ee&gt;] kmalloc_node include/linux/slab.h:604 [inline]
    [&lt;ffffffff814948ee&gt;] kvmalloc_node+0x3e/0x100 mm/util.c:580
    [&lt;ffffffff814950f2&gt;] kvmalloc include/linux/slab.h:732 [inline]
    [&lt;ffffffff814950f2&gt;] vmemdup_user+0x22/0x100 mm/util.c:199
    [&lt;ffffffff8109f5ff&gt;] kvm_vcpu_ioctl_set_cpuid2+0x8f/0xf0 arch/x86/kvm/cpuid.c:423
    [&lt;ffffffff810711b9&gt;] kvm_arch_vcpu_ioctl+0xb99/0x1e60 arch/x86/kvm/x86.c:5251
    [&lt;ffffffff8103e92d&gt;] kvm_vcpu_ioctl+0x4ad/0x950 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4066
    [&lt;ffffffff815afacc&gt;] vfs_ioctl fs/ioctl.c:51 [inline]
    [&lt;ffffffff815afacc&gt;] __do_sys_ioctl fs/ioctl.c:874 [inline]
    [&lt;ffffffff815afacc&gt;] __se_sys_ioctl fs/ioctl.c:860 [inline]
    [&lt;ffffffff815afacc&gt;] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860
    [&lt;ffffffff844a3335&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff844a3335&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84600068&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48764/">CVE-2022-48764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48764">CVE-2022-48764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226700">SUSE bug 1226700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: LAPIC: Also cancel preemption timer during SET_LAPIC

The below warning is splatting during guest reboot.

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1931 at arch/x86/kvm/x86.c:10322 kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  CPU: 0 PID: 1931 Comm: qemu-system-x86 Tainted: G          I       5.17.0-rc1+ #5
  RIP: 0010:kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_vcpu_ioctl+0x279/0x710 [kvm]
   __x64_sys_ioctl+0x83/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7fd39797350b

This can be triggered by not exposing tsc-deadline mode and doing a reboot in
the guest. The lapic_shutdown() function which is called in sys_reboot path
will not disarm the flying timer, it just masks LVTT. lapic_shutdown() clears
APIC state w/ LVT_MASKED and timer-mode bit is 0, this can trigger timer-mode
switch between tsc-deadline and oneshot/periodic, which can result in preemption
timer be cancelled in apic_update_lvtt(). However, We can't depend on this when
not exposing tsc-deadline mode and oneshot/periodic modes emulated by preemption
timer. Qemu will synchronise states around reset, let's cancel preemption timer
under KVM_SET_LAPIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48766" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48766" ref_url="https://www.suse.com/security/cve/CVE-2022-48766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.

Mirrors the logic for dcn30. Cue lots of WARNs and some
kernel panics without this fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48766/">CVE-2022-48766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48766">CVE-2022-48766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226704">SUSE bug 1226704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48767" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: properly put ceph_string reference after async create attempt

The reference acquired by try_prep_async_create is currently leaked.
Ensure we put it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48768" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/histogram: Fix a potential memory leak for kstrdup()

kfree() is missing on an error path to free the memory allocated by
kstrdup():

  p = param = kstrdup(data-&gt;params[i], GFP_KERNEL);

So it is better to free it via kfree(p).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48769" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: runtime: avoid EFIv2 runtime services on Apple x86 machines

Aditya reports [0] that his recent MacbookPro crashes in the firmware
when using the variable services at runtime. The culprit appears to be a
call to QueryVariableInfo(), which we did not use to call on Apple x86
machines in the past as they only upgraded from EFI v1.10 to EFI v2.40
firmware fairly recently, and QueryVariableInfo() (along with
UpdateCapsule() et al) was added in EFI v2.00.

The only runtime service introduced in EFI v2.00 that we actually use in
Linux is QueryVariableInfo(), as the capsule based ones are optional,
generally not used at runtime (all the LVFS/fwupd firmware update
infrastructure uses helper EFI programs that invoke capsule update at
boot time, not runtime), and not implemented by Apple machines in the
first place. QueryVariableInfo() is used to 'safely' set variables,
i.e., only when there is enough space. This prevents machines with buggy
firmwares from corrupting their NVRAMs when they run out of space.

Given that Apple machines have been using EFI v1.10 services only for
the longest time (the EFI v2.0 spec was released in 2006, and Linux
support for the newly introduced runtime services was added in 2011, but
the MacbookPro12,1 released in 2015 still claims to be EFI v1.10 only),
let's avoid the EFI v2.0 ones on all Apple x86 machines.

[0] https://lore.kernel.org/all/6D757C75-65B1-468B-842D-10410081A8E4@live.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48770" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48770" ref_url="https://www.suse.com/security/cve/CVE-2022-48770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()

task_pt_regs() can return NULL on powerpc for kernel threads. This is
then used in __bpf_get_stack() to check for user mode, resulting in a
kernel oops. Guard against this by checking return value of
task_pt_regs() before trying to obtain the call chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48770/">CVE-2022-48770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48770">CVE-2022-48770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226730">SUSE bug 1226730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48772" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: lgdt3306a: Add a check against null-pointer-def

The driver should check whether the client provides the platform_data.

The following log reveals it:

[   29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40
[   29.610730] Read of size 40 at addr 0000000000000000 by task bash/414
[   29.612820] Call Trace:
[   29.613030]  &lt;TASK&gt;
[   29.613201]  dump_stack_lvl+0x56/0x6f
[   29.613496]  ? kmemdup+0x30/0x40
[   29.613754]  print_report.cold+0x494/0x6b7
[   29.614082]  ? kmemdup+0x30/0x40
[   29.614340]  kasan_report+0x8a/0x190
[   29.614628]  ? kmemdup+0x30/0x40
[   29.614888]  kasan_check_range+0x14d/0x1d0
[   29.615213]  memcpy+0x20/0x60
[   29.615454]  kmemdup+0x30/0x40
[   29.615700]  lgdt3306a_probe+0x52/0x310
[   29.616339]  i2c_device_probe+0x951/0xa90
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226976">SUSE bug 1226976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48773" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create

If there are failures then we must not leave the non-NULL pointers with
the error value, otherwise `rpcrdma_ep_destroy` gets confused and tries
free them, resulting in an Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48774" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ptdma: Fix the error handling path in pt_core_init()

In order to free resources correctly in the error handling path of
pt_core_init(), 2 goto's have to be switched. Otherwise, some resources
will leak and we will try to release things that have not been allocated
yet.

Also move a dev_err() to a place where it is more meaningful.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48775" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj

kobject_init_and_add() takes reference even when it fails.
According to the doc of kobject_init_and_add():

   If this function returns an error, kobject_put() must be called to
   properly clean up the memory associated with the object.

Fix memory leak by calling kobject_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48776" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: parsers: qcom: Fix missing free for pparts in cleanup

Mtdpart doesn't free pparts when a cleanup function is declared.
Add missing free for pparts in cleanup function for smem to fix the
leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48777" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: parsers: qcom: Fix kernel panic on skipped partition

In the event of a skipped partition (case when the entry name is empty)
the kernel panics in the cleanup function as the name entry is NULL.
Rework the parser logic by first checking the real partition number and
then allocate the space and set the data for the valid partitions.

The logic was also fundamentally wrong as with a skipped partition, the
parts number returned was incorrect by not decreasing it for the skipped
partitions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: gpmi: don't leak PM reference in error path

If gpmi_nfc_apply_timings() fails, the PM runtime usage counter must be
dropped.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48779" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48779" ref_url="https://www.suse.com/security/cve/CVE-2022-48779" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()

ocelot_vlan_member_del() will free the struct ocelot_bridge_vlan, so if
this is the same as the port's pvid_vlan which we access afterwards,
what we're accessing is freed memory.

Fix the bug by determining whether to clear ocelot_port-&gt;pvid_vlan prior
to calling ocelot_vlan_member_del().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48779/">CVE-2022-48779 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48779">CVE-2022-48779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227939">SUSE bug 1227939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48780" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Avoid overwriting the copies of clcsock callback functions

The callback functions of clcsock will be saved and replaced during
the fallback. But if the fallback happens more than once, then the
copies of these callback functions will be overwritten incorrectly,
resulting in a loop call issue:

clcsk-&gt;sk_error_report
 |- smc_fback_error_report() &lt;------------------------------|
     |- smc_fback_forward_wakeup()                          | (loop)
         |- clcsock_callback()  (incorrectly overwritten)   |
             |- smc-&gt;clcsk_error_report() ------------------|

So this patch fixes the issue by saving these function pointers only
once in the fallback and avoiding overwriting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48781" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48781" ref_url="https://www.suse.com/security/cve/CVE-2022-48781" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - get rid of alg_memory_allocated

alg_memory_allocated does not seem to be really used.

alg_proto does have a .memory_allocated field, but no
corresponding .sysctl_mem.

This means sk_has_account() returns true, but all sk_prot_mem_limits()
users will trigger a NULL dereference [1].

THis was not a problem until SO_RESERVE_MEM addition.

general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 3591 Comm: syz-executor153 Not tainted 5.17.0-rc3-syzkaller-00316-gb81b1829e7e3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:sk_prot_mem_limits include/net/sock.h:1523 [inline]
RIP: 0010:sock_reserve_memory+0x1d7/0x330 net/core/sock.c:1000
Code: 08 00 74 08 48 89 ef e8 27 20 bb f9 4c 03 7c 24 10 48 8b 6d 00 48 83 c5 08 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df &lt;80&gt; 3c 08 00 74 08 48 89 ef e8 fb 1f bb f9 48 8b 6d 00 4c 89 ff 48
RSP: 0018:ffffc90001f1fb68 EFLAGS: 00010202
RAX: 0000000000000001 RBX: ffff88814aabc000 RCX: dffffc0000000000
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff90e18120
RBP: 0000000000000008 R08: dffffc0000000000 R09: fffffbfff21c3025
R10: fffffbfff21c3025 R11: 0000000000000000 R12: ffffffff8d109840
R13: 0000000000001002 R14: 0000000000000001 R15: 0000000000000001
FS:  0000555556e08300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc74416f130 CR3: 0000000073d9e000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 sock_setsockopt+0x14a9/0x3a30 net/core/sock.c:1446
 __sys_setsockopt+0x5af/0x980 net/socket.c:2176
 __do_sys_setsockopt net/socket.c:2191 [inline]
 __se_sys_setsockopt net/socket.c:2188 [inline]
 __x64_sys_setsockopt+0xb1/0xc0 net/socket.c:2188
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fc7440fddc9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe98f07968 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fc7440fddc9
RDX: 0000000000000049 RSI: 0000000000000001 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000004 R09: 00007ffe98f07990
R10: 0000000020000000 R11: 0000000000000246 R12: 00007ffe98f0798c
R13: 00007ffe98f079a0 R14: 00007ffe98f079e0 R15: 0000000000000000
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:sk_prot_mem_limits include/net/sock.h:1523 [inline]
RIP: 0010:sock_reserve_memory+0x1d7/0x330 net/core/sock.c:1000
Code: 08 00 74 08 48 89 ef e8 27 20 bb f9 4c 03 7c 24 10 48 8b 6d 00 48 83 c5 08 48 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df &lt;80&gt; 3c 08 00 74 08 48 89 ef e8 fb 1f bb f9 48 8b 6d 00 4c 89 ff 48
RSP: 0018:ffffc90001f1fb68 EFLAGS: 00010202
RAX: 0000000000000001 RBX: ffff88814aabc000 RCX: dffffc0000000000
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff90e18120
RBP: 0000000000000008 R08: dffffc0000000000 R09: fffffbfff21c3025
R10: fffffbfff21c3025 R11: 0000000000000000 R12: ffffffff8d109840
R13: 0000000000001002 R14: 0000000000000001 R15: 0000000000000001
FS:  0000555556e08300(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc74416f130 CR3: 0000000073d9e000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48781/">CVE-2022-48781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48781">CVE-2022-48781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227946">SUSE bug 1227946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48782" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48782" ref_url="https://www.suse.com/security/cve/CVE-2022-48782" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mctp: fix use after free

Clang static analysis reports this problem
route.c:425:4: warning: Use of memory after it is freed
  trace_mctp_key_acquire(key);
  ^~~~~~~~~~~~~~~~~~~~~~~~~~~
When mctp_key_add() fails, key is freed but then is later
used in trace_mctp_key_acquire().  Add an else statement
to use the key only when mctp_key_add() is successful.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48782/">CVE-2022-48782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48782">CVE-2022-48782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227943">SUSE bug 1227943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48783" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: lantiq_gswip: fix use after free in gswip_remove()

of_node_put(priv-&gt;ds-&gt;slave_mii_bus-&gt;dev.of_node) should be
done before mdiobus_free(priv-&gt;ds-&gt;slave_mii_bus).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48784" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cfg80211: fix race in netlink owner interface destruction

My previous fix here to fix the deadlock left a race where
the exact same deadlock (see the original commit referenced
below) can still happen if cfg80211_destroy_ifaces() already
runs while nl80211_netlink_notify() is still marking some
interfaces as nl_owner_dead.

The race happens because we have two loops here - first we
dev_close() all the netdevs, and then we destroy them. If we
also have two netdevs (first one need only be a wdev though)
then we can find one during the first iteration, close it,
and go to the second iteration -- but then find two, and try
to destroy also the one we didn't close yet.

Fix this by only iterating once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48785" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48785" ref_url="https://www.suse.com/security/cve/CVE-2022-48785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()

Some time ago 8965779d2c0e ("ipv6,mcast: always hold idev-&gt;lock before mca_lock")
switched ipv6_get_lladdr() to __ipv6_get_lladdr(), which is rcu-unsafe
version. That was OK, because idev-&gt;lock was held for these codepaths.

In 88e2ca308094 ("mld: convert ifmcaddr6 to RCU") these external locks were
removed, so we probably need to restore the original rcu-safe call.

Otherwise, we occasionally get a machine crashed/stalled with the following
in dmesg:

[ 3405.966610][T230589] general protection fault, probably for non-canonical address 0xdead00000000008c: 0000 [#1] SMP NOPTI
[ 3405.982083][T230589] CPU: 44 PID: 230589 Comm: kworker/44:3 Tainted: G           O      5.15.19-cloudflare-2022.2.1 #1
[ 3405.998061][T230589] Hardware name: SUPA-COOL-SERV
[ 3406.009552][T230589] Workqueue: mld mld_ifc_work
[ 3406.017224][T230589] RIP: 0010:__ipv6_get_lladdr+0x34/0x60
[ 3406.025780][T230589] Code: 57 10 48 83 c7 08 48 89 e5 48 39 d7 74 3e 48 8d 82 38 ff ff ff eb 13 48 8b 90 d0 00 00 00 48 8d 82 38 ff ff ff 48 39 d7 74 22 &lt;66&gt; 83 78 32 20 77 1b 75 e4 89 ca 23 50 2c 75 dd 48 8b 50 08 48 8b
[ 3406.055748][T230589] RSP: 0018:ffff94e4b3fc3d10 EFLAGS: 00010202
[ 3406.065617][T230589] RAX: dead00000000005a RBX: ffff94e4b3fc3d30 RCX: 0000000000000040
[ 3406.077477][T230589] RDX: dead000000000122 RSI: ffff94e4b3fc3d30 RDI: ffff8c3a31431008
[ 3406.089389][T230589] RBP: ffff94e4b3fc3d10 R08: 0000000000000000 R09: 0000000000000000
[ 3406.101445][T230589] R10: ffff8c3a31430000 R11: 000000000000000b R12: ffff8c2c37887100
[ 3406.113553][T230589] R13: ffff8c3a39537000 R14: 00000000000005dc R15: ffff8c3a31431000
[ 3406.125730][T230589] FS:  0000000000000000(0000) GS:ffff8c3b9fc80000(0000) knlGS:0000000000000000
[ 3406.138992][T230589] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3406.149895][T230589] CR2: 00007f0dfea1db60 CR3: 000000387b5f2000 CR4: 0000000000350ee0
[ 3406.162421][T230589] Call Trace:
[ 3406.170235][T230589]  &lt;TASK&gt;
[ 3406.177736][T230589]  mld_newpack+0xfe/0x1a0
[ 3406.186686][T230589]  add_grhead+0x87/0xa0
[ 3406.195498][T230589]  add_grec+0x485/0x4e0
[ 3406.204310][T230589]  ? newidle_balance+0x126/0x3f0
[ 3406.214024][T230589]  mld_ifc_work+0x15d/0x450
[ 3406.223279][T230589]  process_one_work+0x1e6/0x380
[ 3406.232982][T230589]  worker_thread+0x50/0x3a0
[ 3406.242371][T230589]  ? rescuer_thread+0x360/0x360
[ 3406.252175][T230589]  kthread+0x127/0x150
[ 3406.261197][T230589]  ? set_kthread_struct+0x40/0x40
[ 3406.271287][T230589]  ret_from_fork+0x22/0x30
[ 3406.280812][T230589]  &lt;/TASK&gt;
[ 3406.288937][T230589] Modules linked in: ... [last unloaded: kheaders]
[ 3406.476714][T230589] ---[ end trace 3525a7655f2f3b9e ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48785/">CVE-2022-48785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48785">CVE-2022-48785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227927">SUSE bug 1227927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: remove vsock from connected table when connect is interrupted by a signal

vsock_connect() expects that the socket could already be in the
TCP_ESTABLISHED state when the connecting task wakes up with a signal
pending. If this happens the socket will be in the connected table, and
it is not removed when the socket state is reset. In this situation it's
common for the process to retry connect(), and if the connection is
successful the socket will be added to the connected table a second
time, corrupting the list.

Prevent this by calling vsock_remove_connected() if a signal is received
while waiting for a connection. This is harmless if the socket is not in
the connected table, and if it is in the table then removing it will
prevent list corruption from a double add.

Note for backporting: this patch requires d5afa82c977e ("vsock: correct
removal of socket from the list"), which is in all current stable trees
except 4.9.y.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48787" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: fix use-after-free

If no firmware was present at all (or, presumably, all of the
firmware files failed to parse), we end up unbinding by calling
device_release_driver(), which calls remove(), which then in
iwlwifi calls iwl_drv_stop(), freeing the 'drv' struct. However
the new code I added will still erroneously access it after it
was freed.

Set 'failure=false' in this case to avoid the access, all data
was already freed anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48788" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: fix possible use-after-free in transport error_recovery work

While nvme_rdma_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48789" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix possible use-after-free in transport error_recovery work

While nvme_tcp_submit_async_event_work is checking the ctrl and queue
state before preparing the AER command and scheduling io_work, in order
to fully prevent a race where this check is not reliable the error
recovery work must flush async_event_work before continuing to destroy
the admin queue after setting the ctrl state to RESETTING such that
there is no race .submit_async_event and the error recovery handler
itself changing the ctrl state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48790" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix a possible use-after-free in controller reset during load

Unlike .queue_rq, in .submit_async_event drivers may not check the ctrl
readiness for AER submission. This may lead to a use-after-free
condition that was observed with nvme-tcp.

The race condition may happen in the following scenario:
1. driver executes its reset_ctrl_work
2. -&gt; nvme_stop_ctrl - flushes ctrl async_event_work
3. ctrl sends AEN which is received by the host, which in turn
   schedules AEN handling
4. teardown admin queue (which releases the queue socket)
5. AEN processed, submits another AER, calling the driver to submit
6. driver attempts to send the cmd
==&gt; use-after-free

In order to fix that, add ctrl state check to validate the ctrl
is actually able to accept the AER submission.

This addresses the above race in controller resets because the driver
during teardown should:
1. change ctrl state to RESETTING
2. flush async_event_work (as well as other async work elements)

So after 1,2, any other AER command will find the
ctrl state to be RESETTING and bail out without submitting the AER.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48791" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3304-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix use-after-free for aborted TMF sas_task

Currently a use-after-free may occur if a TMF sas_task is aborted before we
handle the IO completion in mpi_ssp_completion(). The abort occurs due to
timeout.

When the timeout occurs, the SAS_TASK_STATE_ABORTED flag is set and the
sas_task is freed in pm8001_exec_internal_tmf_task().

However, if the I/O completion occurs later, the I/O completion still
thinks that the sas_task is available. Fix this by clearing the ccb-&gt;task
if the TMF times out - the I/O completion handler does nothing if this
pointer is cleared.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228012">SUSE bug 1228012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48792" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task

Currently a use-after-free may occur if a sas_task is aborted by the upper
layer before we handle the I/O completion in mpi_ssp_completion() or
mpi_sata_completion().

In this case, the following are the two steps in handling those I/O
completions:

 - Call complete() to inform the upper layer handler of completion of
   the I/O.

 - Release driver resources associated with the sas_task in
   pm8001_ccb_task_free() call.

When complete() is called, the upper layer may free the sas_task. As such,
we should not touch the associated sas_task afterwards, but we do so in the
pm8001_ccb_task_free() call.

Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228017">SUSE bug 1228017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48793" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: nSVM: fix potential NULL derefernce on nested migration

Turns out that due to review feedback and/or rebases
I accidentally moved the call to nested_svm_load_cr3 to be too early,
before the NPT is enabled, which is very wrong to do.

KVM can't even access guest memory at that point as nested NPT
is needed for that, and of course it won't initialize the walk_mmu,
which is main issue the patch was addressing.

Fix this for real.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48794" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: at86rf230: Stop leaking skb's

Upon error the ieee802154_xmit_complete() helper is not called. Only
ieee802154_wake_queue() is called manually. In the Tx case we then leak
the skb structure.

Free the skb structure upon error before returning when appropriate.

As the 'is_tx = 0' cannot be moved in the complete handler because of a
possible race between the delay in switching to STATE_RX_AACK_ON and a
new interrupt, we introduce an intermediate 'was_tx' boolean just for
this purpose.

There is no Fixes tag applying here, many changes have been made on this
area and the issue kind of always existed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48795" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48795" ref_url="https://www.suse.com/security/cve/CVE-2022-48795" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: Fix data TLB miss in sba_unmap_sg

Rolf Eike Beer reported the following bug:

[1274934.746891] Bad Address (null pointer deref?): Code=15 (Data TLB miss fault) at addr 0000004140000018
[1274934.746891] CPU: 3 PID: 5549 Comm: cmake Not tainted 5.15.4-gentoo-parisc64 #4
[1274934.746891] Hardware name: 9000/785/C8000
[1274934.746891]
[1274934.746891]      YZrvWESTHLNXBCVMcbcbcbcbOGFRQPDI
[1274934.746891] PSW: 00001000000001001111111000001110 Not tainted
[1274934.746891] r00-03  000000ff0804fe0e 0000000040bc9bc0 00000000406760e4 0000004140000000
[1274934.746891] r04-07  0000000040b693c0 0000004140000000 000000004a2b08b0 0000000000000001
[1274934.746891] r08-11  0000000041f98810 0000000000000000 000000004a0a7000 0000000000000001
[1274934.746891] r12-15  0000000040bddbc0 0000000040c0cbc0 0000000040bddbc0 0000000040bddbc0
[1274934.746891] r16-19  0000000040bde3c0 0000000040bddbc0 0000000040bde3c0 0000000000000007
[1274934.746891] r20-23  0000000000000006 000000004a368950 0000000000000000 0000000000000001
[1274934.746891] r24-27  0000000000001fff 000000000800000e 000000004a1710f0 0000000040b693c0
[1274934.746891] r28-31  0000000000000001 0000000041f988b0 0000000041f98840 000000004a171118
[1274934.746891] sr00-03  00000000066e5800 0000000000000000 0000000000000000 00000000066e5800
[1274934.746891] sr04-07  0000000000000000 0000000000000000 0000000000000000 0000000000000000
[1274934.746891]
[1274934.746891] IASQ: 0000000000000000 0000000000000000 IAOQ: 00000000406760e8 00000000406760ec
[1274934.746891]  IIR: 48780030    ISR: 0000000000000000  IOR: 0000004140000018
[1274934.746891]  CPU:        3   CR30: 00000040e3a9c000 CR31: ffffffffffffffff
[1274934.746891]  ORIG_R28: 0000000040acdd58
[1274934.746891]  IAOQ[0]: sba_unmap_sg+0xb0/0x118
[1274934.746891]  IAOQ[1]: sba_unmap_sg+0xb4/0x118
[1274934.746891]  RP(r2): sba_unmap_sg+0xac/0x118
[1274934.746891] Backtrace:
[1274934.746891]  [&lt;00000000402740cc&gt;] dma_unmap_sg_attrs+0x6c/0x70
[1274934.746891]  [&lt;000000004074d6bc&gt;] scsi_dma_unmap+0x54/0x60
[1274934.746891]  [&lt;00000000407a3488&gt;] mptscsih_io_done+0x150/0xd70
[1274934.746891]  [&lt;0000000040798600&gt;] mpt_interrupt+0x168/0xa68
[1274934.746891]  [&lt;0000000040255a48&gt;] __handle_irq_event_percpu+0xc8/0x278
[1274934.746891]  [&lt;0000000040255c34&gt;] handle_irq_event_percpu+0x3c/0xd8
[1274934.746891]  [&lt;000000004025ecb4&gt;] handle_percpu_irq+0xb4/0xf0
[1274934.746891]  [&lt;00000000402548e0&gt;] generic_handle_irq+0x50/0x70
[1274934.746891]  [&lt;000000004019a254&gt;] call_on_stack+0x18/0x24
[1274934.746891]
[1274934.746891] Kernel panic - not syncing: Bad Address (null pointer deref?)

The bug is caused by overrunning the sglist and incorrectly testing
sg_dma_len(sglist) before nents. Normally this doesn't cause a crash,
but in this case sglist crossed a page boundary. This occurs in the
following code:

	while (sg_dma_len(sglist) &amp;&amp; nents--) {

The fix is simply to test nents first and move the decrement of nents
into the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48795/">CVE-2022-48795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48795">CVE-2022-48795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228027">SUSE bug 1228027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48796" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Fix potential use-after-free during probe

Kasan has reported the following use after free on dev-&gt;iommu.
when a device probe fails and it is in process of freeing dev-&gt;iommu
in dev_iommu_free function, a deferred_probe_work_func runs in parallel
and tries to access dev-&gt;iommu-&gt;fwspec in of_iommu_configure path thus
causing use after free.

BUG: KASAN: use-after-free in of_iommu_configure+0xb4/0x4a4
Read of size 8 at addr ffffff87a2f1acb8 by task kworker/u16:2/153

Workqueue: events_unbound deferred_probe_work_func
Call trace:
 dump_backtrace+0x0/0x33c
 show_stack+0x18/0x24
 dump_stack_lvl+0x16c/0x1e0
 print_address_description+0x84/0x39c
 __kasan_report+0x184/0x308
 kasan_report+0x50/0x78
 __asan_load8+0xc0/0xc4
 of_iommu_configure+0xb4/0x4a4
 of_dma_configure_id+0x2fc/0x4d4
 platform_dma_configure+0x40/0x5c
 really_probe+0x1b4/0xb74
 driver_probe_device+0x11c/0x228
 __device_attach_driver+0x14c/0x304
 bus_for_each_drv+0x124/0x1b0
 __device_attach+0x25c/0x334
 device_initial_probe+0x24/0x34
 bus_probe_device+0x78/0x134
 deferred_probe_work_func+0x130/0x1a8
 process_one_work+0x4c8/0x970
 worker_thread+0x5c8/0xaec
 kthread+0x1f8/0x220
 ret_from_fork+0x10/0x18

Allocated by task 1:
 ____kasan_kmalloc+0xd4/0x114
 __kasan_kmalloc+0x10/0x1c
 kmem_cache_alloc_trace+0xe4/0x3d4
 __iommu_probe_device+0x90/0x394
 probe_iommu_group+0x70/0x9c
 bus_for_each_dev+0x11c/0x19c
 bus_iommu_probe+0xb8/0x7d4
 bus_set_iommu+0xcc/0x13c
 arm_smmu_bus_init+0x44/0x130 [arm_smmu]
 arm_smmu_device_probe+0xb88/0xc54 [arm_smmu]
 platform_drv_probe+0xe4/0x13c
 really_probe+0x2c8/0xb74
 driver_probe_device+0x11c/0x228
 device_driver_attach+0xf0/0x16c
 __driver_attach+0x80/0x320
 bus_for_each_dev+0x11c/0x19c
 driver_attach+0x38/0x48
 bus_add_driver+0x1dc/0x3a4
 driver_register+0x18c/0x244
 __platform_driver_register+0x88/0x9c
 init_module+0x64/0xff4 [arm_smmu]
 do_one_initcall+0x17c/0x2f0
 do_init_module+0xe8/0x378
 load_module+0x3f80/0x4a40
 __se_sys_finit_module+0x1a0/0x1e4
 __arm64_sys_finit_module+0x44/0x58
 el0_svc_common+0x100/0x264
 do_el0_svc+0x38/0xa4
 el0_svc+0x20/0x30
 el0_sync_handler+0x68/0xac
 el0_sync+0x160/0x180

Freed by task 1:
 kasan_set_track+0x4c/0x84
 kasan_set_free_info+0x28/0x4c
 ____kasan_slab_free+0x120/0x15c
 __kasan_slab_free+0x18/0x28
 slab_free_freelist_hook+0x204/0x2fc
 kfree+0xfc/0x3a4
 __iommu_probe_device+0x284/0x394
 probe_iommu_group+0x70/0x9c
 bus_for_each_dev+0x11c/0x19c
 bus_iommu_probe+0xb8/0x7d4
 bus_set_iommu+0xcc/0x13c
 arm_smmu_bus_init+0x44/0x130 [arm_smmu]
 arm_smmu_device_probe+0xb88/0xc54 [arm_smmu]
 platform_drv_probe+0xe4/0x13c
 really_probe+0x2c8/0xb74
 driver_probe_device+0x11c/0x228
 device_driver_attach+0xf0/0x16c
 __driver_attach+0x80/0x320
 bus_for_each_dev+0x11c/0x19c
 driver_attach+0x38/0x48
 bus_add_driver+0x1dc/0x3a4
 driver_register+0x18c/0x244
 __platform_driver_register+0x88/0x9c
 init_module+0x64/0xff4 [arm_smmu]
 do_one_initcall+0x17c/0x2f0
 do_init_module+0xe8/0x378
 load_module+0x3f80/0x4a40
 __se_sys_finit_module+0x1a0/0x1e4
 __arm64_sys_finit_module+0x44/0x58
 el0_svc_common+0x100/0x264
 do_el0_svc+0x38/0xa4
 el0_svc+0x20/0x30
 el0_sync_handler+0x68/0xac
 el0_sync+0x160/0x180

Fix this by setting dev-&gt;iommu to NULL first and
then freeing dev_iommu structure in dev_iommu_free
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48797" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: don't try to NUMA-migrate COW pages that have other uses

Oded Gabbay reports that enabling NUMA balancing causes corruption with
his Gaudi accelerator test load:

 "All the details are in the bug, but the bottom line is that somehow,
  this patch causes corruption when the numa balancing feature is
  enabled AND we don't use process affinity AND we use GUP to pin pages
  so our accelerator can DMA to/from system memory.

  Either disabling numa balancing, using process affinity to bind to
  specific numa-node or reverting this patch causes the bug to
  disappear"

and Oded bisected the issue to commit 09854ba94c6a ("mm: do_wp_page()
simplification").

Now, the NUMA balancing shouldn't actually be changing the writability
of a page, and as such shouldn't matter for COW.  But it appears it
does.  Suspicious.

However, regardless of that, the condition for enabling NUMA faults in
change_pte_range() is nonsensical.  It uses "page_mapcount(page)" to
decide if a COW page should be NUMA-protected or not, and that makes
absolutely no sense.

The number of mappings a page has is irrelevant: not only does GUP get a
reference to a page as in Oded's case, but the other mappings migth be
paged out and the only reference to them would be in the page count.

Since we should never try to NUMA-balance a page that we can't move
anyway due to other references, just fix the code to use 'page_count()'.
Oded confirms that that fixes his issue.

Now, this does imply that something in NUMA balancing ends up changing
page protections (other than the obvious one of making the page
inaccessible to get the NUMA faulting information).  Otherwise the COW
simplification wouldn't matter - since doing the GUP on the page would
make sure it's writable.

The cause of that permission change would be good to figure out too,
since it clearly results in spurious COW events - but fixing the
nonsensical test that just happened to work before is obviously the
CorrectThing(tm) to do regardless.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48798" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cio: verify the driver availability for path_event call

If no driver is attached to a device or the driver does not provide the
path_event function, an FCES path-event on this device could end up in a
kernel-panic. Verify the driver availability before the path_event
function call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48799" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix list corruption in perf_cgroup_switch()

There's list corruption on cgrp_cpuctx_list. This happens on the
following path:

  perf_cgroup_switch: list_for_each_entry(cgrp_cpuctx_list)
      cpu_ctx_sched_in
         ctx_sched_in
            ctx_pinned_sched_in
              merge_sched_in
                  perf_cgroup_event_disable: remove the event from the list

Use list_for_each_entry_safe() to allow removing an entry during
iteration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48800" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: vmscan: remove deadlock due to throttling failing to make progress

A soft lockup bug in kcompactd was reported in a private bugzilla with
the following visible in dmesg;

  watchdog: BUG: soft lockup - CPU#33 stuck for 26s! [kcompactd0:479]
  watchdog: BUG: soft lockup - CPU#33 stuck for 52s! [kcompactd0:479]
  watchdog: BUG: soft lockup - CPU#33 stuck for 78s! [kcompactd0:479]
  watchdog: BUG: soft lockup - CPU#33 stuck for 104s! [kcompactd0:479]

The machine had 256G of RAM with no swap and an earlier failed
allocation indicated that node 0 where kcompactd was run was potentially
unreclaimable;

  Node 0 active_anon:29355112kB inactive_anon:2913528kB active_file:0kB
    inactive_file:0kB unevictable:64kB isolated(anon):0kB isolated(file):0kB
    mapped:8kB dirty:0kB writeback:0kB shmem:26780kB shmem_thp:
    0kB shmem_pmdmapped: 0kB anon_thp: 23480320kB writeback_tmp:0kB
    kernel_stack:2272kB pagetables:24500kB all_unreclaimable? yes

Vlastimil Babka investigated a crash dump and found that a task
migrating pages was trying to drain PCP lists;

  PID: 52922  TASK: ffff969f820e5000  CPU: 19  COMMAND: "kworker/u128:3"
  Call Trace:
     __schedule
     schedule
     schedule_timeout
     wait_for_completion
     __flush_work
     __drain_all_pages
     __alloc_pages_slowpath.constprop.114
     __alloc_pages
     alloc_migration_target
     migrate_pages
     migrate_to_node
     do_migrate_pages
     cpuset_migrate_mm_workfn
     process_one_work
     worker_thread
     kthread
     ret_from_fork

This failure is specific to CONFIG_PREEMPT=n builds.  The root of the
problem is that kcompact0 is not rescheduling on a CPU while a task that
has isolated a large number of the pages from the LRU is waiting on
kcompact0 to reschedule so the pages can be released.  While
shrink_inactive_list() only loops once around too_many_isolated, reclaim
can continue without rescheduling if sc-&gt;skipped_deactivate == 1 which
could happen if there was no file LRU and the inactive anon list was not
low.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48801" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL

If we fail to copy the just created file descriptor to userland, we
try to clean up by putting back 'fd' and freeing 'ib'. The code uses
put_unused_fd() for the former which is wrong, as the file descriptor
was already published by fd_install() which gets called internally by
anon_inode_getfd().

This makes the error handling code leaving a half cleaned up file
descriptor table around and a partially destructed 'file' object,
allowing userland to play use-after-free tricks on us, by abusing
the still usable fd and making the code operate on a dangling
'file-&gt;private_data' pointer.

Instead of leaving the kernel in a partially corrupted state, don't
attempt to explicitly clean up and leave this to the process exit
path that'll release any still valid fds, including the one created
by the previous call to anon_inode_getfd(). Simply return -EFAULT to
indicate the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228023">SUSE bug 1228023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48802" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: task_mmu.c: don't read mapcount for migration entry

The syzbot reported the below BUG:

  kernel BUG at include/linux/page-flags.h:785!
  invalid opcode: 0000 [#1] PREEMPT SMP KASAN
  CPU: 1 PID: 4392 Comm: syz-executor560 Not tainted 5.16.0-rc6-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:PageDoubleMap include/linux/page-flags.h:785 [inline]
  RIP: 0010:__page_mapcount+0x2d2/0x350 mm/util.c:744
  Call Trace:
    page_mapcount include/linux/mm.h:837 [inline]
    smaps_account+0x470/0xb10 fs/proc/task_mmu.c:466
    smaps_pte_entry fs/proc/task_mmu.c:538 [inline]
    smaps_pte_range+0x611/0x1250 fs/proc/task_mmu.c:601
    walk_pmd_range mm/pagewalk.c:128 [inline]
    walk_pud_range mm/pagewalk.c:205 [inline]
    walk_p4d_range mm/pagewalk.c:240 [inline]
    walk_pgd_range mm/pagewalk.c:277 [inline]
    __walk_page_range+0xe23/0x1ea0 mm/pagewalk.c:379
    walk_page_vma+0x277/0x350 mm/pagewalk.c:530
    smap_gather_stats.part.0+0x148/0x260 fs/proc/task_mmu.c:768
    smap_gather_stats fs/proc/task_mmu.c:741 [inline]
    show_smap+0xc6/0x440 fs/proc/task_mmu.c:822
    seq_read_iter+0xbb0/0x1240 fs/seq_file.c:272
    seq_read+0x3e0/0x5b0 fs/seq_file.c:162
    vfs_read+0x1b5/0x600 fs/read_write.c:479
    ksys_read+0x12d/0x250 fs/read_write.c:619
    do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    entry_SYSCALL_64_after_hwframe+0x44/0xae

The reproducer was trying to read /proc/$PID/smaps when calling
MADV_FREE at the mean time.  MADV_FREE may split THPs if it is called
for partial THP.  It may trigger the below race:

           CPU A                         CPU B
           -----                         -----
  smaps walk:                      MADV_FREE:
  page_mapcount()
    PageCompound()
                                   split_huge_page()
    page = compound_head(page)
    PageDoubleMap(page)

When calling PageDoubleMap() this page is not a tail page of THP anymore
so the BUG is triggered.

This could be fixed by elevated refcount of the page before calling
mapcount, but that would prevent it from counting migration entries, and
it seems overkilling because the race just could happen when PMD is
split so all PTE entries of tail pages are actually migration entries,
and smaps_account() does treat migration entries as mapcount == 1 as
Kirill pointed out.

Add a new parameter for smaps_account() to tell this entry is migration
entry then skip calling page_mapcount().  Don't skip getting mapcount
for device private entries since they do track references with mapcount.

Pagemap also has the similar issue although it was not reported.  Fixed
it as well.

[shy828301@gmail.com: v4]
  Link: https://lkml.kernel.org/r/20220203182641.824731-1-shy828301@gmail.com
[nathan@kernel.org: avoid unused variable warning in pagemap_pmd_range()]
  Link: https://lkml.kernel.org/r/20220207171049.1102239-1-nathan@kernel.org
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48803" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: ti: Fix missing sentinel for clk_div_table

_get_table_maxdiv() tries to access "clk_div_table" array out of bound
defined in phy-j721e-wiz.c. Add a sentinel entry to prevent
the following global-out-of-bounds error reported by enabling KASAN.

[    9.552392] BUG: KASAN: global-out-of-bounds in _get_maxdiv+0xc0/0x148
[    9.558948] Read of size 4 at addr ffff8000095b25a4 by task kworker/u4:1/38
[    9.565926]
[    9.567441] CPU: 1 PID: 38 Comm: kworker/u4:1 Not tainted 5.16.0-116492-gdaadb3bd0e8d-dirty #360
[    9.576242] Hardware name: Texas Instruments J721e EVM (DT)
[    9.581832] Workqueue: events_unbound deferred_probe_work_func
[    9.587708] Call trace:
[    9.590174]  dump_backtrace+0x20c/0x218
[    9.594038]  show_stack+0x18/0x68
[    9.597375]  dump_stack_lvl+0x9c/0xd8
[    9.601062]  print_address_description.constprop.0+0x78/0x334
[    9.606830]  kasan_report+0x1f0/0x260
[    9.610517]  __asan_load4+0x9c/0xd8
[    9.614030]  _get_maxdiv+0xc0/0x148
[    9.617540]  divider_determine_rate+0x88/0x488
[    9.622005]  divider_round_rate_parent+0xc8/0x124
[    9.626729]  wiz_clk_div_round_rate+0x54/0x68
[    9.631113]  clk_core_determine_round_nolock+0x124/0x158
[    9.636448]  clk_core_round_rate_nolock+0x68/0x138
[    9.641260]  clk_core_set_rate_nolock+0x268/0x3a8
[    9.645987]  clk_set_rate+0x50/0xa8
[    9.649499]  cdns_sierra_phy_init+0x88/0x248
[    9.653794]  phy_init+0x98/0x108
[    9.657046]  cdns_pcie_enable_phy+0xa0/0x170
[    9.661340]  cdns_pcie_init_phy+0x250/0x2b0
[    9.665546]  j721e_pcie_probe+0x4b8/0x798
[    9.669579]  platform_probe+0x8c/0x108
[    9.673350]  really_probe+0x114/0x630
[    9.677037]  __driver_probe_device+0x18c/0x220
[    9.681505]  driver_probe_device+0xac/0x150
[    9.685712]  __device_attach_driver+0xec/0x170
[    9.690178]  bus_for_each_drv+0xf0/0x158
[    9.694124]  __device_attach+0x184/0x210
[    9.698070]  device_initial_probe+0x14/0x20
[    9.702277]  bus_probe_device+0xec/0x100
[    9.706223]  deferred_probe_work_func+0x124/0x180
[    9.710951]  process_one_work+0x4b0/0xbc0
[    9.714983]  worker_thread+0x74/0x5d0
[    9.718668]  kthread+0x214/0x230
[    9.721919]  ret_from_fork+0x10/0x20
[    9.725520]
[    9.727032] The buggy address belongs to the variable:
[    9.732183]  clk_div_table+0x24/0x440
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48804" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt_ioctl: fix array_index_nospec in vt_setactivate

array_index_nospec ensures that an out-of-bounds value is set to zero
on the transient path. Decreasing the value by one afterwards causes
a transient integer underflow. vsa.console should be decreased first
and then sanitized with array_index_nospec.

Kasper Acknowledgements: Jakob Koschel, Brian Johannesmeyer, Kaveh
Razavi, Herbert Bos, Cristiano Giuffrida from the VUSec group at VU
Amsterdam.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48806" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX

Commit effa453168a7 ("i2c: i801: Don't silently correct invalid transfer
size") revealed that ee1004_eeprom_read() did not properly limit how
many bytes to read at once.

In particular, i2c_smbus_read_i2c_block_data_or_emulated() takes the
length to read as an u8.  If count == 256 after taking into account the
offset and page boundary, the cast to u8 overflows.  And this is common
when user space tries to read the entire EEPROM at once.

To fix it, limit each read to I2C_SMBUS_BLOCK_MAX (32) bytes, already
the maximum length i2c_smbus_read_i2c_block_data_or_emulated() allows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48807" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler

Currently, the same handler is called for both a NETDEV_BONDING_INFO
LAG unlink notification as for a NETDEV_UNREGISTER call.  This is
causing a problem though, since the netdev_notifier_info passed has
a different structure depending on which event is passed.  The problem
manifests as a call trace from a BUG: KASAN stack-out-of-bounds error.

Fix this by creating a handler specific to NETDEV_UNREGISTER that only
is passed valid elements in the netdev_notifier_info struct for the
NETDEV_UNREGISTER event.

Also included is the removal of an unbalanced dev_put on the peer_netdev
and related braces.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228024">SUSE bug 1228024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48808" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48808" ref_url="https://www.suse.com/security/cve/CVE-2022-48808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: fix panic when DSA master device unbinds on shutdown

Rafael reports that on a system with LX2160A and Marvell DSA switches,
if a reboot occurs while the DSA master (dpaa2-eth) is up, the following
panic can be seen:

systemd-shutdown[1]: Rebooting.
Unable to handle kernel paging request at virtual address 00a0000800000041
[00a0000800000041] address between user and kernel address ranges
Internal error: Oops: 96000004 [#1] PREEMPT SMP
CPU: 6 PID: 1 Comm: systemd-shutdow Not tainted 5.16.5-00042-g8f5585009b24 #32
pc : dsa_slave_netdevice_event+0x130/0x3e4
lr : raw_notifier_call_chain+0x50/0x6c
Call trace:
 dsa_slave_netdevice_event+0x130/0x3e4
 raw_notifier_call_chain+0x50/0x6c
 call_netdevice_notifiers_info+0x54/0xa0
 __dev_close_many+0x50/0x130
 dev_close_many+0x84/0x120
 unregister_netdevice_many+0x130/0x710
 unregister_netdevice_queue+0x8c/0xd0
 unregister_netdev+0x20/0x30
 dpaa2_eth_remove+0x68/0x190
 fsl_mc_driver_remove+0x20/0x5c
 __device_release_driver+0x21c/0x220
 device_release_driver_internal+0xac/0xb0
 device_links_unbind_consumers+0xd4/0x100
 __device_release_driver+0x94/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_device_remove+0x24/0x40
 __fsl_mc_device_remove+0xc/0x20
 device_for_each_child+0x58/0xa0
 dprc_remove+0x90/0xb0
 fsl_mc_driver_remove+0x20/0x5c
 __device_release_driver+0x21c/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_bus_remove+0x80/0x100
 fsl_mc_bus_shutdown+0xc/0x1c
 platform_shutdown+0x20/0x30
 device_shutdown+0x154/0x330
 __do_sys_reboot+0x1cc/0x250
 __arm64_sys_reboot+0x20/0x30
 invoke_syscall.constprop.0+0x4c/0xe0
 do_el0_svc+0x4c/0x150
 el0_svc+0x24/0xb0
 el0t_64_sync_handler+0xa8/0xb0
 el0t_64_sync+0x178/0x17c

It can be seen from the stack trace that the problem is that the
deregistration of the master causes a dev_close(), which gets notified
as NETDEV_GOING_DOWN to dsa_slave_netdevice_event().
But dsa_switch_shutdown() has already run, and this has unregistered the
DSA slave interfaces, and yet, the NETDEV_GOING_DOWN handler attempts to
call dev_close_many() on those slave interfaces, leading to the problem.

The previous attempt to avoid the NETDEV_GOING_DOWN on the master after
dsa_switch_shutdown() was called seems improper. Unregistering the slave
interfaces is unnecessary and unhelpful. Instead, after the slaves have
stopped being uppers of the DSA master, we can now reset to NULL the
master-&gt;dsa_ptr pointer, which will make DSA start ignoring all future
notifier events on the master.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48808/">CVE-2022-48808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48808">CVE-2022-48808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227958">SUSE bug 1227958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48809" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48809" ref_url="https://www.suse.com/security/cve/CVE-2022-48809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix a memleak when uncloning an skb dst and its metadata

When uncloning an skb dst and its associated metadata, a new
dst+metadata is allocated and later replaces the old one in the skb.
This is helpful to have a non-shared dst+metadata attached to a specific
skb.

The issue is the uncloned dst+metadata is initialized with a refcount of
1, which is increased to 2 before attaching it to the skb. When
tun_dst_unclone returns, the dst+metadata is only referenced from a
single place (the skb) while its refcount is 2. Its refcount will never
drop to 0 (when the skb is consumed), leading to a memory leak.

Fix this by removing the call to dst_hold in tun_dst_unclone, as the
dst+metadata refcount is already 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48809/">CVE-2022-48809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48809">CVE-2022-48809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227947">SUSE bug 1227947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48810" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48810" ref_url="https://www.suse.com/security/cve/CVE-2022-48810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path

ip[6]mr_free_table() can only be called under RTNL lock.

RTNL: assertion failed at net/core/dev.c (10367)
WARNING: CPU: 1 PID: 5890 at net/core/dev.c:10367 unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367
Modules linked in:
CPU: 1 PID: 5890 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller-11627-g422ee58dc0ef #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:unregister_netdevice_many+0x1246/0x1850 net/core/dev.c:10367
Code: 0f 85 9b ee ff ff e8 69 07 4b fa ba 7f 28 00 00 48 c7 c6 00 90 ae 8a 48 c7 c7 40 90 ae 8a c6 05 6d b1 51 06 01 e8 8c 90 d8 01 &lt;0f&gt; 0b e9 70 ee ff ff e8 3e 07 4b fa 4c 89 e7 e8 86 2a 59 fa e9 ee
RSP: 0018:ffffc900046ff6e0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff888050f51d00 RSI: ffffffff815fa008 RDI: fffff520008dfece
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815f3d6e R11: 0000000000000000 R12: 00000000fffffff4
R13: dffffc0000000000 R14: ffffc900046ff750 R15: ffff88807b7dc000
FS:  00007f4ab736e700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fee0b4f8990 CR3: 000000001e7d2000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 mroute_clean_tables+0x244/0xb40 net/ipv6/ip6mr.c:1509
 ip6mr_free_table net/ipv6/ip6mr.c:389 [inline]
 ip6mr_rules_init net/ipv6/ip6mr.c:246 [inline]
 ip6mr_net_init net/ipv6/ip6mr.c:1306 [inline]
 ip6mr_net_init+0x3f0/0x4e0 net/ipv6/ip6mr.c:1298
 ops_init+0xaf/0x470 net/core/net_namespace.c:140
 setup_net+0x54f/0xbb0 net/core/net_namespace.c:331
 copy_net_ns+0x318/0x760 net/core/net_namespace.c:475
 create_new_namespaces+0x3f6/0xb20 kernel/nsproxy.c:110
 copy_namespaces+0x391/0x450 kernel/nsproxy.c:178
 copy_process+0x2e0c/0x7300 kernel/fork.c:2167
 kernel_clone+0xe7/0xab0 kernel/fork.c:2555
 __do_sys_clone+0xc8/0x110 kernel/fork.c:2672
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f4ab89f9059
Code: Unable to access opcode bytes at RIP 0x7f4ab89f902f.
RSP: 002b:00007f4ab736e118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007f4ab8b0bf60 RCX: 00007f4ab89f9059
RDX: 0000000020000280 RSI: 0000000020000270 RDI: 0000000040200000
RBP: 00007f4ab8a5308d R08: 0000000020000300 R09: 0000000020000300
R10: 00000000200002c0 R11: 0000000000000206 R12: 0000000000000000
R13: 00007ffc3977cc1f R14: 00007f4ab736e300 R15: 0000000000022000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48810/">CVE-2022-48810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48810">CVE-2022-48810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227936">SUSE bug 1227936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48811" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: don't release napi in __ibmvnic_open()

If __ibmvnic_open() encounters an error such as when setting link state,
it calls release_resources() which frees the napi structures needlessly.
Instead, have __ibmvnic_open() only clean up the work it did so far (i.e.
disable napi and irqs) and leave the rest to the callers.

If caller of __ibmvnic_open() is ibmvnic_open(), it should release the
resources immediately. If the caller is do_reset() or do_hard_reset(),
they will release the resources on the next reset.

This fixes following crash that occurred when running the drmgr command
several times to add/remove a vnic interface:

	[102056] ibmvnic 30000003 env3: Disabling rx_scrq[6] irq
	[102056] ibmvnic 30000003 env3: Disabling rx_scrq[7] irq
	[102056] ibmvnic 30000003 env3: Replenished 8 pools
	Kernel attempted to read user page (10) - exploit attempt? (uid: 0)
	BUG: Kernel NULL pointer dereference on read at 0x00000010
	Faulting instruction address: 0xc000000000a3c840
	Oops: Kernel access of bad area, sig: 11 [#1]
	LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
	...
	CPU: 9 PID: 102056 Comm: kworker/9:2 Kdump: loaded Not tainted 5.16.0-rc5-autotest-g6441998e2e37 #1
	Workqueue: events_long __ibmvnic_reset [ibmvnic]
	NIP:  c000000000a3c840 LR: c0080000029b5378 CTR: c000000000a3c820
	REGS: c0000000548e37e0 TRAP: 0300   Not tainted  (5.16.0-rc5-autotest-g6441998e2e37)
	MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 28248484  XER: 00000004
	CFAR: c0080000029bdd24 DAR: 0000000000000010 DSISR: 40000000 IRQMASK: 0
	GPR00: c0080000029b55d0 c0000000548e3a80 c0000000028f0200 0000000000000000
	...
	NIP [c000000000a3c840] napi_enable+0x20/0xc0
	LR [c0080000029b5378] __ibmvnic_open+0xf0/0x430 [ibmvnic]
	Call Trace:
	[c0000000548e3a80] [0000000000000006] 0x6 (unreliable)
	[c0000000548e3ab0] [c0080000029b55d0] __ibmvnic_open+0x348/0x430 [ibmvnic]
	[c0000000548e3b40] [c0080000029bcc28] __ibmvnic_reset+0x500/0xdf0 [ibmvnic]
	[c0000000548e3c60] [c000000000176228] process_one_work+0x288/0x570
	[c0000000548e3d00] [c000000000176588] worker_thread+0x78/0x660
	[c0000000548e3da0] [c0000000001822f0] kthread+0x1c0/0x1d0
	[c0000000548e3e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64
	Instruction dump:
	7d2948f8 792307e0 4e800020 60000000 3c4c01eb 384239e0 f821ffd1 39430010
	38a0fff6 e92d1100 f9210028 39200000 &lt;e9030010&gt; f9010020 60420000 e9210020
	---[ end trace 5f8033b08fd27706 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48812" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: lantiq_gswip: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The GSWIP switch is a platform device, so the initial set of constraints
that I thought would cause this (I2C or SPI buses which call -&gt;remove on
-&gt;shutdown) do not apply. But there is one more which applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the GSWIP switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The gswip driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48813" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: felix: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The Felix VSC9959 switch is a PCI device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
-&gt;remove on -&gt;shutdown) do not apply. But there is one more which
applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the felix switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The felix driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc_size() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48814" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: seville: register the mdiobus under devres

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The Seville VSC9959 switch is a platform device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
-&gt;remove on -&gt;shutdown) do not apply. But there is one more which
applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the seville switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The seville driver has a code structure that could accommodate both the
mdiobus_unregister and mdiobus_free calls, but it has an external
dependency upon mscc_miim_setup() from mdio-mscc-miim.c, which calls
devm_mdiobus_alloc_size() on its behalf. So rather than restructuring
that, and exporting yet one more symbol mscc_miim_teardown(), let's work
with devres and replace of_mdiobus_register with the devres variant.
When we use all-devres, we can ensure that devres doesn't free a
still-registered bus (it either runs both callbacks, or none).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48815" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: bcm_sf2: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The Starfighter 2 is a platform device, so the initial set of
constraints that I thought would cause this (I2C or SPI buses which call
-&gt;remove on -&gt;shutdown) do not apply. But there is one more which
applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the bcm_sf2 switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The bcm_sf2 driver has the code structure in place for orderly mdiobus
removal, so just replace devm_mdiobus_alloc() with the non-devres
variant, and add manual free where necessary, to ensure that we don't
let devres free a still-registered bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: lock against -&gt;sock changing during sysfs read

-&gt;sock can be set to NULL asynchronously unless -&gt;recv_mutex is held.
So it is important to hold that mutex.  Otherwise a sysfs read can
trigger an oops.
Commit 17f09d3f619a ("SUNRPC: Check if the xprt is connected before
handling sysfs reads") appears to attempt to fix this problem, but it
only narrows the race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48817" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: ar9331: register the mdiobus under devres

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The ar9331 is an MDIO device, so the initial set of constraints that I
thought would cause this (I2C or SPI buses which call -&gt;remove on
-&gt;shutdown) do not apply. But there is one more which applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the ar9331 switch driver on shutdown.

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The ar9331 driver doesn't have a complex code structure for mdiobus
removal, so just replace of_mdiobus_register with the devres variant in
order to be all-devres and ensure that we don't free a still-registered
bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48818" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: don't use devres for mdiobus

As explained in commits:
74b6d7d13307 ("net: dsa: realtek: register the MDIO bus under devres")
5135e96a3dd2 ("net: dsa: don't allocate the slave_mii_bus using devres")

mdiobus_free() will panic when called from devm_mdiobus_free() &lt;-
devres_release_all() &lt;- __device_release_driver(), and that mdiobus was
not previously unregistered.

The mv88e6xxx is an MDIO device, so the initial set of constraints that
I thought would cause this (I2C or SPI buses which call -&gt;remove on
-&gt;shutdown) do not apply. But there is one more which applies here.

If the DSA master itself is on a bus that calls -&gt;remove from -&gt;shutdown
(like dpaa2-eth, which is on the fsl-mc bus), there is a device link
between the switch and the DSA master, and device_links_unbind_consumers()
will unbind the Marvell switch driver on shutdown.

systemd-shutdown[1]: Powering off.
mv88e6085 0x0000000008b96000:00 sw_gl0: Link is Down
fsl-mc dpbp.9: Removing from iommu group 7
fsl-mc dpbp.8: Removing from iommu group 7
------------[ cut here ]------------
kernel BUG at drivers/net/phy/mdio_bus.c:677!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 1 Comm: systemd-shutdow Not tainted 5.16.5-00040-gdc05f73788e5 #15
pc : mdiobus_free+0x44/0x50
lr : devm_mdiobus_free+0x10/0x20
Call trace:
 mdiobus_free+0x44/0x50
 devm_mdiobus_free+0x10/0x20
 devres_release_all+0xa0/0x100
 __device_release_driver+0x190/0x220
 device_release_driver_internal+0xac/0xb0
 device_links_unbind_consumers+0xd4/0x100
 __device_release_driver+0x4c/0x220
 device_release_driver_internal+0xac/0xb0
 device_links_unbind_consumers+0xd4/0x100
 __device_release_driver+0x94/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_device_remove+0x24/0x40
 __fsl_mc_device_remove+0xc/0x20
 device_for_each_child+0x58/0xa0
 dprc_remove+0x90/0xb0
 fsl_mc_driver_remove+0x20/0x5c
 __device_release_driver+0x21c/0x220
 device_release_driver+0x28/0x40
 bus_remove_device+0x118/0x124
 device_del+0x174/0x420
 fsl_mc_bus_remove+0x80/0x100
 fsl_mc_bus_shutdown+0xc/0x1c
 platform_shutdown+0x20/0x30
 device_shutdown+0x154/0x330
 kernel_power_off+0x34/0x6c
 __do_sys_reboot+0x15c/0x250
 __arm64_sys_reboot+0x20/0x30
 invoke_syscall.constprop.0+0x4c/0xe0
 do_el0_svc+0x4c/0x150
 el0_svc+0x24/0xb0
 el0t_64_sync_handler+0xa8/0xb0
 el0t_64_sync+0x178/0x17c

So the same treatment must be applied to all DSA switch drivers, which
is: either use devres for both the mdiobus allocation and registration,
or don't use devres at all.

The Marvell driver already has a good structure for mdiobus removal, so
just plug in mdiobus_free and get rid of devres.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48819" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48819" ref_url="https://www.suse.com/security/cve/CVE-2022-48819" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case

syzbot found that mixing sendpage() and sendmsg(MSG_ZEROCOPY)
calls over the same TCP socket would again trigger the
infamous warning in inet_sock_destruct()

	WARN_ON(sk_forward_alloc_get(sk));

While Talal took into account a mix of regular copied data
and MSG_ZEROCOPY one in the same skb, the sendpage() path
has been forgotten.

We want the charging to happen for sendpage(), because
pages could be coming from a pipe. What is missing is the
downgrading of pure zerocopy status to make sure
sk_forward_alloc will stay synced.

Add tcp_downgrade_zcopy_pure() helper so that we can
use it from the two callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48819/">CVE-2022-48819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48819">CVE-2022-48819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227934">SUSE bug 1227934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48820" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()

This error path needs to decrement "usbphyc-&gt;n_pll_cons.counter" before
returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48821" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: avoid double fput() on failed usercopy

If the copy back to userland fails for the FASTRPC_IOCTL_ALLOC_DMA_BUFF
ioctl(), we shouldn't assume that 'buf-&gt;dmabuf' is still valid. In fact,
dma_buf_fd() called fd_install() before, i.e. "consumed" one reference,
leaving us with none.

Calling dma_buf_put() will therefore put a reference we no longer own,
leading to a valid file descritor table entry for an already released
'file' object which is a straight use-after-free.

Simply avoid calling dma_buf_put() and rely on the process exit code to
do the necessary cleanup, if needed, i.e. if the file descriptor is
still valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228022">SUSE bug 1228022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: f_fs: Fix use-after-free for epfile

Consider a case where ffs_func_eps_disable is called from
ffs_func_disable as part of composition switch and at the
same time ffs_epfile_release get called from userspace.
ffs_epfile_release will free up the read buffer and call
ffs_data_closed which in turn destroys ffs-&gt;epfiles and
mark it as NULL. While this was happening the driver has
already initialized the local epfile in ffs_func_eps_disable
which is now freed and waiting to acquire the spinlock. Once
spinlock is acquired the driver proceeds with the stale value
of epfile and tries to free the already freed read buffer
causing use-after-free.

Following is the illustration of the race:

      CPU1                                  CPU2

   ffs_func_eps_disable
   epfiles (local copy)
					ffs_epfile_release
					ffs_data_closed
					if (last file closed)
					ffs_data_reset
					ffs_data_clear
					ffs_epfiles_destroy
spin_lock
dereference epfiles

Fix this races by taking epfiles local copy &amp; assigning it under
spinlock and if epfiles(local) is null then update it in ffs-&gt;epfiles
then finally destroy it.
Extending the scope further from the race, protecting the ep related
structures, and concurrent accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-10-12"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228136">SUSE bug 1228136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix refcount issue when LOGO is received during TMF

Hung task call trace was seen during LOGO processing.

[  974.309060] [0000:00:00.0]:[qedf_eh_device_reset:868]: 1:0:2:0: LUN RESET Issued...
[  974.309065] [0000:00:00.0]:[qedf_initiate_tmf:2422]: tm_flags 0x10 sc_cmd 00000000c16b930f op = 0x2a target_id = 0x2 lun=0
[  974.309178] [0000:00:00.0]:[qedf_initiate_tmf:2431]: portid=016900 tm_flags =LUN RESET
[  974.309222] [0000:00:00.0]:[qedf_initiate_tmf:2438]: orig io_req = 00000000ec78df8f xid = 0x180 ref_cnt = 1.
[  974.309625] host1: rport 016900: Received LOGO request while in state Ready
[  974.309627] host1: rport 016900: Delete port
[  974.309642] host1: rport 016900: work event 3
[  974.309644] host1: rport 016900: lld callback ev 3
[  974.313243] [0000:61:00.2]:[qedf_execute_tmf:2383]:1: fcport is uploading, not executing flush.
[  974.313295] [0000:61:00.2]:[qedf_execute_tmf:2400]:1: task mgmt command success...
[  984.031088] INFO: task jbd2/dm-15-8:7645 blocked for more than 120 seconds.
[  984.031136]       Not tainted 4.18.0-305.el8.x86_64 #1

[  984.031166] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  984.031209] jbd2/dm-15-8    D    0  7645      2 0x80004080
[  984.031212] Call Trace:
[  984.031222]  __schedule+0x2c4/0x700
[  984.031230]  ? unfreeze_partials.isra.83+0x16e/0x1a0
[  984.031233]  ? bit_wait_timeout+0x90/0x90
[  984.031235]  schedule+0x38/0xa0
[  984.031238]  io_schedule+0x12/0x40
[  984.031240]  bit_wait_io+0xd/0x50
[  984.031243]  __wait_on_bit+0x6c/0x80
[  984.031248]  ? free_buffer_head+0x21/0x50
[  984.031251]  out_of_line_wait_on_bit+0x91/0xb0
[  984.031257]  ? init_wait_var_entry+0x50/0x50
[  984.031268]  jbd2_journal_commit_transaction+0x112e/0x19f0 [jbd2]
[  984.031280]  kjournald2+0xbd/0x270 [jbd2]
[  984.031284]  ? finish_wait+0x80/0x80
[  984.031291]  ? commit_timeout+0x10/0x10 [jbd2]
[  984.031294]  kthread+0x116/0x130
[  984.031300]  ? kthread_flush_work_fn+0x10/0x10
[  984.031305]  ret_from_fork+0x1f/0x40

There was a ref count issue when LOGO is received during TMF. This leads to
one of the I/Os hanging with the driver. Fix the ref count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: myrs: Fix crash in error case

In myrs_detect(), cs-&gt;disable_intr is NULL when privdata-&gt;hw_init() fails
with non-zero. In this case, myrs_cleanup(cs) will call a NULL ptr and
crash the kernel.

[    1.105606] myrs 0000:00:03.0: Unknown Initialization Error 5A
[    1.105872] myrs 0000:00:03.0: Failed to initialize Controller
[    1.106082] BUG: kernel NULL pointer dereference, address: 0000000000000000
[    1.110774] Call Trace:
[    1.110950]  myrs_cleanup+0xe4/0x150 [myrs]
[    1.111135]  myrs_probe.cold+0x91/0x56a [myrs]
[    1.111302]  ? DAC960_GEM_intr_handler+0x1f0/0x1f0 [myrs]
[    1.111500]  local_pci_probe+0x48/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Add stag_work to all the vports

Call trace seen when creating NPIV ports, only 32 out of 64 show online.
stag work was not initialized for vport, hence initialize the stag work.

WARNING: CPU: 8 PID: 645 at kernel/workqueue.c:1635 __queue_delayed_work+0x68/0x80
CPU: 8 PID: 645 Comm: kworker/8:1 Kdump: loaded Tainted: G IOE    --------- --
 4.18.0-348.el8.x86_64 #1
Hardware name: Dell Inc. PowerEdge MX740c/0177V9, BIOS 2.12.2 07/09/2021
Workqueue: events fc_lport_timeout [libfc]
RIP: 0010:__queue_delayed_work+0x68/0x80
Code: 89 b2 88 00 00 00 44 89 82 90 00 00 00 48 01 c8 48 89 42 50 41 81
f8 00 20 00 00 75 1d e9 60 24 07 00 44 89 c7 e9 98 f6 ff ff &lt;0f&gt; 0b eb
c5 0f 0b eb a1 0f 0b eb a7 0f 0b eb ac 44 89 c6 e9 40 23
RSP: 0018:ffffae514bc3be40 EFLAGS: 00010006
RAX: ffff8d25d6143750 RBX: 0000000000000202 RCX: 0000000000000002
RDX: ffff8d2e31383748 RSI: ffff8d25c000d600 RDI: ffff8d2e31383788
RBP: ffff8d2e31380de0 R08: 0000000000002000 R09: ffff8d2e31383750
R10: ffffffffc0c957e0 R11: ffff8d2624800000 R12: ffff8d2e31380a58
R13: ffff8d2d915eb000 R14: ffff8d25c499b5c0 R15: ffff8d2e31380e18
FS:  0000000000000000(0000) GS:ffff8d2d1fb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055fd0484b8b8 CR3: 00000008ffc10006 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
  queue_delayed_work_on+0x36/0x40
  qedf_elsct_send+0x57/0x60 [qedf]
  fc_lport_enter_flogi+0x90/0xc0 [libfc]
  fc_lport_timeout+0xb7/0x140 [libfc]
  process_one_work+0x1a7/0x360
  ? create_worker+0x1a0/0x1a0
  worker_thread+0x30/0x390
  ? create_worker+0x1a0/0x1a0
  kthread+0x116/0x130
  ? kthread_flush_work_fn+0x10/0x10
  ret_from_fork+0x35/0x40
 ---[ end trace 008f00f722f2c2ff ]--

Initialize stag work for all the vports.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Fix deadlock on DSI device attach error

DSI device attach to DSI host will be done with host device's lock
held.

Un-registering host in "device attach" error path (ex: probe retry)
will result in deadlock with below call trace and non operational
DSI display.

Startup Call trace:
[   35.043036]  rt_mutex_slowlock.constprop.21+0x184/0x1b8
[   35.043048]  mutex_lock_nested+0x7c/0xc8
[   35.043060]  device_del+0x4c/0x3e8
[   35.043075]  device_unregister+0x20/0x40
[   35.043082]  mipi_dsi_remove_device_fn+0x18/0x28
[   35.043093]  device_for_each_child+0x68/0xb0
[   35.043105]  mipi_dsi_host_unregister+0x40/0x90
[   35.043115]  vc4_dsi_host_attach+0xf0/0x120 [vc4]
[   35.043199]  mipi_dsi_attach+0x30/0x48
[   35.043209]  tc358762_probe+0x128/0x164 [tc358762]
[   35.043225]  mipi_dsi_drv_probe+0x28/0x38
[   35.043234]  really_probe+0xc0/0x318
[   35.043244]  __driver_probe_device+0x80/0xe8
[   35.043254]  driver_probe_device+0xb8/0x118
[   35.043263]  __device_attach_driver+0x98/0xe8
[   35.043273]  bus_for_each_drv+0x84/0xd8
[   35.043281]  __device_attach+0xf0/0x150
[   35.043290]  device_initial_probe+0x1c/0x28
[   35.043300]  bus_probe_device+0xa4/0xb0
[   35.043308]  deferred_probe_work_func+0xa0/0xe0
[   35.043318]  process_one_work+0x254/0x700
[   35.043330]  worker_thread+0x4c/0x448
[   35.043339]  kthread+0x19c/0x1a8
[   35.043348]  ret_from_fork+0x10/0x20

Shutdown Call trace:
[  365.565417] Call trace:
[  365.565423]  __switch_to+0x148/0x200
[  365.565452]  __schedule+0x340/0x9c8
[  365.565467]  schedule+0x48/0x110
[  365.565479]  schedule_timeout+0x3b0/0x448
[  365.565496]  wait_for_completion+0xac/0x138
[  365.565509]  __flush_work+0x218/0x4e0
[  365.565523]  flush_work+0x1c/0x28
[  365.565536]  wait_for_device_probe+0x68/0x158
[  365.565550]  device_shutdown+0x24/0x348
[  365.565561]  kernel_restart_prepare+0x40/0x50
[  365.565578]  kernel_restart+0x20/0x70
[  365.565591]  __do_sys_reboot+0x10c/0x220
[  365.565605]  __arm64_sys_reboot+0x2c/0x38
[  365.565619]  invoke_syscall+0x4c/0x110
[  365.565634]  el0_svc_common.constprop.3+0xfc/0x120
[  365.565648]  do_el0_svc+0x2c/0x90
[  365.565661]  el0_svc+0x4c/0xf0
[  365.565671]  el0t_64_sync_handler+0x90/0xb8
[  365.565682]  el0t_64_sync+0x180/0x184
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix the behavior of READ near OFFSET_MAX

Dan Aloni reports:
&gt; Due to commit 8cfb9015280d ("NFS: Always provide aligned buffers to
&gt; the RPC read layers") on the client, a read of 0xfff is aligned up
&gt; to server rsize of 0x1000.
&gt;
&gt; As a result, in a test where the server has a file of size
&gt; 0x7fffffffffffffff, and the client tries to read from the offset
&gt; 0x7ffffffffffff000, the read causes loff_t overflow in the server
&gt; and it returns an NFS code of EINVAL to the client. The client as
&gt; a result indefinitely retries the request.

The Linux NFS client does not handle NFS?ERR_INVAL, even though all
NFS specifications permit servers to return that status code for a
READ.

Instead of NFS?ERR_INVAL, have out-of-range READ requests succeed
and return a short result. Set the EOF flag in the result to prevent
the client from retrying the READ request. This behavior appears to
be consistent with Solaris NFS servers.

Note that NFSv3 and NFSv4 use u64 offset values on the wire. These
must be converted to loff_t internally before use -- an implicit
type cast is not adequate for this purpose. Otherwise VFS checks
against sb-&gt;s_maxbytes do not work properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48828" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix ia_size underflow

iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and
NFSv4 both define file size as an unsigned 64-bit type. Thus there
is a range of valid file size values an NFS client can send that is
already larger than Linux can handle.

Currently decode_fattr4() dumps a full u64 value into ia_size. If
that value happens to be larger than S64_MAX, then ia_size
underflows. I'm about to fix up the NFSv3 behavior as well, so let's
catch the underflow in the common code path: nfsd_setattr().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48829" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes

iattr::ia_size is a loff_t, so these NFSv3 procedures must be
careful to deal with incoming client size values that are larger
than s64_max without corrupting the value.

Silently capping the value results in storing a different value
than the client passed in which is unexpected behavior, so remove
the min_t() check in decode_sattr3().

Note that RFC 1813 permits only the WRITE procedure to return
NFS3ERR_FBIG. We believe that NFSv3 reference implementations
also return NFS3ERR_FBIG when ia_size is too large.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: fix potential CAN frame reception race in isotp_rcv()

When receiving a CAN frame the current code logic does not consider
concurrently receiving processes which do not show up in real world
usage.

Ziyang Xuan writes:

The following syz problem is one of the scenarios. so-&gt;rx.len is
changed by isotp_rcv_ff() during isotp_rcv_cf(), so-&gt;rx.len equals
0 before alloc_skb() and equals 4096 after alloc_skb(). That will
trigger skb_over_panic() in skb_put().

=======================================================
CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc8-syzkaller #0
RIP: 0010:skb_panic+0x16c/0x16e net/core/skbuff.c:113
Call Trace:
 &lt;TASK&gt;
 skb_over_panic net/core/skbuff.c:118 [inline]
 skb_put.cold+0x24/0x24 net/core/skbuff.c:1990
 isotp_rcv_cf net/can/isotp.c:570 [inline]
 isotp_rcv+0xa38/0x1e30 net/can/isotp.c:668
 deliver net/can/af_can.c:574 [inline]
 can_rcv_filter+0x445/0x8d0 net/can/af_can.c:635
 can_receive+0x31d/0x580 net/can/af_can.c:665
 can_rcv+0x120/0x1c0 net/can/af_can.c:696
 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5465
 __netif_receive_skb+0x24/0x1b0 net/core/dev.c:5579

Therefore we make sure the state changes and data structures stay
consistent at CAN frame reception time by adding a spin_lock in
isotp_rcv(). This fixes the issue reported by syzkaller but does not
affect real world operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48831" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: fix reference leak in asymmetric_verify()

Don't leak a reference to the key if its algorithm is unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48832" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48832" ref_url="https://www.suse.com/security/cve/CVE-2022-48832" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: don't deref the syscall args when checking the openat2 open_how::flags

As reported by Jeff, dereferencing the openat2 syscall argument in
audit_match_perm() to obtain the open_how::flags can result in an
oops/page-fault.  This patch fixes this by using the open_how struct
that we store in the audit_context with audit_openat2_how().

Independent of this patch, Richard Guy Briggs posted a similar patch
to the audit mailing list roughly 40 minutes after this patch was
posted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48832/">CVE-2022-48832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48832">CVE-2022-48832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227984">SUSE bug 1227984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48833" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48833" ref_url="https://www.suse.com/security/cve/CVE-2022-48833" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: skip reserved bytes warning on unmount after log cleanup failure

After the recent changes made by commit c2e39305299f01 ("btrfs: clear
extent buffer uptodate when we fail to write it") and its followup fix,
commit 651740a5024117 ("btrfs: check WRITE_ERR when trying to read an
extent buffer"), we can now end up not cleaning up space reservations of
log tree extent buffers after a transaction abort happens, as well as not
cleaning up still dirty extent buffers.

This happens because if writeback for a log tree extent buffer failed,
then we have cleared the bit EXTENT_BUFFER_UPTODATE from the extent buffer
and we have also set the bit EXTENT_BUFFER_WRITE_ERR on it. Later on,
when trying to free the log tree with free_log_tree(), which iterates
over the tree, we can end up getting an -EIO error when trying to read
a node or a leaf, since read_extent_buffer_pages() returns -EIO if an
extent buffer does not have EXTENT_BUFFER_UPTODATE set and has the
EXTENT_BUFFER_WRITE_ERR bit set. Getting that -EIO means that we return
immediately as we can not iterate over the entire tree.

In that case we never update the reserved space for an extent buffer in
the respective block group and space_info object.

When this happens we get the following traces when unmounting the fs:

[174957.284509] BTRFS: error (device dm-0) in cleanup_transaction:1913: errno=-5 IO failure
[174957.286497] BTRFS: error (device dm-0) in free_log_tree:3420: errno=-5 IO failure
[174957.399379] ------------[ cut here ]------------
[174957.402497] WARNING: CPU: 2 PID: 3206883 at fs/btrfs/block-group.c:127 btrfs_put_block_group+0x77/0xb0 [btrfs]
[174957.407523] Modules linked in: btrfs overlay dm_zero (...)
[174957.424917] CPU: 2 PID: 3206883 Comm: umount Tainted: G        W         5.16.0-rc5-btrfs-next-109 #1
[174957.426689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[174957.428716] RIP: 0010:btrfs_put_block_group+0x77/0xb0 [btrfs]
[174957.429717] Code: 21 48 8b bd (...)
[174957.432867] RSP: 0018:ffffb70d41cffdd0 EFLAGS: 00010206
[174957.433632] RAX: 0000000000000001 RBX: ffff8b09c3848000 RCX: ffff8b0758edd1c8
[174957.434689] RDX: 0000000000000001 RSI: ffffffffc0b467e7 RDI: ffff8b0758edd000
[174957.436068] RBP: ffff8b0758edd000 R08: 0000000000000000 R09: 0000000000000000
[174957.437114] R10: 0000000000000246 R11: 0000000000000000 R12: ffff8b09c3848148
[174957.438140] R13: ffff8b09c3848198 R14: ffff8b0758edd188 R15: dead000000000100
[174957.439317] FS:  00007f328fb82800(0000) GS:ffff8b0a2d200000(0000) knlGS:0000000000000000
[174957.440402] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[174957.441164] CR2: 00007fff13563e98 CR3: 0000000404f4e005 CR4: 0000000000370ee0
[174957.442117] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[174957.443076] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[174957.443948] Call Trace:
[174957.444264]  &lt;TASK&gt;
[174957.444538]  btrfs_free_block_groups+0x255/0x3c0 [btrfs]
[174957.445238]  close_ctree+0x301/0x357 [btrfs]
[174957.445803]  ? call_rcu+0x16c/0x290
[174957.446250]  generic_shutdown_super+0x74/0x120
[174957.446832]  kill_anon_super+0x14/0x30
[174957.447305]  btrfs_kill_super+0x12/0x20 [btrfs]
[174957.447890]  deactivate_locked_super+0x31/0xa0
[174957.448440]  cleanup_mnt+0x147/0x1c0
[174957.448888]  task_work_run+0x5c/0xa0
[174957.449336]  exit_to_user_mode_prepare+0x1e5/0x1f0
[174957.449934]  syscall_exit_to_user_mode+0x16/0x40
[174957.450512]  do_syscall_64+0x48/0xc0
[174957.450980]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[174957.451605] RIP: 0033:0x7f328fdc4a97
[174957.452059] Code: 03 0c 00 f7 (...)
[174957.454320] RSP: 002b:00007fff13564ec8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
[174957.455262] RAX: 0000000000000000 RBX: 00007f328feea264 RCX: 00007f328fdc4a97
[174957.456131] RDX: 0000000000000000 RSI: 00000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48833/">CVE-2022-48833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48833">CVE-2022-48833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228059">SUSE bug 1228059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48834" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: usbtmc: Fix bug in pipe direction for control transfers

The syzbot fuzzer reported a minor bug in the usbtmc driver:

usb 5-1: BOGUS control dir, pipe 80001e80 doesn't match bRequestType 0
WARNING: CPU: 0 PID: 3813 at drivers/usb/core/urb.c:412
usb_submit_urb+0x13a5/0x1970 drivers/usb/core/urb.c:410
Modules linked in:
CPU: 0 PID: 3813 Comm: syz-executor122 Not tainted
5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0
...
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x113/0x530 drivers/usb/core/message.c:58
 usb_internal_control_msg drivers/usb/core/message.c:102 [inline]
 usb_control_msg+0x2a5/0x4b0 drivers/usb/core/message.c:153
 usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1947 [inline]

The problem is that usbtmc_ioctl_request() uses usb_rcvctrlpipe() for
all of its transfers, whether they are in or out.  It's easy to fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48835" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Page fault in reply q processing

A page fault was encountered in mpt3sas on a LUN reset error path:

[  145.763216] mpt3sas_cm1: Task abort tm failed: handle(0x0002),timeout(30) tr_method(0x0) smid(3) msix_index(0)
[  145.778932] scsi 1:0:0:0: task abort: FAILED scmd(0x0000000024ba29a2)
[  145.817307] scsi 1:0:0:0: attempting device reset! scmd(0x0000000024ba29a2)
[  145.827253] scsi 1:0:0:0: [sg1] tag#2 CDB: Receive Diagnostic 1c 01 01 ff fc 00
[  145.837617] scsi target1:0:0: handle(0x0002), sas_address(0x500605b0000272b9), phy(0)
[  145.848598] scsi target1:0:0: enclosure logical id(0x500605b0000272b8), slot(0)
[  149.858378] mpt3sas_cm1: Poll ReplyDescriptor queues for completion of smid(0), task_type(0x05), handle(0x0002)
[  149.875202] BUG: unable to handle page fault for address: 00000007fffc445d
[  149.885617] #PF: supervisor read access in kernel mode
[  149.894346] #PF: error_code(0x0000) - not-present page
[  149.903123] PGD 0 P4D 0
[  149.909387] Oops: 0000 [#1] PREEMPT SMP NOPTI
[  149.917417] CPU: 24 PID: 3512 Comm: scsi_eh_1 Kdump: loaded Tainted: G S         O      5.10.89-altav-1 #1
[  149.934327] Hardware name: DDN           200NVX2             /200NVX2-MB          , BIOS ATHG2.2.02.01 09/10/2021
[  149.951871] RIP: 0010:_base_process_reply_queue+0x4b/0x900 [mpt3sas]
[  149.961889] Code: 0f 84 22 02 00 00 8d 48 01 49 89 fd 48 8d 57 38 f0 0f b1 4f 38 0f 85 d8 01 00 00 49 8b 45 10 45 31 e4 41 8b 55 0c 48 8d 1c d0 &lt;0f&gt; b6 03 83 e0 0f 3c 0f 0f 85 a2 00 00 00 e9 e6 01 00 00 0f b7 ee
[  149.991952] RSP: 0018:ffffc9000f1ebcb8 EFLAGS: 00010246
[  150.000937] RAX: 0000000000000055 RBX: 00000007fffc445d RCX: 000000002548f071
[  150.011841] RDX: 00000000ffff8881 RSI: 0000000000000001 RDI: ffff888125ed50d8
[  150.022670] RBP: 0000000000000000 R08: 0000000000000000 R09: c0000000ffff7fff
[  150.033445] R10: ffffc9000f1ebb68 R11: ffffc9000f1ebb60 R12: 0000000000000000
[  150.044204] R13: ffff888125ed50d8 R14: 0000000000000080 R15: 34cdc00034cdea80
[  150.054963] FS:  0000000000000000(0000) GS:ffff88dfaf200000(0000) knlGS:0000000000000000
[  150.066715] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.076078] CR2: 00000007fffc445d CR3: 000000012448a006 CR4: 0000000000770ee0
[  150.086887] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  150.097670] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  150.108323] PKRU: 55555554
[  150.114690] Call Trace:
[  150.120497]  ? printk+0x48/0x4a
[  150.127049]  mpt3sas_scsih_issue_tm.cold.114+0x2e/0x2b3 [mpt3sas]
[  150.136453]  mpt3sas_scsih_issue_locked_tm+0x86/0xb0 [mpt3sas]
[  150.145759]  scsih_dev_reset+0xea/0x300 [mpt3sas]
[  150.153891]  scsi_eh_ready_devs+0x541/0x9e0 [scsi_mod]
[  150.162206]  ? __scsi_host_match+0x20/0x20 [scsi_mod]
[  150.170406]  ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
[  150.178925]  ? blk_mq_tagset_busy_iter+0x45/0x60
[  150.186638]  ? scsi_try_target_reset+0x90/0x90 [scsi_mod]
[  150.195087]  scsi_error_handler+0x3a5/0x4a0 [scsi_mod]
[  150.203206]  ? __schedule+0x1e9/0x610
[  150.209783]  ? scsi_eh_get_sense+0x210/0x210 [scsi_mod]
[  150.217924]  kthread+0x12e/0x150
[  150.224041]  ? kthread_worker_fn+0x130/0x130
[  150.231206]  ret_from_fork+0x1f/0x30

This is caused by mpt3sas_base_sync_reply_irqs() using an invalid reply_q
pointer outside of the list_for_each_entry() loop. At the end of the full
list traversal the pointer is invalid.

Move the _base_process_reply_queue() call inside of the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48836" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: aiptek - properly check endpoint type

Syzbot reported warning in usb_submit_urb() which is caused by wrong
endpoint type. There was a check for the number of endpoints, but not
for the type of endpoint.

Fix it by replacing old desc.bNumEndpoints check with
usb_find_common_endpoints() helper for finding endpoints

Fail log:

usb 5-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 2 PID: 48 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
Modules linked in:
CPU: 2 PID: 48 Comm: kworker/2:2 Not tainted 5.17.0-rc6-syzkaller-00226-g07ebd38a0da2 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Workqueue: usb_hub_wq hub_event
...
Call Trace:
 &lt;TASK&gt;
 aiptek_open+0xd5/0x130 drivers/input/tablet/aiptek.c:830
 input_open_device+0x1bb/0x320 drivers/input/input.c:629
 kbd_connect+0xfe/0x160 drivers/tty/vt/keyboard.c:1593
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48837" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: rndis: prevent integer overflow in rndis_set_response()

If "BufOffset" is very large the "BufOffset + 8" operation can have an
integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48838" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: Fix use-after-free bug by not setting udc-&gt;dev.driver

The syzbot fuzzer found a use-after-free bug:

BUG: KASAN: use-after-free in dev_uevent+0x712/0x780 drivers/base/core.c:2320
Read of size 8 at addr ffff88802b934098 by task udevd/3689

CPU: 2 PID: 3689 Comm: udevd Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 dev_uevent+0x712/0x780 drivers/base/core.c:2320
 uevent_show+0x1b8/0x380 drivers/base/core.c:2391
 dev_attr_show+0x4b/0x90 drivers/base/core.c:2094

Although the bug manifested in the driver core, the real cause was a
race with the gadget core.  dev_uevent() does:

	if (dev-&gt;driver)
		add_uevent_var(env, "DRIVER=%s", dev-&gt;driver-&gt;name);

and between the test and the dereference of dev-&gt;driver, the gadget
core sets dev-&gt;driver to NULL.

The race wouldn't occur if the gadget core registered its devices on
a real bus, using the standard synchronization techniques of the
driver core.  However, it's not necessary to make such a large change
in order to fix this bug; all we need to do is make sure that
udc-&gt;dev.driver is always NULL.

In fact, there is no reason for udc-&gt;dev.driver ever to be set to
anything, let alone to the value it currently gets: the address of the
gadget's driver.  After all, a gadget driver only knows how to manage
a gadget, not how to manage a UDC.

This patch simply removes the statements in the gadget core that touch
udc-&gt;dev.driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48840" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix hang during reboot/shutdown

Recent commit 974578017fc1 ("iavf: Add waiting so the port is
initialized in remove") adds a wait-loop at the beginning of
iavf_remove() to ensure that port initialization is finished
prior unregistering net device. This causes a regression
in reboot/shutdown scenario because in this case callback
iavf_shutdown() is called and this callback detaches the device,
makes it down if it is running and sets its state to __IAVF_REMOVE.
Later shutdown callback of associated PF driver (e.g. ice_shutdown)
is called. That callback calls among other things sriov_disable()
that calls indirectly iavf_remove() (see stack trace below).
As the adapter state is already __IAVF_REMOVE then the mentioned
loop is end-less and shutdown process hangs.

The patch fixes this by checking adapter's state at the beginning
of iavf_remove() and skips the rest of the function if the adapter
is already in remove state (shutdown is in progress).

Reproducer:
1. Create VF on PF driven by ice or i40e driver
2. Ensure that the VF is bound to iavf driver
3. Reboot

[52625.981294] sysrq: SysRq : Show Blocked State
[52625.988377] task:reboot          state:D stack:    0 pid:17359 ppid:     1 f2
[52625.996732] Call Trace:
[52625.999187]  __schedule+0x2d1/0x830
[52626.007400]  schedule+0x35/0xa0
[52626.010545]  schedule_hrtimeout_range_clock+0x83/0x100
[52626.020046]  usleep_range+0x5b/0x80
[52626.023540]  iavf_remove+0x63/0x5b0 [iavf]
[52626.027645]  pci_device_remove+0x3b/0xc0
[52626.031572]  device_release_driver_internal+0x103/0x1f0
[52626.036805]  pci_stop_bus_device+0x72/0xa0
[52626.040904]  pci_stop_and_remove_bus_device+0xe/0x20
[52626.045870]  pci_iov_remove_virtfn+0xba/0x120
[52626.050232]  sriov_disable+0x2f/0xe0
[52626.053813]  ice_free_vfs+0x7c/0x340 [ice]
[52626.057946]  ice_remove+0x220/0x240 [ice]
[52626.061967]  ice_shutdown+0x16/0x50 [ice]
[52626.065987]  pci_device_shutdown+0x34/0x60
[52626.070086]  device_shutdown+0x165/0x1c5
[52626.074011]  kernel_restart+0xe/0x30
[52626.077593]  __do_sys_reboot+0x1d2/0x210
[52626.093815]  do_syscall_64+0x5b/0x1a0
[52626.097483]  entry_SYSCALL_64_after_hwframe+0x65/0xca
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48841" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats()

It is possible to do NULL pointer dereference in routine that updates
Tx ring stats. Currently only stats and bytes are updated when ring
pointer is valid, but later on ring is accessed to propagate gathered Tx
stats onto VSI stats.

Change the existing logic to move to next ring when ring is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48842" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix race condition during interface enslave

Commit 5dbbbd01cbba83 ("ice: Avoid RTNL lock when re-creating
auxiliary device") changes a process of re-creation of aux device
so ice_plug_aux_dev() is called from ice_service_task() context.
This unfortunately opens a race window that can result in dead-lock
when interface has left LAG and immediately enters LAG again.

Reproducer:
```
#!/bin/sh

ip link add lag0 type bond mode 1 miimon 100
ip link set lag0

for n in {1..10}; do
        echo Cycle: $n
        ip link set ens7f0 master lag0
        sleep 1
        ip link set ens7f0 nomaster
done
```

This results in:
[20976.208697] Workqueue: ice ice_service_task [ice]
[20976.213422] Call Trace:
[20976.215871]  __schedule+0x2d1/0x830
[20976.219364]  schedule+0x35/0xa0
[20976.222510]  schedule_preempt_disabled+0xa/0x10
[20976.227043]  __mutex_lock.isra.7+0x310/0x420
[20976.235071]  enum_all_gids_of_dev_cb+0x1c/0x100 [ib_core]
[20976.251215]  ib_enum_roce_netdev+0xa4/0xe0 [ib_core]
[20976.256192]  ib_cache_setup_one+0x33/0xa0 [ib_core]
[20976.261079]  ib_register_device+0x40d/0x580 [ib_core]
[20976.266139]  irdma_ib_register_device+0x129/0x250 [irdma]
[20976.281409]  irdma_probe+0x2c1/0x360 [irdma]
[20976.285691]  auxiliary_bus_probe+0x45/0x70
[20976.289790]  really_probe+0x1f2/0x480
[20976.298509]  driver_probe_device+0x49/0xc0
[20976.302609]  bus_for_each_drv+0x79/0xc0
[20976.306448]  __device_attach+0xdc/0x160
[20976.310286]  bus_probe_device+0x9d/0xb0
[20976.314128]  device_add+0x43c/0x890
[20976.321287]  __auxiliary_device_add+0x43/0x60
[20976.325644]  ice_plug_aux_dev+0xb2/0x100 [ice]
[20976.330109]  ice_service_task+0xd0c/0xed0 [ice]
[20976.342591]  process_one_work+0x1a7/0x360
[20976.350536]  worker_thread+0x30/0x390
[20976.358128]  kthread+0x10a/0x120
[20976.365547]  ret_from_fork+0x1f/0x40
...
[20976.438030] task:ip              state:D stack:    0 pid:213658 ppid:213627 flags:0x00004084
[20976.446469] Call Trace:
[20976.448921]  __schedule+0x2d1/0x830
[20976.452414]  schedule+0x35/0xa0
[20976.455559]  schedule_preempt_disabled+0xa/0x10
[20976.460090]  __mutex_lock.isra.7+0x310/0x420
[20976.464364]  device_del+0x36/0x3c0
[20976.467772]  ice_unplug_aux_dev+0x1a/0x40 [ice]
[20976.472313]  ice_lag_event_handler+0x2a2/0x520 [ice]
[20976.477288]  notifier_call_chain+0x47/0x70
[20976.481386]  __netdev_upper_dev_link+0x18b/0x280
[20976.489845]  bond_enslave+0xe05/0x1790 [bonding]
[20976.494475]  do_setlink+0x336/0xf50
[20976.502517]  __rtnl_newlink+0x529/0x8b0
[20976.543441]  rtnl_newlink+0x43/0x60
[20976.546934]  rtnetlink_rcv_msg+0x2b1/0x360
[20976.559238]  netlink_rcv_skb+0x4c/0x120
[20976.563079]  netlink_unicast+0x196/0x230
[20976.567005]  netlink_sendmsg+0x204/0x3d0
[20976.570930]  sock_sendmsg+0x4c/0x50
[20976.574423]  ____sys_sendmsg+0x1eb/0x250
[20976.586807]  ___sys_sendmsg+0x7c/0xc0
[20976.606353]  __sys_sendmsg+0x57/0xa0
[20976.609930]  do_syscall_64+0x5b/0x1a0
[20976.613598]  entry_SYSCALL_64_after_hwframe+0x65/0xca

1. Command 'ip link ... set nomaster' causes that ice_plug_aux_dev()
   is called from ice_service_task() context, aux device is created
   and associated device-&gt;lock is taken.
2. Command 'ip link ... set master...' calls ice's notifier under
   RTNL lock and that notifier calls ice_unplug_aux_dev(). That
   function tries to take aux device-&gt;lock but this is already taken
   by ice_plug_aux_dev() in step 1
3. Later ice_plug_aux_dev() tries to take RTNL lock but this is already
   taken in step 2
4. Dead-lock

The patch fixes this issue by following changes:
- Bit ICE_FLAG_PLUG_AUX_DEV is kept to be set during ice_plug_aux_dev()
  call in ice_service_task()
- The bit is checked in ice_clear_rdma_cap() and only if it is not set
  then ice_unplug_aux_dev() is called. If it is set (in other words
  plugging of aux device was requested and ice_plug_aux_dev() is
  potentially running) then the function only clears the
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48843" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vrr: Set VRR capable prop only if it is attached to connector

VRR capable property is not attached by default to the connector
It is attached only if VRR is supported.
So if the driver tries to call drm core set prop function without
it being attached that causes NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48844" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48844" ref_url="https://www.suse.com/security/cve/CVE-2022-48844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix leaking sent_cmd skb

sent_cmd memory is not freed before freeing hci_dev causing it to leak
it contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48844/">CVE-2022-48844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48844">CVE-2022-48844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228068">SUSE bug 1228068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48845" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48845" ref_url="https://www.suse.com/security/cve/CVE-2022-48845" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: smp: fill in sibling and core maps earlier

After enabling CONFIG_SCHED_CORE (landed during 5.14 cycle),
2-core 2-thread-per-core interAptiv (CPS-driven) started emitting
the following:

[    0.025698] CPU1 revision is: 0001a120 (MIPS interAptiv (multi))
[    0.048183] ------------[ cut here ]------------
[    0.048187] WARNING: CPU: 1 PID: 0 at kernel/sched/core.c:6025 sched_core_cpu_starting+0x198/0x240
[    0.048220] Modules linked in:
[    0.048233] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.17.0-rc3+ #35 b7b319f24073fd9a3c2aa7ad15fb7993eec0b26f
[    0.048247] Stack : 817f0000 00000004 327804c8 810eb050 00000000 00000004 00000000 c314fdd1
[    0.048278]         830cbd64 819c0000 81800000 817f0000 83070bf4 00000001 830cbd08 00000000
[    0.048307]         00000000 00000000 815fcbc4 00000000 00000000 00000000 00000000 00000000
[    0.048334]         00000000 00000000 00000000 00000000 817f0000 00000000 00000000 817f6f34
[    0.048361]         817f0000 818a3c00 817f0000 00000004 00000000 00000000 4dc33260 0018c933
[    0.048389]         ...
[    0.048396] Call Trace:
[    0.048399] [&lt;8105a7bc&gt;] show_stack+0x3c/0x140
[    0.048424] [&lt;8131c2a0&gt;] dump_stack_lvl+0x60/0x80
[    0.048440] [&lt;8108b5c0&gt;] __warn+0xc0/0xf4
[    0.048454] [&lt;8108b658&gt;] warn_slowpath_fmt+0x64/0x10c
[    0.048467] [&lt;810bd418&gt;] sched_core_cpu_starting+0x198/0x240
[    0.048483] [&lt;810c6514&gt;] sched_cpu_starting+0x14/0x80
[    0.048497] [&lt;8108c0f8&gt;] cpuhp_invoke_callback_range+0x78/0x140
[    0.048510] [&lt;8108d914&gt;] notify_cpu_starting+0x94/0x140
[    0.048523] [&lt;8106593c&gt;] start_secondary+0xbc/0x280
[    0.048539]
[    0.048543] ---[ end trace 0000000000000000 ]---
[    0.048636] Synchronize counters for CPU 1: done.

...for each but CPU 0/boot.
Basic debug printks right before the mentioned line say:

[    0.048170] CPU: 1, smt_mask:

So smt_mask, which is sibling mask obviously, is empty when entering
the function.
This is critical, as sched_core_cpu_starting() calculates
core-scheduling parameters only once per CPU start, and it's crucial
to have all the parameters filled in at that moment (at least it
uses cpu_smt_mask() which in fact is `&amp;cpu_sibling_map[cpu]` on
MIPS).

A bit of debugging led me to that set_cpu_sibling_map() performing
the actual map calculation, was being invocated after
notify_cpu_start(), and exactly the latter function starts CPU HP
callback round (sched_core_cpu_starting() is basically a CPU HP
callback).
While the flow is same on ARM64 (maps after the notifier, although
before calling set_cpu_online()), x86 started calculating sibling
maps earlier than starting the CPU HP callbacks in Linux 4.14 (see
[0] for the reference). Neither me nor my brief tests couldn't find
any potential caveats in calculating the maps right after performing
delay calibration, but the WARN splat is now gone.
The very same debug prints now yield exactly what I expected from
them:

[    0.048433] CPU: 1, smt_mask: 0-1

[0] https://git.kernel.org/pub/scm/linux/kernel/git/mips/linux.git/commit/?id=76ce7cfe35ef
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48845/">CVE-2022-48845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48845">CVE-2022-48845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228070">SUSE bug 1228070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48846" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48846" ref_url="https://www.suse.com/security/cve/CVE-2022-48846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: release rq qos structures for queue without disk

blkcg_init_queue() may add rq qos structures to request queue, previously
blk_cleanup_queue() calls rq_qos_exit() to release them, but commit
8e141f9eb803 ("block: drain file system I/O on del_gendisk")
moves rq_qos_exit() into del_gendisk(), so memory leak is caused
because queues may not have disk, such as un-present scsi luns, nvme
admin queue, ...

Fixes the issue by adding rq_qos_exit() to blk_cleanup_queue() back.

BTW, v5.18 won't need this patch any more since we move
blkcg_init_queue()/blkcg_exit_queue() into disk allocation/release
handler, and patches have been in for-5.18/block.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48846/">CVE-2022-48846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48846">CVE-2022-48846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227992">SUSE bug 1227992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48847" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watch_queue: Fix filter limit check

In watch_queue_set_filter(), there are a couple of places where we check
that the filter type value does not exceed what the type_filter bitmap
can hold.  One place calculates the number of bits by:

   if (tf[i].type &gt;= sizeof(wfilter-&gt;type_filter) * 8)

which is fine, but the second does:

   if (tf[i].type &gt;= sizeof(wfilter-&gt;type_filter) * BITS_PER_LONG)

which is not.  This can lead to a couple of out-of-bounds writes due to
a too-large type:

 (1) __set_bit() on wfilter-&gt;type_filter
 (2) Writing more elements in wfilter-&gt;filters[] than we allocated.

Fix this by just using the proper WATCH_TYPE__NR instead, which is the
number of types we actually know about.

The bug may cause an oops looking something like:

  BUG: KASAN: slab-out-of-bounds in watch_queue_set_filter+0x659/0x740
  Write of size 4 at addr ffff88800d2c66bc by task watch_queue_oob/611
  ...
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x45/0x59
   print_address_description.constprop.0+0x1f/0x150
   ...
   kasan_report.cold+0x7f/0x11b
   ...
   watch_queue_set_filter+0x659/0x740
   ...
   __x64_sys_ioctl+0x127/0x190
   do_syscall_64+0x43/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  Allocated by task 611:
   kasan_save_stack+0x1e/0x40
   __kasan_kmalloc+0x81/0xa0
   watch_queue_set_filter+0x23a/0x740
   __x64_sys_ioctl+0x127/0x190
   do_syscall_64+0x43/0x90
   entry_SYSCALL_64_after_hwframe+0x44/0xae

  The buggy address belongs to the object at ffff88800d2c66a0
   which belongs to the cache kmalloc-32 of size 32
  The buggy address is located 28 bytes inside of
   32-byte region [ffff88800d2c66a0, ffff88800d2c66c0)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48848" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48848" ref_url="https://www.suse.com/security/cve/CVE-2022-48848" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/osnoise: Do not unregister events twice

Nicolas reported that using:

 # trace-cmd record -e all -M 10 -p osnoise --poll

Resulted in the following kernel warning:

 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 1217 at kernel/tracepoint.c:404 tracepoint_probe_unregister+0x280/0x370
 [...]
 CPU: 0 PID: 1217 Comm: trace-cmd Not tainted 5.17.0-rc6-next-20220307-nico+ #19
 RIP: 0010:tracepoint_probe_unregister+0x280/0x370
 [...]
 CR2: 00007ff919b29497 CR3: 0000000109da4005 CR4: 0000000000170ef0
 Call Trace:
  &lt;TASK&gt;
  osnoise_workload_stop+0x36/0x90
  tracing_set_tracer+0x108/0x260
  tracing_set_trace_write+0x94/0xd0
  ? __check_object_size.part.0+0x10a/0x150
  ? selinux_file_permission+0x104/0x150
  vfs_write+0xb5/0x290
  ksys_write+0x5f/0xe0
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7ff919a18127
 [...]
 ---[ end trace 0000000000000000 ]---

The warning complains about an attempt to unregister an
unregistered tracepoint.

This happens on trace-cmd because it first stops tracing, and
then switches the tracer to nop. Which is equivalent to:

  # cd /sys/kernel/tracing/
  # echo osnoise &gt; current_tracer
  # echo 0 &gt; tracing_on
  # echo nop &gt; current_tracer

The osnoise tracer stops the workload when no trace instance
is actually collecting data. This can be caused both by
disabling tracing or disabling the tracer itself.

To avoid unregistering events twice, use the existing
trace_osnoise_callback_enabled variable to check if the events
(and the workload) are actually active before trying to
deactivate them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48848/">CVE-2022-48848 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48848">CVE-2022-48848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227994">SUSE bug 1227994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48849" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: bypass tiling flag check in virtual display case (v2)

vkms leverages common amdgpu framebuffer creation, and
also as it does not support FB modifier, there is no need
to check tiling flags when initing framebuffer when virtual
display is enabled.

This can fix below calltrace:

amdgpu 0000:00:08.0: GFX9+ requires FB check based on format modifier
WARNING: CPU: 0 PID: 1023 at drivers/gpu/drm/amd/amdgpu/amdgpu_display.c:1150 amdgpu_display_framebuffer_init+0x8e7/0xb40 [amdgpu]

v2: check adev-&gt;enable_virtual_display instead as vkms can be
	enabled in bare metal as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48850" ref_url="https://www.suse.com/security/cve/CVE-2022-48850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net-sysfs: add check for netdevice being present to speed_show

When bringing down the netdevice or system shutdown, a panic can be
triggered while accessing the sysfs path because the device is already
removed.

    [  755.549084] mlx5_core 0000:12:00.1: Shutdown was called
    [  756.404455] mlx5_core 0000:12:00.0: Shutdown was called
    ...
    [  757.937260] BUG: unable to handle kernel NULL pointer dereference at           (null)
    [  758.031397] IP: [&lt;ffffffff8ee11acb&gt;] dma_pool_alloc+0x1ab/0x280

    crash&gt; bt
    ...
    PID: 12649  TASK: ffff8924108f2100  CPU: 1   COMMAND: "amsd"
    ...
     #9 [ffff89240e1a38b0] page_fault at ffffffff8f38c778
        [exception RIP: dma_pool_alloc+0x1ab]
        RIP: ffffffff8ee11acb  RSP: ffff89240e1a3968  RFLAGS: 00010046
        RAX: 0000000000000246  RBX: ffff89243d874100  RCX: 0000000000001000
        RDX: 0000000000000000  RSI: 0000000000000246  RDI: ffff89243d874090
        RBP: ffff89240e1a39c0   R8: 000000000001f080   R9: ffff8905ffc03c00
        R10: ffffffffc04680d4  R11: ffffffff8edde9fd  R12: 00000000000080d0
        R13: ffff89243d874090  R14: ffff89243d874080  R15: 0000000000000000
        ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
    #10 [ffff89240e1a39c8] mlx5_alloc_cmd_msg at ffffffffc04680f3 [mlx5_core]
    #11 [ffff89240e1a3a18] cmd_exec at ffffffffc046ad62 [mlx5_core]
    #12 [ffff89240e1a3ab8] mlx5_cmd_exec at ffffffffc046b4fb [mlx5_core]
    #13 [ffff89240e1a3ae8] mlx5_core_access_reg at ffffffffc0475434 [mlx5_core]
    #14 [ffff89240e1a3b40] mlx5e_get_fec_caps at ffffffffc04a7348 [mlx5_core]
    #15 [ffff89240e1a3bb0] get_fec_supported_advertised at ffffffffc04992bf [mlx5_core]
    #16 [ffff89240e1a3c08] mlx5e_get_link_ksettings at ffffffffc049ab36 [mlx5_core]
    #17 [ffff89240e1a3ce8] __ethtool_get_link_ksettings at ffffffff8f25db46
    #18 [ffff89240e1a3d48] speed_show at ffffffff8f277208
    #19 [ffff89240e1a3dd8] dev_attr_show at ffffffff8f0b70e3
    #20 [ffff89240e1a3df8] sysfs_kf_seq_show at ffffffff8eedbedf
    #21 [ffff89240e1a3e18] kernfs_seq_show at ffffffff8eeda596
    #22 [ffff89240e1a3e28] seq_read at ffffffff8ee76d10
    #23 [ffff89240e1a3e98] kernfs_fop_read at ffffffff8eedaef5
    #24 [ffff89240e1a3ed8] vfs_read at ffffffff8ee4e3ff
    #25 [ffff89240e1a3f08] sys_read at ffffffff8ee4f27f
    #26 [ffff89240e1a3f50] system_call_fastpath at ffffffff8f395f92

    crash&gt; net_device.state ffff89443b0c0000
      state = 0x5  (__LINK_STATE_START| __LINK_STATE_NOCARRIER)

To prevent this scenario, we also make sure that the netdevice is present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48850/">CVE-2022-48850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48850">CVE-2022-48850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228071">SUSE bug 1228071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48851" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: gdm724x: fix use after free in gdm_lte_rx()

The netif_rx_ni() function frees the skb so we can't dereference it to
save the skb-&gt;len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48852" ref_url="https://www.suse.com/security/cve/CVE-2022-48852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: hdmi: Unregister codec device on unbind

On bind we will register the HDMI codec device but we don't unregister
it on unbind, leading to a device leakage. Unregister our device at
unbind.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48852/">CVE-2022-48852 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48852">CVE-2022-48852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228067">SUSE bug 1228067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48853" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

swiotlb: fix info leak with DMA_FROM_DEVICE

The problem I'm addressing was discovered by the LTP test covering
cve-2018-1000204.

A short description of what happens follows:
1) The test case issues a command code 00 (TEST UNIT READY) via the SG_IO
   interface with: dxfer_len == 524288, dxdfer_dir == SG_DXFER_FROM_DEV
   and a corresponding dxferp. The peculiar thing about this is that TUR
   is not reading from the device.
2) In sg_start_req() the invocation of blk_rq_map_user() effectively
   bounces the user-space buffer. As if the device was to transfer into
   it. Since commit a45b599ad808 ("scsi: sg: allocate with __GFP_ZERO in
   sg_build_indirect()") we make sure this first bounce buffer is
   allocated with GFP_ZERO.
3) For the rest of the story we keep ignoring that we have a TUR, so the
   device won't touch the buffer we prepare as if the we had a
   DMA_FROM_DEVICE type of situation. My setup uses a virtio-scsi device
   and the  buffer allocated by SG is mapped by the function
   virtqueue_add_split() which uses DMA_FROM_DEVICE for the "in" sgs (here
   scatter-gather and not scsi generics). This mapping involves bouncing
   via the swiotlb (we need swiotlb to do virtio in protected guest like
   s390 Secure Execution, or AMD SEV).
4) When the SCSI TUR is done, we first copy back the content of the second
   (that is swiotlb) bounce buffer (which most likely contains some
   previous IO data), to the first bounce buffer, which contains all
   zeros.  Then we copy back the content of the first bounce buffer to
   the user-space buffer.
5) The test case detects that the buffer, which it zero-initialized,
  ain't all zeros and fails.

One can argue that this is an swiotlb problem, because without swiotlb
we leak all zeros, and the swiotlb should be transparent in a sense that
it does not affect the outcome (if all other participants are well
behaved).

Copying the content of the original buffer into the swiotlb buffer is
the only way I can think of to make swiotlb transparent in such
scenarios. So let's do just that if in doubt, but allow the driver
to tell us that the whole mapped buffer is going to be overwritten,
in which case we can preserve the old behavior and avoid the performance
impact of the extra bounce.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48854" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48854" ref_url="https://www.suse.com/security/cve/CVE-2022-48854" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: arc_emac: Fix use after free in arc_mdio_probe()

If bus-&gt;state is equal to MDIOBUS_ALLOCATED, mdiobus_free(bus) will free
the "bus". But bus-&gt;name is still used in the next line, which will lead
to a use after free.

We can fix it by putting the name in a local variable and make the
bus-&gt;name point to the rodata section "name",then use the name in the
error message without referring to bus to avoid the uaf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48854/">CVE-2022-48854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48854">CVE-2022-48854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227998">SUSE bug 1227998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48855" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48855" ref_url="https://www.suse.com/security/cve/CVE-2022-48855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: fix kernel-infoleak for SCTP sockets

syzbot reported a kernel infoleak [1] of 4 bytes.

After analysis, it turned out r-&gt;idiag_expires is not initialized
if inet_sctp_diag_fill() calls inet_diag_msg_common_fill()

Make sure to clear idiag_timer/idiag_retrans/idiag_expires
and let inet_diag_msg_sctpasoc_fill() fill them again if needed.

[1]

BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:121 [inline]
BUG: KMSAN: kernel-infoleak in copyout lib/iov_iter.c:154 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668
 instrument_copy_to_user include/linux/instrumented.h:121 [inline]
 copyout lib/iov_iter.c:154 [inline]
 _copy_to_iter+0x6ef/0x25a0 lib/iov_iter.c:668
 copy_to_iter include/linux/uio.h:162 [inline]
 simple_copy_to_iter+0xf3/0x140 net/core/datagram.c:519
 __skb_datagram_iter+0x2d5/0x11b0 net/core/datagram.c:425
 skb_copy_datagram_iter+0xdc/0x270 net/core/datagram.c:533
 skb_copy_datagram_msg include/linux/skbuff.h:3696 [inline]
 netlink_recvmsg+0x669/0x1c80 net/netlink/af_netlink.c:1977
 sock_recvmsg_nosec net/socket.c:948 [inline]
 sock_recvmsg net/socket.c:966 [inline]
 __sys_recvfrom+0x795/0xa10 net/socket.c:2097
 __do_sys_recvfrom net/socket.c:2115 [inline]
 __se_sys_recvfrom net/socket.c:2111 [inline]
 __x64_sys_recvfrom+0x19d/0x210 net/socket.c:2111
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:737 [inline]
 slab_alloc_node mm/slub.c:3247 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4975
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1158 [inline]
 netlink_dump+0x3e5/0x16c0 net/netlink/af_netlink.c:2248
 __netlink_dump_start+0xcf8/0xe90 net/netlink/af_netlink.c:2373
 netlink_dump_start include/linux/netlink.h:254 [inline]
 inet_diag_handler_cmd+0x2e7/0x400 net/ipv4/inet_diag.c:1341
 sock_diag_rcv_msg+0x24a/0x620
 netlink_rcv_skb+0x40c/0x7e0 net/netlink/af_netlink.c:2494
 sock_diag_rcv+0x63/0x80 net/core/sock_diag.c:277
 netlink_unicast_kernel net/netlink/af_netlink.c:1317 [inline]
 netlink_unicast+0x1093/0x1360 net/netlink/af_netlink.c:1343
 netlink_sendmsg+0x14d9/0x1720 net/netlink/af_netlink.c:1919
 sock_sendmsg_nosec net/socket.c:705 [inline]
 sock_sendmsg net/socket.c:725 [inline]
 sock_write_iter+0x594/0x690 net/socket.c:1061
 do_iter_readv_writev+0xa7f/0xc70
 do_iter_write+0x52c/0x1500 fs/read_write.c:851
 vfs_writev fs/read_write.c:924 [inline]
 do_writev+0x645/0xe00 fs/read_write.c:967
 __do_sys_writev fs/read_write.c:1040 [inline]
 __se_sys_writev fs/read_write.c:1037 [inline]
 __x64_sys_writev+0xe5/0x120 fs/read_write.c:1037
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Bytes 68-71 of 2508 are uninitialized
Memory access of size 2508 starts at ffff888114f9b000
Data copied to user address 00007f7fe09ff2e0

CPU: 1 PID: 3478 Comm: syz-executor306 Not tainted 5.17.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48855/">CVE-2022-48855 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48855">CVE-2022-48855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228003">SUSE bug 1228003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48856" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gianfar: ethtool: Fix refcount leak in gfar_get_ts_info

The of_find_compatible_node() function returns a node pointer with
refcount incremented, We should use of_node_put() on it when done
Add the missing of_node_put() to release the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48857" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: port100: fix use-after-free in port100_send_complete

Syzbot reported UAF in port100_send_complete(). The root case is in
missing usb_kill_urb() calls on error handling path of -&gt;probe function.

port100_send_complete() accesses devm allocated memory which will be
freed on probe failure. We should kill this urbs before returning an
error from probe function to prevent reported use-after-free

Fail log:

BUG: KASAN: use-after-free in port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935
Read of size 1 at addr ffff88801bb59540 by task ksoftirqd/2/26
...
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x303 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 port100_send_complete+0x16e/0x1a0 drivers/nfc/port100.c:935
 __usb_hcd_giveback_urb+0x2b0/0x5c0 drivers/usb/core/hcd.c:1670

...

Allocated by task 1255:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:45 [inline]
 set_alloc_info mm/kasan/common.c:436 [inline]
 ____kasan_kmalloc mm/kasan/common.c:515 [inline]
 ____kasan_kmalloc mm/kasan/common.c:474 [inline]
 __kasan_kmalloc+0xa6/0xd0 mm/kasan/common.c:524
 alloc_dr drivers/base/devres.c:116 [inline]
 devm_kmalloc+0x96/0x1d0 drivers/base/devres.c:823
 devm_kzalloc include/linux/device.h:209 [inline]
 port100_probe+0x8a/0x1320 drivers/nfc/port100.c:1502

Freed by task 1255:
 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:38
 kasan_set_track+0x21/0x30 mm/kasan/common.c:45
 kasan_set_free_info+0x20/0x30 mm/kasan/generic.c:370
 ____kasan_slab_free mm/kasan/common.c:366 [inline]
 ____kasan_slab_free+0xff/0x140 mm/kasan/common.c:328
 kasan_slab_free include/linux/kasan.h:236 [inline]
 __cache_free mm/slab.c:3437 [inline]
 kfree+0xf8/0x2b0 mm/slab.c:3794
 release_nodes+0x112/0x1a0 drivers/base/devres.c:501
 devres_release_all+0x114/0x190 drivers/base/devres.c:530
 really_probe+0x626/0xcc0 drivers/base/dd.c:670
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48858" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix a race on command flush flow

Fix a refcount use after free warning due to a race on command entry.
Such race occurs when one of the commands releases its last refcount and
frees its index and entry while another process running command flush
flow takes refcount to this command entry. The process which handles
commands flush may see this command as needed to be flushed if the other
process released its refcount but didn't release the index yet. Fix it
by adding the needed spin lock.

It fixes the following warning trace:

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 11 PID: 540311 at lib/refcount.c:25 refcount_warn_saturate+0x80/0xe0
...
RIP: 0010:refcount_warn_saturate+0x80/0xe0
...
Call Trace:
 &lt;TASK&gt;
 mlx5_cmd_trigger_completions+0x293/0x340 [mlx5_core]
 mlx5_cmd_flush+0x3a/0xf0 [mlx5_core]
 enter_error_state+0x44/0x80 [mlx5_core]
 mlx5_fw_fatal_reporter_err_work+0x37/0xe0 [mlx5_core]
 process_one_work+0x1be/0x390
 worker_thread+0x4d/0x3d0
 ? rescuer_thread+0x350/0x350
 kthread+0x141/0x160
 ? set_kthread_struct+0x40/0x40
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48859" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr

This node pointer is returned by of_find_compatible_node() with
refcount incremented. Calling of_node_put() to aovid the refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48860" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: Fix error handling in xemaclite_of_probe

This node pointer is returned by of_parse_phandle() with refcount
incremented in this function. Calling of_node_put() to avoid the
refcount leak. As the remove function do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48861" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: fix use-after-free on vp_vdpa_remove

When vp_vdpa driver is unbind, vp_vdpa is freed in vdpa_unregister_device
and then vp_vdpa-&gt;mdev.pci_dev is dereferenced in vp_modern_remove,
triggering use-after-free.

Call Trace of unbinding driver free vp_vdpa :
do_syscall_64
  vfs_write
    kernfs_fop_write_iter
      device_release_driver_internal
        pci_device_remove
          vp_vdpa_remove
            vdpa_unregister_device
              kobject_release
                device_release
                  kfree

Call Trace of dereference vp_vdpa-&gt;mdev.pci_dev:
vp_modern_remove
  pci_release_selected_regions
    pci_release_region
      pci_resource_len
        pci_resource_end
          (dev)-&gt;resource[(bar)].end
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: fix hung thread due to erroneous iotlb entries

In vhost_iotlb_add_range_ctx(), range size can overflow to 0 when
start is 0 and last is ULONG_MAX. One instance where it can happen
is when userspace sends an IOTLB message with iova=size=uaddr=0
(vhost_process_iotlb_msg). So, an entry with size = 0, start = 0,
last = ULONG_MAX ends up in the iotlb. Next time a packet is sent,
iotlb_access_ok() loops indefinitely due to that erroneous entry.

	Call Trace:
	 &lt;TASK&gt;
	 iotlb_access_ok+0x21b/0x3e0 drivers/vhost/vhost.c:1340
	 vq_meta_prefetch+0xbc/0x280 drivers/vhost/vhost.c:1366
	 vhost_transport_do_send_pkt+0xe0/0xfd0 drivers/vhost/vsock.c:104
	 vhost_worker+0x23d/0x3d0 drivers/vhost/vhost.c:372
	 kthread+0x2e9/0x3a0 kernel/kthread.c:377
	 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
	 &lt;/TASK&gt;

Reported by syzbot at:
	https://syzkaller.appspot.com/bug?extid=0abd373e2e50d704db87

To fix this, do two things:

1. Return -EINVAL in vhost_chr_write_iter() when userspace asks to map
   a range with size 0.
2. Fix vhost_iotlb_add_range_ctx() to handle the range [0, ULONG_MAX]
   by splitting it into two entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48863" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: Fix memory leak in dsp_pipeline_build()

dsp_pipeline_build() allocates dup pointer by kstrdup(cfg),
but then it updates dup variable by strsep(&amp;dup, "|").
As a result when it calls kfree(dup), the dup variable contains NULL.

Found by Linux Driver Verification project (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48864" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48864" ref_url="https://www.suse.com/security/cve/CVE-2022-48864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command

When control vq receives a VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command
request from the driver, presently there is no validation against the
number of queue pairs to configure, or even if multiqueue had been
negotiated or not is unverified. This may lead to kernel panic due to
uninitialized resource for the queues were there any bogus request
sent down by untrusted driver. Tie up the loose ends there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48864/">CVE-2022-48864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48864">CVE-2022-48864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228011">SUSE bug 1228011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48865" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48865" ref_url="https://www.suse.com/security/cve/CVE-2022-48865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix kernel panic when enabling bearer

When enabling a bearer on a node, a kernel panic is observed:

[    4.498085] RIP: 0010:tipc_mon_prep+0x4e/0x130 [tipc]
...
[    4.520030] Call Trace:
[    4.520689]  &lt;IRQ&gt;
[    4.521236]  tipc_link_build_proto_msg+0x375/0x750 [tipc]
[    4.522654]  tipc_link_build_state_msg+0x48/0xc0 [tipc]
[    4.524034]  __tipc_node_link_up+0xd7/0x290 [tipc]
[    4.525292]  tipc_rcv+0x5da/0x730 [tipc]
[    4.526346]  ? __netif_receive_skb_core+0xb7/0xfc0
[    4.527601]  tipc_l2_rcv_msg+0x5e/0x90 [tipc]
[    4.528737]  __netif_receive_skb_list_core+0x20b/0x260
[    4.530068]  netif_receive_skb_list_internal+0x1bf/0x2e0
[    4.531450]  ? dev_gro_receive+0x4c2/0x680
[    4.532512]  napi_complete_done+0x6f/0x180
[    4.533570]  virtnet_poll+0x29c/0x42e [virtio_net]
...

The node in question is receiving activate messages in another
thread after changing bearer status to allow message sending/
receiving in current thread:

         thread 1           |              thread 2
         --------           |              --------
                            |
tipc_enable_bearer()        |
  test_and_set_bit_lock()   |
    tipc_bearer_xmit_skb()  |
                            | tipc_l2_rcv_msg()
                            |   tipc_rcv()
                            |     __tipc_node_link_up()
                            |       tipc_link_build_state_msg()
                            |         tipc_link_build_proto_msg()
                            |           tipc_mon_prep()
                            |           {
                            |             ...
                            |             // null-pointer dereference
                            |             u16 gen = mon-&gt;dom_gen;
                            |             ...
                            |           }
  // Not being executed yet |
  tipc_mon_create()         |
  {                         |
    ...                     |
    // allocate             |
    mon = kzalloc();        |
    ...                     |
  }                         |

Monitoring pointer in thread 2 is dereferenced before monitoring data
is allocated in thread 1. This causes kernel panic.

This commit fixes it by allocating the monitoring data before enabling
the bearer to receive messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48865/">CVE-2022-48865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48865">CVE-2022-48865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228065">SUSE bug 1228065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts

Syzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug.
The root case is in missing validation check of actual number of endpoints.

Code should not blindly access usb_host_interface::endpoint array, since
it may contain less endpoints than code expects.

Fix it by adding missing validaion check and print an error if
number of endpoints do not match expected number
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228785">SUSE bug 1228785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48867" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48867" ref_url="https://www.suse.com/security/cve/CVE-2022-48867" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Prevent use after free on completion memory

On driver unload any pending descriptors are flushed at the
time the interrupt is freed:
idxd_dmaengine_drv_remove() -&gt;
	drv_disable_wq() -&gt;
		idxd_wq_free_irq() -&gt;
			idxd_flush_pending_descs().

If there are any descriptors present that need to be flushed this
flow triggers a "not present" page fault as below:

 BUG: unable to handle page fault for address: ff391c97c70c9040
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page

The address that triggers the fault is the address of the
descriptor that was freed moments earlier via:
drv_disable_wq()-&gt;idxd_wq_free_resources()

Fix the use after free by freeing the descriptors after any possible
usage. This is done after idxd_wq_reset() to ensure that the memory
remains accessible during possible completion writes by the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-15"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48867/">CVE-2022-48867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48867">CVE-2022-48867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229505">SUSE bug 1229505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48868" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Let probe fail when workqueue cannot be enabled

The workqueue is enabled when the appropriate driver is loaded and
disabled when the driver is removed. When the driver is removed it
assumes that the workqueue was enabled successfully and proceeds to
free allocations made during workqueue enabling.

Failure during workqueue enabling does not prevent the driver from
being loaded. This is because the error path within drv_enable_wq()
returns success unless a second failure is encountered
during the error path. By returning success it is possible to load
the driver even if the workqueue cannot be enabled and
allocations that do not exist are attempted to be freed during
driver remove.

Some examples of problematic flows:
(a)

 idxd_dmaengine_drv_probe() -&gt; drv_enable_wq() -&gt; idxd_wq_request_irq():
 In above flow, if idxd_wq_request_irq() fails then
 idxd_wq_unmap_portal() is called on error exit path, but
 drv_enable_wq() returns 0 because idxd_wq_disable() succeeds. The
 driver is thus loaded successfully.

 idxd_dmaengine_drv_remove()-&gt;drv_disable_wq()-&gt;idxd_wq_unmap_portal()
 Above flow on driver unload triggers the WARN in devm_iounmap() because
 the device resource has already been removed during error path of
 drv_enable_wq().

(b)

 idxd_dmaengine_drv_probe() -&gt; drv_enable_wq() -&gt; idxd_wq_request_irq():
 In above flow, if idxd_wq_request_irq() fails then
 idxd_wq_init_percpu_ref() is never called to initialize the percpu
 counter, yet the driver loads successfully because drv_enable_wq()
 returns 0.

 idxd_dmaengine_drv_remove()-&gt;__idxd_wq_quiesce()-&gt;percpu_ref_kill():
 Above flow on driver unload triggers a BUG when attempting to drop the
 initial ref of the uninitialized percpu ref:
 BUG: kernel NULL pointer dereference, address: 0000000000000010

Fix the drv_enable_wq() error path by returning the original error that
indicates failure of workqueue enabling. This ensures that the probe
fails when an error is encountered and the driver remove paths are only
attempted when the workqueue was enabled successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadgetfs: Fix race between mounting and unmounting

The syzbot fuzzer and Gerald Lee have identified a use-after-free bug
in the gadgetfs driver, involving processes concurrently mounting and
unmounting the gadgetfs filesystem.  In particular, gadgetfs_fill_super()
can race with gadgetfs_kill_sb(), causing the latter to deallocate
the_device while the former is using it.  The output from KASAN says,
in part:

BUG: KASAN: use-after-free in instrument_atomic_read_write include/linux/instrumented.h:102 [inline]
BUG: KASAN: use-after-free in atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
BUG: KASAN: use-after-free in __refcount_sub_and_test include/linux/refcount.h:272 [inline]
BUG: KASAN: use-after-free in __refcount_dec_and_test include/linux/refcount.h:315 [inline]
BUG: KASAN: use-after-free in refcount_dec_and_test include/linux/refcount.h:333 [inline]
BUG: KASAN: use-after-free in put_dev drivers/usb/gadget/legacy/inode.c:159 [inline]
BUG: KASAN: use-after-free in gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086
Write of size 4 at addr ffff8880276d7840 by task syz-executor126/18689

CPU: 0 PID: 18689 Comm: syz-executor126 Not tainted 6.1.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
...
 atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:176 [inline]
 __refcount_sub_and_test include/linux/refcount.h:272 [inline]
 __refcount_dec_and_test include/linux/refcount.h:315 [inline]
 refcount_dec_and_test include/linux/refcount.h:333 [inline]
 put_dev drivers/usb/gadget/legacy/inode.c:159 [inline]
 gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086
 deactivate_locked_super+0xa7/0xf0 fs/super.c:332
 vfs_get_super fs/super.c:1190 [inline]
 get_tree_single+0xd0/0x160 fs/super.c:1207
 vfs_get_tree+0x88/0x270 fs/super.c:1531
 vfs_fsconfig_locked fs/fsopen.c:232 [inline]

The simplest solution is to ensure that gadgetfs_fill_super() and
gadgetfs_kill_sb() are serialized by making them both acquire a new
mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48870" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: fix possible null-ptr-defer in spk_ttyio_release

Run the following tests on the qemu platform:

syzkaller:~# modprobe speakup_audptr
 input: Speakup as /devices/virtual/input/input4
 initialized device: /dev/synth, node (MAJOR 10, MINOR 125)
 speakup 3.1.6: initialized
 synth name on entry is: (null)
 synth probe

spk_ttyio_initialise_ldisc failed because tty_kopen_exclusive returned
failed (errno -16), then remove the module, we will get a null-ptr-defer
problem, as follow:

syzkaller:~# modprobe -r speakup_audptr
 releasing synth audptr
 BUG: kernel NULL pointer dereference, address: 0000000000000080
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 0 P4D 0
 Oops: 0002 [#1] PREEMPT SMP PTI
 CPU: 2 PID: 204 Comm: modprobe Not tainted 6.1.0-rc6-dirty #1
 RIP: 0010:mutex_lock+0x14/0x30
 Call Trace:
 &lt;TASK&gt;
  spk_ttyio_release+0x19/0x70 [speakup]
  synth_release.part.6+0xac/0xc0 [speakup]
  synth_remove+0x56/0x60 [speakup]
  __x64_sys_delete_module+0x156/0x250
  ? fpregs_assert_state_consistent+0x1d/0x50
  do_syscall_64+0x37/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 &lt;/TASK&gt;
 Modules linked in: speakup_audptr(-) speakup
 Dumping ftrace buffer:

in_synth-&gt;dev was not initialized during modprobe, so we add check
for in_synth-&gt;dev to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48871" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: qcom-geni-serial: fix slab-out-of-bounds on RX FIFO buffer

Driver's probe allocates memory for RX FIFO (port-&gt;rx_fifo) based on
default RX FIFO depth, e.g. 16.  Later during serial startup the
qcom_geni_serial_port_setup() updates the RX FIFO depth
(port-&gt;rx_fifo_depth) to match real device capabilities, e.g. to 32.

The RX UART handle code will read "port-&gt;rx_fifo_depth" number of words
into "port-&gt;rx_fifo" buffer, thus exceeding the bounds.  This can be
observed in certain configurations with Qualcomm Bluetooth HCI UART
device and KASAN:

  Bluetooth: hci0: QCA Product ID   :0x00000010
  Bluetooth: hci0: QCA SOC Version  :0x400a0200
  Bluetooth: hci0: QCA ROM Version  :0x00000200
  Bluetooth: hci0: QCA Patch Version:0x00000d2b
  Bluetooth: hci0: QCA controller version 0x02000200
  Bluetooth: hci0: QCA Downloading qca/htbtfw20.tlv
  bluetooth hci0: Direct firmware load for qca/htbtfw20.tlv failed with error -2
  Bluetooth: hci0: QCA Failed to request file: qca/htbtfw20.tlv (-2)
  Bluetooth: hci0: QCA Failed to download patch (-2)
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in handle_rx_uart+0xa8/0x18c
  Write of size 4 at addr ffff279347d578c0 by task swapper/0/0

  CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rt5-00350-gb2450b7e00be-dirty #26
  Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)
  Call trace:
   dump_backtrace.part.0+0xe0/0xf0
   show_stack+0x18/0x40
   dump_stack_lvl+0x8c/0xb8
   print_report+0x188/0x488
   kasan_report+0xb4/0x100
   __asan_store4+0x80/0xa4
   handle_rx_uart+0xa8/0x18c
   qcom_geni_serial_handle_rx+0x84/0x9c
   qcom_geni_serial_isr+0x24c/0x760
   __handle_irq_event_percpu+0x108/0x500
   handle_irq_event+0x6c/0x110
   handle_fasteoi_irq+0x138/0x2cc
   generic_handle_domain_irq+0x48/0x64

If the RX FIFO depth changes after probe, be sure to resize the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48872" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix use-after-free race condition for maps

It is possible that in between calling fastrpc_map_get() until
map-&gt;fl-&gt;lock is taken in fastrpc_free_map(), another thread can call
fastrpc_map_lookup() and get a reference to a map that is about to be
deleted.

Rewrite fastrpc_map_get() to only increase the reference count of a map
if it's non-zero. Propagate this to callers so they can know if a map is
about to be deleted.

Fixes this warning:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 5 PID: 10100 at lib/refcount.c:25 refcount_warn_saturate
...
Call trace:
 refcount_warn_saturate
 [fastrpc_map_get inlined]
 [fastrpc_map_lookup inlined]
 fastrpc_map_create
 fastrpc_internal_invoke
 fastrpc_device_ioctl
 __arm64_sys_ioctl
 invoke_syscall
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229519">SUSE bug 1229519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Don't remove map on creater_process and device_release

Do not remove the map from the list on error path in
fastrpc_init_create_process, instead call fastrpc_map_put, to avoid
use-after-free. Do not remove it on fastrpc_device_release either,
call fastrpc_map_put instead.

The fastrpc_free_map is the only proper place to remove the map.
This is called only after the reference count is 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229513">SUSE bug 1229513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48874" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48874" ref_url="https://www.suse.com/security/cve/CVE-2022-48874" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix use-after-free and race in fastrpc_map_find

Currently, there is a race window between the point when the mutex is
unlocked in fastrpc_map_lookup and the reference count increasing
(fastrpc_map_get) in fastrpc_map_find, which can also lead to
use-after-free.

So lets merge fastrpc_map_find into fastrpc_map_lookup which allows us
to both protect the maps list by also taking the &amp;fl-&gt;lock spinlock and
the reference count, since the spinlock will be released only after.
Add take_ref argument to make this suitable for all callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48874/">CVE-2022-48874 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48874">CVE-2022-48874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229514">SUSE bug 1229514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48875" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: sdata can be NULL during AMPDU start

ieee80211_tx_ba_session_handle_start() may get NULL for sdata when a
deauthentication is ongoing.

Here a trace triggering the race with the hostapd test
multi_ap_fronthaul_on_ap:

(gdb) list *drv_ampdu_action+0x46
0x8b16 is in drv_ampdu_action (net/mac80211/driver-ops.c:396).
391             int ret = -EOPNOTSUPP;
392
393             might_sleep();
394
395             sdata = get_bss_sdata(sdata);
396             if (!check_sdata_in_driver(sdata))
397                     return -EIO;
398
399             trace_drv_ampdu_action(local, sdata, params);
400

wlan0: moving STA 02:00:00:00:03:00 to state 3
wlan0: associated
wlan0: deauthenticating from 02:00:00:00:03:00 by local choice (Reason: 3=DEAUTH_LEAVING)
wlan3.sta1: Open BA session requested for 02:00:00:00:00:00 tid 0
wlan3.sta1: dropped frame to 02:00:00:00:00:00 (unauthorized port)
wlan0: moving STA 02:00:00:00:03:00 to state 2
wlan0: moving STA 02:00:00:00:03:00 to state 1
wlan0: Removed STA 02:00:00:00:03:00
wlan0: Destroyed STA 02:00:00:00:03:00
BUG: unable to handle page fault for address: fffffffffffffb48
PGD 11814067 P4D 11814067 PUD 11816067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 2 PID: 133397 Comm: kworker/u16:1 Tainted: G        W          6.1.0-rc8-wt+ #59
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
Workqueue: phy3 ieee80211_ba_session_work [mac80211]
RIP: 0010:drv_ampdu_action+0x46/0x280 [mac80211]
Code: 53 48 89 f3 be 89 01 00 00 e8 d6 43 bf ef e8 21 46 81 f0 83 bb a0 1b 00 00 04 75 0e 48 8b 9b 28 0d 00 00 48 81 eb 10 0e 00 00 &lt;8b&gt; 93 58 09 00 00 f6 c2 20 0f 84 3b 01 00 00 8b 05 dd 1c 0f 00 85
RSP: 0018:ffffc900025ebd20 EFLAGS: 00010287
RAX: 0000000000000000 RBX: fffffffffffff1f0 RCX: ffff888102228240
RDX: 0000000080000000 RSI: ffffffff918c5de0 RDI: ffff888102228b40
RBP: ffffc900025ebd40 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000000 R12: ffff888118c18ec0
R13: 0000000000000000 R14: ffffc900025ebd60 R15: ffff888018b7efb8
FS:  0000000000000000(0000) GS:ffff88817a600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffffffffffb48 CR3: 0000000105228006 CR4: 0000000000170ee0
Call Trace:
 &lt;TASK&gt;
 ieee80211_tx_ba_session_handle_start+0xd0/0x190 [mac80211]
 ieee80211_ba_session_work+0xff/0x2e0 [mac80211]
 process_one_work+0x29f/0x620
 worker_thread+0x4d/0x3d0
 ? process_one_work+0x620/0x620
 kthread+0xfb/0x120
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48876" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48876" ref_url="https://www.suse.com/security/cve/CVE-2022-48876" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix initialization of rx-&gt;link and rx-&gt;link_sta

There are some codepaths that do not initialize rx-&gt;link_sta properly. This
causes a crash in places which assume that rx-&gt;link_sta is valid if rx-&gt;sta
is valid.
One known instance is triggered by __ieee80211_rx_h_amsdu being called from
fast-rx. It results in a crash like this one:

 BUG: kernel NULL pointer dereference, address: 00000000000000a8
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page PGD 0 P4D 0
 Oops: 0002 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 506 Comm: mt76-usb-rx phy Tainted: G            E      6.1.0-debian64x+1.7 #3
 Hardware name: ZOTAC ZBOX-ID92/ZBOX-IQ01/ZBOX-ID92/ZBOX-IQ01, BIOS B220P007 05/21/2014
 RIP: 0010:ieee80211_deliver_skb+0x62/0x1f0 [mac80211]
 Code: 00 48 89 04 24 e8 9e a7 c3 df 89 c0 48 03 1c c5 a0 ea 39 a1 4c 01 6b 08 48 ff 03 48
       83 7d 28 00 74 11 48 8b 45 30 48 63 55 44 &lt;48&gt; 83 84 d0 a8 00 00 00 01 41 8b 86 c0
       11 00 00 8d 50 fd 83 fa 01
 RSP: 0018:ffff999040803b10 EFLAGS: 00010286
 RAX: 0000000000000000 RBX: ffffb9903f496480 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffff999040803ce0 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d21828ac900
 R13: 000000000000004a R14: ffff8d2198ed89c0 R15: ffff8d2198ed8000
 FS:  0000000000000000(0000) GS:ffff8d24afe80000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00000000000000a8 CR3: 0000000429810002 CR4: 00000000001706e0
 Call Trace:
  &lt;TASK&gt;
  __ieee80211_rx_h_amsdu+0x1b5/0x240 [mac80211]
  ? ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]
  ? __local_bh_enable_ip+0x3b/0xa0
  ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]
  ? prepare_transfer+0x109/0x1a0 [xhci_hcd]
  ieee80211_rx_list+0xa80/0xda0 [mac80211]
  mt76_rx_complete+0x207/0x2e0 [mt76]
  mt76_rx_poll_complete+0x357/0x5a0 [mt76]
  mt76u_rx_worker+0x4f5/0x600 [mt76_usb]
  ? mt76_get_min_avg_rssi+0x140/0x140 [mt76]
  __mt76_worker_fn+0x50/0x80 [mt76]
  kthread+0xed/0x120
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x22/0x30

Since the initialization of rx-&gt;link and rx-&gt;link_sta is rather convoluted
and duplicated in many places, clean it up by using a helper function to
set it.

[remove unnecessary rx-&gt;sta-&gt;sta.mlo check]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48876/">CVE-2022-48876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48876">CVE-2022-48876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229511">SUSE bug 1229511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48877" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48877" ref_url="https://www.suse.com/security/cve/CVE-2022-48877" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: let's avoid panic if extent_tree is not created

This patch avoids the below panic.

pc : __lookup_extent_tree+0xd8/0x760
lr : f2fs_do_write_data_page+0x104/0x87c
sp : ffffffc010cbb3c0
x29: ffffffc010cbb3e0 x28: 0000000000000000
x27: ffffff8803e7f020 x26: ffffff8803e7ed40
x25: ffffff8803e7f020 x24: ffffffc010cbb460
x23: ffffffc010cbb480 x22: 0000000000000000
x21: 0000000000000000 x20: ffffffff22e90900
x19: 0000000000000000 x18: ffffffc010c5d080
x17: 0000000000000000 x16: 0000000000000020
x15: ffffffdb1acdbb88 x14: ffffff888759e2b0
x13: 0000000000000000 x12: ffffff802da49000
x11: 000000000a001200 x10: ffffff8803e7ed40
x9 : ffffff8023195800 x8 : ffffff802da49078
x7 : 0000000000000001 x6 : 0000000000000000
x5 : 0000000000000006 x4 : ffffffc010cbba28
x3 : 0000000000000000 x2 : ffffffc010cbb480
x1 : 0000000000000000 x0 : ffffff8803e7ed40
Call trace:
 __lookup_extent_tree+0xd8/0x760
 f2fs_do_write_data_page+0x104/0x87c
 f2fs_write_single_data_page+0x420/0xb60
 f2fs_write_cache_pages+0x418/0xb1c
 __f2fs_write_data_pages+0x428/0x58c
 f2fs_write_data_pages+0x30/0x40
 do_writepages+0x88/0x190
 __writeback_single_inode+0x48/0x448
 writeback_sb_inodes+0x468/0x9e8
 __writeback_inodes_wb+0xb8/0x2a4
 wb_writeback+0x33c/0x740
 wb_do_writeback+0x2b4/0x400
 wb_workfn+0xe4/0x34c
 process_one_work+0x24c/0x5bc
 worker_thread+0x3e8/0xa50
 kthread+0x150/0x1b4
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48877/">CVE-2022-48877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48877">CVE-2022-48877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229517">SUSE bug 1229517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_qca: Fix driver shutdown on closed serdev

The driver shutdown callback (which sends EDL_SOC_RESET to the device
over serdev) should not be invoked when HCI device is not open (e.g. if
hci_dev_open_sync() failed), because the serdev and its TTY are not open
either.  Also skip this step if device is powered off
(qca_power_shutdown()).

The shutdown callback causes use-after-free during system reboot with
Qualcomm Atheros Bluetooth:

  Unable to handle kernel paging request at virtual address
  0072662f67726fd7
  ...
  CPU: 6 PID: 1 Comm: systemd-shutdow Tainted: G        W
  6.1.0-rt5-00325-g8a5f56bcfcca #8
  Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)
  Call trace:
   tty_driver_flush_buffer+0x4/0x30
   serdev_device_write_flush+0x24/0x34
   qca_serdev_shutdown+0x80/0x130 [hci_uart]
   device_shutdown+0x15c/0x260
   kernel_restart+0x48/0xac

KASAN report:

  BUG: KASAN: use-after-free in tty_driver_flush_buffer+0x1c/0x50
  Read of size 8 at addr ffff16270c2e0018 by task systemd-shutdow/1

  CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted
  6.1.0-next-20221220-00014-gb85aaf97fb01-dirty #28
  Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT)
  Call trace:
   dump_backtrace.part.0+0xdc/0xf0
   show_stack+0x18/0x30
   dump_stack_lvl+0x68/0x84
   print_report+0x188/0x488
   kasan_report+0xa4/0xf0
   __asan_load8+0x80/0xac
   tty_driver_flush_buffer+0x1c/0x50
   ttyport_write_flush+0x34/0x44
   serdev_device_write_flush+0x48/0x60
   qca_serdev_shutdown+0x124/0x274
   device_shutdown+0x1e8/0x350
   kernel_restart+0x48/0xb0
   __do_sys_reboot+0x244/0x2d0
   __arm64_sys_reboot+0x54/0x70
   invoke_syscall+0x60/0x190
   el0_svc_common.constprop.0+0x7c/0x160
   do_el0_svc+0x44/0xf0
   el0_svc+0x2c/0x6c
   el0t_64_sync_handler+0xbc/0x140
   el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: fix NULL-deref in init error path

In cases where runtime services are not supported or have been disabled,
the runtime services workqueue will never have been allocated.

Do not try to destroy the workqueue unconditionally in the unlikely
event that EFI initialisation fails to avoid dereferencing a NULL
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48880" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/surface: aggregator: Add missing call to ssam_request_sync_free()

Although rare, ssam_request_sync_init() can fail. In that case, the
request should be freed via ssam_request_sync_free(). Currently it is
leaked instead. Fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48881" ref_url="https://www.suse.com/security/cve/CVE-2022-48881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: Fix refcount leak in amd_pmc_probe

pci_get_domain_bus_and_slot() takes reference, the caller should release
the reference by calling pci_dev_put() after use. Call pci_dev_put() in
the error path to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48881/">CVE-2022-48881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48881">CVE-2022-48881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229559">SUSE bug 1229559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48882" ref_url="https://www.suse.com/security/cve/CVE-2022-48882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)

Upon updating MAC security entity (SecY) in hw offload path, the macsec
security association (SA) initialization routine is called. In case of
extended packet number (epn) is enabled the salt and ssci attributes are
retrieved using the MACsec driver rx_sa context which is unavailable when
updating a SecY property such as encoding-sa hence the null dereference.
Fix by using the provided SA to set those attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48882/">CVE-2022-48882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48882">CVE-2022-48882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229558">SUSE bug 1229558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent

A user is able to configure an arbitrary number of rx queues when
creating an interface via netlink. This doesn't work for child PKEY
interfaces because the child interface uses the parent receive channels.

Although the child shares the parent's receive channels, the number of
rx queues is important for the channel_stats array: the parent's rx
channel index is used to access the child's channel_stats. So the array
has to be at least as large as the parent's rx queue size for the
counting to work correctly and to prevent out of bound accesses.

This patch checks for the mentioned scenario and returns an error when
trying to create the interface. The error is propagated to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229560">SUSE bug 1229560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229561">SUSE bug 1229561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48884" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix command stats access after free

Command may fail while driver is reloading and can't accept FW commands
till command interface is reinitialized. Such command failure is being
logged to command stats. This results in NULL pointer access as command
stats structure is being freed and reallocated during mlx5 devlink
reload (see kernel log below).

Fix it by making command stats statically allocated on driver probe.

Kernel log:
[ 2394.808802] BUG: unable to handle kernel paging request at 000000000002a9c0
[ 2394.810610] PGD 0 P4D 0
[ 2394.811811] Oops: 0002 [#1] SMP NOPTI
...
[ 2394.815482] RIP: 0010:native_queued_spin_lock_slowpath+0x183/0x1d0
...
[ 2394.829505] Call Trace:
[ 2394.830667]  _raw_spin_lock_irq+0x23/0x26
[ 2394.831858]  cmd_status_err+0x55/0x110 [mlx5_core]
[ 2394.833020]  mlx5_access_reg+0xe7/0x150 [mlx5_core]
[ 2394.834175]  mlx5_query_port_ptys+0x78/0xa0 [mlx5_core]
[ 2394.835337]  mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core]
[ 2394.836454]  ? kmem_cache_alloc_trace+0x140/0x1c0
[ 2394.837562]  __rh_call_get_link_ksettings+0x33/0x100
[ 2394.838663]  ? __rtnl_unlock+0x25/0x50
[ 2394.839755]  __ethtool_get_link_ksettings+0x72/0x150
[ 2394.840862]  duplex_show+0x6e/0xc0
[ 2394.841963]  dev_attr_show+0x1c/0x40
[ 2394.843048]  sysfs_kf_seq_show+0x9b/0x100
[ 2394.844123]  seq_read+0x153/0x410
[ 2394.845187]  vfs_read+0x91/0x140
[ 2394.846226]  ksys_read+0x4f/0xb0
[ 2394.847234]  do_syscall_64+0x5b/0x1a0
[ 2394.848228]  entry_SYSCALL_64_after_hwframe+0x65/0xca
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229562">SUSE bug 1229562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229563">SUSE bug 1229563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix potential memory leak in ice_gnss_tty_write()

The ice_gnss_tty_write() return directly if the write_buf alloc failed,
leaking the cmd_buf.

Fix by free cmd_buf if write_buf alloc failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229564">SUSE bug 1229564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48886" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48886" ref_url="https://www.suse.com/security/cve/CVE-2022-48886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Add check for kzalloc

Add the check for the return value of kzalloc in order to avoid
NULL pointer dereference.
Moreover, use the goto-label to share the clean code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48886/">CVE-2022-48886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48886">CVE-2022-48886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229548">SUSE bug 1229548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48887" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48887" ref_url="https://www.suse.com/security/cve/CVE-2022-48887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Remove rcu locks from user resources

User resource lookups used rcu to avoid two extra atomics. Unfortunately
the rcu paths were buggy and it was easy to make the driver crash by
submitting command buffers from two different threads. Because the
lookups never show up in performance profiles replace them with a
regular spin lock which fixes the races in accesses to those shared
resources.

Fixes kernel oops'es in IGT's vmwgfx execution_buffer stress test and
seen crashes with apps using shared resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48887/">CVE-2022-48887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48887">CVE-2022-48887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229547">SUSE bug 1229547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48888" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48888" ref_url="https://www.suse.com/security/cve/CVE-2022-48888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Fix memory leak in msm_mdss_parse_data_bus_icc_path

of_icc_get() alloc resources for path1, we should release it when not
need anymore. Early return when IS_ERR_OR_NULL(path0) may leak path1.
Defer getting path1 to fix this.

Patchwork: https://patchwork.freedesktop.org/patch/514264/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48888/">CVE-2022-48888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48888">CVE-2022-48888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229546">SUSE bug 1229546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48889" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48889" ref_url="https://www.suse.com/security/cve/CVE-2022-48889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof-nau8825: fix module alias overflow

The maximum name length for a platform_device_id entry is 20 characters
including the trailing NUL byte. The sof_nau8825.c file exceeds that,
which causes an obscure error message:

sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: illegal character encoding in string literal [-Werror,-Winvalid-source-encoding]
MODULE_ALIAS("platform:adl_max98373_nau8825&lt;U+0018&gt;&lt;AA&gt;");
                                                   ^~~~
include/linux/module.h:168:49: note: expanded from macro 'MODULE_ALIAS'
                                                ^~~~~~
include/linux/module.h:165:56: note: expanded from macro 'MODULE_INFO'
                                                       ^~~~
include/linux/moduleparam.h:26:47: note: expanded from macro '__MODULE_INFO'
                = __MODULE_INFO_PREFIX __stringify(tag) "=" info

I could not figure out how to make the module handling robust enough
to handle this better, but as a quick fix, using slightly shorter
names that are still unique avoids the build issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48889/">CVE-2022-48889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48889">CVE-2022-48889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229545">SUSE bug 1229545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48890" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM

storvsc_queuecommand() maps the scatter/gather list using scsi_dma_map(),
which in a confidential VM allocates swiotlb bounce buffers. If the I/O
submission fails in storvsc_do_io(), the I/O is typically retried by higher
level code, but the bounce buffer memory is never freed.  The mostly like
cause of I/O submission failure is a full VMBus channel ring buffer, which
is not uncommon under high I/O loads.  Eventually enough bounce buffer
memory leaks that the confidential VM can't do any I/O. The same problem
can arise in a non-confidential VM with kernel boot parameter
swiotlb=force.

Fix this by doing scsi_dma_unmap() in the case of an I/O submission
error, which frees the bounce buffer memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48891" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: da9211: Use irq handler when ready

If the system does not come from reset (like when it is kexec()), the
regulator might have an IRQ waiting for us.

If we enable the IRQ handler before its structures are ready, we crash.

This patch fixes:

[    1.141839] Unable to handle kernel read from unreadable memory at virtual address 0000000000000078
[    1.316096] Call trace:
[    1.316101]  blocking_notifier_call_chain+0x20/0xa8
[    1.322757] cpu cpu0: dummy supplies not allowed for exclusive requests
[    1.327823]  regulator_notifier_call_chain+0x1c/0x2c
[    1.327825]  da9211_irq_handler+0x68/0xf8
[    1.327829]  irq_thread+0x11c/0x234
[    1.327833]  kthread+0x13c/0x154
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48892" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48892" ref_url="https://www.suse.com/security/cve/CVE-2022-48892" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/core: Fix use-after-free bug in dup_user_cpus_ptr()

Since commit 07ec77a1d4e8 ("sched: Allow task CPU affinity to be
restricted on asymmetric systems"), the setting and clearing of
user_cpus_ptr are done under pi_lock for arm64 architecture. However,
dup_user_cpus_ptr() accesses user_cpus_ptr without any lock
protection. Since sched_setaffinity() can be invoked from another
process, the process being modified may be undergoing fork() at
the same time.  When racing with the clearing of user_cpus_ptr in
__set_cpus_allowed_ptr_locked(), it can lead to user-after-free and
possibly double-free in arm64 kernel.

Commit 8f9ea86fdf99 ("sched: Always preserve the user requested
cpumask") fixes this problem as user_cpus_ptr, once set, will never
be cleared in a task's lifetime. However, this bug was re-introduced
in commit 851a723e45d1 ("sched: Always clear user_cpus_ptr in
do_set_cpus_allowed()") which allows the clearing of user_cpus_ptr in
do_set_cpus_allowed(). This time, it will affect all arches.

Fix this bug by always clearing the user_cpus_ptr of the newly
cloned/forked task before the copying process starts and check the
user_cpus_ptr state of the source task under pi_lock.

Note to stable, this patch won't be applicable to stable releases.
Just copy the new dup_user_cpus_ptr() function over.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48892/">CVE-2022-48892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48892">CVE-2022-48892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229543">SUSE bug 1229543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48893" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48893" ref_url="https://www.suse.com/security/cve/CVE-2022-48893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Cleanup partial engine discovery failures

If we abort driver initialisation in the middle of gt/engine discovery,
some engines will be fully setup and some not. Those incompletely setup
engines only have 'engine-&gt;release == NULL' and so will leak any of the
common objects allocated.

v2:
 - Drop the destroy_pinned_context() helper for now.  It's not really
   worth it with just a single callsite at the moment.  (Janusz)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48893/">CVE-2022-48893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48893">CVE-2022-48893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229576">SUSE bug 1229576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48894" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48894" ref_url="https://www.suse.com/security/cve/CVE-2022-48894" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-v3: Don't unregister on shutdown

Similar to SMMUv2, this driver calls iommu_device_unregister() from the
shutdown path, which removes the IOMMU groups with no coordination
whatsoever with their users - shutdown methods are optional in device
drivers. This can lead to NULL pointer dereferences in those drivers'
DMA API calls, or worse.

Instead of calling the full arm_smmu_device_remove() from
arm_smmu_device_shutdown(), let's pick only the relevant function call -
arm_smmu_device_disable() - more or less the reverse of
arm_smmu_device_reset() - and call just that from the shutdown path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48894/">CVE-2022-48894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48894">CVE-2022-48894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229542">SUSE bug 1229542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48895" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48895" ref_url="https://www.suse.com/security/cve/CVE-2022-48895" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu: Don't unregister on shutdown

Michael Walle says he noticed the following stack trace while performing
a shutdown with "reboot -f". He suggests he got "lucky" and just hit the
correct spot for the reboot while there was a packet transmission in
flight.

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098
CPU: 0 PID: 23 Comm: kworker/0:1 Not tainted 6.1.0-rc5-00088-gf3600ff8e322 #1930
Hardware name: Kontron KBox A-230-LS (DT)
pc : iommu_get_dma_domain+0x14/0x20
lr : iommu_dma_map_page+0x9c/0x254
Call trace:
 iommu_get_dma_domain+0x14/0x20
 dma_map_page_attrs+0x1ec/0x250
 enetc_start_xmit+0x14c/0x10b0
 enetc_xmit+0x60/0xdc
 dev_hard_start_xmit+0xb8/0x210
 sch_direct_xmit+0x11c/0x420
 __dev_queue_xmit+0x354/0xb20
 ip6_finish_output2+0x280/0x5b0
 __ip6_finish_output+0x15c/0x270
 ip6_output+0x78/0x15c
 NF_HOOK.constprop.0+0x50/0xd0
 mld_sendpack+0x1bc/0x320
 mld_ifc_work+0x1d8/0x4dc
 process_one_work+0x1e8/0x460
 worker_thread+0x178/0x534
 kthread+0xe0/0xe4
 ret_from_fork+0x10/0x20
Code: d503201f f9416800 d503233f d50323bf (f9404c00)
---[ end trace 0000000000000000 ]---
Kernel panic - not syncing: Oops: Fatal exception in interrupt

This appears to be reproducible when the board has a fixed IP address,
is ping flooded from another host, and "reboot -f" is used.

The following is one more manifestation of the issue:

$ reboot -f
kvm: exiting hardware virtualization
cfg80211: failed to load regulatory.db
arm-smmu 5000000.iommu: disabling translation
sdhci-esdhc 2140000.mmc: Removing from iommu group 11
sdhci-esdhc 2150000.mmc: Removing from iommu group 12
fsl-edma 22c0000.dma-controller: Removing from iommu group 17
dwc3 3100000.usb: Removing from iommu group 9
dwc3 3110000.usb: Removing from iommu group 10
ahci-qoriq 3200000.sata: Removing from iommu group 2
fsl-qdma 8380000.dma-controller: Removing from iommu group 20
platform f080000.display: Removing from iommu group 0
etnaviv-gpu f0c0000.gpu: Removing from iommu group 1
etnaviv etnaviv: Removing from iommu group 1
caam_jr 8010000.jr: Removing from iommu group 13
caam_jr 8020000.jr: Removing from iommu group 14
caam_jr 8030000.jr: Removing from iommu group 15
caam_jr 8040000.jr: Removing from iommu group 16
fsl_enetc 0000:00:00.0: Removing from iommu group 4
arm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with "arm-smmu.disable_bypass=0" to allow, but this may have security implications
arm-smmu 5000000.iommu:         GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000
fsl_enetc 0000:00:00.1: Removing from iommu group 5
arm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with "arm-smmu.disable_bypass=0" to allow, but this may have security implications
arm-smmu 5000000.iommu:         GFSR 0x80000002, GFSYNR0 0x00000002, GFSYNR1 0x00000429, GFSYNR2 0x00000000
arm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with "arm-smmu.disable_bypass=0" to allow, but this may have security implications
arm-smmu 5000000.iommu:         GFSR 0x80000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000
fsl_enetc 0000:00:00.2: Removing from iommu group 6
fsl_enetc_mdio 0000:00:00.3: Removing from iommu group 8
mscc_felix 0000:00:00.5: Removing from iommu group 3
fsl_enetc 0000:00:00.6: Removing from iommu group 7
pcieport 0001:00:00.0: Removing from iommu group 18
arm-smmu 5000000.iommu: Blocked unknown Stream ID 0x429; boot with "arm-smmu.disable_bypass=0" to allow, but this may have security implications
arm-smmu 5000000.iommu:         GFSR 0x00000002, GFSYNR0 0x00000000, GFSYNR1 0x00000429, GFSYNR2 0x00000000
pcieport 0002:00:00.0: Removing from iommu group 19
Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a8
pc : iommu_get_dma_domain+0x14/0x20
lr : iommu_dma_unmap_page+0x38/0xe0
Call trace:
 iommu_get_dma_domain+0x14/0x20
 dma_unmap_page_attrs+0x38/0x1d0
 en
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48895/">CVE-2022-48895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48895">CVE-2022-48895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229541">SUSE bug 1229541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48896" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix pci device refcount leak

As the comment of pci_get_domain_bus_and_slot() says, it
returns a PCI device with refcount incremented, when finish
using it, the caller must decrement the reference count by
calling pci_dev_put().

In ixgbe_get_first_secondary_devfn() and ixgbe_x550em_a_has_mii(),
pci_dev_put() is called to avoid leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48897" ref_url="https://www.suse.com/security/cve/CVE-2022-48897" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/mm: fix incorrect file_map_count for invalid pmd

The page table check trigger BUG_ON() unexpectedly when split hugepage:

 ------------[ cut here ]------------
 kernel BUG at mm/page_table_check.c:119!
 Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
 Dumping ftrace buffer:
    (ftrace buffer empty)
 Modules linked in:
 CPU: 7 PID: 210 Comm: transhuge-stres Not tainted 6.1.0-rc3+ #748
 Hardware name: linux,dummy-virt (DT)
 pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : page_table_check_set.isra.0+0x398/0x468
 lr : page_table_check_set.isra.0+0x1c0/0x468
[...]
 Call trace:
  page_table_check_set.isra.0+0x398/0x468
  __page_table_check_pte_set+0x160/0x1c0
  __split_huge_pmd_locked+0x900/0x1648
  __split_huge_pmd+0x28c/0x3b8
  unmap_page_range+0x428/0x858
  unmap_single_vma+0xf4/0x1c8
  zap_page_range+0x2b0/0x410
  madvise_vma_behavior+0xc44/0xe78
  do_madvise+0x280/0x698
  __arm64_sys_madvise+0x90/0xe8
  invoke_syscall.constprop.0+0xdc/0x1d8
  do_el0_svc+0xf4/0x3f8
  el0_svc+0x58/0x120
  el0t_64_sync_handler+0xb8/0xc0
  el0t_64_sync+0x19c/0x1a0
[...]

On arm64, pmd_leaf() will return true even if the pmd is invalid due to
pmd_present_invalid() check. So in pmdp_invalidate() the file_map_count
will not only decrease once but also increase once. Then in set_pte_at(),
the file_map_count increase again, and so trigger BUG_ON() unexpectedly.

Add !pmd_present_invalid() check in pmd_user_accessible_page() to fix the
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48897/">CVE-2022-48897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48897">CVE-2022-48897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229538">SUSE bug 1229538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48898" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dp: do not complete dp_aux_cmd_fifo_tx() if irq is not for aux transfer

There are 3 possible interrupt sources are handled by DP controller,
HPDstatus, Controller state changes and Aux read/write transaction.
At every irq, DP controller have to check isr status of every interrupt
sources and service the interrupt if its isr status bits shows interrupts
are pending. There is potential race condition may happen at current aux
isr handler implementation since it is always complete dp_aux_cmd_fifo_tx()
even irq is not for aux read or write transaction. This may cause aux read
transaction return premature if host aux data read is in the middle of
waiting for sink to complete transferring data to host while irq happen.
This will cause host's receiving buffer contains unexpected data. This
patch fixes this problem by checking aux isr and return immediately at
aux isr handler if there are no any isr status bits set.

Current there is a bug report regrading eDP edid corruption happen during
system booting up. After lengthy debugging to found that VIDEO_READY
interrupt was continuously firing during system booting up which cause
dp_aux_isr() to complete dp_aux_cmd_fifo_tx() prematurely to retrieve data
from aux hardware buffer which is not yet contains complete data transfer
from sink. This cause edid corruption.

Follows are the signature at kernel logs when problem happen,
EDID has corrupt header
panel-simple-dp-aux aux-aea0000.edp: Couldn't identify panel via EDID

Changes in v2:
-- do complete if (ret == IRQ_HANDLED) ay dp-aux_isr()
-- add more commit text

Changes in v3:
-- add Stephen suggested
-- dp_aux_isr() return IRQ_XXX back to caller
-- dp_ctrl_isr() return IRQ_XXX back to caller

Changes in v4:
-- split into two patches

Changes in v5:
-- delete empty line between tags

Changes in v6:
-- remove extra "that" and fixed line more than 75 char at commit text

Patchwork: https://patchwork.freedesktop.org/patch/516121/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48899" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/virtio: Fix GEM handle creation UAF

Userspace can guess the handle value and try to race GEM object creation
with handle close, resulting in a use-after-free if we dereference the
object after dropping the handle's reference.  For that reason, dropping
the handle's reference must be done *after* we are done dereferencing
the object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48901" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48901" ref_url="https://www.suse.com/security/cve/CVE-2022-48901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not start relocation until in progress drops are done

We hit a bug with a recovering relocation on mount for one of our file
systems in production.  I reproduced this locally by injecting errors
into snapshot delete with balance running at the same time.  This
presented as an error while looking up an extent item

  WARNING: CPU: 5 PID: 1501 at fs/btrfs/extent-tree.c:866 lookup_inline_extent_backref+0x647/0x680
  CPU: 5 PID: 1501 Comm: btrfs-balance Not tainted 5.16.0-rc8+ #8
  RIP: 0010:lookup_inline_extent_backref+0x647/0x680
  RSP: 0018:ffffae0a023ab960 EFLAGS: 00010202
  RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000000000
  RBP: ffff943fd2a39b60 R08: 0000000000000000 R09: 0000000000000001
  R10: 0001434088152de0 R11: 0000000000000000 R12: 0000000001d05000
  R13: ffff943fd2a39b60 R14: ffff943fdb96f2a0 R15: ffff9442fc923000
  FS:  0000000000000000(0000) GS:ffff944e9eb40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f1157b1fca8 CR3: 000000010f092000 CR4: 0000000000350ee0
  Call Trace:
   &lt;TASK&gt;
   insert_inline_extent_backref+0x46/0xd0
   __btrfs_inc_extent_ref.isra.0+0x5f/0x200
   ? btrfs_merge_delayed_refs+0x164/0x190
   __btrfs_run_delayed_refs+0x561/0xfa0
   ? btrfs_search_slot+0x7b4/0xb30
   ? btrfs_update_root+0x1a9/0x2c0
   btrfs_run_delayed_refs+0x73/0x1f0
   ? btrfs_update_root+0x1a9/0x2c0
   btrfs_commit_transaction+0x50/0xa50
   ? btrfs_update_reloc_root+0x122/0x220
   prepare_to_merge+0x29f/0x320
   relocate_block_group+0x2b8/0x550
   btrfs_relocate_block_group+0x1a6/0x350
   btrfs_relocate_chunk+0x27/0xe0
   btrfs_balance+0x777/0xe60
   balance_kthread+0x35/0x50
   ? btrfs_balance+0xe60/0xe60
   kthread+0x16b/0x190
   ? set_kthread_struct+0x40/0x40
   ret_from_fork+0x22/0x30
   &lt;/TASK&gt;

Normally snapshot deletion and relocation are excluded from running at
the same time by the fs_info-&gt;cleaner_mutex.  However if we had a
pending balance waiting to get the -&gt;cleaner_mutex, and a snapshot
deletion was running, and then the box crashed, we would come up in a
state where we have a half deleted snapshot.

Again, in the normal case the snapshot deletion needs to complete before
relocation can start, but in this case relocation could very well start
before the snapshot deletion completes, as we simply add the root to the
dead roots list and wait for the next time the cleaner runs to clean up
the snapshot.

Fix this by setting a bit on the fs_info if we have any DEAD_ROOT's that
had a pending drop_progress key.  If they do then we know we were in the
middle of the drop operation and set a flag on the fs_info.  Then
balance can wait until this flag is cleared to start up again.

If there are DEAD_ROOT's that don't have a drop_progress set then we're
safe to start balance right away as we'll be properly protected by the
cleaner_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48901/">CVE-2022-48901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48901">CVE-2022-48901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229607">SUSE bug 1229607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48902" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48902" ref_url="https://www.suse.com/security/cve/CVE-2022-48902" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not WARN_ON() if we have PageError set

Whenever we do any extent buffer operations we call
assert_eb_page_uptodate() to complain loudly if we're operating on an
non-uptodate page.  Our overnight tests caught this warning earlier this
week

  WARNING: CPU: 1 PID: 553508 at fs/btrfs/extent_io.c:6849 assert_eb_page_uptodate+0x3f/0x50
  CPU: 1 PID: 553508 Comm: kworker/u4:13 Tainted: G        W         5.17.0-rc3+ #564
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014
  Workqueue: btrfs-cache btrfs_work_helper
  RIP: 0010:assert_eb_page_uptodate+0x3f/0x50
  RSP: 0018:ffffa961440a7c68 EFLAGS: 00010246
  RAX: 0017ffffc0002112 RBX: ffffe6e74453f9c0 RCX: 0000000000001000
  RDX: ffffe6e74467c887 RSI: ffffe6e74453f9c0 RDI: ffff8d4c5efc2fc0
  RBP: 0000000000000d56 R08: ffff8d4d4a224000 R09: 0000000000000000
  R10: 00015817fa9d1ef0 R11: 000000000000000c R12: 00000000000007b1
  R13: ffff8d4c5efc2fc0 R14: 0000000001500000 R15: 0000000001cb1000
  FS:  0000000000000000(0000) GS:ffff8d4dbbd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007ff31d3448d8 CR3: 0000000118be8004 CR4: 0000000000370ee0
  Call Trace:

   extent_buffer_test_bit+0x3f/0x70
   free_space_test_bit+0xa6/0xc0
   load_free_space_tree+0x1f6/0x470
   caching_thread+0x454/0x630
   ? rcu_read_lock_sched_held+0x12/0x60
   ? rcu_read_lock_sched_held+0x12/0x60
   ? rcu_read_lock_sched_held+0x12/0x60
   ? lock_release+0x1f0/0x2d0
   btrfs_work_helper+0xf2/0x3e0
   ? lock_release+0x1f0/0x2d0
   ? finish_task_switch.isra.0+0xf9/0x3a0
   process_one_work+0x26d/0x580
   ? process_one_work+0x580/0x580
   worker_thread+0x55/0x3b0
   ? process_one_work+0x580/0x580
   kthread+0xf0/0x120
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork+0x1f/0x30

This was partially fixed by c2e39305299f01 ("btrfs: clear extent buffer
uptodate when we fail to write it"), however all that fix did was keep
us from finding extent buffers after a failed writeout.  It didn't keep
us from continuing to use a buffer that we already had found.

In this case we're searching the commit root to cache the block group,
so we can start committing the transaction and switch the commit root
and then start writing.  After the switch we can look up an extent
buffer that hasn't been written yet and start processing that block
group.  Then we fail to write that block out and clear Uptodate on the
page, and then we start spewing these errors.

Normally we're protected by the tree lock to a certain degree here.  If
we read a block we have that block read locked, and we block the writer
from locking the block before we submit it for the write.  However this
isn't necessarily fool proof because the read could happen before we do
the submit_bio and after we locked and unlocked the extent buffer.

Also in this particular case we have path-&gt;skip_locking set, so that
won't save us here.  We'll simply get a block that was valid when we
read it, but became invalid while we were using it.

What we really want is to catch the case where we've "read" a block but
it's not marked Uptodate.  On read we ClearPageError(), so if we're
!Uptodate and !Error we know we didn't do the right thing for reading
the page.

Fix this by checking !Uptodate &amp;&amp; !Error, this way we will not complain
if our buffer gets invalidated while we're using it, and we'll maintain
the spirit of the check which is to make sure we have a fully in-cache
block while we're messing with it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48902/">CVE-2022-48902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48902">CVE-2022-48902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229609">SUSE bug 1229609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix relocation crash due to premature return from btrfs_commit_transaction()

We are seeing crashes similar to the following trace:

[38.969182] WARNING: CPU: 20 PID: 2105 at fs/btrfs/relocation.c:4070 btrfs_relocate_block_group+0x2dc/0x340 [btrfs]
[38.973556] CPU: 20 PID: 2105 Comm: btrfs Not tainted 5.17.0-rc4 #54
[38.974580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[38.976539] RIP: 0010:btrfs_relocate_block_group+0x2dc/0x340 [btrfs]
[38.980336] RSP: 0000:ffffb0dd42e03c20 EFLAGS: 00010206
[38.981218] RAX: ffff96cfc4ede800 RBX: ffff96cfc3ce0000 RCX: 000000000002ca14
[38.982560] RDX: 0000000000000000 RSI: 4cfd109a0bcb5d7f RDI: ffff96cfc3ce0360
[38.983619] RBP: ffff96cfc309c000 R08: 0000000000000000 R09: 0000000000000000
[38.984678] R10: ffff96cec0000001 R11: ffffe84c80000000 R12: ffff96cfc4ede800
[38.985735] R13: 0000000000000000 R14: 0000000000000000 R15: ffff96cfc3ce0360
[38.987146] FS:  00007f11c15218c0(0000) GS:ffff96d6dfb00000(0000) knlGS:0000000000000000
[38.988662] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[38.989398] CR2: 00007ffc922c8e60 CR3: 00000001147a6001 CR4: 0000000000370ee0
[38.990279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[38.991219] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[38.992528] Call Trace:
[38.992854]  &lt;TASK&gt;
[38.993148]  btrfs_relocate_chunk+0x27/0xe0 [btrfs]
[38.993941]  btrfs_balance+0x78e/0xea0 [btrfs]
[38.994801]  ? vsnprintf+0x33c/0x520
[38.995368]  ? __kmalloc_track_caller+0x351/0x440
[38.996198]  btrfs_ioctl_balance+0x2b9/0x3a0 [btrfs]
[38.997084]  btrfs_ioctl+0x11b0/0x2da0 [btrfs]
[38.997867]  ? mod_objcg_state+0xee/0x340
[38.998552]  ? seq_release+0x24/0x30
[38.999184]  ? proc_nr_files+0x30/0x30
[38.999654]  ? call_rcu+0xc8/0x2f0
[39.000228]  ? __x64_sys_ioctl+0x84/0xc0
[39.000872]  ? btrfs_ioctl_get_supported_features+0x30/0x30 [btrfs]
[39.001973]  __x64_sys_ioctl+0x84/0xc0
[39.002566]  do_syscall_64+0x3a/0x80
[39.003011]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[39.003735] RIP: 0033:0x7f11c166959b
[39.007324] RSP: 002b:00007fff2543e998 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[39.008521] RAX: ffffffffffffffda RBX: 00007f11c1521698 RCX: 00007f11c166959b
[39.009833] RDX: 00007fff2543ea40 RSI: 00000000c4009420 RDI: 0000000000000003
[39.011270] RBP: 0000000000000003 R08: 0000000000000013 R09: 00007f11c16f94e0
[39.012581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff25440df3
[39.014046] R13: 0000000000000000 R14: 00007fff2543ea40 R15: 0000000000000001
[39.015040]  &lt;/TASK&gt;
[39.015418] ---[ end trace 0000000000000000 ]---
[43.131559] ------------[ cut here ]------------
[43.132234] kernel BUG at fs/btrfs/extent-tree.c:2717!
[43.133031] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[43.133702] CPU: 1 PID: 1839 Comm: btrfs Tainted: G        W         5.17.0-rc4 #54
[43.134863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
[43.136426] RIP: 0010:unpin_extent_range+0x37a/0x4f0 [btrfs]
[43.139913] RSP: 0000:ffffb0dd4216bc70 EFLAGS: 00010246
[43.140629] RAX: 0000000000000000 RBX: ffff96cfc34490f8 RCX: 0000000000000001
[43.141604] RDX: 0000000080000001 RSI: 0000000051d00000 RDI: 00000000ffffffff
[43.142645] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff96cfd07dca50
[43.143669] R10: ffff96cfc46e8a00 R11: fffffffffffec000 R12: 0000000041d00000
[43.144657] R13: ffff96cfc3ce0000 R14: ffffb0dd4216bd08 R15: 0000000000000000
[43.145686] FS:  00007f7657dd68c0(0000) GS:ffff96d6df640000(0000) knlGS:0000000000000000
[43.146808] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[43.147584] CR2: 00007f7fe81bf5b0 CR3: 00000001093ee004 CR4: 0000000000370ee0
[43.148589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[43.149581] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48904" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Fix I/O page table memory leak

The current logic updates the I/O page table mode for the domain
before calling the logic to free memory used for the page table.
This results in IOMMU page table memory leak, and can be observed
when launching VM w/ pass-through devices.

Fix by freeing the memory used for page table before updating the mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: free reset-work-item when flushing

Fix a tiny memory leak when flushing the reset work queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48906" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48906" ref_url="https://www.suse.com/security/cve/CVE-2022-48906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Correctly set DATA_FIN timeout when number of retransmits is large

Syzkaller with UBSAN uncovered a scenario where a large number of
DATA_FIN retransmits caused a shift-out-of-bounds in the DATA_FIN
timeout calculation:

================================================================================
UBSAN: shift-out-of-bounds in net/mptcp/protocol.c:470:29
shift exponent 32 is too large for 32-bit type 'unsigned int'
CPU: 1 PID: 13059 Comm: kworker/1:0 Not tainted 5.17.0-rc2-00630-g5fbf21c90c60 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Workqueue: events mptcp_worker
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 ubsan_epilogue+0xb/0x5a lib/ubsan.c:151
 __ubsan_handle_shift_out_of_bounds.cold+0xb2/0x20e lib/ubsan.c:330
 mptcp_set_datafin_timeout net/mptcp/protocol.c:470 [inline]
 __mptcp_retrans.cold+0x72/0x77 net/mptcp/protocol.c:2445
 mptcp_worker+0x58a/0xa70 net/mptcp/protocol.c:2528
 process_one_work+0x9df/0x16d0 kernel/workqueue.c:2307
 worker_thread+0x95/0xe10 kernel/workqueue.c:2454
 kthread+0x2f4/0x3b0 kernel/kthread.c:377
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
 &lt;/TASK&gt;
================================================================================

This change limits the maximum timeout by limiting the size of the
shift, which keeps all intermediate values in-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48906/">CVE-2022-48906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48906">CVE-2022-48906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229605">SUSE bug 1229605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48907" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

auxdisplay: lcd2s: Fix memory leak in -&gt;remove()

Once allocated the struct lcd2s_data is never freed.
Fix the memory leak by switching to devm_kzalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48908" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48908" ref_url="https://www.suse.com/security/cve/CVE-2022-48908" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()

During driver initialization, the pointer of card info, i.e. the
variable 'ci' is required. However, the definition of
'com20020pci_id_table' reveals that this field is empty for some
devices, which will cause null pointer dereference when initializing
these devices.

The following log reveals it:

[    3.973806] KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
[    3.973819] RIP: 0010:com20020pci_probe+0x18d/0x13e0 [com20020_pci]
[    3.975181] Call Trace:
[    3.976208]  local_pci_probe+0x13f/0x210
[    3.977248]  pci_device_probe+0x34c/0x6d0
[    3.977255]  ? pci_uevent+0x470/0x470
[    3.978265]  really_probe+0x24c/0x8d0
[    3.978273]  __driver_probe_device+0x1b3/0x280
[    3.979288]  driver_probe_device+0x50/0x370

Fix this by checking whether the 'ci' is a null pointer first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48908/">CVE-2022-48908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48908">CVE-2022-48908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229610">SUSE bug 1229610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48909" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix connection leak

There's a potential leak issue under following execution sequence :

smc_release  				smc_connect_work
if (sk-&gt;sk_state == SMC_INIT)
					send_clc_confirim
	tcp_abort();
					...
					sk.sk_state = SMC_ACTIVE
smc_close_active
switch(sk-&gt;sk_state) {
...
case SMC_ACTIVE:
	smc_close_final()
	// then wait peer closed

Unfortunately, tcp_abort() may discard CLC CONFIRM messages that are
still in the tcp send buffer, in which case our connection token cannot
be delivered to the server side, which means that we cannot get a
passive close message at all. Therefore, it is impossible for the to be
disconnected at all.

This patch tries a very simple way to avoid this issue, once the state
has changed to SMC_ACTIVE after tcp_abort(), we can actively abort the
smc connection, considering that the state is SMC_INIT before
tcp_abort(), abandoning the complete disconnection process should not
cause too much problem.

In fact, this problem may exist as long as the CLC CONFIRM message is
not received by the server. Whether a timer should be added after
smc_close_final() needs to be discussed in the future. But even so, this
patch provides a faster release for connection in above case, it should
also be valuable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48910" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48910" ref_url="https://www.suse.com/security/cve/CVE-2022-48910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: ensure we call ipv6_mc_down() at most once

There are two reasons for addrconf_notify() to be called with NETDEV_DOWN:
either the network device is actually going down, or IPv6 was disabled
on the interface.

If either of them stays down while the other is toggled, we repeatedly
call the code for NETDEV_DOWN, including ipv6_mc_down(), while never
calling the corresponding ipv6_mc_up() in between. This will cause a
new entry in idev-&gt;mc_tomb to be allocated for each multicast group
the interface is subscribed to, which in turn leaks one struct ifmcaddr6
per nontrivial multicast group the interface is subscribed to.

The following reproducer will leak at least $n objects:

ip addr add ff2e::4242/32 dev eth0 autojoin
sysctl -w net.ipv6.conf.eth0.disable_ipv6=1
for i in $(seq 1 $n); do
	ip link set up eth0; ip link set down eth0
done

Joining groups with IPV6_ADD_MEMBERSHIP (unprivileged) or setting the
sysctl net.ipv6.conf.eth0.forwarding to 1 (=&gt; subscribing to ff02::2)
can also be used to create a nontrivial idev-&gt;mc_list, which will the
leak objects with the right up-down-sequence.

Based on both sources for NETDEV_DOWN events the interface IPv6 state
should be considered:

 - not ready if the network interface is not ready OR IPv6 is disabled
   for it
 - ready if the network interface is ready AND IPv6 is enabled for it

The functions ipv6_mc_up() and ipv6_down() should only be run when this
state changes.

Implement this by remembering when the IPv6 state is ready, and only
run ipv6_mc_down() if it actually changed from ready to not ready.

The other direction (not ready -&gt; ready) already works correctly, as:

 - the interface notification triggered codepath for NETDEV_UP /
   NETDEV_CHANGE returns early if ipv6 is disabled, and
 - the disable_ipv6=0 triggered codepath skips fully initializing the
   interface as long as addrconf_link_ready(dev) returns false
 - calling ipv6_mc_up() repeatedly does not leak anything
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48910/">CVE-2022-48910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48910">CVE-2022-48910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229632">SUSE bug 1229632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48911" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_queue: fix possible use-after-free

Eric Dumazet says:
  The sock_hold() side seems suspect, because there is no guarantee
  that sk_refcnt is not already 0.

On failure, we cannot queue the packet and need to indicate an
error.  The packet will be dropped by the caller.

v2: split skb prefetch hunk into separate change
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229640">SUSE bug 1229640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: fix use-after-free in __nf_register_net_hook()

We must not dereference @new_hooks after nf_hook_mutex has been released,
because other threads might have freed our allocated hooks already.

BUG: KASAN: use-after-free in nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [inline]
BUG: KASAN: use-after-free in hooks_validate net/netfilter/core.c:171 [inline]
BUG: KASAN: use-after-free in __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438
Read of size 2 at addr ffff88801c1a8000 by task syz-executor237/4430

CPU: 1 PID: 4430 Comm: syz-executor237 Not tainted 5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x336 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [inline]
 hooks_validate net/netfilter/core.c:171 [inline]
 __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438
 nf_register_net_hook+0x114/0x170 net/netfilter/core.c:571
 nf_register_net_hooks+0x59/0xc0 net/netfilter/core.c:587
 nf_synproxy_ipv6_init+0x85/0xe0 net/netfilter/nf_synproxy_core.c:1218
 synproxy_tg6_check+0x30d/0x560 net/ipv6/netfilter/ip6t_SYNPROXY.c:81
 xt_check_target+0x26c/0x9e0 net/netfilter/x_tables.c:1038
 check_target net/ipv6/netfilter/ip6_tables.c:530 [inline]
 find_check_entry.constprop.0+0x7f1/0x9e0 net/ipv6/netfilter/ip6_tables.c:573
 translate_table+0xc8b/0x1750 net/ipv6/netfilter/ip6_tables.c:735
 do_replace net/ipv6/netfilter/ip6_tables.c:1153 [inline]
 do_ip6t_set_ctl+0x56e/0xb90 net/ipv6/netfilter/ip6_tables.c:1639
 nf_setsockopt+0x83/0xe0 net/netfilter/nf_sockopt.c:101
 ipv6_setsockopt+0x122/0x180 net/ipv6/ipv6_sockglue.c:1024
 rawv6_setsockopt+0xd3/0x6a0 net/ipv6/raw.c:1084
 __sys_setsockopt+0x2db/0x610 net/socket.c:2180
 __do_sys_setsockopt net/socket.c:2191 [inline]
 __se_sys_setsockopt net/socket.c:2188 [inline]
 __x64_sys_setsockopt+0xba/0x150 net/socket.c:2188
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f65a1ace7d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f65a1a7f308 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f65a1ace7d9
RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003
RBP: 00007f65a1b574c8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000000 R11: 0000000000000246 R12: 00007f65a1b55130
R13: 00007f65a1b574c0 R14: 00007f65a1b24090 R15: 0000000000022000
 &lt;/TASK&gt;

The buggy address belongs to the page:
page:ffffea0000706a00 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1c1a8
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea0001c1b108 ffffea000046dd08 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x52dc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_ZERO), pid 4430, ts 1061781545818, free_ts 1061791488993
 prep_new_page mm/page_alloc.c:2434 [inline]
 get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4165
 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5389
 __alloc_pages_node include/linux/gfp.h:572 [inline]
 alloc_pages_node include/linux/gfp.h:595 [inline]
 kmalloc_large_node+0x62/0x130 mm/slub.c:4438
 __kmalloc_node+0x35a/0x4a0 mm/slub.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229644">SUSE bug 1229644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48913" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blktrace: fix use after free for struct blk_trace

When tracing the whole disk, 'dropped' and 'msg' will be created
under 'q-&gt;debugfs_dir' and 'bt-&gt;dir' is NULL, thus blk_trace_free()
won't remove those files. What's worse, the following UAF can be
triggered because of accessing stale 'dropped' and 'msg':

==================================================================
BUG: KASAN: use-after-free in blk_dropped_read+0x89/0x100
Read of size 4 at addr ffff88816912f3d8 by task blktrace/1188

CPU: 27 PID: 1188 Comm: blktrace Not tainted 5.17.0-rc4-next-20220217+ #469
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-4
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x34/0x44
 print_address_description.constprop.0.cold+0xab/0x381
 ? blk_dropped_read+0x89/0x100
 ? blk_dropped_read+0x89/0x100
 kasan_report.cold+0x83/0xdf
 ? blk_dropped_read+0x89/0x100
 kasan_check_range+0x140/0x1b0
 blk_dropped_read+0x89/0x100
 ? blk_create_buf_file_callback+0x20/0x20
 ? kmem_cache_free+0xa1/0x500
 ? do_sys_openat2+0x258/0x460
 full_proxy_read+0x8f/0xc0
 vfs_read+0xc6/0x260
 ksys_read+0xb9/0x150
 ? vfs_write+0x3d0/0x3d0
 ? fpregs_assert_state_consistent+0x55/0x60
 ? exit_to_user_mode_prepare+0x39/0x1e0
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbc080d92fd
Code: ce 20 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 1
RSP: 002b:00007fbb95ff9cb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 00007fbb95ff9dc0 RCX: 00007fbc080d92fd
RDX: 0000000000000100 RSI: 00007fbb95ff9cc0 RDI: 0000000000000045
RBP: 0000000000000045 R08: 0000000000406299 R09: 00000000fffffffd
R10: 000000000153afa0 R11: 0000000000000293 R12: 00007fbb780008c0
R13: 00007fbb78000938 R14: 0000000000608b30 R15: 00007fbb780029c8
 &lt;/TASK&gt;

Allocated by task 1050:
 kasan_save_stack+0x1e/0x40
 __kasan_kmalloc+0x81/0xa0
 do_blk_trace_setup+0xcb/0x410
 __blk_trace_setup+0xac/0x130
 blk_trace_ioctl+0xe9/0x1c0
 blkdev_ioctl+0xf1/0x390
 __x64_sys_ioctl+0xa5/0xe0
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Freed by task 1050:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_set_free_info+0x20/0x30
 __kasan_slab_free+0x103/0x180
 kfree+0x9a/0x4c0
 __blk_trace_remove+0x53/0x70
 blk_trace_ioctl+0x199/0x1c0
 blkdev_common_ioctl+0x5e9/0xb30
 blkdev_ioctl+0x1a5/0x390
 __x64_sys_ioctl+0xa5/0xe0
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

The buggy address belongs to the object at ffff88816912f380
 which belongs to the cache kmalloc-96 of size 96
The buggy address is located 88 bytes inside of
 96-byte region [ffff88816912f380, ffff88816912f3e0)
The buggy address belongs to the page:
page:000000009a1b4e7c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0f
flags: 0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)
raw: 0017ffffc0000200 ffffea00044f1100 dead000000000002 ffff88810004c780
raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff88816912f280: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
 ffff88816912f300: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
&gt;ffff88816912f380: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
                                                    ^
 ffff88816912f400: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
 ffff88816912f480: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48914" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/netfront: destroy queues before real_num_tx_queues is zeroed

xennet_destroy_queues() relies on info-&gt;netdev-&gt;real_num_tx_queues to
delete queues. Since d7dac083414eb5bb99a6d2ed53dc2c1b405224e5
("net-sysfs: update the queue counts in the unregistration path"),
unregister_netdev() indirectly sets real_num_tx_queues to 0. Those two
facts together means, that xennet_destroy_queues() called from
xennet_remove() cannot do its job, because it's called after
unregister_netdev(). This results in kfree-ing queues that are still
linked in napi, which ultimately crashes:

    BUG: kernel NULL pointer dereference, address: 0000000000000000
    #PF: supervisor read access in kernel mode
    #PF: error_code(0x0000) - not-present page
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP PTI
    CPU: 1 PID: 52 Comm: xenwatch Tainted: G        W         5.16.10-1.32.fc32.qubes.x86_64+ #226
    RIP: 0010:free_netdev+0xa3/0x1a0
    Code: ff 48 89 df e8 2e e9 00 00 48 8b 43 50 48 8b 08 48 8d b8 a0 fe ff ff 48 8d a9 a0 fe ff ff 49 39 c4 75 26 eb 47 e8 ed c1 66 ff &lt;48&gt; 8b 85 60 01 00 00 48 8d 95 60 01 00 00 48 89 ef 48 2d 60 01 00
    RSP: 0000:ffffc90000bcfd00 EFLAGS: 00010286
    RAX: 0000000000000000 RBX: ffff88800edad000 RCX: 0000000000000000
    RDX: 0000000000000001 RSI: ffffc90000bcfc30 RDI: 00000000ffffffff
    RBP: fffffffffffffea0 R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800edad050
    R13: ffff8880065f8f88 R14: 0000000000000000 R15: ffff8880066c6680
    FS:  0000000000000000(0000) GS:ffff8880f3300000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000000000000000 CR3: 00000000e998c006 CR4: 00000000003706e0
    Call Trace:
     &lt;TASK&gt;
     xennet_remove+0x13d/0x300 [xen_netfront]
     xenbus_dev_remove+0x6d/0xf0
     __device_release_driver+0x17a/0x240
     device_release_driver+0x24/0x30
     bus_remove_device+0xd8/0x140
     device_del+0x18b/0x410
     ? _raw_spin_unlock+0x16/0x30
     ? klist_iter_exit+0x14/0x20
     ? xenbus_dev_request_and_reply+0x80/0x80
     device_unregister+0x13/0x60
     xenbus_dev_changed+0x18e/0x1f0
     xenwatch_thread+0xc0/0x1a0
     ? do_wait_intr_irq+0xa0/0xa0
     kthread+0x16b/0x190
     ? set_kthread_struct+0x40/0x40
     ret_from_fork+0x22/0x30
     &lt;/TASK&gt;

Fix this by calling xennet_destroy_queues() from xennet_uninit(),
when real_num_tx_queues is still available. This ensures that queues are
destroyed when real_num_tx_queues is set to 0, regardless of how
unregister_netdev() was called.

Originally reported at
https://github.com/QubesOS/qubes-issues/issues/7257
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48915" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Fix TZ_GET_TRIP NULL pointer dereference

Do not call get_trip_hyst() from thermal_genl_cmd_tz_get_trip() if
the thermal zone does not define one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48916" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix double list_add when enabling VMD in scalable mode

When enabling VMD and IOMMU scalable mode, the following kernel panic
call trace/kernel log is shown in Eagle Stream platform (Sapphire Rapids
CPU) during booting:

pci 0000:59:00.5: Adding to iommu group 42
...
vmd 0000:59:00.5: PCI host bridge to bus 10000:80
pci 10000:80:01.0: [8086:352a] type 01 class 0x060400
pci 10000:80:01.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
pci 10000:80:01.0: enabling Extended Tags
pci 10000:80:01.0: PME# supported from D0 D3hot D3cold
pci 10000:80:01.0: DMAR: Setup RID2PASID failed
pci 10000:80:01.0: Failed to add to iommu group 42: -16
pci 10000:80:03.0: [8086:352b] type 01 class 0x060400
pci 10000:80:03.0: reg 0x10: [mem 0x00000000-0x0001ffff 64bit]
pci 10000:80:03.0: enabling Extended Tags
pci 10000:80:03.0: PME# supported from D0 D3hot D3cold
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:29!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.17.0-rc3+ #7
Hardware name: Lenovo ThinkSystem SR650V3/SB27A86647, BIOS ESE101Y-1.00 01/13/2022
Workqueue: events work_for_cpu_fn
RIP: 0010:__list_add_valid.cold+0x26/0x3f
Code: 9a 4a ab ff 4c 89 c1 48 c7 c7 40 0c d9 9e e8 b9 b1 fe ff 0f
      0b 48 89 f2 4c 89 c1 48 89 fe 48 c7 c7 f0 0c d9 9e e8 a2 b1
      fe ff &lt;0f&gt; 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 98 0c d9
      9e e8 8b b1 fe
RSP: 0000:ff5ad434865b3a40 EFLAGS: 00010246
RAX: 0000000000000058 RBX: ff4d61160b74b880 RCX: ff4d61255e1fffa8
RDX: 0000000000000000 RSI: 00000000fffeffff RDI: ffffffff9fd34f20
RBP: ff4d611d8e245c00 R08: 0000000000000000 R09: ff5ad434865b3888
R10: ff5ad434865b3880 R11: ff4d61257fdc6fe8 R12: ff4d61160b74b8a0
R13: ff4d61160b74b8a0 R14: ff4d611d8e245c10 R15: ff4d611d8001ba70
FS:  0000000000000000(0000) GS:ff4d611d5ea00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ff4d611fa1401000 CR3: 0000000aa0210001 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 intel_pasid_alloc_table+0x9c/0x1d0
 dmar_insert_one_dev_info+0x423/0x540
 ? device_to_iommu+0x12d/0x2f0
 intel_iommu_attach_device+0x116/0x290
 __iommu_attach_device+0x1a/0x90
 iommu_group_add_device+0x190/0x2c0
 __iommu_probe_device+0x13e/0x250
 iommu_probe_device+0x24/0x150
 iommu_bus_notifier+0x69/0x90
 blocking_notifier_call_chain+0x5a/0x80
 device_add+0x3db/0x7b0
 ? arch_memremap_can_ram_remap+0x19/0x50
 ? memremap+0x75/0x140
 pci_device_add+0x193/0x1d0
 pci_scan_single_device+0xb9/0xf0
 pci_scan_slot+0x4c/0x110
 pci_scan_child_bus_extend+0x3a/0x290
 vmd_enable_domain.constprop.0+0x63e/0x820
 vmd_probe+0x163/0x190
 local_pci_probe+0x42/0x80
 work_for_cpu_fn+0x13/0x20
 process_one_work+0x1e2/0x3b0
 worker_thread+0x1c4/0x3a0
 ? rescuer_thread+0x370/0x370
 kthread+0xc7/0xf0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
...
Kernel panic - not syncing: Fatal exception
Kernel Offset: 0x1ca00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
---[ end Kernel panic - not syncing: Fatal exception ]---

The following 'lspci' output shows devices '10000:80:*' are subdevices of
the VMD device 0000:59:00.5:

  $ lspci
  ...
  0000:59:00.5 RAID bus controller: Intel Corporation Volume Management Device NVMe RAID Controller (rev 20)
  ...
  10000:80:01.0 PCI bridge: Intel Corporation Device 352a (rev 03)
  10000:80:03.0 PCI bridge: Intel Corporation Device 352b (rev 03)
  10000:80:05.0 PCI bridge: Intel Corporation Device 352c (rev 03)
  10000:80:07.0 PCI bridge: Intel Corporation Device 352d (rev 03)
  10000:81:00.0 Non-Volatile memory controller: Intel Corporation NVMe Datacenter SSD [3DNAND, Beta Rock Controller]
  10000:82:00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48917" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min

While the $val/$val2 values passed in from userspace are always &gt;= 0
integers, the limits of the control can be signed integers and the $min
can be non-zero and less than zero. To correctly validate $val/$val2
against platform_max, add the $min offset to val first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mvm: check debugfs_dir ptr before use

When "debugfs=off" is used on the kernel command line, iwiwifi's
mvm module uses an invalid/unchecked debugfs_dir pointer and causes
a BUG:

 BUG: kernel NULL pointer dereference, address: 000000000000004f
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 503 Comm: modprobe Tainted: G        W         5.17.0-rc5 #7
 Hardware name: Dell Inc. Inspiron 15 5510/076F7Y, BIOS 2.4.1 11/05/2021
 RIP: 0010:iwl_mvm_dbgfs_register+0x692/0x700 [iwlmvm]
 Code: 69 a0 be 80 01 00 00 48 c7 c7 50 73 6a a0 e8 95 cf ee e0 48 8b 83 b0 1e 00 00 48 c7 c2 54 73 6a a0 be 64 00 00 00 48 8d 7d 8c &lt;48&gt; 8b 48 50 e8 15 22 07 e1 48 8b 43 28 48 8d 55 8c 48 c7 c7 5f 73
 RSP: 0018:ffffc90000a0ba68 EFLAGS: 00010246
 RAX: ffffffffffffffff RBX: ffff88817d6e3328 RCX: ffff88817d6e3328
 RDX: ffffffffa06a7354 RSI: 0000000000000064 RDI: ffffc90000a0ba6c
 RBP: ffffc90000a0bae0 R08: ffffffff824e4880 R09: ffffffffa069d620
 R10: ffffc90000a0ba00 R11: ffffffffffffffff R12: 0000000000000000
 R13: ffffc90000a0bb28 R14: ffff88817d6e3328 R15: ffff88817d6e3320
 FS:  00007f64dd92d740(0000) GS:ffff88847f640000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000000004f CR3: 000000016fc79001 CR4: 0000000000770ee0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? iwl_mvm_mac_setup_register+0xbdc/0xda0 [iwlmvm]
  iwl_mvm_start_post_nvm+0x71/0x100 [iwlmvm]
  iwl_op_mode_mvm_start+0xab8/0xb30 [iwlmvm]
  _iwl_op_mode_start+0x6f/0xd0 [iwlwifi]
  iwl_opmode_register+0x6a/0xe0 [iwlwifi]
  ? 0xffffffffa0231000
  iwl_mvm_init+0x35/0x1000 [iwlmvm]
  ? 0xffffffffa0231000
  do_one_initcall+0x5a/0x1b0
  ? kmem_cache_alloc+0x1e5/0x2f0
  ? do_init_module+0x1e/0x220
  do_init_module+0x48/0x220
  load_module+0x2602/0x2bc0
  ? __kernel_read+0x145/0x2e0
  ? kernel_read_file+0x229/0x290
  __do_sys_finit_module+0xc5/0x130
  ? __do_sys_finit_module+0xc5/0x130
  __x64_sys_finit_module+0x13/0x20
  do_syscall_64+0x38/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f64dda564dd
 Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1b 29 0f 00 f7 d8 64 89 01 48
 RSP: 002b:00007ffdba393f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f64dda564dd
 RDX: 0000000000000000 RSI: 00005575399e2ab2 RDI: 0000000000000001
 RBP: 000055753a91c5e0 R08: 0000000000000000 R09: 0000000000000002
 R10: 0000000000000001 R11: 0000000000000246 R12: 00005575399e2ab2
 R13: 000055753a91ceb0 R14: 0000000000000000 R15: 000055753a923018
  &lt;/TASK&gt;
 Modules linked in: btintel(+) btmtk bluetooth vfat snd_hda_codec_hdmi fat snd_hda_codec_realtek snd_hda_codec_generic iwlmvm(+) snd_sof_pci_intel_tgl mac80211 snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence soundwire_bus snd_sof_intel_hda snd_sof_pci snd_sof snd_sof_xtensa_dsp snd_soc_hdac_hda snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core btrfs snd_compress snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec raid6_pq iwlwifi snd_hda_core snd_pcm snd_timer snd soundcore cfg80211 intel_ish_ipc(+) thunderbolt rfkill intel_ishtp ucsi_acpi wmi i2c_hid_acpi i2c_hid evdev
 CR2: 000000000000004f
 ---[ end trace 0000000000000000 ]---

Check the debugfs_dir pointer for an error before using it.

[change to make both conditional]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-26"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48919" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix double free race when mount fails in cifs_get_root()

When cifs_get_root() fails during cifs_smb3_do_mount() we call
deactivate_locked_super() which eventually will call delayed_free() which
will free the context.
In this situation we should not proceed to enter the out: section in
cifs_smb3_do_mount() and free the same resources a second time.

[Thu Feb 10 12:59:06 2022] BUG: KASAN: use-after-free in rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022] Read of size 8 at addr ffff888364f4d110 by task swapper/1/0

[Thu Feb 10 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G           OE     5.17.0-rc3+ #4
[Thu Feb 10 12:59:06 2022] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 12/17/2019
[Thu Feb 10 12:59:06 2022] Call Trace:
[Thu Feb 10 12:59:06 2022]  &lt;IRQ&gt;
[Thu Feb 10 12:59:06 2022]  dump_stack_lvl+0x5d/0x78
[Thu Feb 10 12:59:06 2022]  print_address_description.constprop.0+0x24/0x150
[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022]  kasan_report.cold+0x7d/0x117
[Thu Feb 10 12:59:06 2022]  ? rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022]  __asan_load8+0x86/0xa0
[Thu Feb 10 12:59:06 2022]  rcu_cblist_dequeue+0x32/0x60
[Thu Feb 10 12:59:06 2022]  rcu_core+0x547/0xca0
[Thu Feb 10 12:59:06 2022]  ? call_rcu+0x3c0/0x3c0
[Thu Feb 10 12:59:06 2022]  ? __this_cpu_preempt_check+0x13/0x20
[Thu Feb 10 12:59:06 2022]  ? lock_is_held_type+0xea/0x140
[Thu Feb 10 12:59:06 2022]  rcu_core_si+0xe/0x10
[Thu Feb 10 12:59:06 2022]  __do_softirq+0x1d4/0x67b
[Thu Feb 10 12:59:06 2022]  __irq_exit_rcu+0x100/0x150
[Thu Feb 10 12:59:06 2022]  irq_exit_rcu+0xe/0x30
[Thu Feb 10 12:59:06 2022]  sysvec_hyperv_stimer0+0x9d/0xc0
...
[Thu Feb 10 12:59:07 2022] Freed by task 58179:
[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50
[Thu Feb 10 12:59:07 2022]  kasan_set_track+0x25/0x30
[Thu Feb 10 12:59:07 2022]  kasan_set_free_info+0x24/0x40
[Thu Feb 10 12:59:07 2022]  ____kasan_slab_free+0x137/0x170
[Thu Feb 10 12:59:07 2022]  __kasan_slab_free+0x12/0x20
[Thu Feb 10 12:59:07 2022]  slab_free_freelist_hook+0xb3/0x1d0
[Thu Feb 10 12:59:07 2022]  kfree+0xcd/0x520
[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0x149/0xbe0 [cifs]
[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]
[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140
[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0
[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210
[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0
[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae

[Thu Feb 10 12:59:07 2022] Last potentially related work creation:
[Thu Feb 10 12:59:07 2022]  kasan_save_stack+0x26/0x50
[Thu Feb 10 12:59:07 2022]  __kasan_record_aux_stack+0xb6/0xc0
[Thu Feb 10 12:59:07 2022]  kasan_record_aux_stack_noalloc+0xb/0x10
[Thu Feb 10 12:59:07 2022]  call_rcu+0x76/0x3c0
[Thu Feb 10 12:59:07 2022]  cifs_umount+0xce/0xe0 [cifs]
[Thu Feb 10 12:59:07 2022]  cifs_kill_sb+0xc8/0xe0 [cifs]
[Thu Feb 10 12:59:07 2022]  deactivate_locked_super+0x5d/0xd0
[Thu Feb 10 12:59:07 2022]  cifs_smb3_do_mount+0xab9/0xbe0 [cifs]
[Thu Feb 10 12:59:07 2022]  smb3_get_tree+0x1a0/0x2e0 [cifs]
[Thu Feb 10 12:59:07 2022]  vfs_get_tree+0x52/0x140
[Thu Feb 10 12:59:07 2022]  path_mount+0x635/0x10c0
[Thu Feb 10 12:59:07 2022]  __x64_sys_mount+0x1bf/0x210
[Thu Feb 10 12:59:07 2022]  do_syscall_64+0x5c/0xc0
[Thu Feb 10 12:59:07 2022]  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-26"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229660">SUSE bug 1229660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48920" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48920" ref_url="https://www.suse.com/security/cve/CVE-2022-48920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: get rid of warning on transaction commit when using flushoncommit

When using the flushoncommit mount option, during almost every transaction
commit we trigger a warning from __writeback_inodes_sb_nr():

  $ cat fs/fs-writeback.c:
  (...)
  static void __writeback_inodes_sb_nr(struct super_block *sb, ...
  {
        (...)
        WARN_ON(!rwsem_is_locked(&amp;sb-&gt;s_umount));
        (...)
  }
  (...)

The trace produced in dmesg looks like the following:

  [947.473890] WARNING: CPU: 5 PID: 930 at fs/fs-writeback.c:2610 __writeback_inodes_sb_nr+0x7e/0xb3
  [947.481623] Modules linked in: nfsd nls_cp437 cifs asn1_decoder cifs_arc4 fscache cifs_md4 ipmi_ssif
  [947.489571] CPU: 5 PID: 930 Comm: btrfs-transacti Not tainted 95.16.3-srb-asrock-00001-g36437ad63879 #186
  [947.497969] RIP: 0010:__writeback_inodes_sb_nr+0x7e/0xb3
  [947.502097] Code: 24 10 4c 89 44 24 18 c6 (...)
  [947.519760] RSP: 0018:ffffc90000777e10 EFLAGS: 00010246
  [947.523818] RAX: 0000000000000000 RBX: 0000000000963300 RCX: 0000000000000000
  [947.529765] RDX: 0000000000000000 RSI: 000000000000fa51 RDI: ffffc90000777e50
  [947.535740] RBP: ffff888101628a90 R08: ffff888100955800 R09: ffff888100956000
  [947.541701] R10: 0000000000000002 R11: 0000000000000001 R12: ffff888100963488
  [947.547645] R13: ffff888100963000 R14: ffff888112fb7200 R15: ffff888100963460
  [947.553621] FS:  0000000000000000(0000) GS:ffff88841fd40000(0000) knlGS:0000000000000000
  [947.560537] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [947.565122] CR2: 0000000008be50c4 CR3: 000000000220c000 CR4: 00000000001006e0
  [947.571072] Call Trace:
  [947.572354]  &lt;TASK&gt;
  [947.573266]  btrfs_commit_transaction+0x1f1/0x998
  [947.576785]  ? start_transaction+0x3ab/0x44e
  [947.579867]  ? schedule_timeout+0x8a/0xdd
  [947.582716]  transaction_kthread+0xe9/0x156
  [947.585721]  ? btrfs_cleanup_transaction.isra.0+0x407/0x407
  [947.590104]  kthread+0x131/0x139
  [947.592168]  ? set_kthread_struct+0x32/0x32
  [947.595174]  ret_from_fork+0x22/0x30
  [947.597561]  &lt;/TASK&gt;
  [947.598553] ---[ end trace 644721052755541c ]---

This is because we started using writeback_inodes_sb() to flush delalloc
when committing a transaction (when using -o flushoncommit), in order to
avoid deadlocks with filesystem freeze operations. This change was made
by commit ce8ea7cc6eb313 ("btrfs: don't call btrfs_start_delalloc_roots
in flushoncommit"). After that change we started producing that warning,
and every now and then a user reports this since the warning happens too
often, it spams dmesg/syslog, and a user is unsure if this reflects any
problem that might compromise the filesystem's reliability.

We can not just lock the sb-&gt;s_umount semaphore before calling
writeback_inodes_sb(), because that would at least deadlock with
filesystem freezing, since at fs/super.c:freeze_super() sync_filesystem()
is called while we are holding that semaphore in write mode, and that can
trigger a transaction commit, resulting in a deadlock. It would also
trigger the same type of deadlock in the unmount path. Possibly, it could
also introduce some other locking dependencies that lockdep would report.

To fix this call try_to_writeback_inodes_sb() instead of
writeback_inodes_sb(), because that will try to read lock sb-&gt;s_umount
and then will only call writeback_inodes_sb() if it was able to lock it.
This is fine because the cases where it can't read lock sb-&gt;s_umount
are during a filesystem unmount or during a filesystem freeze - in those
cases sb-&gt;s_umount is write locked and sync_filesystem() is called, which
calls writeback_inodes_sb(). In other words, in all cases where we can't
take a read lock on sb-&gt;s_umount, writeback is already being triggered
elsewhere.

An alternative would be to call btrfs_start_delalloc_roots() with a
number of pages different from LONG_MAX, for example matching the number
of delalloc bytes we currently have, in 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48920/">CVE-2022-48920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48920">CVE-2022-48920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229658">SUSE bug 1229658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix fault in reweight_entity

Syzbot found a GPF in reweight_entity. This has been bisected to
commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid
sched_task_group")

There is a race between sched_post_fork() and setpriority(PRIO_PGRP)
within a thread group that causes a null-ptr-deref in
reweight_entity() in CFS. The scenario is that the main process spawns
number of new threads, which then call setpriority(PRIO_PGRP, 0, -20),
wait, and exit.  For each of the new threads the copy_process() gets
invoked, which adds the new task_struct and calls sched_post_fork()
for it.

In the above scenario there is a possibility that
setpriority(PRIO_PGRP) and set_one_prio() will be called for a thread
in the group that is just being created by copy_process(), and for
which the sched_post_fork() has not been executed yet. This will
trigger a null pointer dereference in reweight_entity(), as it will
try to access the run queue pointer, which hasn't been set.

Before the mentioned change the cfs_rq pointer for the task  has been
set in sched_fork(), which is called much earlier in copy_process(),
before the new task is added to the thread_group.  Now it is done in
the sched_post_fork(), which is called after that.  To fix the issue
the remove the update_load param from the update_load param() function
and call reweight_task() only if the task flag doesn't have the
TASK_NEW flag set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-26"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48922" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48922" ref_url="https://www.suse.com/security/cve/CVE-2022-48922" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: fix oops caused by irqsoff latency tracer

The trace_hardirqs_{on,off}() require the caller to setup frame pointer
properly. This because these two functions use macro 'CALLER_ADDR1' (aka.
__builtin_return_address(1)) to acquire caller info. If the $fp is used
for other purpose, the code generated this macro (as below) could trigger
memory access fault.

   0xffffffff8011510e &lt;+80&gt;:    ld      a1,-16(s0)
   0xffffffff80115112 &lt;+84&gt;:    ld      s2,-8(a1)  # &lt;-- paging fault here

The oops message during booting if compiled with 'irqoff' tracer enabled:
[    0.039615][    T0] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8
[    0.041925][    T0] Oops [#1]
[    0.042063][    T0] Modules linked in:
[    0.042864][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.17.0-rc1-00233-g9a20c48d1ed2 #29
[    0.043568][    T0] Hardware name: riscv-virtio,qemu (DT)
[    0.044343][    T0] epc : trace_hardirqs_on+0x56/0xe2
[    0.044601][    T0]  ra : restore_all+0x12/0x6e
[    0.044721][    T0] epc : ffffffff80126a5c ra : ffffffff80003b94 sp : ffffffff81403db0
[    0.044801][    T0]  gp : ffffffff8163acd8 tp : ffffffff81414880 t0 : 0000000000000020
[    0.044882][    T0]  t1 : 0098968000000000 t2 : 0000000000000000 s0 : ffffffff81403de0
[    0.044967][    T0]  s1 : 0000000000000000 a0 : 0000000000000001 a1 : 0000000000000100
[    0.045046][    T0]  a2 : 0000000000000000 a3 : 0000000000000000 a4 : 0000000000000000
[    0.045124][    T0]  a5 : 0000000000000000 a6 : 0000000000000000 a7 : 0000000054494d45
[    0.045210][    T0]  s2 : ffffffff80003b94 s3 : ffffffff81a8f1b0 s4 : ffffffff80e27b50
[    0.045289][    T0]  s5 : ffffffff81414880 s6 : ffffffff8160fa00 s7 : 00000000800120e8
[    0.045389][    T0]  s8 : 0000000080013100 s9 : 000000000000007f s10: 0000000000000000
[    0.045474][    T0]  s11: 0000000000000000 t3 : 7fffffffffffffff t4 : 0000000000000000
[    0.045548][    T0]  t5 : 0000000000000000 t6 : ffffffff814aa368
[    0.045620][    T0] status: 0000000200000100 badaddr: 00000000000000f8 cause: 000000000000000d
[    0.046402][    T0] [&lt;ffffffff80003b94&gt;] restore_all+0x12/0x6e

This because the $fp(aka. $s0) register is not used as frame pointer in the
assembly entry code.

	resume_kernel:
		REG_L s0, TASK_TI_PREEMPT_COUNT(tp)
		bnez s0, restore_all
		REG_L s0, TASK_TI_FLAGS(tp)
                andi s0, s0, _TIF_NEED_RESCHED
                beqz s0, restore_all
                call preempt_schedule_irq
                j restore_all

To fix above issue, here we add one extra level wrapper for function
trace_hardirqs_{on,off}() so they can be safely called by low level entry
code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48922/">CVE-2022-48922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48922">CVE-2022-48922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229634">SUSE bug 1229634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48923" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: prevent copying too big compressed lzo segment

Compressed length can be corrupted to be a lot larger than memory
we have allocated for buffer.
This will cause memcpy in copy_compressed_segment to write outside
of allocated memory.

This mostly results in stuck read syscall but sometimes when using
btrfs send can get #GP

  kernel: general protection fault, probably for non-canonical address 0x841551d5c1000: 0000 [#1] PREEMPT SMP NOPTI
  kernel: CPU: 17 PID: 264 Comm: kworker/u256:7 Tainted: P           OE     5.17.0-rc2-1 #12
  kernel: Workqueue: btrfs-endio btrfs_work_helper [btrfs]
  kernel: RIP: 0010:lzo_decompress_bio (./include/linux/fortify-string.h:225 fs/btrfs/lzo.c:322 fs/btrfs/lzo.c:394) btrfs
  Code starting with the faulting instruction
  ===========================================
     0:*  48 8b 06                mov    (%rsi),%rax              &lt;-- trapping instruction
     3:   48 8d 79 08             lea    0x8(%rcx),%rdi
     7:   48 83 e7 f8             and    $0xfffffffffffffff8,%rdi
     b:   48 89 01                mov    %rax,(%rcx)
     e:   44 89 f0                mov    %r14d,%eax
    11:   48 8b 54 06 f8          mov    -0x8(%rsi,%rax,1),%rdx
  kernel: RSP: 0018:ffffb110812efd50 EFLAGS: 00010212
  kernel: RAX: 0000000000001000 RBX: 000000009ca264c8 RCX: ffff98996e6d8ff8
  kernel: RDX: 0000000000000064 RSI: 000841551d5c1000 RDI: ffffffff9500435d
  kernel: RBP: ffff989a3be856c0 R08: 0000000000000000 R09: 0000000000000000
  kernel: R10: 0000000000000000 R11: 0000000000001000 R12: ffff98996e6d8000
  kernel: R13: 0000000000000008 R14: 0000000000001000 R15: 000841551d5c1000
  kernel: FS:  0000000000000000(0000) GS:ffff98a09d640000(0000) knlGS:0000000000000000
  kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  kernel: CR2: 00001e9f984d9ea8 CR3: 000000014971a000 CR4: 00000000003506e0
  kernel: Call Trace:
  kernel:  &lt;TASK&gt;
  kernel: end_compressed_bio_read (fs/btrfs/compression.c:104 fs/btrfs/compression.c:1363 fs/btrfs/compression.c:323) btrfs
  kernel: end_workqueue_fn (fs/btrfs/disk-io.c:1923) btrfs
  kernel: btrfs_work_helper (fs/btrfs/async-thread.c:326) btrfs
  kernel: process_one_work (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:212 ./include/trace/events/workqueue.h:108 kernel/workqueue.c:2312)
  kernel: worker_thread (./include/linux/list.h:292 kernel/workqueue.c:2455)
  kernel: ? process_one_work (kernel/workqueue.c:2397)
  kernel: kthread (kernel/kthread.c:377)
  kernel: ? kthread_complete_and_exit (kernel/kthread.c:332)
  kernel: ret_from_fork (arch/x86/entry/entry_64.S:301)
  kernel:  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229663">SUSE bug 1229663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48924" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: int340x: fix memory leak in int3400_notify()

It is easy to hit the below memory leaks in my TigerLake platform:

unreferenced object 0xffff927c8b91dbc0 (size 32):
  comm "kworker/0:2", pid 112, jiffies 4294893323 (age 83.604s)
  hex dump (first 32 bytes):
    4e 41 4d 45 3d 49 4e 54 33 34 30 30 20 54 68 65  NAME=INT3400 The
    72 6d 61 6c 00 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  rmal.kkkkkkkkkk.
  backtrace:
    [&lt;ffffffff9c502c3e&gt;] __kmalloc_track_caller+0x2fe/0x4a0
    [&lt;ffffffff9c7b7c15&gt;] kvasprintf+0x65/0xd0
    [&lt;ffffffff9c7b7d6e&gt;] kasprintf+0x4e/0x70
    [&lt;ffffffffc04cb662&gt;] int3400_notify+0x82/0x120 [int3400_thermal]
    [&lt;ffffffff9c8b7358&gt;] acpi_ev_notify_dispatch+0x54/0x71
    [&lt;ffffffff9c88f1a7&gt;] acpi_os_execute_deferred+0x17/0x30
    [&lt;ffffffff9c2c2c0a&gt;] process_one_work+0x21a/0x3f0
    [&lt;ffffffff9c2c2e2a&gt;] worker_thread+0x4a/0x3b0
    [&lt;ffffffff9c2cb4dd&gt;] kthread+0xfd/0x130
    [&lt;ffffffff9c201c1f&gt;] ret_from_fork+0x1f/0x30

Fix it by calling kfree() accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48925" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Do not change route.addr.src_addr outside state checks

If the state is not idle then resolve_prepare_src() should immediately
fail and no change to global state should happen. However, it
unconditionally overwrites the src_addr trying to build a temporary any
address.

For instance if the state is already RDMA_CM_LISTEN then this will corrupt
the src_addr and would cause the test in cma_cancel_operation():

           if (cma_any_addr(cma_src_addr(id_priv)) &amp;&amp; !id_priv-&gt;cma_dev)

Which would manifest as this trace from syzkaller:

  BUG: KASAN: use-after-free in __list_add_valid+0x93/0xa0 lib/list_debug.c:26
  Read of size 8 at addr ffff8881546491e0 by task syz-executor.1/32204

  CPU: 1 PID: 32204 Comm: syz-executor.1 Not tainted 5.12.0-rc8-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  Call Trace:
   __dump_stack lib/dump_stack.c:79 [inline]
   dump_stack+0x141/0x1d7 lib/dump_stack.c:120
   print_address_description.constprop.0.cold+0x5b/0x2f8 mm/kasan/report.c:232
   __kasan_report mm/kasan/report.c:399 [inline]
   kasan_report.cold+0x7c/0xd8 mm/kasan/report.c:416
   __list_add_valid+0x93/0xa0 lib/list_debug.c:26
   __list_add include/linux/list.h:67 [inline]
   list_add_tail include/linux/list.h:100 [inline]
   cma_listen_on_all drivers/infiniband/core/cma.c:2557 [inline]
   rdma_listen+0x787/0xe00 drivers/infiniband/core/cma.c:3751
   ucma_listen+0x16a/0x210 drivers/infiniband/core/ucma.c:1102
   ucma_write+0x259/0x350 drivers/infiniband/core/ucma.c:1732
   vfs_write+0x28e/0xa30 fs/read_write.c:603
   ksys_write+0x1ee/0x250 fs/read_write.c:658
   do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46
   entry_SYSCALL_64_after_hwframe+0x44/0xae

This is indicating that an rdma_id_private was destroyed without doing
cma_cancel_listens().

Instead of trying to re-use the src_addr memory to indirectly create an
any address derived from the dst build one explicitly on the stack and
bind to that as any other normal flow would do. rdma_bind_addr() will copy
it over the src_addr once it knows the state is valid.

This is similar to commit bc0bdc5afaa7 ("RDMA/cma: Do not change
route.addr.src_addr.ss_family")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48926" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: rndis: add spinlock for rndis response list

There's no lock for rndis response list. It could cause list corruption
if there're two different list_add at the same time like below.
It's better to add in rndis_add_response / rndis_free_response
/ rndis_get_next_response to prevent any race condition on response list.

[  361.894299] [1:   irq/191-dwc3:16979] list_add corruption.
next-&gt;prev should be prev (ffffff80651764d0),
but was ffffff883dc36f80. (next=ffffff80651764d0).

[  361.904380] [1:   irq/191-dwc3:16979] Call trace:
[  361.904391] [1:   irq/191-dwc3:16979]  __list_add_valid+0x74/0x90
[  361.904401] [1:   irq/191-dwc3:16979]  rndis_msg_parser+0x168/0x8c0
[  361.904409] [1:   irq/191-dwc3:16979]  rndis_command_complete+0x24/0x84
[  361.904417] [1:   irq/191-dwc3:16979]  usb_gadget_giveback_request+0x20/0xe4
[  361.904426] [1:   irq/191-dwc3:16979]  dwc3_gadget_giveback+0x44/0x60
[  361.904434] [1:   irq/191-dwc3:16979]  dwc3_ep0_complete_data+0x1e8/0x3a0
[  361.904442] [1:   irq/191-dwc3:16979]  dwc3_ep0_interrupt+0x29c/0x3dc
[  361.904450] [1:   irq/191-dwc3:16979]  dwc3_process_event_entry+0x78/0x6cc
[  361.904457] [1:   irq/191-dwc3:16979]  dwc3_process_event_buf+0xa0/0x1ec
[  361.904465] [1:   irq/191-dwc3:16979]  dwc3_thread_interrupt+0x34/0x5c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48927" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: tsc2046: fix memory corruption by preventing array overflow

On one side we have indio_dev-&gt;num_channels includes all physical channels +
timestamp channel. On other side we have an array allocated only for
physical channels. So, fix memory corruption by ARRAY_SIZE() instead of
num_channels variable.

Note the first case is a cleanup rather than a fix as the software
timestamp channel bit in active_scanmask is never set by the IIO core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48928" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: men_z188_adc: Fix a resource leak in an error handling path

If iio_device_register() fails, a previous ioremap() is left unbalanced.

Update the error handling path and add the missing iounmap() call, as
already done in the remove function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix crash due to out of bounds access into reg2btf_ids.

When commit e6ac2450d6de ("bpf: Support bpf program calling kernel function") added
kfunc support, it defined reg2btf_ids as a cheap way to translate the verifier
reg type to the appropriate btf_vmlinux BTF ID, however
commit c25b2ae13603 ("bpf: Replace PTR_TO_XXX_OR_NULL with PTR_TO_XXX | PTR_MAYBE_NULL")
moved the __BPF_REG_TYPE_MAX from the last member of bpf_reg_type enum to after
the base register types, and defined other variants using type flag
composition. However, now, the direct usage of reg-&gt;type to index into
reg2btf_ids may no longer fall into __BPF_REG_TYPE_MAX range, and hence lead to
out of bounds access and kernel crash on dereference of bad pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48930" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/ib_srp: Fix a deadlock

Remove the flush_workqueue(system_long_wq) call since flushing
system_long_wq is deadlock-prone and since that call is redundant with a
preceding cancel_work_sync()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48931" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

configfs: fix a race in configfs_{,un}register_subsystem()

When configfs_register_subsystem() or configfs_unregister_subsystem()
is executing link_group() or unlink_group(),
it is possible that two processes add or delete list concurrently.
Some unfortunate interleavings of them can cause kernel panic.

One of cases is:
A --&gt; B --&gt; C --&gt; D
A &lt;-- B &lt;-- C &lt;-- D

     delete list_head *B        |      delete list_head *C
--------------------------------|-----------------------------------
configfs_unregister_subsystem   |   configfs_unregister_subsystem
  unlink_group                  |     unlink_group
    unlink_obj                  |       unlink_obj
      list_del_init             |         list_del_init
        __list_del_entry        |           __list_del_entry
          __list_del            |             __list_del
            // next == C        |
            next-&gt;prev = prev   |
                                |               next-&gt;prev = prev
            prev-&gt;next = next   |
                                |                 // prev == B
                                |                 prev-&gt;next = next

Fix this by adding mutex when calling link_group() or unlink_group(),
but parent configfs_subsystem is NULL when config_item is root.
So I create a mutex configfs_subsystem_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48932" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte

When adding a rule with 32 destinations, we hit the following out-of-band
access issue:

  BUG: KASAN: slab-out-of-bounds in mlx5_cmd_dr_create_fte+0x18ee/0x1e70

This patch fixes the issue by both increasing the allocated buffers to
accommodate for the needed actions and by checking the number of actions
to prevent this issue when a rule with too many actions is provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48933" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48933" ref_url="https://www.suse.com/security/cve/CVE-2022-48933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix memory leak during stateful obj update

stateful objects can be updated from the control plane.
The transaction logic allocates a temporary object for this purpose.

The -&gt;init function was called for this object, so plain kfree() leaks
resources. We must call -&gt;destroy function of the object.

nft_obj_destroy does this, but it also decrements the module refcount,
but the update path doesn't increment it.

To avoid special-casing the update object release, do module_get for
the update case too and release it via nft_obj_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48933/">CVE-2022-48933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48933">CVE-2022-48933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229621">SUSE bug 1229621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()

ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX)
inclusive.
So NFP_MAX_MAC_INDEX (0xff) is a valid id.

In order for the error handling path to work correctly, the 'invalid'
value for 'ida_idx' should not be in the 0..NFP_MAX_MAC_INDEX range,
inclusive.

So set it to -1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48935" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unregister flowtable hooks on netns exit

Unregister flowtable hooks before they are releases via
nf_tables_flowtable_destroy() otherwise hook core reports UAF.

BUG: KASAN: use-after-free in nf_hook_entries_grow+0x5a7/0x700 net/netfilter/core.c:142 net/netfilter/core.c:142
Read of size 4 at addr ffff8880736f7438 by task syz-executor579/3666

CPU: 0 PID: 3666 Comm: syz-executor579 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 __dump_stack lib/dump_stack.c:88 [inline] lib/dump_stack.c:106
 dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 lib/dump_stack.c:106
 print_address_description+0x65/0x380 mm/kasan/report.c:247 mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 __kasan_report mm/kasan/report.c:433 [inline] mm/kasan/report.c:450
 kasan_report+0x19a/0x1f0 mm/kasan/report.c:450 mm/kasan/report.c:450
 nf_hook_entries_grow+0x5a7/0x700 net/netfilter/core.c:142 net/netfilter/core.c:142
 __nf_register_net_hook+0x27e/0x8d0 net/netfilter/core.c:429 net/netfilter/core.c:429
 nf_register_net_hook+0xaa/0x180 net/netfilter/core.c:571 net/netfilter/core.c:571
 nft_register_flowtable_net_hooks+0x3c5/0x730 net/netfilter/nf_tables_api.c:7232 net/netfilter/nf_tables_api.c:7232
 nf_tables_newflowtable+0x2022/0x2cf0 net/netfilter/nf_tables_api.c:7430 net/netfilter/nf_tables_api.c:7430
 nfnetlink_rcv_batch net/netfilter/nfnetlink.c:513 [inline]
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline]
 nfnetlink_rcv_batch net/netfilter/nfnetlink.c:513 [inline] net/netfilter/nfnetlink.c:652
 nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:634 [inline] net/netfilter/nfnetlink.c:652
 nfnetlink_rcv+0x10e6/0x2550 net/netfilter/nfnetlink.c:652 net/netfilter/nfnetlink.c:652

__nft_release_hook() calls nft_unregister_flowtable_net_hooks() which
only unregisters the hooks, then after RCU grace period, it is
guaranteed that no packets add new entries to the flowtable (no flow
offload rules and flowtable hooks are reachable from packet path), so it
is safe to call nf_flow_table_free() which cleans up the remaining
entries from the flowtable (both software and hardware) and it unbinds
the flow_block.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48937" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: add a schedule point in io_add_buffers()

Looping ~65535 times doing kmalloc() calls can trigger soft lockups,
especially with DEBUG features (like KASAN).

[  253.536212] watchdog: BUG: soft lockup - CPU#64 stuck for 26s! [b219417889:12575]
[  253.544433] Modules linked in: vfat fat i2c_mux_pca954x i2c_mux spidev cdc_acm xhci_pci xhci_hcd sha3_generic gq(O)
[  253.544451] CPU: 64 PID: 12575 Comm: b219417889 Tainted: G S         O      5.17.0-smp-DEV #801
[  253.544457] RIP: 0010:kernel_text_address (./include/asm-generic/sections.h:192 ./include/linux/kallsyms.h:29 kernel/extable.c:67 kernel/extable.c:98)
[  253.544464] Code: 0f 93 c0 48 c7 c1 e0 63 d7 a4 48 39 cb 0f 92 c1 20 c1 0f b6 c1 5b 5d c3 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 53 48 89 fb &lt;48&gt; c7 c0 00 00 80 a0 41 be 01 00 00 00 48 39 c7 72 0c 48 c7 c0 40
[  253.544468] RSP: 0018:ffff8882d8baf4c0 EFLAGS: 00000246
[  253.544471] RAX: 1ffff1105b175e00 RBX: ffffffffa13ef09a RCX: 00000000a13ef001
[  253.544474] RDX: ffffffffa13ef09a RSI: ffff8882d8baf558 RDI: ffffffffa13ef09a
[  253.544476] RBP: ffff8882d8baf4d8 R08: ffff8882d8baf5e0 R09: 0000000000000004
[  253.544479] R10: ffff8882d8baf5e8 R11: ffffffffa0d59a50 R12: ffff8882eab20380
[  253.544481] R13: ffffffffa0d59a50 R14: dffffc0000000000 R15: 1ffff1105b175eb0
[  253.544483] FS:  00000000016d3380(0000) GS:ffff88af48c00000(0000) knlGS:0000000000000000
[  253.544486] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  253.544488] CR2: 00000000004af0f0 CR3: 00000002eabfa004 CR4: 00000000003706e0
[  253.544491] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  253.544492] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  253.544494] Call Trace:
[  253.544496]  &lt;TASK&gt;
[  253.544498] ? io_queue_sqe (fs/io_uring.c:7143)
[  253.544505] __kernel_text_address (kernel/extable.c:78)
[  253.544508] unwind_get_return_address (arch/x86/kernel/unwind_frame.c:19)
[  253.544514] arch_stack_walk (arch/x86/kernel/stacktrace.c:27)
[  253.544517] ? io_queue_sqe (fs/io_uring.c:7143)
[  253.544521] stack_trace_save (kernel/stacktrace.c:123)
[  253.544527] ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)
[  253.544531] ? ____kasan_kmalloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:515)
[  253.544533] ? __kasan_kmalloc (mm/kasan/common.c:524)
[  253.544535] ? kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)
[  253.544541] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)
[  253.544544] ? __io_queue_sqe (fs/io_uring.c:?)
[  253.544551] __kasan_kmalloc (mm/kasan/common.c:524)
[  253.544553] kmem_cache_alloc_trace (./include/linux/kasan.h:270 mm/slab.c:3567)
[  253.544556] ? io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)
[  253.544560] io_issue_sqe (fs/io_uring.c:4556 fs/io_uring.c:4589 fs/io_uring.c:6828)
[  253.544564] ? __kasan_slab_alloc (mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)
[  253.544567] ? __kasan_slab_alloc (mm/kasan/common.c:39 mm/kasan/common.c:45 mm/kasan/common.c:436 mm/kasan/common.c:469)
[  253.544569] ? kmem_cache_alloc_bulk (mm/slab.h:732 mm/slab.c:3546)
[  253.544573] ? __io_alloc_req_refill (fs/io_uring.c:2078)
[  253.544578] ? io_submit_sqes (fs/io_uring.c:7441)
[  253.544581] ? __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uring.c:10096)
[  253.544584] ? __x64_sys_io_uring_enter (fs/io_uring.c:10096)
[  253.544587] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
[  253.544590] ? entry_SYSCALL_64_after_hwframe (??:?)
[  253.544596] __io_queue_sqe (fs/io_uring.c:?)
[  253.544600] io_queue_sqe (fs/io_uring.c:7143)
[  253.544603] io_submit_sqe (fs/io_uring.c:?)
[  253.544608] io_submit_sqes (fs/io_uring.c:?)
[  253.544612] __se_sys_io_uring_enter (fs/io_uring.c:10154 fs/io_uri
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48938" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

CDC-NCM: avoid overflow in sanity checking

A broken device may give an extreme offset like 0xFFF0
and a reasonable length for a fragment. In the sanity
check as formulated now, this will create an integer
overflow, defeating the sanity check. Both offset
and offset + len need to be checked in such a manner
that no overflow can occur.
And those quantities should be unsigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48939" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add schedule points in batch ops

syzbot reported various soft lockups caused by bpf batch operations.

 INFO: task kworker/1:1:27 blocked for more than 140 seconds.
 INFO: task hung in rcu_barrier

Nothing prevents batch ops to process huge amount of data,
we need to add schedule points in them.

Note that maybe_wait_bpf_programs(map) calls from
generic_map_delete_batch() can be factorized by moving
the call after the loop.

This will be done later in -next tree once we get this fix merged,
unless there is strong opinion doing this optimization sooner.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229616">SUSE bug 1229616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48940" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48940" ref_url="https://www.suse.com/security/cve/CVE-2022-48940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix crash due to incorrect copy_map_value

When both bpf_spin_lock and bpf_timer are present in a BPF map value,
copy_map_value needs to skirt both objects when copying a value into and
out of the map. However, the current code does not set both s_off and
t_off in copy_map_value, which leads to a crash when e.g. bpf_spin_lock
is placed in map value with bpf_timer, as bpf_map_update_elem call will
be able to overwrite the other timer object.

When the issue is not fixed, an overwriting can produce the following
splat:

[root@(none) bpf]# ./test_progs -t timer_crash
[   15.930339] bpf_testmod: loading out-of-tree module taints kernel.
[   16.037849] ==================================================================
[   16.038458] BUG: KASAN: user-memory-access in __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.038944] Write of size 8 at addr 0000000000043ec0 by task test_progs/325
[   16.039399]
[   16.039514] CPU: 0 PID: 325 Comm: test_progs Tainted: G           OE     5.16.0+ #278
[   16.039983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0-1 04/01/2014
[   16.040485] Call Trace:
[   16.040645]  &lt;TASK&gt;
[   16.040805]  dump_stack_lvl+0x59/0x73
[   16.041069]  ? __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.041427]  kasan_report.cold+0x116/0x11b
[   16.041673]  ? __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.042040]  __pv_queued_spin_lock_slowpath+0x32b/0x520
[   16.042328]  ? memcpy+0x39/0x60
[   16.042552]  ? pv_hash+0xd0/0xd0
[   16.042785]  ? lockdep_hardirqs_off+0x95/0xd0
[   16.043079]  __bpf_spin_lock_irqsave+0xdf/0xf0
[   16.043366]  ? bpf_get_current_comm+0x50/0x50
[   16.043608]  ? jhash+0x11a/0x270
[   16.043848]  bpf_timer_cancel+0x34/0xe0
[   16.044119]  bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81
[   16.044500]  bpf_trampoline_6442477838_0+0x36/0x1000
[   16.044836]  __x64_sys_nanosleep+0x5/0x140
[   16.045119]  do_syscall_64+0x59/0x80
[   16.045377]  ? lock_is_held_type+0xe4/0x140
[   16.045670]  ? irqentry_exit_to_user_mode+0xa/0x40
[   16.046001]  ? mark_held_locks+0x24/0x90
[   16.046287]  ? asm_exc_page_fault+0x1e/0x30
[   16.046569]  ? asm_exc_page_fault+0x8/0x30
[   16.046851]  ? lockdep_hardirqs_on+0x7e/0x100
[   16.047137]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   16.047405] RIP: 0033:0x7f9e4831718d
[   16.047602] Code: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48
[   16.048764] RSP: 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023
[   16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d
[   16.049747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0
[   16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0
[   16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30
[   16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   16.051608]  &lt;/TASK&gt;
[   16.051762] ==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48940/">CVE-2022-48940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48940">CVE-2022-48940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229615">SUSE bug 1229615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48941" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix concurrent reset and removal of VFs

Commit c503e63200c6 ("ice: Stop processing VF messages during teardown")
introduced a driver state flag, ICE_VF_DEINIT_IN_PROGRESS, which is
intended to prevent some issues with concurrently handling messages from
VFs while tearing down the VFs.

This change was motivated by crashes caused while tearing down and
bringing up VFs in rapid succession.

It turns out that the fix actually introduces issues with the VF driver
caused because the PF no longer responds to any messages sent by the VF
during its .remove routine. This results in the VF potentially removing
its DMA memory before the PF has shut down the device queues.

Additionally, the fix doesn't actually resolve concurrency issues within
the ice driver. It is possible for a VF to initiate a reset just prior
to the ice driver removing VFs. This can result in the remove task
concurrently operating while the VF is being reset. This results in
similar memory corruption and panics purportedly fixed by that commit.

Fix this concurrency at its root by protecting both the reset and
removal flows using the existing VF cfg_lock. This ensures that we
cannot remove the VF while any outstanding critical tasks such as a
virtchnl message or a reset are occurring.

This locking change also fixes the root cause originally fixed by commit
c503e63200c6 ("ice: Stop processing VF messages during teardown"), so we
can simply revert it.

Note that I kept these two changes together because simply reverting the
original commit alone would leave the driver vulnerable to worse race
conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: Handle failure to register sensor with thermal zone correctly

If an attempt is made to a sensor with a thermal zone and it fails,
the call to devm_thermal_zone_of_sensor_register() may return -ENODEV.
This may result in crashes similar to the following.

Unable to handle kernel NULL pointer dereference at virtual address 00000000000003cd
...
Internal error: Oops: 96000021 [#1] PREEMPT SMP
...
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mutex_lock+0x18/0x60
lr : thermal_zone_device_update+0x40/0x2e0
sp : ffff800014c4fc60
x29: ffff800014c4fc60 x28: ffff365ee3f6e000 x27: ffffdde218426790
x26: ffff365ee3f6e000 x25: 0000000000000000 x24: ffff365ee3f6e000
x23: ffffdde218426870 x22: ffff365ee3f6e000 x21: 00000000000003cd
x20: ffff365ee8bf3308 x19: ffffffffffffffed x18: 0000000000000000
x17: ffffdde21842689c x16: ffffdde1cb7a0b7c x15: 0000000000000040
x14: ffffdde21a4889a0 x13: 0000000000000228 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000001120000 x7 : 0000000000000001 x6 : 0000000000000000
x5 : 0068000878e20f07 x4 : 0000000000000000 x3 : 00000000000003cd
x2 : ffff365ee3f6e000 x1 : 0000000000000000 x0 : 00000000000003cd
Call trace:
 mutex_lock+0x18/0x60
 hwmon_notify_event+0xfc/0x110
 0xffffdde1cb7a0a90
 0xffffdde1cb7a0b7c
 irq_thread_fn+0x2c/0xa0
 irq_thread+0x134/0x240
 kthread+0x178/0x190
 ret_from_fork+0x10/0x20
Code: d503201f d503201f d2800001 aa0103e4 (c8e47c02)

Jon Hunter reports that the exact call sequence is:

hwmon_notify_event()
  --&gt; hwmon_thermal_notify()
    --&gt; thermal_zone_device_update()
      --&gt; update_temperature()
        --&gt; mutex_lock()

The hwmon core needs to handle all errors returned from calls
to devm_thermal_zone_of_sensor_register(). If the call fails
with -ENODEV, report that the sensor was not attached to a
thermal zone  but continue to register the hwmon device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: make apf token non-zero to fix bug

In current async pagefault logic, when a page is ready, KVM relies on
kvm_arch_can_dequeue_async_page_present() to determine whether to deliver
a READY event to the Guest. This function test token value of struct
kvm_vcpu_pv_apf_data, which must be reset to zero by Guest kernel when a
READY event is finished by Guest. If value is zero meaning that a READY
event is done, so the KVM can deliver another.
But the kvm_arch_setup_async_pf() may produce a valid token with zero
value, which is confused with previous mention and may lead the loss of
this READY event.

This bug may cause task blocked forever in Guest:
 INFO: task stress:7532 blocked for more than 1254 seconds.
       Not tainted 5.10.0 #16
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:stress          state:D stack:    0 pid: 7532 ppid:  1409
 flags:0x00000080
 Call Trace:
  __schedule+0x1e7/0x650
  schedule+0x46/0xb0
  kvm_async_pf_task_wait_schedule+0xad/0xe0
  ? exit_to_user_mode_prepare+0x60/0x70
  __kvm_handle_async_pf+0x4f/0xb0
  ? asm_exc_page_fault+0x8/0x30
  exc_page_fault+0x6f/0x110
  ? asm_exc_page_fault+0x8/0x30
  asm_exc_page_fault+0x1e/0x30
 RIP: 0033:0x402d00
 RSP: 002b:00007ffd31912500 EFLAGS: 00010206
 RAX: 0000000000071000 RBX: ffffffffffffffff RCX: 00000000021a32b0
 RDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0
 RBP: 00000000021262b0 R08: 0000000000000003 R09: 0000000000000086
 R10: 00000000000000eb R11: 00007fefbdf2baa0 R12: 0000000000000000
 R13: 0000000000000002 R14: 000000000007d000 R15: 0000000000001000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48944" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: Fix yet more sched_fork() races

Where commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an
invalid sched_task_group") fixed a fork race vs cgroup, it opened up a
race vs syscalls by not placing the task on the runqueue before it
gets exposed through the pidhash.

Commit 13765de8148f ("sched/fair: Fix fault in reweight_entity") is
trying to fix a single instance of this, instead fix the whole class
of issues, effectively reverting this commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48945" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vivid: fix compose size exceed boundary

syzkaller found a bug:

 BUG: unable to handle page fault for address: ffffc9000a3b1000
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 100000067 P4D 100000067 PUD 10015f067 PMD 1121ca067 PTE 0
 Oops: 0002 [#1] PREEMPT SMP
 CPU: 0 PID: 23489 Comm: vivid-000-vid-c Not tainted 6.1.0-rc1+ #512
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
 RIP: 0010:memcpy_erms+0x6/0x10
[...]
 Call Trace:
  &lt;TASK&gt;
  ? tpg_fill_plane_buffer+0x856/0x15b0
  vivid_fillbuff+0x8ac/0x1110
  vivid_thread_vid_cap_tick+0x361/0xc90
  vivid_thread_vid_cap+0x21a/0x3a0
  kthread+0x143/0x180
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;

This is because we forget to check boundary after adjust compose-&gt;height
int V4L2_SEL_TGT_CROP case. Add v4l2_rect_map_inside() to fix this problem
for this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48950" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48950" ref_url="https://www.suse.com/security/cve/CVE-2022-48950" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix perf_pending_task() UaF

Per syzbot it is possible for perf_pending_task() to run after the
event is free()'d. There are two related but distinct cases:

 - the task_work was already queued before destroying the event;
 - destroying the event itself queues the task_work.

The first cannot be solved using task_work_cancel() since
perf_release() itself might be called from a task_work (____fput),
which means the current-&gt;task_works list is already empty and
task_work_cancel() won't be able to find the perf_pending_task()
entry.

The simplest alternative is extending the perf_event lifetime to cover
the task_work.

The second is just silly, queueing a task_work while you know the
event is going away makes no sense and is easily avoided by
re-arranging how the event is marked STATE_DEAD and ensuring it goes
through STATE_OFF on the way down.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48950/">CVE-2022-48950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48950">CVE-2022-48950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231925">SUSE bug 1231925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48952" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48952" ref_url="https://www.suse.com/security/cve/CVE-2022-48952" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: mt7621: Add sentinel to quirks table

Current driver is missing a sentinel in the struct soc_device_attribute
array, which causes an oops when assessed by the
soc_device_match(mt7621_pcie_quirks_match) call.

This was only exposed once the CONFIG_SOC_MT7621 mt7621 soc_dev_attr
was fixed to register the SOC as a device, in:

commit 7c18b64bba3b ("mips: ralink: mt7621: do not use kzalloc too early")

Fix it by adding the required sentinel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48952/">CVE-2022-48952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48952">CVE-2022-48952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231932">SUSE bug 1231932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48954" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: fix use-after-free in hsci

KASAN found that addr was dereferenced after br2dev_event_work was freed.

==================================================================
BUG: KASAN: use-after-free in qeth_l2_br2dev_worker+0x5ba/0x6b0
Read of size 1 at addr 00000000fdcea440 by task kworker/u760:4/540
CPU: 17 PID: 540 Comm: kworker/u760:4 Tainted: G            E      6.1.0-20221128.rc7.git1.5aa3bed4ce83.300.fc36.s390x+kasan #1
Hardware name: IBM 8561 T01 703 (LPAR)
Workqueue: 0.0.8000_event qeth_l2_br2dev_worker
Call Trace:
 [&lt;000000016944d4ce&gt;] dump_stack_lvl+0xc6/0xf8
 [&lt;000000016942cd9c&gt;] print_address_description.constprop.0+0x34/0x2a0
 [&lt;000000016942d118&gt;] print_report+0x110/0x1f8
 [&lt;0000000167a7bd04&gt;] kasan_report+0xfc/0x128
 [&lt;000000016938d79a&gt;] qeth_l2_br2dev_worker+0x5ba/0x6b0
 [&lt;00000001673edd1e&gt;] process_one_work+0x76e/0x1128
 [&lt;00000001673ee85c&gt;] worker_thread+0x184/0x1098
 [&lt;000000016740718a&gt;] kthread+0x26a/0x310
 [&lt;00000001672c606a&gt;] __ret_from_fork+0x8a/0xe8
 [&lt;00000001694711da&gt;] ret_from_fork+0xa/0x40
Allocated by task 108338:
 kasan_save_stack+0x40/0x68
 kasan_set_track+0x36/0x48
 __kasan_kmalloc+0xa0/0xc0
 qeth_l2_switchdev_event+0x25a/0x738
 atomic_notifier_call_chain+0x9c/0xf8
 br_switchdev_fdb_notify+0xf4/0x110
 fdb_notify+0x122/0x180
 fdb_add_entry.constprop.0.isra.0+0x312/0x558
 br_fdb_add+0x59e/0x858
 rtnl_fdb_add+0x58a/0x928
 rtnetlink_rcv_msg+0x5f8/0x8d8
 netlink_rcv_skb+0x1f2/0x408
 netlink_unicast+0x570/0x790
 netlink_sendmsg+0x752/0xbe0
 sock_sendmsg+0xca/0x110
 ____sys_sendmsg+0x510/0x6a8
 ___sys_sendmsg+0x12a/0x180
 __sys_sendmsg+0xe6/0x168
 __do_sys_socketcall+0x3c8/0x468
 do_syscall+0x22c/0x328
 __do_syscall+0x94/0xf0
 system_call+0x82/0xb0
Freed by task 540:
 kasan_save_stack+0x40/0x68
 kasan_set_track+0x36/0x48
 kasan_save_free_info+0x4c/0x68
 ____kasan_slab_free+0x14e/0x1a8
 __kasan_slab_free+0x24/0x30
 __kmem_cache_free+0x168/0x338
 qeth_l2_br2dev_worker+0x154/0x6b0
 process_one_work+0x76e/0x1128
 worker_thread+0x184/0x1098
 kthread+0x26a/0x310
 __ret_from_fork+0x8a/0xe8
 ret_from_fork+0xa/0x40
Last potentially related work creation:
 kasan_save_stack+0x40/0x68
 __kasan_record_aux_stack+0xbe/0xd0
 insert_work+0x56/0x2e8
 __queue_work+0x4ce/0xd10
 queue_work_on+0xf4/0x100
 qeth_l2_switchdev_event+0x520/0x738
 atomic_notifier_call_chain+0x9c/0xf8
 br_switchdev_fdb_notify+0xf4/0x110
 fdb_notify+0x122/0x180
 fdb_add_entry.constprop.0.isra.0+0x312/0x558
 br_fdb_add+0x59e/0x858
 rtnl_fdb_add+0x58a/0x928
 rtnetlink_rcv_msg+0x5f8/0x8d8
 netlink_rcv_skb+0x1f2/0x408
 netlink_unicast+0x570/0x790
 netlink_sendmsg+0x752/0xbe0
 sock_sendmsg+0xca/0x110
 ____sys_sendmsg+0x510/0x6a8
 ___sys_sendmsg+0x12a/0x180
 __sys_sendmsg+0xe6/0x168
 __do_sys_socketcall+0x3c8/0x468
 do_syscall+0x22c/0x328
 __do_syscall+0x94/0xf0
 system_call+0x82/0xb0
Second to last potentially related work creation:
 kasan_save_stack+0x40/0x68
 __kasan_record_aux_stack+0xbe/0xd0
 kvfree_call_rcu+0xb2/0x760
 kernfs_unlink_open_file+0x348/0x430
 kernfs_fop_release+0xc2/0x320
 __fput+0x1ae/0x768
 task_work_run+0x1bc/0x298
 exit_to_user_mode_prepare+0x1a0/0x1a8
 __do_syscall+0x94/0xf0
 system_call+0x82/0xb0
The buggy address belongs to the object at 00000000fdcea400
 which belongs to the cache kmalloc-96 of size 96
The buggy address is located 64 bytes inside of
 96-byte region [00000000fdcea400, 00000000fdcea460)
The buggy address belongs to the physical page:
page:000000005a9c26e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xfdcea
flags: 0x3ffff00000000200(slab|node=0|zone=1|lastcpupid=0x1ffff)
raw: 3ffff00000000200 0000000000000000 0000000100000122 000000008008cc00
raw: 0000000000000000 0020004100000000 ffffffff00000001 0000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
 00000000fdcea300: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
 00000000fdcea380: fb fb fb fb fb fb f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48955" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: thunderbolt: fix memory leak in tbnet_open()

When tb_ring_alloc_rx() failed in tbnet_open(), ida that allocated in
tb_xdomain_alloc_out_hopid() is not released. Add
tb_xdomain_release_out_hopid() to the error path to release ida.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48957" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48957" ref_url="https://www.suse.com/security/cve/CVE-2022-48957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove()

The cmd_buff needs to be freed when error happened in
dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48957/">CVE-2022-48957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48957">CVE-2022-48957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231973">SUSE bug 1231973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48958" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48958" ref_url="https://www.suse.com/security/cve/CVE-2022-48958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: aeroflex: fix potential skb leak in greth_init_rings()

The greth_init_rings() function won't free the newly allocated skb when
dma_mapping_error() returns error, so add dev_kfree_skb() to fix it.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48958/">CVE-2022-48958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48958">CVE-2022-48958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231889">SUSE bug 1231889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions()

When dsa_devlink_region_create failed in sja1105_setup_devlink_regions(),
priv-&gt;regions is not released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48963" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48963" ref_url="https://www.suse.com/security/cve/CVE-2022-48963" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: iosm: fix memory leak in ipc_mux_init()

When failed to alloc ipc_mux-&gt;ul_adb.pp_qlt in ipc_mux_init(), ipc_mux
is not released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48963/">CVE-2022-48963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48963">CVE-2022-48963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231974">SUSE bug 1231974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48964" ref_url="https://www.suse.com/security/cve/CVE-2022-48964" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ravb: Fix potential use-after-free in ravb_rx_gbeth()

The skb is delivered to napi_gro_receive() which may free it, after calling this,
dereferencing skb may trigger use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48964/">CVE-2022-48964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48964">CVE-2022-48964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232023">SUSE bug 1232023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48965" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48965" ref_url="https://www.suse.com/security/cve/CVE-2022-48965" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio/rockchip: fix refcount leak in rockchip_gpiolib_register()

The node returned by of_get_parent() with refcount incremented,
of_node_put() needs be called when finish using it. So add it in the
end of of_pinctrl_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48965/">CVE-2022-48965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48965">CVE-2022-48965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232022">SUSE bug 1232022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48966" ref_url="https://www.suse.com/security/cve/CVE-2022-48966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mvneta: Prevent out of bounds read in mvneta_config_rss()

The pp-&gt;indir[0] value comes from the user.  It is passed to:

	if (cpu_online(pp-&gt;rxq_def))

inside the mvneta_percpu_elect() function.  It needs bounds checkeding
to ensure that it is not beyond the end of the cpu bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48966/">CVE-2022-48966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48966">CVE-2022-48966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232191">SUSE bug 1232191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48968" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential memory leak in otx2_init_tc()

In otx2_init_tc(), if rhashtable_init() failed, it does not free
tc-&gt;tc_entries_bitmap which is allocated in otx2_tc_alloc_ent_bitmap().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48970" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Get user_ns from in_skb in unix_diag_get_exact().

Wei Chen reported a NULL deref in sk_user_ns() [0][1], and Paolo diagnosed
the root cause: in unix_diag_get_exact(), the newly allocated skb does not
have sk. [2]

We must get the user_ns from the NETLINK_CB(in_skb).sk and pass it to
sk_diag_fill().

[0]:
BUG: kernel NULL pointer dereference, address: 0000000000000270
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 12bbce067 P4D 12bbce067 PUD 12bc40067 PMD 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 0 PID: 27942 Comm: syz-executor.0 Not tainted 6.1.0-rc5-next-20221118 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014
RIP: 0010:sk_user_ns include/net/sock.h:920 [inline]
RIP: 0010:sk_diag_dump_uid net/unix/diag.c:119 [inline]
RIP: 0010:sk_diag_fill+0x77d/0x890 net/unix/diag.c:170
Code: 89 ef e8 66 d4 2d fd c7 44 24 40 00 00 00 00 49 8d 7c 24 18 e8
54 d7 2d fd 49 8b 5c 24 18 48 8d bb 70 02 00 00 e8 43 d7 2d fd &lt;48&gt; 8b
9b 70 02 00 00 48 8d 7b 10 e8 33 d7 2d fd 48 8b 5b 10 48 8d
RSP: 0018:ffffc90000d67968 EFLAGS: 00010246
RAX: ffff88812badaa48 RBX: 0000000000000000 RCX: ffffffff840d481d
RDX: 0000000000000465 RSI: 0000000000000000 RDI: 0000000000000270
RBP: ffffc90000d679a8 R08: 0000000000000277 R09: 0000000000000000
R10: 0001ffffffffffff R11: 0001c90000d679a8 R12: ffff88812ac03800
R13: ffff88812c87c400 R14: ffff88812ae42210 R15: ffff888103026940
FS:  00007f08b4e6f700(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000270 CR3: 000000012c58b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 unix_diag_get_exact net/unix/diag.c:285 [inline]
 unix_diag_handler_dump+0x3f9/0x500 net/unix/diag.c:317
 __sock_diag_cmd net/core/sock_diag.c:235 [inline]
 sock_diag_rcv_msg+0x237/0x250 net/core/sock_diag.c:266
 netlink_rcv_skb+0x13e/0x250 net/netlink/af_netlink.c:2564
 sock_diag_rcv+0x24/0x40 net/core/sock_diag.c:277
 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
 netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1356
 netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1932
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0x38f/0x500 net/socket.c:2476
 ___sys_sendmsg net/socket.c:2530 [inline]
 __sys_sendmsg+0x197/0x230 net/socket.c:2559
 __do_sys_sendmsg net/socket.c:2568 [inline]
 __se_sys_sendmsg net/socket.c:2566 [inline]
 __x64_sys_sendmsg+0x42/0x50 net/socket.c:2566
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x4697f9
Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d
01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f08b4e6ec48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000077bf80 RCX: 00000000004697f9
RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003
RBP: 00000000004d29e9 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000077bf80
R13: 0000000000000000 R14: 000000000077bf80 R15: 00007ffdb36bc6c0
 &lt;/TASK&gt;
Modules linked in:
CR2: 0000000000000270

[1]: https://lore.kernel.org/netdev/CAO4mrfdvyjFpokhNsiwZiP-wpdSD0AStcJwfKcKQdAALQ9_2Qw@mail.gmail.com/
[2]: https://lore.kernel.org/netdev/e04315e7c90d9a75613f3993c2baf2d344eef7eb.camel@redhat.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48974" ref_url="https://www.suse.com/security/cve/CVE-2022-48974" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: fix using __this_cpu_add in preemptible

Currently in nf_conntrack_hash_check_insert(), when it fails in
nf_ct_ext_valid_pre/post(), NF_CT_STAT_INC() will be called in the
preemptible context, a call trace can be triggered:

   BUG: using __this_cpu_add() in preemptible [00000000] code: conntrack/1636
   caller is nf_conntrack_hash_check_insert+0x45/0x430 [nf_conntrack]
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x33/0x46
    check_preemption_disabled+0xc3/0xf0
    nf_conntrack_hash_check_insert+0x45/0x430 [nf_conntrack]
    ctnetlink_create_conntrack+0x3cd/0x4e0 [nf_conntrack_netlink]
    ctnetlink_new_conntrack+0x1c0/0x450 [nf_conntrack_netlink]
    nfnetlink_rcv_msg+0x277/0x2f0 [nfnetlink]
    netlink_rcv_skb+0x50/0x100
    nfnetlink_rcv+0x65/0x144 [nfnetlink]
    netlink_unicast+0x1ae/0x290
    netlink_sendmsg+0x257/0x4f0
    sock_sendmsg+0x5f/0x70

This patch is to fix it by changing to use NF_CT_STAT_INC_ATOMIC() for
nf_ct_ext_valid_pre/post() check in nf_conntrack_hash_check_insert(),
as well as nf_ct_ext_valid_post() in __nf_conntrack_confirm().

Note that nf_ct_ext_valid_pre() check in __nf_conntrack_confirm() is
safe to use NF_CT_STAT_INC(), as it's under local_bh_disable().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48974/">CVE-2022-48974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48974">CVE-2022-48974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231886">SUSE bug 1231886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48975" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix memory leak in gpiochip_setup_dev()

Here is a backtrace report about memory leak detected in
gpiochip_setup_dev():

unreferenced object 0xffff88810b406400 (size 512):
  comm "python3", pid 1682, jiffies 4295346908 (age 24.090s)
  backtrace:
    kmalloc_trace
    device_add		device_private_init at drivers/base/core.c:3361
			(inlined by) device_add at drivers/base/core.c:3411
    cdev_device_add
    gpiolib_cdev_register
    gpiochip_setup_dev
    gpiochip_add_data_with_key

gcdev_register() &amp; gcdev_unregister() would call device_add() &amp;
device_del() (no matter CONFIG_GPIO_CDEV is enabled or not) to
register/unregister device.

However, if device_add() succeeds, some resource (like
struct device_private allocated by device_private_init())
is not released by device_del().

Therefore, after device_add() succeeds by gcdev_register(), it
needs to call put_device() to release resource in the error handle
path.

Here we move forward the register of release function, and let it
release every piece of resource by put_device() instead of kfree().

While at it, fix another subtle issue, i.e. when gc-&gt;ngpio is equal
to 0, we still call kcalloc() and, in case of further error, kfree()
on the ZERO_PTR pointer, which is not NULL. It's not a bug per se,
but rather waste of the resources and potentially wrong expectation
about contents of the gdev-&gt;descs variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48976" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48976" ref_url="https://www.suse.com/security/cve/CVE-2022-48976" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable_offload: fix using __this_cpu_add in preemptible

flow_offload_queue_work() can be called in workqueue without
bh disabled, like the call trace showed in my act_ct testing,
calling NF_FLOW_TABLE_STAT_INC() there would cause a call
trace:

  BUG: using __this_cpu_add() in preemptible [00000000] code: kworker/u4:0/138560
  caller is flow_offload_queue_work+0xec/0x1b0 [nf_flow_table]
  Workqueue: act_ct_workqueue tcf_ct_flow_table_cleanup_work [act_ct]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x33/0x46
   check_preemption_disabled+0xc3/0xf0
   flow_offload_queue_work+0xec/0x1b0 [nf_flow_table]
   nf_flow_table_iterate+0x138/0x170 [nf_flow_table]
   nf_flow_table_free+0x140/0x1a0 [nf_flow_table]
   tcf_ct_flow_table_cleanup_work+0x2f/0x2b0 [act_ct]
   process_one_work+0x6a3/0x1030
   worker_thread+0x8a/0xdf0

This patch fixes it by using NF_FLOW_TABLE_STAT_INC_ATOMIC()
instead in flow_offload_queue_work().

Note that for FLOW_CLS_REPLACE branch in flow_offload_queue_work(),
it may not be called in preemptible path, but it's good to use
NF_FLOW_TABLE_STAT_INC_ATOMIC() for all cases in
flow_offload_queue_work().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48976/">CVE-2022-48976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48976">CVE-2022-48976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231884">SUSE bug 1231884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48977" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: af_can: fix NULL pointer dereference in can_rcv_filter

Analogue to commit 8aa59e355949 ("can: af_can: fix NULL pointer
dereference in can_rx_register()") we need to check for a missing
initialization of ml_priv in the receive path of CAN frames.

Since commit 4e096a18867a ("net: introduce CAN specific pointer in the
struct net_device") the check for dev-&gt;type to be ARPHRD_CAN is not
sufficient anymore since bonding or tun netdevices claim to be CAN
devices but do not initialize ml_priv accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48979" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48979" ref_url="https://www.suse.com/security/cve/CVE-2022-48979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix array index out of bound error in DCN32 DML

[Why&amp;How]
LinkCapacitySupport array is indexed with the number of voltage states and
not the number of max DPPs. Fix the error by changing the array
declaration to use the correct (larger) array size of total number of
voltage states.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48979/">CVE-2022-48979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48979">CVE-2022-48979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232293">SUSE bug 1232293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48980" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48980" ref_url="https://www.suse.com/security/cve/CVE-2022-48980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing()

The SJA1105 family has 45 L2 policing table entries
(SJA1105_MAX_L2_POLICING_COUNT) and SJA1110 has 110
(SJA1110_MAX_L2_POLICING_COUNT). Keeping the table structure but
accounting for the difference in port count (5 in SJA1105 vs 10 in
SJA1110) does not fully explain the difference. Rather, the SJA1110 also
has L2 ingress policers for multicast traffic. If a packet is classified
as multicast, it will be processed by the policer index 99 + SRCPORT.

The sja1105_init_l2_policing() function initializes all L2 policers such
that they don't interfere with normal packet reception by default. To have
a common code between SJA1105 and SJA1110, the index of the multicast
policer for the port is calculated because it's an index that is out of
bounds for SJA1105 but in bounds for SJA1110, and a bounds check is
performed.

The code fails to do the proper thing when determining what to do with the
multicast policer of port 0 on SJA1105 (ds-&gt;num_ports = 5). The "mcast"
index will be equal to 45, which is also equal to
table-&gt;ops-&gt;max_entry_count (SJA1105_MAX_L2_POLICING_COUNT). So it passes
through the check. But at the same time, SJA1105 doesn't have multicast
policers. So the code programs the SHARINDX field of an out-of-bounds
element in the L2 Policing table of the static config.

The comparison between index 45 and 45 entries should have determined the
code to not access this policer index on SJA1105, since its memory wasn't
even allocated.

With enough bad luck, the out-of-bounds write could even overwrite other
valid kernel data, but in this case, the issue was detected using KASAN.

Kernel log:

sja1105 spi5.0: Probed switch chip: SJA1105Q
==================================================================
BUG: KASAN: slab-out-of-bounds in sja1105_setup+0x1cbc/0x2340
Write of size 8 at addr ffffff880bd57708 by task kworker/u8:0/8
...
Workqueue: events_unbound deferred_probe_work_func
Call trace:
...
sja1105_setup+0x1cbc/0x2340
dsa_register_switch+0x1284/0x18d0
sja1105_probe+0x748/0x840
...
Allocated by task 8:
...
sja1105_setup+0x1bcc/0x2340
dsa_register_switch+0x1284/0x18d0
sja1105_probe+0x748/0x840
...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48980/">CVE-2022-48980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48980">CVE-2022-48980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232233">SUSE bug 1232233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48981" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/shmem-helper: Remove errant put in error path

drm_gem_shmem_mmap() doesn't own this reference, resulting in the GEM
object getting prematurely freed leading to a later use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48982" ref_url="https://www.suse.com/security/cve/CVE-2022-48982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix crash when replugging CSR fake controllers

It seems fake CSR 5.0 clones can cause the suspend notifier to be
registered twice causing the following kernel panic:

[   71.986122] Call Trace:
[   71.986124]  &lt;TASK&gt;
[   71.986125]  blocking_notifier_chain_register+0x33/0x60
[   71.986130]  hci_register_dev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da]
[   71.986154]  btusb_probe+0x979/0xd85 [btusb e1e0605a4f4c01984a4b9c8ac58c3666ae287477]
[   71.986159]  ? __pm_runtime_set_status+0x1a9/0x300
[   71.986162]  ? ktime_get_mono_fast_ns+0x3e/0x90
[   71.986167]  usb_probe_interface+0xe3/0x2b0
[   71.986171]  really_probe+0xdb/0x380
[   71.986174]  ? pm_runtime_barrier+0x54/0x90
[   71.986177]  __driver_probe_device+0x78/0x170
[   71.986180]  driver_probe_device+0x1f/0x90
[   71.986183]  __device_attach_driver+0x89/0x110
[   71.986186]  ? driver_allows_async_probing+0x70/0x70
[   71.986189]  bus_for_each_drv+0x8c/0xe0
[   71.986192]  __device_attach+0xb2/0x1e0
[   71.986195]  bus_probe_device+0x92/0xb0
[   71.986198]  device_add+0x422/0x9a0
[   71.986201]  ? sysfs_merge_group+0xd4/0x110
[   71.986205]  usb_set_configuration+0x57a/0x820
[   71.986208]  usb_generic_driver_probe+0x4f/0x70
[   71.986211]  usb_probe_device+0x3a/0x110
[   71.986213]  really_probe+0xdb/0x380
[   71.986216]  ? pm_runtime_barrier+0x54/0x90
[   71.986219]  __driver_probe_device+0x78/0x170
[   71.986221]  driver_probe_device+0x1f/0x90
[   71.986224]  __device_attach_driver+0x89/0x110
[   71.986227]  ? driver_allows_async_probing+0x70/0x70
[   71.986230]  bus_for_each_drv+0x8c/0xe0
[   71.986232]  __device_attach+0xb2/0x1e0
[   71.986235]  bus_probe_device+0x92/0xb0
[   71.986237]  device_add+0x422/0x9a0
[   71.986239]  ? _dev_info+0x7d/0x98
[   71.986242]  ? blake2s_update+0x4c/0xc0
[   71.986246]  usb_new_device.cold+0x148/0x36d
[   71.986250]  hub_event+0xa8a/0x1910
[   71.986255]  process_one_work+0x1c4/0x380
[   71.986259]  worker_thread+0x51/0x390
[   71.986262]  ? rescuer_thread+0x3b0/0x3b0
[   71.986264]  kthread+0xdb/0x110
[   71.986266]  ? kthread_complete_and_exit+0x20/0x20
[   71.986268]  ret_from_fork+0x1f/0x30
[   71.986273]  &lt;/TASK&gt;
[   71.986274] ---[ end trace 0000000000000000 ]---
[   71.986284] btusb: probe of 2-1.6:1.0 failed with error -17
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48982/">CVE-2022-48982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48982">CVE-2022-48982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231978">SUSE bug 1231978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48983" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48983" ref_url="https://www.suse.com/security/cve/CVE-2022-48983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: Fix a null-ptr-deref in io_tctx_exit_cb()

Syzkaller reports a NULL deref bug as follows:

 BUG: KASAN: null-ptr-deref in io_tctx_exit_cb+0x53/0xd3
 Read of size 4 at addr 0000000000000138 by task file1/1955

 CPU: 1 PID: 1955 Comm: file1 Not tainted 6.1.0-rc7-00103-gef4d3ea40565 #75
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0xcd/0x134
  ? io_tctx_exit_cb+0x53/0xd3
  kasan_report+0xbb/0x1f0
  ? io_tctx_exit_cb+0x53/0xd3
  kasan_check_range+0x140/0x190
  io_tctx_exit_cb+0x53/0xd3
  task_work_run+0x164/0x250
  ? task_work_cancel+0x30/0x30
  get_signal+0x1c3/0x2440
  ? lock_downgrade+0x6e0/0x6e0
  ? lock_downgrade+0x6e0/0x6e0
  ? exit_signals+0x8b0/0x8b0
  ? do_raw_read_unlock+0x3b/0x70
  ? do_raw_spin_unlock+0x50/0x230
  arch_do_signal_or_restart+0x82/0x2470
  ? kmem_cache_free+0x260/0x4b0
  ? putname+0xfe/0x140
  ? get_sigframe_size+0x10/0x10
  ? do_execveat_common.isra.0+0x226/0x710
  ? lockdep_hardirqs_on+0x79/0x100
  ? putname+0xfe/0x140
  ? do_execveat_common.isra.0+0x238/0x710
  exit_to_user_mode_prepare+0x15f/0x250
  syscall_exit_to_user_mode+0x19/0x50
  do_syscall_64+0x42/0xb0
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 RIP: 0023:0x0
 Code: Unable to access opcode bytes at 0xffffffffffffffd6.
 RSP: 002b:00000000fffb7790 EFLAGS: 00000200 ORIG_RAX: 000000000000000b
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Kernel panic - not syncing: panic_on_warn set ...

This happens because the adding of task_work from io_ring_exit_work()
isn't synchronized with canceling all work items from eg exec. The
execution of the two are ordered in that they are both run by the task
itself, but if io_tctx_exit_cb() is queued while we're canceling all
work items off exec AND gets executed when the task exits to userspace
rather than in the main loop in io_uring_cancel_generic(), then we can
find current-&gt;io_uring == NULL and hit the above crash.

It's safe to add this NULL check here, because the execution of the two
paths are done by the task itself.

[axboe: add code comment and also put an explanation in the commit msg]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48983/">CVE-2022-48983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48983">CVE-2022-48983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231959">SUSE bug 1231959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48984" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48984" ref_url="https://www.suse.com/security/cve/CVE-2022-48984" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: slcan: fix freed work crash

The LTP test pty03 is causing a crash in slcan:
  BUG: kernel NULL pointer dereference, address: 0000000000000008
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 0 PID: 348 Comm: kworker/0:3 Not tainted 6.0.8-1-default #1 openSUSE Tumbleweed 9d20364b934f5aab0a9bdf84e8f45cfdfae39dab
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014
  Workqueue:  0x0 (events)
  RIP: 0010:process_one_work (/home/rich/kernel/linux/kernel/workqueue.c:706 /home/rich/kernel/linux/kernel/workqueue.c:2185)
  Code: 49 89 ff 41 56 41 55 41 54 55 53 48 89 f3 48 83 ec 10 48 8b 06 48 8b 6f 48 49 89 c4 45 30 e4 a8 04 b8 00 00 00 00 4c 0f 44 e0 &lt;49&gt; 8b 44 24 08 44 8b a8 00 01 00 00 41 83 e5 20 f6 45 10 04 75 0e
  RSP: 0018:ffffaf7b40f47e98 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: ffff9d644e1b8b48 RCX: ffff9d649e439968
  RDX: 00000000ffff8455 RSI: ffff9d644e1b8b48 RDI: ffff9d64764aa6c0
  RBP: ffff9d649e4335c0 R08: 0000000000000c00 R09: ffff9d64764aa734
  R10: 0000000000000007 R11: 0000000000000001 R12: 0000000000000000
  R13: ffff9d649e4335e8 R14: ffff9d64490da780 R15: ffff9d64764aa6c0
  FS:  0000000000000000(0000) GS:ffff9d649e400000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000008 CR3: 0000000036424000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
  worker_thread (/home/rich/kernel/linux/kernel/workqueue.c:2436)
  kthread (/home/rich/kernel/linux/kernel/kthread.c:376)
  ret_from_fork (/home/rich/kernel/linux/arch/x86/entry/entry_64.S:312)

Apparently, the slcan's tx_work is freed while being scheduled. While
slcan_netdev_close() (netdev side) calls flush_work(&amp;sl-&gt;tx_work),
slcan_close() (tty side) does not. So when the netdev is never set UP,
but the tty is stuffed with bytes and forced to wakeup write, the work
is scheduled, but never flushed.

So add an additional flush_work() to slcan_close() to be sure the work
is flushed under all circumstances.

The Fixes commit below moved flush_work() from slcan_close() to
slcan_netdev_close(). What was the rationale behind it? Maybe we can
drop the one in slcan_netdev_close()?

I see the same pattern in can327. So it perhaps needs the very same fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48984/">CVE-2022-48984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48984">CVE-2022-48984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231982">SUSE bug 1231982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48987" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-dv-timings.c: fix too strict blanking sanity checks

Sanity checks were added to verify the v4l2_bt_timings blanking fields
in order to avoid integer overflows when userspace passes weird values.

But that assumed that userspace would correctly fill in the front porch,
backporch and sync values, but sometimes all you know is the total
blanking, which is then assigned to just one of these fields.

And that can fail with these checks.

So instead set a maximum for the total horizontal and vertical
blanking and check that each field remains below that.

That is still sufficient to avoid integer overflows, but it also
allows for more flexibility in how userspace fills in these fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48989" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: Fix oops due to race with cookie_lru and use_cookie

If a cookie expires from the LRU and the LRU_DISCARD flag is set, but
the state machine has not run yet, it's possible another thread can call
fscache_use_cookie and begin to use it.

When the cookie_worker finally runs, it will see the LRU_DISCARD flag
set, transition the cookie-&gt;state to LRU_DISCARDING, which will then
withdraw the cookie.  Once the cookie is withdrawn the object is removed
the below oops will occur because the object associated with the cookie
is now NULL.

Fix the oops by clearing the LRU_DISCARD bit if another thread uses the
cookie before the cookie_worker runs.

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  ...
  CPU: 31 PID: 44773 Comm: kworker/u130:1 Tainted: G     E    6.0.0-5.dneg.x86_64 #1
  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
  Workqueue: events_unbound netfs_rreq_write_to_cache_work [netfs]
  RIP: 0010:cachefiles_prepare_write+0x28/0x90 [cachefiles]
  ...
  Call Trace:
    netfs_rreq_write_to_cache_work+0x11c/0x320 [netfs]
    process_one_work+0x217/0x3e0
    worker_thread+0x4a/0x3b0
    kthread+0xd6/0x100
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232027">SUSE bug 1232027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48990" ref_url="https://www.suse.com/security/cve/CVE-2022-48990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free during gpu recovery

[Why]
    [  754.862560] refcount_t: underflow; use-after-free.
    [  754.862898] Call Trace:
    [  754.862903]  &lt;TASK&gt;
    [  754.862913]  amdgpu_job_free_cb+0xc2/0xe1 [amdgpu]
    [  754.863543]  drm_sched_main.cold+0x34/0x39 [amd_sched]

[How]
    The fw_fence may be not init, check whether dma_fence_init
    is performed before job free
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48990/">CVE-2022-48990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48990">CVE-2022-48990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232028">SUSE bug 1232028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232029">SUSE bug 1232029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48991" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths

Any codepath that zaps page table entries must invoke MMU notifiers to
ensure that secondary MMUs (like KVM) don't keep accessing pages which
aren't mapped anymore.  Secondary MMUs don't hold their own references to
pages that are mirrored over, so failing to notify them can lead to page
use-after-free.

I'm marking this as addressing an issue introduced in commit f3f0e1d2150b
("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of
the security impact of this only came in commit 27e1f8273113 ("khugepaged:
enable collapse pmd for pte-mapped THP"), which actually omitted flushes
for the removal of present PTEs, not just for the removal of empty page
tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232372">SUSE bug 1232372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48994" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: seq: Fix function prototype mismatch in snd_seq_expand_var_event

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed.

seq_copy_in_user() and seq_copy_in_kernel() did not have prototypes
matching snd_seq_dump_func_t. Adjust this and remove the casts. There
are not resulting binary output differences.

This was found as a result of Clang's new -Wcast-function-type-strict
flag, which is more sensitive than the simpler -Wcast-function-type,
which only checks for type width mismatches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48995" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: raydium_ts_i2c - fix memory leak in raydium_i2c_send()

There is a kmemleak when test the raydium_i2c_ts with bpf mock device:

  unreferenced object 0xffff88812d3675a0 (size 8):
    comm "python3", pid 349, jiffies 4294741067 (age 95.695s)
    hex dump (first 8 bytes):
      11 0e 10 c0 01 00 04 00                          ........
    backtrace:
      [&lt;0000000068427125&gt;] __kmalloc+0x46/0x1b0
      [&lt;0000000090180f91&gt;] raydium_i2c_send+0xd4/0x2bf [raydium_i2c_ts]
      [&lt;000000006e631aee&gt;] raydium_i2c_initialize.cold+0xbc/0x3e4 [raydium_i2c_ts]
      [&lt;00000000dc6fcf38&gt;] raydium_i2c_probe+0x3cd/0x6bc [raydium_i2c_ts]
      [&lt;00000000a310de16&gt;] i2c_device_probe+0x651/0x680
      [&lt;00000000f5a96bf3&gt;] really_probe+0x17c/0x3f0
      [&lt;00000000096ba499&gt;] __driver_probe_device+0xe3/0x170
      [&lt;00000000c5acb4d9&gt;] driver_probe_device+0x49/0x120
      [&lt;00000000264fe082&gt;] __device_attach_driver+0xf7/0x150
      [&lt;00000000f919423c&gt;] bus_for_each_drv+0x114/0x180
      [&lt;00000000e067feca&gt;] __device_attach+0x1e5/0x2d0
      [&lt;0000000054301fc2&gt;] bus_probe_device+0x126/0x140
      [&lt;00000000aad93b22&gt;] device_add+0x810/0x1130
      [&lt;00000000c086a53f&gt;] i2c_new_client_device+0x352/0x4e0
      [&lt;000000003c2c248c&gt;] of_i2c_register_device+0xf1/0x110
      [&lt;00000000ffec4177&gt;] of_i2c_notify+0x100/0x160
  unreferenced object 0xffff88812d3675c8 (size 8):
    comm "python3", pid 349, jiffies 4294741070 (age 95.692s)
    hex dump (first 8 bytes):
      22 00 36 2d 81 88 ff ff                          ".6-....
    backtrace:
      [&lt;0000000068427125&gt;] __kmalloc+0x46/0x1b0
      [&lt;0000000090180f91&gt;] raydium_i2c_send+0xd4/0x2bf [raydium_i2c_ts]
      [&lt;000000001d5c9620&gt;] raydium_i2c_initialize.cold+0x223/0x3e4 [raydium_i2c_ts]
      [&lt;00000000dc6fcf38&gt;] raydium_i2c_probe+0x3cd/0x6bc [raydium_i2c_ts]
      [&lt;00000000a310de16&gt;] i2c_device_probe+0x651/0x680
      [&lt;00000000f5a96bf3&gt;] really_probe+0x17c/0x3f0
      [&lt;00000000096ba499&gt;] __driver_probe_device+0xe3/0x170
      [&lt;00000000c5acb4d9&gt;] driver_probe_device+0x49/0x120
      [&lt;00000000264fe082&gt;] __device_attach_driver+0xf7/0x150
      [&lt;00000000f919423c&gt;] bus_for_each_drv+0x114/0x180
      [&lt;00000000e067feca&gt;] __device_attach+0x1e5/0x2d0
      [&lt;0000000054301fc2&gt;] bus_probe_device+0x126/0x140
      [&lt;00000000aad93b22&gt;] device_add+0x810/0x1130
      [&lt;00000000c086a53f&gt;] i2c_new_client_device+0x352/0x4e0
      [&lt;000000003c2c248c&gt;] of_i2c_register_device+0xf1/0x110
      [&lt;00000000ffec4177&gt;] of_i2c_notify+0x100/0x160

After BANK_SWITCH command from i2c BUS, no matter success or error
happened, the tx_buf should be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48996" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48996" ref_url="https://www.suse.com/security/cve/CVE-2022-48996" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: fix wrong empty schemes assumption under online tuning in damon_sysfs_set_schemes()

Commit da87878010e5 ("mm/damon/sysfs: support online inputs update") made
'damon_sysfs_set_schemes()' to be called for running DAMON context, which
could have schemes.  In the case, DAMON sysfs interface is supposed to
update, remove, or add schemes to reflect the sysfs files.  However, the
code is assuming the DAMON context wouldn't have schemes at all, and
therefore creates and adds new schemes.  As a result, the code doesn't
work as intended for online schemes tuning and could have more than
expected memory footprint.  The schemes are all in the DAMON context, so
it doesn't leak the memory, though.

Remove the wrong asssumption (the DAMON context wouldn't have schemes) in
'damon_sysfs_set_schemes()' to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48996/">CVE-2022-48996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48996">CVE-2022-48996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232121">SUSE bug 1232121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: tpm: Protect tpm_pm_suspend with locks

Currently tpm transactions are executed unconditionally in
tpm_pm_suspend() function, which may lead to races with other tpm
accessors in the system.

Specifically, the hw_random tpm driver makes use of tpm_get_random(),
and this function is called in a loop from a kthread, which means it's
not frozen alongside userspace, and so can race with the work done
during system suspend:

  tpm tpm0: tpm_transmit: tpm_recv: error -52
  tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
  CPU: 0 PID: 1 Comm: init Not tainted 6.1.0-rc5+ #135
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
  Call Trace:
   tpm_tis_status.cold+0x19/0x20
   tpm_transmit+0x13b/0x390
   tpm_transmit_cmd+0x20/0x80
   tpm1_pm_suspend+0xa6/0x110
   tpm_pm_suspend+0x53/0x80
   __pnp_bus_suspend+0x35/0xe0
   __device_suspend+0x10f/0x350

Fix this by calling tpm_try_get_ops(), which itself is a wrapper around
tpm_chip_start(), but takes the appropriate mutex.

[Jason: reworked commit message, added metadata]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48998" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48998" ref_url="https://www.suse.com/security/cve/CVE-2022-48998" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/bpf/32: Fix Oops on tail call tests

test_bpf tail call tests end up as:

  test_bpf: #0 Tail call leaf jited:1 85 PASS
  test_bpf: #1 Tail call 2 jited:1 111 PASS
  test_bpf: #2 Tail call 3 jited:1 145 PASS
  test_bpf: #3 Tail call 4 jited:1 170 PASS
  test_bpf: #4 Tail call load/store leaf jited:1 190 PASS
  test_bpf: #5 Tail call load/store jited:1
  BUG: Unable to handle kernel data access on write at 0xf1b4e000
  Faulting instruction address: 0xbe86b710
  Oops: Kernel access of bad area, sig: 11 [#1]
  BE PAGE_SIZE=4K MMU=Hash PowerMac
  Modules linked in: test_bpf(+)
  CPU: 0 PID: 97 Comm: insmod Not tainted 6.1.0-rc4+ #195
  Hardware name: PowerMac3,1 750CL 0x87210 PowerMac
  NIP:  be86b710 LR: be857e88 CTR: be86b704
  REGS: f1b4df20 TRAP: 0300   Not tainted  (6.1.0-rc4+)
  MSR:  00009032 &lt;EE,ME,IR,DR,RI&gt;  CR: 28008242  XER: 00000000
  DAR: f1b4e000 DSISR: 42000000
  GPR00: 00000001 f1b4dfe0 c11d2280 00000000 00000000 00000000 00000002 00000000
  GPR08: f1b4e000 be86b704 f1b4e000 00000000 00000000 100d816a f2440000 fe73baa8
  GPR16: f2458000 00000000 c1941ae4 f1fe2248 00000045 c0de0000 f2458030 00000000
  GPR24: 000003e8 0000000f f2458000 f1b4dc90 3e584b46 00000000 f24466a0 c1941a00
  NIP [be86b710] 0xbe86b710
  LR [be857e88] __run_one+0xec/0x264 [test_bpf]
  Call Trace:
  [f1b4dfe0] [00000002] 0x2 (unreliable)
  Instruction dump:
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  ---[ end trace 0000000000000000 ]---

This is a tentative to write above the stack. The problem is encoutered
with tests added by commit 38608ee7b690 ("bpf, tests: Add load store
test case for tail call")

This happens because tail call is done to a BPF prog with a different
stack_depth. At the time being, the stack is kept as is when the caller
tail calls its callee. But at exit, the callee restores the stack based
on its own properties. Therefore here, at each run, r1 is erroneously
increased by 32 - 16 = 16 bytes.

This was done that way in order to pass the tail call count from caller
to callee through the stack. As powerpc32 doesn't have a red zone in
the stack, it was necessary the maintain the stack as is for the tail
call. But it was not anticipated that the BPF frame size could be
different.

Let's take a new approach. Use register r4 to carry the tail call count
during the tail call, and save it into the stack at function entry if
required. This means the input parameter must be in r3, which is more
correct as it is a 32 bits parameter, then tail call better match with
normal BPF function entry, the down side being that we move that input
parameter back and forth between r3 and r4. That can be optimised later.

Doing that also has the advantage of maximising the common parts between
tail calls and a normal function exit.

With the fix, tail call tests are now successfull:

  test_bpf: #0 Tail call leaf jited:1 53 PASS
  test_bpf: #1 Tail call 2 jited:1 115 PASS
  test_bpf: #2 Tail call 3 jited:1 154 PASS
  test_bpf: #3 Tail call 4 jited:1 165 PASS
  test_bpf: #4 Tail call load/store leaf jited:1 101 PASS
  test_bpf: #5 Tail call load/store jited:1 141 PASS
  test_bpf: #6 Tail call error path, max count reached jited:1 994 PASS
  test_bpf: #7 Tail call count preserved across function calls jited:1 140975 PASS
  test_bpf: #8 Tail call error path, NULL target jited:1 110 PASS
  test_bpf: #9 Tail call error path, index out of range jited:1 69 PASS
  test_bpf: test_tail_calls: Summary: 10 PASSED, 0 FAILED, [10/10 JIT'ed]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48998/">CVE-2022-48998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48998">CVE-2022-48998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232122">SUSE bug 1232122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48999" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Handle attempt to delete multipath route when fib_info contains an nh reference

Gwangun Jung reported a slab-out-of-bounds access in fib_nh_match:
    fib_nh_match+0xf98/0x1130 linux-6.0-rc7/net/ipv4/fib_semantics.c:961
    fib_table_delete+0x5f3/0xa40 linux-6.0-rc7/net/ipv4/fib_trie.c:1753
    inet_rtm_delroute+0x2b3/0x380 linux-6.0-rc7/net/ipv4/fib_frontend.c:874

Separate nexthop objects are mutually exclusive with the legacy
multipath spec. Fix fib_nh_match to return if the config for the
to be deleted route contains a multipath spec while the fib_info
is using a nexthop object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49000" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix PCI device refcount leak in has_external_pci()

for_each_pci_dev() is implemented by pci_get_device(). The comment of
pci_get_device() says that it will increase the reference count for the
returned pci_dev and also decrease the reference count for the input
pci_dev @from if it is not NULL.

If we break for_each_pci_dev() loop with pdev not NULL, we need to call
pci_dev_put() to decrease the reference count. Add the missing
pci_dev_put() before 'return true' to avoid reference count leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49001" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49001" ref_url="https://www.suse.com/security/cve/CVE-2022-49001" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: fix race when vmap stack overflow

Currently, when detecting vmap stack overflow, riscv firstly switches
to the so called shadow stack, then use this shadow stack to call the
get_overflow_stack() to get the overflow stack. However, there's
a race here if two or more harts use the same shadow stack at the same
time.

To solve this race, we introduce spin_shadow_stack atomic var, which
will be swap between its own address and 0 in atomic way, when the
var is set, it means the shadow_stack is being used; when the var
is cleared, it means the shadow_stack isn't being used.

[Palmer: Add AQ to the swap, and also some comments.]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49001/">CVE-2022-49001 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49001">CVE-2022-49001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232128">SUSE bug 1232128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49003" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix SRCU protection of nvme_ns_head list

Walking the nvme_ns_head siblings list is protected by the head's srcu
in nvme_ns_head_submit_bio() but not nvme_mpath_revalidate_paths().
Removing namespaces from the list also fails to synchronize the srcu.
Concurrent scan work can therefore cause use-after-frees.

Hold the head's srcu lock in nvme_mpath_revalidate_paths() and
synchronize with the srcu, not the global RCU, in nvme_ns_remove().

Observed the following panic when making NVMe/RDMA connections
with native multipath on the Rocky Linux 8.6 kernel
(it seems the upstream kernel has the same race condition).
Disassembly shows the faulting instruction is cmp 0x50(%rdx),%rcx;
computing capacity != get_capacity(ns-&gt;disk).
Address 0x50 is dereferenced because ns-&gt;disk is NULL.
The NULL disk appears to be the result of concurrent scan work
freeing the namespace (note the log line in the middle of the panic).

[37314.206036] BUG: unable to handle kernel NULL pointer dereference at 0000000000000050
[37314.206036] nvme0n3: detected capacity change from 0 to 11811160064
[37314.299753] PGD 0 P4D 0
[37314.299756] Oops: 0000 [#1] SMP PTI
[37314.299759] CPU: 29 PID: 322046 Comm: kworker/u98:3 Kdump: loaded Tainted: G        W      X --------- -  - 4.18.0-372.32.1.el8test86.x86_64 #1
[37314.299762] Hardware name: Dell Inc. PowerEdge R720/0JP31P, BIOS 2.7.0 05/23/2018
[37314.299763] Workqueue: nvme-wq nvme_scan_work [nvme_core]
[37314.299783] RIP: 0010:nvme_mpath_revalidate_paths+0x26/0xb0 [nvme_core]
[37314.299790] Code: 1f 44 00 00 66 66 66 66 90 55 53 48 8b 5f 50 48 8b 83 c8 c9 00 00 48 8b 13 48 8b 48 50 48 39 d3 74 20 48 8d 42 d0 48 8b 50 20 &lt;48&gt; 3b 4a 50 74 05 f0 80 60 70 ef 48 8b 50 30 48 8d 42 d0 48 39 d3
[37315.058803] RSP: 0018:ffffabe28f913d10 EFLAGS: 00010202
[37315.121316] RAX: ffff927a077da800 RBX: ffff92991dd70000 RCX: 0000000001600000
[37315.206704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff92991b719800
[37315.292106] RBP: ffff929a6b70c000 R08: 000000010234cd4a R09: c0000000ffff7fff
[37315.377501] R10: 0000000000000001 R11: ffffabe28f913a30 R12: 0000000000000000
[37315.462889] R13: ffff92992716600c R14: ffff929964e6e030 R15: ffff92991dd70000
[37315.548286] FS:  0000000000000000(0000) GS:ffff92b87fb80000(0000) knlGS:0000000000000000
[37315.645111] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[37315.713871] CR2: 0000000000000050 CR3: 0000002208810006 CR4: 00000000000606e0
[37315.799267] Call Trace:
[37315.828515]  nvme_update_ns_info+0x1ac/0x250 [nvme_core]
[37315.892075]  nvme_validate_or_alloc_ns+0x2ff/0xa00 [nvme_core]
[37315.961871]  ? __blk_mq_free_request+0x6b/0x90
[37316.015021]  nvme_scan_work+0x151/0x240 [nvme_core]
[37316.073371]  process_one_work+0x1a7/0x360
[37316.121318]  ? create_worker+0x1a0/0x1a0
[37316.168227]  worker_thread+0x30/0x390
[37316.212024]  ? create_worker+0x1a0/0x1a0
[37316.258939]  kthread+0x10a/0x120
[37316.297557]  ? set_kthread_struct+0x50/0x50
[37316.347590]  ret_from_fork+0x35/0x40
[37316.390360] Modules linked in: nvme_rdma nvme_tcp(X) nvme_fabrics nvme_core netconsole iscsi_tcp libiscsi_tcp dm_queue_length dm_service_time nf_conntrack_netlink br_netfilter bridge stp llc overlay nft_chain_nat ipt_MASQUERADE nf_nat xt_addrtype xt_CT nft_counter xt_state xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment xt_multiport nft_compat nf_tables libcrc32c nfnetlink dm_multipath tg3 rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm intel_rapl_msr iTCO_wdt iTCO_vendor_support dcdbas intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel ipmi_ssif kvm irqbypass crct10dif_pclmul crc32_pclmul mlx5_ib ghash_clmulni_intel ib_uverbs rapl intel_cstate intel_uncore ib_core ipmi_si joydev mei_me pcspkr ipmi_devintf mei lpc_ich wmi ipmi_msghandler acpi_power_meter ex
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232139">SUSE bug 1232139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49004" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49004" ref_url="https://www.suse.com/security/cve/CVE-2022-49004" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Sync efi page table's kernel mappings before switching

The EFI page table is initially created as a copy of the kernel page table.
With VMAP_STACK enabled, kernel stacks are allocated in the vmalloc area:
if the stack is allocated in a new PGD (one that was not present at the
moment of the efi page table creation or not synced in a previous vmalloc
fault), the kernel will take a trap when switching to the efi page table
when the vmalloc kernel stack is accessed, resulting in a kernel panic.

Fix that by updating the efi kernel mappings before switching to the efi
page table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49004/">CVE-2022-49004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49004">CVE-2022-49004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232143">SUSE bug 1232143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49005" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Fix bounds check for _sx controls

For _sx controls the semantics of the max field is not the usual one, max
is the number of steps rather than the maximum value. This means that our
check in snd_soc_put_volsw_sx() needs to just check against the maximum
value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49007" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix NULL pointer dereference in nilfs_palloc_commit_free_entry()

Syzbot reported a null-ptr-deref bug:

 NILFS (loop0): segctord starting. Construction interval = 5 seconds, CP
 frequency &lt; 30 seconds
 general protection fault, probably for non-canonical address
 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN
 KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
 CPU: 1 PID: 3603 Comm: segctord Not tainted
 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0
 Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google
 10/11/2022
 RIP: 0010:nilfs_palloc_commit_free_entry+0xe5/0x6b0
 fs/nilfs2/alloc.c:608
 Code: 00 00 00 00 fc ff df 80 3c 02 00 0f 85 cd 05 00 00 48 b8 00 00 00
 00 00 fc ff df 4c 8b 73 08 49 8d 7e 10 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02
 00 0f 85 26 05 00 00 49 8b 46 10 be a6 00 00 00 48 c7 c7
 RSP: 0018:ffffc90003dff830 EFLAGS: 00010212
 RAX: dffffc0000000000 RBX: ffff88802594e218 RCX: 000000000000000d
 RDX: 0000000000000002 RSI: 0000000000002000 RDI: 0000000000000010
 RBP: ffff888071880222 R08: 0000000000000005 R09: 000000000000003f
 R10: 000000000000000d R11: 0000000000000000 R12: ffff888071880158
 R13: ffff88802594e220 R14: 0000000000000000 R15: 0000000000000004
 FS:  0000000000000000(0000) GS:ffff8880b9b00000(0000)
 knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fb1c08316a8 CR3: 0000000018560000 CR4: 0000000000350ee0
 Call Trace:
  &lt;TASK&gt;
  nilfs_dat_commit_free fs/nilfs2/dat.c:114 [inline]
  nilfs_dat_commit_end+0x464/0x5f0 fs/nilfs2/dat.c:193
  nilfs_dat_commit_update+0x26/0x40 fs/nilfs2/dat.c:236
  nilfs_btree_commit_update_v+0x87/0x4a0 fs/nilfs2/btree.c:1940
  nilfs_btree_commit_propagate_v fs/nilfs2/btree.c:2016 [inline]
  nilfs_btree_propagate_v fs/nilfs2/btree.c:2046 [inline]
  nilfs_btree_propagate+0xa00/0xd60 fs/nilfs2/btree.c:2088
  nilfs_bmap_propagate+0x73/0x170 fs/nilfs2/bmap.c:337
  nilfs_collect_file_data+0x45/0xd0 fs/nilfs2/segment.c:568
  nilfs_segctor_apply_buffers+0x14a/0x470 fs/nilfs2/segment.c:1018
  nilfs_segctor_scan_file+0x3f4/0x6f0 fs/nilfs2/segment.c:1067
  nilfs_segctor_collect_blocks fs/nilfs2/segment.c:1197 [inline]
  nilfs_segctor_collect fs/nilfs2/segment.c:1503 [inline]
  nilfs_segctor_do_construct+0x12fc/0x6af0 fs/nilfs2/segment.c:2045
  nilfs_segctor_construct+0x8e3/0xb30 fs/nilfs2/segment.c:2379
  nilfs_segctor_thread_construct fs/nilfs2/segment.c:2487 [inline]
  nilfs_segctor_thread+0x3c3/0xf30 fs/nilfs2/segment.c:2570
  kthread+0x2e4/0x3a0 kernel/kthread.c:376
  ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
  &lt;/TASK&gt;
 ...

If DAT metadata file is corrupted on disk, there is a case where
req-&gt;pr_desc_bh is NULL and blocknr is 0 at nilfs_dat_commit_end() during
a b-tree operation that cascadingly updates ancestor nodes of the b-tree,
because nilfs_dat_commit_alloc() for a lower level block can initialize
the blocknr on the same DAT entry between nilfs_dat_prepare_end() and
nilfs_dat_commit_end().

If this happens, nilfs_dat_commit_end() calls nilfs_dat_commit_free()
without valid buffer heads in req-&gt;pr_desc_bh and req-&gt;pr_bitmap_bh, and
causes the NULL pointer dereference above in
nilfs_palloc_commit_free_entry() function, which leads to a crash.

Fix this by adding a NULL check on req-&gt;pr_desc_bh and req-&gt;pr_bitmap_bh
before nilfs_palloc_commit_free_entry() in nilfs_dat_commit_free().

This also calls nilfs_error() in that case to notify that there is a fatal
flaw in the filesystem metadata and prevent further operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49008" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49008" ref_url="https://www.suse.com/security/cve/CVE-2022-49008" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: can327: can327_feed_frame_to_netdev(): fix potential skb leak when netdev is down

In can327_feed_frame_to_netdev(), it did not free the skb when netdev
is down, and all callers of can327_feed_frame_to_netdev() did not free
allocated skb too. That would trigger skb leak.

Fix it by adding kfree_skb() in can327_feed_frame_to_netdev() when netdev
is down. Not tested, just compiled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49008/">CVE-2022-49008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49008">CVE-2022-49008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232171">SUSE bug 1232171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49009" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49009" ref_url="https://www.suse.com/security/cve/CVE-2022-49009" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (asus-ec-sensors) Add checks for devm_kcalloc

As the devm_kcalloc may return NULL, the return value needs to be checked
to avoid NULL poineter dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49009/">CVE-2022-49009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49009">CVE-2022-49009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232008">SUSE bug 1232008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49012" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix server-&gt;active leak in afs_put_server

The atomic_read was accidentally replaced with atomic_inc_return,
which prevents the server from getting cleaned up and causes rmmod
to hang with a warning:

    Can't purge s=00000001
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49013" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49013" ref_url="https://www.suse.com/security/cve/CVE-2022-49013" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: fix memory leak in sctp_stream_outq_migrate()

When sctp_stream_outq_migrate() is called to release stream out resources,
the memory pointed to by prio_head in stream out is not released.

The memory leak information is as follows:
 unreferenced object 0xffff88801fe79f80 (size 64):
   comm "sctp_repo", pid 7957, jiffies 4294951704 (age 36.480s)
   hex dump (first 32 bytes):
     80 9f e7 1f 80 88 ff ff 80 9f e7 1f 80 88 ff ff  ................
     90 9f e7 1f 80 88 ff ff 90 9f e7 1f 80 88 ff ff  ................
   backtrace:
     [&lt;ffffffff81b215c6&gt;] kmalloc_trace+0x26/0x60
     [&lt;ffffffff88ae517c&gt;] sctp_sched_prio_set+0x4cc/0x770
     [&lt;ffffffff88ad64f2&gt;] sctp_stream_init_ext+0xd2/0x1b0
     [&lt;ffffffff88aa2604&gt;] sctp_sendmsg_to_asoc+0x1614/0x1a30
     [&lt;ffffffff88ab7ff1&gt;] sctp_sendmsg+0xda1/0x1ef0
     [&lt;ffffffff87f765ed&gt;] inet_sendmsg+0x9d/0xe0
     [&lt;ffffffff8754b5b3&gt;] sock_sendmsg+0xd3/0x120
     [&lt;ffffffff8755446a&gt;] __sys_sendto+0x23a/0x340
     [&lt;ffffffff87554651&gt;] __x64_sys_sendto+0xe1/0x1b0
     [&lt;ffffffff89978b49&gt;] do_syscall_64+0x39/0xb0
     [&lt;ffffffff89a0008b&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49013/">CVE-2022-49013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49013">CVE-2022-49013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231891">SUSE bug 1231891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49014" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tun: Fix use-after-free in tun_detach()

syzbot reported use-after-free in tun_detach() [1].  This causes call
trace like below:

==================================================================
BUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
Read of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673

CPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x15e/0x461 mm/kasan/report.c:395
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
 notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
 call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942
 call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]
 call_netdevice_notifiers net/core/dev.c:1997 [inline]
 netdev_wait_allrefs_any net/core/dev.c:10237 [inline]
 netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351
 tun_detach drivers/net/tun.c:704 [inline]
 tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467
 __fput+0x27c/0xa90 fs/file_table.c:320
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xb3d/0x2a30 kernel/exit.c:820
 do_group_exit+0xd4/0x2a0 kernel/exit.c:950
 get_signal+0x21b1/0x2440 kernel/signal.c:2858
 arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296
 do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The cause of the issue is that sock_put() from __tun_detach() drops
last reference count for struct net, and then notifier_call_chain()
from netdev_state_change() accesses that struct net.

This patch fixes the issue by calling sock_put() from tun_detach()
after all necessary accesses for the struct net has done.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232818">SUSE bug 1232818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mdiobus: fix unbalanced node reference count

I got the following report while doing device(mscc-miim) load test
with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled:

  OF: ERROR: memory leak, expected refcount 1 instead of 2,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /spi/soc@0/mdio@7107009c/ethernet-phy@0

If the 'fwnode' is not an acpi node, the refcount is get in
fwnode_mdiobus_phy_device_register(), but it has never been
put when the device is freed in the normal path. So call
fwnode_handle_put() in phy_device_release() to avoid leak.

If it's an acpi node, it has never been get, but it's put
in the error path, so call fwnode_handle_get() before
phy_device_register() to keep get/put operation balanced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49017" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49017" ref_url="https://www.suse.com/security/cve/CVE-2022-49017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: re-fetch skb cb after tipc_msg_validate

As the call trace shows, the original skb was freed in tipc_msg_validate(),
and dereferencing the old skb cb would cause an use-after-free crash.

  BUG: KASAN: use-after-free in tipc_crypto_rcv_complete+0x1835/0x2240 [tipc]
  Call Trace:
   &lt;IRQ&gt;
   tipc_crypto_rcv_complete+0x1835/0x2240 [tipc]
   tipc_crypto_rcv+0xd32/0x1ec0 [tipc]
   tipc_rcv+0x744/0x1150 [tipc]
  ...
  Allocated by task 47078:
   kmem_cache_alloc_node+0x158/0x4d0
   __alloc_skb+0x1c1/0x270
   tipc_buf_acquire+0x1e/0xe0 [tipc]
   tipc_msg_create+0x33/0x1c0 [tipc]
   tipc_link_build_proto_msg+0x38a/0x2100 [tipc]
   tipc_link_timeout+0x8b8/0xef0 [tipc]
   tipc_node_timeout+0x2a1/0x960 [tipc]
   call_timer_fn+0x2d/0x1c0
  ...
  Freed by task 47078:
   tipc_msg_validate+0x7b/0x440 [tipc]
   tipc_crypto_rcv_complete+0x4b5/0x2240 [tipc]
   tipc_crypto_rcv+0xd32/0x1ec0 [tipc]
   tipc_rcv+0x744/0x1150 [tipc]

This patch fixes it by re-fetching the skb cb from the new allocated skb
after calling tipc_msg_validate().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49017/">CVE-2022-49017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49017">CVE-2022-49017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232004">SUSE bug 1232004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49018" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49018" ref_url="https://www.suse.com/security/cve/CVE-2022-49018" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix sleep in atomic at close time

Matt reported a splat at msk close time:

    BUG: sleeping function called from invalid context at net/mptcp/protocol.c:2877
    in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 155, name: packetdrill
    preempt_count: 201, expected: 0
    RCU nest depth: 0, expected: 0
    4 locks held by packetdrill/155:
    #0: ffff888001536990 (&amp;sb-&gt;s_type-&gt;i_mutex_key#6){+.+.}-{3:3}, at: __sock_release (net/socket.c:650)
    #1: ffff88800b498130 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_close (net/mptcp/protocol.c:2973)
    #2: ffff88800b49a130 (sk_lock-AF_INET/1){+.+.}-{0:0}, at: __mptcp_close_ssk (net/mptcp/protocol.c:2363)
    #3: ffff88800b49a0b0 (slock-AF_INET){+...}-{2:2}, at: __lock_sock_fast (include/net/sock.h:1820)
    Preemption disabled at:
    0x0
    CPU: 1 PID: 155 Comm: packetdrill Not tainted 6.1.0-rc5 #365
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
    Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl (lib/dump_stack.c:107 (discriminator 4))
    __might_resched.cold (kernel/sched/core.c:9891)
    __mptcp_destroy_sock (include/linux/kernel.h:110)
    __mptcp_close (net/mptcp/protocol.c:2959)
    mptcp_subflow_queue_clean (include/net/sock.h:1777)
    __mptcp_close_ssk (net/mptcp/protocol.c:2363)
    mptcp_destroy_common (net/mptcp/protocol.c:3170)
    mptcp_destroy (include/net/sock.h:1495)
    __mptcp_destroy_sock (net/mptcp/protocol.c:2886)
    __mptcp_close (net/mptcp/protocol.c:2959)
    mptcp_close (net/mptcp/protocol.c:2974)
    inet_release (net/ipv4/af_inet.c:432)
    __sock_release (net/socket.c:651)
    sock_close (net/socket.c:1367)
    __fput (fs/file_table.c:320)
    task_work_run (kernel/task_work.c:181 (discriminator 1))
    exit_to_user_mode_prepare (include/linux/resume_user_mode.h:49)
    syscall_exit_to_user_mode (kernel/entry/common.c:130)
    do_syscall_64 (arch/x86/entry/common.c:87)
    entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)

We can't call mptcp_close under the 'fast' socket lock variant, replace
it with a sock_lock_nested() as the relevant code is already under the
listening msk socket lock protection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49018/">CVE-2022-49018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49018">CVE-2022-49018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232002">SUSE bug 1232002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49019" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: nixge: fix NULL dereference

In function nixge_hw_dma_bd_release() dereference of NULL pointer
priv-&gt;rx_bd_v is possible for the case of its allocation failure in
nixge_hw_dma_bd_init().

Move for() loop with priv-&gt;rx_bd_v dereference under the check for
its validity.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49022" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration

Fix possible out-of-bound access in ieee80211_get_rate_duration routine
as reported by the following UBSAN report:

UBSAN: array-index-out-of-bounds in net/mac80211/airtime.c:455:47
index 15 is out of range for type 'u16 [12]'
CPU: 2 PID: 217 Comm: kworker/u32:10 Not tainted 6.1.0-060100rc3-generic
Hardware name: Acer Aspire TC-281/Aspire TC-281, BIOS R01-A2 07/18/2017
Workqueue: mt76 mt76u_tx_status_data [mt76_usb]
Call Trace:
 &lt;TASK&gt;
 show_stack+0x4e/0x61
 dump_stack_lvl+0x4a/0x6f
 dump_stack+0x10/0x18
 ubsan_epilogue+0x9/0x43
 __ubsan_handle_out_of_bounds.cold+0x42/0x47
ieee80211_get_rate_duration.constprop.0+0x22f/0x2a0 [mac80211]
 ? ieee80211_tx_status_ext+0x32e/0x640 [mac80211]
 ieee80211_calc_rx_airtime+0xda/0x120 [mac80211]
 ieee80211_calc_tx_airtime+0xb4/0x100 [mac80211]
 mt76x02_send_tx_status+0x266/0x480 [mt76x02_lib]
 mt76x02_tx_status_data+0x52/0x80 [mt76x02_lib]
 mt76u_tx_status_data+0x67/0xd0 [mt76_usb]
 process_one_work+0x225/0x400
 worker_thread+0x50/0x3e0
 ? process_one_work+0x400/0x400
 kthread+0xe9/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49023" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix buffer overflow in elem comparison

For vendor elements, the code here assumes that 5 octets
are present without checking. Since the element itself is
already checked to fit, we only need to check the length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233022">SUSE bug 1233022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49024" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods

In m_can_pci_remove() and error handling path of m_can_pci_probe(),
m_can_class_free_dev() should be called to free resource allocated by
m_can_class_allocate_dev(), otherwise there will be memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49025" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix use-after-free when reverting termination table

When having multiple dests with termination tables and second one
or afterwards fails the driver reverts usage of term tables but
doesn't reset the assignment in attr-&gt;dests[num_vport_dests].termtbl
which case a use-after-free when releasing the rule.
Fix by resetting the assignment of termtbl to null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233023">SUSE bug 1233023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49030" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49030" ref_url="https://www.suse.com/security/cve/CVE-2022-49030" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libbpf: Handle size overflow for ringbuf mmap

The maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries
will overflow u32 when mapping producer page and data pages. Only
casting max_entries to size_t is not enough, because for 32-bits
application on 64-bits kernel the size of read-only mmap region
also could overflow size_t.

So fixing it by casting the size of read-only mmap region into a __u64
and checking whether or not there will be overflow during mmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49030/">CVE-2022-49030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49030">CVE-2022-49030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231994">SUSE bug 1231994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49034" ref_url="https://www.suse.com/security/cve/CVE-2022-49034" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sh: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK

When CONFIG_CPUMASK_OFFSTACK and CONFIG_DEBUG_PER_CPU_MAPS are selected,
cpu_max_bits_warn() generates a runtime warning similar as below when
showing /proc/cpuinfo. Fix this by using nr_cpu_ids (the runtime limit)
instead of NR_CPUS to iterate CPUs.

[    3.052463] ------------[ cut here ]------------
[    3.059679] WARNING: CPU: 3 PID: 1 at include/linux/cpumask.h:108 show_cpuinfo+0x5e8/0x5f0
[    3.070072] Modules linked in: efivarfs autofs4
[    3.076257] CPU: 0 PID: 1 Comm: systemd Not tainted 5.19-rc5+ #1052
[    3.099465] Stack : 9000000100157b08 9000000000f18530 9000000000cf846c 9000000100154000
[    3.109127]         9000000100157a50 0000000000000000 9000000100157a58 9000000000ef7430
[    3.118774]         90000001001578e8 0000000000000040 0000000000000020 ffffffffffffffff
[    3.128412]         0000000000aaaaaa 1ab25f00eec96a37 900000010021de80 900000000101c890
[    3.138056]         0000000000000000 0000000000000000 0000000000000000 0000000000aaaaaa
[    3.147711]         ffff8000339dc220 0000000000000001 0000000006ab4000 0000000000000000
[    3.157364]         900000000101c998 0000000000000004 9000000000ef7430 0000000000000000
[    3.167012]         0000000000000009 000000000000006c 0000000000000000 0000000000000000
[    3.176641]         9000000000d3de08 9000000001639390 90000000002086d8 00007ffff0080286
[    3.186260]         00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c
[    3.195868]         ...
[    3.199917] Call Trace:
[    3.203941] [&lt;90000000002086d8&gt;] show_stack+0x38/0x14c
[    3.210666] [&lt;9000000000cf846c&gt;] dump_stack_lvl+0x60/0x88
[    3.217625] [&lt;900000000023d268&gt;] __warn+0xd0/0x100
[    3.223958] [&lt;9000000000cf3c90&gt;] warn_slowpath_fmt+0x7c/0xcc
[    3.231150] [&lt;9000000000210220&gt;] show_cpuinfo+0x5e8/0x5f0
[    3.238080] [&lt;90000000004f578c&gt;] seq_read_iter+0x354/0x4b4
[    3.245098] [&lt;90000000004c2e90&gt;] new_sync_read+0x17c/0x1c4
[    3.252114] [&lt;90000000004c5174&gt;] vfs_read+0x138/0x1d0
[    3.258694] [&lt;90000000004c55f8&gt;] ksys_read+0x70/0x100
[    3.265265] [&lt;9000000000cfde9c&gt;] do_syscall+0x7c/0x94
[    3.271820] [&lt;9000000000202fe4&gt;] handle_syscall+0xc4/0x160
[    3.281824] ---[ end trace 8b484262b4b8c24c ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49034/">CVE-2022-49034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49034">CVE-2022-49034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234861">SUSE bug 1234861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0030" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0030" ref_url="https://www.suse.com/security/cve/CVE-2023-0030" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-03"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0030/">CVE-2023-0030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0030">CVE-2023-0030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206777">SUSE bug 1206777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0122" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0122" ref_url="https://www.suse.com/security/cve/CVE-2023-0122" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability in the Linux kernel NVMe functionality, in nvmet_setup_auth(), allows an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine. Affected versions v6.0-rc1 to v6.0-rc3, fixed in v6.0-rc4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0122/">CVE-2023-0122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0122">CVE-2023-0122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207050">SUSE bug 1207050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    A deadlock flaw was found in the Linux kernel's BPF subsystem. This flaw allows a local user to potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207139">SUSE bug 1207139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215208">SUSE bug 1215208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0210" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0210" ref_url="https://www.suse.com/security/cve/CVE-2023-0210" source="SUSE CVE"/>
    <description>
    A bug affects the Linux kernel's ksmbd NTLMv2 authentication and is known to crash the OS immediately in Linux-based systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-12"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0210/">CVE-2023-0210 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0210">CVE-2023-0210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206707">SUSE bug 1206707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0240" ref_url="https://www.suse.com/security/cve/CVE-2023-0240" source="SUSE CVE"/>
    <description>
    There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0240/">CVE-2023-0240 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0240">CVE-2023-0240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216818">SUSE bug 1216818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel. SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit 56b88b50565cd8b946a2d00b0c83927b7ebb055e

    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207134">SUSE bug 1207134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207190">SUSE bug 1207190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel's OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-23"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210499">SUSE bug 1210499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0458" ref_url="https://www.suse.com/security/cve/CVE-2023-0458" source="SUSE CVE"/>
    <description>
    A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-28"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0458/">CVE-2023-0458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210905">SUSE bug 1210905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0468" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0468" ref_url="https://www.suse.com/security/cve/CVE-2023-0468" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0468/">CVE-2023-0468 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0468">CVE-2023-0468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207511">SUSE bug 1207511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0469" ref_url="https://www.suse.com/security/cve/CVE-2023-0469" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-01-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0469/">CVE-2023-0469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0469">CVE-2023-0469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207521">SUSE bug 1207521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0615" ref_url="https://www.suse.com/security/cve/CVE-2023-0615" source="SUSE CVE"/>
    <description>
    A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0615/">CVE-2023-0615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0615">CVE-2023-0615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207844">SUSE bug 1207844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1032" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1032" ref_url="https://www.suse.com/security/cve/CVE-2023-1032" source="SUSE CVE"/>
    <description>
    The Linux kernel io_uring IORING_OP_SOCKET operation contained a double free in function __sys_socket_file() in file net/socket.c. This issue was introduced in da214a475f8bd1d3e9e7a19ddfeb4d1617551bab and fixed in 649c15c7691e9b13cbe9bf6c65c365350e056067.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1032/">CVE-2023-1032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1032">CVE-2023-1032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209240">SUSE bug 1209240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec-&gt;tx_ready.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2024-04-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-25"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208601">SUSE bug 1208601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208603">SUSE bug 1208603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1193" ref_url="https://www.suse.com/security/cve/CVE-2023-1193" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1193/">CVE-2023-1193 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1193">CVE-2023-1193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208972">SUSE bug 1208972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1194" ref_url="https://www.suse.com/security/cve/CVE-2023-1194" source="SUSE CVE"/>
    <description>
    An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1194/">CVE-2023-1194 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1194">CVE-2023-1194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208968">SUSE bug 1208968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1195" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1195" ref_url="https://www.suse.com/security/cve/CVE-2023-1195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-&gt;hostname to NULL, leading to an invalid pointer request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1195/">CVE-2023-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1195">CVE-2023-1195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208971">SUSE bug 1208971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1252" ref_url="https://www.suse.com/security/cve/CVE-2023-1252" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-10"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1252/">CVE-2023-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1252">CVE-2023-1252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209045">SUSE bug 1209045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1295" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1295" ref_url="https://www.suse.com/security/cve/CVE-2023-1295" source="SUSE CVE"/>
    <description>
    A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1295/">CVE-2023-1295 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1295">CVE-2023-1295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212836">SUSE bug 1212836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1382</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A data race flaw was found in the Linux kernel, between where con is allocated and con-&gt;sock is set. This issue leads to a NULL pointer dereference when accessing con-&gt;sock-&gt;sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1476" ref_url="https://www.suse.com/security/cve/CVE-2023-1476" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-23"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1476/">CVE-2023-1476 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1476">CVE-2023-1476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209476">SUSE bug 1209476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-24"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1583" ref_url="https://www.suse.com/security/cve/CVE-2023-1583" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has auto index selection enabled via IORING_FILE_INDEX_ALLOC can cause a NULL pointer dereference. An unprivileged user can use the flaw to cause a system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1583/">CVE-2023-1583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209637">SUSE bug 1209637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209797">SUSE bug 1209797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1872" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1872" ref_url="https://www.suse.com/security/cve/CVE-2023-1872" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.

The io_file_get_fixed function lacks the presence of ctx-&gt;uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.

We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1872/">CVE-2023-1872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1872">CVE-2023-1872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210414">SUSE bug 1210414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210417">SUSE bug 1210417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210566">SUSE bug 1210566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210457">SUSE bug 1210457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2008" ref_url="https://www.suse.com/security/cve/CVE-2023-2008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2008/">CVE-2023-2008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2019" ref_url="https://www.suse.com/security/cve/CVE-2023-2019" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2019/">CVE-2023-2019 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2019">CVE-2023-2019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210454">SUSE bug 1210454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20584" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20584" ref_url="https://www.suse.com/security/cve/CVE-2023-20584" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7484" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000103.html" source="SUSE-SU"/>
    <description>
    IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" cvss4="4/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2023-20584/">CVE-2023-20584 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20584">CVE-2023-20584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229262">SUSE bug 1229262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20941" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20941" ref_url="https://www.suse.com/security/cve/CVE-2023-20941" source="SUSE CVE"/>
    <description>
    In acc_ctrlrequest_composite of f_accessory.c, there is a possible out of bounds write due to a missing bounds check. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264029575References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-20941/">CVE-2023-20941 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20941">CVE-2023-20941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210676">SUSE bug 1210676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21102" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-10"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212346">SUSE bug 1212346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21106" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21106" ref_url="https://www.suse.com/security/cve/CVE-2023-21106" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In adreno_set_param of adreno_gpu.c, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-265016072References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21106/">CVE-2023-21106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21106">CVE-2023-21106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211654">SUSE bug 1211654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211655">SUSE bug 1211655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21264" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21264" ref_url="https://www.suse.com/security/cve/CVE-2023-21264" source="SUSE CVE"/>
    <description>
    In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21264/">CVE-2023-21264 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21264">CVE-2023-21264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214289">SUSE bug 1214289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21400" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    In multiple functions  of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031544.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-10"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211395">SUSE bug 1211395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    Incorrect verifier pruning in BPF in Linux Kernel &gt;=5.4 leads to unsafe
code paths being incorrectly marked as safe, resulting in arbitrary read/write in
kernel memory, lateral privilege escalation, and container escape.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-21"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215518">SUSE bug 1215518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215519">SUSE bug 1215519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21636" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21636" ref_url="https://www.suse.com/security/cve/CVE-2023-21636" source="SUSE CVE"/>
    <description>
    Memory Corruption due to improper validation of array index in Linux while updating adn record.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-16"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21636/">CVE-2023-21636 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21636">CVE-2023-21636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215069">SUSE bug 1215069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-10"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22024" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22024" ref_url="https://www.suse.com/security/cve/CVE-2023-22024" source="SUSE CVE"/>
    <description>
    In the Unbreakable Enterprise Kernel (UEK), the RDS module in UEK has two setsockopt(2) options, RDS_CONN_RESET and RDS6_CONN_RESET, that are not re-entrant.  A malicious local user with CAP_NET_ADMIN can use this to crash the kernel. CVSS 3.1 Base Score 5.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22024/">CVE-2023-22024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22024">CVE-2023-22024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215615">SUSE bug 1215615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.

The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.

We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-03"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210987">SUSE bug 1210987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2236" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2236" ref_url="https://www.suse.com/security/cve/CVE-2023-2236" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.

Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.

We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-03"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2236/">CVE-2023-2236 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2236">CVE-2023-2236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210990">SUSE bug 1210990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210991">SUSE bug 1210991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22995" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22995" ref_url="https://www.suse.com/security/cve/CVE-2023-22995" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.17, an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-01"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22995/">CVE-2023-22995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22995">CVE-2023-22995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208741">SUSE bug 1208741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22996" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22996" ref_url="https://www.suse.com/security/cve/CVE-2023-22996" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.17.2, drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use, e.g., with put_device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-22996/">CVE-2023-22996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22996">CVE-2023-22996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208781">SUSE bug 1208781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22997" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22997" ref_url="https://www.suse.com/security/cve/CVE-2023-22997" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 6.1.2, kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-02"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22997/">CVE-2023-22997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22997">CVE-2023-22997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208782">SUSE bug 1208782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22999" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22999" ref_url="https://www.suse.com/security/cve/CVE-2023-22999" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.16.3, drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22999/">CVE-2023-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22999">CVE-2023-22999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208785">SUSE bug 1208785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23000" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.17, drivers/phy/tegra/xusb.c mishandles the tegra_xusb_find_port_node return value. Callers expect NULL in the error case, but an error pointer is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23000">CVE-2023-23000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.16.3, drivers/scsi/ufs/ufs-mediatek.c misinterprets the regulator_get return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23002" ref_url="https://www.suse.com/security/cve/CVE-2023-23002" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.16.3, drivers/bluetooth/hci_qca.c misinterprets the devm_gpiod_get_index_optional return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23002/">CVE-2023-23002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23002">CVE-2023-23002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208840">SUSE bug 1208840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23003" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23003" ref_url="https://www.suse.com/security/cve/CVE-2023-23003" source="SUSE CVE"/>
    <description>
    In the Linux kernel before 5.16, tools/perf/util/expr.c lacks a check for the hashmap__new return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23003/">CVE-2023-23003 at SUSE</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23003">CVE-2023-23003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208842">SUSE bug 1208842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23005" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23005" ref_url="https://www.suse.com/security/cve/CVE-2023-23005" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** In the Linux kernel before 6.2, mm/memory-tiers.c misinterprets the alloc_memory_type return value (expects it to be NULL in the error case, whereas it is actually an error pointer). NOTE: this is disputed by third parties because there are no realistic cases in which a user can cause the alloc_memory_type error case to be reached.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23005/">CVE-2023-23005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23005">CVE-2023-23005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208844">SUSE bug 1208844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 5.15.13, drivers/net/ethernet/mellanox/mlx5/core/steering/dr_domain.c misinterprets the mlx5_get_uars_page return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23039" ref_url="https://www.suse.com/security/cve/CVE-2023-23039" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open(), aka a race condition between vcc_open() and vcc_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23039/">CVE-2023-23039 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23039">CVE-2023-23039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208641">SUSE bug 1208641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23586" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23586" ref_url="https://www.suse.com/security/cve/CVE-2023-23586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
    <description>
    Due to a vulnerability in the io_uring subsystem, it is possible to leak kernel memory information to the user process. timens_install calls current_is_single_threaded to determine if the current process is single-threaded, but this call does not consider io_uring's io_worker threads, thus it is possible to insert a time namespace's vvar page to process's memory space via a page fault. When this time namespace is destroyed, the vvar page is also freed, but not removed from the process' memory, and a next page allocated by the kernel will be still available from the user-space process and can leak memory contents via this (read-only) use-after-free vulnerability. We recommend upgrading past version 5.10.161 or commit 788d0824269bef539fe31a785b1517882eafed93 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23586/">CVE-2023-23586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23586">CVE-2023-23586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208474">SUSE bug 1208474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2430" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2430" ref_url="https://www.suse.com/security/cve/CVE-2023-2430" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2430/">CVE-2023-2430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2430">CVE-2023-2430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211014">SUSE bug 1211014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207846">SUSE bug 1207846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2593" ref_url="https://www.suse.com/security/cve/CVE-2023-2593" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2593/">CVE-2023-2593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2593">CVE-2023-2593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211527">SUSE bug 1211527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2598" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2598" ref_url="https://www.suse.com/security/cve/CVE-2023-2598" source="SUSE CVE"/>
    <description>
    A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-10"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2598/">CVE-2023-2598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2598">CVE-2023-2598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211046">SUSE bug 1211046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26083" ref_url="https://www.suse.com/security/cve/CVE-2023-26083" source="SUSE CVE"/>
    <description>
    Memory leak vulnerability in Mali GPU Kernel Driver in Midgard GPU Kernel Driver all versions from r6p0 - r32p0, Bifrost GPU Kernel Driver all versions from r0p0 - r42p0, Valhall GPU Kernel Driver all versions from r19p0 - r42p0, and Avalon GPU Kernel Driver all versions from r41p0 - r42p0 allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-04-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-26083/">CVE-2023-26083 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26083">CVE-2023-26083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210236">SUSE bug 1210236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2612" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2612" ref_url="https://www.suse.com/security/cve/CVE-2023-2612" source="SUSE CVE"/>
    <description>
    Jean-Baptiste Cayrou discovered that the shiftfs file system in the Ubuntu Linux kernel contained a race condition when handling inode locking in some situations. A local attacker could use this to cause a denial of service (kernel deadlock).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2612/">CVE-2023-2612 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2612">CVE-2023-2612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211902">SUSE bug 1211902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26242" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26242" ref_url="https://www.suse.com/security/cve/CVE-2023-26242" source="SUSE CVE"/>
    <description>
    afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-09"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26242/">CVE-2023-26242 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26242">CVE-2023-26242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208518">SUSE bug 1208518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26544" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26544" ref_url="https://www.suse.com/security/cve/CVE-2023-26544" source="SUSE CVE"/>
    <description>
    In the Linux kernel 6.0.8, there is a use-after-free in run_unpack in fs/ntfs3/run.c, related to a difference between NTFS sector size and media sector size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26544/">CVE-2023-26544 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26544">CVE-2023-26544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208697">SUSE bug 1208697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26605" ref_url="https://www.suse.com/security/cve/CVE-2023-26605" source="SUSE CVE"/>
    <description>
    In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-02"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26605/">CVE-2023-26605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26605">CVE-2023-26605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208699">SUSE bug 1208699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26606" ref_url="https://www.suse.com/security/cve/CVE-2023-26606" source="SUSE CVE"/>
    <description>
    In the Linux kernel 6.0.8, there is a use-after-free in ntfs_trim_fs in fs/ntfs3/bitmap.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26606/">CVE-2023-26606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26606">CVE-2023-26606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208694">SUSE bug 1208694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26607" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26607" ref_url="https://www.suse.com/security/cve/CVE-2023-26607" source="SUSE CVE"/>
    <description>
    In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26607/">CVE-2023-26607 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26607">CVE-2023-26607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208703">SUSE bug 1208703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28327</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the UNIX protocol in net/unix/diag.c In unix_diag_get_exact in the Linux Kernel. The newly allocated skb does not have sk, leading to a NULL pointer. This flaw allows a local user to crash or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-03-16"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28410" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-25"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211819">SUSE bug 1211819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="TID000021404" ref_url="https://www.suse.com/support/kb/doc/?id=000021404" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28866" ref_url="https://www.suse.com/security/cve/CVE-2023-28866" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.2.8, net/bluetooth/hci_sync.c allows out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but do not.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28866/">CVE-2023-28866 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209780">SUSE bug 1209780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2898" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2898" ref_url="https://www.suse.com/security/cve/CVE-2023-2898" source="SUSE CVE"/>
    <description>
    There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2898/">CVE-2023-2898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2898">CVE-2023-2898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211742">SUSE bug 1211742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim's hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3022" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3022" ref_url="https://www.suse.com/security/cve/CVE-2023-3022" source="SUSE CVE"/>
    <description>
    A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3022/">CVE-2023-3022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3022">CVE-2023-3022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211906">SUSE bug 1211906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3106" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3106" ref_url="https://www.suse.com/security/cve/CVE-2023-3106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability was found in netlink_dump. This issue can occur when the Netlink socket receives the message(sendmsg) for the XFRM_MSG_GETSA, XFRM_MSG_GETPOLICY type message, and the DUMP flag is set and can cause a denial of service or possibly another unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3106/">CVE-2023-3106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3106">CVE-2023-3106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213251">SUSE bug 1213251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31081" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31081" ref_url="https://www.suse.com/security/cve/CVE-2023-31081" source="SUSE CVE"/>
    <description>
    An issue was discovered in drivers/media/test-drivers/vidtv/vidtv_bridge.c in the Linux kernel 6.2. There is a NULL pointer dereference in vidtv_mux_stop_thread. In vidtv_stop_streaming, after dvb-&gt;mux=NULL occurs, it executes vidtv_mux_stop_thread(dvb-&gt;mux).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31081/">CVE-2023-31081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31081">CVE-2023-31081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210782">SUSE bug 1210782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31082" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31082" ref_url="https://www.suse.com/security/cve/CVE-2023-31082" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in drivers/tty/n_gsm.c in the Linux kernel 6.2. There is a sleeping function called from an invalid context in gsmld_write, which will block the kernel. Note: This has been disputed by 3rd parties as not a valid vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2024-05-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31082/">CVE-2023-31082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31082">CVE-2023-31082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210781">SUSE bug 1210781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3117" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** Duplicate of CVE-2023-3390.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212934">SUSE bug 1212934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213064">SUSE bug 1213064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31356" ref_url="https://www.suse.com/security/cve/CVE-2023-31356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7484" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000103.html" source="SUSE-SU"/>
    <description>
    Incomplete system memory cleanup in SEV firmware could
allow a privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2024-10-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-31356/">CVE-2023-31356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31356">CVE-2023-31356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229263">SUSE bug 1229263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3220" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3220" ref_url="https://www.suse.com/security/cve/CVE-2023-3220" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3220/">CVE-2023-3220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212556">SUSE bug 1212556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-14"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211187">SUSE bug 1211187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32246" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32246" ref_url="https://www.suse.com/security/cve/CVE-2023-32246" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32246/">CVE-2023-32246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32246">CVE-2023-32246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211528">SUSE bug 1211528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32247" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32247" ref_url="https://www.suse.com/security/cve/CVE-2023-32247" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_SESSION_SETUP commands. The issue results from the lack of control of resource consumption. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32247/">CVE-2023-32247 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32247">CVE-2023-32247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211529">SUSE bug 1211529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32248" ref_url="https://www.suse.com/security/cve/CVE-2023-32248" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_TREE_CONNECT and SMB2_QUERY_INFO commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32248/">CVE-2023-32248 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32248">CVE-2023-32248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211530">SUSE bug 1211530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32249" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32249" ref_url="https://www.suse.com/security/cve/CVE-2023-32249" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32249/">CVE-2023-32249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32249">CVE-2023-32249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211531">SUSE bug 1211531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32250" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32250" ref_url="https://www.suse.com/security/cve/CVE-2023-32250" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32250/">CVE-2023-32250 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32250">CVE-2023-32250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211532">SUSE bug 1211532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32251" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32251" ref_url="https://www.suse.com/security/cve/CVE-2023-32251" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32251/">CVE-2023-32251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32251">CVE-2023-32251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211533">SUSE bug 1211533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32252" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32252" ref_url="https://www.suse.com/security/cve/CVE-2023-32252" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the handling of SMB2_LOGOFF commands. The issue results from the lack of proper validation of a pointer prior to accessing it. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32252/">CVE-2023-32252 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32252">CVE-2023-32252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211534">SUSE bug 1211534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32253" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32253" ref_url="https://www.suse.com/security/cve/CVE-2023-32253" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32253/">CVE-2023-32253 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32253">CVE-2023-32253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211535">SUSE bug 1211535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32254" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32254" ref_url="https://www.suse.com/security/cve/CVE-2023-32254" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32254/">CVE-2023-32254 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32254">CVE-2023-32254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211536">SUSE bug 1211536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32255" ref_url="https://www.suse.com/security/cve/CVE-2023-32255" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32255/">CVE-2023-32255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32255">CVE-2023-32255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211537">SUSE bug 1211537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32256" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32256" ref_url="https://www.suse.com/security/cve/CVE-2023-32256" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32256/">CVE-2023-32256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32256">CVE-2023-32256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211538">SUSE bug 1211538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32257" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32257" ref_url="https://www.suse.com/security/cve/CVE-2023-32257" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_SESSION_SETUP and SMB2_LOGOFF commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32257/">CVE-2023-32257 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32257">CVE-2023-32257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211539">SUSE bug 1211539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32258" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32258" ref_url="https://www.suse.com/security/cve/CVE-2023-32258" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's ksmbd, a high-performance in-kernel SMB server. The specific flaw exists within the processing of SMB2_LOGOFF and SMB2_CLOSE commands. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to execute code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32258/">CVE-2023-32258 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32258">CVE-2023-32258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211540">SUSE bug 1211540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32629" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32629" ref_url="https://www.suse.com/security/cve/CVE-2023-32629" source="SUSE CVE"/>
    <description>
    Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up_meta_inode_data skip permission checks when calling ovl_do_setxattr on Ubuntu kernels
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-27"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32629/">CVE-2023-32629 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32629">CVE-2023-32629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213685">SUSE bug 1213685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213707">SUSE bug 1213707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3269" ref_url="https://www.suse.com/security/cve/CVE-2023-3269" source="SUSE CVE"/>
    <description>
    A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-12"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3269/">CVE-2023-3269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3269">CVE-2023-3269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212395">SUSE bug 1212395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213760">SUSE bug 1213760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3312" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3312" ref_url="https://www.suse.com/security/cve/CVE-2023-3312" source="SUSE CVE"/>
    <description>
    A vulnerability was found in drivers/cpufreq/qcom-cpufreq-hw.c in cpufreq subsystem in the Linux Kernel. This flaw, during device unbind will lead to double release problem leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3312/">CVE-2023-3312 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3312">CVE-2023-3312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212536">SUSE bug 1212536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33250" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33250" ref_url="https://www.suse.com/security/cve/CVE-2023-33250" source="SUSE CVE"/>
    <description>
    The Linux kernel 6.3 has a use-after-free in iopt_unmap_iova_range in drivers/iommu/iommufd/io_pagetable.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-33250/">CVE-2023-33250 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33250">CVE-2023-33250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211597">SUSE bug 1211597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3355</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3355" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3355" ref_url="https://www.suse.com/security/cve/CVE-2023-3355" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's drivers/gpu/drm/msm/msm_gem_submit.c code in the submit_lookup_cmds function, which fails because it lacks a check of the return value of kmalloc(). This issue allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3355/">CVE-2023-3355 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3355">CVE-2023-3355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212778">SUSE bug 1212778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3357</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3357" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel AMD Sensor Fusion Hub driver. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3359</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3359" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3359" ref_url="https://www.suse.com/security/cve/CVE-2023-3359" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel brcm_nvram_parse in drivers/nvmem/brcm_nvram.c. Lacks for the check of the return value of kzalloc() can cause the NULL Pointer Dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3359/">CVE-2023-3359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3359">CVE-2023-3359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212608">SUSE bug 1212608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3389" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.

Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.

We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).


    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-01"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.

Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.

We recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212934">SUSE bug 1212934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216225">SUSE bug 1216225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33951" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-31"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211593">SUSE bug 1211593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33952" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-05-31"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211595">SUSE bug 1211595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212348">SUSE bug 1212348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34256" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34256" ref_url="https://www.suse.com/security/cve/CVE-2023-34256" source="SUSE CVE"/>
    <description>
    ** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-02"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34256/">CVE-2023-34256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34256">CVE-2023-34256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211895">SUSE bug 1211895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3439" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3439" ref_url="https://www.suse.com/security/cve/CVE-2023-3439" source="SUSE CVE"/>
    <description>
    A flaw was found in the MCTP protocol in the Linux kernel. The function mctp_unregister() reclaims the device's relevant resource when a netcard detaches. However, a running routine may be unaware of this and cause the use-after-free of the mdev-&gt;addrs object, potentially leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3439/">CVE-2023-3439 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3439">CVE-2023-3439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212845">SUSE bug 1212845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212509">SUSE bug 1212509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35823" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35826" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35826" ref_url="https://www.suse.com/security/cve/CVE-2023-35826" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in cedrus_remove in drivers/staging/media/sunxi/cedrus/cedrus.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35826/">CVE-2023-35826 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35826">CVE-2023-35826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212505">SUSE bug 1212505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35827" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35828" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35829" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35829" ref_url="https://www.suse.com/security/cve/CVE-2023-35829" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35829/">CVE-2023-35829 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212495">SUSE bug 1212495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.

We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213584">SUSE bug 1213584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3640" ref_url="https://www.suse.com/security/cve/CVE-2023-3640" source="SUSE CVE"/>
    <description>
    A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3640/">CVE-2023-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3640">CVE-2023-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213271">SUSE bug 1213271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-22"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3773" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3773" ref_url="https://www.suse.com/security/cve/CVE-2023-3773" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-27"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3773/">CVE-2023-3773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213667">SUSE bug 1213667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215097">SUSE bug 1215097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38409" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213417">SUSE bug 1213417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38426</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38426" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38426" ref_url="https://www.suse.com/security/cve/CVE-2023-38426" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.4. ksmbd has an out-of-bounds read in smb2_find_context_vals when create_context's name_len is larger than the tag length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38426/">CVE-2023-38426 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38426">CVE-2023-38426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213421">SUSE bug 1213421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38427</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38427" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38427" ref_url="https://www.suse.com/security/cve/CVE-2023-38427" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/smb2pdu.c in ksmbd has an integer underflow and out-of-bounds read in deassemble_neg_contexts.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38427/">CVE-2023-38427 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38427">CVE-2023-38427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213422">SUSE bug 1213422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38428</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38428" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38428" ref_url="https://www.suse.com/security/cve/CVE-2023-38428" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/smb2pdu.c in ksmbd does not properly check the UserName value because it does not consider the address of security buffer, leading to an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38428/">CVE-2023-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38428">CVE-2023-38428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213423">SUSE bug 1213423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38429</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38429" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38429" ref_url="https://www.suse.com/security/cve/CVE-2023-38429" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.4. fs/ksmbd/connection.c in ksmbd has an off-by-one error in memory allocation (because of ksmbd_smb2_check_message) that may lead to out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38429/">CVE-2023-38429 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38429">CVE-2023-38429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213424">SUSE bug 1213424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38430</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38430" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38430" ref_url="https://www.suse.com/security/cve/CVE-2023-38430" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.9. ksmbd does not validate the SMB request protocol ID, leading to an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38430/">CVE-2023-38430 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38430">CVE-2023-38430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213425">SUSE bug 1213425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38431" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38431" ref_url="https://www.suse.com/security/cve/CVE-2023-38431" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.8. fs/smb/server/connection.c in ksmbd does not validate the relationship between the NetBIOS header's length field and the SMB header sizes, via pdu_size in ksmbd_conn_handler_loop, leading to an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38431/">CVE-2023-38431 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38431">CVE-2023-38431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213426">SUSE bug 1213426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38432" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38432" ref_url="https://www.suse.com/security/cve/CVE-2023-38432" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.3.10. fs/smb/server/smb2misc.c in ksmbd does not validate the relationship between the command payload size and the RFC1002 length specification, leading to an out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2024-04-26"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38432/">CVE-2023-38432 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38432">CVE-2023-38432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213427">SUSE bug 1213427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3865" ref_url="https://www.suse.com/security/cve/CVE-2023-3865" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3865/">CVE-2023-3865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3865">CVE-2023-3865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213813">SUSE bug 1213813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3866" ref_url="https://www.suse.com/security/cve/CVE-2023-3866" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3866/">CVE-2023-3866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3866">CVE-2023-3866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213814">SUSE bug 1213814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3867" ref_url="https://www.suse.com/security/cve/CVE-2023-3867" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3867/">CVE-2023-3867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3867">CVE-2023-3867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213545">SUSE bug 1213545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39176" ref_url="https://www.suse.com/security/cve/CVE-2023-39176" source="SUSE CVE"/>
    <description>
    A flaw was found within the parsing of SMB2 requests that have a transform header in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-11-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39176/">CVE-2023-39176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39176">CVE-2023-39176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226176">SUSE bug 1226176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39179" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39179" ref_url="https://www.suse.com/security/cve/CVE-2023-39179" source="SUSE CVE"/>
    <description>
    A flaw was found within the handling of SMB2 read requests in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-11-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39179/">CVE-2023-39179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39179">CVE-2023-39179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226180">SUSE bug 1226180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39180" ref_url="https://www.suse.com/security/cve/CVE-2023-39180" source="SUSE CVE"/>
    <description>
    A flaw was found within the handling of SMB2_READ commands in the kernel ksmbd module. The issue results from not releasing memory after its effective lifetime. An attacker can leverage this to create a denial-of-service condition on affected installations of Linux. Authentication is not required to exploit this vulnerability, but only systems with ksmbd enabled are vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-11-19"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39180/">CVE-2023-39180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39180">CVE-2023-39180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226179">SUSE bug 1226179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39190" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39190" ref_url="https://www.suse.com/security/cve/CVE-2023-39190" source="SUSE CVE"/>
    <description>
    ** REJECT ** CVE-2023-39190 was found to be a duplicate of CVE-2023-31436. Please see https://access.redhat.com/security/cve/CVE-2023-31436 for information about affected products and security errata.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39190/">CVE-2023-39190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39190">CVE-2023-39190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216056">SUSE bug 1216056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39191" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215863">SUSE bug 1215863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215887">SUSE bug 1215887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-01"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214812">SUSE bug 1214812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4015" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4015" ref_url="https://www.suse.com/security/cve/CVE-2023-4015" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.

We recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4015/">CVE-2023-4015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215104">SUSE bug 1215104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215106">SUSE bug 1215106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40791" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40791" ref_url="https://www.suse.com/security/cve/CVE-2023-40791" source="SUSE CVE"/>
    <description>
    extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation, as demonstrated by a WARNING for try_grab_page.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-40791/">CVE-2023-40791 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40791">CVE-2023-40791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216255">SUSE bug 1216255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-05"/>
	<updated date="2024-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215118">SUSE bug 1215118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214022">SUSE bug 1214022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4205" ref_url="https://www.suse.com/security/cve/CVE-2023-4205" source="SUSE CVE"/>
    <description>
    ** REJECT ** This was deemed as a false positive both by the reporter and upstream kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-12"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4205/">CVE-2023-4205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4205">CVE-2023-4205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214050">SUSE bug 1214050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-10"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214123">SUSE bug 1214123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42752" ref_url="https://www.suse.com/security/cve/CVE-2023-42752" source="SUSE CVE"/>
    <description>
    An integer overflow flaw was found in the Linux kernel. This issue leads to the kernel allocating `skb_shared_info` in the userspace, which is exploitable in systems without SMAP protection since `skb_shared_info` contains references to function pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42752/">CVE-2023-42752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42752">CVE-2023-42752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215146">SUSE bug 1215146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215468">SUSE bug 1215468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
    <description>
    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-&gt;nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218613">SUSE bug 1218613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756" source="SUSE CVE"/>
    <description>
    A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215767">SUSE bug 1215767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4389" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A flaw was found in btrfs_get_root_ref in fs/btrfs/disk-io.c in the btrfs filesystem in the Linux Kernel due to a double decrement of the reference count. This issue may allow a local attacker with user privilege to crash the system or may lead to leaked internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214351">SUSE bug 1214351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4394" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4394" ref_url="https://www.suse.com/security/cve/CVE-2023-4394" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in btrfs_get_dev_args_from_path in fs/btrfs/volumes.c in btrfs file-system in the Linux Kernel. This flaw allows a local attacker with special privileges to cause a system crash or leak internal kernel information
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4394/">CVE-2023-4394 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4394">CVE-2023-4394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214352">SUSE bug 1214352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44466" ref_url="https://www.suse.com/security/cve/CVE-2023-44466" source="SUSE CVE"/>
    <description>
    An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44466/">CVE-2023-44466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215871">SUSE bug 1215871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4458" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4458" ref_url="https://www.suse.com/security/cve/CVE-2023-4458" source="SUSE CVE"/>
    <description>
    A flaw was found within the parsing of extended attributes in the kernel ksmbd module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this to disclose sensitive information on affected installations of Linux. Only systems with ksmbd enabled are vulnerable to this CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-11-15"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4458/">CVE-2023-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4458">CVE-2023-4458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226178">SUSE bug 1226178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4563" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This was assigned as a duplicate of CVE-2023-4244.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214727">SUSE bug 1214727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-30"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45896" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45896" ref_url="https://www.suse.com/security/cve/CVE-2023-45896" source="SUSE CVE"/>
    <description>
    ntfs3 in the Linux kernel through 6.8.0 allows a physically proximate attacker to read kernel memory by mounting a filesystem (e.g., if a Linux distribution is configured to allow unprivileged mounts of removable media) and then leveraging local access to trigger an out-of-bounds read. A length value can be larger than the amount of memory allocated. NOTE: the supplier's perspective is that there is no vulnerability when an attack requires an attacker-modified filesystem image.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45896/">CVE-2023-45896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45896">CVE-2023-45896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229922">SUSE bug 1229922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45898" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45898" ref_url="https://www.suse.com/security/cve/CVE-2023-45898" source="SUSE CVE"/>
    <description>
    The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45898/">CVE-2023-45898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45898">CVE-2023-45898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216262">SUSE bug 1216262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4610" ref_url="https://www.suse.com/security/cve/CVE-2023-4610" source="SUSE CVE"/>
    <description>
    ** REJECT ** The SRCU code was added in upstream kernel v6.4-rc1 and removed before v6.4. This bug only existed in development kernels. Please see https://lore.kernel.org/all/ZTKVfoQZplpB8rki@casper.infradead.org and https://bugzilla.suse.com/show_bug.cgi?id=1215932 for more information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4610/">CVE-2023-4610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4610">CVE-2023-4610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215932">SUSE bug 1215932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4611" ref_url="https://www.suse.com/security/cve/CVE-2023-4611" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in mm/mempolicy.c in the memory management subsystem in the Linux Kernel. This issue is caused by a race between mbind() and VMA-locked page fault, and may allow a local attacker to crash the system or lead to a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-08-31"/>
	<updated date="2024-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4611/">CVE-2023-4611 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4611">CVE-2023-4611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214772">SUSE bug 1214772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228359">SUSE bug 1228359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216896">SUSE bug 1216896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4732" ref_url="https://www.suse.com/security/cve/CVE-2023-4732" source="SUSE CVE"/>
    <description>
    A flaw was found in pfn_swap_entry_to_page in memory management subsystem in the Linux Kernel. In this flaw, an attacker with a local user privilege may cause a denial of service problem due to a BUG statement referencing pmd_t x.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4732/">CVE-2023-4732 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4732">CVE-2023-4732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214926">SUSE bug 1214926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50431" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50431" ref_url="https://www.suse.com/security/cve/CVE-2023-50431" source="SUSE CVE"/>
    <description>
    sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info-&gt;pad0 is not initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50431/">CVE-2023-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50431">CVE-2023-50431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217930">SUSE bug 1217930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5158" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215768">SUSE bug 1215768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216044">SUSE bug 1216044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51781" ref_url="https://www.suse.com/security/cve/CVE-2023-51781" source="SUSE CVE"/>
    <description>
    An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-12"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51781/">CVE-2023-51781 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51781">CVE-2023-51781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218731">SUSE bug 1218731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.

We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52340</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-30"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219296">SUSE bug 1219296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52436" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52436" ref_url="https://www.suse.com/security/cve/CVE-2023-52436" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: explicitly null-terminate the xattr list

When setting an xattr, explicitly null-terminate the xattr list.  This
eliminates the fragile assumption that the unused xattr space is always
zeroed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52436/">CVE-2023-52436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52436">CVE-2023-52436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220139">SUSE bug 1220139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52438</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52438" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52438" ref_url="https://www.suse.com/security/cve/CVE-2023-52438" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix use-after-free in shinker's callback

The mmap read lock is used during the shrinker's callback, which means
that using alloc-&gt;vma pointer isn't safe as it can race with munmap().
As of commit dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in
munmap") the mmap lock is downgraded after the vma has been isolated.

I was able to reproduce this issue by manually adding some delays and
triggering page reclaiming through the shrinker's debug sysfs. The
following KASAN report confirms the UAF:

  ==================================================================
  BUG: KASAN: slab-use-after-free in zap_page_range_single+0x470/0x4b8
  Read of size 8 at addr ffff356ed50e50f0 by task bash/478

  CPU: 1 PID: 478 Comm: bash Not tainted 6.6.0-rc5-00055-g1c8b86a3799f-dirty #70
  Hardware name: linux,dummy-virt (DT)
  Call trace:
   zap_page_range_single+0x470/0x4b8
   binder_alloc_free_page+0x608/0xadc
   __list_lru_walk_one+0x130/0x3b0
   list_lru_walk_node+0xc4/0x22c
   binder_shrink_scan+0x108/0x1dc
   shrinker_debugfs_scan_write+0x2b4/0x500
   full_proxy_write+0xd4/0x140
   vfs_write+0x1ac/0x758
   ksys_write+0xf0/0x1dc
   __arm64_sys_write+0x6c/0x9c

  Allocated by task 492:
   kmem_cache_alloc+0x130/0x368
   vm_area_alloc+0x2c/0x190
   mmap_region+0x258/0x18bc
   do_mmap+0x694/0xa60
   vm_mmap_pgoff+0x170/0x29c
   ksys_mmap_pgoff+0x290/0x3a0
   __arm64_sys_mmap+0xcc/0x144

  Freed by task 491:
   kmem_cache_free+0x17c/0x3c8
   vm_area_free_rcu_cb+0x74/0x98
   rcu_core+0xa38/0x26d4
   rcu_core_si+0x10/0x1c
   __do_softirq+0x2fc/0xd24

  Last potentially related work creation:
   __call_rcu_common.constprop.0+0x6c/0xba0
   call_rcu+0x10/0x1c
   vm_area_free+0x18/0x24
   remove_vma+0xe4/0x118
   do_vmi_align_munmap.isra.0+0x718/0xb5c
   do_vmi_munmap+0xdc/0x1fc
   __vm_munmap+0x10c/0x278
   __arm64_sys_munmap+0x58/0x7c

Fix this issue by performing instead a vma_lookup() which will fail to
find the vma that was isolated before the mmap lock downgrade. Note that
this option has better performance than upgrading to a mmap write lock
which would increase contention. Plus, mmap_write_trylock() has been
recently removed anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52438/">CVE-2023-52438 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52438">CVE-2023-52438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220135">SUSE bug 1220135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52439</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio: Fix use-after-free in uio_open

core-1				core-2
-------------------------------------------------------
uio_unregister_device		uio_open
				idev = idr_find()
device_unregister(&amp;idev-&gt;dev)
put_device(&amp;idev-&gt;dev)
uio_device_release
				get_device(&amp;idev-&gt;dev)
kfree(idev)
uio_free_minor(minor)
				uio_release
				put_device(&amp;idev-&gt;dev)
				kfree(idev)
-------------------------------------------------------

In the core-1 uio_unregister_device(), the device_unregister will kfree
idev when the idev-&gt;dev kobject ref is 1. But after core-1
device_unregister, put_device and before doing kfree, the core-2 may
get_device. Then:
1. After core-1 kfree idev, the core-2 will do use-after-free for idev.
2. When core-2 do uio_release and put_device, the idev will be double
   freed.

To address this issue, we can get idev atomic &amp; inc idev reference with
minor_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52440</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52440" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52440" ref_url="https://www.suse.com/security/cve/CVE-2023-52440" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob()

If authblob-&gt;SessionKey.Length is bigger than session key
size(CIFS_KEY_SIZE), slub overflow can happen in key exchange codes.
cifs_arc4_crypt copy to session key array from SessionKey from client.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52440/">CVE-2023-52440 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52440">CVE-2023-52440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220182">SUSE bug 1220182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228823">SUSE bug 1228823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52441</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52441" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52441" ref_url="https://www.suse.com/security/cve/CVE-2023-52441" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix out of bounds in init_smb2_rsp_hdr()

If client send smb2 negotiate request and then send smb1 negotiate
request, init_smb2_rsp_hdr is called for smb1 negotiate request since
need_neg is set to false. This patch ignore smb1 packets after -&gt;need_neg
is set to false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52441/">CVE-2023-52441 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52441">CVE-2023-52441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220183">SUSE bug 1220183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52442</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52442" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52442" ref_url="https://www.suse.com/security/cve/CVE-2023-52442" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate session id and tree id in compound request

`smb2_get_msg()` in smb2_get_ksmbd_tcon() and smb2_check_user_session()
will always return the first request smb2 header in a compound request.
if `SMB2_TREE_CONNECT_HE` is the first command in compound request, will
return 0, i.e. The tree id check is skipped.
This patch use ksmbd_req_buf_next() to get current command in compound.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52442/">CVE-2023-52442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52442">CVE-2023-52442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220184">SUSE bug 1220184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52444</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52444" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52444" ref_url="https://www.suse.com/security/cve/CVE-2023-52444" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid dirent corruption

As Al reported in link[1]:

f2fs_rename()
...
	if (old_dir != new_dir &amp;&amp; !whiteout)
		f2fs_set_link(old_inode, old_dir_entry,
					old_dir_page, new_dir);
	else
		f2fs_put_page(old_dir_page, 0);

You want correct inumber in the ".." link.  And cross-directory
rename does move the source to new parent, even if you'd been asked
to leave a whiteout in the old place.

[1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/

With below testcase, it may cause dirent corruption, due to it missed
to call f2fs_set_link() to update ".." link to new directory.
- mkdir -p dir/foo
- renameat2 -w dir/foo bar

[ASSERT] (__chk_dots_dentries:1421)  --&gt; Bad inode number[0x4] for '..', parent parent ino is [0x3]
[FSCK] other corrupted bugs                           [Fail]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52444/">CVE-2023-52444 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52444">CVE-2023-52444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220234">SUSE bug 1220234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52446</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52446" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52446" ref_url="https://www.suse.com/security/cve/CVE-2023-52446" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a race condition between btf_put() and map_free()

When running `./test_progs -j` in my local vm with latest kernel,
I once hit a kasan error like below:

  [ 1887.184724] BUG: KASAN: slab-use-after-free in bpf_rb_root_free+0x1f8/0x2b0
  [ 1887.185599] Read of size 4 at addr ffff888106806910 by task kworker/u12:2/2830
  [ 1887.186498]
  [ 1887.186712] CPU: 3 PID: 2830 Comm: kworker/u12:2 Tainted: G           OEL     6.7.0-rc3-00699-g90679706d486-dirty #494
  [ 1887.188034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  [ 1887.189618] Workqueue: events_unbound bpf_map_free_deferred
  [ 1887.190341] Call Trace:
  [ 1887.190666]  &lt;TASK&gt;
  [ 1887.190949]  dump_stack_lvl+0xac/0xe0
  [ 1887.191423]  ? nf_tcp_handle_invalid+0x1b0/0x1b0
  [ 1887.192019]  ? panic+0x3c0/0x3c0
  [ 1887.192449]  print_report+0x14f/0x720
  [ 1887.192930]  ? preempt_count_sub+0x1c/0xd0
  [ 1887.193459]  ? __virt_addr_valid+0xac/0x120
  [ 1887.194004]  ? bpf_rb_root_free+0x1f8/0x2b0
  [ 1887.194572]  kasan_report+0xc3/0x100
  [ 1887.195085]  ? bpf_rb_root_free+0x1f8/0x2b0
  [ 1887.195668]  bpf_rb_root_free+0x1f8/0x2b0
  [ 1887.196183]  ? __bpf_obj_drop_impl+0xb0/0xb0
  [ 1887.196736]  ? preempt_count_sub+0x1c/0xd0
  [ 1887.197270]  ? preempt_count_sub+0x1c/0xd0
  [ 1887.197802]  ? _raw_spin_unlock+0x1f/0x40
  [ 1887.198319]  bpf_obj_free_fields+0x1d4/0x260
  [ 1887.198883]  array_map_free+0x1a3/0x260
  [ 1887.199380]  bpf_map_free_deferred+0x7b/0xe0
  [ 1887.199943]  process_scheduled_works+0x3a2/0x6c0
  [ 1887.200549]  worker_thread+0x633/0x890
  [ 1887.201047]  ? __kthread_parkme+0xd7/0xf0
  [ 1887.201574]  ? kthread+0x102/0x1d0
  [ 1887.202020]  kthread+0x1ab/0x1d0
  [ 1887.202447]  ? pr_cont_work+0x270/0x270
  [ 1887.202954]  ? kthread_blkcg+0x50/0x50
  [ 1887.203444]  ret_from_fork+0x34/0x50
  [ 1887.203914]  ? kthread_blkcg+0x50/0x50
  [ 1887.204397]  ret_from_fork_asm+0x11/0x20
  [ 1887.204913]  &lt;/TASK&gt;
  [ 1887.204913]  &lt;/TASK&gt;
  [ 1887.205209]
  [ 1887.205416] Allocated by task 2197:
  [ 1887.205881]  kasan_set_track+0x3f/0x60
  [ 1887.206366]  __kasan_kmalloc+0x6e/0x80
  [ 1887.206856]  __kmalloc+0xac/0x1a0
  [ 1887.207293]  btf_parse_fields+0xa15/0x1480
  [ 1887.207836]  btf_parse_struct_metas+0x566/0x670
  [ 1887.208387]  btf_new_fd+0x294/0x4d0
  [ 1887.208851]  __sys_bpf+0x4ba/0x600
  [ 1887.209292]  __x64_sys_bpf+0x41/0x50
  [ 1887.209762]  do_syscall_64+0x4c/0xf0
  [ 1887.210222]  entry_SYSCALL_64_after_hwframe+0x63/0x6b
  [ 1887.210868]
  [ 1887.211074] Freed by task 36:
  [ 1887.211460]  kasan_set_track+0x3f/0x60
  [ 1887.211951]  kasan_save_free_info+0x28/0x40
  [ 1887.212485]  ____kasan_slab_free+0x101/0x180
  [ 1887.213027]  __kmem_cache_free+0xe4/0x210
  [ 1887.213514]  btf_free+0x5b/0x130
  [ 1887.213918]  rcu_core+0x638/0xcc0
  [ 1887.214347]  __do_softirq+0x114/0x37e

The error happens at bpf_rb_root_free+0x1f8/0x2b0:

  00000000000034c0 &lt;bpf_rb_root_free&gt;:
  ; {
    34c0: f3 0f 1e fa                   endbr64
    34c4: e8 00 00 00 00                callq   0x34c9 &lt;bpf_rb_root_free+0x9&gt;
    34c9: 55                            pushq   %rbp
    34ca: 48 89 e5                      movq    %rsp, %rbp
  ...
  ;       if (rec &amp;&amp; rec-&gt;refcount_off &gt;= 0 &amp;&amp;
    36aa: 4d 85 ed                      testq   %r13, %r13
    36ad: 74 a9                         je      0x3658 &lt;bpf_rb_root_free+0x198&gt;
    36af: 49 8d 7d 10                   leaq    0x10(%r13), %rdi
    36b3: e8 00 00 00 00                callq   0x36b8 &lt;bpf_rb_root_free+0x1f8&gt;
                                        &lt;==== kasan function
    36b8: 45 8b 7d 10                   movl    0x10(%r13), %r15d
                                        &lt;==== use-after-free load
    36bc: 45 85 ff                      testl   %r15d, %r15d
    36bf: 78 8c                         js      0x364d &lt;bpf_rb_root_free+0x18d&gt;

So the problem 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52446/">CVE-2023-52446 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52446">CVE-2023-52446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220247">SUSE bug 1220247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52447</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52447" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Defer the free of inner map when necessary

When updating or deleting an inner map in map array or map htab, the map
may still be accessed by non-sleepable program or sleepable program.
However bpf_map_fd_put_ptr() decreases the ref-counter of the inner map
directly through bpf_map_put(), if the ref-counter is the last one
(which is true for most cases), the inner map will be freed by
ops-&gt;map_free() in a kworker. But for now, most .map_free() callbacks
don't use synchronize_rcu() or its variants to wait for the elapse of a
RCU grace period, so after the invocation of ops-&gt;map_free completes,
the bpf program which is accessing the inner map may incur
use-after-free problem.

Fix the free of inner map by invoking bpf_map_free_deferred() after both
one RCU grace period and one tasks trace RCU grace period if the inner
map has been removed from the outer map before. The deferment is
accomplished by using call_rcu() or call_rcu_tasks_trace() when
releasing the last ref-counter of bpf map. The newly-added rcu_head
field in bpf_map shares the same storage space with work field to
reduce the size of bpf_map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52448</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump

Syzkaller has reported a NULL pointer dereference when accessing
rgd-&gt;rd_rgl in gfs2_rgrp_dump().  This can happen when creating
rgd-&gt;rd_gl fails in read_rindex_entry().  Add a NULL pointer check in
gfs2_rgrp_dump() to prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52450</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()

Get logical socket id instead of physical id in discover_upi_topology()
to avoid out-of-bound access on 'upi = &amp;type-&gt;topology[nid][idx];' line
that leads to NULL pointer dereference in upi_fill_topology()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52452</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52452" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix accesses to uninit stack slots

Privileged programs are supposed to be able to read uninitialized stack
memory (ever since 6715df8d5) but, before this patch, these accesses
were permitted inconsistently. In particular, accesses were permitted
above state-&gt;allocated_stack, but not below it. In other words, if the
stack was already "large enough", the access was permitted, but
otherwise the access was rejected instead of being allowed to "grow the
stack". This undesired rejection was happening in two places:
- in check_stack_slot_within_bounds()
- in check_stack_range_initialized()
This patch arranges for these accesses to be permitted. A bunch of tests
that were relying on the old rejection had to change; all of them were
changed to add also run unprivileged, in which case the old behavior
persists. One tests couldn't be updated - global_func16 - because it
can't run unprivileged for other reasons.

This patch also fixes the tracking of the stack size for variable-offset
reads. This second fix is bundled in the same commit as the first one
because they're inter-related. Before this patch, writes to the stack
using registers containing a variable offset (as opposed to registers
with fixed, known values) were not properly contributing to the
function's needed stack size. As a result, it was possible for a program
to verify, but then to attempt to read out-of-bounds data at runtime
because a too small stack had been allocated for it.

Each function tracks the size of the stack it needs in
bpf_subprog_info.stack_depth, which is maintained by
update_stack_depth(). For regular memory accesses, check_mem_access()
was calling update_state_depth() but it was passing in only the fixed
part of the offset register, ignoring the variable offset. This was
incorrect; the minimum possible value of that register should be used
instead.

This tracking is now fixed by centralizing the tracking of stack size in
grow_stack_state(), and by lifting the calls to grow_stack_state() to
check_stack_access_within_bounds() as suggested by Andrii. The code is
now simpler and more convincingly tracks the correct maximum stack size.
check_stack_range_initialized() can now rely on enough stack having been
allocated for the access; this helps with the fix for the first issue.

A few tests were changed to also check the stack depth computation. The
one that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52453</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hisi_acc_vfio_pci: Update migration data pointer correctly on saving/resume

When the optional PRE_COPY support was added to speed up the device
compatibility check, it failed to update the saving/resuming data
pointers based on the fd offset. This results in migration data
corruption and when the device gets started on the destination the
following error is reported in some cases,

[  478.907684] arm-smmu-v3 arm-smmu-v3.2.auto: event 0x10 received:
[  478.913691] arm-smmu-v3 arm-smmu-v3.2.auto:  0x0000310200000010
[  478.919603] arm-smmu-v3 arm-smmu-v3.2.auto:  0x000002088000007f
[  478.925515] arm-smmu-v3 arm-smmu-v3.2.auto:  0x0000000000000000
[  478.931425] arm-smmu-v3 arm-smmu-v3.2.auto:  0x0000000000000000
[  478.947552] hisi_zip 0000:31:00.0: qm_axi_rresp [error status=0x1] found
[  478.955930] hisi_zip 0000:31:00.0: qm_db_timeout [error status=0x400] found
[  478.955944] hisi_zip 0000:31:00.0: qm sq doorbell timeout in function 2
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220337">SUSE bug 1220337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52454</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52454" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length

If the host sends an H2CData command with an invalid DATAL,
the kernel may crash in nvmet_tcp_build_pdu_iovec().

Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
lr : nvmet_tcp_io_work+0x6ac/0x718 [nvmet_tcp]
Call trace:
  process_one_work+0x174/0x3c8
  worker_thread+0x2d0/0x3e8
  kthread+0x104/0x110

Fix the bug by raising a fatal error if DATAL isn't coherent
with the packet size.
Also, the PDU length should never exceed the MAXH2CDATA parameter which
has been communicated to the host in nvmet_tcp_handle_icreq().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52455" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52455" ref_url="https://www.suse.com/security/cve/CVE-2023-52455" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Don't reserve 0-length IOVA region

When the bootloader/firmware doesn't setup the framebuffers, their
address and size are 0 in "iommu-addresses" property. If IOVA region is
reserved with 0 length, then it ends up corrupting the IOVA rbtree with
an entry which has pfn_hi &lt; pfn_lo.
If we intend to use display driver in kernel without framebuffer then
it's causing the display IOMMU mappings to fail as entire valid IOVA
space is reserved when address and length are passed as 0.
An ideal solution would be firmware removing the "iommu-addresses"
property and corresponding "memory-region" if display is not present.
But the kernel should be able to handle this by checking for size of
IOVA region and skipping the IOVA reservation if size is 0. Also, add
a warning if firmware is requesting 0-length IOVA region reservation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52455/">CVE-2023-52455 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52455">CVE-2023-52455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220332">SUSE bug 1220332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52456</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52456" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: imx: fix tx statemachine deadlock

When using the serial port as RS485 port, the tx statemachine is used to
control the RTS pin to drive the RS485 transceiver TX_EN pin. When the
TTY port is closed in the middle of a transmission (for instance during
userland application crash), imx_uart_shutdown disables the interface
and disables the Transmission Complete interrupt. afer that,
imx_uart_stop_tx bails on an incomplete transmission, to be retriggered
by the TC interrupt. This interrupt is disabled and therefore the tx
statemachine never transitions out of SEND. The statemachine is in
deadlock now, and the TX_EN remains low, making the interface useless.

imx_uart_stop_tx now checks for incomplete transmission AND whether TC
interrupts are enabled before bailing to be retriggered. This makes sure
the state machine handling is reached, and is properly set to
WAIT_AFTER_SEND.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-05-02"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52457</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52457" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: omap: Don't skip resource freeing if pm_runtime_resume_and_get() failed

Returning an error code from .remove() makes the driver core emit the
little helpful error message:

	remove callback returned a non-zero value. This will be ignored.

and then remove the device anyhow. So all resources that were not freed
are leaked in this case. Skipping serial8250_unregister_port() has the
potential to keep enough of the UART around to trigger a use-after-free.

So replace the error return (and with it the little helpful error
message) by a more useful error message and continue to cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52458</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: add check that partition length needs to be aligned with block size

Before calling add partition or resize partition, there is no check
on whether the length is aligned with the logical block size.
If the logical block size of the disk is larger than 512 bytes,
then the partition size maybe not the multiple of the logical block size,
and when the last sector is read, bio_truncate() will adjust the bio size,
resulting in an IO error if the size of the read command is smaller than
the logical block size.If integrity data is supported, this will also
result in a null pointer dereference when calling bio_integrity_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220428">SUSE bug 1220428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52459</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52459" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52459" ref_url="https://www.suse.com/security/cve/CVE-2023-52459" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l: async: Fix duplicated list deletion

The list deletion call dropped here is already called from the
helper function in the line before. Having a second list_del()
call results in either a warning (with CONFIG_DEBUG_LIST=y):

list_del corruption, c46c8198-&gt;next is LIST_POISON1 (00000100)

If CONFIG_DEBUG_LIST is disabled the operation results in a
kernel error due to NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52459/">CVE-2023-52459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52459">CVE-2023-52459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220318">SUSE bug 1220318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52460" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52460" ref_url="https://www.suse.com/security/cve/CVE-2023-52460" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix NULL pointer dereference at hibernate

During hibernate sequence the source context might not have a clk_mgr.
So don't use it to look for DML2 support.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52460/">CVE-2023-52460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52460">CVE-2023-52460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220319">SUSE bug 1220319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52461" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52461" ref_url="https://www.suse.com/security/cve/CVE-2023-52461" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Fix bounds limiting when given a malformed entity

If we're given a malformed entity in drm_sched_entity_init()--shouldn't
happen, but we verify--with out-of-bounds priority value, we set it to an
allowed value. Fix the expression which sets this limit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52461/">CVE-2023-52461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52461">CVE-2023-52461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220322">SUSE bug 1220322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52462" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix check for attempt to corrupt spilled pointer

When register is spilled onto a stack as a 1/2/4-byte register, we set
slot_type[BPF_REG_SIZE - 1] (plus potentially few more below it,
depending on actual spill size). So to check if some stack slot has
spilled register we need to consult slot_type[7], not slot_type[0].

To avoid the need to remember and double-check this in the future, just
use is_spilled_reg() helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220325">SUSE bug 1220325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: force RO when remounting if SetVariable is not supported

If SetVariable at runtime is not supported by the firmware we never assign
a callback for that function. At the same time mount the efivarfs as
RO so no one can call that.  However, we never check the permission flags
when someone remounts the filesystem as RW. As a result this leads to a
crash looking like this:

$ mount -o remount,rw /sys/firmware/efi/efivars
$ efi-updatevar -f PK.auth PK

[  303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  303.280482] Mem abort info:
[  303.280854]   ESR = 0x0000000086000004
[  303.281338]   EC = 0x21: IABT (current EL), IL = 32 bits
[  303.282016]   SET = 0, FnV = 0
[  303.282414]   EA = 0, S1PTW = 0
[  303.282821]   FSC = 0x04: level 0 translation fault
[  303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000
[  303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
[  303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6
[  303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1
[  303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023
[  303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  303.292123] pc : 0x0
[  303.292443] lr : efivar_set_variable_locked+0x74/0xec
[  303.293156] sp : ffff800008673c10
[  303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000
[  303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027
[  303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000
[  303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000
[  303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54
[  303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4
[  303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002
[  303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201
[  303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc
[  303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000
[  303.303341] Call trace:
[  303.303679]  0x0
[  303.303938]  efivar_entry_set_get_size+0x98/0x16c
[  303.304585]  efivarfs_file_write+0xd0/0x1a4
[  303.305148]  vfs_write+0xc4/0x2e4
[  303.305601]  ksys_write+0x70/0x104
[  303.306073]  __arm64_sys_write+0x1c/0x28
[  303.306622]  invoke_syscall+0x48/0x114
[  303.307156]  el0_svc_common.constprop.0+0x44/0xec
[  303.307803]  do_el0_svc+0x38/0x98
[  303.308268]  el0_svc+0x2c/0x84
[  303.308702]  el0t_64_sync_handler+0xf4/0x120
[  303.309293]  el0t_64_sync+0x190/0x194
[  303.309794] Code: ???????? ???????? ???????? ???????? (????????)
[  303.310612] ---[ end trace 0000000000000000 ]---

Fix this by adding a .reconfigure() function to the fs operations which
we can use to check the requested flags and deny anything that's not RO
if the firmware doesn't implement SetVariable at runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52465" ref_url="https://www.suse.com/security/cve/CVE-2023-52465" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: Fix null pointer dereference in smb2_probe

devm_kasprintf and devm_kzalloc return a pointer to dynamically
allocated memory which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52465/">CVE-2023-52465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52465">CVE-2023-52465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220434">SUSE bug 1220434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52466" ref_url="https://www.suse.com/security/cve/CVE-2023-52466" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52466/">CVE-2023-52466 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52466">CVE-2023-52466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220417">SUSE bug 1220417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: syscon: Fix null pointer dereference in of_syscon_register()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52468" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52468" ref_url="https://www.suse.com/security/cve/CVE-2023-52468" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

class: fix use-after-free in class_register()

The lock_class_key is still registered and can be found in
lock_keys_hash hlist after subsys_private is freed in error
handler path.A task who iterate over the lock_keys_hash
later may cause use-after-free.So fix that up and unregister
the lock_class_key before kfree(cp).

On our platform, a driver fails to kset_register because of
creating duplicate filename '/class/xxx'.With Kasan enabled,
it prints a invalid-access bug report.

KASAN bug report:

BUG: KASAN: invalid-access in lockdep_register_key+0x19c/0x1bc
Write of size 8 at addr 15ffff808b8c0368 by task modprobe/252
Pointer tag: [15], memory tag: [fe]

CPU: 7 PID: 252 Comm: modprobe Tainted: G        W
 6.6.0-mainline-maybe-dirty #1

Call trace:
dump_backtrace+0x1b0/0x1e4
show_stack+0x2c/0x40
dump_stack_lvl+0xac/0xe0
print_report+0x18c/0x4d8
kasan_report+0xe8/0x148
__hwasan_store8_noabort+0x88/0x98
lockdep_register_key+0x19c/0x1bc
class_register+0x94/0x1ec
init_module+0xbc/0xf48 [rfkill]
do_one_initcall+0x17c/0x72c
do_init_module+0x19c/0x3f8
...
Memory state around the buggy address:
ffffff808b8c0100: 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a 8a
ffffff808b8c0200: 8a 8a 8a 8a 8a 8a 8a 8a fe fe fe fe fe fe fe fe
&gt;ffffff808b8c0300: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
                                     ^
ffffff808b8c0400: 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03 03

As CONFIG_KASAN_GENERIC is not set, Kasan reports invalid-access
not use-after-free here.In this case, modprobe is manipulating
the corrupted lock_keys_hash hlish where lock_class_key is already
freed before.

It's worth noting that this only can happen if lockdep is enabled,
which is not true for normal system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52468/">CVE-2023-52468 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52468">CVE-2023-52468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220431">SUSE bug 1220431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228715">SUSE bug 1228715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52471" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52471" ref_url="https://www.suse.com/security/cve/CVE-2023-52471" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix some null pointer dereference issues in ice_ptp.c

devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52471/">CVE-2023-52471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52471">CVE-2023-52471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220424">SUSE bug 1220424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52472" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52472" ref_url="https://www.suse.com/security/cve/CVE-2023-52472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: rsa - add a check for allocation failure

Static checkers insist that the mpi_alloc() allocation can fail so add
a check to prevent a NULL dereference.  Small allocations like this
can't actually fail in current kernels, but adding a check is very
simple and makes the static checkers happy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52472/">CVE-2023-52472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52472">CVE-2023-52472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220427">SUSE bug 1220427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220430">SUSE bug 1220430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52473" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52473" ref_url="https://www.suse.com/security/cve/CVE-2023-52473" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Fix NULL pointer dereference in zone registration error path

If device_register() in thermal_zone_device_register_with_trips()
returns an error, the tz variable is set to NULL and subsequently
dereferenced in kfree(tz-&gt;tzp).

Commit adc8749b150c ("thermal/drivers/core: Use put_device() if
device_register() fails") added the tz = NULL assignment in question to
avoid a possible double-free after dropping the reference to the zone
device.  However, after commit 4649620d9404 ("thermal: core: Make
thermal_zone_device_unregister() return after freeing the zone"), that
assignment has become redundant, because dropping the reference to the
zone device does not cause the zone object to be freed any more.

Drop it to address the NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52473/">CVE-2023-52473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52473">CVE-2023-52473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220430">SUSE bug 1220430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52474" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests

hfi1 user SDMA request processing has two bugs that can cause data
corruption for user SDMA requests that have multiple payload iovecs
where an iovec other than the tail iovec does not run up to the page
boundary for the buffer pointed to by that iovec.a

Here are the specific bugs:
1. user_sdma_txadd() does not use struct user_sdma_iovec-&gt;iov.iov_len.
   Rather, user_sdma_txadd() will add up to PAGE_SIZE bytes from iovec
   to the packet, even if some of those bytes are past
   iovec-&gt;iov.iov_len and are thus not intended to be in the packet.
2. user_sdma_txadd() and user_sdma_send_pkts() fail to advance to the
   next iovec in user_sdma_request-&gt;iovs when the current iovec
   is not PAGE_SIZE and does not contain enough data to complete the
   packet. The transmitted packet will contain the wrong data from the
   iovec pages.

This has not been an issue with SDMA packets from hfi1 Verbs or PSM2
because they only produce iovecs that end short of PAGE_SIZE as the tail
iovec of an SDMA request.

Fixing these bugs exposes other bugs with the SDMA pin cache
(struct mmu_rb_handler) that get in way of supporting user SDMA requests
with multiple payload iovecs whose buffers do not end at PAGE_SIZE. So
this commit fixes those issues as well.

Here are the mmu_rb_handler bugs that non-PAGE_SIZE-end multi-iovec
payload user SDMA requests can hit:
1. Overlapping memory ranges in mmu_rb_handler will result in duplicate
   pinnings.
2. When extending an existing mmu_rb_handler entry (struct mmu_rb_node),
   the mmu_rb code (1) removes the existing entry under a lock, (2)
   releases that lock, pins the new pages, (3) then reacquires the lock
   to insert the extended mmu_rb_node.

   If someone else comes in and inserts an overlapping entry between (2)
   and (3), insert in (3) will fail.

   The failure path code in this case unpins _all_ pages in either the
   original mmu_rb_node or the new mmu_rb_node that was inserted between
   (2) and (3).
3. In hfi1_mmu_rb_remove_unless_exact(), mmu_rb_node-&gt;refcount is
   incremented outside of mmu_rb_handler-&gt;lock. As a result, mmu_rb_node
   could be evicted by another thread that gets mmu_rb_handler-&gt;lock and
   checks mmu_rb_node-&gt;refcount before mmu_rb_node-&gt;refcount is
   incremented.
4. Related to #2 above, SDMA request submission failure path does not
   check mmu_rb_node-&gt;refcount before freeing mmu_rb_node object.

   If there are other SDMA requests in progress whose iovecs have
   pointers to the now-freed mmu_rb_node(s), those pointers to the
   now-freed mmu_rb nodes will be dereferenced when those SDMA requests
   complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52475" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: powermate - fix use-after-free in powermate_config_complete

syzbot has found a use-after-free bug [1] in the powermate driver. This
happens when the device is disconnected, which leads to a memory free from
the powermate_device struct.  When an asynchronous control message
completes after the kfree and its callback is invoked, the lock does not
exist anymore and hence the bug.

Use usb_kill_urb() on pm-&gt;config to cancel any in-progress requests upon
device disconnection.

[1] https://syzkaller.appspot.com/bug?extid=0434ac83f907a1dbdd1e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/lbr: Filter vsyscall addresses

We found that a panic can occur when a vsyscall is made while LBR sampling
is active. If the vsyscall is interrupted (NMI) for perf sampling, this
call sequence can occur (most recent at top):

    __insn_get_emulate_prefix()
    insn_get_emulate_prefix()
    insn_get_prefixes()
    insn_get_opcode()
    decode_branch_type()
    get_branch_type()
    intel_pmu_lbr_filter()
    intel_pmu_handle_irq()
    perf_event_nmi_handler()

Within __insn_get_emulate_prefix() at frame 0, a macro is called:

    peek_nbyte_next(insn_byte_t, insn, i)

Within this macro, this dereference occurs:

    (insn)-&gt;next_byte

Inspecting registers at this point, the value of the next_byte field is the
address of the vsyscall made, for example the location of the vsyscall
version of gettimeofday() at 0xffffffffff600000. The access to an address
in the vsyscall region will trigger an oops due to an unhandled page fault.

To fix the bug, filtering for vsyscalls can be done when
determining the branch type. This patch will return
a "none" branch if a kernel address if found to lie in the
vsyscall region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52477" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: hub: Guard against accesses to uninitialized BOS descriptors

Many functions in drivers/usb/core/hub.c and drivers/usb/core/hub.h
access fields inside udev-&gt;bos without checking if it was allocated and
initialized. If usb_get_bos_descriptor() fails for whatever
reason, udev-&gt;bos will be NULL and those accesses will result in a
crash:

BUG: kernel NULL pointer dereference, address: 0000000000000018
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 5 PID: 17818 Comm: kworker/5:1 Tainted: G W 5.15.108-18910-gab0e1cb584e1 #1 &lt;HASH:1f9e 1&gt;
Hardware name: Google Kindred/Kindred, BIOS Google_Kindred.12672.413.0 02/03/2021
Workqueue: usb_hub_wq hub_event
RIP: 0010:hub_port_reset+0x193/0x788
Code: 89 f7 e8 20 f7 15 00 48 8b 43 08 80 b8 96 03 00 00 03 75 36 0f b7 88 92 03 00 00 81 f9 10 03 00 00 72 27 48 8b 80 a8 03 00 00 &lt;48&gt; 83 78 18 00 74 19 48 89 df 48 8b 75 b0 ba 02 00 00 00 4c 89 e9
RSP: 0018:ffffab740c53fcf8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffa1bc5f678000 RCX: 0000000000000310
RDX: fffffffffffffdff RSI: 0000000000000286 RDI: ffffa1be9655b840
RBP: ffffab740c53fd70 R08: 00001b7d5edaa20c R09: ffffffffb005e060
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffffab740c53fd3e R14: 0000000000000032 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffffa1be96540000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000018 CR3: 000000022e80c005 CR4: 00000000003706e0
Call Trace:
hub_event+0x73f/0x156e
? hub_activate+0x5b7/0x68f
process_one_work+0x1a2/0x487
worker_thread+0x11a/0x288
kthread+0x13a/0x152
? process_one_work+0x487/0x487
? kthread_associate_blkcg+0x70/0x70
ret_from_fork+0x1f/0x30

Fall back to a default behavior if the BOS descriptor isn't accessible
and skip all the functionalities that depend on it: LPM support checks,
Super Speed capabilitiy checks, U1/U2 states setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect

hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.

hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.

This opens the following races (note the below code is simplified):

1. Retrieving + printing the protocol (harmless race):

	if (!hidpp-&gt;protocol_major) {
		hidpp_root_get_protocol_version()
		hidpp-&gt;protocol_major = response.rap.params[0];
	}

We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:

[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.

Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:

2. Updating the name to the HIDPP name (harmless race):

	if (hidpp-&gt;name == hdev-&gt;name) {
		...
		hidpp-&gt;name = new_name;
	}

3. Initializing the power_supply class for the battery (problematic!):

hidpp_initialize_battery()
{
        if (hidpp-&gt;battery.ps)
                return 0;

	probe_battery(); /* Blocks, threads take turns executing this */

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);
}

4. Creating delayed input_device (potentially problematic):

	if (hidpp-&gt;delayed_input)
		return;

	hidpp-&gt;delayed_input = hidpp_allocate_input(hdev);

The really big problem here is 3. Hitting the race leads to the following
sequence:

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

	...

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.

Notice how:

1. This is all devm-maganaged
2. The hidpp-&gt;battery.desc struct is shared between the 2 power supplies
3. hidpp-&gt;battery.desc.properties points to the result from the second
   devm_kmemdup()

This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
   hidpp-&gt;battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
   this involves sending a remove uevent to userspace which invokes
   power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp-&gt;battery.desc.properties which
   now points to freed memory leading to backtraces like this one:

Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel:  ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel:  dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel:  kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52479" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52479" ref_url="https://www.suse.com/security/cve/CVE-2023-52479" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix uaf in smb20_oplock_break_ack

drop reference after use opinfo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-11-07"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52479/">CVE-2023-52479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52479">CVE-2023-52479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220695">SUSE bug 1220695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52480" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52480" ref_url="https://www.suse.com/security/cve/CVE-2023-52480" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix race condition between session lookup and expire

 Thread A                        +  Thread B
 ksmbd_session_lookup            |  smb2_sess_setup
   sess = xa_load                |
                                 |
                                 |    xa_erase(&amp;conn-&gt;sessions, sess-&gt;id);
                                 |
                                 |    ksmbd_session_destroy(sess) --&gt; kfree(sess)
                                 |
   // UAF!                       |
   sess-&gt;last_active = jiffies   |
                                 +

This patch add rwsem to fix race condition between ksmbd_session_lookup
and ksmbd_expire_session.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52480/">CVE-2023-52480 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52480">CVE-2023-52480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220665">SUSE bug 1220665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52481" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: errata: Add Cortex-A520 speculative unprivileged load workaround

Implement the workaround for ARM Cortex-A520 erratum 2966298. On an
affected Cortex-A520 core, a speculatively executed unprivileged load
might leak data from a privileged load via a cache side channel. The
issue only exists for loads within a translation regime with the same
translation (e.g. same ASID and VMID). Therefore, the issue only affects
the return to EL0.

The workaround is to execute a TLBI before returning to EL0 after all
loads of privileged data. A non-shareable TLBI to any address is
sufficient.

The workaround isn't necessary if page table isolation (KPTI) is
enabled, but for simplicity it will be. Page table isolation should
normally be disabled for Cortex-A520 as it supports the CSV3 feature
and the E0PD feature (used when KASLR is enabled).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220887">SUSE bug 1220887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52482" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/srso: Add SRSO mitigation for Hygon processors

Add mitigation for the speculative return stack overflow vulnerability
which exists on Hygon processors too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52483" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52483" ref_url="https://www.suse.com/security/cve/CVE-2023-52483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mctp: perform route lookups under a RCU read-side lock

Our current route lookups (mctp_route_lookup and mctp_route_lookup_null)
traverse the net's route list without the RCU read lock held. This means
the route lookup is subject to preemption, resulting in an potential
grace period expiry, and so an eventual kfree() while we still have the
route pointer.

Add the proper read-side critical section locks around the route
lookups, preventing premption and a possible parallel kfree.

The remaining net-&gt;mctp.routes accesses are already under a
rcu_read_lock, or protected by the RTNL for updates.

Based on an analysis from Sili Luo &lt;rootlab@huawei.com&gt;, where
introducing a delay in the route lookup could cause a UAF on
simultaneous sendmsg() and route deletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52483/">CVE-2023-52483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52483">CVE-2023-52483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220738">SUSE bug 1220738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223291">SUSE bug 1223291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-v3: Fix soft lockup triggered by arm_smmu_mm_invalidate_range

When running an SVA case, the following soft lockup is triggered:
--------------------------------------------------------------------
watchdog: BUG: soft lockup - CPU#244 stuck for 26s!
pstate: 83400009 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : arm_smmu_cmdq_issue_cmdlist+0x178/0xa50
lr : arm_smmu_cmdq_issue_cmdlist+0x150/0xa50
sp : ffff8000d83ef290
x29: ffff8000d83ef290 x28: 000000003b9aca00 x27: 0000000000000000
x26: ffff8000d83ef3c0 x25: da86c0812194a0e8 x24: 0000000000000000
x23: 0000000000000040 x22: ffff8000d83ef340 x21: ffff0000c63980c0
x20: 0000000000000001 x19: ffff0000c6398080 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: ffff3000b4a3bbb0
x14: ffff3000b4a30888 x13: ffff3000b4a3cf60 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffc08120e4d6bc
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000048cfa
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 000000000000000a
x2 : 0000000080000000 x1 : 0000000000000000 x0 : 0000000000000001
Call trace:
 arm_smmu_cmdq_issue_cmdlist+0x178/0xa50
 __arm_smmu_tlb_inv_range+0x118/0x254
 arm_smmu_tlb_inv_range_asid+0x6c/0x130
 arm_smmu_mm_invalidate_range+0xa0/0xa4
 __mmu_notifier_invalidate_range_end+0x88/0x120
 unmap_vmas+0x194/0x1e0
 unmap_region+0xb4/0x144
 do_mas_align_munmap+0x290/0x490
 do_mas_munmap+0xbc/0x124
 __vm_munmap+0xa8/0x19c
 __arm64_sys_munmap+0x28/0x50
 invoke_syscall+0x78/0x11c
 el0_svc_common.constprop.0+0x58/0x1c0
 do_el0_svc+0x34/0x60
 el0_svc+0x2c/0xd4
 el0t_64_sync_handler+0x114/0x140
 el0t_64_sync+0x1a4/0x1a8
--------------------------------------------------------------------

Note that since 6.6-rc1 the arm_smmu_mm_invalidate_range above is renamed
to "arm_smmu_mm_arch_invalidate_secondary_tlbs", yet the problem remains.

The commit 06ff87bae8d3 ("arm64: mm: remove unused functions and variable
protoypes") fixed a similar lockup on the CPU MMU side. Yet, it can occur
to SMMU too, since arm_smmu_mm_arch_invalidate_secondary_tlbs() is called
typically next to MMU tlb flush function, e.g.
	tlb_flush_mmu_tlbonly {
		tlb_flush {
			__flush_tlb_range {
				// check MAX_TLBI_OPS
			}
		}
		mmu_notifier_arch_invalidate_secondary_tlbs {
			arm_smmu_mm_arch_invalidate_secondary_tlbs {
				// does not check MAX_TLBI_OPS
			}
		}
	}

Clone a CMDQ_MAX_TLBI_OPS from the MAX_TLBI_OPS in tlbflush.h, since in an
SVA case SMMU uses the CPU page table, so it makes sense to align with the
tlbflush code. Then, replace per-page TLBI commands with a single per-asid
TLBI command, if the request size hits this threshold.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52485" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52485" ref_url="https://www.suse.com/security/cve/CVE-2023-52485" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Wake DMCUB before sending a command

[Why]
We can hang in place trying to send commands when the DMCUB isn't
powered on.

[How]
For functions that execute within a DC context or DC lock we can
wrap the direct calls to dm_execute_dmub_cmd/list with code that
exits idle power optimizations and reallows once we're done with
the command submission on success.

For DM direct submissions the DM will need to manage the enter/exit
sequencing manually.

We cannot invoke a DMCUB command directly within the DM execution
helper or we can deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52485/">CVE-2023-52485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52485">CVE-2023-52485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220835">SUSE bug 1220835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Don't unref the same fb many times by mistake due to deadlock handling

If we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl()
we proceed to unref the fb and then retry the whole thing from the top.
But we forget to reset the fb pointer back to NULL, and so if we then
get another error during the retry, before the fb lookup, we proceed
the unref the same fb again without having gotten another reference.
The end result is that the fb will (eventually) end up being freed
while it's still in use.

Reset fb to NULL once we've unreffed it to avoid doing it again
until we've done another fb lookup.

This turned out to be pretty easy to hit on a DG2 when doing async
flips (and CONFIG_DEBUG_WW_MUTEX_SLOWPATH=y). The first symptom I
saw that drm_closefb() simply got stuck in a busy loop while walking
the framebuffer list. Fortunately I was able to convince it to oops
instead, and from there it was easier to track down the culprit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221277">SUSE bug 1221277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52487" ref_url="https://www.suse.com/security/cve/CVE-2023-52487" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix peer flow lists handling

The cited change refactored mlx5e_tc_del_fdb_peer_flow() to only clear DUP
flag when list of peer flows has become empty. However, if any concurrent
user holds a reference to a peer flow (for example, the neighbor update
workqueue task is updating peer flow's parent encap entry concurrently),
then the flow will not be removed from the peer list and, consecutively,
DUP flag will remain set. Since mlx5e_tc_del_fdb_peers_flow() calls
mlx5e_tc_del_fdb_peer_flow() for every possible peer index the algorithm
will try to remove the flow from eswitch instances that it has never peered
with causing either NULL pointer dereference when trying to remove the flow
peer list head of peer_index that was never initialized or a warning if the
list debug config is enabled[0].

Fix the issue by always removing the peer flow from the list even when not
releasing the last reference to it.

[0]:

[ 3102.985806] ------------[ cut here ]------------
[ 3102.986223] list_del corruption, ffff888139110698-&gt;next is NULL
[ 3102.986757] WARNING: CPU: 2 PID: 22109 at lib/list_debug.c:53 __list_del_entry_valid_or_report+0x4f/0xc0
[ 3102.987561] Modules linked in: act_ct nf_flow_table bonding act_tunnel_key act_mirred act_skbedit vxlan cls_matchall nfnetlink_cttimeout act_gact cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa openvswitch nsh xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcg
ss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core [last unloaded: bonding]
[ 3102.991113] CPU: 2 PID: 22109 Comm: revalidator28 Not tainted 6.6.0-rc6+ #3
[ 3102.991695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 3102.992605] RIP: 0010:__list_del_entry_valid_or_report+0x4f/0xc0
[ 3102.993122] Code: 39 c2 74 56 48 8b 32 48 39 fe 75 62 48 8b 51 08 48 39 f2 75 73 b8 01 00 00 00 c3 48 89 fe 48 c7 c7 48 fd 0a 82 e8 41 0b ad ff &lt;0f&gt; 0b 31 c0 c3 48 89 fe 48 c7 c7 70 fd 0a 82 e8 2d 0b ad ff 0f 0b
[ 3102.994615] RSP: 0018:ffff8881383e7710 EFLAGS: 00010286
[ 3102.995078] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
[ 3102.995670] RDX: 0000000000000001 RSI: ffff88885f89b640 RDI: ffff88885f89b640
[ 3102.997188] DEL flow 00000000be367878 on port 0
[ 3102.998594] RBP: dead000000000122 R08: 0000000000000000 R09: c0000000ffffdfff
[ 3102.999604] R10: 0000000000000008 R11: ffff8881383e7598 R12: dead000000000100
[ 3103.000198] R13: 0000000000000002 R14: ffff888139110000 R15: ffff888101901240
[ 3103.000790] FS:  00007f424cde4700(0000) GS:ffff88885f880000(0000) knlGS:0000000000000000
[ 3103.001486] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3103.001986] CR2: 00007fd42e8dcb70 CR3: 000000011e68a003 CR4: 0000000000370ea0
[ 3103.002596] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3103.003190] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 3103.003787] Call Trace:
[ 3103.004055]  &lt;TASK&gt;
[ 3103.004297]  ? __warn+0x7d/0x130
[ 3103.004623]  ? __list_del_entry_valid_or_report+0x4f/0xc0
[ 3103.005094]  ? report_bug+0xf1/0x1c0
[ 3103.005439]  ? console_unlock+0x4a/0xd0
[ 3103.005806]  ? handle_bug+0x3f/0x70
[ 3103.006149]  ? exc_invalid_op+0x13/0x60
[ 3103.006531]  ? asm_exc_invalid_op+0x16/0x20
[ 3103.007430]  ? __list_del_entry_valid_or_report+0x4f/0xc0
[ 3103.007910]  mlx5e_tc_del_fdb_peers_flow+0xcf/0x240 [mlx5_core]
[ 3103.008463]  mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]
[ 3103.008944]  mlx5e_flow_put+0x26/0x50 [mlx5_core]
[ 3103.009401]  mlx5e_delete_flower+0x25f/0x380 [mlx5_core]
[ 3103.009901]  tc_setup_cb_destroy+0xab/0x180
[ 3103.010292]  fl_hw_destroy_filter+0x99/0xc0 [cls_flower]
[ 3103.010779]  __fl_delete+0x2d4/0x2f0 [cls_flower]
[ 3103.0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52487/">CVE-2023-52487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52487">CVE-2023-52487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221341">SUSE bug 1221341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52488" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: convert from _raw_ to _noinc_ regmap functions for FIFO

The SC16IS7XX IC supports a burst mode to access the FIFOs where the
initial register address is sent ($00), followed by all the FIFO data
without having to resend the register address each time. In this mode, the
IC doesn't increment the register address for each R/W byte.

The regmap_raw_read() and regmap_raw_write() are functions which can
perform IO over multiple registers. They are currently used to read/write
from/to the FIFO, and although they operate correctly in this burst mode on
the SPI bus, they would corrupt the regmap cache if it was not disabled
manually. The reason is that when the R/W size is more than 1 byte, these
functions assume that the register address is incremented and handle the
cache accordingly.

Convert FIFO R/W functions to use the regmap _noinc_ versions in order to
remove the manual cache control which was a workaround when using the
_raw_ versions. FIFO registers are properly declared as volatile so
cache will not be used/updated for FIFO accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221162">SUSE bug 1221162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/sparsemem: fix race in accessing memory_section-&gt;usage

The below race is observed on a PFN which falls into the device memory
region with the system memory configuration where PFN's are such that
[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL].  Since normal zone start and end
pfn contains the device memory PFN's as well, the compaction triggered
will try on the device memory PFN's too though they end up in NOP(because
pfn_to_online_page() returns NULL for ZONE_DEVICE memory sections).  When
from other core, the section mappings are being removed for the
ZONE_DEVICE region, that the PFN in question belongs to, on which
compaction is currently being operated is resulting into the kernel crash
with CONFIG_SPASEMEM_VMEMAP enabled.  The crash logs can be seen at [1].

compact_zone()			memunmap_pages
-------------			---------------
__pageblock_pfn_to_page
   ......
 (a)pfn_valid():
     valid_section()//return true
			      (b)__remove_pages()-&gt;
				  sparse_remove_section()-&gt;
				    section_deactivate():
				    [Free the array ms-&gt;usage and set
				     ms-&gt;usage = NULL]
     pfn_section_valid()
     [Access ms-&gt;usage which
     is NULL]

NOTE: From the above it can be said that the race is reduced to between
the pfn_valid()/pfn_section_valid() and the section deactivate with
SPASEMEM_VMEMAP enabled.

The commit b943f045a9af("mm/sparse: fix kernel crash with
pfn_section_valid check") tried to address the same problem by clearing
the SECTION_HAS_MEM_MAP with the expectation of valid_section() returns
false thus ms-&gt;usage is not accessed.

Fix this issue by the below steps:

a) Clear SECTION_HAS_MEM_MAP before freeing the -&gt;usage.

b) RCU protected read side critical section will either return NULL
   when SECTION_HAS_MEM_MAP is cleared or can successfully access -&gt;usage.

c) Free the -&gt;usage with kfree_rcu() and set ms-&gt;usage = NULL.  No
   attempt will be made to access -&gt;usage after this as the
   SECTION_HAS_MEM_MAP is cleared thus valid_section() return false.

Thanks to David/Pavan for their inputs on this patch.

[1] https://lore.kernel.org/linux-mm/994410bb-89aa-d987-1f50-f514903c55aa@quicinc.com/

On Snapdragon SoC, with the mentioned memory configuration of PFN's as
[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL], we are able to see bunch of
issues daily while testing on a device farm.

For this particular issue below is the log.  Though the below log is
not directly pointing to the pfn_section_valid(){ ms-&gt;usage;}, when we
loaded this dump on T32 lauterbach tool, it is pointing.

[  540.578056] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
[  540.578068] Mem abort info:
[  540.578070]   ESR = 0x0000000096000005
[  540.578073]   EC = 0x25: DABT (current EL), IL = 32 bits
[  540.578077]   SET = 0, FnV = 0
[  540.578080]   EA = 0, S1PTW = 0
[  540.578082]   FSC = 0x05: level 1 translation fault
[  540.578085] Data abort info:
[  540.578086]   ISV = 0, ISS = 0x00000005
[  540.578088]   CM = 0, WnR = 0
[  540.579431] pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBSBTYPE=--)
[  540.579436] pc : __pageblock_pfn_to_page+0x6c/0x14c
[  540.579454] lr : compact_zone+0x994/0x1058
[  540.579460] sp : ffffffc03579b510
[  540.579463] x29: ffffffc03579b510 x28: 0000000000235800 x27:000000000000000c
[  540.579470] x26: 0000000000235c00 x25: 0000000000000068 x24:ffffffc03579b640
[  540.579477] x23: 0000000000000001 x22: ffffffc03579b660 x21:0000000000000000
[  540.579483] x20: 0000000000235bff x19: ffffffdebf7e3940 x18:ffffffdebf66d140
[  540.579489] x17: 00000000739ba063 x16: 00000000739ba063 x15:00000000009f4bff
[  540.579495] x14: 0000008000000000 x13: 0000000000000000 x12:0000000000000001
[  540.579501] x11: 0000000000000000 x10: 0000000000000000 x9 :ffffff897d2cd440
[  540.579507] x8 : 0000000000000000 x7 : 0000000000000000 x6 :ffffffc03579b5b4
[  540.579512] x5 : 0000000000027f25 x4 : ffffffc03579b5b8 x3 :0000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52490" ref_url="https://www.suse.com/security/cve/CVE-2023-52490" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: migrate: fix getting incorrect page mapping during page migration

When running stress-ng testing, we found below kernel crash after a few hours:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
pc : dentry_name+0xd8/0x224
lr : pointer+0x22c/0x370
sp : ffff800025f134c0
......
Call trace:
  dentry_name+0xd8/0x224
  pointer+0x22c/0x370
  vsnprintf+0x1ec/0x730
  vscnprintf+0x2c/0x60
  vprintk_store+0x70/0x234
  vprintk_emit+0xe0/0x24c
  vprintk_default+0x3c/0x44
  vprintk_func+0x84/0x2d0
  printk+0x64/0x88
  __dump_page+0x52c/0x530
  dump_page+0x14/0x20
  set_migratetype_isolate+0x110/0x224
  start_isolate_page_range+0xc4/0x20c
  offline_pages+0x124/0x474
  memory_block_offline+0x44/0xf4
  memory_subsys_offline+0x3c/0x70
  device_offline+0xf0/0x120
  ......

After analyzing the vmcore, I found this issue is caused by page migration.
The scenario is that, one thread is doing page migration, and we will use the
target page's -&gt;mapping field to save 'anon_vma' pointer between page unmap and
page move, and now the target page is locked and refcount is 1.

Currently, there is another stress-ng thread performing memory hotplug,
attempting to offline the target page that is being migrated. It discovers that
the refcount of this target page is 1, preventing the offline operation, thus
proceeding to dump the page. However, page_mapping() of the target page may
return an incorrect file mapping to crash the system in dump_mapping(), since
the target page-&gt;mapping only saves 'anon_vma' pointer without setting
PAGE_MAPPING_ANON flag.

There are seveval ways to fix this issue:
(1) Setting the PAGE_MAPPING_ANON flag for target page's -&gt;mapping when saving
'anon_vma', but this can confuse PageAnon() for PFN walkers, since the target
page has not built mappings yet.
(2) Getting the page lock to call page_mapping() in __dump_page() to avoid crashing
the system, however, there are still some PFN walkers that call page_mapping()
without holding the page lock, such as compaction.
(3) Using target page-&gt;private field to save the 'anon_vma' pointer and 2 bits
page state, just as page-&gt;mapping records an anonymous page, which can remove
the page_mapping() impact for PFN walkers and also seems a simple way.

So I choose option 3 to fix this issue, and this can also fix other potential
issues for PFN walkers, such as compaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52490/">CVE-2023-52490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52490">CVE-2023-52490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221325">SUSE bug 1221325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52491" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52491" ref_url="https://www.suse.com/security/cve/CVE-2023-52491" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mtk-jpeg: Fix use after free bug due to error path handling in mtk_jpeg_dec_device_run

In mtk_jpeg_probe, &amp;jpeg-&gt;job_timeout_work is bound with
mtk_jpeg_job_timeout_work.

In mtk_jpeg_dec_device_run, if error happens in
mtk_jpeg_set_dec_dst, it will finally start the worker while
mark the job as finished by invoking v4l2_m2m_job_finish.

There are two methods to trigger the bug. If we remove the
module, it which will call mtk_jpeg_remove to make cleanup.
The possible sequence is as follows, which will cause a
use-after-free bug.

CPU0                  CPU1
mtk_jpeg_dec_...    |
  start worker	    |
                    |mtk_jpeg_job_timeout_work
mtk_jpeg_remove     |
  v4l2_m2m_release  |
    kfree(m2m_dev); |
                    |
                    | v4l2_m2m_get_curr_priv
                    |   m2m_dev-&gt;curr_ctx //use

If we close the file descriptor, which will call mtk_jpeg_release,
it will have a similar sequence.

Fix this bug by starting timeout worker only if started jpegdec worker
successfully. Then v4l2_m2m_job_finish will only be called in
either mtk_jpeg_job_timeout_work or mtk_jpeg_dec_device_run.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52491/">CVE-2023-52491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52491">CVE-2023-52491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221281">SUSE bug 1221281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52492" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fix NULL pointer in channel unregistration function

__dma_async_device_channel_register() can fail. In case of failure,
chan-&gt;local is freed (with free_percpu()), and chan-&gt;local is nullified.
When dma_async_device_unregister() is called (because of managed API or
intentionally by DMA controller driver), channels are unconditionally
unregistered, leading to this NULL pointer:
[    1.318693] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0
[...]
[    1.484499] Call trace:
[    1.486930]  device_del+0x40/0x394
[    1.490314]  device_unregister+0x20/0x7c
[    1.494220]  __dma_async_device_channel_unregister+0x68/0xc0

Look at dma_async_device_register() function error path, channel device
unregistration is done only if chan-&gt;local is not NULL.

Then add the same condition at the beginning of
__dma_async_device_channel_unregister() function, to avoid NULL pointer
issue whatever the API used to reach this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52493" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Drop chan lock before queuing buffers

Ensure read and write locks for the channel are not taken in succession by
dropping the read lock from parse_xfer_event() such that a callback given
to client can potentially queue buffers and acquire the write lock in that
process. Any queueing of buffers should be done without channel read lock
acquired as it can result in multiple locks and a soft lockup.

[mani: added fixes tag and cc'ed stable]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221274">SUSE bug 1221274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52494" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Add alignment check for event ring read pointer

Though we do check the event ring read pointer by "is_valid_ring_ptr"
to make sure it is in the buffer range, but there is another risk the
pointer may be not aligned.  Since we are expecting event ring elements
are 128 bits(struct mhi_ring_element) aligned, an unaligned read pointer
could lead to multiple issues like DoS or ring buffer memory corruption.

So add a alignment check for event ring read pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221273">SUSE bug 1221273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52495" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52495" ref_url="https://www.suse.com/security/cve/CVE-2023-52495" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: pmic_glink_altmode: fix port sanity check

The PMIC GLINK altmode driver currently supports at most two ports.

Fix the incomplete port sanity check on notifications to avoid
accessing and corrupting memory beyond the port array if we ever get a
notification for an unsupported port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52495/">CVE-2023-52495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52495">CVE-2023-52495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221271">SUSE bug 1221271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52496" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52496" ref_url="https://www.suse.com/security/cve/CVE-2023-52496" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52496/">CVE-2023-52496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52496">CVE-2023-52496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221163">SUSE bug 1221163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52497" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix lz4 inplace decompression

Currently EROFS can map another compressed buffer for inplace
decompression, that was used to handle the cases that some pages of
compressed data are actually not in-place I/O.

However, like most simple LZ77 algorithms, LZ4 expects the compressed
data is arranged at the end of the decompressed buffer and it
explicitly uses memmove() to handle overlapping:
  __________________________________________________________
 |_ direction of decompression --&gt; ____ |_ compressed data _|

Although EROFS arranges compressed data like this, it typically maps two
individual virtual buffers so the relative order is uncertain.
Previously, it was hardly observed since LZ4 only uses memmove() for
short overlapped literals and x86/arm64 memmove implementations seem to
completely cover it up and they don't have this issue.  Juhyung reported
that EROFS data corruption can be found on a new Intel x86 processor.
After some analysis, it seems that recent x86 processors with the new
FSRM feature expose this issue with "rep movsb".

Let's strictly use the decompressed buffer for lz4 inplace
decompression for now.  Later, as an useful improvement, we could try
to tie up these two buffers together in the correct order.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52498" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: sleep: Fix possible deadlocks in core system-wide PM code

It is reported that in low-memory situations the system-wide resume core
code deadlocks, because async_schedule_dev() executes its argument
function synchronously if it cannot allocate memory (and not only in
that case) and that function attempts to acquire a mutex that is already
held.  Executing the argument function synchronously from within
dpm_async_fn() may also be problematic for ordering reasons (it may
cause a consumer device's resume callback to be invoked before a
requisite supplier device's one, for example).

Address this by changing the code in question to use
async_schedule_dev_nocall() for scheduling the asynchronous
execution of device suspend and resume functions and to directly
run them synchronously if async_schedule_dev_nocall() returns false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221269">SUSE bug 1221269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52499" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52499" ref_url="https://www.suse.com/security/cve/CVE-2023-52499" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/47x: Fix 47x syscall return crash

Eddie reported that newer kernels were crashing during boot on his 476
FSP2 system:

  kernel tried to execute user page (b7ee2000) - exploit attempt? (uid: 0)
  BUG: Unable to handle kernel instruction fetch
  Faulting instruction address: 0xb7ee2000
  Oops: Kernel access of bad area, sig: 11 [#1]
  BE PAGE_SIZE=4K FSP-2
  Modules linked in:
  CPU: 0 PID: 61 Comm: mount Not tainted 6.1.55-d23900f.ppcnf-fsp2 #1
  Hardware name: ibm,fsp2 476fpe 0x7ff520c0 FSP-2
  NIP:  b7ee2000 LR: 8c008000 CTR: 00000000
  REGS: bffebd83 TRAP: 0400   Not tainted (6.1.55-d23900f.ppcnf-fs p2)
  MSR:  00000030 &lt;IR,DR&gt;  CR: 00001000  XER: 20000000
  GPR00: c00110ac bffebe63 bffebe7e bffebe88 8c008000 00001000 00000d12 b7ee2000
  GPR08: 00000033 00000000 00000000 c139df10 48224824 1016c314 10160000 00000000
  GPR16: 10160000 10160000 00000008 00000000 10160000 00000000 10160000 1017f5b0
  GPR24: 1017fa50 1017f4f0 1017fa50 1017f740 1017f630 00000000 00000000 1017f4f0
  NIP [b7ee2000] 0xb7ee2000
  LR [8c008000] 0x8c008000
  Call Trace:
  Instruction dump:
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  ---[ end trace 0000000000000000 ]---

The problem is in ret_from_syscall where the check for
icache_44x_need_flush is done. When the flush is needed the code jumps
out-of-line to do the flush, and then intends to jump back to continue
the syscall return.

However the branch back to label 1b doesn't return to the correct
location, instead branching back just prior to the return to userspace,
causing bogus register values to be used by the rfi.

The breakage was introduced by commit 6f76a01173cc
("powerpc/syscall: implement system call entry/exit logic in C for PPC32") which
inadvertently removed the "1" label and reused it elsewhere.

Fix it by adding named local labels in the correct locations. Note that
the return label needs to be outside the ifdef so that CONFIG_PPC_47x=n
compiles.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52499/">CVE-2023-52499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52499">CVE-2023-52499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220881">SUSE bug 1220881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52500" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command

Tags allocated for OPC_INB_SET_CONTROLLER_CONFIG command need to be freed
when we receive the response.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52501" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not attempt to read past "commit"

When iterating over the ring buffer while the ring buffer is active, the
writer can corrupt the reader. There's barriers to help detect this and
handle it, but that code missed the case where the last event was at the
very end of the page and has only 4 bytes left.

The checks to detect the corruption by the writer to reads needs to see the
length of the event. If the length in the first 4 bytes is zero then the
length is stored in the second 4 bytes. But if the writer is in the process
of updating that code, there's a small window where the length in the first
4 bytes could be zero even though the length is only 4 bytes. That will
cause rb_event_length() to read the next 4 bytes which could happen to be off the
allocated page.

To protect against this, fail immediately if the next event pointer is
less than 8 bytes from the end of the commit (last byte of data), as all
events must be a minimum of 8 bytes anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52502" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: fix races in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn()

Sili Luo reported a race in nfc_llcp_sock_get(), leading to UAF.

Getting a reference on the socket found in a lookup while
holding a lock should happen before releasing the lock.

nfc_llcp_sock_get_sn() has a similar problem.

Finally nfc_llcp_recv_snl() needs to make sure the socket
found by nfc_llcp_sock_from_sn() does not disappear.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220832">SUSE bug 1220832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52503" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix use-after-free vulnerability in amdtee_close_session

There is a potential race condition in amdtee_close_session that may
cause use-after-free in amdtee_open_session. For instance, if a session
has refcount == 1, and one thread tries to free this session via:

    kref_put(&amp;sess-&gt;refcount, destroy_session);

the reference count will get decremented, and the next step would be to
call destroy_session(). However, if in another thread,
amdtee_open_session() is called before destroy_session() has completed
execution, alloc_session() may return 'sess' that will be freed up
later in destroy_session() leading to use-after-free in
amdtee_open_session.

To fix this issue, treat decrement of sess-&gt;refcount and removal of
'sess' from session list in destroy_session() as a critical section, so
that it is executed atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220915">SUSE bug 1220915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52504" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/alternatives: Disable KASAN in apply_alternatives()

Fei has reported that KASAN triggers during apply_alternatives() on
a 5-level paging machine:

	BUG: KASAN: out-of-bounds in rcu_is_watching()
	Read of size 4 at addr ff110003ee6419a0 by task swapper/0/0
	...
	__asan_load4()
	rcu_is_watching()
	trace_hardirqs_on()
	text_poke_early()
	apply_alternatives()
	...

On machines with 5-level paging, cpu_feature_enabled(X86_FEATURE_LA57)
gets patched. It includes KASAN code, where KASAN_SHADOW_START depends on
__VIRTUAL_MASK_SHIFT, which is defined with cpu_feature_enabled().

KASAN gets confused when apply_alternatives() patches the
KASAN_SHADOW_START users. A test patch that makes KASAN_SHADOW_START
static, by replacing __VIRTUAL_MASK_SHIFT with 56, works around the issue.

Fix it for real by disabling KASAN while the kernel is patching alternatives.

[ mingo: updated the changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52505" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52505" ref_url="https://www.suse.com/security/cve/CVE-2023-52505" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: lynx-28g: serialize concurrent phy_set_mode_ext() calls to shared registers

The protocol converter configuration registers PCC8, PCCC, PCCD
(implemented by the driver), as well as others, control protocol
converters from multiple lanes (each represented as a different
struct phy). So, if there are simultaneous calls to phy_set_mode_ext()
to lanes sharing the same PCC register (either for the "old" or for the
"new" protocol), corruption of the values programmed to hardware is
possible, because lynx_28g_rmw() has no locking.

Add a spinlock in the struct lynx_28g_priv shared by all lanes, and take
the global spinlock from the phy_ops :: set_mode() implementation. There
are no other callers which modify PCC registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52505/">CVE-2023-52505 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52505">CVE-2023-52505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220830">SUSE bug 1220830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52506" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52506" ref_url="https://www.suse.com/security/cve/CVE-2023-52506" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Set all reserved memblocks on Node#0 at initialization

After commit 61167ad5fecdea ("mm: pass nid to reserve_bootmem_region()")
we get a panic if DEFERRED_STRUCT_PAGE_INIT is enabled:

[    0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000000000002b82, era == 90000000040e3f28, ra == 90000000040e3f18
[    0.000000] Oops[#1]:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0+ #733
[    0.000000] pc 90000000040e3f28 ra 90000000040e3f18 tp 90000000046f4000 sp 90000000046f7c90
[    0.000000] a0 0000000000000001 a1 0000000000200000 a2 0000000000000040 a3 90000000046f7ca0
[    0.000000] a4 90000000046f7ca4 a5 0000000000000000 a6 90000000046f7c38 a7 0000000000000000
[    0.000000] t0 0000000000000002 t1 9000000004b00ac8 t2 90000000040e3f18 t3 90000000040f0800
[    0.000000] t4 00000000000f0000 t5 80000000ffffe07e t6 0000000000000003 t7 900000047fff5e20
[    0.000000] t8 aaaaaaaaaaaaaaab u0 0000000000000018 s9 0000000000000000 s0 fffffefffe000000
[    0.000000] s1 0000000000000000 s2 0000000000000080 s3 0000000000000040 s4 0000000000000000
[    0.000000] s5 0000000000000000 s6 fffffefffe000000 s7 900000000470b740 s8 9000000004ad4000
[    0.000000]    ra: 90000000040e3f18 reserve_bootmem_region+0xec/0x21c
[    0.000000]   ERA: 90000000040e3f28 reserve_bootmem_region+0xfc/0x21c
[    0.000000]  CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
[    0.000000]  PRMD: 00000000 (PPLV0 -PIE -PWE)
[    0.000000]  EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
[    0.000000]  ECFG: 00070800 (LIE=11 VS=7)
[    0.000000] ESTAT: 00010800 [PIL] (IS=11 ECode=1 EsubCode=0)
[    0.000000]  BADV: 0000000000002b82
[    0.000000]  PRID: 0014d000 (Loongson-64bit, Loongson-3A6000)
[    0.000000] Modules linked in:
[    0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____))
[    0.000000] Stack : 0000000000000000 9000000002eb5430 0000003a00000020 90000000045ccd00
[    0.000000]         900000000470e000 90000000002c1918 0000000000000000 9000000004110780
[    0.000000]         00000000fe6c0000 0000000480000000 9000000004b4e368 9000000004110748
[    0.000000]         0000000000000000 900000000421ca84 9000000004620000 9000000004564970
[    0.000000]         90000000046f7d78 9000000002cc9f70 90000000002c1918 900000000470e000
[    0.000000]         9000000004564970 90000000040bc0e0 90000000046f7d78 0000000000000000
[    0.000000]         0000000000004000 90000000045ccd00 0000000000000000 90000000002c1918
[    0.000000]         90000000002c1900 900000000470b700 9000000004b4df78 9000000004620000
[    0.000000]         90000000046200a8 90000000046200a8 0000000000000000 9000000004218b2c
[    0.000000]         9000000004270008 0000000000000001 0000000000000000 90000000045ccd00
[    0.000000]         ...
[    0.000000] Call Trace:
[    0.000000] [&lt;90000000040e3f28&gt;] reserve_bootmem_region+0xfc/0x21c
[    0.000000] [&lt;900000000421ca84&gt;] memblock_free_all+0x114/0x350
[    0.000000] [&lt;9000000004218b2c&gt;] mm_core_init+0x138/0x3cc
[    0.000000] [&lt;9000000004200e38&gt;] start_kernel+0x488/0x7a4
[    0.000000] [&lt;90000000040df0d8&gt;] kernel_entry+0xd8/0xdc
[    0.000000]
[    0.000000] Code: 02eb21ad  00410f4c  380c31ac &lt;262b818d&gt; 6800b70d  02c1c196  0015001c  57fe4bb1  260002cd

The reason is early memblock_reserve() in memblock_init() set node id to
MAX_NUMNODES, making NODE_DATA(nid) a NULL dereference in the call chain
reserve_bootmem_region() -&gt; init_reserved_page(). After memblock_init(),
those late calls of memblock_reserve() operate on subregions of memblock
.memory regions. As a result, these reserved regions will be set to the
correct node at the first iteration of memmap_init_reserved_pages().

So set all reserved memblocks on Node#0 at initialization can avoid this
panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52506/">CVE-2023-52506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52506">CVE-2023-52506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220867">SUSE bug 1220867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52507" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: assert requested protocol is valid

The protocol is used in a bit mask to determine if the protocol is
supported. Assert the provided protocol is less than the maximum
defined so it doesn't potentially perform a shift-out-of-bounds and
provide a clearer error for undefined protocols vs unsupported ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52508" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid()

The nvme_fc_fcp_op structure describing an AEN operation is initialized with a
null request structure pointer. An FC LLDD may make a call to
nvme_fc_io_getuuid passing a pointer to an nvmefc_fcp_req for an AEN operation.

Add validation of the request structure pointer before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52509" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ravb: Fix use-after-free issue in ravb_tx_timeout_work()

The ravb_stop() should call cancel_work_sync(). Otherwise,
ravb_tx_timeout_work() is possible to use the freed priv after
ravb_remove() was called like below:

CPU0			CPU1
			ravb_tx_timeout()
ravb_remove()
unregister_netdev()
free_netdev(ndev)
// free priv
			ravb_tx_timeout_work()
			// use priv

unregister_netdev() will call .ndo_stop() so that ravb_stop() is
called. And, after phy_stop() is called, netif_carrier_off()
is also called. So that .ndo_tx_timeout() will not be called
after phy_stop().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223290">SUSE bug 1223290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52510" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ieee802154: ca8210: Fix a potential UAF in ca8210_probe

If of_clk_add_provider() fails in ca8210_register_ext_clock(),
it calls clk_unregister() to release priv-&gt;clk and returns an
error. However, the caller ca8210_probe() then calls ca8210_remove(),
where priv-&gt;clk is freed again in ca8210_unregister_ext_clock(). In
this case, a use-after-free may happen in the second time we call
clk_unregister().

Fix this by removing the first clk_unregister(). Also, priv-&gt;clk could
be an error code on failure of clk_register_fixed_rate(). Use
IS_ERR_OR_NULL to catch this case in ca8210_unregister_ext_clock().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52511</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52511" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: sun6i: reduce DMA RX transfer width to single byte

Through empirical testing it has been determined that sometimes RX SPI
transfers with DMA enabled return corrupted data. This is down to single
or even multiple bytes lost during DMA transfer from SPI peripheral to
memory. It seems the RX FIFO within the SPI peripheral can become
confused when performing bus read accesses wider than a single byte to it
during an active SPI transfer.

This patch reduces the width of individual DMA read accesses to the
RX FIFO to a single byte to mitigate that issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52512</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52512" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52512" ref_url="https://www.suse.com/security/cve/CVE-2023-52512" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: nuvoton: wpcm450: fix out of bounds write

Write into 'pctrl-&gt;gpio_bank' happens before the check for GPIO index
validity, so out of bounds write may happen.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52512/">CVE-2023-52512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52512">CVE-2023-52512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221021">SUSE bug 1221021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52513</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix connection failure handling

In case immediate MPA request processing fails, the newly
created endpoint unlinks the listening endpoint and is
ready to be dropped. This special case was not handled
correctly by the code handling the later TCP socket close,
causing a NULL dereference crash in siw_cm_work_handler()
when dereferencing a NULL listener. We now also cancel
the useless MPA timeout, if immediate MPA request
processing fails.

This patch furthermore simplifies MPA processing in general:
Scheduling a useless TCP socket read in sk_data_ready() upcall
is now surpressed, if the socket is already moved out of
TCP_ESTABLISHED state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52515</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52515" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srp: Do not call scsi_done() from srp_abort()

After scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler
callback, it performs one of the following actions:
* Call scsi_queue_insert().
* Call scsi_finish_command().
* Call scsi_eh_scmd_add().
Hence, SCSI abort handlers must not call scsi_done(). Otherwise all
the above actions would trigger a use-after-free. Hence remove the
scsi_done() call from srp_abort(). Keep the srp_free_req() call
before returning SUCCESS because we may not see the command again if
SUCCESS is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52516</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52516" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52516" ref_url="https://www.suse.com/security/cve/CVE-2023-52516" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-debug: don't call __dma_entry_alloc_check_leak() under free_entries_lock

__dma_entry_alloc_check_leak() calls into printk -&gt; serial console
output (qcom geni) and grabs port-&gt;lock under free_entries_lock
spin lock, which is a reverse locking dependency chain as qcom_geni
IRQ handler can call into dma-debug code and grab free_entries_lock
under port-&gt;lock.

Move __dma_entry_alloc_check_leak() call out of free_entries_lock
scope so that we don't acquire serial console's port-&gt;lock under it.

Trimmed-down lockdep splat:

 The existing dependency chain (in reverse order) is:

               -&gt; #2 (free_entries_lock){-.-.}-{2:2}:
        _raw_spin_lock_irqsave+0x60/0x80
        dma_entry_alloc+0x38/0x110
        debug_dma_map_page+0x60/0xf8
        dma_map_page_attrs+0x1e0/0x230
        dma_map_single_attrs.constprop.0+0x6c/0xc8
        geni_se_rx_dma_prep+0x40/0xcc
        qcom_geni_serial_isr+0x310/0x510
        __handle_irq_event_percpu+0x110/0x244
        handle_irq_event_percpu+0x20/0x54
        handle_irq_event+0x50/0x88
        handle_fasteoi_irq+0xa4/0xcc
        handle_irq_desc+0x28/0x40
        generic_handle_domain_irq+0x24/0x30
        gic_handle_irq+0xc4/0x148
        do_interrupt_handler+0xa4/0xb0
        el1_interrupt+0x34/0x64
        el1h_64_irq_handler+0x18/0x24
        el1h_64_irq+0x64/0x68
        arch_local_irq_enable+0x4/0x8
        ____do_softirq+0x18/0x24
        ...

               -&gt; #1 (&amp;port_lock_key){-.-.}-{2:2}:
        _raw_spin_lock_irqsave+0x60/0x80
        qcom_geni_serial_console_write+0x184/0x1dc
        console_flush_all+0x344/0x454
        console_unlock+0x94/0xf0
        vprintk_emit+0x238/0x24c
        vprintk_default+0x3c/0x48
        vprintk+0xb4/0xbc
        _printk+0x68/0x90
        register_console+0x230/0x38c
        uart_add_one_port+0x338/0x494
        qcom_geni_serial_probe+0x390/0x424
        platform_probe+0x70/0xc0
        really_probe+0x148/0x280
        __driver_probe_device+0xfc/0x114
        driver_probe_device+0x44/0x100
        __device_attach_driver+0x64/0xdc
        bus_for_each_drv+0xb0/0xd8
        __device_attach+0xe4/0x140
        device_initial_probe+0x1c/0x28
        bus_probe_device+0x44/0xb0
        device_add+0x538/0x668
        of_device_add+0x44/0x50
        of_platform_device_create_pdata+0x94/0xc8
        of_platform_bus_create+0x270/0x304
        of_platform_populate+0xac/0xc4
        devm_of_platform_populate+0x60/0xac
        geni_se_probe+0x154/0x160
        platform_probe+0x70/0xc0
        ...

               -&gt; #0 (console_owner){-...}-{0:0}:
        __lock_acquire+0xdf8/0x109c
        lock_acquire+0x234/0x284
        console_flush_all+0x330/0x454
        console_unlock+0x94/0xf0
        vprintk_emit+0x238/0x24c
        vprintk_default+0x3c/0x48
        vprintk+0xb4/0xbc
        _printk+0x68/0x90
        dma_entry_alloc+0xb4/0x110
        debug_dma_map_sg+0xdc/0x2f8
        __dma_map_sg_attrs+0xac/0xe4
        dma_map_sgtable+0x30/0x4c
        get_pages+0x1d4/0x1e4 [msm]
        msm_gem_pin_pages_locked+0x38/0xac [msm]
        msm_gem_pin_vma_locked+0x58/0x88 [msm]
        msm_ioctl_gem_submit+0xde4/0x13ac [msm]
        drm_ioctl_kernel+0xe0/0x15c
        drm_ioctl+0x2e8/0x3f4
        vfs_ioctl+0x30/0x50
        ...

 Chain exists of:
   console_owner --&gt; &amp;port_lock_key --&gt; free_entries_lock

  Possible unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
   lock(free_entries_lock);
                                lock(&amp;port_lock_key);
                                lock(free_entries_lock);
   lock(console_owner);

                *** DEADLOCK ***

 Call trace:
  dump_backtrace+0xb4/0xf0
  show_stack+0x20/0x30
  dump_stack_lvl+0x60/0x84
  dump_stack+0x18/0x24
  print_circular_bug+0x1cc/0x234
  check_noncircular+0x78/0xac
  __lock_acquire+0xdf8/0x109c
  lock_acquire+0x234/0x284
  console_flush_all+0x330/0x454
  consol
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52516/">CVE-2023-52516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52516">CVE-2023-52516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221035">SUSE bug 1221035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52517</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain

Previously the transfer complete IRQ immediately drained to RX FIFO to
read any data remaining in FIFO to the RX buffer. This behaviour is
correct when dealing with SPI in interrupt mode. However in DMA mode the
transfer complete interrupt still fires as soon as all bytes to be
transferred have been stored in the FIFO. At that point data in the FIFO
still needs to be picked up by the DMA engine. Thus the drain procedure
and DMA engine end up racing to read from RX FIFO, corrupting any data
read. Additionally the RX buffer pointer is never adjusted according to
DMA progress in DMA mode, thus calling the RX FIFO drain procedure in DMA
mode is a bug.
Fix corruptions in DMA RX mode by draining RX FIFO only in interrupt mode.
Also wait for completion of RX DMA when in DMA mode before returning to
ensure all data has been copied to the supplied memory buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52518</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52518" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_codec: Fix leaking content of local_codecs

The following memory leak can be observed when the controller supports
codecs which are stored in local_codecs list but the elements are never
freed:

unreferenced object 0xffff88800221d840 (size 32):
  comm "kworker/u3:0", pid 36, jiffies 4294898739 (age 127.060s)
  hex dump (first 32 bytes):
    f8 d3 02 03 80 88 ff ff 80 d8 21 02 80 88 ff ff  ..........!.....
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffffb324f557&gt;] __kmalloc+0x47/0x120
    [&lt;ffffffffb39ef37d&gt;] hci_codec_list_add.isra.0+0x2d/0x160
    [&lt;ffffffffb39ef643&gt;] hci_read_codec_capabilities+0x183/0x270
    [&lt;ffffffffb39ef9ab&gt;] hci_read_supported_codecs+0x1bb/0x2d0
    [&lt;ffffffffb39f162e&gt;] hci_read_local_codecs_sync+0x3e/0x60
    [&lt;ffffffffb39ff1b3&gt;] hci_dev_open_sync+0x943/0x11e0
    [&lt;ffffffffb396d55d&gt;] hci_power_on+0x10d/0x3f0
    [&lt;ffffffffb30c99b4&gt;] process_one_work+0x404/0x800
    [&lt;ffffffffb30ca134&gt;] worker_thread+0x374/0x670
    [&lt;ffffffffb30d9108&gt;] kthread+0x188/0x1c0
    [&lt;ffffffffb304db6b&gt;] ret_from_fork+0x2b/0x50
    [&lt;ffffffffb300206a&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221056">SUSE bug 1221056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52519</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit

The EHL (Elkhart Lake) based platforms provide a OOB (Out of band)
service, which allows to wakup device when the system is in S5 (Soft-Off
state). This OOB service can be enabled/disabled from BIOS settings. When
enabled, the ISH device gets PME wake capability. To enable PME wakeup,
driver also needs to enable ACPI GPE bit.

On resume, BIOS will clear the wakeup bit. So driver need to re-enable it
in resume function to keep the next wakeup capability. But this BIOS
clearing of wakeup bit doesn't decrement internal OS GPE reference count,
so this reenabling on every resume will cause reference count to overflow.

So first disable and reenable ACPI GPE bit using acpi_disable_gpe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52520</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52520" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix reference leak

If a duplicate attribute is found using kset_find_obj(), a reference
to that attribute is returned which needs to be disposed accordingly
using kobject_put(). Move the setting name validation into a separate
function to allow for this change without having to duplicate the
cleanup code for this setting.
As a side note, a very similar bug was fixed in
commit 7295a996fdab ("platform/x86: dell-sysman: Fix reference leak"),
so it seems that the bug was copied from that driver.

Compile-tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52521</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52521" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52521" ref_url="https://www.suse.com/security/cve/CVE-2023-52521" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52521/">CVE-2023-52521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52521">CVE-2023-52521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220923">SUSE bug 1220923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52522</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52522" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52522" ref_url="https://www.suse.com/security/cve/CVE-2023-52522" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix possible store tearing in neigh_periodic_work()

While looking at a related syzbot report involving neigh_periodic_work(),
I found that I forgot to add an annotation when deleting an
RCU protected item from a list.

Readers use rcu_deference(*np), we need to use either
rcu_assign_pointer() or WRITE_ONCE() on writer side
to prevent store tearing.

I use rcu_assign_pointer() to have lockdep support,
this was the choice made in neigh_flush_dev().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52522/">CVE-2023-52522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220924">SUSE bug 1220924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52523</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52523" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets

With a SOCKMAP/SOCKHASH map and an sk_msg program user can steer messages
sent from one TCP socket (s1) to actually egress from another TCP
socket (s2):

tcp_bpf_sendmsg(s1)		// = sk_prot-&gt;sendmsg
  tcp_bpf_send_verdict(s1)	// __SK_REDIRECT case
    tcp_bpf_sendmsg_redir(s2)
      tcp_bpf_push_locked(s2)
	tcp_bpf_push(s2)
	  tcp_rate_check_app_limited(s2) // expects tcp_sock
	  tcp_sendmsg_locked(s2)	 // ditto

There is a hard-coded assumption in the call-chain, that the egress
socket (s2) is a TCP socket.

However in commit 122e6c79efe1 ("sock_map: Update sock type checks for
UDP") we have enabled redirects to non-TCP sockets. This was done for the
sake of BPF sk_skb programs. There was no indention to support sk_msg
send-to-egress use case.

As a result, attempts to send-to-egress through a non-TCP socket lead to a
crash due to invalid downcast from sock to tcp_sock:

 BUG: kernel NULL pointer dereference, address: 000000000000002f
 ...
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x60/0x70
  ? __die+0x1f/0x70
  ? page_fault_oops+0x80/0x160
  ? do_user_addr_fault+0x2d7/0x800
  ? rcu_is_watching+0x11/0x50
  ? exc_page_fault+0x70/0x1c0
  ? asm_exc_page_fault+0x27/0x30
  ? tcp_tso_segs+0x14/0xa0
  tcp_write_xmit+0x67/0xce0
  __tcp_push_pending_frames+0x32/0xf0
  tcp_push+0x107/0x140
  tcp_sendmsg_locked+0x99f/0xbb0
  tcp_bpf_push+0x19d/0x3a0
  tcp_bpf_sendmsg_redir+0x55/0xd0
  tcp_bpf_send_verdict+0x407/0x550
  tcp_bpf_sendmsg+0x1a1/0x390
  inet_sendmsg+0x6a/0x70
  sock_sendmsg+0x9d/0xc0
  ? sockfd_lookup_light+0x12/0x80
  __sys_sendto+0x10e/0x160
  ? syscall_enter_from_user_mode+0x20/0x60
  ? __this_cpu_preempt_check+0x13/0x20
  ? lockdep_hardirqs_on+0x82/0x110
  __x64_sys_sendto+0x1f/0x30
  do_syscall_64+0x38/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Reject selecting a non-TCP sockets as redirect target from a BPF sk_msg
program to prevent the crash. When attempted, user will receive an EACCES
error from send/sendto/sendmsg() syscall.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52524</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52524" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: llcp: Add lock when modifying device list

The device list needs its associated lock held when modifying it, or the
list could become corrupted, as syzbot discovered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52525</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52525" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet

Only skip the code path trying to access the rfc1042 headers when the
buffer is too small, so the driver can still process packets without
rfc1042 headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52526</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52526" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52526" ref_url="https://www.suse.com/security/cve/CVE-2023-52526" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix memory leak of LZMA global compressed deduplication

When stressing microLZMA EROFS images with the new global compressed
deduplication feature enabled (`-Ededupe`), I found some short-lived
temporary pages weren't properly released, which could slowly cause
unexpected OOMs hours later.

Let's fix it now (LZ4 and DEFLATE don't have this issue.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52526/">CVE-2023-52526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52526">CVE-2023-52526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220897">SUSE bug 1220897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52527</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52527" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52527" ref_url="https://www.suse.com/security/cve/CVE-2023-52527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()

Including the transhdrlen in length is a problem when the packet is
partially filled (e.g. something like send(MSG_MORE) happened previously)
when appending to an IPv4 or IPv6 packet as we don't want to repeat the
transport header or account for it twice.  This can happen under some
circumstances, such as splicing into an L2TP socket.

The symptom observed is a warning in __ip6_append_data():

    WARNING: CPU: 1 PID: 5042 at net/ipv6/ip6_output.c:1800 __ip6_append_data.isra.0+0x1be8/0x47f0 net/ipv6/ip6_output.c:1800

that occurs when MSG_SPLICE_PAGES is used to append more data to an already
partially occupied skbuff.  The warning occurs when 'copy' is larger than
the amount of data in the message iterator.  This is because the requested
length includes the transport header length when it shouldn't.  This can be
triggered by, for example:

        sfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);
        bind(sfd, ...); // ::1
        connect(sfd, ...); // ::1 port 7
        send(sfd, buffer, 4100, MSG_MORE);
        sendfile(sfd, dfd, NULL, 1024);

Fix this by only adding transhdrlen into the length if the write queue is
empty in l2tp_ip6_sendmsg(), analogously to how UDP does things.

l2tp_ip_sendmsg() looks like it won't suffer from this problem as it builds
the UDP packet itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52527/">CVE-2023-52527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52527">CVE-2023-52527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220928">SUSE bug 1220928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52528</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52528" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg

syzbot reported the following uninit-value access issue:

=====================================================
BUG: KMSAN: uninit-value in smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]
BUG: KMSAN: uninit-value in smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482
CPU: 0 PID: 8696 Comm: kworker/0:3 Not tainted 5.8.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: usb_hub_wq hub_event
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x21c/0x280 lib/dump_stack.c:118
 kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:121
 __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:975 [inline]
 smsc75xx_bind+0x5c9/0x11e0 drivers/net/usb/smsc75xx.c:1482
 usbnet_probe+0x1152/0x3f90 drivers/net/usb/usbnet.c:1737
 usb_probe_interface+0xece/0x1550 drivers/usb/core/driver.c:374
 really_probe+0xf20/0x20b0 drivers/base/dd.c:529
 driver_probe_device+0x293/0x390 drivers/base/dd.c:701
 __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807
 bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431
 __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873
 device_initial_probe+0x4a/0x60 drivers/base/dd.c:920
 bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491
 device_add+0x3b0e/0x40d0 drivers/base/core.c:2680
 usb_set_configuration+0x380f/0x3f10 drivers/usb/core/message.c:2032
 usb_generic_driver_probe+0x138/0x300 drivers/usb/core/generic.c:241
 usb_probe_device+0x311/0x490 drivers/usb/core/driver.c:272
 really_probe+0xf20/0x20b0 drivers/base/dd.c:529
 driver_probe_device+0x293/0x390 drivers/base/dd.c:701
 __device_attach_driver+0x63f/0x830 drivers/base/dd.c:807
 bus_for_each_drv+0x2ca/0x3f0 drivers/base/bus.c:431
 __device_attach+0x4e2/0x7f0 drivers/base/dd.c:873
 device_initial_probe+0x4a/0x60 drivers/base/dd.c:920
 bus_probe_device+0x177/0x3d0 drivers/base/bus.c:491
 device_add+0x3b0e/0x40d0 drivers/base/core.c:2680
 usb_new_device+0x1bd4/0x2a30 drivers/usb/core/hub.c:2554
 hub_port_connect drivers/usb/core/hub.c:5208 [inline]
 hub_port_connect_change drivers/usb/core/hub.c:5348 [inline]
 port_event drivers/usb/core/hub.c:5494 [inline]
 hub_event+0x5e7b/0x8a70 drivers/usb/core/hub.c:5576
 process_one_work+0x1688/0x2140 kernel/workqueue.c:2269
 worker_thread+0x10bc/0x2730 kernel/workqueue.c:2415
 kthread+0x551/0x590 kernel/kthread.c:292
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:293

Local variable ----buf.i87@smsc75xx_bind created at:
 __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]
 smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482
 __smsc75xx_read_reg drivers/net/usb/smsc75xx.c:83 [inline]
 smsc75xx_wait_ready drivers/net/usb/smsc75xx.c:968 [inline]
 smsc75xx_bind+0x485/0x11e0 drivers/net/usb/smsc75xx.c:1482

This issue is caused because usbnet_read_cmd() reads less bytes than requested
(zero byte in the reproducer). In this case, 'buf' is not properly filled.

This patch fixes the issue by returning -ENODATA if usbnet_read_cmd() reads
less bytes than requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52529</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52529" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: sony: Fix a potential memory leak in sony_probe()

If an error occurs after a successful usb_alloc_urb() call, usb_free_urb()
should be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52530</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52530" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix potential key use-after-free

When ieee80211_key_link() is called by ieee80211_gtk_rekey_add()
but returns 0 due to KRACK protection (identical key reinstall),
ieee80211_gtk_rekey_add() will still return a pointer into the
key, in a potential use-after-free. This normally doesn't happen
since it's only called by iwlwifi in case of WoWLAN rekey offload
which has its own KRACK protection, but still better to fix, do
that by returning an error code and converting that to success on
the cfg80211 boundary only, leaving the error for bad callers of
ieee80211_gtk_rekey_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix a memory corruption issue

A few lines above, space is kzalloc()'ed for:
	sizeof(struct iwl_nvm_data) +
	sizeof(struct ieee80211_channel) +
	sizeof(struct ieee80211_rate)

'mvm-&gt;nvm_data' is a 'struct iwl_nvm_data', so it is fine.

At the end of this structure, there is the 'channels' flex array.
Each element is of type 'struct ieee80211_channel'.
So only 1 element is allocated in this array.

When doing:
  mvm-&gt;nvm_data-&gt;bands[0].channels = mvm-&gt;nvm_data-&gt;channels;
We point at the first element of the 'channels' flex array.
So this is fine.

However, when doing:
  mvm-&gt;nvm_data-&gt;bands[0].bitrates =
			(void *)((u8 *)mvm-&gt;nvm_data-&gt;channels + 1);
because of the "(u8 *)" cast, we add only 1 to the address of the beginning
of the flex array.

It is likely that we want point at the 'struct ieee80211_rate' allocated
just after.

Remove the spurious casting so that the pointer arithmetic works as
expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52532" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix TX CQE error handling

For an unknown TX CQE error type (probably from a newer hardware),
still free the SKB, update the queue tail, etc., otherwise the
accounting will be wrong.

Also, TX errors can be triggered by injecting corrupted packets, so
replace the WARN_ONCE to ratelimited error logging.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Avoid memory allocation in iommu_suspend()

The iommu_suspend() syscore suspend callback is invoked with IRQ disabled.
Allocating memory with the GFP_KERNEL flag may re-enable IRQs during
the suspend callback, which can cause intermittent suspend/hibernation
problems with the following kernel traces:

Calling iommu_suspend+0x0/0x1d0
------------[ cut here ]------------
WARNING: CPU: 0 PID: 15 at kernel/time/timekeeping.c:868 ktime_get+0x9b/0xb0
...
CPU: 0 PID: 15 Comm: rcu_preempt Tainted: G     U      E      6.3-intel #r1
RIP: 0010:ktime_get+0x9b/0xb0
...
Call Trace:
 &lt;IRQ&gt;
 tick_sched_timer+0x22/0x90
 ? __pfx_tick_sched_timer+0x10/0x10
 __hrtimer_run_queues+0x111/0x2b0
 hrtimer_interrupt+0xfa/0x230
 __sysvec_apic_timer_interrupt+0x63/0x140
 sysvec_apic_timer_interrupt+0x7b/0xa0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1f/0x30
...
------------[ cut here ]------------
Interrupts enabled after iommu_suspend+0x0/0x1d0
WARNING: CPU: 0 PID: 27420 at drivers/base/syscore.c:68 syscore_suspend+0x147/0x270
CPU: 0 PID: 27420 Comm: rtcwake Tainted: G     U  W   E      6.3-intel #r1
RIP: 0010:syscore_suspend+0x147/0x270
...
Call Trace:
 &lt;TASK&gt;
 hibernation_snapshot+0x25b/0x670
 hibernate+0xcd/0x390
 state_store+0xcf/0xe0
 kobj_attr_store+0x13/0x30
 sysfs_kf_write+0x3f/0x50
 kernfs_fop_write_iter+0x128/0x200
 vfs_write+0x1fd/0x3c0
 ksys_write+0x6f/0xf0
 __x64_sys_write+0x1d/0x30
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

Given that only 4 words memory is needed, avoid the memory allocation in
iommu_suspend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52560" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52560" ref_url="https://www.suse.com/security/cve/CVE-2023-52560" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/vaddr-test: fix memory leak in damon_do_test_apply_three_regions()

When CONFIG_DAMON_VADDR_KUNIT_TEST=y and making CONFIG_DEBUG_KMEMLEAK=y
and CONFIG_DEBUG_KMEMLEAK_AUTO_SCAN=y, the below memory leak is detected.

Since commit 9f86d624292c ("mm/damon/vaddr-test: remove unnecessary
variables"), the damon_destroy_ctx() is removed, but still call
damon_new_target() and damon_new_region(), the damon_region which is
allocated by kmem_cache_alloc() in damon_new_region() and the damon_target
which is allocated by kmalloc in damon_new_target() are not freed.  And
the damon_region which is allocated in damon_new_region() in
damon_set_regions() is also not freed.

So use damon_destroy_target to free all the damon_regions and damon_target.

    unreferenced object 0xffff888107c9a940 (size 64):
      comm "kunit_try_catch", pid 1069, jiffies 4294670592 (age 732.761s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b  ............kkkk
        60 c7 9c 07 81 88 ff ff f8 cb 9c 07 81 88 ff ff  `...............
      backtrace:
        [&lt;ffffffff817e0167&gt;] kmalloc_trace+0x27/0xa0
        [&lt;ffffffff819c11cf&gt;] damon_new_target+0x3f/0x1b0
        [&lt;ffffffff819c7d55&gt;] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0
        [&lt;ffffffff819c82be&gt;] damon_test_apply_three_regions1+0x21e/0x260
        [&lt;ffffffff829fce6a&gt;] kunit_generic_run_threadfn_adapter+0x4a/0x90
        [&lt;ffffffff81237cf6&gt;] kthread+0x2b6/0x380
        [&lt;ffffffff81097add&gt;] ret_from_fork+0x2d/0x70
        [&lt;ffffffff81003791&gt;] ret_from_fork_asm+0x11/0x20
    unreferenced object 0xffff8881079cc740 (size 56):
      comm "kunit_try_catch", pid 1069, jiffies 4294670592 (age 732.761s)
      hex dump (first 32 bytes):
        05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00  ................
        6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b  kkkkkkkk....kkkk
      backtrace:
        [&lt;ffffffff819bc492&gt;] damon_new_region+0x22/0x1c0
        [&lt;ffffffff819c7d91&gt;] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0
        [&lt;ffffffff819c82be&gt;] damon_test_apply_three_regions1+0x21e/0x260
        [&lt;ffffffff829fce6a&gt;] kunit_generic_run_threadfn_adapter+0x4a/0x90
        [&lt;ffffffff81237cf6&gt;] kthread+0x2b6/0x380
        [&lt;ffffffff81097add&gt;] ret_from_fork+0x2d/0x70
        [&lt;ffffffff81003791&gt;] ret_from_fork_asm+0x11/0x20
    unreferenced object 0xffff888107c9ac40 (size 64):
      comm "kunit_try_catch", pid 1071, jiffies 4294670595 (age 732.843s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 06 00 00 00 6b 6b 6b 6b  ............kkkk
        a0 cc 9c 07 81 88 ff ff 78 a1 76 07 81 88 ff ff  ........x.v.....
      backtrace:
        [&lt;ffffffff817e0167&gt;] kmalloc_trace+0x27/0xa0
        [&lt;ffffffff819c11cf&gt;] damon_new_target+0x3f/0x1b0
        [&lt;ffffffff819c7d55&gt;] damon_do_test_apply_three_regions.constprop.0+0x95/0x3e0
        [&lt;ffffffff819c851e&gt;] damon_test_apply_three_regions2+0x21e/0x260
        [&lt;ffffffff829fce6a&gt;] kunit_generic_run_threadfn_adapter+0x4a/0x90
        [&lt;ffffffff81237cf6&gt;] kthread+0x2b6/0x380
        [&lt;ffffffff81097add&gt;] ret_from_fork+0x2d/0x70
        [&lt;ffffffff81003791&gt;] ret_from_fork_asm+0x11/0x20
    unreferenced object 0xffff8881079ccc80 (size 56):
      comm "kunit_try_catch", pid 1071, jiffies 4294670595 (age 732.843s)
      hex dump (first 32 bytes):
        05 00 00 00 00 00 00 00 14 00 00 00 00 00 00 00  ................
        6b 6b 6b 6b 6b 6b 6b 6b 00 00 00 00 6b 6b 6b 6b  kkkkkkkk....kkkk
      backtrace:
        [&lt;ffffffff819bc492&gt;] damon_new_region+0x22/0x1c0
        [&lt;ffffffff819c7d91&gt;] damon_do_test_apply_three_regions.constprop.0+0xd1/0x3e0
        [&lt;ffffffff819c851e&gt;] damon_test_apply_three_regions2+0x21e/0x260
        [&lt;ffffffff829fce6a&gt;] kunit_generic_run_threadfn_adapter+0x4a/0x90
        [&lt;ffffffff81237cf6&gt;] kthread+0x2b6/0x380
        [&lt;ffffffff81097add&gt;] ret_from_fork+0x2d/0x70
        [&lt;ffff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52560/">CVE-2023-52560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52560">CVE-2023-52560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220934">SUSE bug 1220934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52561" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: qcom: sdm845-db845c: Mark cont splash memory region as reserved

Adding a reserved memory region for the framebuffer memory
(the splash memory region set up by the bootloader).

It fixes a kernel panic (arm-smmu: Unhandled context fault
at this particular memory region) reported on DB845c running
v5.10.y.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220935">SUSE bug 1220935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52562" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52562" ref_url="https://www.suse.com/security/cve/CVE-2023-52562" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slab_common: fix slab_caches list corruption after kmem_cache_destroy()

After the commit in Fixes:, if a module that created a slab cache does not
release all of its allocated objects before destroying the cache (at rmmod
time), we might end up releasing the kmem_cache object without removing it
from the slab_caches list thus corrupting the list as kmem_cache_destroy()
ignores the return value from shutdown_cache(), which in turn never removes
the kmem_cache object from slabs_list in case __kmem_cache_shutdown() fails
to release all of the cache's slabs.

This is easily observable on a kernel built with CONFIG_DEBUG_LIST=y
as after that ill release the system will immediately trip on list_add,
or list_del, assertions similar to the one shown below as soon as another
kmem_cache gets created, or destroyed:

  [ 1041.213632] list_del corruption. next-&gt;prev should be ffff89f596fb5768, but was 52f1e5016aeee75d. (next=ffff89f595a1b268)
  [ 1041.219165] ------------[ cut here ]------------
  [ 1041.221517] kernel BUG at lib/list_debug.c:62!
  [ 1041.223452] invalid opcode: 0000 [#1] PREEMPT SMP PTI
  [ 1041.225408] CPU: 2 PID: 1852 Comm: rmmod Kdump: loaded Tainted: G    B   W  OE      6.5.0 #15
  [ 1041.228244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc37 05/24/2023
  [ 1041.231212] RIP: 0010:__list_del_entry_valid+0xae/0xb0

Another quick way to trigger this issue, in a kernel with CONFIG_SLUB=y,
is to set slub_debug to poison the released objects and then just run
cat /proc/slabinfo after removing the module that leaks slab objects,
in which case the kernel will panic:

  [   50.954843] general protection fault, probably for non-canonical address 0xa56b6b6b6b6b6b8b: 0000 [#1] PREEMPT SMP PTI
  [   50.961545] CPU: 2 PID: 1495 Comm: cat Kdump: loaded Tainted: G    B   W  OE      6.5.0 #15
  [   50.966808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc37 05/24/2023
  [   50.972663] RIP: 0010:get_slabinfo+0x42/0xf0

This patch fixes this issue by properly checking shutdown_cache()'s
return value before taking the kmem_cache_release() branch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52562/">CVE-2023-52562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52562">CVE-2023-52562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220936">SUSE bug 1220936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52563" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/meson: fix memory leak on -&gt;hpd_notify callback

The EDID returned by drm_bridge_get_edid() needs to be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220937">SUSE bug 1220937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52564" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "tty: n_gsm: fix UAF in gsm_cleanup_mux"

This reverts commit 9b9c8195f3f0d74a826077fc1c01b9ee74907239.

The commit above is reverted as it did not solve the original issue.

gsm_cleanup_mux() tries to free up the virtual ttys by calling
gsm_dlci_release() for each available DLCI. There, dlci_put() is called to
decrease the reference counter for the DLCI via tty_port_put() which
finally calls gsm_dlci_free(). This already clears the pointer which is
being checked in gsm_cleanup_mux() before calling gsm_dlci_release().
Therefore, it is not necessary to clear this pointer in gsm_cleanup_mux()
as done in the reverted commit. The commit introduces a null pointer
dereference:
 &lt;TASK&gt;
 ? __die+0x1f/0x70
 ? page_fault_oops+0x156/0x420
 ? search_exception_tables+0x37/0x50
 ? fixup_exception+0x21/0x310
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? tty_port_put+0x19/0xa0
 gsmtty_cleanup+0x29/0x80 [n_gsm]
 release_one_tty+0x37/0xe0
 process_one_work+0x1e6/0x3e0
 worker_thread+0x4c/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe1/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2f/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

The actual issue is that nothing guards dlci_put() from being called
multiple times while the tty driver was triggered but did not yet finished
calling gsm_dlci_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52565" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52565" ref_url="https://www.suse.com/security/cve/CVE-2023-52565" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix OOB read

If the index provided by the user is bigger than the mask size, we might do
an out of bound read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52565/">CVE-2023-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52565">CVE-2023-52565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220939">SUSE bug 1220939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52566" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential use after free in nilfs_gccache_submit_read_data()

In nilfs_gccache_submit_read_data(), brelse(bh) is called to drop the
reference count of bh when the call to nilfs_dat_translate() fails.  If
the reference count hits 0 and its owner page gets unlocked, bh may be
freed.  However, bh-&gt;b_page is dereferenced to put the page after that,
which may result in a use-after-free bug.  This patch moves the release
operation after unlocking and putting the page.

NOTE: The function in question is only called in GC, and in combination
with current userland tools, address translation using DAT does not occur
in that function, so the code path that causes this issue will not be
executed.  However, it is possible to run that code path by intentionally
modifying the userland GC library or by calling the GC ioctl directly.

[konishi.ryusuke@gmail.com: NOTE added to the commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250_port: Check IRQ data before use

In case the leaf driver wants to use IRQ polling (irq = 0) and
IIR register shows that an interrupt happened in the 8250 hardware
the IRQ data can be NULL. In such a case we need to skip the wake
event as we came to this path from the timer interrupt and quite
likely system is already awake.

Without this fix we have got an Oops:

    serial8250: ttyS0 at I/O 0x3f8 (irq = 0, base_baud = 115200) is a 16550A
    ...
    BUG: kernel NULL pointer dereference, address: 0000000000000010
    RIP: 0010:serial8250_handle_irq+0x7c/0x240
    Call Trace:
     ? serial8250_handle_irq+0x7c/0x240
     ? __pfx_serial8250_timeout+0x10/0x10
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52568" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52568" ref_url="https://www.suse.com/security/cve/CVE-2023-52568" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race

The SGX EPC reclaimer (ksgxd) may reclaim the SECS EPC page for an
enclave and set secs.epc_page to NULL. The SECS page is used for EAUG
and ELDU in the SGX page fault handler. However, the NULL check for
secs.epc_page is only done for ELDU, not EAUG before being used.

Fix this by doing the same NULL check and reloading of the SECS page as
needed for both EAUG and ELDU.

The SECS page holds global enclave metadata. It can only be reclaimed
when there are no other enclave pages remaining. At that point,
virtually nothing can be done with the enclave until the SECS page is
paged back in.

An enclave can not run nor generate page faults without a resident SECS
page. But it is still possible for a #PF for a non-SECS page to race
with paging out the SECS page: when the last resident non-SECS page A
triggers a #PF in a non-resident page B, and then page A and the SECS
both are paged out before the #PF on B is handled.

Hitting this bug requires that race triggered with a #PF for EAUG.
Following is a trace when it happens.

BUG: kernel NULL pointer dereference, address: 0000000000000000
RIP: 0010:sgx_encl_eaug_page+0xc7/0x210
Call Trace:
 ? __kmem_cache_alloc_node+0x16a/0x440
 ? xa_load+0x6e/0xa0
 sgx_vma_fault+0x119/0x230
 __do_fault+0x36/0x140
 do_fault+0x12f/0x400
 __handle_mm_fault+0x728/0x1110
 handle_mm_fault+0x105/0x310
 do_user_addr_fault+0x1ee/0x750
 ? __this_cpu_preempt_check+0x13/0x20
 exc_page_fault+0x76/0x180
 asm_exc_page_fault+0x27/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52568/">CVE-2023-52568 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52568">CVE-2023-52568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220941">SUSE bug 1220941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: remove BUG() after failure to insert delayed dir index item

Instead of calling BUG() when we fail to insert a delayed dir index item
into the delayed node's tree, we can just release all the resources we
have allocated/acquired before and return the error to the caller. This is
fine because all existing call chains undo anything they have done before
calling btrfs_insert_delayed_dir_index() or BUG_ON (when creating pending
snapshots in the transaction commit path).

So remove the BUG() call and do proper error handling.

This relates to a syzbot report linked below, but does not fix it because
it only prevents hitting a BUG(), it does not fix the issue where somehow
we attempt to use twice the same index number for different index items.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52570" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52570" ref_url="https://www.suse.com/security/cve/CVE-2023-52570" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/mdev: Fix a null-ptr-deref bug for mdev_unregister_parent()

Inject fault while probing mdpy.ko, if kstrdup() of create_dir() fails in
kobject_add_internal() in kobject_init_and_add() in mdev_type_add()
in parent_create_sysfs_files(), it will return 0 and probe successfully.
And when rmmod mdpy.ko, the mdpy_dev_exit() will call
mdev_unregister_parent(), the mdev_type_remove() may traverse uninitialized
parent-&gt;types[i] in parent_remove_sysfs_files(), and it will cause
below null-ptr-deref.

If mdev_type_add() fails, return the error code and kset_unregister()
to fix the issue.

 general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN
 KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
 CPU: 2 PID: 10215 Comm: rmmod Tainted: G        W        N 6.6.0-rc2+ #20
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 RIP: 0010:__kobject_del+0x62/0x1c0
 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 51 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 28 48 8d 7d 10 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 24 01 00 00 48 8b 75 10 48 89 df 48 8d 6b 3c e8
 RSP: 0018:ffff88810695fd30 EFLAGS: 00010202
 RAX: dffffc0000000000 RBX: ffffffffa0270268 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000010
 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10233a4ef1
 R10: ffff888119d2778b R11: 0000000063666572 R12: 0000000000000000
 R13: fffffbfff404e2d4 R14: dffffc0000000000 R15: ffffffffa0271660
 FS:  00007fbc81981540(0000) GS:ffff888119d00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007fc14a142dc0 CR3: 0000000110a62003 CR4: 0000000000770ee0
 DR0: ffffffff8fb0bce8 DR1: ffffffff8fb0bce9 DR2: ffffffff8fb0bcea
 DR3: ffffffff8fb0bceb DR6: 00000000fffe0ff0 DR7: 0000000000000600
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? die_addr+0x3d/0xa0
  ? exc_general_protection+0x144/0x220
  ? asm_exc_general_protection+0x22/0x30
  ? __kobject_del+0x62/0x1c0
  kobject_del+0x32/0x50
  parent_remove_sysfs_files+0xd6/0x170 [mdev]
  mdev_unregister_parent+0xfb/0x190 [mdev]
  ? mdev_register_parent+0x270/0x270 [mdev]
  ? find_module_all+0x9d/0xe0
  mdpy_dev_exit+0x17/0x63 [mdpy]
  __do_sys_delete_module.constprop.0+0x2fa/0x4b0
  ? module_flags+0x300/0x300
  ? __fput+0x4e7/0xa00
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x46/0xb0
 RIP: 0033:0x7fbc813221b7
 Code: 73 01 c3 48 8b 0d d1 8c 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 b0 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 8c 2c 00 f7 d8 64 89 01 48
 RSP: 002b:00007ffe780e0648 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0
 RAX: ffffffffffffffda RBX: 00007ffe780e06a8 RCX: 00007fbc813221b7
 RDX: 000000000000000a RSI: 0000000000000800 RDI: 000055e214df9b58
 RBP: 000055e214df9af0 R08: 00007ffe780df5c1 R09: 0000000000000000
 R10: 00007fbc8139ecc0 R11: 0000000000000206 R12: 00007ffe780e0870
 R13: 00007ffe780e0ed0 R14: 000055e214df9260 R15: 000055e214df9af0
  &lt;/TASK&gt;
 Modules linked in: mdpy(-) mdev vfio_iommu_type1 vfio [last unloaded: mdpy]
 Dumping ftrace buffer:
    (ftrace buffer empty)
 ---[ end trace 0000000000000000 ]---
 RIP: 0010:__kobject_del+0x62/0x1c0
 Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 51 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8b 6b 28 48 8d 7d 10 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 24 01 00 00 48 8b 75 10 48 89 df 48 8d 6b 3c e8
 RSP: 0018:ffff88810695fd30 EFLAGS: 00010202
 RAX: dffffc0000000000 RBX: ffffffffa0270268 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000010
 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10233a4ef1
 R10: ffff888119d2778b R11: 0000000063666572 R12: 0000000000000000
 R13: fffffbfff404e2d4 R14: dffffc0000000000 R15: ffffffffa0271660
 FS:  00007fbc81981540(0000) GS:ffff888119d00000(000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52570/">CVE-2023-52570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52570">CVE-2023-52570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220925">SUSE bug 1220925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52571" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52571" ref_url="https://www.suse.com/security/cve/CVE-2023-52571" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: rk817: Fix node refcount leak

Dan Carpenter reports that the Smatch static checker warning has found
that there is another refcount leak in the probe function. While
of_node_put() was added in one of the return paths, it should in
fact be added for ALL return paths that return an error and at driver
removal time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52571/">CVE-2023-52571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52571">CVE-2023-52571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220945">SUSE bug 1220945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52573" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rds: Fix possible NULL-pointer dereference

In rds_rdma_cm_event_handler_cmn() check, if conn pointer exists
before dereferencing it as rdma_set_service_type() argument

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220869">SUSE bug 1220869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: fix null-ptr-deref when team device type is changed

Get a null-ptr-deref bug as follows with reproducer [1].

BUG: kernel NULL pointer dereference, address: 0000000000000228
...
RIP: 0010:vlan_dev_hard_header+0x35/0x140 [8021q]
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x24/0x70
 ? page_fault_oops+0x82/0x150
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? vlan_dev_hard_header+0x35/0x140 [8021q]
 ? vlan_dev_hard_header+0x8e/0x140 [8021q]
 neigh_connected_output+0xb2/0x100
 ip6_finish_output2+0x1cb/0x520
 ? nf_hook_slow+0x43/0xc0
 ? ip6_mtu+0x46/0x80
 ip6_finish_output+0x2a/0xb0
 mld_sendpack+0x18f/0x250
 mld_ifc_work+0x39/0x160
 process_one_work+0x1e6/0x3f0
 worker_thread+0x4d/0x2f0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe5/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30

[1]
$ teamd -t team0 -d -c '{"runner": {"name": "loadbalance"}}'
$ ip link add name t-dummy type dummy
$ ip link add link t-dummy name t-dummy.100 type vlan id 100
$ ip link add name t-nlmon type nlmon
$ ip link set t-nlmon master team0
$ ip link set t-nlmon nomaster
$ ip link set t-dummy up
$ ip link set team0 up
$ ip link set t-dummy.100 down
$ ip link set t-dummy.100 master team0

When enslave a vlan device to team device and team device type is changed
from non-ether to ether, header_ops of team device is changed to
vlan_header_ops. That is incorrect and will trigger null-ptr-deref
for vlan-&gt;real_dev in vlan_dev_hard_header() because team device is not
a vlan device.

Cache eth_header_ops in team_setup(), then assign cached header_ops to
header_ops of team net device when its type is changed from non-ether
to ether to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm, kexec, ima: Use memblock_free_late() from ima_free_kexec_buffer()

The code calling ima_free_kexec_buffer() runs long after the memblock
allocator has already been torn down, potentially resulting in a use
after free in memblock_isolate_range().

With KASAN or KFENCE, this use after free will result in a BUG
from the idle task, and a subsequent kernel panic.

Switch ima_free_kexec_buffer() over to memblock_free_late() to avoid
that bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52577" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52577" ref_url="https://www.suse.com/security/cve/CVE-2023-52577" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dccp: fix dccp_v4_err()/dccp_v6_err() again

dh-&gt;dccph_x is the 9th byte (offset 8) in "struct dccp_hdr",
not in the "byte 7" as Jann claimed.

We need to make sure the ICMP messages are big enough,
using more standard ways (no more assumptions).

syzbot reported:
BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]
BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2681 [inline]
BUG: KMSAN: uninit-value in dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94
pskb_may_pull_reason include/linux/skbuff.h:2667 [inline]
pskb_may_pull include/linux/skbuff.h:2681 [inline]
dccp_v6_err+0x426/0x1aa0 net/dccp/ipv6.c:94
icmpv6_notify+0x4c7/0x880 net/ipv6/icmp.c:867
icmpv6_rcv+0x19d5/0x30d0
ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438
ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
NF_HOOK include/linux/netfilter.h:304 [inline]
ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
dst_input include/net/dst.h:468 [inline]
ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79
NF_HOOK include/linux/netfilter.h:304 [inline]
ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310
__netif_receive_skb_one_core net/core/dev.c:5523 [inline]
__netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637
netif_receive_skb_internal net/core/dev.c:5723 [inline]
netif_receive_skb+0x58/0x660 net/core/dev.c:5782
tun_rx_batched+0x83b/0x920
tun_get_user+0x564c/0x6940 drivers/net/tun.c:2002
tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
call_write_iter include/linux/fs.h:1985 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x8ef/0x15c0 fs/read_write.c:584
ksys_write+0x20f/0x4c0 fs/read_write.c:637
__do_sys_write fs/read_write.c:649 [inline]
__se_sys_write fs/read_write.c:646 [inline]
__x64_sys_write+0x93/0xd0 fs/read_write.c:646
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767
slab_alloc_node mm/slub.c:3478 [inline]
kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523
kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559
__alloc_skb+0x318/0x740 net/core/skbuff.c:650
alloc_skb include/linux/skbuff.h:1286 [inline]
alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6313
sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2795
tun_alloc_skb drivers/net/tun.c:1531 [inline]
tun_get_user+0x23cf/0x6940 drivers/net/tun.c:1846
tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
call_write_iter include/linux/fs.h:1985 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x8ef/0x15c0 fs/read_write.c:584
ksys_write+0x20f/0x4c0 fs/read_write.c:637
__do_sys_write fs/read_write.c:649 [inline]
__se_sys_write fs/read_write.c:646 [inline]
__x64_sys_write+0x93/0xd0 fs/read_write.c:646
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

CPU: 0 PID: 4995 Comm: syz-executor153 Not tainted 6.6.0-rc1-syzkaller-00014-ga747acc0b752 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52577/">CVE-2023-52577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52577">CVE-2023-52577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220873">SUSE bug 1220873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52579" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52579" ref_url="https://www.suse.com/security/cve/CVE-2023-52579" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52579/">CVE-2023-52579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52579">CVE-2023-52579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220875">SUSE bug 1220875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/core: Fix ETH_P_1588 flow dissector

When a PTP ethernet raw frame with a size of more than 256 bytes followed
by a 0xff pattern is sent to __skb_flow_dissect, nhoff value calculation
is wrong. For example: hdr-&gt;message_length takes the wrong value (0xffff)
and it does not replicate real header length. In this case, 'nhoff' value
was overridden and the PTP header was badly dissected. This leads to a
kernel crash.

net/core: flow_dissector
net/core flow dissector nhoff = 0x0000000e
net/core flow dissector hdr-&gt;message_length = 0x0000ffff
net/core flow dissector nhoff = 0x0001000d (u16 overflow)
...
skb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88
skb frag:     00000000: f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Using the size of the ptp_header struct will allow the corrected
calculation of the nhoff value.

net/core flow dissector nhoff = 0x0000000e
net/core flow dissector nhoff = 0x00000030 (sizeof ptp_header)
...
skb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 f7 ff ff
skb linear:   00000010: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
skb linear:   00000020: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
skb frag:     00000000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Kernel trace:
[   74.984279] ------------[ cut here ]------------
[   74.989471] kernel BUG at include/linux/skbuff.h:2440!
[   74.995237] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[   75.001098] CPU: 4 PID: 0 Comm: swapper/4 Tainted: G     U            5.15.85-intel-ese-standard-lts #1
[   75.011629] Hardware name: Intel Corporation A-Island (CPU:AlderLake)/A-Island (ID:06), BIOS SB_ADLP.01.01.00.01.03.008.D-6A9D9E73-dirty Mar 30 2023
[   75.026507] RIP: 0010:eth_type_trans+0xd0/0x130
[   75.031594] Code: 03 88 47 78 eb c7 8b 47 68 2b 47 6c 48 8b 97 c0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb ab &lt;0f&gt; 0b b8 00 01 00 00 eb a2 48 85 ff 74 eb 48 8d 54 24 06 31 f6 b9
[   75.052612] RSP: 0018:ffff9948c0228de0 EFLAGS: 00010297
[   75.058473] RAX: 00000000000003f2 RBX: ffff8e47047dc300 RCX: 0000000000001003
[   75.066462] RDX: ffff8e4e8c9ea040 RSI: ffff8e4704e0a000 RDI: ffff8e47047dc300
[   75.074458] RBP: ffff8e4704e2acc0 R08: 00000000000003f3 R09: 0000000000000800
[   75.082466] R10: 000000000000000d R11: ffff9948c0228dec R12: ffff8e4715e4e010
[   75.090461] R13: ffff9948c0545018 R14: 0000000000000001 R15: 0000000000000800
[   75.098464] FS:  0000000000000000(0000) GS:ffff8e4e8fb00000(0000) knlGS:0000000000000000
[   75.107530] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   75.113982] CR2: 00007f5eb35934a0 CR3: 0000000150e0a002 CR4: 0000000000770ee0
[   75.121980] PKRU: 55555554
[   75.125035] Call Trace:
[   75.127792]  &lt;IRQ&gt;
[   75.130063]  ? eth_get_headlen+0xa4/0xc0
[   75.134472]  igc_process_skb_fields+0xcd/0x150
[   75.139461]  igc_poll+0xc80/0x17b0
[   75.143272]  __napi_poll+0x27/0x170
[   75.147192]  net_rx_action+0x234/0x280
[   75.151409]  __do_softirq+0xef/0x2f4
[   75.155424]  irq_exit_rcu+0xc7/0x110
[   75.159432]  common_interrupt+0xb8/0xd0
[   75.163748]  &lt;/IRQ&gt;
[   75.166112]  &lt;TASK&gt;
[   75.168473]  asm_common_interrupt+0x22/0x40
[   75.173175] RIP: 0010:cpuidle_enter_state+0xe2/0x350
[   75.178749] Code: 85 c0 0f 8f 04 02 00 00 31 ff e8 39 6c 67 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 50 02 00 00 31 ff e8 52 b0 6d ff fb 45 85 f6 &lt;0f&gt; 88 b1 00 00 00 49 63 ce 4c 2b 2c 24 48 89 c8 48 6b d1 68 48 c1
[   75.199757] RSP: 0018:ffff9948c013bea8 EFLAGS: 00000202
[   75.205614] RAX: ffff8e4e8fb00000 RBX: ffffb948bfd23900 RCX: 000000000000001f
[   75.213619] RDX: 0000000000000004 RSI: ffffffff94206161 RDI: ffffffff94212e20
[   75.221620] RBP: 0000000000000004 R08: 000000117568973a R09: 0000000000000001
[   75.229622] R10: 000000000000afc8 R11: ffff8e4e8fb29ce4 R12: ffffffff945ae980
[   75.237628] R13: 000000117568973a R14: 0000000000000004 R15: 0000000000000000
[   75.245635]  ? 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220876">SUSE bug 1220876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix memleak when more than 255 elements expired

When more than 255 elements expired we're supposed to switch to a new gc
container structure.

This never happens: u8 type will wrap before reaching the boundary
and nft_trans_gc_space() always returns true.

This means we recycle the initial gc container structure and
lose track of the elements that came before.

While at it, don't deref 'gc' after we've passed it to call_rcu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220877">SUSE bug 1220877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Only call folio_start_fscache() one time for each folio

If a network filesystem using netfs implements a clamp_length()
function, it can set subrequest lengths smaller than a page size.

When we loop through the folios in netfs_rreq_unlock_folios() to
set any folios to be written back, we need to make sure we only
call folio_start_fscache() once for each folio.

Otherwise, this simple testcase:

  mount -o fsc,rsize=1024,wsize=1024 127.0.0.1:/export /mnt/nfs
  dd if=/dev/zero of=/mnt/nfs/file.bin bs=4096 count=1
  1+0 records in
  1+0 records out
  4096 bytes (4.1 kB, 4.0 KiB) copied, 0.0126359 s, 324 kB/s
  echo 3 &gt; /proc/sys/vm/drop_caches
  cat /mnt/nfs/file.bin &gt; /dev/null

will trigger an oops similar to the following:

  page dumped because: VM_BUG_ON_FOLIO(folio_test_private_2(folio))
  ------------[ cut here ]------------
  kernel BUG at include/linux/netfs.h:44!
  ...
  CPU: 5 PID: 134 Comm: kworker/u16:5 Kdump: loaded Not tainted 6.4.0-rc5
  ...
  RIP: 0010:netfs_rreq_unlock_folios+0x68e/0x730 [netfs]
  ...
  Call Trace:
    netfs_rreq_assess+0x497/0x660 [netfs]
    netfs_subreq_terminated+0x32b/0x610 [netfs]
    nfs_netfs_read_completion+0x14e/0x1a0 [nfs]
    nfs_read_completion+0x2f9/0x330 [nfs]
    rpc_free_task+0x72/0xa0 [sunrpc]
    rpc_async_release+0x46/0x70 [sunrpc]
    process_one_work+0x3bd/0x710
    worker_thread+0x89/0x610
    kthread+0x181/0x1c0
    ret_from_fork+0x29/0x50
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix deadlock or deadcode of misusing dget()

The lock order is incorrect between denty and its parent, we should
always make sure that the parent get the lock first.

But since this deadcode is never used and the parent dir will always
be set from the callers, let's just remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52584" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52584" ref_url="https://www.suse.com/security/cve/CVE-2023-52584" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spmi: mediatek: Fix UAF on device remove

The pmif driver data that contains the clocks is allocated along with
spmi_controller.
On device remove, spmi_controller will be freed first, and then devres
, including the clocks, will be cleanup.
This leads to UAF because putting the clocks will access the clocks in
the pmif driver data, which is already freed along with spmi_controller.

This can be reproduced by enabling DEBUG_TEST_DRIVER_REMOVE and
building the kernel with KASAN.

Fix the UAF issue by using unmanaged clk_bulk_get() and putting the
clocks before freeing spmi_controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52584/">CVE-2023-52584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52584">CVE-2023-52584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221079">SUSE bug 1221079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52585" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix possible NULL dereference in amdgpu_ras_query_error_status_helper()

Return invalid error code -EINVAL for invalid block id.

Fixes the below:

drivers/gpu/drm/amd/amdgpu/amdgpu_ras.c:1183 amdgpu_ras_query_error_status_helper() error: we previously assumed 'info' could be null (see line 1176)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221080">SUSE bug 1221080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52586" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add mutex lock in control vblank irq

Add a mutex lock to control vblank irq to synchronize vblank
enable/disable operations happening from different threads to prevent
race conditions while registering/unregistering the vblank irq callback.

v4: -Removed vblank_ctl_lock from dpu_encoder_virt, so it is only a
    parameter of dpu_encoder_phys.
    -Switch from atomic refcnt to a simple int counter as mutex has
    now been added
v3: Mistakenly did not change wording in last version. It is done now.
v2: Slightly changed wording of commit message

Patchwork: https://patchwork.freedesktop.org/patch/571854/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221081">SUSE bug 1221081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/ipoib: Fix mcast list locking

Releasing the `priv-&gt;lock` while iterating the `priv-&gt;multicast_list` in
`ipoib_mcast_join_task()` opens a window for `ipoib_mcast_dev_flush()` to
remove the items while in the middle of iteration. If the mcast is removed
while the lock was dropped, the for loop spins forever resulting in a hard
lockup (as was reported on RHEL 4.18.0-372.75.1.el8_6 kernel):

    Task A (kworker/u72:2 below)       | Task B (kworker/u72:0 below)
    -----------------------------------+-----------------------------------
    ipoib_mcast_join_task(work)        | ipoib_ib_dev_flush_light(work)
      spin_lock_irq(&amp;priv-&gt;lock)       | __ipoib_ib_dev_flush(priv, ...)
      list_for_each_entry(mcast,       | ipoib_mcast_dev_flush(dev = priv-&gt;dev)
          &amp;priv-&gt;multicast_list, list) |
        ipoib_mcast_join(dev, mcast)   |
          spin_unlock_irq(&amp;priv-&gt;lock) |
                                       |   spin_lock_irqsave(&amp;priv-&gt;lock, flags)
                                       |   list_for_each_entry_safe(mcast, tmcast,
                                       |                  &amp;priv-&gt;multicast_list, list)
                                       |     list_del(&amp;mcast-&gt;list);
                                       |     list_add_tail(&amp;mcast-&gt;list, &amp;remove_list)
                                       |   spin_unlock_irqrestore(&amp;priv-&gt;lock, flags)
          spin_lock_irq(&amp;priv-&gt;lock)   |
                                       |   ipoib_mcast_remove_list(&amp;remove_list)
   (Here, `mcast` is no longer on the  |     list_for_each_entry_safe(mcast, tmcast,
    `priv-&gt;multicast_list` and we keep |                            remove_list, list)
    spinning on the `remove_list` of   |  &gt;&gt;&gt;  wait_for_completion(&amp;mcast-&gt;done)
    the other thread which is blocked  |
    and the list is still valid on     |
    it's stack.)

Fix this by keeping the lock held and changing to GFP_ATOMIC to prevent
eventual sleeps.
Unfortunately we could not reproduce the lockup and confirm this fix but
based on the code review I think this fix should address such lockups.

crash&gt; bc 31
PID: 747      TASK: ff1c6a1a007e8000  CPU: 31   COMMAND: "kworker/u72:2"
--
    [exception RIP: ipoib_mcast_join_task+0x1b1]
    RIP: ffffffffc0944ac1  RSP: ff646f199a8c7e00  RFLAGS: 00000002
    RAX: 0000000000000000  RBX: ff1c6a1a04dc82f8  RCX: 0000000000000000
                                  work (&amp;priv-&gt;mcast_task{,.work})
    RDX: ff1c6a192d60ac68  RSI: 0000000000000286  RDI: ff1c6a1a04dc8000
           &amp;mcast-&gt;list
    RBP: ff646f199a8c7e90   R8: ff1c699980019420   R9: ff1c6a1920c9a000
    R10: ff646f199a8c7e00  R11: ff1c6a191a7d9800  R12: ff1c6a192d60ac00
                                                         mcast
    R13: ff1c6a1d82200000  R14: ff1c6a1a04dc8000  R15: ff1c6a1a04dc82d8
           dev                    priv (&amp;priv-&gt;lock)     &amp;priv-&gt;multicast_list (aka head)
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
--- &lt;NMI exception stack&gt; ---
 #5 [ff646f199a8c7e00] ipoib_mcast_join_task+0x1b1 at ffffffffc0944ac1 [ib_ipoib]
 #6 [ff646f199a8c7e98] process_one_work+0x1a7 at ffffffff9bf10967

crash&gt; rx ff646f199a8c7e68
ff646f199a8c7e68:  ff1c6a1a04dc82f8 &lt;&lt;&lt; work = &amp;priv-&gt;mcast_task.work

crash&gt; list -hO ipoib_dev_priv.multicast_list ff1c6a1a04dc8000
(empty)

crash&gt; ipoib_dev_priv.mcast_task.work.func,mcast_mutex.owner.counter ff1c6a1a04dc8000
  mcast_task.work.func = 0xffffffffc0944910 &lt;ipoib_mcast_join_task&gt;,
  mcast_mutex.owner.counter = 0xff1c69998efec000

crash&gt; b 8
PID: 8        TASK: ff1c69998efec000  CPU: 33   COMMAND: "kworker/u72:0"
--
 #3 [ff646f1980153d50] wait_for_completion+0x96 at ffffffff9c7d7646
 #4 [ff646f1980153d90] ipoib_mcast_remove_list+0x56 at ffffffffc0944dc6 [ib_ipoib]
 #5 [ff646f1980153de8] ipoib_mcast_dev_flush+0x1a7 at ffffffffc09455a7 [ib_ipoib]
 #6 [ff646f1980153e58] __ipoib_ib_dev_flush+0x1a4 at ffffffffc09431a4 [ib_ipoib]
 #7 [ff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221082">SUSE bug 1221082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52588" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52588" ref_url="https://www.suse.com/security/cve/CVE-2023-52588" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to tag gcing flag on page during block migration

It needs to add missing gcing flag on page during block migration,
in order to garantee migrated data be persisted during checkpoint,
otherwise out-of-order persistency between data and node may cause
data corruption after SPOR.

Similar issue was fixed by commit 2d1fe8a86bf5 ("f2fs: fix to tag
gcing flag on page during file defragment").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52588/">CVE-2023-52588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52588">CVE-2023-52588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221083">SUSE bug 1221083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52589" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rkisp1: Fix IRQ disable race issue

In rkisp1_isp_stop() and rkisp1_csi_disable() the driver masks the
interrupts and then apparently assumes that the interrupt handler won't
be running, and proceeds in the stop procedure. This is not the case, as
the interrupt handler can already be running, which would lead to the
ISP being disabled while the interrupt handler handling a captured
frame.

This brings up two issues: 1) the ISP could be powered off while the
interrupt handler is still running and accessing registers, leading to
board lockup, and 2) the interrupt handler code and the code that
disables the streaming might do things that conflict.

It is not clear to me if 2) causes a real issue, but 1) can be seen with
a suitable delay (or printk in my case) in the interrupt handler,
leading to board lockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221084">SUSE bug 1221084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52590" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change ocfs2 rename code to avoid touching renamed directory if
its parent does not change as without locking that can corrupt the
filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52591" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

reiserfs: Avoid touching renamed directory if parent does not change

The VFS will not be locking moved directory if its parent does not
change. Change reiserfs rename code to avoid touching renamed directory
if its parent does not change as without locking that can corrupt the
filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wfx: fix possible NULL pointer dereference in wfx_set_mfp_ap()

Since 'ieee80211_beacon_get()' can return NULL, 'wfx_set_mfp_ap()'
should check the return value before examining skb data. So convert
the latter to return an appropriate error code and propagate it to
return from 'wfx_start_ap()' as well. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221042">SUSE bug 1221042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus()

Fix an array-index-out-of-bounds read in ath9k_htc_txstatus(). The bug
occurs when txs-&gt;cnt, data from a URB provided by a USB device, is
bigger than the size of the array txs-&gt;txstatus, which is
HTC_MAX_TX_STATUS. WARN_ON() already checks it, but there is no bug
handling code after the check. Make the function return if that is the
case.

Found by a modified version of syzkaller.

UBSAN: array-index-out-of-bounds in htc_drv_txrx.c
index 13 is out of range for type '__wmi_event_txstatus [12]'
Call Trace:
 ath9k_htc_txstatus
 ath9k_wmi_event_tasklet
 tasklet_action_common
 __do_softirq
 irq_exit_rxu
 sysvec_apic_timer_interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221045">SUSE bug 1221045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rt2x00: restart beacon queue when hardware reset

When a hardware reset is triggered, all registers are reset, so all
queues are forced to stop in hardware interface. However, mac80211
will not automatically stop the queue. If we don't manually stop the
beacon queue, the queue will be deadlocked and unable to start again.
This patch fixes the issue where Apple devices cannot connect to the
AP after calling ieee80211_restart_hw().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221046">SUSE bug 1221046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52596" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52596" ref_url="https://www.suse.com/security/cve/CVE-2023-52596" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysctl: Fix out of bounds access for empty sysctl registers

When registering tables to the sysctl subsystem there is a check to see
if header is a permanently empty directory (used for mounts). This check
evaluates the first element of the ctl_table. This results in an out of
bounds evaluation when registering empty directories.

The function register_sysctl_mount_point now passes a ctl_table of size
1 instead of size 0. It now relies solely on the type to identify
a permanently empty register.

Make sure that the ctl_table has at least one element before testing for
permanent emptiness.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52596/">CVE-2023-52596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52596">CVE-2023-52596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221047">SUSE bug 1221047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: fix setting of fpc register

kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
(fpc) register of a guest cpu. The new value is tested for validity by
temporarily loading it into the fpc register.

This may lead to corruption of the fpc register of the host process:
if an interrupt happens while the value is temporarily loaded into the fpc
register, and within interrupt context floating point or vector registers
are used, the current fp/vx registers are saved with save_fpu_regs()
assuming they belong to user space and will be loaded into fp/vx registers
when returning to user space.

test_fp_ctl() restores the original user space / host process fpc register
value, however it will be discarded, when returning to user space.

In result the host process will incorrectly continue to run with the value
that was supposed to be used for a guest cpu.

Fix this by simply removing the test. There is another test right before
the SIE context is entered which will handles invalid values.

This results in a change of behaviour: invalid values will now be accepted
instead of that the ioctl fails with -EINVAL. This seems to be acceptable,
given that this interface is most likely not used anymore, and this is in
addition the same behaviour implemented with the memory mapped interface
(replace invalid values with zero) - see sync_regs() in kvm-s390.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/ptrace: handle setting of fpc register correctly

If the content of the floating point control (fpc) register of a traced
process is modified with the ptrace interface the new value is tested for
validity by temporarily loading it into the fpc register.

This may lead to corruption of the fpc register of the tracing process:
if an interrupt happens while the value is temporarily loaded into the
fpc register, and within interrupt context floating point or vector
registers are used, the current fp/vx registers are saved with
save_fpu_regs() assuming they belong to user space and will be loaded into
fp/vx registers when returning to user space.

test_fp_ctl() restores the original user space fpc register value, however
it will be discarded, when returning to user space.

In result the tracer will incorrectly continue to run with the value that
was supposed to be used for the traced process.

Fix this by saving fpu register contents with save_fpu_regs() before using
test_fp_ctl().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221060">SUSE bug 1221060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52599" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in diNewExt

[Syz report]
UBSAN: array-index-out-of-bounds in fs/jfs/jfs_imap.c:2360:2
index -878706688 is out of range for type 'struct iagctl[128]'
CPU: 1 PID: 5065 Comm: syz-executor282 Not tainted 6.7.0-rc4-syzkaller-00009-gbee0e7762ad2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:217 [inline]
 __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348
 diNewExt+0x3cf3/0x4000 fs/jfs/jfs_imap.c:2360
 diAllocExt fs/jfs/jfs_imap.c:1949 [inline]
 diAllocAG+0xbe8/0x1e50 fs/jfs/jfs_imap.c:1666
 diAlloc+0x1d3/0x1760 fs/jfs/jfs_imap.c:1587
 ialloc+0x8f/0x900 fs/jfs/jfs_inode.c:56
 jfs_mkdir+0x1c5/0xb90 fs/jfs/namei.c:225
 vfs_mkdir+0x2f1/0x4b0 fs/namei.c:4106
 do_mkdirat+0x264/0x3a0 fs/namei.c:4129
 __do_sys_mkdir fs/namei.c:4149 [inline]
 __se_sys_mkdir fs/namei.c:4147 [inline]
 __x64_sys_mkdir+0x6e/0x80 fs/namei.c:4147
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7fcb7e6a0b57
Code: ff ff 77 07 31 c0 c3 0f 1f 40 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 53 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd83023038 EFLAGS: 00000286 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007fcb7e6a0b57
RDX: 00000000000a1020 RSI: 00000000000001ff RDI: 0000000020000140
RBP: 0000000020000140 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000286 R12: 00007ffd830230d0
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000

[Analysis]
When the agstart is too large, it can cause agno overflow.

[Fix]
After obtaining agno, if the value is invalid, exit the subsequent process.


Modified the test from agno &gt; MAXAG to agno &gt;= MAXAG based on linux-next
report by kernel test robot (Dan Carpenter).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221062">SUSE bug 1221062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228782">SUSE bug 1228782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52600" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix uaf in jfs_evict_inode

When the execution of diMount(ipimap) fails, the object ipimap that has been
released may be accessed in diFreeSpecial(). Asynchronous ipimap release occurs
when rcu_core() calls jfs_free_node().

Therefore, when diMount(ipimap) fails, sbi-&gt;ipimap should not be initialized as
ipimap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221071">SUSE bug 1221071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228783">SUSE bug 1228783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52601" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in dbAdjTree

Currently there is a bound check missing in the dbAdjTree while
accessing the dmt_stree. To add the required check added the bool is_ctl
which is required to determine the size as suggest in the following
commit.
https://lore.kernel.org/linux-kernel-mentees/f9475918-2186-49b8-b801-6f0f9e75f4fa@oracle.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221068">SUSE bug 1221068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228822">SUSE bug 1228822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix slab-out-of-bounds Read in dtSearch

Currently while searching for current page in the sorted entry table
of the page there is a out of bound access. Added a bound check to fix
the error.

Dave:
Set return code to -EIO
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221070">SUSE bug 1221070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52603" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

UBSAN: array-index-out-of-bounds in dtSplitRoot

Syzkaller reported the following issue:

oop0: detected capacity change from 0 to 32768

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dtree.c:1971:9
index -2 is out of range for type 'struct dtslot [128]'
CPU: 0 PID: 3613 Comm: syz-executor270 Not tainted 6.0.0-syzkaller-09423-g493ffd6605b2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:151 [inline]
 __ubsan_handle_out_of_bounds+0xdb/0x130 lib/ubsan.c:283
 dtSplitRoot+0x8d8/0x1900 fs/jfs/jfs_dtree.c:1971
 dtSplitUp fs/jfs/jfs_dtree.c:985 [inline]
 dtInsert+0x1189/0x6b80 fs/jfs/jfs_dtree.c:863
 jfs_mkdir+0x757/0xb00 fs/jfs/namei.c:270
 vfs_mkdir+0x3b3/0x590 fs/namei.c:4013
 do_mkdirat+0x279/0x550 fs/namei.c:4038
 __do_sys_mkdirat fs/namei.c:4053 [inline]
 __se_sys_mkdirat fs/namei.c:4051 [inline]
 __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4051
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fcdc0113fd9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffeb8bc67d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000102
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcdc0113fd9
RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003
RBP: 00007fcdc00d37a0 R08: 0000000000000000 R09: 00007fcdc00d37a0
R10: 00005555559a72c0 R11: 0000000000000246 R12: 00000000f8008000
R13: 0000000000000000 R14: 00083878000000f8 R15: 0000000000000000
 &lt;/TASK&gt;

The issue is caused when the value of fsi becomes less than -1.
The check to break the loop when fsi value becomes -1 is present
but syzbot was able to produce value less than -1 which cause the error.
This patch simply add the change for the values less than 0.

The patch is tested via syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221066">SUSE bug 1221066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52604" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

FS:JFS:UBSAN:array-index-out-of-bounds in dbAdjTree

Syzkaller reported the following issue:

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:2867:6
index 196694 is out of range for type 's8[1365]' (aka 'signed char[1365]')
CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:217 [inline]
 __ubsan_handle_out_of_bounds+0x11c/0x150 lib/ubsan.c:348
 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867
 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834
 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331
 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]
 dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402
 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534
 txUpdateMap+0x342/0x9e0
 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
 jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732
 kthread+0x2d3/0x370 kernel/kthread.c:388
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
 &lt;/TASK&gt;
================================================================================
Kernel panic - not syncing: UBSAN: panic_on_warn set ...
CPU: 1 PID: 109 Comm: jfsCommit Not tainted 6.6.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 panic+0x30f/0x770 kernel/panic.c:340
 check_panic_on_warn+0x82/0xa0 kernel/panic.c:236
 ubsan_epilogue lib/ubsan.c:223 [inline]
 __ubsan_handle_out_of_bounds+0x13c/0x150 lib/ubsan.c:348
 dbAdjTree+0x474/0x4f0 fs/jfs/jfs_dmap.c:2867
 dbJoin+0x210/0x2d0 fs/jfs/jfs_dmap.c:2834
 dbFreeBits+0x4eb/0xda0 fs/jfs/jfs_dmap.c:2331
 dbFreeDmap fs/jfs/jfs_dmap.c:2080 [inline]
 dbFree+0x343/0x650 fs/jfs/jfs_dmap.c:402
 txFreeMap+0x798/0xd50 fs/jfs/jfs_txnmgr.c:2534
 txUpdateMap+0x342/0x9e0
 txLazyCommit fs/jfs/jfs_txnmgr.c:2664 [inline]
 jfs_lazycommit+0x47a/0xb70 fs/jfs/jfs_txnmgr.c:2732
 kthread+0x2d3/0x370 kernel/kthread.c:388
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304
 &lt;/TASK&gt;
Kernel Offset: disabled
Rebooting in 86400 seconds..

The issue is caused when the value of lp becomes greater than
CTLTREESIZE which is the max size of stree. Adding a simple check
solves this issue.

Dave:
As the function returns a void, good error handling
would require a more intrusive code reorganization, so I modified
Osama's patch at use WARN_ON_ONCE for lack of a cleaner option.

The patch is tested via syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221067">SUSE bug 1221067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228739">SUSE bug 1228739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/lib: Validate size for vector operations

Some of the fp/vmx code in sstep.c assume a certain maximum size for the
instructions being emulated. The size of those operations however is
determined separately in analyse_instr().

Add a check to validate the assumption on the maximum size of the
operations, so as to prevent any unintended kernel stack corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221069">SUSE bug 1221069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52607" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/mm: Fix null-pointer dereference in pgtable_cache_add

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52608" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Check mailbox/SMT channel for consistency

On reception of a completion interrupt the shared memory area is accessed
to retrieve the message header at first and then, if the message sequence
number identifies a transaction which is still pending, the related
payload is fetched too.

When an SCMI command times out the channel ownership remains with the
platform until eventually a late reply is received and, as a consequence,
any further transmission attempt remains pending, waiting for the channel
to be relinquished by the platform.

Once that late reply is received the channel ownership is given back
to the agent and any pending request is then allowed to proceed and
overwrite the SMT area of the just delivered late reply; then the wait
for the reply to the new request starts.

It has been observed that the spurious IRQ related to the late reply can
be wrongly associated with the freshly enqueued request: when that happens
the SCMI stack in-flight lookup procedure is fooled by the fact that the
message header now present in the SMT area is related to the new pending
transaction, even though the real reply has still to arrive.

This race-condition on the A2P channel can be detected by looking at the
channel status bits: a genuine reply from the platform will have set the
channel free bit before triggering the completion IRQ.

Add a consistency check to validate such condition in the A2P ISR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221375">SUSE bug 1221375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52609" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52609" ref_url="https://www.suse.com/security/cve/CVE-2023-52609" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix race between mmput() and do_exit()

Task A calls binder_update_page_range() to allocate and insert pages on
a remote address space from Task B. For this, Task A pins the remote mm
via mmget_not_zero() first. This can race with Task B do_exit() and the
final mmput() refcount decrement will come from Task A.

  Task A            | Task B
  ------------------+------------------
  mmget_not_zero()  |
                    |  do_exit()
                    |    exit_mm()
                    |      mmput()
  mmput()           |
    exit_mmap()     |
      remove_vma()  |
        fput()      |

In this case, the work of ____fput() from Task B is queued up in Task A
as TWA_RESUME. So in theory, Task A returns to userspace and the cleanup
work gets executed. However, Task A instead sleep, waiting for a reply
from Task B that never comes (it's dead).

This means the binder_deferred_release() is blocked until an unrelated
binder event forces Task A to go back to userspace. All the associated
death notifications will also be delayed until then.

In order to fix this use mmput_async() that will schedule the work in
the corresponding mm-&gt;async_put_work WQ instead of Task A.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52609/">CVE-2023-52609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52609">CVE-2023-52609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221609">SUSE bug 1221609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ct: fix skb leak and crash on ooo frags

act_ct adds skb-&gt;users before defragmentation. If frags arrive in order,
the last frag's reference is reset in:

  inet_frag_reasm_prepare
    skb_morph

which is not straightforward.

However when frags arrive out of order, nobody unref the last frag, and
all frags are leaked. The situation is even worse, as initiating packet
capture can lead to a crash[0] when skb has been cloned and shared at the
same time.

Fix the issue by removing skb_get() before defragmentation. act_ct
returns TC_ACT_CONSUMED when defrag failed or in progress.

[0]:
[  843.804823] ------------[ cut here ]------------
[  843.809659] kernel BUG at net/core/skbuff.c:2091!
[  843.814516] invalid opcode: 0000 [#1] PREEMPT SMP
[  843.819296] CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G S 6.7.0-rc3 #2
[  843.824107] Hardware name: XFUSION 1288H V6/BC13MBSBD, BIOS 1.29 11/25/2022
[  843.828953] RIP: 0010:pskb_expand_head+0x2ac/0x300
[  843.833805] Code: 8b 70 28 48 85 f6 74 82 48 83 c6 08 bf 01 00 00 00 e8 38 bd ff ff 8b 83 c0 00 00 00 48 03 83 c8 00 00 00 e9 62 ff ff ff 0f 0b &lt;0f&gt; 0b e8 8d d0 ff ff e9 b3 fd ff ff 81 7c 24 14 40 01 00 00 4c 89
[  843.843698] RSP: 0018:ffffc9000cce07c0 EFLAGS: 00010202
[  843.848524] RAX: 0000000000000002 RBX: ffff88811a211d00 RCX: 0000000000000820
[  843.853299] RDX: 0000000000000640 RSI: 0000000000000000 RDI: ffff88811a211d00
[  843.857974] RBP: ffff888127d39518 R08: 00000000bee97314 R09: 0000000000000000
[  843.862584] R10: 0000000000000000 R11: ffff8881109f0000 R12: 0000000000000880
[  843.867147] R13: ffff888127d39580 R14: 0000000000000640 R15: ffff888170f7b900
[  843.871680] FS:  0000000000000000(0000) GS:ffff889ffffc0000(0000) knlGS:0000000000000000
[  843.876242] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  843.880778] CR2: 00007fa42affcfb8 CR3: 000000011433a002 CR4: 0000000000770ef0
[  843.885336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  843.889809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  843.894229] PKRU: 55555554
[  843.898539] Call Trace:
[  843.902772]  &lt;IRQ&gt;
[  843.906922]  ? __die_body+0x1e/0x60
[  843.911032]  ? die+0x3c/0x60
[  843.915037]  ? do_trap+0xe2/0x110
[  843.918911]  ? pskb_expand_head+0x2ac/0x300
[  843.922687]  ? do_error_trap+0x65/0x80
[  843.926342]  ? pskb_expand_head+0x2ac/0x300
[  843.929905]  ? exc_invalid_op+0x50/0x60
[  843.933398]  ? pskb_expand_head+0x2ac/0x300
[  843.936835]  ? asm_exc_invalid_op+0x1a/0x20
[  843.940226]  ? pskb_expand_head+0x2ac/0x300
[  843.943580]  inet_frag_reasm_prepare+0xd1/0x240
[  843.946904]  ip_defrag+0x5d4/0x870
[  843.950132]  nf_ct_handle_fragments+0xec/0x130 [nf_conntrack]
[  843.953334]  tcf_ct_act+0x252/0xd90 [act_ct]
[  843.956473]  ? tcf_mirred_act+0x516/0x5a0 [act_mirred]
[  843.959657]  tcf_action_exec+0xa1/0x160
[  843.962823]  fl_classify+0x1db/0x1f0 [cls_flower]
[  843.966010]  ? skb_clone+0x53/0xc0
[  843.969173]  tcf_classify+0x24d/0x420
[  843.972333]  tc_run+0x8f/0xf0
[  843.975465]  __netif_receive_skb_core+0x67a/0x1080
[  843.978634]  ? dev_gro_receive+0x249/0x730
[  843.981759]  __netif_receive_skb_list_core+0x12d/0x260
[  843.984869]  netif_receive_skb_list_internal+0x1cb/0x2f0
[  843.987957]  ? mlx5e_handle_rx_cqe_mpwrq_rep+0xfa/0x1a0 [mlx5_core]
[  843.991170]  napi_complete_done+0x72/0x1a0
[  843.994305]  mlx5e_napi_poll+0x28c/0x6d0 [mlx5_core]
[  843.997501]  __napi_poll+0x25/0x1b0
[  844.000627]  net_rx_action+0x256/0x330
[  844.003705]  __do_softirq+0xb3/0x29b
[  844.006718]  irq_exit_rcu+0x9e/0xc0
[  844.009672]  common_interrupt+0x86/0xa0
[  844.012537]  &lt;/IRQ&gt;
[  844.015285]  &lt;TASK&gt;
[  844.017937]  asm_common_interrupt+0x26/0x40
[  844.020591] RIP: 0010:acpi_safe_halt+0x1b/0x20
[  844.023247] Code: ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 65 48 8b 04 25 00 18 03 00 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 81 d0 44 00 fb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221610">SUSE bug 1221610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52611" ref_url="https://www.suse.com/security/cve/CVE-2023-52611" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: sdio: Honor the host max_req_size in the RX path

Lukas reports skb_over_panic errors on his Banana Pi BPI-CM4 which comes
with an Amlogic A311D (G12B) SoC and a RTL8822CS SDIO wifi/Bluetooth
combo card. The error he observed is identical to what has been fixed
in commit e967229ead0e ("wifi: rtw88: sdio: Check the HISR RX_REQUEST
bit in rtw_sdio_rx_isr()") but that commit didn't fix Lukas' problem.

Lukas found that disabling or limiting RX aggregation works around the
problem for some time (but does not fully fix it). In the following
discussion a few key topics have been discussed which have an impact on
this problem:
- The Amlogic A311D (G12B) SoC has a hardware bug in the SDIO controller
  which prevents DMA transfers. Instead all transfers need to go through
  the controller SRAM which limits transfers to 1536 bytes
- rtw88 chips don't split incoming (RX) packets, so if a big packet is
  received this is forwarded to the host in it's original form
- rtw88 chips can do RX aggregation, meaning more multiple incoming
  packets can be pulled by the host from the card with one MMC/SDIO
  transfer. This Depends on settings in the REG_RXDMA_AGG_PG_TH
  register (BIT_RXDMA_AGG_PG_TH limits the number of packets that will
  be aggregated, BIT_DMA_AGG_TO_V1 configures a timeout for aggregation
  and BIT_EN_PRE_CALC makes the chip honor the limits more effectively)

Use multiple consecutive reads in rtw_sdio_read_port() and limit the
number of bytes which are copied by the host from the card in one
MMC/SDIO transfer. This allows receiving a buffer that's larger than
the hosts max_req_size (number of bytes which can be transferred in
one MMC/SDIO transfer). As a result of this the skb_over_panic error
is gone as the rtw88 driver is now able to receive more than 1536 bytes
from the card (either because the incoming packet is larger than that
or because multiple packets have been aggregated).

In case of an receive errors (-EILSEQ has been observed by Lukas) we
need to drain the remaining data from the card's buffer, otherwise the
card will return corrupt data for the next rtw_sdio_read_port() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52611/">CVE-2023-52611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52611">CVE-2023-52611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221611">SUSE bug 1221611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52612" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: scomp - fix req-&gt;dst buffer overflow

The req-&gt;dst buffer size should be checked before copying from the
scomp_scratch-&gt;dst to avoid req-&gt;dst buffer overflow problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221616">SUSE bug 1221616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52613" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52613" ref_url="https://www.suse.com/security/cve/CVE-2023-52613" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/thermal/loongson2_thermal: Fix incorrect PTR_ERR() judgment

PTR_ERR() returns -ENODEV when thermal-zones are undefined, and we need
-ENODEV as the right value for comparison.

Otherwise, tz-&gt;type is NULL when thermal-zones is undefined, resulting
in the following error:

[   12.290030] CPU 1 Unable to handle kernel paging request at virtual address fffffffffffffff1, era == 900000000355f410, ra == 90000000031579b8
[   12.302877] Oops[#1]:
[   12.305190] CPU: 1 PID: 181 Comm: systemd-udevd Not tainted 6.6.0-rc7+ #5385
[   12.312304] pc 900000000355f410 ra 90000000031579b8 tp 90000001069e8000 sp 90000001069eba10
[   12.320739] a0 0000000000000000 a1 fffffffffffffff1 a2 0000000000000014 a3 0000000000000001
[   12.329173] a4 90000001069eb990 a5 0000000000000001 a6 0000000000001001 a7 900000010003431c
[   12.337606] t0 fffffffffffffff1 t1 54567fd5da9b4fd4 t2 900000010614ec40 t3 00000000000dc901
[   12.346041] t4 0000000000000000 t5 0000000000000004 t6 900000010614ee20 t7 900000000d00b790
[   12.354472] t8 00000000000dc901 u0 54567fd5da9b4fd4 s9 900000000402ae10 s0 900000010614ec40
[   12.362916] s1 90000000039fced0 s2 ffffffffffffffed s3 ffffffffffffffed s4 9000000003acc000
[   12.362931] s5 0000000000000004 s6 fffffffffffff000 s7 0000000000000490 s8 90000001028b2ec8
[   12.362938]    ra: 90000000031579b8 thermal_add_hwmon_sysfs+0x258/0x300
[   12.386411]   ERA: 900000000355f410 strscpy+0xf0/0x160
[   12.391626]  CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
[   12.397898]  PRMD: 00000004 (PPLV0 +PIE -PWE)
[   12.403678]  EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
[   12.409859]  ECFG: 00071c1c (LIE=2-4,10-12 VS=7)
[   12.415882] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
[   12.415907]  BADV: fffffffffffffff1
[   12.415911]  PRID: 0014a000 (Loongson-64bit, Loongson-2K1000)
[   12.415917] Modules linked in: loongson2_thermal(+) vfat fat uio_pdrv_genirq uio fuse zram zsmalloc
[   12.415950] Process systemd-udevd (pid: 181, threadinfo=00000000358b9718, task=00000000ace72fe3)
[   12.415961] Stack : 0000000000000dc0 54567fd5da9b4fd4 900000000402ae10 9000000002df9358
[   12.415982]         ffffffffffffffed 0000000000000004 9000000107a10aa8 90000001002a3410
[   12.415999]         ffffffffffffffed ffffffffffffffed 9000000107a11268 9000000003157ab0
[   12.416016]         9000000107a10aa8 ffffff80020fc0c8 90000001002a3410 ffffffffffffffed
[   12.416032]         0000000000000024 ffffff80020cc1e8 900000000402b2a0 9000000003acc000
[   12.416048]         90000001002a3410 0000000000000000 ffffff80020f4030 90000001002a3410
[   12.416065]         0000000000000000 9000000002df6808 90000001002a3410 0000000000000000
[   12.416081]         ffffff80020f4030 0000000000000000 90000001002a3410 9000000002df2ba8
[   12.416097]         00000000000000b4 90000001002a34f4 90000001002a3410 0000000000000002
[   12.416114]         ffffff80020f4030 fffffffffffffff0 90000001002a3410 9000000002df2f30
[   12.416131]         ...
[   12.416138] Call Trace:
[   12.416142] [&lt;900000000355f410&gt;] strscpy+0xf0/0x160
[   12.416167] [&lt;90000000031579b8&gt;] thermal_add_hwmon_sysfs+0x258/0x300
[   12.416183] [&lt;9000000003157ab0&gt;] devm_thermal_add_hwmon_sysfs+0x50/0xe0
[   12.416200] [&lt;ffffff80020cc1e8&gt;] loongson2_thermal_probe+0x128/0x200 [loongson2_thermal]
[   12.416232] [&lt;9000000002df6808&gt;] platform_probe+0x68/0x140
[   12.416249] [&lt;9000000002df2ba8&gt;] really_probe+0xc8/0x3c0
[   12.416269] [&lt;9000000002df2f30&gt;] __driver_probe_device+0x90/0x180
[   12.416286] [&lt;9000000002df3058&gt;] driver_probe_device+0x38/0x160
[   12.416302] [&lt;9000000002df33a8&gt;] __driver_attach+0xa8/0x200
[   12.416314] [&lt;9000000002deffec&gt;] bus_for_each_dev+0x8c/0x120
[   12.416330] [&lt;9000000002df198c&gt;] bus_add_driver+0x10c/0x2a0
[   12.416346] [&lt;9000000002df46b4&gt;] driver_register+0x74/0x160
[   12.416358] [&lt;90000000022201a4&gt;] do_one_initcall+0x84/0x220
[   12.416372] [&lt;90000000022f3ab8&gt;] do_init_module+0x58/0x2c0
[
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52613/">CVE-2023-52613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52613">CVE-2023-52613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221619">SUSE bug 1221619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52614" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Fix buffer overflow in trans_stat_show

Fix buffer overflow in trans_stat_show().

Convert simple snprintf to the more secure scnprintf with size of
PAGE_SIZE.

Add condition checking if we are exceeding PAGE_SIZE and exit early from
loop. Also add at the end a warning that we exceeded PAGE_SIZE and that
stats is disabled.

Return -EFBIG in the case where we don't have enough space to write the
full transition table.

Also document in the ABI that this function can return -EFBIG error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221617">SUSE bug 1221617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwrng: core - Fix page fault dead lock on mmap-ed hwrng

There is a dead-lock in the hwrng device read path.  This triggers
when the user reads from /dev/hwrng into memory also mmap-ed from
/dev/hwrng.  The resulting page fault triggers a recursive read
which then dead-locks.

Fix this by using a stack buffer when calling copy_to_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-12-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221614">SUSE bug 1221614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52616" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: lib/mpi - Fix unexpected pointer access in mpi_ec_init

When the mpi_ec_ctx structure is initialized, some fields are not
cleared, causing a crash when referencing the field when the
structure was released. Initially, this issue was ignored because
memory for mpi_ec_ctx is allocated with the __GFP_ZERO flag.
For example, this error will be triggered when calculating the
Za value for SM2 separately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52617" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: switchtec: Fix stdev_release() crash after surprise hot remove

A PCI device hot removal may occur while stdev-&gt;cdev is held open. The call
to stdev_release() then happens during close or exit, at a point way past
switchtec_pci_remove(). Otherwise the last ref would vanish with the
trailing put_device(), just before return.

At that later point in time, the devm cleanup has already removed the
stdev-&gt;mmio_mrpc mapping. Also, the stdev-&gt;pdev reference was not a counted
one. Therefore, in DMA mode, the iowrite32() in stdev_release() will cause
a fatal page fault, and the subsequent dma_free_coherent(), if reached,
would pass a stale &amp;stdev-&gt;pdev-&gt;dev pointer.

Fix by moving MRPC DMA shutdown into switchtec_pci_remove(), after
stdev_kill(). Counting the stdev-&gt;pdev ref is now optional, but may prevent
future accidents.

Reproducible via the script at
https://lore.kernel.org/r/20231113212150.96410-1-dns@arista.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221613">SUSE bug 1221613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52618" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block/rnbd-srv: Check for unlikely string overflow

Since "dev_search_path" can technically be as large as PATH_MAX,
there was a risk of truncation when copying it and a second string
into "full_path" since it was also PATH_MAX sized. The W=1 builds were
reporting this warning:

drivers/block/rnbd/rnbd-srv.c: In function 'process_msg_open.isra':
drivers/block/rnbd/rnbd-srv.c:616:51: warning: '%s' directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=]
  616 |                 snprintf(full_path, PATH_MAX, "%s/%s",
      |                                                   ^~
In function 'rnbd_srv_get_full_path',
    inlined from 'process_msg_open.isra' at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: 'snprintf' output between 2 and 4351 bytes into a destination of size 4096
  616 |                 snprintf(full_path, PATH_MAX, "%s/%s",
      |                 ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  617 |                          dev_search_path, dev_name);
      |                          ~~~~~~~~~~~~~~~~~~~~~~~~~~

To fix this, unconditionally check for truncation (as was already done
for the case where "%SESSNAME%" was present).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221615">SUSE bug 1221615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52619" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/ram: Fix crash when setting number of cpus to an odd number

When the number of cpu cores is adjusted to 7 or other odd numbers,
the zone size will become an odd number.
The address of the zone will become:
    addr of zone0 = BASE
    addr of zone1 = BASE + zone_size
    addr of zone2 = BASE + zone_size*2
    ...
The address of zone1/3/5/7 will be mapped to non-alignment va.
Eventually crashes will occur when accessing these va.

So, use ALIGN_DOWN() to make sure the zone size is even
to avoid this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221618">SUSE bug 1221618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow timeout for anonymous sets

Never used from userspace, disallow these parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221825">SUSE bug 1221825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52621" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers

These three bpf_map_{lookup,update,delete}_elem() helpers are also
available for sleepable bpf program, so add the corresponding lock
assertion for sleepable bpf program, otherwise the following warning
will be reported when a sleepable bpf program manipulates bpf map under
interpreter mode (aka bpf_jit_enable=0):

  WARNING: CPU: 3 PID: 4985 at kernel/bpf/helpers.c:40 ......
  CPU: 3 PID: 4985 Comm: test_progs Not tainted 6.6.0+ #2
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:bpf_map_lookup_elem+0x54/0x60
  ......
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0xa5/0x240
   ? bpf_map_lookup_elem+0x54/0x60
   ? report_bug+0x1ba/0x1f0
   ? handle_bug+0x40/0x80
   ? exc_invalid_op+0x18/0x50
   ? asm_exc_invalid_op+0x1b/0x20
   ? __pfx_bpf_map_lookup_elem+0x10/0x10
   ? rcu_lockdep_current_cpu_online+0x65/0xb0
   ? rcu_is_watching+0x23/0x50
   ? bpf_map_lookup_elem+0x54/0x60
   ? __pfx_bpf_map_lookup_elem+0x10/0x10
   ___bpf_prog_run+0x513/0x3b70
   __bpf_prog_run32+0x9d/0xd0
   ? __bpf_prog_enter_sleepable_recur+0xad/0x120
   ? __bpf_prog_enter_sleepable_recur+0x3e/0x120
   bpf_trampoline_6442580665+0x4d/0x1000
   __x64_sys_getpgid+0x5/0x30
   ? do_syscall_64+0x36/0xb0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-29"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid online resizing failures due to oversized flex bg

When we online resize an ext4 filesystem with a oversized flexbg_size,

     mkfs.ext4 -F -G 67108864 $dev -b 4096 100M
     mount $dev $dir
     resize2fs $dev 16G

the following WARN_ON is triggered:
==================================================================
WARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550
Modules linked in: sg(E)
CPU: 0 PID: 427 Comm: resize2fs Tainted: G  E  6.6.0-rc5+ #314
RIP: 0010:__alloc_pages+0x411/0x550
Call Trace:
 &lt;TASK&gt;
 __kmalloc_large_node+0xa2/0x200
 __kmalloc+0x16e/0x290
 ext4_resize_fs+0x481/0xd80
 __ext4_ioctl+0x1616/0x1d90
 ext4_ioctl+0x12/0x20
 __x64_sys_ioctl+0xf0/0x150
 do_syscall_64+0x3b/0x90
==================================================================

This is because flexbg_size is too large and the size of the new_group_data
array to be allocated exceeds MAX_ORDER. Currently, the minimum value of
MAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding
maximum number of groups that can be allocated is:

 (PAGE_SIZE &lt;&lt; MAX_ORDER) / sizeof(struct ext4_new_group_data) ~ 21845

And the value that is down-aligned to the power of 2 is 16384. Therefore,
this value is defined as MAX_RESIZE_BG, and the number of groups added
each time does not exceed this value during resizing, and is added multiple
times to complete the online resizing. The difference is that the metadata
in a flex_bg may be more dispersed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222080">SUSE bug 1222080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix a suspicious RCU usage warning

I received the following warning while running cthon against an ontap
server running pNFS:

[   57.202521] =============================
[   57.202522] WARNING: suspicious RCU usage
[   57.202523] 6.7.0-rc3-g2cc14f52aeb7 #41492 Not tainted
[   57.202525] -----------------------------
[   57.202525] net/sunrpc/xprtmultipath.c:349 RCU-list traversed in non-reader section!!
[   57.202527]
               other info that might help us debug this:

[   57.202528]
               rcu_scheduler_active = 2, debug_locks = 1
[   57.202529] no locks held by test5/3567.
[   57.202530]
               stack backtrace:
[   57.202532] CPU: 0 PID: 3567 Comm: test5 Not tainted 6.7.0-rc3-g2cc14f52aeb7 #41492 5b09971b4965c0aceba19f3eea324a4a806e227e
[   57.202534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 2/2/2022
[   57.202536] Call Trace:
[   57.202537]  &lt;TASK&gt;
[   57.202540]  dump_stack_lvl+0x77/0xb0
[   57.202551]  lockdep_rcu_suspicious+0x154/0x1a0
[   57.202556]  rpc_xprt_switch_has_addr+0x17c/0x190 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202596]  rpc_clnt_setup_test_and_add_xprt+0x50/0x180 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202621]  ? rpc_clnt_add_xprt+0x254/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202646]  rpc_clnt_add_xprt+0x27a/0x300 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202671]  ? __pfx_rpc_clnt_setup_test_and_add_xprt+0x10/0x10 [sunrpc ebe02571b9a8ceebf7d98e71675af20c19bdb1f6]
[   57.202696]  nfs4_pnfs_ds_connect+0x345/0x760 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202728]  ? __pfx_nfs4_test_session_trunk+0x10/0x10 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202754]  nfs4_fl_prepare_ds+0x75/0xc0 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]
[   57.202760]  filelayout_write_pagelist+0x4a/0x200 [nfs_layout_nfsv41_files e3a4187f18ae8a27b630f9feae6831b584a9360a]
[   57.202765]  pnfs_generic_pg_writepages+0xbe/0x230 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202788]  __nfs_pageio_add_request+0x3fd/0x520 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202813]  nfs_pageio_add_request+0x18b/0x390 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202831]  nfs_do_writepage+0x116/0x1e0 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202849]  nfs_writepages_callback+0x13/0x30 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202866]  write_cache_pages+0x265/0x450
[   57.202870]  ? __pfx_nfs_writepages_callback+0x10/0x10 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202891]  nfs_writepages+0x141/0x230 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202913]  do_writepages+0xd2/0x230
[   57.202917]  ? filemap_fdatawrite_wbc+0x5c/0x80
[   57.202921]  filemap_fdatawrite_wbc+0x67/0x80
[   57.202924]  filemap_write_and_wait_range+0xd9/0x170
[   57.202930]  nfs_wb_all+0x49/0x180 [nfs 6c976fa593a7c2976f5a0aeb4965514a828e6902]
[   57.202947]  nfs4_file_flush+0x72/0xb0 [nfsv4 c716d88496ded0ea6d289bbea684fa996f9b57a9]
[   57.202969]  __se_sys_close+0x46/0xd0
[   57.202972]  do_syscall_64+0x68/0x100
[   57.202975]  ? do_syscall_64+0x77/0x100
[   57.202976]  ? do_syscall_64+0x77/0x100
[   57.202979]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[   57.202982] RIP: 0033:0x7fe2b12e4a94
[   57.202985] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 18 0e 00 00 74 13 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 44 c3 0f 1f 00 48 83 ec 18 89 7c 24 0c e8 c3
[   57.202987] RSP: 002b:00007ffe857ddb38 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
[   57.202989] RAX: ffffffffffffffda RBX: 00007ffe857dfd68 RCX: 00007fe2b12e4a94
[   57.202991] RDX: 0000000000002000 RSI: 00007ffe857ddc40 RDI: 0000000000000003
[   57.202992] RBP: 00007ffe857dfc50 R08: 7fffffffffffffff R09: 0000000065650f49
[   57.202993] R10: 00007f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222060">SUSE bug 1222060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52624" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52624" ref_url="https://www.suse.com/security/cve/CVE-2023-52624" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Wake DMCUB before executing GPINT commands

[Why]
DMCUB can be in idle when we attempt to interface with the HW through
the GPINT mailbox resulting in a system hang.

[How]
Add dc_wake_and_execute_gpint() to wrap the wake, execute, sleep
sequence.

If the GPINT executes successfully then DMCUB will be put back into
sleep after the optional response is returned.

It functions similar to the inbox command interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52624/">CVE-2023-52624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52624">CVE-2023-52624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222083">SUSE bug 1222083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52625" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52625" ref_url="https://www.suse.com/security/cve/CVE-2023-52625" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Refactor DMCUB enter/exit idle interface

[Why]
We can hang in place trying to send commands when the DMCUB isn't
powered on.

[How]
We need to exit out of the idle state prior to sending a command,
but the process that performs the exit also invokes a command itself.

Fixing this issue involves the following:

1. Using a software state to track whether or not we need to start
   the process to exit idle or notify idle.

It's possible for the hardware to have exited an idle state without
driver knowledge, but entering one is always restricted to a driver
allow - which makes the SW state vs HW state mismatch issue purely one
of optimization, which should seldomly be hit, if at all.

2. Refactor any instances of exit/notify idle to use a single wrapper
   that maintains this SW state.

This works simialr to dc_allow_idle_optimizations, but works at the
DMCUB level and makes sure the state is marked prior to any notify/exit
idle so we don't enter an infinite loop.

3. Make sure we exit out of idle prior to sending any commands or
   waiting for DMCUB idle.

This patch takes care of 1/2. A future patch will take care of wrapping
DMCUB command submission with calls to this new interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52625/">CVE-2023-52625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52625">CVE-2023-52625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222085">SUSE bug 1222085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52626" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52626" ref_url="https://www.suse.com/security/cve/CVE-2023-52626" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context

Indirection (*) is of lower precedence than postfix increment (++). Logic
in napi_poll context would cause an out-of-bound read by first increment
the pointer address by byte address space and then dereference the value.
Rather, the intended logic was to dereference first and then increment the
underlying value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52626/">CVE-2023-52626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52626">CVE-2023-52626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222054">SUSE bug 1222054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52627" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7091r: Allow users to configure device events

AD7091R-5 devices are supported by the ad7091r-5 driver together with
the ad7091r-base driver. Those drivers declared iio events for notifying
user space when ADC readings fall bellow the thresholds of low limit
registers or above the values set in high limit registers.
However, to configure iio events and their thresholds, a set of callback
functions must be implemented and those were not present until now.
The consequence of trying to configure ad7091r-5 events without the
proper callback functions was a null pointer dereference in the kernel
because the pointers to the callback functions were not set.

Implement event configuration callbacks allowing users to read/write
event thresholds and enable/disable event generation.

Since the event spec structs are generic to AD7091R devices, also move
those from the ad7091r-5 driver the base driver so they can be reused
when support for ad7091r-2/-4/-8 be added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222051">SUSE bug 1222051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52629" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52629" ref_url="https://www.suse.com/security/cve/CVE-2023-52629" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sh: push-switch: Reorder cleanup operations to avoid use-after-free bug

The original code puts flush_work() before timer_shutdown_sync()
in switch_drv_remove(). Although we use flush_work() to stop
the worker, it could be rescheduled in switch_timer(). As a result,
a use-after-free bug can occur. The details are shown below:

      (cpu 0)                    |      (cpu 1)
switch_drv_remove()              |
 flush_work()                    |
  ...                            |  switch_timer // timer
                                 |   schedule_work(&amp;psw-&gt;work)
 timer_shutdown_sync()           |
 ...                             |  switch_work_handler // worker
 kfree(psw) // free              |
                                 |   psw-&gt;state = 0 // use

This patch puts timer_shutdown_sync() before flush_work() to
mitigate the bugs. As a result, the worker and timer will be
stopped safely before the deallocate operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52629/">CVE-2023-52629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52629">CVE-2023-52629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222231">SUSE bug 1222231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52630" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52630" ref_url="https://www.suse.com/security/cve/CVE-2023-52630" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52630/">CVE-2023-52630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52630">CVE-2023-52630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222270">SUSE bug 1222270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52631" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52631" ref_url="https://www.suse.com/security/cve/CVE-2023-52631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix an NULL dereference bug

The issue here is when this is called from ntfs_load_attr_list().  The
"size" comes from le32_to_cpu(attr-&gt;res.data_size) so it can't overflow
on a 64bit systems but on 32bit systems the "+ 1023" can overflow and
the result is zero.  This means that the kmalloc will succeed by
returning the ZERO_SIZE_PTR and then the memcpy() will crash with an
Oops on the next line.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52631/">CVE-2023-52631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52631">CVE-2023-52631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222264">SUSE bug 1222264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52632" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix lock dependency warning with srcu

======================================================
WARNING: possible circular locking dependency detected
6.5.0-kfd-yangp #2289 Not tainted
------------------------------------------------------
kworker/0:2/996 is trying to acquire lock:
        (srcu){.+.+}-{0:0}, at: __synchronize_srcu+0x5/0x1a0

but task is already holding lock:
        ((work_completion)(&amp;svms-&gt;deferred_list_work)){+.+.}-{0:0}, at:
	process_one_work+0x211/0x560

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #3 ((work_completion)(&amp;svms-&gt;deferred_list_work)){+.+.}-{0:0}:
        __flush_work+0x88/0x4f0
        svm_range_list_lock_and_flush_work+0x3d/0x110 [amdgpu]
        svm_range_set_attr+0xd6/0x14c0 [amdgpu]
        kfd_ioctl+0x1d1/0x630 [amdgpu]
        __x64_sys_ioctl+0x88/0xc0

-&gt; #2 (&amp;info-&gt;lock#2){+.+.}-{3:3}:
        __mutex_lock+0x99/0xc70
        amdgpu_amdkfd_gpuvm_restore_process_bos+0x54/0x740 [amdgpu]
        restore_process_helper+0x22/0x80 [amdgpu]
        restore_process_worker+0x2d/0xa0 [amdgpu]
        process_one_work+0x29b/0x560
        worker_thread+0x3d/0x3d0

-&gt; #1 ((work_completion)(&amp;(&amp;process-&gt;restore_work)-&gt;work)){+.+.}-{0:0}:
        __flush_work+0x88/0x4f0
        __cancel_work_timer+0x12c/0x1c0
        kfd_process_notifier_release_internal+0x37/0x1f0 [amdgpu]
        __mmu_notifier_release+0xad/0x240
        exit_mmap+0x6a/0x3a0
        mmput+0x6a/0x120
        do_exit+0x322/0xb90
        do_group_exit+0x37/0xa0
        __x64_sys_exit_group+0x18/0x20
        do_syscall_64+0x38/0x80

-&gt; #0 (srcu){.+.+}-{0:0}:
        __lock_acquire+0x1521/0x2510
        lock_sync+0x5f/0x90
        __synchronize_srcu+0x4f/0x1a0
        __mmu_notifier_release+0x128/0x240
        exit_mmap+0x6a/0x3a0
        mmput+0x6a/0x120
        svm_range_deferred_list_work+0x19f/0x350 [amdgpu]
        process_one_work+0x29b/0x560
        worker_thread+0x3d/0x3d0

other info that might help us debug this:
Chain exists of:
  srcu --&gt; &amp;info-&gt;lock#2 --&gt; (work_completion)(&amp;svms-&gt;deferred_list_work)

Possible unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
        lock((work_completion)(&amp;svms-&gt;deferred_list_work));
                        lock(&amp;info-&gt;lock#2);
			lock((work_completion)(&amp;svms-&gt;deferred_list_work));
        sync(srcu);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222274">SUSE bug 1222274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52633" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52633" ref_url="https://www.suse.com/security/cve/CVE-2023-52633" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: time-travel: fix time corruption

In 'basic' time-travel mode (without =inf-cpu or =ext), we
still get timer interrupts. These can happen at arbitrary
points in time, i.e. while in timer_read(), which pushes
time forward just a little bit. Then, if we happen to get
the interrupt after calculating the new time to push to,
but before actually finishing that, the interrupt will set
the time to a value that's incompatible with the forward,
and we'll crash because time goes backwards when we do the
forwarding.

Fix this by reading the time_travel_time, calculating the
adjustment, and doing the adjustment all with interrupts
disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52633/">CVE-2023-52633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52633">CVE-2023-52633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222263">SUSE bug 1222263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52634" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52634" ref_url="https://www.suse.com/security/cve/CVE-2023-52634" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix disable_otg_wa logic

[Why]
When switching to another HDMI mode, we are unnecesarilly
disabling/enabling FIFO causing both HPO and DIG registers to be set at
the same time when only HPO is supposed to be set.

This can lead to a system hang the next time we change refresh rates as
there are cases when we don't disable OTG/FIFO but FIFO is enabled when
it isn't supposed to be.

[How]
Removing the enable/disable FIFO entirely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52634/">CVE-2023-52634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52634">CVE-2023-52634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222278">SUSE bug 1222278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52635" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Synchronize devfreq_monitor_[start/stop]

There is a chance if a frequent switch of the governor
done in a loop result in timer list corruption where
timer cancel being done from two place one from
cancel_delayed_work_sync() and followed by expire_timers()
can be seen from the traces[1].

while true
do
        echo "simple_ondemand" &gt; /sys/class/devfreq/1d84000.ufshc/governor
        echo "performance" &gt; /sys/class/devfreq/1d84000.ufshc/governor
done

It looks to be issue with devfreq driver where
device_monitor_[start/stop] need to synchronized so that
delayed work should get corrupted while it is either
being queued or running or being cancelled.

Let's use polling flag and devfreq lock to synchronize the
queueing the timer instance twice and work data being
corrupted.

[1]
...
..
&lt;idle&gt;-0    [003]   9436.209662:  timer_cancel   timer=0xffffff80444f0428
&lt;idle&gt;-0    [003]   9436.209664:  timer_expire_entry   timer=0xffffff80444f0428  now=0x10022da1c  function=__typeid__ZTSFvP10timer_listE_global_addr  baseclk=0x10022da1c
&lt;idle&gt;-0    [003]   9436.209718:  timer_expire_exit   timer=0xffffff80444f0428
kworker/u16:6-14217    [003]   9436.209863:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2b  now=0x10022da1c  flags=182452227
vendor.xxxyyy.ha-1593    [004]   9436.209888:  timer_cancel   timer=0xffffff80444f0428
vendor.xxxyyy.ha-1593    [004]   9436.216390:  timer_init   timer=0xffffff80444f0428
vendor.xxxyyy.ha-1593    [004]   9436.216392:  timer_start   timer=0xffffff80444f0428  function=__typeid__ZTSFvP10timer_listE_global_addr  expires=0x10022da2c  now=0x10022da1d  flags=186646532
vendor.xxxyyy.ha-1593    [005]   9436.220992:  timer_cancel   timer=0xffffff80444f0428
xxxyyyTraceManag-7795    [004]   9436.261641:  timer_cancel   timer=0xffffff80444f0428

[2]

 9436.261653][    C4] Unable to handle kernel paging request at virtual address dead00000000012a
[ 9436.261664][    C4] Mem abort info:
[ 9436.261666][    C4]   ESR = 0x96000044
[ 9436.261669][    C4]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 9436.261671][    C4]   SET = 0, FnV = 0
[ 9436.261673][    C4]   EA = 0, S1PTW = 0
[ 9436.261675][    C4] Data abort info:
[ 9436.261677][    C4]   ISV = 0, ISS = 0x00000044
[ 9436.261680][    C4]   CM = 0, WnR = 1
[ 9436.261682][    C4] [dead00000000012a] address between user and kernel address ranges
[ 9436.261685][    C4] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[ 9436.261701][    C4] Skip md ftrace buffer dump for: 0x3a982d0
...

[ 9436.262138][    C4] CPU: 4 PID: 7795 Comm: TraceManag Tainted: G S      W  O      5.10.149-android12-9-o-g17f915d29d0c #1
[ 9436.262141][    C4] Hardware name: Qualcomm Technologies, Inc.  (DT)
[ 9436.262144][    C4] pstate: 22400085 (nzCv daIf +PAN -UAO +TCO BTYPE=--)
[ 9436.262161][    C4] pc : expire_timers+0x9c/0x438
[ 9436.262164][    C4] lr : expire_timers+0x2a4/0x438
[ 9436.262168][    C4] sp : ffffffc010023dd0
[ 9436.262171][    C4] x29: ffffffc010023df0 x28: ffffffd0636fdc18
[ 9436.262178][    C4] x27: ffffffd063569dd0 x26: ffffffd063536008
[ 9436.262182][    C4] x25: 0000000000000001 x24: ffffff88f7c69280
[ 9436.262185][    C4] x23: 00000000000000e0 x22: dead000000000122
[ 9436.262188][    C4] x21: 000000010022da29 x20: ffffff8af72b4e80
[ 9436.262191][    C4] x19: ffffffc010023e50 x18: ffffffc010025038
[ 9436.262195][    C4] x17: 0000000000000240 x16: 0000000000000201
[ 9436.262199][    C4] x15: ffffffffffffffff x14: ffffff889f3c3100
[ 9436.262203][    C4] x13: ffffff889f3c3100 x12: 00000000049f56b8
[ 9436.262207][    C4] x11: 00000000049f56b8 x10: 00000000ffffffff
[ 9436.262212][    C4] x9 : ffffffc010023e50 x8 : dead000000000122
[ 9436.262216][    C4] x7 : ffffffffffffffff x6 : ffffffc0100239d8
[ 9436.262220][    C4] x5 : 0000000000000000 x4 : 0000000000000101
[ 9436.262223][    C4] x3 : 0000000000000080 x2 : ffffff8
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222294">SUSE bug 1222294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52636" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: just wait for more data to be available on the socket

A short read may occur while reading the message footer from the
socket.  Later, when the socket is ready for another read, the
messenger invokes all read_partial_*() handlers, including
read_partial_sparse_msg_data().  The expectation is that
read_partial_sparse_msg_data() would bail, allowing the messenger to
invoke read_partial() for the footer and pick up where it left off.

However read_partial_sparse_msg_data() violates that and ends up
calling into the state machine in the OSD client.  The sparse-read
state machine assumes that it's a new op and interprets some piece of
the footer as the sparse-read header and returns bogus extents/data
length, etc.

To determine whether read_partial_sparse_msg_data() should bail, let's
reuse cursor-&gt;total_resid.  Because once it reaches to zero that means
all the extents and data have been successfully received in last read,
else it could break out when partially reading any of the extents and
data.  And then osd_sparse_read() could continue where it left off.

[ idryomov: changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222247">SUSE bug 1222247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52637" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)

Lock jsk-&gt;sk to prevent UAF when setsockopt(..., SO_J1939_FILTER, ...)
modifies jsk-&gt;filters while receiving packets.

Following trace was seen on affected system:
 ==================================================================
 BUG: KASAN: slab-use-after-free in j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
 Read of size 4 at addr ffff888012144014 by task j1939/350

 CPU: 0 PID: 350 Comm: j1939 Tainted: G        W  OE      6.5.0-rc5 #1
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
 Call Trace:
  print_report+0xd3/0x620
  ? kasan_complete_mode_report_info+0x7d/0x200
  ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
  kasan_report+0xc2/0x100
  ? j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
  __asan_load4+0x84/0xb0
  j1939_sk_recv_match_one+0x1af/0x2d0 [can_j1939]
  j1939_sk_recv+0x20b/0x320 [can_j1939]
  ? __kasan_check_write+0x18/0x20
  ? __pfx_j1939_sk_recv+0x10/0x10 [can_j1939]
  ? j1939_simple_recv+0x69/0x280 [can_j1939]
  ? j1939_ac_recv+0x5e/0x310 [can_j1939]
  j1939_can_recv+0x43f/0x580 [can_j1939]
  ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939]
  ? raw_rcv+0x42/0x3c0 [can_raw]
  ? __pfx_j1939_can_recv+0x10/0x10 [can_j1939]
  can_rcv_filter+0x11f/0x350 [can]
  can_receive+0x12f/0x190 [can]
  ? __pfx_can_rcv+0x10/0x10 [can]
  can_rcv+0xdd/0x130 [can]
  ? __pfx_can_rcv+0x10/0x10 [can]
  __netif_receive_skb_one_core+0x13d/0x150
  ? __pfx___netif_receive_skb_one_core+0x10/0x10
  ? __kasan_check_write+0x18/0x20
  ? _raw_spin_lock_irq+0x8c/0xe0
  __netif_receive_skb+0x23/0xb0
  process_backlog+0x107/0x260
  __napi_poll+0x69/0x310
  net_rx_action+0x2a1/0x580
  ? __pfx_net_rx_action+0x10/0x10
  ? __pfx__raw_spin_lock+0x10/0x10
  ? handle_irq_event+0x7d/0xa0
  __do_softirq+0xf3/0x3f8
  do_softirq+0x53/0x80
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  __local_bh_enable_ip+0x6e/0x70
  netif_rx+0x16b/0x180
  can_send+0x32b/0x520 [can]
  ? __pfx_can_send+0x10/0x10 [can]
  ? __check_object_size+0x299/0x410
  raw_sendmsg+0x572/0x6d0 [can_raw]
  ? __pfx_raw_sendmsg+0x10/0x10 [can_raw]
  ? apparmor_socket_sendmsg+0x2f/0x40
  ? __pfx_raw_sendmsg+0x10/0x10 [can_raw]
  sock_sendmsg+0xef/0x100
  sock_write_iter+0x162/0x220
  ? __pfx_sock_write_iter+0x10/0x10
  ? __rtnl_unlock+0x47/0x80
  ? security_file_permission+0x54/0x320
  vfs_write+0x6ba/0x750
  ? __pfx_vfs_write+0x10/0x10
  ? __fget_light+0x1ca/0x1f0
  ? __rcu_read_unlock+0x5b/0x280
  ksys_write+0x143/0x170
  ? __pfx_ksys_write+0x10/0x10
  ? __kasan_check_read+0x15/0x20
  ? fpregs_assert_state_consistent+0x62/0x70
  __x64_sys_write+0x47/0x60
  do_syscall_64+0x60/0x90
  ? do_syscall_64+0x6d/0x90
  ? irqentry_exit+0x3f/0x50
  ? exc_page_fault+0x79/0xf0
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

 Allocated by task 348:
  kasan_save_stack+0x2a/0x50
  kasan_set_track+0x29/0x40
  kasan_save_alloc_info+0x1f/0x30
  __kasan_kmalloc+0xb5/0xc0
  __kmalloc_node_track_caller+0x67/0x160
  j1939_sk_setsockopt+0x284/0x450 [can_j1939]
  __sys_setsockopt+0x15c/0x2f0
  __x64_sys_setsockopt+0x6b/0x80
  do_syscall_64+0x60/0x90
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

 Freed by task 349:
  kasan_save_stack+0x2a/0x50
  kasan_set_track+0x29/0x40
  kasan_save_free_info+0x2f/0x50
  __kasan_slab_free+0x12e/0x1c0
  __kmem_cache_free+0x1b9/0x380
  kfree+0x7a/0x120
  j1939_sk_setsockopt+0x3b2/0x450 [can_j1939]
  __sys_setsockopt+0x15c/0x2f0
  __x64_sys_setsockopt+0x6b/0x80
  do_syscall_64+0x60/0x90
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222291">SUSE bug 1222291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52638" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52638" ref_url="https://www.suse.com/security/cve/CVE-2023-52638" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock

The following 3 locks would race against each other, causing the
deadlock situation in the Syzbot bug report:

- j1939_socks_lock
- active_session_list_lock
- sk_session_queue_lock

A reasonable fix is to change j1939_socks_lock to an rwlock, since in
the rare situations where a write lock is required for the linked list
that j1939_socks_lock is protecting, the code does not attempt to
acquire any more locks. This would break the circular lock dependency,
where, for example, the current thread already locks j1939_socks_lock
and attempts to acquire sk_session_queue_lock, and at the same time,
another thread attempts to acquire j1939_socks_lock while holding
sk_session_queue_lock.

NOTE: This patch along does not fix the unregister_netdevice bug
reported by Syzbot; instead, it solves a deadlock situation to prepare
for one or more further patches to actually fix the Syzbot bug, which
appears to be a reference counting problem within the j1939 codebase.

[mkl: remove unrelated newline change]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52638/">CVE-2023-52638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222299">SUSE bug 1222299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52639" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: vsie: fix race during shadow creation

Right now it is possible to see gmap-&gt;private being zero in
kvm_s390_vsie_gmap_notifier resulting in a crash.  This is due to the
fact that we add gmap-&gt;private == kvm after creation:

static int acquire_gmap_shadow(struct kvm_vcpu *vcpu,
                               struct vsie_page *vsie_page)
{
[...]
        gmap = gmap_shadow(vcpu-&gt;arch.gmap, asce, edat);
        if (IS_ERR(gmap))
                return PTR_ERR(gmap);
        gmap-&gt;private = vcpu-&gt;kvm;

Let children inherit the private field of the parent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222300">SUSE bug 1222300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52640" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52640" ref_url="https://www.suse.com/security/cve/CVE-2023-52640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix oob in ntfs_listxattr

The length of name cannot exceed the space occupied by ea.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52640/">CVE-2023-52640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52640">CVE-2023-52640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222301">SUSE bug 1222301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52641" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52641" ref_url="https://www.suse.com/security/cve/CVE-2023-52641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()

It is preferable to exit through the out: label because
internal debugging functions are located there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52641/">CVE-2023-52641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52641">CVE-2023-52641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222303">SUSE bug 1222303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52642" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rc: bpf attach/detach requires write permission

Note that bpf attach/detach also requires CAP_NET_ADMIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223031">SUSE bug 1223031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52643" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: core: fix memleak in iio_device_register_sysfs

When iio_device_register_sysfs_group() fails, we should
free iio_dev_opaque-&gt;chan_attr_group.attrs to prevent
potential memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222960">SUSE bug 1222960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52644" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled

When QoS is disabled, the queue priority value will not map to the correct
ieee80211 queue since there is only one queue. Stop/wake queue 0 when QoS
is disabled to prevent trying to stop/wake a non-existent queue and failing
to stop/wake the actual queue instantiated.

Log of issue before change (with kernel parameter qos=0):
    [  +5.112651] ------------[ cut here ]------------
    [  +0.000005] WARNING: CPU: 7 PID: 25513 at net/mac80211/util.c:449 __ieee80211_wake_queue+0xd5/0x180 [mac80211]
    [  +0.000067] Modules linked in: b43(O) snd_seq_dummy snd_hrtimer snd_seq snd_seq_device nft_chain_nat xt_MASQUERADE nf_nat xfrm_user xfrm_algo xt_addrtype overlay ccm af_packet amdgpu snd_hda_codec_cirrus snd_hda_codec_generic ledtrig_audio drm_exec amdxcp gpu_sched xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_rpfilter ipt_rpfilter xt_pkttype xt_LOG nf_log_syslog xt_tcpudp nft_compat nf_tables nfnetlink sch_fq_codel btusb uinput iTCO_wdt ctr btrtl intel_pmc_bxt i915 intel_rapl_msr mei_hdcp mei_pxp joydev at24 watchdog btintel atkbd libps2 serio radeon btbcm vivaldi_fmap btmtk intel_rapl_common snd_hda_codec_hdmi bluetooth uvcvideo nls_iso8859_1 applesmc nls_cp437 x86_pkg_temp_thermal snd_hda_intel intel_powerclamp vfat videobuf2_vmalloc coretemp fat snd_intel_dspcfg crc32_pclmul uvc polyval_clmulni snd_intel_sdw_acpi loop videobuf2_memops snd_hda_codec tun drm_suballoc_helper polyval_generic drm_ttm_helper drm_buddy tap ecdh_generic videobuf2_v4l2 gf128mul macvlan ttm ghash_clmulni_intel ecc tg3
    [  +0.000044]  videodev bridge snd_hda_core rapl crc16 drm_display_helper cec mousedev snd_hwdep evdev intel_cstate bcm5974 hid_appleir videobuf2_common stp mac_hid libphy snd_pcm drm_kms_helper acpi_als mei_me intel_uncore llc mc snd_timer intel_gtt industrialio_triggered_buffer apple_mfi_fastcharge i2c_i801 mei snd lpc_ich agpgart ptp i2c_smbus thunderbolt apple_gmux i2c_algo_bit kfifo_buf video industrialio soundcore pps_core wmi tiny_power_button sbs sbshc button ac cordic bcma mac80211 cfg80211 ssb rfkill libarc4 kvm_intel kvm drm irqbypass fuse backlight firmware_class efi_pstore configfs efivarfs dmi_sysfs ip_tables x_tables autofs4 dm_crypt cbc encrypted_keys trusted asn1_encoder tee tpm rng_core input_leds hid_apple led_class hid_generic usbhid hid sd_mod t10_pi crc64_rocksoft crc64 crc_t10dif crct10dif_generic ahci libahci libata uhci_hcd ehci_pci ehci_hcd crct10dif_pclmul crct10dif_common sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel usbcore scsi_mod libaes crypto_simd cryptd scsi_common
    [  +0.000055]  usb_common rtc_cmos btrfs blake2b_generic libcrc32c crc32c_generic crc32c_intel xor raid6_pq dm_snapshot dm_bufio dm_mod dax [last unloaded: b43(O)]
    [  +0.000009] CPU: 7 PID: 25513 Comm: irq/17-b43 Tainted: G        W  O       6.6.7 #1-NixOS
    [  +0.000003] Hardware name: Apple Inc. MacBookPro8,3/Mac-942459F5819B171B, BIOS 87.0.0.0.0 06/13/2019
    [  +0.000001] RIP: 0010:__ieee80211_wake_queue+0xd5/0x180 [mac80211]
    [  +0.000046] Code: 00 45 85 e4 0f 85 9b 00 00 00 48 8d bd 40 09 00 00 f0 48 0f ba ad 48 09 00 00 00 72 0f 5b 5d 41 5c 41 5d 41 5e e9 cb 6d 3c d0 &lt;0f&gt; 0b 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc 48 8d b4 16 94 00 00
    [  +0.000002] RSP: 0018:ffffc90003c77d60 EFLAGS: 00010097
    [  +0.000001] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 0000000000000000
    [  +0.000001] RDX: 0000000000000000 RSI: 0000000000000002 RDI: ffff88820b924900
    [  +0.000002] RBP: ffff88820b924900 R08: ffffc90003c77d90 R09: 000000000003bfd0
    [  +0.000001] R10: ffff88820b924900 R11: ffffc90003c77c68 R12: 0000000000000000
    [  +0.000001] R13: 0000000000000000 R14: ffffc90003c77d90 R15: ffffffffc0fa6f40
    [  +0.000001] FS:  0000000000000000(0000) GS:ffff88846fb80000(0000) knlGS:0000000000000000
    [  +0.000001] CS:  0010 DS: 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222961">SUSE bug 1222961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52645" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: mediatek: fix race conditions with genpd

If the power domains are registered first with genpd and *after that*
the driver attempts to power them on in the probe sequence, then it is
possible that a race condition occurs if genpd tries to power them on
in the same time.
The same is valid for powering them off before unregistering them
from genpd.
Attempt to fix race conditions by first removing the domains from genpd
and *after that* powering down domains.
Also first power up the domains and *after that* register them
to genpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223033">SUSE bug 1223033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52646" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52646" ref_url="https://www.suse.com/security/cve/CVE-2023-52646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aio: fix mremap after fork null-deref

Commit e4a0d3e720e7 ("aio: Make it possible to remap aio ring") introduced
a null-deref if mremap is called on an old aio mapping after fork as
mm-&gt;ioctx_table will be set to NULL.

[jmoyer@redhat.com: fix 80 column issue]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52646/">CVE-2023-52646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52646">CVE-2023-52646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223432">SUSE bug 1223432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52647" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52647" ref_url="https://www.suse.com/security/cve/CVE-2023-52647" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: nxp: imx8-isi: Check whether crossbar pad is non-NULL before access

When translating source to sink streams in the crossbar subdev, the
driver tries to locate the remote subdev connected to the sink pad. The
remote pad may be NULL, if userspace tries to enable a stream that ends
at an unconnected crossbar sink. When that occurs, the driver
dereferences the NULL pad, leading to a crash.

Prevent the crash by checking if the pad is NULL before using it, and
return an error if it is.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52647/">CVE-2023-52647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52647">CVE-2023-52647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223764">SUSE bug 1223764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52648" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52648" ref_url="https://www.suse.com/security/cve/CVE-2023-52648" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Unmap the surface before resetting it on a plane state

Switch to a new plane state requires unreferencing of all held surfaces.
In the work required for mob cursors the mapped surfaces started being
cached but the variable indicating whether the surface is currently
mapped was not being reset. This leads to crashes as the duplicated
state, incorrectly, indicates the that surface is mapped even when
no surface is present. That's because after unreferencing the surface
it's perfectly possible for the plane to be backed by a bo instead of a
surface.

Reset the surface mapped flag when unreferencing the plane state surface
to fix null derefs in cleanup. Fixes crashes in KDE KWin 6.0 on Wayland:

Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 4 PID: 2533 Comm: kwin_wayland Not tainted 6.7.0-rc3-vmwgfx #2
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:vmw_du_cursor_plane_cleanup_fb+0x124/0x140 [vmwgfx]
Code: 00 00 00 75 3a 48 83 c4 10 5b 5d c3 cc cc cc cc 48 8b b3 a8 00 00 00 48 c7 c7 99 90 43 c0 e8 93 c5 db ca 48 8b 83 a8 00 00 00 &lt;48&gt; 8b 78 28 e8 e3 f&gt;
RSP: 0018:ffffb6b98216fa80 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff969d84cdcb00 RCX: 0000000000000027
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff969e75f21600
RBP: ffff969d4143dc50 R08: 0000000000000000 R09: ffffb6b98216f920
R10: 0000000000000003 R11: ffff969e7feb3b10 R12: 0000000000000000
R13: 0000000000000000 R14: 000000000000027b R15: ffff969d49c9fc00
FS:  00007f1e8f1b4180(0000) GS:ffff969e75f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000028 CR3: 0000000104006004 CR4: 00000000003706f0
Call Trace:
 &lt;TASK&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x171/0x4e0
 ? exc_page_fault+0x7f/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? vmw_du_cursor_plane_cleanup_fb+0x124/0x140 [vmwgfx]
 drm_atomic_helper_cleanup_planes+0x9b/0xc0
 commit_tail+0xd1/0x130
 drm_atomic_helper_commit+0x11a/0x140
 drm_atomic_commit+0x97/0xd0
 ? __pfx___drm_printfn_info+0x10/0x10
 drm_atomic_helper_update_plane+0xf5/0x160
 drm_mode_cursor_universal+0x10e/0x270
 drm_mode_cursor_common+0x102/0x230
 ? __pfx_drm_mode_cursor2_ioctl+0x10/0x10
 drm_ioctl_kernel+0xb2/0x110
 drm_ioctl+0x26d/0x4b0
 ? __pfx_drm_mode_cursor2_ioctl+0x10/0x10
 ? __pfx_drm_ioctl+0x10/0x10
 vmw_generic_ioctl+0xa4/0x110 [vmwgfx]
 __x64_sys_ioctl+0x94/0xd0
 do_syscall_64+0x61/0xe0
 ? __x64_sys_ioctl+0xaf/0xd0
 ? syscall_exit_to_user_mode+0x2b/0x40
 ? do_syscall_64+0x70/0xe0
 ? __x64_sys_ioctl+0xaf/0xd0
 ? syscall_exit_to_user_mode+0x2b/0x40
 ? do_syscall_64+0x70/0xe0
 ? exc_page_fault+0x7f/0x180
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
RIP: 0033:0x7f1e93f279ed
Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff f&gt;
RSP: 002b:00007ffca0faf600 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000055db876ed2c0 RCX: 00007f1e93f279ed
RDX: 00007ffca0faf6c0 RSI: 00000000c02464bb RDI: 0000000000000015
RBP: 00007ffca0faf650 R08: 000055db87184010 R09: 0000000000000007
R10: 000055db886471a0 R11: 0000000000000246 R12: 00007ffca0faf6c0
R13: 00000000c02464bb R14: 0000000000000015 R15: 00007ffca0faf790
 &lt;/TASK&gt;
Modules linked in: snd_seq_dummy snd_hrtimer nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_ine&gt;
CR2: 0000000000000028
---[ end trace 0000000000000000 ]---
RIP: 0010:vmw_du_cursor_plane_cleanup_fb+0x124/0x140 [vmwgfx]
Code: 00 00 00 75 3a 48 83 c4 10 5b 5d c3 cc cc cc cc 48 8b b3 a8 00 00 00 48 c7 c7 99 90 43 c0 e8 93 c5 db ca 48 8b 83 a8 00 00 00 &lt;48&gt; 8b 78 28 e8 e3 f&gt;
RSP: 0018:ffffb6b98216fa80 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff969d84cdcb00 RCX: 0000000000000027
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff969e75f21600
RBP: ffff969d4143
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52648/">CVE-2023-52648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52648">CVE-2023-52648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223765">SUSE bug 1223765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52649" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52649" ref_url="https://www.suse.com/security/cve/CVE-2023-52649" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vkms: Avoid reading beyond LUT array

When the floor LUT index (drm_fixp2int(lut_index) is the last
index of the array the ceil LUT index will point to an entry
beyond the array. Make sure we guard against it and use the
value of the floor LUT index.

v3:
 - Drop bits from commit description that didn't contribute
   anything of value
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52649/">CVE-2023-52649 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52649">CVE-2023-52649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223768">SUSE bug 1223768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52650" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: dsi: Add missing check for of_find_device_by_node

Add check for the return value of of_find_device_by_node() and return
the error if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223770">SUSE bug 1223770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52651" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52651" ref_url="https://www.suse.com/security/cve/CVE-2023-52651" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52651/">CVE-2023-52651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52651">CVE-2023-52651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230621">SUSE bug 1230621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NTB: fix possible name leak in ntb_register_device()

If device_register() fails in ntb_register_device(), the device name
allocated by dev_set_name() should be freed. As per the comment in
device_register(), callers should use put_device() to give up the
reference in the error path. So fix this by calling put_device() in the
error path so that the name can be freed in kobject_cleanup().

As a result of this, put_device() in the error path of
ntb_register_device() is removed and the actual error is returned.

[mani: reworded commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223686">SUSE bug 1223686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52653" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: fix a memleak in gss_import_v2_context

The ctx-&gt;mech_used.data allocated by kmemdup is not freed in neither
gss_import_v2_context nor it only caller gss_krb5_import_sec_context,
which frees ctx on error.

Thus, this patch reform the last call of gss_import_v2_context to the
gss_krb5_import_ctx_v2, preventing the memleak while keepping the return
formation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223712">SUSE bug 1223712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52654" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/af_unix: disable sending io_uring over sockets

File reference cycles have caused lots of problems for io_uring
in the past, and it still doesn't work exactly right and races with
unix_stream_read_generic(). The safest fix would be to completely
disallow sending io_uring files via sockets via SCM_RIGHT, so there
are no possible cycles invloving registered files and thus rendering
SCM accounting on the io_uring side unnecessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: aqc111: check packet for fixup for true limit

If a device sends a packet that is inbetween 0
and sizeof(u64) the value passed to skb_trim()
as length will wrap around ending up as some very
large value.

The driver will then proceed to parse the header
located at that position, which will either oops or
process some random value.

The fix is to check against sizeof(u64) rather than
0, which the driver currently does. The issue exists
since the introduction of the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52656" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: drop any code related to SCM_RIGHTS

This is dead code after we dropped support for passing io_uring fds
over SCM_RIGHTS, get rid of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-11-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224187">SUSE bug 1224187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52657" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "drm/amd/pm: resolve reboot exception for si oland"

This reverts commit e490d60a2f76bff636c68ce4fe34c1b6c34bbd86.

This causes hangs on SI when DC is enabled and errors on driver
reboot and power off cycles.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224722">SUSE bug 1224722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52658" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"

This reverts commit 662404b24a4c4d839839ed25e3097571f5938b9b.
The revert is required due to the suspicion it is not good for anything
and cause crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224719">SUSE bug 1224719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52659" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type

On 64-bit platforms, the pfn_to_kaddr() macro requires that the input
value is 64 bits in order to ensure that valid address bits don't get
lost when shifting that input by PAGE_SHIFT to calculate the physical
address to provide a virtual address for.

One such example is in pvalidate_pages() (used by SEV-SNP guests), where
the GFN in the struct used for page-state change requests is a 40-bit
bit-field, so attempts to pass this GFN field directly into
pfn_to_kaddr() ends up causing guest crashes when dealing with addresses
above the 1TB range due to the above.

Fix this issue with SEV-SNP guests, as well as any similar cases that
might cause issues in current/future code, by using an inline function,
instead of a macro, so that the input is implicitly cast to the
expected 64-bit input type prior to performing the shift operation.

While it might be argued that the issue is on the caller side, other
archs/macros have taken similar approaches to deal with instances like
this, such as ARM explicitly casting the input to phys_addr_t:

  e48866647b48 ("ARM: 8396/1: use phys_addr_t in pfn_to_kaddr()")

A C inline function is even better though.

[ mingo: Refined the changelog some more &amp; added __always_inline. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224442">SUSE bug 1224442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52660" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rkisp1: Fix IRQ handling due to shared interrupts

The driver requests the interrupts as IRQF_SHARED, so the interrupt
handlers can be called at any time. If such a call happens while the ISP
is powered down, the SoC will hang as the driver tries to access the
ISP registers.

This can be reproduced even without the platform sharing the IRQ line:
Enable CONFIG_DEBUG_SHIRQ and unload the driver, and the board will
hang.

Fix this by adding a new field, 'irqs_enabled', which is used to bail
out from the interrupt handler when the ISP is not operational.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224443">SUSE bug 1224443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52661" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe()

If clk_get_sys(..., "pll_d2_out0") fails, the clk_get_sys() call must be
undone.

Add the missing clk_put and a new 'put_pll_d_out0' label in the error
handling path, and use it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224445">SUSE bug 1224445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52662" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node

When ida_alloc_max fails, resources allocated before should be freed,
including *res allocated by kmalloc and ttm_resource_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224449">SUSE bug 1224449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52663" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52663" ref_url="https://www.suse.com/security/cve/CVE-2023-52663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: amd: Fix memory leak in amd_sof_acp_probe()

Driver uses kasprintf() to initialize fw_{code,data}_bin members of
struct acp_dev_data, but kfree() is never called to deallocate the
memory, which results in a memory leak.

Fix the issue by switching to devm_kasprintf(). Additionally, ensure the
allocation was successful by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52663/">CVE-2023-52663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52663">CVE-2023-52663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224630">SUSE bug 1224630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52664" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: eliminate double free in error handling logic

Driver has a logic leak in ring data allocation/free,
where aq_ring_free could be called multiple times on same ring,
if system is under stress and got memory allocation error.

Ring pointer was used as an indicator of failure, but this is
not correct since only ring data is allocated/deallocated.
Ring itself is an array member.

Changing ring allocation functions to return error code directly.
This simplifies error handling and eliminates aq_ring_free
on higher layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224747">SUSE bug 1224747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52665" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52665" ref_url="https://www.suse.com/security/cve/CVE-2023-52665" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52665/">CVE-2023-52665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52665">CVE-2023-52665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224599">SUSE bug 1224599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a potential double-free in fs_any_create_groups

When kcalloc() for ft-&gt;g succeeds but kvzalloc() for in fails,
fs_any_create_groups() will free ft-&gt;g. However, its caller
fs_any_create_table() will free ft-&gt;g again through calling
mlx5e_destroy_flow_table(), which will lead to a double-free.
Fix this by setting ft-&gt;g to NULL in fs_any_create_groups().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224603">SUSE bug 1224603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52668" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52668" ref_url="https://www.suse.com/security/cve/CVE-2023-52668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: fix lock ordering in btrfs_zone_activate()

The btrfs CI reported a lockdep warning as follows by running generic
generic/129.

   WARNING: possible circular locking dependency detected
   6.7.0-rc5+ #1 Not tainted
   ------------------------------------------------------
   kworker/u5:5/793427 is trying to acquire lock:
   ffff88813256d028 (&amp;cache-&gt;lock){+.+.}-{2:2}, at: btrfs_zone_finish_one_bg+0x5e/0x130
   but task is already holding lock:
   ffff88810a23a318 (&amp;fs_info-&gt;zone_active_bgs_lock){+.+.}-{2:2}, at: btrfs_zone_finish_one_bg+0x34/0x130
   which lock already depends on the new lock.

   the existing dependency chain (in reverse order) is:
   -&gt; #1 (&amp;fs_info-&gt;zone_active_bgs_lock){+.+.}-{2:2}:
   ...
   -&gt; #0 (&amp;cache-&gt;lock){+.+.}-{2:2}:
   ...

This is because we take fs_info-&gt;zone_active_bgs_lock after a block_group's
lock in btrfs_zone_activate() while doing the opposite in other places.

Fix the issue by expanding the fs_info-&gt;zone_active_bgs_lock's critical
section and taking it before a block_group's lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52668/">CVE-2023-52668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52668">CVE-2023-52668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224690">SUSE bug 1224690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52669" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: s390/aes - Fix buffer overread in CTR mode

When processing the last block, the s390 ctr code will always read
a whole block, even if there isn't a whole block of data left.  Fix
this by using the actual length left and copy it into a buffer first
for processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224637">SUSE bug 1224637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52670" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: virtio: Free driver_override when rpmsg_remove()

Free driver_override when rpmsg_remove(), otherwise
the following memory leak will occur:

unreferenced object 0xffff0000d55d7080 (size 128):
  comm "kworker/u8:2", pid 56, jiffies 4294893188 (age 214.272s)
  hex dump (first 32 bytes):
    72 70 6d 73 67 5f 6e 73 00 00 00 00 00 00 00 00  rpmsg_ns........
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;000000009c94c9c1&gt;] __kmem_cache_alloc_node+0x1f8/0x320
    [&lt;000000002300d89b&gt;] __kmalloc_node_track_caller+0x44/0x70
    [&lt;00000000228a60c3&gt;] kstrndup+0x4c/0x90
    [&lt;0000000077158695&gt;] driver_set_override+0xd0/0x164
    [&lt;000000003e9c4ea5&gt;] rpmsg_register_device_override+0x98/0x170
    [&lt;000000001c0c89a8&gt;] rpmsg_ns_register_device+0x24/0x30
    [&lt;000000008bbf8fa2&gt;] rpmsg_probe+0x2e0/0x3ec
    [&lt;00000000e65a68df&gt;] virtio_dev_probe+0x1c0/0x280
    [&lt;00000000443331cc&gt;] really_probe+0xbc/0x2dc
    [&lt;00000000391064b1&gt;] __driver_probe_device+0x78/0xe0
    [&lt;00000000a41c9a5b&gt;] driver_probe_device+0xd8/0x160
    [&lt;000000009c3bd5df&gt;] __device_attach_driver+0xb8/0x140
    [&lt;0000000043cd7614&gt;] bus_for_each_drv+0x7c/0xd4
    [&lt;000000003b929a36&gt;] __device_attach+0x9c/0x19c
    [&lt;00000000a94e0ba8&gt;] device_initial_probe+0x14/0x20
    [&lt;000000003c999637&gt;] bus_probe_device+0xa0/0xac
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52671" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix hang/underflow when transitioning to ODM4:1

[Why]
Under some circumstances, disabling an OPTC and attempting to reclaim
its OPP(s) for a different OPTC could cause a hang/underflow due to OPPs
not being properly disconnected from the disabled OPTC.

[How]
Ensure that all OPPs are unassigned from an OPTC when it gets disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224729">SUSE bug 1224729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52672" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pipe: wakeup wr_wait after setting max_usage

Commit c73be61cede5 ("pipe: Add general notification queue support") a
regression was introduced that would lock up resized pipes under certain
conditions. See the reproducer in [1].

The commit resizing the pipe ring size was moved to a different
function, doing that moved the wakeup for pipe-&gt;wr_wait before actually
raising pipe-&gt;max_usage. If a pipe was full before the resize occured it
would result in the wakeup never actually triggering pipe_write.

Set @max_usage and @nr_accounted before waking writers if this isn't a
watch queue.

[Christian Brauner &lt;brauner@kernel.org&gt;: rewrite to account for watch queues]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224614">SUSE bug 1224614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52673" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52673" ref_url="https://www.suse.com/security/cve/CVE-2023-52673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix a debugfs null pointer error

[WHY &amp; HOW]
Check whether get_subvp_en() callback exists before calling it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52673/">CVE-2023-52673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52673">CVE-2023-52673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224741">SUSE bug 1224741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52674" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add clamp() in scarlett2_mixer_ctl_put()

Ensure the value passed to scarlett2_mixer_ctl_put() is between 0 and
SCARLETT2_MIXER_MAX_VALUE so we don't attempt to access outside
scarlett2_mixer_values[].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224727">SUSE bug 1224727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52675" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/imc-pmu: Add a null pointer check in update_events_in_group()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224504">SUSE bug 1224504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52676" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Guard stack limits against 32bit overflow

This patch promotes the arithmetic around checking stack bounds to be
done in the 64-bit domain, instead of the current 32bit. The arithmetic
implies adding together a 64-bit register with a int offset. The
register was checked to be below 1&lt;&lt;29 when it was variable, but not
when it was fixed. The offset either comes from an instruction (in which
case it is 16 bit), from another register (in which case the caller
checked it to be below 1&lt;&lt;29 [1]), or from the size of an argument to a
kfunc (in which case it can be a u32 [2]). Between the register being
inconsistently checked to be below 1&lt;&lt;29, and the offset being up to an
u32, it appears that we were open to overflowing the `int`s which were
currently used for arithmetic.

[1] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L7494-L7498
[2] https://github.com/torvalds/linux/blob/815fb87b753055df2d9e50f6cd80eb10235fe3e9/kernel/bpf/verifier.c#L11904
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226336">SUSE bug 1226336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52678" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c

Before using list_first_entry, make sure to check that list is not
empty, if list is empty return -ENODATA.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1347 kfd_create_indirect_link_prop() warn: can 'gpu_link' even be NULL?
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1428 kfd_add_peer_prop() warn: can 'iolink1' even be NULL?
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_topology.c:1433 kfd_add_peer_prop() warn: can 'iolink2' even be NULL?
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224617">SUSE bug 1224617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52679" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: Fix double free in of_parse_phandle_with_args_map

In of_parse_phandle_with_args_map() the inner loop that
iterates through the map entries calls of_node_put(new)
to free the reference acquired by the previous iteration
of the inner loop. This assumes that the value of "new" is
NULL on the first iteration of the inner loop.

Make sure that this is true in all iterations of the outer
loop by setting "new" to NULL after its value is assigned to "cur".

Extend the unittest to detect the double free and add an additional
test case that actually triggers this path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224508">SUSE bug 1224508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52680" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add missing error checks to *_ctl_get()

The *_ctl_get() functions which call scarlett2_update_*() were not
checking the return value. Fix to check the return value and pass to
the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224608">SUSE bug 1224608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52681" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52681" ref_url="https://www.suse.com/security/cve/CVE-2023-52681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Free s_fs_info on unmount

Now that we allocate a s_fs_info struct on fs context creation, we
should ensure that we free it again when the superblock goes away.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52681/">CVE-2023-52681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52681">CVE-2023-52681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224505">SUSE bug 1224505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52682" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52682" ref_url="https://www.suse.com/security/cve/CVE-2023-52682" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to wait on block writeback for post_read case

If inode is compressed, but not encrypted, it missed to call
f2fs_wait_on_block_writeback() to wait for GCed page writeback
in IPU write path.

Thread A				GC-Thread
					- f2fs_gc
					 - do_garbage_collect
					  - gc_data_segment
					   - move_data_block
					    - f2fs_submit_page_write
					     migrate normal cluster's block via
					     meta_inode's page cache
- f2fs_write_single_data_page
 - f2fs_do_write_data_page
  - f2fs_inplace_write_data
   - f2fs_submit_page_bio

IRQ
- f2fs_read_end_io
					IRQ
					old data overrides new data due to
					out-of-order GC and common IO.
					- f2fs_read_end_io
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52682/">CVE-2023-52682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52682">CVE-2023-52682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224734">SUSE bug 1224734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52683" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: LPIT: Avoid u32 multiplication overflow

In lpit_update_residency() there is a possibility of overflow
in multiplication, if tsc_khz is large enough (&gt; UINT_MAX/1000).

Change multiplication to mul_u32_u32().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224627">SUSE bug 1224627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52684" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52684" ref_url="https://www.suse.com/security/cve/CVE-2023-52684" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: qseecom: fix memory leaks in error paths

Fix instances of returning error codes directly instead of jumping to
the relevant labels where memory allocated for the SCM calls would be
freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52684/">CVE-2023-52684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52684">CVE-2023-52684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224689">SUSE bug 1224689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52685" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224728">SUSE bug 1224728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52686" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check in opal_event_init()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52687" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52687" ref_url="https://www.suse.com/security/cve/CVE-2023-52687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: safexcel - Add error handling for dma_map_sg() calls

Macro dma_map_sg() may return 0 on error. This patch enables
checks in case of the macro failure and ensures unmapping of
previously mapped buffers with dma_unmap_sg().

Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52687/">CVE-2023-52687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52687">CVE-2023-52687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224501">SUSE bug 1224501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52688" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52688" ref_url="https://www.suse.com/security/cve/CVE-2023-52688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix the error handler of rfkill config

When the core rfkill config throws error, it should free the
allocated resources. Currently it is not freeing the core pdev
create resources. Avoid this issue by calling the core pdev
destroy in the error handler of core rfkill config.

Found this issue in the code review and it is compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52688/">CVE-2023-52688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52688">CVE-2023-52688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224631">SUSE bug 1224631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52689" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52689" ref_url="https://www.suse.com/security/cve/CVE-2023-52689" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add missing mutex lock around get meter levels

As scarlett2_meter_ctl_get() uses meter_level_map[], the data_mutex
should be locked while accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52689/">CVE-2023-52689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52689">CVE-2023-52689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224684">SUSE bug 1224684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52690" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check to scom_debug_init_one()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
Add a null pointer check, and release 'ent' to avoid memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52691" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix a double-free in si_dpm_init

When the allocation of
adev-&gt;pm.dpm.dyn_state.vddc_dependency_on_dispclk.entries fails,
amdgpu_free_extended_power_table is called to free some fields of adev.
However, when the control flow returns to si_dpm_sw_init, it goes to
label dpm_failed and calls si_dpm_fini, which calls
amdgpu_free_extended_power_table again and free those fields again. Thus
a double-free is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224607">SUSE bug 1224607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52692" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Add missing error check to scarlett2_usb_set_config()

scarlett2_usb_set_config() calls scarlett2_usb_get() but was not
checking the result. Return the error if it fails rather than
continuing with an invalid value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224628">SUSE bug 1224628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: video: check for error while searching for backlight device parent

If acpi_get_parent() called in acpi_video_dev_register_backlight()
fails, for example, because acpi_ut_acquire_mutex() fails inside
acpi_get_parent), this can lead to incorrect (uninitialized)
acpi_parent handle being passed to acpi_get_pci_dev() for detecting
the parent pci device.

Check acpi_get_parent() result and set parent device only in case of success.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224686">SUSE bug 1224686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52694" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function

With tpd12s015_remove() marked with __exit this function is discarded
when the driver is compiled as a built-in. The result is that when the
driver unbinds there is no cleanup done which results in resource
leakage or worse.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224598">SUSE bug 1224598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52695" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52695" ref_url="https://www.suse.com/security/cve/CVE-2023-52695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check writeback connectors in create_validate_stream_for_sink

[WHY &amp; HOW]
This is to check connector type to avoid
unhandled null pointer for writeback connectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52695/">CVE-2023-52695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52695">CVE-2023-52695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224506">SUSE bug 1224506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52696" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv: Add a null pointer check in opal_powercap_init()

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224601">SUSE bug 1224601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52697" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52697" ref_url="https://www.suse.com/security/cve/CVE-2023-52697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof_sdw_rt_sdca_jack_common: ctx-&gt;headset_codec_dev = NULL

sof_sdw_rt_sdca_jack_exit() are used by different codecs, and some of
them use the same dai name.
For example, rt712 and rt713 both use "rt712-sdca-aif1" and
sof_sdw_rt_sdca_jack_exit().
As a result, sof_sdw_rt_sdca_jack_exit() will be called twice by
mc_dailink_exit_loop(). Set ctx-&gt;headset_codec_dev = NULL; after
put_device(ctx-&gt;headset_codec_dev); to avoid ctx-&gt;headset_codec_dev
being put twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52697/">CVE-2023-52697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52697">CVE-2023-52697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224596">SUSE bug 1224596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52698" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

calipso: fix memory leak in netlbl_calipso_add_pass()

If IPv6 support is disabled at boot (ipv6.disable=1),
the calipso_init() -&gt; netlbl_calipso_ops_register() function isn't called,
and the netlbl_calipso_ops_get() function always returns NULL.
In this case, the netlbl_calipso_add_pass() function allocates memory
for the doi_def variable but doesn't free it with the calipso_doi_free().

BUG: memory leak
unreferenced object 0xffff888011d68180 (size 64):
  comm "syz-executor.1", pid 10746, jiffies 4295410986 (age 17.928s)
  hex dump (first 32 bytes):
    00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;...&gt;] kmalloc include/linux/slab.h:552 [inline]
    [&lt;...&gt;] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]
    [&lt;...&gt;] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111
    [&lt;...&gt;] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739
    [&lt;...&gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
    [&lt;...&gt;] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800
    [&lt;...&gt;] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515
    [&lt;...&gt;] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811
    [&lt;...&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
    [&lt;...&gt;] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339
    [&lt;...&gt;] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934
    [&lt;...&gt;] sock_sendmsg_nosec net/socket.c:651 [inline]
    [&lt;...&gt;] sock_sendmsg+0x157/0x190 net/socket.c:671
    [&lt;...&gt;] ____sys_sendmsg+0x712/0x870 net/socket.c:2342
    [&lt;...&gt;] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396
    [&lt;...&gt;] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429
    [&lt;...&gt;] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
    [&lt;...&gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller

[PM: merged via the LSM tree at Jakub Kicinski request]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224621">SUSE bug 1224621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52699" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysv: don't call sb_bread() with pointers_lock held

syzbot is reporting sleep in atomic context in SysV filesystem [1], for
sb_bread() is called with rw_spinlock held.

A "write_lock(&amp;pointers_lock) =&gt; read_lock(&amp;pointers_lock) deadlock" bug
and a "sb_bread() with write_lock(&amp;pointers_lock)" bug were introduced by
"Replace BKL for chain locking with sysvfs-private rwlock" in Linux 2.5.12.

Then, "[PATCH] err1-40: sysvfs locking fix" in Linux 2.6.8 fixed the
former bug by moving pointers_lock lock to the callers, but instead
introduced a "sb_bread() with read_lock(&amp;pointers_lock)" bug (which made
this problem easier to hit).

Al Viro suggested that why not to do like get_branch()/get_block()/
find_shared() in Minix filesystem does. And doing like that is almost a
revert of "[PATCH] err1-40: sysvfs locking fix" except that get_branch()
 from with find_shared() is called without write_lock(&amp;pointers_lock).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224659">SUSE bug 1224659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52700" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52700" ref_url="https://www.suse.com/security/cve/CVE-2023-52700" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix kernel warning when sending SYN message

When sending a SYN message, this kernel stack trace is observed:

...
[   13.396352] RIP: 0010:_copy_from_iter+0xb4/0x550
...
[   13.398494] Call Trace:
[   13.398630]  &lt;TASK&gt;
[   13.398630]  ? __alloc_skb+0xed/0x1a0
[   13.398630]  tipc_msg_build+0x12c/0x670 [tipc]
[   13.398630]  ? shmem_add_to_page_cache.isra.71+0x151/0x290
[   13.398630]  __tipc_sendmsg+0x2d1/0x710 [tipc]
[   13.398630]  ? tipc_connect+0x1d9/0x230 [tipc]
[   13.398630]  ? __local_bh_enable_ip+0x37/0x80
[   13.398630]  tipc_connect+0x1d9/0x230 [tipc]
[   13.398630]  ? __sys_connect+0x9f/0xd0
[   13.398630]  __sys_connect+0x9f/0xd0
[   13.398630]  ? preempt_count_add+0x4d/0xa0
[   13.398630]  ? fpregs_assert_state_consistent+0x22/0x50
[   13.398630]  __x64_sys_connect+0x16/0x20
[   13.398630]  do_syscall_64+0x42/0x90
[   13.398630]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

It is because commit a41dad905e5a ("iov_iter: saner checks for attempt
to copy to/from iterator") has introduced sanity check for copying
from/to iov iterator. Lacking of copy direction from the iterator
viewpoint would lead to kernel stack trace like above.

This commit fixes this issue by initializing the iov iterator with
the correct copy direction when sending SYN or ACK without data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-07-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52700/">CVE-2023-52700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52700">CVE-2023-52700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224938">SUSE bug 1224938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52701" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52701" ref_url="https://www.suse.com/security/cve/CVE-2023-52701" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: use a bounce buffer for copying skb-&gt;mark

syzbot found arm64 builds would crash in sock_recv_mark()
when CONFIG_HARDENED_USERCOPY=y

x86 and powerpc are not detecting the issue because
they define user_access_begin.
This will be handled in a different patch,
because a check_object_size() is missing.

Only data from skb-&gt;cb[] can be copied directly to/from user space,
as explained in commit 79a8a642bf05 ("net: Whitelist
the skbuff_head_cache "cb" field")

syzbot report was:
usercopy: Kernel memory exposure attempt detected from SLUB object 'skbuff_head_cache' (offset 168, size 4)!
------------[ cut here ]------------
kernel BUG at mm/usercopy.c:102 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 4410 Comm: syz-executor533 Not tainted 6.2.0-rc7-syzkaller-17907-g2d3827b3f393 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : usercopy_abort+0x90/0x94 mm/usercopy.c:90
lr : usercopy_abort+0x90/0x94 mm/usercopy.c:90
sp : ffff80000fb9b9a0
x29: ffff80000fb9b9b0 x28: ffff0000c6073400 x27: 0000000020001a00
x26: 0000000000000014 x25: ffff80000cf52000 x24: fffffc0000000000
x23: 05ffc00000000200 x22: fffffc000324bf80 x21: ffff0000c92fe1a8
x20: 0000000000000001 x19: 0000000000000004 x18: 0000000000000000
x17: 656a626f2042554c x16: ffff0000c6073dd0 x15: ffff80000dbd2118
x14: ffff0000c6073400 x13: 00000000ffffffff x12: ffff0000c6073400
x11: ff808000081bbb4c x10: 0000000000000000 x9 : 7b0572d7cc0ccf00
x8 : 7b0572d7cc0ccf00 x7 : ffff80000bf650d4 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000000
x2 : ffff0001fefbff08 x1 : 0000000100000000 x0 : 000000000000006c
Call trace:
usercopy_abort+0x90/0x94 mm/usercopy.c:90
__check_heap_object+0xa8/0x100 mm/slub.c:4761
check_heap_object mm/usercopy.c:196 [inline]
__check_object_size+0x208/0x6b8 mm/usercopy.c:251
check_object_size include/linux/thread_info.h:199 [inline]
__copy_to_user include/linux/uaccess.h:115 [inline]
put_cmsg+0x408/0x464 net/core/scm.c:238
sock_recv_mark net/socket.c:975 [inline]
__sock_recv_cmsgs+0x1fc/0x248 net/socket.c:984
sock_recv_cmsgs include/net/sock.h:2728 [inline]
packet_recvmsg+0x2d8/0x678 net/packet/af_packet.c:3482
____sys_recvmsg+0x110/0x3a0
___sys_recvmsg net/socket.c:2737 [inline]
__sys_recvmsg+0x194/0x210 net/socket.c:2767
__do_sys_recvmsg net/socket.c:2777 [inline]
__se_sys_recvmsg net/socket.c:2774 [inline]
__arm64_sys_recvmsg+0x2c/0x3c net/socket.c:2774
__invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
invoke_syscall+0x64/0x178 arch/arm64/kernel/syscall.c:52
el0_svc_common+0xbc/0x180 arch/arm64/kernel/syscall.c:142
do_el0_svc+0x48/0x110 arch/arm64/kernel/syscall.c:193
el0_svc+0x58/0x14c arch/arm64/kernel/entry-common.c:637
el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591
Code: 91388800 aa0903e1 f90003e8 94e6d752 (d4210000)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52701/">CVE-2023-52701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52701">CVE-2023-52701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225021">SUSE bug 1225021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52702" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()

old_meter needs to be free after it is detached regardless of whether
the new meter is successfully attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52703" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path

syzbot reported that act_len in kalmia_send_init_packet() is
uninitialized when passing it to the first usb_bulk_msg error path. Jiri
Pirko noted that it's pointless to pass it in the error path, and that
the value that would be printed in the second error path would be the
value of act_len from the first call to usb_bulk_msg.[1]

With this in mind, let's just not pass act_len to the usb_bulk_msg error
paths.

1: https://lore.kernel.org/lkml/Y9pY61y1nwTuzMOa@nanopsycho/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52704" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52704" ref_url="https://www.suse.com/security/cve/CVE-2023-52704" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL

Tetsuo-San noted that commit f5d39b020809 ("freezer,sched: Rewrite
core freezer logic") broke call_usermodehelper_exec() for the KILLABLE
case.

Specifically it was missed that the second, unconditional,
wait_for_completion() was not optional and ensures the on-stack
completion is unused before going out-of-scope.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-05-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52704/">CVE-2023-52704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52704">CVE-2023-52704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225226">SUSE bug 1225226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52705" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52705" ref_url="https://www.suse.com/security/cve/CVE-2023-52705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix underflow in second superblock position calculations

Macro NILFS_SB2_OFFSET_BYTES, which computes the position of the second
superblock, underflows when the argument device size is less than 4096
bytes.  Therefore, when using this macro, it is necessary to check in
advance that the device size is not less than a lower limit, or at least
that underflow does not occur.

The current nilfs2 implementation lacks this check, causing out-of-bound
block access when mounting devices smaller than 4096 bytes:

 I/O error, dev loop0, sector 36028797018963960 op 0x0:(READ) flags 0x0
 phys_seg 1 prio class 2
 NILFS (loop0): unable to read secondary superblock (blocksize = 1024)

In addition, when trying to resize the filesystem to a size below 4096
bytes, this underflow occurs in nilfs_resize_fs(), passing a huge number
of segments to nilfs_sufile_resize(), corrupting parameters such as the
number of segments in superblocks.  This causes excessive loop iterations
in nilfs_sufile_resize() during a subsequent resize ioctl, causing
semaphore ns_segctor_sem to block for a long time and hang the writer
thread:

 INFO: task segctord:5067 blocked for more than 143 seconds.
      Not tainted 6.2.0-rc8-syzkaller-00015-gf6feea56f66d #0
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:segctord        state:D stack:23456 pid:5067  ppid:2
 flags:0x00004000
 Call Trace:
  &lt;TASK&gt;
  context_switch kernel/sched/core.c:5293 [inline]
  __schedule+0x1409/0x43f0 kernel/sched/core.c:6606
  schedule+0xc3/0x190 kernel/sched/core.c:6682
  rwsem_down_write_slowpath+0xfcf/0x14a0 kernel/locking/rwsem.c:1190
  nilfs_transaction_lock+0x25c/0x4f0 fs/nilfs2/segment.c:357
  nilfs_segctor_thread_construct fs/nilfs2/segment.c:2486 [inline]
  nilfs_segctor_thread+0x52f/0x1140 fs/nilfs2/segment.c:2570
  kthread+0x270/0x300 kernel/kthread.c:376
  ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
  &lt;/TASK&gt;
 ...
 Call Trace:
  &lt;TASK&gt;
  folio_mark_accessed+0x51c/0xf00 mm/swap.c:515
  __nilfs_get_page_block fs/nilfs2/page.c:42 [inline]
  nilfs_grab_buffer+0x3d3/0x540 fs/nilfs2/page.c:61
  nilfs_mdt_submit_block+0xd7/0x8f0 fs/nilfs2/mdt.c:121
  nilfs_mdt_read_block+0xeb/0x430 fs/nilfs2/mdt.c:176
  nilfs_mdt_get_block+0x12d/0xbb0 fs/nilfs2/mdt.c:251
  nilfs_sufile_get_segment_usage_block fs/nilfs2/sufile.c:92 [inline]
  nilfs_sufile_truncate_range fs/nilfs2/sufile.c:679 [inline]
  nilfs_sufile_resize+0x7a3/0x12b0 fs/nilfs2/sufile.c:777
  nilfs_resize_fs+0x20c/0xed0 fs/nilfs2/super.c:422
  nilfs_ioctl_resize fs/nilfs2/ioctl.c:1033 [inline]
  nilfs_ioctl+0x137c/0x2440 fs/nilfs2/ioctl.c:1301
  ...

This fixes these issues by inserting appropriate minimum device size
checks or anti-underflow checks, depending on where the macro is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52705/">CVE-2023-52705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52705">CVE-2023-52705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225480">SUSE bug 1225480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52706" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52706" ref_url="https://www.suse.com/security/cve/CVE-2023-52706" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: sim: fix a memory leak

Fix an inverted logic bug in gpio_sim_remove_hogs() that leads to GPIO
hog structures never being freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52706/">CVE-2023-52706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52706">CVE-2023-52706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225473">SUSE bug 1225473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/psi: Fix use-after-free in ep_remove_wait_queue()

If a non-root cgroup gets removed when there is a thread that registered
trigger and is polling on a pressure file within the cgroup, the polling
waitqueue gets freed in the following path:

 do_rmdir
   cgroup_rmdir
     kernfs_drain_open_files
       cgroup_file_release
         cgroup_pressure_release
           psi_trigger_destroy

However, the polling thread still has a reference to the pressure file and
will access the freed waitqueue when the file is closed or upon exit:

 fput
   ep_eventpoll_release
     ep_free
       ep_remove_wait_queue
         remove_wait_queue

This results in use-after-free as pasted below.

The fundamental problem here is that cgroup_file_release() (and
consequently waitqueue's lifetime) is not tied to the file's real lifetime.
Using wake_up_pollfree() here might be less than ideal, but it is in line
with the comment at commit 42288cb44c4b ("wait: add wake_up_pollfree()")
since the waitqueue's lifetime is not tied to file's one and can be
considered as another special case. While this would be fixable by somehow
making cgroup_file_release() be tied to the fput(), it would require
sizable refactoring at cgroups or higher layer which might be more
justifiable if we identify more cases like this.

  BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0
  Write of size 4 at addr ffff88810e625328 by task a.out/4404

	CPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38
	Hardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017
	Call Trace:
	&lt;TASK&gt;
	dump_stack_lvl+0x73/0xa0
	print_report+0x16c/0x4e0
	kasan_report+0xc3/0xf0
	kasan_check_range+0x2d2/0x310
	_raw_spin_lock_irqsave+0x60/0xc0
	remove_wait_queue+0x1a/0xa0
	ep_free+0x12c/0x170
	ep_eventpoll_release+0x26/0x30
	__fput+0x202/0x400
	task_work_run+0x11d/0x170
	do_exit+0x495/0x1130
	do_group_exit+0x100/0x100
	get_signal+0xd67/0xde0
	arch_do_signal_or_restart+0x2a/0x2b0
	exit_to_user_mode_prepare+0x94/0x100
	syscall_exit_to_user_mode+0x20/0x40
	do_syscall_64+0x52/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
	&lt;/TASK&gt;

 Allocated by task 4404:

	kasan_set_track+0x3d/0x60
	__kasan_kmalloc+0x85/0x90
	psi_trigger_create+0x113/0x3e0
	pressure_write+0x146/0x2e0
	cgroup_file_write+0x11c/0x250
	kernfs_fop_write_iter+0x186/0x220
	vfs_write+0x3d8/0x5c0
	ksys_write+0x90/0x110
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd

 Freed by task 4407:

	kasan_set_track+0x3d/0x60
	kasan_save_free_info+0x27/0x40
	____kasan_slab_free+0x11d/0x170
	slab_free_freelist_hook+0x87/0x150
	__kmem_cache_free+0xcb/0x180
	psi_trigger_destroy+0x2e8/0x310
	cgroup_file_release+0x4f/0xb0
	kernfs_drain_open_files+0x165/0x1f0
	kernfs_drain+0x162/0x1a0
	__kernfs_remove+0x1fb/0x310
	kernfs_remove_by_name_ns+0x95/0xe0
	cgroup_addrm_files+0x67f/0x700
	cgroup_destroy_locked+0x283/0x3c0
	cgroup_rmdir+0x29/0x100
	kernfs_iop_rmdir+0xd1/0x140
	vfs_rmdir+0xfe/0x240
	do_rmdir+0x13d/0x280
	__x64_sys_rmdir+0x2c/0x30
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52708" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmc_spi: fix error handling in mmc_spi_probe()

If mmc_add_host() fails, it doesn't need to call mmc_remove_host(),
or it will cause null-ptr-deref, because of deleting a not added
device in mmc_remove_host().

To fix this, goto label 'fail_glue_init', if mmc_add_host() fails,
and change the label 'fail_add_host' to 'fail_gpiod_request'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdio: fix possible resource leaks in some error paths

If sdio_add_func() or sdio_init_func() fails, sdio_remove_func() can
not release the resources, because the sdio function is not presented
in these two cases, it won't call of_node_put() or put_device().

To fix these leaks, make sdio_func_present() only control whether
device_del() needs to be called or not, then always call of_node_put()
and put_device().

In error case in sdio_init_func(), the reference of 'card-&gt;dev' is
not get, to avoid redundant put in sdio_free_func_cis(), move the
get_device() to sdio_alloc_func() and put_device() to sdio_release_func(),
it can keep the get/put function be balanced.

Without this patch, while doing fault inject test, it can get the
following leak reports, after this fix, the leak is gone.

unreferenced object 0xffff888112514000 (size 2048):
  comm "kworker/3:2", pid 65, jiffies 4294741614 (age 124.774s)
  hex dump (first 32 bytes):
    00 e0 6f 12 81 88 ff ff 60 58 8d 06 81 88 ff ff  ..o.....`X......
    10 40 51 12 81 88 ff ff 10 40 51 12 81 88 ff ff  .@Q......@Q.....
  backtrace:
    [&lt;000000009e5931da&gt;] kmalloc_trace+0x21/0x110
    [&lt;000000002f839ccb&gt;] mmc_alloc_card+0x38/0xb0 [mmc_core]
    [&lt;0000000004adcbf6&gt;] mmc_sdio_init_card+0xde/0x170 [mmc_core]
    [&lt;000000007538fea0&gt;] mmc_attach_sdio+0xcb/0x1b0 [mmc_core]
    [&lt;00000000d4fdeba7&gt;] mmc_rescan+0x54a/0x640 [mmc_core]

unreferenced object 0xffff888112511000 (size 2048):
  comm "kworker/3:2", pid 65, jiffies 4294741623 (age 124.766s)
  hex dump (first 32 bytes):
    00 40 51 12 81 88 ff ff e0 58 8d 06 81 88 ff ff  .@Q......X......
    10 10 51 12 81 88 ff ff 10 10 51 12 81 88 ff ff  ..Q.......Q.....
  backtrace:
    [&lt;000000009e5931da&gt;] kmalloc_trace+0x21/0x110
    [&lt;00000000fcbe706c&gt;] sdio_alloc_func+0x35/0x100 [mmc_core]
    [&lt;00000000c68f4b50&gt;] mmc_attach_sdio.cold.18+0xb1/0x395 [mmc_core]
    [&lt;00000000d4fdeba7&gt;] mmc_rescan+0x54a/0x640 [mmc_core]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52731" ref_url="https://www.suse.com/security/cve/CVE-2023-52731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix invalid page access after closing deferred I/O devices

When a fbdev with deferred I/O is once opened and closed, the dirty
pages still remain queued in the pageref list, and eventually later
those may be processed in the delayed work.  This may lead to a
corruption of pages, hitting an Oops.

This patch makes sure to cancel the delayed work and clean up the
pageref list at closing the device for addressing the bug.  A part of
the cleanup code is factored out as a new helper function that is
called from the common fb_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52731/">CVE-2023-52731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52731">CVE-2023-52731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224929">SUSE bug 1224929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52732" ref_url="https://www.suse.com/security/cve/CVE-2023-52732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: blocklist the kclient when receiving corrupted snap trace

When received corrupted snap trace we don't know what exactly has
happened in MDS side. And we shouldn't continue IOs and metadatas
access to MDS, which may corrupt or get incorrect contents.

This patch will just block all the further IO/MDS requests
immediately and then evict the kclient itself.

The reason why we still need to evict the kclient just after
blocking all the further IOs is that the MDS could revoke the caps
faster.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52732/">CVE-2023-52732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52732">CVE-2023-52732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225222">SUSE bug 1225222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/decompressor: specify __decompress() buf len to avoid overflow

Historically calls to __decompress() didn't specify "out_len" parameter
on many architectures including s390, expecting that no writes beyond
uncompressed kernel image are performed. This has changed since commit
2aa14b1ab2c4 ("zstd: import usptream v1.5.2") which includes zstd library
commit 6a7ede3dfccb ("Reduce size of dctx by reutilizing dst buffer
(#2751)"). Now zstd decompression code might store literal buffer in
the unwritten portion of the destination buffer. Since "out_len" is
not set, it is considered to be unlimited and hence free to use for
optimization needs. On s390 this might corrupt initrd or ipl report
which are often placed right after the decompressor buffer. Luckily the
size of uncompressed kernel image is already known to the decompressor,
so to avoid the problem simply specify it in the "out_len" parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself

sock_map proto callbacks should never call themselves by design. Protect
against bugs like [1] and break out of the recursive loop to avoid a stack
overflow in favor of a resource leak.

[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52736" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Do not unset preset when cleaning up codec

Several functions that take part in codec's initialization and removal
are re-used by ASoC codec drivers implementations. Drivers mimic the
behavior of hda_codec_driver_probe/remove() found in
sound/pci/hda/hda_bind.c with their component-&gt;probe/remove() instead.

One of the reasons for that is the expectation of
snd_hda_codec_device_new() to receive a valid pointer to an instance of
struct snd_card. This expectation can be met only once sound card
components probing commences.

As ASoC sound card may be unbound without codec device being actually
removed from the system, unsetting -&gt;preset in
snd_hda_codec_cleanup_for_unbind() interferes with module unload -&gt; load
scenario causing null-ptr-deref. Preset is assigned only once, during
device/driver matching whereas ASoC codec driver's module reloading may
occur several times throughout the lifetime of an audio stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52737" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52737" ref_url="https://www.suse.com/security/cve/CVE-2023-52737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: lock the inode in shared mode before starting fiemap

Currently fiemap does not take the inode's lock (VFS lock), it only locks
a file range in the inode's io tree. This however can lead to a deadlock
if we have a concurrent fsync on the file and fiemap code triggers a fault
when accessing the user space buffer with fiemap_fill_next_extent(). The
deadlock happens on the inode's i_mmap_lock semaphore, which is taken both
by fsync and btrfs_page_mkwrite(). This deadlock was recently reported by
syzbot and triggers a trace like the following:

   task:syz-executor361 state:D stack:20264 pid:5668  ppid:5119   flags:0x00004004
   Call Trace:
    &lt;TASK&gt;
    context_switch kernel/sched/core.c:5293 [inline]
    __schedule+0x995/0xe20 kernel/sched/core.c:6606
    schedule+0xcb/0x190 kernel/sched/core.c:6682
    wait_on_state fs/btrfs/extent-io-tree.c:707 [inline]
    wait_extent_bit+0x577/0x6f0 fs/btrfs/extent-io-tree.c:751
    lock_extent+0x1c2/0x280 fs/btrfs/extent-io-tree.c:1742
    find_lock_delalloc_range+0x4e6/0x9c0 fs/btrfs/extent_io.c:488
    writepage_delalloc+0x1ef/0x540 fs/btrfs/extent_io.c:1863
    __extent_writepage+0x736/0x14e0 fs/btrfs/extent_io.c:2174
    extent_write_cache_pages+0x983/0x1220 fs/btrfs/extent_io.c:3091
    extent_writepages+0x219/0x540 fs/btrfs/extent_io.c:3211
    do_writepages+0x3c3/0x680 mm/page-writeback.c:2581
    filemap_fdatawrite_wbc+0x11e/0x170 mm/filemap.c:388
    __filemap_fdatawrite_range mm/filemap.c:421 [inline]
    filemap_fdatawrite_range+0x175/0x200 mm/filemap.c:439
    btrfs_fdatawrite_range fs/btrfs/file.c:3850 [inline]
    start_ordered_ops fs/btrfs/file.c:1737 [inline]
    btrfs_sync_file+0x4ff/0x1190 fs/btrfs/file.c:1839
    generic_write_sync include/linux/fs.h:2885 [inline]
    btrfs_do_write_iter+0xcd3/0x1280 fs/btrfs/file.c:1684
    call_write_iter include/linux/fs.h:2189 [inline]
    new_sync_write fs/read_write.c:491 [inline]
    vfs_write+0x7dc/0xc50 fs/read_write.c:584
    ksys_write+0x177/0x2a0 fs/read_write.c:637
    do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
    entry_SYSCALL_64_after_hwframe+0x63/0xcd
   RIP: 0033:0x7f7d4054e9b9
   RSP: 002b:00007f7d404fa2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
   RAX: ffffffffffffffda RBX: 00007f7d405d87a0 RCX: 00007f7d4054e9b9
   RDX: 0000000000000090 RSI: 0000000020000000 RDI: 0000000000000006
   RBP: 00007f7d405a51d0 R08: 0000000000000000 R09: 0000000000000000
   R10: 0000000000000000 R11: 0000000000000246 R12: 61635f65646f6e69
   R13: 65646f7475616f6e R14: 7261637369646f6e R15: 00007f7d405d87a8
    &lt;/TASK&gt;
   INFO: task syz-executor361:5697 blocked for more than 145 seconds.
         Not tainted 6.2.0-rc3-syzkaller-00376-g7c6984405241 #0
   "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
   task:syz-executor361 state:D stack:21216 pid:5697  ppid:5119   flags:0x00004004
   Call Trace:
    &lt;TASK&gt;
    context_switch kernel/sched/core.c:5293 [inline]
    __schedule+0x995/0xe20 kernel/sched/core.c:6606
    schedule+0xcb/0x190 kernel/sched/core.c:6682
    rwsem_down_read_slowpath+0x5f9/0x930 kernel/locking/rwsem.c:1095
    __down_read_common+0x54/0x2a0 kernel/locking/rwsem.c:1260
    btrfs_page_mkwrite+0x417/0xc80 fs/btrfs/inode.c:8526
    do_page_mkwrite+0x19e/0x5e0 mm/memory.c:2947
    wp_page_shared+0x15e/0x380 mm/memory.c:3295
    handle_pte_fault mm/memory.c:4949 [inline]
    __handle_mm_fault mm/memory.c:5073 [inline]
    handle_mm_fault+0x1b79/0x26b0 mm/memory.c:5219
    do_user_addr_fault+0x69b/0xcb0 arch/x86/mm/fault.c:1428
    handle_page_fault arch/x86/mm/fault.c:1519 [inline]
    exc_page_fault+0x7a/0x110 arch/x86/mm/fault.c:1575
    asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570
   RIP: 0010:copy_user_short_string+0xd/0x40 arch/x86/lib/copy_user_64.S:233
   Code: 74 0a 89 (...)
   RSP: 0018:ffffc9000570f330 EFLAGS: 000502
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52737/">CVE-2023-52737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52737">CVE-2023-52737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225484">SUSE bug 1225484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52738" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini

Currently amdgpu calls drm_sched_fini() from the fence driver sw fini
routine - such function is expected to be called only after the
respective init function - drm_sched_init() - was executed successfully.

Happens that we faced a driver probe failure in the Steam Deck
recently, and the function drm_sched_fini() was called even without
its counter-part had been previously called, causing the following oops:

amdgpu: probe of 0000:04:00.0 failed with error -110
BUG: kernel NULL pointer dereference, address: 0000000000000090
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 609 Comm: systemd-udevd Not tainted 6.2.0-rc3-gpiccoli #338
Hardware name: Valve Jupiter/Jupiter, BIOS F7A0113 11/04/2022
RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched]
[...]
Call Trace:
 &lt;TASK&gt;
 amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu]
 amdgpu_device_fini_sw+0x2b/0x3b0 [amdgpu]
 amdgpu_driver_release_kms+0x16/0x30 [amdgpu]
 devm_drm_dev_init_release+0x49/0x70
 [...]

To prevent that, check if the drm_sched was properly initialized for a
given ring before calling its fini counter-part.

Notice ideally we'd use sched.ready for that; such field is set as the latest
thing on drm_sched_init(). But amdgpu seems to "override" the meaning of such
field - in the above oops for example, it was a GFX ring causing the crash, and
the sched.ready field was set to true in the ring init routine, regardless of
the state of the DRM scheduler. Hence, we ended-up using sched.ops as per
Christian's suggestion [0], and also removed the no_scheduler check [1].

[0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/
[1] https://lore.kernel.org/amd-gfx/cd0e2994-f85f-d837-609f-7056d5fb7231@amd.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52739" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Fix page corruption caused by racy check in __free_pages

When we upgraded our kernel, we started seeing some page corruption like
the following consistently:

  BUG: Bad page state in process ganesha.nfsd  pfn:1304ca
  page:0000000022261c55 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1304ca
  flags: 0x17ffffc0000000()
  raw: 0017ffffc0000000 ffff8a513ffd4c98 ffffeee24b35ec08 0000000000000000
  raw: 0000000000000000 0000000000000001 00000000ffffff7f 0000000000000000
  page dumped because: nonzero mapcount
  CPU: 0 PID: 15567 Comm: ganesha.nfsd Kdump: loaded Tainted: P    B      O      5.10.158-1.nutanix.20221209.el7.x86_64 #1
  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 04/05/2016
  Call Trace:
   dump_stack+0x74/0x96
   bad_page.cold+0x63/0x94
   check_new_page_bad+0x6d/0x80
   rmqueue+0x46e/0x970
   get_page_from_freelist+0xcb/0x3f0
   ? _cond_resched+0x19/0x40
   __alloc_pages_nodemask+0x164/0x300
   alloc_pages_current+0x87/0xf0
   skb_page_frag_refill+0x84/0x110
   ...

Sometimes, it would also show up as corruption in the free list pointer
and cause crashes.

After bisecting the issue, we found the issue started from commit
e320d3012d25 ("mm/page_alloc.c: fix freeing non-compound pages"):

	if (put_page_testzero(page))
		free_the_page(page, order);
	else if (!PageHead(page))
		while (order-- &gt; 0)
			free_the_page(page + (1 &lt;&lt; order), order);

So the problem is the check PageHead is racy because at this point we
already dropped our reference to the page.  So even if we came in with
compound page, the page can already be freed and PageHead can return
false and we will end up freeing all the tail pages causing double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225119">SUSE bug 1225119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52740" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch

The RFI and STF security mitigation options can flip the
interrupt_exit_not_reentrant static branch condition concurrently with
the interrupt exit code which tests that branch.

Interrupt exit tests this condition to set MSR[EE|RI] for exit, then
again in the case a soft-masked interrupt is found pending, to recover
the MSR so the interrupt can be replayed before attempting to exit
again. If the condition changes between these two tests, the MSR and irq
soft-mask state will become corrupted, leading to warnings and possible
crashes. For example, if the branch is initially true then false,
MSR[EE] will be 0 but PACA_IRQ_HARD_DIS clear and EE may not get
enabled, leading to warnings in irq_64.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52741" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix use-after-free in rdata-&gt;read_into_pages()

When the network status is unstable, use-after-free may occur when
read data from the server.

  BUG: KASAN: use-after-free in readpages_fill_pages+0x14c/0x7e0

  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x38/0x4c
   print_report+0x16f/0x4a6
   kasan_report+0xb7/0x130
   readpages_fill_pages+0x14c/0x7e0
   cifs_readv_receive+0x46d/0xa40
   cifs_demultiplex_thread+0x121c/0x1490
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50
   &lt;/TASK&gt;

  Allocated by task 2535:
   kasan_save_stack+0x22/0x50
   kasan_set_track+0x25/0x30
   __kasan_kmalloc+0x82/0x90
   cifs_readdata_direct_alloc+0x2c/0x110
   cifs_readdata_alloc+0x2d/0x60
   cifs_readahead+0x393/0xfe0
   read_pages+0x12f/0x470
   page_cache_ra_unbounded+0x1b1/0x240
   filemap_get_pages+0x1c8/0x9a0
   filemap_read+0x1c0/0x540
   cifs_strict_readv+0x21b/0x240
   vfs_read+0x395/0x4b0
   ksys_read+0xb8/0x150
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

  Freed by task 79:
   kasan_save_stack+0x22/0x50
   kasan_set_track+0x25/0x30
   kasan_save_free_info+0x2e/0x50
   __kasan_slab_free+0x10e/0x1a0
   __kmem_cache_free+0x7a/0x1a0
   cifs_readdata_release+0x49/0x60
   process_one_work+0x46c/0x760
   worker_thread+0x2a4/0x6f0
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50

  Last potentially related work creation:
   kasan_save_stack+0x22/0x50
   __kasan_record_aux_stack+0x95/0xb0
   insert_work+0x2b/0x130
   __queue_work+0x1fe/0x660
   queue_work_on+0x4b/0x60
   smb2_readv_callback+0x396/0x800
   cifs_abort_connection+0x474/0x6a0
   cifs_reconnect+0x5cb/0xa50
   cifs_readv_from_socket.cold+0x22/0x6c
   cifs_read_page_from_socket+0xc1/0x100
   readpages_fill_pages.cold+0x2f/0x46
   cifs_readv_receive+0x46d/0xa40
   cifs_demultiplex_thread+0x121c/0x1490
   kthread+0x16b/0x1a0
   ret_from_fork+0x2c/0x50

The following function calls will cause UAF of the rdata pointer.

readpages_fill_pages
 cifs_read_page_from_socket
  cifs_readv_from_socket
   cifs_reconnect
    __cifs_reconnect
     cifs_abort_connection
      mid-&gt;callback() --&gt; smb2_readv_callback
       queue_work(&amp;rdata-&gt;work)  # if the worker completes first,
                                 # the rdata is freed
          cifs_readv_complete
            kref_put
              cifs_readdata_release
                kfree(rdata)
 return rdata-&gt;...               # UAF in readpages_fill_pages()

Similarly, this problem also occurs in the uncache_fill_pages().

Fix this by adjusts the order of condition judgment in the return
statement.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52742" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: USB: Fix wrong-direction WARNING in plusb.c

The syzbot fuzzer detected a bug in the plusb network driver: A
zero-length control-OUT transfer was treated as a read instead of a
write.  In modern kernels this error provokes a WARNING:

usb 1-1: BOGUS control dir, pipe 80000280 doesn't match bRequestType c0
WARNING: CPU: 0 PID: 4645 at drivers/usb/core/urb.c:411
usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
Modules linked in:
CPU: 1 PID: 4645 Comm: dhcpcd Not tainted
6.2.0-rc6-syzkaller-00050-g9f266ccaa2f5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
01/12/2023
RIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
...
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58
 usb_internal_control_msg drivers/usb/core/message.c:102 [inline]
 usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153
 __usbnet_read_cmd+0xb9/0x390 drivers/net/usb/usbnet.c:2010
 usbnet_read_cmd+0x96/0xf0 drivers/net/usb/usbnet.c:2068
 pl_vendor_req drivers/net/usb/plusb.c:60 [inline]
 pl_set_QuickLink_features drivers/net/usb/plusb.c:75 [inline]
 pl_reset+0x2f/0xf0 drivers/net/usb/plusb.c:85
 usbnet_open+0xcc/0x5d0 drivers/net/usb/usbnet.c:889
 __dev_open+0x297/0x4d0 net/core/dev.c:1417
 __dev_change_flags+0x587/0x750 net/core/dev.c:8530
 dev_change_flags+0x97/0x170 net/core/dev.c:8602
 devinet_ioctl+0x15a2/0x1d70 net/ipv4/devinet.c:1147
 inet_ioctl+0x33f/0x380 net/ipv4/af_inet.c:979
 sock_do_ioctl+0xcc/0x230 net/socket.c:1169
 sock_ioctl+0x1f8/0x680 net/socket.c:1286
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x197/0x210 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The fix is to call usbnet_write_cmd() instead of usbnet_read_cmd() and
remove the USB_DIR_IN flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52743" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Do not use WQ_MEM_RECLAIM flag for workqueue

When both ice and the irdma driver are loaded, a warning in
check_flush_dependency is being triggered. This is due to ice driver
workqueue being allocated with the WQ_MEM_RECLAIM flag and the irdma one
is not.

According to kernel documentation, this flag should be set if the
workqueue will be involved in the kernel's memory reclamation flow.
Since it is not, there is no need for the ice driver's WQ to have this
flag set so remove it.

Example trace:

[  +0.000004] workqueue: WQ_MEM_RECLAIM ice:ice_service_task [ice] is flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000139] WARNING: CPU: 0 PID: 728 at kernel/workqueue.c:2632 check_flush_dependency+0x178/0x1a0
[  +0.000011] Modules linked in: bonding tls xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_cha
in_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rfkill vfat fat intel_rapl_msr intel
_rapl_common isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct1
0dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_
core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_cm iw_cm iTCO_wdt iTCO_vendor_support ipmi_ssif irdma mei_me ib_uverbs
ib_core intel_uncore joydev pcspkr i2c_i801 acpi_ipmi mei lpc_ich i2c_smbus intel_pch_thermal ioatdma ipmi_si acpi_power_meter
acpi_pad xfs libcrc32c sd_mod t10_pi crc64_rocksoft crc64 sg ahci ixgbe libahci ice i40e igb crc32c_intel mdio i2c_algo_bit liba
ta dca wmi dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
[  +0.000161]  [last unloaded: bonding]
[  +0.000006] CPU: 0 PID: 728 Comm: kworker/0:2 Tainted: G S                 6.2.0-rc2_next-queue-13jan-00458-gc20aabd57164 #1
[  +0.000006] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0010.010620200716 01/06/2020
[  +0.000003] Workqueue: ice ice_service_task [ice]
[  +0.000127] RIP: 0010:check_flush_dependency+0x178/0x1a0
[  +0.000005] Code: 89 8e 02 01 e8 49 3d 40 00 49 8b 55 18 48 8d 8d d0 00 00 00 48 8d b3 d0 00 00 00 4d 89 e0 48 c7 c7 e0 3b 08
9f e8 bb d3 07 01 &lt;0f&gt; 0b e9 be fe ff ff 80 3d 24 89 8e 02 00 0f 85 6b ff ff ff e9 06
[  +0.000004] RSP: 0018:ffff88810a39f990 EFLAGS: 00010282
[  +0.000005] RAX: 0000000000000000 RBX: ffff888141bc2400 RCX: 0000000000000000
[  +0.000004] RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffffa1213a80
[  +0.000003] RBP: ffff888194bf3400 R08: ffffed117b306112 R09: ffffed117b306112
[  +0.000003] R10: ffff888bd983088b R11: ffffed117b306111 R12: 0000000000000000
[  +0.000003] R13: ffff888111f84d00 R14: ffff88810a3943ac R15: ffff888194bf3400
[  +0.000004] FS:  0000000000000000(0000) GS:ffff888bd9800000(0000) knlGS:0000000000000000
[  +0.000003] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000003] CR2: 000056035b208b60 CR3: 000000017795e005 CR4: 00000000007706f0
[  +0.000003] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  +0.000003] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  +0.000002] PKRU: 55555554
[  +0.000003] Call Trace:
[  +0.000002]  &lt;TASK&gt;
[  +0.000003]  __flush_workqueue+0x203/0x840
[  +0.000006]  ? mutex_unlock+0x84/0xd0
[  +0.000008]  ? __pfx_mutex_unlock+0x10/0x10
[  +0.000004]  ? __pfx___flush_workqueue+0x10/0x10
[  +0.000006]  ? mutex_lock+0xa3/0xf0
[  +0.000005]  ib_cache_cleanup_one+0x39/0x190 [ib_core]
[  +0.000174]  __ib_unregister_device+0x84/0xf0 [ib_core]
[  +0.000094]  ib_unregister_device+0x25/0x30 [ib_core]
[  +0.000093]  irdma_ib_unregister_device+0x97/0xc0 [irdma]
[  +0.000064]  ? __pfx_irdma_ib_unregister_device+0x10/0x10 [irdma]
[  +0.000059]  ? up_write+0x5c/0x90
[  +0.000005]  irdma_remove+0x36/0x90 [irdma]
[  +0.000062]  auxiliary_bus_remove+0x32/0x50
[  +0.000007]  device_r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52744" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix potential NULL-ptr-dereference

in_dev_get() can return NULL which will cause a failure once idev is
dereferenced in in_dev_for_each_ifa_rtnl(). This patch adds a
check for NULL value in idev beforehand.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/IPoIB: Fix legacy IPoIB due to wrong number of queues

The cited commit creates child PKEY interfaces over netlink will
multiple tx and rx queues, but some devices doesn't support more than 1
tx and 1 rx queues. This causes to a crash when traffic is sent over the
PKEY interface due to the parent having a single queue but the child
having multiple queues.

This patch fixes the number of queues to 1 for legacy IPoIB at the
earliest possible point in time.

BUG: kernel NULL pointer dereference, address: 000000000000036b
PGD 0 P4D 0
Oops: 0000 [#1] SMP
CPU: 4 PID: 209665 Comm: python3 Not tainted 6.1.0_for_upstream_min_debug_2022_12_12_17_02 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:kmem_cache_alloc+0xcb/0x450
Code: ce 7e 49 8b 50 08 49 83 78 10 00 4d 8b 28 0f 84 cb 02 00 00 4d 85 ed 0f 84 c2 02 00 00 41 8b 44 24 28 48 8d 4a
01 49 8b 3c 24 &lt;49&gt; 8b 5c 05 00 4c 89 e8 65 48 0f c7 0f 0f 94 c0 84 c0 74 b8 41 8b
RSP: 0018:ffff88822acbbab8 EFLAGS: 00010202
RAX: 0000000000000070 RBX: ffff8881c28e3e00 RCX: 00000000064f8dae
RDX: 00000000064f8dad RSI: 0000000000000a20 RDI: 0000000000030d00
RBP: 0000000000000a20 R08: ffff8882f5d30d00 R09: ffff888104032f40
R10: ffff88810fade828 R11: 736f6d6570736575 R12: ffff88810081c000
R13: 00000000000002fb R14: ffffffff817fc865 R15: 0000000000000000
FS:  00007f9324ff9700(0000) GS:ffff8882f5d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000036b CR3: 00000001125af004 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 skb_clone+0x55/0xd0
 ip6_finish_output2+0x3fe/0x690
 ip6_finish_output+0xfa/0x310
 ip6_send_skb+0x1e/0x60
 udp_v6_send_skb+0x1e5/0x420
 udpv6_sendmsg+0xb3c/0xe60
 ? ip_mc_finish_output+0x180/0x180
 ? __switch_to_asm+0x3a/0x60
 ? __switch_to_asm+0x34/0x60
 sock_sendmsg+0x33/0x40
 __sys_sendto+0x103/0x160
 ? _copy_to_user+0x21/0x30
 ? kvm_clock_get_cycles+0xd/0x10
 ? ktime_get_ts64+0x49/0xe0
 __x64_sys_sendto+0x25/0x30
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f9374f1ed14
Code: 42 41 f8 ff 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b
7c 24 08 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 68 41 f8 ff 48 8b
RSP: 002b:00007f9324ff7bd0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f9324ff7cc8 RCX: 00007f9374f1ed14
RDX: 00000000000002fb RSI: 00007f93000052f0 RDI: 0000000000000030
RBP: 0000000000000000 R08: 00007f9324ff7d40 R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 000000012a05f200 R14: 0000000000000001 R15: 00007f9374d57bdc
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52746" ref_url="https://www.suse.com/security/cve/CVE-2023-52746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()

  int type = nla_type(nla);

  if (type &gt; XFRMA_MAX) {
            return -EOPNOTSUPP;
  }

@type is then used as an array index and can be used
as a Spectre v1 gadget.

  if (nla_len(nla) &lt; compat_policy[type].len) {

array_index_nospec() can be used to prevent leaking
content of kernel memory to malicious users.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52746/">CVE-2023-52746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52746">CVE-2023-52746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225114">SUSE bug 1225114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52747" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Restore allocated resources on failed copyout

Fix a resource leak if an error occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52748" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52748" ref_url="https://www.suse.com/security/cve/CVE-2023-52748" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: avoid format-overflow warning

With gcc and W=1 option, there's a warning like this:

fs/f2fs/compress.c: In function 'f2fs_init_page_array_cache':
fs/f2fs/compress.c:1984:47: error: '%u' directive writing between
1 and 7 bytes into a region of size between 5 and 8
[-Werror=format-overflow=]
 1984 |  sprintf(slab_name, "f2fs_page_array_entry-%u:%u", MAJOR(dev),
		MINOR(dev));
      |                                               ^~

String "f2fs_page_array_entry-%u:%u" can up to 35. The first "%u" can up
to 4 and the second "%u" can up to 7, so total size is "24 + 4 + 7 = 35".
slab_name's size should be 35 rather than 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52748/">CVE-2023-52748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52748">CVE-2023-52748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225093">SUSE bug 1225093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52749" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52749" ref_url="https://www.suse.com/security/cve/CVE-2023-52749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: Fix null dereference on suspend

A race condition exists where a synchronous (noqueue) transfer can be
active during a system suspend. This can cause a null pointer
dereference exception to occur when the system resumes.

Example order of events leading to the exception:
1. spi_sync() calls __spi_transfer_message_noqueue() which sets
   ctlr-&gt;cur_msg
2. Spi transfer begins via spi_transfer_one_message()
3. System is suspended interrupting the transfer context
4. System is resumed
6. spi_controller_resume() calls spi_start_queue() which resets cur_msg
   to NULL
7. Spi transfer context resumes and spi_finalize_current_message() is
   called which dereferences cur_msg (which is now NULL)

Wait for synchronous transfers to complete before suspending by
acquiring the bus mutex and setting/checking a suspend flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52749/">CVE-2023-52749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52749">CVE-2023-52749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225476">SUSE bug 1225476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52750" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52750" ref_url="https://www.suse.com/security/cve/CVE-2023-52750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer

Prior to LLVM 15.0.0, LLVM's integrated assembler would incorrectly
byte-swap NOP when compiling for big-endian, and the resulting series of
bytes happened to match the encoding of FNMADD S21, S30, S0, S0.

This went unnoticed until commit:

  34f66c4c4d5518c1 ("arm64: Use a positive cpucap for FP/SIMD")

Prior to that commit, the kernel would always enable the use of FPSIMD
early in boot when __cpu_setup() initialized CPACR_EL1, and so usage of
FNMADD within the kernel was not detected, but could result in the
corruption of user or kernel FPSIMD state.

After that commit, the instructions happen to trap during boot prior to
FPSIMD being detected and enabled, e.g.

| Unhandled 64-bit el1h sync exception on CPU0, ESR 0x000000001fe00000 -- ASIMD
| CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.0-rc3-00013-g34f66c4c4d55 #1
| Hardware name: linux,dummy-virt (DT)
| pstate: 400000c9 (nZcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : __pi_strcmp+0x1c/0x150
| lr : populate_properties+0xe4/0x254
| sp : ffffd014173d3ad0
| x29: ffffd014173d3af0 x28: fffffbfffddffcb8 x27: 0000000000000000
| x26: 0000000000000058 x25: fffffbfffddfe054 x24: 0000000000000008
| x23: fffffbfffddfe000 x22: fffffbfffddfe000 x21: fffffbfffddfe044
| x20: ffffd014173d3b70 x19: 0000000000000001 x18: 0000000000000005
| x17: 0000000000000010 x16: 0000000000000000 x15: 00000000413e7000
| x14: 0000000000000000 x13: 0000000000001bcc x12: 0000000000000000
| x11: 00000000d00dfeed x10: ffffd414193f2cd0 x9 : 0000000000000000
| x8 : 0101010101010101 x7 : ffffffffffffffc0 x6 : 0000000000000000
| x5 : 0000000000000000 x4 : 0101010101010101 x3 : 000000000000002a
| x2 : 0000000000000001 x1 : ffffd014171f2988 x0 : fffffbfffddffcb8
| Kernel panic - not syncing: Unhandled exception
| CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.0-rc3-00013-g34f66c4c4d55 #1
| Hardware name: linux,dummy-virt (DT)
| Call trace:
|  dump_backtrace+0xec/0x108
|  show_stack+0x18/0x2c
|  dump_stack_lvl+0x50/0x68
|  dump_stack+0x18/0x24
|  panic+0x13c/0x340
|  el1t_64_irq_handler+0x0/0x1c
|  el1_abort+0x0/0x5c
|  el1h_64_sync+0x64/0x68
|  __pi_strcmp+0x1c/0x150
|  unflatten_dt_nodes+0x1e8/0x2d8
|  __unflatten_device_tree+0x5c/0x15c
|  unflatten_device_tree+0x38/0x50
|  setup_arch+0x164/0x1e0
|  start_kernel+0x64/0x38c
|  __primary_switched+0xbc/0xc4

Restrict CONFIG_CPU_BIG_ENDIAN to a known good assembler, which is
either GNU as or LLVM's IAS 15.0.0 and newer, which contains the linked
commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52750/">CVE-2023-52750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52750">CVE-2023-52750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225485">SUSE bug 1225485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52751" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in smb2_query_info_compound()

The following UAF was triggered when running fstests generic/072 with
KASAN enabled against Windows Server 2022 and mount options
'multichannel,max_channels=2,vers=3.1.1,mfsymlinks,noperm'

  BUG: KASAN: slab-use-after-free in smb2_query_info_compound+0x423/0x6d0 [cifs]
  Read of size 8 at addr ffff888014941048 by task xfs_io/27534

  CPU: 0 PID: 27534 Comm: xfs_io Not tainted 6.6.0-rc7 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
  Call Trace:
   dump_stack_lvl+0x4a/0x80
   print_report+0xcf/0x650
   ? srso_alias_return_thunk+0x5/0x7f
   ? srso_alias_return_thunk+0x5/0x7f
   ? __phys_addr+0x46/0x90
   kasan_report+0xda/0x110
   ? smb2_query_info_compound+0x423/0x6d0 [cifs]
   ? smb2_query_info_compound+0x423/0x6d0 [cifs]
   smb2_query_info_compound+0x423/0x6d0 [cifs]
   ? __pfx_smb2_query_info_compound+0x10/0x10 [cifs]
   ? srso_alias_return_thunk+0x5/0x7f
   ? __stack_depot_save+0x39/0x480
   ? kasan_save_stack+0x33/0x60
   ? kasan_set_track+0x25/0x30
   ? ____kasan_slab_free+0x126/0x170
   smb2_queryfs+0xc2/0x2c0 [cifs]
   ? __pfx_smb2_queryfs+0x10/0x10 [cifs]
   ? __pfx___lock_acquire+0x10/0x10
   smb311_queryfs+0x210/0x220 [cifs]
   ? __pfx_smb311_queryfs+0x10/0x10 [cifs]
   ? srso_alias_return_thunk+0x5/0x7f
   ? __lock_acquire+0x480/0x26c0
   ? lock_release+0x1ed/0x640
   ? srso_alias_return_thunk+0x5/0x7f
   ? do_raw_spin_unlock+0x9b/0x100
   cifs_statfs+0x18c/0x4b0 [cifs]
   statfs_by_dentry+0x9b/0xf0
   fd_statfs+0x4e/0xb0
   __do_sys_fstatfs+0x7f/0xe0
   ? __pfx___do_sys_fstatfs+0x10/0x10
   ? srso_alias_return_thunk+0x5/0x7f
   ? lockdep_hardirqs_on_prepare+0x136/0x200
   ? srso_alias_return_thunk+0x5/0x7f
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8

  Allocated by task 27534:
   kasan_save_stack+0x33/0x60
   kasan_set_track+0x25/0x30
   __kasan_kmalloc+0x8f/0xa0
   open_cached_dir+0x71b/0x1240 [cifs]
   smb2_query_info_compound+0x5c3/0x6d0 [cifs]
   smb2_queryfs+0xc2/0x2c0 [cifs]
   smb311_queryfs+0x210/0x220 [cifs]
   cifs_statfs+0x18c/0x4b0 [cifs]
   statfs_by_dentry+0x9b/0xf0
   fd_statfs+0x4e/0xb0
   __do_sys_fstatfs+0x7f/0xe0
   do_syscall_64+0x3f/0x90
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8

  Freed by task 27534:
   kasan_save_stack+0x33/0x60
   kasan_set_track+0x25/0x30
   kasan_save_free_info+0x2b/0x50
   ____kasan_slab_free+0x126/0x170
   slab_free_freelist_hook+0xd0/0x1e0
   __kmem_cache_free+0x9d/0x1b0
   open_cached_dir+0xff5/0x1240 [cifs]
   smb2_query_info_compound+0x5c3/0x6d0 [cifs]
   smb2_queryfs+0xc2/0x2c0 [cifs]

This is a race between open_cached_dir() and cached_dir_lease_break()
where the cache entry for the open directory handle receives a lease
break while creating it.  And before returning from open_cached_dir(),
we put the last reference of the new @cfid because of
!@cfid-&gt;has_lease.

Besides the UAF, while running xfstests a lot of missed lease breaks
have been noticed in tests that run several concurrent statfs(2) calls
on those cached fids

  CIFS: VFS: \\w22-root1.gandalf.test No task to wake, unknown frame...
  CIFS: VFS: \\w22-root1.gandalf.test Cmd: 18 Err: 0x0 Flags: 0x1...
  CIFS: VFS: \\w22-root1.gandalf.test smb buf 00000000715bfe83 len 108
  CIFS: VFS: Dump pending requests:
  CIFS: VFS: \\w22-root1.gandalf.test No task to wake, unknown frame...
  CIFS: VFS: \\w22-root1.gandalf.test Cmd: 18 Err: 0x0 Flags: 0x1...
  CIFS: VFS: \\w22-root1.gandalf.test smb buf 000000005aa7316e len 108
  ...

To fix both, in open_cached_dir() ensure that @cfid-&gt;has_lease is set
right before sending out compounded request so that any potential
lease break will be get processed by demultiplex thread while we're
still caching @cfid.  And, if open failed for some reason, re-check
@cfid-&gt;has_lease to decide whether or not put lease reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-06"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225489">SUSE bug 1225489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free bug in cifs_debug_data_proc_show()

Skip SMB sessions that are being teared down
(e.g. @ses-&gt;ses_status == SES_EXITING) in cifs_debug_data_proc_show()
to avoid use-after-free in @ses.

This fixes the following GPF when reading from /proc/fs/cifs/DebugData
while mounting and umounting

  [ 816.251274] general protection fault, probably for non-canonical
  address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI
  ...
  [  816.260138] Call Trace:
  [  816.260329]  &lt;TASK&gt;
  [  816.260499]  ? die_addr+0x36/0x90
  [  816.260762]  ? exc_general_protection+0x1b3/0x410
  [  816.261126]  ? asm_exc_general_protection+0x26/0x30
  [  816.261502]  ? cifs_debug_tcon+0xbd/0x240 [cifs]
  [  816.261878]  ? cifs_debug_tcon+0xab/0x240 [cifs]
  [  816.262249]  cifs_debug_data_proc_show+0x516/0xdb0 [cifs]
  [  816.262689]  ? seq_read_iter+0x379/0x470
  [  816.262995]  seq_read_iter+0x118/0x470
  [  816.263291]  proc_reg_read_iter+0x53/0x90
  [  816.263596]  ? srso_alias_return_thunk+0x5/0x7f
  [  816.263945]  vfs_read+0x201/0x350
  [  816.264211]  ksys_read+0x75/0x100
  [  816.264472]  do_syscall_64+0x3f/0x90
  [  816.264750]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
  [  816.265135] RIP: 0033:0x7fd5e669d381
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-06"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225819">SUSE bug 1225819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid NULL dereference of timing generator

[Why &amp; How]
Check whether assigned timing generator is NULL or not before
accessing its funcs to prevent NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52754" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imon: fix access to invalid resource for the second interface

imon driver probes two USB interfaces, and at the probe of the second
interface, the driver assumes blindly that the first interface got
bound with the same imon driver.  It's usually true, but it's still
possible that the first interface is bound with another driver via a
malformed descriptor.  Then it may lead to a memory corruption, as
spotted by syzkaller; imon driver accesses the data from drvdata as
struct imon_context object although it's a completely different one
that was assigned by another driver.

This patch adds a sanity check -- whether the first interface is
really bound with the imon driver or not -- for avoiding the problem
above at the probe time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52755" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52755" ref_url="https://www.suse.com/security/cve/CVE-2023-52755" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slab out of bounds write in smb_inherit_dacl()

slab out-of-bounds write is caused by that offsets is bigger than pntsd
allocation size. This patch add the check to validate 3 offsets using
allocation size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-06"/>
	<updated date="2024-06-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52755/">CVE-2023-52755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52755">CVE-2023-52755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225481">SUSE bug 1225481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52757" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential deadlock when releasing mids

All release_mid() callers seem to hold a reference of @mid so there is
no need to call kref_put(&amp;mid-&gt;refcount, __release_mid) under
@server-&gt;mid_lock spinlock.  If they don't, then an use-after-free bug
would have occurred anyways.

By getting rid of such spinlock also fixes a potential deadlock as
shown below

CPU 0                                CPU 1
------------------------------------------------------------------
cifs_demultiplex_thread()            cifs_debug_data_proc_show()
 release_mid()
  spin_lock(&amp;server-&gt;mid_lock);
                                     spin_lock(&amp;cifs_tcp_ses_lock)
				      spin_lock(&amp;server-&gt;mid_lock)
  __release_mid()
   smb2_find_smb_tcon()
    spin_lock(&amp;cifs_tcp_ses_lock) *deadlock*
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225548">SUSE bug 1225548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52759" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52760" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52760" ref_url="https://www.suse.com/security/cve/CVE-2023-52760" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix slab-use-after-free in gfs2_qd_dealloc

In gfs2_put_super(), whether withdrawn or not, the quota should
be cleaned up by gfs2_quota_cleanup().

Otherwise, struct gfs2_sbd will be freed before gfs2_qd_dealloc (rcu
callback) has run for all gfs2_quota_data objects, resulting in
use-after-free.

Also, gfs2_destroy_threads() and gfs2_quota_cleanup() is already called
by gfs2_make_fs_ro(), so in gfs2_put_super(), after calling
gfs2_make_fs_ro(), there is no need to call them again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52760/">CVE-2023-52760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52760">CVE-2023-52760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225562">SUSE bug 1225562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52761" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52761" ref_url="https://www.suse.com/security/cve/CVE-2023-52761" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: VMAP_STACK overflow detection thread-safe

commit 31da94c25aea ("riscv: add VMAP_STACK overflow detection") added
support for CONFIG_VMAP_STACK. If overflow is detected, CPU switches to
`shadow_stack` temporarily before switching finally to per-cpu
`overflow_stack`.

If two CPUs/harts are racing and end up in over flowing kernel stack, one
or both will end up corrupting each other state because `shadow_stack` is
not per-cpu. This patch optimizes per-cpu overflow stack switch by
directly picking per-cpu `overflow_stack` and gets rid of `shadow_stack`.

Following are the changes in this patch

 - Defines an asm macro to obtain per-cpu symbols in destination
   register.
 - In entry.S, when overflow is detected, per-cpu overflow stack is
   located using per-cpu asm macro. Computing per-cpu symbol requires
   a temporary register. x31 is saved away into CSR_SCRATCH
   (CSR_SCRATCH is anyways zero since we're in kernel).

Please see Links for additional relevant disccussion and alternative
solution.

Tested by `echo EXHAUST_STACK &gt; /sys/kernel/debug/provoke-crash/DIRECT`
Kernel crash log below

 Insufficient stack space to handle exception!/debug/provoke-crash/DIRECT
 Task stack:     [0xff20000010a98000..0xff20000010a9c000]
 Overflow stack: [0xff600001f7d98370..0xff600001f7d99370]
 CPU: 1 PID: 205 Comm: bash Not tainted 6.1.0-rc2-00001-g328a1f96f7b9 #34
 Hardware name: riscv-virtio,qemu (DT)
 epc : __memset+0x60/0xfc
  ra : recursive_loop+0x48/0xc6 [lkdtm]
 epc : ffffffff808de0e4 ra : ffffffff0163a752 sp : ff20000010a97e80
  gp : ffffffff815c0330 tp : ff600000820ea280 t0 : ff20000010a97e88
  t1 : 000000000000002e t2 : 3233206874706564 s0 : ff20000010a982b0
  s1 : 0000000000000012 a0 : ff20000010a97e88 a1 : 0000000000000000
  a2 : 0000000000000400 a3 : ff20000010a98288 a4 : 0000000000000000
  a5 : 0000000000000000 a6 : fffffffffffe43f0 a7 : 00007fffffffffff
  s2 : ff20000010a97e88 s3 : ffffffff01644680 s4 : ff20000010a9be90
  s5 : ff600000842ba6c0 s6 : 00aaaaaac29e42b0 s7 : 00fffffff0aa3684
  s8 : 00aaaaaac2978040 s9 : 0000000000000065 s10: 00ffffff8a7cad10
  s11: 00ffffff8a76a4e0 t3 : ffffffff815dbaf4 t4 : ffffffff815dbaf4
  t5 : ffffffff815dbab8 t6 : ff20000010a9bb48
 status: 0000000200000120 badaddr: ff20000010a97e88 cause: 000000000000000f
 Kernel panic - not syncing: Kernel stack overflow
 CPU: 1 PID: 205 Comm: bash Not tainted 6.1.0-rc2-00001-g328a1f96f7b9 #34
 Hardware name: riscv-virtio,qemu (DT)
 Call Trace:
 [&lt;ffffffff80006754&gt;] dump_backtrace+0x30/0x38
 [&lt;ffffffff808de798&gt;] show_stack+0x40/0x4c
 [&lt;ffffffff808ea2a8&gt;] dump_stack_lvl+0x44/0x5c
 [&lt;ffffffff808ea2d8&gt;] dump_stack+0x18/0x20
 [&lt;ffffffff808dec06&gt;] panic+0x126/0x2fe
 [&lt;ffffffff800065ea&gt;] walk_stackframe+0x0/0xf0
 [&lt;ffffffff0163a752&gt;] recursive_loop+0x48/0xc6 [lkdtm]
 SMP: stopping secondary CPUs
 ---[ end Kernel panic - not syncing: Kernel stack overflow ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-12-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52761/">CVE-2023-52761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52761">CVE-2023-52761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225459">SUSE bug 1225459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52762" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-blk: fix implicit overflow on virtio_max_dma_size

The following codes have an implicit conversion from size_t to u32:
(u32)max_size = (size_t)virtio_max_dma_size(vdev);

This may lead overflow, Ex (size_t)4G -&gt; (u32)0. Once
virtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX
instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52763" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.

The `i3c_master_bus_init` function may attach the I2C devices before the
I3C bus initialization. In this flow, the DAT `alloc_entry`` will be used
before the DAT `init`. Additionally, if the `i3c_master_bus_init` fails,
the DAT `cleanup` will execute before the device is detached, which will
execue DAT `free_entry` function. The above scenario can cause the driver
to use DAT_data when it is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52764" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: gspca: cpia1: shift-out-of-bounds in set_flicker

Syzkaller reported the following issue:
UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27
shift exponent 245 is too large for 32-bit type 'int'

When the value of the variable "sd-&gt;params.exposure.gain" exceeds the
number of bits in an integer, a shift-out-of-bounds error is reported. It
is triggered because the variable "currentexp" cannot be left-shifted by
more than the number of bits in an integer. In order to avoid invalid
range during left-shift, the conditional expression is added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52765" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52765" ref_url="https://www.suse.com/security/cve/CVE-2023-52765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: qcom-spmi-pmic: Fix revid implementation

The Qualcomm SPMI PMIC revid implementation is broken in multiple ways.

First, it assumes that just because the sibling base device has been
registered that means that it is also bound to a driver, which may not
be the case (e.g. due to probe deferral or asynchronous probe). This
could trigger a NULL-pointer dereference when attempting to access the
driver data of the unbound device.

Second, it accesses driver data of a sibling device directly and without
any locking, which means that the driver data may be freed while it is
being accessed (e.g. on driver unbind).

Third, it leaks a struct device reference to the sibling device which is
looked up using the spmi_device_from_of() every time a function (child)
device is calling the revid function (e.g. on probe).

Fix this mess by reimplementing the revid lookup so that it is done only
at probe of the PMIC device; the base device fetches the revid info from
the hardware, while any secondary SPMI device fetches the information
from the base device and caches it so that it can be accessed safely
from its children. If the base device has not been probed yet then probe
of a secondary device is deferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52765/">CVE-2023-52765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52765">CVE-2023-52765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225029">SUSE bug 1225029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52766" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler

Do not loop over ring headers in hci_dma_irq_handler() that are not
allocated and enabled in hci_dma_init(). Otherwise out of bounds access
will occur from rings-&gt;headers[i] access when i &gt;= number of allocated
ring headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52767" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52767" ref_url="https://www.suse.com/security/cve/CVE-2023-52767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix NULL deref on tls_sw_splice_eof() with empty record

syzkaller discovered that if tls_sw_splice_eof() is executed as part of
sendfile() when the plaintext/ciphertext sk_msg are empty, the send path
gets confused because the empty ciphertext buffer does not have enough
space for the encryption overhead. This causes tls_push_record() to go on
the `split = true` path (which is only supposed to be used when interacting
with an attached BPF program), and then get further confused and hit the
tls_merge_open_record() path, which then assumes that there must be at
least one populated buffer element, leading to a NULL deref.

It is possible to have empty plaintext/ciphertext buffers if we previously
bailed from tls_sw_sendmsg_locked() via the tls_trim_both_msgs() path.
tls_sw_push_pending_record() already handles this case correctly; let's do
the same check in tls_sw_splice_eof().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52767/">CVE-2023-52767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52767">CVE-2023-52767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224998">SUSE bug 1224998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52768" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52768" ref_url="https://www.suse.com/security/cve/CVE-2023-52768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: use vmm_table as array in wilc struct

Enabling KASAN and running some iperf tests raises some memory issues with
vmm_table:

BUG: KASAN: slab-out-of-bounds in wilc_wlan_handle_txq+0x6ac/0xdb4
Write of size 4 at addr c3a61540 by task wlan0-tx/95

KASAN detects that we are writing data beyond range allocated to vmm_table.
There is indeed a mismatch between the size passed to allocator in
wilc_wlan_init, and the range of possible indexes used later: allocation
size is missing a multiplication by sizeof(u32)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52768/">CVE-2023-52768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52768">CVE-2023-52768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225004">SUSE bug 1225004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52769" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52769" ref_url="https://www.suse.com/security/cve/CVE-2023-52769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix htt mlo-offset event locking

The ath12k active pdevs are protected by RCU but the htt mlo-offset
event handling code calling ath12k_mac_get_ar_by_pdev_id() was not
marked as a read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52769/">CVE-2023-52769 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52769">CVE-2023-52769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225001">SUSE bug 1225001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52770" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52770" ref_url="https://www.suse.com/security/cve/CVE-2023-52770" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: split initial and dynamic conditions for extent_cache

Let's allocate the extent_cache tree without dynamic conditions to avoid a
missing condition causing a panic as below.

 # create a file w/ a compressed flag
 # disable the compression
 # panic while updating extent_cache

F2FS-fs (dm-64): Swapfile: last extent is not aligned to section
F2FS-fs (dm-64): Swapfile (3) is not align to section: 1) creat(), 2) ioctl(F2FS_IOC_SET_PIN_FILE), 3) fallocate(2097152 * N)
Adding 124996k swap on ./swap-file.  Priority:0 extents:2 across:17179494468k
==================================================================
BUG: KASAN: null-ptr-deref in instrument_atomic_read_write out/common/include/linux/instrumented.h:101 [inline]
BUG: KASAN: null-ptr-deref in atomic_try_cmpxchg_acquire out/common/include/asm-generic/atomic-instrumented.h:705 [inline]
BUG: KASAN: null-ptr-deref in queued_write_lock out/common/include/asm-generic/qrwlock.h:92 [inline]
BUG: KASAN: null-ptr-deref in __raw_write_lock out/common/include/linux/rwlock_api_smp.h:211 [inline]
BUG: KASAN: null-ptr-deref in _raw_write_lock+0x5a/0x110 out/common/kernel/locking/spinlock.c:295
Write of size 4 at addr 0000000000000030 by task syz-executor154/3327

CPU: 0 PID: 3327 Comm: syz-executor154 Tainted: G           O      5.10.185 #1
Hardware name: emulation qemu-x86/qemu-x86, BIOS 2023.01-21885-gb3cc1cd24d 01/01/2023
Call Trace:
 __dump_stack out/common/lib/dump_stack.c:77 [inline]
 dump_stack_lvl+0x17e/0x1c4 out/common/lib/dump_stack.c:118
 __kasan_report+0x16c/0x260 out/common/mm/kasan/report.c:415
 kasan_report+0x51/0x70 out/common/mm/kasan/report.c:428
 kasan_check_range+0x2f3/0x340 out/common/mm/kasan/generic.c:186
 __kasan_check_write+0x14/0x20 out/common/mm/kasan/shadow.c:37
 instrument_atomic_read_write out/common/include/linux/instrumented.h:101 [inline]
 atomic_try_cmpxchg_acquire out/common/include/asm-generic/atomic-instrumented.h:705 [inline]
 queued_write_lock out/common/include/asm-generic/qrwlock.h:92 [inline]
 __raw_write_lock out/common/include/linux/rwlock_api_smp.h:211 [inline]
 _raw_write_lock+0x5a/0x110 out/common/kernel/locking/spinlock.c:295
 __drop_extent_tree+0xdf/0x2f0 out/common/fs/f2fs/extent_cache.c:1155
 f2fs_drop_extent_tree+0x17/0x30 out/common/fs/f2fs/extent_cache.c:1172
 f2fs_insert_range out/common/fs/f2fs/file.c:1600 [inline]
 f2fs_fallocate+0x19fd/0x1f40 out/common/fs/f2fs/file.c:1764
 vfs_fallocate+0x514/0x9b0 out/common/fs/open.c:310
 ksys_fallocate out/common/fs/open.c:333 [inline]
 __do_sys_fallocate out/common/fs/open.c:341 [inline]
 __se_sys_fallocate out/common/fs/open.c:339 [inline]
 __x64_sys_fallocate+0xb8/0x100 out/common/fs/open.c:339
 do_syscall_64+0x35/0x50 out/common/arch/x86/entry/common.c:46
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52770/">CVE-2023-52770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52770">CVE-2023-52770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225033">SUSE bug 1225033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52771" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52771" ref_url="https://www.suse.com/security/cve/CVE-2023-52771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/port: Fix delete_endpoint() vs parent unregistration race

The CXL subsystem, at cxl_mem -&gt;probe() time, establishes a lineage of
ports (struct cxl_port objects) between an endpoint and the root of a
CXL topology. Each port including the endpoint port is attached to the
cxl_port driver.

Given that setup, it follows that when either any port in that lineage
goes through a cxl_port -&gt;remove() event, or the memdev goes through a
cxl_mem -&gt;remove() event. The hierarchy below the removed port, or the
entire hierarchy if the memdev is removed needs to come down.

The delete_endpoint() callback is careful to check whether it is being
called to tear down the hierarchy, or if it is only being called to
teardown the memdev because an ancestor port is going through
-&gt;remove().

That care needs to take the device_lock() of the endpoint's parent.
Which requires 2 bugs to be fixed:

1/ A reference on the parent is needed to prevent use-after-free
   scenarios like this signature:

    BUG: spinlock bad magic on CPU#0, kworker/u56:0/11
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023
    Workqueue: cxl_port detach_memdev [cxl_core]
    RIP: 0010:spin_bug+0x65/0xa0
    Call Trace:
      do_raw_spin_lock+0x69/0xa0
     __mutex_lock+0x695/0xb80
     delete_endpoint+0xad/0x150 [cxl_core]
     devres_release_all+0xb8/0x110
     device_unbind_cleanup+0xe/0x70
     device_release_driver_internal+0x1d2/0x210
     detach_memdev+0x15/0x20 [cxl_core]
     process_one_work+0x1e3/0x4c0
     worker_thread+0x1dd/0x3d0

2/ In the case of RCH topologies, the parent device that needs to be
   locked is not always @port-&gt;dev as returned by cxl_mem_find_port(), use
   endpoint-&gt;dev.parent instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52771/">CVE-2023-52771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52771">CVE-2023-52771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225007">SUSE bug 1225007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52772" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52772" ref_url="https://www.suse.com/security/cve/CVE-2023-52772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: fix use-after-free in unix_stream_read_actor()

syzbot reported the following crash [1]

After releasing unix socket lock, u-&gt;oob_skb can be changed
by another thread. We must temporarily increase skb refcount
to make sure this other thread will not free the skb under us.

[1]

BUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa7/0xc0 net/unix/af_unix.c:2866
Read of size 4 at addr ffff88801f3b9cc4 by task syz-executor107/5297

CPU: 1 PID: 5297 Comm: syz-executor107 Not tainted 6.6.0-syzkaller-15910-gb8e3a87a627b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:364 [inline]
print_report+0xc4/0x620 mm/kasan/report.c:475
kasan_report+0xda/0x110 mm/kasan/report.c:588
unix_stream_read_actor+0xa7/0xc0 net/unix/af_unix.c:2866
unix_stream_recv_urg net/unix/af_unix.c:2587 [inline]
unix_stream_read_generic+0x19a5/0x2480 net/unix/af_unix.c:2666
unix_stream_recvmsg+0x189/0x1b0 net/unix/af_unix.c:2903
sock_recvmsg_nosec net/socket.c:1044 [inline]
sock_recvmsg+0xe2/0x170 net/socket.c:1066
____sys_recvmsg+0x21f/0x5c0 net/socket.c:2803
___sys_recvmsg+0x115/0x1a0 net/socket.c:2845
__sys_recvmsg+0x114/0x1e0 net/socket.c:2875
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82
entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7fc67492c559
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fc6748ab228 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
RAX: ffffffffffffffda RBX: 000000000000001c RCX: 00007fc67492c559
RDX: 0000000040010083 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00007fc6749b6348 R08: 00007fc6748ab6c0 R09: 00007fc6748ab6c0
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc6749b6340
R13: 00007fc6749b634c R14: 00007ffe9fac52a0 R15: 00007ffe9fac5388
&lt;/TASK&gt;

Allocated by task 5295:
kasan_save_stack+0x33/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
__kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:328
kasan_slab_alloc include/linux/kasan.h:188 [inline]
slab_post_alloc_hook mm/slab.h:763 [inline]
slab_alloc_node mm/slub.c:3478 [inline]
kmem_cache_alloc_node+0x180/0x3c0 mm/slub.c:3523
__alloc_skb+0x287/0x330 net/core/skbuff.c:641
alloc_skb include/linux/skbuff.h:1286 [inline]
alloc_skb_with_frags+0xe4/0x710 net/core/skbuff.c:6331
sock_alloc_send_pskb+0x7e4/0x970 net/core/sock.c:2780
sock_alloc_send_skb include/net/sock.h:1884 [inline]
queue_oob net/unix/af_unix.c:2147 [inline]
unix_stream_sendmsg+0xb5f/0x10a0 net/unix/af_unix.c:2301
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0xd5/0x180 net/socket.c:745
____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
__sys_sendmsg+0x117/0x1e0 net/socket.c:2667
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:82
entry_SYSCALL_64_after_hwframe+0x63/0x6b

Freed by task 5295:
kasan_save_stack+0x33/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:522
____kasan_slab_free mm/kasan/common.c:236 [inline]
____kasan_slab_free+0x15b/0x1b0 mm/kasan/common.c:200
kasan_slab_free include/linux/kasan.h:164 [inline]
slab_free_hook mm/slub.c:1800 [inline]
slab_free_freelist_hook+0x114/0x1e0 mm/slub.c:1826
slab_free mm/slub.c:3809 [inline]
kmem_cache_free+0xf8/0x340 mm/slub.c:3831
kfree_skbmem+0xef/0x1b0 net/core/skbuff.c:1015
__kfree_skb net/core/skbuff.c:1073 [inline]
consume_skb net/core/skbuff.c:1288 [inline]
consume_skb+0xdf/0x170 net/core/skbuff.c:1282
queue_oob net/unix/af_unix.c:2178 [inline]
u
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52772/">CVE-2023-52772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52772">CVE-2023-52772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224989">SUSE bug 1224989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224991">SUSE bug 1224991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52773" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()

When ddc_service_construct() is called, it explicitly checks both the
link type and whether there is something on the link which will
dictate whether the pin is marked as hw_supported.

If the pin isn't set or the link is not set (such as from
unloading/reloading amdgpu in an IGT test) then fail the
amdgpu_dm_i2c_xfer() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225041">SUSE bug 1225041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52774" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: protect device queue against concurrent access

In dasd_profile_start() the amount of requests on the device queue are
counted. The access to the device queue is unprotected against
concurrent access. With a lot of parallel I/O, especially with alias
devices enabled, the device queue can change while dasd_profile_start()
is accessing the queue. In the worst case this leads to a kernel panic
due to incorrect pointer accesses.

Fix this by taking the device lock before accessing the queue and
counting the requests. Additionally the check for a valid profile data
pointer can be done earlier to avoid unnecessary locking in a hot path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: avoid data corruption caused by decline

We found a data corruption issue during testing of SMC-R on Redis
applications.

The benchmark has a low probability of reporting a strange error as
shown below.

"Error: Protocol error, got "\xe2" as reply type byte"

Finally, we found that the retrieved error data was as follows:

0xE2 0xD4 0xC3 0xD9 0x04 0x00 0x2C 0x20 0xA6 0x56 0x00 0x16 0x3E 0x0C
0xCB 0x04 0x02 0x01 0x00 0x00 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00
0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0x00 0xE2

It is quite obvious that this is a SMC DECLINE message, which means that
the applications received SMC protocol message.
We found that this was caused by the following situations:

client                  server
        |  clc proposal
        -------------&gt;
        |  clc accept
        &lt;-------------
        |  clc confirm
        -------------&gt;
wait llc confirm
			send llc confirm
        |failed llc confirm
        |   x------
(after 2s)timeout
                        wait llc confirm rsp

wait decline

(after 1s) timeout
                        (after 2s) timeout
        |   decline
        --------------&gt;
        |   decline
        &lt;--------------

As a result, a decline message was sent in the implementation, and this
message was read from TCP by the already-fallback connection.

This patch double the client timeout as 2x of the server value,
With this simple change, the Decline messages should never cross or
collide (during Confirm link timeout).

This issue requires an immediate solution, since the protocol updates
involve a more long-term solution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225088">SUSE bug 1225088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52776" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52776" ref_url="https://www.suse.com/security/cve/CVE-2023-52776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix dfs-radar and temperature event locking

The ath12k active pdevs are protected by RCU but the DFS-radar and
temperature event handling code calling ath12k_mac_get_ar_by_pdev_id()
was not marked as a read-side critical section.

Mark the code in question as RCU read-side critical sections to avoid
any potential use-after-free issues.

Note that the temperature event handler looks like a place holder
currently but would still trigger an RCU lockdep splat.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52776/">CVE-2023-52776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52776">CVE-2023-52776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225090">SUSE bug 1225090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52777" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix gtk offload status event locking

The ath11k active pdevs are protected by RCU but the gtk offload status
event handling code calling ath11k_mac_get_arvif_by_vdev_id() was not
marked as a read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224992">SUSE bug 1224992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52778" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52778" ref_url="https://www.suse.com/security/cve/CVE-2023-52778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: deal with large GSO size

After the blamed commit below, the TCP sockets (and the MPTCP subflows)
can build egress packets larger than 64K. That exceeds the maximum DSS
data size, the length being misrepresent on the wire and the stream being
corrupted, as later observed on the receiver:

  WARNING: CPU: 0 PID: 9696 at net/mptcp/protocol.c:705 __mptcp_move_skbs_from_subflow+0x2604/0x26e0
  CPU: 0 PID: 9696 Comm: syz-executor.7 Not tainted 6.6.0-rc5-gcd8bdf563d46 #45
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
  netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'.
  RIP: 0010:__mptcp_move_skbs_from_subflow+0x2604/0x26e0 net/mptcp/protocol.c:705
  RSP: 0018:ffffc90000006e80 EFLAGS: 00010246
  RAX: ffffffff83e9f674 RBX: ffff88802f45d870 RCX: ffff888102ad0000
  netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'.
  RDX: 0000000080000303 RSI: 0000000000013908 RDI: 0000000000003908
  RBP: ffffc90000007110 R08: ffffffff83e9e078 R09: 1ffff1100e548c8a
  R10: dffffc0000000000 R11: ffffed100e548c8b R12: 0000000000013908
  R13: dffffc0000000000 R14: 0000000000003908 R15: 000000000031cf29
  FS:  00007f239c47e700(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f239c45cd78 CR3: 000000006a66c006 CR4: 0000000000770ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   mptcp_data_ready+0x263/0xac0 net/mptcp/protocol.c:819
   subflow_data_ready+0x268/0x6d0 net/mptcp/subflow.c:1409
   tcp_data_queue+0x21a1/0x7a60 net/ipv4/tcp_input.c:5151
   tcp_rcv_established+0x950/0x1d90 net/ipv4/tcp_input.c:6098
   tcp_v6_do_rcv+0x554/0x12f0 net/ipv6/tcp_ipv6.c:1483
   tcp_v6_rcv+0x2e26/0x3810 net/ipv6/tcp_ipv6.c:1749
   ip6_protocol_deliver_rcu+0xd6b/0x1ae0 net/ipv6/ip6_input.c:438
   ip6_input+0x1c5/0x470 net/ipv6/ip6_input.c:483
   ipv6_rcv+0xef/0x2c0 include/linux/netfilter.h:304
   __netif_receive_skb+0x1ea/0x6a0 net/core/dev.c:5532
   process_backlog+0x353/0x660 net/core/dev.c:5974
   __napi_poll+0xc6/0x5a0 net/core/dev.c:6536
   net_rx_action+0x6a0/0xfd0 net/core/dev.c:6603
   __do_softirq+0x184/0x524 kernel/softirq.c:553
   do_softirq+0xdd/0x130 kernel/softirq.c:454

Address the issue explicitly bounding the maximum GSO size to what MPTCP
actually allows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52778/">CVE-2023-52778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52778">CVE-2023-52778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224948">SUSE bug 1224948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52779" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52779" ref_url="https://www.suse.com/security/cve/CVE-2023-52779" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: Pass AT_GETATTR_NOSEC flag to getattr interface function

When vfs_getattr_nosec() calls a filesystem's getattr interface function
then the 'nosec' should propagate into this function so that
vfs_getattr_nosec() can again be called from the filesystem's gettattr
rather than vfs_getattr(). The latter would add unnecessary security
checks that the initial vfs_getattr_nosec() call wanted to avoid.
Therefore, introduce the getattr flag GETATTR_NOSEC and allow to pass
with the new getattr_flags parameter to the getattr interface function.
In overlayfs and ecryptfs use this flag to determine which one of the
two functions to call.

In a recent code change introduced to IMA vfs_getattr_nosec() ended up
calling vfs_getattr() in overlayfs, which in turn called
security_inode_getattr() on an exiting process that did not have
current-&gt;fs set anymore, which then caused a kernel NULL pointer
dereference. With this change the call to security_inode_getattr() can
be avoided, thus avoiding the NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52779/">CVE-2023-52779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52779">CVE-2023-52779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225027">SUSE bug 1225027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52780" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52780" ref_url="https://www.suse.com/security/cve/CVE-2023-52780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mvneta: fix calls to page_pool_get_stats

Calling page_pool_get_stats in the mvneta driver without checks
leads to kernel crashes.
First the page pool is only available if the bm is not used.
The page pool is also not allocated when the port is stopped.
It can also be not allocated in case of errors.

The current implementation leads to the following crash calling
ethstats on a port that is down or when calling it at the wrong moment:

ble to handle kernel NULL pointer dereference at virtual address 00000070
[00000070] *pgd=00000000
Internal error: Oops: 5 [#1] SMP ARM
Hardware name: Marvell Armada 380/385 (Device Tree)
PC is at page_pool_get_stats+0x18/0x1cc
LR is at mvneta_ethtool_get_stats+0xa0/0xe0 [mvneta]
pc : [&lt;c0b413cc&gt;]    lr : [&lt;bf0a98d8&gt;]    psr: a0000013
sp : f1439d48  ip : f1439dc0  fp : 0000001d
r10: 00000100  r9 : c4816b80  r8 : f0d75150
r7 : bf0b400c  r6 : c238f000  r5 : 00000000  r4 : f1439d68
r3 : c2091040  r2 : ffffffd8  r1 : f1439d68  r0 : 00000000
Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
Control: 10c5387d  Table: 066b004a  DAC: 00000051
Register r0 information: NULL pointer
Register r1 information: 2-page vmalloc region starting at 0xf1438000 allocated at kernel_clone+0x9c/0x390
Register r2 information: non-paged memory
Register r3 information: slab kmalloc-2k start c2091000 pointer offset 64 size 2048
Register r4 information: 2-page vmalloc region starting at 0xf1438000 allocated at kernel_clone+0x9c/0x390
Register r5 information: NULL pointer
Register r6 information: slab kmalloc-cg-4k start c238f000 pointer offset 0 size 4096
Register r7 information: 15-page vmalloc region starting at 0xbf0a8000 allocated at load_module+0xa30/0x219c
Register r8 information: 1-page vmalloc region starting at 0xf0d75000 allocated at ethtool_get_stats+0x138/0x208
Register r9 information: slab task_struct start c4816b80 pointer offset 0
Register r10 information: non-paged memory
Register r11 information: non-paged memory
Register r12 information: 2-page vmalloc region starting at 0xf1438000 allocated at kernel_clone+0x9c/0x390
Process snmpd (pid: 733, stack limit = 0x38de3a88)
Stack: (0xf1439d48 to 0xf143a000)
9d40:                   000000c0 00000001 c238f000 bf0b400c f0d75150 c4816b80
9d60: 00000100 bf0a98d8 00000000 00000000 00000000 00000000 00000000 00000000
9d80: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9da0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9dc0: 00000dc0 5335509c 00000035 c238f000 bf0b2214 01067f50 f0d75000 c0b9b9c8
9de0: 0000001d 00000035 c2212094 5335509c c4816b80 c238f000 c5ad6e00 01067f50
9e00: c1b0be80 c4816b80 00014813 c0b9d7f0 00000000 00000000 0000001d 0000001d
9e20: 00000000 00001200 00000000 00000000 c216ed90 c73943b8 00000000 00000000
9e40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9e60: 00000000 c0ad9034 00000000 00000000 00000000 00000000 00000000 00000000
9e80: 00000000 00000000 00000000 5335509c c1b0be80 f1439ee4 00008946 c1b0be80
9ea0: 01067f50 f1439ee3 00000000 00000046 b6d77ae0 c0b383f0 00008946 becc83e8
9ec0: c1b0be80 00000051 0000000b c68ca480 c7172d00 c0ad8ff0 f1439ee3 cf600e40
9ee0: 01600e40 32687465 00000000 00000000 00000000 01067f50 00000000 00000000
9f00: 00000000 5335509c 00008946 00008946 00000000 c68ca480 becc83e8 c05e2de0
9f20: f1439fb0 c03002f0 00000006 5ac3c35a c4816b80 00000006 b6d77ae0 c030caf0
9f40: c4817350 00000014 f1439e1c 0000000c 00000000 00000051 01000000 00000014
9f60: 00003fec f1439edc 00000001 c0372abc b6d77ae0 c0372abc cf600e40 5335509c
9f80: c21e6800 01015c9c 0000000b 00008946 00000036 c03002f0 c4816b80 00000036
9fa0: b6d77ae0 c03000c0 01015c9c 0000000b 0000000b 00008946 becc83e8 00000000
9fc0: 01015c9c 0000000b 00008946 00000036 00000035 010678a0 b6d797ec b6d77ae0
9fe0: b6dbf738 becc838c b6d186d7 b6baa858 40000030 0000000b 00000000 00000000
 page_pool_get_s
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52780/">CVE-2023-52780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52780">CVE-2023-52780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224933">SUSE bug 1224933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52781" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: config: fix iteration issue in 'usb_get_bos_descriptor()'

The BOS descriptor defines a root descriptor and is the base descriptor for
accessing a family of related descriptors.

Function 'usb_get_bos_descriptor()' encounters an iteration issue when
skipping the 'USB_DT_DEVICE_CAPABILITY' descriptor type. This results in
the same descriptor being read repeatedly.

To address this issue, a 'goto' statement is introduced to ensure that the
pointer and the amount read is updated correctly. This ensures that the
function iterates to the next descriptor instead of reading the same
descriptor repeatedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52782" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52782" ref_url="https://www.suse.com/security/cve/CVE-2023-52782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Track xmit submission to PTP WQ after populating metadata map

Ensure the skb is available in metadata mapping to skbs before tracking the
metadata index for detecting undelivered CQEs. If the metadata index is put
in the tracking list before putting the skb in the map, the metadata index
might be used for detecting undelivered CQEs before the relevant skb is
available in the map, which can lead to a null-ptr-deref.

Log:
    general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN
    KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
    CPU: 0 PID: 1243 Comm: kworker/0:2 Not tainted 6.6.0-rc4+ #108
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
    Workqueue: events mlx5e_rx_dim_work [mlx5_core]
    RIP: 0010:mlx5e_ptp_napi_poll+0x9a4/0x2290 [mlx5_core]
    Code: 8c 24 38 cc ff ff 4c 8d 3c c1 4c 89 f9 48 c1 e9 03 42 80 3c 31 00 0f 85 97 0f 00 00 4d 8b 3f 49 8d 7f 28 48 89 f9 48 c1 e9 03 &lt;42&gt; 80 3c 31 00 0f 85 8b 0f 00 00 49 8b 47 28 48 85 c0 0f 84 05 07
    RSP: 0018:ffff8884d3c09c88 EFLAGS: 00010206
    RAX: 0000000000000069 RBX: ffff8881160349d8 RCX: 0000000000000005
    RDX: ffffed10218f48cf RSI: 0000000000000004 RDI: 0000000000000028
    RBP: ffff888122707700 R08: 0000000000000001 R09: ffffed109a781383
    R10: 0000000000000003 R11: 0000000000000003 R12: ffff88810c7a7a40
    R13: ffff888122707700 R14: dffffc0000000000 R15: 0000000000000000
    FS:  0000000000000000(0000) GS:ffff8884d3c00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f4f878dd6e0 CR3: 000000014d108002 CR4: 0000000000370eb0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
    &lt;IRQ&gt;
    ? die_addr+0x3c/0xa0
    ? exc_general_protection+0x144/0x210
    ? asm_exc_general_protection+0x22/0x30
    ? mlx5e_ptp_napi_poll+0x9a4/0x2290 [mlx5_core]
    ? mlx5e_ptp_napi_poll+0x8f6/0x2290 [mlx5_core]
    __napi_poll.constprop.0+0xa4/0x580
    net_rx_action+0x460/0xb80
    ? _raw_spin_unlock_irqrestore+0x32/0x60
    ? __napi_poll.constprop.0+0x580/0x580
    ? tasklet_action_common.isra.0+0x2ef/0x760
    __do_softirq+0x26c/0x827
    irq_exit_rcu+0xc2/0x100
    common_interrupt+0x7f/0xa0
    &lt;/IRQ&gt;
    &lt;TASK&gt;
    asm_common_interrupt+0x22/0x40
    RIP: 0010:__kmem_cache_alloc_node+0xb/0x330
    Code: 41 5d 41 5e 41 5f c3 8b 44 24 14 8b 4c 24 10 09 c8 eb d5 e8 b7 43 ca 01 0f 1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 &lt;41&gt; 56 41 89 d6 41 55 41 89 f5 41 54 49 89 fc 53 48 83 e4 f0 48 83
    RSP: 0018:ffff88812c4079c0 EFLAGS: 00000246
    RAX: 1ffffffff083c7fe RBX: ffff888100042dc0 RCX: 0000000000000218
    RDX: 00000000ffffffff RSI: 0000000000000dc0 RDI: ffff888100042dc0
    RBP: ffff88812c4079c8 R08: ffffffffa0289f96 R09: ffffed1025880ea9
    R10: ffff888138839f80 R11: 0000000000000002 R12: 0000000000000dc0
    R13: 0000000000000100 R14: 000000000000008c R15: ffff8881271fc450
    ? cmd_exec+0x796/0x2200 [mlx5_core]
    kmalloc_trace+0x26/0xc0
    cmd_exec+0x796/0x2200 [mlx5_core]
    mlx5_cmd_do+0x22/0xc0 [mlx5_core]
    mlx5_cmd_exec+0x17/0x30 [mlx5_core]
    mlx5_core_modify_cq_moderation+0x139/0x1b0 [mlx5_core]
    ? mlx5_add_cq_to_tasklet+0x280/0x280 [mlx5_core]
    ? lockdep_set_lock_cmp_fn+0x190/0x190
    ? process_one_work+0x659/0x1220
    mlx5e_rx_dim_work+0x9d/0x100 [mlx5_core]
    process_one_work+0x730/0x1220
    ? lockdep_hardirqs_on_prepare+0x400/0x400
    ? max_active_store+0xf0/0xf0
    ? assign_work+0x168/0x240
    worker_thread+0x70f/0x12d0
    ? __kthread_parkme+0xd1/0x1d0
    ? process_one_work+0x1220/0x1220
    kthread+0x2d9/0x3b0
    ? kthread_complete_and_exit+0x20/0x20
    ret_from_fork+0x2d/0x70
    ? kthread_complete_and_exit+0x20/0x20
    ret_from_fork_as
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52782/">CVE-2023-52782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52782">CVE-2023-52782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225103">SUSE bug 1225103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52783" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52783" ref_url="https://www.suse.com/security/cve/CVE-2023-52783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wangxun: fix kernel panic due to null pointer

When the device uses a custom subsystem vendor ID, the function
wx_sw_init() returns before the memory of 'wx-&gt;mac_table' is allocated.
The null pointer will causes the kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52783/">CVE-2023-52783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52783">CVE-2023-52783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225104">SUSE bug 1225104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52784" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: stop the device in bond_setup_by_slave()

Commit 9eed321cde22 ("net: lapbether: only support ethernet devices")
has been able to keep syzbot away from net/lapb, until today.

In the following splat [1], the issue is that a lapbether device has
been created on a bonding device without members. Then adding a non
ARPHRD_ETHER member forced the bonding master to change its type.

The fix is to make sure we call dev_close() in bond_setup_by_slave()
so that the potential linked lapbether devices (or any other devices
having assumptions on the physical device) are removed.

A similar bug has been addressed in commit 40baec225765
("bonding: fix panic on non-ARPHRD_ETHER enslave failure")

[1]
skbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0
kernel BUG at net/core/skbuff.c:192 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : skb_panic net/core/skbuff.c:188 [inline]
pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
lr : skb_panic net/core/skbuff.c:188 [inline]
lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
sp : ffff800096a06aa0
x29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000
x26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea
x23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140
x20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100
x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001
x14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00
x8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c
x2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086
Call trace:
skb_panic net/core/skbuff.c:188 [inline]
skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
skb_push+0xf0/0x108 net/core/skbuff.c:2446
ip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384
dev_hard_header include/linux/netdevice.h:3136 [inline]
lapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257
lapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447
lapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149
lapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251
__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326
lapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
lapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
bond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332
bond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539
dev_ifsioc+0x754/0x9ac
dev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786
sock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217
sock_ioctl+0x4e8/0x834 net/socket.c:1322
vfs_ioctl fs/ioctl.c:51 [inline]
__do_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224946">SUSE bug 1224946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52785" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52785" ref_url="https://www.suse.com/security/cve/CVE-2023-52785" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix racing issue between ufshcd_mcq_abort() and ISR

If command timeout happens and cq complete IRQ is raised at the same time,
ufshcd_mcq_abort clears lprb-&gt;cmd and a NULL pointer deref happens in the
ISR. Error log:

ufshcd_abort: Device abort task at tag 18
Unable to handle kernel NULL pointer dereference at virtual address
0000000000000108
pc : [0xffffffe27ef867ac] scsi_dma_unmap+0xc/0x44
lr : [0xffffffe27f1b898c] ufshcd_release_scsi_cmd+0x24/0x114
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52785/">CVE-2023-52785 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52785">CVE-2023-52785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224950">SUSE bug 1224950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52786" ref_url="https://www.suse.com/security/cve/CVE-2023-52786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix racy may inline data check in dio write

syzbot reports that the following warning from ext4_iomap_begin()
triggers as of the commit referenced below:

        if (WARN_ON_ONCE(ext4_has_inline_data(inode)))
                return -ERANGE;

This occurs during a dio write, which is never expected to encounter
an inode with inline data. To enforce this behavior,
ext4_dio_write_iter() checks the current inline state of the inode
and clears the MAY_INLINE_DATA state flag to either fall back to
buffered writes, or enforce that any other writers in progress on
the inode are not allowed to create inline data.

The problem is that the check for existing inline data and the state
flag can span a lock cycle. For example, if the ilock is originally
locked shared and subsequently upgraded to exclusive, another writer
may have reacquired the lock and created inline data before the dio
write task acquires the lock and proceeds.

The commit referenced below loosens the lock requirements to allow
some forms of unaligned dio writes to occur under shared lock, but
AFAICT the inline data check was technically already racy for any
dio write that would have involved a lock cycle. Regardless, lift
clearing of the state bit to the same lock critical section that
checks for preexisting inline data on the inode to close the race.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52786/">CVE-2023-52786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52786">CVE-2023-52786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224939">SUSE bug 1224939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52787" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: make sure active queue usage is held for bio_integrity_prep()

blk_integrity_unregister() can come if queue usage counter isn't held
for one bio with integrity prepared, so this request may be completed with
calling profile-&gt;complete_fn, then kernel panic.

Another constraint is that bio_integrity_prep() needs to be called
before bio merge.

Fix the issue by:

- call bio_integrity_prep() with one queue usage counter grabbed reliably

- call bio_integrity_prep() before bio merge
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225105">SUSE bug 1225105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i915/perf: Fix NULL deref bugs with drm_dbg() calls

When i915 perf interface is not available dereferencing it will lead to
NULL dereferences.

As returning -ENOTSUPP is pretty clear return when perf interface is not
available.

[tursulin: added stable tag]
(cherry picked from commit 36f27350ff745bd228ab04d7845dfbffc177a889)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52789" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: vcc: Add check for kstrdup() in vcc_probe()

Add check for the return value of kstrdup() and return the error, if it
fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52790" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52790" ref_url="https://www.suse.com/security/cve/CVE-2023-52790" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

swiotlb: fix out-of-bounds TLB allocations with CONFIG_SWIOTLB_DYNAMIC

Limit the free list length to the size of the IO TLB. Transient pool can be
smaller than IO_TLB_SEGSIZE, but the free list is initialized with the
assumption that the total number of slots is a multiple of IO_TLB_SEGSIZE.
As a result, swiotlb_area_find_slots() may allocate slots past the end of
a transient IO TLB buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-52790/">CVE-2023-52790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52790">CVE-2023-52790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225107">SUSE bug 1225107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52791" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: core: Run atomic i2c xfer when !preemptible

Since bae1d3a05a8b, i2c transfers are non-atomic if preemption is
disabled. However, non-atomic i2c transfers require preemption (e.g. in
wait_for_completion() while waiting for the DMA).

panic() calls preempt_disable_notrace() before calling
emergency_restart(). Therefore, if an i2c device is used for the
restart, the xfer should be atomic. This avoids warnings like:

[   12.667612] WARNING: CPU: 1 PID: 1 at kernel/rcu/tree_plugin.h:318 rcu_note_context_switch+0x33c/0x6b0
[   12.676926] Voluntary context switch within RCU read-side critical section!
...
[   12.742376]  schedule_timeout from wait_for_completion_timeout+0x90/0x114
[   12.749179]  wait_for_completion_timeout from tegra_i2c_wait_completion+0x40/0x70
...
[   12.994527]  atomic_notifier_call_chain from machine_restart+0x34/0x58
[   13.001050]  machine_restart from panic+0x2a8/0x32c

Use !preemptible() instead, which is basically the same check as
pre-v5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52792" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52792" ref_url="https://www.suse.com/security/cve/CVE-2023-52792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/region: Do not try to cleanup after cxl_region_setup_targets() fails

Commit 5e42bcbc3fef ("cxl/region: decrement -&gt;nr_targets on error in
cxl_region_attach()") tried to avoid 'eiw' initialization errors when
-&gt;nr_targets exceeded 16, by just decrementing -&gt;nr_targets when
cxl_region_setup_targets() failed.

Commit 86987c766276 ("cxl/region: Cleanup target list on attach error")
extended that cleanup to also clear cxled-&gt;pos and p-&gt;targets[pos]. The
initialization error was incidentally fixed separately by:
Commit 8d4285425714 ("cxl/region: Fix port setup uninitialized variable
warnings") which was merged a few days after 5e42bcbc3fef.

But now the original cleanup when cxl_region_setup_targets() fails
prevents endpoint and switch decoder resources from being reused:

1) the cleanup does not set the decoder's region to NULL, which results
   in future dpa_size_store() calls returning -EBUSY
2) the decoder is not properly freed, which results in future commit
   errors associated with the upstream switch

Now that the initialization errors were fixed separately, the proper
cleanup for this case is to just return immediately. Then the resources
associated with this target get cleanup up as normal when the failed
region is deleted.

The -&gt;nr_targets decrement in the error case also helped prevent
a p-&gt;targets[] array overflow, so add a new check to prevent against
that overflow.

Tested by trying to create an invalid region for a 2 switch * 2 endpoint
topology, and then following up with creating a valid region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52792/">CVE-2023-52792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52792">CVE-2023-52792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225477">SUSE bug 1225477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52794" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52794" ref_url="https://www.suse.com/security/cve/CVE-2023-52794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: powerclamp: fix mismatch in get function for max_idle

KASAN reported this

      [ 444.853098] BUG: KASAN: global-out-of-bounds in param_get_int+0x77/0x90
      [ 444.853111] Read of size 4 at addr ffffffffc16c9220 by task cat/2105
      ...
      [ 444.853442] The buggy address belongs to the variable:
      [ 444.853443] max_idle+0x0/0xffffffffffffcde0 [intel_powerclamp]

There is a mismatch between the param_get_int and the definition of
max_idle.  Replacing param_get_int with param_get_byte resolves this
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52794/">CVE-2023-52794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52794">CVE-2023-52794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225028">SUSE bug 1225028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost-vdpa: fix use after free in vhost_vdpa_probe()

The put_device() calls vhost_vdpa_release_dev() which calls
ida_simple_remove() and frees "v".  So this call to
ida_simple_remove() is a use after free and a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225085">SUSE bug 1225085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52796" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: add ipvlan_route_v6_outbound() helper

Inspired by syzbot reports using a stack of multiple ipvlan devices.

Reduce stack size needed in ipvlan_process_v6_outbound() by moving
the flowi6 struct used for the route lookup in an non inlined
helper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,
immediately reclaimed.

Also make sure ipvlan_process_v4_outbound() is not inlined.

We might also have to lower MAX_NEST_DEV, because only syzbot uses
setups with more than four stacked devices.

BUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)
stack guard page: 0000 [#1] SMP KASAN
CPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
RIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188
Code: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 &lt;41&gt; 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89
RSP: 0018:ffffc9000e804000 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568
RBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c
R13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000
FS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;#DF&gt;
&lt;/#DF&gt;
&lt;TASK&gt;
[&lt;ffffffff81f281d1&gt;] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31
[&lt;ffffffff817e5bf2&gt;] instrument_atomic_read include/linux/instrumented.h:72 [inline]
[&lt;ffffffff817e5bf2&gt;] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
[&lt;ffffffff817e5bf2&gt;] cpumask_test_cpu include/linux/cpumask.h:506 [inline]
[&lt;ffffffff817e5bf2&gt;] cpu_online include/linux/cpumask.h:1092 [inline]
[&lt;ffffffff817e5bf2&gt;] trace_lock_acquire include/trace/events/lock.h:24 [inline]
[&lt;ffffffff817e5bf2&gt;] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632
[&lt;ffffffff8563221e&gt;] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306
[&lt;ffffffff8561464d&gt;] rcu_read_lock include/linux/rcupdate.h:747 [inline]
[&lt;ffffffff8561464d&gt;] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221
[&lt;ffffffff85618120&gt;] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606
[&lt;ffffffff856f65b5&gt;] pol_lookup_func include/net/ip6_fib.h:584 [inline]
[&lt;ffffffff856f65b5&gt;] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116
[&lt;ffffffff85618009&gt;] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638
[&lt;ffffffff8561821a&gt;] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651
[&lt;ffffffff838bd5a3&gt;] ip6_route_output include/net/ip6_route.h:100 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677
[&lt;ffffffff838c2909&gt;] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229
[&lt;ffffffff84d03900&gt;] netdev_start_xmit include/linux/netdevice.h:4966 [inline]
[&lt;ffffffff84d03900&gt;] xmit_one net/core/dev.c:3644 [inline]
[&lt;ffffffff84d03900&gt;] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660
[&lt;ffffffff84d080e2&gt;] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324
[&lt;ffffffff855ce4cd&gt;] dev_queue_xmit include/linux/netdevice.h:3067 [inline]
[&lt;ffffffff855ce4cd&gt;] neigh_hh_output include/net/neighbour.h:529 [inline]
[&lt;f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224930">SUSE bug 1224930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52797" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52797" ref_url="https://www.suse.com/security/cve/CVE-2023-52797" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: perf: Check find_first_bit() return value

We must check the return value of find_first_bit() before using the
return value as an index array since it happens to overflow the array
and then panic:

[  107.318430] Kernel BUG [#1]
[  107.319434] CPU: 3 PID: 1238 Comm: kill Tainted: G            E      6.6.0-rc6ubuntu-defconfig #2
[  107.319465] Hardware name: riscv-virtio,qemu (DT)
[  107.319551] epc : pmu_sbi_ovf_handler+0x3a4/0x3ae
[  107.319840]  ra : pmu_sbi_ovf_handler+0x52/0x3ae
[  107.319868] epc : ffffffff80a0a77c ra : ffffffff80a0a42a sp : ffffaf83fecda350
[  107.319884]  gp : ffffffff823961a8 tp : ffffaf8083db1dc0 t0 : ffffaf83fecda480
[  107.319899]  t1 : ffffffff80cafe62 t2 : 000000000000ff00 s0 : ffffaf83fecda520
[  107.319921]  s1 : ffffaf83fecda380 a0 : 00000018fca29df0 a1 : ffffffffffffffff
[  107.319936]  a2 : 0000000001073734 a3 : 0000000000000004 a4 : 0000000000000000
[  107.319951]  a5 : 0000000000000040 a6 : 000000001d1c8774 a7 : 0000000000504d55
[  107.319965]  s2 : ffffffff82451f10 s3 : ffffffff82724e70 s4 : 000000000000003f
[  107.319980]  s5 : 0000000000000011 s6 : ffffaf8083db27c0 s7 : 0000000000000000
[  107.319995]  s8 : 0000000000000001 s9 : 00007fffb45d6558 s10: 00007fffb45d81a0
[  107.320009]  s11: ffffaf7ffff60000 t3 : 0000000000000004 t4 : 0000000000000000
[  107.320023]  t5 : ffffaf7f80000000 t6 : ffffaf8000000000
[  107.320037] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000003
[  107.320081] [&lt;ffffffff80a0a77c&gt;] pmu_sbi_ovf_handler+0x3a4/0x3ae
[  107.320112] [&lt;ffffffff800b42d0&gt;] handle_percpu_devid_irq+0x9e/0x1a0
[  107.320131] [&lt;ffffffff800ad92c&gt;] generic_handle_domain_irq+0x28/0x36
[  107.320148] [&lt;ffffffff8065f9f8&gt;] riscv_intc_irq+0x36/0x4e
[  107.320166] [&lt;ffffffff80caf4a0&gt;] handle_riscv_irq+0x54/0x86
[  107.320189] [&lt;ffffffff80cb0036&gt;] do_irq+0x64/0x96
[  107.320271] Code: 85a6 855e b097 ff7f 80e7 9220 b709 9002 4501 bbd9 (9002) 6097
[  107.320585] ---[ end trace 0000000000000000 ]---
[  107.320704] Kernel panic - not syncing: Fatal exception in interrupt
[  107.320775] SMP: stopping secondary CPUs
[  107.321219] Kernel Offset: 0x0 from 0xffffffff80000000
[  107.333051] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52797/">CVE-2023-52797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52797">CVE-2023-52797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225115">SUSE bug 1225115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52798" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix dfs radar event locking

The ath11k active pdevs are protected by RCU but the DFS radar event
handling code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in dbFindLeaf

Currently while searching for dmtree_t for sufficient free blocks there
is an array out of bounds while getting element in tp-&gt;dm_stree. To add
the required check for out of bound we first need to determine the type
of dmtree. Thus added an extra parameter to dbFindLeaf so that the type
of tree can be determined and the required check can be applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52800" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix htt pktlog locking

The ath11k active pdevs are protected by RCU but the htt pktlog handling
code calling ath11k_mac_get_ar_by_pdev_id() was not marked as a
read-side critical section.

Mark the code in question as an RCU read-side critical section to avoid
any potential use-after-free issues.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52801" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52801" ref_url="https://www.suse.com/security/cve/CVE-2023-52801" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Fix missing update of domains_itree after splitting iopt_area

In iopt_area_split(), if the original iopt_area has filled a domain and is
linked to domains_itree, pages_nodes have to be properly
reinserted. Otherwise the domains_itree becomes corrupted and we will UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52801/">CVE-2023-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52801">CVE-2023-52801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225006">SUSE bug 1225006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52802" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52802" ref_url="https://www.suse.com/security/cve/CVE-2023-52802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52802/">CVE-2023-52802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52802">CVE-2023-52802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225474">SUSE bug 1225474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix RPC client cleaned up the freed pipefs dentries

RPC client pipefs dentries cleanup is in separated rpc_remove_pipedir()
workqueue,which takes care about pipefs superblock locking.
In some special scenarios, when kernel frees the pipefs sb of the
current client and immediately alloctes a new pipefs sb,
rpc_remove_pipedir function would misjudge the existence of pipefs
sb which is not the one it used to hold. As a result,
the rpc_remove_pipedir would clean the released freed pipefs dentries.

To fix this issue, rpc_remove_pipedir should check whether the
current pipefs sb is consistent with the original pipefs sb.

This error can be catched by KASAN:
=========================================================
[  250.497700] BUG: KASAN: slab-use-after-free in dget_parent+0x195/0x200
[  250.498315] Read of size 4 at addr ffff88800a2ab804 by task kworker/0:18/106503
[  250.500549] Workqueue: events rpc_free_client_work
[  250.501001] Call Trace:
[  250.502880]  kasan_report+0xb6/0xf0
[  250.503209]  ? dget_parent+0x195/0x200
[  250.503561]  dget_parent+0x195/0x200
[  250.503897]  ? __pfx_rpc_clntdir_depopulate+0x10/0x10
[  250.504384]  rpc_rmdir_depopulate+0x1b/0x90
[  250.504781]  rpc_remove_client_dir+0xf5/0x150
[  250.505195]  rpc_free_client_work+0xe4/0x230
[  250.505598]  process_one_work+0x8ee/0x13b0
...
[   22.039056] Allocated by task 244:
[   22.039390]  kasan_save_stack+0x22/0x50
[   22.039758]  kasan_set_track+0x25/0x30
[   22.040109]  __kasan_slab_alloc+0x59/0x70
[   22.040487]  kmem_cache_alloc_lru+0xf0/0x240
[   22.040889]  __d_alloc+0x31/0x8e0
[   22.041207]  d_alloc+0x44/0x1f0
[   22.041514]  __rpc_lookup_create_exclusive+0x11c/0x140
[   22.041987]  rpc_mkdir_populate.constprop.0+0x5f/0x110
[   22.042459]  rpc_create_client_dir+0x34/0x150
[   22.042874]  rpc_setup_pipedir_sb+0x102/0x1c0
[   22.043284]  rpc_client_register+0x136/0x4e0
[   22.043689]  rpc_new_client+0x911/0x1020
[   22.044057]  rpc_create_xprt+0xcb/0x370
[   22.044417]  rpc_create+0x36b/0x6c0
...
[   22.049524] Freed by task 0:
[   22.049803]  kasan_save_stack+0x22/0x50
[   22.050165]  kasan_set_track+0x25/0x30
[   22.050520]  kasan_save_free_info+0x2b/0x50
[   22.050921]  __kasan_slab_free+0x10e/0x1a0
[   22.051306]  kmem_cache_free+0xa5/0x390
[   22.051667]  rcu_core+0x62c/0x1930
[   22.051995]  __do_softirq+0x165/0x52a
[   22.052347]
[   22.052503] Last potentially related work creation:
[   22.052952]  kasan_save_stack+0x22/0x50
[   22.053313]  __kasan_record_aux_stack+0x8e/0xa0
[   22.053739]  __call_rcu_common.constprop.0+0x6b/0x8b0
[   22.054209]  dentry_free+0xb2/0x140
[   22.054540]  __dentry_kill+0x3be/0x540
[   22.054900]  shrink_dentry_list+0x199/0x510
[   22.055293]  shrink_dcache_parent+0x190/0x240
[   22.055703]  do_one_tree+0x11/0x40
[   22.056028]  shrink_dcache_for_umount+0x61/0x140
[   22.056461]  generic_shutdown_super+0x70/0x590
[   22.056879]  kill_anon_super+0x3a/0x60
[   22.057234]  rpc_kill_sb+0x121/0x200
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225008">SUSE bug 1225008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Add validity check for db_maxag and db_agpref

Both db_maxag and db_agpref are used as the index of the
db_agfree array, but there is currently no validity check for
db_maxag and db_agpref, which can lead to errors.

The following is related bug reported by Syzbot:

UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20
index 7936 is out of range for type 'atomic_t[128]'

Add checking that the values of db_maxag and db_agpref are valid
indexes for the db_agfree array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52805" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in diAlloc

Currently there is not check against the agno of the iag while
allocating new inodes to avoid fragmentation problem. Added the check
which is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52806" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix possible null-ptr-deref when assigning a stream

While AudioDSP drivers assign streams exclusively of HOST or LINK type,
nothing blocks a user to attempt to assign a COUPLED stream. As
supplied substream instance may be a stub, what is the case when
code-loading, such scenario ends with null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52807" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs

The hns3 driver define an array of string to show the coalesce
info, but if the kernel adds a new mode or a new state,
out-of-bounds access may occur when coalesce info is read via
debugfs, this patch fix the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225097">SUSE bug 1225097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52808" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs

If init debugfs failed during device registration due to memory allocation
failure, debugfs_remove_recursive() is called, after which debugfs_dir is
not set to NULL. debugfs_remove_recursive() will be called again during
device removal. As a result, illegal pointer is accessed.

[ 1665.467244] hisi_sas_v3_hw 0000:b4:02.0: failed to init debugfs!
...
[ 1669.836708] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[ 1669.872669] pc : down_write+0x24/0x70
[ 1669.876315] lr : down_write+0x1c/0x70
[ 1669.879961] sp : ffff000036f53a30
[ 1669.883260] x29: ffff000036f53a30 x28: ffffa027c31549f8
[ 1669.888547] x27: ffffa027c3140000 x26: 0000000000000000
[ 1669.893834] x25: ffffa027bf37c270 x24: ffffa027bf37c270
[ 1669.899122] x23: ffff0000095406b8 x22: ffff0000095406a8
[ 1669.904408] x21: 0000000000000000 x20: ffffa027bf37c310
[ 1669.909695] x19: 00000000000000a0 x18: ffff8027dcd86f10
[ 1669.914982] x17: 0000000000000000 x16: 0000000000000000
[ 1669.920268] x15: 0000000000000000 x14: ffffa0274014f870
[ 1669.925555] x13: 0000000000000040 x12: 0000000000000228
[ 1669.930842] x11: 0000000000000020 x10: 0000000000000bb0
[ 1669.936129] x9 : ffff000036f537f0 x8 : ffff80273088ca10
[ 1669.941416] x7 : 000000000000001d x6 : 00000000ffffffff
[ 1669.946702] x5 : ffff000008a36310 x4 : ffff80273088be00
[ 1669.951989] x3 : ffff000009513e90 x2 : 0000000000000000
[ 1669.957276] x1 : 00000000000000a0 x0 : ffffffff00000001
[ 1669.962563] Call trace:
[ 1669.965000]  down_write+0x24/0x70
[ 1669.968301]  debugfs_remove_recursive+0x5c/0x1b0
[ 1669.972905]  hisi_sas_debugfs_exit+0x24/0x30 [hisi_sas_main]
[ 1669.978541]  hisi_sas_v3_remove+0x130/0x150 [hisi_sas_v3_hw]
[ 1669.984175]  pci_device_remove+0x48/0xd8
[ 1669.988082]  device_release_driver_internal+0x1b4/0x250
[ 1669.993282]  device_release_driver+0x28/0x38
[ 1669.997534]  pci_stop_bus_device+0x84/0xb8
[ 1670.001611]  pci_stop_and_remove_bus_device_locked+0x24/0x40
[ 1670.007244]  remove_store+0xfc/0x140
[ 1670.010802]  dev_attr_store+0x44/0x60
[ 1670.014448]  sysfs_kf_write+0x58/0x80
[ 1670.018095]  kernfs_fop_write+0xe8/0x1f0
[ 1670.022000]  __vfs_write+0x60/0x190
[ 1670.025472]  vfs_write+0xac/0x1c0
[ 1670.028771]  ksys_write+0x6c/0xd8
[ 1670.032071]  __arm64_sys_write+0x24/0x30
[ 1670.035977]  el0_svc_common+0x78/0x130
[ 1670.039710]  el0_svc_handler+0x38/0x78
[ 1670.043442]  el0_svc+0x8/0xc

To fix this, set debugfs_dir to NULL after debugfs_remove_recursive().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225555">SUSE bug 1225555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()

fc_lport_ptp_setup() did not check the return value of fc_rport_create()
which can return NULL and would cause a NULL pointer dereference. Address
this issue by checking return value of fc_rport_create() and log error
message on fc_rport_create() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225556">SUSE bug 1225556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52810" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/jfs: Add check for negative db_l2nbperpage

l2nbperpage is log2(number of blks per page), and the minimum legal
value should be 0, not negative.

In the case of l2nbperpage being negative, an error will occur
when subsequently used as shift exponent.

Syzbot reported this bug:

UBSAN: shift-out-of-bounds in fs/jfs/jfs_dmap.c:799:12
shift exponent -16777216 is negative
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52811" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool

In practice the driver should never send more commands than are allocated
to a queue's event pool. In the unlikely event that this happens, the code
asserts a BUG_ON, and in the case that the kernel is not configured to
crash on panic returns a junk event pointer from the empty event list
causing things to spiral from there. This BUG_ON is a historical artifact
of the ibmvfc driver first being upstreamed, and it is well known now that
the use of BUG_ON is bad practice except in the most unrecoverable
scenario. There is nothing about this scenario that prevents the driver
from recovering and carrying on.

Remove the BUG_ON in question from ibmvfc_get_event() and return a NULL
pointer in the case of an empty event pool. Update all call sites to
ibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate
failure or recovery action.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52812" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: check num of link levels when update pcie param

In SR-IOV environment, the value of pcie_table-&gt;num_of_link_levels will
be 0, and num_of_levels - 1 will cause array index out of bounds
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225564">SUSE bug 1225564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52813" ref_url="https://www.suse.com/security/cve/CVE-2023-52813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: pcrypt - Fix hungtask for PADATA_RESET

We found a hungtask bug in test_aead_vec_cfg as follows:

INFO: task cryptomgr_test:391009 blocked for more than 120 seconds.
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Call trace:
 __switch_to+0x98/0xe0
 __schedule+0x6c4/0xf40
 schedule+0xd8/0x1b4
 schedule_timeout+0x474/0x560
 wait_for_common+0x368/0x4e0
 wait_for_completion+0x20/0x30
 wait_for_completion+0x20/0x30
 test_aead_vec_cfg+0xab4/0xd50
 test_aead+0x144/0x1f0
 alg_test_aead+0xd8/0x1e0
 alg_test+0x634/0x890
 cryptomgr_test+0x40/0x70
 kthread+0x1e0/0x220
 ret_from_fork+0x10/0x18
 Kernel panic - not syncing: hung_task: blocked tasks

For padata_do_parallel, when the return err is 0 or -EBUSY, it will call
wait_for_completion(&amp;wait-&gt;completion) in test_aead_vec_cfg. In normal
case, aead_request_complete() will be called in pcrypt_aead_serial and the
return err is 0 for padata_do_parallel. But, when pinst-&gt;flags is
PADATA_RESET, the return err is -EBUSY for padata_do_parallel, and it
won't call aead_request_complete(). Therefore, test_aead_vec_cfg will
hung at wait_for_completion(&amp;wait-&gt;completion), which will cause
hungtask.

The problem comes as following:
(padata_do_parallel)                 |
    rcu_read_lock_bh();              |
    err = -EINVAL;                   |   (padata_replace)
                                     |     pinst-&gt;flags |= PADATA_RESET;
    err = -EBUSY                     |
    if (pinst-&gt;flags &amp; PADATA_RESET) |
        rcu_read_unlock_bh()         |
        return err

In order to resolve the problem, we replace the return err -EBUSY with
-EAGAIN, which means parallel_data is changing, and the caller should call
it again.

v3:
remove retry and just change the return err.
v2:
introduce padata_try_do_parallel() in pcrypt_aead_encrypt and
pcrypt_aead_decrypt to solve the hungtask.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52813/">CVE-2023-52813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52813">CVE-2023-52813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225527">SUSE bug 1225527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52814" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential null pointer derefernce

The amdgpu_ras_get_context may return NULL if device
not support ras feature, so add check before using.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52815" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/vkms: fix a possible null pointer dereference

In amdgpu_vkms_conn_get_modes(), the return value of drm_cvt_mode()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_cvt_mode(). Add a check to avoid null pointer
dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225568">SUSE bug 1225568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52816" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix shift out-of-bounds issue

[  567.613292] shift exponent 255 is too large for 64-bit type 'long unsigned int'
[  567.614498] CPU: 5 PID: 238 Comm: kworker/5:1 Tainted: G           OE      6.2.0-34-generic #34~22.04.1-Ubuntu
[  567.614502] Hardware name: AMD Splinter/Splinter-RPL, BIOS WS43927N_871 09/25/2023
[  567.614504] Workqueue: events send_exception_work_handler [amdgpu]
[  567.614748] Call Trace:
[  567.614750]  &lt;TASK&gt;
[  567.614753]  dump_stack_lvl+0x48/0x70
[  567.614761]  dump_stack+0x10/0x20
[  567.614763]  __ubsan_handle_shift_out_of_bounds+0x156/0x310
[  567.614769]  ? srso_alias_return_thunk+0x5/0x7f
[  567.614773]  ? update_sd_lb_stats.constprop.0+0xf2/0x3c0
[  567.614780]  svm_range_split_by_granularity.cold+0x2b/0x34 [amdgpu]
[  567.615047]  ? srso_alias_return_thunk+0x5/0x7f
[  567.615052]  svm_migrate_to_ram+0x185/0x4d0 [amdgpu]
[  567.615286]  do_swap_page+0x7b6/0xa30
[  567.615291]  ? srso_alias_return_thunk+0x5/0x7f
[  567.615294]  ? __free_pages+0x119/0x130
[  567.615299]  handle_pte_fault+0x227/0x280
[  567.615303]  __handle_mm_fault+0x3c0/0x720
[  567.615311]  handle_mm_fault+0x119/0x330
[  567.615314]  ? lock_mm_and_find_vma+0x44/0x250
[  567.615318]  do_user_addr_fault+0x1a9/0x640
[  567.615323]  exc_page_fault+0x81/0x1b0
[  567.615328]  asm_exc_page_fault+0x27/0x30
[  567.615332] RIP: 0010:__get_user_8+0x1c/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL

In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:

1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G           OE     5.15.0-43-generic #46-Ubunt       u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS:  00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]  &lt;TASK&gt;
[4005007.702640]  amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]
[4005007.703002]  full_proxy_read+0x5c/0x80
[4005007.703011]  vfs_read+0x9f/0x1a0
[4005007.703019]  ksys_read+0x67/0xe0
[4005007.703023]  __x64_sys_read+0x19/0x20
[4005007.703028]  do_syscall_64+0x5c/0xc0
[4005007.703034]  ? do_user_addr_fault+0x1e3/0x670
[4005007.703040]  ? exit_to_user_mode_prepare+0x37/0xb0
[4005007.703047]  ? irqentry_exit_to_user_mode+0x9/0x20
[4005007.703052]  ? irqentry_exit+0x19/0x30
[4005007.703057]  ? exc_page_fault+0x89/0x160
[4005007.703062]  ? asm_exc_page_fault+0x8/0x30
[4005007.703068]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[4005007.703075] RIP: 0033:0x7f5e07672992
[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f        1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e       c 28 48 89 54 24
[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992
[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003
[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010
[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000
[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
[4005007.703105]  &lt;/TASK&gt;
[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_       iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t       tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm       i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo       mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v       2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core        drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca
[4005007.703184] CR2: 0000000000000000
[4005007.703188] ---[ en
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52818" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7

For pptable structs that use flexible array sizes, use flexible arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52819" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga

For pptable structs that use flexible array sizes, use flexible arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52821" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel: fix a possible null pointer dereference

In versatile_panel_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52823" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52823" ref_url="https://www.suse.com/security/cve/CVE-2023-52823" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52823/">CVE-2023-52823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52823">CVE-2023-52823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225039">SUSE bug 1225039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52825" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix a race condition of vram buffer unref in svm code

prange-&gt;svm_bo unref can happen in both mmu callback and a callback after
migrate to system ram. Both are async call in different tasks. Sync svm_bo
unref operation to avoid random "use-after-free".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52826" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference

In tpg110_get_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52827" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52827" ref_url="https://www.suse.com/security/cve/CVE-2023-52827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()

len is extracted from HTT message and could be an unexpected value in
case errors happen, so add validation before using to avoid possible
out-of-bound read in the following message iteration and parsing.

The same issue also applies to ppdu_info-&gt;ppdu_stats.common.num_users,
so validate it before using too.

These are found during code review.

Compile test only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52827/">CVE-2023-52827 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52827">CVE-2023-52827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225078">SUSE bug 1225078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227321">SUSE bug 1227321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52828" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52828" ref_url="https://www.suse.com/security/cve/CVE-2023-52828" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Detect IP == ksym.end as part of BPF program

Now that bpf_throw kfunc is the first such call instruction that has
noreturn semantics within the verifier, this also kicks in dead code
elimination in unprecedented ways. For one, any instruction following
a bpf_throw call will never be marked as seen. Moreover, if a callchain
ends up throwing, any instructions after the call instruction to the
eventually throwing subprog in callers will also never be marked as
seen.

The tempting way to fix this would be to emit extra 'int3' instructions
which bump the jited_len of a program, and ensure that during runtime
when a program throws, we can discover its boundaries even if the call
instruction to bpf_throw (or to subprogs that always throw) is emitted
as the final instruction in the program.

An example of such a program would be this:

do_something():
	...
	r0 = 0
	exit

foo():
	r1 = 0
	call bpf_throw
	r0 = 0
	exit

bar(cond):
	if r1 != 0 goto pc+2
	call do_something
	exit
	call foo
	r0 = 0  // Never seen by verifier
	exit	//

main(ctx):
	r1 = ...
	call bar
	r0 = 0
	exit

Here, if we do end up throwing, the stacktrace would be the following:

bpf_throw
foo
bar
main

In bar, the final instruction emitted will be the call to foo, as such,
the return address will be the subsequent instruction (which the JIT
emits as int3 on x86). This will end up lying outside the jited_len of
the program, thus, when unwinding, we will fail to discover the return
address as belonging to any program and end up in a panic due to the
unreliable stack unwinding of BPF programs that we never expect.

To remedy this case, make bpf_prog_ksym_find treat IP == ksym.end as
part of the BPF program, so that is_bpf_text_address returns true when
such a case occurs, and we are able to unwind reliably when the final
instruction ends up being a call instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52828/">CVE-2023-52828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52828">CVE-2023-52828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225079">SUSE bug 1225079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52829" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52829" ref_url="https://www.suse.com/security/cve/CVE-2023-52829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps()

reg_cap.phy_id is extracted from WMI event and could be an unexpected value
in case some errors happen. As a result out-of-bound write may occur to
soc-&gt;hal_reg_cap. Fix it by validating reg_cap.phy_id before using it.

This is found during code review.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52829/">CVE-2023-52829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52829">CVE-2023-52829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225081">SUSE bug 1225081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227474">SUSE bug 1227474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52831" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52831" ref_url="https://www.suse.com/security/cve/CVE-2023-52831" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpu/hotplug: Don't offline the last non-isolated CPU

If a system has isolated CPUs via the "isolcpus=" command line parameter,
then an attempt to offline the last housekeeping CPU will result in a
WARN_ON() when rebuilding the scheduler domains and a subsequent panic due
to and unhandled empty CPU mas in partition_sched_domains_locked().

cpuset_hotplug_workfn()
  rebuild_sched_domains_locked()
    ndoms = generate_sched_domains(&amp;doms, &amp;attr);
      cpumask_and(doms[0], top_cpuset.effective_cpus, housekeeping_cpumask(HK_FLAG_DOMAIN));

Thus results in an empty CPU mask which triggers the warning and then the
subsequent crash:

WARNING: CPU: 4 PID: 80 at kernel/sched/topology.c:2366 build_sched_domains+0x120c/0x1408
Call trace:
 build_sched_domains+0x120c/0x1408
 partition_sched_domains_locked+0x234/0x880
 rebuild_sched_domains_locked+0x37c/0x798
 rebuild_sched_domains+0x30/0x58
 cpuset_hotplug_workfn+0x2a8/0x930

Unable to handle kernel paging request at virtual address fffe80027ab37080
 partition_sched_domains_locked+0x318/0x880
 rebuild_sched_domains_locked+0x37c/0x798

Aside of the resulting crash, it does not make any sense to offline the last
last housekeeping CPU.

Prevent this by masking out the non-housekeeping CPUs when selecting a
target CPU for initiating the CPU unplug operation via the work queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52831/">CVE-2023-52831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52831">CVE-2023-52831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225533">SUSE bug 1225533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52832" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't return unset power in ieee80211_get_tx_power()

We can get a UBSAN warning if ieee80211_get_tx_power() returns the
INT_MIN value mac80211 internally uses for "unset power level".

 UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5
 -2147483648 * 100 cannot be represented in type 'int'
 CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE
 Call Trace:
  dump_stack+0x74/0x92
  ubsan_epilogue+0x9/0x50
  handle_overflow+0x8d/0xd0
  __ubsan_handle_mul_overflow+0xe/0x10
  nl80211_send_iface+0x688/0x6b0 [cfg80211]
  [...]
  cfg80211_register_wdev+0x78/0xb0 [cfg80211]
  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]
  [...]
  ieee80211_if_add+0x60e/0x8f0 [mac80211]
  ieee80211_register_hw+0xda5/0x1170 [mac80211]

In this case, simply return an error instead, to indicate
that no data is available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52833" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: Add date-&gt;evt_skb is NULL check

fix crash because of null pointers

[ 6104.969662] BUG: kernel NULL pointer dereference, address: 00000000000000c8
[ 6104.969667] #PF: supervisor read access in kernel mode
[ 6104.969668] #PF: error_code(0x0000) - not-present page
[ 6104.969670] PGD 0 P4D 0
[ 6104.969673] Oops: 0000 [#1] SMP NOPTI
[ 6104.969684] RIP: 0010:btusb_mtk_hci_wmt_sync+0x144/0x220 [btusb]
[ 6104.969688] RSP: 0018:ffffb8d681533d48 EFLAGS: 00010246
[ 6104.969689] RAX: 0000000000000000 RBX: ffff8ad560bb2000 RCX: 0000000000000006
[ 6104.969691] RDX: 0000000000000000 RSI: ffffb8d681533d08 RDI: 0000000000000000
[ 6104.969692] RBP: ffffb8d681533d70 R08: 0000000000000001 R09: 0000000000000001
[ 6104.969694] R10: 0000000000000001 R11: 00000000fa83b2da R12: ffff8ad461d1d7c0
[ 6104.969695] R13: 0000000000000000 R14: ffff8ad459618c18 R15: ffffb8d681533d90
[ 6104.969697] FS:  00007f5a1cab9d40(0000) GS:ffff8ad578200000(0000) knlGS:00000
[ 6104.969699] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 6104.969700] CR2: 00000000000000c8 CR3: 000000018620c001 CR4: 0000000000760ef0
[ 6104.969701] PKRU: 55555554
[ 6104.969702] Call Trace:
[ 6104.969708]  btusb_mtk_shutdown+0x44/0x80 [btusb]
[ 6104.969732]  hci_dev_do_close+0x470/0x5c0 [bluetooth]
[ 6104.969748]  hci_rfkill_set_block+0x56/0xa0 [bluetooth]
[ 6104.969753]  rfkill_set_block+0x92/0x160
[ 6104.969755]  rfkill_fop_write+0x136/0x1e0
[ 6104.969759]  __vfs_write+0x18/0x40
[ 6104.969761]  vfs_write+0xdf/0x1c0
[ 6104.969763]  ksys_write+0xb1/0xe0
[ 6104.969765]  __x64_sys_write+0x1a/0x20
[ 6104.969769]  do_syscall_64+0x51/0x180
[ 6104.969771]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[ 6104.969773] RIP: 0033:0x7f5a21f18fef
[ 6104.9] RSP: 002b:00007ffeefe39010 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[ 6104.969780] RAX: ffffffffffffffda RBX: 000055c10a7560a0 RCX: 00007f5a21f18fef
[ 6104.969781] RDX: 0000000000000008 RSI: 00007ffeefe39060 RDI: 0000000000000012
[ 6104.969782] RBP: 00007ffeefe39060 R08: 0000000000000000 R09: 0000000000000017
[ 6104.969784] R10: 00007ffeefe38d97 R11: 0000000000000293 R12: 0000000000000002
[ 6104.969785] R13: 00007ffeefe39220 R14: 00007ffeefe391a0 R15: 000055c10a72acf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52834" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atl1c: Work around the DMA RX overflow issue

This is based on alx driver commit 881d0327db37 ("net: alx: Work around
the DMA RX overflow issue").

The alx and atl1c drivers had RX overflow error which was why a custom
allocator was created to avoid certain addresses. The simpler workaround
then created for alx driver, but not for atl1c due to lack of tester.

Instead of using a custom allocator, check the allocated skb address and
use skb_reserve() to move away from problematic 0x...fc0 address.

Tested on AR8131 on Acer 4540.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52835" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Bail out early if the request AUX area is out of bound

When perf-record with a large AUX area, e.g 4GB, it fails with:

    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1
    failed to mmap with 12 (Cannot allocate memory)

and it reveals a WARNING with __alloc_pages():

	------------[ cut here ]------------
	WARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248
	Call trace:
	 __alloc_pages+0x1ec/0x248
	 __kmalloc_large_node+0xc0/0x1f8
	 __kmalloc_node+0x134/0x1e8
	 rb_alloc_aux+0xe0/0x298
	 perf_mmap+0x440/0x660
	 mmap_region+0x308/0x8a8
	 do_mmap+0x3c0/0x528
	 vm_mmap_pgoff+0xf4/0x1b8
	 ksys_mmap_pgoff+0x18c/0x218
	 __arm64_sys_mmap+0x38/0x58
	 invoke_syscall+0x50/0x128
	 el0_svc_common.constprop.0+0x58/0x188
	 do_el0_svc+0x34/0x50
	 el0_svc+0x34/0x108
	 el0t_64_sync_handler+0xb8/0xc0
	 el0t_64_sync+0x1a4/0x1a8

'rb-&gt;aux_pages' allocated by kcalloc() is a pointer array which is used to
maintains AUX trace pages. The allocated page for this array is physically
contiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the
size of pointer array crosses the limitation set by MAX_ORDER, it reveals a
WARNING.

So bail out early with -ENOMEM if the request AUX area is out of bound,
e.g.:

    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1
    failed to mmap with 12 (Cannot allocate memory)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225602">SUSE bug 1225602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52836" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52836" ref_url="https://www.suse.com/security/cve/CVE-2023-52836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

locking/ww_mutex/test: Fix potential workqueue corruption

In some cases running with the test-ww_mutex code, I was seeing
odd behavior where sometimes it seemed flush_workqueue was
returning before all the work threads were finished.

Often this would cause strange crashes as the mutexes would be
freed while they were being used.

Looking at the code, there is a lifetime problem as the
controlling thread that spawns the work allocates the
"struct stress" structures that are passed to the workqueue
threads. Then when the workqueue threads are finished,
they free the stress struct that was passed to them.

Unfortunately the workqueue work_struct node is in the stress
struct. Which means the work_struct is freed before the work
thread returns and while flush_workqueue is waiting.

It seems like a better idea to have the controlling thread
both allocate and free the stress structures, so that we can
be sure we don't corrupt the workqueue by freeing the structure
prematurely.

So this patch reworks the test to do so, and with this change
I no longer see the early flush_workqueue returns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52836/">CVE-2023-52836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52836">CVE-2023-52836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225609">SUSE bug 1225609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52837" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix uaf in nbd_open

Commit 4af5f2e03013 ("nbd: use blk_mq_alloc_disk and
blk_cleanup_disk") cleans up disk by blk_cleanup_disk() and it won't set
disk-&gt;private_data as NULL as before. UAF may be triggered in nbd_open()
if someone tries to open nbd device right after nbd_put() since nbd has
been free in nbd_dev_remove().

Fix this by implementing -&gt;free_disk and free private data in it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: imsttfb: fix a resource leak in probe

I've re-written the error handling but the bug is that if init_imstt()
fails we need to call iounmap(par-&gt;cmap_regs).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52839" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52839" ref_url="https://www.suse.com/security/cve/CVE-2023-52839" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: perf: Do not broadcast to other cpus when starting a counter

This command:

$ perf record -e cycles:k -e instructions:k -c 10000 -m 64M dd if=/dev/zero of=/dev/null count=1000

gives rise to this kernel warning:

[  444.364395] WARNING: CPU: 0 PID: 104 at kernel/smp.c:775 smp_call_function_many_cond+0x42c/0x436
[  444.364515] Modules linked in:
[  444.364657] CPU: 0 PID: 104 Comm: perf-exec Not tainted 6.6.0-rc6-00051-g391df82e8ec3-dirty #73
[  444.364771] Hardware name: riscv-virtio,qemu (DT)
[  444.364868] epc : smp_call_function_many_cond+0x42c/0x436
[  444.364917]  ra : on_each_cpu_cond_mask+0x20/0x32
[  444.364948] epc : ffffffff8009f9e0 ra : ffffffff8009fa5a sp : ff20000000003800
[  444.364966]  gp : ffffffff81500aa0 tp : ff60000002b83000 t0 : ff200000000038c0
[  444.364982]  t1 : ffffffff815021f0 t2 : 000000000000001f s0 : ff200000000038b0
[  444.364998]  s1 : ff60000002c54d98 a0 : ff60000002a73940 a1 : 0000000000000000
[  444.365013]  a2 : 0000000000000000 a3 : 0000000000000003 a4 : 0000000000000100
[  444.365029]  a5 : 0000000000010100 a6 : 0000000000f00000 a7 : 0000000000000000
[  444.365044]  s2 : 0000000000000000 s3 : ffffffffffffffff s4 : ff60000002c54d98
[  444.365060]  s5 : ffffffff81539610 s6 : ffffffff80c20c48 s7 : 0000000000000000
[  444.365075]  s8 : 0000000000000000 s9 : 0000000000000001 s10: 0000000000000001
[  444.365090]  s11: ffffffff80099394 t3 : 0000000000000003 t4 : 00000000eac0c6e6
[  444.365104]  t5 : 0000000400000000 t6 : ff60000002e010d0
[  444.365120] status: 0000000200000100 badaddr: 0000000000000000 cause: 0000000000000003
[  444.365226] [&lt;ffffffff8009f9e0&gt;] smp_call_function_many_cond+0x42c/0x436
[  444.365295] [&lt;ffffffff8009fa5a&gt;] on_each_cpu_cond_mask+0x20/0x32
[  444.365311] [&lt;ffffffff806e90dc&gt;] pmu_sbi_ctr_start+0x7a/0xaa
[  444.365327] [&lt;ffffffff806e880c&gt;] riscv_pmu_start+0x48/0x66
[  444.365339] [&lt;ffffffff8012111a&gt;] perf_adjust_freq_unthr_context+0x196/0x1ac
[  444.365356] [&lt;ffffffff801237aa&gt;] perf_event_task_tick+0x78/0x8c
[  444.365368] [&lt;ffffffff8003faf4&gt;] scheduler_tick+0xe6/0x25e
[  444.365383] [&lt;ffffffff8008a042&gt;] update_process_times+0x80/0x96
[  444.365398] [&lt;ffffffff800991ec&gt;] tick_sched_handle+0x26/0x52
[  444.365410] [&lt;ffffffff800993e4&gt;] tick_sched_timer+0x50/0x98
[  444.365422] [&lt;ffffffff8008a6aa&gt;] __hrtimer_run_queues+0x126/0x18a
[  444.365433] [&lt;ffffffff8008b350&gt;] hrtimer_interrupt+0xce/0x1da
[  444.365444] [&lt;ffffffff806cdc60&gt;] riscv_timer_interrupt+0x30/0x3a
[  444.365457] [&lt;ffffffff8006afa6&gt;] handle_percpu_devid_irq+0x80/0x114
[  444.365470] [&lt;ffffffff80065b82&gt;] generic_handle_domain_irq+0x1c/0x2a
[  444.365483] [&lt;ffffffff8045faec&gt;] riscv_intc_irq+0x2e/0x46
[  444.365497] [&lt;ffffffff808a9c62&gt;] handle_riscv_irq+0x4a/0x74
[  444.365521] [&lt;ffffffff808aa760&gt;] do_irq+0x7c/0x7e
[  444.365796] ---[ end trace 0000000000000000 ]---

That's because the fix in commit 3fec323339a4 ("drivers: perf: Fix panic
in riscv SBI mmap support") was wrong since there is no need to broadcast
to other cpus when starting a counter, that's only needed in mmap when
the counters could have already been started on other cpus, so simply
remove this broadcast.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-05-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52839/">CVE-2023-52839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52839">CVE-2023-52839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225100">SUSE bug 1225100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52840" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()

The put_device() calls rmi_release_function() which frees "fn" so the
dereference on the next line "fn-&gt;num_of_irqs" is a use after free.
Move the put_device() to the end to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: mux: Add check and kfree for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
Moreover, use kfree() in the later error handling in order to avoid
memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52842" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52842" ref_url="https://www.suse.com/security/cve/CVE-2023-52842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()

KMSAN reported the following uninit-value access issue:

=====================================================
BUG: KMSAN: uninit-value in virtio_transport_recv_pkt+0x1dfb/0x26a0 net/vmw_vsock/virtio_transport_common.c:1421
 virtio_transport_recv_pkt+0x1dfb/0x26a0 net/vmw_vsock/virtio_transport_common.c:1421
 vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120
 process_one_work kernel/workqueue.c:2630 [inline]
 process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703
 worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784
 kthread+0x3cc/0x520 kernel/kthread.c:388
 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

Uninit was stored to memory at:
 virtio_transport_space_update net/vmw_vsock/virtio_transport_common.c:1274 [inline]
 virtio_transport_recv_pkt+0x1ee8/0x26a0 net/vmw_vsock/virtio_transport_common.c:1415
 vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120
 process_one_work kernel/workqueue.c:2630 [inline]
 process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703
 worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784
 kthread+0x3cc/0x520 kernel/kthread.c:388
 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

Uninit was created at:
 slab_post_alloc_hook+0x105/0xad0 mm/slab.h:767
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x5a2/0xaf0 mm/slub.c:3523
 kmalloc_reserve+0x13c/0x4a0 net/core/skbuff.c:559
 __alloc_skb+0x2fd/0x770 net/core/skbuff.c:650
 alloc_skb include/linux/skbuff.h:1286 [inline]
 virtio_vsock_alloc_skb include/linux/virtio_vsock.h:66 [inline]
 virtio_transport_alloc_skb+0x90/0x11e0 net/vmw_vsock/virtio_transport_common.c:58
 virtio_transport_reset_no_sock net/vmw_vsock/virtio_transport_common.c:957 [inline]
 virtio_transport_recv_pkt+0x1279/0x26a0 net/vmw_vsock/virtio_transport_common.c:1387
 vsock_loopback_work+0x3bb/0x5a0 net/vmw_vsock/vsock_loopback.c:120
 process_one_work kernel/workqueue.c:2630 [inline]
 process_scheduled_works+0xff6/0x1e60 kernel/workqueue.c:2703
 worker_thread+0xeca/0x14d0 kernel/workqueue.c:2784
 kthread+0x3cc/0x520 kernel/kthread.c:388
 ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

CPU: 1 PID: 10664 Comm: kworker/1:5 Not tainted 6.6.0-rc3-00146-g9f3ebbef746f #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-1.fc38 04/01/2014
Workqueue: vsock-loopback vsock_loopback_work
=====================================================

The following simple reproducer can cause the issue described above:

int main(void)
{
  int sock;
  struct sockaddr_vm addr = {
    .svm_family = AF_VSOCK,
    .svm_cid = VMADDR_CID_ANY,
    .svm_port = 1234,
  };

  sock = socket(AF_VSOCK, SOCK_STREAM, 0);
  connect(sock, (struct sockaddr *)&amp;addr, sizeof(addr));
  return 0;
}

This issue occurs because the `buf_alloc` and `fwd_cnt` fields of the
`struct virtio_vsock_hdr` are not initialized when a new skb is allocated
in `virtio_transport_init_hdr()`. This patch resolves the issue by
initializing these fields during allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52842/">CVE-2023-52842 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52842">CVE-2023-52842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225025">SUSE bug 1225025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52843" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: verify mac len before reading mac header

LLC reads the mac header with eth_hdr without verifying that the skb
has an Ethernet header.

Syzbot was able to enter llc_rcv on a tun device. Tun can insert
packets without mac len and with user configurable skb-&gt;protocol
(passing a tun_pi header when not configuring IFF_NO_PI).

    BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
    BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
    llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]
    llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111
    llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218
    __netif_receive_skb_one_core net/core/dev.c:5523 [inline]
    __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637
    netif_receive_skb_internal net/core/dev.c:5723 [inline]
    netif_receive_skb+0x58/0x660 net/core/dev.c:5782
    tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
    tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002

Add a mac_len test before all three eth_hdr(skb) calls under net/llc.

There are further uses in include/net/llc_pdu.h. All these are
protected by a test skb-&gt;protocol == ETH_P_802_2. Which does not
protect against this tun scenario.

But the mac_len test added in this patch in llc_fixup_skb will
indirectly protect those too. That is called from llc_rcv before any
other LLC code.

It is tempting to just add a blanket mac_len check in llc_rcv, but
not sure whether that could break valid LLC paths that do not assume
an Ethernet header. 802.2 LLC may be used on top of non-802.3
protocols in principle. The below referenced commit shows that used
to, on top of Token Ring.

At least one of the three eth_hdr uses goes back to before the start
of git history. But the one that syzbot exercises is introduced in
this commit. That commit is old enough (2008), that effectively all
stable kernels should receive this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224951">SUSE bug 1224951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52844" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: psi: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52845" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING

syzbot reported the following uninit-value access issue [1]:

=====================================================
BUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline]
BUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756
 strlen lib/string.c:418 [inline]
 strstr+0xb8/0x2f0 lib/string.c:756
 tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595
 genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline]
 genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline]
 genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066
 netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545
 genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075
 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]
 netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595
 __sys_sendmsg net/socket.c:2624 [inline]
 __do_sys_sendmsg net/socket.c:2633 [inline]
 __se_sys_sendmsg net/socket.c:2631 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
 slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559
 __alloc_skb+0x318/0x740 net/core/skbuff.c:650
 alloc_skb include/linux/skbuff.h:1286 [inline]
 netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline]
 netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595
 __sys_sendmsg net/socket.c:2624 [inline]
 __do_sys_sendmsg net/socket.c:2633 [inline]
 __se_sys_sendmsg net/socket.c:2631 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

TIPC bearer-related names including link names must be null-terminated
strings. If a link name which is not null-terminated is passed through
netlink, strstr() and similar functions can cause buffer overrun. This
causes the above issue.

This patch changes the nla_policy for bearer-related names from NLA_STRING
to NLA_NUL_STRING. This resolves the issue by ensuring that only
null-terminated strings are accepted as bearer-related names.

syzbot reported similar uninit-value issue related to bearer names [2]. The
root cause of this issue is that a non-null-terminated bearer name was
passed. This patch also resolved this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225585">SUSE bug 1225585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52846" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hsr: Prevent use after free in prp_create_tagged_frame()

The prp_fill_rct() function can fail.  In that situation, it frees the
skb and returns NULL.  Meanwhile on the success path, it returns the
original skb.  So it's straight forward to fix bug by using the returned
value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225099">SUSE bug 1225099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: bttv: fix use after free error due to btv-&gt;timeout timer

There may be some a race condition between timer function
bttv_irq_timeout and bttv_remove. The timer is setup in
probe and there is no timer_delete operation in remove
function. When it hit kfree btv, the function might still be
invoked, which will cause use after free bug.

This bug is found by static analysis, it may be false positive.

Fix it by adding del_timer_sync invoking to the remove function.

cpu0                cpu1
                  bttv_probe
                    -&gt;timer_setup
                      -&gt;bttv_set_dma
                        -&gt;mod_timer;
bttv_remove
  -&gt;kfree(btv);
                  -&gt;bttv_irq_timeout
                    -&gt;USE btv
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52848" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52848" ref_url="https://www.suse.com/security/cve/CVE-2023-52848" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to drop meta_inode's page cache in f2fs_put_super()

syzbot reports a kernel bug as below:

F2FS-fs (loop1): detect filesystem reference count leak during umount, type: 10, count: 1
kernel BUG at fs/f2fs/super.c:1639!
CPU: 0 PID: 15451 Comm: syz-executor.1 Not tainted 6.5.0-syzkaller-09338-ge0152e7481c6 #0
RIP: 0010:f2fs_put_super+0xce1/0xed0 fs/f2fs/super.c:1639
Call Trace:
 generic_shutdown_super+0x161/0x3c0 fs/super.c:693
 kill_block_super+0x3b/0x70 fs/super.c:1646
 kill_f2fs_super+0x2b7/0x3d0 fs/f2fs/super.c:4879
 deactivate_locked_super+0x9a/0x170 fs/super.c:481
 deactivate_super+0xde/0x100 fs/super.c:514
 cleanup_mnt+0x222/0x3d0 fs/namespace.c:1254
 task_work_run+0x14d/0x240 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
 exit_to_user_mode_prepare+0x210/0x240 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x60 kernel/entry/common.c:296
 do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

In f2fs_put_super(), it tries to do sanity check on dirty and IO
reference count of f2fs, once there is any reference count leak,
it will trigger panic.

The root case is, during f2fs_put_super(), if there is any IO error
in f2fs_wait_on_all_pages(), we missed to truncate meta_inode's page
cache later, result in panic, fix this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52848/">CVE-2023-52848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52848">CVE-2023-52848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225385">SUSE bug 1225385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52849" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52849" ref_url="https://www.suse.com/security/cve/CVE-2023-52849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/mem: Fix shutdown order

Ira reports that removing cxl_mock_mem causes a crash with the following
trace:

 BUG: kernel NULL pointer dereference, address: 0000000000000044
 [..]
 RIP: 0010:cxl_region_decode_reset+0x7f/0x180 [cxl_core]
 [..]
 Call Trace:
  &lt;TASK&gt;
  cxl_region_detach+0xe8/0x210 [cxl_core]
  cxl_decoder_kill_region+0x27/0x40 [cxl_core]
  cxld_unregister+0x29/0x40 [cxl_core]
  devres_release_all+0xb8/0x110
  device_unbind_cleanup+0xe/0x70
  device_release_driver_internal+0x1d2/0x210
  bus_remove_device+0xd7/0x150
  device_del+0x155/0x3e0
  device_unregister+0x13/0x60
  devm_release_action+0x4d/0x90
  ? __pfx_unregister_port+0x10/0x10 [cxl_core]
  delete_endpoint+0x121/0x130 [cxl_core]
  devres_release_all+0xb8/0x110
  device_unbind_cleanup+0xe/0x70
  device_release_driver_internal+0x1d2/0x210
  bus_remove_device+0xd7/0x150
  device_del+0x155/0x3e0
  ? lock_release+0x142/0x290
  cdev_device_del+0x15/0x50
  cxl_memdev_unregister+0x54/0x70 [cxl_core]

This crash is due to the clearing out the cxl_memdev's driver context
(@cxlds) before the subsystem is done with it. This is ultimately due to
the region(s), that this memdev is a member, being torn down and expecting
to be able to de-reference @cxlds, like here:

static int cxl_region_decode_reset(struct cxl_region *cxlr, int count)
...
                if (cxlds-&gt;rcd)
                        goto endpoint_reset;
...

Fix it by keeping the driver context valid until memdev-device
unregistration, and subsequently the entire stack of related
dependencies, unwinds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52849/">CVE-2023-52849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52849">CVE-2023-52849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224949">SUSE bug 1224949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52850" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52850" ref_url="https://www.suse.com/security/cve/CVE-2023-52850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: hantro: Check whether reset op is defined before use

The i.MX8MM/N/P does not define the .reset op since reset of the VPU is
done by genpd. Check whether the .reset op is defined before calling it
to avoid NULL pointer dereference.

Note that the Fixes tag is set to the commit which removed the reset op
from i.MX8M Hantro G2 implementation, this is because before this commit
all the implementations did define the .reset op.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52850/">CVE-2023-52850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52850">CVE-2023-52850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225014">SUSE bug 1225014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52851" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF

In the unlikely event that workqueue allocation fails and returns NULL in
mlx5_mkey_cache_init(), delete the call to
mlx5r_umr_resource_cleanup() (which frees the QP) in
mlx5_ib_stage_post_ib_reg_umr_init().  This will avoid attempted double
free of the same QP when __mlx5_ib_add() does its cleanup.

Resolves a splat:

   Syzkaller reported a UAF in ib_destroy_qp_user

   workqueue: Failed to create a rescuer kthread for wq "mkey_cache": -EINTR
   infiniband mlx5_0: mlx5_mkey_cache_init:981:(pid 1642):
   failed to create work queue
   infiniband mlx5_0: mlx5_ib_stage_post_ib_reg_umr_init:4075:(pid 1642):
   mr cache init failed -12
   ==================================================================
   BUG: KASAN: slab-use-after-free in ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2073)
   Read of size 8 at addr ffff88810da310a8 by task repro_upstream/1642

   Call Trace:
   &lt;TASK&gt;
   kasan_report (mm/kasan/report.c:590)
   ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2073)
   mlx5r_umr_resource_cleanup (drivers/infiniband/hw/mlx5/umr.c:198)
   __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4178)
   mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)
   ...
   &lt;/TASK&gt;

   Allocated by task 1642:
   __kmalloc (./include/linux/kasan.h:198 mm/slab_common.c:1026
   mm/slab_common.c:1039)
   create_qp (./include/linux/slab.h:603 ./include/linux/slab.h:720
   ./include/rdma/ib_verbs.h:2795 drivers/infiniband/core/verbs.c:1209)
   ib_create_qp_kernel (drivers/infiniband/core/verbs.c:1347)
   mlx5r_umr_resource_init (drivers/infiniband/hw/mlx5/umr.c:164)
   mlx5_ib_stage_post_ib_reg_umr_init (drivers/infiniband/hw/mlx5/main.c:4070)
   __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4168)
   mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)
   ...

   Freed by task 1642:
   __kmem_cache_free (mm/slub.c:1826 mm/slub.c:3809 mm/slub.c:3822)
   ib_destroy_qp_user (drivers/infiniband/core/verbs.c:2112)
   mlx5r_umr_resource_cleanup (drivers/infiniband/hw/mlx5/umr.c:198)
   mlx5_ib_stage_post_ib_reg_umr_init (drivers/infiniband/hw/mlx5/main.c:4076
   drivers/infiniband/hw/mlx5/main.c:4065)
   __mlx5_ib_add (drivers/infiniband/hw/mlx5/main.c:4168)
   mlx5r_probe (drivers/infiniband/hw/mlx5/main.c:4402)
   ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225587">SUSE bug 1225587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52852" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52852" ref_url="https://www.suse.com/security/cve/CVE-2023-52852" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix to avoid use-after-free on dic

Call trace:
 __memcpy+0x128/0x250
 f2fs_read_multi_pages+0x940/0xf7c
 f2fs_mpage_readpages+0x5a8/0x624
 f2fs_readahead+0x5c/0x110
 page_cache_ra_unbounded+0x1b8/0x590
 do_sync_mmap_readahead+0x1dc/0x2e4
 filemap_fault+0x254/0xa8c
 f2fs_filemap_fault+0x2c/0x104
 __do_fault+0x7c/0x238
 do_handle_mm_fault+0x11bc/0x2d14
 do_mem_abort+0x3a8/0x1004
 el0_da+0x3c/0xa0
 el0t_64_sync_handler+0xc4/0xec
 el0t_64_sync+0x1b4/0x1b8

In f2fs_read_multi_pages(), once f2fs_decompress_cluster() was called if
we hit cached page in compress_inode's cache, dic may be released, it needs
break the loop rather than continuing it, in order to avoid accessing
invalid dic pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52852/">CVE-2023-52852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52852">CVE-2023-52852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225116">SUSE bug 1225116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52853" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hid: cp2112: Fix duplicate workqueue initialization

Previously the cp2112 driver called INIT_DELAYED_WORK within
cp2112_gpio_irq_startup, resulting in duplicate initilizations of the
workqueue on subsequent IRQ startups following an initial request. This
resulted in a warning in set_work_data in workqueue.c, as well as a rare
NULL dereference within process_one_work in workqueue.c.

Initialize the workqueue within _probe instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52854" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix refcnt handling in padata_free_shell()

In a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead
to system UAF (Use-After-Free) issues. Due to the lengthy analysis of
the pcrypt_aead01 function call, I'll describe the problem scenario
using a simplified model:

Suppose there's a user of padata named `user_function` that adheres to
the padata requirement of calling `padata_free_shell` after `serial()`
has been invoked, as demonstrated in the following code:

```c
struct request {
    struct padata_priv padata;
    struct completion *done;
};

void parallel(struct padata_priv *padata) {
    do_something();
}

void serial(struct padata_priv *padata) {
    struct request *request = container_of(padata,
    				struct request,
				padata);
    complete(request-&gt;done);
}

void user_function() {
    DECLARE_COMPLETION(done)
    padata-&gt;parallel = parallel;
    padata-&gt;serial = serial;
    padata_do_parallel();
    wait_for_completion(&amp;done);
    padata_free_shell();
}
```

In the corresponding padata.c file, there's the following code:

```c
static void padata_serial_worker(struct work_struct *serial_work) {
    ...
    cnt = 0;

    while (!list_empty(&amp;local_list)) {
        ...
        padata-&gt;serial(padata);
        cnt++;
    }

    local_bh_enable();

    if (refcount_sub_and_test(cnt, &amp;pd-&gt;refcnt))
        padata_free_pd(pd);
}
```

Because of the high system load and the accumulation of unexecuted
softirq at this moment, `local_bh_enable()` in padata takes longer
to execute than usual. Subsequently, when accessing `pd-&gt;refcnt`,
`pd` has already been released by `padata_free_shell()`, resulting
in a UAF issue with `pd-&gt;refcnt`.

The fix is straightforward: add `refcount_dec_and_test` before calling
`padata_free_pd` in `padata_free_shell`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency

In _dwc2_hcd_urb_enqueue(), "urb-&gt;hcpriv = NULL" is executed without
holding the lock "hsotg-&gt;lock". In _dwc2_hcd_urb_dequeue():

    spin_lock_irqsave(&amp;hsotg-&gt;lock, flags);
    ...
	if (!urb-&gt;hcpriv) {
		dev_dbg(hsotg-&gt;dev, "## urb-&gt;hcpriv is NULL ##\n");
		goto out;
	}
    rc = dwc2_hcd_urb_dequeue(hsotg, urb-&gt;hcpriv); // Use urb-&gt;hcpriv
    ...
out:
    spin_unlock_irqrestore(&amp;hsotg-&gt;lock, flags);

When _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are
concurrently executed, the NULL check of "urb-&gt;hcpriv" can be executed
before "urb-&gt;hcpriv = NULL". After urb-&gt;hcpriv is NULL, it can be used
in the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL
pointer dereference.

This possible bug is found by an experimental static analysis tool
developed by myself. This tool analyzes the locking APIs to extract
function pairs that can be concurrently executed, and then analyzes the
instructions in the paired functions to identify possible concurrency
bugs including data races and atomicity violations. The above possible
bug is reported, when my tool analyzes the source code of Linux 6.5.

To fix this possible bug, "urb-&gt;hcpriv = NULL" should be executed with
holding the lock "hsotg-&gt;lock". After using this patch, my tool never
reports the possible bug, with the kernelconfiguration allyesconfig for
x86_64. Because I have no associated hardware, I cannot test the patch
in runtime testing, and just verify it according to the code logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52856" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: lt8912b: Fix crash on bridge detach

The lt8912b driver, in its bridge detach function, calls
drm_connector_unregister() and drm_connector_cleanup().

drm_connector_unregister() should be called only for connectors
explicitly registered with drm_connector_register(), which is not the
case in lt8912b.

The driver's drm_connector_funcs.destroy hook is set to
drm_connector_cleanup().

Thus the driver should not call either drm_connector_unregister() nor
drm_connector_cleanup() in its lt8912_bridge_detach(), as they cause a
crash on bridge detach:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=00000000858f3000
[0000000000000000] pgd=0800000085918003, p4d=0800000085918003, pud=0800000085431003, pmd=0000000000000000
Internal error: Oops: 0000000096000006 [#1] PREEMPT SMP
Modules linked in: tidss(-) display_connector lontium_lt8912b tc358768 panel_lvds panel_simple drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks
CPU: 3 PID: 462 Comm: rmmod Tainted: G        W          6.5.0-rc2+ #2
Hardware name: Toradex Verdin AM62 on Verdin Development Board (DT)
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : drm_connector_cleanup+0x78/0x2d4 [drm]
lr : lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]
sp : ffff800082ed3a90
x29: ffff800082ed3a90 x28: ffff0000040c1940 x27: 0000000000000000
x26: 0000000000000000 x25: dead000000000122 x24: dead000000000122
x23: dead000000000100 x22: ffff000003fb6388 x21: 0000000000000000
x20: 0000000000000000 x19: ffff000003fb6260 x18: fffffffffffe56e8
x17: 0000000000000000 x16: 0010000000000000 x15: 0000000000000038
x14: 0000000000000000 x13: ffff800081914b48 x12: 000000000000040e
x11: 000000000000015a x10: ffff80008196ebb8 x9 : ffff800081914b48
x8 : 00000000ffffefff x7 : ffff0000040c1940 x6 : ffff80007aa649d0
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80008159e008
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 drm_connector_cleanup+0x78/0x2d4 [drm]
 lt8912_bridge_detach+0x54/0x6c [lontium_lt8912b]
 drm_bridge_detach+0x44/0x84 [drm]
 drm_encoder_cleanup+0x40/0xb8 [drm]
 drmm_encoder_alloc_release+0x1c/0x30 [drm]
 drm_managed_release+0xac/0x148 [drm]
 drm_dev_put.part.0+0x88/0xb8 [drm]
 devm_drm_dev_init_release+0x14/0x24 [drm]
 devm_action_release+0x14/0x20
 release_nodes+0x5c/0x90
 devres_release_all+0x8c/0xe0
 device_unbind_cleanup+0x18/0x68
 device_release_driver_internal+0x208/0x23c
 driver_detach+0x4c/0x94
 bus_remove_driver+0x70/0xf4
 driver_unregister+0x30/0x60
 platform_driver_unregister+0x14/0x20
 tidss_platform_driver_exit+0x18/0xb2c [tidss]
 __arm64_sys_delete_module+0x1a0/0x2b4
 invoke_syscall+0x48/0x110
 el0_svc_common.constprop.0+0x60/0x10c
 do_el0_svc_compat+0x1c/0x40
 el0_svc_compat+0x40/0xac
 el0t_32_sync_handler+0xb0/0x138
 el0t_32_sync+0x194/0x198
Code: 9104a276 f2fbd5b7 aa0203e1 91008af8 (f85c0420)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52857" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Fix coverity issue with unintentional integer overflow

1. Instead of multiplying 2 variable of different types. Change to
assign a value of one variable and then multiply the other variable.

2. Add a int variable for multiplier calculation instead of calculating
different types multiplier with dma_addr_t variable directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225581">SUSE bug 1225581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: hisi: Fix use-after-free when register pmu fails

When we fail to register the uncore pmu, the pmu context may not been
allocated. The error handing will call cpuhp_state_remove_instance()
to call uncore pmu offline callback, which migrate the pmu context.
Since that's liable to lead to some kind of use-after-free.

Use cpuhp_state_remove_instance_nocalls() instead of
cpuhp_state_remove_instance() so that the notifiers don't execute after
the PMU device has been failed to register.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225582">SUSE bug 1225582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process

When tearing down a 'hisi_hns3' PMU, we mistakenly run the CPU hotplug
callbacks after the device has been unregistered, leading to fireworks
when we try to execute empty function callbacks within the driver:

  | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
  | CPU: 0 PID: 15 Comm: cpuhp/0 Tainted: G        W  O      5.12.0-rc4+ #1
  | Hardware name:  , BIOS KpxxxFPGA 1P B600 V143 04/22/2021
  | pstate: 80400009 (Nzcv daif +PAN -UAO -TCO BTYPE=--)
  | pc : perf_pmu_migrate_context+0x98/0x38c
  | lr : perf_pmu_migrate_context+0x94/0x38c
  |
  | Call trace:
  |  perf_pmu_migrate_context+0x98/0x38c
  |  hisi_hns3_pmu_offline_cpu+0x104/0x12c [hisi_hns3_pmu]

Use cpuhp_state_remove_instance_nocalls() instead of
cpuhp_state_remove_instance() so that the notifiers don't execute after
the PMU device has been unregistered.

[will: Rewrote commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224936">SUSE bug 1224936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52861" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: it66121: Fix invalid connector dereference

Fix the NULL pointer dereference when no monitor is connected, and the
sound card is opened from userspace.

Instead return an empty buffer (of zeroes) as the EDID information to
the sound framework if there is no connector attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224941">SUSE bug 1224941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52862" ref_url="https://www.suse.com/security/cve/CVE-2023-52862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null pointer dereference in error message

This patch fixes a null pointer dereference in the error message that is
printed when the Display Core (DC) fails to initialize. The original
message includes the DC version number, which is undefined if the DC is
not initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52862/">CVE-2023-52862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52862">CVE-2023-52862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225015">SUSE bug 1225015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (axi-fan-control) Fix possible NULL pointer dereference

axi_fan_control_irq_handler(), dependent on the private
axi_fan_control_data structure, might be called before the hwmon
device is registered. That will cause an "Unable to handle kernel
NULL pointer dereference" error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225586">SUSE bug 1225586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: wmi: Fix opening of char device

Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via
file private data"), the miscdevice stores a pointer to itself inside
filp-&gt;private_data, which means that private_data will not be NULL when
wmi_char_open() is called. This might cause memory corruption should
wmi_char_open() be unable to find its driver, something which can
happen when the associated WMI device is deleted in wmi_free_devices().

Fix the problem by using the miscdevice pointer to retrieve the WMI
device data associated with a char device using container_of(). This
also avoids wmi_char_open() picking a wrong WMI device bound to a
driver with the same name as the original driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52866" ref_url="https://www.suse.com/security/cve/CVE-2023-52866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: uclogic: Fix user-memory-access bug in uclogic_params_ugee_v2_init_event_hooks()

When CONFIG_HID_UCLOGIC=y and CONFIG_KUNIT_ALL_TESTS=y, launch kernel and
then the below user-memory-access bug occurs.

In hid_test_uclogic_params_cleanup_event_hooks(),it call
uclogic_params_ugee_v2_init_event_hooks() with the first arg=NULL, so
when it calls uclogic_params_ugee_v2_has_battery(), the hid_get_drvdata()
will access hdev-&gt;dev with hdev=NULL, which will cause below
user-memory-access.

So add a fake_device with quirks member and call hid_set_drvdata()
to assign hdev-&gt;dev-&gt;driver_data which avoids the null-ptr-def bug
for drvdata-&gt;quirks in uclogic_params_ugee_v2_has_battery(). After applying
this patch, the below user-memory-access bug never occurs.

 general protection fault, probably for non-canonical address 0xdffffc0000000329: 0000 [#1] PREEMPT SMP KASAN
 KASAN: probably user-memory-access in range [0x0000000000001948-0x000000000000194f]
 CPU: 5 PID: 2189 Comm: kunit_try_catch Tainted: G    B   W        N 6.6.0-rc2+ #30
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 RIP: 0010:uclogic_params_ugee_v2_init_event_hooks+0x87/0x600
 Code: f3 f3 65 48 8b 14 25 28 00 00 00 48 89 54 24 60 31 d2 48 89 fa c7 44 24 30 00 00 00 00 48 c7 44 24 28 02 f8 02 01 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 2c 04 00 00 48 8b 9d 48 19 00 00 48 b8 00 00 00
 RSP: 0000:ffff88810679fc88 EFLAGS: 00010202
 RAX: dffffc0000000000 RBX: 0000000000000004 RCX: 0000000000000000
 RDX: 0000000000000329 RSI: ffff88810679fd88 RDI: 0000000000001948
 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffed1020f639f0
 R10: ffff888107b1cf87 R11: 0000000000000400 R12: 1ffff11020cf3f92
 R13: ffff88810679fd88 R14: ffff888100b97b08 R15: ffff8881030bb080
 FS:  0000000000000000(0000) GS:ffff888119e80000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 0000000005286001 CR4: 0000000000770ee0
 DR0: ffffffff8fdd6cf4 DR1: ffffffff8fdd6cf5 DR2: ffffffff8fdd6cf6
 DR3: ffffffff8fdd6cf7 DR6: 00000000fffe0ff0 DR7: 0000000000000600
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? die_addr+0x3d/0xa0
  ? exc_general_protection+0x144/0x220
  ? asm_exc_general_protection+0x22/0x30
  ? uclogic_params_ugee_v2_init_event_hooks+0x87/0x600
  ? sched_clock_cpu+0x69/0x550
  ? uclogic_parse_ugee_v2_desc_gen_params+0x70/0x70
  ? load_balance+0x2950/0x2950
  ? rcu_trc_cmpxchg_need_qs+0x67/0xa0
  hid_test_uclogic_params_cleanup_event_hooks+0x9e/0x1a0
  ? uclogic_params_ugee_v2_init_event_hooks+0x600/0x600
  ? __switch_to+0x5cf/0xe60
  ? migrate_enable+0x260/0x260
  ? __kthread_parkme+0x83/0x150
  ? kunit_try_run_case_cleanup+0xe0/0xe0
  kunit_generic_run_threadfn_adapter+0x4a/0x90
  ? kunit_try_catch_throw+0x80/0x80
  kthread+0x2b5/0x380
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x2d/0x70
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;
 Modules linked in:
 Dumping ftrace buffer:
    (ftrace buffer empty)
 ---[ end trace 0000000000000000 ]---
 RIP: 0010:uclogic_params_ugee_v2_init_event_hooks+0x87/0x600
 Code: f3 f3 65 48 8b 14 25 28 00 00 00 48 89 54 24 60 31 d2 48 89 fa c7 44 24 30 00 00 00 00 48 c7 44 24 28 02 f8 02 01 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 2c 04 00 00 48 8b 9d 48 19 00 00 48 b8 00 00 00
 RSP: 0000:ffff88810679fc88 EFLAGS: 00010202
 RAX: dffffc0000000000 RBX: 0000000000000004 RCX: 0000000000000000
 RDX: 0000000000000329 RSI: ffff88810679fd88 RDI: 0000000000001948
 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffed1020f639f0
 R10: ffff888107b1cf87 R11: 0000000000000400 R12: 1ffff11020cf3f92
 R13: ffff88810679fd88 R14: ffff888100b97b08 R15: ffff8881030bb080
 FS:  0000000000000000(0000) GS:ffff888119e80000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 0000000005286001 CR4: 0000000000770ee0
 DR0: ffffffff8fdd6cf4 DR1: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52866/">CVE-2023-52866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52866">CVE-2023-52866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225120">SUSE bug 1225120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: possible buffer overflow

Buffer 'afmt_status' of size 6 could overflow, since index 'afmt_idx' is
checked after access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: prevent potential string overflow

The dev-&gt;id value comes from ida_alloc() so it's a number between zero
and INT_MAX.  If it's too high then these sprintf()s will overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52869" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/platform: Add check for kstrdup

Add check for the return value of kstrdup() and return the error
if it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225050">SUSE bug 1225050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52870" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: llcc: Handle a second device without data corruption

Usually there is only one llcc device. But if there were a second, even
a failed probe call would modify the global drv_data pointer. So check
if drv_data is valid before overwriting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227475">SUSE bug 1227475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52872" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix race condition in status line change on dead connections

gsm_cleanup_mux() cleans up the gsm by closing all DLCIs, stopping all
timers, removing the virtual tty devices and clearing the data queues.
This procedure, however, may cause subsequent changes of the virtual modem
status lines of a DLCI. More data is being added the outgoing data queue
and the deleted kick timer is restarted to handle this. At this point many
resources have already been removed by the cleanup procedure. Thus, a
kernel panic occurs.

Fix this by proving in gsm_modem_update() that the cleanup procedure has
not been started and the mux is still alive.

Note that writing to a virtual tty is already protected by checks against
the DLCI specific connection state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52873" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52874" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52874" ref_url="https://www.suse.com/security/cve/CVE-2023-52874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro

In the TDX_HYPERCALL asm, after the TDCALL instruction returns from the
untrusted VMM, the registers that the TDX guest shares to the VMM need
to be cleared to avoid speculative execution of VMM-provided values.

RSI is specified in the bitmap of those registers, but it is missing
when zeroing out those registers in the current TDX_HYPERCALL.

It was there when it was originally added in commit 752d13305c78
("x86/tdx: Expand __tdx_hypercall() to handle more arguments"), but was
later removed in commit 1e70c680375a ("x86/tdx: Do not corrupt
frame-pointer in __tdx_hypercall()"), which was correct because %rsi is
later restored in the "pop %rsi".  However a later commit 7a3a401874be
("x86/tdx: Drop flags from __tdx_hypercall()") removed that "pop %rsi"
but forgot to add the "xor %rsi, %rsi" back.

Fix by adding it back.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52874/">CVE-2023-52874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52874">CVE-2023-52874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225049">SUSE bug 1225049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52875" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52876" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data

Add the check for the return value of mtk_alloc_clk_data() in order to
avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52877" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()

It is possible that typec_register_partner() returns ERR_PTR on failure.
When port-&gt;partner is an error, a NULL pointer dereference may occur as
shown below.

[91222.095236][  T319] typec port0: failed to register partner (-17)
...
[91225.061491][  T319] Unable to handle kernel NULL pointer dereference
at virtual address 000000000000039f
[91225.274642][  T319] pc : tcpm_pd_data_request+0x310/0x13fc
[91225.274646][  T319] lr : tcpm_pd_data_request+0x298/0x13fc
[91225.308067][  T319] Call trace:
[91225.308070][  T319]  tcpm_pd_data_request+0x310/0x13fc
[91225.308073][  T319]  tcpm_pd_rx_handler+0x100/0x9e8
[91225.355900][  T319]  kthread_worker_fn+0x178/0x58c
[91225.355902][  T319]  kthread+0x150/0x200
[91225.355905][  T319]  ret_from_fork+0x10/0x30

Add a check for port-&gt;partner to avoid dereferencing a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52878" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds

If the "struct can_priv::echoo_skb" is accessed out of bounds, this
would cause a kernel crash. Instead, issue a meaningful warning
message and return with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52879" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52879" ref_url="https://www.suse.com/security/cve/CVE-2023-52879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Have trace_event_file have ref counters

The following can crash the kernel:

 # cd /sys/kernel/tracing
 # echo 'p:sched schedule' &gt; kprobe_events
 # exec 5&gt;&gt;events/kprobes/sched/enable
 # &gt; kprobe_events
 # exec 5&gt;&amp;-

The above commands:

 1. Change directory to the tracefs directory
 2. Create a kprobe event (doesn't matter what one)
 3. Open bash file descriptor 5 on the enable file of the kprobe event
 4. Delete the kprobe event (removes the files too)
 5. Close the bash file descriptor 5

The above causes a crash!

 BUG: kernel NULL pointer dereference, address: 0000000000000028
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 6 PID: 877 Comm: bash Not tainted 6.5.0-rc4-test-00008-g2c6b6b1029d4-dirty #186
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
 RIP: 0010:tracing_release_file_tr+0xc/0x50

What happens here is that the kprobe event creates a trace_event_file
"file" descriptor that represents the file in tracefs to the event. It
maintains state of the event (is it enabled for the given instance?).
Opening the "enable" file gets a reference to the event "file" descriptor
via the open file descriptor. When the kprobe event is deleted, the file is
also deleted from the tracefs system which also frees the event "file"
descriptor.

But as the tracefs file is still opened by user space, it will not be
totally removed until the final dput() is called on it. But this is not
true with the event "file" descriptor that is already freed. If the user
does a write to or simply closes the file descriptor it will reference the
event "file" descriptor that was just freed, causing a use-after-free bug.

To solve this, add a ref count to the event "file" descriptor as well as a
new flag called "FREED". The "file" will not be freed until the last
reference is released. But the FREE flag will be set when the event is
removed to prevent any more modifications to that event from happening,
even if there's still a reference to the event "file" descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52879/">CVE-2023-52879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52879">CVE-2023-52879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225101">SUSE bug 1225101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc

Any unprivileged user can attach N_GSM0710 ldisc, but it requires
CAP_NET_ADMIN to create a GSM network anyway.

Require initial namespace CAP_NET_ADMIN to do that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: do not accept ACK of bytes we never sent

This patch is based on a detailed report and ideas from Yepeng Pan
and Christian Rossow.

ACK seq validation is currently following RFC 5961 5.2 guidelines:

   The ACK value is considered acceptable only if
   it is in the range of ((SND.UNA - MAX.SND.WND) &lt;= SEG.ACK &lt;=
   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the
   above condition MUST be discarded and an ACK sent back.  It needs to
   be noted that RFC 793 on page 72 (fifth check) says: "If the ACK is a
   duplicate (SEG.ACK &lt; SND.UNA), it can be ignored.  If the ACK
   acknowledges something not yet sent (SEG.ACK &gt; SND.NXT) then send an
   ACK, drop the segment, and return".  The "ignored" above implies that
   the processing of the incoming data segment continues, which means
   the ACK value is treated as acceptable.  This mitigation makes the
   ACK check more stringent since any ACK &lt; SND.UNA wouldn't be
   accepted, instead only ACKs that are in the range ((SND.UNA -
   MAX.SND.WND) &lt;= SEG.ACK &lt;= SND.NXT) get through.

This can be refined for new (and possibly spoofed) flows,
by not accepting ACK for bytes that were never sent.

This greatly improves TCP security at a little cost.

I added a Fixes: tag to make sure this patch will reach stable trees,
even if the 'blamed' patch was adhering to the RFC.

tp-&gt;bytes_acked was added in linux-4.2

Following packetdrill test (courtesy of Yepeng Pan) shows
the issue at hand:

0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1024) = 0

// ---------------- Handshake ------------------- //

// when window scale is set to 14 the window size can be extended to
// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet
// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)
// ,though this ack number acknowledges some data never
// sent by the server.

+0 &lt; S 0:0(0) win 65535 &lt;mss 1400,nop,wscale 14&gt;
+0 &gt; S. 0:0(0) ack 1 &lt;...&gt;
+0 &lt; . 1:1(0) ack 1 win 65535
+0 accept(3, ..., ...) = 4

// For the established connection, we send an ACK packet,
// the ack packet uses ack number 1 - 1073725300 + 2^32,
// where 2^32 is used to wrap around.
// Note: we used 1073725300 instead of 1073725440 to avoid possible
// edge cases.
// 1 - 1073725300 + 2^32 = 3221241997

// Oops, old kernels happily accept this packet.
+0 &lt; . 1:1001(1000) ack 3221241997 win 65535

// After the kernel fix the following will be replaced by a challenge ACK,
// and prior malicious frame would be dropped.
+0 &gt; . 1:1(0) ack 1001
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226152">SUSE bug 1226152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52882" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change

While PLL CPUX clock rate change when CPU is running from it works in
vast majority of cases, now and then it causes instability. This leads
to system crashes and other undefined behaviour. After a lot of testing
(30+ hours) while also doing a lot of frequency switches, we can't
observe any instability issues anymore when doing reparenting to stable
clock like 24 MHz oscillator.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225692">SUSE bug 1225692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52883" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52883" ref_url="https://www.suse.com/security/cve/CVE-2023-52883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix possible null pointer dereference

abo-&gt;tbo.resource may be NULL in amdgpu_vm_bo_update.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52883/">CVE-2023-52883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52883">CVE-2023-52883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226630">SUSE bug 1226630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cyapa - add missing input core locking to suspend/resume functions

Grab input-&gt;mutex during suspend/resume functions like it is done in
other input drivers. This fixes the following warning during system
suspend/resume cycle on Samsung Exynos5250-based Snow Chromebook:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
...
------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226764">SUSE bug 1226764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52885" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix UAF in svc_tcp_listen_data_ready()

After the listener svc_sock is freed, and before invoking svc_tcp_accept()
for the established child sock, there is a window that the newsock
retaining a freed listener svc_sock in sk_user_data which cloning from
parent. In the race window, if data is received on the newsock, we will
observe use-after-free report in svc_tcp_listen_data_ready().

Reproduce by two tasks:

1. while :; do rpc.nfsd 0 ; rpc.nfsd; done
2. while :; do echo "" | ncat -4 127.0.0.1 2049 ; done

KASAN report:

  ==================================================================
  BUG: KASAN: slab-use-after-free in svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]
  Read of size 8 at addr ffff888139d96228 by task nc/102553
  CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18
  Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
  Call Trace:
   &lt;IRQ&gt;
   dump_stack_lvl+0x33/0x50
   print_address_description.constprop.0+0x27/0x310
   print_report+0x3e/0x70
   kasan_report+0xae/0xe0
   svc_tcp_listen_data_ready+0x1cf/0x1f0 [sunrpc]
   tcp_data_queue+0x9f4/0x20e0
   tcp_rcv_established+0x666/0x1f60
   tcp_v4_do_rcv+0x51c/0x850
   tcp_v4_rcv+0x23fc/0x2e80
   ip_protocol_deliver_rcu+0x62/0x300
   ip_local_deliver_finish+0x267/0x350
   ip_local_deliver+0x18b/0x2d0
   ip_rcv+0x2fb/0x370
   __netif_receive_skb_one_core+0x166/0x1b0
   process_backlog+0x24c/0x5e0
   __napi_poll+0xa2/0x500
   net_rx_action+0x854/0xc90
   __do_softirq+0x1bb/0x5de
   do_softirq+0xcb/0x100
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   ...
   &lt;/TASK&gt;

  Allocated by task 102371:
   kasan_save_stack+0x1e/0x40
   kasan_set_track+0x21/0x30
   __kasan_kmalloc+0x7b/0x90
   svc_setup_socket+0x52/0x4f0 [sunrpc]
   svc_addsock+0x20d/0x400 [sunrpc]
   __write_ports_addfd+0x209/0x390 [nfsd]
   write_ports+0x239/0x2c0 [nfsd]
   nfsctl_transaction_write+0xac/0x110 [nfsd]
   vfs_write+0x1c3/0xae0
   ksys_write+0xed/0x1c0
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

  Freed by task 102551:
   kasan_save_stack+0x1e/0x40
   kasan_set_track+0x21/0x30
   kasan_save_free_info+0x2a/0x50
   __kasan_slab_free+0x106/0x190
   __kmem_cache_free+0x133/0x270
   svc_xprt_free+0x1e2/0x350 [sunrpc]
   svc_xprt_destroy_all+0x25a/0x440 [sunrpc]
   nfsd_put+0x125/0x240 [nfsd]
   nfsd_svc+0x2cb/0x3c0 [nfsd]
   write_threads+0x1ac/0x2a0 [nfsd]
   nfsctl_transaction_write+0xac/0x110 [nfsd]
   vfs_write+0x1c3/0xae0
   ksys_write+0xed/0x1c0
   do_syscall_64+0x38/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

Fix the UAF by simply doing nothing in svc_tcp_listen_data_ready()
if state != TCP_LISTEN, that will avoid dereferencing svsk for all
child socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227753">SUSE bug 1227753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52886" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix race by not overwriting udev-&gt;descriptor in hub_port_init()

Syzbot reported an out-of-bounds read in sysfs.c:read_descriptors():

BUG: KASAN: slab-out-of-bounds in read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883
Read of size 8 at addr ffff88801e78b8c8 by task udevd/5011

CPU: 0 PID: 5011 Comm: udevd Not tainted 6.4.0-rc6-syzkaller-00195-g40f71e7cd3c6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
 print_address_description.constprop.0+0x2c/0x3c0 mm/kasan/report.c:351
 print_report mm/kasan/report.c:462 [inline]
 kasan_report+0x11c/0x130 mm/kasan/report.c:572
 read_descriptors+0x263/0x280 drivers/usb/core/sysfs.c:883
...
Allocated by task 758:
...
 __do_kmalloc_node mm/slab_common.c:966 [inline]
 __kmalloc+0x5e/0x190 mm/slab_common.c:979
 kmalloc include/linux/slab.h:563 [inline]
 kzalloc include/linux/slab.h:680 [inline]
 usb_get_configuration+0x1f7/0x5170 drivers/usb/core/config.c:887
 usb_enumerate_device drivers/usb/core/hub.c:2407 [inline]
 usb_new_device+0x12b0/0x19d0 drivers/usb/core/hub.c:2545

As analyzed by Khazhy Kumykov, the cause of this bug is a race between
read_descriptors() and hub_port_init(): The first routine uses a field
in udev-&gt;descriptor, not expecting it to change, while the second
overwrites it.

Prior to commit 45bf39f8df7f ("USB: core: Don't hold device lock while
reading the "descriptors" sysfs file") this race couldn't occur,
because the routines were mutually exclusive thanks to the device
locking.  Removing that locking from read_descriptors() exposed it to
the race.

The best way to fix the bug is to keep hub_port_init() from changing
udev-&gt;descriptor once udev has been initialized and registered.
Drivers expect the descriptors stored in the kernel to be immutable;
we should not undermine this expectation.  In fact, this change should
have been made long ago.

So now hub_port_init() will take an additional argument, specifying a
buffer in which to store the device descriptor it reads.  (If udev has
not yet been initialized, the buffer pointer will be NULL and then
hub_port_init() will store the device descriptor in udev as before.)
This eliminates the data race responsible for the out-of-bounds read.

The changes to hub_port_init() appear more extensive than they really
are, because of indentation changes resulting from an attempt to avoid
writing to other parts of the usb_device structure after it has been
initialized.  Similar changes should be made to the code that reads
the BOS descriptor, but that can be handled in a separate patch later
on.  This patch is sufficient to fix the bug found by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52887" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new

This patch enhances error handling in scenarios with RTS (Request to
Send) messages arriving closely. It replaces the less informative WARN_ON_ONCE
backtraces with a new error handling method. This provides clearer error
messages and allows for the early termination of problematic sessions.
Previously, sessions were only released at the end of j1939_xtp_rx_rts().

Potentially this could be reproduced with something like:
testj1939 -r vcan0:0x80 &amp;
while true; do
	# send first RTS
	cansend vcan0 18EC8090#1014000303002301;
	# send second RTS
	cansend vcan0 18EC8090#1014000303002301;
	# send abort
	cansend vcan0 18EC8090#ff00000000002301;
done
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228426">SUSE bug 1228426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52888" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52888" ref_url="https://www.suse.com/security/cve/CVE-2023-52888" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Only free buffer VA that is not NULL

In the MediaTek vcodec driver, while mtk_vcodec_mem_free() is mostly
called only when the buffer to free exists, there are some instances
that didn't do the check and triggered warnings in practice.

We believe those checks were forgotten unintentionally. Add the checks
back to fix the warnings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52888/">CVE-2023-52888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52888">CVE-2023-52888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228557">SUSE bug 1228557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52889" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

apparmor: Fix null pointer deref when receiving skb during sock creation

The panic below is observed when receiving ICMP packets with secmark set
while an ICMP raw socket is being created. SK_CTX(sk)-&gt;label is updated
in apparmor_socket_post_create(), but the packet is delivered to the
socket before that, causing the null pointer dereference.
Drop the packet if label context is not set.

    BUG: kernel NULL pointer dereference, address: 000000000000004c
    #PF: supervisor read access in kernel mode
    #PF: error_code(0x0000) - not-present page
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP NOPTI
    CPU: 0 PID: 407 Comm: a.out Not tainted 6.4.12-arch1-1 #1 3e6fa2753a2d75925c34ecb78e22e85a65d083df
    Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020
    RIP: 0010:aa_label_next_confined+0xb/0x40
    Code: 00 00 48 89 ef e8 d5 25 0c 00 e9 66 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 89 f0 &lt;8b&gt; 77 4c 39 c6 7e 1f 48 63 d0 48 8d 14 d7 eb 0b 83 c0 01 48 83 c2
    RSP: 0018:ffffa92940003b08 EFLAGS: 00010246
    RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000000000e
    RDX: ffffa92940003be8 RSI: 0000000000000000 RDI: 0000000000000000
    RBP: ffff8b57471e7800 R08: ffff8b574c642400 R09: 0000000000000002
    R10: ffffffffbd820eeb R11: ffffffffbeb7ff00 R12: ffff8b574c642400
    R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000000
    FS:  00007fb092ea7640(0000) GS:ffff8b577bc00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 000000000000004c CR3: 00000001020f2005 CR4: 00000000007706f0
    PKRU: 55555554
    Call Trace:
     &lt;IRQ&gt;
     ? __die+0x23/0x70
     ? page_fault_oops+0x171/0x4e0
     ? exc_page_fault+0x7f/0x180
     ? asm_exc_page_fault+0x26/0x30
     ? aa_label_next_confined+0xb/0x40
     apparmor_secmark_check+0xec/0x330
     security_sock_rcv_skb+0x35/0x50
     sk_filter_trim_cap+0x47/0x250
     sock_queue_rcv_skb_reason+0x20/0x60
     raw_rcv+0x13c/0x210
     raw_local_deliver+0x1f3/0x250
     ip_protocol_deliver_rcu+0x4f/0x2f0
     ip_local_deliver_finish+0x76/0xa0
     __netif_receive_skb_one_core+0x89/0xa0
     netif_receive_skb+0x119/0x170
     ? __netdev_alloc_skb+0x3d/0x140
     vmxnet3_rq_rx_complete+0xb23/0x1010 [vmxnet3 56a84f9c97178c57a43a24ec073b45a9d6f01f3a]
     vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3 56a84f9c97178c57a43a24ec073b45a9d6f01f3a]
     __napi_poll+0x28/0x1b0
     net_rx_action+0x2a4/0x380
     __do_softirq+0xd1/0x2c8
     __irq_exit_rcu+0xbb/0xf0
     common_interrupt+0x86/0xa0
     &lt;/IRQ&gt;
     &lt;TASK&gt;
     asm_common_interrupt+0x26/0x40
    RIP: 0010:apparmor_socket_post_create+0xb/0x200
    Code: 08 48 85 ff 75 a1 eb b1 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 &lt;55&gt; 48 89 fd 53 45 85 c0 0f 84 b2 00 00 00 48 8b 1d 80 56 3f 02 48
    RSP: 0018:ffffa92940ce7e50 EFLAGS: 00000286
    RAX: ffffffffbc756440 RBX: 0000000000000000 RCX: 0000000000000001
    RDX: 0000000000000003 RSI: 0000000000000002 RDI: ffff8b574eaab740
    RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
    R10: ffff8b57444cec70 R11: 0000000000000000 R12: 0000000000000003
    R13: 0000000000000002 R14: ffff8b574eaab740 R15: ffffffffbd8e4748
     ? __pfx_apparmor_socket_post_create+0x10/0x10
     security_socket_post_create+0x4b/0x80
     __sock_create+0x176/0x1f0
     __sys_socket+0x89/0x100
     __x64_sys_socket+0x17/0x20
     do_syscall_64+0x5d/0x90
     ? do_syscall_64+0x6c/0x90
     ? do_syscall_64+0x6c/0x90
     ? do_syscall_64+0x6c/0x90
     entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229287">SUSE bug 1229287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52893" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gsmi: fix null-deref in gsmi_get_variable

We can get EFI variables without fetching the attribute, so we must
allow for that in gsmi.

commit 859748255b43 ("efi: pstore: Omit efivars caching EFI varstore
access layer") added a new get_variable call with attr=NULL, which
triggers panic in gsmi.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52894" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate()

In Google internal bug 265639009 we've received an (as yet) unreproducible
crash report from an aarch64 GKI 5.10.149-android13 running device.

AFAICT the source code is at:
  https://android.googlesource.com/kernel/common/+/refs/tags/ASB-2022-12-05_13-5.10

The call stack is:
  ncm_close() -&gt; ncm_notify() -&gt; ncm_do_notify()
with the crash at:
  ncm_do_notify+0x98/0x270
Code: 79000d0b b9000a6c f940012a f9400269 (b9405d4b)

Which I believe disassembles to (I don't know ARM assembly, but it looks sane enough to me...):

  // halfword (16-bit) store presumably to event-&gt;wLength (at offset 6 of struct usb_cdc_notification)
  0B 0D 00 79    strh w11, [x8, #6]

  // word (32-bit) store presumably to req-&gt;Length (at offset 8 of struct usb_request)
  6C 0A 00 B9    str  w12, [x19, #8]

  // x10 (NULL) was read here from offset 0 of valid pointer x9
  // IMHO we're reading 'cdev-&gt;gadget' and getting NULL
  // gadget is indeed at offset 0 of struct usb_composite_dev
  2A 01 40 F9    ldr  x10, [x9]

  // loading req-&gt;buf pointer, which is at offset 0 of struct usb_request
  69 02 40 F9    ldr  x9, [x19]

  // x10 is null, crash, appears to be attempt to read cdev-&gt;gadget-&gt;max_speed
  4B 5D 40 B9    ldr  w11, [x10, #0x5c]

which seems to line up with ncm_do_notify() case NCM_NOTIFY_SPEED code fragment:

  event-&gt;wLength = cpu_to_le16(8);
  req-&gt;length = NCM_STATUS_BYTECOUNT;

  /* SPEED_CHANGE data is up/down speeds in bits/sec */
  data = req-&gt;buf + sizeof *event;
  data[0] = cpu_to_le32(ncm_bitrate(cdev-&gt;gadget));

My analysis of registers and NULL ptr deref crash offset
  (Unable to handle kernel NULL pointer dereference at virtual address 000000000000005c)
heavily suggests that the crash is due to 'cdev-&gt;gadget' being NULL when executing:
  data[0] = cpu_to_le32(ncm_bitrate(cdev-&gt;gadget));
which calls:
  ncm_bitrate(NULL)
which then calls:
  gadget_is_superspeed(NULL)
which reads
  ((struct usb_gadget *)NULL)-&gt;max_speed
and hits a panic.

AFAICT, if I'm counting right, the offset of max_speed is indeed 0x5C.
(remember there's a GKI KABI reservation of 16 bytes in struct work_struct)

It's not at all clear to me how this is all supposed to work...
but returning 0 seems much better than panic-ing...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52895" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52895" ref_url="https://www.suse.com/security/cve/CVE-2023-52895" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/poll: don't reissue in case of poll race on multishot request

A previous commit fixed a poll race that can occur, but it's only
applicable for multishot requests. For a multishot request, we can safely
ignore a spurious wakeup, as we never leave the waitqueue to begin with.

A blunt reissue of a multishot armed request can cause us to leak a
buffer, if they are ring provided. While this seems like a bug in itself,
it's not really defined behavior to reissue a multishot request directly.
It's less efficient to do so as well, and not required to rearm anything
like it is for singleshot poll requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52895/">CVE-2023-52895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52895">CVE-2023-52895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229534">SUSE bug 1229534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52896" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race between quota rescan and disable leading to NULL pointer deref

If we have one task trying to start the quota rescan worker while another
one is trying to disable quotas, we can end up hitting a race that results
in the quota rescan worker doing a NULL pointer dereference. The steps for
this are the following:

1) Quotas are enabled;

2) Task A calls the quota rescan ioctl and enters btrfs_qgroup_rescan().
   It calls qgroup_rescan_init() which returns 0 (success) and then joins a
   transaction and commits it;

3) Task B calls the quota disable ioctl and enters btrfs_quota_disable().
   It clears the bit BTRFS_FS_QUOTA_ENABLED from fs_info-&gt;flags and calls
   btrfs_qgroup_wait_for_completion(), which returns immediately since the
   rescan worker is not yet running.
   Then it starts a transaction and locks fs_info-&gt;qgroup_ioctl_lock;

4) Task A queues the rescan worker, by calling btrfs_queue_work();

5) The rescan worker starts, and calls rescan_should_stop() at the start
   of its while loop, which results in 0 iterations of the loop, since
   the flag BTRFS_FS_QUOTA_ENABLED was cleared from fs_info-&gt;flags by
   task B at step 3);

6) Task B sets fs_info-&gt;quota_root to NULL;

7) The rescan worker tries to start a transaction and uses
   fs_info-&gt;quota_root as the root argument for btrfs_start_transaction().
   This results in a NULL pointer dereference down the call chain of
   btrfs_start_transaction(). The stack trace is something like the one
   reported in Link tag below:

   general protection fault, probably for non-canonical address 0xdffffc0000000041: 0000 [#1] PREEMPT SMP KASAN
   KASAN: null-ptr-deref in range [0x0000000000000208-0x000000000000020f]
   CPU: 1 PID: 34 Comm: kworker/u4:2 Not tainted 6.1.0-syzkaller-13872-gb6bb9676f216 #0
   Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
   Workqueue: btrfs-qgroup-rescan btrfs_work_helper
   RIP: 0010:start_transaction+0x48/0x10f0 fs/btrfs/transaction.c:564
   Code: 48 89 fb 48 (...)
   RSP: 0018:ffffc90000ab7ab0 EFLAGS: 00010206
   RAX: 0000000000000041 RBX: 0000000000000208 RCX: ffff88801779ba80
   RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
   RBP: dffffc0000000000 R08: 0000000000000001 R09: fffff52000156f5d
   R10: fffff52000156f5d R11: 1ffff92000156f5c R12: 0000000000000000
   R13: 0000000000000001 R14: 0000000000000001 R15: 0000000000000003
   FS:  0000000000000000(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00007f2bea75b718 CR3: 000000001d0cc000 CR4: 00000000003506e0
   DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
   DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
   Call Trace:
    &lt;TASK&gt;
    btrfs_qgroup_rescan_worker+0x3bb/0x6a0 fs/btrfs/qgroup.c:3402
    btrfs_work_helper+0x312/0x850 fs/btrfs/async-thread.c:280
    process_one_work+0x877/0xdb0 kernel/workqueue.c:2289
    worker_thread+0xb14/0x1330 kernel/workqueue.c:2436
    kthread+0x266/0x300 kernel/kthread.c:376
    ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
    &lt;/TASK&gt;
   Modules linked in:

So fix this by having the rescan worker function not attempt to start a
transaction if it didn't do any rescan work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52897" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52897" ref_url="https://www.suse.com/security/cve/CVE-2023-52897" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: do not warn on record without old_roots populated

[BUG]
There are some reports from the mailing list that since v6.1 kernel, the
WARN_ON() inside btrfs_qgroup_account_extent() gets triggered during
rescan:

  WARNING: CPU: 3 PID: 6424 at fs/btrfs/qgroup.c:2756 btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs]
  CPU: 3 PID: 6424 Comm: snapperd Tainted: P           OE      6.1.2-1-default #1 openSUSE Tumbleweed 05c7a1b1b61d5627475528f71f50444637b5aad7
  RIP: 0010:btrfs_qgroup_account_extents+0x1ae/0x260 [btrfs]
  Call Trace:
   &lt;TASK&gt;
  btrfs_commit_transaction+0x30c/0xb40 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]
   ? start_transaction+0xc3/0x5b0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]
  btrfs_qgroup_rescan+0x42/0xc0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]
   btrfs_ioctl+0x1ab9/0x25c0 [btrfs c39c9c546c241c593f03bd6d5f39ea1b676250f6]
   ? __rseq_handle_notify_resume+0xa9/0x4a0
   ? mntput_no_expire+0x4a/0x240
   ? __seccomp_filter+0x319/0x4d0
   __x64_sys_ioctl+0x90/0xd0
   do_syscall_64+0x5b/0x80
   ? syscall_exit_to_user_mode+0x17/0x40
   ? do_syscall_64+0x67/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  RIP: 0033:0x7fd9b790d9bf
   &lt;/TASK&gt;

[CAUSE]
Since commit e15e9f43c7ca ("btrfs: introduce
BTRFS_QGROUP_RUNTIME_FLAG_NO_ACCOUNTING to skip qgroup accounting"), if
our qgroup is already in inconsistent state, we will no longer do the
time-consuming backref walk.

This can leave some qgroup records without a valid old_roots ulist.
Normally this is fine, as btrfs_qgroup_account_extents() would also skip
those records if we have NO_ACCOUNTING flag set.

But there is a small window, if we have NO_ACCOUNTING flag set, and
inserted some qgroup_record without a old_roots ulist, but then the user
triggered a qgroup rescan.

During btrfs_qgroup_rescan(), we firstly clear NO_ACCOUNTING flag, then
commit current transaction.

And since we have a qgroup_record with old_roots = NULL, we trigger the
WARN_ON() during btrfs_qgroup_account_extents().

[FIX]
Unfortunately due to the introduction of NO_ACCOUNTING flag, the
assumption that every qgroup_record would have its old_roots populated
is no longer correct.

Fix the false alerts and drop the WARN_ON().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52897/">CVE-2023-52897 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52897">CVE-2023-52897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229532">SUSE bug 1229532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52898" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix null pointer dereference when host dies

Make sure xhci_free_dev() and xhci_kill_endpoint_urbs() do not race
and cause null pointer dereference when host suddenly dies.

Usb core may call xhci_free_dev() which frees the xhci-&gt;devs[slot_id]
virt device at the same time that xhci_kill_endpoint_urbs() tries to
loop through all the device's endpoints, checking if there are any
cancelled urbs left to give back.

hold the xhci spinlock while freeing the virt device
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52899" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52899" ref_url="https://www.suse.com/security/cve/CVE-2023-52899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Add exception protection processing for vd in axi_chan_handle_err function

Since there is no protection for vd, a kernel panic will be
triggered here in exceptional cases.

You can refer to the processing of axi_chan_block_xfer_complete function

The triggered kernel panic is as follows:

[   67.848444] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060
[   67.848447] Mem abort info:
[   67.848449]   ESR = 0x96000004
[   67.848451]   EC = 0x25: DABT (current EL), IL = 32 bits
[   67.848454]   SET = 0, FnV = 0
[   67.848456]   EA = 0, S1PTW = 0
[   67.848458] Data abort info:
[   67.848460]   ISV = 0, ISS = 0x00000004
[   67.848462]   CM = 0, WnR = 0
[   67.848465] user pgtable: 4k pages, 48-bit VAs, pgdp=00000800c4c0b000
[   67.848468] [0000000000000060] pgd=0000000000000000, p4d=0000000000000000
[   67.848472] Internal error: Oops: 96000004 [#1] SMP
[   67.848475] Modules linked in: dmatest
[   67.848479] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.10.100-emu_x2rc+ #11
[   67.848483] pstate: 62000085 (nZCv daIf -PAN -UAO +TCO BTYPE=--)
[   67.848487] pc : axi_chan_handle_err+0xc4/0x230
[   67.848491] lr : axi_chan_handle_err+0x30/0x230
[   67.848493] sp : ffff0803fe55ae50
[   67.848495] x29: ffff0803fe55ae50 x28: ffff800011212200
[   67.848500] x27: ffff0800c42c0080 x26: ffff0800c097c080
[   67.848504] x25: ffff800010d33880 x24: ffff80001139d850
[   67.848508] x23: ffff0800c097c168 x22: 0000000000000000
[   67.848512] x21: 0000000000000080 x20: 0000000000002000
[   67.848517] x19: ffff0800c097c080 x18: 0000000000000000
[   67.848521] x17: 0000000000000000 x16: 0000000000000000
[   67.848525] x15: 0000000000000000 x14: 0000000000000000
[   67.848529] x13: 0000000000000000 x12: 0000000000000040
[   67.848533] x11: ffff0800c0400248 x10: ffff0800c040024a
[   67.848538] x9 : ffff800010576cd4 x8 : ffff0800c0400270
[   67.848542] x7 : 0000000000000000 x6 : ffff0800c04003e0
[   67.848546] x5 : ffff0800c0400248 x4 : ffff0800c4294480
[   67.848550] x3 : dead000000000100 x2 : dead000000000122
[   67.848555] x1 : 0000000000000100 x0 : ffff0800c097c168
[   67.848559] Call trace:
[   67.848562]  axi_chan_handle_err+0xc4/0x230
[   67.848566]  dw_axi_dma_interrupt+0xf4/0x590
[   67.848569]  __handle_irq_event_percpu+0x60/0x220
[   67.848573]  handle_irq_event+0x64/0x120
[   67.848576]  handle_fasteoi_irq+0xc4/0x220
[   67.848580]  __handle_domain_irq+0x80/0xe0
[   67.848583]  gic_handle_irq+0xc0/0x138
[   67.848585]  el1_irq+0xc8/0x180
[   67.848588]  arch_cpu_idle+0x14/0x2c
[   67.848591]  default_idle_call+0x40/0x16c
[   67.848594]  do_idle+0x1f0/0x250
[   67.848597]  cpu_startup_entry+0x2c/0x60
[   67.848600]  rest_init+0xc0/0xcc
[   67.848603]  arch_call_rest_init+0x14/0x1c
[   67.848606]  start_kernel+0x4cc/0x500
[   67.848610] Code: eb0002ff 9a9f12d6 f2fbd5a2 f2fbd5a3 (a94602c1)
[   67.848613] ---[ end trace 585a97036f88203a ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52899/">CVE-2023-52899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52899">CVE-2023-52899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229569">SUSE bug 1229569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52900" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix general protection fault in nilfs_btree_insert()

If nilfs2 reads a corrupted disk image and tries to reads a b-tree node
block by calling __nilfs_btree_get_block() against an invalid virtual
block address, it returns -ENOENT because conversion of the virtual block
address to a disk block address fails.  However, this return value is the
same as the internal code that b-tree lookup routines return to indicate
that the block being searched does not exist, so functions that operate on
that b-tree may misbehave.

When nilfs_btree_insert() receives this spurious 'not found' code from
nilfs_btree_do_lookup(), it misunderstands that the 'not found' check was
successful and continues the insert operation using incomplete lookup path
data, causing the following crash:

 general protection fault, probably for non-canonical address
 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN
 KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
 ...
 RIP: 0010:nilfs_btree_get_nonroot_node fs/nilfs2/btree.c:418 [inline]
 RIP: 0010:nilfs_btree_prepare_insert fs/nilfs2/btree.c:1077 [inline]
 RIP: 0010:nilfs_btree_insert+0x6d3/0x1c10 fs/nilfs2/btree.c:1238
 Code: bc 24 80 00 00 00 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 4c 89
 ff e8 4b 02 92 fe 4d 8b 3f 49 83 c7 28 4c 89 f8 48 c1 e8 03 &lt;42&gt; 80 3c
 28 00 74 08 4c 89 ff e8 2e 02 92 fe 4d 8b 3f 49 83 c7 02
 ...
 Call Trace:
 &lt;TASK&gt;
  nilfs_bmap_do_insert fs/nilfs2/bmap.c:121 [inline]
  nilfs_bmap_insert+0x20d/0x360 fs/nilfs2/bmap.c:147
  nilfs_get_block+0x414/0x8d0 fs/nilfs2/inode.c:101
  __block_write_begin_int+0x54c/0x1a80 fs/buffer.c:1991
  __block_write_begin fs/buffer.c:2041 [inline]
  block_write_begin+0x93/0x1e0 fs/buffer.c:2102
  nilfs_write_begin+0x9c/0x110 fs/nilfs2/inode.c:261
  generic_perform_write+0x2e4/0x5e0 mm/filemap.c:3772
  __generic_file_write_iter+0x176/0x400 mm/filemap.c:3900
  generic_file_write_iter+0xab/0x310 mm/filemap.c:3932
  call_write_iter include/linux/fs.h:2186 [inline]
  new_sync_write fs/read_write.c:491 [inline]
  vfs_write+0x7dc/0xc50 fs/read_write.c:584
  ksys_write+0x177/0x2a0 fs/read_write.c:637
  do_syscall_x64 arch/x86/entry/common.c:50 [inline]
  do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
 ...
 &lt;/TASK&gt;

This patch fixes the root cause of this problem by replacing the error
code that __nilfs_btree_get_block() returns on block address conversion
failure from -ENOENT to another internal code -EINVAL which means that the
b-tree metadata is corrupted.

By returning -EINVAL, it propagates without glitches, and for all relevant
b-tree operations, functions in the upper bmap layer output an error
message indicating corrupted b-tree metadata via
nilfs_bmap_convert_error(), and code -EIO will be eventually returned as
it should be.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52901" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Check endpoint is valid before dereferencing it

When the host controller is not responding, all URBs queued to all
endpoints need to be killed. This can cause a kernel panic if we
dereference an invalid endpoint.

Fix this by using xhci_get_virt_ep() helper to find the endpoint and
checking if the endpoint is valid before dereferencing it.

[233311.853271] xhci-hcd xhci-hcd.1.auto: xHCI host controller not responding, assume dead
[233311.853393] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000e8

[233311.853964] pc : xhci_hc_died+0x10c/0x270
[233311.853971] lr : xhci_hc_died+0x1ac/0x270

[233311.854077] Call trace:
[233311.854085]  xhci_hc_died+0x10c/0x270
[233311.854093]  xhci_stop_endpoint_command_watchdog+0x100/0x1a4
[233311.854105]  call_timer_fn+0x50/0x2d4
[233311.854112]  expire_timers+0xac/0x2e4
[233311.854118]  run_timer_softirq+0x300/0xabc
[233311.854127]  __do_softirq+0x148/0x528
[233311.854135]  irq_exit+0x194/0x1a8
[233311.854143]  __handle_domain_irq+0x164/0x1d0
[233311.854149]  gic_handle_irq.22273+0x10c/0x188
[233311.854156]  el1_irq+0xfc/0x1a8
[233311.854175]  lpm_cpuidle_enter+0x25c/0x418 [msm_pm]
[233311.854185]  cpuidle_enter_state+0x1f0/0x764
[233311.854194]  do_idle+0x594/0x6ac
[233311.854201]  cpu_startup_entry+0x7c/0x80
[233311.854209]  secondary_start_kernel+0x170/0x198
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52902" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52902" ref_url="https://www.suse.com/security/cve/CVE-2023-52902" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nommu: fix memory leak in do_mmap() error path

The preallocation of the maple tree nodes may leak if the error path to
"error_just_free" is taken.  Fix this by moving the freeing of the maple
tree nodes to a shared location for all error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52902/">CVE-2023-52902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52902">CVE-2023-52902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229530">SUSE bug 1229530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52903" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52903" ref_url="https://www.suse.com/security/cve/CVE-2023-52903" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: lock overflowing for IOPOLL

syzbot reports an issue with overflow filling for IOPOLL:

WARNING: CPU: 0 PID: 28 at io_uring/io_uring.c:734 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
CPU: 0 PID: 28 Comm: kworker/u4:1 Not tainted 6.2.0-rc3-syzkaller-16369-g358a161a6a9e #0
Workqueue: events_unbound io_ring_exit_work
Call trace:
 io_cqring_event_overflow+0x1c0/0x230 io_uring/io_uring.c:734
 io_req_cqe_overflow+0x5c/0x70 io_uring/io_uring.c:773
 io_fill_cqe_req io_uring/io_uring.h:168 [inline]
 io_do_iopoll+0x474/0x62c io_uring/rw.c:1065
 io_iopoll_try_reap_events+0x6c/0x108 io_uring/io_uring.c:1513
 io_uring_try_cancel_requests+0x13c/0x258 io_uring/io_uring.c:3056
 io_ring_exit_work+0xec/0x390 io_uring/io_uring.c:2869
 process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
 worker_thread+0x340/0x610 kernel/workqueue.c:2436
 kthread+0x12c/0x158 kernel/kthread.c:376
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:863

There is no real problem for normal IOPOLL as flush is also called with
uring_lock taken, but it's getting more complicated for IOPOLL|SQPOLL,
for which __io_cqring_overflow_flush() happens from the CQ waiting path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52903/">CVE-2023-52903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52903">CVE-2023-52903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229584">SUSE bug 1229584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52904" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52904" ref_url="https://www.suse.com/security/cve/CVE-2023-52904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate()

The subs function argument may be NULL, so do not use it before the NULL check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52904/">CVE-2023-52904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52904">CVE-2023-52904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229529">SUSE bug 1229529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52905" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix resource leakage in VF driver unbind

resources allocated like mcam entries to support the Ntuple feature
and hash tables for the tc feature are not getting freed in driver
unbind. This patch fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52906" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52906" ref_url="https://www.suse.com/security/cve/CVE-2023-52906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mpls: Fix warning during failed attribute validation

The 'TCA_MPLS_LABEL' attribute is of 'NLA_U32' type, but has a
validation type of 'NLA_VALIDATE_FUNCTION'. This is an invalid
combination according to the comment above 'struct nla_policy':

"
Meaning of `validate' field, use via NLA_POLICY_VALIDATE_FN:
   NLA_BINARY           Validation function called for the attribute.
   All other            Unused - but note that it's a union
"

This can trigger the warning [1] in nla_get_range_unsigned() when
validation of the attribute fails. Despite being of 'NLA_U32' type, the
associated 'min'/'max' fields in the policy are negative as they are
aliased by the 'validate' field.

Fix by changing the attribute type to 'NLA_BINARY' which is consistent
with the above comment and all other users of NLA_POLICY_VALIDATE_FN().
As a result, move the length validation to the validation function.

No regressions in MPLS tests:

 # ./tdc.py -f tc-tests/actions/mpls.json
 [...]
 # echo $?
 0

[1]
WARNING: CPU: 0 PID: 17743 at lib/nlattr.c:118
nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
Modules linked in:
CPU: 0 PID: 17743 Comm: syz-executor.0 Not tainted 6.1.0-rc8 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014
RIP: 0010:nla_get_range_unsigned+0x1d8/0x1e0 lib/nlattr.c:117
[...]
Call Trace:
 &lt;TASK&gt;
 __netlink_policy_dump_write_attr+0x23d/0x990 net/netlink/policy.c:310
 netlink_policy_dump_write_attr+0x22/0x30 net/netlink/policy.c:411
 netlink_ack_tlv_fill net/netlink/af_netlink.c:2454 [inline]
 netlink_ack+0x546/0x760 net/netlink/af_netlink.c:2506
 netlink_rcv_skb+0x1b7/0x240 net/netlink/af_netlink.c:2546
 rtnetlink_rcv+0x18/0x20 net/core/rtnetlink.c:6109
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x5e9/0x6b0 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x739/0x860 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0x38f/0x500 net/socket.c:2482
 ___sys_sendmsg net/socket.c:2536 [inline]
 __sys_sendmsg+0x197/0x230 net/socket.c:2565
 __do_sys_sendmsg net/socket.c:2574 [inline]
 __se_sys_sendmsg net/socket.c:2572 [inline]
 __x64_sys_sendmsg+0x42/0x50 net/socket.c:2572
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52906/">CVE-2023-52906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52906">CVE-2023-52906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229527">SUSE bug 1229527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52907" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Wait for out_urb's completion in pn533_usb_send_frame()

Fix a use-after-free that occurs in hcd when in_urb sent from
pn533_usb_send_frame() is completed earlier than out_urb. Its callback
frees the skb data in pn533_send_async_complete() that is used as a
transfer buffer of out_urb. Wait before sending in_urb until the
callback of out_urb is called. To modify the callback of out_urb alone,
separate the complete function of out_urb and ack_urb.

Found by a modified version of syzkaller.

BUG: KASAN: use-after-free in dummy_timer
Call Trace:
 memcpy (mm/kasan/shadow.c:65)
 dummy_perform_transfer (drivers/usb/gadget/udc/dummy_hcd.c:1352)
 transfer (drivers/usb/gadget/udc/dummy_hcd.c:1453)
 dummy_timer (drivers/usb/gadget/udc/dummy_hcd.c:1972)
 arch_static_branch (arch/x86/include/asm/jump_label.h:27)
 static_key_false (include/linux/jump_label.h:207)
 timer_expire_exit (include/trace/events/timer.h:127)
 call_timer_fn (kernel/time/timer.c:1475)
 expire_timers (kernel/time/timer.c:1519)
 __run_timers (kernel/time/timer.c:1790)
 run_timer_softirq (kernel/time/timer.c:1803)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52908" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52908" ref_url="https://www.suse.com/security/cve/CVE-2023-52908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential NULL dereference

Fix potential NULL dereference, in the case when "man", the resource manager
might be NULL, when/if we print debug information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52908/">CVE-2023-52908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52908">CVE-2023-52908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229525">SUSE bug 1229525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52909" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52909" ref_url="https://www.suse.com/security/cve/CVE-2023-52909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix handling of cached open files in nfsd4_open codepath

Commit fb70bf124b05 ("NFSD: Instantiate a struct file when creating a
regular NFSv4 file") added the ability to cache an open fd over a
compound. There are a couple of problems with the way this currently
works:

It's racy, as a newly-created nfsd_file can end up with its PENDING bit
cleared while the nf is hashed, and the nf_file pointer is still zeroed
out. Other tasks can find it in this state and they expect to see a
valid nf_file, and can oops if nf_file is NULL.

Also, there is no guarantee that we'll end up creating a new nfsd_file
if one is already in the hash. If an extant entry is in the hash with a
valid nf_file, nfs4_get_vfs_file will clobber its nf_file pointer with
the value of op_file and the old nf_file will leak.

Fix both issues by making a new nfsd_file_acquirei_opened variant that
takes an optional file pointer. If one is present when this is called,
we'll take a new reference to it instead of trying to open the file. If
the nfsd_file already has a valid nf_file, we'll just ignore the
optional file and pass the nfsd_file back as-is.

Also rework the tracepoints a bit to allow for an "opened" variant and
don't try to avoid counting acquisitions in the case where we already
have a cached open file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52909/">CVE-2023-52909 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52909">CVE-2023-52909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229524">SUSE bug 1229524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52910" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52910" ref_url="https://www.suse.com/security/cve/CVE-2023-52910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/iova: Fix alloc iova overflows issue

In __alloc_and_insert_iova_range, there is an issue that retry_pfn
overflows. The value of iovad-&gt;anchor.pfn_hi is ~0UL, then when
iovad-&gt;cached_node is iovad-&gt;anchor, curr_iova-&gt;pfn_hi + 1 will
overflow. As a result, if the retry logic is executed, low_pfn is
updated to 0, and then new_pfn &lt; low_pfn returns false to make the
allocation successful.

This issue occurs in the following two situations:
1. The first iova size exceeds the domain size. When initializing
iova domain, iovad-&gt;cached_node is assigned as iovad-&gt;anchor. For
example, the iova domain size is 10M, start_pfn is 0x1_F000_0000,
and the iova size allocated for the first time is 11M. The
following is the log information, new-&gt;pfn_lo is smaller than
iovad-&gt;cached_node.

Example log as follows:
[  223.798112][T1705487] sh: [name:iova&amp;]__alloc_and_insert_iova_range
start_pfn:0x1f0000,retry_pfn:0x0,size:0xb00,limit_pfn:0x1f0a00
[  223.799590][T1705487] sh: [name:iova&amp;]__alloc_and_insert_iova_range
success start_pfn:0x1f0000,new-&gt;pfn_lo:0x1efe00,new-&gt;pfn_hi:0x1f08ff

2. The node with the largest iova-&gt;pfn_lo value in the iova domain
is deleted, iovad-&gt;cached_node will be updated to iovad-&gt;anchor,
and then the alloc iova size exceeds the maximum iova size that can
be allocated in the domain.

After judging that retry_pfn is less than limit_pfn, call retry_pfn+1
to fix the overflow issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52910/">CVE-2023-52910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52910">CVE-2023-52910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229523">SUSE bug 1229523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52911" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: another fix for the headless Adreno GPU

Fix another oops reproducible when rebooting the board with the Adreno
GPU working in the headless mode (e.g. iMX platforms).

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read
[00000000] *pgd=74936831, *pte=00000000, *ppte=00000000
Internal error: Oops: 17 [#1] ARM
CPU: 0 PID: 51 Comm: reboot Not tainted 6.2.0-rc1-dirty #11
Hardware name: Freescale i.MX53 (Device Tree Support)
PC is at msm_atomic_commit_tail+0x50/0x970
LR is at commit_tail+0x9c/0x188
pc : [&lt;c06aa430&gt;]    lr : [&lt;c067a214&gt;]    psr: 600e0013
sp : e0851d30  ip : ee4eb7eb  fp : 00090acc
r10: 00000058  r9 : c2193014  r8 : c4310000
r7 : c4759380  r6 : 07bef61d  r5 : 00000000  r4 : 00000000
r3 : c44cc440  r2 : 00000000  r1 : 00000000  r0 : 00000000
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
Control: 10c5387d  Table: 74910019  DAC: 00000051
Register r0 information: NULL pointer
Register r1 information: NULL pointer
Register r2 information: NULL pointer
Register r3 information: slab kmalloc-1k start c44cc400 pointer offset 64 size 1024
Register r4 information: NULL pointer
Register r5 information: NULL pointer
Register r6 information: non-paged memory
Register r7 information: slab kmalloc-128 start c4759380 pointer offset 0 size 128
Register r8 information: slab kmalloc-2k start c4310000 pointer offset 0 size 2048
Register r9 information: non-slab/vmalloc memory
Register r10 information: non-paged memory
Register r11 information: non-paged memory
Register r12 information: non-paged memory
Process reboot (pid: 51, stack limit = 0xc80046d9)
Stack: (0xe0851d30 to 0xe0852000)
1d20:                                     c4759380 fbd77200 000005ff 002b9c70
1d40: c4759380 c4759380 00000000 07bef61d 00000600 c0d6fe7c c2193014 00000058
1d60: 00090acc c067a214 00000000 c4759380 c4310000 00000000 c44cc854 c067a89c
1d80: 00000000 00000000 00000000 c4310468 00000000 c4759380 c4310000 c4310468
1da0: c4310470 c0643258 c4759380 00000000 00000000 c0c4ee24 00000000 c44cc810
1dc0: 00000000 c0c4ee24 00000000 c44cc810 00000000 0347d2a8 e0851e00 e0851e00
1de0: c4759380 c067ad20 c4310000 00000000 c44cc810 c27f8718 c44cc854 c067adb8
1e00: c4933000 00000002 00000001 00000000 00000000 c2130850 00000000 c2130854
1e20: c25fc488 00000000 c0ff162c 00000000 00000001 00000002 00000000 00000000
1e40: c43102c0 c43102c0 00000000 0347d2a8 c44cc810 c44cc814 c2133da8 c06d1a60
1e60: 00000000 00000000 00079028 c2012f24 fee1dead c4933000 00000058 c01431e4
1e80: 01234567 c0143a20 00000000 00000000 00000000 00000000 00000000 00000000
1ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1ec0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1f80: 00000000 00000000 00000000 0347d2a8 00000002 00000004 00000078 00000058
1fa0: c010028c c0100060 00000002 00000004 fee1dead 28121969 01234567 00079028
1fc0: 00000002 00000004 00000078 00000058 0002fdc5 00000000 00000000 00090acc
1fe0: 00000058 becc9c64 b6e97e05 b6e0e5f6 600e0030 fee1dead 00000000 00000000
 msm_atomic_commit_tail from commit_tail+0x9c/0x188
 commit_tail from drm_atomic_helper_commit+0x160/0x188
 drm_atomic_helper_commit from drm_atomic_commit+0xac/0xe0
 drm_atomic_commit from drm_atomic_helper_disable_all+0x1b0/0x1c0
 drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x88/0x140
 drm_atomic_helper_shutdown from device_shutdown+0x16c/0x240
 device_shutdown from kernel_restart+0x38/0x90
 kernel_restart from __do_sys_reboot+0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52912" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52912" ref_url="https://www.suse.com/security/cve/CVE-2023-52912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fixed bug on error when unloading amdgpu

Fixed bug on error when unloading amdgpu.

The error message is as follows:
[  377.706202] kernel BUG at drivers/gpu/drm/drm_buddy.c:278!
[  377.706215] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[  377.706222] CPU: 4 PID: 8610 Comm: modprobe Tainted: G          IOE      6.0.0-thomas #1
[  377.706231] Hardware name: ASUS System Product Name/PRIME Z390-A, BIOS 2004 11/02/2021
[  377.706238] RIP: 0010:drm_buddy_free_block+0x26/0x30 [drm_buddy]
[  377.706264] Code: 00 00 00 90 0f 1f 44 00 00 48 8b 0e 89 c8 25 00 0c 00 00 3d 00 04 00 00 75 10 48 8b 47 18 48 d3 e0 48 01 47 28 e9 fa fe ff ff &lt;0f&gt; 0b 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41 54 55 48 89 f5 53
[  377.706282] RSP: 0018:ffffad2dc4683cb8 EFLAGS: 00010287
[  377.706289] RAX: 0000000000000000 RBX: ffff8b1743bd5138 RCX: 0000000000000000
[  377.706297] RDX: ffff8b1743bd5160 RSI: ffff8b1743bd5c78 RDI: ffff8b16d1b25f70
[  377.706304] RBP: ffff8b1743bd59e0 R08: 0000000000000001 R09: 0000000000000001
[  377.706311] R10: ffff8b16c8572400 R11: ffffad2dc4683cf0 R12: ffff8b16d1b25f70
[  377.706318] R13: ffff8b16d1b25fd0 R14: ffff8b1743bd59c0 R15: ffff8b16d1b25f70
[  377.706325] FS:  00007fec56c72c40(0000) GS:ffff8b1836500000(0000) knlGS:0000000000000000
[  377.706334] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  377.706340] CR2: 00007f9b88c1ba50 CR3: 0000000110450004 CR4: 00000000003706e0
[  377.706347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  377.706354] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  377.706361] Call Trace:
[  377.706365]  &lt;TASK&gt;
[  377.706369]  drm_buddy_free_list+0x2a/0x60 [drm_buddy]
[  377.706376]  amdgpu_vram_mgr_fini+0xea/0x180 [amdgpu]
[  377.706572]  amdgpu_ttm_fini+0x12e/0x1a0 [amdgpu]
[  377.706650]  amdgpu_bo_fini+0x22/0x90 [amdgpu]
[  377.706727]  gmc_v11_0_sw_fini+0x26/0x30 [amdgpu]
[  377.706821]  amdgpu_device_fini_sw+0xa1/0x3c0 [amdgpu]
[  377.706897]  amdgpu_driver_release_kms+0x12/0x30 [amdgpu]
[  377.706975]  drm_dev_release+0x20/0x40 [drm]
[  377.707006]  release_nodes+0x35/0xb0
[  377.707014]  devres_release_all+0x8b/0xc0
[  377.707020]  device_unbind_cleanup+0xe/0x70
[  377.707027]  device_release_driver_internal+0xee/0x160
[  377.707033]  driver_detach+0x44/0x90
[  377.707039]  bus_remove_driver+0x55/0xe0
[  377.707045]  pci_unregister_driver+0x3b/0x90
[  377.707052]  amdgpu_exit+0x11/0x6c [amdgpu]
[  377.707194]  __x64_sys_delete_module+0x142/0x2b0
[  377.707201]  ? fpregs_assert_state_consistent+0x22/0x50
[  377.707208]  ? exit_to_user_mode_prepare+0x3e/0x190
[  377.707215]  do_syscall_64+0x38/0x90
[  377.707221]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52912/">CVE-2023-52912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52912">CVE-2023-52912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229588">SUSE bug 1229588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52913" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52913" ref_url="https://www.suse.com/security/cve/CVE-2023-52913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix potential context UAFs

gem_context_register() makes the context visible to userspace, and which
point a separate thread can trigger the I915_GEM_CONTEXT_DESTROY ioctl.
So we need to ensure that nothing uses the ctx ptr after this.  And we
need to ensure that adding the ctx to the xarray is the *last* thing
that gem_context_register() does with the ctx pointer.

[tursulin: Stable and fixes tags add/tidy.]
(cherry picked from commit bed4b455cf5374e68879be56971c1da563bcd90c)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52913/">CVE-2023-52913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52913">CVE-2023-52913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229521">SUSE bug 1229521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52914" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52914" ref_url="https://www.suse.com/security/cve/CVE-2023-52914" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/poll: add hash if ready poll request can't complete inline

If we don't, then we may lose access to it completely, leading to a
request leak. This will eventually stall the ring exit process as
well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-07"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52914/">CVE-2023-52914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52914">CVE-2023-52914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229520">SUSE bug 1229520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer

In af9035_i2c_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach af9035_i2c_master_xfer. If accessing
msg[i].buf[0] without sanity check, null ptr deref would happen.
We add check on msg[i].len to prevent crash.

Similar commit:
commit 0ed554fd769a
("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-07"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230270">SUSE bug 1230270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: aspeed: Fix memory overwrite if timing is 1600x900

When capturing 1600x900, system could crash when system memory usage is
tight.

The way to reproduce this issue:
1. Use 1600x900 to display on host
2. Mount ISO through 'Virtual media' on OpenBMC's web
3. Run script as below on host to do sha continuously
  #!/bin/bash
  while [ [1] ];
  do
	find /media -type f -printf '"%h/%f"\n' | xargs sha256sum
  done
4. Open KVM on OpenBMC's web

The size of macro block captured is 8x8. Therefore, we should make sure
the height of src-buf is 8 aligned to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-07"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230269">SUSE bug 1230269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52919" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: fix possible NULL pointer dereference in send_acknowledge()

Handle memory allocation failure from nci_skb_alloc() (calling
alloc_skb()) to avoid possible NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52920" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52920" ref_url="https://www.suse.com/security/cve/CVE-2023-52920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: support non-r10 register spill/fill to/from stack in precision tracking

Use instruction (jump) history to record instructions that performed
register spill/fill to/from stack, regardless if this was done through
read-only r10 register, or any other register after copying r10 into it
*and* potentially adjusting offset.

To make this work reliably, we push extra per-instruction flags into
instruction history, encoding stack slot index (spi) and stack frame
number in extra 10 bit flags we take away from prev_idx in instruction
history. We don't touch idx field for maximum performance, as it's
checked most frequently during backtracking.

This change removes basically the last remaining practical limitation of
precision backtracking logic in BPF verifier. It fixes known
deficiencies, but also opens up new opportunities to reduce number of
verified states, explored in the subsequent patches.

There are only three differences in selftests' BPF object files
according to veristat, all in the positive direction (less states).

File                                    Program        Insns (A)  Insns (B)  Insns  (DIFF)  States (A)  States (B)  States (DIFF)
--------------------------------------  -------------  ---------  ---------  -------------  ----------  ----------  -------------
test_cls_redirect_dynptr.bpf.linked3.o  cls_redirect        2987       2864  -123 (-4.12%)         240         231    -9 (-3.75%)
xdp_synproxy_kern.bpf.linked3.o         syncookie_tc       82848      82661  -187 (-0.23%)        5107        5073   -34 (-0.67%)
xdp_synproxy_kern.bpf.linked3.o         syncookie_xdp      85116      84964  -152 (-0.18%)        5162        5130   -32 (-0.62%)

Note, I avoided renaming jmp_history to more generic insn_hist to
minimize number of lines changed and potential merge conflicts between
bpf and bpf-next trees.

Notice also cur_hist_entry pointer reset to NULL at the beginning of
instruction verification loop. This pointer avoids the problem of
relying on last jump history entry's insn_idx to determine whether we
already have entry for current instruction or not. It can happen that we
added jump history entry because current instruction is_jmp_point(), but
also we need to add instruction flags for stack access. In this case, we
don't want to entries, so we need to reuse last added entry, if it is
present.

Relying on insn_idx comparison has the same ambiguity problem as the one
that was fixed recently in [0], so we avoid that.

  [0] https://patchwork.kernel.org/project/netdevbpf/patch/20231110002638.4168352-3-andrii@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52920/">CVE-2023-52920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52920">CVE-2023-52920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232823">SUSE bug 1232823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52921" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52921" ref_url="https://www.suse.com/security/cve/CVE-2023-52921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix possible UAF in amdgpu_cs_pass1()

Since the gang_size check is outside of chunk parsing
loop, we need to reset i before we free the chunk data.

Suggested by Ye Zhang (@VAR10CK) of Baidu Security.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52921/">CVE-2023-52921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52921">CVE-2023-52921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233452">SUSE bug 1233452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Fix UAF in bcm_proc_show()

BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80
Read of size 8 at addr ffff888155846230 by task cat/7862

CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xd5/0x150
 print_report+0xc1/0x5e0
 kasan_report+0xba/0xf0
 bcm_proc_show+0x969/0xa80
 seq_read_iter+0x4f6/0x1260
 seq_read+0x165/0x210
 proc_reg_read+0x227/0x300
 vfs_read+0x1d5/0x8d0
 ksys_read+0x11e/0x240
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Allocated by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_kmalloc+0x9e/0xa0
 bcm_sendmsg+0x264b/0x44e0
 sock_sendmsg+0xda/0x180
 ____sys_sendmsg+0x735/0x920
 ___sys_sendmsg+0x11d/0x1b0
 __sys_sendmsg+0xfa/0x1d0
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 ____kasan_slab_free+0x161/0x1c0
 slab_free_freelist_hook+0x119/0x220
 __kmem_cache_free+0xb4/0x2e0
 rcu_core+0x809/0x1bd0

bcm_op is freed before procfs entry be removed in bcm_release(),
this lead to bcm_proc_show() may read the freed bcm_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52923" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52923" ref_url="https://www.suse.com/security/cve/CVE-2023-52923" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: adapt set backend to use GC transaction API

Use the GC transaction API to replace the old and buggy gc API and the
busy mark approach.

No set elements are removed from async garbage collection anymore,
instead the _DEAD bit is set on so the set element is not visible from
lookup path anymore. Async GC enqueues transaction work that might be
aborted and retried later.

rbtree and pipapo set backends does not set on the _DEAD bit from the
sync GC path since this runs in control plane path where mutex is held.
In this case, set elements are deactivated, removed and then released
via RCU callback, sync GC never fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52923/">CVE-2023-52923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52923">CVE-2023-52923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236104">SUSE bug 1236104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5345</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.

In case of an error in smb3_fs_context_parse_param, ctx-&gt;password was freed but the field was not set to NULL which could lead to double free.

We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215899">SUSE bug 1215899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215971">SUSE bug 1215971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5633" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
    <description>
    The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216645">SUSE bug 1216645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5972" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5972" ref_url="https://www.suse.com/security/cve/CVE-2023-5972" source="SUSE CVE"/>
    <description>
    A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5972/">CVE-2023-5972 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5972">CVE-2023-5972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217473">SUSE bug 1217473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6111" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6111" ref_url="https://www.suse.com/security/cve/CVE-2023-6111" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times.

We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-15"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6111/">CVE-2023-6111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6111">CVE-2023-6111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217164">SUSE bug 1217164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217522">SUSE bug 1217522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6200" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6200" ref_url="https://www.suse.com/security/cve/CVE-2023-6200" source="SUSE CVE"/>
    <description>
    A race condition was found in the Linux Kernel. Under certain conditions, an unauthenticated attacker from an adjacent network could send an ICMPv6 router advertisement packet, causing arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-30"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6200/">CVE-2023-6200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6200">CVE-2023-6200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219297">SUSE bug 1219297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219298">SUSE bug 1219298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6238" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6238" ref_url="https://www.suse.com/security/cve/CVE-2023-6238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. Only privileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6238/">CVE-2023-6238 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6238">CVE-2023-6238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217384">SUSE bug 1217384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217388">SUSE bug 1217388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218813">SUSE bug 1218813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227675">SUSE bug 1227675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6356</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-03"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218487">SUSE bug 1218487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-28"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222685">SUSE bug 1222685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6560" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6560" ref_url="https://www.suse.com/security/cve/CVE-2023-6560" source="SUSE CVE"/>
    <description>
    An out-of-bounds memory access flaw was found in the io_uring SQ/CQ rings functionality in the Linux kernel. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6560/">CVE-2023-6560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6560">CVE-2023-6560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217867">SUSE bug 1217867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6679" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6679" ref_url="https://www.suse.com/security/cve/CVE-2023-6679" source="SUSE CVE"/>
    <description>
    A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the  Linux kernel. This issue could be exploited to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6679/">CVE-2023-6679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6679">CVE-2023-6679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217944">SUSE bug 1217944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() in drivers/net/wireless/ath/ath10k/wmi-tlv.c in the Linux kernel. This issue could be exploited to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7122" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7122" ref_url="https://www.suse.com/security/cve/CVE-2023-7122" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-10-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-7122/">CVE-2023-7122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7122">CVE-2023-7122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231845">SUSE bug 1231845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0193" ref_url="https://www.suse.com/security/cve/CVE-2024-0193" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-04"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0193/">CVE-2024-0193 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218495">SUSE bug 1218495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218496">SUSE bug 1218496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0443</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0443" ref_url="https://www.suse.com/security/cve/CVE-2024-0443" source="SUSE CVE"/>
    <description>
    A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0443/">CVE-2024-0443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0443">CVE-2024-0443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218767">SUSE bug 1218767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0562" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0562" ref_url="https://www.suse.com/security/cve/CVE-2024-0562" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux Kernel. When a disk is removed, bdi_unregister is called to stop further write-back and waits for associated delayed work to complete. However, wb_inode_writeback_end() may schedule bandwidth estimation work after this has completed, which can result in the timer attempting to access the recently freed bdi_writeback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0562/">CVE-2024-0562 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0562">CVE-2024-0562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228139">SUSE bug 1228139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0564" ref_url="https://www.suse.com/security/cve/CVE-2024-0564" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's memory deduplication mechanism. The max page sharing of Kernel Samepage Merging (KSM), added in Linux kernel version 4.4.0-96.119, can create a side channel. When the attacker and the victim share the same host and the default setting of KSM is "max page sharing=256", it is possible for the attacker to time the unmap to merge with the victim's page. The unmapping time depends on whether it merges with the victim's page and additional physical pages are created beyond the KSM's "max page share". Through these operations, the attacker can leak the victim's page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-23"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0564/">CVE-2024-0564 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0564">CVE-2024-0564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219054">SUSE bug 1219054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219078">SUSE bug 1219078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0582" ref_url="https://www.suse.com/security/cve/CVE-2024-0582" source="SUSE CVE"/>
    <description>
    A memory leak flaw was found in the Linux kernel's io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-17"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0582/">CVE-2024-0582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0582">CVE-2024-0582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218840">SUSE bug 1218840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in tipc_crypto_key_revoke in net/tipc/crypto.c in the Linux kernel's TIPC subsystem. This flaw allows guests with local user privileges to trigger a deadlock and potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0646" ref_url="https://www.suse.com/security/cve/CVE-2024-0646" source="SUSE CVE"/>
    <description>
    An out-of-bounds memory write flaw was found in the Linux kernel's Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0646/">CVE-2024-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218941">SUSE bug 1218941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218942">SUSE bug 1218942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0671" ref_url="https://www.suse.com/security/cve/CVE-2024-0671" source="SUSE CVE"/>
    <description>
    Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Midgard GPU Kernel Driver: from r19p0 through r32p0; Bifrost GPU Kernel Driver: from r7p0 through r48p0; Valhall GPU Kernel Driver: from r19p0 through r48p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r48p0.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0671/">CVE-2024-0671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0671">CVE-2024-0671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223184">SUSE bug 1223184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1065" ref_url="https://www.suse.com/security/cve/CVE-2024-1065" source="SUSE CVE"/>
    <description>
    Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r45p0 through r48p0; Valhall GPU Kernel Driver: from r45p0 through r48p0; Arm 5th Gen GPU Architecture Kernel Driver: from r45p0 through r48p0.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1065/">CVE-2024-1065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1065">CVE-2024-1065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223185">SUSE bug 1223185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.

We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219432">SUSE bug 1219432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1312" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1312" ref_url="https://www.suse.com/security/cve/CVE-2024-1312" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Memory Management subsystem when a user wins two races at the same time with a fail in the mas_prev_slot function. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-07-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1312/">CVE-2024-1312 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1312">CVE-2024-1312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219731">SUSE bug 1219731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228358">SUSE bug 1228358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21806" ref_url="https://www.suse.com/security/cve/CVE-2024-21806" source="SUSE CVE"/>
    <description>
    Improper conditions check in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters E810 Series before version 28.3 may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21806/">CVE-2024-21806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21806">CVE-2024-21806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229206">SUSE bug 1229206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21807" ref_url="https://www.suse.com/security/cve/CVE-2024-21807" source="SUSE CVE"/>
    <description>
    Improper initialization in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21807/">CVE-2024-21807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21807">CVE-2024-21807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229208">SUSE bug 1229208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21810" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21810" ref_url="https://www.suse.com/security/cve/CVE-2024-21810" source="SUSE CVE"/>
    <description>
    Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-08-17"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21810/">CVE-2024-21810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21810">CVE-2024-21810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229209">SUSE bug 1229209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21823" ref_url="https://www.suse.com/security/cve/CVE-2024-21823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-21823/">CVE-2024-21823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21823">CVE-2024-21823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223625">SUSE bug 1223625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22386</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22386" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22386" ref_url="https://www.suse.com/security/cve/CVE-2024-22386" source="SUSE CVE"/>
    <description>
    A race condition was found in the Linux kernel's drm/exynos device driver in exynos_drm_crtc_atomic_disable() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.



    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22386/">CVE-2024-22386 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22386">CVE-2024-22386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219615">SUSE bug 1219615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22705" ref_url="https://www.suse.com/security/cve/CVE-2024-22705" source="SUSE CVE"/>
    <description>
    An issue was discovered in ksmbd in the Linux kernel before 6.6.10. smb2_get_data_area_len in fs/smb/server/smb2misc.c can cause an smb_strndup_from_utf16 out-of-bounds access because the relationship between Name data and CreateContexts data is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22705/">CVE-2024-22705 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22705">CVE-2024-22705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219102">SUSE bug 1219102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23196" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23196" ref_url="https://www.suse.com/security/cve/CVE-2024-23196" source="SUSE CVE"/>
    <description>
    A race condition was found in the Linux kernel's sound/hda  device driver in snd_hdac_regmap_sync() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23196/">CVE-2024-23196 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23196">CVE-2024-23196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219622">SUSE bug 1219622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In btrfs_get_root_ref in fs/btrfs/disk-io.c in the Linux kernel through 6.7.1, there can be an assertion failure and crash because a subvolume can be read out too soon after its root item is inserted upon subvolume creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23981" ref_url="https://www.suse.com/security/cve/CVE-2024-23981" source="SUSE CVE"/>
    <description>
    Wrap-around error in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-09-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23981/">CVE-2024-23981 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23981">CVE-2024-23981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229210">SUSE bug 1229210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24857" ref_url="https://www.suse.com/security/cve/CVE-2024-24857" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's net/bluetooth device driver in conn_info_{min,max}_age_set() function. This can result in integrity overflow issue, possibly leading to bluetooth connection abnormality or denial of service.





    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-24857/">CVE-2024-24857 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24857">CVE-2024-24857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219616">SUSE bug 1219616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24858" ref_url="https://www.suse.com/security/cve/CVE-2024-24858" source="SUSE CVE"/>
    <description>
    A race condition was found in the Linux kernel's net/bluetooth in {conn,adv}_{min,max}_interval_set() function. This can result in I2cap connection or broadcast abnormality issue, possibly leading to denial of service.





    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24858/">CVE-2024-24858 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24858">CVE-2024-24858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219609">SUSE bug 1219609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24859" ref_url="https://www.suse.com/security/cve/CVE-2024-24859" source="SUSE CVE"/>
    <description>
    A race condition was found in the Linux kernel's net/bluetooth in sniff_{min,max}_interval_set() function. This can result in a bluetooth sniffing exception issue, possibly leading denial of service.








    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24859/">CVE-2024-24859 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24859">CVE-2024-24859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219612">SUSE bug 1219612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's bluetooth device driver in {min,max}_key_size_set() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.





    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24986" ref_url="https://www.suse.com/security/cve/CVE-2024-24986" source="SUSE CVE"/>
    <description>
    Improper access control in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-09-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24986/">CVE-2024-24986 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24986">CVE-2024-24986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229211">SUSE bug 1229211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt to allocate zero bytes, and crash, because of a missing check for ubi-&gt;leb_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219834">SUSE bug 1219834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25740" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25740" ref_url="https://www.suse.com/security/cve/CVE-2024-25740" source="SUSE CVE"/>
    <description>
    A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux kernel through 6.7.4 for UBI_IOCATT, because kobj-&gt;name is not released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25740/">CVE-2024-25740 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25740">CVE-2024-25740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219830">SUSE bug 1219830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    printer_write in drivers/usb/gadget/function/f_printer.c in the Linux kernel through 6.7.4 does not properly call usb_ep_queue, which might allow attackers to cause a denial of service or have unspecified other impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219832">SUSE bug 1219832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-05-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25743" ref_url="https://www.suse.com/security/cve/CVE-2024-25743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-05-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-25743/">CVE-2024-25743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25743">CVE-2024-25743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223307">SUSE bug 1223307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2024-09-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220314">SUSE bug 1220314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_rbtree: skip end interval element from gc

rbtree lazy gc on insert might collect an end interval element that has
been just added in this transactions, skip end interval elements that
are not yet active.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220144">SUSE bug 1220144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26582" ref_url="https://www.suse.com/security/cve/CVE-2024-26582" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: fix use-after-free with partial reads and async decrypt

tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-06-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-26582/">CVE-2024-26582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220214">SUSE bug 1220214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226329">SUSE bug 1226329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between async notify and socket close

The submitting thread (one which called recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete()
so any code past that point risks touching already freed data.

Try to avoid the locking and extra flags altogether.
Have the main thread hold an extra reference, this way
we can depend solely on the atomic ref counter for
synchronization.

Don't futz with reiniting the completion, either, we are now
tightly controlling when completion fires.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: handle backlogging of crypto requests

Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our
requests to the crypto API, crypto_aead_{encrypt,decrypt} can return
 -EBUSY instead of -EINPROGRESS in valid situations. For example, when
the cryptd queue for AESNI is full (easy to trigger with an
artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued
to the backlog but still processed. In that case, the async callback
will also be called twice: first with err == -EINPROGRESS, which it
seems we can just ignore, then with err == 0.

Compared to Sabrina's original patch this version uses the new
tls_*crypt_async_wait() helpers and converts the EBUSY to
EINPROGRESS to avoid having to modify all the error handling
paths. The handling is identical.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between tx work scheduling and socket close

Similarly to previous commit, the submitting thread (recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete().
Reorder scheduling the work before calling complete().
This seems more logical in the first place, as it's
the inverse order of what the submitting thread will do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220211">SUSE bug 1220211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix stack corruption

When tc filters are first added to a net device, the corresponding local
port gets bound to an ACL group in the device. The group contains a list
of ACLs. In turn, each ACL points to a different TCAM region where the
filters are stored. During forwarding, the ACLs are sequentially
evaluated until a match is found.

One reason to place filters in different regions is when they are added
with decreasing priorities and in an alternating order so that two
consecutive filters can never fit in the same region because of their
key usage.

In Spectrum-2 and newer ASICs the firmware started to report that the
maximum number of ACLs in a group is more than 16, but the layout of the
register that configures ACL groups (PAGT) was not updated to account
for that. It is therefore possible to hit stack corruption [1] in the
rare case where more than 16 ACLs in a group are required.

Fix by limiting the maximum ACL group size to the minimum between what
the firmware reports and the maximum ACLs that fit in the PAGT register.

Add a test case to make sure the machine does not crash when this
condition is hit.

[1]
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120
[...]
 dump_stack_lvl+0x36/0x50
 panic+0x305/0x330
 __stack_chk_fail+0x15/0x20
 mlxsw_sp_acl_tcam_group_update+0x116/0x120
 mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110
 mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20
 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
 mlxsw_sp_acl_rule_add+0x47/0x240
 mlxsw_sp_flower_replace+0x1a9/0x1d0
 tc_setup_cb_add+0xdc/0x1c0
 fl_hw_replace_filter+0x146/0x1f0
 fl_change+0xc17/0x1360
 tc_new_tfilter+0x472/0xb90
 rtnetlink_rcv_msg+0x313/0x3b0
 netlink_rcv_skb+0x58/0x100
 netlink_unicast+0x244/0x390
 netlink_sendmsg+0x1e4/0x440
 ____sys_sendmsg+0x164/0x260
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xc0
 do_syscall_64+0x40/0xe0
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26587" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26587" ref_url="https://www.suse.com/security/cve/CVE-2024-26587" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netdevsim: don't try to destroy PHC on VFs

PHC gets initialized in nsim_init_netdevsim(), which
is only called if (nsim_dev_port_is_pf()).

Create a counterpart of nsim_init_netdevsim() and
move the mock_phc_destroy() there.

This fixes a crash trying to destroy netdevsim with
VFs instantiated, as caught by running the devlink.sh test:

    BUG: kernel NULL pointer dereference, address: 00000000000000b8
    RIP: 0010:mock_phc_destroy+0xd/0x30
    Call Trace:
     &lt;TASK&gt;
     nsim_destroy+0x4a/0x70 [netdevsim]
     __nsim_dev_port_del+0x47/0x70 [netdevsim]
     nsim_dev_reload_destroy+0x105/0x120 [netdevsim]
     nsim_drv_remove+0x2f/0xb0 [netdevsim]
     device_release_driver_internal+0x1a1/0x210
     bus_remove_device+0xd5/0x120
     device_del+0x159/0x490
     device_unregister+0x12/0x30
     del_device_store+0x11a/0x1a0 [netdevsim]
     kernfs_fop_write_iter+0x130/0x1d0
     vfs_write+0x30b/0x4b0
     ksys_write+0x69/0xf0
     do_syscall_64+0xcc/0x1e0
     entry_SYSCALL_64_after_hwframe+0x6f/0x77
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26587/">CVE-2024-26587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26587">CVE-2024-26587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220246">SUSE bug 1220246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26588" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26588" ref_url="https://www.suse.com/security/cve/CVE-2024-26588" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: BPF: Prevent out-of-bounds memory access

The test_tag test triggers an unhandled page fault:

  # ./test_tag
  [  130.640218] CPU 0 Unable to handle kernel paging request at virtual address ffff80001b898004, era == 9000000003137f7c, ra == 9000000003139e70
  [  130.640501] Oops[#3]:
  [  130.640553] CPU: 0 PID: 1326 Comm: test_tag Tainted: G      D    O       6.7.0-rc4-loong-devel-gb62ab1a397cf #47 61985c1d94084daa2432f771daa45b56b10d8d2a
  [  130.640764] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022
  [  130.640874] pc 9000000003137f7c ra 9000000003139e70 tp 9000000104cb4000 sp 9000000104cb7a40
  [  130.641001] a0 ffff80001b894000 a1 ffff80001b897ff8 a2 000000006ba210be a3 0000000000000000
  [  130.641128] a4 000000006ba210be a5 00000000000000f1 a6 00000000000000b3 a7 0000000000000000
  [  130.641256] t0 0000000000000000 t1 00000000000007f6 t2 0000000000000000 t3 9000000004091b70
  [  130.641387] t4 000000006ba210be t5 0000000000000004 t6 fffffffffffffff0 t7 90000000040913e0
  [  130.641512] t8 0000000000000005 u0 0000000000000dc0 s9 0000000000000009 s0 9000000104cb7ae0
  [  130.641641] s1 00000000000007f6 s2 0000000000000009 s3 0000000000000095 s4 0000000000000000
  [  130.641771] s5 ffff80001b894000 s6 ffff80001b897fb0 s7 9000000004090c50 s8 0000000000000000
  [  130.641900]    ra: 9000000003139e70 build_body+0x1fcc/0x4988
  [  130.642007]   ERA: 9000000003137f7c build_body+0xd8/0x4988
  [  130.642112]  CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
  [  130.642261]  PRMD: 00000004 (PPLV0 +PIE -PWE)
  [  130.642353]  EUEN: 00000003 (+FPE +SXE -ASXE -BTE)
  [  130.642458]  ECFG: 00071c1c (LIE=2-4,10-12 VS=7)
  [  130.642554] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
  [  130.642658]  BADV: ffff80001b898004
  [  130.642719]  PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)
  [  130.642815] Modules linked in: [last unloaded: bpf_testmod(O)]
  [  130.642924] Process test_tag (pid: 1326, threadinfo=00000000f7f4015f, task=000000006499f9fd)
  [  130.643062] Stack : 0000000000000000 9000000003380724 0000000000000000 0000000104cb7be8
  [  130.643213]         0000000000000000 25af8d9b6e600558 9000000106250ea0 9000000104cb7ae0
  [  130.643378]         0000000000000000 0000000000000000 9000000104cb7be8 90000000049f6000
  [  130.643538]         0000000000000090 9000000106250ea0 ffff80001b894000 ffff80001b894000
  [  130.643685]         00007ffffb917790 900000000313ca94 0000000000000000 0000000000000000
  [  130.643831]         ffff80001b894000 0000000000000ff7 0000000000000000 9000000100468000
  [  130.643983]         0000000000000000 0000000000000000 0000000000000040 25af8d9b6e600558
  [  130.644131]         0000000000000bb7 ffff80001b894048 0000000000000000 0000000000000000
  [  130.644276]         9000000104cb7be8 90000000049f6000 0000000000000090 9000000104cb7bdc
  [  130.644423]         ffff80001b894000 0000000000000000 00007ffffb917790 90000000032acfb0
  [  130.644572]         ...
  [  130.644629] Call Trace:
  [  130.644641] [&lt;9000000003137f7c&gt;] build_body+0xd8/0x4988
  [  130.644785] [&lt;900000000313ca94&gt;] bpf_int_jit_compile+0x228/0x4ec
  [  130.644891] [&lt;90000000032acfb0&gt;] bpf_prog_select_runtime+0x158/0x1b0
  [  130.645003] [&lt;90000000032b3504&gt;] bpf_prog_load+0x760/0xb44
  [  130.645089] [&lt;90000000032b6744&gt;] __sys_bpf+0xbb8/0x2588
  [  130.645175] [&lt;90000000032b8388&gt;] sys_bpf+0x20/0x2c
  [  130.645259] [&lt;9000000003f6ab38&gt;] do_syscall+0x7c/0x94
  [  130.645369] [&lt;9000000003121c5c&gt;] handle_syscall+0xbc/0x158
  [  130.645507]
  [  130.645539] Code: 380839f6  380831f9  28412bae &lt;24000ca6&gt; 004081ad  0014cb50  004083e8  02bff34c  58008e91
  [  130.645729]
  [  130.646418] ---[ end trace 0000000000000000 ]---

On my machine, which has CONFIG_PAGE_SIZE_16KB=y, the test failed at
loading a BPF prog with 2039 instructions:

  prog = (struct bpf_prog *)ffff80001b894000
  insn = (struct bpf_insn *)(prog-&gt;insnsi)fff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26588/">CVE-2024-26588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26588">CVE-2024-26588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220236">SUSE bug 1220236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject variable offset alu on PTR_TO_FLOW_KEYS

For PTR_TO_FLOW_KEYS, check_flow_keys_access() only uses fixed off
for validation. However, variable offset ptr alu is not prohibited
for this ptr kind. So the variable offset is not checked.

The following prog is accepted:

  func#0 @0
  0: R1=ctx() R10=fp0
  0: (bf) r6 = r1                       ; R1=ctx() R6_w=ctx()
  1: (79) r7 = *(u64 *)(r6 +144)        ; R6_w=ctx() R7_w=flow_keys()
  2: (b7) r8 = 1024                     ; R8_w=1024
  3: (37) r8 /= 1                       ; R8_w=scalar()
  4: (57) r8 &amp;= 1024                    ; R8_w=scalar(smin=smin32=0,
  smax=umax=smax32=umax32=1024,var_off=(0x0; 0x400))
  5: (0f) r7 += r8
  mark_precise: frame0: last_idx 5 first_idx 0 subseq_idx -1
  mark_precise: frame0: regs=r8 stack= before 4: (57) r8 &amp;= 1024
  mark_precise: frame0: regs=r8 stack= before 3: (37) r8 /= 1
  mark_precise: frame0: regs=r8 stack= before 2: (b7) r8 = 1024
  6: R7_w=flow_keys(smin=smin32=0,smax=umax=smax32=umax32=1024,var_off
  =(0x0; 0x400)) R8_w=scalar(smin=smin32=0,smax=umax=smax32=umax32=1024,
  var_off=(0x0; 0x400))
  6: (79) r0 = *(u64 *)(r7 +0)          ; R0_w=scalar()
  7: (95) exit

This prog loads flow_keys to r7, and adds the variable offset r8
to r7, and finally causes out-of-bounds access:

  BUG: unable to handle page fault for address: ffffc90014c80038
  [...]
  Call Trace:
   &lt;TASK&gt;
   bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline]
   __bpf_prog_run include/linux/filter.h:651 [inline]
   bpf_prog_run include/linux/filter.h:658 [inline]
   bpf_prog_run_pin_on_cpu include/linux/filter.h:675 [inline]
   bpf_flow_dissect+0x15f/0x350 net/core/flow_dissector.c:991
   bpf_prog_test_run_flow_dissector+0x39d/0x620 net/bpf/test_run.c:1359
   bpf_prog_test_run kernel/bpf/syscall.c:4107 [inline]
   __sys_bpf+0xf8f/0x4560 kernel/bpf/syscall.c:5475
   __do_sys_bpf kernel/bpf/syscall.c:5561 [inline]
   __se_sys_bpf kernel/bpf/syscall.c:5559 [inline]
   __x64_sys_bpf+0x73/0xb0 kernel/bpf/syscall.c:5559
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0x3f/0x110 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x63/0x6b

Fix this by rejecting ptr alu with variable offset on flow_keys.
Applying the patch rejects the program with "R7 pointer arithmetic
on flow_keys prohibited".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26590" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26590" ref_url="https://www.suse.com/security/cve/CVE-2024-26590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix inconsistent per-file compression format

EROFS can select compression algorithms on a per-file basis, and each
per-file compression algorithm needs to be marked in the on-disk
superblock for initialization.

However, syzkaller can generate inconsistent crafted images that use
an unsupported algorithmtype for specific inodes, e.g. use MicroLZMA
algorithmtype even it's not set in `sbi-&gt;available_compr_algs`.  This
can lead to an unexpected "BUG: kernel NULL pointer dereference" if
the corresponding decompressor isn't built-in.

Fix this by checking against `sbi-&gt;available_compr_algs` for each
m_algorithmformat request.  Incorrect !erofs_sb_has_compr_cfgs preset
bitmap is now fixed together since it was harmless previously.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26590/">CVE-2024-26590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26590">CVE-2024-26590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220252">SUSE bug 1220252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix re-attachment branch in bpf_tracing_prog_attach

The following case can cause a crash due to missing attach_btf:

1) load rawtp program
2) load fentry program with rawtp as target_fd
3) create tracing link for fentry program with target_fd = 0
4) repeat 3

In the end we have:

- prog-&gt;aux-&gt;dst_trampoline == NULL
- tgt_prog == NULL (because we did not provide target_fd to link_create)
- prog-&gt;aux-&gt;attach_btf == NULL (the program was loaded with attach_prog_fd=X)
- the program was loaded for tgt_prog but we have no way to find out which one

    BUG: kernel NULL pointer dereference, address: 0000000000000058
    Call Trace:
     &lt;TASK&gt;
     ? __die+0x20/0x70
     ? page_fault_oops+0x15b/0x430
     ? fixup_exception+0x22/0x330
     ? exc_page_fault+0x6f/0x170
     ? asm_exc_page_fault+0x22/0x30
     ? bpf_tracing_prog_attach+0x279/0x560
     ? btf_obj_id+0x5/0x10
     bpf_tracing_prog_attach+0x439/0x560
     __sys_bpf+0x1cf4/0x2de0
     __x64_sys_bpf+0x1c/0x30
     do_syscall_64+0x41/0xf0
     entry_SYSCALL_64_after_hwframe+0x6e/0x76

Return -EINVAL in this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26592" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26592" ref_url="https://www.suse.com/security/cve/CVE-2024-26592" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix UAF issue in ksmbd_tcp_new_connection()

The race is between the handling of a new TCP connection and
its disconnection. It leads to UAF on `struct tcp_transport` in
ksmbd_tcp_new_connection() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-26592/">CVE-2024-26592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26592">CVE-2024-26592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220256">SUSE bug 1220256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: i801: Fix block process call transactions

According to the Intel datasheets, software must reset the block
buffer index twice for block process call transactions: once before
writing the outgoing data to the buffer, and once again before
reading the incoming data from the buffer.

The driver is currently missing the second reset, causing the wrong
portion of the block buffer to be read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-24"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26594" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26594" ref_url="https://www.suse.com/security/cve/CVE-2024-26594" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate mech token in session setup

If client send invalid mech token in session setup request, ksmbd
validate and make the error if it is invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-08-29"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26594/">CVE-2024-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26594">CVE-2024-26594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220327">SUSE bug 1220327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26596" ref_url="https://www.suse.com/security/cve/CVE-2024-26596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: fix netdev_priv() dereference before check on non-DSA netdevice events

After the blamed commit, we started doing this dereference for every
NETDEV_CHANGEUPPER and NETDEV_PRECHANGEUPPER event in the system.

static inline struct dsa_port *dsa_user_to_port(const struct net_device *dev)
{
	struct dsa_user_priv *p = netdev_priv(dev);

	return p-&gt;dp;
}

Which is obviously bogus, because not all net_devices have a netdev_priv()
of type struct dsa_user_priv. But struct dsa_user_priv is fairly small,
and p-&gt;dp means dereferencing 8 bytes starting with offset 16. Most
drivers allocate that much private memory anyway, making our access not
fault, and we discard the bogus data quickly afterwards, so this wasn't
caught.

But the dummy interface is somewhat special in that it calls
alloc_netdev() with a priv size of 0. So every netdev_priv() dereference
is invalid, and we get this when we emit a NETDEV_PRECHANGEUPPER event
with a VLAN as its new upper:

$ ip link add dummy1 type dummy
$ ip link add link dummy1 name dummy1.100 type vlan id 100
[   43.309174] ==================================================================
[   43.316456] BUG: KASAN: slab-out-of-bounds in dsa_user_prechangeupper+0x30/0xe8
[   43.323835] Read of size 8 at addr ffff3f86481d2990 by task ip/374
[   43.330058]
[   43.342436] Call trace:
[   43.366542]  dsa_user_prechangeupper+0x30/0xe8
[   43.371024]  dsa_user_netdevice_event+0xb38/0xee8
[   43.375768]  notifier_call_chain+0xa4/0x210
[   43.379985]  raw_notifier_call_chain+0x24/0x38
[   43.384464]  __netdev_upper_dev_link+0x3ec/0x5d8
[   43.389120]  netdev_upper_dev_link+0x70/0xa8
[   43.393424]  register_vlan_dev+0x1bc/0x310
[   43.397554]  vlan_newlink+0x210/0x248
[   43.401247]  rtnl_newlink+0x9fc/0xe30
[   43.404942]  rtnetlink_rcv_msg+0x378/0x580

Avoid the kernel oops by dereferencing after the type check, as customary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26596/">CVE-2024-26596 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26596">CVE-2024-26596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220355">SUSE bug 1220355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qualcomm: rmnet: fix global oob in rmnet_policy

The variable rmnet_link_ops assign a *bigger* maxtype which leads to a
global out-of-bounds read when parsing the netlink attributes. See bug
trace below:

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:386 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600
Read of size 1 at addr ffffffff92c438d0 by task syz-executor.6/84207

CPU: 0 PID: 84207 Comm: syz-executor.6 Tainted: G                 N 6.1.0 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x8b/0xb3 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x172/0x475 mm/kasan/report.c:395
 kasan_report+0xbb/0x1c0 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:386 [inline]
 __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600
 __nla_parse+0x3e/0x50 lib/nlattr.c:697
 nla_parse_nested_deprecated include/net/netlink.h:1248 [inline]
 __rtnl_newlink+0x50a/0x1880 net/core/rtnetlink.c:3485
 rtnl_newlink+0x64/0xa0 net/core/rtnetlink.c:3594
 rtnetlink_rcv_msg+0x43c/0xd70 net/core/rtnetlink.c:6091
 netlink_rcv_skb+0x14f/0x410 net/netlink/af_netlink.c:2540
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x54e/0x800 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x930/0xe50 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0x154/0x190 net/socket.c:734
 ____sys_sendmsg+0x6df/0x840 net/socket.c:2482
 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536
 __sys_sendmsg+0xf3/0x1c0 net/socket.c:2565
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fdcf2072359
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fdcf13e3168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007fdcf219ff80 RCX: 00007fdcf2072359
RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000003
RBP: 00007fdcf20bd493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fffbb8d7bdf R14: 00007fdcf13e3300 R15: 0000000000022000
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 rmnet_policy+0x30/0xe0

The buggy address belongs to the physical page:
page:0000000065bdeb3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x155243
flags: 0x200000000001000(reserved|node=0|zone=2)
raw: 0200000000001000 ffffea00055490c8 ffffea00055490c8 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffffffff92c43780: f9 f9 f9 f9 00 00 00 02 f9 f9 f9 f9 00 00 00 07
 ffffffff92c43800: f9 f9 f9 f9 00 00 00 05 f9 f9 f9 f9 06 f9 f9 f9
&gt;ffffffff92c43880: f9 f9 f9 f9 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9
                                                 ^
 ffffffff92c43900: 00 00 00 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 f9
 ffffffff92c43980: 00 00 00 07 f9 f9 f9 f9 00 00 00 05 f9 f9 f9 f9

According to the comment of `nla_parse_nested_deprecated`, the maxtype
should be len(destination array) - 1. Hence use `IFLA_RMNET_MAX` here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220363">SUSE bug 1220363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache

There is a potential UAF scenario in the case of an LPI translation
cache hit racing with an operation that invalidates the cache, such
as a DISCARD ITS command. The root of the problem is that
vgic_its_check_cache() does not elevate the refcount on the vgic_irq
before dropping the lock that serializes refcount changes.

Have vgic_its_check_cache() raise the refcount on the returned vgic_irq
and add the corresponding decrement after queueing the interrupt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221129">SUSE bug 1221129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pwm: Fix out-of-bounds access in of_pwm_single_xlate()

With args-&gt;args_count == 2 args-&gt;args[2] is not defined. Actually the
flags are contained in args-&gt;args[1].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220365">SUSE bug 1220365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: regenerate buddy after block freeing failed if under fc replay

This mostly reverts commit 6bd97bf273bd ("ext4: remove redundant
mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy(). Based on
code in mb_free_blocks(), fast commit replay can end up marking as free
blocks that are already marked as such. This causes corruption of the
buddy bitmap so we need to regenerate it in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/membarrier: reduce the ability to hammer on sys_membarrier

On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything.  So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Stop relying on userspace for info to fault in xsave buffer

Before this change, the expected size of the user space buffer was
taken from fx_sw-&gt;xstate_size. fx_sw-&gt;xstate_size can be changed
from user-space, so it is possible construct a sigreturn frame where:

 * fx_sw-&gt;xstate_size is smaller than the size required by valid bits in
   fx_sw-&gt;xfeatures.
 * user-space unmaps parts of the sigrame fpu buffer so that not all of
   the buffer required by xrstor is accessible.

In this case, xrstor tries to restore and accesses the unmapped area
which results in a fault. But fault_in_readable succeeds because buf +
fx_sw-&gt;xstate_size is within the still mapped area, so it goes back and
tries xrstor again. It will spin in this loop forever.

Instead, fault in the maximum size which can be touched by XRSTOR (taken
from fpstate-&gt;user_size).

[ dhansen: tweak subject / changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26604" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26604" ref_url="https://www.suse.com/security/cve/CVE-2024-26604" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "kobject: Remove redundant checks for whether ktype is NULL"

This reverts commit 1b28cb81dab7c1eedc6034206f4e8d644046ad31.

It is reported to cause problems, so revert it for now until the root
cause can be found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26604/">CVE-2024-26604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26604">CVE-2024-26604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220449">SUSE bug 1220449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26605" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26605" ref_url="https://www.suse.com/security/cve/CVE-2024-26605" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/ASPM: Fix deadlock when enabling ASPM

A last minute revert in 6.7-final introduced a potential deadlock when
enabling ASPM during probe of Qualcomm PCIe controllers as reported by
lockdep:

  ============================================
  WARNING: possible recursive locking detected
  6.7.0 #40 Not tainted
  --------------------------------------------
  kworker/u16:5/90 is trying to acquire lock:
  ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pcie_aspm_pm_state_change+0x58/0xdc

              but task is already holding lock:
  ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pci_walk_bus+0x34/0xbc

              other info that might help us debug this:
   Possible unsafe locking scenario:

         CPU0
         ----
    lock(pci_bus_sem);
    lock(pci_bus_sem);

               *** DEADLOCK ***

  Call trace:
   print_deadlock_bug+0x25c/0x348
   __lock_acquire+0x10a4/0x2064
   lock_acquire+0x1e8/0x318
   down_read+0x60/0x184
   pcie_aspm_pm_state_change+0x58/0xdc
   pci_set_full_power_state+0xa8/0x114
   pci_set_power_state+0xc4/0x120
   qcom_pcie_enable_aspm+0x1c/0x3c [pcie_qcom]
   pci_walk_bus+0x64/0xbc
   qcom_pcie_host_post_init_2_7_0+0x28/0x34 [pcie_qcom]

The deadlock can easily be reproduced on machines like the Lenovo ThinkPad
X13s by adding a delay to increase the race window during asynchronous
probe where another thread can take a write lock.

Add a new pci_set_power_state_locked() and associated helper functions that
can be called with the PCI bus semaphore held to avoid taking the read lock
twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26605/">CVE-2024-26605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26605">CVE-2024-26605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220336">SUSE bug 1220336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26606" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26606" ref_url="https://www.suse.com/security/cve/CVE-2024-26606" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: signal epoll threads of self-work

In (e)poll mode, threads often depend on I/O events to determine when
data is ready for consumption. Within binder, a thread may initiate a
command via BINDER_WRITE_READ without a read buffer and then make use
of epoll_wait() or similar to consume any responses afterwards.

It is then crucial that epoll threads are signaled via wakeup when they
queue their own work. Otherwise, they risk waiting indefinitely for an
event leaving their work unhandled. What is worse, subsequent commands
won't trigger a wakeup either as the thread has pending work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26606/">CVE-2024-26606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26606">CVE-2024-26606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220450">SUSE bug 1220450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: sii902x: Fix probing race issue

A null pointer dereference crash has been observed rarely on TI
platforms using sii9022 bridge:

[   53.271356]  sii902x_get_edid+0x34/0x70 [sii902x]
[   53.276066]  sii902x_bridge_get_edid+0x14/0x20 [sii902x]
[   53.281381]  drm_bridge_get_edid+0x20/0x34 [drm]
[   53.286305]  drm_bridge_connector_get_modes+0x8c/0xcc [drm_kms_helper]
[   53.292955]  drm_helper_probe_single_connector_modes+0x190/0x538 [drm_kms_helper]
[   53.300510]  drm_client_modeset_probe+0x1f0/0xbd4 [drm]
[   53.305958]  __drm_fb_helper_initial_config_and_unlock+0x50/0x510 [drm_kms_helper]
[   53.313611]  drm_fb_helper_initial_config+0x48/0x58 [drm_kms_helper]
[   53.320039]  drm_fbdev_dma_client_hotplug+0x84/0xd4 [drm_dma_helper]
[   53.326401]  drm_client_register+0x5c/0xa0 [drm]
[   53.331216]  drm_fbdev_dma_setup+0xc8/0x13c [drm_dma_helper]
[   53.336881]  tidss_probe+0x128/0x264 [tidss]
[   53.341174]  platform_probe+0x68/0xc4
[   53.344841]  really_probe+0x188/0x3c4
[   53.348501]  __driver_probe_device+0x7c/0x16c
[   53.352854]  driver_probe_device+0x3c/0x10c
[   53.357033]  __device_attach_driver+0xbc/0x158
[   53.361472]  bus_for_each_drv+0x88/0xe8
[   53.365303]  __device_attach+0xa0/0x1b4
[   53.369135]  device_initial_probe+0x14/0x20
[   53.373314]  bus_probe_device+0xb0/0xb4
[   53.377145]  deferred_probe_work_func+0xcc/0x124
[   53.381757]  process_one_work+0x1f0/0x518
[   53.385770]  worker_thread+0x1e8/0x3dc
[   53.389519]  kthread+0x11c/0x120
[   53.392750]  ret_from_fork+0x10/0x20

The issue here is as follows:

- tidss probes, but is deferred as sii902x is still missing.
- sii902x starts probing and enters sii902x_init().
- sii902x calls drm_bridge_add(). Now the sii902x bridge is ready from
  DRM's perspective.
- sii902x calls sii902x_audio_codec_init() and
  platform_device_register_data()
- The registration of the audio platform device causes probing of the
  deferred devices.
- tidss probes, which eventually causes sii902x_bridge_get_edid() to be
  called.
- sii902x_bridge_get_edid() tries to use the i2c to read the edid.
  However, the sii902x driver has not set up the i2c part yet, leading
  to the crash.

Fix this by moving the drm_bridge_add() to the end of the
sii902x_init(), which is also at the very end of sii902x_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26608" ref_url="https://www.suse.com/security/cve/CVE-2024-26608" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix global oob in ksmbd_nl_policy

Similar to a reported issue (check the commit b33fb5b801c6 ("net:
qualcomm: rmnet: fix global oob in rmnet_policy"), my local fuzzer finds
another global out-of-bounds read for policy ksmbd_nl_policy. See bug
trace below:

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:386 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600
Read of size 1 at addr ffffffff8f24b100 by task syz-executor.1/62810

CPU: 0 PID: 62810 Comm: syz-executor.1 Tainted: G                 N 6.1.0 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x8b/0xb3 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x172/0x475 mm/kasan/report.c:395
 kasan_report+0xbb/0x1c0 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:386 [inline]
 __nla_validate_parse+0x24af/0x2750 lib/nlattr.c:600
 __nla_parse+0x3e/0x50 lib/nlattr.c:697
 __nlmsg_parse include/net/netlink.h:748 [inline]
 genl_family_rcv_msg_attrs_parse.constprop.0+0x1b0/0x290 net/netlink/genetlink.c:565
 genl_family_rcv_msg_doit+0xda/0x330 net/netlink/genetlink.c:734
 genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]
 genl_rcv_msg+0x441/0x780 net/netlink/genetlink.c:850
 netlink_rcv_skb+0x14f/0x410 net/netlink/af_netlink.c:2540
 genl_rcv+0x24/0x40 net/netlink/genetlink.c:861
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0x54e/0x800 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x930/0xe50 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg+0x154/0x190 net/socket.c:734
 ____sys_sendmsg+0x6df/0x840 net/socket.c:2482
 ___sys_sendmsg+0x110/0x1b0 net/socket.c:2536
 __sys_sendmsg+0xf3/0x1c0 net/socket.c:2565
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fdd66a8f359
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fdd65e00168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007fdd66bbcf80 RCX: 00007fdd66a8f359
RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000003
RBP: 00007fdd66ada493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc84b81aff R14: 00007fdd65e00300 R15: 0000000000022000
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 ksmbd_nl_policy+0x100/0xa80

The buggy address belongs to the physical page:
page:0000000034f47940 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1ccc4b
flags: 0x200000000001000(reserved|node=0|zone=2)
raw: 0200000000001000 ffffea00073312c8 ffffea00073312c8 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffffffff8f24b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffffffff8f24b080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
&gt;ffffffff8f24b100: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 07 f9
                   ^
 ffffffff8f24b180: f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9 00 00 00 05
 ffffffff8f24b200: f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9 00 00 04 f9
==================================================================

To fix it, add a placeholder named __KSMBD_EVENT_MAX and let
KSMBD_EVENT_MAX to be its original value - 1 according to what other
netlink families do. Also change two sites that refer the
KSMBD_EVENT_MAX to correct value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26608/">CVE-2024-26608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26608">CVE-2024-26608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221285">SUSE bug 1221285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26609" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26609" ref_url="https://www.suse.com/security/cve/CVE-2024-26609" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26609/">CVE-2024-26609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26609">CVE-2024-26609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221290">SUSE bug 1221290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix a memory corruption

iwl_fw_ini_trigger_tlv::data is a pointer to a __le32, which means that
if we copy to iwl_fw_ini_trigger_tlv::data + offset while offset is in
bytes, we'll write past the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221302">SUSE bug 1221302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26611" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26611" ref_url="https://www.suse.com/security/cve/CVE-2024-26611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: fix usage of multi-buffer BPF helpers for ZC XDP

Currently when packet is shrunk via bpf_xdp_adjust_tail() and memory
type is set to MEM_TYPE_XSK_BUFF_POOL, null ptr dereference happens:

[1136314.192256] BUG: kernel NULL pointer dereference, address:
0000000000000034
[1136314.203943] #PF: supervisor read access in kernel mode
[1136314.213768] #PF: error_code(0x0000) - not-present page
[1136314.223550] PGD 0 P4D 0
[1136314.230684] Oops: 0000 [#1] PREEMPT SMP NOPTI
[1136314.239621] CPU: 8 PID: 54203 Comm: xdpsock Not tainted 6.6.0+ #257
[1136314.250469] Hardware name: Intel Corporation S2600WFT/S2600WFT,
BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[1136314.265615] RIP: 0010:__xdp_return+0x6c/0x210
[1136314.274653] Code: ad 00 48 8b 47 08 49 89 f8 a8 01 0f 85 9b 01 00 00 0f 1f 44 00 00 f0 41 ff 48 34 75 32 4c 89 c7 e9 79 cd 80 ff 83 fe 03 75 17 &lt;f6&gt; 41 34 01 0f 85 02 01 00 00 48 89 cf e9 22 cc 1e 00 e9 3d d2 86
[1136314.302907] RSP: 0018:ffffc900089f8db0 EFLAGS: 00010246
[1136314.312967] RAX: ffffc9003168aed0 RBX: ffff8881c3300000 RCX:
0000000000000000
[1136314.324953] RDX: 0000000000000000 RSI: 0000000000000003 RDI:
ffffc9003168c000
[1136314.336929] RBP: 0000000000000ae0 R08: 0000000000000002 R09:
0000000000010000
[1136314.348844] R10: ffffc9000e495000 R11: 0000000000000040 R12:
0000000000000001
[1136314.360706] R13: 0000000000000524 R14: ffffc9003168aec0 R15:
0000000000000001
[1136314.373298] FS:  00007f8df8bbcb80(0000) GS:ffff8897e0e00000(0000)
knlGS:0000000000000000
[1136314.386105] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1136314.396532] CR2: 0000000000000034 CR3: 00000001aa912002 CR4:
00000000007706f0
[1136314.408377] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[1136314.420173] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[1136314.431890] PKRU: 55555554
[1136314.439143] Call Trace:
[1136314.446058]  &lt;IRQ&gt;
[1136314.452465]  ? __die+0x20/0x70
[1136314.459881]  ? page_fault_oops+0x15b/0x440
[1136314.468305]  ? exc_page_fault+0x6a/0x150
[1136314.476491]  ? asm_exc_page_fault+0x22/0x30
[1136314.484927]  ? __xdp_return+0x6c/0x210
[1136314.492863]  bpf_xdp_adjust_tail+0x155/0x1d0
[1136314.501269]  bpf_prog_ccc47ae29d3b6570_xdp_sock_prog+0x15/0x60
[1136314.511263]  ice_clean_rx_irq_zc+0x206/0xc60 [ice]
[1136314.520222]  ? ice_xmit_zc+0x6e/0x150 [ice]
[1136314.528506]  ice_napi_poll+0x467/0x670 [ice]
[1136314.536858]  ? ttwu_do_activate.constprop.0+0x8f/0x1a0
[1136314.546010]  __napi_poll+0x29/0x1b0
[1136314.553462]  net_rx_action+0x133/0x270
[1136314.561619]  __do_softirq+0xbe/0x28e
[1136314.569303]  do_softirq+0x3f/0x60

This comes from __xdp_return() call with xdp_buff argument passed as
NULL which is supposed to be consumed by xsk_buff_free() call.

To address this properly, in ZC case, a node that represents the frag
being removed has to be pulled out of xskb_list. Introduce
appropriate xsk helpers to do such node operation and use them
accordingly within bpf_xdp_adjust_tail().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26611/">CVE-2024-26611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26611">CVE-2024-26611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221303">SUSE bug 1221303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs, fscache: Prevent Oops in fscache_put_cache()

This function dereferences "cache" and then checks if it's
IS_ERR_OR_NULL().  Check first, then dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221291">SUSE bug 1221291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26613" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26613" ref_url="https://www.suse.com/security/cve/CVE-2024-26613" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26613/">CVE-2024-26613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26613">CVE-2024-26613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221292">SUSE bug 1221292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: make sure init the accept_queue's spinlocks once

When I run syz's reproduction C program locally, it causes the following
issue:
pvqspinlock: lock 0xffff9d181cd5c660 has corrupted value 0x0!
WARNING: CPU: 19 PID: 21160 at __pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
RIP: 0010:__pv_queued_spin_unlock_slowpath (kernel/locking/qspinlock_paravirt.h:508)
Code: 73 56 3a ff 90 c3 cc cc cc cc 8b 05 bb 1f 48 01 85 c0 74 05 c3 cc cc cc cc 8b 17 48 89 fe 48 c7 c7
30 20 ce 8f e8 ad 56 42 ff &lt;0f&gt; 0b c3 cc cc cc cc 0f 0b 0f 1f 40 00 90 90 90 90 90 90 90 90 90
RSP: 0018:ffffa8d200604cb8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9d1ef60e0908
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffff9d1ef60e0900
RBP: ffff9d181cd5c280 R08: 0000000000000000 R09: 00000000ffff7fff
R10: ffffa8d200604b68 R11: ffffffff907dcdc8 R12: 0000000000000000
R13: ffff9d181cd5c660 R14: ffff9d1813a3f330 R15: 0000000000001000
FS:  00007fa110184640(0000) GS:ffff9d1ef60c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 000000011f65e000 CR4: 00000000000006f0
Call Trace:
&lt;IRQ&gt;
  _raw_spin_unlock (kernel/locking/spinlock.c:186)
  inet_csk_reqsk_queue_add (net/ipv4/inet_connection_sock.c:1321)
  inet_csk_complete_hashdance (net/ipv4/inet_connection_sock.c:1358)
  tcp_check_req (net/ipv4/tcp_minisocks.c:868)
  tcp_v4_rcv (net/ipv4/tcp_ipv4.c:2260)
  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:205)
  ip_local_deliver_finish (net/ipv4/ip_input.c:234)
  __netif_receive_skb_one_core (net/core/dev.c:5529)
  process_backlog (./include/linux/rcupdate.h:779)
  __napi_poll (net/core/dev.c:6533)
  net_rx_action (net/core/dev.c:6604)
  __do_softirq (./arch/x86/include/asm/jump_label.h:27)
  do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)
&lt;/IRQ&gt;
&lt;TASK&gt;
  __local_bh_enable_ip (kernel/softirq.c:381)
  __dev_queue_xmit (net/core/dev.c:4374)
  ip_finish_output2 (./include/net/neighbour.h:540 net/ipv4/ip_output.c:235)
  __ip_queue_xmit (net/ipv4/ip_output.c:535)
  __tcp_transmit_skb (net/ipv4/tcp_output.c:1462)
  tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6469)
  tcp_rcv_state_process (net/ipv4/tcp_input.c:6657)
  tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1929)
  __release_sock (./include/net/sock.h:1121 net/core/sock.c:2968)
  release_sock (net/core/sock.c:3536)
  inet_wait_for_connect (net/ipv4/af_inet.c:609)
  __inet_stream_connect (net/ipv4/af_inet.c:702)
  inet_stream_connect (net/ipv4/af_inet.c:748)
  __sys_connect (./include/linux/file.h:45 net/socket.c:2064)
  __x64_sys_connect (net/socket.c:2073 net/socket.c:2070 net/socket.c:2070)
  do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:82)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
  RIP: 0033:0x7fa10ff05a3d
  Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89
  c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d ab a3 0e 00 f7 d8 64 89 01 48
  RSP: 002b:00007fa110183de8 EFLAGS: 00000202 ORIG_RAX: 000000000000002a
  RAX: ffffffffffffffda RBX: 0000000020000054 RCX: 00007fa10ff05a3d
  RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003
  RBP: 00007fa110183e20 R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000202 R12: 00007fa110184640
  R13: 0000000000000000 R14: 00007fa10fe8b060 R15: 00007fff73e23b20
&lt;/TASK&gt;

The issue triggering process is analyzed as follows:
Thread A                                       Thread B
tcp_v4_rcv	//receive ack TCP packet       inet_shutdown
  tcp_check_req                                  tcp_disconnect //disconnect sock
  ...                                              tcp_set_state(sk, TCP_CLOSE)
    inet_csk_complete_hashdance                ...
      inet_csk_reqsk_queue_add         
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix illegal rmb_desc access in SMC-D connection dump

A crash was found when dumping SMC-D connections. It can be reproduced
by following steps:

- run nginx/wrk test:
  smc_run nginx
  smc_run wrk -t 16 -c 1000 -d &lt;duration&gt; -H 'Connection: Close' &lt;URL&gt;

- continuously dump SMC-D connections in parallel:
  watch -n 1 'smcss -D'

 BUG: kernel NULL pointer dereference, address: 0000000000000030
 CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G	E      6.7.0+ #55
 RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x24/0x70
  ? page_fault_oops+0x66/0x150
  ? exc_page_fault+0x69/0x140
  ? asm_exc_page_fault+0x26/0x30
  ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
  ? __kmalloc_node_track_caller+0x35d/0x430
  ? __alloc_skb+0x77/0x170
  smc_diag_dump_proto+0xd0/0xf0 [smc_diag]
  smc_diag_dump+0x26/0x60 [smc_diag]
  netlink_dump+0x19f/0x320
  __netlink_dump_start+0x1dc/0x300
  smc_diag_handler_dump+0x6a/0x80 [smc_diag]
  ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]
  sock_diag_rcv_msg+0x121/0x140
  ? __pfx_sock_diag_rcv_msg+0x10/0x10
  netlink_rcv_skb+0x5a/0x110
  sock_diag_rcv+0x28/0x40
  netlink_unicast+0x22a/0x330
  netlink_sendmsg+0x1f8/0x420
  __sock_sendmsg+0xb0/0xc0
  ____sys_sendmsg+0x24e/0x300
  ? copy_msghdr_from_user+0x62/0x80
  ___sys_sendmsg+0x7c/0xd0
  ? __do_fault+0x34/0x160
  ? do_read_fault+0x5f/0x100
  ? do_fault+0xb0/0x110
  ? __handle_mm_fault+0x2b0/0x6c0
  __sys_sendmsg+0x4d/0x80
  do_syscall_64+0x69/0x180
  entry_SYSCALL_64_after_hwframe+0x6e/0x76

It is possible that the connection is in process of being established
when we dump it. Assumed that the connection has been registered in a
link group by smc_conn_create() but the rmb_desc has not yet been
initialized by smc_buf_create(), thus causing the illegal access to
conn-&gt;rmb_desc. So fix it by checking before dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220942">SUSE bug 1220942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26616" ref_url="https://www.suse.com/security/cve/CVE-2024-26616" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: scrub: avoid use-after-free when chunk length is not 64K aligned

[BUG]
There is a bug report that, on a ext4-converted btrfs, scrub leads to
various problems, including:

- "unable to find chunk map" errors
  BTRFS info (device vdb): scrub: started on devid 1
  BTRFS critical (device vdb): unable to find chunk map for logical 2214744064 length 4096
  BTRFS critical (device vdb): unable to find chunk map for logical 2214744064 length 45056

  This would lead to unrepariable errors.

- Use-after-free KASAN reports:
  ==================================================================
  BUG: KASAN: slab-use-after-free in __blk_rq_map_sg+0x18f/0x7c0
  Read of size 8 at addr ffff8881013c9040 by task btrfs/909
  CPU: 0 PID: 909 Comm: btrfs Not tainted 6.7.0-x64v3-dbg #11 c50636e9419a8354555555245df535e380563b2b
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 2023.11-2 12/24/2023
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x43/0x60
   print_report+0xcf/0x640
   kasan_report+0xa6/0xd0
   __blk_rq_map_sg+0x18f/0x7c0
   virtblk_prep_rq.isra.0+0x215/0x6a0 [virtio_blk 19a65eeee9ae6fcf02edfad39bb9ddee07dcdaff]
   virtio_queue_rqs+0xc4/0x310 [virtio_blk 19a65eeee9ae6fcf02edfad39bb9ddee07dcdaff]
   blk_mq_flush_plug_list.part.0+0x780/0x860
   __blk_flush_plug+0x1ba/0x220
   blk_finish_plug+0x3b/0x60
   submit_initial_group_read+0x10a/0x290 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   flush_scrub_stripes+0x38e/0x430 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   scrub_stripe+0x82a/0xae0 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   scrub_chunk+0x178/0x200 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   scrub_enumerate_chunks+0x4bc/0xa30 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   btrfs_scrub_dev+0x398/0x810 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   btrfs_ioctl+0x4b9/0x3020 [btrfs e57987a360bed82fe8756dcd3e0de5406ccfe965]
   __x64_sys_ioctl+0xbd/0x100
   do_syscall_64+0x5d/0xe0
   entry_SYSCALL_64_after_hwframe+0x63/0x6b
  RIP: 0033:0x7f47e5e0952b

- Crash, mostly due to above use-after-free

[CAUSE]
The converted fs has the following data chunk layout:

    item 2 key (FIRST_CHUNK_TREE CHUNK_ITEM 2214658048) itemoff 16025 itemsize 80
        length 86016 owner 2 stripe_len 65536 type DATA|single

For above logical bytenr 2214744064, it's at the chunk end
(2214658048 + 86016 = 2214744064).

This means btrfs_submit_bio() would split the bio, and trigger endio
function for both of the two halves.

However scrub_submit_initial_read() would only expect the endio function
to be called once, not any more.
This means the first endio function would already free the bbio::bio,
leaving the bvec freed, thus the 2nd endio call would lead to
use-after-free.

[FIX]
- Make sure scrub_read_endio() only updates bits in its range
  Since we may read less than 64K at the end of the chunk, we should not
  touch the bits beyond chunk boundary.

- Make sure scrub_submit_initial_read() only to read the chunk range
  This is done by calculating the real number of sectors we need to
  read, and add sector-by-sector to the bio.

Thankfully the scrub read repair path won't need extra fixes:

- scrub_stripe_submit_repair_read()
  With above fixes, we won't update error bit for range beyond chunk,
  thus scrub_stripe_submit_repair_read() should never submit any read
  beyond the chunk.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26616/">CVE-2024-26616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26616">CVE-2024-26616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220943">SUSE bug 1220943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26617" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26617" ref_url="https://www.suse.com/security/cve/CVE-2024-26617" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc/task_mmu: move mmu notification mechanism inside mm lock

Move mmu notification mechanism inside mm lock to prevent race condition
in other components which depend on it.  The notifier will invalidate
memory range.  Depending upon the number of iterations, different memory
ranges would be invalidated.

The following warning would be removed by this patch:
WARNING: CPU: 0 PID: 5067 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:734 kvm_mmu_notifier_change_pte+0x860/0x960 arch/x86/kvm/../../../virt/kvm/kvm_main.c:734

There is no behavioural and performance change with this patch when
there is no component registered with the mmu notifier.

[akpm@linux-foundation.org: narrow the scope of `range', per Sean]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26617/">CVE-2024-26617 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26617">CVE-2024-26617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221294">SUSE bug 1221294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26618" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26618" ref_url="https://www.suse.com/security/cve/CVE-2024-26618" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/sme: Always exit sme_alloc() early with existing storage

When sme_alloc() is called with existing storage and we are not flushing we
will always allocate new storage, both leaking the existing storage and
corrupting the state. Fix this by separating the checks for flushing and
for existing storage as we do for SVE.

Callers that reallocate (eg, due to changing the vector length) should
call sme_free() themselves.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26618/">CVE-2024-26618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26618">CVE-2024-26618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221295">SUSE bug 1221295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26619" ref_url="https://www.suse.com/security/cve/CVE-2024-26619" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Fix module loading free order

Reverse order of kfree calls to resolve use-after-free error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26619/">CVE-2024-26619 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26619">CVE-2024-26619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221296">SUSE bug 1221296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26620" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/vfio-ap: always filter entire AP matrix

The vfio_ap_mdev_filter_matrix function is called whenever a new adapter or
domain is assigned to the mdev. The purpose of the function is to update
the guest's AP configuration by filtering the matrix of adapters and
domains assigned to the mdev. When an adapter or domain is assigned, only
the APQNs associated with the APID of the new adapter or APQI of the new
domain are inspected. If an APQN does not reference a queue device bound to
the vfio_ap device driver, then it's APID will be filtered from the mdev's
matrix when updating the guest's AP configuration.

Inspecting only the APID of the new adapter or APQI of the new domain will
result in passing AP queues through to a guest that are not bound to the
vfio_ap device driver under certain circumstances. Consider the following:

guest's AP configuration (all also assigned to the mdev's matrix):
14.0004
14.0005
14.0006
16.0004
16.0005
16.0006

unassign domain 4
unbind queue 16.0005
assign domain 4

When domain 4 is re-assigned, since only domain 4 will be inspected, the
APQNs that will be examined will be:
14.0004
16.0004

Since both of those APQNs reference queue devices that are bound to the
vfio_ap device driver, nothing will get filtered from the mdev's matrix
when updating the guest's AP configuration. Consequently, queue 16.0005
will get passed through despite not being bound to the driver. This
violates the linux device model requirement that a guest shall only be
given access to devices bound to the device driver facilitating their
pass-through.

To resolve this problem, every adapter and domain assigned to the mdev will
be inspected when filtering the mdev's matrix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-12-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221298">SUSE bug 1221298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224176">SUSE bug 1224176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26621" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26621" ref_url="https://www.suse.com/security/cve/CVE-2024-26621" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: huge_memory: don't force huge page alignment on 32 bit

commit efa7df3e3bb5 ("mm: align larger anonymous mappings on THP
boundaries") caused two issues [1] [2] reported on 32 bit system or compat
userspace.

It doesn't make too much sense to force huge page alignment on 32 bit
system due to the constrained virtual address space.

[1] https://lore.kernel.org/linux-mm/d0a136a0-4a31-46bc-adf4-2db109a61672@kernel.org/
[2] https://lore.kernel.org/linux-mm/CAJuCfpHXLdQy1a2B6xN2d7quTYwg2OoZseYPZTRpU0eHHKD-sQ@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-01-18"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26621/">CVE-2024-26621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26621">CVE-2024-26621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220944">SUSE bug 1220944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26622" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tomoyo: fix UAF write bug in tomoyo_write_control()

Since tomoyo_write_control() updates head-&gt;write_buf when write()
of long lines is requested, we need to fetch head-&gt;write_buf after
head-&gt;io_sem is held.  Otherwise, concurrent write() requests can
cause use-after-free-write and double-free problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220828">SUSE bug 1220828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26623" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26623" ref_url="https://www.suse.com/security/cve/CVE-2024-26623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pds_core: Prevent race issues involving the adminq

There are multiple paths that can result in using the pdsc's
adminq.

[1] pdsc_adminq_isr and the resulting work from queue_work(),
    i.e. pdsc_work_thread()-&gt;pdsc_process_adminq()

[2] pdsc_adminq_post()

When the device goes through reset via PCIe reset and/or
a fw_down/fw_up cycle due to bad PCIe state or bad device
state the adminq is destroyed and recreated.

A NULL pointer dereference can happen if [1] or [2] happens
after the adminq is already destroyed.

In order to fix this, add some further state checks and
implement reference counting for adminq uses. Reference
counting was used because multiple threads can attempt to
access the adminq at the same time via [1] or [2]. Additionally,
multiple clients (i.e. pds-vfio-pci) can be using [2]
at the same time.

The adminq_refcnt is initialized to 1 when the adminq has been
allocated and is ready to use. Users/clients of the adminq
(i.e. [1] and [2]) will increment the refcnt when they are using
the adminq. When the driver goes into a fw_down cycle it will
set the PDSC_S_FW_DEAD bit and then wait for the adminq_refcnt
to hit 1. Setting the PDSC_S_FW_DEAD before waiting will prevent
any further adminq_refcnt increments. Waiting for the
adminq_refcnt to hit 1 allows for any current users of the adminq
to finish before the driver frees the adminq. Once the
adminq_refcnt hits 1 the driver clears the refcnt to signify that
the adminq is deleted and cannot be used. On the fw_up cycle the
driver will once again initialize the adminq_refcnt to 1 allowing
the adminq to be used again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26623/">CVE-2024-26623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26623">CVE-2024-26623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221057">SUSE bug 1221057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: call sock_orphan() at release time

syzbot reported an interesting trace [1] caused by a stale sk-&gt;sk_wq
pointer in a closed llc socket.

In commit ff7b11aa481f ("net: socket: set sock-&gt;sk to NULL after
calling proto_ops::release()") Eric Biggers hinted that some protocols
are missing a sock_orphan(), we need to perform a full audit.

In net-next, I plan to clear sock-&gt;sk from sock_orphan() and
amend Eric patch to add a warning.

[1]
 BUG: KASAN: slab-use-after-free in list_empty include/linux/list.h:373 [inline]
 BUG: KASAN: slab-use-after-free in waitqueue_active include/linux/wait.h:127 [inline]
 BUG: KASAN: slab-use-after-free in sock_def_write_space_wfree net/core/sock.c:3384 [inline]
 BUG: KASAN: slab-use-after-free in sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468
Read of size 8 at addr ffff88802f4fc880 by task ksoftirqd/1/27

CPU: 1 PID: 27 Comm: ksoftirqd/1 Not tainted 6.8.0-rc1-syzkaller-00049-g6098d87eaf31 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0xc4/0x620 mm/kasan/report.c:488
  kasan_report+0xda/0x110 mm/kasan/report.c:601
  list_empty include/linux/list.h:373 [inline]
  waitqueue_active include/linux/wait.h:127 [inline]
  sock_def_write_space_wfree net/core/sock.c:3384 [inline]
  sock_wfree+0x9a8/0x9d0 net/core/sock.c:2468
  skb_release_head_state+0xa3/0x2b0 net/core/skbuff.c:1080
  skb_release_all net/core/skbuff.c:1092 [inline]
  napi_consume_skb+0x119/0x2b0 net/core/skbuff.c:1404
  e1000_unmap_and_free_tx_resource+0x144/0x200 drivers/net/ethernet/intel/e1000/e1000_main.c:1970
  e1000_clean_tx_irq drivers/net/ethernet/intel/e1000/e1000_main.c:3860 [inline]
  e1000_clean+0x4a1/0x26e0 drivers/net/ethernet/intel/e1000/e1000_main.c:3801
  __napi_poll.constprop.0+0xb4/0x540 net/core/dev.c:6576
  napi_poll net/core/dev.c:6645 [inline]
  net_rx_action+0x956/0xe90 net/core/dev.c:6778
  __do_softirq+0x21a/0x8de kernel/softirq.c:553
  run_ksoftirqd kernel/softirq.c:921 [inline]
  run_ksoftirqd+0x31/0x60 kernel/softirq.c:913
  smpboot_thread_fn+0x660/0xa10 kernel/smpboot.c:164
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;

Allocated by task 5167:
  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  unpoison_slab_object mm/kasan/common.c:314 [inline]
  __kasan_slab_alloc+0x81/0x90 mm/kasan/common.c:340
  kasan_slab_alloc include/linux/kasan.h:201 [inline]
  slab_post_alloc_hook mm/slub.c:3813 [inline]
  slab_alloc_node mm/slub.c:3860 [inline]
  kmem_cache_alloc_lru+0x142/0x6f0 mm/slub.c:3879
  alloc_inode_sb include/linux/fs.h:3019 [inline]
  sock_alloc_inode+0x25/0x1c0 net/socket.c:308
  alloc_inode+0x5d/0x220 fs/inode.c:260
  new_inode_pseudo+0x16/0x80 fs/inode.c:1005
  sock_alloc+0x40/0x270 net/socket.c:634
  __sock_create+0xbc/0x800 net/socket.c:1535
  sock_create net/socket.c:1622 [inline]
  __sys_socket_create net/socket.c:1659 [inline]
  __sys_socket+0x14c/0x260 net/socket.c:1706
  __do_sys_socket net/socket.c:1720 [inline]
  __se_sys_socket net/socket.c:1718 [inline]
  __x64_sys_socket+0x72/0xb0 net/socket.c:1718
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xd3/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Freed by task 0:
  kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640
  poison_slab_object mm/kasan/common.c:241 [inline]
  __kasan_slab_free+0x121/0x1b0 mm/kasan/common.c:257
  kasan_slab_free include/linux/kasan.h:184 [inline]
  slab_free_hook mm/slub.c:2121 [inlin
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221086">SUSE bug 1221086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26626" ref_url="https://www.suse.com/security/cve/CVE-2024-26626" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmr: fix kernel panic when forwarding mcast packets

The stacktrace was:
[   86.305548] BUG: kernel NULL pointer dereference, address: 0000000000000092
[   86.306815] #PF: supervisor read access in kernel mode
[   86.307717] #PF: error_code(0x0000) - not-present page
[   86.308624] PGD 0 P4D 0
[   86.309091] Oops: 0000 [#1] PREEMPT SMP NOPTI
[   86.309883] CPU: 2 PID: 3139 Comm: pimd Tainted: G     U             6.8.0-6wind-knet #1
[   86.311027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.11.1-0-g0551a4be2c-prebuilt.qemu-project.org 04/01/2014
[   86.312728] RIP: 0010:ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985)
[ 86.313399] Code: f9 1f 0f 87 85 03 00 00 48 8d 04 5b 48 8d 04 83 49 8d 44 c5 00 48 8b 40 70 48 39 c2 0f 84 d9 00 00 00 49 8b 46 58 48 83 e0 fe &lt;80&gt; b8 92 00 00 00 00 0f 84 55 ff ff ff 49 83 47 38 01 45 85 e4 0f
[   86.316565] RSP: 0018:ffffad21c0583ae0 EFLAGS: 00010246
[   86.317497] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[   86.318596] RDX: ffff9559cb46c000 RSI: 0000000000000000 RDI: 0000000000000000
[   86.319627] RBP: ffffad21c0583b30 R08: 0000000000000000 R09: 0000000000000000
[   86.320650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001
[   86.321672] R13: ffff9559c093a000 R14: ffff9559cc00b800 R15: ffff9559c09c1d80
[   86.322873] FS:  00007f85db661980(0000) GS:ffff955a79d00000(0000) knlGS:0000000000000000
[   86.324291] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   86.325314] CR2: 0000000000000092 CR3: 000000002f13a000 CR4: 0000000000350ef0
[   86.326589] Call Trace:
[   86.327036]  &lt;TASK&gt;
[   86.327434] ? show_regs (/build/work/knet/arch/x86/kernel/dumpstack.c:479)
[   86.328049] ? __die (/build/work/knet/arch/x86/kernel/dumpstack.c:421 /build/work/knet/arch/x86/kernel/dumpstack.c:434)
[   86.328508] ? page_fault_oops (/build/work/knet/arch/x86/mm/fault.c:707)
[   86.329107] ? do_user_addr_fault (/build/work/knet/arch/x86/mm/fault.c:1264)
[   86.329756] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[   86.330350] ? __irq_work_queue_local (/build/work/knet/kernel/irq_work.c:111 (discriminator 1))
[   86.331013] ? exc_page_fault (/build/work/knet/./arch/x86/include/asm/paravirt.h:693 /build/work/knet/arch/x86/mm/fault.c:1515 /build/work/knet/arch/x86/mm/fault.c:1563)
[   86.331702] ? asm_exc_page_fault (/build/work/knet/./arch/x86/include/asm/idtentry.h:570)
[   86.332468] ? ip_mr_forward (/build/work/knet/net/ipv4/ipmr.c:1985)
[   86.333183] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[   86.333920] ipmr_mfc_add (/build/work/knet/./include/linux/rcupdate.h:782 /build/work/knet/net/ipv4/ipmr.c:1009 /build/work/knet/net/ipv4/ipmr.c:1273)
[   86.334583] ? __pfx_ipmr_hash_cmp (/build/work/knet/net/ipv4/ipmr.c:363)
[   86.335357] ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470)
[   86.336135] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[   86.336854] ? ip_mroute_setsockopt (/build/work/knet/net/ipv4/ipmr.c:1470)
[   86.337679] do_ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:944)
[   86.338408] ? __pfx_unix_stream_read_actor (/build/work/knet/net/unix/af_unix.c:2862)
[   86.339232] ? srso_return_thunk (/build/work/knet/arch/x86/lib/retpoline.S:223)
[   86.339809] ? aa_sk_perm (/build/work/knet/security/apparmor/include/cred.h:153 /build/work/knet/security/apparmor/net.c:181)
[   86.340342] ip_setsockopt (/build/work/knet/net/ipv4/ip_sockglue.c:1415)
[   86.340859] raw_setsockopt (/build/work/knet/net/ipv4/raw.c:836)
[   86.341408] ? security_socket_setsockopt (/build/work/knet/security/security.c:4561 (discriminator 13))
[   86.342116] sock_common_setsockopt (/build/work/knet/net/core/sock.c:3716)
[   86.342747] do_sock_setsockopt (/build/work/knet/net/socket.c:2313)
[   86.343363] __sys_setsockopt (/build/work/knet/./include/linux/file.h:32 /build/work/kn
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26626/">CVE-2024-26626 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26626">CVE-2024-26626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221089">SUSE bug 1221089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler

Inside scsi_eh_wakeup(), scsi_host_busy() is called &amp; checked with host
lock every time for deciding if error handler kthread needs to be waken up.

This can be too heavy in case of recovery, such as:

 - N hardware queues

 - queue depth is M for each hardware queue

 - each scsi_host_busy() iterates over (N * M) tag/requests

If recovery is triggered in case that all requests are in-flight, each
scsi_eh_wakeup() is strictly serialized, when scsi_eh_wakeup() is called
for the last in-flight request, scsi_host_busy() has been run for (N * M -
1) times, and request has been iterated for (N*M - 1) * (N * M) times.

If both N and M are big enough, hard lockup can be triggered on acquiring
host lock, and it is observed on mpi3mr(128 hw queues, queue depth 8169).

Fix the issue by calling scsi_host_busy() outside the host lock. We don't
need the host lock for getting busy count because host the lock never
covers that.

[mkp: Drop unnecessary 'busy' variables pointed out by Bart]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221090">SUSE bug 1221090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix RELEASE_LOCKOWNER

The test on so_count in nfsd4_release_lockowner() is nonsense and
harmful.  Revert to using check_for_locks(), changing that to not sleep.

First: harmful.
As is documented in the kdoc comment for nfsd4_release_lockowner(), the
test on so_count can transiently return a false positive resulting in a
return of NFS4ERR_LOCKS_HELD when in fact no locks are held.  This is
clearly a protocol violation and with the Linux NFS client it can cause
incorrect behaviour.

If RELEASE_LOCKOWNER is sent while some other thread is still
processing a LOCK request which failed because, at the time that request
was received, the given owner held a conflicting lock, then the nfsd
thread processing that LOCK request can hold a reference (conflock) to
the lock owner that causes nfsd4_release_lockowner() to return an
incorrect error.

The Linux NFS client ignores that NFS4ERR_LOCKS_HELD error because it
never sends NFS4_RELEASE_LOCKOWNER without first releasing any locks, so
it knows that the error is impossible.  It assumes the lock owner was in
fact released so it feels free to use the same lock owner identifier in
some later locking request.

When it does reuse a lock owner identifier for which a previous RELEASE
failed, it will naturally use a lock_seqid of zero.  However the server,
which didn't release the lock owner, will expect a larger lock_seqid and
so will respond with NFS4ERR_BAD_SEQID.

So clearly it is harmful to allow a false positive, which testing
so_count allows.

The test is nonsense because ... well... it doesn't mean anything.

so_count is the sum of three different counts.
1/ the set of states listed on so_stateids
2/ the set of active vfs locks owned by any of those states
3/ various transient counts such as for conflicting locks.

When it is tested against '2' it is clear that one of these is the
transient reference obtained by find_lockowner_str_locked().  It is not
clear what the other one is expected to be.

In practice, the count is often 2 because there is precisely one state
on so_stateids.  If there were more, this would fail.

In my testing I see two circumstances when RELEASE_LOCKOWNER is called.
In one case, CLOSE is called before RELEASE_LOCKOWNER.  That results in
all the lock states being removed, and so the lockowner being discarded
(it is removed when there are no more references which usually happens
when the lock state is discarded).  When nfsd4_release_lockowner() finds
that the lock owner doesn't exist, it returns success.

The other case shows an so_count of '2' and precisely one state listed
in so_stateid.  It appears that the Linux client uses a separate lock
owner for each file resulting in one lock state per lock owner, so this
test on '2' is safe.  For another client it might not be safe.

So this patch changes check_for_locks() to use the (newish)
find_any_file_locked() so that it doesn't take a reference on the
nfs4_file and so never calls nfsd_file_put(), and so never sleeps.  With
this check is it safe to restore the use of check_for_locks() rather
than testing so_count against the mysterious '2'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221379">SUSE bug 1221379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26630" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26630" ref_url="https://www.suse.com/security/cve/CVE-2024-26630" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: cachestat: fix folio read-after-free in cache walk

In cachestat, we access the folio from the page cache's xarray to compute
its page offset, and check for its dirty and writeback flags.  However, we
do not hold a reference to the folio before performing these actions,
which means the folio can concurrently be released and reused as another
folio/page/slab.

Get around this altogether by just using xarray's existing machinery for
the folio page offsets and dirty/writeback states.

This changes behavior for tmpfs files to now always report zeroes in their
dirty and writeback counters.  This is okay as tmpfs doesn't follow
conventional writeback cache behavior: its pages get "cleaned" during
swapout, after which they're no longer resident etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26630/">CVE-2024-26630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26630">CVE-2024-26630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221380">SUSE bug 1221380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26631" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: fix data-race in ipv6_mc_down / mld_ifc_work

idev-&gt;mc_ifc_count can be written over without proper locking.

Originally found by syzbot [1], fix this issue by encapsulating calls
to mld_ifc_stop_work() (and mld_gq_stop_work() for good measure) with
mutex_lock() and mutex_unlock() accordingly as these functions
should only be called with mc_lock per their declarations.

[1]
BUG: KCSAN: data-race in ipv6_mc_down / mld_ifc_work

write to 0xffff88813a80c832 of 1 bytes by task 3771 on cpu 0:
 mld_ifc_stop_work net/ipv6/mcast.c:1080 [inline]
 ipv6_mc_down+0x10a/0x280 net/ipv6/mcast.c:2725
 addrconf_ifdown+0xe32/0xf10 net/ipv6/addrconf.c:3949
 addrconf_notify+0x310/0x980
 notifier_call_chain kernel/notifier.c:93 [inline]
 raw_notifier_call_chain+0x6b/0x1c0 kernel/notifier.c:461
 __dev_notify_flags+0x205/0x3d0
 dev_change_flags+0xab/0xd0 net/core/dev.c:8685
 do_setlink+0x9f6/0x2430 net/core/rtnetlink.c:2916
 rtnl_group_changelink net/core/rtnetlink.c:3458 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3717 [inline]
 rtnl_newlink+0xbb3/0x1670 net/core/rtnetlink.c:3754
 rtnetlink_rcv_msg+0x807/0x8c0 net/core/rtnetlink.c:6558
 netlink_rcv_skb+0x126/0x220 net/netlink/af_netlink.c:2545
 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:6576
 netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]
 netlink_unicast+0x589/0x650 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x66e/0x770 net/netlink/af_netlink.c:1910
 ...

write to 0xffff88813a80c832 of 1 bytes by task 22 on cpu 1:
 mld_ifc_work+0x54c/0x7b0 net/ipv6/mcast.c:2653
 process_one_work kernel/workqueue.c:2627 [inline]
 process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2700
 worker_thread+0x525/0x730 kernel/workqueue.c:2781
 ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221630">SUSE bug 1221630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26632" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26632" ref_url="https://www.suse.com/security/cve/CVE-2024-26632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix iterating over an empty bio with bio_for_each_folio_all

If the bio contains no data, bio_first_folio() calls page_folio() on a
NULL pointer and oopses.  Move the test that we've reached the end of
the bio from bio_next_folio() to bio_first_folio().

[axboe: add unlikely() to error case]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26632/">CVE-2024-26632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26632">CVE-2024-26632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221635">SUSE bug 1221635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()

syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken.

Reading frag_off can only be done if we pulled enough bytes
to skb-&gt;head. Currently we might access garbage.

[1]
BUG: KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0
ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0
ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]
ip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x569/0x660 net/core/neighbour.c:1592
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137
ip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip6_output+0x323/0x610 net/ipv6/ip6_output.c:243
dst_output include/net/dst.h:451 [inline]
ip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155
ip6_send_skb net/ipv6/ip6_output.c:1952 [inline]
ip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972
rawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582
rawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920
inet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
slab_alloc_node mm/slub.c:3478 [inline]
__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517
__do_kmalloc_node mm/slab_common.c:1006 [inline]
__kmalloc_node_track_caller+0x118/0x3c0 mm/slab_common.c:1027
kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582
pskb_expand_head+0x226/0x1a00 net/core/skbuff.c:2098
__pskb_pull_tail+0x13b/0x2310 net/core/skbuff.c:2655
pskb_may_pull_reason include/linux/skbuff.h:2673 [inline]
pskb_may_pull include/linux/skbuff.h:2681 [inline]
ip6_tnl_parse_tlv_enc_lim+0x901/0xbb0 net/ipv6/ip6_tunnel.c:408
ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]
ip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x569/0x660 net/core/neighbour.c:1592
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137
ip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip6_output+0x323/0x610 net/ipv6/ip6_output.c:243
dst_output include/net/dst.h:451 [inline]
ip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155
ip6_send_skb net/ipv6/ip6_output.c:1952 [inline]
ip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972
rawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582
rawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920
inet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendms
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221647">SUSE bug 1221647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26634" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26634" ref_url="https://www.suse.com/security/cve/CVE-2024-26634" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix removing a namespace with conflicting altnames

Mark reports a BUG() when a net namespace is removed.

    kernel BUG at net/core/dev.c:11520!

Physical interfaces moved outside of init_net get "refunded"
to init_net when that namespace disappears. The main interface
name may get overwritten in the process if it would have
conflicted. We need to also discard all conflicting altnames.
Recent fixes addressed ensuring that altnames get moved
with the main interface, which surfaced this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26634/">CVE-2024-26634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26634">CVE-2024-26634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221651">SUSE bug 1221651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26635" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: Drop support for ETH_P_TR_802_2.

syzbot reported an uninit-value bug below. [0]

llc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2
(0x0011), and syzbot abused the latter to trigger the bug.

  write$tun(r0, &amp;(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[], @llc={@snap={0xaa, 0x1, ')', "90e5dd"}}}}, 0x16)

llc_conn_handler() initialises local variables {saddr,daddr}.mac
based on skb in llc_pdu_decode_sa()/llc_pdu_decode_da() and passes
them to __llc_lookup().

However, the initialisation is done only when skb-&gt;protocol is
htons(ETH_P_802_2), otherwise, __llc_lookup_established() and
__llc_lookup_listener() will read garbage.

The missing initialisation existed prior to commit 211ed865108e
("net: delete all instances of special processing for token ring").

It removed the part to kick out the token ring stuff but forgot to
close the door allowing ETH_P_TR_802_2 packets to sneak into llc_rcv().

Let's remove llc_tr_packet_type and complete the deprecation.

[0]:
BUG: KMSAN: uninit-value in __llc_lookup_established+0xe9d/0xf90
 __llc_lookup_established+0xe9d/0xf90
 __llc_lookup net/llc/llc_conn.c:611 [inline]
 llc_conn_handler+0x4bd/0x1360 net/llc/llc_conn.c:791
 llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206
 __netif_receive_skb_one_core net/core/dev.c:5527 [inline]
 __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5641
 netif_receive_skb_internal net/core/dev.c:5727 [inline]
 netif_receive_skb+0x58/0x660 net/core/dev.c:5786
 tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
 tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002
 tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x8ef/0x1490 fs/read_write.c:584
 ksys_write+0x20f/0x4c0 fs/read_write.c:637
 __do_sys_write fs/read_write.c:649 [inline]
 __se_sys_write fs/read_write.c:646 [inline]
 __x64_sys_write+0x93/0xd0 fs/read_write.c:646
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Local variable daddr created at:
 llc_conn_handler+0x53/0x1360 net/llc/llc_conn.c:783
 llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206

CPU: 1 PID: 5004 Comm: syz-executor994 Not tainted 6.6.0-syzkaller-14500-g1c41041124bd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221656">SUSE bug 1221656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26636" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

llc: make llc_ui_sendmsg() more robust against bonding changes

syzbot was able to trick llc_ui_sendmsg(), allocating an skb with no
headroom, but subsequently trying to push 14 bytes of Ethernet header [1]

Like some others, llc_ui_sendmsg() releases the socket lock before
calling sock_alloc_send_skb().
Then it acquires it again, but does not redo all the sanity checks
that were performed.

This fix:

- Uses LL_RESERVED_SPACE() to reserve space.
- Check all conditions again after socket lock is held again.
- Do not account Ethernet header for mtu limitation.

[1]

skbuff: skb_under_panic: text:ffff800088baa334 len:1514 put:14 head:ffff0000c9c37000 data:ffff0000c9c36ff2 tail:0x5dc end:0x6c0 dev:bond0

 kernel BUG at net/core/skbuff.c:193 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6875 Comm: syz-executor.0 Not tainted 6.7.0-rc8-syzkaller-00101-g0802e17d9aca-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : skb_panic net/core/skbuff.c:189 [inline]
 pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
 lr : skb_panic net/core/skbuff.c:189 [inline]
 lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
sp : ffff800096f97000
x29: ffff800096f97010 x28: ffff80008cc8d668 x27: dfff800000000000
x26: ffff0000cb970c90 x25: 00000000000005dc x24: ffff0000c9c36ff2
x23: ffff0000c9c37000 x22: 00000000000005ea x21: 00000000000006c0
x20: 000000000000000e x19: ffff800088baa334 x18: 1fffe000368261ce
x17: ffff80008e4ed000 x16: ffff80008a8310f8 x15: 0000000000000001
x14: 1ffff00012df2d58 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000001 x10: 0000000000ff0100 x9 : e28a51f1087e8400
x8 : e28a51f1087e8400 x7 : ffff80008028f8d0 x6 : 0000000000000000
x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78714
x2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000089
Call trace:
  skb_panic net/core/skbuff.c:189 [inline]
  skb_under_panic+0x13c/0x140 net/core/skbuff.c:203
  skb_push+0xf0/0x108 net/core/skbuff.c:2451
  eth_header+0x44/0x1f8 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3188 [inline]
  llc_mac_hdr_init+0x110/0x17c net/llc/llc_output.c:33
  llc_sap_action_send_xid_c+0x170/0x344 net/llc/llc_s_ac.c:85
  llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]
  llc_sap_next_state net/llc/llc_sap.c:182 [inline]
  llc_sap_state_process+0x1ec/0x774 net/llc/llc_sap.c:209
  llc_build_and_send_xid_pkt+0x12c/0x1c0 net/llc/llc_sap.c:270
  llc_ui_sendmsg+0x7bc/0xb1c net/llc/af_llc.c:997
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  sock_sendmsg+0x194/0x274 net/socket.c:767
  splice_to_socket+0x7cc/0xd58 fs/splice.c:881
  do_splice_from fs/splice.c:933 [inline]
  direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142
  splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088
  do_splice_direct+0x20c/0x348 fs/splice.c:1194
  do_sendfile+0x4bc/0xc70 fs/read_write.c:1254
  __do_sys_sendfile64 fs/read_write.c:1322 [inline]
  __se_sys_sendfile64 fs/read_write.c:1308 [inline]
  __arm64_sys_sendfile64+0x160/0x3b4 fs/read_write.c:1308
  __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]
  invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51
  el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136
  do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155
  el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678
  el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696
  el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595
Code: aa1803e6 aa1903e7 a90023f5 94792f6a (d4210000)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221659">SUSE bug 1221659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26637" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26637" ref_url="https://www.suse.com/security/cve/CVE-2024-26637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: rely on mac80211 debugfs handling for vif

mac80211 started to delete debugfs entries in certain cases, causing a
ath11k to crash when it tried to delete the entries later. Fix this by
relying on mac80211 to delete the entries when appropriate and adding
them from the vif_add_debugfs handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26637/">CVE-2024-26637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26637">CVE-2024-26637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221652">SUSE bug 1221652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26638" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26638" ref_url="https://www.suse.com/security/cve/CVE-2024-26638" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: always initialize struct msghdr completely

syzbot complains that msg-&gt;msg_get_inq value can be uninitialized [1]

struct msghdr got many new fields recently, we should always make
sure their values is zero by default.

[1]
 BUG: KMSAN: uninit-value in tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571
  tcp_recvmsg+0x686/0xac0 net/ipv4/tcp.c:2571
  inet_recvmsg+0x131/0x580 net/ipv4/af_inet.c:879
  sock_recvmsg_nosec net/socket.c:1044 [inline]
  sock_recvmsg+0x12b/0x1e0 net/socket.c:1066
  __sock_xmit+0x236/0x5c0 drivers/block/nbd.c:538
  nbd_read_reply drivers/block/nbd.c:732 [inline]
  recv_work+0x262/0x3100 drivers/block/nbd.c:863
  process_one_work kernel/workqueue.c:2627 [inline]
  process_scheduled_works+0x104e/0x1e70 kernel/workqueue.c:2700
  worker_thread+0xf45/0x1490 kernel/workqueue.c:2781
  kthread+0x3ed/0x540 kernel/kthread.c:388
  ret_from_fork+0x66/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242

Local variable msg created at:
  __sock_xmit+0x4c/0x5c0 drivers/block/nbd.c:513
  nbd_read_reply drivers/block/nbd.c:732 [inline]
  recv_work+0x262/0x3100 drivers/block/nbd.c:863

CPU: 1 PID: 7465 Comm: kworker/u5:1 Not tainted 6.7.0-rc7-syzkaller-00041-gf016f7547aee #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: nbd5-recv recv_work
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26638/">CVE-2024-26638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26638">CVE-2024-26638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221649">SUSE bug 1221649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26639" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26639" ref_url="https://www.suse.com/security/cve/CVE-2024-26639" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26639/">CVE-2024-26639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26639">CVE-2024-26639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221624">SUSE bug 1221624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: add sanity checks to rx zerocopy

TCP rx zerocopy intent is to map pages initially allocated
from NIC drivers, not pages owned by a fs.

This patch adds to can_map_frag() these additional checks:

- Page must not be a compound one.
- page-&gt;mapping must be NULL.

This fixes the panic reported by ZhangPeng.

syzbot was able to loopback packets built with sendfile(),
mapping pages owned by an ext4 file to TCP rx zerocopy.

r3 = socket$inet_tcp(0x2, 0x1, 0x0)
mmap(&amp;(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r4, &amp;(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10)
connect$inet(r4, &amp;(0x7f00000006c0)={0x2, 0x4e24, @empty}, 0x10)
r5 = openat$dir(0xffffffffffffff9c, &amp;(0x7f00000000c0)='./file0\x00',
    0x181e42, 0x0)
fallocate(r5, 0x0, 0x0, 0x85b8)
sendfile(r4, r5, 0x0, 0x8ba0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23,
    &amp;(0x7f00000001c0)={&amp;(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0,
    0x0, 0x0, 0x0, 0x0}, &amp;(0x7f0000000440)=0x40)
r6 = openat$dir(0xffffffffffffff9c, &amp;(0x7f00000000c0)='./file0\x00',
    0x181e42, 0x0)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221650">SUSE bug 1221650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()

syzbot found __ip6_tnl_rcv() could access unitiliazed data [1].

Call pskb_inet_may_pull() to fix this, and initialize ipv6h
variable after this call as it can change skb-&gt;head.

[1]
 BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321
  ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727
  __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845
  ip6_tnl_rcv+0xce/0x100 net/ipv6/ip6_tunnel.c:888
 gre_rcv+0x143f/0x1870
  ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438
  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
  dst_input include/net/dst.h:461 [inline]
  ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5532 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5646
  netif_receive_skb_internal net/core/dev.c:5732 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5791
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555
  tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2084 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x786/0x1200 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
  slab_alloc_node mm/slub.c:3478 [inline]
  kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
  __alloc_skb+0x318/0x740 net/core/skbuff.c:651
  alloc_skb include/linux/skbuff.h:1286 [inline]
  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787
  tun_alloc_skb drivers/net/tun.c:1531 [inline]
  tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2084 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x786/0x1200 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

CPU: 0 PID: 5034 Comm: syz-executor331 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221654">SUSE bug 1221654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow anonymous set with timeout flag

Anonymous sets are never used with timeout from userspace, reject this.
Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

While the rhashtable set gc runs asynchronously, a race allows it to
collect elements from anonymous sets with timeouts while it is being
released from the commit path.

Mingi Cho originally reported this issue in a different path in 6.1.x
with a pipapo set with low timeouts which is not possible upstream since
7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set
element timeout").

Fix this by setting on the dead flag for anonymous sets to skip async gc
in this case.

According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on
transaction abort"), Florian plans to accelerate abort path by releasing
objects via workqueue, therefore, this sets on the dead flag for abort
path too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26644" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't abort filesystem when attempting to snapshot deleted subvolume

If the source file descriptor to the snapshot ioctl refers to a deleted
subvolume, we get the following abort:

  BTRFS: Transaction aborted (error -2)
  WARNING: CPU: 0 PID: 833 at fs/btrfs/transaction.c:1875 create_pending_snapshot+0x1040/0x1190 [btrfs]
  Modules linked in: pata_acpi btrfs ata_piix libata scsi_mod virtio_net blake2b_generic xor net_failover virtio_rng failover scsi_common rng_core raid6_pq libcrc32c
  CPU: 0 PID: 833 Comm: t_snapshot_dele Not tainted 6.7.0-rc6 #2
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
  RIP: 0010:create_pending_snapshot+0x1040/0x1190 [btrfs]
  RSP: 0018:ffffa09c01337af8 EFLAGS: 00010282
  RAX: 0000000000000000 RBX: ffff9982053e7c78 RCX: 0000000000000027
  RDX: ffff99827dc20848 RSI: 0000000000000001 RDI: ffff99827dc20840
  RBP: ffffa09c01337c00 R08: 0000000000000000 R09: ffffa09c01337998
  R10: 0000000000000003 R11: ffffffffb96da248 R12: fffffffffffffffe
  R13: ffff99820535bb28 R14: ffff99820b7bd000 R15: ffff99820381ea80
  FS:  00007fe20aadabc0(0000) GS:ffff99827dc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000559a120b502f CR3: 00000000055b6000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? __warn+0x81/0x130
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? report_bug+0x171/0x1a0
   ? handle_bug+0x3a/0x70
   ? exc_invalid_op+0x17/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   ? create_pending_snapshot+0x1040/0x1190 [btrfs]
   create_pending_snapshots+0x92/0xc0 [btrfs]
   btrfs_commit_transaction+0x66b/0xf40 [btrfs]
   btrfs_mksubvol+0x301/0x4d0 [btrfs]
   btrfs_mksnapshot+0x80/0xb0 [btrfs]
   __btrfs_ioctl_snap_create+0x1c2/0x1d0 [btrfs]
   btrfs_ioctl_snap_create_v2+0xc4/0x150 [btrfs]
   btrfs_ioctl+0x8a6/0x2650 [btrfs]
   ? kmem_cache_free+0x22/0x340
   ? do_sys_openat2+0x97/0xe0
   __x64_sys_ioctl+0x97/0xd0
   do_syscall_64+0x46/0xf0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
  RIP: 0033:0x7fe20abe83af
  RSP: 002b:00007ffe6eff1360 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fe20abe83af
  RDX: 00007ffe6eff23c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fe20ad16cd0
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 00007ffe6eff13c0 R14: 00007fe20ad45000 R15: 0000559a120b6d58
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
  BTRFS: error (device vdc: state A) in create_pending_snapshot:1875: errno=-2 No such entry
  BTRFS info (device vdc: state EA): forced readonly
  BTRFS warning (device vdc: state EA): Skipping commit of aborted transaction.
  BTRFS: error (device vdc: state EA) in cleanup_transaction:2055: errno=-2 No such entry

This happens because create_pending_snapshot() initializes the new root
item as a copy of the source root item. This includes the refs field,
which is 0 for a deleted subvolume. The call to btrfs_insert_root()
therefore inserts a root with refs == 0. btrfs_get_new_fs_root() then
finds the root and returns -ENOENT if refs == 0, which causes
create_pending_snapshot() to abort.

Fix it by checking the source root's refs before attempting the
snapshot, but after locking subvol_sem to avoid racing with deletion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222072">SUSE bug 1222072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26645" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Ensure visibility when inserting an element into tracing_map

Running the following two commands in parallel on a multi-processor
AArch64 machine can sporadically produce an unexpected warning about
duplicate histogram entries:

 $ while true; do
     echo hist:key=id.syscall:val=hitcount &gt; \
       /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/trigger
     cat /sys/kernel/debug/tracing/events/raw_syscalls/sys_enter/hist
     sleep 0.001
   done
 $ stress-ng --sysbadaddr $(nproc)

The warning looks as follows:

[ 2911.172474] ------------[ cut here ]------------
[ 2911.173111] Duplicates detected: 1
[ 2911.173574] WARNING: CPU: 2 PID: 12247 at kernel/trace/tracing_map.c:983 tracing_map_sort_entries+0x3e0/0x408
[ 2911.174702] Modules linked in: iscsi_ibft(E) iscsi_boot_sysfs(E) rfkill(E) af_packet(E) nls_iso8859_1(E) nls_cp437(E) vfat(E) fat(E) ena(E) tiny_power_button(E) qemu_fw_cfg(E) button(E) fuse(E) efi_pstore(E) ip_tables(E) x_tables(E) xfs(E) libcrc32c(E) aes_ce_blk(E) aes_ce_cipher(E) crct10dif_ce(E) polyval_ce(E) polyval_generic(E) ghash_ce(E) gf128mul(E) sm4_ce_gcm(E) sm4_ce_ccm(E) sm4_ce(E) sm4_ce_cipher(E) sm4(E) sm3_ce(E) sm3(E) sha3_ce(E) sha512_ce(E) sha512_arm64(E) sha2_ce(E) sha256_arm64(E) nvme(E) sha1_ce(E) nvme_core(E) nvme_auth(E) t10_pi(E) sg(E) scsi_mod(E) scsi_common(E) efivarfs(E)
[ 2911.174738] Unloaded tainted modules: cppc_cpufreq(E):1
[ 2911.180985] CPU: 2 PID: 12247 Comm: cat Kdump: loaded Tainted: G            E      6.7.0-default #2 1b58bbb22c97e4399dc09f92d309344f69c44a01
[ 2911.182398] Hardware name: Amazon EC2 c7g.8xlarge/, BIOS 1.0 11/1/2018
[ 2911.183208] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 2911.184038] pc : tracing_map_sort_entries+0x3e0/0x408
[ 2911.184667] lr : tracing_map_sort_entries+0x3e0/0x408
[ 2911.185310] sp : ffff8000a1513900
[ 2911.185750] x29: ffff8000a1513900 x28: ffff0003f272fe80 x27: 0000000000000001
[ 2911.186600] x26: ffff0003f272fe80 x25: 0000000000000030 x24: 0000000000000008
[ 2911.187458] x23: ffff0003c5788000 x22: ffff0003c16710c8 x21: ffff80008017f180
[ 2911.188310] x20: ffff80008017f000 x19: ffff80008017f180 x18: ffffffffffffffff
[ 2911.189160] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000a15134b8
[ 2911.190015] x14: 0000000000000000 x13: 205d373432323154 x12: 5b5d313131333731
[ 2911.190844] x11: 00000000fffeffff x10: 00000000fffeffff x9 : ffffd1b78274a13c
[ 2911.191716] x8 : 000000000017ffe8 x7 : c0000000fffeffff x6 : 000000000057ffa8
[ 2911.192554] x5 : ffff0012f6c24ec0 x4 : 0000000000000000 x3 : ffff2e5b72b5d000
[ 2911.193404] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0003ff254480
[ 2911.194259] Call trace:
[ 2911.194626]  tracing_map_sort_entries+0x3e0/0x408
[ 2911.195220]  hist_show+0x124/0x800
[ 2911.195692]  seq_read_iter+0x1d4/0x4e8
[ 2911.196193]  seq_read+0xe8/0x138
[ 2911.196638]  vfs_read+0xc8/0x300
[ 2911.197078]  ksys_read+0x70/0x108
[ 2911.197534]  __arm64_sys_read+0x24/0x38
[ 2911.198046]  invoke_syscall+0x78/0x108
[ 2911.198553]  el0_svc_common.constprop.0+0xd0/0xf8
[ 2911.199157]  do_el0_svc+0x28/0x40
[ 2911.199613]  el0_svc+0x40/0x178
[ 2911.200048]  el0t_64_sync_handler+0x13c/0x158
[ 2911.200621]  el0t_64_sync+0x1a8/0x1b0
[ 2911.201115] ---[ end trace 0000000000000000 ]---

The problem appears to be caused by CPU reordering of writes issued from
__tracing_map_insert().

The check for the presence of an element with a given key in this
function is:

 val = READ_ONCE(entry-&gt;val);
 if (val &amp;&amp; keys_match(key, val-&gt;key, map-&gt;key_size)) ...

The write of a new entry is:

 elt = get_free_elt(map);
 memcpy(elt-&gt;key, key, map-&gt;key_size);
 entry-&gt;val = elt;

The "memcpy(elt-&gt;key, key, map-&gt;key_size);" and "entry-&gt;val = elt;"
stores may become visible in the reversed order on another CPU. This
second CPU might then incorrectly determine that a new key doesn't match
an already present val-&gt;key and subse
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222056">SUSE bug 1222056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26646" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: hfi: Add syscore callbacks for system-wide PM

The kernel allocates a memory buffer and provides its location to the
hardware, which uses it to update the HFI table. This allocation occurs
during boot and remains constant throughout runtime.

When resuming from hibernation, the restore kernel allocates a second
memory buffer and reprograms the HFI hardware with the new location as
part of a normal boot. The location of the second memory buffer may
differ from the one allocated by the image kernel.

When the restore kernel transfers control to the image kernel, its HFI
buffer becomes invalid, potentially leading to memory corruption if the
hardware writes to it (the hardware continues to use the buffer from the
restore kernel).

It is also possible that the hardware "forgets" the address of the memory
buffer when resuming from "deep" suspend. Memory corruption may also occur
in such a scenario.

To prevent the described memory corruption, disable HFI when preparing to
suspend or hibernate. Enable it when resuming.

Add syscore callbacks to handle the package of the boot CPU (packages of
non-boot CPUs are handled via CPU offline). Syscore ops always run on the
boot CPU. Additionally, HFI only needs to be disabled during "deep" suspend
and hibernation. Syscore ops only run in these cases.

[ rjw: Comment adjustment, subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222070">SUSE bug 1222070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26647" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26647" ref_url="https://www.suse.com/security/cve/CVE-2024-26647" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix late derefrence 'dsc' check in 'link_set_dsc_pps_packet()'

In link_set_dsc_pps_packet(), 'struct display_stream_compressor *dsc'
was dereferenced in a DC_LOGGER_INIT(dsc-&gt;ctx-&gt;logger); before the 'dsc'
NULL pointer check.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/dc/link/link_dpms.c:905 link_set_dsc_pps_packet() warn: variable dereferenced before check 'dsc' (see line 903)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26647/">CVE-2024-26647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26647">CVE-2024-26647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222066">SUSE bug 1222066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26648" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26648" ref_url="https://www.suse.com/security/cve/CVE-2024-26648" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix variable deferencing before NULL check in edp_setup_replay()

In edp_setup_replay(), 'struct dc *dc' &amp; 'struct dmub_replay *replay'
was dereferenced before the pointer 'link' &amp; 'replay' NULL check.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() warn: variable dereferenced before check 'link' (see line 933)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26648/">CVE-2024-26648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26648">CVE-2024-26648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222067">SUSE bug 1222067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26649" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the null pointer when load rlc firmware

If the RLC firmware is invalid because of wrong header size,
the pointer to the rlc firmware is released in function
amdgpu_ucode_request. There will be a null pointer error
in subsequent use. So skip validation to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222055">SUSE bug 1222055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sr9800: Add check for usbnet_get_endpoints

Add check for usbnet_get_endpoints() and return the error if it fails
in order to transfer the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221337">SUSE bug 1221337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26652" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26652" ref_url="https://www.suse.com/security/cve/CVE-2024-26652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: pds_core: Fix possible double free in error handling path

When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), Callback function pdsc_auxbus_dev_release
calls kfree(padev) to free memory. We shouldn't call kfree(padev)
again in the error handling path.

Fix this by cleaning up the redundant kfree() and putting
the error handling back to where the errors happened.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-29"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26652/">CVE-2024-26652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26652">CVE-2024-26652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222115">SUSE bug 1222115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222116">SUSE bug 1222116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26653" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26653" ref_url="https://www.suse.com/security/cve/CVE-2024-26653" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: misc: ljca: Fix double free in error handling path

When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function ljca_auxdev_release
calls kfree(auxdev-&gt;dev.platform_data) to free the parameter data
of the function ljca_new_client_device. The callers of
ljca_new_client_device shouldn't call kfree() again
in the error handling path to free the platform data.

Fix this by cleaning up the redundant kfree() in all callers and
adding kfree() the passed in platform_data on errors which happen
before auxiliary_device_init() succeeds .
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26653/">CVE-2024-26653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26653">CVE-2024-26653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222297">SUSE bug 1222297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26654" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs

The dreamcastcard-&gt;timer could schedule the spu_dma_work and the
spu_dma_work could also arm the dreamcastcard-&gt;timer.

When the snd_pcm_substream is closing, the aica_channel will be
deallocated. But it could still be dereferenced in the worker
thread. The reason is that del_timer() will return directly
regardless of whether the timer handler is running or not and
the worker could be rescheduled in the timer handler. As a result,
the UAF bug will happen. The racy situation is shown below:

      (Thread 1)                 |      (Thread 2)
snd_aicapcm_pcm_close()          |
 ...                             |  run_spu_dma() //worker
                                 |    mod_timer()
  flush_work()                   |
  del_timer()                    |  aica_period_elapsed() //timer
  kfree(dreamcastcard-&gt;channel)  |    schedule_work()
                                 |  run_spu_dma() //worker
  ...                            |    dreamcastcard-&gt;channel-&gt; //USE

In order to mitigate this bug and other possible corner cases,
call mod_timer() conditionally in run_spu_dma(), then implement
PCM sync_stop op to cancel both the timer and worker. The sync_stop
op will be called from PCM core appropriately when needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222304">SUSE bug 1222304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26655" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26655" ref_url="https://www.suse.com/security/cve/CVE-2024-26655" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Fix memory leak in posix_clock_open()

If the clk ops.open() function returns an error, we don't release the
pccontext we allocated for this clock.

Re-organize the code slightly to make it all more obvious.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26655/">CVE-2024-26655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26655">CVE-2024-26655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222306">SUSE bug 1222306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26656" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix use-after-free bug

The bug can be triggered by sending a single amdgpu_gem_userptr_ioctl
to the AMDGPU DRM driver on any ASICs with an invalid address and size.
The bug was reported by Joonkyo Jung &lt;joonkyoj@yonsei.ac.kr&gt;.
For example the following code:

static void Syzkaller1(int fd)
{
	struct drm_amdgpu_gem_userptr arg;
	int ret;

	arg.addr = 0xffffffffffff0000;
	arg.size = 0x80000000; /*2 Gb*/
	arg.flags = 0x7;
	ret = drmIoctl(fd, 0xc1186451/*amdgpu_gem_userptr_ioctl*/, &amp;arg);
}

Due to the address and size are not valid there is a failure in
amdgpu_hmm_register-&gt;mmu_interval_notifier_insert-&gt;__mmu_interval_notifier_insert-&gt;
check_shl_overflow, but we even the amdgpu_hmm_register failure we still call
amdgpu_hmm_unregister into  amdgpu_gem_object_free which causes access to a bad address.
The following stack is below when the issue is reproduced when Kazan is enabled:

[  +0.000014] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000009] RIP: 0010:mmu_interval_notifier_remove+0x327/0x340
[  +0.000017] Code: ff ff 49 89 44 24 08 48 b8 00 01 00 00 00 00 ad de 4c 89 f7 49 89 47 40 48 83 c0 22 49 89 47 48 e8 ce d1 2d 01 e9 32 ff ff ff &lt;0f&gt; 0b e9 16 ff ff ff 4c 89 ef e8 fa 14 b3 ff e9 36 ff ff ff e8 80
[  +0.000014] RSP: 0018:ffffc90002657988 EFLAGS: 00010246
[  +0.000013] RAX: 0000000000000000 RBX: 1ffff920004caf35 RCX: ffffffff8160565b
[  +0.000011] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8881a9f78260
[  +0.000010] RBP: ffffc90002657a70 R08: 0000000000000001 R09: fffff520004caf25
[  +0.000010] R10: 0000000000000003 R11: ffffffff8161d1d6 R12: ffff88810e988c00
[  +0.000010] R13: ffff888126fb5a00 R14: ffff88810e988c0c R15: ffff8881a9f78260
[  +0.000011] FS:  00007ff9ec848540(0000) GS:ffff8883cc880000(0000) knlGS:0000000000000000
[  +0.000012] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000010] CR2: 000055b3f7e14328 CR3: 00000001b5770000 CR4: 0000000000350ef0
[  +0.000010] Call Trace:
[  +0.000006]  &lt;TASK&gt;
[  +0.000007]  ? show_regs+0x6a/0x80
[  +0.000018]  ? __warn+0xa5/0x1b0
[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340
[  +0.000018]  ? report_bug+0x24a/0x290
[  +0.000022]  ? handle_bug+0x46/0x90
[  +0.000015]  ? exc_invalid_op+0x19/0x50
[  +0.000016]  ? asm_exc_invalid_op+0x1b/0x20
[  +0.000017]  ? kasan_save_stack+0x26/0x50
[  +0.000017]  ? mmu_interval_notifier_remove+0x23b/0x340
[  +0.000019]  ? mmu_interval_notifier_remove+0x327/0x340
[  +0.000019]  ? mmu_interval_notifier_remove+0x23b/0x340
[  +0.000020]  ? __pfx_mmu_interval_notifier_remove+0x10/0x10
[  +0.000017]  ? kasan_save_alloc_info+0x1e/0x30
[  +0.000018]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_kmalloc+0xb1/0xc0
[  +0.000018]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_read+0x11/0x20
[  +0.000020]  amdgpu_hmm_unregister+0x34/0x50 [amdgpu]
[  +0.004695]  amdgpu_gem_object_free+0x66/0xa0 [amdgpu]
[  +0.004534]  ? __pfx_amdgpu_gem_object_free+0x10/0x10 [amdgpu]
[  +0.004291]  ? do_syscall_64+0x5f/0xe0
[  +0.000023]  ? srso_return_thunk+0x5/0x5f
[  +0.000017]  drm_gem_object_free+0x3b/0x50 [drm]
[  +0.000489]  amdgpu_gem_userptr_ioctl+0x306/0x500 [amdgpu]
[  +0.004295]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004270]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __this_cpu_preempt_check+0x13/0x20
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? sysvec_apic_timer_interrupt+0x57/0xc0
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  +0.000022]  ? drm_ioctl_kernel+0x17b/0x1f0 [drm]
[  +0.000496]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004272]  ? drm_ioctl_kernel+0x190/0x1f0 [drm]
[  +0.000492]  drm_ioctl_kernel+0x140/0x1f0 [drm]
[  +0.000497]  ? __pfx_amdgpu_gem_userptr_ioctl+0x10/0x10 [amdgpu]
[  +0.004297]  ? __pfx_drm_ioctl_kernel+0x10/0x10 [d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222307">SUSE bug 1222307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26657" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26657" ref_url="https://www.suse.com/security/cve/CVE-2024-26657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: fix null-ptr-deref in init entity

The bug can be triggered by sending an amdgpu_cs_wait_ioctl
to the AMDGPU DRM driver on any ASICs with valid context.
The bug was reported by Joonkyo Jung &lt;joonkyoj@yonsei.ac.kr&gt;.
For example the following code:

    static void Syzkaller2(int fd)
    {
	union drm_amdgpu_ctx arg1;
	union drm_amdgpu_wait_cs arg2;

	arg1.in.op = AMDGPU_CTX_OP_ALLOC_CTX;
	ret = drmIoctl(fd, 0x140106442 /* amdgpu_ctx_ioctl */, &amp;arg1);

	arg2.in.handle = 0x0;
	arg2.in.timeout = 0x2000000000000;
	arg2.in.ip_type = AMD_IP_VPE /* 0x9 */;
	arg2-&gt;in.ip_instance = 0x0;
	arg2.in.ring = 0x0;
	arg2.in.ctx_id = arg1.out.alloc.ctx_id;

	drmIoctl(fd, 0xc0206449 /* AMDGPU_WAIT_CS * /, &amp;arg2);
    }

The ioctl AMDGPU_WAIT_CS without previously submitted job could be assumed that
the error should be returned, but the following commit 1decbf6bb0b4dc56c9da6c5e57b994ebfc2be3aa
modified the logic and allowed to have sched_rq equal to NULL.

As a result when there is no job the ioctl AMDGPU_WAIT_CS returns success.
The change fixes null-ptr-deref in init entity and the stack below demonstrates
the error condition:

[  +0.000007] BUG: kernel NULL pointer dereference, address: 0000000000000028
[  +0.007086] #PF: supervisor read access in kernel mode
[  +0.005234] #PF: error_code(0x0000) - not-present page
[  +0.005232] PGD 0 P4D 0
[  +0.002501] Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  +0.005034] CPU: 10 PID: 9229 Comm: amd_basic Tainted: G    B   W    L     6.7.0+ #4
[  +0.007797] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.009798] RIP: 0010:drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[  +0.006426] Code: 80 00 00 00 00 00 00 00 e8 1a 81 82 e0 49 89 9c 24 c0 00 00 00 4c 89 ef e8 4a 80 82 e0 49 8b 5d 00 48 8d 7b 28 e8 3d 80 82 e0 &lt;48&gt; 83 7b 28 00 0f 84 28 01 00 00 4d 8d ac 24 98 00 00 00 49 8d 5c
[  +0.019094] RSP: 0018:ffffc90014c1fa40 EFLAGS: 00010282
[  +0.005237] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffff8113f3fa
[  +0.007326] RDX: fffffbfff0a7889d RSI: 0000000000000008 RDI: ffffffff853c44e0
[  +0.007264] RBP: ffffc90014c1fa80 R08: 0000000000000001 R09: fffffbfff0a7889c
[  +0.007266] R10: ffffffff853c44e7 R11: 0000000000000001 R12: ffff8881a719b010
[  +0.007263] R13: ffff88810d412748 R14: 0000000000000002 R15: 0000000000000000
[  +0.007264] FS:  00007ffff7045540(0000) GS:ffff8883cc900000(0000) knlGS:0000000000000000
[  +0.008236] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.005851] CR2: 0000000000000028 CR3: 000000011912e000 CR4: 0000000000350ef0
[  +0.007175] Call Trace:
[  +0.002561]  &lt;TASK&gt;
[  +0.002141]  ? show_regs+0x6a/0x80
[  +0.003473]  ? __die+0x25/0x70
[  +0.003124]  ? page_fault_oops+0x214/0x720
[  +0.004179]  ? preempt_count_sub+0x18/0xc0
[  +0.004093]  ? __pfx_page_fault_oops+0x10/0x10
[  +0.004590]  ? srso_return_thunk+0x5/0x5f
[  +0.004000]  ? vprintk_default+0x1d/0x30
[  +0.004063]  ? srso_return_thunk+0x5/0x5f
[  +0.004087]  ? vprintk+0x5c/0x90
[  +0.003296]  ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[  +0.005807]  ? srso_return_thunk+0x5/0x5f
[  +0.004090]  ? _printk+0xb3/0xe0
[  +0.003293]  ? __pfx__printk+0x10/0x10
[  +0.003735]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[  +0.005482]  ? do_user_addr_fault+0x345/0x770
[  +0.004361]  ? exc_page_fault+0x64/0xf0
[  +0.003972]  ? asm_exc_page_fault+0x27/0x30
[  +0.004271]  ? add_taint+0x2a/0xa0
[  +0.003476]  ? drm_sched_entity_init+0x2d3/0x420 [gpu_sched]
[  +0.005812]  amdgpu_ctx_get_entity+0x3f9/0x770 [amdgpu]
[  +0.009530]  ? finish_task_switch.isra.0+0x129/0x470
[  +0.005068]  ? __pfx_amdgpu_ctx_get_entity+0x10/0x10 [amdgpu]
[  +0.010063]  ? __kasan_check_write+0x14/0x20
[  +0.004356]  ? srso_return_thunk+0x5/0x5f
[  +0.004001]  ? mutex_unlock+0x81/0xd0
[  +0.003802]  ? srso_return_thunk+0x5/0x5f
[  +0.004096]  amdgpu_cs_wait_ioctl+0xf6/0x270 [amdgpu]
[  +0.009355]  ? __pfx_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26657/">CVE-2024-26657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26657">CVE-2024-26657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222273">SUSE bug 1222273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26658" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26658" ref_url="https://www.suse.com/security/cve/CVE-2024-26658" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcachefs: grab s_umount only if snapshotting

When I was testing mongodb over bcachefs with compression,
there is a lockdep warning when snapshotting mongodb data volume.

$ cat test.sh
prog=bcachefs

$prog subvolume create /mnt/data
$prog subvolume create /mnt/data/snapshots

while true;do
    $prog subvolume snapshot /mnt/data /mnt/data/snapshots/$(date +%s)
    sleep 1s
done

$ cat /etc/mongodb.conf
systemLog:
  destination: file
  logAppend: true
  path: /mnt/data/mongod.log

storage:
  dbPath: /mnt/data/

lockdep reports:
[ 3437.452330] ======================================================
[ 3437.452750] WARNING: possible circular locking dependency detected
[ 3437.453168] 6.7.0-rc7-custom+ #85 Tainted: G            E
[ 3437.453562] ------------------------------------------------------
[ 3437.453981] bcachefs/35533 is trying to acquire lock:
[ 3437.454325] ffffa0a02b2b1418 (sb_writers#10){.+.+}-{0:0}, at: filename_create+0x62/0x190
[ 3437.454875]
               but task is already holding lock:
[ 3437.455268] ffffa0a02b2b10e0 (&amp;type-&gt;s_umount_key#48){.+.+}-{3:3}, at: bch2_fs_file_ioctl+0x232/0xc90 [bcachefs]
[ 3437.456009]
               which lock already depends on the new lock.

[ 3437.456553]
               the existing dependency chain (in reverse order) is:
[ 3437.457054]
               -&gt; #3 (&amp;type-&gt;s_umount_key#48){.+.+}-{3:3}:
[ 3437.457507]        down_read+0x3e/0x170
[ 3437.457772]        bch2_fs_file_ioctl+0x232/0xc90 [bcachefs]
[ 3437.458206]        __x64_sys_ioctl+0x93/0xd0
[ 3437.458498]        do_syscall_64+0x42/0xf0
[ 3437.458779]        entry_SYSCALL_64_after_hwframe+0x6e/0x76
[ 3437.459155]
               -&gt; #2 (&amp;c-&gt;snapshot_create_lock){++++}-{3:3}:
[ 3437.459615]        down_read+0x3e/0x170
[ 3437.459878]        bch2_truncate+0x82/0x110 [bcachefs]
[ 3437.460276]        bchfs_truncate+0x254/0x3c0 [bcachefs]
[ 3437.460686]        notify_change+0x1f1/0x4a0
[ 3437.461283]        do_truncate+0x7f/0xd0
[ 3437.461555]        path_openat+0xa57/0xce0
[ 3437.461836]        do_filp_open+0xb4/0x160
[ 3437.462116]        do_sys_openat2+0x91/0xc0
[ 3437.462402]        __x64_sys_openat+0x53/0xa0
[ 3437.462701]        do_syscall_64+0x42/0xf0
[ 3437.462982]        entry_SYSCALL_64_after_hwframe+0x6e/0x76
[ 3437.463359]
               -&gt; #1 (&amp;sb-&gt;s_type-&gt;i_mutex_key#15){+.+.}-{3:3}:
[ 3437.463843]        down_write+0x3b/0xc0
[ 3437.464223]        bch2_write_iter+0x5b/0xcc0 [bcachefs]
[ 3437.464493]        vfs_write+0x21b/0x4c0
[ 3437.464653]        ksys_write+0x69/0xf0
[ 3437.464839]        do_syscall_64+0x42/0xf0
[ 3437.465009]        entry_SYSCALL_64_after_hwframe+0x6e/0x76
[ 3437.465231]
               -&gt; #0 (sb_writers#10){.+.+}-{0:0}:
[ 3437.465471]        __lock_acquire+0x1455/0x21b0
[ 3437.465656]        lock_acquire+0xc6/0x2b0
[ 3437.465822]        mnt_want_write+0x46/0x1a0
[ 3437.465996]        filename_create+0x62/0x190
[ 3437.466175]        user_path_create+0x2d/0x50
[ 3437.466352]        bch2_fs_file_ioctl+0x2ec/0xc90 [bcachefs]
[ 3437.466617]        __x64_sys_ioctl+0x93/0xd0
[ 3437.466791]        do_syscall_64+0x42/0xf0
[ 3437.466957]        entry_SYSCALL_64_after_hwframe+0x6e/0x76
[ 3437.467180]
               other info that might help us debug this:

[ 3437.469670] 2 locks held by bcachefs/35533:
               other info that might help us debug this:

[ 3437.467507] Chain exists of:
                 sb_writers#10 --&gt; &amp;c-&gt;snapshot_create_lock --&gt; &amp;type-&gt;s_umount_key#48

[ 3437.467979]  Possible unsafe locking scenario:

[ 3437.468223]        CPU0                    CPU1
[ 3437.468405]        ----                    ----
[ 3437.468585]   rlock(&amp;type-&gt;s_umount_key#48);
[ 3437.468758]                                lock(&amp;c-&gt;snapshot_create_lock);
[ 3437.469030]                                lock(&amp;type-&gt;s_umount_key#48);
[ 3437.469291]   rlock(sb_writers#10);
[ 3437.469434]
                *** DEADLOCK ***

[ 3437.469
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26658/">CVE-2024-26658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26658">CVE-2024-26658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222315">SUSE bug 1222315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: handle isoc Babble and Buffer Overrun events properly

xHCI 4.9 explicitly forbids assuming that the xHC has released its
ownership of a multi-TRB TD when it reports an error on one of the
early TRBs. Yet the driver makes such assumption and releases the TD,
allowing the remaining TRBs to be freed or overwritten by new TDs.

The xHC should also report completion of the final TRB due to its IOC
flag being set by us, regardless of prior errors. This event cannot
be recognized if the TD has already been freed earlier, resulting in
"Transfer event TRB DMA ptr not part of current TD" error message.

Fix this by reusing the logic for processing isoc Transaction Errors.
This also handles hosts which fail to report the final completion.

Fix transfer length reporting on Babble errors. They may be caused by
device malfunction, no guarantee that the buffer has been filled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222317">SUSE bug 1222317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Implement bounds check for stream encoder creation in DCN301

'stream_enc_regs' array is an array of dcn10_stream_enc_registers
structures. The array is initialized with four elements, corresponding
to the four calls to stream_enc_regs() in the array initializer. This
means that valid indices for this array are 0, 1, 2, and 3.

The error message 'stream_enc_regs' 4 &lt;= 5 below, is indicating that
there is an attempt to access this array with an index of 5, which is
out of bounds. This could lead to undefined behavior

Here, eng_id is used as an index to access the stream_enc_regs array. If
eng_id is 5, this would result in an out-of-bounds access on the
stream_enc_regs array.

Thus fixing Buffer overflow error in dcn301_stream_encoder_create
reported by Smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn301/dcn301_resource.c:1011 dcn301_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 &lt;= 5
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222266">SUSE bug 1222266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()'

In "u32 otg_inst = pipe_ctx-&gt;stream_res.tg-&gt;inst;"
pipe_ctx-&gt;stream_res.tg could be NULL, it is relying on the caller to
ensure the tg is not NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222323">SUSE bug 1222323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26662" ref_url="https://www.suse.com/security/cve/CVE-2024-26662" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()'

'panel_cntl' structure used to control the display panel could be null,
dereferencing it could lead to a null pointer access.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn21/dcn21_hwseq.c:269 dcn21_set_backlight_level() error: we previously assumed 'panel_cntl' could be null (see line 250)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26662/">CVE-2024-26662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26662">CVE-2024-26662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222324">SUSE bug 1222324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Check the bearer type before calling tipc_udp_nl_bearer_add()

syzbot reported the following general protection fault [1]:

general protection fault, probably for non-canonical address 0xdffffc0000000010: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000080-0x0000000000000087]
...
RIP: 0010:tipc_udp_is_known_peer+0x9c/0x250 net/tipc/udp_media.c:291
...
Call Trace:
 &lt;TASK&gt;
 tipc_udp_nl_bearer_add+0x212/0x2f0 net/tipc/udp_media.c:646
 tipc_nl_bearer_add+0x21e/0x360 net/tipc/bearer.c:1089
 genl_family_rcv_msg_doit+0x1fc/0x2e0 net/netlink/genetlink.c:972
 genl_family_rcv_msg net/netlink/genetlink.c:1052 [inline]
 genl_rcv_msg+0x561/0x800 net/netlink/genetlink.c:1067
 netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2544
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
 netlink_unicast+0x53b/0x810 net/netlink/af_netlink.c:1367
 netlink_sendmsg+0x8b7/0xd70 net/netlink/af_netlink.c:1909
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0xd5/0x180 net/socket.c:745
 ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
 ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
 __sys_sendmsg+0x117/0x1e0 net/socket.c:2667
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

The cause of this issue is that when tipc_nl_bearer_add() is called with
the TIPC_NLA_BEARER_UDP_OPTS attribute, tipc_udp_nl_bearer_add() is called
even if the bearer is not UDP.

tipc_udp_is_known_peer() called by tipc_udp_nl_bearer_add() assumes that
the media_ptr field of the tipc_bearer has an udp_bearer type object, so
the function goes crazy for non-UDP bearers.

This patch fixes the issue by checking the bearer type before calling
tipc_udp_nl_bearer_add() in tipc_nl_bearer_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222326">SUSE bug 1222326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Fix out-of-bounds memory access

Fix a bug that pdata-&gt;cpu_map[] is set before out-of-bounds check.
The problem might be triggered on systems with more than 128 cores per
package.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222355">SUSE bug 1222355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26665" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tunnels: fix out of bounds access when building IPv6 PMTU error

If the ICMPv6 error is built from a non-linear skb we get the following
splat,

  BUG: KASAN: slab-out-of-bounds in do_csum+0x220/0x240
  Read of size 4 at addr ffff88811d402c80 by task netperf/820
  CPU: 0 PID: 820 Comm: netperf Not tainted 6.8.0-rc1+ #543
  ...
   kasan_report+0xd8/0x110
   do_csum+0x220/0x240
   csum_partial+0xc/0x20
   skb_tunnel_check_pmtu+0xeb9/0x3280
   vxlan_xmit_one+0x14c2/0x4080
   vxlan_xmit+0xf61/0x5c00
   dev_hard_start_xmit+0xfb/0x510
   __dev_queue_xmit+0x7cd/0x32a0
   br_dev_queue_push_xmit+0x39d/0x6a0

Use skb_checksum instead of csum_partial who cannot deal with non-linear
SKBs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222328">SUSE bug 1222328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26666" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26666" ref_url="https://www.suse.com/security/cve/CVE-2024-26666" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix RCU use in TDLS fast-xmit

This looks up the link under RCU protection, but isn't
guaranteed to actually have protection. Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26666/">CVE-2024-26666 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26666">CVE-2024-26666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222293">SUSE bug 1222293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup

The commit 8b45a26f2ba9 ("drm/msm/dpu: reserve cdm blocks for writeback
in case of YUV output") introduced a smatch warning about another
conditional block in dpu_encoder_helper_phys_cleanup() which had assumed
hw_pp will always be valid which may not necessarily be true.

Lets fix the other conditional block by making sure hw_pp is valid
before dereferencing it.

Patchwork: https://patchwork.freedesktop.org/patch/574878/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222331">SUSE bug 1222331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_limit: reject configurations that cause integer overflow

Reject bogus configs where internal token counter wraps around.
This only occurs with very very large requests, such as 17gbyte/s.

Its better to reject this rather than having incorrect ratelimit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222335">SUSE bug 1222335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26669" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: flower: Fix chain template offload

When a qdisc is deleted from a net device the stack instructs the
underlying driver to remove its flow offload callback from the
associated filter block using the 'FLOW_BLOCK_UNBIND' command. The stack
then continues to replay the removal of the filters in the block for
this driver by iterating over the chains in the block and invoking the
'reoffload' operation of the classifier being used. In turn, the
classifier in its 'reoffload' operation prepares and emits a
'FLOW_CLS_DESTROY' command for each filter.

However, the stack does not do the same for chain templates and the
underlying driver never receives a 'FLOW_CLS_TMPLT_DESTROY' command when
a qdisc is deleted. This results in a memory leak [1] which can be
reproduced using [2].

Fix by introducing a 'tmplt_reoffload' operation and have the stack
invoke it with the appropriate arguments as part of the replay.
Implement the operation in the sole classifier that supports chain
templates (flower) by emitting the 'FLOW_CLS_TMPLT_{CREATE,DESTROY}'
command based on whether a flow offload callback is being bound to a
filter block or being unbound from one.

As far as I can tell, the issue happens since cited commit which
reordered tcf_block_offload_unbind() before tcf_block_flush_all_chains()
in __tcf_block_put(). The order cannot be reversed as the filter block
is expected to be freed after flushing all the chains.

[1]
unreferenced object 0xffff888107e28800 (size 2048):
  comm "tc", pid 1079, jiffies 4294958525 (age 3074.287s)
  hex dump (first 32 bytes):
    b1 a6 7c 11 81 88 ff ff e0 5b b3 10 81 88 ff ff  ..|......[......
    01 00 00 00 00 00 00 00 e0 aa b0 84 ff ff ff ff  ................
  backtrace:
    [&lt;ffffffff81c06a68&gt;] __kmem_cache_alloc_node+0x1e8/0x320
    [&lt;ffffffff81ab374e&gt;] __kmalloc+0x4e/0x90
    [&lt;ffffffff832aec6d&gt;] mlxsw_sp_acl_ruleset_get+0x34d/0x7a0
    [&lt;ffffffff832bc195&gt;] mlxsw_sp_flower_tmplt_create+0x145/0x180
    [&lt;ffffffff832b2e1a&gt;] mlxsw_sp_flow_block_cb+0x1ea/0x280
    [&lt;ffffffff83a10613&gt;] tc_setup_cb_call+0x183/0x340
    [&lt;ffffffff83a9f85a&gt;] fl_tmplt_create+0x3da/0x4c0
    [&lt;ffffffff83a22435&gt;] tc_ctl_chain+0xa15/0x1170
    [&lt;ffffffff838a863c&gt;] rtnetlink_rcv_msg+0x3cc/0xed0
    [&lt;ffffffff83ac87f0&gt;] netlink_rcv_skb+0x170/0x440
    [&lt;ffffffff83ac6270&gt;] netlink_unicast+0x540/0x820
    [&lt;ffffffff83ac6e28&gt;] netlink_sendmsg+0x8d8/0xda0
    [&lt;ffffffff83793def&gt;] ____sys_sendmsg+0x30f/0xa80
    [&lt;ffffffff8379d29a&gt;] ___sys_sendmsg+0x13a/0x1e0
    [&lt;ffffffff8379d50c&gt;] __sys_sendmsg+0x11c/0x1f0
    [&lt;ffffffff843b9ce0&gt;] do_syscall_64+0x40/0xe0
unreferenced object 0xffff88816d2c0400 (size 1024):
  comm "tc", pid 1079, jiffies 4294958525 (age 3074.287s)
  hex dump (first 32 bytes):
    40 00 00 00 00 00 00 00 57 f6 38 be 00 00 00 00  @.......W.8.....
    10 04 2c 6d 81 88 ff ff 10 04 2c 6d 81 88 ff ff  ..,m......,m....
  backtrace:
    [&lt;ffffffff81c06a68&gt;] __kmem_cache_alloc_node+0x1e8/0x320
    [&lt;ffffffff81ab36c1&gt;] __kmalloc_node+0x51/0x90
    [&lt;ffffffff81a8ed96&gt;] kvmalloc_node+0xa6/0x1f0
    [&lt;ffffffff82827d03&gt;] bucket_table_alloc.isra.0+0x83/0x460
    [&lt;ffffffff82828d2b&gt;] rhashtable_init+0x43b/0x7c0
    [&lt;ffffffff832aed48&gt;] mlxsw_sp_acl_ruleset_get+0x428/0x7a0
    [&lt;ffffffff832bc195&gt;] mlxsw_sp_flower_tmplt_create+0x145/0x180
    [&lt;ffffffff832b2e1a&gt;] mlxsw_sp_flow_block_cb+0x1ea/0x280
    [&lt;ffffffff83a10613&gt;] tc_setup_cb_call+0x183/0x340
    [&lt;ffffffff83a9f85a&gt;] fl_tmplt_create+0x3da/0x4c0
    [&lt;ffffffff83a22435&gt;] tc_ctl_chain+0xa15/0x1170
    [&lt;ffffffff838a863c&gt;] rtnetlink_rcv_msg+0x3cc/0xed0
    [&lt;ffffffff83ac87f0&gt;] netlink_rcv_skb+0x170/0x440
    [&lt;ffffffff83ac6270&gt;] netlink_unicast+0x540/0x820
    [&lt;ffffffff83ac6e28&gt;] netlink_sendmsg+0x8d8/0xda0
    [&lt;ffffffff83793def&gt;] ____sys_sendmsg+0x30f/0xa80

[2]
 # tc qdisc add dev swp1 clsact
 # tc chain add dev swp1 ingress proto ip chain 1 flower dst_ip 0.0.0.0/32
 # tc qdisc del dev
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222350">SUSE bug 1222350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26670" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD

Currently the ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround isn't
quite right, as it is supposed to be applied after the last explicit
memory access, but is immediately followed by an LDR.

The ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround is used to
handle Cortex-A520 erratum 2966298 and Cortex-A510 erratum 3117295,
which are described in:

* https://developer.arm.com/documentation/SDEN2444153/0600/?lang=en
* https://developer.arm.com/documentation/SDEN1873361/1600/?lang=en

In both cases the workaround is described as:

| If pagetable isolation is disabled, the context switch logic in the
| kernel can be updated to execute the following sequence on affected
| cores before exiting to EL0, and after all explicit memory accesses:
|
| 1. A non-shareable TLBI to any context and/or address, including
|    unused contexts or addresses, such as a `TLBI VALE1 Xzr`.
|
| 2. A DSB NSH to guarantee completion of the TLBI.

The important part being that the TLBI+DSB must be placed "after all
explicit memory accesses".

Unfortunately, as-implemented, the TLBI+DSB is immediately followed by
an LDR, as we have:

| alternative_if ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD
| 	tlbi	vale1, xzr
| 	dsb	nsh
| alternative_else_nop_endif
| alternative_if_not ARM64_UNMAP_KERNEL_AT_EL0
| 	ldr	lr, [sp, #S_LR]
| 	add	sp, sp, #PT_REGS_SIZE		// restore sp
| 	eret
| alternative_else_nop_endif
|
| [ ... KPTI exception return path ... ]

This patch fixes this by reworking the logic to place the TLBI+DSB
immediately before the ERET, after all explicit memory accesses.

The ERET is currently in a separate alternative block, and alternatives
cannot be nested. To account for this, the alternative block for
ARM64_UNMAP_KERNEL_AT_EL0 is replaced with a single alternative branch
to skip the KPTI logic, with the new shape of the logic being:

| alternative_insn "b .L_skip_tramp_exit_\@", nop, ARM64_UNMAP_KERNEL_AT_EL0
| 	[ ... KPTI exception return path ... ]
| .L_skip_tramp_exit_\@:
|
| 	ldr	lr, [sp, #S_LR]
| 	add	sp, sp, #PT_REGS_SIZE		// restore sp
|
| alternative_if ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD
| 	tlbi	vale1, xzr
| 	dsb	nsh
| alternative_else_nop_endif
| 	eret

The new structure means that the workaround is only applied when KPTI is
not in use; this is fine as noted in the documented implications of the
erratum:

| Pagetable isolation between EL0 and higher level ELs prevents the
| issue from occurring.

... and as per the workaround description quoted above, the workaround
is only necessary "If pagetable isolation is disabled".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222356">SUSE bug 1222356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix IO hang from sbitmap wakeup race

In blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered
with the following blk_mq_get_driver_tag() in case of getting driver
tag failure.

Then in __sbitmap_queue_wake_up(), waitqueue_active() may not observe
the added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime
blk_mq_mark_tag_wait() can't get driver tag successfully.

This issue can be reproduced by running the following test in loop, and
fio hang can be observed in &lt; 30min when running it on my test VM
in laptop.

	modprobe -r scsi_debug
	modprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4
	dev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`
	fio --filename=/dev/"$dev" --direct=1 --rw=randrw --bs=4k --iodepth=1 \
       		--runtime=100 --numjobs=40 --time_based --name=test \
        	--ioengine=libaio

Fix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which
is just fine in case of running out of tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222357">SUSE bug 1222357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26672" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26672" ref_url="https://www.suse.com/security/cve/CVE-2024-26672" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix variable 'mca_funcs' dereferenced before NULL check in 'amdgpu_mca_smu_get_mca_entry()'

Fixes the below:

drivers/gpu/drm/amd/amdgpu/amdgpu_mca.c:377 amdgpu_mca_smu_get_mca_entry() warn: variable dereferenced before check 'mca_funcs' (see line 368)

357 int amdgpu_mca_smu_get_mca_entry(struct amdgpu_device *adev,
				     enum amdgpu_mca_error_type type,
358                                  int idx, struct mca_bank_entry *entry)
359 {
360         const struct amdgpu_mca_smu_funcs *mca_funcs =
						adev-&gt;mca.mca_funcs;
361         int count;
362
363         switch (type) {
364         case AMDGPU_MCA_ERROR_TYPE_UE:
365                 count = mca_funcs-&gt;max_ue_count;

mca_funcs is dereferenced here.

366                 break;
367         case AMDGPU_MCA_ERROR_TYPE_CE:
368                 count = mca_funcs-&gt;max_ce_count;

mca_funcs is dereferenced here.

369                 break;
370         default:
371                 return -EINVAL;
372         }
373
374         if (idx &gt;= count)
375                 return -EINVAL;
376
377         if (mca_funcs &amp;&amp; mca_funcs-&gt;mca_get_mca_entry)
	        ^^^^^^^^^

Checked too late!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26672/">CVE-2024-26672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26672">CVE-2024-26672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222358">SUSE bug 1222358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations

- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
- Disallow layer 4 protocol with no ports, since destination port is a
  mandatory attribute for this object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222368">SUSE bug 1222368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26674" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26674" ref_url="https://www.suse.com/security/cve/CVE-2024-26674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/lib: Revert to _ASM_EXTABLE_UA() for {get,put}_user() fixups

During memory error injection test on kernels &gt;= v6.4, the kernel panics
like below. However, this issue couldn't be reproduced on kernels &lt;= v6.3.

  mce: [Hardware Error]: CPU 296: Machine Check Exception: f Bank 1: bd80000000100134
  mce: [Hardware Error]: RIP 10:&lt;ffffffff821b9776&gt; {__get_user_nocheck_4+0x6/0x20}
  mce: [Hardware Error]: TSC 411a93533ed ADDR 346a8730040 MISC 86
  mce: [Hardware Error]: PROCESSOR 0:a06d0 TIME 1706000767 SOCKET 1 APIC 211 microcode 80001490
  mce: [Hardware Error]: Run the above through 'mcelog --ascii'
  mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
  Kernel panic - not syncing: Fatal local machine check

The MCA code can recover from an in-kernel #MC if the fixup type is
EX_TYPE_UACCESS, explicitly indicating that the kernel is attempting to
access userspace memory. However, if the fixup type is EX_TYPE_DEFAULT
the only thing that is raised for an in-kernel #MC is a panic.

ex_handler_uaccess() would warn if users gave a non-canonical addresses
(with bit 63 clear) to {get, put}_user(), which was unexpected.

Therefore, commit

  b19b74bc99b1 ("x86/mm: Rework address range check in get_user() and put_user()")

replaced _ASM_EXTABLE_UA() with _ASM_EXTABLE() for {get, put}_user()
fixups. However, the new fixup type EX_TYPE_DEFAULT results in a panic.

Commit

  6014bc27561f ("x86-64: make access_ok() independent of LAM")

added the check gp_fault_address_ok() right before the WARN_ONCE() in
ex_handler_uaccess() to not warn about non-canonical user addresses due
to LAM.

With that in place, revert back to _ASM_EXTABLE_UA() for {get,put}_user()
exception fixups in order to be able to handle in-kernel MCEs correctly
again.

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26674/">CVE-2024-26674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26674">CVE-2024-26674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222378">SUSE bug 1222378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp_async: limit MRU to 64K

syzbot triggered a warning [1] in __alloc_pages():

WARN_ON_ONCE_GFP(order &gt; MAX_PAGE_ORDER, gfp)

Willem fixed a similar issue in commit c0a2a1b0d631 ("ppp: limit MRU to 64K")

Adopt the same sanity check for ppp_async_ioctl(PPPIOCSMRU)

[1]:

 WARNING: CPU: 1 PID: 11 at mm/page_alloc.c:4543 __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
Modules linked in:
CPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted 6.8.0-rc2-syzkaller-g41bccc98fb79 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: events_unbound flush_to_ldisc
pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
 lr : __alloc_pages+0xc8/0x698 mm/page_alloc.c:4537
sp : ffff800093967580
x29: ffff800093967660 x28: ffff8000939675a0 x27: dfff800000000000
x26: ffff70001272ceb4 x25: 0000000000000000 x24: ffff8000939675c0
x23: 0000000000000000 x22: 0000000000060820 x21: 1ffff0001272ceb8
x20: ffff8000939675e0 x19: 0000000000000010 x18: ffff800093967120
x17: ffff800083bded5c x16: ffff80008ac97500 x15: 0000000000000005
x14: 1ffff0001272cebc x13: 0000000000000000 x12: 0000000000000000
x11: ffff70001272cec1 x10: 1ffff0001272cec0 x9 : 0000000000000001
x8 : ffff800091c91000 x7 : 0000000000000000 x6 : 000000000000003f
x5 : 00000000ffffffff x4 : 0000000000000000 x3 : 0000000000000020
x2 : 0000000000000008 x1 : 0000000000000000 x0 : ffff8000939675e0
Call trace:
  __alloc_pages+0x308/0x698 mm/page_alloc.c:4543
  __alloc_pages_node include/linux/gfp.h:238 [inline]
  alloc_pages_node include/linux/gfp.h:261 [inline]
  __kmalloc_large_node+0xbc/0x1fc mm/slub.c:3926
  __do_kmalloc_node mm/slub.c:3969 [inline]
  __kmalloc_node_track_caller+0x418/0x620 mm/slub.c:4001
  kmalloc_reserve+0x17c/0x23c net/core/skbuff.c:590
  __alloc_skb+0x1c8/0x3d8 net/core/skbuff.c:651
  __netdev_alloc_skb+0xb8/0x3e8 net/core/skbuff.c:715
  netdev_alloc_skb include/linux/skbuff.h:3235 [inline]
  dev_alloc_skb include/linux/skbuff.h:3248 [inline]
  ppp_async_input drivers/net/ppp/ppp_async.c:863 [inline]
  ppp_asynctty_receive+0x588/0x186c drivers/net/ppp/ppp_async.c:341
  tty_ldisc_receive_buf+0x12c/0x15c drivers/tty/tty_buffer.c:390
  tty_port_default_receive_buf+0x74/0xac drivers/tty/tty_port.c:37
  receive_buf drivers/tty/tty_buffer.c:444 [inline]
  flush_to_ldisc+0x284/0x6e4 drivers/tty/tty_buffer.c:494
  process_one_work+0x694/0x1204 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x938/0xef4 kernel/workqueue.c:2787
  kthread+0x288/0x310 kernel/kthread.c:388
  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222379">SUSE bug 1222379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26676" ref_url="https://www.suse.com/security/cve/CVE-2024-26676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Call kfree_skb() for dead unix_(sk)-&gt;oob_skb in GC.

syzbot reported a warning [0] in __unix_gc() with a repro, which
creates a socketpair and sends one socket's fd to itself using the
peer.

  socketpair(AF_UNIX, SOCK_STREAM, 0, [3, 4]) = 0
  sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\360", iov_len=1}],
          msg_iovlen=1, msg_control=[{cmsg_len=20, cmsg_level=SOL_SOCKET,
                                      cmsg_type=SCM_RIGHTS, cmsg_data=[3]}],
          msg_controllen=24, msg_flags=0}, MSG_OOB|MSG_PROBE|MSG_DONTWAIT|MSG_ZEROCOPY) = 1

This forms a self-cyclic reference that GC should finally untangle
but does not due to lack of MSG_OOB handling, resulting in memory
leak.

Recently, commit 11498715f266 ("af_unix: Remove io_uring code for
GC.") removed io_uring's dead code in GC and revealed the problem.

The code was executed at the final stage of GC and unconditionally
moved all GC candidates from gc_candidates to gc_inflight_list.
That papered over the reported problem by always making the following
WARN_ON_ONCE(!list_empty(&amp;gc_candidates)) false.

The problem has been there since commit 2aab4b969002 ("af_unix: fix
struct pid leaks in OOB support") added full scm support for MSG_OOB
while fixing another bug.

To fix this problem, we must call kfree_skb() for unix_sk(sk)-&gt;oob_skb
if the socket still exists in gc_candidates after purging collected skb.

Then, we need to set NULL to oob_skb before calling kfree_skb() because
it calls last fput() and triggers unix_release_sock(), where we call
duplicate kfree_skb(u-&gt;oob_skb) if not NULL.

Note that the leaked socket remained being linked to a global list, so
kmemleak also could not detect it.  We need to check /proc/net/protocol
to notice the unfreed socket.

[0]:
WARNING: CPU: 0 PID: 2863 at net/unix/garbage.c:345 __unix_gc+0xc74/0xe80 net/unix/garbage.c:345
Modules linked in:
CPU: 0 PID: 2863 Comm: kworker/u4:11 Not tainted 6.8.0-rc1-syzkaller-00583-g1701940b1a02 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Workqueue: events_unbound __unix_gc
RIP: 0010:__unix_gc+0xc74/0xe80 net/unix/garbage.c:345
Code: 8b 5c 24 50 e9 86 f8 ff ff e8 f8 e4 22 f8 31 d2 48 c7 c6 30 6a 69 89 4c 89 ef e8 97 ef ff ff e9 80 f9 ff ff e8 dd e4 22 f8 90 &lt;0f&gt; 0b 90 e9 7b fd ff ff 48 89 df e8 5c e7 7c f8 e9 d3 f8 ff ff e8
RSP: 0018:ffffc9000b03fba0 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffffc9000b03fc10 RCX: ffffffff816c493e
RDX: ffff88802c02d940 RSI: ffffffff896982f3 RDI: ffffc9000b03fb30
RBP: ffffc9000b03fce0 R08: 0000000000000001 R09: fffff52001607f66
R10: 0000000000000003 R11: 0000000000000002 R12: dffffc0000000000
R13: ffffc9000b03fc10 R14: ffffc9000b03fc10 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005559c8677a60 CR3: 000000000d57a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 process_one_work+0x889/0x15e0 kernel/workqueue.c:2633
 process_scheduled_works kernel/workqueue.c:2706 [inline]
 worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787
 kthread+0x2c6/0x3b0 kernel/kthread.c:388
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26676/">CVE-2024-26676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26676">CVE-2024-26676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222380">SUSE bug 1222380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26678" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26678" ref_url="https://www.suse.com/security/cve/CVE-2024-26678" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/efistub: Use 1:1 file:memory mapping for PE/COFF .compat section

The .compat section is a dummy PE section that contains the address of
the 32-bit entrypoint of the 64-bit kernel image if it is bootable from
32-bit firmware (i.e., CONFIG_EFI_MIXED=y)

This section is only 8 bytes in size and is only referenced from the
loader, and so it is placed at the end of the memory view of the image,
to avoid the need for padding it to 4k, which is required for sections
appearing in the middle of the image.

Unfortunately, this violates the PE/COFF spec, and even if most EFI
loaders will work correctly (including the Tianocore reference
implementation), PE loaders do exist that reject such images, on the
basis that both the file and memory views of the file contents should be
described by the section headers in a monotonically increasing manner
without leaving any gaps.

So reorganize the sections to avoid this issue. This results in a slight
padding overhead (&lt; 4k) which can be avoided if desired by disabling
CONFIG_EFI_MIXED (which is only needed in rare cases these days)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26678/">CVE-2024-26678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26678">CVE-2024-26678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222292">SUSE bug 1222292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: read sk-&gt;sk_family once in inet_recv_error()

inet_recv_error() is called without holding the socket lock.

IPv6 socket could mutate to IPv4 with IPV6_ADDRFORM
socket option and trigger a KCSAN warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222385">SUSE bug 1222385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: Fix DMA mapping for PTP hwts ring

Function aq_ring_hwts_rx_alloc() maps extra AQ_CFG_RXDS_DEF bytes
for PTP HWTS ring but then generic aq_ring_free() does not take this
into account.
Create and use a specific function to free HWTS ring to fix this
issue.

Trace:
[  215.351607] ------------[ cut here ]------------
[  215.351612] DMA-API: atlantic 0000:4b:00.0: device driver frees DMA memory with different size [device address=0x00000000fbdd0000] [map size=34816 bytes] [unmap size=32768 bytes]
[  215.351635] WARNING: CPU: 33 PID: 10759 at kernel/dma/debug.c:988 check_unmap+0xa6f/0x2360
...
[  215.581176] Call Trace:
[  215.583632]  &lt;TASK&gt;
[  215.585745]  ? show_trace_log_lvl+0x1c4/0x2df
[  215.590114]  ? show_trace_log_lvl+0x1c4/0x2df
[  215.594497]  ? debug_dma_free_coherent+0x196/0x210
[  215.599305]  ? check_unmap+0xa6f/0x2360
[  215.603147]  ? __warn+0xca/0x1d0
[  215.606391]  ? check_unmap+0xa6f/0x2360
[  215.610237]  ? report_bug+0x1ef/0x370
[  215.613921]  ? handle_bug+0x3c/0x70
[  215.617423]  ? exc_invalid_op+0x14/0x50
[  215.621269]  ? asm_exc_invalid_op+0x16/0x20
[  215.625480]  ? check_unmap+0xa6f/0x2360
[  215.629331]  ? mark_lock.part.0+0xca/0xa40
[  215.633445]  debug_dma_free_coherent+0x196/0x210
[  215.638079]  ? __pfx_debug_dma_free_coherent+0x10/0x10
[  215.643242]  ? slab_free_freelist_hook+0x11d/0x1d0
[  215.648060]  dma_free_attrs+0x6d/0x130
[  215.651834]  aq_ring_free+0x193/0x290 [atlantic]
[  215.656487]  aq_ptp_ring_free+0x67/0x110 [atlantic]
...
[  216.127540] ---[ end trace 6467e5964dd2640b ]---
[  216.132160] DMA-API: Mapped at:
[  216.132162]  debug_dma_alloc_coherent+0x66/0x2f0
[  216.132165]  dma_alloc_attrs+0xf5/0x1b0
[  216.132168]  aq_ring_hwts_rx_alloc+0x150/0x1f0 [atlantic]
[  216.132193]  aq_ptp_ring_alloc+0x1bb/0x540 [atlantic]
[  216.132213]  aq_nic_init+0x4a1/0x760 [atlantic]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222427">SUSE bug 1222427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: avoid potential loop in nsim_dev_trap_report_work()

Many syzbot reports include the following trace [1]

If nsim_dev_trap_report_work() can not grab the mutex,
it should rearm itself at least one jiffie later.

[1]
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 32383 Comm: kworker/0:2 Not tainted 6.8.0-rc2-syzkaller-00031-g861c0981648f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Workqueue: events nsim_dev_trap_report_work
 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:89 [inline]
 RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]
 RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]
 RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]
 RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
 RIP: 0010:kasan_check_range+0x101/0x190 mm/kasan/generic.c:189
Code: 07 49 39 d1 75 0a 45 3a 11 b8 01 00 00 00 7c 0b 44 89 c2 e8 21 ed ff ff 83 f0 01 5b 5d 41 5c c3 48 85 d2 74 4f 48 01 ea eb 09 &lt;48&gt; 83 c0 01 48 39 d0 74 41 80 38 00 74 f2 eb b6 41 bc 08 00 00 00
RSP: 0018:ffffc90012dcf998 EFLAGS: 00000046
RAX: fffffbfff258af1e RBX: fffffbfff258af1f RCX: ffffffff8168eda3
RDX: fffffbfff258af1f RSI: 0000000000000004 RDI: ffffffff92c578f0
RBP: fffffbfff258af1e R08: 0000000000000000 R09: fffffbfff258af1e
R10: ffffffff92c578f3 R11: ffffffff8acbcbc0 R12: 0000000000000002
R13: ffff88806db38400 R14: 1ffff920025b9f42 R15: ffffffff92c578e8
FS:  0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c00994e078 CR3: 000000002c250000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
  instrument_atomic_read include/linux/instrumented.h:68 [inline]
  atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline]
  queued_spin_is_locked include/asm-generic/qspinlock.h:57 [inline]
  debug_spin_unlock kernel/locking/spinlock_debug.c:101 [inline]
  do_raw_spin_unlock+0x53/0x230 kernel/locking/spinlock_debug.c:141
  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:150 [inline]
  _raw_spin_unlock_irqrestore+0x22/0x70 kernel/locking/spinlock.c:194
  debug_object_activate+0x349/0x540 lib/debugobjects.c:726
  debug_work_activate kernel/workqueue.c:578 [inline]
  insert_work+0x30/0x230 kernel/workqueue.c:1650
  __queue_work+0x62e/0x11d0 kernel/workqueue.c:1802
  __queue_delayed_work+0x1bf/0x270 kernel/workqueue.c:1953
  queue_delayed_work_on+0x106/0x130 kernel/workqueue.c:1989
  queue_delayed_work include/linux/workqueue.h:563 [inline]
  schedule_delayed_work include/linux/workqueue.h:677 [inline]
  nsim_dev_trap_report_work+0x9c0/0xc80 drivers/net/netdevsim/dev.c:842
  process_one_work+0x886/0x15d0 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x8b9/0x1290 kernel/workqueue.c:2787
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222431">SUSE bug 1222431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26682" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26682" ref_url="https://www.suse.com/security/cve/CVE-2024-26682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: improve CSA/ECSA connection refusal

As mentioned in the previous commit, we pretty quickly found
that some APs have ECSA elements stuck in their probe response,
so using that to not attempt to connect while CSA is happening
we never connect to such an AP.

Improve this situation by checking more carefully and ignoring
the ECSA if cfg80211 has previously detected the ECSA element
being stuck in the probe response.

Additionally, allow connecting to an AP that's switching to a
channel it's already using, unless it's using quiet mode. In
this case, we may just have to adjust bandwidth later. If it's
actually switching channels, it's better not to try to connect
in the middle of that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26682/">CVE-2024-26682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26682">CVE-2024-26682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222433">SUSE bug 1222433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26683" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26683" ref_url="https://www.suse.com/security/cve/CVE-2024-26683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: detect stuck ECSA element in probe resp

We recently added some validation that we don't try to
connect to an AP that is currently in a channel switch
process, since that might want the channel to be quiet
or we might not be able to connect in time to hear the
switching in a beacon. This was in commit c09c4f31998b
("wifi: mac80211: don't connect to an AP while it's in
a CSA process").

However, we promptly got a report that this caused new
connection failures, and it turns out that the AP that
we now cannot connect to is permanently advertising an
extended channel switch announcement, even with quiet.
The AP in question was an Asus RT-AC53, with firmware
3.0.0.4.380_10760-g21a5898.

As a first step, attempt to detect that we're dealing
with such a situation, so mac80211 can use this later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26683/">CVE-2024-26683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26683">CVE-2024-26683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222434">SUSE bug 1222434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26684" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: xgmac: fix handling of DPP safety error for DMA channels

Commit 56e58d6c8a56 ("net: stmmac: Implement Safety Features in
XGMAC core") checks and reports safety errors, but leaves the
Data Path Parity Errors for each channel in DMA unhandled at all, lead to
a storm of interrupt.
Fix it by checking and clearing the DMA_DPP_Interrupt_Status register.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222445">SUSE bug 1222445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential bug in end_buffer_async_write

According to a syzbot report, end_buffer_async_write(), which handles the
completion of block device writes, may detect abnormal condition of the
buffer async_write flag and cause a BUG_ON failure when using nilfs2.

Nilfs2 itself does not use end_buffer_async_write().  But, the async_write
flag is now used as a marker by commit 7f42ec394156 ("nilfs2: fix issue
with race condition of competition between segments for dirty blocks") as
a means of resolving double list insertion of dirty blocks in
nilfs_lookup_dirty_data_buffers() and nilfs_lookup_node_buffers() and the
resulting crash.

This modification is safe as long as it is used for file data and b-tree
node blocks where the page caches are independent.  However, it was
irrelevant and redundant to also introduce async_write for segment summary
and super root blocks that share buffers with the backing device.  This
led to the possibility that the BUG_ON check in end_buffer_async_write
would fail as described above, if independent writebacks of the backing
device occurred in parallel.

The use of async_write for segment summary buffers has already been
removed in a previous change.

Fix this issue by removing the manipulation of the async_write flag for
the remaining super root block buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222437">SUSE bug 1222437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/events: close evtchn after mapping cleanup

shutdown_pirq and startup_pirq are not taking the
irq_mapping_update_lock because they can't due to lock inversion. Both
are called with the irq_desc-&gt;lock being taking. The lock order,
however, is first irq_mapping_update_lock and then irq_desc-&gt;lock.

This opens multiple races:
- shutdown_pirq can be interrupted by a function that allocates an event
  channel:

  CPU0                        CPU1
  shutdown_pirq {
    xen_evtchn_close(e)
                              __startup_pirq {
                                EVTCHNOP_bind_pirq
                                  -&gt; returns just freed evtchn e
                                set_evtchn_to_irq(e, irq)
                              }
    xen_irq_info_cleanup() {
      set_evtchn_to_irq(e, -1)
    }
  }

  Assume here event channel e refers here to the same event channel
  number.
  After this race the evtchn_to_irq mapping for e is invalid (-1).

- __startup_pirq races with __unbind_from_irq in a similar way. Because
  __startup_pirq doesn't take irq_mapping_update_lock it can grab the
  evtchn that __unbind_from_irq is currently freeing and cleaning up. In
  this case even though the event channel is allocated, its mapping can
  be unset in evtchn_to_irq.

The fix is to first cleanup the mappings and then close the event
channel. In this way, when an event channel gets allocated it's
potential previous evtchn_to_irq mappings are guaranteed to be unset already.
This is also the reverse order of the allocation where first the event
channel is allocated and then the mappings are setup.

On a 5.10 kernel prior to commit 3fcdaf3d7634 ("xen/events: modify internal
[un]bind interfaces"), we hit a BUG like the following during probing of NVMe
devices. The issue is that during nvme_setup_io_queues, pci_free_irq
is called for every device which results in a call to shutdown_pirq.
With many nvme devices it's therefore likely to hit this race during
boot because there will be multiple calls to shutdown_pirq and
startup_pirq are running potentially in parallel.

  ------------[ cut here ]------------
  blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled
  kernel BUG at drivers/xen/events/events_base.c:499!
  invalid opcode: 0000 [#1] SMP PTI
  CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1
  Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006
  Workqueue: nvme-reset-wq nvme_reset_work
  RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0
  Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff &lt;0f&gt; 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00
  RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006
  RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff
  RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00
  R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed
  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002
  FS:  0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? show_trace_log_lvl+0x1c1/0x2d9
   ? set_affinity_irq+0xdc/0x1c0
   ? __die_body.cold+0x8/0xd
   ? die+0x2b/0x50
   ? do_trap+0x90/0x110
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? do_error_trap+0x65/0x80
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? exc_invalid_op+0x4e/0x70
   ? bind_evtchn_to_cpu+0xdf/0xf0
   ? asm_exc_invalid_op+0x12/0x20
   ? bind_evtchn_to_cpu+0xdf/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super

When configuring a hugetlb filesystem via the fsconfig() syscall, there is
a possible NULL dereference in hugetlbfs_fill_super() caused by assigning
NULL to ctx-&gt;hstate in hugetlbfs_parse_param() when the requested pagesize
is non valid.

E.g: Taking the following steps:

     fd = fsopen("hugetlbfs", FSOPEN_CLOEXEC);
     fsconfig(fd, FSCONFIG_SET_STRING, "pagesize", "1024", 0);
     fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0);

Given that the requested "pagesize" is invalid, ctxt-&gt;hstate will be replaced
with NULL, losing its previous value, and we will print an error:

 ...
 ...
 case Opt_pagesize:
 ps = memparse(param-&gt;string, &amp;rest);
 ctx-&gt;hstate = h;
 if (!ctx-&gt;hstate) {
         pr_err("Unsupported page size %lu MB\n", ps / SZ_1M);
         return -EINVAL;
 }
 return 0;
 ...
 ...

This is a problem because later on, we will dereference ctxt-&gt;hstate in
hugetlbfs_fill_super()

 ...
 ...
 sb-&gt;s_blocksize = huge_page_size(ctx-&gt;hstate);
 ...
 ...

Causing below Oops.

Fix this by replacing cxt-&gt;hstate value only when then pagesize is known
to be valid.

 kernel: hugetlbfs: Unsupported page size 0 MB
 kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028
 kernel: #PF: supervisor read access in kernel mode
 kernel: #PF: error_code(0x0000) - not-present page
 kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0
 kernel: Oops: 0000 [#1] PREEMPT SMP PTI
 kernel: CPU: 4 PID: 5659 Comm: syscall Tainted: G            E      6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344aabc35190ae8f
 kernel: Hardware name: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 05/03/2017
 kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0
 kernel: Code: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 &lt;8b&gt; 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28
 kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246
 kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004
 kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff RDI: ffff9af555e9b000
 kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004
 kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000
 kernel: R13: ffffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400
 kernel: FS:  00007ffbc0ba4740(0000) GS:ffff9b0bd7000000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die_body+0x1a/0x60
 kernel:  ? page_fault_oops+0x16f/0x4a0
 kernel:  ? search_bpf_extables+0x65/0x70
 kernel:  ? fixup_exception+0x22/0x310
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  ? hugetlbfs_fill_super+0xb4/0x1a0
 kernel:  ? hugetlbfs_fill_super+0x28/0x1a0
 kernel:  ? __pfx_hugetlbfs_fill_super+0x10/0x10
 kernel:  vfs_get_super+0x40/0xa0
 kernel:  ? __pfx_bpf_lsm_capable+0x10/0x10
 kernel:  vfs_get_tree+0x25/0xd0
 kernel:  vfs_cmd_create+0x64/0xe0
 kernel:  __x64_sys_fsconfig+0x395/0x410
 kernel:  do_syscall_64+0x80/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? syscall_exit_to_user_mode+0x82/0x240
 kernel:  ? do_syscall_64+0x8d/0x160
 kernel:  ? exc_page_fault+0x69/0x150
 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0x76
 kernel: RIP: 0033:0x7ffbc0cb87c9
 kernel: Code: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48
 kernel: RSP: 002b:00007ffc29d2f388 EFLAGS: 00000206 ORIG_RAX: 00000000000001af
 kernel: RAX: fffffffffff
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: prevent use-after-free in encode_cap_msg()

In fs/ceph/caps.c, in encode_cap_msg(), "use after free" error was
caught by KASAN at this line - 'ceph_buffer_get(arg-&gt;xattr_buf);'. This
implies before the refcount could be increment here, it was freed.

In same file, in "handle_cap_grant()" refcount is decremented by this
line - 'ceph_buffer_put(ci-&gt;i_xattrs.blob);'. It appears that a race
occurred and resource was freed by the latter line before the former
line could increment it.

encode_cap_msg() is called by __send_cap() and __send_cap() is called by
ceph_check_caps() after calling __prep_cap(). __prep_cap() is where
arg-&gt;xattr_buf is assigned to ci-&gt;i_xattrs.blob. This is the spot where
the refcount must be increased to prevent "use after free" error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26690" ref_url="https://www.suse.com/security/cve/CVE-2024-26690" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: protect updates of 64-bit statistics counters

As explained by a comment in &lt;linux/u64_stats_sync.h&gt;, write side of struct
u64_stats_sync must ensure mutual exclusion, or one seqcount update could
be lost on 32-bit platforms, thus blocking readers forever. Such lockups
have been observed in real world after stmmac_xmit() on one CPU raced with
stmmac_napi_poll_tx() on another CPU.

To fix the issue without introducing a new lock, split the statics into
three parts:

1. fields updated only under the tx queue lock,
2. fields updated only during NAPI poll,
3. fields updated only from interrupt context,

Updates to fields in the first two groups are already serialized through
other locks. It is sufficient to split the existing struct u64_stats_sync
so that each group has its own.

Note that tx_set_ic_bit is updated from both contexts. Split this counter
so that each context gets its own, and calculate their sum to get the total
value in stmmac_get_ethtool_stats().

For the third group, multiple interrupts may be processed by different CPUs
at the same time, but interrupts on the same CPU will not nest. Move fields
from this group to a newly created per-cpu struct stmmac_pcpu_stats.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26690/">CVE-2024-26690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26690">CVE-2024-26690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222462">SUSE bug 1222462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26691" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26691" ref_url="https://www.suse.com/security/cve/CVE-2024-26691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix circular locking dependency

The rule inside kvm enforces that the vcpu-&gt;mutex is taken *inside*
kvm-&gt;lock. The rule is violated by the pkvm_create_hyp_vm() which acquires
the kvm-&gt;lock while already holding the vcpu-&gt;mutex lock from
kvm_vcpu_ioctl(). Avoid the circular locking dependency altogether by
protecting the hyp vm handle with the config_lock, much like we already
do for other forms of VM-scoped data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26691/">CVE-2024-26691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26691">CVE-2024-26691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222463">SUSE bug 1222463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Fix regression in writes when non-standard maximum write size negotiated

The conversion to netfs in the 6.3 kernel caused a regression when
maximum write size is set by the server to an unexpected value which is
not a multiple of 4096 (similarly if the user overrides the maximum
write size by setting mount parm "wsize", but sets it to a value that
is not a multiple of 4096).  When negotiated write size is not a
multiple of 4096 the netfs code can skip the end of the final
page when doing large sequential writes, causing data corruption.

This section of code is being rewritten/removed due to a large
netfs change, but until that point (ie for the 6.3 kernel until now)
we can not support non-standard maximum write sizes.

Add a warning if a user specifies a wsize on mount that is not
a multiple of 4096 (and round down), also add a change where we
round down the maximum write size if the server negotiates a value
that is not a multiple of 4096 (we also have to check to make sure that
we do not round it down to zero).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222464">SUSE bug 1222464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26693" ref_url="https://www.suse.com/security/cve/CVE-2024-26693" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: fix a crash when we run out of stations

A DoS tool that injects loads of authentication frames made our AP
crash. The iwl_mvm_is_dup() function couldn't find the per-queue
dup_data which was not allocated.

The root cause for that is that we ran out of stations in the firmware
and we didn't really add the station to the firmware, yet we didn't
return an error to mac80211.
Mac80211 was thinking that we have the station and because of that,
sta_info::uploaded was set to 1. This allowed
ieee80211_find_sta_by_ifaddr() to return a valid station object, but
that ieee80211_sta didn't have any iwl_mvm_sta object initialized and
that caused the crash mentioned earlier when we got Rx on that station.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26693/">CVE-2024-26693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26693">CVE-2024-26693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222451">SUSE bug 1222451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26694" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26694" ref_url="https://www.suse.com/security/cve/CVE-2024-26694" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fix double-free bug

The storage for the TLV PC register data wasn't done like all
the other storage in the drv-&gt;fw area, which is cleared at the
end of deallocation. Therefore, the freeing must also be done
differently, explicitly NULL'ing it out after the free, since
otherwise there's a nasty double-free bug here if a file fails
to load after this has been parsed, and we get another free
later (e.g. because no other file exists.) Fix that by adding
the missing NULL assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26694/">CVE-2024-26694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26694">CVE-2024-26694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222466">SUSE bug 1222466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked

The SEV platform device can be shutdown with a null psp_master,
e.g., using DEBUG_TEST_DRIVER_REMOVE.  Found using KASAN:

[  137.148210] ccp 0000:23:00.1: enabling device (0000 -&gt; 0002)
[  137.162647] ccp 0000:23:00.1: no command queues available
[  137.170598] ccp 0000:23:00.1: sev enabled
[  137.174645] ccp 0000:23:00.1: psp enabled
[  137.178890] general protection fault, probably for non-canonical address 0xdffffc000000001e: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN NOPTI
[  137.182693] KASAN: null-ptr-deref in range [0x00000000000000f0-0x00000000000000f7]
[  137.182693] CPU: 93 PID: 1 Comm: swapper/0 Not tainted 6.8.0-rc1+ #311
[  137.182693] RIP: 0010:__sev_platform_shutdown_locked+0x51/0x180
[  137.182693] Code: 08 80 3c 08 00 0f 85 0e 01 00 00 48 8b 1d 67 b6 01 08 48 b8 00 00 00 00 00 fc ff df 48 8d bb f0 00 00 00 48 89 f9 48 c1 e9 03 &lt;80&gt; 3c 01 00 0f 85 fe 00 00 00 48 8b 9b f0 00 00 00 48 85 db 74 2c
[  137.182693] RSP: 0018:ffffc900000cf9b0 EFLAGS: 00010216
[  137.182693] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 000000000000001e
[  137.182693] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 00000000000000f0
[  137.182693] RBP: ffffc900000cf9c8 R08: 0000000000000000 R09: fffffbfff58f5a66
[  137.182693] R10: ffffc900000cf9c8 R11: ffffffffac7ad32f R12: ffff8881e5052c28
[  137.182693] R13: ffff8881e5052c28 R14: ffff8881758e43e8 R15: ffffffffac64abf8
[  137.182693] FS:  0000000000000000(0000) GS:ffff889de7000000(0000) knlGS:0000000000000000
[  137.182693] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  137.182693] CR2: 0000000000000000 CR3: 0000001cf7c7e000 CR4: 0000000000350ef0
[  137.182693] Call Trace:
[  137.182693]  &lt;TASK&gt;
[  137.182693]  ? show_regs+0x6c/0x80
[  137.182693]  ? __die_body+0x24/0x70
[  137.182693]  ? die_addr+0x4b/0x80
[  137.182693]  ? exc_general_protection+0x126/0x230
[  137.182693]  ? asm_exc_general_protection+0x2b/0x30
[  137.182693]  ? __sev_platform_shutdown_locked+0x51/0x180
[  137.182693]  sev_firmware_shutdown.isra.0+0x1e/0x80
[  137.182693]  sev_dev_destroy+0x49/0x100
[  137.182693]  psp_dev_destroy+0x47/0xb0
[  137.182693]  sp_destroy+0xbb/0x240
[  137.182693]  sp_pci_remove+0x45/0x60
[  137.182693]  pci_device_remove+0xaa/0x1d0
[  137.182693]  device_remove+0xc7/0x170
[  137.182693]  really_probe+0x374/0xbe0
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  __driver_probe_device+0x199/0x460
[  137.182693]  driver_probe_device+0x4e/0xd0
[  137.182693]  __driver_attach+0x191/0x3d0
[  137.182693]  ? __pfx___driver_attach+0x10/0x10
[  137.182693]  bus_for_each_dev+0x100/0x190
[  137.182693]  ? __pfx_bus_for_each_dev+0x10/0x10
[  137.182693]  ? __kasan_check_read+0x15/0x20
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  ? _raw_spin_unlock+0x27/0x50
[  137.182693]  driver_attach+0x41/0x60
[  137.182693]  bus_add_driver+0x2a8/0x580
[  137.182693]  driver_register+0x141/0x480
[  137.182693]  __pci_register_driver+0x1d6/0x2a0
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  ? esrt_sysfs_init+0x1cd/0x5d0
[  137.182693]  ? __pfx_sp_mod_init+0x10/0x10
[  137.182693]  sp_pci_init+0x22/0x30
[  137.182693]  sp_mod_init+0x14/0x30
[  137.182693]  ? __pfx_sp_mod_init+0x10/0x10
[  137.182693]  do_one_initcall+0xd1/0x470
[  137.182693]  ? __pfx_do_one_initcall+0x10/0x10
[  137.182693]  ? parameq+0x80/0xf0
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  ? __kmalloc+0x3b0/0x4e0
[  137.182693]  ? kernel_init_freeable+0x92d/0x1050
[  137.182693]  ? kasan_populate_vmalloc_pte+0x171/0x190
[  137.182693]  ? srso_return_thunk+0x5/0x5f
[  137.182693]  kernel_init_freeable+0xa64/0x1050
[  137.182693]  ? __pfx_kernel_init+0x10/0x10
[  137.182693]  kernel_init+0x24/0x160
[  137.182693]  ? __switch_to_asm+0x3e/0x70
[  137.182693]  ret_from_fork+0x40/0x80
[  137.182693]  ? __pfx_kernel_init+0x1
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222373">SUSE bug 1222373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()

Syzbot reported a hang issue in migrate_pages_batch() called by mbind()
and nilfs_lookup_dirty_data_buffers() called in the log writer of nilfs2.

While migrate_pages_batch() locks a folio and waits for the writeback to
complete, the log writer thread that should bring the writeback to
completion picks up the folio being written back in
nilfs_lookup_dirty_data_buffers() that it calls for subsequent log
creation and was trying to lock the folio.  Thus causing a deadlock.

In the first place, it is unexpected that folios/pages in the middle of
writeback will be updated and become dirty.  Nilfs2 adds a checksum to
verify the validity of the log being written and uses it for recovery at
mount, so data changes during writeback are suppressed.  Since this is
broken, an unclean shutdown could potentially cause recovery to fail.

Investigation revealed that the root cause is that the wait for writeback
completion in nilfs_page_mkwrite() is conditional, and if the backing
device does not require stable writes, data may be modified without
waiting.

Fix these issues by making nilfs_page_mkwrite() wait for writeback to
finish regardless of the stable write requirement of the backing device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222549">SUSE bug 1222549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26697" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix data corruption in dsync block recovery for small block sizes

The helper function nilfs_recovery_copy_block() of
nilfs_recovery_dsync_blocks(), which recovers data from logs created by
data sync writes during a mount after an unclean shutdown, incorrectly
calculates the on-page offset when copying repair data to the file's page
cache.  In environments where the block size is smaller than the page
size, this flaw can cause data corruption and leak uninitialized memory
bytes during the recovery process.

Fix these issues by correcting this byte offset calculation on the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222550">SUSE bug 1222550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26698" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove

In commit ac5047671758 ("hv_netvsc: Disable NAPI before closing the
VMBus channel"), napi_disable was getting called for all channels,
including all subchannels without confirming if they are enabled or not.

This caused hv_netvsc getting hung at napi_disable, when netvsc_probe()
has finished running but nvdev-&gt;subchan_work has not started yet.
netvsc_subchan_work() -&gt; rndis_set_subchannel() has not created the
sub-channels and because of that netvsc_sc_open() is not running.
netvsc_remove() calls cancel_work_sync(&amp;nvdev-&gt;subchan_work), for which
netvsc_subchan_work did not run.

netif_napi_add() sets the bit NAPI_STATE_SCHED because it ensures NAPI
cannot be scheduled. Then netvsc_sc_open() -&gt; napi_enable will clear the
NAPIF_STATE_SCHED bit, so it can be scheduled. napi_disable() does the
opposite.

Now during netvsc_device_remove(), when napi_disable is called for those
subchannels, napi_disable gets stuck on infinite msleep.

This fix addresses this problem by ensuring that napi_disable() is not
getting called for non-enabled NAPI struct.
But netif_napi_del() is still necessary for these non-enabled NAPI struct
for cleanup purpose.

Call trace:
[  654.559417] task:modprobe        state:D stack:    0 pid: 2321 ppid:  1091 flags:0x00004002
[  654.568030] Call Trace:
[  654.571221]  &lt;TASK&gt;
[  654.573790]  __schedule+0x2d6/0x960
[  654.577733]  schedule+0x69/0xf0
[  654.581214]  schedule_timeout+0x87/0x140
[  654.585463]  ? __bpf_trace_tick_stop+0x20/0x20
[  654.590291]  msleep+0x2d/0x40
[  654.593625]  napi_disable+0x2b/0x80
[  654.597437]  netvsc_device_remove+0x8a/0x1f0 [hv_netvsc]
[  654.603935]  rndis_filter_device_remove+0x194/0x1c0 [hv_netvsc]
[  654.611101]  ? do_wait_intr+0xb0/0xb0
[  654.615753]  netvsc_remove+0x7c/0x120 [hv_netvsc]
[  654.621675]  vmbus_remove+0x27/0x40 [hv_vmbus]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222374">SUSE bug 1222374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26699" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26699" ref_url="https://www.suse.com/security/cve/CVE-2024-26699" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr

[Why]
There is a potential memory access violation while
iterating through array of dcn35 clks.

[How]
Limit iteration per array size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26699/">CVE-2024-26699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26699">CVE-2024-26699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222602">SUSE bug 1222602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix MST Null Ptr for RV

The change try to fix below error specific to RV platform:

BUG: kernel NULL pointer dereference, address: 0000000000000008
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2
Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022
RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0
Call Trace:
 &lt;TASK&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x171/0x4e0
 ? plist_add+0xbe/0x100
 ? exc_page_fault+0x7c/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
 ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
 compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 drm_atomic_check_only+0x5c5/0xa40
 drm_mode_atomic_ioctl+0x76e/0xbc0
 ? _copy_to_user+0x25/0x30
 ? drm_ioctl+0x296/0x4b0
 ? __pfx_drm_mode_atomic_ioctl+0x10/0x10
 drm_ioctl_kernel+0xcd/0x170
 drm_ioctl+0x26d/0x4b0
 ? __pfx_drm_mode_atomic_ioctl+0x10/0x10
 amdgpu_drm_ioctl+0x4e/0x90 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
 __x64_sys_ioctl+0x94/0xd0
 do_syscall_64+0x60/0x90
 ? do_syscall_64+0x6c/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f4dad17f76f
Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c&gt;
RSP: 002b:00007ffd9ae859f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000055e255a55900 RCX: 00007f4dad17f76f
RDX: 00007ffd9ae85a90 RSI: 00000000c03864bc RDI: 000000000000000b
RBP: 00007ffd9ae85a90 R08: 0000000000000003 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c03864bc
R13: 000000000000000b R14: 000055e255a7fc60 R15: 000055e255a01eb0
 &lt;/TASK&gt;
Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device ccm cmac algif_hash algif_skcipher af_alg joydev mousedev bnep &gt;
 typec libphy k10temp ipmi_msghandler roles i2c_scmi acpi_cpufreq mac_hid nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_mas&gt;
CR2: 0000000000000008
---[ end trace 0000000000000000 ]---
RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222870">SUSE bug 1222870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC

Recently, we encounter kernel crash in function rm3100_common_probe
caused by out of bound access of array rm3100_samp_rates (because of
underlying hardware failures). Add boundary check to prevent out of
bound access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222424">SUSE bug 1222424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26703" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26703" ref_url="https://www.suse.com/security/cve/CVE-2024-26703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/timerlat: Move hrtimer_init to timerlat_fd open()

Currently, the timerlat's hrtimer is initialized at the first read of
timerlat_fd, and destroyed at close(). It works, but it causes an error
if the user program open() and close() the file without reading.

Here's an example:

 # echo NO_OSNOISE_WORKLOAD &gt; /sys/kernel/debug/tracing/osnoise/options
 # echo timerlat &gt; /sys/kernel/debug/tracing/current_tracer

 # cat &lt;&lt;EOF &gt; ./timerlat_load.py
 # !/usr/bin/env python3

 timerlat_fd = open("/sys/kernel/tracing/osnoise/per_cpu/cpu0/timerlat_fd", 'r')
 timerlat_fd.close();
 EOF

 # ./taskset -c 0 ./timerlat_load.py
&lt;BOOM&gt;

 BUG: kernel NULL pointer dereference, address: 0000000000000010
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 1 PID: 2673 Comm: python3 Not tainted 6.6.13-200.fc39.x86_64 #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39 04/01/2014
 RIP: 0010:hrtimer_active+0xd/0x50
 Code: 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 48 8b 57 30 &lt;8b&gt; 42 10 a8 01 74 09 f3 90 8b 42 10 a8 01 75 f7 80 7f 38 00 75 1d
 RSP: 0018:ffffb031009b7e10 EFLAGS: 00010286
 RAX: 000000000002db00 RBX: ffff9118f786db08 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: ffff9117a0e64400 RDI: ffff9118f786db08
 RBP: ffff9118f786db80 R08: ffff9117a0ddd420 R09: ffff9117804d4f70
 R10: 0000000000000000 R11: 0000000000000000 R12: ffff9118f786db08
 R13: ffff91178fdd5e20 R14: ffff9117840978c0 R15: 0000000000000000
 FS:  00007f2ffbab1740(0000) GS:ffff9118f7840000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000010 CR3: 00000001b402e000 CR4: 0000000000750ee0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x23/0x70
  ? page_fault_oops+0x171/0x4e0
  ? srso_alias_return_thunk+0x5/0x7f
  ? avc_has_extended_perms+0x237/0x520
  ? exc_page_fault+0x7f/0x180
  ? asm_exc_page_fault+0x26/0x30
  ? hrtimer_active+0xd/0x50
  hrtimer_cancel+0x15/0x40
  timerlat_fd_release+0x48/0xe0
  __fput+0xf5/0x290
  __x64_sys_close+0x3d/0x80
  do_syscall_64+0x60/0x90
  ? srso_alias_return_thunk+0x5/0x7f
  ? __x64_sys_ioctl+0x72/0xd0
  ? srso_alias_return_thunk+0x5/0x7f
  ? syscall_exit_to_user_mode+0x2b/0x40
  ? srso_alias_return_thunk+0x5/0x7f
  ? do_syscall_64+0x6c/0x90
  ? srso_alias_return_thunk+0x5/0x7f
  ? exit_to_user_mode_prepare+0x142/0x1f0
  ? srso_alias_return_thunk+0x5/0x7f
  ? syscall_exit_to_user_mode+0x2b/0x40
  ? srso_alias_return_thunk+0x5/0x7f
  ? do_syscall_64+0x6c/0x90
  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
 RIP: 0033:0x7f2ffb321594
 Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d d5 cd 0d 00 00 74 13 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 3c c3 0f 1f 00 55 48 89 e5 48 83 ec 10 89 7d
 RSP: 002b:00007ffe8d8eef18 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
 RAX: ffffffffffffffda RBX: 00007f2ffba4e668 RCX: 00007f2ffb321594
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
 RBP: 00007ffe8d8eef40 R08: 0000000000000000 R09: 0000000000000000
 R10: 55c926e3167eae79 R11: 0000000000000202 R12: 0000000000000003
 R13: 00007ffe8d8ef030 R14: 0000000000000000 R15: 00007f2ffba4e668
  &lt;/TASK&gt;
 CR2: 0000000000000010
 ---[ end trace 0000000000000000 ]---

Move hrtimer_init to timerlat_fd open() to avoid this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26703/">CVE-2024-26703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26703">CVE-2024-26703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222423">SUSE bug 1222423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double-free of blocks due to wrong extents moved_len

In ext4_move_extents(), moved_len is only updated when all moves are
successfully executed, and only discards orig_inode and donor_inode
preallocations when moved_len is not zero. When the loop fails to exit
after successfully moving some extents, moved_len is not updated and
remains at 0, so it does not discard the preallocations.

If the moved extents overlap with the preallocated extents, the
overlapped extents are freed twice in ext4_mb_release_inode_pa() and
ext4_process_freed_data() (as described in commit 94d7c16cbbbd ("ext4:
Fix double-free of blocks with EXT4_IOC_MOVE_EXT")), and bb_free is
incremented twice. Hence when trim is executed, a zero-division bug is
triggered in mb_update_avg_fragment_size() because bb_free is not zero
and bb_fragments is zero.

Therefore, update move_len after each extent move to avoid the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26705" ref_url="https://www.suse.com/security/cve/CVE-2024-26705" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: BTLB: Fix crash when setting up BTLB at CPU bringup

When using hotplug and bringing up a 32-bit CPU, ask the firmware about the
BTLB information to set up the static (block) TLB entries.

For that write access to the static btlb_info struct is needed, but
since it is marked __ro_after_init the kernel segfaults with missing
write permissions.

Fix the crash by dropping the __ro_after_init annotation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26705/">CVE-2024-26705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26705">CVE-2024-26705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222485">SUSE bug 1222485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26706" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26706" ref_url="https://www.suse.com/security/cve/CVE-2024-26706" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: Fix random data corruption from exception handler

The current exception handler implementation, which assists when accessing
user space memory, may exhibit random data corruption if the compiler decides
to use a different register than the specified register %r29 (defined in
ASM_EXCEPTIONTABLE_REG) for the error code. If the compiler choose another
register, the fault handler will nevertheless store -EFAULT into %r29 and thus
trash whatever this register is used for.
Looking at the assembly I found that this happens sometimes in emulate_ldd().

To solve the issue, the easiest solution would be if it somehow is
possible to tell the fault handler which register is used to hold the error
code. Using %0 or %1 in the inline assembly is not posssible as it will show
up as e.g. %r29 (with the "%r" prefix), which the GNU assembler can not
convert to an integer.

This patch takes another, better and more flexible approach:
We extend the __ex_table (which is out of the execution path) by one 32-word.
In this word we tell the compiler to insert the assembler instruction
"or %r0,%r0,%reg", where %reg references the register which the compiler
choosed for the error return code.
In case of an access failure, the fault handler finds the __ex_table entry and
can examine the opcode. The used register is encoded in the lowest 5 bits, and
the fault handler can then store -EFAULT into this register.

Since we extend the __ex_table to 3 words we can't use the BUILDTIME_TABLE_SORT
config option any longer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26706/">CVE-2024-26706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26706">CVE-2024-26706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222486">SUSE bug 1222486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26707" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26707" ref_url="https://www.suse.com/security/cve/CVE-2024-26707" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()

Syzkaller reported [1] hitting a warning after failing to allocate
resources for skb in hsr_init_skb(). Since a WARN_ONCE() call will
not help much in this case, it might be prudent to switch to
netdev_warn_once(). At the very least it will suppress syzkaller
reports such as [1].

Just in case, use netdev_warn_once() in send_prp_supervision_frame()
for similar reasons.

[1]
HSR: Could not send supervision frame
WARNING: CPU: 1 PID: 85 at net/hsr/hsr_device.c:294 send_hsr_supervision_frame+0x60a/0x810 net/hsr/hsr_device.c:294
RIP: 0010:send_hsr_supervision_frame+0x60a/0x810 net/hsr/hsr_device.c:294
...
Call Trace:
 &lt;IRQ&gt;
 hsr_announce+0x114/0x370 net/hsr/hsr_device.c:382
 call_timer_fn+0x193/0x590 kernel/time/timer.c:1700
 expire_timers kernel/time/timer.c:1751 [inline]
 __run_timers+0x764/0xb20 kernel/time/timer.c:2022
 run_timer_softirq+0x58/0xd0 kernel/time/timer.c:2035
 __do_softirq+0x21a/0x8de kernel/softirq.c:553
 invoke_softirq kernel/softirq.c:427 [inline]
 __irq_exit_rcu kernel/softirq.c:632 [inline]
 irq_exit_rcu+0xb7/0x120 kernel/softirq.c:644
 sysvec_apic_timer_interrupt+0x95/0xb0 arch/x86/kernel/apic/apic.c:1076
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649
...

This issue is also found in older kernels (at least up to 5.10).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26707/">CVE-2024-26707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26707">CVE-2024-26707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222421">SUSE bug 1222421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26708" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26708" ref_url="https://www.suse.com/security/cve/CVE-2024-26708" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: really cope with fastopen race

Fastopen and PM-trigger subflow shutdown can race, as reported by
syzkaller.

In my first attempt to close such race, I missed the fact that
the subflow status can change again before the subflow_state_change
callback is invoked.

Address the issue additionally copying with all the states directly
reachable from TCP_FIN_WAIT1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26708/">CVE-2024-26708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26708">CVE-2024-26708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222672">SUSE bug 1222672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26709" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26709" ref_url="https://www.suse.com/security/cve/CVE-2024-26709" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach

The function spapr_tce_platform_iommu_attach_dev() is missing to call
iommu_group_put() when the domain is already set. This refcount leak
shows up with BUG_ON() during DLPAR remove operation as:

  KernelBug: Kernel bug in state 'None': kernel BUG at arch/powerpc/platforms/pseries/iommu.c:100!
  Oops: Exception in kernel mode, sig: 5 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
  &lt;snip&gt;
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_016) hv:phyp pSeries
  NIP:  c0000000000ff4d4 LR: c0000000000ff4cc CTR: 0000000000000000
  REGS: c0000013aed5f840 TRAP: 0700   Tainted: G          I         (6.8.0-rc3-autotest-g99bd3cb0d12e)
  MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 44002402  XER: 20040000
  CFAR: c000000000a0d170 IRQMASK: 0
  ...
  NIP iommu_reconfig_notifier+0x94/0x200
  LR  iommu_reconfig_notifier+0x8c/0x200
  Call Trace:
    iommu_reconfig_notifier+0x8c/0x200 (unreliable)
    notifier_call_chain+0xb8/0x19c
    blocking_notifier_call_chain+0x64/0x98
    of_reconfig_notify+0x44/0xdc
    of_detach_node+0x78/0xb0
    ofdt_write.part.0+0x86c/0xbb8
    proc_reg_write+0xf4/0x150
    vfs_write+0xf8/0x488
    ksys_write+0x84/0x140
    system_call_exception+0x138/0x330
    system_call_vectored_common+0x15c/0x2ec

The patch adds the missing iommu_group_put() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26709/">CVE-2024-26709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26709">CVE-2024-26709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222418">SUSE bug 1222418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26710" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26710" ref_url="https://www.suse.com/security/cve/CVE-2024-26710" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/kasan: Limit KASAN thread size increase to 32KB

KASAN is seen to increase stack usage, to the point that it was reported
to lead to stack overflow on some 32-bit machines (see link).

To avoid overflows the stack size was doubled for KASAN builds in
commit 3e8635fb2e07 ("powerpc/kasan: Force thread size increase with
KASAN").

However with a 32KB stack size to begin with, the doubling leads to a
64KB stack, which causes build errors:
  arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff)

Although the asm could be reworked, in practice a 32KB stack seems
sufficient even for KASAN builds - the additional usage seems to be in
the 2-3KB range for a 64-bit KASAN build.

So only increase the stack for KASAN if the stack size is &lt; 32KB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26710/">CVE-2024-26710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26710">CVE-2024-26710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222419">SUSE bug 1222419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26711" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26711" ref_url="https://www.suse.com/security/cve/CVE-2024-26711" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad4130: zero-initialize clock init data

The clk_init_data struct does not have all its members
initialized, causing issues when trying to expose the internal
clock on the CLK pin.

Fix this by zero-initializing the clk_init_data struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26711/">CVE-2024-26711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26711">CVE-2024-26711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222420">SUSE bug 1222420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26712" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26712" ref_url="https://www.suse.com/security/cve/CVE-2024-26712" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/kasan: Fix addr error caused by page alignment

In kasan_init_region, when k_start is not page aligned, at the begin of
for loop, k_cur = k_start &amp; PAGE_MASK is less than k_start, and then
`va = block + k_cur - k_start` is less than block, the addr va is invalid,
because the memory address space from va to block is not alloced by
memblock_alloc, which will not be reserved by memblock_reserve later, it
will be used by other places.

As a result, memory overwriting occurs.

for example:
int __init __weak kasan_init_region(void *start, size_t size)
{
[...]
	/* if say block(dcd97000) k_start(feef7400) k_end(feeff3fe) */
	block = memblock_alloc(k_end - k_start, PAGE_SIZE);
	[...]
	for (k_cur = k_start &amp; PAGE_MASK; k_cur &lt; k_end; k_cur += PAGE_SIZE) {
		/* at the begin of for loop
		 * block(dcd97000) va(dcd96c00) k_cur(feef7000) k_start(feef7400)
		 * va(dcd96c00) is less than block(dcd97000), va is invalid
		 */
		void *va = block + k_cur - k_start;
		[...]
	}
[...]
}

Therefore, page alignment is performed on k_start before
memblock_alloc() to ensure the validity of the VA address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26712/">CVE-2024-26712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26712">CVE-2024-26712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222439">SUSE bug 1222439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26713" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26713" ref_url="https://www.suse.com/security/cve/CVE-2024-26713" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-17"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26713/">CVE-2024-26713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26713">CVE-2024-26713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222872">SUSE bug 1222872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26714" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26714" ref_url="https://www.suse.com/security/cve/CVE-2024-26714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

interconnect: qcom: sc8180x: Mark CO0 BCM keepalive

The CO0 BCM needs to be up at all times, otherwise some hardware (like
the UFS controller) loses its connection to the rest of the SoC,
resulting in a hang of the platform, accompanied by a spectacular
logspam.

Mark it as keepalive to prevent such cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26714/">CVE-2024-26714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26714">CVE-2024-26714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222489">SUSE bug 1222489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend

In current scenario if Plug-out and Plug-In performed continuously
there could be a chance while checking for dwc-&gt;gadget_driver in
dwc3_gadget_suspend, a NULL pointer dereference may occur.

Call Stack:

	CPU1:                           CPU2:
	gadget_unbind_driver            dwc3_suspend_common
	dwc3_gadget_stop                dwc3_gadget_suspend
                                        dwc3_disconnect_gadget

CPU1 basically clears the variable and CPU2 checks the variable.
Consider CPU1 is running and right before gadget_driver is cleared
and in parallel CPU2 executes dwc3_gadget_suspend where it finds
dwc-&gt;gadget_driver which is not NULL and resumes execution and then
CPU1 completes execution. CPU2 executes dwc3_disconnect_gadget where
it checks dwc-&gt;gadget_driver is already NULL because of which the
NULL pointer deference occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222561">SUSE bug 1222561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26716" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26716" ref_url="https://www.suse.com/security/cve/CVE-2024-26716" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: core: Prevent null pointer dereference in update_port_device_state

Currently, the function update_port_device_state gets the usb_hub from
udev-&gt;parent by calling usb_hub_to_struct_hub.
However, in case the actconfig or the maxchild is 0, the usb_hub would
be NULL and upon further accessing to get port_dev would result in null
pointer dereference.

Fix this by introducing an if check after the usb_hub is populated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26716/">CVE-2024-26716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26716">CVE-2024-26716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222359">SUSE bug 1222359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26717" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid-of: fix NULL-deref on failed power up

A while back the I2C HID implementation was split in an ACPI and OF
part, but the new OF driver never initialises the client pointer which
is dereferenced on power-up failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222360">SUSE bug 1222360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-crypt, dm-verity: disable tasklets

Tasklets have an inherent problem with memory corruption. The function
tasklet_action_common calls tasklet_trylock, then it calls the tasklet
callback and then it calls tasklet_unlock. If the tasklet callback frees
the structure that contains the tasklet or if it calls some code that may
free it, tasklet_unlock will write into free memory.

The commits 8e14f610159d and d9a02e016aaf try to fix it for dm-crypt, but
it is not a sufficient fix and the data corruption can still happen [1].
There is no fix for dm-verity and dm-verity will write into free memory
with every tasklet-processed bio.

There will be atomic workqueues implemented in the kernel 6.9 [2]. They
will have better interface and they will not suffer from the memory
corruption problem.

But we need something that stops the memory corruption now and that can be
backported to the stable kernels. So, I'm proposing this commit that
disables tasklets in both dm-crypt and dm-verity. This commit doesn't
remove the tasklet support, because the tasklet code will be reused when
atomic workqueues will be implemented.

[1] https://lore.kernel.org/all/d390d7ee-f142-44d3-822a-87949e14608b@suse.de/T/
[2] https://lore.kernel.org/lkml/20240130091300.2968534-1-tj@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222416">SUSE bug 1222416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26719" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26719" ref_url="https://www.suse.com/security/cve/CVE-2024-26719" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau: offload fence uevents work to workqueue

This should break the deadlock between the fctx lock and the irq lock.

This offloads the processing off the work from the irq into a workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26719/">CVE-2024-26719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26719">CVE-2024-26719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222566">SUSE bug 1222566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26721" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26721" ref_url="https://www.suse.com/security/cve/CVE-2024-26721" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address

Commit bd077259d0a9 ("drm/i915/vdsc: Add function to read any PPS
register") defines a new macro to calculate the DSC PPS register
addresses with PPS number as an input. This macro correctly calculates
the addresses till PPS 11 since the addresses increment by 4. So in that
case the following macro works correctly to give correct register
address:

_MMIO(_DSCA_PPS_0 + (pps) * 4)

However after PPS 11, the register address for PPS 12 increments by 12
because of RC Buffer memory allocation in between. Because of this
discontinuity in the address space, the macro calculates wrong addresses
for PPS 12 - 16 resulting into incorrect DSC PPS parameter value
read/writes causing DSC corruption.

This fixes it by correcting this macro to add the offset of 12 for PPS
&gt;=12.

v3: Add correct paranthesis for pps argument (Jani Nikula)

(cherry picked from commit 6074be620c31dc2ae11af96a1a5ea95580976fb5)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26721/">CVE-2024-26721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26721">CVE-2024-26721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222365">SUSE bug 1222365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26722" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()

There is a path in rt5645_jack_detect_work(), where rt5645-&gt;jd_mutex
is left locked forever. That may lead to deadlock
when rt5645_jack_detect_work() is called for the second time.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222520">SUSE bug 1222520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26723" ref_url="https://www.suse.com/security/cve/CVE-2024-26723" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lan966x: Fix crash when adding interface under a lag

There is a crash when adding one of the lan966x interfaces under a lag
interface. The issue can be reproduced like this:
ip link add name bond0 type bond miimon 100 mode balance-xor
ip link set dev eth0 master bond0

The reason is because when adding a interface under the lag it would go
through all the ports and try to figure out which other ports are under
that lag interface. And the issue is that lan966x can have ports that are
NULL pointer as they are not probed. So then iterating over these ports
it would just crash as they are NULL pointers.
The fix consists in actually checking for NULL pointers before accessing
something from the ports. Like we do in other places.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26723/">CVE-2024-26723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26723">CVE-2024-26723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222367">SUSE bug 1222367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26724" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26724" ref_url="https://www.suse.com/security/cve/CVE-2024-26724" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers

I managed to hit following use after free warning recently:

[ 2169.711665] ==================================================================
[ 2169.714009] BUG: KASAN: slab-use-after-free in __run_timers.part.0+0x179/0x4c0
[ 2169.716293] Write of size 8 at addr ffff88812b326a70 by task swapper/4/0

[ 2169.719022] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.8.0-rc2jiri+ #2
[ 2169.720974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 2169.722457] Call Trace:
[ 2169.722756]  &lt;IRQ&gt;
[ 2169.723024]  dump_stack_lvl+0x58/0xb0
[ 2169.723417]  print_report+0xc5/0x630
[ 2169.723807]  ? __virt_addr_valid+0x126/0x2b0
[ 2169.724268]  kasan_report+0xbe/0xf0
[ 2169.724667]  ? __run_timers.part.0+0x179/0x4c0
[ 2169.725116]  ? __run_timers.part.0+0x179/0x4c0
[ 2169.725570]  __run_timers.part.0+0x179/0x4c0
[ 2169.726003]  ? call_timer_fn+0x320/0x320
[ 2169.726404]  ? lock_downgrade+0x3a0/0x3a0
[ 2169.726820]  ? kvm_clock_get_cycles+0x14/0x20
[ 2169.727257]  ? ktime_get+0x92/0x150
[ 2169.727630]  ? lapic_next_deadline+0x35/0x60
[ 2169.728069]  run_timer_softirq+0x40/0x80
[ 2169.728475]  __do_softirq+0x1a1/0x509
[ 2169.728866]  irq_exit_rcu+0x95/0xc0
[ 2169.729241]  sysvec_apic_timer_interrupt+0x6b/0x80
[ 2169.729718]  &lt;/IRQ&gt;
[ 2169.729993]  &lt;TASK&gt;
[ 2169.730259]  asm_sysvec_apic_timer_interrupt+0x16/0x20
[ 2169.730755] RIP: 0010:default_idle+0x13/0x20
[ 2169.731190] Code: c0 08 00 00 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 72 ff ff ff cc cc cc cc 8b 05 9a 7f 1f 02 85 c0 7e 07 0f 00 2d cf 69 43 00 fb f4 &lt;fa&gt; c3 66 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 04 25 c0 93 04 00
[ 2169.732759] RSP: 0018:ffff888100dbfe10 EFLAGS: 00000242
[ 2169.733264] RAX: 0000000000000001 RBX: ffff888100d9c200 RCX: ffffffff8241bd62
[ 2169.733925] RDX: ffffed109a848b15 RSI: 0000000000000004 RDI: ffffffff8127ac55
[ 2169.734566] RBP: 0000000000000004 R08: 0000000000000000 R09: ffffed109a848b14
[ 2169.735200] R10: ffff8884d42458a3 R11: 000000000000ba7e R12: ffffffff83d7d3a0
[ 2169.735835] R13: 1ffff110201b7fc6 R14: 0000000000000000 R15: ffff888100d9c200
[ 2169.736478]  ? ct_kernel_exit.constprop.0+0xa2/0xc0
[ 2169.736954]  ? do_idle+0x285/0x290
[ 2169.737323]  default_idle_call+0x63/0x90
[ 2169.737730]  do_idle+0x285/0x290
[ 2169.738089]  ? arch_cpu_idle_exit+0x30/0x30
[ 2169.738511]  ? mark_held_locks+0x1a/0x80
[ 2169.738917]  ? lockdep_hardirqs_on_prepare+0x12e/0x200
[ 2169.739417]  cpu_startup_entry+0x30/0x40
[ 2169.739825]  start_secondary+0x19a/0x1c0
[ 2169.740229]  ? set_cpu_sibling_map+0xbd0/0xbd0
[ 2169.740673]  secondary_startup_64_no_verify+0x15d/0x16b
[ 2169.741179]  &lt;/TASK&gt;

[ 2169.741686] Allocated by task 1098:
[ 2169.742058]  kasan_save_stack+0x1c/0x40
[ 2169.742456]  kasan_save_track+0x10/0x30
[ 2169.742852]  __kasan_kmalloc+0x83/0x90
[ 2169.743246]  mlx5_dpll_probe+0xf5/0x3c0 [mlx5_dpll]
[ 2169.743730]  auxiliary_bus_probe+0x62/0xb0
[ 2169.744148]  really_probe+0x127/0x590
[ 2169.744534]  __driver_probe_device+0xd2/0x200
[ 2169.744973]  device_driver_attach+0x6b/0xf0
[ 2169.745402]  bind_store+0x90/0xe0
[ 2169.745761]  kernfs_fop_write_iter+0x1df/0x2a0
[ 2169.746210]  vfs_write+0x41f/0x790
[ 2169.746579]  ksys_write+0xc7/0x160
[ 2169.746947]  do_syscall_64+0x6f/0x140
[ 2169.747333]  entry_SYSCALL_64_after_hwframe+0x46/0x4e

[ 2169.748049] Freed by task 1220:
[ 2169.748393]  kasan_save_stack+0x1c/0x40
[ 2169.748789]  kasan_save_track+0x10/0x30
[ 2169.749188]  kasan_save_free_info+0x3b/0x50
[ 2169.749621]  poison_slab_object+0x106/0x180
[ 2169.750044]  __kasan_slab_free+0x14/0x50
[ 2169.750451]  kfree+0x118/0x330
[ 2169.750792]  mlx5_dpll_remove+0xf5/0x110 [mlx5_dpll]
[ 2169.751271]  auxiliary_bus_remove+0x2e/0x40
[ 2169.751694]  device_release_driver_internal+0x24b/0x2e0
[ 2169.752191]  unbind_store+0xa6/0xb0
[ 2169.752563]  kernfs_fo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26724/">CVE-2024-26724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26724">CVE-2024-26724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222523">SUSE bug 1222523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26725" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26725" ref_url="https://www.suse.com/security/cve/CVE-2024-26725" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpll: fix possible deadlock during netlink dump operation

Recently, I've been hitting following deadlock warning during dpll pin
dump:

[52804.637962] ======================================================
[52804.638536] WARNING: possible circular locking dependency detected
[52804.639111] 6.8.0-rc2jiri+ #1 Not tainted
[52804.639529] ------------------------------------------------------
[52804.640104] python3/2984 is trying to acquire lock:
[52804.640581] ffff88810e642678 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}, at: netlink_dump+0xb3/0x780
[52804.641417]
               but task is already holding lock:
[52804.642010] ffffffff83bde4c8 (dpll_lock){+.+.}-{3:3}, at: dpll_lock_dumpit+0x13/0x20
[52804.642747]
               which lock already depends on the new lock.

[52804.643551]
               the existing dependency chain (in reverse order) is:
[52804.644259]
               -&gt; #1 (dpll_lock){+.+.}-{3:3}:
[52804.644836]        lock_acquire+0x174/0x3e0
[52804.645271]        __mutex_lock+0x119/0x1150
[52804.645723]        dpll_lock_dumpit+0x13/0x20
[52804.646169]        genl_start+0x266/0x320
[52804.646578]        __netlink_dump_start+0x321/0x450
[52804.647056]        genl_family_rcv_msg_dumpit+0x155/0x1e0
[52804.647575]        genl_rcv_msg+0x1ed/0x3b0
[52804.648001]        netlink_rcv_skb+0xdc/0x210
[52804.648440]        genl_rcv+0x24/0x40
[52804.648831]        netlink_unicast+0x2f1/0x490
[52804.649290]        netlink_sendmsg+0x36d/0x660
[52804.649742]        __sock_sendmsg+0x73/0xc0
[52804.650165]        __sys_sendto+0x184/0x210
[52804.650597]        __x64_sys_sendto+0x72/0x80
[52804.651045]        do_syscall_64+0x6f/0x140
[52804.651474]        entry_SYSCALL_64_after_hwframe+0x46/0x4e
[52804.652001]
               -&gt; #0 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}:
[52804.652650]        check_prev_add+0x1ae/0x1280
[52804.653107]        __lock_acquire+0x1ed3/0x29a0
[52804.653559]        lock_acquire+0x174/0x3e0
[52804.653984]        __mutex_lock+0x119/0x1150
[52804.654423]        netlink_dump+0xb3/0x780
[52804.654845]        __netlink_dump_start+0x389/0x450
[52804.655321]        genl_family_rcv_msg_dumpit+0x155/0x1e0
[52804.655842]        genl_rcv_msg+0x1ed/0x3b0
[52804.656272]        netlink_rcv_skb+0xdc/0x210
[52804.656721]        genl_rcv+0x24/0x40
[52804.657119]        netlink_unicast+0x2f1/0x490
[52804.657570]        netlink_sendmsg+0x36d/0x660
[52804.658022]        __sock_sendmsg+0x73/0xc0
[52804.658450]        __sys_sendto+0x184/0x210
[52804.658877]        __x64_sys_sendto+0x72/0x80
[52804.659322]        do_syscall_64+0x6f/0x140
[52804.659752]        entry_SYSCALL_64_after_hwframe+0x46/0x4e
[52804.660281]
               other info that might help us debug this:

[52804.661077]  Possible unsafe locking scenario:

[52804.661671]        CPU0                    CPU1
[52804.662129]        ----                    ----
[52804.662577]   lock(dpll_lock);
[52804.662924]                                lock(nlk_cb_mutex-GENERIC);
[52804.663538]                                lock(dpll_lock);
[52804.664073]   lock(nlk_cb_mutex-GENERIC);
[52804.664490]

The issue as follows: __netlink_dump_start() calls control-&gt;start(cb)
with nlk-&gt;cb_mutex held. In control-&gt;start(cb) the dpll_lock is taken.
Then nlk-&gt;cb_mutex is released and taken again in netlink_dump(), while
dpll_lock still being held. That leads to ABBA deadlock when another
CPU races with the same operation.

Fix this by moving dpll_lock taking into dumpit() callback which ensures
correct lock taking order.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26725/">CVE-2024-26725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26725">CVE-2024-26725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222369">SUSE bug 1222369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26726" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26726" ref_url="https://www.suse.com/security/cve/CVE-2024-26726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't drop extent_map for free space inode on write error

While running the CI for an unrelated change I hit the following panic
with generic/648 on btrfs_holes_spacecache.

assertion failed: block_start != EXTENT_MAP_HOLE, in fs/btrfs/extent_io.c:1385
------------[ cut here ]------------
kernel BUG at fs/btrfs/extent_io.c:1385!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 1 PID: 2695096 Comm: fsstress Kdump: loaded Tainted: G        W          6.8.0-rc2+ #1
RIP: 0010:__extent_writepage_io.constprop.0+0x4c1/0x5c0
Call Trace:
 &lt;TASK&gt;
 extent_write_cache_pages+0x2ac/0x8f0
 extent_writepages+0x87/0x110
 do_writepages+0xd5/0x1f0
 filemap_fdatawrite_wbc+0x63/0x90
 __filemap_fdatawrite_range+0x5c/0x80
 btrfs_fdatawrite_range+0x1f/0x50
 btrfs_write_out_cache+0x507/0x560
 btrfs_write_dirty_block_groups+0x32a/0x420
 commit_cowonly_roots+0x21b/0x290
 btrfs_commit_transaction+0x813/0x1360
 btrfs_sync_file+0x51a/0x640
 __x64_sys_fdatasync+0x52/0x90
 do_syscall_64+0x9c/0x190
 entry_SYSCALL_64_after_hwframe+0x6e/0x76

This happens because we fail to write out the free space cache in one
instance, come back around and attempt to write it again.  However on
the second pass through we go to call btrfs_get_extent() on the inode to
get the extent mapping.  Because this is a new block group, and with the
free space inode we always search the commit root to avoid deadlocking
with the tree, we find nothing and return a EXTENT_MAP_HOLE for the
requested range.

This happens because the first time we try to write the space cache out
we hit an error, and on an error we drop the extent mapping.  This is
normal for normal files, but the free space cache inode is special.  We
always expect the extent map to be correct.  Thus the second time
through we end up with a bogus extent map.

Since we're deprecating this feature, the most straightforward way to
fix this is to simply skip dropping the extent map range for this failed
range.

I shortened the test by using error injection to stress the area to make
it easier to reproduce.  With this patch in place we no longer panic
with my error injection test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26726/">CVE-2024-26726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26726">CVE-2024-26726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222532">SUSE bug 1222532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not ASSERT() if the newly created subvolume already got read

[BUG]
There is a syzbot crash, triggered by the ASSERT() during subvolume
creation:

 assertion failed: !anon_dev, in fs/btrfs/disk-io.c:1319
 ------------[ cut here ]------------
 kernel BUG at fs/btrfs/disk-io.c:1319!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 RIP: 0010:btrfs_get_root_ref.part.0+0x9aa/0xa60
  &lt;TASK&gt;
  btrfs_get_new_fs_root+0xd3/0xf0
  create_subvol+0xd02/0x1650
  btrfs_mksubvol+0xe95/0x12b0
  __btrfs_ioctl_snap_create+0x2f9/0x4f0
  btrfs_ioctl_snap_create+0x16b/0x200
  btrfs_ioctl+0x35f0/0x5cf0
  __x64_sys_ioctl+0x19d/0x210
  do_syscall_64+0x3f/0xe0
  entry_SYSCALL_64_after_hwframe+0x63/0x6b
 ---[ end trace 0000000000000000 ]---

[CAUSE]
During create_subvol(), after inserting root item for the newly created
subvolume, we would trigger btrfs_get_new_fs_root() to get the
btrfs_root of that subvolume.

The idea here is, we have preallocated an anonymous device number for
the subvolume, thus we can assign it to the new subvolume.

But there is really nothing preventing things like backref walk to read
the new subvolume.
If that happens before we call btrfs_get_new_fs_root(), the subvolume
would be read out, with a new anonymous device number assigned already.

In that case, we would trigger ASSERT(), as we really expect no one to
read out that subvolume (which is not yet accessible from the fs).
But things like backref walk is still possible to trigger the read on
the subvolume.

Thus our assumption on the ASSERT() is not correct in the first place.

[FIX]
Fix it by removing the ASSERT(), and just free the @anon_dev, reset it
to 0, and continue.

If the subvolume tree is read out by something else, it should have
already get a new anon_dev assigned thus we only need to free the
preallocated one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26728" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26728" ref_url="https://www.suse.com/security/cve/CVE-2024-26728" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix null-pointer dereference on edid reading

Use i2c adapter when there isn't aux_mode in dc_link to fix a
null-pointer derefence that happens when running
igt@kms_force_connector_basic in a system with DCN2.1 and HDMI connector
detected as below:

[  +0.178146] BUG: kernel NULL pointer dereference, address: 00000000000004c0
[  +0.000010] #PF: supervisor read access in kernel mode
[  +0.000005] #PF: error_code(0x0000) - not-present page
[  +0.000004] PGD 0 P4D 0
[  +0.000006] Oops: 0000 [#1] PREEMPT SMP NOPTI
[  +0.000006] CPU: 15 PID: 2368 Comm: kms_force_conne Not tainted 6.5.0-asdn+ #152
[  +0.000005] Hardware name: HP HP ENVY x360 Convertible 13-ay1xxx/8929, BIOS F.01 07/14/2021
[  +0.000004] RIP: 0010:i2c_transfer+0xd/0x100
[  +0.000011] Code: ea fc ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 55 53 &lt;48&gt; 8b 47 10 48 89 fb 48 83 38 00 0f 84 b3 00 00 00 83 3d 2f 80 16
[  +0.000004] RSP: 0018:ffff9c4f89c0fad0 EFLAGS: 00010246
[  +0.000005] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000080
[  +0.000003] RDX: 0000000000000002 RSI: ffff9c4f89c0fb20 RDI: 00000000000004b0
[  +0.000003] RBP: ffff9c4f89c0fb80 R08: 0000000000000080 R09: ffff8d8e0b15b980
[  +0.000003] R10: 00000000000380e0 R11: 0000000000000000 R12: 0000000000000080
[  +0.000002] R13: 0000000000000002 R14: ffff9c4f89c0fb0e R15: ffff9c4f89c0fb0f
[  +0.000004] FS:  00007f9ad2176c40(0000) GS:ffff8d90fe9c0000(0000) knlGS:0000000000000000
[  +0.000003] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000004] CR2: 00000000000004c0 CR3: 0000000121bc4000 CR4: 0000000000750ee0
[  +0.000003] PKRU: 55555554
[  +0.000003] Call Trace:
[  +0.000006]  &lt;TASK&gt;
[  +0.000006]  ? __die+0x23/0x70
[  +0.000011]  ? page_fault_oops+0x17d/0x4c0
[  +0.000008]  ? preempt_count_add+0x6e/0xa0
[  +0.000008]  ? srso_alias_return_thunk+0x5/0x7f
[  +0.000011]  ? exc_page_fault+0x7f/0x180
[  +0.000009]  ? asm_exc_page_fault+0x26/0x30
[  +0.000013]  ? i2c_transfer+0xd/0x100
[  +0.000010]  drm_do_probe_ddc_edid+0xc2/0x140 [drm]
[  +0.000067]  ? srso_alias_return_thunk+0x5/0x7f
[  +0.000006]  ? _drm_do_get_edid+0x97/0x3c0 [drm]
[  +0.000043]  ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm]
[  +0.000042]  edid_block_read+0x3b/0xd0 [drm]
[  +0.000043]  _drm_do_get_edid+0xb6/0x3c0 [drm]
[  +0.000041]  ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm]
[  +0.000043]  drm_edid_read_custom+0x37/0xd0 [drm]
[  +0.000044]  amdgpu_dm_connector_mode_valid+0x129/0x1d0 [amdgpu]
[  +0.000153]  drm_connector_mode_valid+0x3b/0x60 [drm_kms_helper]
[  +0.000000]  __drm_helper_update_and_validate+0xfe/0x3c0 [drm_kms_helper]
[  +0.000000]  ? amdgpu_dm_connector_get_modes+0xb6/0x520 [amdgpu]
[  +0.000000]  ? srso_alias_return_thunk+0x5/0x7f
[  +0.000000]  drm_helper_probe_single_connector_modes+0x2ab/0x540 [drm_kms_helper]
[  +0.000000]  status_store+0xb2/0x1f0 [drm]
[  +0.000000]  kernfs_fop_write_iter+0x136/0x1d0
[  +0.000000]  vfs_write+0x24d/0x440
[  +0.000000]  ksys_write+0x6f/0xf0
[  +0.000000]  do_syscall_64+0x60/0xc0
[  +0.000000]  ? srso_alias_return_thunk+0x5/0x7f
[  +0.000000]  ? syscall_exit_to_user_mode+0x2b/0x40
[  +0.000000]  ? srso_alias_return_thunk+0x5/0x7f
[  +0.000000]  ? do_syscall_64+0x6c/0xc0
[  +0.000000]  ? do_syscall_64+0x6c/0xc0
[  +0.000000]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[  +0.000000] RIP: 0033:0x7f9ad46b4b00
[  +0.000000] Code: 40 00 48 8b 15 19 b3 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d e1 3a 0e 00 00 74 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89
[  +0.000000] RSP: 002b:00007ffcbd3bd6d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
[  +0.000000] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9ad46b4b00
[  +0.000000] RDX: 0000000000000002 RSI: 00007f9ad48a7417 RDI: 0000000000000009
[  +0.000000] RBP: 0000000000000002 R08
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26728/">CVE-2024-26728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26728">CVE-2024-26728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222370">SUSE bug 1222370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26729" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26729" ref_url="https://www.suse.com/security/cve/CVE-2024-26729" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv

Fixes potential null pointer dereference warnings in the
dc_dmub_srv_cmd_list_queue_execute() and dc_dmub_srv_is_hw_pwr_up()
functions.

In both functions, the 'dc_dmub_srv' variable was being dereferenced
before it was checked for null. This could lead to a null pointer
dereference if 'dc_dmub_srv' is null. The fix is to check if
'dc_dmub_srv' is null before dereferencing it.

Thus moving the null checks for 'dc_dmub_srv' to the beginning of the
functions to ensure that 'dc_dmub_srv' is not null when it is
dereferenced.

Found by smatch &amp; thus fixing the below:
drivers/gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:133 dc_dmub_srv_cmd_list_queue_execute() warn: variable dereferenced before check 'dc_dmub_srv' (see line 128)
drivers/gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:1167 dc_dmub_srv_is_hw_pwr_up() warn: variable dereferenced before check 'dc_dmub_srv' (see line 1164)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26729/">CVE-2024-26729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26729">CVE-2024-26729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222552">SUSE bug 1222552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26730" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26730" ref_url="https://www.suse.com/security/cve/CVE-2024-26730" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (nct6775) Fix access to temperature configuration registers

The number of temperature configuration registers does
not always match the total number of temperature registers.
This can result in access errors reported if KASAN is enabled.

BUG: KASAN: global-out-of-bounds in nct6775_probe+0x5654/0x6fe9 nct6775_core
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26730/">CVE-2024-26730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26730">CVE-2024-26730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222538">SUSE bug 1222538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26731" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26731" ref_url="https://www.suse.com/security/cve/CVE-2024-26731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()

syzbot reported the following NULL pointer dereference issue [1]:

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  [...]
  RIP: 0010:0x0
  [...]
  Call Trace:
   &lt;TASK&gt;
   sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230
   unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg+0x221/0x270 net/socket.c:745
   ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
   ___sys_sendmsg net/socket.c:2638 [inline]
   __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
   do_syscall_64+0xf9/0x240
   entry_SYSCALL_64_after_hwframe+0x6f/0x77

If sk_psock_verdict_data_ready() and sk_psock_stop_verdict() are called
concurrently, psock-&gt;saved_data_ready can be NULL, causing the above issue.

This patch fixes this issue by calling the appropriate data ready function
using the sk_psock_data_ready() helper and protecting it from concurrency
with sk-&gt;sk_callback_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26731/">CVE-2024-26731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26731">CVE-2024-26731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222371">SUSE bug 1222371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26732" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26732" ref_url="https://www.suse.com/security/cve/CVE-2024-26732" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: implement lockless setsockopt(SO_PEEK_OFF)

syzbot reported a lockdep violation [1] involving af_unix
support of SO_PEEK_OFF.

Since SO_PEEK_OFF is inherently not thread safe (it uses a per-socket
sk_peek_off field), there is really no point to enforce a pointless
thread safety in the kernel.

After this patch :

- setsockopt(SO_PEEK_OFF) no longer acquires the socket lock.

- skb_consume_udp() no longer has to acquire the socket lock.

- af_unix no longer needs a special version of sk_set_peek_off(),
  because it does not lock u-&gt;iolock anymore.

As a followup, we could replace prot-&gt;set_peek_off to be a boolean
and avoid an indirect call, since we always use sk_set_peek_off().

[1]

WARNING: possible circular locking dependency detected
6.8.0-rc4-syzkaller-00267-g0f1dd5e91e2b #0 Not tainted

syz-executor.2/30025 is trying to acquire lock:
 ffff8880765e7d80 (&amp;u-&gt;iolock){+.+.}-{3:3}, at: unix_set_peek_off+0x26/0xa0 net/unix/af_unix.c:789

but task is already holding lock:
 ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1691 [inline]
 ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sockopt_lock_sock net/core/sock.c:1060 [inline]
 ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sk_setsockopt+0xe52/0x3360 net/core/sock.c:1193

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (sk_lock-AF_UNIX){+.+.}-{0:0}:
        lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754
        lock_sock_nested+0x48/0x100 net/core/sock.c:3524
        lock_sock include/net/sock.h:1691 [inline]
        __unix_dgram_recvmsg+0x1275/0x12c0 net/unix/af_unix.c:2415
        sock_recvmsg_nosec+0x18e/0x1d0 net/socket.c:1046
        ____sys_recvmsg+0x3c0/0x470 net/socket.c:2801
        ___sys_recvmsg net/socket.c:2845 [inline]
        do_recvmmsg+0x474/0xae0 net/socket.c:2939
        __sys_recvmmsg net/socket.c:3018 [inline]
        __do_sys_recvmmsg net/socket.c:3041 [inline]
        __se_sys_recvmmsg net/socket.c:3034 [inline]
        __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3034
       do_syscall_64+0xf9/0x240
       entry_SYSCALL_64_after_hwframe+0x6f/0x77

-&gt; #0 (&amp;u-&gt;iolock){+.+.}-{3:3}:
        check_prev_add kernel/locking/lockdep.c:3134 [inline]
        check_prevs_add kernel/locking/lockdep.c:3253 [inline]
        validate_chain+0x18ca/0x58e0 kernel/locking/lockdep.c:3869
        __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137
        lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754
        __mutex_lock_common kernel/locking/mutex.c:608 [inline]
        __mutex_lock+0x136/0xd70 kernel/locking/mutex.c:752
        unix_set_peek_off+0x26/0xa0 net/unix/af_unix.c:789
       sk_setsockopt+0x207e/0x3360
        do_sock_setsockopt+0x2fb/0x720 net/socket.c:2307
        __sys_setsockopt+0x1ad/0x250 net/socket.c:2334
        __do_sys_setsockopt net/socket.c:2343 [inline]
        __se_sys_setsockopt net/socket.c:2340 [inline]
        __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
       do_syscall_64+0xf9/0x240
       entry_SYSCALL_64_after_hwframe+0x6f/0x77

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(sk_lock-AF_UNIX);
                               lock(&amp;u-&gt;iolock);
                               lock(sk_lock-AF_UNIX);
  lock(&amp;u-&gt;iolock);

 *** DEADLOCK ***

1 lock held by syz-executor.2/30025:
  #0: ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1691 [inline]
  #0: ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sockopt_lock_sock net/core/sock.c:1060 [inline]
  #0: ffff8880765e7930 (sk_lock-AF_UNIX){+.+.}-{0:0}, at: sk_setsockopt+0xe52/0x3360 net/core/sock.c:1193

stack backtrace:
CPU: 0 PID: 30025 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00267-g0f1dd5e91e2b #0
Hardware name: Google Google C
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26732/">CVE-2024-26732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26732">CVE-2024-26732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222551">SUSE bug 1222551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26733" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arp: Prevent overflow in arp_req_get().

syzkaller reported an overflown write in arp_req_get(). [0]

When ioctl(SIOCGARP) is issued, arp_req_get() looks up an neighbour
entry and copies neigh-&gt;ha to struct arpreq.arp_ha.sa_data.

The arp_ha here is struct sockaddr, not struct sockaddr_storage, so
the sa_data buffer is just 14 bytes.

In the splat below, 2 bytes are overflown to the next int field,
arp_flags.  We initialise the field just after the memcpy(), so it's
not a problem.

However, when dev-&gt;addr_len is greater than 22 (e.g. MAX_ADDR_LEN),
arp_netmask is overwritten, which could be set as htonl(0xFFFFFFFFUL)
in arp_ioctl() before calling arp_req_get().

To avoid the overflow, let's limit the max length of memcpy().

Note that commit b5f0de6df6dc ("net: dev: Convert sa_data to flexible
array in struct sockaddr") just silenced syzkaller.

[0]:
memcpy: detected field-spanning write (size 16) of single field "r-&gt;arp_ha.sa_data" at net/ipv4/arp.c:1128 (size 14)
WARNING: CPU: 0 PID: 144638 at net/ipv4/arp.c:1128 arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Modules linked in:
CPU: 0 PID: 144638 Comm: syz-executor.4 Not tainted 6.1.74 #31
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014
RIP: 0010:arp_req_get+0x411/0x4a0 net/ipv4/arp.c:1128
Code: fd ff ff e8 41 42 de fb b9 0e 00 00 00 4c 89 fe 48 c7 c2 20 6d ab 87 48 c7 c7 80 6d ab 87 c6 05 25 af 72 04 01 e8 5f 8d ad fb &lt;0f&gt; 0b e9 6c fd ff ff e8 13 42 de fb be 03 00 00 00 4c 89 e7 e8 a6
RSP: 0018:ffffc900050b7998 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88803a815000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8641a44a RDI: 0000000000000001
RBP: ffffc900050b7a98 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 203a7970636d656d R12: ffff888039c54000
R13: 1ffff92000a16f37 R14: ffff88803a815084 R15: 0000000000000010
FS:  00007f172bf306c0(0000) GS:ffff88805aa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f172b3569f0 CR3: 0000000057f12005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 arp_ioctl+0x33f/0x4b0 net/ipv4/arp.c:1261
 inet_ioctl+0x314/0x3a0 net/ipv4/af_inet.c:981
 sock_do_ioctl+0xdf/0x260 net/socket.c:1204
 sock_ioctl+0x3ef/0x650 net/socket.c:1321
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x18e/0x220 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x37/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x64/0xce
RIP: 0033:0x7f172b262b8d
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f172bf300b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f172b3abf80 RCX: 00007f172b262b8d
RDX: 0000000020000000 RSI: 0000000000008954 RDI: 0000000000000003
RBP: 00007f172b2d3493 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f172b3abf80 R15: 00007f172bf10000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26734" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26734" ref_url="https://www.suse.com/security/cve/CVE-2024-26734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: fix possible use-after-free and memory leaks in devlink_init()

The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.

Make an unregister in case of unsuccessful registration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26734/">CVE-2024-26734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26734">CVE-2024-26734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222438">SUSE bug 1222438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix possible use-after-free and null-ptr-deref

The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222372">SUSE bug 1222372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26736" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Increase buffer size in afs_update_volume_status()

The max length of volume-&gt;vid value is 20 characters.
So increase idbuf[] size up to 24 to avoid overflow.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[DH: Actually, it's 20 + NUL, so increase it to 24 and use snprintf()]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222586">SUSE bug 1222586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel

The following race is possible between bpf_timer_cancel_and_free
and bpf_timer_cancel. It will lead a UAF on the timer-&gt;timer.

bpf_timer_cancel();
	spin_lock();
	t = timer-&gt;time;
	spin_unlock();

					bpf_timer_cancel_and_free();
						spin_lock();
						t = timer-&gt;timer;
						timer-&gt;timer = NULL;
						spin_unlock();
						hrtimer_cancel(&amp;t-&gt;timer);
						kfree(t);

	/* UAF on t */
	hrtimer_cancel(&amp;t-&gt;timer);

In bpf_timer_cancel_and_free, this patch frees the timer-&gt;timer
after a rcu grace period. This requires a rcu_head addition
to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init,
this does not need a kfree_rcu because it is still under the
spin_lock and timer-&gt;timer has not been visible by others yet.

In bpf_timer_cancel, rcu_read_lock() is added because this helper
can be used in a non rcu critical section context (e.g. from
a sleepable bpf prog). Other timer-&gt;timer usages in helpers.c
have been audited, bpf_timer_cancel() is the only place where
timer-&gt;timer is used outside of the spin_lock.

Another solution considered is to mark a t-&gt;flag in bpf_timer_cancel
and clear it after hrtimer_cancel() is done.  In bpf_timer_cancel_and_free,
it busy waits for the flag to be cleared before kfree(t). This patch
goes with a straight forward solution and frees timer-&gt;timer after
a rcu grace period.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222557">SUSE bug 1222557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26738" ref_url="https://www.suse.com/security/cve/CVE-2024-26738" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller

When a PCI device is dynamically added, the kernel oopses with a NULL
pointer dereference:

  BUG: Kernel NULL pointer dereference on read at 0x00000030
  Faulting instruction address: 0xc0000000006bbe5c
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs xsk_diag bonding nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5_ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod fuse
  CPU: 17 PID: 2685 Comm: drmgr Not tainted 6.7.0-203405+ #66
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries
  NIP:  c0000000006bbe5c LR: c000000000a13e68 CTR: c0000000000579f8
  REGS: c00000009924f240 TRAP: 0300   Not tainted  (6.7.0-203405+)
  MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 24002220  XER: 20040006
  CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0
  ...
  NIP sysfs_add_link_to_group+0x34/0x94
  LR  iommu_device_link+0x5c/0x118
  Call Trace:
   iommu_init_device+0x26c/0x318 (unreliable)
   iommu_device_link+0x5c/0x118
   iommu_init_device+0xa8/0x318
   iommu_probe_device+0xc0/0x134
   iommu_bus_notifier+0x44/0x104
   notifier_call_chain+0xb8/0x19c
   blocking_notifier_call_chain+0x64/0x98
   bus_notify+0x50/0x7c
   device_add+0x640/0x918
   pci_device_add+0x23c/0x298
   of_create_pci_dev+0x400/0x884
   of_scan_pci_dev+0x124/0x1b0
   __of_scan_bus+0x78/0x18c
   pcibios_scan_phb+0x2a4/0x3b0
   init_phb_dynamic+0xb8/0x110
   dlpar_add_slot+0x170/0x3b8 [rpadlpar_io]
   add_slot_store.part.0+0xb4/0x130 [rpadlpar_io]
   kobj_attr_store+0x2c/0x48
   sysfs_kf_write+0x64/0x78
   kernfs_fop_write_iter+0x1b0/0x290
   vfs_write+0x350/0x4a0
   ksys_write+0x84/0x140
   system_call_exception+0x124/0x330
   system_call_vectored_common+0x15c/0x2ec

Commit a940904443e4 ("powerpc/iommu: Add iommu_ops to report capabilities
and allow blocking domains") broke DLPAR add of PCI devices.

The above added iommu_device structure to pci_controller. During
system boot, PCI devices are discovered and this newly added iommu_device
structure is initialized by a call to iommu_device_register().

During DLPAR add of a PCI device, a new pci_controller structure is
allocated but there are no calls made to iommu_device_register()
interface.

Fix is to register the iommu device during DLPAR add as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26738/">CVE-2024-26738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26738">CVE-2024-26738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222607">SUSE bug 1222607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: don't override retval if we already lost the skb

If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.

Move the retval override to the error path which actually need it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26740" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26740" ref_url="https://www.suse.com/security/cve/CVE-2024-26740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: use the backlog for mirred ingress

The test Davide added in commit ca22da2fbd69 ("act_mirred: use the backlog
for nested calls to mirred ingress") hangs our testing VMs every 10 or so
runs, with the familiar tcp_v4_rcv -&gt; tcp_v4_rcv deadlock reported by
lockdep.

The problem as previously described by Davide (see Link) is that
if we reverse flow of traffic with the redirect (egress -&gt; ingress)
we may reach the same socket which generated the packet. And we may
still be holding its socket lock. The common solution to such deadlocks
is to put the packet in the Rx backlog, rather than run the Rx path
inline. Do that for all egress -&gt; ingress reversals, not just once
we started to nest mirred calls.

In the past there was a concern that the backlog indirection will
lead to loss of error reporting / less accurate stats. But the current
workaround does not seem to address the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26740/">CVE-2024-26740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26740">CVE-2024-26740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222563">SUSE bug 1222563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26741" ref_url="https://www.suse.com/security/cve/CVE-2024-26741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().

syzkaller reported a warning [0] in inet_csk_destroy_sock() with no
repro.

  WARN_ON(inet_sk(sk)-&gt;inet_num &amp;&amp; !inet_csk(sk)-&gt;icsk_bind_hash);

However, the syzkaller's log hinted that connect() failed just before
the warning due to FAULT_INJECTION.  [1]

When connect() is called for an unbound socket, we search for an
available ephemeral port.  If a bhash bucket exists for the port, we
call __inet_check_established() or __inet6_check_established() to check
if the bucket is reusable.

If reusable, we add the socket into ehash and set inet_sk(sk)-&gt;inet_num.

Later, we look up the corresponding bhash2 bucket and try to allocate
it if it does not exist.

Although it rarely occurs in real use, if the allocation fails, we must
revert the changes by check_established().  Otherwise, an unconnected
socket could illegally occupy an ehash entry.

Note that we do not put tw back into ehash because sk might have
already responded to a packet for tw and it would be better to free
tw earlier under such memory presure.

[0]:
WARNING: CPU: 0 PID: 350830 at net/ipv4/inet_connection_sock.c:1193 inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)
Modules linked in:
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)
Code: 41 5c 41 5d 41 5e e9 2d 4a 3d fd e8 28 4a 3d fd 48 89 ef e8 f0 cd 7d ff 5b 5d 41 5c 41 5d 41 5e e9 13 4a 3d fd e8 0e 4a 3d fd &lt;0f&gt; 0b e9 61 fe ff ff e8 02 4a 3d fd 4c 89 e7 be 03 00 00 00 e8 05
RSP: 0018:ffffc9000b21fd38 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000009e78 RCX: ffffffff840bae40
RDX: ffff88806e46c600 RSI: ffffffff840bb012 RDI: ffff88811755cca8
RBP: ffff88811755c880 R08: 0000000000000003 R09: 0000000000000000
R10: 0000000000009e78 R11: 0000000000000000 R12: ffff88811755c8e0
R13: ffff88811755c892 R14: ffff88811755c918 R15: 0000000000000000
FS:  00007f03e5243800(0000) GS:ffff88811ae00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32f21000 CR3: 0000000112ffe001 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? inet_csk_destroy_sock (net/ipv4/inet_connection_sock.c:1193)
 dccp_close (net/dccp/proto.c:1078)
 inet_release (net/ipv4/af_inet.c:434)
 __sock_release (net/socket.c:660)
 sock_close (net/socket.c:1423)
 __fput (fs/file_table.c:377)
 __fput_sync (fs/file_table.c:462)
 __x64_sys_close (fs/open.c:1557 fs/open.c:1539 fs/open.c:1539)
 do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
RIP: 0033:0x7f03e53852bb
Code: 03 00 00 00 0f 05 48 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 43 c9 f5 ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 c9 f5 ff 8b 44
RSP: 002b:00000000005dfba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f03e53852bb
RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000167c
R10: 0000000008a79680 R11: 0000000000000293 R12: 00007f03e4e43000
R13: 00007f03e4e43170 R14: 00007f03e4e43178 R15: 00007f03e4e43170
 &lt;/TASK&gt;

[1]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 350833 Comm: syz-executor.1 Not tainted 6.7.0-12272-g2121c43f88f5 #9
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl (lib/dump_stack.c:107 (discriminator 1))
 should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)
 should_failslab (mm/slub.c:3748)
 kmem_cache_alloc (mm/slub.c:3763 mm/slub.c:3842 mm/slub.c:3867)
 inet_bind2_bucket_create 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26741/">CVE-2024-26741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26741">CVE-2024-26741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222587">SUSE bug 1222587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix disable_managed_interrupts

Correct blk-mq registration issue with module parameter
disable_managed_interrupts enabled.

When we turn off the default PCI_IRQ_AFFINITY flag, the driver needs to
register with blk-mq using blk_mq_map_queues(). The driver is currently
calling blk_mq_pci_map_queues() which results in a stack trace and possibly
undefined behavior.

Stack Trace:
[    7.860089] scsi host2: smartpqi
[    7.871934] WARNING: CPU: 0 PID: 238 at block/blk-mq-pci.c:52 blk_mq_pci_map_queues+0xca/0xd0
[    7.889231] Modules linked in: sd_mod t10_pi sg uas smartpqi(+) crc32c_intel scsi_transport_sas usb_storage dm_mirror dm_region_hash dm_log dm_mod ipmi_devintf ipmi_msghandler fuse
[    7.924755] CPU: 0 PID: 238 Comm: kworker/0:3 Not tainted 4.18.0-372.88.1.el8_6_smartpqi_test.x86_64 #1
[    7.944336] Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 03/08/2022
[    7.963026] Workqueue: events work_for_cpu_fn
[    7.978275] RIP: 0010:blk_mq_pci_map_queues+0xca/0xd0
[    7.978278] Code: 48 89 de 89 c7 e8 f6 0f 4f 00 3b 05 c4 b7 8e 01 72 e1 5b 31 c0 5d 41 5c 41 5d 41 5e 41 5f e9 7d df 73 00 31 c0 e9 76 df 73 00 &lt;0f&gt; 0b eb bc 90 90 0f 1f 44 00 00 41 57 49 89 ff 41 56 41 55 41 54
[    7.978280] RSP: 0018:ffffa95fc3707d50 EFLAGS: 00010216
[    7.978283] RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000010
[    7.978284] RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffff9190c32d4310
[    7.978286] RBP: 0000000000000000 R08: ffffa95fc3707d38 R09: ffff91929b81ac00
[    7.978287] R10: 0000000000000001 R11: ffffa95fc3707ac0 R12: 0000000000000000
[    7.978288] R13: ffff9190c32d4000 R14: 00000000ffffffff R15: ffff9190c4c950a8
[    7.978290] FS:  0000000000000000(0000) GS:ffff9193efc00000(0000) knlGS:0000000000000000
[    7.978292] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.172814] CR2: 000055d11166c000 CR3: 00000002dae10002 CR4: 00000000007706f0
[    8.172816] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    8.172817] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    8.172818] PKRU: 55555554
[    8.172819] Call Trace:
[    8.172823]  blk_mq_alloc_tag_set+0x12e/0x310
[    8.264339]  scsi_add_host_with_dma.cold.9+0x30/0x245
[    8.279302]  pqi_ctrl_init+0xacf/0xc8e [smartpqi]
[    8.294085]  ? pqi_pci_probe+0x480/0x4c8 [smartpqi]
[    8.309015]  pqi_pci_probe+0x480/0x4c8 [smartpqi]
[    8.323286]  local_pci_probe+0x42/0x80
[    8.337855]  work_for_cpu_fn+0x16/0x20
[    8.351193]  process_one_work+0x1a7/0x360
[    8.364462]  ? create_worker+0x1a0/0x1a0
[    8.379252]  worker_thread+0x1ce/0x390
[    8.392623]  ? create_worker+0x1a0/0x1a0
[    8.406295]  kthread+0x10a/0x120
[    8.418428]  ? set_kthread_struct+0x50/0x50
[    8.431532]  ret_from_fork+0x1f/0x40
[    8.444137] ---[ end trace 1bf0173d39354506 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222608">SUSE bug 1222608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/qedr: Fix qedr_create_user_qp error flow

Avoid the following warning by making sure to free the allocated
resources in case that qedr_init_user_queue() fail.

-----------[ cut here ]-----------
WARNING: CPU: 0 PID: 143192 at drivers/infiniband/core/rdma_core.c:874 uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Modules linked in: tls target_core_user uio target_core_pscsi target_core_file target_core_iblock ib_srpt ib_srp scsi_transport_srp nfsd nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs 8021q garp mrp stp llc ext4 mbcache jbd2 opa_vnic ib_umad ib_ipoib sunrpc rdma_ucm ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm hfi1 intel_rapl_msr intel_rapl_common mgag200 qedr sb_edac drm_shmem_helper rdmavt x86_pkg_temp_thermal drm_kms_helper intel_powerclamp ib_uverbs coretemp i2c_algo_bit kvm_intel dell_wmi_descriptor ipmi_ssif sparse_keymap kvm ib_core rfkill syscopyarea sysfillrect video sysimgblt irqbypass ipmi_si ipmi_devintf fb_sys_fops rapl iTCO_wdt mxm_wmi iTCO_vendor_support intel_cstate pcspkr dcdbas intel_uncore ipmi_msghandler lpc_ich acpi_power_meter mei_me mei fuse drm xfs libcrc32c qede sd_mod ahci libahci t10_pi sg crct10dif_pclmul crc32_pclmul crc32c_intel qed libata tg3
ghash_clmulni_intel megaraid_sas crc8 wmi [last unloaded: ib_srpt]
CPU: 0 PID: 143192 Comm: fi_rdm_tagged_p Kdump: loaded Not tainted 5.14.0-408.el9.x86_64 #1
Hardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 2.14.0 01/25/2022
RIP: 0010:uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
Code: 5d 41 5c 41 5d 41 5e e9 0f 26 1b dd 48 89 df e8 67 6a ff ff 49 8b 86 10 01 00 00 48 85 c0 74 9c 4c 89 e7 e8 83 c0 cb dd eb 92 &lt;0f&gt; 0b eb be 0f 0b be 04 00 00 00 48 89 df e8 8e f5 ff ff e9 6d ff
RSP: 0018:ffffb7c6cadfbc60 EFLAGS: 00010286
RAX: ffff8f0889ee3f60 RBX: ffff8f088c1a5200 RCX: 00000000802a0016
RDX: 00000000802a0017 RSI: 0000000000000001 RDI: ffff8f0880042600
RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
R10: ffff8f11fffd5000 R11: 0000000000039000 R12: ffff8f0d5b36cd80
R13: ffff8f088c1a5250 R14: ffff8f1206d91000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8f11d7c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000147069200e20 CR3: 00000001c7210002 CR4: 00000000001706f0
Call Trace:
&lt;TASK&gt;
? show_trace_log_lvl+0x1c4/0x2df
? show_trace_log_lvl+0x1c4/0x2df
? ib_uverbs_close+0x1f/0xb0 [ib_uverbs]
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
? __warn+0x81/0x110
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
? report_bug+0x10a/0x140
? handle_bug+0x3c/0x70
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? uverbs_destroy_ufile_hw+0xcf/0xf0 [ib_uverbs]
ib_uverbs_close+0x1f/0xb0 [ib_uverbs]
__fput+0x94/0x250
task_work_run+0x5c/0x90
do_exit+0x270/0x4a0
do_group_exit+0x2d/0x90
get_signal+0x87c/0x8c0
arch_do_signal_or_restart+0x25/0x100
? ib_uverbs_ioctl+0xc2/0x110 [ib_uverbs]
exit_to_user_mode_loop+0x9c/0x130
exit_to_user_mode_prepare+0xb6/0x100
syscall_exit_to_user_mode+0x12/0x40
do_syscall_64+0x69/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x22/0x40
? do_syscall_64+0x69/0x90
? syscall_exit_work+0x103/0x130
? syscall_exit_to_user_mode+0x22/0x40
? do_syscall_64+0x69/0x90
? do_syscall_64+0x69/0x90
? common_interrupt+0x43/0xa0
entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x1470abe3ec6b
Code: Unable to access opcode bytes at RIP 0x1470abe3ec41.
RSP: 002b:00007fff13ce9108 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: fffffffffffffffc RBX: 00007fff13ce9218 RCX: 00001470abe3ec6b
RDX: 00007fff13ce9200 RSI: 00000000c0181b01 RDI: 0000000000000004
RBP: 00007fff13ce91e0 R08: 0000558d9655da10 R09: 0000558d9655dd00
R10: 00007fff13ce95c0 R11: 0000000000000246 R12: 00007fff13ce9358
R13: 0000000000000013 R14: 0000558d9655db50 R15: 00007fff13ce9470
&lt;/TASK&gt;
--[ end trace 888a9b92e04c5c97 ]--
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222677">SUSE bug 1222677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Support specifying the srpt_service_guid parameter

Make loading ib_srpt with this parameter set work. The current behavior is
that setting that parameter while loading the ib_srpt kernel module
triggers the following kernel crash:

BUG: kernel NULL pointer dereference, address: 0000000000000000
Call Trace:
 &lt;TASK&gt;
 parse_one+0x18c/0x1d0
 parse_args+0xe1/0x230
 load_module+0x8de/0xa60
 init_module_from_file+0x8b/0xd0
 idempotent_init_module+0x181/0x240
 __x64_sys_finit_module+0x5a/0xb0
 do_syscall_64+0x5f/0xe0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222449">SUSE bug 1222449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV

When kdump kernel tries to copy dump data over SR-IOV, LPAR panics due
to NULL pointer exception:

  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)
  BUG: Kernel NULL pointer dereference on read at 0x00000000
  Faulting instruction address: 0xc000000020847ad4
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop
  CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12
  Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries
  NIP:  c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c
  REGS: c000000029162ca0 TRAP: 0300   Not tainted  (6.4.0-Test102+)
  MSR:  800000000280b033 &lt;SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE&gt;  CR: 48288244  XER: 00000008
  CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1
  ...
  NIP _find_next_zero_bit+0x24/0x110
  LR  bitmap_find_next_zero_area_off+0x5c/0xe0
  Call Trace:
    dev_printk_emit+0x38/0x48 (unreliable)
    iommu_area_alloc+0xc4/0x180
    iommu_range_alloc+0x1e8/0x580
    iommu_alloc+0x60/0x130
    iommu_alloc_coherent+0x158/0x2b0
    dma_iommu_alloc_coherent+0x3c/0x50
    dma_alloc_attrs+0x170/0x1f0
    mlx5_cmd_init+0xc0/0x760 [mlx5_core]
    mlx5_function_setup+0xf0/0x510 [mlx5_core]
    mlx5_init_one+0x84/0x210 [mlx5_core]
    probe_one+0x118/0x2c0 [mlx5_core]
    local_pci_probe+0x68/0x110
    pci_call_probe+0x68/0x200
    pci_device_probe+0xbc/0x1a0
    really_probe+0x104/0x540
    __driver_probe_device+0xb4/0x230
    driver_probe_device+0x54/0x130
    __driver_attach+0x158/0x2b0
    bus_for_each_dev+0xa8/0x130
    driver_attach+0x34/0x50
    bus_add_driver+0x16c/0x300
    driver_register+0xa4/0x1b0
    __pci_register_driver+0x68/0x80
    mlx5_init+0xb8/0x100 [mlx5_core]
    do_one_initcall+0x60/0x300
    do_init_module+0x7c/0x2b0

At the time of LPAR dump, before kexec hands over control to kdump
kernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.
For the SR-IOV case, default DMA window "ibm,dma-window" is removed from
the FDT and DDW added, for the device.

Now, kexec hands over control to the kdump kernel.

When the kdump kernel initializes, PCI busses are scanned and IOMMU
group/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV
case, there is no "ibm,dma-window". The original commit: b1fc44eaa9ba,
fixes the path where memory is pre-mapped (direct mapped) to the DDW.
When TCEs are direct mapped, there is no need to initialize IOMMU
tables.

iommu_table_setparms_lpar() only considers "ibm,dma-window" property
when initiallizing IOMMU table. In the scenario where TCEs are
dynamically allocated for SR-IOV, newly created IOMMU table is not
initialized. Later, when the device driver tries to enter TCEs for the
SR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().

The fix is to initialize the IOMMU table with DDW property stored in the
FDT. There are 2 points to remember:

	1. For the dedicated adapter, kdump kernel would encounter both
	   default and DDW in FDT. In this case, DDW property is used to
	   initialize the IOMMU table.

	2. A DDW could be direct or dynamic mapped. kdump kernel would
	   initialize IOMMU table and mark the existing DDW as
	   "dynamic". This works fine since, at the time of table
	   initialization, iommu_table_clear() makes some space in the
	   DDW, for some predefined number of TCEs which are needed for
	   kdump to succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26746" ref_url="https://www.suse.com/security/cve/CVE-2024-26746" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Ensure safe user copy of completion record

If CONFIG_HARDENED_USERCOPY is enabled, copying completion record from
event log cache to user triggers a kernel bug.

[ 1987.159822] usercopy: Kernel memory exposure attempt detected from SLUB object 'dsa0' (offset 74, size 31)!
[ 1987.170845] ------------[ cut here ]------------
[ 1987.176086] kernel BUG at mm/usercopy.c:102!
[ 1987.180946] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 1987.186866] CPU: 17 PID: 528 Comm: kworker/17:1 Not tainted 6.8.0-rc2+ #5
[ 1987.194537] Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023
[ 1987.206405] Workqueue: wq0.0 idxd_evl_fault_work [idxd]
[ 1987.212338] RIP: 0010:usercopy_abort+0x72/0x90
[ 1987.217381] Code: 58 65 9c 50 48 c7 c2 17 85 61 9c 57 48 c7 c7 98 fd 6b 9c 48 0f 44 d6 48 c7 c6 b3 08 62 9c 4c 89 d1 49 0f 44 f3 e8 1e 2e d5 ff &lt;0f&gt; 0b 49 c7 c1 9e 42 61 9c 4c 89 cf 4d 89 c8 eb a9 66 66 2e 0f 1f
[ 1987.238505] RSP: 0018:ff62f5cf20607d60 EFLAGS: 00010246
[ 1987.244423] RAX: 000000000000005f RBX: 000000000000001f RCX: 0000000000000000
[ 1987.252480] RDX: 0000000000000000 RSI: ffffffff9c61429e RDI: 00000000ffffffff
[ 1987.260538] RBP: ff62f5cf20607d78 R08: ff2a6a89ef3fffe8 R09: 00000000fffeffff
[ 1987.268595] R10: ff2a6a89eed00000 R11: 0000000000000003 R12: ff2a66934849c89a
[ 1987.276652] R13: 0000000000000001 R14: ff2a66934849c8b9 R15: ff2a66934849c899
[ 1987.284710] FS:  0000000000000000(0000) GS:ff2a66b22fe40000(0000) knlGS:0000000000000000
[ 1987.293850] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1987.300355] CR2: 00007fe291a37000 CR3: 000000010fbd4005 CR4: 0000000000f71ef0
[ 1987.308413] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1987.316470] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 1987.324527] PKRU: 55555554
[ 1987.327622] Call Trace:
[ 1987.330424]  &lt;TASK&gt;
[ 1987.332826]  ? show_regs+0x6e/0x80
[ 1987.336703]  ? die+0x3c/0xa0
[ 1987.339988]  ? do_trap+0xd4/0xf0
[ 1987.343662]  ? do_error_trap+0x75/0xa0
[ 1987.347922]  ? usercopy_abort+0x72/0x90
[ 1987.352277]  ? exc_invalid_op+0x57/0x80
[ 1987.356634]  ? usercopy_abort+0x72/0x90
[ 1987.360988]  ? asm_exc_invalid_op+0x1f/0x30
[ 1987.365734]  ? usercopy_abort+0x72/0x90
[ 1987.370088]  __check_heap_object+0xb7/0xd0
[ 1987.374739]  __check_object_size+0x175/0x2d0
[ 1987.379588]  idxd_copy_cr+0xa9/0x130 [idxd]
[ 1987.384341]  idxd_evl_fault_work+0x127/0x390 [idxd]
[ 1987.389878]  process_one_work+0x13e/0x300
[ 1987.394435]  ? __pfx_worker_thread+0x10/0x10
[ 1987.399284]  worker_thread+0x2f7/0x420
[ 1987.403544]  ? _raw_spin_unlock_irqrestore+0x2b/0x50
[ 1987.409171]  ? __pfx_worker_thread+0x10/0x10
[ 1987.414019]  kthread+0x107/0x140
[ 1987.417693]  ? __pfx_kthread+0x10/0x10
[ 1987.421954]  ret_from_fork+0x3d/0x60
[ 1987.426019]  ? __pfx_kthread+0x10/0x10
[ 1987.430281]  ret_from_fork_asm+0x1b/0x30
[ 1987.434744]  &lt;/TASK&gt;

The issue arises because event log cache is created using
kmem_cache_create() which is not suitable for user copy.

Fix the issue by creating event log cache with
kmem_cache_create_usercopy(), ensuring safe user copy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26746/">CVE-2024-26746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26746">CVE-2024-26746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222444">SUSE bug 1222444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: roles: fix NULL pointer issue when put module's reference

In current design, usb role class driver will get usb_role_switch parent's
module reference after the user get usb_role_switch device and put the
reference after the user put the usb_role_switch device. However, the
parent device of usb_role_switch may be removed before the user put the
usb_role_switch. If so, then, NULL pointer issue will be met when the user
put the parent module's reference.

This will save the module pointer in structure of usb_role_switch. Then,
we don't need to find module by iterating long relations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222609">SUSE bug 1222609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: fix memory double free when handle zero packet

829  if (request-&gt;complete) {
830          spin_unlock(&amp;priv_dev-&gt;lock);
831          usb_gadget_giveback_request(&amp;priv_ep-&gt;endpoint,
832                                    request);
833          spin_lock(&amp;priv_dev-&gt;lock);
834  }
835
836  if (request-&gt;buf == priv_dev-&gt;zlp_buf)
837      cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, request);

Driver append an additional zero packet request when queue a packet, which
length mod max packet size is 0. When transfer complete, run to line 831,
usb_gadget_giveback_request() will free this requestion. 836 condition is
true, so cdns3_gadget_ep_free_request() free this request again.

Log:

[ 1920.140696][  T150] BUG: KFENCE: use-after-free read in cdns3_gadget_giveback+0x134/0x2c0 [cdns3]
[ 1920.140696][  T150]
[ 1920.151837][  T150] Use-after-free read at 0x000000003d1cd10b (in kfence-#36):
[ 1920.159082][  T150]  cdns3_gadget_giveback+0x134/0x2c0 [cdns3]
[ 1920.164988][  T150]  cdns3_transfer_completed+0x438/0x5f8 [cdns3]

Add check at line 829, skip call usb_gadget_giveback_request() if it is
additional zero length packet request. Needn't call
usb_gadget_giveback_request() because it is allocated in this driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222513">SUSE bug 1222513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()

  ...
  cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, &amp;priv_req-&gt;request);
  list_del_init(&amp;priv_req-&gt;list);
  ...

'priv_req' actually free at cdns3_gadget_ep_free_request(). But
list_del_init() use priv_req-&gt;list after it.

[ 1542.642868][  T534] BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xd4
[ 1542.642868][  T534]
[ 1542.653162][  T534] Use-after-free read at 0x000000009ed0ba99 (in kfence-#3):
[ 1542.660311][  T534]  __list_del_entry_valid+0x10/0xd4
[ 1542.665375][  T534]  cdns3_gadget_ep_disable+0x1f8/0x388 [cdns3]
[ 1542.671571][  T534]  usb_ep_disable+0x44/0xe4
[ 1542.675948][  T534]  ffs_func_eps_disable+0x64/0xc8
[ 1542.680839][  T534]  ffs_func_set_alt+0x74/0x368
[ 1542.685478][  T534]  ffs_func_disable+0x18/0x28

Move list_del_init() before cdns3_gadget_ep_free_request() to resolve this
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222680">SUSE bug 1222680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26750" ref_url="https://www.suse.com/security/cve/CVE-2024-26750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Drop oob_skb ref before purging queue in GC.

syzbot reported another task hung in __unix_gc().  [0]

The current while loop assumes that all of the left candidates
have oob_skb and calling kfree_skb(oob_skb) releases the remaining
candidates.

However, I missed a case that oob_skb has self-referencing fd and
another fd and the latter sk is placed before the former in the
candidate list.  Then, the while loop never proceeds, resulting
the task hung.

__unix_gc() has the same loop just before purging the collected skb,
so we can call kfree_skb(oob_skb) there and let __skb_queue_purge()
release all inflight sockets.

[0]:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2784 Comm: kworker/u4:8 Not tainted 6.8.0-rc4-syzkaller-01028-g71b605d32017 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Workqueue: events_unbound __unix_gc
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:200
Code: 89 fb e8 23 00 00 00 48 8b 3d 84 f5 1a 0c 48 89 de 5b e9 43 26 57 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 &lt;f3&gt; 0f 1e fa 48 8b 04 24 65 48 8b 0d 90 52 70 7e 65 8b 15 91 52 70
RSP: 0018:ffffc9000a17fa78 EFLAGS: 00000287
RAX: ffffffff8a0a6108 RBX: ffff88802b6c2640 RCX: ffff88802c0b3b80
RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000
RBP: ffffc9000a17fbf0 R08: ffffffff89383f1d R09: 1ffff1100ee5ff84
R10: dffffc0000000000 R11: ffffed100ee5ff85 R12: 1ffff110056d84ee
R13: ffffc9000a17fae0 R14: 0000000000000000 R15: ffffffff8f47b840
FS:  0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffef5687ff8 CR3: 0000000029b34000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
 __unix_gc+0xe69/0xf40 net/unix/garbage.c:343
 process_one_work kernel/workqueue.c:2633 [inline]
 process_scheduled_works+0x913/0x1420 kernel/workqueue.c:2706
 worker_thread+0xa5f/0x1000 kernel/workqueue.c:2787
 kthread+0x2ef/0x390 kernel/kthread.c:388
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26750/">CVE-2024-26750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26750">CVE-2024-26750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222617">SUSE bug 1222617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: ep93xx: Add terminator to gpiod_lookup_table

Without the terminator, if a con_id is passed to gpio_find() that
does not exist in the lookup table the function will not stop looping
correctly, and eventually cause an oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222724">SUSE bug 1222724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26752" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26752" ref_url="https://www.suse.com/security/cve/CVE-2024-26752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

l2tp: pass correct message length to ip6_append_data

l2tp_ip6_sendmsg needs to avoid accounting for the transport header
twice when splicing more data into an already partially-occupied skbuff.

To manage this, we check whether the skbuff contains data using
skb_queue_empty when deciding how much data to append using
ip6_append_data.

However, the code which performed the calculation was incorrect:

     ulen = len + skb_queue_empty(&amp;sk-&gt;sk_write_queue) ? transhdrlen : 0;

...due to C operator precedence, this ends up setting ulen to
transhdrlen for messages with a non-zero length, which results in
corrupted packets on the wire.

Add parentheses to correct the calculation in line with the original
intent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-06-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26752/">CVE-2024-26752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26752">CVE-2024-26752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222667">SUSE bug 1222667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223292">SUSE bug 1223292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26753" ref_url="https://www.suse.com/security/cve/CVE-2024-26753" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: virtio/akcipher - Fix stack overflow on memcpy

sizeof(struct virtio_crypto_akcipher_session_para) is less than
sizeof(struct virtio_crypto_op_ctrl_req::u), copying more bytes from
stack variable leads stack overflow. Clang reports this issue by
commands:
make -j CC=clang-14 mrproper &gt;/dev/null 2&gt;&amp;1
make -j O=/tmp/crypto-build CC=clang-14 allmodconfig &gt;/dev/null 2&gt;&amp;1
make -j O=/tmp/crypto-build W=1 CC=clang-14 drivers/crypto/virtio/
  virtio_crypto_akcipher_algs.o
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-26753/">CVE-2024-26753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26753">CVE-2024-26753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222601">SUSE bug 1222601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()

The gtp_net_ops pernet operations structure for the subsystem must be
registered before registering the generic netlink family.

Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:

general protection fault, probably for non-canonical address
0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 1 PID: 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
RIP: 0010:gtp_genl_dump_pdp+0x1be/0x800 [gtp]
Code: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86
      df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt;
      3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74
RSP: 0018:ffff888014107220 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000
FS:  00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x90/0xa0
 ? die_addr+0x50/0xd0
 ? exc_general_protection+0x148/0x220
 ? asm_exc_general_protection+0x22/0x30
 ? gtp_genl_dump_pdp+0x1be/0x800 [gtp]
 ? __alloc_skb+0x1dd/0x350
 ? __pfx___alloc_skb+0x10/0x10
 genl_dumpit+0x11d/0x230
 netlink_dump+0x5b9/0xce0
 ? lockdep_hardirqs_on_prepare+0x253/0x430
 ? __pfx_netlink_dump+0x10/0x10
 ? kasan_save_track+0x10/0x40
 ? __kasan_kmalloc+0x9b/0xa0
 ? genl_start+0x675/0x970
 __netlink_dump_start+0x6fc/0x9f0
 genl_family_rcv_msg_dumpit+0x1bb/0x2d0
 ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10
 ? genl_op_from_small+0x2a/0x440
 ? cap_capable+0x1d0/0x240
 ? __pfx_genl_start+0x10/0x10
 ? __pfx_genl_dumpit+0x10/0x10
 ? __pfx_genl_done+0x10/0x10
 ? security_capable+0x9d/0xe0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222632">SUSE bug 1222632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26755" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26755" ref_url="https://www.suse.com/security/cve/CVE-2024-26755" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: Don't suspend the array for interrupted reshape

md_start_sync() will suspend the array if there are spares that can be
added or removed from conf, however, if reshape is still in progress,
this won't happen at all or data will be corrupted(remove_and_add_spares
won't be called from md_choose_sync_action for reshape), hence there is
no need to suspend the array if reshape is not done yet.

Meanwhile, there is a potential deadlock for raid456:

1) reshape is interrupted;

2) set one of the disk WantReplacement, and add a new disk to the array,
   however, recovery won't start until the reshape is finished;

3) then issue an IO across reshpae position, this IO will wait for
   reshape to make progress;

4) continue to reshape, then md_start_sync() found there is a spare disk
   that can be added to conf, mddev_suspend() is called;

Step 4 and step 3 is waiting for each other, deadlock triggered. Noted
this problem is found by code review, and it's not reporduced yet.

Fix this porblem by don't suspend the array for interrupted reshape,
this is safe because conf won't be changed until reshape is done.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26755/">CVE-2024-26755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26755">CVE-2024-26755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222529">SUSE bug 1222529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26756" ref_url="https://www.suse.com/security/cve/CVE-2024-26756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: Don't register sync_thread for reshape directly

Currently, if reshape is interrupted, then reassemble the array will
register sync_thread directly from pers-&gt;run(), in this case
'MD_RECOVERY_RUNNING' is set directly, however, there is no guarantee
that md_do_sync() will be executed, hence stop_sync_thread() will hang
because 'MD_RECOVERY_RUNNING' can't be cleared.

Last patch make sure that md_do_sync() will set MD_RECOVERY_DONE,
however, following hang can still be triggered by dm-raid test
shell/lvconvert-raid-reshape.sh occasionally:

[root@fedora ~]# cat /proc/1982/stack
[&lt;0&gt;] stop_sync_thread+0x1ab/0x270 [md_mod]
[&lt;0&gt;] md_frozen_sync_thread+0x5c/0xa0 [md_mod]
[&lt;0&gt;] raid_presuspend+0x1e/0x70 [dm_raid]
[&lt;0&gt;] dm_table_presuspend_targets+0x40/0xb0 [dm_mod]
[&lt;0&gt;] __dm_destroy+0x2a5/0x310 [dm_mod]
[&lt;0&gt;] dm_destroy+0x16/0x30 [dm_mod]
[&lt;0&gt;] dev_remove+0x165/0x290 [dm_mod]
[&lt;0&gt;] ctl_ioctl+0x4bb/0x7b0 [dm_mod]
[&lt;0&gt;] dm_ctl_ioctl+0x11/0x20 [dm_mod]
[&lt;0&gt;] vfs_ioctl+0x21/0x60
[&lt;0&gt;] __x64_sys_ioctl+0xb9/0xe0
[&lt;0&gt;] do_syscall_64+0xc6/0x230
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x6c/0x74

Meanwhile mddev-&gt;recovery is:
MD_RECOVERY_RUNNING |
MD_RECOVERY_INTR |
MD_RECOVERY_RESHAPE |
MD_RECOVERY_FROZEN

Fix this problem by remove the code to register sync_thread directly
from raid10 and raid5. And let md_check_recovery() to register
sync_thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26756/">CVE-2024-26756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26756">CVE-2024-26756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222531">SUSE bug 1222531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26757" ref_url="https://www.suse.com/security/cve/CVE-2024-26757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: Don't ignore read-only array in md_check_recovery()

Usually if the array is not read-write, md_check_recovery() won't
register new sync_thread in the first place. And if the array is
read-write and sync_thread is registered, md_set_readonly() will
unregister sync_thread before setting the array read-only. md/raid
follow this behavior hence there is no problem.

After commit f52f5c71f3d4 ("md: fix stopping sync thread"), following
hang can be triggered by test shell/integrity-caching.sh:

1) array is read-only. dm-raid update super block:
rs_update_sbs
 ro = mddev-&gt;ro
 mddev-&gt;ro = 0
  -&gt; set array read-write
 md_update_sb

2) register new sync thread concurrently.

3) dm-raid set array back to read-only:
rs_update_sbs
 mddev-&gt;ro = ro

4) stop the array:
raid_dtr
 md_stop
  stop_sync_thread
    set_bit(MD_RECOVERY_INTR, &amp;mddev-&gt;recovery);
    md_wakeup_thread_directly(mddev-&gt;sync_thread);
    wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery))

5) sync thread done:
 md_do_sync
 set_bit(MD_RECOVERY_DONE, &amp;mddev-&gt;recovery);
 md_wakeup_thread(mddev-&gt;thread);

6) daemon thread can't unregister sync thread:
 md_check_recovery
  if (!md_is_rdwr(mddev) &amp;&amp;
      !test_bit(MD_RECOVERY_NEEDED, &amp;mddev-&gt;recovery))
   return;
  -&gt; -&gt; MD_RECOVERY_RUNNING can't be cleared, hence step 4 hang;

The root cause is that dm-raid manipulate 'mddev-&gt;ro' by itself,
however, dm-raid really should stop sync thread before setting the
array read-only. Unfortunately, I need to read more code before I
can refacter the handler of 'mddev-&gt;ro' in dm-raid, hence let's fix
the problem the easy way for now to prevent dm-raid regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26757/">CVE-2024-26757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26757">CVE-2024-26757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222527">SUSE bug 1222527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26760" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26760" ref_url="https://www.suse.com/security/cve/CVE-2024-26760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: pscsi: Fix bio_put() for error case

As of commit 066ff571011d ("block: turn bio_kmalloc into a simple kmalloc
wrapper"), a bio allocated by bio_kmalloc() must be freed by bio_uninit()
and kfree(). That is not done properly for the error case, hitting WARN and
NULL pointer dereference in bio_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26760/">CVE-2024-26760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26760">CVE-2024-26760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222596">SUSE bug 1222596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26762" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26762" ref_url="https://www.suse.com/security/cve/CVE-2024-26762" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/pci: Skip to handle RAS errors if CXL.mem device is detached

The PCI AER model is an awkward fit for CXL error handling. While the
expectation is that a PCI device can escalate to link reset to recover
from an AER event, the same reset on CXL amounts to a surprise memory
hotplug of massive amounts of memory.

At present, the CXL error handler attempts some optimistic error
handling to unbind the device from the cxl_mem driver after reaping some
RAS register values. This results in a "hopeful" attempt to unplug the
memory, but there is no guarantee that will succeed.

A subsequent AER notification after the memdev unbind event can no
longer assume the registers are mapped. Check for memdev bind before
reaping status register values to avoid crashes of the form:

 BUG: unable to handle page fault for address: ffa00000195e9100
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 [...]
 RIP: 0010:__cxl_handle_ras+0x30/0x110 [cxl_core]
 [...]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x24/0x70
  ? page_fault_oops+0x82/0x160
  ? kernelmode_fixup_or_oops+0x84/0x110
  ? exc_page_fault+0x113/0x170
  ? asm_exc_page_fault+0x26/0x30
  ? __pfx_dpc_reset_link+0x10/0x10
  ? __cxl_handle_ras+0x30/0x110 [cxl_core]
  ? find_cxl_port+0x59/0x80 [cxl_core]
  cxl_handle_rp_ras+0xbc/0xd0 [cxl_core]
  cxl_error_detected+0x6c/0xf0 [cxl_core]
  report_error_detected+0xc7/0x1c0
  pci_walk_bus+0x73/0x90
  pcie_do_recovery+0x23f/0x330

Longer term, the unbind and PCI_ERS_RESULT_DISCONNECT behavior might
need to be replaced with a new PCI_ERS_RESULT_PANIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26762/">CVE-2024-26762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26762">CVE-2024-26762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230337">SUSE bug 1230337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26763" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-crypt: don't modify the data when using authenticated encryption

It was said that authenticated encryption could produce invalid tag when
the data that is being encrypted is modified [1]. So, fix this problem by
copying the data into the clone bio first and then encrypt them inside the
clone bio.

This may reduce performance, but it is needed to prevent the user from
corrupting the device by writing data with O_DIRECT and modifying them at
the same time.

[1] https://lore.kernel.org/all/20240207004723.GA35324@sol.localdomain/T/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222720">SUSE bug 1222720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26764" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio

If kiocb_set_cancel_fn() is called for I/O submitted via io_uring, the
following kernel warning appears:

WARNING: CPU: 3 PID: 368 at fs/aio.c:598 kiocb_set_cancel_fn+0x9c/0xa8
Call trace:
 kiocb_set_cancel_fn+0x9c/0xa8
 ffs_epfile_read_iter+0x144/0x1d0
 io_read+0x19c/0x498
 io_issue_sqe+0x118/0x27c
 io_submit_sqes+0x25c/0x5fc
 __arm64_sys_io_uring_enter+0x104/0xab0
 invoke_syscall+0x58/0x11c
 el0_svc_common+0xb4/0xf4
 do_el0_svc+0x2c/0xb0
 el0_svc+0x2c/0xa4
 el0t_64_sync_handler+0x68/0xb4
 el0t_64_sync+0x1a4/0x1a8

Fix this by setting the IOCB_AIO_RW flag for read and write I/O that is
submitted by libaio.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26766" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one error

Unfortunately the commit `fd8958efe877` introduced another error
causing the `descs` array to overflow. This reults in further crashes
easily reproducible by `sendmsg` system call.

[ 1080.836473] general protection fault, probably for non-canonical address 0x400300015528b00a: 0000 [#1] PREEMPT SMP PTI
[ 1080.869326] RIP: 0010:hfi1_ipoib_build_ib_tx_headers.constprop.0+0xe1/0x2b0 [hfi1]
--
[ 1080.974535] Call Trace:
[ 1080.976990]  &lt;TASK&gt;
[ 1081.021929]  hfi1_ipoib_send_dma_common+0x7a/0x2e0 [hfi1]
[ 1081.027364]  hfi1_ipoib_send_dma_list+0x62/0x270 [hfi1]
[ 1081.032633]  hfi1_ipoib_send+0x112/0x300 [hfi1]
[ 1081.042001]  ipoib_start_xmit+0x2a9/0x2d0 [ib_ipoib]
[ 1081.046978]  dev_hard_start_xmit+0xc4/0x210
--
[ 1081.148347]  __sys_sendmsg+0x59/0xa0

crash&gt; ipoib_txreq 0xffff9cfeba229f00
struct ipoib_txreq {
  txreq = {
    list = {
      next = 0xffff9cfeba229f00,
      prev = 0xffff9cfeba229f00
    },
    descp = 0xffff9cfeba229f40,
    coalesce_buf = 0x0,
    wait = 0xffff9cfea4e69a48,
    complete = 0xffffffffc0fe0760 &lt;hfi1_ipoib_sdma_complete&gt;,
    packet_len = 0x46d,
    tlen = 0x0,
    num_desc = 0x0,
    desc_limit = 0x6,
    next_descq_idx = 0x45c,
    coalesce_idx = 0x0,
    flags = 0x0,
    descs = {{
        qw = {0x8024000120dffb00, 0x4}  # SDMA_DESC0_FIRST_DESC_FLAG (bit 63)
      }, {
        qw = {  0x3800014231b108, 0x4}
      }, {
        qw = { 0x310000e4ee0fcf0, 0x8}
      }, {
        qw = {  0x3000012e9f8000, 0x8}
      }, {
        qw = {  0x59000dfb9d0000, 0x8}
      }, {
        qw = {  0x78000e02e40000, 0x8}
      }}
  },
  sdma_hdr =  0x400300015528b000,  &lt;&lt;&lt; invalid pointer in the tx request structure
  sdma_status = 0x0,                   SDMA_DESC0_LAST_DESC_FLAG (bit 62)
  complete = 0x0,
  priv = 0x0,
  txq = 0xffff9cfea4e69880,
  skb = 0xffff9d099809f400
}

If an SDMA send consists of exactly 6 descriptors and requires dword
padding (in the 7th descriptor), the sdma_txreq descriptor array is not
properly expanded and the packet will overflow into the container
structure. This results in a panic when the send completion runs. The
exact panic varies depending on what elements of the container structure
get corrupted. The fix is to use the correct expression in
_pad_sdma_tx_descs() to test the need to expand the descriptor array.

With this patch the crashes are no longer reproducible and the machine is
stable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222882">SUSE bug 1222882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26767" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fixed integer types and null check locations

[why]:
issues fixed:
- comparison with wider integer type in loop condition which can cause
infinite loops
- pointer dereference before null check
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230339">SUSE bug 1230339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26768" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26768" ref_url="https://www.suse.com/security/cve/CVE-2024-26768" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]

With default config, the value of NR_CPUS is 64. When HW platform has
more then 64 cpus, system will crash on these platforms. MAX_CORE_PIC
is the maximum cpu number in MADT table (max physical number) which can
exceed the supported maximum cpu number (NR_CPUS, max logical number),
but kernel should not crash. Kernel should boot cpus with NR_CPUS, let
the remainder cpus stay in BIOS.

The potential crash reason is that the array acpi_core_pic[NR_CPUS] can
be overflowed when parsing MADT table, and it is obvious that CORE_PIC
should be corresponding to physical core rather than logical core, so it
is better to define the array as acpi_core_pic[MAX_CORE_PIC].

With the patch, system can boot up 64 vcpus with qemu parameter -smp 128,
otherwise system will crash with the following message.

[    0.000000] CPU 0 Unable to handle kernel paging request at virtual address 0000420000004259, era == 90000000037a5f0c, ra == 90000000037a46ec
[    0.000000] Oops[#1]:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 6.8.0-rc2+ #192
[    0.000000] Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022
[    0.000000] pc 90000000037a5f0c ra 90000000037a46ec tp 9000000003c90000 sp 9000000003c93d60
[    0.000000] a0 0000000000000019 a1 9000000003d93bc0 a2 0000000000000000 a3 9000000003c93bd8
[    0.000000] a4 9000000003c93a74 a5 9000000083c93a67 a6 9000000003c938f0 a7 0000000000000005
[    0.000000] t0 0000420000004201 t1 0000000000000000 t2 0000000000000001 t3 0000000000000001
[    0.000000] t4 0000000000000003 t5 0000000000000000 t6 0000000000000030 t7 0000000000000063
[    0.000000] t8 0000000000000014 u0 ffffffffffffffff s9 0000000000000000 s0 9000000003caee98
[    0.000000] s1 90000000041b0480 s2 9000000003c93da0 s3 9000000003c93d98 s4 9000000003c93d90
[    0.000000] s5 9000000003caa000 s6 000000000a7fd000 s7 000000000f556b60 s8 000000000e0a4330
[    0.000000]    ra: 90000000037a46ec platform_init+0x214/0x250
[    0.000000]   ERA: 90000000037a5f0c efi_runtime_init+0x30/0x94
[    0.000000]  CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
[    0.000000]  PRMD: 00000000 (PPLV0 -PIE -PWE)
[    0.000000]  EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
[    0.000000]  ECFG: 00070800 (LIE=11 VS=7)
[    0.000000] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
[    0.000000]  BADV: 0000420000004259
[    0.000000]  PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)
[    0.000000] Modules linked in:
[    0.000000] Process swapper (pid: 0, threadinfo=(____ptrval____), task=(____ptrval____))
[    0.000000] Stack : 9000000003c93a14 9000000003800898 90000000041844f8 90000000037a46ec
[    0.000000]         000000000a7fd000 0000000008290000 0000000000000000 0000000000000000
[    0.000000]         0000000000000000 0000000000000000 00000000019d8000 000000000f556b60
[    0.000000]         000000000a7fd000 000000000f556b08 9000000003ca7700 9000000003800000
[    0.000000]         9000000003c93e50 9000000003800898 9000000003800108 90000000037a484c
[    0.000000]         000000000e0a4330 000000000f556b60 000000000a7fd000 000000000f556b08
[    0.000000]         9000000003ca7700 9000000004184000 0000000000200000 000000000e02b018
[    0.000000]         000000000a7fd000 90000000037a0790 9000000003800108 0000000000000000
[    0.000000]         0000000000000000 000000000e0a4330 000000000f556b60 000000000a7fd000
[    0.000000]         000000000f556b08 000000000eaae298 000000000eaa5040 0000000000200000
[    0.000000]         ...
[    0.000000] Call Trace:
[    0.000000] [&lt;90000000037a5f0c&gt;] efi_runtime_init+0x30/0x94
[    0.000000] [&lt;90000000037a46ec&gt;] platform_init+0x214/0x250
[    0.000000] [&lt;90000000037a484c&gt;] setup_arch+0x124/0x45c
[    0.000000] [&lt;90000000037a0790&gt;] start_kernel+0x90/0x670
[    0.000000] [&lt;900000000378b0d8&gt;] kernel_entry+0xd8/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26768/">CVE-2024-26768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26768">CVE-2024-26768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222600">SUSE bug 1222600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: avoid deadlock on delete association path

When deleting an association the shutdown path is deadlocking because we
try to flush the nvmet_wq nested. Avoid this by deadlock by deferring
the put work into its own work item.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222727">SUSE bug 1222727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26771" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: edma: Add some null pointer checks to the edma_probe

devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222610">SUSE bug 1222610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26772" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()

Places the logic for checking if the group's block bitmap is corrupt under
the protection of the group lock to avoid allocating blocks from the group
with a corrupted block bitmap.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222613">SUSE bug 1222613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()

Determine if the group block bitmap is corrupted before using ac_b_ex in
ext4_mb_try_best_found() to avoid allocating blocks from a group with a
corrupted block bitmap in the following concurrency and making the
situation worse.

ext4_mb_regular_allocator
  ext4_lock_group(sb, group)
  ext4_mb_good_group
   // check if the group bbitmap is corrupted
  ext4_mb_complex_scan_group
   // Scan group gets ac_b_ex but doesn't use it
  ext4_unlock_group(sb, group)
                           ext4_mark_group_bitmap_corrupted(group)
                           // The block bitmap was corrupted during
                           // the group unlock gap.
  ext4_mb_try_best_found
    ext4_lock_group(ac-&gt;ac_sb, group)
    ext4_mb_use_best_found
      mb_mark_used
      // Allocating blocks in block bitmap corrupted group
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26774" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26774" ref_url="https://www.suse.com/security/cve/CVE-2024-26774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt

Determine if bb_fragments is 0 instead of determining bb_free to eliminate
the risk of dividing by zero when the block bitmap is corrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26774/">CVE-2024-26774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26774">CVE-2024-26774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222622">SUSE bug 1222622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: avoid potential deadlock at set_capacity

Move set_capacity() outside of the section procected by (&amp;d-&gt;lock).
To avoid possible interrupt unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
[1] lock(&amp;bdev-&gt;bd_size_lock);
                                local_irq_disable();
                            [2] lock(&amp;d-&gt;lock);
                            [3] lock(&amp;bdev-&gt;bd_size_lock);
   &lt;Interrupt&gt;
[4]  lock(&amp;d-&gt;lock);

  *** DEADLOCK ***

Where [1](&amp;bdev-&gt;bd_size_lock) hold by zram_add()-&gt;set_capacity().
[2]lock(&amp;d-&gt;lock) hold by aoeblk_gdalloc(). And aoeblk_gdalloc()
is trying to acquire [3](&amp;bdev-&gt;bd_size_lock) at set_capacity() call.
In this situation an attempt to acquire [4]lock(&amp;d-&gt;lock) from
aoecmd_cfg_rsp() will lead to deadlock.

So the simplest solution is breaking lock dependency
[2](&amp;d-&gt;lock) -&gt; [3](&amp;bdev-&gt;bd_size_lock) by moving set_capacity()
outside.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222627">SUSE bug 1222627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected

Return IRQ_NONE from the interrupt handler when no interrupt was
detected. Because an empty interrupt will cause a null pointer error:

    Unable to handle kernel NULL pointer dereference at virtual
  address 0000000000000008
    Call trace:
        complete+0x54/0x100
        hisi_sfc_v3xx_isr+0x2c/0x40 [spi_hisi_sfc_v3xx]
        __handle_irq_event_percpu+0x64/0x1e0
        handle_irq_event+0x7c/0x1cc
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222764">SUSE bug 1222764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: sis: Error out if pixclock equals zero

The userspace program could pass any values to the driver through
ioctl() interface. If the driver doesn't check the value of pixclock,
it may cause divide-by-zero error.

In sisfb_check_var(), var-&gt;pixclock is used as a divisor to caculate
drate before it is checked against zero. Fix this by checking it
at the beginning.

This is similar to CVE-2022-3061 in i740fb which was fixed by
commit 15cf0b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222765">SUSE bug 1222765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26778" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: savage: Error out if pixclock equals zero

The userspace program could pass any values to the driver through
ioctl() interface. If the driver doesn't check the value of pixclock,
it may cause divide-by-zero error.

Although pixclock is checked in savagefb_decode_var(), but it is not
checked properly in savagefb_probe(). Fix this by checking whether
pixclock is zero in the function savagefb_check_var() before
info-&gt;var.pixclock is used as the divisor.

This is similar to CVE-2022-3061 in i740fb which was fixed by
commit 15cf0b8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222770">SUSE bug 1222770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26779" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix race condition on enabling fast-xmit

fast-xmit must only be enabled after the sta has been uploaded to the driver,
otherwise it could end up passing the not-yet-uploaded sta via drv_tx calls
to the driver, leading to potential crashes because of uninitialized drv_priv
data.
Add a missing sta-&gt;uploaded check and re-check fast xmit after inserting a sta.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222772">SUSE bug 1222772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26780" ref_url="https://www.suse.com/security/cve/CVE-2024-26780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix task hung while purging oob_skb in GC.

syzbot reported a task hung; at the same time, GC was looping infinitely
in list_for_each_entry_safe() for OOB skb.  [0]

syzbot demonstrated that the list_for_each_entry_safe() was not actually
safe in this case.

A single skb could have references for multiple sockets.  If we free such
a skb in the list_for_each_entry_safe(), the current and next sockets could
be unlinked in a single iteration.

unix_notinflight() uses list_del_init() to unlink the socket, so the
prefetched next socket forms a loop itself and list_for_each_entry_safe()
never stops.

Here, we must use while() and make sure we always fetch the first socket.

[0]:
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 5065 Comm: syz-executor236 Not tainted 6.8.0-rc3-syzkaller-00136-g1f719a2f3fa6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [inline]
RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline]
RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:207
Code: cc cc cc cc 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 48 8b 14 25 40 c2 03 00 &lt;65&gt; 8b 05 b4 7c 78 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74
RSP: 0018:ffffc900033efa58 EFLAGS: 00000283
RAX: ffff88807b077800 RBX: ffff88807b077800 RCX: 1ffffffff27b1189
RDX: ffff88802a5a3b80 RSI: ffffffff8968488d RDI: ffff88807b077f70
RBP: ffffc900033efbb0 R08: 0000000000000001 R09: fffffbfff27a900c
R10: ffffffff93d48067 R11: ffffffff8ae000eb R12: ffff88807b077800
R13: dffffc0000000000 R14: ffff88807b077e40 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000564f4fc1e3a8 CR3: 000000000d57a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
 unix_gc+0x563/0x13b0 net/unix/garbage.c:319
 unix_release_sock+0xa93/0xf80 net/unix/af_unix.c:683
 unix_release+0x91/0xf0 net/unix/af_unix.c:1064
 __sock_release+0xb0/0x270 net/socket.c:659
 sock_close+0x1c/0x30 net/socket.c:1421
 __fput+0x270/0xb80 fs/file_table.c:376
 task_work_run+0x14f/0x250 kernel/task_work.c:180
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xa8a/0x2ad0 kernel/exit.c:871
 do_group_exit+0xd4/0x2a0 kernel/exit.c:1020
 __do_sys_exit_group kernel/exit.c:1031 [inline]
 __se_sys_exit_group kernel/exit.c:1029 [inline]
 __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1029
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f9d6cbdac09
Code: Unable to access opcode bytes at 0x7f9d6cbdabdf.
RSP: 002b:00007fff5952feb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9d6cbdac09
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
RBP: 00007f9d6cc552b0 R08: ffffffffffffffb8 R09: 0000000000000006
R10: 0000000000000006 R11: 0000000000000246 R12: 00007f9d6cc552b0
R13: 0000000000000000 R14: 00007f9d6cc55d00 R15: 00007f9d6cbabe70
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26780/">CVE-2024-26780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26780">CVE-2024-26780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222588">SUSE bug 1222588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26781" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26781" ref_url="https://www.suse.com/security/cve/CVE-2024-26781" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix possible deadlock in subflow diag

Syzbot and Eric reported a lockdep splat in the subflow diag:

   WARNING: possible circular locking dependency detected
   6.8.0-rc4-syzkaller-00212-g40b9385dd8e6 #0 Not tainted

   syz-executor.2/24141 is trying to acquire lock:
   ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at:
   tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline]
   ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at:
   tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137

   but task is already holding lock:
   ffffc9000135e488 (&amp;h-&gt;lhash2[i].lock){+.+.}-{2:2}, at: spin_lock
   include/linux/spinlock.h:351 [inline]
   ffffc9000135e488 (&amp;h-&gt;lhash2[i].lock){+.+.}-{2:2}, at:
   inet_diag_dump_icsk+0x39f/0x1f80 net/ipv4/inet_diag.c:1038

   which lock already depends on the new lock.

   the existing dependency chain (in reverse order) is:

   -&gt; #1 (&amp;h-&gt;lhash2[i].lock){+.+.}-{2:2}:
   lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   __inet_hash+0x335/0xbe0 net/ipv4/inet_hashtables.c:743
   inet_csk_listen_start+0x23a/0x320 net/ipv4/inet_connection_sock.c:1261
   __inet_listen_sk+0x2a2/0x770 net/ipv4/af_inet.c:217
   inet_listen+0xa3/0x110 net/ipv4/af_inet.c:239
   rds_tcp_listen_init+0x3fd/0x5a0 net/rds/tcp_listen.c:316
   rds_tcp_init_net+0x141/0x320 net/rds/tcp.c:577
   ops_init+0x352/0x610 net/core/net_namespace.c:136
   __register_pernet_operations net/core/net_namespace.c:1214 [inline]
   register_pernet_operations+0x2cb/0x660 net/core/net_namespace.c:1283
   register_pernet_device+0x33/0x80 net/core/net_namespace.c:1370
   rds_tcp_init+0x62/0xd0 net/rds/tcp.c:735
   do_one_initcall+0x238/0x830 init/main.c:1236
   do_initcall_level+0x157/0x210 init/main.c:1298
   do_initcalls+0x3f/0x80 init/main.c:1314
   kernel_init_freeable+0x42f/0x5d0 init/main.c:1551
   kernel_init+0x1d/0x2a0 init/main.c:1441
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242

   -&gt; #0 (k-sk_lock-AF_INET6){+.+.}-{0:0}:
   check_prev_add kernel/locking/lockdep.c:3134 [inline]
   check_prevs_add kernel/locking/lockdep.c:3253 [inline]
   validate_chain+0x18ca/0x58e0 kernel/locking/lockdep.c:3869
   __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137
   lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754
   lock_sock_fast include/net/sock.h:1723 [inline]
   subflow_get_info+0x166/0xd20 net/mptcp/diag.c:28
   tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline]
   tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137
   inet_sk_diag_fill+0x10ed/0x1e00 net/ipv4/inet_diag.c:345
   inet_diag_dump_icsk+0x55b/0x1f80 net/ipv4/inet_diag.c:1061
   __inet_diag_dump+0x211/0x3a0 net/ipv4/inet_diag.c:1263
   inet_diag_dump_compat+0x1c1/0x2d0 net/ipv4/inet_diag.c:1371
   netlink_dump+0x59b/0xc80 net/netlink/af_netlink.c:2264
   __netlink_dump_start+0x5df/0x790 net/netlink/af_netlink.c:2370
   netlink_dump_start include/linux/netlink.h:338 [inline]
   inet_diag_rcv_msg_compat+0x209/0x4c0 net/ipv4/inet_diag.c:1405
   sock_diag_rcv_msg+0xe7/0x410
   netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
   sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:280
   netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
   netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
   netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg+0x221/0x270 net/socket.c:745
   ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
   ___sys_sendmsg net/socket.c:2638 [inline]
   __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
   do_syscall_64+0xf9/0x240
   entry_SYSCALL_64_after_hwframe+0x6f/0x77

As noted by Eric we can break the lock dependency chain avoid
dumping 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26781/">CVE-2024-26781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26781">CVE-2024-26781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222589">SUSE bug 1222589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26782" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix double-free on socket dismantle

when MPTCP server accepts an incoming connection, it clones its listener
socket. However, the pointer to 'inet_opt' for the new socket has the same
value as the original one: as a consequence, on program exit it's possible
to observe the following splat:

  BUG: KASAN: double-free in inet_sock_destruct+0x54f/0x8b0
  Free of addr ffff888485950880 by task swapper/25/0

  CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Not tainted 6.8.0-rc1+ #609
  Hardware name: Supermicro SYS-6027R-72RF/X9DRH-7TF/7F/iTF/iF, BIOS 3.0  07/26/2013
  Call Trace:
   &lt;IRQ&gt;
   dump_stack_lvl+0x32/0x50
   print_report+0xca/0x620
   kasan_report_invalid_free+0x64/0x90
   __kasan_slab_free+0x1aa/0x1f0
   kfree+0xed/0x2e0
   inet_sock_destruct+0x54f/0x8b0
   __sk_destruct+0x48/0x5b0
   rcu_do_batch+0x34e/0xd90
   rcu_core+0x559/0xac0
   __do_softirq+0x183/0x5a4
   irq_exit_rcu+0x12d/0x170
   sysvec_apic_timer_interrupt+0x6b/0x80
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   asm_sysvec_apic_timer_interrupt+0x16/0x20
  RIP: 0010:cpuidle_enter_state+0x175/0x300
  Code: 30 00 0f 84 1f 01 00 00 83 e8 01 83 f8 ff 75 e5 48 83 c4 18 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc fb 45 85 ed &lt;0f&gt; 89 60 ff ff ff 48 c1 e5 06 48 c7 43 18 00 00 00 00 48 83 44 2b
  RSP: 0018:ffff888481cf7d90 EFLAGS: 00000202
  RAX: 0000000000000000 RBX: ffff88887facddc8 RCX: 0000000000000000
  RDX: 1ffff1110ff588b1 RSI: 0000000000000019 RDI: ffff88887fac4588
  RBP: 0000000000000004 R08: 0000000000000002 R09: 0000000000043080
  R10: 0009b02ea273363f R11: ffff88887fabf42b R12: ffffffff932592e0
  R13: 0000000000000004 R14: 0000000000000000 R15: 00000022c880ec80
   cpuidle_enter+0x4a/0xa0
   do_idle+0x310/0x410
   cpu_startup_entry+0x51/0x60
   start_secondary+0x211/0x270
   secondary_startup_64_no_verify+0x184/0x18b
   &lt;/TASK&gt;

  Allocated by task 6853:
   kasan_save_stack+0x1c/0x40
   kasan_save_track+0x10/0x30
   __kasan_kmalloc+0xa6/0xb0
   __kmalloc+0x1eb/0x450
   cipso_v4_sock_setattr+0x96/0x360
   netlbl_sock_setattr+0x132/0x1f0
   selinux_netlbl_socket_post_create+0x6c/0x110
   selinux_socket_post_create+0x37b/0x7f0
   security_socket_post_create+0x63/0xb0
   __sock_create+0x305/0x450
   __sys_socket_create.part.23+0xbd/0x130
   __sys_socket+0x37/0xb0
   __x64_sys_socket+0x6f/0xb0
   do_syscall_64+0x83/0x160
   entry_SYSCALL_64_after_hwframe+0x6e/0x76

  Freed by task 6858:
   kasan_save_stack+0x1c/0x40
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x3b/0x60
   __kasan_slab_free+0x12c/0x1f0
   kfree+0xed/0x2e0
   inet_sock_destruct+0x54f/0x8b0
   __sk_destruct+0x48/0x5b0
   subflow_ulp_release+0x1f0/0x250
   tcp_cleanup_ulp+0x6e/0x110
   tcp_v4_destroy_sock+0x5a/0x3a0
   inet_csk_destroy_sock+0x135/0x390
   tcp_fin+0x416/0x5c0
   tcp_data_queue+0x1bc8/0x4310
   tcp_rcv_state_process+0x15a3/0x47b0
   tcp_v4_do_rcv+0x2c1/0x990
   tcp_v4_rcv+0x41fb/0x5ed0
   ip_protocol_deliver_rcu+0x6d/0x9f0
   ip_local_deliver_finish+0x278/0x360
   ip_local_deliver+0x182/0x2c0
   ip_rcv+0xb5/0x1c0
   __netif_receive_skb_one_core+0x16e/0x1b0
   process_backlog+0x1e3/0x650
   __napi_poll+0xa6/0x500
   net_rx_action+0x740/0xbb0
   __do_softirq+0x183/0x5a4

  The buggy address belongs to the object at ffff888485950880
   which belongs to the cache kmalloc-64 of size 64
  The buggy address is located 0 bytes inside of
   64-byte region [ffff888485950880, ffff8884859508c0)

  The buggy address belongs to the physical page:
  page:0000000056d1e95e refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888485950700 pfn:0x485950
  flags: 0x57ffffc0000800(slab|node=1|zone=2|lastcpupid=0x1fffff)
  page_type: 0xffffffff()
  raw: 0057ffffc0000800 ffff88810004c640 ffffea00121b8ac0 dead000000000006
  raw: ffff888485950700 0000000000200019 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888485950780: fa fb fb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index

With numa balancing on, when a numa system is running where a numa node
doesn't have its local memory so it has no managed zones, the following
oops has been observed.  It's because wakeup_kswapd() is called with a
wrong zone index, -1.  Fixed it by checking the index before calling
wakeup_kswapd().

&gt; BUG: unable to handle page fault for address: 00000000000033f3
&gt; #PF: supervisor read access in kernel mode
&gt; #PF: error_code(0x0000) - not-present page
&gt; PGD 0 P4D 0
&gt; Oops: 0000 [#1] PREEMPT SMP NOPTI
&gt; CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255
&gt; Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
&gt;    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
&gt; RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)
&gt; Code: (omitted)
&gt; RSP: 0000:ffffc90004257d58 EFLAGS: 00010286
&gt; RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003
&gt; RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480
&gt; RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff
&gt; R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003
&gt; R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940
&gt; FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000
&gt; CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&gt; CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0
&gt; DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
&gt; DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
&gt; PKRU: 55555554
&gt; Call Trace:
&gt;  &lt;TASK&gt;
&gt; ? __die
&gt; ? page_fault_oops
&gt; ? __pte_offset_map_lock
&gt; ? exc_page_fault
&gt; ? asm_exc_page_fault
&gt; ? wakeup_kswapd
&gt; migrate_misplaced_page
&gt; __handle_mm_fault
&gt; handle_mm_fault
&gt; do_user_addr_fault
&gt; exc_page_fault
&gt; asm_exc_page_fault
&gt; RIP: 0033:0x55b897ba0808
&gt; Code: (omitted)
&gt; RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287
&gt; RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0
&gt; RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0
&gt; RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075
&gt; R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
&gt; R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000
&gt;  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222615">SUSE bug 1222615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26784" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26784" ref_url="https://www.suse.com/security/cve/CVE-2024-26784" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: arm: Fix NULL dereference on scmi_perf_domain removal

On unloading of the scmi_perf_domain module got the below splat, when in
the DT provided to the system under test the '#power-domain-cells' property
was missing. Indeed, this particular setup causes the probe to bail out
early without giving any error, which leads to the -&gt;remove() callback gets
to run too, but without all the expected initialized structures in place.

Add a check and bail out early on remove too.

 Call trace:
  scmi_perf_domain_remove+0x28/0x70 [scmi_perf_domain]
  scmi_dev_remove+0x28/0x40 [scmi_core]
  device_remove+0x54/0x90
  device_release_driver_internal+0x1dc/0x240
  driver_detach+0x58/0xa8
  bus_remove_driver+0x78/0x108
  driver_unregister+0x38/0x70
  scmi_driver_unregister+0x28/0x180 [scmi_core]
  scmi_perf_domain_driver_exit+0x18/0xb78 [scmi_perf_domain]
  __arm64_sys_delete_module+0x1a8/0x2c0
  invoke_syscall+0x50/0x128
  el0_svc_common.constprop.0+0x48/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x34/0xb8
  el0t_64_sync_handler+0x100/0x130
  el0t_64_sync+0x190/0x198
 Code: a90153f3 f9403c14 f9414800 955f8a05 (b9400a80)
 ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26784/">CVE-2024-26784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26784">CVE-2024-26784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222778">SUSE bug 1222778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26785" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26785" ref_url="https://www.suse.com/security/cve/CVE-2024-26785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Fix protection fault in iommufd_test_syz_conv_iova

Syzkaller reported the following bug:

  general protection fault, probably for non-canonical address 0xdffffc0000000038: 0000 [#1] SMP KASAN
  KASAN: null-ptr-deref in range [0x00000000000001c0-0x00000000000001c7]
  Call Trace:
   lock_acquire
   lock_acquire+0x1ce/0x4f0
   down_read+0x93/0x4a0
   iommufd_test_syz_conv_iova+0x56/0x1f0
   iommufd_test_access_rw.isra.0+0x2ec/0x390
   iommufd_test+0x1058/0x1e30
   iommufd_fops_ioctl+0x381/0x510
   vfs_ioctl
   __do_sys_ioctl
   __se_sys_ioctl
   __x64_sys_ioctl+0x170/0x1e0
   do_syscall_x64
   do_syscall_64+0x71/0x140

This is because the new iommufd_access_change_ioas() sets access-&gt;ioas to
NULL during its process, so the lock might be gone in a concurrent racing
context.

Fix this by doing the same access-&gt;ioas sanity as iommufd_access_rw() and
iommufd_access_pin_pages() functions do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26785/">CVE-2024-26785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26785">CVE-2024-26785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222779">SUSE bug 1222779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26786" ref_url="https://www.suse.com/security/cve/CVE-2024-26786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Fix iopt_access_list_id overwrite bug

Syzkaller reported the following WARN_ON:
  WARNING: CPU: 1 PID: 4738 at drivers/iommu/iommufd/io_pagetable.c:1360

  Call Trace:
   iommufd_access_change_ioas+0x2fe/0x4e0
   iommufd_access_destroy_object+0x50/0xb0
   iommufd_object_remove+0x2a3/0x490
   iommufd_object_destroy_user
   iommufd_access_destroy+0x71/0xb0
   iommufd_test_staccess_release+0x89/0xd0
   __fput+0x272/0xb50
   __fput_sync+0x4b/0x60
   __do_sys_close
   __se_sys_close
   __x64_sys_close+0x8b/0x110
   do_syscall_x64

The mismatch between the access pointer in the list and the passed-in
pointer is resulting from an overwrite of access-&gt;iopt_access_list_id, in
iopt_add_access(). Called from iommufd_access_change_ioas() when
xa_alloc() succeeds but iopt_calculate_iova_alignment() fails.

Add a new_id in iopt_add_access() and only update iopt_access_list_id when
returning successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26786/">CVE-2024-26786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26786">CVE-2024-26786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222780">SUSE bug 1222780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmci: stm32: fix DMA API overlapping mappings warning

Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning:

DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,
overlapping mappings aren't supported
WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568
add_dma_entry+0x234/0x2f4
Modules linked in:
CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1
Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)
Workqueue: events_freezable mmc_rescan
Call trace:
add_dma_entry+0x234/0x2f4
debug_dma_map_sg+0x198/0x350
__dma_map_sg_attrs+0xa0/0x110
dma_map_sg_attrs+0x10/0x2c
sdmmc_idma_prep_data+0x80/0xc0
mmci_prep_data+0x38/0x84
mmci_start_data+0x108/0x2dc
mmci_request+0xe4/0x190
__mmc_start_request+0x68/0x140
mmc_start_request+0x94/0xc0
mmc_wait_for_req+0x70/0x100
mmc_send_tuning+0x108/0x1ac
sdmmc_execute_tuning+0x14c/0x210
mmc_execute_tuning+0x48/0xec
mmc_sd_init_uhs_card.part.0+0x208/0x464
mmc_sd_init_card+0x318/0x89c
mmc_attach_sd+0xe4/0x180
mmc_rescan+0x244/0x320

DMA API debug brings to light leaking dma-mappings as dma_map_sg and
dma_unmap_sg are not correctly balanced.

If an error occurs in mmci_cmd_irq function, only mmci_dma_error
function is called and as this API is not managed on stm32 variant,
dma_unmap_sg is never called in this error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222781">SUSE bug 1222781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26788" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: init irq after reg initialization

Initialize the qDMA irqs after the registers are configured so that
interrupts that may have been pending from a primary kernel don't get
processed by the irq handler before it is ready to and cause panic with
the following trace:

  Call trace:
   fsl_qdma_queue_handler+0xf8/0x3e8
   __handle_irq_event_percpu+0x78/0x2b0
   handle_irq_event_percpu+0x1c/0x68
   handle_irq_event+0x44/0x78
   handle_fasteoi_irq+0xc8/0x178
   generic_handle_irq+0x24/0x38
   __handle_domain_irq+0x90/0x100
   gic_handle_irq+0x5c/0xb8
   el1_irq+0xb8/0x180
   _raw_spin_unlock_irqrestore+0x14/0x40
   __setup_irq+0x4bc/0x798
   request_threaded_irq+0xd8/0x190
   devm_request_threaded_irq+0x74/0xe8
   fsl_qdma_probe+0x4d4/0xca8
   platform_drv_probe+0x50/0xa0
   really_probe+0xe0/0x3f8
   driver_probe_device+0x64/0x130
   device_driver_attach+0x6c/0x78
   __driver_attach+0xbc/0x158
   bus_for_each_dev+0x5c/0x98
   driver_attach+0x20/0x28
   bus_add_driver+0x158/0x220
   driver_register+0x60/0x110
   __platform_driver_register+0x44/0x50
   fsl_qdma_driver_init+0x18/0x20
   do_one_initcall+0x48/0x258
   kernel_init_freeable+0x1a4/0x23c
   kernel_init+0x10/0xf8
   ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222783">SUSE bug 1222783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26789" ref_url="https://www.suse.com/security/cve/CVE-2024-26789" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: arm64/neonbs - fix out-of-bounds access on short input

The bit-sliced implementation of AES-CTR operates on blocks of 128
bytes, and will fall back to the plain NEON version for tail blocks or
inputs that are shorter than 128 bytes to begin with.

It will call straight into the plain NEON asm helper, which performs all
memory accesses in granules of 16 bytes (the size of a NEON register).
For this reason, the associated plain NEON glue code will copy inputs
shorter than 16 bytes into a temporary buffer, given that this is a rare
occurrence and it is not worth the effort to work around this in the asm
code.

The fallback from the bit-sliced NEON version fails to take this into
account, potentially resulting in out-of-bounds accesses. So clone the
same workaround, and use a temp buffer for short in/outputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26789/">CVE-2024-26789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26789">CVE-2024-26789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222626">SUSE bug 1222626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26790" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read

There is chip (ls1028a) errata:

The SoC may hang on 16 byte unaligned read transactions by QDMA.

Unaligned read transactions initiated by QDMA may stall in the NOC
(Network On-Chip), causing a deadlock condition. Stalled transactions will
trigger completion timeouts in PCIe controller.

Workaround:
Enable prefetch by setting the source descriptor prefetchable bit
( SD[PF] = 1 ).

Implement this workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222784">SUSE bug 1222784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: dev-replace: properly validate device names

There's a syzbot report that device name buffers passed to device
replace are not properly checked for string termination which could lead
to a read out of bounds in getname_kernel().

Add a helper that validates both source and target device name buffers.
For devid as the source initialize the buffer to empty string in case
something tries to read it later.

This was originally analyzed and fixed in a different way by Edward Adam
Davis (see links).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222793">SUSE bug 1222793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26792" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double free of anonymous device after snapshot creation failure

When creating a snapshot we may do a double free of an anonymous device
in case there's an error committing the transaction. The second free may
result in freeing an anonymous device number that was allocated by some
other subsystem in the kernel or another btrfs filesystem.

The steps that lead to this:

1) At ioctl.c:create_snapshot() we allocate an anonymous device number
   and assign it to pending_snapshot-&gt;anon_dev;

2) Then we call btrfs_commit_transaction() and end up at
   transaction.c:create_pending_snapshot();

3) There we call btrfs_get_new_fs_root() and pass it the anonymous device
   number stored in pending_snapshot-&gt;anon_dev;

4) btrfs_get_new_fs_root() frees that anonymous device number because
   btrfs_lookup_fs_root() returned a root - someone else did a lookup
   of the new root already, which could some task doing backref walking;

5) After that some error happens in the transaction commit path, and at
   ioctl.c:create_snapshot() we jump to the 'fail' label, and after
   that we free again the same anonymous device number, which in the
   meanwhile may have been reallocated somewhere else, because
   pending_snapshot-&gt;anon_dev still has the same value as in step 1.

Recently syzbot ran into this and reported the following trace:

  ------------[ cut here ]------------
  ida_free called for id=51 which is not allocated.
  WARNING: CPU: 1 PID: 31038 at lib/idr.c:525 ida_free+0x370/0x420 lib/idr.c:525
  Modules linked in:
  CPU: 1 PID: 31038 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-00410-gc02197fc9076 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
  RIP: 0010:ida_free+0x370/0x420 lib/idr.c:525
  Code: 10 42 80 3c 28 (...)
  RSP: 0018:ffffc90015a67300 EFLAGS: 00010246
  RAX: be5130472f5dd000 RBX: 0000000000000033 RCX: 0000000000040000
  RDX: ffffc90009a7a000 RSI: 000000000003ffff RDI: 0000000000040000
  RBP: ffffc90015a673f0 R08: ffffffff81577992 R09: 1ffff92002b4cdb4
  R10: dffffc0000000000 R11: fffff52002b4cdb5 R12: 0000000000000246
  R13: dffffc0000000000 R14: ffffffff8e256b80 R15: 0000000000000246
  FS:  00007fca3f4b46c0(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f167a17b978 CR3: 000000001ed26000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   btrfs_get_root_ref+0xa48/0xaf0 fs/btrfs/disk-io.c:1346
   create_pending_snapshot+0xff2/0x2bc0 fs/btrfs/transaction.c:1837
   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1931
   btrfs_commit_transaction+0xf1c/0x3740 fs/btrfs/transaction.c:2404
   create_snapshot+0x507/0x880 fs/btrfs/ioctl.c:848
   btrfs_mksubvol+0x5d0/0x750 fs/btrfs/ioctl.c:998
   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1044
   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1306
   btrfs_ioctl_snap_create_v2+0x1ca/0x400 fs/btrfs/ioctl.c:1393
   btrfs_ioctl+0xa74/0xd40
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:871 [inline]
   __se_sys_ioctl+0xfe/0x170 fs/ioctl.c:857
   do_syscall_64+0xfb/0x240
   entry_SYSCALL_64_after_hwframe+0x6f/0x77
  RIP: 0033:0x7fca3e67dda9
  Code: 28 00 00 00 (...)
  RSP: 002b:00007fca3f4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 00007fca3e7abf80 RCX: 00007fca3e67dda9
  RDX: 00000000200005c0 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 00007fca3e6ca47a R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
  R13: 000000000000000b R14: 00007fca3e7abf80 R15: 00007fff6bf95658
   &lt;/TASK&gt;

Where we get an explicit message where we attempt to free an anonymous
device number that is not currently allocated. It happens in a different
code path from the example below, at btrfs_get_root_ref(), so this change
may not fix the case triggered by sy
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26793" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: fix use-after-free and null-ptr-deref in gtp_newlink()

The gtp_link_ops operations structure for the subsystem must be
registered after registering the gtp_net_ops pernet operations structure.

Syzkaller hit 'general protection fault in gtp_genl_dump_pdp' bug:

[ 1010.702740] gtp: GTP module unloaded
[ 1010.715877] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
[ 1010.715888] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 1010.715895] CPU: 1 PID: 128616 Comm: a.out Not tainted 6.8.0-rc6-std-def-alt1 #1
[ 1010.715899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 04/01/2014
[ 1010.715908] RIP: 0010:gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.715915] Code: 80 3c 02 00 0f 85 41 04 00 00 48 8b bb d8 05 00 00 e8 ed f6 ff ff 48 89 c2 48 89 c5 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4f 04 00 00 4c 89 e2 4c 8b 6d 00 48 b8 00 00 00
[ 1010.715920] RSP: 0018:ffff888020fbf180 EFLAGS: 00010203
[ 1010.715929] RAX: dffffc0000000000 RBX: ffff88800399c000 RCX: 0000000000000000
[ 1010.715933] RDX: 0000000000000001 RSI: ffffffff84805280 RDI: 0000000000000282
[ 1010.715938] RBP: 000000000000000d R08: 0000000000000001 R09: 0000000000000000
[ 1010.715942] R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800399cc80
[ 1010.715947] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000400
[ 1010.715953] FS:  00007fd1509ab5c0(0000) GS:ffff88805b300000(0000) knlGS:0000000000000000
[ 1010.715958] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1010.715962] CR2: 0000000000000000 CR3: 000000001c07a000 CR4: 0000000000750ee0
[ 1010.715968] PKRU: 55555554
[ 1010.715972] Call Trace:
[ 1010.715985]  ? __die_body.cold+0x1a/0x1f
[ 1010.715995]  ? die_addr+0x43/0x70
[ 1010.716002]  ? exc_general_protection+0x199/0x2f0
[ 1010.716016]  ? asm_exc_general_protection+0x1e/0x30
[ 1010.716026]  ? gtp_newlink+0x4d7/0x9c0 [gtp]
[ 1010.716034]  ? gtp_net_exit+0x150/0x150 [gtp]
[ 1010.716042]  __rtnl_newlink+0x1063/0x1700
[ 1010.716051]  ? rtnl_setlink+0x3c0/0x3c0
[ 1010.716063]  ? is_bpf_text_address+0xc0/0x1f0
[ 1010.716070]  ? kernel_text_address.part.0+0xbb/0xd0
[ 1010.716076]  ? __kernel_text_address+0x56/0xa0
[ 1010.716084]  ? unwind_get_return_address+0x5a/0xa0
[ 1010.716091]  ? create_prof_cpu_mask+0x30/0x30
[ 1010.716098]  ? arch_stack_walk+0x9e/0xf0
[ 1010.716106]  ? stack_trace_save+0x91/0xd0
[ 1010.716113]  ? stack_trace_consume_entry+0x170/0x170
[ 1010.716121]  ? __lock_acquire+0x15c5/0x5380
[ 1010.716139]  ? mark_held_locks+0x9e/0xe0
[ 1010.716148]  ? kmem_cache_alloc_trace+0x35f/0x3c0
[ 1010.716155]  ? __rtnl_newlink+0x1700/0x1700
[ 1010.716160]  rtnl_newlink+0x69/0xa0
[ 1010.716166]  rtnetlink_rcv_msg+0x43b/0xc50
[ 1010.716172]  ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716179]  ? lock_acquire+0x1fe/0x560
[ 1010.716188]  ? netlink_deliver_tap+0x12f/0xd50
[ 1010.716196]  netlink_rcv_skb+0x14d/0x440
[ 1010.716202]  ? rtnl_fdb_dump+0x9f0/0x9f0
[ 1010.716208]  ? netlink_ack+0xab0/0xab0
[ 1010.716213]  ? netlink_deliver_tap+0x202/0xd50
[ 1010.716220]  ? netlink_deliver_tap+0x218/0xd50
[ 1010.716226]  ? __virt_addr_valid+0x30b/0x590
[ 1010.716233]  netlink_unicast+0x54b/0x800
[ 1010.716240]  ? netlink_attachskb+0x870/0x870
[ 1010.716248]  ? __check_object_size+0x2de/0x3b0
[ 1010.716254]  netlink_sendmsg+0x938/0xe40
[ 1010.716261]  ? netlink_unicast+0x800/0x800
[ 1010.716269]  ? __import_iovec+0x292/0x510
[ 1010.716276]  ? netlink_unicast+0x800/0x800
[ 1010.716284]  __sock_sendmsg+0x159/0x190
[ 1010.716290]  ____sys_sendmsg+0x712/0x880
[ 1010.716297]  ? sock_write_iter+0x3d0/0x3d0
[ 1010.716304]  ? __ia32_sys_recvmmsg+0x270/0x270
[ 1010.716309]  ? lock_acquire+0x1fe/0x560
[ 1010.716315]  ? drain_array_locked+0x90/0x90
[ 1010.716324]  ___sys_sendmsg+0xf8/0x170
[ 1010.716331]  ? sendmsg_copy_msghdr+0x170/0x170
[ 1010.716337]  ? lockdep_init_map
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-12-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222428">SUSE bug 1222428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26794" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26794" ref_url="https://www.suse.com/security/cve/CVE-2024-26794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race between ordered extent completion and fiemap

For fiemap we recently stopped locking the target extent range for the
whole duration of the fiemap call, in order to avoid a deadlock in a
scenario where the fiemap buffer happens to be a memory mapped range of
the same file. This use case is very unlikely to be useful in practice but
it may be triggered by fuzz testing (syzbot, etc).

However by not locking the target extent range for the whole duration of
the fiemap call we can race with an ordered extent. This happens like
this:

1) The fiemap task finishes processing a file extent item that covers
   the file range [512K, 1M[, and that file extent item is the last item
   in the leaf currently being processed;

2) And ordered extent for the file range [768K, 2M[, in COW mode,
   completes (btrfs_finish_one_ordered()) and the file extent item
   covering the range [512K, 1M[ is trimmed to cover the range
   [512K, 768K[ and then a new file extent item for the range [768K, 2M[
   is inserted in the inode's subvolume tree;

3) The fiemap task calls fiemap_next_leaf_item(), which then calls
   btrfs_next_leaf() to find the next leaf / item. This finds that the
   the next key following the one we previously processed (its type is
   BTRFS_EXTENT_DATA_KEY and its offset is 512K), is the key corresponding
   to the new file extent item inserted by the ordered extent, which has
   a type of BTRFS_EXTENT_DATA_KEY and an offset of 768K;

4) Later the fiemap code ends up at emit_fiemap_extent() and triggers
   the warning:

      if (cache-&gt;offset + cache-&gt;len &gt; offset) {
               WARN_ON(1);
               return -EINVAL;
      }

   Since we get 1M &gt; 768K, because the previously emitted entry for the
   old extent covering the file range [512K, 1M[ ends at an offset that
   is greater than the new extent's start offset (768K). This makes fiemap
   fail with -EINVAL besides triggering the warning that produces a stack
   trace like the following:

     [1621.677651] ------------[ cut here ]------------
     [1621.677656] WARNING: CPU: 1 PID: 204366 at fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs]
     [1621.677899] Modules linked in: btrfs blake2b_generic (...)
     [1621.677951] CPU: 1 PID: 204366 Comm: pool Not tainted 6.8.0-rc5-btrfs-next-151+ #1
     [1621.677954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014
     [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs]
     [1621.678033] Code: 2b 4c 89 63 (...)
     [1621.678035] RSP: 0018:ffffab16089ffd20 EFLAGS: 00010206
     [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000
     [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI: ffffab16089ffe90
     [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 0000000000000000
     [1621.678041] R10: 0000000000000000 R11: 0000000000001000 R12: 0000000041d78000
     [1621.678043] R13: 0000000000001000 R14: 0000000000000000 R15: ffff9434f0b17850
     [1621.678044] FS:  00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) knlGS:0000000000000000
     [1621.678046] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
     [1621.678048] CR2: 00007fa6b0801000 CR3: 000000012d404002 CR4: 0000000000370ef0
     [1621.678053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
     [1621.678055] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
     [1621.678056] Call Trace:
     [1621.678074]  &lt;TASK&gt;
     [1621.678076]  ? __warn+0x80/0x130
     [1621.678082]  ? emit_fiemap_extent+0x84/0x90 [btrfs]
     [1621.678159]  ? report_bug+0x1f4/0x200
     [1621.678164]  ? handle_bug+0x42/0x70
     [1621.678167]  ? exc_invalid_op+0x14/0x70
     [1621.678170]  ? asm_exc_invalid_op+0x16/0x20
     [1621.678178]  ? emit_fiemap_extent+0x84/0x90 [btrfs]
     [1621.678253]  extent_fiemap+0x766
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26794/">CVE-2024-26794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26794">CVE-2024-26794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222426">SUSE bug 1222426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26795" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26795" ref_url="https://www.suse.com/security/cve/CVE-2024-26795" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Sparse-Memory/vmemmap out-of-bounds fix

Offset vmemmap so that the first page of vmemmap will be mapped
to the first page of physical memory in order to ensure that
vmemmap's bounds will be respected during
pfn_to_page()/page_to_pfn() operations.
The conversion macros will produce correct SV39/48/57 addresses
for every possible/valid DRAM_BASE inside the physical memory limits.

v2:Address Alex's comments
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26795/">CVE-2024-26795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26795">CVE-2024-26795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222794">SUSE bug 1222794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26796" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26796" ref_url="https://www.suse.com/security/cve/CVE-2024-26796" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: perf: ctr_get_width function for legacy is not defined

With parameters CONFIG_RISCV_PMU_LEGACY=y and CONFIG_RISCV_PMU_SBI=n
linux kernel crashes when you try perf record:

$ perf record ls
[ 46.749286] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[ 46.750199] Oops [#1]
[ 46.750342] Modules linked in:
[ 46.750608] CPU: 0 PID: 107 Comm: perf-exec Not tainted 6.6.0 #2
[ 46.750906] Hardware name: riscv-virtio,qemu (DT)
[ 46.751184] epc : 0x0
[ 46.751430] ra : arch_perf_update_userpage+0x54/0x13e
[ 46.751680] epc : 0000000000000000 ra : ffffffff8072ee52 sp : ff2000000022b8f0
[ 46.751958] gp : ffffffff81505988 tp : ff6000000290d400 t0 : ff2000000022b9c0
[ 46.752229] t1 : 0000000000000001 t2 : 0000000000000003 s0 : ff2000000022b930
[ 46.752451] s1 : ff600000028fb000 a0 : 0000000000000000 a1 : ff600000028fb000
[ 46.752673] a2 : 0000000ae2751268 a3 : 00000000004fb708 a4 : 0000000000000004
[ 46.752895] a5 : 0000000000000000 a6 : 000000000017ffe3 a7 : 00000000000000d2
[ 46.753117] s2 : ff600000028fb000 s3 : 0000000ae2751268 s4 : 0000000000000000
[ 46.753338] s5 : ffffffff8153e290 s6 : ff600000863b9000 s7 : ff60000002961078
[ 46.753562] s8 : ff60000002961048 s9 : ff60000002961058 s10: 0000000000000001
[ 46.753783] s11: 0000000000000018 t3 : ffffffffffffffff t4 : ffffffffffffffff
[ 46.754005] t5 : ff6000000292270c t6 : ff2000000022bb30
[ 46.754179] status: 0000000200000100 badaddr: 0000000000000000 cause: 000000000000000c
[ 46.754653] Code: Unable to access instruction at 0xffffffffffffffec.
[ 46.754939] ---[ end trace 0000000000000000 ]---
[ 46.755131] note: perf-exec[107] exited with irqs disabled
[ 46.755546] note: perf-exec[107] exited with preempt_count 4

This happens because in the legacy case the ctr_get_width function was not
defined, but it is used in arch_perf_update_userpage.

Also remove extra check in riscv_pmu_ctr_get_width_mask
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26796/">CVE-2024-26796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26796">CVE-2024-26796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222795">SUSE bug 1222795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26797" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26797" ref_url="https://www.suse.com/security/cve/CVE-2024-26797" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Prevent potential buffer overflow in map_hw_resources

Adds a check in the map_hw_resources function to prevent a potential
buffer overflow. The function was accessing arrays using an index that
could potentially be greater than the size of the arrays, leading to a
buffer overflow.

Adds a check to ensure that the index is within the bounds of the
arrays. If the index is out of bounds, an error message is printed and
break it will continue execution with just ignoring extra data early to
prevent the buffer overflow.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:79 map_hw_resources() error: buffer overflow 'dml2-&gt;v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_stream_id' 6 &lt;= 7
drivers/gpu/drm/amd/amdgpu/../display/dc/dml2/dml2_wrapper.c:81 map_hw_resources() error: buffer overflow 'dml2-&gt;v20.scratch.dml_to_dc_pipe_mapping.disp_cfg_to_plane_id' 6 &lt;= 7
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26797/">CVE-2024-26797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26797">CVE-2024-26797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222425">SUSE bug 1222425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: always restore the old font data in fbcon_do_set_font()

Commit a5a923038d70 (fbdev: fbcon: Properly revert changes when
vc_resize() failed) started restoring old font data upon failure (of
vc_resize()). But it performs so only for user fonts. It means that the
"system"/internal fonts are not restored at all. So in result, the very
first call to fbcon_do_set_font() performs no restore at all upon
failing vc_resize().

This can be reproduced by Syzkaller to crash the system on the next
invocation of font_get(). It's rather hard to hit the allocation failure
in vc_resize() on the first font_set(), but not impossible. Esp. if
fault injection is used to aid the execution/failure. It was
demonstrated by Sirius:
  BUG: unable to handle page fault for address: fffffffffffffff8
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD cb7b067 P4D cb7b067 PUD cb7d067 PMD 0
  Oops: 0000 [#1] PREEMPT SMP KASAN
  CPU: 1 PID: 8007 Comm: poc Not tainted 6.7.0-g9d1694dc91ce #20
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:fbcon_get_font+0x229/0x800 drivers/video/fbdev/core/fbcon.c:2286
  Call Trace:
   &lt;TASK&gt;
   con_font_get drivers/tty/vt/vt.c:4558 [inline]
   con_font_op+0x1fc/0xf20 drivers/tty/vt/vt.c:4673
   vt_k_ioctl drivers/tty/vt/vt_ioctl.c:474 [inline]
   vt_ioctl+0x632/0x2ec0 drivers/tty/vt/vt_ioctl.c:752
   tty_ioctl+0x6f8/0x1570 drivers/tty/tty_io.c:2803
   vfs_ioctl fs/ioctl.c:51 [inline]
  ...

So restore the font data in any case, not only for user fonts. Note the
later 'if' is now protected by 'old_userfont' and not 'old_data' as the
latter is always set now. (And it is supposed to be non-NULL. Otherwise
we would see the bug above again.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222798">SUSE bug 1222798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26799" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26799" ref_url="https://www.suse.com/security/cve/CVE-2024-26799" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: Fix uninitialized pointer dmactl

In the case where __lpass_get_dmactl_handle is called and the driver
id dai_id is invalid the pointer dmactl is not being assigned a value,
and dmactl contains a garbage value since it has not been initialized
and so the null check may not work. Fix this to initialize dmactl to
NULL. One could argue that modern compilers will set this to zero, but
it is useful to keep this initialized as per the same way in functions
__lpass_platform_codec_intf_init and lpass_cdc_dma_daiops_hw_params.

Cleans up clang scan build warning:
sound/soc/qcom/lpass-cdc-dma.c:275:7: warning: Branch condition
evaluates to a garbage value [core.uninitialized.Branch]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26799/">CVE-2024-26799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26799">CVE-2024-26799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222415">SUSE bug 1222415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix use-after-free on failed backlog decryption

When the decrypt request goes to the backlog and crypto_aead_decrypt
returns -EBUSY, tls_do_decryption will wait until all async
decryptions have completed. If one of them fails, tls_do_decryption
will return -EBADMSG and tls_decrypt_sg jumps to the error path,
releasing all the pages. But the pages have been passed to the async
callback, and have already been released by tls_decrypt_done.

The only true async case is when crypto_aead_decrypt returns
 -EINPROGRESS. With -EBUSY, we already waited so we can tell
tls_sw_recvmsg that the data is available for immediate copy, but we
need to notify tls_decrypt_sg (via the new -&gt;async_done flag) that the
memory has already been released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Avoid potential use-after-free in hci_error_reset

While handling the HCI_EV_HARDWARE_ERROR event, if the underlying
BT controller is not responding, the GPIO reset mechanism would
free the hci_dev and lead to a use-after-free in hci_error_reset.

Here's the call trace observed on a ChromeOS device with Intel AX201:
   queue_work_on+0x3e/0x6c
   __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth &lt;HASH:3b4a6&gt;]
   ? init_wait_entry+0x31/0x31
   __hci_cmd_sync+0x16/0x20 [bluetooth &lt;HASH:3b4a 6&gt;]
   hci_error_reset+0x4f/0xa4 [bluetooth &lt;HASH:3b4a 6&gt;]
   process_one_work+0x1d8/0x33f
   worker_thread+0x21b/0x373
   kthread+0x13a/0x152
   ? pr_cont_work+0x54/0x54
   ? kthread_blkcg+0x31/0x31
    ret_from_fork+0x1f/0x30

This patch holds the reference count on the hci_dev while processing
a HCI_EV_HARDWARE_ERROR event to avoid potential crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222413">SUSE bug 1222413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

stmmac: Clear variable when destroying workqueue

Currently when suspending driver and stopping workqueue it is checked whether
workqueue is not NULL and if so, it is destroyed.
Function destroy_workqueue() does drain queue and does clear variable, but
it does not set workqueue variable to NULL. This can cause kernel/module
panic if code attempts to clear workqueue that was not initialized.

This scenario is possible when resuming suspended driver in stmmac_resume(),
because there is no handling for failed stmmac_hw_setup(),
which can fail and return if DMA engine has failed to initialize,
and workqueue is initialized after DMA engine.
Should DMA engine fail to initialize, resume will proceed normally,
but interface won't work and TX queue will eventually timeout,
causing 'Reset adapter' error.
This then does destroy workqueue during reset process.
And since workqueue is initialized after DMA engine and can be skipped,
it will cause kernel/module panic.

To secure against this possible crash, set workqueue variable to NULL when
destroying workqueue.

Log/backtrace from crash goes as follows:
[88.031977]------------[ cut here ]------------
[88.031985]NETDEV WATCHDOG: eth0 (sxgmac): transmit queue 1 timed out
[88.032017]WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:477 dev_watchdog+0x390/0x398
           &lt;Skipping backtrace for watchdog timeout&gt;
[88.032251]---[ end trace e70de432e4d5c2c0 ]---
[88.032282]sxgmac 16d88000.ethernet eth0: Reset adapter.
[88.036359]------------[ cut here ]------------
[88.036519]Call trace:
[88.036523] flush_workqueue+0x3e4/0x430
[88.036528] drain_workqueue+0xc4/0x160
[88.036533] destroy_workqueue+0x40/0x270
[88.036537] stmmac_fpe_stop_wq+0x4c/0x70
[88.036541] stmmac_release+0x278/0x280
[88.036546] __dev_close_many+0xcc/0x158
[88.036551] dev_close_many+0xbc/0x190
[88.036555] dev_close.part.0+0x70/0xc0
[88.036560] dev_close+0x24/0x30
[88.036564] stmmac_service_task+0x110/0x140
[88.036569] process_one_work+0x1d8/0x4a0
[88.036573] worker_thread+0x54/0x408
[88.036578] kthread+0x164/0x170
[88.036583] ret_from_fork+0x10/0x20
[88.036588]---[ end trace e70de432e4d5c2c1 ]---
[88.036597]Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222799">SUSE bug 1222799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26803" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26803" ref_url="https://www.suse.com/security/cve/CVE-2024-26803" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: veth: clear GRO when clearing XDP even when down

veth sets NETIF_F_GRO automatically when XDP is enabled,
because both features use the same NAPI machinery.

The logic to clear NETIF_F_GRO sits in veth_disable_xdp() which
is called both on ndo_stop and when XDP is turned off.
To avoid the flag from being cleared when the device is brought
down, the clearing is skipped when IFF_UP is not set.
Bringing the device down should indeed not modify its features.

Unfortunately, this means that clearing is also skipped when
XDP is disabled _while_ the device is down. And there's nothing
on the open path to bring the device features back into sync.
IOW if user enables XDP, disables it and then brings the device
up we'll end up with a stray GRO flag set but no NAPI instances.

We don't depend on the GRO flag on the datapath, so the datapath
won't crash. We will crash (or hang), however, next time features
are sync'ed (either by user via ethtool or peer changing its config).
The GRO flag will go away, and veth will try to disable the NAPIs.
But the open path never created them since XDP was off, the GRO flag
was a stray. If NAPI was initialized before we'll hang in napi_disable().
If it never was we'll crash trying to stop uninitialized hrtimer.

Move the GRO flag updates to the XDP enable / disable paths,
instead of mixing them with the ndo_open / ndo_close paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26803/">CVE-2024-26803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26803">CVE-2024-26803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222788">SUSE bug 1222788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: prevent perpetual headroom growth

syzkaller triggered following kasan splat:
BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191
[..]
 kasan_report+0xda/0x110 mm/kasan/report.c:588
 __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
 skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]
 ___skb_get_hash net/core/flow_dissector.c:1791 [inline]
 __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856
 skb_get_hash include/linux/skbuff.h:1556 [inline]
 ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748
 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592
 ...
 ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 ..
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831
 ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 ...

The splat occurs because skb-&gt;data points past skb-&gt;head allocated area.
This is because neigh layer does:
  __skb_pull(skb, skb_network_offset(skb));

... but skb_network_offset() returns a negative offset and __skb_pull()
arg is unsigned.  IOW, we skb-&gt;data gets "adjusted" by a huge value.

The negative value is returned because skb-&gt;head and skb-&gt;data distance is
more than 64k and skb-&gt;network_header (u16) has wrapped around.

The bug is in the ip_tunnel infrastructure, which can cause
dev-&gt;needed_headroom to increment ad infinitum.

The syzkaller reproducer consists of packets getting routed via a gre
tunnel, and route of gre encapsulated packets pointing at another (ipip)
tunnel.  The ipip encapsulation finds gre0 as next output device.

This results in the following pattern:

1). First packet is to be sent out via gre0.
Route lookup found an output device, ipip0.

2).
ip_tunnel_xmit for gre0 bumps gre0-&gt;needed_headroom based on the future
output device, rt.dev-&gt;needed_headroom (ipip0).

3).
ip output / start_xmit moves skb on to ipip0. which runs the same
code path again (xmit recursion).

4).
Routing step for the post-gre0-encap packet finds gre0 as output device
to use for ipip0 encapsulated packet.

tunl0-&gt;needed_headroom is then incremented based on the (already bumped)
gre0 device headroom.

This repeats for every future packet:

gre0-&gt;needed_headroom gets inflated because previous packets' ipip0 step
incremented rt-&gt;dev (gre0) headroom, and ipip0 incremented because gre0
needed_headroom was increased.

For each subsequent packet, gre/ipip0-&gt;needed_headroom grows until
post-expand-head reallocations result in a skb-&gt;head/data distance of
more than 64k.

Once that happens, skb-&gt;network_header (u16) wraps around when
pskb_expand_head tries to make sure that skb_network_offset() is unchanged
after the headroom expansion/reallocation.

After this skb_network_offset(skb) returns a different (and negative)
result post headroom expansion.

The next trip to neigh layer (or anything else that would __skb_pull the
network header) makes skb-&gt;data point to a memory location outside
skb-&gt;head area.

v2: Cap the needed_headroom update to an arbitarily chosen upperlimit to
prevent perpetual increase instead of dropping the headroom increment
completely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222629">SUSE bug 1222629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter

syzbot reported the following uninit-value access issue [1]:

netlink_to_full_skb() creates a new `skb` and puts the `skb-&gt;data`
passed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data
size is specified as `len` and passed to skb_put_data(). This `len`
is based on `skb-&gt;end` that is not data offset but buffer offset. The
`skb-&gt;end` contains data and tailroom. Since the tailroom is not
initialized when the new `skb` created, KMSAN detects uninitialized
memory area when copying the data.

This patch resolved this issue by correct the len from `skb-&gt;end` to
`skb-&gt;len`, which is the actual data offset.

BUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 copy_to_user_iter lib/iov_iter.c:24 [inline]
 iterate_ubuf include/linux/iov_iter.h:29 [inline]
 iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 iterate_and_advance include/linux/iov_iter.h:271 [inline]
 _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
 copy_to_iter include/linux/uio.h:197 [inline]
 simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532
 __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420
 skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
 skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
 packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482
 sock_recvmsg_nosec net/socket.c:1044 [inline]
 sock_recvmsg net/socket.c:1066 [inline]
 sock_read_iter+0x467/0x580 net/socket.c:1136
 call_read_iter include/linux/fs.h:2014 [inline]
 new_sync_read fs/read_write.c:389 [inline]
 vfs_read+0x8f6/0xe00 fs/read_write.c:470
 ksys_read+0x20f/0x4c0 fs/read_write.c:613
 __do_sys_read fs/read_write.c:623 [inline]
 __se_sys_read fs/read_write.c:621 [inline]
 __x64_sys_read+0x93/0xd0 fs/read_write.c:621
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was stored to memory at:
 skb_put_data include/linux/skbuff.h:2622 [inline]
 netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]
 __netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]
 __netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325
 netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]
 netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]
 netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
 netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368
 netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 free_pages_prepare mm/page_alloc.c:1087 [inline]
 free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347
 free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533
 release_pages+0x23d3/0x2410 mm/swap.c:1042
 free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316
 tlb_batch_pages
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222630">SUSE bug 1222630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26806" ref_url="https://www.suse.com/security/cve/CVE-2024-26806" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks

The -&gt;runtime_suspend() and -&gt;runtime_resume() callbacks are not
expected to call spi_controller_suspend() and spi_controller_resume().
Remove calls to those in the cadence-qspi driver.

Those helpers have two roles currently:
 - They stop/start the queue, including dealing with the kworker.
 - They toggle the SPI controller SPI_CONTROLLER_SUSPENDED flag. It
   requires acquiring ctlr-&gt;bus_lock_mutex.

Step one is irrelevant because cadence-qspi is not queued. Step two
however has two implications:
 - A deadlock occurs, because -&gt;runtime_resume() is called in a context
   where the lock is already taken (in the -&gt;exec_op() callback, where
   the usage count is incremented).
 - It would disallow all operations once the device is auto-suspended.

Here is a brief call tree highlighting the mutex deadlock:

spi_mem_exec_op()
        ...
        spi_mem_access_start()
                mutex_lock(&amp;ctlr-&gt;bus_lock_mutex)

        cqspi_exec_mem_op()
                pm_runtime_resume_and_get()
                        cqspi_resume()
                                spi_controller_resume()
                                        mutex_lock(&amp;ctlr-&gt;bus_lock_mutex)
                ...

        spi_mem_access_end()
                mutex_unlock(&amp;ctlr-&gt;bus_lock_mutex)
        ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26806/">CVE-2024-26806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26806">CVE-2024-26806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222800">SUSE bug 1222800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Both cadence-quadspi -&gt;runtime_suspend() and -&gt;runtime_resume()
implementations start with:

	struct cqspi_st *cqspi = dev_get_drvdata(dev);
	struct spi_controller *host = dev_get_drvdata(dev);

This obviously cannot be correct, unless "struct cqspi_st" is the
first member of " struct spi_controller", or the other way around, but
it is not the case. "struct spi_controller" is allocated by
devm_spi_alloc_host(), which allocates an extra amount of memory for
private data, used to store "struct cqspi_st".

The -&gt;probe() function of the cadence-quadspi driver then sets the
device drvdata to store the address of the "struct cqspi_st"
structure. Therefore:

	struct cqspi_st *cqspi = dev_get_drvdata(dev);

is correct, but:

	struct spi_controller *host = dev_get_drvdata(dev);

is not, as it makes "host" point not to a "struct spi_controller" but
to the same "struct cqspi_st" structure as above.

This obviously leads to bad things (memory corruption, kernel crashes)
directly during -&gt;probe(), as -&gt;probe() enables the device using PM
runtime, leading the -&gt;runtime_resume() hook being called, which in
turns calls spi_controller_resume() with the wrong pointer.

This has at least been reported [0] to cause a kernel crash, but the
exact behavior will depend on the memory contents.

[0] https://lore.kernel.org/all/20240226121803.5a7r5wkpbbowcxgx@dhruva/

This issue potentially affects all platforms that are currently using
the cadence-quadspi driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222801">SUSE bug 1222801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain

Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER
event is reported, otherwise a stale reference to netdevice remains in
the hook list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26809" ref_url="https://www.suse.com/security/cve/CVE-2024-26809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: release elements in clone only from destroy path

Clone already always provides a current view of the lookup table, use it
to destroy the set, otherwise it is possible to destroy elements twice.

This fix requires:

 212ed75dc5fb ("netfilter: nf_tables: integrate pipapo into commit protocol")

which came after:

 9827a0e6e23b ("netfilter: nft_set_pipapo: release elements in clone from abort path").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26809/">CVE-2024-26809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26809">CVE-2024-26809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222633">SUSE bug 1222633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26811" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26811" ref_url="https://www.suse.com/security/cve/CVE-2024-26811" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate payload size in ipc response

If installing malicious ksmbd-tools, ksmbd.mountd can return invalid ipc
response to ksmbd kernel server. ksmbd should validate payload size of
ipc response from ksmbd.mountd to avoid memory overrun or
slab-out-of-bounds. This patch validate 3 ipc response that has payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26811/">CVE-2024-26811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26811">CVE-2024-26811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222805">SUSE bug 1222805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26812" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Create persistent INTx handler

A vulnerability exists where the eventfd for INTx signaling can be
deconfigured, which unregisters the IRQ handler but still allows
eventfds to be signaled with a NULL context through the SET_IRQS ioctl
or through unmask irqfd if the device interrupt is pending.

Ideally this could be solved with some additional locking; the igate
mutex serializes the ioctl and config space accesses, and the interrupt
handler is unregistered relative to the trigger, but the irqfd path
runs asynchronous to those.  The igate mutex cannot be acquired from the
atomic context of the eventfd wake function.  Disabling the irqfd
relative to the eventfd registration is potentially incompatible with
existing userspace.

As a result, the solution implemented here moves configuration of the
INTx interrupt handler to track the lifetime of the INTx context object
and irq_type configuration, rather than registration of a particular
trigger eventfd.  Synchronization is added between the ioctl path and
eventfd_signal() wrapper such that the eventfd trigger can be
dynamically updated relative to in-flight interrupts or irqfd callbacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222808">SUSE bug 1222808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26813" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/platform: Create persistent IRQ handlers

The vfio-platform SET_IRQS ioctl currently allows loopback triggering of
an interrupt before a signaling eventfd has been configured by the user,
which thereby allows a NULL pointer dereference.

Rather than register the IRQ relative to a valid trigger, register all
IRQs in a disabled state in the device open path.  This allows mask
operations on the IRQ to nest within the overall enable state governed
by a valid eventfd signal.  This decouples @masked, protected by the
@locked spinlock from @trigger, protected via the @igate mutex.

In doing so, it's guaranteed that changes to @trigger cannot race the
IRQ handlers because the IRQ handler is synchronously disabled before
modifying the trigger, and loopback triggering of the IRQ via ioctl is
safe due to serialization with trigger changes via igate.

For compatibility, request_irq() failures are maintained to be local to
the SET_IRQS ioctl rather than a fatal error in the open device path.
This allows, for example, a userspace driver with polling mode support
to continue to work regardless of moving the request_irq() call site.
This necessarily blocks all SET_IRQS access to the failed index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/fsl-mc: Block calling interrupt handler without trigger

The eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is
initially NULL and may become NULL if the user sets the trigger
eventfd to -1.  The interrupt handler itself is guaranteed that
trigger is always valid between request_irq() and free_irq(), but
the loopback testing mechanisms to invoke the handler function
need to test the trigger.  The triggering and setting ioctl paths
both make use of igate and are therefore mutually exclusive.

The vfio-fsl-mc driver does not make use of irqfds, nor does it
support any sort of masking operations, therefore unlike vfio-pci
and vfio-platform, the flow can remain essentially unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26815" ref_url="https://www.suse.com/security/cve/CVE-2024-26815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check

taprio_parse_tc_entry() is not correctly checking
TCA_TAPRIO_TC_ENTRY_INDEX attribute:

	int tc; // Signed value

	tc = nla_get_u32(tb[TCA_TAPRIO_TC_ENTRY_INDEX]);
	if (tc &gt;= TC_QOPT_MAX_QUEUE) {
		NL_SET_ERR_MSG_MOD(extack, "TC entry index out of range");
		return -ERANGE;
	}

syzbot reported that it could fed arbitary negative values:

UBSAN: shift-out-of-bounds in net/sched/sch_taprio.c:1722:18
shift exponent -2147418108 is negative
CPU: 0 PID: 5066 Comm: syz-executor367 Not tainted 6.8.0-rc7-syzkaller-00136-gc8a5c731fd12 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  ubsan_epilogue lib/ubsan.c:217 [inline]
  __ubsan_handle_shift_out_of_bounds+0x3c7/0x420 lib/ubsan.c:386
  taprio_parse_tc_entry net/sched/sch_taprio.c:1722 [inline]
  taprio_parse_tc_entries net/sched/sch_taprio.c:1768 [inline]
  taprio_change+0xb87/0x57d0 net/sched/sch_taprio.c:1877
  taprio_init+0x9da/0xc80 net/sched/sch_taprio.c:2134
  qdisc_create+0x9d4/0x1190 net/sched/sch_api.c:1355
  tc_modify_qdisc+0xa26/0x1e40 net/sched/sch_api.c:1776
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6617
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f1b2dea3759
Code: 48 83 c4 28 c3 e8 d7 19 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffd4de452f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f1b2def0390 RCX: 00007f1b2dea3759
RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000004
RBP: 0000000000000003 R08: 0000555500000000 R09: 0000555500000000
R10: 0000555500000000 R11: 0000000000000246 R12: 00007ffd4de45340
R13: 00007ffd4de45310 R14: 0000000000000001 R15: 00007ffd4de45340
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26815/">CVE-2024-26815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26815">CVE-2024-26815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222635">SUSE bug 1222635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86, relocs: Ignore relocations in .notes section

When building with CONFIG_XEN_PV=y, .text symbols are emitted into
the .notes section so that Xen can find the "startup_xen" entry point.
This information is used prior to booting the kernel, so relocations
are not useful. In fact, performing relocations against the .notes
section means that the KASLR base is exposed since /sys/kernel/notes
is world-readable.

To avoid leaking the KASLR base without breaking unprivileged tools that
are expecting to read /sys/kernel/notes, skip performing relocations in
the .notes section. The values readable in .notes are then identical to
those found in System.map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26817" ref_url="https://www.suse.com/security/cve/CVE-2024-26817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amdkfd: use calloc instead of kzalloc to avoid integer overflow

This uses calloc instead of doing the multiplication which might
overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26817/">CVE-2024-26817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26817">CVE-2024-26817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222812">SUSE bug 1222812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26818" ref_url="https://www.suse.com/security/cve/CVE-2024-26818" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tools/rtla: Fix clang warning about mount_point var size

clang is reporting this warning:

$ make HOSTCC=clang CC=clang LLVM_IAS=1
[...]
clang -O -g -DVERSION=\"6.8.0-rc3\" -flto=auto -fexceptions
	-fstack-protector-strong -fasynchronous-unwind-tables
	-fstack-clash-protection  -Wall -Werror=format-security
	-Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS
	$(pkg-config --cflags libtracefs)    -c -o src/utils.o src/utils.c

src/utils.c:548:66: warning: 'fscanf' may overflow; destination buffer in argument 3 has size 1024, but the corresponding specifier may require size 1025 [-Wfortify-source]
  548 |         while (fscanf(fp, "%*s %" STR(MAX_PATH) "s %99s %*s %*d %*d\n", mount_point, type) == 2) {
      |                                                                         ^

Increase mount_point variable size to MAX_PATH+1 to avoid the overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26818/">CVE-2024-26818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26818">CVE-2024-26818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222962">SUSE bug 1222962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed

If hv_netvsc driver is unloaded and reloaded, the NET_DEVICE_REGISTER
handler cannot perform VF register successfully as the register call
is received before netvsc_probe is finished. This is because we
register register_netdevice_notifier() very early( even before
vmbus_driver_register()).
To fix this, we try to register each such matching VF( if it is visible
as a netdevice) at the end of netvsc_probe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223078">SUSE bug 1223078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26821" ref_url="https://www.suse.com/security/cve/CVE-2024-26821" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26821/">CVE-2024-26821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26821">CVE-2024-26821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223080">SUSE bug 1223080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: set correct id, uid and cruid for multiuser automounts

When uid, gid and cruid are not specified, we need to dynamically
set them into the filesystem context used for automounting otherwise
they'll end up reusing the values from the parent mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223011">SUSE bug 1223011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26823" ref_url="https://www.suse.com/security/cve/CVE-2024-26823" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Restore quirk probing for ACPI-based systems

While refactoring the way the ITSs are probed, the handling of quirks
applicable to ACPI-based platforms was lost. As a result, systems such as
HIP07 lose their GICv4 functionnality, and some other may even fail to
boot, unless they are configured to boot with DT.

Move the enabling of quirks into its_probe_one(), making it common to all
firmware implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26823/">CVE-2024-26823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26823">CVE-2024-26823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223009">SUSE bug 1223009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26824" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26824" ref_url="https://www.suse.com/security/cve/CVE-2024-26824" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_hash - Remove bogus SGL free on zero-length error path

When a zero-length message is hashed by algif_hash, and an error
is triggered, it tries to free an SG list that was never allocated
in the first place.  Fix this by not freeing the SG list on the
zero-length error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26824/">CVE-2024-26824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26824">CVE-2024-26824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223081">SUSE bug 1223081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26825" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: free rx_data_reassembly skb on NCI device cleanup

rx_data_reassembly skb is stored during NCI data exchange for processing
fragmented packets. It is dropped only when the last fragment is processed
or when an NTF packet with NCI_OP_RF_DEACTIVATE_NTF opcode is received.
However, the NCI device may be deallocated before that which leads to skb
leak.

As by design the rx_data_reassembly skb is bound to the NCI device and
nothing prevents the device to be freed before the skb is processed in
some way and cleaned, free it on the NCI device cleanup.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223065">SUSE bug 1223065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26826" ref_url="https://www.suse.com/security/cve/CVE-2024-26826" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix data re-injection from stale subflow

When the MPTCP PM detects that a subflow is stale, all the packet
scheduler must re-inject all the mptcp-level unacked data. To avoid
acquiring unneeded locks, it first try to check if any unacked data
is present at all in the RTX queue, but such check is currently
broken, as it uses TCP-specific helper on an MPTCP socket.

Funnily enough fuzzers and static checkers are happy, as the accessed
memory still belongs to the mptcp_sock struct, and even from a
functional perspective the recovery completed successfully, as
the short-cut test always failed.

A recent unrelated TCP change - commit d5fed5addb2b ("tcp: reorganize
tcp_sock fast path variables") - exposed the issue, as the tcp field
reorganization makes the mptcp code always skip the re-inection.

Fix the issue dropping the bogus call: we are on a slow path, the early
optimization proved once again to be evil.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26826/">CVE-2024-26826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26826">CVE-2024-26826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223010">SUSE bug 1223010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26827" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26827" ref_url="https://www.suse.com/security/cve/CVE-2024-26827" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26827/">CVE-2024-26827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26827">CVE-2024-26827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223005">SUSE bug 1223005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix underflow in parse_server_interfaces()

In this loop, we step through the buffer and after each item we check
if the size_left is greater than the minimum size we need.  However,
the problem is that "bytes_left" is type ssize_t while sizeof() is type
size_t.  That means that because of type promotion, the comparison is
done as an unsigned and if we have negative bytes left the loop
continues instead of ending.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223363">SUSE bug 1223363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26829" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ir_toy: fix a memleak in irtoy_tx

When irtoy_command fails, buf should be freed since it is allocated by
irtoy_tx, or there is a memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223027">SUSE bug 1223027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not allow untrusted VF to remove administratively set MAC

Currently when PF administratively sets VF's MAC address and the VF
is put down (VF tries to delete all MACs) then the MAC is removed
from MAC filters and primary VF MAC is zeroed.

Do not allow untrusted VF to remove primary MAC when it was set
administratively by PF.

Reproducer:
1) Create VF
2) Set VF interface up
3) Administratively set the VF's MAC
4) Put VF interface down

[root@host ~]# echo 1 &gt; /sys/class/net/enp2s0f0/device/sriov_numvfs
[root@host ~]# ip link set enp2s0f0v0 up
[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
[root@host ~]# ip link set enp2s0f0v0 down
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223012">SUSE bug 1223012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26831" ref_url="https://www.suse.com/security/cve/CVE-2024-26831" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/handshake: Fix handshake_req_destroy_test1

Recently, handshake_req_destroy_test1 started failing:

Expected handshake_req_destroy_test == req, but
    handshake_req_destroy_test == 0000000000000000
    req == 0000000060f99b40
not ok 11 req_destroy works

This is because "sock_release(sock)" was replaced with "fput(filp)"
to address a memory leak. Note that sock_release() is synchronous
but fput() usually delays the final close and clean-up.

The delay is not consequential in the other cases that were changed
but handshake_req_destroy_test1 is testing that handshake_req_cancel()
followed by closing the file actually does call the -&gt;hp_destroy
method. Thus the PTR_EQ test at the end has to be sure that the
final close is complete before it checks the pointer.

We cannot use a completion here because if -&gt;hp_destroy is never
called (ie, there is an API bug) then the test will hang.

Reported by: Guenter Roeck &lt;linux@roeck-us.net&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26831/">CVE-2024-26831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26831">CVE-2024-26831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223008">SUSE bug 1223008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26832" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26832" ref_url="https://www.suse.com/security/cve/CVE-2024-26832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: zswap: fix missing folio cleanup in writeback race path

In zswap_writeback_entry(), after we get a folio from
__read_swap_cache_async(), we grab the tree lock again to check that the
swap entry was not invalidated and recycled.  If it was, we delete the
folio we just added to the swap cache and exit.

However, __read_swap_cache_async() returns the folio locked when it is
newly allocated, which is always true for this path, and the folio is
ref'd.  Make sure to unlock and put the folio before returning.

This was discovered by code inspection, probably because this path handles
a race condition that should not happen often, and the bug would not crash
the system, it will only strand the folio indefinitely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26832/">CVE-2024-26832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26832">CVE-2024-26832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223007">SUSE bug 1223007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix memory leak in dm_sw_fini()

After destroying dmub_srv, the memory associated with it is
not freed, causing a memory leak:

unreferenced object 0xffff896302b45800 (size 1024):
  comm "(udev-worker)", pid 222, jiffies 4294894636
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 6265fd77):
    [&lt;ffffffff993495ed&gt;] kmalloc_trace+0x29d/0x340
    [&lt;ffffffffc0ea4a94&gt;] dm_dmub_sw_init+0xb4/0x450 [amdgpu]
    [&lt;ffffffffc0ea4e55&gt;] dm_sw_init+0x15/0x2b0 [amdgpu]
    [&lt;ffffffffc0ba8557&gt;] amdgpu_device_init+0x1417/0x24e0 [amdgpu]
    [&lt;ffffffffc0bab285&gt;] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]
    [&lt;ffffffffc0ba09c7&gt;] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]
    [&lt;ffffffff9968fd1e&gt;] local_pci_probe+0x3e/0x90
    [&lt;ffffffff996918a3&gt;] pci_device_probe+0xc3/0x230
    [&lt;ffffffff99805872&gt;] really_probe+0xe2/0x480
    [&lt;ffffffff99805c98&gt;] __driver_probe_device+0x78/0x160
    [&lt;ffffffff99805daf&gt;] driver_probe_device+0x1f/0x90
    [&lt;ffffffff9980601e&gt;] __driver_attach+0xce/0x1c0
    [&lt;ffffffff99803170&gt;] bus_for_each_dev+0x70/0xc0
    [&lt;ffffffff99804822&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffff99807245&gt;] driver_register+0x55/0x100
    [&lt;ffffffff990012d1&gt;] do_one_initcall+0x41/0x300

Fix this by freeing dmub_srv after destroying it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223036">SUSE bug 1223036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26834" ref_url="https://www.suse.com/security/cve/CVE-2024-26834" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_flow_offload: release dst in case direct xmit path is used

Direct xmit does not use it since it calls dev_queue_xmit() to send
packets, hence it calls dst_release().

kmemleak reports:

unreferenced object 0xffff88814f440900 (size 184):
  comm "softirq", pid 0, jiffies 4294951896
  hex dump (first 32 bytes):
    00 60 5b 04 81 88 ff ff 00 e6 e8 82 ff ff ff ff  .`[.............
    21 0b 50 82 ff ff ff ff 00 00 00 00 00 00 00 00  !.P.............
  backtrace (crc cb2bf5d6):
    [&lt;000000003ee17107&gt;] kmem_cache_alloc+0x286/0x340
    [&lt;0000000021a5de2c&gt;] dst_alloc+0x43/0xb0
    [&lt;00000000f0671159&gt;] rt_dst_alloc+0x2e/0x190
    [&lt;00000000fe5092c9&gt;] __mkroute_output+0x244/0x980
    [&lt;000000005fb96fb0&gt;] ip_route_output_flow+0xc0/0x160
    [&lt;0000000045367433&gt;] nf_ip_route+0xf/0x30
    [&lt;0000000085da1d8e&gt;] nf_route+0x2d/0x60
    [&lt;00000000d1ecd1cb&gt;] nft_flow_route+0x171/0x6a0 [nft_flow_offload]
    [&lt;00000000d9b2fb60&gt;] nft_flow_offload_eval+0x4e8/0x700 [nft_flow_offload]
    [&lt;000000009f447dbb&gt;] expr_call_ops_eval+0x53/0x330 [nf_tables]
    [&lt;00000000072e1be6&gt;] nft_do_chain+0x17c/0x840 [nf_tables]
    [&lt;00000000d0551029&gt;] nft_do_chain_inet+0xa1/0x210 [nf_tables]
    [&lt;0000000097c9d5c6&gt;] nf_hook_slow+0x5b/0x160
    [&lt;0000000005eccab1&gt;] ip_forward+0x8b6/0x9b0
    [&lt;00000000553a269b&gt;] ip_rcv+0x221/0x230
    [&lt;00000000412872e5&gt;] __netif_receive_skb_one_core+0xfe/0x110
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26834/">CVE-2024-26834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26834">CVE-2024-26834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222964">SUSE bug 1222964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: set dormant flag on hook register failure

We need to set the dormant flag again if we fail to register
the hooks.

During memory pressure hook registration can fail and we end up
with a table marked as active but no registered hooks.

On table/base chain deletion, nf_tables will attempt to unregister
the hook again which yields a warn splat from the nftables core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222967">SUSE bug 1222967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26836" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: think-lmi: Fix password opcode ordering for workstations

The Lenovo workstations require the password opcode to be run before
the attribute value is changed (if Admin password is enabled).

Tested on some Thinkpads to confirm they are OK with this order too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222968">SUSE bug 1222968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: switchdev: Skip MDB replays of deferred events on offload

Before this change, generation of the list of MDB events to replay
would race against the creation of new group memberships, either from
the IGMP/MLD snooping logic or from user configuration.

While new memberships are immediately visible to walkers of
br-&gt;mdb_list, the notification of their existence to switchdev event
subscribers is deferred until a later point in time. So if a replay
list was generated during a time that overlapped with such a window,
it would also contain a replay of the not-yet-delivered event.

The driver would thus receive two copies of what the bridge internally
considered to be one single event. On destruction of the bridge, only
a single membership deletion event was therefore sent. As a
consequence of this, drivers which reference count memberships (at
least DSA), would be left with orphan groups in their hardware
database when the bridge was destroyed.

This is only an issue when replaying additions. While deletion events
may still be pending on the deferred queue, they will already have
been removed from br-&gt;mdb_list, so no duplicates can be generated in
that scenario.

To a user this meant that old group memberships, from a bridge in
which a port was previously attached, could be reanimated (in
hardware) when the port joined a new bridge, without the new bridge's
knowledge.

For example, on an mv88e6xxx system, create a snooping bridge and
immediately add a port to it:

    root@infix-06-0b-00:~$ ip link add dev br0 up type bridge mcast_snooping 1 &amp;&amp; \
    &gt; ip link set dev x3 up master br0

And then destroy the bridge:

    root@infix-06-0b-00:~$ ip link del dev br0
    root@infix-06-0b-00:~$ mvls atu
    ADDRESS             FID  STATE      Q  F  0  1  2  3  4  5  6  7  8  9  a
    DEV:0 Marvell 88E6393X
    33:33:00:00:00:6a     1  static     -  -  0  .  .  .  .  .  .  .  .  .  .
    33:33:ff:87:e4:3f     1  static     -  -  0  .  .  .  .  .  .  .  .  .  .
    ff:ff:ff:ff:ff:ff     1  static     -  -  0  1  2  3  4  5  6  7  8  9  a
    root@infix-06-0b-00:~$

The two IPv6 groups remain in the hardware database because the
port (x3) is notified of the host's membership twice: once via the
original event and once via a replay. Since only a single delete
notification is sent, the count remains at 1 when the bridge is
destroyed.

Then add the same port (or another port belonging to the same hardware
domain) to a new bridge, this time with snooping disabled:

    root@infix-06-0b-00:~$ ip link add dev br1 up type bridge mcast_snooping 0 &amp;&amp; \
    &gt; ip link set dev x3 up master br1

All multicast, including the two IPv6 groups from br0, should now be
flooded, according to the policy of br1. But instead the old
memberships are still active in the hardware database, causing the
switch to only forward traffic to those groups towards the CPU (port
0).

Eliminate the race in two steps:

1. Grab the write-side lock of the MDB while generating the replay
   list.

This prevents new memberships from showing up while we are generating
the replay list. But it leaves the scenario in which a deferred event
was already generated, but not delivered, before we grabbed the
lock. Therefore:

2. Make sure that no deferred version of a replay event is already
   enqueued to the switchdev deferred queue, before adding it to the
   replay list, when replaying additions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222973">SUSE bug 1222973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix KASAN issue with tasklet

KASAN testing revealed the following issue assocated with freeing an IRQ.

[50006.466686] Call Trace:
[50006.466691]  &lt;IRQ&gt;
[50006.489538]  dump_stack+0x5c/0x80
[50006.493475]  print_address_description.constprop.6+0x1a/0x150
[50006.499872]  ? irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.505742]  ? irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.511644]  kasan_report.cold.11+0x7f/0x118
[50006.516572]  ? irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.522473]  irdma_sc_process_ceq+0x483/0x790 [irdma]
[50006.528232]  irdma_process_ceq+0xb2/0x400 [irdma]
[50006.533601]  ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma]
[50006.540298]  irdma_ceq_dpc+0x44/0x100 [irdma]
[50006.545306]  tasklet_action_common.isra.14+0x148/0x2c0
[50006.551096]  __do_softirq+0x1d0/0xaf8
[50006.555396]  irq_exit_rcu+0x219/0x260
[50006.559670]  irq_exit+0xa/0x20
[50006.563320]  smp_apic_timer_interrupt+0x1bf/0x690
[50006.568645]  apic_timer_interrupt+0xf/0x20
[50006.573341]  &lt;/IRQ&gt;

The issue is that a tasklet could be pending on another core racing
the delete of the irq.

Fix by insuring any scheduled tasklet is killed after deleting the
irq.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222974">SUSE bug 1222974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/hfi1: Fix a memleak in init_credit_return

When dma_alloc_coherent fails to allocate dd-&gt;cr_base[i].va,
init_credit_return should deallocate dd-&gt;cr_base and
dd-&gt;cr_base[i] that allocated before. Or those resources
would be never freed and a memleak is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222975">SUSE bug 1222975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26840" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix memory leak in cachefiles_add_cache()

The following memory leak was reported after unbinding /dev/cachefiles:

==================================================================
unreferenced object 0xffff9b674176e3c0 (size 192):
  comm "cachefilesd2", pid 680, jiffies 4294881224
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc ea38a44b):
    [&lt;ffffffff8eb8a1a5&gt;] kmem_cache_alloc+0x2d5/0x370
    [&lt;ffffffff8e917f86&gt;] prepare_creds+0x26/0x2e0
    [&lt;ffffffffc002eeef&gt;] cachefiles_determine_cache_security+0x1f/0x120
    [&lt;ffffffffc00243ec&gt;] cachefiles_add_cache+0x13c/0x3a0
    [&lt;ffffffffc0025216&gt;] cachefiles_daemon_write+0x146/0x1c0
    [&lt;ffffffff8ebc4a3b&gt;] vfs_write+0xcb/0x520
    [&lt;ffffffff8ebc5069&gt;] ksys_write+0x69/0xf0
    [&lt;ffffffff8f6d4662&gt;] do_syscall_64+0x72/0x140
    [&lt;ffffffff8f8000aa&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76
==================================================================

Put the reference count of cache_cred in cachefiles_daemon_unbind() to
fix the problem. And also put cache_cred in cachefiles_add_cache() error
branch to avoid memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26841" ref_url="https://www.suse.com/security/cve/CVE-2024-26841" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Update cpu_sibling_map when disabling nonboot CPUs

Update cpu_sibling_map when disabling nonboot CPUs by defining &amp; calling
clear_cpu_sibling_map(), otherwise we get such errors on SMT systems:

jump label: negative count!
WARNING: CPU: 6 PID: 45 at kernel/jump_label.c:263 __static_key_slow_dec_cpuslocked+0xec/0x100
CPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340
pc 90000000004c302c ra 90000000004c302c tp 90000001005bc000 sp 90000001005bfd20
a0 000000000000001b a1 900000000224c278 a2 90000001005bfb58 a3 900000000224c280
a4 900000000224c278 a5 90000001005bfb50 a6 0000000000000001 a7 0000000000000001
t0 ce87a4763eb5234a t1 ce87a4763eb5234a t2 0000000000000000 t3 0000000000000000
t4 0000000000000006 t5 0000000000000000 t6 0000000000000064 t7 0000000000001964
t8 000000000009ebf6 u0 9000000001f2a068 s9 0000000000000000 s0 900000000246a2d8
s1 ffffffffffffffff s2 ffffffffffffffff s3 90000000021518c0 s4 0000000000000040
s5 9000000002151058 s6 9000000009828e40 s7 00000000000000b4 s8 0000000000000006
   ra: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100
  ERA: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100
 CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
 PRMD: 00000004 (PPLV0 +PIE -PWE)
 EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
 ECFG: 00071c1c (LIE=2-4,10-12 VS=7)
ESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)
 PRID: 0014d000 (Loongson-64bit, Loongson-3A6000-HV)
CPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340
Stack : 0000000000000000 900000000203f258 900000000179afc8 90000001005bc000
        90000001005bf980 0000000000000000 90000001005bf988 9000000001fe0be0
        900000000224c280 900000000224c278 90000001005bf8c0 0000000000000001
        0000000000000001 ce87a4763eb5234a 0000000007f38000 90000001003f8cc0
        0000000000000000 0000000000000006 0000000000000000 4c206e6f73676e6f
        6f4c203a656d616e 000000000009ec99 0000000007f38000 0000000000000000
        900000000214b000 9000000001fe0be0 0000000000000004 0000000000000000
        0000000000000107 0000000000000009 ffffffffffafdabe 00000000000000b4
        0000000000000006 90000000004c302c 9000000000224528 00005555939a0c7c
        00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c
        ...
Call Trace:
[&lt;9000000000224528&gt;] show_stack+0x48/0x1a0
[&lt;900000000179afc8&gt;] dump_stack_lvl+0x78/0xa0
[&lt;9000000000263ed0&gt;] __warn+0x90/0x1a0
[&lt;90000000017419b8&gt;] report_bug+0x1b8/0x280
[&lt;900000000179c564&gt;] do_bp+0x264/0x420
[&lt;90000000004c302c&gt;] __static_key_slow_dec_cpuslocked+0xec/0x100
[&lt;90000000002b4d7c&gt;] sched_cpu_deactivate+0x2fc/0x300
[&lt;9000000000266498&gt;] cpuhp_invoke_callback+0x178/0x8a0
[&lt;9000000000267f70&gt;] cpuhp_thread_fun+0xf0/0x240
[&lt;90000000002a117c&gt;] smpboot_thread_fn+0x1dc/0x2e0
[&lt;900000000029a720&gt;] kthread+0x140/0x160
[&lt;9000000000222288&gt;] ret_from_kernel_thread+0xc/0xa4
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26841/">CVE-2024-26841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26841">CVE-2024-26841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222977">SUSE bug 1222977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: runtime: Fix potential overflow of soft-reserved region size

md_size will have been narrowed if we have &gt;= 4GB worth of pages in a
soft-reserved region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223014">SUSE bug 1223014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26844" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26844" ref_url="https://www.suse.com/security/cve/CVE-2024-26844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix WARNING in _copy_from_iter

Syzkaller reports a warning in _copy_from_iter because an
iov_iter is supposedly used in the wrong direction. The reason
is that syzcaller managed to generate a request with
a transfer direction of SG_DXFER_TO_FROM_DEV. This instructs
the kernel to copy user buffers into the kernel, read into
the copied buffers and then copy the data back to user space.

Thus the iovec is used in both directions.

Detect this situation in the block layer and construct a new
iterator with the correct direction for the copy-in.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26844/">CVE-2024-26844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26844">CVE-2024-26844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223015">SUSE bug 1223015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Add TMF to tmr_list handling

An abort that is responded to by iSCSI itself is added to tmr_list but does
not go to target core. A LUN_RESET that goes through tmr_list takes a
refcounter on the abort and waits for completion. However, the abort will
be never complete because it was not started in target core.

 Unable to locate ITT: 0x05000000 on CID: 0
 Unable to locate RefTaskTag: 0x05000000 on CID: 0.
 wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
 wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
...
 INFO: task kworker/0:2:49 blocked for more than 491 seconds.
 task:kworker/0:2     state:D stack:    0 pid:   49 ppid:     2 flags:0x00000800
 Workqueue: events target_tmr_work [target_core_mod]
Call Trace:
 __switch_to+0x2c4/0x470
 _schedule+0x314/0x1730
 schedule+0x64/0x130
 schedule_timeout+0x168/0x430
 wait_for_completion+0x140/0x270
 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]
 core_tmr_lun_reset+0x30/0xa0 [target_core_mod]
 target_tmr_work+0xc8/0x1b0 [target_core_mod]
 process_one_work+0x2d4/0x5d0
 worker_thread+0x78/0x6c0

To fix this, only add abort to tmr_list if it will be handled by target
core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223018">SUSE bug 1223018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: do not wait in vain when unloading module

The module exit path has race between deleting all controllers and
freeing 'left over IDs'. To prevent double free a synchronization
between nvme_delete_ctrl and ida_destroy has been added by the initial
commit.

There is some logic around trying to prevent from hanging forever in
wait_for_completion, though it does not handling all cases. E.g.
blktests is able to reproduce the situation where the module unload
hangs forever.

If we completely rely on the cleanup code executed from the
nvme_delete_ctrl path, all IDs will be freed eventually. This makes
calling ida_destroy unnecessary. We only have to ensure that all
nvme_delete_ctrl code has been executed before we leave
nvme_fc_exit_module. This is done by flushing the nvme_delete_wq
workqueue.

While at it, remove the unused nvme_fc_wq workqueue too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223023">SUSE bug 1223023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26847" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26847" ref_url="https://www.suse.com/security/cve/CVE-2024-26847" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas: use correct function name for resetting TCE tables

The PAPR spec spells the function name as

  "ibm,reset-pe-dma-windows"

but in practice firmware uses the singular form:

  "ibm,reset-pe-dma-window"

in the device tree. Since we have the wrong spelling in the RTAS
function table, reverse lookups (token -&gt; name) fail and warn:

  unexpected failed lookup for token 86
  WARNING: CPU: 1 PID: 545 at arch/powerpc/kernel/rtas.c:659 __do_enter_rtas_trace+0x2a4/0x2b4
  CPU: 1 PID: 545 Comm: systemd-udevd Not tainted 6.8.0-rc4 #30
  Hardware name: IBM,9105-22A POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NL1060_028) hv:phyp pSeries
  NIP [c0000000000417f0] __do_enter_rtas_trace+0x2a4/0x2b4
  LR [c0000000000417ec] __do_enter_rtas_trace+0x2a0/0x2b4
  Call Trace:
   __do_enter_rtas_trace+0x2a0/0x2b4 (unreliable)
   rtas_call+0x1f8/0x3e0
   enable_ddw.constprop.0+0x4d0/0xc84
   dma_iommu_dma_supported+0xe8/0x24c
   dma_set_mask+0x5c/0xd8
   mlx5_pci_init.constprop.0+0xf0/0x46c [mlx5_core]
   probe_one+0xfc/0x32c [mlx5_core]
   local_pci_probe+0x68/0x12c
   pci_call_probe+0x68/0x1ec
   pci_device_probe+0xbc/0x1a8
   really_probe+0x104/0x570
   __driver_probe_device+0xb8/0x224
   driver_probe_device+0x54/0x130
   __driver_attach+0x158/0x2b0
   bus_for_each_dev+0xa8/0x120
   driver_attach+0x34/0x48
   bus_add_driver+0x174/0x304
   driver_register+0x8c/0x1c4
   __pci_register_driver+0x68/0x7c
   mlx5_init+0xb8/0x118 [mlx5_core]
   do_one_initcall+0x60/0x388
   do_init_module+0x7c/0x2a4
   init_module_from_file+0xb4/0x108
   idempotent_init_module+0x184/0x34c
   sys_finit_module+0x90/0x114

And oopses are possible when lockdep is enabled or the RTAS
tracepoints are active, since those paths dereference the result of
the lookup.

Use the correct spelling to match firmware's behavior, adjusting the
related constants to match.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26847/">CVE-2024-26847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26847">CVE-2024-26847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223026">SUSE bug 1223026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223030">SUSE bug 1223030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26849" ref_url="https://www.suse.com/security/cve/CVE-2024-26849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: add nla be16/32 types to minlen array

BUG: KMSAN: uninit-value in nla_validate_range_unsigned lib/nlattr.c:222 [inline]
BUG: KMSAN: uninit-value in nla_validate_int_range lib/nlattr.c:336 [inline]
BUG: KMSAN: uninit-value in validate_nla lib/nlattr.c:575 [inline]
BUG: KMSAN: uninit-value in __nla_validate_parse+0x2e20/0x45c0 lib/nlattr.c:631
 nla_validate_range_unsigned lib/nlattr.c:222 [inline]
 nla_validate_int_range lib/nlattr.c:336 [inline]
 validate_nla lib/nlattr.c:575 [inline]
...

The message in question matches this policy:

 [NFTA_TARGET_REV]       = NLA_POLICY_MAX(NLA_BE32, 255),

but because NLA_BE32 size in minlen array is 0, the validation
code will read past the malformed (too small) attribute.

Note: Other attributes, e.g. BITFIELD32, SINT, UINT.. are also missing:
those likely should be added too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26849/">CVE-2024-26849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26849">CVE-2024-26849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223053">SUSE bug 1223053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26850" ref_url="https://www.suse.com/security/cve/CVE-2024-26850" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/debug_vm_pgtable: fix BUG_ON with pud advanced test

Architectures like powerpc add debug checks to ensure we find only devmap
PUD pte entries.  These debug checks are only done with CONFIG_DEBUG_VM. 
This patch marks the ptes used for PUD advanced test devmap pte entries so
that we don't hit on debug checks on architecture like ppc64 as below.

WARNING: CPU: 2 PID: 1 at arch/powerpc/mm/book3s64/radix_pgtable.c:1382 radix__pud_hugepage_update+0x38/0x138
....
NIP [c0000000000a7004] radix__pud_hugepage_update+0x38/0x138
LR [c0000000000a77a8] radix__pudp_huge_get_and_clear+0x28/0x60
Call Trace:
[c000000004a2f950] [c000000004a2f9a0] 0xc000000004a2f9a0 (unreliable)
[c000000004a2f980] [000d34c100000000] 0xd34c100000000
[c000000004a2f9a0] [c00000000206ba98] pud_advanced_tests+0x118/0x334
[c000000004a2fa40] [c00000000206db34] debug_vm_pgtable+0xcbc/0x1c48
[c000000004a2fc10] [c00000000000fd28] do_one_initcall+0x60/0x388

Also

 kernel BUG at arch/powerpc/mm/book3s64/pgtable.c:202!
 ....

 NIP [c000000000096510] pudp_huge_get_and_clear_full+0x98/0x174
 LR [c00000000206bb34] pud_advanced_tests+0x1b4/0x334
 Call Trace:
 [c000000004a2f950] [000d34c100000000] 0xd34c100000000 (unreliable)
 [c000000004a2f9a0] [c00000000206bb34] pud_advanced_tests+0x1b4/0x334
 [c000000004a2fa40] [c00000000206db34] debug_vm_pgtable+0xcbc/0x1c48
 [c000000004a2fc10] [c00000000000fd28] do_one_initcall+0x60/0x388
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26850/">CVE-2024-26850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26850">CVE-2024-26850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223054">SUSE bug 1223054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack_h323: Add protection for bmp length out of range

UBSAN load reports an exception of BRK#5515 SHIFT_ISSUE:Bitwise shifts
that are out of bounds for their data type.

vmlinux   get_bitmap(b=75) + 712
&lt;net/netfilter/nf_conntrack_h323_asn1.c:0&gt;
vmlinux   decode_seq(bs=0xFFFFFFD008037000, f=0xFFFFFFD008037018, level=134443100) + 1956
&lt;net/netfilter/nf_conntrack_h323_asn1.c:592&gt;
vmlinux   decode_choice(base=0xFFFFFFD0080370F0, level=23843636) + 1216
&lt;net/netfilter/nf_conntrack_h323_asn1.c:814&gt;
vmlinux   decode_seq(f=0xFFFFFFD0080371A8, level=134443500) + 812
&lt;net/netfilter/nf_conntrack_h323_asn1.c:576&gt;
vmlinux   decode_choice(base=0xFFFFFFD008037280, level=0) + 1216
&lt;net/netfilter/nf_conntrack_h323_asn1.c:814&gt;
vmlinux   DecodeRasMessage() + 304
&lt;net/netfilter/nf_conntrack_h323_asn1.c:833&gt;
vmlinux   ras_help() + 684
&lt;net/netfilter/nf_conntrack_h323_main.c:1728&gt;
vmlinux   nf_confirm() + 188
&lt;net/netfilter/nf_conntrack_proto.c:137&gt;

Due to abnormal data in skb-&gt;data, the extension bitmap length
exceeds 32 when decoding ras message then uses the length to make
a shift operation. It will change into negative after several loop.
UBSAN load could detect a negative shift as an undefined behaviour
and reports exception.
So we add the protection to avoid the length exceeding 32. Or else
it will return out of range error and stop decoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223074">SUSE bug 1223074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

syzbot found another use-after-free in ip6_route_mpath_notify() [1]

Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.

We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.

[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037

CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x167/0x540 mm/kasan/report.c:488
  kasan_report+0x142/0x180 mm/kasan/report.c:601
 rt6_fill_node+0x1460/0x1ac0
  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
 &lt;/TASK&gt;

Allocated by task 23037:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3981 [inline]
  __kmalloc+0x22e/0x490 mm/slub.c:3994
  kmalloc include/linux/slab.h:594 [inline]
  kzalloc include/linux/slab.h:711 [inline]
  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 16:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
  poison_slab_object+0xa6/0xe0 m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223059">SUSE bug 1223059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: avoid returning frame twice in XDP_REDIRECT

When a frame can not be transmitted in XDP_REDIRECT
(e.g. due to a full queue), it is necessary to free
it by calling xdp_return_frame_rx_napi.

However, this is the responsibility of the caller of
the ndo_xdp_xmit (see for example bq_xmit_all in
kernel/bpf/devmap.c) and thus calling it inside
igc_xdp_xmit (which is the ndo_xdp_xmit of the igc
driver) as well will lead to memory corruption.

In fact, bq_xmit_all expects that it can return all
frames after the last successfully transmitted one.
Therefore, break for the first not transmitted frame,
but do not call xdp_return_frame_rx_napi in igc_xdp_xmit.
This is equally implemented in other Intel drivers
such as the igb.

There are two alternatives to this that were rejected:
1. Return num_frames as all the frames would have been
   transmitted and release them inside igc_xdp_xmit.
   While it might work technically, it is not what
   the return value is meant to represent (i.e. the
   number of SUCCESSFULLY transmitted packets).
2. Rework kernel/bpf/devmap.c and all drivers to
   support non-consecutively dropped packets.
   Besides being complex, it likely has a negative
   performance impact without a significant gain
   since it is anyway unlikely that the next frame
   can be transmitted if the previous one was dropped.

The memory corruption can be reproduced with
the following script which leads to a kernel panic
after a few seconds.  It basically generates more
traffic than a i225 NIC can transmit and pushes it
via XDP_REDIRECT from a virtual interface to the
physical interface where frames get dropped.

   #!/bin/bash
   INTERFACE=enp4s0
   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`

   sudo ip link add dev veth1 type veth peer name veth2
   sudo ip link set up $INTERFACE
   sudo ip link set up veth1
   sudo ip link set up veth2

   cat &lt;&lt; EOF &gt; redirect.bpf.c

   SEC("prog")
   int redirect(struct xdp_md *ctx)
   {
       return bpf_redirect($INTERFACE_IDX, 0);
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o
   sudo ip link set veth2 xdp obj redirect.bpf.o

   cat &lt;&lt; EOF &gt; pass.bpf.c

   SEC("prog")
   int pass(struct xdp_md *ctx)
   {
       return XDP_PASS;
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o
   sudo ip link set $INTERFACE xdp obj pass.bpf.o

   cat &lt;&lt; EOF &gt; trafgen.cfg

   {
     /* Ethernet Header */
     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
     const16(ETH_P_IP),

     /* IPv4 Header */
     0b01000101, 0,   # IPv4 version, IHL, TOS
     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))
     const16(2),      # IPv4 ident
     0b01000000, 0,   # IPv4 flags, fragmentation off
     64,              # IPv4 TTL
     17,              # Protocol UDP
     csumip(14, 33),  # IPv4 checksum

     /* UDP Header */
     10,  0, 1, 1,    # IP Src - adapt as needed
     10,  0, 1, 2,    # IP Dest - adapt as needed
     const16(6666),   # UDP Src Port
     const16(6666),   # UDP Dest Port
     const16(1008),   # UDP length (UDP header 8 bytes + payload length)
     csumudp(14, 34), # UDP checksum

     /* Payload */
     fill('W', 1000),
   }
   EOF

   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223061">SUSE bug 1223061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26854" ref_url="https://www.suse.com/security/cve/CVE-2024-26854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix uninitialized dplls mutex usage

The pf-&gt;dplls.lock mutex is initialized too late, after its first use.
Move it to the top of ice_dpll_init.
Note that the "err_exit" error path destroys the mutex. And the mutex is
the last thing destroyed in ice_dpll_deinit.
This fixes the following warning with CONFIG_DEBUG_MUTEXES:

 ice 0000:10:00.0: The DDP package was successfully loaded: ICE OS Default Package version 1.3.36.0
 ice 0000:10:00.0: 252.048 Gb/s available PCIe bandwidth (16.0 GT/s PCIe x16 link)
 ice 0000:10:00.0: PTP init successful
 ------------[ cut here ]------------
 DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
 WARNING: CPU: 0 PID: 410 at kernel/locking/mutex.c:587 __mutex_lock+0x773/0xd40
 Modules linked in: crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ice(+) nvme nvme_c&gt;
 CPU: 0 PID: 410 Comm: kworker/0:4 Not tainted 6.8.0-rc5+ #3
 Hardware name: HPE ProLiant DL110 Gen10 Plus/ProLiant DL110 Gen10 Plus, BIOS U56 10/19/2023
 Workqueue: events work_for_cpu_fn
 RIP: 0010:__mutex_lock+0x773/0xd40
 Code: c0 0f 84 1d f9 ff ff 44 8b 35 0d 9c 69 01 45 85 f6 0f 85 0d f9 ff ff 48 c7 c6 12 a2 a9 85 48 c7 c7 12 f1 a&gt;
 RSP: 0018:ff7eb1a3417a7ae0 EFLAGS: 00010286
 RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: ffffffff85ac2bff RDI: 00000000ffffffff
 RBP: ff7eb1a3417a7b80 R08: 0000000000000000 R09: 00000000ffffbfff
 R10: ff7eb1a3417a7978 R11: ff32b80f7fd2e568 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: ff32b7f02c50e0d8
 FS:  0000000000000000(0000) GS:ff32b80efe800000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055b5852cc000 CR3: 000000003c43a004 CR4: 0000000000771ef0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0x84/0x170
  ? __mutex_lock+0x773/0xd40
  ? report_bug+0x1c7/0x1d0
  ? prb_read_valid+0x1b/0x30
  ? handle_bug+0x42/0x70
  ? exc_invalid_op+0x18/0x70
  ? asm_exc_invalid_op+0x1a/0x20
  ? __mutex_lock+0x773/0xd40
  ? rcu_is_watching+0x11/0x50
  ? __kmalloc_node_track_caller+0x346/0x490
  ? ice_dpll_lock_status_get+0x28/0x50 [ice]
  ? __pfx_ice_dpll_lock_status_get+0x10/0x10 [ice]
  ? ice_dpll_lock_status_get+0x28/0x50 [ice]
  ice_dpll_lock_status_get+0x28/0x50 [ice]
  dpll_device_get_one+0x14f/0x2e0
  dpll_device_event_send+0x7d/0x150
  dpll_device_register+0x124/0x180
  ice_dpll_init_dpll+0x7b/0xd0 [ice]
  ice_dpll_init+0x224/0xa40 [ice]
  ? _dev_info+0x70/0x90
  ice_load+0x468/0x690 [ice]
  ice_probe+0x75b/0xa10 [ice]
  ? _raw_spin_unlock_irqrestore+0x4f/0x80
  ? process_one_work+0x1a3/0x500
  local_pci_probe+0x47/0xa0
  work_for_cpu_fn+0x17/0x30
  process_one_work+0x20d/0x500
  worker_thread+0x1df/0x3e0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0x103/0x140
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x31/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1b/0x30
  &lt;/TASK&gt;
 irq event stamp: 125197
 hardirqs last  enabled at (125197): [&lt;ffffffff8416409d&gt;] finish_task_switch.isra.0+0x12d/0x3d0
 hardirqs last disabled at (125196): [&lt;ffffffff85134044&gt;] __schedule+0xea4/0x19f0
 softirqs last  enabled at (105334): [&lt;ffffffff84e1e65a&gt;] napi_get_frags_check+0x1a/0x60
 softirqs last disabled at (105332): [&lt;ffffffff84e1e65a&gt;] napi_get_frags_check+0x1a/0x60
 ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26854/">CVE-2024-26854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26854">CVE-2024-26854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223039">SUSE bug 1223039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()

The function ice_bridge_setlink() may encounter a NULL pointer dereference
if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently
in nla_for_each_nested(). To address this issue, add a check to ensure that
br_spec is not NULL before proceeding with the nested attribute iteration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223051">SUSE bug 1223051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sparx5: Fix use after free inside sparx5_del_mact_entry

Based on the static analyzis of the code it looks like when an entry
from the MAC table was removed, the entry was still used after being
freed. More precise the vid of the mac_entry was used after calling
devm_kfree on the mac_entry.
The fix consists in first using the vid of the mac_entry to delete the
entry from the HW and after that to free it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223052">SUSE bug 1223052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

geneve: make sure to pull inner header in geneve_rx()

syzbot triggered a bug in geneve_rx() [1]

Issue is similar to the one I fixed in commit 8d975c15c0cd
("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")

We have to save skb-&gt;network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.

pskb_inet_may_pull() makes sure the needed headers are in skb-&gt;head.

[1]
BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
 BUG: KMSAN: uninit-value in geneve_rx drivers/net/geneve.c:279 [inline]
 BUG: KMSAN: uninit-value in geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
  geneve_rx drivers/net/geneve.c:279 [inline]
  geneve_udp_encap_recv+0x36f9/0x3c10 drivers/net/geneve.c:391
  udp_queue_rcv_one_skb+0x1d39/0x1f20 net/ipv4/udp.c:2108
  udp_queue_rcv_skb+0x6ae/0x6e0 net/ipv4/udp.c:2186
  udp_unicast_rcv_skb+0x184/0x4b0 net/ipv4/udp.c:2346
  __udp4_lib_rcv+0x1c6b/0x3010 net/ipv4/udp.c:2422
  udp_rcv+0x7d/0xa0 net/ipv4/udp.c:2604
  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
  dst_input include/net/dst.h:461 [inline]
  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
  process_backlog+0x480/0x8b0 net/core/dev.c:5976
  __napi_poll+0xe3/0x980 net/core/dev.c:6576
  napi_poll net/core/dev.c:6645 [inline]
  net_rx_action+0x8b8/0x1870 net/core/dev.c:6778
  __do_softirq+0x1b7/0x7c5 kernel/softirq.c:553
  do_softirq+0x9a/0xf0 kernel/softirq.c:454
  __local_bh_enable_ip+0x9b/0xa0 kernel/softirq.c:381
  local_bh_enable include/linux/bottom_half.h:33 [inline]
  rcu_read_unlock_bh include/linux/rcupdate.h:820 [inline]
  __dev_queue_xmit+0x2768/0x51c0 net/core/dev.c:4378
  dev_queue_xmit include/linux/netdevice.h:3171 [inline]
  packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3081 [inline]
  packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  __sys_sendto+0x735/0xa10 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3819 [inline]
  slab_alloc_node mm/slub.c:3860 [inline]
  kmem_cache_alloc_node+0x5cb/0xbc0 mm/slub.c:3903
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
  __alloc_skb+0x352/0x790 net/core/skbuff.c:651
  alloc_skb include/linux/skbuff.h:1296 [inline]
  alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6394
  sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2783
  packet_alloc_skb net/packet/af_packet.c:2930 [inline]
  packet_snd net/packet/af_packet.c:3024 [inline]
  packet_sendmsg+0x70c2/0x9f10 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  __sys_sendto+0x735/0xa10 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223058">SUSE bug 1223058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26858" ref_url="https://www.suse.com/security/cve/CVE-2024-26858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map

Just simply reordering the functions mlx5e_ptp_metadata_map_put and
mlx5e_ptpsq_track_metadata in the mlx5e_txwqe_complete context is not good
enough since both the compiler and CPU are free to reorder these two
functions. If reordering does occur, the issue that was supposedly fixed by
7e3f3ba97e6c ("net/mlx5e: Track xmit submission to PTP WQ after populating
metadata map") will be seen. This will lead to NULL pointer dereferences in
mlx5e_ptpsq_mark_ts_cqes_undelivered in the NAPI polling context due to the
tracking list being populated before the metadata map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26858/">CVE-2024-26858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26858">CVE-2024-26858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223020">SUSE bug 1223020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/bnx2x: Prevent access to a freed page in page_pool

Fix race condition leading to system crash during EEH error handling

During EEH error recovery, the bnx2x driver's transmit timeout logic
could cause a race condition when handling reset tasks. The
bnx2x_tx_timeout() schedules reset tasks via bnx2x_sp_rtnl_task(),
which ultimately leads to bnx2x_nic_unload(). In bnx2x_nic_unload()
SGEs are freed using bnx2x_free_rx_sge_range(). However, this could
overlap with the EEH driver's attempt to reset the device using
bnx2x_io_slot_reset(), which also tries to free SGEs. This race
condition can result in system crashes due to accessing freed memory
locations in bnx2x_free_rx_sge()

799  static inline void bnx2x_free_rx_sge(struct bnx2x *bp,
800				struct bnx2x_fastpath *fp, u16 index)
801  {
802	struct sw_rx_page *sw_buf = &amp;fp-&gt;rx_page_ring[index];
803     struct page *page = sw_buf-&gt;page;
....
where sw_buf was set to NULL after the call to dma_unmap_page()
by the preceding thread.

    EEH: Beginning: 'slot_reset'
    PCI 0011:01:00.0#10000: EEH: Invoking bnx2x-&gt;slot_reset()
    bnx2x: [bnx2x_io_slot_reset:14228(eth1)]IO slot reset initializing...
    bnx2x 0011:01:00.0: enabling device (0140 -&gt; 0142)
    bnx2x: [bnx2x_io_slot_reset:14244(eth1)]IO slot reset --&gt; driver unload
    Kernel attempted to read user page (0) - exploit attempt? (uid: 0)
    BUG: Kernel NULL pointer dereference on read at 0x00000000
    Faulting instruction address: 0xc0080000025065fc
    Oops: Kernel access of bad area, sig: 11 [#1]
    .....
    Call Trace:
    [c000000003c67a20] [c00800000250658c] bnx2x_io_slot_reset+0x204/0x610 [bnx2x] (unreliable)
    [c000000003c67af0] [c0000000000518a8] eeh_report_reset+0xb8/0xf0
    [c000000003c67b60] [c000000000052130] eeh_pe_report+0x180/0x550
    [c000000003c67c70] [c00000000005318c] eeh_handle_normal_event+0x84c/0xa60
    [c000000003c67d50] [c000000000053a84] eeh_event_handler+0xf4/0x170
    [c000000003c67da0] [c000000000194c58] kthread+0x1c8/0x1d0
    [c000000003c67e10] [c00000000000cf64] ret_from_kernel_thread+0x5c/0x64

To solve this issue, we need to verify page pool allocations before
freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223049">SUSE bug 1223049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26860" ref_url="https://www.suse.com/security/cve/CVE-2024-26860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-integrity: fix a memory leak when rechecking the data

Memory for the "checksums" pointer will leak if the data is rechecked
after checksum failure (because the associated kfree won't happen due
to 'goto skip_io').

Fix this by freeing the checksums memory before recheck, and just use
the "checksum_onstack" memory for storing checksum during recheck.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26860/">CVE-2024-26860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26860">CVE-2024-26860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223077">SUSE bug 1223077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: receive: annotate data-race around receiving_counter.counter

Syzkaller with KCSAN identified a data-race issue when accessing
keypair-&gt;receiving_counter.counter. Use READ_ONCE() and WRITE_ONCE()
annotations to mark the data race as intentional.

    BUG: KCSAN: data-race in wg_packet_decrypt_worker / wg_packet_rx_poll

    write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0:
     counter_validate drivers/net/wireguard/receive.c:321 [inline]
     wg_packet_rx_poll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461
     __napi_poll+0x60/0x3b0 net/core/dev.c:6536
     napi_poll net/core/dev.c:6605 [inline]
     net_rx_action+0x32b/0x750 net/core/dev.c:6738
     __do_softirq+0xc4/0x279 kernel/softirq.c:553
     do_softirq+0x5e/0x90 kernel/softirq.c:454
     __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381
     __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
     _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
     spin_unlock_bh include/linux/spinlock.h:396 [inline]
     ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
     wg_packet_decrypt_worker+0x6c5/0x700 drivers/net/wireguard/receive.c:499
     process_one_work kernel/workqueue.c:2633 [inline]
     ...

    read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1:
     decrypt_packet drivers/net/wireguard/receive.c:252 [inline]
     wg_packet_decrypt_worker+0x220/0x700 drivers/net/wireguard/receive.c:501
     process_one_work kernel/workqueue.c:2633 [inline]
     process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2706
     worker_thread+0x525/0x730 kernel/workqueue.c:2787
     ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223076">SUSE bug 1223076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

packet: annotate data-races around ignore_outgoing

ignore_outgoing is read locklessly from dev_queue_xmit_nit()
and packet_getsockopt()

Add appropriate READ_ONCE()/WRITE_ONCE() annotations.

syzbot reported:

BUG: KCSAN: data-race in dev_queue_xmit_nit / packet_setsockopt

write to 0xffff888107804542 of 1 bytes by task 22618 on cpu 0:
 packet_setsockopt+0xd83/0xfd0 net/packet/af_packet.c:4003
 do_sock_setsockopt net/socket.c:2311 [inline]
 __sys_setsockopt+0x1d8/0x250 net/socket.c:2334
 __do_sys_setsockopt net/socket.c:2343 [inline]
 __se_sys_setsockopt net/socket.c:2340 [inline]
 __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

read to 0xffff888107804542 of 1 bytes by task 27 on cpu 1:
 dev_queue_xmit_nit+0x82/0x620 net/core/dev.c:2248
 xmit_one net/core/dev.c:3527 [inline]
 dev_hard_start_xmit+0xcc/0x3f0 net/core/dev.c:3547
 __dev_queue_xmit+0xf24/0x1dd0 net/core/dev.c:4335
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108
 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127
 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline]
 batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline]
 batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335
 worker_thread+0x526/0x730 kernel/workqueue.c:3416
 kthread+0x1d1/0x210 kernel/kthread.c:388
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243

value changed: 0x00 -&gt; 0x01

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 27 Comm: kworker/u8:1 Tainted: G        W          6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hsr: Fix uninit-value access in hsr_get_node()

KMSAN reported the following uninit-value access issue [1]:

=====================================================
BUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246
 hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246
 fill_frame_info net/hsr/hsr_forward.c:577 [inline]
 hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615
 hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
 __alloc_skb+0x318/0x740 net/core/skbuff.c:651
 alloc_skb include/linux/skbuff.h:1286 [inline]
 alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787
 packet_alloc_skb net/packet/af_packet.c:2936 [inline]
 packet_snd net/packet/af_packet.c:3030 [inline]
 packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

CPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================

If the packet type ID field in the Ethernet header is either ETH_P_PRP or
ETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr()
reads an invalid value as a sequence number. This causes the above issue.

This patch fixes the issue by returning NULL if the Ethernet header is not
followed by an HSR tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223021">SUSE bug 1223021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26864" ref_url="https://www.suse.com/security/cve/CVE-2024-26864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix refcnt handling in __inet_hash_connect().

syzbot reported a warning in sk_nulls_del_node_init_rcu().

The commit 66b60b0c8c4a ("dccp/tcp: Unhash sk from ehash for tb2 alloc
failure after check_estalblished().") tried to fix an issue that an
unconnected socket occupies an ehash entry when bhash2 allocation fails.

In such a case, we need to revert changes done by check_established(),
which does not hold refcnt when inserting socket into ehash.

So, to revert the change, we need to __sk_nulls_add_node_rcu() instead
of sk_nulls_add_node_rcu().

Otherwise, sock_put() will cause refcnt underflow and leak the socket.

[0]:
WARNING: CPU: 0 PID: 23948 at include/net/sock.h:799 sk_nulls_del_node_init_rcu+0x166/0x1a0 include/net/sock.h:799
Modules linked in:
CPU: 0 PID: 23948 Comm: syz-executor.2 Not tainted 6.8.0-rc6-syzkaller-00159-gc055fc00c07b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
RIP: 0010:sk_nulls_del_node_init_rcu+0x166/0x1a0 include/net/sock.h:799
Code: e8 7f 71 c6 f7 83 fb 02 7c 25 e8 35 6d c6 f7 4d 85 f6 0f 95 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 1b 6d c6 f7 90 &lt;0f&gt; 0b 90 eb b2 e8 10 6d c6 f7 4c 89 e7 be 04 00 00 00 e8 63 e7 d2
RSP: 0018:ffffc900032d7848 EFLAGS: 00010246
RAX: ffffffff89cd0035 RBX: 0000000000000001 RCX: 0000000000040000
RDX: ffffc90004de1000 RSI: 000000000003ffff RDI: 0000000000040000
RBP: 1ffff1100439ac26 R08: ffffffff89ccffe3 R09: 1ffff1100439ac28
R10: dffffc0000000000 R11: ffffed100439ac29 R12: ffff888021cd6140
R13: dffffc0000000000 R14: ffff88802a9bf5c0 R15: ffff888021cd6130
FS:  00007f3b823f16c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3b823f0ff8 CR3: 000000004674a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __inet_hash_connect+0x140f/0x20b0 net/ipv4/inet_hashtables.c:1139
 dccp_v6_connect+0xcb9/0x1480 net/dccp/ipv6.c:956
 __inet_stream_connect+0x262/0xf30 net/ipv4/af_inet.c:678
 inet_stream_connect+0x65/0xa0 net/ipv4/af_inet.c:749
 __sys_connect_file net/socket.c:2048 [inline]
 __sys_connect+0x2df/0x310 net/socket.c:2065
 __do_sys_connect net/socket.c:2075 [inline]
 __se_sys_connect net/socket.c:2072 [inline]
 __x64_sys_connect+0x7a/0x90 net/socket.c:2072
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f3b8167dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3b823f10c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 00007f3b817abf80 RCX: 00007f3b8167dda9
RDX: 000000000000001c RSI: 0000000020000040 RDI: 0000000000000003
RBP: 00007f3b823f1120 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 000000000000000b R14: 00007f3b817abf80 R15: 00007ffd3beb57b8
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26864/">CVE-2024-26864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26864">CVE-2024-26864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223112">SUSE bug 1223112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26865" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26865" ref_url="https://www.suse.com/security/cve/CVE-2024-26865" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rds: tcp: Fix use-after-free of net in reqsk_timer_handler().

syzkaller reported a warning of netns tracker [0] followed by KASAN
splat [1] and another ref tracker warning [1].

syzkaller could not find a repro, but in the log, the only suspicious
sequence was as follows:

  18:26:22 executing program 1:
  r0 = socket$inet6_mptcp(0xa, 0x1, 0x106)
  ...
  connect$inet6(r0, &amp;(0x7f0000000080)={0xa, 0x4001, 0x0, @loopback}, 0x1c) (async)

The notable thing here is 0x4001 in connect(), which is RDS_TCP_PORT.

So, the scenario would be:

  1. unshare(CLONE_NEWNET) creates a per netns tcp listener in
      rds_tcp_listen_init().
  2. syz-executor connect()s to it and creates a reqsk.
  3. syz-executor exit()s immediately.
  4. netns is dismantled.  [0]
  5. reqsk timer is fired, and UAF happens while freeing reqsk.  [1]
  6. listener is freed after RCU grace period.  [2]

Basically, reqsk assumes that the listener guarantees netns safety
until all reqsk timers are expired by holding the listener's refcount.
However, this was not the case for kernel sockets.

Commit 740ea3c4a0b2 ("tcp: Clean up kernel listener's reqsk in
inet_twsk_purge()") fixed this issue only for per-netns ehash.

Let's apply the same fix for the global ehash.

[0]:
ref_tracker: net notrefcnt@0000000065449cc3 has 1/1 users at
     sk_alloc (./include/net/net_namespace.h:337 net/core/sock.c:2146)
     inet6_create (net/ipv6/af_inet6.c:192 net/ipv6/af_inet6.c:119)
     __sock_create (net/socket.c:1572)
     rds_tcp_listen_init (net/rds/tcp_listen.c:279)
     rds_tcp_init_net (net/rds/tcp.c:577)
     ops_init (net/core/net_namespace.c:137)
     setup_net (net/core/net_namespace.c:340)
     copy_net_ns (net/core/net_namespace.c:497)
     create_new_namespaces (kernel/nsproxy.c:110)
     unshare_nsproxy_namespaces (kernel/nsproxy.c:228 (discriminator 4))
     ksys_unshare (kernel/fork.c:3429)
     __x64_sys_unshare (kernel/fork.c:3496)
     do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
     entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129)
...
WARNING: CPU: 0 PID: 27 at lib/ref_tracker.c:179 ref_tracker_dir_exit (lib/ref_tracker.c:179)

[1]:
BUG: KASAN: slab-use-after-free in inet_csk_reqsk_queue_drop (./include/net/inet_hashtables.h:180 net/ipv4/inet_connection_sock.c:952 net/ipv4/inet_connection_sock.c:966)
Read of size 8 at addr ffff88801b370400 by task swapper/0/0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl (lib/dump_stack.c:107 (discriminator 1))
 print_report (mm/kasan/report.c:378 mm/kasan/report.c:488)
 kasan_report (mm/kasan/report.c:603)
 inet_csk_reqsk_queue_drop (./include/net/inet_hashtables.h:180 net/ipv4/inet_connection_sock.c:952 net/ipv4/inet_connection_sock.c:966)
 reqsk_timer_handler (net/ipv4/inet_connection_sock.c:979 net/ipv4/inet_connection_sock.c:1092)
 call_timer_fn (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/timer.h:127 kernel/time/timer.c:1701)
 __run_timers.part.0 (kernel/time/timer.c:1752 kernel/time/timer.c:2038)
 run_timer_softirq (kernel/time/timer.c:2053)
 __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:554)
 irq_exit_rcu (kernel/softirq.c:427 kernel/softirq.c:632 kernel/softirq.c:644)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1076 (discriminator 14))
 &lt;/IRQ&gt;

Allocated by task 258 on cpu 0 at 83.612050s:
 kasan_save_stack (mm/kasan/common.c:48)
 kasan_save_track (mm/kasan/common.c:68)
 __kasan_slab_alloc (mm/kasan/common.c:343)
 kmem_cache_alloc (mm/slub.c:3813 mm/slub.c:3860 mm/slub.c:3867)
 copy_net_ns (./include/linux/slab.h:701 net/core/net_namespace.c:421 net/core/net_namespace.c:480)
 create_new_namespaces (kernel/nsproxy.c:110)
 unshare_nsproxy_name
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26865/">CVE-2024-26865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26865">CVE-2024-26865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223062">SUSE bug 1223062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223063">SUSE bug 1223063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: lpspi: Avoid potential use-after-free in probe()

fsl_lpspi_probe() is allocating/disposing memory manually with
spi_alloc_host()/spi_alloc_target(), but uses
devm_spi_register_controller(). In case of error after the latter call the
memory will be explicitly freed in the probe function by
spi_controller_put() call, but used afterwards by "devm" management outside
probe() (spi_unregister_controller() &lt;- devm_spi_unregister() below).

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070
...
Call trace:
 kernfs_find_ns
 kernfs_find_and_get_ns
 sysfs_remove_group
 sysfs_remove_groups
 device_remove_attrs
 device_del
 spi_unregister_controller
 devm_spi_unregister
 release_nodes
 devres_release_all
 really_probe
 driver_probe_device
 __device_attach_driver
 bus_for_each_drv
 __device_attach
 device_initial_probe
 bus_probe_device
 deferred_probe_work_func
 process_one_work
 worker_thread
 kthread
 ret_from_fork
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223024">SUSE bug 1223024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26867" ref_url="https://www.suse.com/security/cve/CVE-2024-26867" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: comedi_8255: Correct error in subdevice initialization

The refactoring done in commit 5c57b1ccecc7 ("comedi: comedi_8255: Rework
subdevice initialization functions") to the initialization of the io
field of struct subdev_8255_private broke all cards using the
drivers/comedi/drivers/comedi_8255.c module.

Prior to 5c57b1ccecc7, __subdev_8255_init() initialized the io field
in the newly allocated struct subdev_8255_private to the non-NULL
callback given to the function, otherwise it used a flag parameter to
select between subdev_8255_mmio and subdev_8255_io. The refactoring
removed that logic and the flag, as subdev_8255_mm_init() and
subdev_8255_io_init() now explicitly pass subdev_8255_mmio and
subdev_8255_io respectively to __subdev_8255_init(), only
__subdev_8255_init() never sets spriv-&gt;io to the supplied
callback. That spriv-&gt;io is NULL leads to a later BUG:

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0010 [#1] SMP PTI
CPU: 1 PID: 1210 Comm: systemd-udevd Not tainted 6.7.3-x86_64 #1
Hardware name: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffa3f1c02d7b78 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff91f847aefd00 RCX: 000000000000009b
RDX: 0000000000000003 RSI: 0000000000000001 RDI: ffff91f840f6fc00
RBP: ffff91f840f6fc00 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: 000000000000005f R12: 0000000000000000
R13: 0000000000000000 R14: ffffffffc0102498 R15: ffff91f847ce6ba8
FS:  00007f72f4e8f500(0000) GS:ffff91f8d5c80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000010540e000 CR4: 00000000000406f0
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x15/0x57
 ? page_fault_oops+0x2ef/0x33c
 ? insert_vmap_area.constprop.0+0xb6/0xd5
 ? alloc_vmap_area+0x529/0x5ee
 ? exc_page_fault+0x15a/0x489
 ? asm_exc_page_fault+0x22/0x30
 __subdev_8255_init+0x79/0x8d [comedi_8255]
 pci_8255_auto_attach+0x11a/0x139 [8255_pci]
 comedi_auto_config+0xac/0x117 [comedi]
 ? __pfx___driver_attach+0x10/0x10
 pci_device_probe+0x88/0xf9
 really_probe+0x101/0x248
 __driver_probe_device+0xbb/0xed
 driver_probe_device+0x1a/0x72
 __driver_attach+0xd4/0xed
 bus_for_each_dev+0x76/0xb8
 bus_add_driver+0xbe/0x1be
 driver_register+0x9a/0xd8
 comedi_pci_driver_register+0x28/0x48 [comedi_pci]
 ? __pfx_pci_8255_driver_init+0x10/0x10 [8255_pci]
 do_one_initcall+0x72/0x183
 do_init_module+0x5b/0x1e8
 init_module_from_file+0x86/0xac
 __do_sys_finit_module+0x151/0x218
 do_syscall_64+0x72/0xdb
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
RIP: 0033:0x7f72f50a0cb9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 47 71 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007ffd47e512d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
RAX: ffffffffffffffda RBX: 0000562dd06ae070 RCX: 00007f72f50a0cb9
RDX: 0000000000000000 RSI: 00007f72f52d32df RDI: 000000000000000e
RBP: 0000000000000000 R08: 00007f72f5168b20 R09: 0000000000000000
R10: 0000000000000050 R11: 0000000000000246 R12: 00007f72f52d32df
R13: 0000000000020000 R14: 0000562dd06785c0 R15: 0000562dcfd0e9a8
 &lt;/TASK&gt;
Modules linked in: 8255_pci(+) comedi_8255 comedi_pci comedi intel_gtt e100(+) acpi_cpufreq rtc_cmos usbhid
CR2: 0000000000000000
---[ end trace 0000000000000000 ]---
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffa3f1c02d7b78 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff91f847aefd00 RCX: 000000000000009b
RDX: 0000000000000003 RSI: 0000000000000001 RDI: ffff91f840f6fc00
RBP: ffff91f840f6fc00 R08: 0000000000000000 R09: 0000000000000001
R10: 0000000000000000 R11: 000000000000005f R12: 0000000000000000
R13: 0000000000000000 R14: ffffffffc0102498 R15: ffff91f847ce6ba8
FS: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26867/">CVE-2024-26867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26867">CVE-2024-26867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223114">SUSE bug 1223114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26868" ref_url="https://www.suse.com/security/cve/CVE-2024-26868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: fix panic when nfs4_ff_layout_prepare_ds() fails

We've been seeing the following panic in production

BUG: kernel NULL pointer dereference, address: 0000000000000065
PGD 2f485f067 P4D 2f485f067 PUD 2cc5d8067 PMD 0
RIP: 0010:ff_layout_cancel_io+0x3a/0x90 [nfs_layout_flexfiles]
Call Trace:
 &lt;TASK&gt;
 ? __die+0x78/0xc0
 ? page_fault_oops+0x286/0x380
 ? __rpc_execute+0x2c3/0x470 [sunrpc]
 ? rpc_new_task+0x42/0x1c0 [sunrpc]
 ? exc_page_fault+0x5d/0x110
 ? asm_exc_page_fault+0x22/0x30
 ? ff_layout_free_layoutreturn+0x110/0x110 [nfs_layout_flexfiles]
 ? ff_layout_cancel_io+0x3a/0x90 [nfs_layout_flexfiles]
 ? ff_layout_cancel_io+0x6f/0x90 [nfs_layout_flexfiles]
 pnfs_mark_matching_lsegs_return+0x1b0/0x360 [nfsv4]
 pnfs_error_mark_layout_for_return+0x9e/0x110 [nfsv4]
 ? ff_layout_send_layouterror+0x50/0x160 [nfs_layout_flexfiles]
 nfs4_ff_layout_prepare_ds+0x11f/0x290 [nfs_layout_flexfiles]
 ff_layout_pg_init_write+0xf0/0x1f0 [nfs_layout_flexfiles]
 __nfs_pageio_add_request+0x154/0x6c0 [nfs]
 nfs_pageio_add_request+0x26b/0x380 [nfs]
 nfs_do_writepage+0x111/0x1e0 [nfs]
 nfs_writepages_callback+0xf/0x30 [nfs]
 write_cache_pages+0x17f/0x380
 ? nfs_pageio_init_write+0x50/0x50 [nfs]
 ? nfs_writepages+0x6d/0x210 [nfs]
 ? nfs_writepages+0x6d/0x210 [nfs]
 nfs_writepages+0x125/0x210 [nfs]
 do_writepages+0x67/0x220
 ? generic_perform_write+0x14b/0x210
 filemap_fdatawrite_wbc+0x5b/0x80
 file_write_and_wait_range+0x6d/0xc0
 nfs_file_fsync+0x81/0x170 [nfs]
 ? nfs_file_mmap+0x60/0x60 [nfs]
 __x64_sys_fsync+0x53/0x90
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Inspecting the core with drgn I was able to pull this

  &gt;&gt;&gt; prog.crashed_thread().stack_trace()[0]
  #0 at 0xffffffffa079657a (ff_layout_cancel_io+0x3a/0x84) in ff_layout_cancel_io at fs/nfs/flexfilelayout/flexfilelayout.c:2021:27
  &gt;&gt;&gt; prog.crashed_thread().stack_trace()[0]['idx']
  (u32)1
  &gt;&gt;&gt; prog.crashed_thread().stack_trace()[0]['flseg'].mirror_array[1].mirror_ds
  (struct nfs4_ff_layout_ds *)0xffffffffffffffed

This is clear from the stack trace, we call nfs4_ff_layout_prepare_ds()
which could error out initializing the mirror_ds, and then we go to
clean it all up and our check is only for if (!mirror-&gt;mirror_ds).  This
is inconsistent with the rest of the users of mirror_ds, which have

  if (IS_ERR_OR_NULL(mirror_ds))

to keep from tripping over this exact scenario.  Fix this up in
ff_layout_cancel_io() to make sure we don't panic when we get an error.
I also spot checked all the other instances of checking mirror_ds and we
appear to be doing the correct checks everywhere, only unconditionally
dereferencing mirror_ds when we know it would be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26868/">CVE-2024-26868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26868">CVE-2024-26868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223038">SUSE bug 1223038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26869" ref_url="https://www.suse.com/security/cve/CVE-2024-26869" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to truncate meta inode pages forcely

Below race case can cause data corruption:

Thread A				GC thread
					- gc_data_segment
					 - ra_data_block
					  - locked meta_inode page
- f2fs_inplace_write_data
 - invalidate_mapping_pages
 : fail to invalidate meta_inode page
   due to lock failure or dirty|writeback
   status
 - f2fs_submit_page_bio
 : write last dirty data to old blkaddr
					 - move_data_block
					  - load old data from meta_inode page
					  - f2fs_submit_page_write
					  : write old data to new blkaddr

Because invalidate_mapping_pages() will skip invalidating page which
has unclear status including locked, dirty, writeback and so on, so
we need to use truncate_inode_pages_range() instead of
invalidate_mapping_pages() to make sure meta_inode page will be dropped.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26869/">CVE-2024-26869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26869">CVE-2024-26869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223116">SUSE bug 1223116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102

A call to listxattr() with a buffer size = 0 returns the actual
size of the buffer needed for a subsequent call. When size &gt; 0,
nfs4_listxattr() does not return an error because either
generic_listxattr() or nfs4_listxattr_nfs4_label() consumes
exactly all the bytes then size is 0 when calling
nfs4_listxattr_nfs4_user() which then triggers the following
kernel BUG:

  [   99.403778] kernel BUG at mm/usercopy.c:102!
  [   99.404063] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
  [   99.408463] CPU: 0 PID: 3310 Comm: python3 Not tainted 6.6.0-61.fc40.aarch64 #1
  [   99.415827] Call trace:
  [   99.415985]  usercopy_abort+0x70/0xa0
  [   99.416227]  __check_heap_object+0x134/0x158
  [   99.416505]  check_heap_object+0x150/0x188
  [   99.416696]  __check_object_size.part.0+0x78/0x168
  [   99.416886]  __check_object_size+0x28/0x40
  [   99.417078]  listxattr+0x8c/0x120
  [   99.417252]  path_listxattr+0x78/0xe0
  [   99.417476]  __arm64_sys_listxattr+0x28/0x40
  [   99.417723]  invoke_syscall+0x78/0x100
  [   99.417929]  el0_svc_common.constprop.0+0x48/0xf0
  [   99.418186]  do_el0_svc+0x24/0x38
  [   99.418376]  el0_svc+0x3c/0x110
  [   99.418554]  el0t_64_sync_handler+0x120/0x130
  [   99.418788]  el0t_64_sync+0x194/0x198
  [   99.418994] Code: aa0003e3 d000a3e0 91310000 97f49bdb (d4210000)

Issue is reproduced when generic_listxattr() returns 'system.nfs4_acl',
thus calling lisxattr() with size = 16 will trigger the bug.

Add check on nfs4_listxattr() to return ERANGE error when it is
called with size &gt; 0 and the return value is greater than size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223113">SUSE bug 1223113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26871" ref_url="https://www.suse.com/security/cve/CVE-2024-26871" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix NULL pointer dereference in f2fs_submit_page_write()

BUG: kernel NULL pointer dereference, address: 0000000000000014
RIP: 0010:f2fs_submit_page_write+0x6cf/0x780 [f2fs]
Call Trace:
&lt;TASK&gt;
? show_regs+0x6e/0x80
? __die+0x29/0x70
? page_fault_oops+0x154/0x4a0
? prb_read_valid+0x20/0x30
? __irq_work_queue_local+0x39/0xd0
? irq_work_queue+0x36/0x70
? do_user_addr_fault+0x314/0x6c0
? exc_page_fault+0x7d/0x190
? asm_exc_page_fault+0x2b/0x30
? f2fs_submit_page_write+0x6cf/0x780 [f2fs]
? f2fs_submit_page_write+0x736/0x780 [f2fs]
do_write_page+0x50/0x170 [f2fs]
f2fs_outplace_write_data+0x61/0xb0 [f2fs]
f2fs_do_write_data_page+0x3f8/0x660 [f2fs]
f2fs_write_single_data_page+0x5bb/0x7a0 [f2fs]
f2fs_write_cache_pages+0x3da/0xbe0 [f2fs]
...
It is possible that other threads have added this fio to io-&gt;bio
and submitted the io-&gt;bio before entering f2fs_submit_page_write().
At this point io-&gt;bio = NULL.
If is_end_zone_blkaddr(sbi, fio-&gt;new_blkaddr) of this fio is true,
then an NULL pointer dereference error occurs at bio_get(io-&gt;bio).
The original code for determining zone end was after "out:",
which would have missed some fio who is zone end. I've moved
 this code before "skip:" to make sure it's done for each fio.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26871/">CVE-2024-26871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26871">CVE-2024-26871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223040">SUSE bug 1223040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Do not register event handler until srpt device is fully setup

Upon rare occasions, KASAN reports a use-after-free Write
in srpt_refresh_port().

This seems to be because an event handler is registered before the
srpt device is fully setup and a race condition upon error may leave a
partially setup event handler in place.

Instead, only register the event handler after srpt device initialization
is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223115">SUSE bug 1223115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26873" ref_url="https://www.suse.com/security/cve/CVE-2024-26873" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: hisi_sas: Fix a deadlock issue related to automatic dump

If we issue a disabling PHY command, the device attached with it will go
offline, if a 2 bit ECC error occurs at the same time, a hung task may be
found:

[ 4613.652388] INFO: task kworker/u256:0:165233 blocked for more than 120 seconds.
[ 4613.666297] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 4613.674809] task:kworker/u256:0  state:D stack:    0 pid:165233 ppid:     2 flags:0x00000208
[ 4613.683959] Workqueue: 0000:74:02.0_disco_q sas_revalidate_domain [libsas]
[ 4613.691518] Call trace:
[ 4613.694678]  __switch_to+0xf8/0x17c
[ 4613.698872]  __schedule+0x660/0xee0
[ 4613.703063]  schedule+0xac/0x240
[ 4613.706994]  schedule_timeout+0x500/0x610
[ 4613.711705]  __down+0x128/0x36c
[ 4613.715548]  down+0x240/0x2d0
[ 4613.719221]  hisi_sas_internal_abort_timeout+0x1bc/0x260 [hisi_sas_main]
[ 4613.726618]  sas_execute_internal_abort+0x144/0x310 [libsas]
[ 4613.732976]  sas_execute_internal_abort_dev+0x44/0x60 [libsas]
[ 4613.739504]  hisi_sas_internal_task_abort_dev.isra.0+0xbc/0x1b0 [hisi_sas_main]
[ 4613.747499]  hisi_sas_dev_gone+0x174/0x250 [hisi_sas_main]
[ 4613.753682]  sas_notify_lldd_dev_gone+0xec/0x2e0 [libsas]
[ 4613.759781]  sas_unregister_common_dev+0x4c/0x7a0 [libsas]
[ 4613.765962]  sas_destruct_devices+0xb8/0x120 [libsas]
[ 4613.771709]  sas_do_revalidate_domain.constprop.0+0x1b8/0x31c [libsas]
[ 4613.778930]  sas_revalidate_domain+0x60/0xa4 [libsas]
[ 4613.784716]  process_one_work+0x248/0x950
[ 4613.789424]  worker_thread+0x318/0x934
[ 4613.793878]  kthread+0x190/0x200
[ 4613.797810]  ret_from_fork+0x10/0x18
[ 4613.802121] INFO: task kworker/u256:4:316722 blocked for more than 120 seconds.
[ 4613.816026] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 4613.824538] task:kworker/u256:4  state:D stack:    0 pid:316722 ppid:     2 flags:0x00000208
[ 4613.833670] Workqueue: 0000:74:02.0 hisi_sas_rst_work_handler [hisi_sas_main]
[ 4613.841491] Call trace:
[ 4613.844647]  __switch_to+0xf8/0x17c
[ 4613.848852]  __schedule+0x660/0xee0
[ 4613.853052]  schedule+0xac/0x240
[ 4613.856984]  schedule_timeout+0x500/0x610
[ 4613.861695]  __down+0x128/0x36c
[ 4613.865542]  down+0x240/0x2d0
[ 4613.869216]  hisi_sas_controller_prereset+0x58/0x1fc [hisi_sas_main]
[ 4613.876324]  hisi_sas_rst_work_handler+0x40/0x8c [hisi_sas_main]
[ 4613.883019]  process_one_work+0x248/0x950
[ 4613.887732]  worker_thread+0x318/0x934
[ 4613.892204]  kthread+0x190/0x200
[ 4613.896118]  ret_from_fork+0x10/0x18
[ 4613.900423] INFO: task kworker/u256:1:348985 blocked for more than 121 seconds.
[ 4613.914341] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 4613.922852] task:kworker/u256:1  state:D stack:    0 pid:348985 ppid:     2 flags:0x00000208
[ 4613.931984] Workqueue: 0000:74:02.0_event_q sas_port_event_worker [libsas]
[ 4613.939549] Call trace:
[ 4613.942702]  __switch_to+0xf8/0x17c
[ 4613.946892]  __schedule+0x660/0xee0
[ 4613.951083]  schedule+0xac/0x240
[ 4613.955015]  schedule_timeout+0x500/0x610
[ 4613.959725]  wait_for_common+0x200/0x610
[ 4613.964349]  wait_for_completion+0x3c/0x5c
[ 4613.969146]  flush_workqueue+0x198/0x790
[ 4613.973776]  sas_porte_broadcast_rcvd+0x1e8/0x320 [libsas]
[ 4613.979960]  sas_port_event_worker+0x54/0xa0 [libsas]
[ 4613.985708]  process_one_work+0x248/0x950
[ 4613.990420]  worker_thread+0x318/0x934
[ 4613.994868]  kthread+0x190/0x200
[ 4613.998800]  ret_from_fork+0x10/0x18

This is because when the device goes offline, we obtain the hisi_hba
semaphore and send the ABORT_DEV command to the device. However, the
internal abort timed out due to the 2 bit ECC error and triggers automatic
dump. In addition, since the hisi_hba semaphore has been obtained, the dump
cannot be executed and the controller cannot be reset.

Therefore, the deadlocks occur on the following circular dependencies
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26873/">CVE-2024-26873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26873">CVE-2024-26873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223047">SUSE bug 1223047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26874" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip

It's possible that mtk_crtc-&gt;event is NULL in
mtk_drm_crtc_finish_page_flip().

pending_needs_vblank value is set by mtk_crtc-&gt;event, but in
mtk_drm_crtc_atomic_flush(), it's is not guarded by the same
lock in mtk_drm_finish_page_flip(), thus a race condition happens.

Consider the following case:

CPU1                              CPU2
step 1:
mtk_drm_crtc_atomic_begin()
mtk_crtc-&gt;event is not null,
                                  step 1:
                                  mtk_drm_crtc_atomic_flush:
                                  mtk_drm_crtc_update_config(
                                      !!mtk_crtc-&gt;event)
step 2:
mtk_crtc_ddp_irq -&gt;
mtk_drm_finish_page_flip:
lock
mtk_crtc-&gt;event set to null,
pending_needs_vblank set to false
unlock
                                  pending_needs_vblank set to true,

                                  step 2:
                                  mtk_crtc_ddp_irq -&gt;
                                  mtk_drm_finish_page_flip called again,
                                  pending_needs_vblank is still true
                                  //null pointer

Instead of guarding the entire mtk_drm_crtc_atomic_flush(), it's more
efficient to just check if mtk_crtc-&gt;event is null before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223048">SUSE bug 1223048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pvrusb2: fix uaf in pvr2_context_set_notify

[Syzbot reported]
BUG: KASAN: slab-use-after-free in pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35
Read of size 4 at addr ffff888113aeb0d8 by task kworker/1:1/26

CPU: 1 PID: 26 Comm: kworker/1:1 Not tainted 6.8.0-rc1-syzkaller-00046-gf1a27f081c1f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Workqueue: usb_hub_wq hub_event
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc4/0x620 mm/kasan/report.c:488
 kasan_report+0xda/0x110 mm/kasan/report.c:601
 pvr2_context_set_notify+0x2c4/0x310 drivers/media/usb/pvrusb2/pvrusb2-context.c:35
 pvr2_context_notify drivers/media/usb/pvrusb2/pvrusb2-context.c:95 [inline]
 pvr2_context_disconnect+0x94/0xb0 drivers/media/usb/pvrusb2/pvrusb2-context.c:272

Freed by task 906:
kasan_save_stack+0x33/0x50 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
kasan_save_free_info+0x3f/0x60 mm/kasan/generic.c:640
poison_slab_object mm/kasan/common.c:241 [inline]
__kasan_slab_free+0x106/0x1b0 mm/kasan/common.c:257
kasan_slab_free include/linux/kasan.h:184 [inline]
slab_free_hook mm/slub.c:2121 [inline]
slab_free mm/slub.c:4299 [inline]
kfree+0x105/0x340 mm/slub.c:4409
pvr2_context_check drivers/media/usb/pvrusb2/pvrusb2-context.c:137 [inline]
pvr2_context_thread_func+0x69d/0x960 drivers/media/usb/pvrusb2/pvrusb2-context.c:158

[Analyze]
Task A set disconnect_flag = !0, which resulted in Task B's condition being met
and releasing mp, leading to this issue.

[Fix]
Place the disconnect_flag assignment operation after all code in pvr2_context_disconnect()
to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223118">SUSE bug 1223118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: adv7511: fix crash on irq during probe

Moved IRQ registration down to end of adv7511_probe().

If an IRQ already is pending during adv7511_probe
(before adv7511_cec_init) then cec_received_msg_ts
could crash using uninitialized data:

    Unable to handle kernel read from unreadable memory at virtual address 00000000000003d5
    Internal error: Oops: 96000004 [#1] PREEMPT_RT SMP
    Call trace:
     cec_received_msg_ts+0x48/0x990 [cec]
     adv7511_cec_irq_process+0x1cc/0x308 [adv7511]
     adv7511_irq_process+0xd8/0x120 [adv7511]
     adv7511_irq_handler+0x1c/0x30 [adv7511]
     irq_thread_fn+0x30/0xa0
     irq_thread+0x14c/0x238
     kthread+0x190/0x1a8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223119">SUSE bug 1223119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: xilinx - call finalize with bh disabled

When calling crypto_finalize_request, BH should be disabled to avoid
triggering the following calltrace:

    ------------[ cut here ]------------
    WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118
    Modules linked in: cryptodev(O)
    CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G           O       6.8.0-rc1-yocto-standard #323
    Hardware name: ZynqMP ZCU102 Rev1.0 (DT)
    pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    pc : crypto_finalize_request+0xa0/0x118
    lr : crypto_finalize_request+0x104/0x118
    sp : ffffffc085353ce0
    x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688
    x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00
    x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000
    x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450
    x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
    x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0
    x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8
    x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001
    x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000
    x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000
    Call trace:
     crypto_finalize_request+0xa0/0x118
     crypto_finalize_aead_request+0x18/0x30
     zynqmp_handle_aes_req+0xcc/0x388
     crypto_pump_work+0x168/0x2d8
     kthread_worker_fn+0xfc/0x3a0
     kthread+0x118/0x138
     ret_from_fork+0x10/0x20
    irq event stamp: 40
    hardirqs last  enabled at (39): [&lt;ffffffc0812416f8&gt;] _raw_spin_unlock_irqrestore+0x70/0xb0
    hardirqs last disabled at (40): [&lt;ffffffc08122d208&gt;] el1_dbg+0x28/0x90
    softirqs last  enabled at (36): [&lt;ffffffc080017dec&gt;] kernel_neon_begin+0x8c/0xf0
    softirqs last disabled at (34): [&lt;ffffffc080017dc0&gt;] kernel_neon_begin+0x60/0xf0
    ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223140">SUSE bug 1223140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

quota: Fix potential NULL pointer dereference

Below race may cause NULL pointer dereference

P1					P2
dquot_free_inode			quota_off
					  drop_dquot_ref
					   remove_dquot_ref
					   dquots = i_dquot(inode)
  dquots = i_dquot(inode)
  srcu_read_lock
  dquots[cnt]) != NULL (1)
					     dquots[type] = NULL (2)
  spin_lock(&amp;dquots[cnt]-&gt;dq_dqb_lock) (3)
   ....

If dquot_free_inode(or other routines) checks inode's quota pointers (1)
before quota_off sets it to NULL(2) and use it (3) after that, NULL pointer
dereference will be triggered.

So let's fix it by using a temporary pointer to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223060">SUSE bug 1223060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: meson: Add missing clocks to axg_clk_regmaps

Some clocks were missing from axg_clk_regmaps, which caused kernel panic
during cat /sys/kernel/debug/clk/clk_summary

[   57.349402] Unable to handle kernel NULL pointer dereference at virtual address 00000000000001fc
...
[   57.430002] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   57.436900] pc : regmap_read+0x1c/0x88
[   57.440608] lr : clk_regmap_gate_is_enabled+0x3c/0xb0
[   57.445611] sp : ffff800082f1b690
[   57.448888] x29: ffff800082f1b690 x28: 0000000000000000 x27: ffff800080eb9a70
[   57.455961] x26: 0000000000000007 x25: 0000000000000016 x24: 0000000000000000
[   57.463033] x23: ffff800080e8b488 x22: 0000000000000015 x21: ffff00000e7e7000
[   57.470106] x20: ffff00000400ec00 x19: 0000000000000000 x18: ffffffffffffffff
[   57.477178] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000042a3000
[   57.484251] x14: 0000000000000000 x13: ffff0000042a2fec x12: 0000000005f5e100
[   57.491323] x11: abcc77118461cefd x10: 0000000000000020 x9 : ffff8000805e4b24
[   57.498396] x8 : ffff0000028063c0 x7 : ffff800082f1b710 x6 : ffff800082f1b710
[   57.505468] x5 : 00000000ffffffd0 x4 : ffff800082f1b6e0 x3 : 0000000000001000
[   57.512541] x2 : ffff800082f1b6e4 x1 : 000000000000012c x0 : 0000000000000000
[   57.519615] Call trace:
[   57.522030]  regmap_read+0x1c/0x88
[   57.525393]  clk_regmap_gate_is_enabled+0x3c/0xb0
[   57.530050]  clk_core_is_enabled+0x44/0x120
[   57.534190]  clk_summary_show_subtree+0x154/0x2f0
[   57.538847]  clk_summary_show_subtree+0x220/0x2f0
[   57.543505]  clk_summary_show_subtree+0x220/0x2f0
[   57.548162]  clk_summary_show_subtree+0x220/0x2f0
[   57.552820]  clk_summary_show_subtree+0x220/0x2f0
[   57.557477]  clk_summary_show_subtree+0x220/0x2f0
[   57.562135]  clk_summary_show_subtree+0x220/0x2f0
[   57.566792]  clk_summary_show_subtree+0x220/0x2f0
[   57.571450]  clk_summary_show+0x84/0xb8
[   57.575245]  seq_read_iter+0x1bc/0x4b8
[   57.578954]  seq_read+0x8c/0xd0
[   57.582059]  full_proxy_read+0x68/0xc8
[   57.585767]  vfs_read+0xb0/0x268
[   57.588959]  ksys_read+0x70/0x108
[   57.592236]  __arm64_sys_read+0x24/0x38
[   57.596031]  invoke_syscall+0x50/0x128
[   57.599740]  el0_svc_common.constprop.0+0x48/0xf8
[   57.604397]  do_el0_svc+0x28/0x40
[   57.607675]  el0_svc+0x34/0xb8
[   57.610694]  el0t_64_sync_handler+0x13c/0x158
[   57.615006]  el0t_64_sync+0x190/0x198
[   57.618635] Code: a9bd7bfd 910003fd a90153f3 aa0003f3 (b941fc00)
[   57.624668] ---[ end trace 0000000000000000 ]---

[jbrunet: add missing Fixes tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223066">SUSE bug 1223066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: call the resume method on internal suspend

There is this reported crash when experimenting with the lvm2 testsuite.
The list corruption is caused by the fact that the postsuspend and resume
methods were not paired correctly; there were two consecutive calls to the
origin_postsuspend function. The second call attempts to remove the
"hash_list" entry from a list, while it was already removed by the first
call.

Fix __dm_internal_resume so that it calls the preresume and resume
methods of the table's targets.

If a preresume method of some target fails, we are in a tricky situation.
We can't return an error because dm_internal_resume isn't supposed to
return errors. We can't return success, because then the "resume" and
"postsuspend" methods would not be paired correctly. So, we set the
DMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace
tools, but it won't cause a kernel crash.

------------[ cut here ]------------
kernel BUG at lib/list_debug.c:56!
invalid opcode: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0
&lt;snip&gt;
RSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282
RAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff
RBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058
R10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001
R13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0
FS:  00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0
Call Trace:
 &lt;TASK&gt;
 ? die+0x2d/0x80
 ? do_trap+0xeb/0xf0
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? do_error_trap+0x60/0x80
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? exc_invalid_op+0x49/0x60
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? asm_exc_invalid_op+0x16/0x20
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ? __list_del_entry_valid_or_report+0x77/0xc0
 origin_postsuspend+0x1a/0x50 [dm_snapshot]
 dm_table_postsuspend_targets+0x34/0x50 [dm_mod]
 dm_suspend+0xd8/0xf0 [dm_mod]
 dev_suspend+0x1f2/0x2f0 [dm_mod]
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ctl_ioctl+0x300/0x5f0 [dm_mod]
 dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]
 __x64_compat_sys_ioctl+0x104/0x170
 do_syscall_64+0x184/0x1b0
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0xf7e6aead
&lt;snip&gt;
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223188">SUSE bug 1223188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when 1588 is received on HIP08 devices

The HIP08 devices does not register the ptp devices, so the
hdev-&gt;ptp is NULL, but the hardware can receive 1588 messages,
and set the HNS3_RXD_TS_VLD_B bit, so, if match this case, the
access of hdev-&gt;ptp-&gt;flags will cause a kernel crash:

[ 5888.946472] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
[ 5888.946475] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
...
[ 5889.266118] pc : hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]
[ 5889.272612] lr : hclge_ptp_get_rx_hwts+0x34/0x170 [hclge]
[ 5889.279101] sp : ffff800012c3bc50
[ 5889.283516] x29: ffff800012c3bc50 x28: ffff2040002be040
[ 5889.289927] x27: ffff800009116484 x26: 0000000080007500
[ 5889.296333] x25: 0000000000000000 x24: ffff204001c6f000
[ 5889.302738] x23: ffff204144f53c00 x22: 0000000000000000
[ 5889.309134] x21: 0000000000000000 x20: ffff204004220080
[ 5889.315520] x19: ffff204144f53c00 x18: 0000000000000000
[ 5889.321897] x17: 0000000000000000 x16: 0000000000000000
[ 5889.328263] x15: 0000004000140ec8 x14: 0000000000000000
[ 5889.334617] x13: 0000000000000000 x12: 00000000010011df
[ 5889.340965] x11: bbfeff4d22000000 x10: 0000000000000000
[ 5889.347303] x9 : ffff800009402124 x8 : 0200f78811dfbb4d
[ 5889.353637] x7 : 2200000000191b01 x6 : ffff208002a7d480
[ 5889.359959] x5 : 0000000000000000 x4 : 0000000000000000
[ 5889.366271] x3 : 0000000000000000 x2 : 0000000000000000
[ 5889.372567] x1 : 0000000000000000 x0 : ffff20400095c080
[ 5889.378857] Call trace:
[ 5889.382285] hclge_ptp_get_rx_hwts+0x40/0x170 [hclge]
[ 5889.388304] hns3_handle_bdinfo+0x324/0x410 [hns3]
[ 5889.394055] hns3_handle_rx_bd+0x60/0x150 [hns3]
[ 5889.399624] hns3_clean_rx_ring+0x84/0x170 [hns3]
[ 5889.405270] hns3_nic_common_poll+0xa8/0x220 [hns3]
[ 5889.411084] napi_poll+0xcc/0x264
[ 5889.415329] net_rx_action+0xd4/0x21c
[ 5889.419911] __do_softirq+0x130/0x358
[ 5889.424484] irq_exit+0x134/0x154
[ 5889.428700] __handle_domain_irq+0x88/0xf0
[ 5889.433684] gic_handle_irq+0x78/0x2c0
[ 5889.438319] el1_irq+0xb8/0x140
[ 5889.442354] arch_cpu_idle+0x18/0x40
[ 5889.446816] default_idle_call+0x5c/0x1c0
[ 5889.451714] cpuidle_idle_call+0x174/0x1b0
[ 5889.456692] do_idle+0xc8/0x160
[ 5889.460717] cpu_startup_entry+0x30/0xfc
[ 5889.465523] secondary_start_kernel+0x158/0x1ec
[ 5889.470936] Code: 97ffab78 f9411c14 91408294 f9457284 (f9400c80)
[ 5889.477950] SMP: stopping secondary CPUs
[ 5890.514626] SMP: failed to stop secondary CPUs 0-69,71-95
[ 5890.522951] Starting crashdump kernel...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223041">SUSE bug 1223041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: make sure to pull inner header in ip_tunnel_rcv()

Apply the same fix than ones found in :

8d975c15c0cd ("ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()")
1ca1ba465e55 ("geneve: make sure to pull inner header in geneve_rx()")

We have to save skb-&gt;network_header in a temporary variable
in order to be able to recompute the network_header pointer
after a pskb_inet_may_pull() call.

pskb_inet_may_pull() makes sure the needed headers are in skb-&gt;head.

syzbot reported:
BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
 BUG: KMSAN: uninit-value in ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP_ECN_decapsulate include/net/inet_ecn.h:302 [inline]
  ip_tunnel_rcv+0xed9/0x2ed0 net/ipv4/ip_tunnel.c:409
  __ipgre_rcv+0x9bc/0xbc0 net/ipv4/ip_gre.c:389
  ipgre_rcv net/ipv4/ip_gre.c:411 [inline]
  gre_rcv+0x423/0x19f0 net/ipv4/ip_gre.c:447
  gre_rcv+0x2a4/0x390 net/ipv4/gre_demux.c:163
  ip_protocol_deliver_rcu+0x264/0x1300 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x2b8/0x440 net/ipv4/ip_input.c:233
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
  dst_input include/net/dst.h:461 [inline]
  ip_rcv_finish net/ipv4/ip_input.c:449 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip_rcv+0x46f/0x760 net/ipv4/ip_input.c:569
  __netif_receive_skb_one_core net/core/dev.c:5534 [inline]
  __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5648
  netif_receive_skb_internal net/core/dev.c:5734 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5793
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1556
  tun_get_user+0x53b9/0x66e0 drivers/net/tun.c:2009
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
  call_write_iter include/linux/fs.h:2087 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb6b/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
  __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590
  alloc_pages_mpol+0x62b/0x9d0 mm/mempolicy.c:2133
  alloc_pages+0x1be/0x1e0 mm/mempolicy.c:2204
  skb_page_frag_refill+0x2bf/0x7c0 net/core/sock.c:2909
  tun_build_skb drivers/net/tun.c:1686 [inline]
  tun_get_user+0xe0a/0x66e0 drivers/net/tun.c:1826
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2055
  call_write_iter include/linux/fs.h:2087 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb6b/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xd0 fs/read_write.c:652
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223034">SUSE bug 1223034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check on 32-bit arches

The stackmap code relies on roundup_pow_of_two() to compute the number
of hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code.

The commit in the fixes tag actually attempted to fix this, but the fix
did not account for the UB, so the fix only works on CPUs where an
overflow does result in a neat truncation to zero, which is not
guaranteed. Checking the value before rounding does not have this
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223035">SUSE bug 1223035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix hashtab overflow check on 32-bit arches

The hashtab code relies on roundup_pow_of_two() to compute the number of
hash buckets, and contains an overflow check by checking if the
resulting value is 0. However, on 32-bit arches, the roundup code itself
can overflow by doing a 32-bit left-shift of an unsigned long value,
which is undefined behaviour, so it is not guaranteed to truncate
neatly. This was triggered by syzbot on the DEVMAP_HASH type, which
contains the same check, copied from the hashtab code. So apply the same
fix to hashtab, by moving the overflow check to before the roundup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223189">SUSE bug 1223189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix DEVMAP_HASH overflow check on 32-bit arches

The devmap code allocates a number hash buckets equal to the next power
of two of the max_entries value provided when creating the map. When
rounding up to the next power of two, the 32-bit variable storing the
number of buckets can overflow, and the code checks for overflow by
checking if the truncated 32-bit value is equal to 0. However, on 32-bit
arches the rounding up itself can overflow mid-way through, because it
ends up doing a left-shift of 32 bits on an unsigned long value. If the
size of an unsigned long is four bytes, this is undefined behaviour, so
there is no guarantee that we'll end up with a nice and tidy 0-value at
the end.

Syzbot managed to turn this into a crash on arm32 by creating a
DEVMAP_HASH with max_entries &gt; 0x80000000 and then trying to update it.
Fix this by moving the overflow check to before the rounding up
operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223190">SUSE bug 1223190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26886" ref_url="https://www.suse.com/security/cve/CVE-2024-26886" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: af_bluetooth: Fix deadlock

Attemting to do sock_lock on .recvmsg may cause a deadlock as shown
bellow, so instead of using sock_sock this uses sk_receive_queue.lock
on bt_sock_ioctl to avoid the UAF:

INFO: task kworker/u9:1:121 blocked for more than 30 seconds.
      Not tainted 6.7.6-lemon #183
Workqueue: hci0 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __schedule+0x37d/0xa00
 schedule+0x32/0xe0
 __lock_sock+0x68/0xa0
 ? __pfx_autoremove_wake_function+0x10/0x10
 lock_sock_nested+0x43/0x50
 l2cap_sock_recv_cb+0x21/0xa0
 l2cap_recv_frame+0x55b/0x30a0
 ? psi_task_switch+0xeb/0x270
 ? finish_task_switch.isra.0+0x93/0x2a0
 hci_rx_work+0x33a/0x3f0
 process_one_work+0x13a/0x2f0
 worker_thread+0x2f0/0x410
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe0/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26886/">CVE-2024-26886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26886">CVE-2024-26886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223044">SUSE bug 1223044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26887" ref_url="https://www.suse.com/security/cve/CVE-2024-26887" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: Fix memory leak

This checks if CONFIG_DEV_COREDUMP is enabled before attempting to clone
the skb and also make sure btmtk_process_coredump frees the skb passed
following the same logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26887/">CVE-2024-26887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26887">CVE-2024-26887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223123">SUSE bug 1223123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26888" ref_url="https://www.suse.com/security/cve/CVE-2024-26888" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: msft: Fix memory leak

Fix leaking buffer allocated to send MSFT_OP_LE_MONITOR_ADVERTISEMENT.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26888/">CVE-2024-26888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26888">CVE-2024-26888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223124">SUSE bug 1223124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix possible buffer overflow

struct hci_dev_info has a fixed size name[8] field so in the event that
hdev-&gt;name is bigger than that strcpy would attempt to write past its
size, so this fixes this problem by switching to use strscpy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228195">SUSE bug 1228195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26890" ref_url="https://www.suse.com/security/cve/CVE-2024-26890" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btrtl: fix out of bounds memory access

The problem is detected by KASAN.
btrtl driver uses private hci data to store 'struct btrealtek_data'.
If btrtl driver is used with btusb, then memory for private hci data
is allocated in btusb. But no private data is allocated after hci_dev,
when btrtl is used with hci_h5.

This commit adds memory allocation for hci_h5 case.

 ==================================================================
 BUG: KASAN: slab-out-of-bounds in btrtl_initialize+0x6cc/0x958 [btrtl]
 Write of size 8 at addr ffff00000f5a5748 by task kworker/u9:0/76

 Hardware name: Pine64 PinePhone (1.2) (DT)
 Workqueue: hci0 hci_power_on [bluetooth]
 Call trace:
  dump_backtrace+0x9c/0x128
  show_stack+0x20/0x38
  dump_stack_lvl+0x48/0x60
  print_report+0xf8/0x5d8
  kasan_report+0x90/0xd0
  __asan_store8+0x9c/0xc0
  	 [btrtl]
  h5_btrtl_setup+0xd0/0x2f8 [hci_uart]
  h5_setup+0x50/0x80 [hci_uart]
  hci_uart_setup+0xd4/0x260 [hci_uart]
  hci_dev_open_sync+0x1cc/0xf68 [bluetooth]
  hci_dev_do_open+0x34/0x90 [bluetooth]
  hci_power_on+0xc4/0x3c8 [bluetooth]
  process_one_work+0x328/0x6f0
  worker_thread+0x410/0x778
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20

 Allocated by task 53:
  kasan_save_stack+0x3c/0x68
  kasan_save_track+0x20/0x40
  kasan_save_alloc_info+0x68/0x78
  __kasan_kmalloc+0xd4/0xd8
  __kmalloc+0x1b4/0x3b0
  hci_alloc_dev_priv+0x28/0xa58 [bluetooth]
  hci_uart_register_device+0x118/0x4f8 [hci_uart]
  h5_serdev_probe+0xf4/0x178 [hci_uart]
  serdev_drv_probe+0x54/0xa0
  really_probe+0x254/0x588
  __driver_probe_device+0xc4/0x210
  driver_probe_device+0x64/0x160
  __driver_attach_async_helper+0x88/0x158
  async_run_entry_fn+0xd0/0x388
  process_one_work+0x328/0x6f0
  worker_thread+0x410/0x778
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20

 Last potentially related work creation:
  kasan_save_stack+0x3c/0x68
  __kasan_record_aux_stack+0xb0/0x150
  kasan_record_aux_stack_noalloc+0x14/0x20
  __queue_work+0x33c/0x960
  queue_work_on+0x98/0xc0
  hci_recv_frame+0xc8/0x1e8 [bluetooth]
  h5_complete_rx_pkt+0x2c8/0x800 [hci_uart]
  h5_rx_payload+0x98/0xb8 [hci_uart]
  h5_recv+0x158/0x3d8 [hci_uart]
  hci_uart_receive_buf+0xa0/0xe8 [hci_uart]
  ttyport_receive_buf+0xac/0x178
  flush_to_ldisc+0x130/0x2c8
  process_one_work+0x328/0x6f0
  worker_thread+0x410/0x778
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20

 Second to last potentially related work creation:
  kasan_save_stack+0x3c/0x68
  __kasan_record_aux_stack+0xb0/0x150
  kasan_record_aux_stack_noalloc+0x14/0x20
  __queue_work+0x788/0x960
  queue_work_on+0x98/0xc0
  __hci_cmd_sync_sk+0x23c/0x7a0 [bluetooth]
  __hci_cmd_sync+0x24/0x38 [bluetooth]
  btrtl_initialize+0x760/0x958 [btrtl]
  h5_btrtl_setup+0xd0/0x2f8 [hci_uart]
  h5_setup+0x50/0x80 [hci_uart]
  hci_uart_setup+0xd4/0x260 [hci_uart]
  hci_dev_open_sync+0x1cc/0xf68 [bluetooth]
  hci_dev_do_open+0x34/0x90 [bluetooth]
  hci_power_on+0xc4/0x3c8 [bluetooth]
  process_one_work+0x328/0x6f0
  worker_thread+0x410/0x778
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20
 ==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26890/">CVE-2024-26890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26890">CVE-2024-26890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223192">SUSE bug 1223192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223362">SUSE bug 1223362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Don't issue ATS Invalidation request when device is disconnected

For those endpoint devices connect to system via hotplug capable ports,
users could request a hot reset to the device by flapping device's link
through setting the slot's link control register, as pciehp_ist() DLLSC
interrupt sequence response, pciehp will unload the device driver and
then power it off. thus cause an IOMMU device-TLB invalidation (Intel
VT-d spec, or ATS Invalidation in PCIe spec r6.1) request for non-existence
target device to be sent and deadly loop to retry that request after ITE
fault triggered in interrupt context.

That would cause following continuous hard lockup warning and system hang

[ 4211.433662] pcieport 0000:17:01.0: pciehp: Slot(108): Link Down
[ 4211.433664] pcieport 0000:17:01.0: pciehp: Slot(108): Card not present
[ 4223.822591] NMI watchdog: Watchdog detected hard LOCKUP on cpu 144
[ 4223.822622] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S
         OE    kernel version xxxx
[ 4223.822623] Hardware name: vendorname xxxx 666-106,
BIOS 01.01.02.03.01 05/15/2023
[ 4223.822623] RIP: 0010:qi_submit_sync+0x2c0/0x490
[ 4223.822624] Code: 48 be 00 00 00 00 00 08 00 00 49 85 74 24 20 0f 95 c1 48 8b
 57 10 83 c1 04 83 3c 1a 03 0f 84 a2 01 00 00 49 8b 04 24 8b 70 34 &lt;40&gt; f6 c6 1
0 74 17 49 8b 04 24 8b 80 80 00 00 00 89 c2 d3 fa 41 39
[ 4223.822624] RSP: 0018:ffffc4f074f0bbb8 EFLAGS: 00000093
[ 4223.822625] RAX: ffffc4f040059000 RBX: 0000000000000014 RCX: 0000000000000005
[ 4223.822625] RDX: ffff9f3841315800 RSI: 0000000000000000 RDI: ffff9f38401a8340
[ 4223.822625] RBP: ffff9f38401a8340 R08: ffffc4f074f0bc00 R09: 0000000000000000
[ 4223.822626] R10: 0000000000000010 R11: 0000000000000018 R12: ffff9f384005e200
[ 4223.822626] R13: 0000000000000004 R14: 0000000000000046 R15: 0000000000000004
[ 4223.822626] FS:  0000000000000000(0000) GS:ffffa237ae400000(0000)
knlGS:0000000000000000
[ 4223.822627] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4223.822627] CR2: 00007ffe86515d80 CR3: 000002fd3000a001 CR4: 0000000000770ee0
[ 4223.822627] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4223.822628] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 4223.822628] PKRU: 55555554
[ 4223.822628] Call Trace:
[ 4223.822628]  qi_flush_dev_iotlb+0xb1/0xd0
[ 4223.822628]  __dmar_remove_one_dev_info+0x224/0x250
[ 4223.822629]  dmar_remove_one_dev_info+0x3e/0x50
[ 4223.822629]  intel_iommu_release_device+0x1f/0x30
[ 4223.822629]  iommu_release_device+0x33/0x60
[ 4223.822629]  iommu_bus_notifier+0x7f/0x90
[ 4223.822630]  blocking_notifier_call_chain+0x60/0x90
[ 4223.822630]  device_del+0x2e5/0x420
[ 4223.822630]  pci_remove_bus_device+0x70/0x110
[ 4223.822630]  pciehp_unconfigure_device+0x7c/0x130
[ 4223.822631]  pciehp_disable_slot+0x6b/0x100
[ 4223.822631]  pciehp_handle_presence_or_link_change+0xd8/0x320
[ 4223.822631]  pciehp_ist+0x176/0x180
[ 4223.822631]  ? irq_finalize_oneshot.part.50+0x110/0x110
[ 4223.822632]  irq_thread_fn+0x19/0x50
[ 4223.822632]  irq_thread+0x104/0x190
[ 4223.822632]  ? irq_forced_thread_fn+0x90/0x90
[ 4223.822632]  ? irq_thread_check_affinity+0xe0/0xe0
[ 4223.822633]  kthread+0x114/0x130
[ 4223.822633]  ? __kthread_cancel_work+0x40/0x40
[ 4223.822633]  ret_from_fork+0x1f/0x30
[ 4223.822633] Kernel panic - not syncing: Hard LOCKUP
[ 4223.822634] CPU: 144 PID: 1422 Comm: irq/57-pciehp Kdump: loaded Tainted: G S
         OE     kernel version xxxx
[ 4223.822634] Hardware name: vendorname xxxx 666-106,
BIOS 01.01.02.03.01 05/15/2023
[ 4223.822634] Call Trace:
[ 4223.822634]  &lt;NMI&gt;
[ 4223.822635]  dump_stack+0x6d/0x88
[ 4223.822635]  panic+0x101/0x2d0
[ 4223.822635]  ? ret_from_fork+0x11/0x30
[ 4223.822635]  nmi_panic.cold.14+0xc/0xc
[ 4223.822636]  watchdog_overflow_callback.cold.8+0x6d/0x81
[ 4223.822636]  __perf_event_overflow+0x4f/0xf0
[ 4223.822636]  handle_pmi_common
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223037">SUSE bug 1223037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26892" ref_url="https://www.suse.com/security/cve/CVE-2024-26892" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix use-after-free in free_irq()

From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test
to make sure the shared irq handler should be able to handle the unexpected
event after deregistration. For this case, let's apply MT76_REMOVED flag to
indicate the device was removed and do not run into the resource access
anymore.

BUG: KASAN: use-after-free in mt7921_irq_handler+0xd8/0x100 [mt7921e]
Read of size 8 at addr ffff88824a7d3b78 by task rmmod/11115
CPU: 28 PID: 11115 Comm: rmmod Tainted: G        W    L    5.17.0 #10
Hardware name: Micro-Star International Co., Ltd. MS-7D73/MPG B650I
EDGE WIFI (MS-7D73), BIOS 1.81 01/05/2024
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x6f/0xa0
 print_address_description.constprop.0+0x1f/0x190
 ? mt7921_irq_handler+0xd8/0x100 [mt7921e]
 ? mt7921_irq_handler+0xd8/0x100 [mt7921e]
 kasan_report.cold+0x7f/0x11b
 ? mt7921_irq_handler+0xd8/0x100 [mt7921e]
 mt7921_irq_handler+0xd8/0x100 [mt7921e]
 free_irq+0x627/0xaa0
 devm_free_irq+0x94/0xd0
 ? devm_request_any_context_irq+0x160/0x160
 ? kobject_put+0x18d/0x4a0
 mt7921_pci_remove+0x153/0x190 [mt7921e]
 pci_device_remove+0xa2/0x1d0
 __device_release_driver+0x346/0x6e0
 driver_detach+0x1ef/0x2c0
 bus_remove_driver+0xe7/0x2d0
 ? __check_object_size+0x57/0x310
 pci_unregister_driver+0x26/0x250
 __do_sys_delete_module+0x307/0x510
 ? free_module+0x6a0/0x6a0
 ? fpregs_assert_state_consistent+0x4b/0xb0
 ? rcu_read_lock_sched_held+0x10/0x70
 ? syscall_enter_from_user_mode+0x20/0x70
 ? trace_hardirqs_on+0x1c/0x130
 do_syscall_64+0x5c/0x80
 ? trace_hardirqs_on_prepare+0x72/0x160
 ? do_syscall_64+0x68/0x80
 ? trace_hardirqs_on_prepare+0x72/0x160
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26892/">CVE-2024-26892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26892">CVE-2024-26892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223195">SUSE bug 1223195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix double free in SMC transport cleanup path

When the generic SCMI code tears down a channel, it calls the chan_free
callback function, defined by each transport. Since multiple protocols
might share the same transport_info member, chan_free() might want to
clean up the same member multiple times within the given SCMI transport
implementation. In this case, it is SMC transport. This will lead to a NULL
pointer dereference at the second time:

    | scmi_protocol scmi_dev.1: Enabled polling mode TX channel - prot_id:16
    | arm-scmi firmware:scmi: SCMI Notifications - Core Enabled.
    | arm-scmi firmware:scmi: unable to communicate with SCMI
    | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
    | Mem abort info:
    |   ESR = 0x0000000096000004
    |   EC = 0x25: DABT (current EL), IL = 32 bits
    |   SET = 0, FnV = 0
    |   EA = 0, S1PTW = 0
    |   FSC = 0x04: level 0 translation fault
    | Data abort info:
    |   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
    |   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    |   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    | user pgtable: 4k pages, 48-bit VAs, pgdp=0000000881ef8000
    | [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
    | Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
    | Modules linked in:
    | CPU: 4 PID: 1 Comm: swapper/0 Not tainted 6.7.0-rc2-00124-g455ef3d016c9-dirty #793
    | Hardware name: FVP Base RevC (DT)
    | pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
    | pc : smc_chan_free+0x3c/0x6c
    | lr : smc_chan_free+0x3c/0x6c
    | Call trace:
    |  smc_chan_free+0x3c/0x6c
    |  idr_for_each+0x68/0xf8
    |  scmi_cleanup_channels.isra.0+0x2c/0x58
    |  scmi_probe+0x434/0x734
    |  platform_probe+0x68/0xd8
    |  really_probe+0x110/0x27c
    |  __driver_probe_device+0x78/0x12c
    |  driver_probe_device+0x3c/0x118
    |  __driver_attach+0x74/0x128
    |  bus_for_each_dev+0x78/0xe0
    |  driver_attach+0x24/0x30
    |  bus_add_driver+0xe4/0x1e8
    |  driver_register+0x60/0x128
    |  __platform_driver_register+0x28/0x34
    |  scmi_driver_init+0x84/0xc0
    |  do_one_initcall+0x78/0x33c
    |  kernel_init_freeable+0x2b8/0x51c
    |  kernel_init+0x24/0x130
    |  ret_from_fork+0x10/0x20
    | Code: f0004701 910a0021 aa1403e5 97b91c70 (b9400280)
    | ---[ end trace 0000000000000000 ]---

Simply check for the struct pointer being NULL before trying to access
its members, to avoid this situation.

This was found when a transport doesn't really work (for instance no SMC
service), the probe routines then tries to clean up, and triggers a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223196">SUSE bug 1223196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()

After unregistering the CPU idle device, the memory associated with
it is not freed, leading to a memory leak:

unreferenced object 0xffff896282f6c000 (size 1024):
  comm "swapper/0", pid 1, jiffies 4294893170
  hex dump (first 32 bytes):
    00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 8836a742):
    [&lt;ffffffff993495ed&gt;] kmalloc_trace+0x29d/0x340
    [&lt;ffffffff9972f3b3&gt;] acpi_processor_power_init+0xf3/0x1c0
    [&lt;ffffffff9972d263&gt;] __acpi_processor_start+0xd3/0xf0
    [&lt;ffffffff9972d2bc&gt;] acpi_processor_start+0x2c/0x50
    [&lt;ffffffff99805872&gt;] really_probe+0xe2/0x480
    [&lt;ffffffff99805c98&gt;] __driver_probe_device+0x78/0x160
    [&lt;ffffffff99805daf&gt;] driver_probe_device+0x1f/0x90
    [&lt;ffffffff9980601e&gt;] __driver_attach+0xce/0x1c0
    [&lt;ffffffff99803170&gt;] bus_for_each_dev+0x70/0xc0
    [&lt;ffffffff99804822&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffff99807245&gt;] driver_register+0x55/0x100
    [&lt;ffffffff9aee4acb&gt;] acpi_processor_driver_init+0x3b/0xc0
    [&lt;ffffffff990012d1&gt;] do_one_initcall+0x41/0x300
    [&lt;ffffffff9ae7c4b0&gt;] kernel_init_freeable+0x320/0x470
    [&lt;ffffffff99b231f6&gt;] kernel_init+0x16/0x1b0
    [&lt;ffffffff99042e6d&gt;] ret_from_fork+0x2d/0x50

Fix this by freeing the CPU idle device after unregistering it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223043">SUSE bug 1223043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces

wilc_netdev_cleanup currently triggers a KASAN warning, which can be
observed on interface registration error path, or simply by
removing the module/unbinding device from driver:

echo spi0.1 &gt; /sys/bus/spi/drivers/wilc1000_spi/unbind

==================================================================
BUG: KASAN: slab-use-after-free in wilc_netdev_cleanup+0x508/0x5cc
Read of size 4 at addr c54d1ce8 by task sh/86

CPU: 0 PID: 86 Comm: sh Not tainted 6.8.0-rc1+ #117
Hardware name: Atmel SAMA5
 unwind_backtrace from show_stack+0x18/0x1c
 show_stack from dump_stack_lvl+0x34/0x58
 dump_stack_lvl from print_report+0x154/0x500
 print_report from kasan_report+0xac/0xd8
 kasan_report from wilc_netdev_cleanup+0x508/0x5cc
 wilc_netdev_cleanup from wilc_bus_remove+0xc8/0xec
 wilc_bus_remove from spi_remove+0x8c/0xac
 spi_remove from device_release_driver_internal+0x434/0x5f8
 device_release_driver_internal from unbind_store+0xbc/0x108
 unbind_store from kernfs_fop_write_iter+0x398/0x584
 kernfs_fop_write_iter from vfs_write+0x728/0xf88
 vfs_write from ksys_write+0x110/0x1e4
 ksys_write from ret_fast_syscall+0x0/0x1c

[...]

Allocated by task 1:
 kasan_save_track+0x30/0x5c
 __kasan_kmalloc+0x8c/0x94
 __kmalloc_node+0x1cc/0x3e4
 kvmalloc_node+0x48/0x180
 alloc_netdev_mqs+0x68/0x11dc
 alloc_etherdev_mqs+0x28/0x34
 wilc_netdev_ifc_init+0x34/0x8ec
 wilc_cfg80211_init+0x690/0x910
 wilc_bus_probe+0xe0/0x4a0
 spi_probe+0x158/0x1b0
 really_probe+0x270/0xdf4
 __driver_probe_device+0x1dc/0x580
 driver_probe_device+0x60/0x140
 __driver_attach+0x228/0x5d4
 bus_for_each_dev+0x13c/0x1a8
 bus_add_driver+0x2a0/0x608
 driver_register+0x24c/0x578
 do_one_initcall+0x180/0x310
 kernel_init_freeable+0x424/0x484
 kernel_init+0x20/0x148
 ret_from_fork+0x14/0x28

Freed by task 86:
 kasan_save_track+0x30/0x5c
 kasan_save_free_info+0x38/0x58
 __kasan_slab_free+0xe4/0x140
 kfree+0xb0/0x238
 device_release+0xc0/0x2a8
 kobject_put+0x1d4/0x46c
 netdev_run_todo+0x8fc/0x11d0
 wilc_netdev_cleanup+0x1e4/0x5cc
 wilc_bus_remove+0xc8/0xec
 spi_remove+0x8c/0xac
 device_release_driver_internal+0x434/0x5f8
 unbind_store+0xbc/0x108
 kernfs_fop_write_iter+0x398/0x584
 vfs_write+0x728/0xf88
 ksys_write+0x110/0x1e4
 ret_fast_syscall+0x0/0x1c
 [...]

David Mosberger-Tan initial investigation [1] showed that this
use-after-free is due to netdevice unregistration during vif list
traversal. When unregistering a net device, since the needs_free_netdev has
been set to true during registration, the netdevice object is also freed,
and as a consequence, the corresponding vif object too, since it is
attached to it as private netdevice data. The next occurrence of the loop
then tries to access freed vif pointer to the list to move forward in the
list.

Fix this use-after-free thanks to two mechanisms:
- navigate in the list with list_for_each_entry_safe, which allows to
  safely modify the list as we go through each element. For each element,
  remove it from the list with list_del_rcu
- make sure to wait for RCU grace period end after each vif removal to make
  sure it is safe to free the corresponding vif too (through
  unregister_netdev)

Since we are in a RCU "modifier" path (not a "reader" path), and because
such path is expected not to be concurrent to any other modifier (we are
using the vif_mutex lock), we do not need to use RCU list API, that's why
we can benefit from list_for_each_entry_safe.

[1] https://lore.kernel.org/linux-wireless/ab077dbe58b1ea5de0a3b2ca21f275a07af967d2.camel@egauge.net/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223197">SUSE bug 1223197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wfx: fix memory leak when starting AP

Kmemleak reported this error:

    unreferenced object 0xd73d1180 (size 184):
      comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.245s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        00 00 00 00 00 00 00 00 1e 00 01 00 00 00 00 00  ................
      backtrace:
        [&lt;5ca11420&gt;] kmem_cache_alloc+0x20c/0x5ac
        [&lt;127bdd74&gt;] __alloc_skb+0x144/0x170
        [&lt;fb8a5e38&gt;] __netdev_alloc_skb+0x50/0x180
        [&lt;0f9fa1d5&gt;] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]
        [&lt;7accd02d&gt;] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]
        [&lt;41e25cc3&gt;] wfx_start_ap+0xc8/0x234 [wfx]
        [&lt;93a70356&gt;] ieee80211_start_ap+0x404/0x6b4 [mac80211]
        [&lt;a4a661cd&gt;] nl80211_start_ap+0x76c/0x9e0 [cfg80211]
        [&lt;47bd8b68&gt;] genl_rcv_msg+0x198/0x378
        [&lt;453ef796&gt;] netlink_rcv_skb+0xd0/0x130
        [&lt;6b7c977a&gt;] genl_rcv+0x34/0x44
        [&lt;66b2d04d&gt;] netlink_unicast+0x1b4/0x258
        [&lt;f965b9b6&gt;] netlink_sendmsg+0x1e8/0x428
        [&lt;aadb8231&gt;] ____sys_sendmsg+0x1e0/0x274
        [&lt;d2b5212d&gt;] ___sys_sendmsg+0x80/0xb4
        [&lt;69954f45&gt;] __sys_sendmsg+0x64/0xa8
    unreferenced object 0xce087000 (size 1024):
      comm "wpa_supplicant", pid 1559, jiffies 13006305 (age 964.246s)
      hex dump (first 32 bytes):
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
        10 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............
      backtrace:
        [&lt;9a993714&gt;] __kmalloc_track_caller+0x230/0x600
        [&lt;f83ea192&gt;] kmalloc_reserve.constprop.0+0x30/0x74
        [&lt;a2c61343&gt;] __alloc_skb+0xa0/0x170
        [&lt;fb8a5e38&gt;] __netdev_alloc_skb+0x50/0x180
        [&lt;0f9fa1d5&gt;] __ieee80211_beacon_get+0x290/0x4d4 [mac80211]
        [&lt;7accd02d&gt;] ieee80211_beacon_get_tim+0x54/0x18c [mac80211]
        [&lt;41e25cc3&gt;] wfx_start_ap+0xc8/0x234 [wfx]
        [&lt;93a70356&gt;] ieee80211_start_ap+0x404/0x6b4 [mac80211]
        [&lt;a4a661cd&gt;] nl80211_start_ap+0x76c/0x9e0 [cfg80211]
        [&lt;47bd8b68&gt;] genl_rcv_msg+0x198/0x378
        [&lt;453ef796&gt;] netlink_rcv_skb+0xd0/0x130
        [&lt;6b7c977a&gt;] genl_rcv+0x34/0x44
        [&lt;66b2d04d&gt;] netlink_unicast+0x1b4/0x258
        [&lt;f965b9b6&gt;] netlink_sendmsg+0x1e8/0x428
        [&lt;aadb8231&gt;] ____sys_sendmsg+0x1e0/0x274
        [&lt;d2b5212d&gt;] ___sys_sendmsg+0x80/0xb4

However, since the kernel is build optimized, it seems the stack is not
accurate. It appears the issue is related to wfx_set_mfp_ap(). The issue
is obvious in this function: memory allocated by ieee80211_beacon_get()
is never released. Fixing this leak makes kmemleak happy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223042">SUSE bug 1223042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete

The ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data
structures have been fully initialised by the time it runs. However, because of
the order in which things are initialised, this is not guaranteed to be the
case, because the device is exposed to the USB subsystem before the ath9k driver
initialisation is completed.

We already committed a partial fix for this in commit:
8b3046abc99e ("ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()")

However, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event
tasklet, pairing it with an "initialisation complete" bit in the TX struct. It
seems syzbot managed to trigger the race for one of the other commands as well,
so let's just move the existing synchronisation bit to cover the whole
tasklet (setting it at the end of ath9k_htc_probe_device() instead of inside
ath9k_tx_init()).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223323">SUSE bug 1223323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts

This patch is against CVE-2023-6270. The description of cve is:

  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux
  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on
  `struct net_device`, and a use-after-free can be triggered by racing
  between the free on the struct and the access through the `skbtxq`
  global queue. This could lead to a denial of service condition or
  potential code execution.

In aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial
code is finished. But the net_device ifp will still be used in
later tx()-&gt;dev_queue_xmit() in kthread. Which means that the
dev_put(ifp) should NOT be called in the success path of skb
initial code in aoecmd_cfg_pkts(). Otherwise tx() may run into
use-after-free because the net_device is freed.

This patch removed the dev_put(ifp) in the success path in
aoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223017">SUSE bug 1223017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26899" ref_url="https://www.suse.com/security/cve/CVE-2024-26899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix deadlock between bd_link_disk_holder and partition scan

'open_mutex' of gendisk is used to protect open/close block devices. But
in bd_link_disk_holder(), it is used to protect the creation of symlink
between holding disk and slave bdev, which introduces some issues.

When bd_link_disk_holder() is called, the driver is usually in the process
of initialization/modification and may suspend submitting io. At this
time, any io hold 'open_mutex', such as scanning partitions, can cause
deadlocks. For example, in raid:

T1                              T2
bdev_open_by_dev
 lock open_mutex [1]
 ...
  efi_partition
  ...
   md_submit_bio
				md_ioctl mddev_syspend
				  -&gt; suspend all io
				 md_add_new_disk
				  bind_rdev_to_array
				   bd_link_disk_holder
				    try lock open_mutex [2]
    md_handle_request
     -&gt; wait mddev_resume

T1 scan partition, T2 add a new device to raid. T1 waits for T2 to resume
mddev, but T2 waits for open_mutex held by T1. Deadlock occurs.

Fix it by introducing a local mutex 'blk_holder_mutex' to replace
'open_mutex'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26899/">CVE-2024-26899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26899">CVE-2024-26899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223045">SUSE bug 1223045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix kmemleak of rdev-&gt;serial

If kobject_add() is fail in bind_rdev_to_array(), 'rdev-&gt;serial' will be
alloc not be freed, and kmemleak occurs.

unreferenced object 0xffff88815a350000 (size 49152):
  comm "mdadm", pid 789, jiffies 4294716910
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc f773277a):
    [&lt;0000000058b0a453&gt;] kmemleak_alloc+0x61/0xe0
    [&lt;00000000366adf14&gt;] __kmalloc_large_node+0x15e/0x270
    [&lt;000000002e82961b&gt;] __kmalloc_node.cold+0x11/0x7f
    [&lt;00000000f206d60a&gt;] kvmalloc_node+0x74/0x150
    [&lt;0000000034bf3363&gt;] rdev_init_serial+0x67/0x170
    [&lt;0000000010e08fe9&gt;] mddev_create_serial_pool+0x62/0x220
    [&lt;00000000c3837bf0&gt;] bind_rdev_to_array+0x2af/0x630
    [&lt;0000000073c28560&gt;] md_add_new_disk+0x400/0x9f0
    [&lt;00000000770e30ff&gt;] md_ioctl+0x15bf/0x1c10
    [&lt;000000006cfab718&gt;] blkdev_ioctl+0x191/0x3f0
    [&lt;0000000085086a11&gt;] vfs_ioctl+0x22/0x60
    [&lt;0000000018b656fe&gt;] __x64_sys_ioctl+0xba/0xe0
    [&lt;00000000e54e675e&gt;] do_syscall_64+0x71/0x150
    [&lt;000000008b0ad622&gt;] entry_SYSCALL_64_after_hwframe+0x6c/0x74
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223046">SUSE bug 1223046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak

syzbot identified a kernel information leak vulnerability in
do_sys_name_to_handle() and issued the following report [1].

[1]
"BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x100 lib/usercopy.c:40
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 _copy_to_user+0xbc/0x100 lib/usercopy.c:40
 copy_to_user include/linux/uaccess.h:191 [inline]
 do_sys_name_to_handle fs/fhandle.c:73 [inline]
 __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]
 __se_sys_name_to_handle_at+0x949/0xb10 fs/fhandle.c:94
 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94
 ...

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 __kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517
 __do_kmalloc_node mm/slab_common.c:1006 [inline]
 __kmalloc+0x121/0x3c0 mm/slab_common.c:1020
 kmalloc include/linux/slab.h:604 [inline]
 do_sys_name_to_handle fs/fhandle.c:39 [inline]
 __do_sys_name_to_handle_at fs/fhandle.c:112 [inline]
 __se_sys_name_to_handle_at+0x441/0xb10 fs/fhandle.c:94
 __x64_sys_name_to_handle_at+0xe4/0x140 fs/fhandle.c:94
 ...

Bytes 18-19 of 20 are uninitialized
Memory access of size 20 starts at ffff888128a46380
Data copied to user address 0000000020000240"

Per Chuck Lever's suggestion, use kzalloc() instead of kmalloc() to
solve the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223198">SUSE bug 1223198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26902" ref_url="https://www.suse.com/security/cve/CVE-2024-26902" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: RISCV: Fix panic on pmu overflow handler

(1 &lt;&lt; idx) of int is not desired when setting bits in unsigned long
overflowed_ctrs, use BIT() instead. This panic happens when running
'perf record -e branches' on sophgo sg2042.

[  273.311852] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098
[  273.320851] Oops [#1]
[  273.323179] Modules linked in:
[  273.326303] CPU: 0 PID: 1475 Comm: perf Not tainted 6.6.0-rc3+ #9
[  273.332521] Hardware name: Sophgo Mango (DT)
[  273.336878] epc : riscv_pmu_ctr_get_width_mask+0x8/0x62
[  273.342291]  ra : pmu_sbi_ovf_handler+0x2e0/0x34e
[  273.347091] epc : ffffffff80aecd98 ra : ffffffff80aee056 sp : fffffff6e36928b0
[  273.354454]  gp : ffffffff821f82d0 tp : ffffffd90c353200 t0 : 0000002ade4f9978
[  273.361815]  t1 : 0000000000504d55 t2 : ffffffff8016cd8c s0 : fffffff6e3692a70
[  273.369180]  s1 : 0000000000000020 a0 : 0000000000000000 a1 : 00001a8e81800000
[  273.376540]  a2 : 0000003c00070198 a3 : 0000003c00db75a4 a4 : 0000000000000015
[  273.383901]  a5 : ffffffd7ff8804b0 a6 : 0000000000000015 a7 : 000000000000002a
[  273.391327]  s2 : 000000000000ffff s3 : 0000000000000000 s4 : ffffffd7ff8803b0
[  273.398773]  s5 : 0000000000504d55 s6 : ffffffd905069800 s7 : ffffffff821fe210
[  273.406139]  s8 : 000000007fffffff s9 : ffffffd7ff8803b0 s10: ffffffd903f29098
[  273.413660]  s11: 0000000080000000 t3 : 0000000000000003 t4 : ffffffff8017a0ca
[  273.421022]  t5 : ffffffff8023cfc2 t6 : ffffffd9040780e8
[  273.426437] status: 0000000200000100 badaddr: 0000000000000098 cause: 000000000000000d
[  273.434512] [&lt;ffffffff80aecd98&gt;] riscv_pmu_ctr_get_width_mask+0x8/0x62
[  273.441169] [&lt;ffffffff80076bd8&gt;] handle_percpu_devid_irq+0x98/0x1ee
[  273.447562] [&lt;ffffffff80071158&gt;] generic_handle_domain_irq+0x28/0x36
[  273.454151] [&lt;ffffffff8047a99a&gt;] riscv_intc_irq+0x36/0x4e
[  273.459659] [&lt;ffffffff80c944de&gt;] handle_riscv_irq+0x4a/0x74
[  273.465442] [&lt;ffffffff80c94c48&gt;] do_irq+0x62/0x92
[  273.470360] Code: 0420 60a2 6402 5529 0141 8082 0013 0000 0013 0000 (6d5c) b783
[  273.477921] ---[ end trace 0000000000000000 ]---
[  273.482630] Kernel panic - not syncing: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26902/">CVE-2024-26902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26902">CVE-2024-26902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223199">SUSE bug 1223199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security

During our fuzz testing of the connection and disconnection process at the
RFCOMM layer, we discovered this bug. By comparing the packets from a
normal connection and disconnection process with the testcase that
triggered a KASAN report. We analyzed the cause of this bug as follows:

1. In the packets captured during a normal connection, the host sends a
`Read Encryption Key Size` type of `HCI_CMD` packet
(Command Opcode: 0x1408) to the controller to inquire the length of
encryption key.After receiving this packet, the controller immediately
replies with a Command Completepacket (Event Code: 0x0e) to return the
Encryption Key Size.

2. In our fuzz test case, the timing of the controller's response to this
packet was delayed to an unexpected point: after the RFCOMM and L2CAP
layers had disconnected but before the HCI layer had disconnected.

3. After receiving the Encryption Key Size Response at the time described
in point 2, the host still called the rfcomm_check_security function.
However, by this time `struct l2cap_conn *conn = l2cap_pi(sk)-&gt;chan-&gt;conn;`
had already been released, and when the function executed
`return hci_conn_security(conn-&gt;hcon, d-&gt;sec_level, auth_type, d-&gt;out);`,
specifically when accessing `conn-&gt;hcon`, a null-ptr-deref error occurred.

To fix this bug, check if `sk-&gt;sk_state` is BT_CLOSED before calling
rfcomm_recv_frame in rfcomm_process_rx.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()

When trying to use copy_from_kernel_nofault() to read vsyscall page
through a bpf program, the following oops was reported:

  BUG: unable to handle page fault for address: ffffffffff600000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 3231067 P4D 3231067 PUD 3233067 PMD 3235067 PTE 0
  Oops: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 20390 Comm: test_progs ...... 6.7.0+ #58
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:copy_from_kernel_nofault+0x6f/0x110
  ......
  Call Trace:
   &lt;TASK&gt;
   ? copy_from_kernel_nofault+0x6f/0x110
   bpf_probe_read_kernel+0x1d/0x50
   bpf_prog_2061065e56845f08_do_probe_read+0x51/0x8d
   trace_call_bpf+0xc5/0x1c0
   perf_call_bpf_enter.isra.0+0x69/0xb0
   perf_syscall_enter+0x13e/0x200
   syscall_trace_enter+0x188/0x1c0
   do_syscall_64+0xb5/0xe0
   entry_SYSCALL_64_after_hwframe+0x6e/0x76
   &lt;/TASK&gt;
  ......
  ---[ end trace 0000000000000000 ]---

The oops is triggered when:

1) A bpf program uses bpf_probe_read_kernel() to read from the vsyscall
page and invokes copy_from_kernel_nofault() which in turn calls
__get_user_asm().

2) Because the vsyscall page address is not readable from kernel space,
a page fault exception is triggered accordingly.

3) handle_page_fault() considers the vsyscall page address as a user
space address instead of a kernel space address. This results in the
fix-up setup by bpf not being applied and a page_fault_oops() is invoked
due to SMAP.

Considering handle_page_fault() has already considered the vsyscall page
address as a userspace address, fix the problem by disallowing vsyscall
page read for copy_from_kernel_nofault().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223202">SUSE bug 1223202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix fortify source warning while accessing Eth segment

 ------------[ cut here ]------------
 memcpy: detected field-spanning write (size 56) of single field "eseg-&gt;inline_hdr.start" at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 (size 2)
 WARNING: CPU: 0 PID: 293779 at /var/lib/dkms/mlnx-ofed-kernel/5.8/build/drivers/infiniband/hw/mlx5/wr.c:131 mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
 Modules linked in: 8021q garp mrp stp llc rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) ib_uverbs(OE) ib_core(OE) mlx5_core(OE) pci_hyperv_intf mlxdevm(OE) mlx_compat(OE) tls mlxfw(OE) psample nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink mst_pciconf(OE) knem(OE) vfio_pci vfio_pci_core vfio_iommu_type1 vfio iommufd irqbypass cuse nfsv3 nfs fscache netfs xfrm_user xfrm_algo ipmi_devintf ipmi_msghandler binfmt_misc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha512_ssse3 snd_pcsp aesni_intel crypto_simd cryptd snd_pcm snd_timer joydev snd soundcore input_leds serio_raw evbug nfsd auth_rpcgss nfs_acl lockd grace sch_fq_codel sunrpc drm efi_pstore ip_tables x_tables autofs4 psmouse virtio_net net_failover failover floppy
  [last unloaded: mlx_compat(OE)]
 CPU: 0 PID: 293779 Comm: ssh Tainted: G           OE      6.2.0-32-generic #32~22.04.1-Ubuntu
 Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
 RIP: 0010:mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
 Code: 0c 01 00 a8 01 75 25 48 8b 75 a0 b9 02 00 00 00 48 c7 c2 10 5b fd c0 48 c7 c7 80 5b fd c0 c6 05 57 0c 03 00 01 e8 95 4d 93 da &lt;0f&gt; 0b 44 8b 4d b0 4c 8b 45 c8 48 8b 4d c0 e9 49 fb ff ff 41 0f b7
 RSP: 0018:ffffb5b48478b570 EFLAGS: 00010046
 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffb5b48478b628 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000000 R12: ffffb5b48478b5e8
 R13: ffff963a3c609b5e R14: ffff9639c3fbd800 R15: ffffb5b480475a80
 FS:  00007fc03b444c80(0000) GS:ffff963a3dc00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000556f46bdf000 CR3: 0000000006ac6003 CR4: 00000000003706f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x72/0x90
  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
  ? __warn+0x8d/0x160
  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
  ? report_bug+0x1bb/0x1d0
  ? handle_bug+0x46/0x90
  ? exc_invalid_op+0x19/0x80
  ? asm_exc_invalid_op+0x1b/0x20
  ? mlx5_ib_post_send+0x191b/0x1a60 [mlx5_ib]
  mlx5_ib_post_send_nodrain+0xb/0x20 [mlx5_ib]
  ipoib_send+0x2ec/0x770 [ib_ipoib]
  ipoib_start_xmit+0x5a0/0x770 [ib_ipoib]
  dev_hard_start_xmit+0x8e/0x1e0
  ? validate_xmit_skb_list+0x4d/0x80
  sch_direct_xmit+0x116/0x3a0
  __dev_xmit_skb+0x1fd/0x580
  __dev_queue_xmit+0x284/0x6b0
  ? _raw_spin_unlock_irq+0xe/0x50
  ? __flush_work.isra.0+0x20d/0x370
  ? push_pseudo_header+0x17/0x40 [ib_ipoib]
  neigh_connected_output+0xcd/0x110
  ip_finish_output2+0x179/0x480
  ? __smp_call_single_queue+0x61/0xa0
  __ip_finish_output+0xc3/0x190
  ip_finish_output+0x2e/0xf0
  ip_output+0x78/0x110
  ? __pfx_ip_finish_output+0x10/0x10
  ip_local_out+0x64/0x70
  __ip_queue_xmit+0x18a/0x460
  ip_queue_xmit+0x15/0x30
  __tcp_transmit_skb+0x914/0x9c0
  tcp_write_xmit+0x334/0x8d0
  tcp_push_one+0x3c/0x60
  tcp_sendmsg_locked+0x2e1/0xac0
  tcp_sendmsg+0x2d/0x50
  inet_sendmsg+0x43/0x90
  sock_sendmsg+0x68/0x80
  sock_write_iter+0x93/0x100
  vfs_write+0x326/0x3c0
  ksys_write+0xbd/0xf0
  ? do_syscall_64+0x69/0x90
  __x64_sys_write+0x19/0x30
  do_syscall_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223203">SUSE bug 1223203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26909" ref_url="https://www.suse.com/security/cve/CVE-2024-26909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: pmic_glink_altmode: fix drm bridge use-after-free

A recent DRM series purporting to simplify support for "transparent
bridges" and handling of probe deferrals ironically exposed a
use-after-free issue on pmic_glink_altmode probe deferral.

This has manifested itself as the display subsystem occasionally failing
to initialise and NULL-pointer dereferences during boot of machines like
the Lenovo ThinkPad X13s.

Specifically, the dp-hpd bridge is currently registered before all
resources have been acquired which means that it can also be
deregistered on probe deferrals.

In the meantime there is a race window where the new aux bridge driver
(or PHY driver previously) may have looked up the dp-hpd bridge and
stored a (non-reference-counted) pointer to the bridge which is about to
be deallocated.

When the display controller is later initialised, this triggers a
use-after-free when attaching the bridges:

	dp -&gt; aux -&gt; dp-hpd (freed)

which may, for example, result in the freed bridge failing to attach:

	[drm:drm_bridge_attach [drm]] *ERROR* failed to attach bridge /soc@0/phy@88eb000 to encoder TMDS-31: -16

or a NULL-pointer dereference:

	Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
	...
	Call trace:
	  drm_bridge_attach+0x70/0x1a8 [drm]
	  drm_aux_bridge_attach+0x24/0x38 [aux_bridge]
	  drm_bridge_attach+0x80/0x1a8 [drm]
	  dp_bridge_init+0xa8/0x15c [msm]
	  msm_dp_modeset_init+0x28/0xc4 [msm]

The DRM bridge implementation is clearly fragile and implicitly built on
the assumption that bridges may never go away. In this case, the fix is
to move the bridge registration in the pmic_glink_altmode driver to
after all resources have been looked up.

Incidentally, with the new dp-hpd bridge implementation, which registers
child devices, this is also a requirement due to a long-standing issue
in driver core that can otherwise lead to a probe deferral loop (see
commit fbc35b45f9f6 ("Add documentation on meaning of -EPROBE_DEFER")).

[DB: slightly fixed commit message by adding the word 'commit']
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26909/">CVE-2024-26909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26909">CVE-2024-26909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223143">SUSE bug 1223143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26910" ref_url="https://www.suse.com/security/cve/CVE-2024-26910" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: fix performance regression in swap operation

The patch "netfilter: ipset: fix race condition between swap/destroy
and kernel side add/del/test", commit 28628fa9 fixes a race condition.
But the synchronize_rcu() added to the swap function unnecessarily slows
it down: it can safely be moved to destroy and use call_rcu() instead.

Eric Dumazet pointed out that simply calling the destroy functions as
rcu callback does not work: sets with timeout use garbage collectors
which need cancelling at destroy which can wait. Therefore the destroy
functions are split into two: cancelling garbage collectors safely at
executing the command received by netlink and moving the remaining
part only into the rcu callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26910/">CVE-2024-26910 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26910">CVE-2024-26910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223151">SUSE bug 1223151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26911" ref_url="https://www.suse.com/security/cve/CVE-2024-26911" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/buddy: Fix alloc_range() error handling code

Few users have observed display corruption when they boot
the machine to KDE Plasma or playing games. We have root
caused the problem that whenever alloc_range() couldn't
find the required memory blocks the function was returning
SUCCESS in some of the corner cases.

The right approach would be if the total allocated size
is less than the required size, the function should
return -ENOSPC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26911/">CVE-2024-26911 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26911">CVE-2024-26911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223055">SUSE bug 1223055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26912" ref_url="https://www.suse.com/security/cve/CVE-2024-26912" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix several DMA buffer leaks

Nouveau manages GSP-RM DMA buffers with nvkm_gsp_mem objects.  Several of
these buffers are never dealloced.  Some of them can be deallocated
right after GSP-RM is initialized, but the rest need to stay until the
driver unloads.

Also futher bullet-proof these objects by poisoning the buffer and
clearing the nvkm_gsp_mem object when it is deallocated.  Poisoning
the buffer should trigger an error (or crash) from GSP-RM if it tries
to access the buffer after we've deallocated it, because we were wrong
about when it is safe to deallocate.

Finally, change the mem-&gt;size field to a size_t because that's the same
type that dma_alloc_coherent expects.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26912/">CVE-2024-26912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26912">CVE-2024-26912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223064">SUSE bug 1223064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26913" ref_url="https://www.suse.com/security/cve/CVE-2024-26913" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix dcn35 8k30 Underflow/Corruption Issue

[why]
odm calculation is missing for pipe split policy determination
and cause Underflow/Corruption issue.

[how]
Add the odm calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26913/">CVE-2024-26913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26913">CVE-2024-26913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223204">SUSE bug 1223204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26914" ref_url="https://www.suse.com/security/cve/CVE-2024-26914" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix incorrect mpc_combine array size

[why]
MAX_SURFACES is per stream, while MAX_PLANES is per asic. The
mpc_combine is an array that records all the planes per asic. Therefore
MAX_PLANES should be used as the array size. Using MAX_SURFACES causes
array overflow when there are more than 3 planes.

[how]
Use the MAX_PLANES for the mpc_combine array size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26914/">CVE-2024-26914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26914">CVE-2024-26914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223205">SUSE bug 1223205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Reset IH OVERFLOW_CLEAR bit

Allows us to detect subsequent IH ring buffer overflows as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223207">SUSE bug 1223207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "drm/amd: flush any delayed gfxoff on suspend entry"

commit ab4750332dbe ("drm/amdgpu/sdma5.2: add begin/end_use ring
callbacks") caused GFXOFF control to be used more heavily and the
codepath that was removed from commit 0dee72639533 ("drm/amd: flush any
delayed gfxoff on suspend entry") now can be exercised at suspend again.

Users report that by using GNOME to suspend the lockscreen trigger will
cause SDMA traffic and the system can deadlock.

This reverts commit 0dee726395333fea833eaaf838bc80962df886c8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223137">SUSE bug 1223137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: Revert "scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock"

This reverts commit 1a1975551943f681772720f639ff42fbaa746212.

This commit causes interrupts to be lost for FCoE devices, since it changed
sping locks from "bh" to "irqsave".

Instead, a work queue should be used, and will be addressed in a separate
commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223056">SUSE bug 1223056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26918" ref_url="https://www.suse.com/security/cve/CVE-2024-26918" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix active state requirement in PME polling

The commit noted in fixes added a bogus requirement that runtime PM managed
devices need to be in the RPM_ACTIVE state for PME polling.  In fact, only
devices in low power states should be polled.

However there's still a requirement that the device config space must be
accessible, which has implications for both the current state of the polled
device and the parent bridge, when present.  It's not sufficient to assume
the bridge remains in D0 and cases have been observed where the bridge
passes the D0 test, but the PM state indicates RPM_SUSPENDING and config
space of the polled device becomes inaccessible during pci_pme_wakeup().

Therefore, since the bridge is already effectively required to be in the
RPM_ACTIVE state, formalize this in the code and elevate the PM usage count
to maintain the state while polling the subordinate device.

This resolves a regression reported in the bugzilla below where a
Thunderbolt/USB4 hierarchy fails to scan for an attached NVMe endpoint
downstream of a bridge in a D3hot power state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26918/">CVE-2024-26918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26918">CVE-2024-26918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223136">SUSE bug 1223136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: ulpi: Fix debugfs directory leak

The ULPI per-device debugfs root is named after the ulpi device's
parent, but ulpi_unregister_interface tries to remove a debugfs
directory named after the ulpi device itself. This results in the
directory sticking around and preventing subsequent (deferred) probes
from succeeding. Change the directory name to match the ulpi device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223847">SUSE bug 1223847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/trigger: Fix to return error if failed to alloc snapshot

Fix register_snapshot_trigger() to return error code if it failed to
allocate a snapshot instead of 0 (success). Unless that, it will register
snapshot trigger without an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228237">SUSE bug 1228237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: inet_defrag: prevent sk release while still in use

ip_local_out() and other functions can pass skb-&gt;sk as function argument.

If the skb is a fragment and reassembly happens before such function call
returns, the sk must not be released.

This affects skb fragments reassembled via netfilter or similar
modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.

Eric Dumazet made an initial analysis of this bug.  Quoting Eric:
  Calling ip_defrag() in output path is also implying skb_orphan(),
  which is buggy because output path relies on sk not disappearing.

  A relevant old patch about the issue was :
  8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()")

  [..]

  net/ipv4/ip_output.c depends on skb-&gt;sk being set, and probably to an
  inet socket, not an arbitrary one.

  If we orphan the packet in ipvlan, then downstream things like FQ
  packet scheduler will not work properly.

  We need to change ip_defrag() to only use skb_orphan() when really
  needed, ie whenever frag_list is going to be used.

Eric suggested to stash sk in fragment queue and made an initial patch.
However there is a problem with this:

If skb is refragmented again right after, ip_do_fragment() will copy
head-&gt;sk to the new fragments, and sets up destructor to sock_wfree.
IOW, we have no choice but to fix up sk_wmem accouting to reflect the
fully reassembled skb, else wmem will underflow.

This change moves the orphan down into the core, to last possible moment.
As ip_defrag_offset is aliased with sk_buff-&gt;sk member, we must move the
offset into the FRAG_CB, else skb-&gt;sk gets clobbered.

This allows to delay the orphaning long enough to learn if the skb has
to be queued or if the skb is completing the reasm queue.

In the former case, things work as before, skb is orphaned.  This is
safe because skb gets queued/stolen and won't continue past reasm engine.

In the latter case, we will steal the skb-&gt;sk reference, reattach it to
the head skb, and fix up wmem accouting when inet_frag inflates truesize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223139">SUSE bug 1223139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: validate the parameters of bo mapping operations more clearly

Verify the parameters of
amdgpu_vm_bo_(map/replace_map/clearing_mappings) in one common place.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223315">SUSE bug 1223315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2797-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix garbage collector racing against connect()

Garbage collector does not take into account the risk of embryo getting
enqueued during the garbage collection. If such embryo has a peer that
carries SCM_RIGHTS, two consecutive passes of scan_children() may see a
different set of children. Leading to an incorrectly elevated inflight
count, and then a dangling pointer within the gc_inflight_list.

sockets are AF_UNIX/SOCK_STREAM
S is an unconnected socket
L is a listening in-flight socket bound to addr, not in fdtable
V's fd will be passed via sendmsg(), gets inflight count bumped

connect(S, addr)	sendmsg(S, [V]); close(V)	__unix_gc()
----------------	-------------------------	-----------

NS = unix_create1()
skb1 = sock_wmalloc(NS)
L = unix_find_other(addr)
unix_state_lock(L)
unix_peer(S) = NS
			// V count=1 inflight=0

 			NS = unix_peer(S)
 			skb2 = sock_alloc()
			skb_queue_tail(NS, skb2[V])

			// V became in-flight
			// V count=2 inflight=1

			close(V)

			// V count=1 inflight=1
			// GC candidate condition met

						for u in gc_inflight_list:
						  if (total_refs == inflight_refs)
						    add u to gc_candidates

						// gc_candidates={L, V}

						for u in gc_candidates:
						  scan_children(u, dec_inflight)

						// embryo (skb1) was not
						// reachable from L yet, so V's
						// inflight remains unchanged
__skb_queue_tail(L, skb1)
unix_state_unlock(L)
						for u in gc_candidates:
						  if (u.inflight)
						    scan_children(u, inc_inflight_move_tail)

						// V count=1 inflight=2 (!)

If there is a GC-candidate listening socket, lock/unlock its state. This
makes GC wait until the end of any ongoing connect() to that socket. After
flipping the lock, a possibly SCM-laden embryo is already enqueued. And if
there is another embryo coming, it can not possibly carry SCM_RIGHTS. At
this point, unix_inflight() can not happen because unix_gc_lock is already
taken. Inflight graph remains unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223683">SUSE bug 1223683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26924" ref_url="https://www.suse.com/security/cve/CVE-2024-26924" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: do not free live element

Pablo reports a crash with large batches of elements with a
back-to-back add/remove pattern.  Quoting Pablo:

  add_elem("00000000") timeout 100 ms
  ...
  add_elem("0000000X") timeout 100 ms
  del_elem("0000000X") &lt;---------------- delete one that was just added
  ...
  add_elem("00005000") timeout 100 ms

  1) nft_pipapo_remove() removes element 0000000X
  Then, KASAN shows a splat.

Looking at the remove function there is a chance that we will drop a
rule that maps to a non-deactivated element.

Removal happens in two steps, first we do a lookup for key k and return the
to-be-removed element and mark it as inactive in the next generation.
Then, in a second step, the element gets removed from the set/map.

The _remove function does not work correctly if we have more than one
element that share the same key.

This can happen if we insert an element into a set when the set already
holds an element with same key, but the element mapping to the existing
key has timed out or is not active in the next generation.

In such case its possible that removal will unmap the wrong element.
If this happens, we will leak the non-deactivated element, it becomes
unreachable.

The element that got deactivated (and will be freed later) will
remain reachable in the set data structure, this can result in
a crash when such an element is retrieved during lookup (stale
pointer).

Add a check that the fully matching key does in fact map to the element
that we have marked as inactive in the deactivation step.
If not, we need to continue searching.

Add a bug/warn trap at the end of the function as well, the remove
function must not ever be called with an invisible/unreachable/non-existent
element.

v2: avoid uneeded temporary variable (Stefano)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26924/">CVE-2024-26924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26924">CVE-2024-26924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223387">SUSE bug 1223387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path

The commit mutex should not be released during the critical section
between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
worker could collect expired objects and get the released commit lock
within the same GC sequence.

nf_tables_module_autoload() temporarily releases the mutex to load
module dependencies, then it goes back to replay the transaction again.
Move it at the end of the abort phase after nft_gc_seq_end() is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224175">SUSE bug 1224175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26926" ref_url="https://www.suse.com/security/cve/CVE-2024-26926" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: check offset alignment in binder_get_object()

Commit 6d98eb95b450 ("binder: avoid potential data leakage when copying
txn") introduced changes to how binder objects are copied. In doing so,
it unintentionally removed an offset alignment check done through calls
to binder_alloc_copy_from_buffer() -&gt; check_buffer().

These calls were replaced in binder_get_object() with copy_from_user(),
so now an explicit offset alignment check is needed here. This avoids
later complications when unwinding the objects gets harder.

It is worth noting this check existed prior to commit 7a67a39320df
("binder: add function to copy binder object from buffer"), likely
removed due to redundancy at the time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26926/">CVE-2024-26926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26926">CVE-2024-26926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223388">SUSE bug 1223388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Add some bounds checking to firmware data

Smatch complains about "head-&gt;full_size - head-&gt;header_size" can
underflow.  To some extent, we're always going to have to trust the
firmware a bit.  However, it's easy enough to add a check for negatives,
and let's add a upper bounds check as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223525">SUSE bug 1223525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_debug_files_proc_show()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223716">SUSE bug 1223716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer

Coverity scan reported potential risk of double free of the pointer
ha-&gt;vp_map.  ha-&gt;vp_map was freed in qla2x00_mem_alloc(), and again freed
in function qla2x00_mem_free(ha).

Assign NULL to vp_map and kfree take care of NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223681">SUSE bug 1223681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix command flush on cable pull

System crash due to command failed to flush back to SCSI layer.

 BUG: unable to handle kernel NULL pointer dereference at 0000000000000000
 PGD 0 P4D 0
 Oops: 0000 [#1] SMP NOPTI
 CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-372.9.1.el8.x86_64 #1
 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021
 Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]
 RIP: 0010:__wake_up_common+0x4c/0x190
 Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 &lt;49&gt; 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75
 RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086
 RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000
 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320
 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8
 R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20
 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  __wake_up_common_lock+0x7c/0xc0
  qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]
 qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0
 ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]
 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.
  ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]
 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1
 ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]
 qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0
  ? __switch_to+0x10c/0x450
 ? process_one_work+0x1a7/0x360
 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.
  ? worker_thread+0x1ce/0x390
  ? create_worker+0x1a0/0x1a0
 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70
  ? kthread+0x10a/0x120
 qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8
  ? set_kthread_struct+0x40/0x40
 qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.
  ? ret_from_fork+0x1f/0x40
 qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout

The system was under memory stress where driver was not able to allocate an
SRB to carry out error recovery of cable pull.  The failure to flush causes
upper layer to start modifying scsi_cmnd.  When the system frees up some
memory, the subsequent cable pull trigger another command flush. At this
point the driver access a null pointer when attempting to DMA unmap the
SGL.

Add a check to make sure commands are flush back on session tear down to
prevent the null pointer access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223627">SUSE bug 1223627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26932" ref_url="https://www.suse.com/security/cve/CVE-2024-26932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: fix double-free issue in tcpm_port_unregister_pd()

When unregister pd capabilitie in tcpm, KASAN will capture below double
-free issue. The root cause is the same capabilitiy will be kfreed twice,
the first time is kfreed by pd_capabilities_release() and the second time
is explicitly kfreed by tcpm_port_unregister_pd().

[    3.988059] BUG: KASAN: double-free in tcpm_port_unregister_pd+0x1a4/0x3dc
[    3.995001] Free of addr ffff0008164d3000 by task kworker/u16:0/10
[    4.001206]
[    4.002712] CPU: 2 PID: 10 Comm: kworker/u16:0 Not tainted 6.8.0-rc5-next-20240220-05616-g52728c567a55 #53
[    4.012402] Hardware name: Freescale i.MX8QXP MEK (DT)
[    4.017569] Workqueue: events_unbound deferred_probe_work_func
[    4.023456] Call trace:
[    4.025920]  dump_backtrace+0x94/0xec
[    4.029629]  show_stack+0x18/0x24
[    4.032974]  dump_stack_lvl+0x78/0x90
[    4.036675]  print_report+0xfc/0x5c0
[    4.040289]  kasan_report_invalid_free+0xa0/0xc0
[    4.044937]  __kasan_slab_free+0x124/0x154
[    4.049072]  kfree+0xb4/0x1e8
[    4.052069]  tcpm_port_unregister_pd+0x1a4/0x3dc
[    4.056725]  tcpm_register_port+0x1dd0/0x2558
[    4.061121]  tcpci_register_port+0x420/0x71c
[    4.065430]  tcpci_probe+0x118/0x2e0

To fix the issue, this will remove kree() from tcpm_port_unregister_pd().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26932/">CVE-2024-26932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26932">CVE-2024-26932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223649">SUSE bug 1223649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in port "disable" sysfs attribute

The show and store callback routines for the "disable" sysfs attribute
file in port.c acquire the device lock for the port's parent hub
device.  This can cause problems if another process has locked the hub
to remove it or change its configuration:

	Removing the hub or changing its configuration requires the
	hub interface to be removed, which requires the port device
	to be removed, and device_del() waits until all outstanding
	sysfs attribute callbacks for the ports have returned.  The
	lock can't be released until then.

	But the disable_show() or disable_store() routine can't return
	until after it has acquired the lock.

The resulting deadlock can be avoided by calling
sysfs_break_active_protection().  This will cause the sysfs core not
to wait for the attribute's callback routine to return, allowing the
removal to proceed.  The disadvantage is that after making this call,
there is no guarantee that the hub structure won't be deallocated at
any moment.  To prevent this, we have to acquire a reference to it
first by calling hub_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223670">SUSE bug 1223670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in usb_deauthorize_interface()

Among the attribute file callback routines in
drivers/usb/core/sysfs.c, the interface_authorized_store() function is
the only one which acquires a device lock on an ancestor device: It
calls usb_deauthorize_interface(), which locks the interface's parent
USB device.

The will lead to deadlock if another process already owns that lock
and tries to remove the interface, whether through a configuration
change or because the device has been disconnected.  As part of the
removal procedure, device_del() waits for all ongoing sysfs attribute
callbacks to complete.  But usb_deauthorize_interface() can't complete
until the device lock has been released, and the lock won't be
released until the removal has finished.

The mechanism provided by sysfs to prevent this kind of deadlock is
to use the sysfs_break_active_protection() function, which tells sysfs
not to wait for the attribute callback.

Reported-and-tested by: Yue Sun &lt;samsun1006219@gmail.com&gt;
Reported by: xingwei lee &lt;xrivendell7@gmail.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223671">SUSE bug 1223671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix unremoved procfs host directory regression

Commit fc663711b944 ("scsi: core: Remove the /proc/scsi/${proc_name}
directory earlier") fixed a bug related to modules loading/unloading, by
adding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led
to a potential duplicate call to the hostdir_rm() routine, since it's also
called from scsi_host_dev_release(). That triggered a regression report,
which was then fixed by commit be03df3d4bfe ("scsi: core: Fix a procfs host
directory removal regression"). The fix just dropped the hostdir_rm() call
from dev_release().

But it happens that this proc directory is created on scsi_host_alloc(),
and that function "pairs" with scsi_host_dev_release(), while
scsi_remove_host() pairs with scsi_add_host(). In other words, it seems the
reason for removing the proc directory on dev_release() was meant to cover
cases in which a SCSI host structure was allocated, but the call to
scsi_add_host() didn't happen. And that pattern happens to exist in some
error paths, for example.

Syzkaller causes that by using USB raw gadget device, error'ing on
usb-storage driver, at usb_stor_probe2(). By checking that path, we can see
that the BadDevice label leads to a scsi_host_put() after a SCSI host
allocation, but there's no call to scsi_add_host() in such path. That leads
to messages like this in dmesg (and a leak of the SCSI host proc
structure):

usb-storage 4-1:87.51: USB Mass Storage device detected
proc_dir_entry 'scsi/usb-storage' already registered
WARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376

The proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),
but guard that with the state check for SHOST_CREATED; there is even a
comment in scsi_host_dev_release() detailing that: such conditional is
meant for cases where the SCSI host was allocated but there was no calls to
{add,remove}_host(), like the usb-storage case.

This is what we propose here and with that, the error path of usb-storage
does not trigger the warning anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-11-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26936" ref_url="https://www.suse.com/security/cve/CVE-2024-26936" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate request buffer size in smb2_allocate_rsp_buf()

The response buffer should be allocated in smb2_allocate_rsp_buf
before validating request. But the fields in payload as well as smb2 header
is used in smb2_allocate_rsp_buf(). This patch add simple buffer size
validation to avoid potencial out-of-bounds in request buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26936/">CVE-2024-26936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26936">CVE-2024-26936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223676">SUSE bug 1223676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Reset queue_priority_hint on parking

Originally, with strict in order execution, we could complete execution
only when the queue was empty. Preempt-to-busy allows replacement of an
active request that may complete before the preemption is processed by
HW. If that happens, the request is retired from the queue, but the
queue_priority_hint remains set, preventing direct submission until
after the next CS interrupt is processed.

This preempt-to-busy race can be triggered by the heartbeat, which will
also act as the power-management barrier and upon completion allow us to
idle the HW. We may process the completion of the heartbeat, and begin
parking the engine before the CS event that restores the
queue_priority_hint, causing us to fail the assertion that it is MIN.

&lt;3&gt;[  166.210729] __engine_park:283 GEM_BUG_ON(engine-&gt;sched_engine-&gt;queue_priority_hint != (-((int)(~0U &gt;&gt; 1)) - 1))
&lt;0&gt;[  166.210781] Dumping ftrace buffer:
&lt;0&gt;[  166.210795] ---------------------------------
...
&lt;0&gt;[  167.302811] drm_fdin-1097      2..s1. 165741070us : trace_ports: 0000:00:02.0 rcs0: promote { ccid:20 1217:2 prio 0 }
&lt;0&gt;[  167.302861] drm_fdin-1097      2d.s2. 165741072us : execlists_submission_tasklet: 0000:00:02.0 rcs0: preempting last=1217:2, prio=0, hint=2147483646
&lt;0&gt;[  167.302928] drm_fdin-1097      2d.s2. 165741072us : __i915_request_unsubmit: 0000:00:02.0 rcs0: fence 1217:2, current 0
&lt;0&gt;[  167.302992] drm_fdin-1097      2d.s2. 165741073us : __i915_request_submit: 0000:00:02.0 rcs0: fence 3:4660, current 4659
&lt;0&gt;[  167.303044] drm_fdin-1097      2d.s1. 165741076us : execlists_submission_tasklet: 0000:00:02.0 rcs0: context:3 schedule-in, ccid:40
&lt;0&gt;[  167.303095] drm_fdin-1097      2d.s1. 165741077us : trace_ports: 0000:00:02.0 rcs0: submit { ccid:40 3:4660* prio 2147483646 }
&lt;0&gt;[  167.303159] kworker/-89       11..... 165741139us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence c90:2, current 2
&lt;0&gt;[  167.303208] kworker/-89       11..... 165741148us : __intel_context_do_unpin: 0000:00:02.0 rcs0: context:c90 unpin
&lt;0&gt;[  167.303272] kworker/-89       11..... 165741159us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence 1217:2, current 2
&lt;0&gt;[  167.303321] kworker/-89       11..... 165741166us : __intel_context_do_unpin: 0000:00:02.0 rcs0: context:1217 unpin
&lt;0&gt;[  167.303384] kworker/-89       11..... 165741170us : i915_request_retire.part.0: 0000:00:02.0 rcs0: fence 3:4660, current 4660
&lt;0&gt;[  167.303434] kworker/-89       11d..1. 165741172us : __intel_context_retire: 0000:00:02.0 rcs0: context:1216 retire runtime: { total:56028ns, avg:56028ns }
&lt;0&gt;[  167.303484] kworker/-89       11..... 165741198us : __engine_park: 0000:00:02.0 rcs0: parked
&lt;0&gt;[  167.303534]   &lt;idle&gt;-0         5d.H3. 165741207us : execlists_irq_handler: 0000:00:02.0 rcs0: semaphore yield: 00000040
&lt;0&gt;[  167.303583] kworker/-89       11..... 165741397us : __intel_context_retire: 0000:00:02.0 rcs0: context:1217 retire runtime: { total:325575ns, avg:0ns }
&lt;0&gt;[  167.303756] kworker/-89       11..... 165741777us : __intel_context_retire: 0000:00:02.0 rcs0: context:c90 retire runtime: { total:0ns, avg:0ns }
&lt;0&gt;[  167.303806] kworker/-89       11..... 165742017us : __engine_park: __engine_park:283 GEM_BUG_ON(engine-&gt;sched_engine-&gt;queue_priority_hint != (-((int)(~0U &gt;&gt; 1)) - 1))
&lt;0&gt;[  167.303811] ---------------------------------
&lt;4&gt;[  167.304722] ------------[ cut here ]------------
&lt;2&gt;[  167.304725] kernel BUG at drivers/gpu/drm/i915/gt/intel_engine_pm.c:283!
&lt;4&gt;[  167.304731] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt;[  167.304734] CPU: 11 PID: 89 Comm: kworker/11:1 Tainted: G        W          6.8.0-rc2-CI_DRM_14193-gc655e0fd2804+ #1
&lt;4&gt;[  167.304736] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022
&lt;4&gt;[  167.304738] Workqueue: i915-unordered retire_work_handler [i915]
&lt;4&gt;[  16
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223677">SUSE bug 1223677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode()

If we have no VBT, or the VBT didn't declare the encoder
in question, we won't have the 'devdata' for the encoder.
Instead of oopsing just bail early.

We won't be able to tell whether the port is DP++ or not,
but so be it.

(cherry picked from commit 26410896206342c8a80d2b027923e9ee7d33b733)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223678">SUSE bug 1223678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/vma: Fix UAF on destroy against retire race

Object debugging tools were sporadically reporting illegal attempts to
free a still active i915 VMA object when parking a GT believed to be idle.

[161.359441] ODEBUG: free active (active state 0) object: ffff88811643b958 object type: i915_active hint: __i915_vma_active+0x0/0x50 [i915]
[161.360082] WARNING: CPU: 5 PID: 276 at lib/debugobjects.c:514 debug_print_object+0x80/0xb0
...
[161.360304] CPU: 5 PID: 276 Comm: kworker/5:2 Not tainted 6.5.0-rc1-CI_DRM_13375-g003f860e5577+ #1
[161.360314] Hardware name: Intel Corporation Rocket Lake Client Platform/RocketLake S UDIMM 6L RVP, BIOS RKLSFWI1.R00.3173.A03.2204210138 04/21/2022
[161.360322] Workqueue: i915-unordered __intel_wakeref_put_work [i915]
[161.360592] RIP: 0010:debug_print_object+0x80/0xb0
...
[161.361347] debug_object_free+0xeb/0x110
[161.361362] i915_active_fini+0x14/0x130 [i915]
[161.361866] release_references+0xfe/0x1f0 [i915]
[161.362543] i915_vma_parked+0x1db/0x380 [i915]
[161.363129] __gt_park+0x121/0x230 [i915]
[161.363515] ____intel_wakeref_put_last+0x1f/0x70 [i915]

That has been tracked down to be happening when another thread is
deactivating the VMA inside __active_retire() helper, after the VMA's
active counter has been already decremented to 0, but before deactivation
of the VMA's object is reported to the object debugging tool.

We could prevent from that race by serializing i915_active_fini() with
__active_retire() via ref-&gt;tree_lock, but that wouldn't stop the VMA from
being used, e.g. from __i915_vma_retire() called at the end of
__active_retire(), after that VMA has been already freed by a concurrent
i915_vma_destroy() on return from the i915_active_fini().  Then, we should
rather fix the issue at the VMA level, not in i915_active.

Since __i915_vma_parked() is called from __gt_park() on last put of the
GT's wakeref, the issue could be addressed by holding the GT wakeref long
enough for __active_retire() to complete before that wakeref is released
and the GT parked.

I believe the issue was introduced by commit d93939730347 ("drm/i915:
Remove the vma refcount") which moved a call to i915_active_fini() from
a dropped i915_vma_release(), called on last put of the removed VMA kref,
to i915_vma_parked() processing path called on last put of a GT wakeref.
However, its visibility to the object debugging tool was suppressed by a
bug in i915_active that was fixed two weeks later with commit e92eb246feb9
("drm/i915/active: Fix missing debug object activation").

A VMA associated with a request doesn't acquire a GT wakeref by itself.
Instead, it depends on a wakeref held directly by the request's active
intel_context for a GT associated with its VM, and indirectly on that
intel_context's engine wakeref if the engine belongs to the same GT as the
VMA's VM.  Those wakerefs are released asynchronously to VMA deactivation.

Fix the issue by getting a wakeref for the VMA's GT when activating it,
and putting that wakeref only after the VMA is deactivated.  However,
exclude global GTT from that processing path, otherwise the GPU never goes
idle.  Since __i915_vma_retire() may be called from atomic contexts, use
async variant of wakeref put.  Also, to avoid circular locking dependency,
take care of acquiring the wakeref before VM mutex when both are needed.

v7: Add inline comments with justifications for:
    - using untracked variants of intel_gt_pm_get/put() (Nirmoy),
    - using async variant of _put(),
    - not getting the wakeref in case of a global GTT,
    - always getting the first wakeref outside vm-&gt;mutex.
v6: Since __i915_vma_active/retire() callbacks are not serialized, storing
    a wakeref tracking handle inside struct i915_vma is not safe, and
    there is no other good place for that.  Use untracked variants of
    intel_gt_pm_get/put_async().
v5: Replace "tile" with "GT" across commit description (Rodrigo),
  - 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223679">SUSE bug 1223679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223680">SUSE bug 1223680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed

The driver creates /sys/kernel/debug/dri/0/mob_ttm even when the
corresponding ttm_resource_manager is not allocated.
This leads to a crash when trying to read from this file.

Add a check to create mob_ttm, system_mob_ttm, and gmr_ttm debug file
only when the corresponding ttm_resource_manager is allocated.

crash&gt; bt
PID: 3133409  TASK: ffff8fe4834a5000  CPU: 3    COMMAND: "grep"
 #0 [ffffb954506b3b20] machine_kexec at ffffffffb2a6bec3
 #1 [ffffb954506b3b78] __crash_kexec at ffffffffb2bb598a
 #2 [ffffb954506b3c38] crash_kexec at ffffffffb2bb68c1
 #3 [ffffb954506b3c50] oops_end at ffffffffb2a2a9b1
 #4 [ffffb954506b3c70] no_context at ffffffffb2a7e913
 #5 [ffffb954506b3cc8] __bad_area_nosemaphore at ffffffffb2a7ec8c
 #6 [ffffb954506b3d10] do_page_fault at ffffffffb2a7f887
 #7 [ffffb954506b3d40] page_fault at ffffffffb360116e
    [exception RIP: ttm_resource_manager_debug+0x11]
    RIP: ffffffffc04afd11  RSP: ffffb954506b3df0  RFLAGS: 00010246
    RAX: ffff8fe41a6d1200  RBX: 0000000000000000  RCX: 0000000000000940
    RDX: 0000000000000000  RSI: ffffffffc04b4338  RDI: 0000000000000000
    RBP: ffffb954506b3e08   R8: ffff8fee3ffad000   R9: 0000000000000000
    R10: ffff8fe41a76a000  R11: 0000000000000001  R12: 00000000ffffffff
    R13: 0000000000000001  R14: ffff8fe5bb6f3900  R15: ffff8fe41a6d1200
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 #8 [ffffb954506b3e00] ttm_resource_manager_show at ffffffffc04afde7 [ttm]
 #9 [ffffb954506b3e30] seq_read at ffffffffb2d8f9f3
    RIP: 00007f4c4eda8985  RSP: 00007ffdbba9e9f8  RFLAGS: 00000246
    RAX: ffffffffffffffda  RBX: 000000000037e000  RCX: 00007f4c4eda8985
    RDX: 000000000037e000  RSI: 00007f4c41573000  RDI: 0000000000000003
    RBP: 000000000037e000   R8: 0000000000000000   R9: 000000000037fe30
    R10: 0000000000000000  R11: 0000000000000246  R12: 00007f4c41573000
    R13: 0000000000000003  R14: 00007f4c41572010  R15: 0000000000000003
    ORIG_RAX: 0000000000000000  CS: 0033  SS: 002b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223718">SUSE bug 1223718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26941" ref_url="https://www.suse.com/security/cve/CVE-2024-26941" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/dp: Fix divide-by-zero regression on DP MST unplug with nouveau

Fix a regression when using nouveau and unplugging a StarTech MSTDP122DP
DisplayPort 1.2 MST hub (the same regression does not appear when using
a Cable Matters DisplayPort 1.4 MST hub). Trace:

 divide error: 0000 [#1] PREEMPT SMP PTI
 CPU: 7 PID: 2962 Comm: Xorg Not tainted 6.8.0-rc3+ #744
 Hardware name: Razer Blade/DANA_MB, BIOS 01.01 08/31/2018
 RIP: 0010:drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper]
 Code: c6 b8 01 00 00 00 75 61 01 c6 41 0f af f3 41 0f af f1 c1 e1 04 48 63 c7 31 d2 89 ff 48 8b 5d f8 c9 48 0f af f1 48 8d 44 06 ff &lt;48&gt; f7 f7 31 d2 31 c9 31 f6 31 ff 45 31 c0 45 31 c9 45 31 d2 45 31
 RSP: 0018:ffffb2c5c211fa30 EFLAGS: 00010206
 RAX: ffffffffffffffff RBX: 0000000000000000 RCX: 0000000000f59b00
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffb2c5c211fa48 R08: 0000000000000001 R09: 0000000000000020
 R10: 0000000000000004 R11: 0000000000000000 R12: 0000000000023b4a
 R13: ffff91d37d165800 R14: ffff91d36fac6d80 R15: ffff91d34a764010
 FS:  00007f4a1ca3fa80(0000) GS:ffff91d6edbc0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000559491d49000 CR3: 000000011d180002 CR4: 00000000003706f0
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x6d/0x80
  ? die+0x37/0xa0
  ? do_trap+0xd4/0xf0
  ? do_error_trap+0x71/0xb0
  ? drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper]
  ? exc_divide_error+0x3a/0x70
  ? drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper]
  ? asm_exc_divide_error+0x1b/0x20
  ? drm_dp_bw_overhead+0xb4/0x110 [drm_display_helper]
  ? drm_dp_calc_pbn_mode+0x2e/0x70 [drm_display_helper]
  nv50_msto_atomic_check+0xda/0x120 [nouveau]
  drm_atomic_helper_check_modeset+0xa87/0xdf0 [drm_kms_helper]
  drm_atomic_helper_check+0x19/0xa0 [drm_kms_helper]
  nv50_disp_atomic_check+0x13f/0x2f0 [nouveau]
  drm_atomic_check_only+0x668/0xb20 [drm]
  ? drm_connector_list_iter_next+0x86/0xc0 [drm]
  drm_atomic_commit+0x58/0xd0 [drm]
  ? __pfx___drm_printfn_info+0x10/0x10 [drm]
  drm_atomic_connector_commit_dpms+0xd7/0x100 [drm]
  drm_mode_obj_set_property_ioctl+0x1c5/0x450 [drm]
  ? __pfx_drm_connector_property_set_ioctl+0x10/0x10 [drm]
  drm_connector_property_set_ioctl+0x3b/0x60 [drm]
  drm_ioctl_kernel+0xb9/0x120 [drm]
  drm_ioctl+0x2d0/0x550 [drm]
  ? __pfx_drm_connector_property_set_ioctl+0x10/0x10 [drm]
  nouveau_drm_ioctl+0x61/0xc0 [nouveau]
  __x64_sys_ioctl+0xa0/0xf0
  do_syscall_64+0x76/0x140
  ? do_syscall_64+0x85/0x140
  ? do_syscall_64+0x85/0x140
  entry_SYSCALL_64_after_hwframe+0x6e/0x76
 RIP: 0033:0x7f4a1cd1a94f
 Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;41&gt; 89 c0 3d 00 f0 ff ff 77 1f 48 8b 44 24 18 64 48 2b 04 25 28 00
 RSP: 002b:00007ffd2f1df520 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
 RAX: ffffffffffffffda RBX: 00007ffd2f1df5b0 RCX: 00007f4a1cd1a94f
 RDX: 00007ffd2f1df5b0 RSI: 00000000c01064ab RDI: 000000000000000f
 RBP: 00000000c01064ab R08: 000056347932deb8 R09: 000056347a7d99c0
 R10: 0000000000000000 R11: 0000000000000246 R12: 000056347938a220
 R13: 000000000000000f R14: 0000563479d9f3f0 R15: 0000000000000000
  &lt;/TASK&gt;
 Modules linked in: rfcomm xt_conntrack nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user xfrm_algo xt_addrtype nft_compat nf_tables nfnetlink br_netfilter bridge stp llc ccm cmac algif_hash overlay algif_skcipher af_alg bnep binfmt_misc snd_sof_pci_intel_cnl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda snd_sof snd_sof_utils snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core snd_compress snd_sof_intel_hda_mlink snd_hda_ext_core iwlmvm intel_rapl_msr intel_rapl_common intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp mac80211 coretemp kvm_intel snd_hda_codec_hdmi kvm snd_hda_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26941/">CVE-2024-26941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26941">CVE-2024-26941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223721">SUSE bug 1223721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26942" ref_url="https://www.suse.com/security/cve/CVE-2024-26942" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: qcom: at803x: fix kernel panic with at8031_probe

On reworking and splitting the at803x driver, in splitting function of
at803x PHYs it was added a NULL dereference bug where priv is referenced
before it's actually allocated and then is tried to write to for the
is_1000basex and is_fiber variables in the case of at8031, writing on
the wrong address.

Fix this by correctly setting priv local variable only after
at803x_probe is called and actually allocates priv in the phydev struct.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26942/">CVE-2024-26942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26942">CVE-2024-26942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223727">SUSE bug 1223727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/dmem: handle kcalloc() allocation failure

The kcalloc() in nouveau_dmem_evict_chunk() will return null if
the physical memory has run out. As a result, if we dereference
src_pfns, dst_pfns or dma_addrs, the null pointer dereference bugs
will happen.

Moreover, the GPU is going away. If the kcalloc() fails, we could not
evict all pages mapping a chunk. So this patch adds a __GFP_NOFAIL
flag in kcalloc().

Finally, as there is no need to have physically contiguous memory,
this patch switches kcalloc() to kvcalloc() in order to avoid
failing allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230527">SUSE bug 1230527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26944" ref_url="https://www.suse.com/security/cve/CVE-2024-26944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: fix use-after-free in do_zone_finish()

Shinichiro reported the following use-after-free triggered by the device
replace operation in fstests btrfs/070.

 BTRFS info (device nullb1): scrub: finished on devid 1 with status: 0
 ==================================================================
 BUG: KASAN: slab-use-after-free in do_zone_finish+0x91a/0xb90 [btrfs]
 Read of size 8 at addr ffff8881543c8060 by task btrfs-cleaner/3494007

 CPU: 0 PID: 3494007 Comm: btrfs-cleaner Tainted: G        W          6.8.0-rc5-kts #1
 Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x5b/0x90
  print_report+0xcf/0x670
  ? __virt_addr_valid+0x200/0x3e0
  kasan_report+0xd8/0x110
  ? do_zone_finish+0x91a/0xb90 [btrfs]
  ? do_zone_finish+0x91a/0xb90 [btrfs]
  do_zone_finish+0x91a/0xb90 [btrfs]
  btrfs_delete_unused_bgs+0x5e1/0x1750 [btrfs]
  ? __pfx_btrfs_delete_unused_bgs+0x10/0x10 [btrfs]
  ? btrfs_put_root+0x2d/0x220 [btrfs]
  ? btrfs_clean_one_deleted_snapshot+0x299/0x430 [btrfs]
  cleaner_kthread+0x21e/0x380 [btrfs]
  ? __pfx_cleaner_kthread+0x10/0x10 [btrfs]
  kthread+0x2e3/0x3c0
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x31/0x70
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1b/0x30
  &lt;/TASK&gt;

 Allocated by task 3493983:
  kasan_save_stack+0x33/0x60
  kasan_save_track+0x14/0x30
  __kasan_kmalloc+0xaa/0xb0
  btrfs_alloc_device+0xb3/0x4e0 [btrfs]
  device_list_add.constprop.0+0x993/0x1630 [btrfs]
  btrfs_scan_one_device+0x219/0x3d0 [btrfs]
  btrfs_control_ioctl+0x26e/0x310 [btrfs]
  __x64_sys_ioctl+0x134/0x1b0
  do_syscall_64+0x99/0x190
  entry_SYSCALL_64_after_hwframe+0x6e/0x76

 Freed by task 3494056:
  kasan_save_stack+0x33/0x60
  kasan_save_track+0x14/0x30
  kasan_save_free_info+0x3f/0x60
  poison_slab_object+0x102/0x170
  __kasan_slab_free+0x32/0x70
  kfree+0x11b/0x320
  btrfs_rm_dev_replace_free_srcdev+0xca/0x280 [btrfs]
  btrfs_dev_replace_finishing+0xd7e/0x14f0 [btrfs]
  btrfs_dev_replace_by_ioctl+0x1286/0x25a0 [btrfs]
  btrfs_ioctl+0xb27/0x57d0 [btrfs]
  __x64_sys_ioctl+0x134/0x1b0
  do_syscall_64+0x99/0x190
  entry_SYSCALL_64_after_hwframe+0x6e/0x76

 The buggy address belongs to the object at ffff8881543c8000
  which belongs to the cache kmalloc-1k of size 1024
 The buggy address is located 96 bytes inside of
  freed 1024-byte region [ffff8881543c8000, ffff8881543c8400)

 The buggy address belongs to the physical page:
 page:00000000fe2c1285 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1543c8
 head:00000000fe2c1285 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
 flags: 0x17ffffc0000840(slab|head|node=0|zone=2|lastcpupid=0x1fffff)
 page_type: 0xffffffff()
 raw: 0017ffffc0000840 ffff888100042dc0 ffffea0019e8f200 dead000000000002
 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
 page dumped because: kasan: bad access detected

 Memory state around the buggy address:
  ffff8881543c7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ffff8881543c7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 &gt;ffff8881543c8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                        ^
  ffff8881543c8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff8881543c8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb

This UAF happens because we're accessing stale zone information of a
already removed btrfs_device in do_zone_finish().

The sequence of events is as follows:

btrfs_dev_replace_start
  btrfs_scrub_dev
   btrfs_dev_replace_finishing
    btrfs_dev_replace_update_device_in_mapping_tree &lt;-- devices replaced
    btrfs_rm_dev_replace_free_srcdev
     btrfs_free_device                              &lt;-- device freed

cleaner_kthread
 btrfs_delete_unused_bgs
  btrfs_zone_finish
   do_zone_finish              &lt;-- refers the freed device

The reason for this is that we're using a
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26944/">CVE-2024-26944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26944">CVE-2024-26944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223731">SUSE bug 1223731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26945" ref_url="https://www.suse.com/security/cve/CVE-2024-26945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: iaa - Fix nr_cpus &lt; nr_iaa case

If nr_cpus &lt; nr_iaa, the calculated cpus_per_iaa will be 0, which
causes a divide-by-0 in rebalance_wq_table().

Make sure cpus_per_iaa is 1 in that case, and also in the nr_iaa == 0
case, even though cpus_per_iaa is never used if nr_iaa == 0, for
paranoia.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26945/">CVE-2024-26945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26945">CVE-2024-26945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223732">SUSE bug 1223732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26946" ref_url="https://www.suse.com/security/cve/CVE-2024-26946" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address

Read from an unsafe address with copy_from_kernel_nofault() in
arch_adjust_kprobe_addr() because this function is used before checking
the address is in text or not. Syzcaller bot found a bug and reported
the case if user specifies inaccessible data area,
arch_adjust_kprobe_addr() will cause a kernel panic.

[ mingo: Clarified the comment. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26946/">CVE-2024-26946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26946">CVE-2024-26946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223669">SUSE bug 1223669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26947" ref_url="https://www.suse.com/security/cve/CVE-2024-26947" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses

Since commit a4d5613c4dc6 ("arm: extend pfn_valid to take into account
freed memory map alignment") changes the semantics of pfn_valid() to check
presence of the memory map for a PFN. A valid page for an address which
is reserved but not mapped by the kernel[1], the system crashed during
some uio test with the following memory layout:

 node   0: [mem 0x00000000c0a00000-0x00000000cc8fffff]
 node   0: [mem 0x00000000d0000000-0x00000000da1fffff]
 the uio layout is:0xc0900000, 0x100000

the crash backtrace like:

  Unable to handle kernel paging request at virtual address bff00000
  [...]
  CPU: 1 PID: 465 Comm: startapp.bin Tainted: G           O      5.10.0 #1
  Hardware name: Generic DT based system
  PC is at b15_flush_kern_dcache_area+0x24/0x3c
  LR is at __sync_icache_dcache+0x6c/0x98
  [...]
   (b15_flush_kern_dcache_area) from (__sync_icache_dcache+0x6c/0x98)
   (__sync_icache_dcache) from (set_pte_at+0x28/0x54)
   (set_pte_at) from (remap_pfn_range+0x1a0/0x274)
   (remap_pfn_range) from (uio_mmap+0x184/0x1b8 [uio])
   (uio_mmap [uio]) from (__mmap_region+0x264/0x5f4)
   (__mmap_region) from (__do_mmap_mm+0x3ec/0x440)
   (__do_mmap_mm) from (do_mmap+0x50/0x58)
   (do_mmap) from (vm_mmap_pgoff+0xfc/0x188)
   (vm_mmap_pgoff) from (ksys_mmap_pgoff+0xac/0xc4)
   (ksys_mmap_pgoff) from (ret_fast_syscall+0x0/0x5c)
  Code: e0801001 e2423001 e1c00003 f57ff04f (ee070f3e)
  ---[ end trace 09cf0734c3805d52 ]---
  Kernel panic - not syncing: Fatal exception

So check if PG_reserved was set to solve this issue.

[1]: https://lore.kernel.org/lkml/Zbtdue57RO0QScJM@linux.ibm.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26947/">CVE-2024-26947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26947">CVE-2024-26947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223662">SUSE bug 1223662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add a dc_state NULL check in dc_state_release

[How]
Check wheather state is NULL before releasing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223664">SUSE bug 1223664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26949" ref_url="https://www.suse.com/security/cve/CVE-2024-26949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/pm: Fix NULL pointer dereference when get power limit

Because powerplay_table initialization is skipped under
sriov case, We check and set default lower and upper OD
value if powerplay_table is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26949/">CVE-2024-26949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26949">CVE-2024-26949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223665">SUSE bug 1223665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: access device through ctx instead of peer

The previous commit fixed a bug that led to a NULL peer-&gt;device being
dereferenced. It's actually easier and faster performance-wise to
instead get the device from ctx-&gt;wg. This semantically makes more sense
too, since ctx-&gt;wg-&gt;peer_allowedips.seq is compared with
ctx-&gt;allowedips_seq, basing them both in ctx. This also acts as a
defence in depth provision against freed peers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223661">SUSE bug 1223661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: check for dangling peer via is_dead instead of empty list

If all peers are removed via wg_peer_remove_all(), rather than setting
peer_list to empty, the peer is added to a temporary list with a head on
the stack of wg_peer_remove_all(). If a netlink dump is resumed and the
cursored peer is one that has been removed via wg_peer_remove_all(), it
will iterate from that peer and then attempt to dump freed peers.

Fix this by instead checking peer-&gt;is_dead, which was explictly created
for this purpose. Also move up the device_update_lock lockdep assertion,
since reading is_dead relies on that.

It can be reproduced by a small script like:

    echo "Setting config..."
    ip link add dev wg0 type wireguard
    wg setconf wg0 /big-config
    (
            while true; do
                    echo "Showing config..."
                    wg showconf wg0 &gt; /dev/null
            done
    ) &amp;
    sleep 4
    wg setconf wg0 &lt;(printf "[Peer]\nPublicKey=$(wg genkey)\n")

Resulting in:

    BUG: KASAN: slab-use-after-free in __lock_acquire+0x182a/0x1b20
    Read of size 8 at addr ffff88811956ec70 by task wg/59
    CPU: 2 PID: 59 Comm: wg Not tainted 6.8.0-rc2-debug+ #5
    Call Trace:
     &lt;TASK&gt;
     dump_stack_lvl+0x47/0x70
     print_address_description.constprop.0+0x2c/0x380
     print_report+0xab/0x250
     kasan_report+0xba/0xf0
     __lock_acquire+0x182a/0x1b20
     lock_acquire+0x191/0x4b0
     down_read+0x80/0x440
     get_peer+0x140/0xcb0
     wg_get_device_dump+0x471/0x1130
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223660">SUSE bug 1223660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26952" ref_url="https://www.suse.com/security/cve/CVE-2024-26952" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix potencial out-of-bounds when buffer offset is invalid

I found potencial out-of-bounds when buffer offset fields of a few requests
is invalid. This patch set the minimum value of buffer offset field to
-&gt;Buffer offset to validate buffer length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26952/">CVE-2024-26952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26952">CVE-2024-26952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223658">SUSE bug 1223658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26953" ref_url="https://www.suse.com/security/cve/CVE-2024-26953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: esp: fix bad handling of pages from page_pool

When the skb is reorganized during esp_output (!esp-&gt;inline), the pages
coming from the original skb fragments are supposed to be released back
to the system through put_page. But if the skb fragment pages are
originating from a page_pool, calling put_page on them will trigger a
page_pool leak which will eventually result in a crash.

This leak can be easily observed when using CONFIG_DEBUG_VM and doing
ipsec + gre (non offloaded) forwarding:

  BUG: Bad page state in process ksoftirqd/16  pfn:1451b6
  page:00000000de2b8d32 refcount:0 mapcount:0 mapping:0000000000000000 index:0x1451b6000 pfn:0x1451b6
  flags: 0x200000000000000(node=0|zone=2)
  page_type: 0xffffffff()
  raw: 0200000000000000 dead000000000040 ffff88810d23c000 0000000000000000
  raw: 00000001451b6000 0000000000000001 00000000ffffffff 0000000000000000
  page dumped because: page_pool leak
  Modules linked in: ip_gre gre mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat nf_nat xt_addrtype br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core overlay zram zsmalloc fuse [last unloaded: mlx5_core]
  CPU: 16 PID: 96 Comm: ksoftirqd/16 Not tainted 6.8.0-rc4+ #22
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x36/0x50
   bad_page+0x70/0xf0
   free_unref_page_prepare+0x27a/0x460
   free_unref_page+0x38/0x120
   esp_ssg_unref.isra.0+0x15f/0x200
   esp_output_tail+0x66d/0x780
   esp_xmit+0x2c5/0x360
   validate_xmit_xfrm+0x313/0x370
   ? validate_xmit_skb+0x1d/0x330
   validate_xmit_skb_list+0x4c/0x70
   sch_direct_xmit+0x23e/0x350
   __dev_queue_xmit+0x337/0xba0
   ? nf_hook_slow+0x3f/0xd0
   ip_finish_output2+0x25e/0x580
   iptunnel_xmit+0x19b/0x240
   ip_tunnel_xmit+0x5fb/0xb60
   ipgre_xmit+0x14d/0x280 [ip_gre]
   dev_hard_start_xmit+0xc3/0x1c0
   __dev_queue_xmit+0x208/0xba0
   ? nf_hook_slow+0x3f/0xd0
   ip_finish_output2+0x1ca/0x580
   ip_sublist_rcv_finish+0x32/0x40
   ip_sublist_rcv+0x1b2/0x1f0
   ? ip_rcv_finish_core.constprop.0+0x460/0x460
   ip_list_rcv+0x103/0x130
   __netif_receive_skb_list_core+0x181/0x1e0
   netif_receive_skb_list_internal+0x1b3/0x2c0
   napi_gro_receive+0xc8/0x200
   gro_cell_poll+0x52/0x90
   __napi_poll+0x25/0x1a0
   net_rx_action+0x28e/0x300
   __do_softirq+0xc3/0x276
   ? sort_range+0x20/0x20
   run_ksoftirqd+0x1e/0x30
   smpboot_thread_fn+0xa6/0x130
   kthread+0xcd/0x100
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork+0x31/0x50
   ? kthread_complete_and_exit+0x20/0x20
   ret_from_fork_asm+0x11/0x20
   &lt;/TASK&gt;

The suggested fix is to introduce a new wrapper (skb_page_unref) that
covers page refcounting for page_pool pages as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26953/">CVE-2024-26953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26953">CVE-2024-26953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223656">SUSE bug 1223656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26954" ref_url="https://www.suse.com/security/cve/CVE-2024-26954" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slab-out-of-bounds in smb_strndup_from_utf16()

If -&gt;NameOffset of smb2_create_req is smaller than Buffer offset of
smb2_create_req, slab-out-of-bounds read can happen from smb2_open.
This patch set the minimum value of the name offset to the buffer offset
to validate name length of smb2_create_req().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26954/">CVE-2024-26954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26954">CVE-2024-26954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223659">SUSE bug 1223659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: prevent kernel bug at submit_bh_wbc()

Fix a bug where nilfs_get_block() returns a successful status when
searching and inserting the specified block both fail inconsistently.  If
this inconsistent behavior is not due to a previously fixed bug, then an
unexpected race is occurring, so return a temporary error -EAGAIN instead.

This prevents callers such as __block_write_begin_int() from requesting a
read into a buffer that is not mapped, which would cause the BUG_ON check
for the BH_Mapped flag in submit_bh_wbc() to fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223657">SUSE bug 1223657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix failure to detect DAT corruption in btree and direct mappings

Patch series "nilfs2: fix kernel bug at submit_bh_wbc()".

This resolves a kernel BUG reported by syzbot.  Since there are two
flaws involved, I've made each one a separate patch.

The first patch alone resolves the syzbot-reported bug, but I think
both fixes should be sent to stable, so I've tagged them as such.


This patch (of 2):

Syzbot has reported a kernel bug in submit_bh_wbc() when writing file data
to a nilfs2 file system whose metadata is corrupted.

There are two flaws involved in this issue.

The first flaw is that when nilfs_get_block() locates a data block using
btree or direct mapping, if the disk address translation routine
nilfs_dat_translate() fails with internal code -ENOENT due to DAT metadata
corruption, it can be passed back to nilfs_get_block().  This causes
nilfs_get_block() to misidentify an existing block as non-existent,
causing both data block lookup and insertion to fail inconsistently.

The second flaw is that nilfs_get_block() returns a successful status in
this inconsistent state.  This causes the caller __block_write_begin_int()
or others to request a read even though the buffer is not mapped,
resulting in a BUG_ON check for the BH_Mapped flag in submit_bh_wbc()
failing.

This fixes the first issue by changing the return value to code -EINVAL
when a conversion using DAT fails with code -ENOENT, avoiding the
conflicting condition that leads to the kernel bug described above.  Here,
code -EINVAL indicates that metadata corruption was detected during the
block lookup, which will be properly handled as a file system error and
converted to -EIO when passing through the nilfs2 bmap layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223663">SUSE bug 1223663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/zcrypt: fix reference counting on zcrypt card objects

Tests with hot-plugging crytpo cards on KVM guests with debug
kernel build revealed an use after free for the load field of
the struct zcrypt_card. The reason was an incorrect reference
handling of the zcrypt card object which could lead to a free
of the zcrypt card object while it was still in use.

This is an example of the slab message:

    kernel: 0x00000000885a7512-0x00000000885a7513 @offset=1298. First byte 0x68 instead of 0x6b
    kernel: Allocated in zcrypt_card_alloc+0x36/0x70 [zcrypt] age=18046 cpu=3 pid=43
    kernel:  kmalloc_trace+0x3f2/0x470
    kernel:  zcrypt_card_alloc+0x36/0x70 [zcrypt]
    kernel:  zcrypt_cex4_card_probe+0x26/0x380 [zcrypt_cex4]
    kernel:  ap_device_probe+0x15c/0x290
    kernel:  really_probe+0xd2/0x468
    kernel:  driver_probe_device+0x40/0xf0
    kernel:  __device_attach_driver+0xc0/0x140
    kernel:  bus_for_each_drv+0x8c/0xd0
    kernel:  __device_attach+0x114/0x198
    kernel:  bus_probe_device+0xb4/0xc8
    kernel:  device_add+0x4d2/0x6e0
    kernel:  ap_scan_adapter+0x3d0/0x7c0
    kernel:  ap_scan_bus+0x5a/0x3b0
    kernel:  ap_scan_bus_wq_callback+0x40/0x60
    kernel:  process_one_work+0x26e/0x620
    kernel:  worker_thread+0x21c/0x440
    kernel: Freed in zcrypt_card_put+0x54/0x80 [zcrypt] age=9024 cpu=3 pid=43
    kernel:  kfree+0x37e/0x418
    kernel:  zcrypt_card_put+0x54/0x80 [zcrypt]
    kernel:  ap_device_remove+0x4c/0xe0
    kernel:  device_release_driver_internal+0x1c4/0x270
    kernel:  bus_remove_device+0x100/0x188
    kernel:  device_del+0x164/0x3c0
    kernel:  device_unregister+0x30/0x90
    kernel:  ap_scan_adapter+0xc8/0x7c0
    kernel:  ap_scan_bus+0x5a/0x3b0
    kernel:  ap_scan_bus_wq_callback+0x40/0x60
    kernel:  process_one_work+0x26e/0x620
    kernel:  worker_thread+0x21c/0x440
    kernel:  kthread+0x150/0x168
    kernel:  __ret_from_fork+0x3c/0x58
    kernel:  ret_from_fork+0xa/0x30
    kernel: Slab 0x00000372022169c0 objects=20 used=18 fp=0x00000000885a7c88 flags=0x3ffff00000000a00(workingset|slab|node=0|zone=1|lastcpupid=0x1ffff)
    kernel: Object 0x00000000885a74b8 @offset=1208 fp=0x00000000885a7c88
    kernel: Redzone  00000000885a74b0: bb bb bb bb bb bb bb bb                          ........
    kernel: Object   00000000885a74b8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74c8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74d8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74e8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a74f8: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
    kernel: Object   00000000885a7508: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 68 4b 6b 6b 6b a5  kkkkkkkkkkhKkkk.
    kernel: Redzone  00000000885a7518: bb bb bb bb bb bb bb bb                          ........
    kernel: Padding  00000000885a756c: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a              ZZZZZZZZZZZZ
    kernel: CPU: 0 PID: 387 Comm: systemd-udevd Not tainted 6.8.0-HF #2
    kernel: Hardware name: IBM 3931 A01 704 (KVM/Linux)
    kernel: Call Trace:
    kernel:  [&lt;00000000ca5ab5b8&gt;] dump_stack_lvl+0x90/0x120
    kernel:  [&lt;00000000c99d78bc&gt;] check_bytes_and_report+0x114/0x140
    kernel:  [&lt;00000000c99d53cc&gt;] check_object+0x334/0x3f8
    kernel:  [&lt;00000000c99d820c&gt;] alloc_debug_processing+0xc4/0x1f8
    kernel:  [&lt;00000000c99d852e&gt;] get_partial_node.part.0+0x1ee/0x3e0
    kernel:  [&lt;00000000c99d94ec&gt;] ___slab_alloc+0xaf4/0x13c8
    kernel:  [&lt;00000000c99d9e38&gt;] __slab_alloc.constprop.0+0x78/0xb8
    kernel:  [&lt;00000000c99dc8dc&gt;] __kmalloc+0x434/0x590
    kernel:  [&lt;00000000c9b4c0ce&gt;] ext4_htree_store_dirent+0x4e/0x1c0
    kernel:  [&lt;00000000c9b908a2&gt;] htree_dirblock_to_tree+0x17a/0x3f0
    kernel: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223666">SUSE bug 1223666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: fix UAF in direct writes

In production we have been hitting the following warning consistently

------------[ cut here ]------------
refcount_t: underflow; use-after-free.
WARNING: CPU: 17 PID: 1800359 at lib/refcount.c:28 refcount_warn_saturate+0x9c/0xe0
Workqueue: nfsiod nfs_direct_write_schedule_work [nfs]
RIP: 0010:refcount_warn_saturate+0x9c/0xe0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x9f/0x130
 ? refcount_warn_saturate+0x9c/0xe0
 ? report_bug+0xcc/0x150
 ? handle_bug+0x3d/0x70
 ? exc_invalid_op+0x16/0x40
 ? asm_exc_invalid_op+0x16/0x20
 ? refcount_warn_saturate+0x9c/0xe0
 nfs_direct_write_schedule_work+0x237/0x250 [nfs]
 process_one_work+0x12f/0x4a0
 worker_thread+0x14e/0x3b0
 ? ZSTD_getCParams_internal+0x220/0x220
 kthread+0xdc/0x120
 ? __btf_name_valid+0xa0/0xa0
 ret_from_fork+0x1f/0x30

This is because we're completing the nfs_direct_request twice in a row.

The source of this is when we have our commit requests to submit, we
process them and send them off, and then in the completion path for the
commit requests we have

if (nfs_commit_end(cinfo.mds))
	nfs_direct_write_complete(dreq);

However since we're submitting asynchronous requests we sometimes have
one that completes before we submit the next one, so we end up calling
complete on the nfs_direct_request twice.

The only other place we use nfs_generic_commit_list() is in
__nfs_commit_inode, which wraps this call in a

nfs_commit_begin();
nfs_commit_end();

Which is a common pattern for this style of completion handling, one
that is also repeated in the direct code with get_dreq()/put_dreq()
calls around where we process events as well as in the completion paths.

Fix this by using the same pattern for the commit requests.

Before with my 200 node rocksdb stress running this warning would pop
every 10ish minutes.  With my patch the stress test has been running for
several hours without popping.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223653">SUSE bug 1223653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26959" ref_url="https://www.suse.com/security/cve/CVE-2024-26959" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btnxpuart: Fix btnxpuart_close

Fix scheduling while atomic BUG in btnxpuart_close(), properly
purge the transmit queue and free the receive skb.

[   10.973809] BUG: scheduling while atomic: kworker/u9:0/80/0x00000002
...
[   10.980740] CPU: 3 PID: 80 Comm: kworker/u9:0 Not tainted 6.8.0-rc7-0.0.0-devel-00005-g61fdfceacf09 #1
[   10.980751] Hardware name: Toradex Verdin AM62 WB on Dahlia Board (DT)
[   10.980760] Workqueue: hci0 hci_power_off [bluetooth]
[   10.981169] Call trace:
...
[   10.981363]  uart_update_mctrl+0x58/0x78
[   10.981373]  uart_dtr_rts+0x104/0x114
[   10.981381]  tty_port_shutdown+0xd4/0xdc
[   10.981396]  tty_port_close+0x40/0xbc
[   10.981407]  uart_close+0x34/0x9c
[   10.981414]  ttyport_close+0x50/0x94
[   10.981430]  serdev_device_close+0x40/0x50
[   10.981442]  btnxpuart_close+0x24/0x98 [btnxpuart]
[   10.981469]  hci_dev_close_sync+0x2d8/0x718 [bluetooth]
[   10.981728]  hci_dev_do_close+0x2c/0x70 [bluetooth]
[   10.981862]  hci_power_off+0x20/0x64 [bluetooth]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26959/">CVE-2024-26959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26959">CVE-2024-26959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223667">SUSE bug 1223667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: swap: fix race between free_swap_and_cache() and swapoff()

There was previously a theoretical window where swapoff() could run and
teardown a swap_info_struct while a call to free_swap_and_cache() was
running in another thread.  This could cause, amongst other bad
possibilities, swap_page_trans_huge_swapped() (called by
free_swap_and_cache()) to access the freed memory for swap_map.

This is a theoretical problem and I haven't been able to provoke it from a
test case.  But there has been agreement based on code review that this is
possible (see link below).

Fix it by using get_swap_device()/put_swap_device(), which will stall
swapoff().  There was an extra check in _swap_info_get() to confirm that
the swap entry was not free.  This isn't present in get_swap_device()
because it doesn't make sense in general due to the race between getting
the reference and swapoff.  So I've added an equivalent check directly in
free_swap_and_cache().

Details of how to provoke one possible issue (thanks to David Hildenbrand
for deriving this):

--8&lt;-----

__swap_entry_free() might be the last user and result in
"count == SWAP_HAS_CACHE".

swapoff-&gt;try_to_unuse() will stop as soon as soon as si-&gt;inuse_pages==0.

So the question is: could someone reclaim the folio and turn
si-&gt;inuse_pages==0, before we completed swap_page_trans_huge_swapped().

Imagine the following: 2 MiB folio in the swapcache. Only 2 subpages are
still references by swap entries.

Process 1 still references subpage 0 via swap entry.
Process 2 still references subpage 1 via swap entry.

Process 1 quits. Calls free_swap_and_cache().
-&gt; count == SWAP_HAS_CACHE
[then, preempted in the hypervisor etc.]

Process 2 quits. Calls free_swap_and_cache().
-&gt; count == SWAP_HAS_CACHE

Process 2 goes ahead, passes swap_page_trans_huge_swapped(), and calls
__try_to_reclaim_swap().

__try_to_reclaim_swap()-&gt;folio_free_swap()-&gt;delete_from_swap_cache()-&gt;
put_swap_folio()-&gt;free_swap_slot()-&gt;swapcache_free_entries()-&gt;
swap_entry_free()-&gt;swap_range_free()-&gt;
...
WRITE_ONCE(si-&gt;inuse_pages, si-&gt;inuse_pages - nr_entries);

What stops swapoff to succeed after process 2 reclaimed the swap cache
but before process1 finished its call to swap_page_trans_huge_swapped()?

--8&lt;-----
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223655">SUSE bug 1223655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac802154: fix llsec key resources release in mac802154_llsec_key_del

mac802154_llsec_key_del() can free resources of a key directly without
following the RCU rules for waiting before the end of a grace period. This
may lead to use-after-free in case llsec_lookup_key() is traversing the
list of keys in parallel with a key deletion:

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 4 PID: 16000 at lib/refcount.c:25 refcount_warn_saturate+0x162/0x2a0
Modules linked in:
CPU: 4 PID: 16000 Comm: wpan-ping Not tainted 6.7.0 #19
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0x162/0x2a0
Call Trace:
 &lt;TASK&gt;
 llsec_lookup_key.isra.0+0x890/0x9e0
 mac802154_llsec_encrypt+0x30c/0x9c0
 ieee802154_subif_start_xmit+0x24/0x1e0
 dev_hard_start_xmit+0x13e/0x690
 sch_direct_xmit+0x2ae/0xbc0
 __dev_queue_xmit+0x11dd/0x3c20
 dgram_sendmsg+0x90b/0xd60
 __sys_sendto+0x466/0x4c0
 __x64_sys_sendto+0xe0/0x1c0
 do_syscall_64+0x45/0xf0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76

Also, ieee802154_llsec_key_entry structures are not freed by
mac802154_llsec_key_del():

unreferenced object 0xffff8880613b6980 (size 64):
  comm "iwpan", pid 2176, jiffies 4294761134 (age 60.475s)
  hex dump (first 32 bytes):
    78 0d 8f 18 80 88 ff ff 22 01 00 00 00 00 ad de  x.......".......
    00 00 00 00 00 00 00 00 03 00 cd ab 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff81dcfa62&gt;] __kmem_cache_alloc_node+0x1e2/0x2d0
    [&lt;ffffffff81c43865&gt;] kmalloc_trace+0x25/0xc0
    [&lt;ffffffff88968b09&gt;] mac802154_llsec_key_add+0xac9/0xcf0
    [&lt;ffffffff8896e41a&gt;] ieee802154_add_llsec_key+0x5a/0x80
    [&lt;ffffffff8892adc6&gt;] nl802154_add_llsec_key+0x426/0x5b0
    [&lt;ffffffff86ff293e&gt;] genl_family_rcv_msg_doit+0x1fe/0x2f0
    [&lt;ffffffff86ff46d1&gt;] genl_rcv_msg+0x531/0x7d0
    [&lt;ffffffff86fee7a9&gt;] netlink_rcv_skb+0x169/0x440
    [&lt;ffffffff86ff1d88&gt;] genl_rcv+0x28/0x40
    [&lt;ffffffff86fec15c&gt;] netlink_unicast+0x53c/0x820
    [&lt;ffffffff86fecd8b&gt;] netlink_sendmsg+0x93b/0xe60
    [&lt;ffffffff86b91b35&gt;] ____sys_sendmsg+0xac5/0xca0
    [&lt;ffffffff86b9c3dd&gt;] ___sys_sendmsg+0x11d/0x1c0
    [&lt;ffffffff86b9c65a&gt;] __sys_sendmsg+0xfa/0x1d0
    [&lt;ffffffff88eadbf5&gt;] do_syscall_64+0x45/0xf0
    [&lt;ffffffff890000ea&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

Handle the proper resource release in the RCU callback function
mac802154_llsec_key_del_rcu().

Note that if llsec_lookup_key() finds a key, it gets a refcount via
llsec_key_get() and locally copies key id from key_entry (which is a
list element). So it's safe to call llsec_key_put() and free the list
entry after the RCU grace period elapses.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223652">SUSE bug 1223652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26962" ref_url="https://www.suse.com/security/cve/CVE-2024-26962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-raid456, md/raid456: fix a deadlock for dm-raid456 while io concurrent with reshape

For raid456, if reshape is still in progress, then IO across reshape
position will wait for reshape to make progress. However, for dm-raid,
in following cases reshape will never make progress hence IO will hang:

1) the array is read-only;
2) MD_RECOVERY_WAIT is set;
3) MD_RECOVERY_FROZEN is set;

After commit c467e97f079f ("md/raid6: use valid sector values to determine
if an I/O should wait on the reshape") fix the problem that IO across
reshape position doesn't wait for reshape, the dm-raid test
shell/lvconvert-raid-reshape.sh start to hang:

[root@fedora ~]# cat /proc/979/stack
[&lt;0&gt;] wait_woken+0x7d/0x90
[&lt;0&gt;] raid5_make_request+0x929/0x1d70 [raid456]
[&lt;0&gt;] md_handle_request+0xc2/0x3b0 [md_mod]
[&lt;0&gt;] raid_map+0x2c/0x50 [dm_raid]
[&lt;0&gt;] __map_bio+0x251/0x380 [dm_mod]
[&lt;0&gt;] dm_submit_bio+0x1f0/0x760 [dm_mod]
[&lt;0&gt;] __submit_bio+0xc2/0x1c0
[&lt;0&gt;] submit_bio_noacct_nocheck+0x17f/0x450
[&lt;0&gt;] submit_bio_noacct+0x2bc/0x780
[&lt;0&gt;] submit_bio+0x70/0xc0
[&lt;0&gt;] mpage_readahead+0x169/0x1f0
[&lt;0&gt;] blkdev_readahead+0x18/0x30
[&lt;0&gt;] read_pages+0x7c/0x3b0
[&lt;0&gt;] page_cache_ra_unbounded+0x1ab/0x280
[&lt;0&gt;] force_page_cache_ra+0x9e/0x130
[&lt;0&gt;] page_cache_sync_ra+0x3b/0x110
[&lt;0&gt;] filemap_get_pages+0x143/0xa30
[&lt;0&gt;] filemap_read+0xdc/0x4b0
[&lt;0&gt;] blkdev_read_iter+0x75/0x200
[&lt;0&gt;] vfs_read+0x272/0x460
[&lt;0&gt;] ksys_read+0x7a/0x170
[&lt;0&gt;] __x64_sys_read+0x1c/0x30
[&lt;0&gt;] do_syscall_64+0xc6/0x230
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x6c/0x74

This is because reshape can't make progress.

For md/raid, the problem doesn't exist because register new sync_thread
doesn't rely on the IO to be done any more:

1) If array is read-only, it can switch to read-write by ioctl/sysfs;
2) md/raid never set MD_RECOVERY_WAIT;
3) If MD_RECOVERY_FROZEN is set, mddev_suspend() doesn't hold
   'reconfig_mutex', hence it can be cleared and reshape can continue by
   sysfs api 'sync_action'.

However, I'm not sure yet how to avoid the problem in dm-raid yet. This
patch on the one hand make sure raid_message() can't change
sync_thread() through raid_message() after presuspend(), on the other
hand detect the above 3 cases before wait for IO do be done in
dm_suspend(), and let dm-raid requeue those IO.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26962/">CVE-2024-26962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26962">CVE-2024-26962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223654">SUSE bug 1223654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26963" ref_url="https://www.suse.com/security/cve/CVE-2024-26963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3-am62: fix module unload/reload behavior

As runtime PM is enabled, the module can be runtime
suspended when .remove() is called.

Do a pm_runtime_get_sync() to make sure module is active
before doing any register operations.

Doing a pm_runtime_put_sync() should disable the refclk
so no need to disable it again.

Fixes the below warning at module removel.

[   39.705310] ------------[ cut here ]------------
[   39.710004] clk:162:3 already disabled
[   39.713941] WARNING: CPU: 0 PID: 921 at drivers/clk/clk.c:1090 clk_core_disable+0xb0/0xb8

We called of_platform_populate() in .probe() so call the
cleanup function of_platform_depopulate() in .remove().
Get rid of the now unnnecessary dwc3_ti_remove_core().
Without this, module re-load doesn't work properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26963/">CVE-2024-26963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26963">CVE-2024-26963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223651">SUSE bug 1223651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Add error handling in xhci_map_urb_for_dma

Currently xhci_map_urb_for_dma() creates a temporary buffer and copies
the SG list to the new linear buffer. But if the kzalloc_node() fails,
then the following sg_pcopy_to_buffer() can lead to crash since it
tries to memcpy to NULL pointer.

So return -ENOMEM if kzalloc returns null pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223650">SUSE bug 1223650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223648">SUSE bug 1223648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223646">SUSE bug 1223646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26967" ref_url="https://www.suse.com/security/cve/CVE-2024-26967" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: camcc-sc8280xp: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26967/">CVE-2024-26967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26967">CVE-2024-26967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223647">SUSE bug 1223647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26968" ref_url="https://www.suse.com/security/cve/CVE-2024-26968" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq9574: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26968/">CVE-2024-26968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26968">CVE-2024-26968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223642">SUSE bug 1223642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223645">SUSE bug 1223645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().

Only compile tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223644">SUSE bug 1223644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26971" ref_url="https://www.suse.com/security/cve/CVE-2024-26971" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: gcc-ipq5018: fix terminating of frequency table arrays

The frequency table arrays are supposed to be terminated with an
empty element. Add such entry to the end of the arrays where it
is missing in order to avoid possible out-of-bound access when
the table is traversed by functions like qcom_find_freq() or
qcom_find_freq_floor().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26971/">CVE-2024-26971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26971">CVE-2024-26971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223639">SUSE bug 1223639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223643">SUSE bug 1223643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fat: fix uninitialized field in nostale filehandles

When fat_encode_fh_nostale() encodes file handle without a parent it
stores only first 10 bytes of the file handle. However the length of the
file handle must be a multiple of 4 so the file handle is actually 12
bytes long and the last two bytes remain uninitialized. This is not
great at we potentially leak uninitialized information with the handle
to userspace. Properly initialize the full handle length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223641">SUSE bug 1223641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - resolve race condition during AER recovery

During the PCI AER system's error recovery process, the kernel driver
may encounter a race condition with freeing the reset_data structure's
memory. If the device restart will take more than 10 seconds the function
scheduling that restart will exit due to a timeout, and the reset_data
structure will be freed. However, this data structure is used for
completion notification after the restart is completed, which leads
to a UAF bug.

This results in a KFENCE bug notice.

  BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]
  Use-after-free read at 0x00000000bc56fddf (in kfence-#142):
  adf_device_reset_worker+0x38/0xa0 [intel_qat]
  process_one_work+0x173/0x340

To resolve this race condition, the memory associated to the container
of the work_struct is freed on the worker if the timeout expired,
otherwise on the function that schedules the worker.
The timeout detection can be done by checking if the caller is
still waiting for completion or not by using completion_done() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223638">SUSE bug 1223638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26975" ref_url="https://www.suse.com/security/cve/CVE-2024-26975" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powercap: intel_rapl: Fix a NULL pointer dereference

A NULL pointer dereference is triggered when probing the MMIO RAPL
driver on platforms with CPU ID not listed in intel_rapl_common CPU
model list.

This is because the intel_rapl_common module still probes on such
platforms even if 'defaults_msr' is not set after commit 1488ac990ac8
("powercap: intel_rapl: Allow probing without CPUID match"). Thus the
MMIO RAPL rp-&gt;priv-&gt;defaults is NULL when registering to RAPL framework.

Fix the problem by adding sanity check to ensure rp-&gt;priv-&gt;rapl_defaults
is always valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26975/">CVE-2024-26975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26975">CVE-2024-26975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223632">SUSE bug 1223632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Always flush async #PF workqueue when vCPU is being destroyed

Always flush the per-vCPU async #PF workqueue when a vCPU is clearing its
completion queue, e.g. when a VM and all its vCPUs is being destroyed.
KVM must ensure that none of its workqueue callbacks is running when the
last reference to the KVM _module_ is put.  Gifting a reference to the
associated VM prevents the workqueue callback from dereferencing freed
vCPU/VM memory, but does not prevent the KVM module from being unloaded
before the callback completes.

Drop the misguided VM refcount gifting, as calling kvm_put_kvm() from
async_pf_execute() if kvm_put_kvm() flushes the async #PF workqueue will
result in deadlock.  async_pf_execute() can't return until kvm_put_kvm()
finishes, and kvm_put_kvm() can't return until async_pf_execute() finishes:

 WARNING: CPU: 8 PID: 251 at virt/kvm/kvm_main.c:1435 kvm_put_kvm+0x2d/0x320 [kvm]
 Modules linked in: vhost_net vhost vhost_iotlb tap kvm_intel kvm irqbypass
 CPU: 8 PID: 251 Comm: kworker/8:1 Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 Workqueue: events async_pf_execute [kvm]
 RIP: 0010:kvm_put_kvm+0x2d/0x320 [kvm]
 Call Trace:
  &lt;TASK&gt;
  async_pf_execute+0x198/0x260 [kvm]
  process_one_work+0x145/0x2d0
  worker_thread+0x27e/0x3a0
  kthread+0xba/0xe0
  ret_from_fork+0x2d/0x50
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---
 INFO: task kworker/8:1:251 blocked for more than 120 seconds.
       Tainted: G        W          6.6.0-rc1-e7af8d17224a-x86/gmem-vm #119
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/8:1     state:D stack:0     pid:251   ppid:2      flags:0x00004000
 Workqueue: events async_pf_execute [kvm]
 Call Trace:
  &lt;TASK&gt;
  __schedule+0x33f/0xa40
  schedule+0x53/0xc0
  schedule_timeout+0x12a/0x140
  __wait_for_common+0x8d/0x1d0
  __flush_work.isra.0+0x19f/0x2c0
  kvm_clear_async_pf_completion_queue+0x129/0x190 [kvm]
  kvm_arch_destroy_vm+0x78/0x1b0 [kvm]
  kvm_put_kvm+0x1c1/0x320 [kvm]
  async_pf_execute+0x198/0x260 [kvm]
  process_one_work+0x145/0x2d0
  worker_thread+0x27e/0x3a0
  kthread+0xba/0xe0
  ret_from_fork+0x2d/0x50
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

If kvm_clear_async_pf_completion_queue() actually flushes the workqueue,
then there's no need to gift async_pf_execute() a reference because all
invocations of async_pf_execute() will be forced to complete before the
vCPU and its VM are destroyed/freed.  And that in turn fixes the module
unloading bug as __fput() won't do module_put() on the last vCPU reference
until the vCPU has been freed, e.g. if closing the vCPU file also puts the
last reference to the KVM module.

Note that kvm_check_async_pf_completion() may also take the work item off
the completion queue and so also needs to flush the work queue, as the
work will not be seen by kvm_clear_async_pf_completion_queue().  Waiting
on the workqueue could theoretically delay a vCPU due to waiting for the
work to complete, but that's a very, very small chance, and likely a very
small delay.  kvm_arch_async_page_present_queued() unconditionally makes a
new request, i.e. will effectively delay entering the guest, so the
remaining work is really just:

        trace_kvm_async_pf_completed(addr, cr2_or_gpa);

        __kvm_vcpu_wake_up(vcpu);

        mmput(mm);

and mmput() can't drop the last reference to the page tables if the vCPU is
still alive, i.e. the vCPU won't get stuck tearing down page tables.

Add a helper to do the flushing, specifically to deal with "wakeup all"
work items, as they aren't actually work items, i.e. are never placed in a
workqueue.  Trying to flush a bogus workqueue entry rightly makes
__flush_work() complain (kudos to whoever added that sanity check).

Note, commit 5f6de5cbebee ("KVM: Prevent module exit until al
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pci_iounmap(): Fix MMIO mapping leak

The #ifdef ARCH_HAS_GENERIC_IOPORT_MAP accidentally also guards iounmap(),
which means MMIO mappings are leaked.

Move the guard so we call iounmap() for MMIO mappings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223631">SUSE bug 1223631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26978" ref_url="https://www.suse.com/security/cve/CVE-2024-26978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: max310x: fix NULL pointer dereference in I2C instantiation

When trying to instantiate a max14830 device from userspace:

    echo max14830 0x60 &gt; /sys/bus/i2c/devices/i2c-2/new_device

we get the following error:

    Unable to handle kernel NULL pointer dereference at virtual address...
    ...
    Call trace:
        max310x_i2c_probe+0x48/0x170 [max310x]
        i2c_device_probe+0x150/0x2a0
    ...

Add check for validity of devtype to prevent the error, and abort probe
with a meaningful error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26978/">CVE-2024-26978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26978">CVE-2024-26978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223629">SUSE bug 1223629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26980" ref_url="https://www.suse.com/security/cve/CVE-2024-26980" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf

If -&gt;ProtocolId is SMB2_TRANSFORM_PROTO_NUM, smb2 request size
validation could be skipped. if request size is smaller than
sizeof(struct smb2_query_info_req), slab-out-of-bounds read can happen in
smb2_allocate_rsp_buf(). This patch allocate response buffer after
decrypting transform request. smb3_decrypt_req() will validate transform
request size and avoid slab-out-of-bound in smb2_allocate_rsp_buf().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26980/">CVE-2024-26980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26980">CVE-2024-26980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223630">SUSE bug 1223630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix OOB in nilfs_set_de_type

The size of the nilfs_type_by_mode array in the fs/nilfs2/dir.c file is
defined as "S_IFMT &gt;&gt; S_SHIFT", but the nilfs_set_de_type() function,
which uses this array, specifies the index to read from the array in the
same way as "(mode &amp; S_IFMT) &gt;&gt; S_SHIFT".

static void nilfs_set_de_type(struct nilfs_dir_entry *de, struct inode
 *inode)
{
	umode_t mode = inode-&gt;i_mode;

	de-&gt;file_type = nilfs_type_by_mode[(mode &amp; S_IFMT)&gt;&gt;S_SHIFT]; // oob
}

However, when the index is determined this way, an out-of-bounds (OOB)
error occurs by referring to an index that is 1 larger than the array size
when the condition "mode &amp; S_IFMT == S_IFMT" is satisfied.  Therefore, a
patch to resize the nilfs_type_by_mode array should be applied to prevent
OOB errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223668">SUSE bug 1223668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero

Syskiller has produced an out of bounds access in fill_meta_index().

That out of bounds access is ultimately caused because the inode
has an inode number with the invalid value of zero, which was not checked.

The reason this causes the out of bounds access is due to following
sequence of events:

1. Fill_meta_index() is called to allocate (via empty_meta_index())
   and fill a metadata index.  It however suffers a data read error
   and aborts, invalidating the newly returned empty metadata index.
   It does this by setting the inode number of the index to zero,
   which means unused (zero is not a valid inode number).

2. When fill_meta_index() is subsequently called again on another
   read operation, locate_meta_index() returns the previous index
   because it matches the inode number of 0.  Because this index
   has been returned it is expected to have been filled, and because
   it hasn't been, an out of bounds access is performed.

This patch adds a sanity check which checks that the inode number
is not zero when the inode is created and returns -EINVAL if it is.

[phillip@squashfs.org.uk: whitespace fix]
  Link: https://lkml.kernel.org/r/20240409204723.446925-1-phillip@squashfs.org.uk
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223634">SUSE bug 1223634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26983" ref_url="https://www.suse.com/security/cve/CVE-2024-26983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bootconfig: use memblock_free_late to free xbc memory to buddy

On the time to free xbc memory in xbc_exit(), memblock may has handed
over memory to buddy allocator. So it doesn't make sense to free memory
back to memblock. memblock_free() called by xbc_exit() even causes UAF bugs
on architectures with CONFIG_ARCH_KEEP_MEMBLOCK disabled like x86.
Following KASAN logs shows this case.

This patch fixes the xbc memory free problem by calling memblock_free()
in early xbc init error rewind path and calling memblock_free_late() in
xbc exit path to free memory to buddy allocator.

[    9.410890] ==================================================================
[    9.418962] BUG: KASAN: use-after-free in memblock_isolate_range+0x12d/0x260
[    9.426850] Read of size 8 at addr ffff88845dd30000 by task swapper/0/1

[    9.435901] CPU: 9 PID: 1 Comm: swapper/0 Tainted: G     U             6.9.0-rc3-00208-g586b5dfb51b9 #5
[    9.446403] Hardware name: Intel Corporation RPLP LP5 (CPU:RaptorLake)/RPLP LP5 (ID:13), BIOS IRPPN02.01.01.00.00.19.015.D-00000000 Dec 28 2023
[    9.460789] Call Trace:
[    9.463518]  &lt;TASK&gt;
[    9.465859]  dump_stack_lvl+0x53/0x70
[    9.469949]  print_report+0xce/0x610
[    9.473944]  ? __virt_addr_valid+0xf5/0x1b0
[    9.478619]  ? memblock_isolate_range+0x12d/0x260
[    9.483877]  kasan_report+0xc6/0x100
[    9.487870]  ? memblock_isolate_range+0x12d/0x260
[    9.493125]  memblock_isolate_range+0x12d/0x260
[    9.498187]  memblock_phys_free+0xb4/0x160
[    9.502762]  ? __pfx_memblock_phys_free+0x10/0x10
[    9.508021]  ? mutex_unlock+0x7e/0xd0
[    9.512111]  ? __pfx_mutex_unlock+0x10/0x10
[    9.516786]  ? kernel_init_freeable+0x2d4/0x430
[    9.521850]  ? __pfx_kernel_init+0x10/0x10
[    9.526426]  xbc_exit+0x17/0x70
[    9.529935]  kernel_init+0x38/0x1e0
[    9.533829]  ? _raw_spin_unlock_irq+0xd/0x30
[    9.538601]  ret_from_fork+0x2c/0x50
[    9.542596]  ? __pfx_kernel_init+0x10/0x10
[    9.547170]  ret_from_fork_asm+0x1a/0x30
[    9.551552]  &lt;/TASK&gt;

[    9.555649] The buggy address belongs to the physical page:
[    9.561875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x45dd30
[    9.570821] flags: 0x200000000000000(node=0|zone=2)
[    9.576271] page_type: 0xffffffff()
[    9.580167] raw: 0200000000000000 ffffea0011774c48 ffffea0012ba1848 0000000000000000
[    9.588823] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000
[    9.597476] page dumped because: kasan: bad access detected

[    9.605362] Memory state around the buggy address:
[    9.610714]  ffff88845dd2ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[    9.618786]  ffff88845dd2ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[    9.626857] &gt;ffff88845dd30000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[    9.634930]                    ^
[    9.638534]  ffff88845dd30080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[    9.646605]  ffff88845dd30100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[    9.654675] ==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26983/">CVE-2024-26983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26983">CVE-2024-26983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223637">SUSE bug 1223637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau: fix instmem race condition around ptr stores

Running a lot of VK CTS in parallel against nouveau, once every
few hours you might see something like this crash.

BUG: kernel NULL pointer dereference, address: 0000000000000008
PGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 7 PID: 53891 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27
Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021
RIP: 0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]
Code: c7 48 01 c8 49 89 45 58 85 d2 0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41 83 c7 01 48 89 ee &lt;48&gt; 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04 48 c1
RSP: 0000:ffffac20c5857838 EFLAGS: 00010202
RAX: 0000000000000000 RBX: 00000000004d8001 RCX: 0000000000000001
RDX: 00000000004d8001 RSI: 00000000000006d8 RDI: ffffa07afe332180
RBP: 00000000000006d8 R08: ffffac20c5857ad0 R09: 0000000000ffff10
R10: 0000000000000001 R11: ffffa07af27e2de0 R12: 000000000000001c
R13: ffffac20c5857ad0 R14: ffffa07a96fe9040 R15: 000000000000001c
FS:  00007fe395eed7c0(0000) GS:ffffa07e2c980000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 000000011febe001 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:

...

 ? gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]
 ? gp100_vmm_pgt_mem+0x37/0x180 [nouveau]
 nvkm_vmm_iter+0x351/0xa20 [nouveau]
 ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 ? __lock_acquire+0x3ed/0x2170
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 nvkm_vmm_ptes_get_map+0xc2/0x100 [nouveau]
 ? __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]
 ? __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau]
 nvkm_vmm_map_locked+0x224/0x3a0 [nouveau]

Adding any sort of useful debug usually makes it go away, so I hand
wrote the function in a line, and debugged the asm.

Every so often pt-&gt;memory-&gt;ptrs is NULL. This ptrs ptr is set in
the nv50_instobj_acquire called from nvkm_kmap.

If Thread A and Thread B both get to nv50_instobj_acquire around
the same time, and Thread A hits the refcount_set line, and in
lockstep thread B succeeds at refcount_inc_not_zero, there is a
chance the ptrs value won't have been stored since refcount_set
is unordered. Force a memory barrier here, I picked smp_mb, since
we want it on all CPUs and it's write followed by a read.

v2: use paired smp_rmb/smp_wmb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223633">SUSE bug 1223633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26985" ref_url="https://www.suse.com/security/cve/CVE-2024-26985" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix bo leak in intel_fb_bo_framebuffer_init

Add a unreference bo in the error path, to prevent leaking a bo ref.

Return 0 on success to clarify the success path.

(cherry picked from commit a2f3d731be3893e730417ae3190760fcaffdf549)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26985/">CVE-2024-26985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26985">CVE-2024-26985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223636">SUSE bug 1223636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26986" ref_url="https://www.suse.com/security/cve/CVE-2024-26986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix memory leak in create_process failure

Fix memory leak due to a leaked mmget reference on an error handling
code path that is triggered when attempting to create KFD processes
while a GPU reset is in progress.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26986/">CVE-2024-26986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26986">CVE-2024-26986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223728">SUSE bug 1223728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26987" ref_url="https://www.suse.com/security/cve/CVE-2024-26987" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled

When I did hard offline test with hugetlb pages, below deadlock occurs:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-11409-gf6cef5f8c37f #1 Not tainted
------------------------------------------------------
bash/46904 is trying to acquire lock:
ffffffffabe68910 (cpu_hotplug_lock){++++}-{0:0}, at: static_key_slow_dec+0x16/0x60

but task is already holding lock:
ffffffffabf92ea8 (pcp_batch_high_lock){+.+.}-{3:3}, at: zone_pcp_disable+0x16/0x40

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (pcp_batch_high_lock){+.+.}-{3:3}:
       __mutex_lock+0x6c/0x770
       page_alloc_cpu_online+0x3c/0x70
       cpuhp_invoke_callback+0x397/0x5f0
       __cpuhp_invoke_callback_range+0x71/0xe0
       _cpu_up+0xeb/0x210
       cpu_up+0x91/0xe0
       cpuhp_bringup_mask+0x49/0xb0
       bringup_nonboot_cpus+0xb7/0xe0
       smp_init+0x25/0xa0
       kernel_init_freeable+0x15f/0x3e0
       kernel_init+0x15/0x1b0
       ret_from_fork+0x2f/0x50
       ret_from_fork_asm+0x1a/0x30

-&gt; #0 (cpu_hotplug_lock){++++}-{0:0}:
       __lock_acquire+0x1298/0x1cd0
       lock_acquire+0xc0/0x2b0
       cpus_read_lock+0x2a/0xc0
       static_key_slow_dec+0x16/0x60
       __hugetlb_vmemmap_restore_folio+0x1b9/0x200
       dissolve_free_huge_page+0x211/0x260
       __page_handle_poison+0x45/0xc0
       memory_failure+0x65e/0xc70
       hard_offline_page_store+0x55/0xa0
       kernfs_fop_write_iter+0x12c/0x1d0
       vfs_write+0x387/0x550
       ksys_write+0x64/0xe0
       do_syscall_64+0xca/0x1e0
       entry_SYSCALL_64_after_hwframe+0x6d/0x75

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(pcp_batch_high_lock);
                               lock(cpu_hotplug_lock);
                               lock(pcp_batch_high_lock);
  rlock(cpu_hotplug_lock);

 *** DEADLOCK ***

5 locks held by bash/46904:
 #0: ffff98f6c3bb23f0 (sb_writers#5){.+.+}-{0:0}, at: ksys_write+0x64/0xe0
 #1: ffff98f6c328e488 (&amp;of-&gt;mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0xf8/0x1d0
 #2: ffff98ef83b31890 (kn-&gt;active#113){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x100/0x1d0
 #3: ffffffffabf9db48 (mf_mutex){+.+.}-{3:3}, at: memory_failure+0x44/0xc70
 #4: ffffffffabf92ea8 (pcp_batch_high_lock){+.+.}-{3:3}, at: zone_pcp_disable+0x16/0x40

stack backtrace:
CPU: 10 PID: 46904 Comm: bash Kdump: loaded Not tainted 6.8.0-11409-gf6cef5f8c37f #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x68/0xa0
 check_noncircular+0x129/0x140
 __lock_acquire+0x1298/0x1cd0
 lock_acquire+0xc0/0x2b0
 cpus_read_lock+0x2a/0xc0
 static_key_slow_dec+0x16/0x60
 __hugetlb_vmemmap_restore_folio+0x1b9/0x200
 dissolve_free_huge_page+0x211/0x260
 __page_handle_poison+0x45/0xc0
 memory_failure+0x65e/0xc70
 hard_offline_page_store+0x55/0xa0
 kernfs_fop_write_iter+0x12c/0x1d0
 vfs_write+0x387/0x550
 ksys_write+0x64/0xe0
 do_syscall_64+0xca/0x1e0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7fc862314887
Code: 10 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007fff19311268 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007fc862314887
RDX: 000000000000000c RSI: 000056405645fe10 RDI: 0000000000000001
RBP: 000056405645fe10 R08: 00007fc8623d1460 R09: 000000007fffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c
R13: 00007fc86241b780 R14: 00007fc862417600 R15: 00007fc862416a00

In short, below scene breaks the 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26987/">CVE-2024-26987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26987">CVE-2024-26987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223672">SUSE bug 1223672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

init/main.c: Fix potential static_command_line memory overflow

We allocate memory of size 'xlen + strlen(boot_command_line) + 1' for
static_command_line, but the strings copied into static_command_line are
extra_command_line and command_line, rather than extra_command_line and
boot_command_line.

When strlen(command_line) &gt; strlen(boot_command_line), static_command_line
will overflow.

This patch just recovers strlen(command_line) which was miss-consolidated
with strlen(boot_command_line) in the commit f5c7310ac73e ("init/main: add
checks for the return value of memblock_alloc*()")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223747">SUSE bug 1223747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: hibernate: Fix level3 translation fault in swsusp_save()

On arm64 machines, swsusp_save() faults if it attempts to access
MEMBLOCK_NOMAP memory ranges. This can be reproduced in QEMU using UEFI
when booting with rodata=off debug_pagealloc=off and CONFIG_KFENCE=n:

  Unable to handle kernel paging request at virtual address ffffff8000000000
  Mem abort info:
    ESR = 0x0000000096000007
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x07: level 3 translation fault
  Data abort info:
    ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
    CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
  swapper pgtable: 4k pages, 39-bit VAs, pgdp=00000000eeb0b000
  [ffffff8000000000] pgd=180000217fff9803, p4d=180000217fff9803, pud=180000217fff9803, pmd=180000217fff8803, pte=0000000000000000
  Internal error: Oops: 0000000096000007 [#1] SMP
  Internal error: Oops: 0000000096000007 [#1] SMP
  Modules linked in: xt_multiport ipt_REJECT nf_reject_ipv4 xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_filter bpfilter rfkill at803x snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg dwmac_generic stmmac_platform snd_hda_codec stmmac joydev pcs_xpcs snd_hda_core phylink ppdev lp parport ramoops reed_solomon ip_tables x_tables nls_iso8859_1 vfat multipath linear amdgpu amdxcp drm_exec gpu_sched drm_buddy hid_generic usbhid hid radeon video drm_suballoc_helper drm_ttm_helper ttm i2c_algo_bit drm_display_helper cec drm_kms_helper drm
  CPU: 0 PID: 3663 Comm: systemd-sleep Not tainted 6.6.2+ #76
  Source Version: 4e22ed63a0a48e7a7cff9b98b7806d8d4add7dc0
  Hardware name: Greatwall GW-XXXXXX-XXX/GW-XXXXXX-XXX, BIOS KunLun BIOS V4.0 01/19/2021
  pstate: 600003c5 (nZCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : swsusp_save+0x280/0x538
  lr : swsusp_save+0x280/0x538
  sp : ffffffa034a3fa40
  x29: ffffffa034a3fa40 x28: ffffff8000001000 x27: 0000000000000000
  x26: ffffff8001400000 x25: ffffffc08113e248 x24: 0000000000000000
  x23: 0000000000080000 x22: ffffffc08113e280 x21: 00000000000c69f2
  x20: ffffff8000000000 x19: ffffffc081ae2500 x18: 0000000000000000
  x17: 6666662074736420 x16: 3030303030303030 x15: 3038666666666666
  x14: 0000000000000b69 x13: ffffff9f89088530 x12: 00000000ffffffea
  x11: 00000000ffff7fff x10: 00000000ffff7fff x9 : ffffffc08193f0d0
  x8 : 00000000000bffe8 x7 : c0000000ffff7fff x6 : 0000000000000001
  x5 : ffffffa0fff09dc8 x4 : 0000000000000000 x3 : 0000000000000027
  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 000000000000004e
  Call trace:
   swsusp_save+0x280/0x538
   swsusp_arch_suspend+0x148/0x190
   hibernation_snapshot+0x240/0x39c
   hibernate+0xc4/0x378
   state_store+0xf0/0x10c
   kobj_attr_store+0x14/0x24

The reason is swsusp_save() -&gt; copy_data_pages() -&gt; page_is_saveable()
-&gt; kernel_page_present() assuming that a page is always present when
can_set_direct_map() is false (all of rodata_full,
debug_pagealloc_enabled() and arm64_kfence_can_set_direct_map() false),
irrespective of the MEMBLOCK_NOMAP ranges. Such MEMBLOCK_NOMAP regions
should not be saved during hibernation.

This problem was introduced by changes to the pfn_valid() logic in
commit a7d9f306ba70 ("arm64: drop pfn_valid_within() and simplify
pfn_valid()").

Similar to other architectures, drop the !can_set_direct_map() check in
kernel_page_present() so that page_is_savable() skips such pages.

[catalin.marinas@arm.com: rework commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223748">SUSE bug 1223748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26990" ref_url="https://www.suse.com/security/cve/CVE-2024-26990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status

Check kvm_mmu_page_ad_need_write_protect() when deciding whether to
write-protect or clear D-bits on TDP MMU SPTEs, so that the TDP MMU
accounts for any role-specific reasons for disabling D-bit dirty logging.

Specifically, TDP MMU SPTEs must be write-protected when the TDP MMU is
being used to run an L2 (i.e. L1 has disabled EPT) and PML is enabled.
KVM always disables PML when running L2, even when L1 and L2 GPAs are in
the some domain, so failing to write-protect TDP MMU SPTEs will cause
writes made by L2 to not be reflected in the dirty log.

[sean: massage shortlog and changelog, tweak ternary op formatting]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26990/">CVE-2024-26990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26990">CVE-2024-26990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223749">SUSE bug 1223749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26991" ref_url="https://www.suse.com/security/cve/CVE-2024-26991" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes

Fix KVM_SET_MEMORY_ATTRIBUTES to not overflow lpage_info array and trigger
KASAN splat, as seen in the private_mem_conversions_test selftest.

When memory attributes are set on a GFN range, that range will have
specific properties applied to the TDP. A huge page cannot be used when
the attributes are inconsistent, so they are disabled for those the
specific huge pages. For internal KVM reasons, huge pages are also not
allowed to span adjacent memslots regardless of whether the backing memory
could be mapped as huge.

What GFNs support which huge page sizes is tracked by an array of arrays
'lpage_info' on the memslot, of 'kvm_lpage_info' structs. Each index of
lpage_info contains a vmalloc allocated array of these for a specific
supported page size. The kvm_lpage_info denotes whether a specific huge
page (GFN and page size) on the memslot is supported. These arrays include
indices for unaligned head and tail huge pages.

Preventing huge pages from spanning adjacent memslot is covered by
incrementing the count in head and tail kvm_lpage_info when the memslot is
allocated, but disallowing huge pages for memory that has mixed attributes
has to be done in a more complicated way. During the
KVM_SET_MEMORY_ATTRIBUTES ioctl KVM updates lpage_info for each memslot in
the range that has mismatched attributes. KVM does this a memslot at a
time, and marks a special bit, KVM_LPAGE_MIXED_FLAG, in the kvm_lpage_info
for any huge page. This bit is essentially a permanently elevated count.
So huge pages will not be mapped for the GFN at that page size if the
count is elevated in either case: a huge head or tail page unaligned to
the memslot or if KVM_LPAGE_MIXED_FLAG is set because it has mixed
attributes.

To determine whether a huge page has consistent attributes, the
KVM_SET_MEMORY_ATTRIBUTES operation checks an xarray to make sure it
consistently has the incoming attribute. Since level - 1 huge pages are
aligned to level huge pages, it employs an optimization. As long as the
level - 1 huge pages are checked first, it can just check these and assume
that if each level - 1 huge page contained within the level sized huge
page is not mixed, then the level size huge page is not mixed. This
optimization happens in the helper hugepage_has_attrs().

Unfortunately, although the kvm_lpage_info array representing page size
'level' will contain an entry for an unaligned tail page of size level,
the array for level - 1  will not contain an entry for each GFN at page
size level. The level - 1 array will only contain an index for any
unaligned region covered by level - 1 huge page size, which can be a
smaller region. So this causes the optimization to overflow the level - 1
kvm_lpage_info and perform a vmalloc out of bounds read.

In some cases of head and tail pages where an overflow could happen,
callers skip the operation completely as KVM_LPAGE_MIXED_FLAG is not
required to prevent huge pages as discussed earlier. But for memslots that
are smaller than the 1GB page size, it does call hugepage_has_attrs(). In
this case the huge page is both the head and tail page. The issue can be
observed simply by compiling the kernel with CONFIG_KASAN_VMALLOC and
running the selftest "private_mem_conversions_test", which produces the
output like the following:

BUG: KASAN: vmalloc-out-of-bounds in hugepage_has_attrs+0x7e/0x110
Read of size 4 at addr ffffc900000a3008 by task private_mem_con/169
Call Trace:
  dump_stack_lvl
  print_report
  ? __virt_addr_valid
  ? hugepage_has_attrs
  ? hugepage_has_attrs
  kasan_report
  ? hugepage_has_attrs
  hugepage_has_attrs
  kvm_arch_post_set_memory_attributes
  kvm_vm_ioctl

It is a little ambiguous whether the unaligned head page (in the bug case
also the tail page) should be expected to have KVM_LPAGE_MIXED_FLAG set.
It is not functionally required, as the unal
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26991/">CVE-2024-26991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26991">CVE-2024-26991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223695">SUSE bug 1223695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26992" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26992" ref_url="https://www.suse.com/security/cve/CVE-2024-26992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/pmu: Disable support for adaptive PEBS

Drop support for virtualizing adaptive PEBS, as KVM's implementation is
architecturally broken without an obvious/easy path forward, and because
exposing adaptive PEBS can leak host LBRs to the guest, i.e. can leak
host kernel addresses to the guest.

Bug #1 is that KVM doesn't account for the upper 32 bits of
IA32_FIXED_CTR_CTRL when (re)programming fixed counters, e.g
fixed_ctrl_field() drops the upper bits, reprogram_fixed_counters()
stores local variables as u8s and truncates the upper bits too, etc.

Bug #2 is that, because KVM _always_ sets precise_ip to a non-zero value
for PEBS events, perf will _always_ generate an adaptive record, even if
the guest requested a basic record.  Note, KVM will also enable adaptive
PEBS in individual *counter*, even if adaptive PEBS isn't exposed to the
guest, but this is benign as MSR_PEBS_DATA_CFG is guaranteed to be zero,
i.e. the guest will only ever see Basic records.

Bug #3 is in perf.  intel_pmu_disable_fixed() doesn't clear the upper
bits either, i.e. leaves ICL_FIXED_0_ADAPTIVE set, and
intel_pmu_enable_fixed() effectively doesn't clear ICL_FIXED_0_ADAPTIVE
either.  I.e. perf _always_ enables ADAPTIVE counters, regardless of what
KVM requests.

Bug #4 is that adaptive PEBS *might* effectively bypass event filters set
by the host, as "Updated Memory Access Info Group" records information
that might be disallowed by userspace via KVM_SET_PMU_EVENT_FILTER.

Bug #5 is that KVM doesn't ensure LBR MSRs hold guest values (or at least
zeros) when entering a vCPU with adaptive PEBS, which allows the guest
to read host LBRs, i.e. host RIPs/addresses, by enabling "LBR Entries"
records.

Disable adaptive PEBS support as an immediate fix due to the severity of
the LBR leak in particular, and because fixing all of the bugs will be
non-trivial, e.g. not suitable for backporting to stable kernels.

Note!  This will break live migration, but trying to make KVM play nice
with live migration would be quite complicated, wouldn't be guaranteed to
work (i.e. KVM might still kill/confuse the guest), and it's not clear
that there are any publicly available VMMs that support adaptive PEBS,
let alone live migrate VMs that support adaptive PEBS, e.g. QEMU doesn't
support PEBS in any capacity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26992/">CVE-2024-26992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26992">CVE-2024-26992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223692">SUSE bug 1223692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: sysfs: Fix reference leak in sysfs_break_active_protection()

The sysfs_break_active_protection() routine has an obvious reference
leak in its error path.  If the call to kernfs_find_and_get() fails then
kn will be NULL, so the companion sysfs_unbreak_active_protection()
routine won't get called (and would only cause an access violation by
trying to dereference kn-&gt;parent if it was called).  As a result, the
reference to kobj acquired at the start of the function will never be
released.

Fix the leak by adding an explicit kobject_put() call when kn is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223693">SUSE bug 1223693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

speakup: Avoid crash on very long word

In case a console is set up really large and contains a really long word
(&gt; 256 characters), we have to stop before the length of the word buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223750">SUSE bug 1223750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26995" ref_url="https://www.suse.com/security/cve/CVE-2024-26995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Correct the PDO counting in pd_set

Off-by-one errors happen because nr_snk_pdo and nr_src_pdo are
incorrectly added one. The index of the loop is equal to the number of
PDOs to be updated when leaving the loop and it doesn't need to be added
one.

When doing the power negotiation, TCPM relies on the "nr_snk_pdo" as
the size of the local sink PDO array to match the Source capabilities
of the partner port. If the off-by-one overflow occurs, a wrong RDO
might be sent and unexpected power transfer might happen such as over
voltage or over current (than expected).

"nr_src_pdo" is used to set the Rp level when the port is in Source
role. It is also the array size of the local Source capabilities when
filling up the buffer which will be sent as the Source PDOs (such as
in Power Negotiation). If the off-by-one overflow occurs, a wrong Rp
level might be set and wrong Source PDOs will be sent to the partner
port. This could potentially cause over current or port resets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26995/">CVE-2024-26995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26995">CVE-2024-26995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223696">SUSE bug 1223696</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26996" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error

When ncm function is working and then stop usb0 interface for link down,
eth_stop() is called. At this piont, accidentally if usb transport error
should happen in usb_ep_enable(), 'in_ep' and/or 'out_ep' may not be enabled.

After that, ncm_disable() is called to disable for ncm unbind
but gether_disconnect() is never called since 'in_ep' is not enabled.

As the result, ncm object is released in ncm unbind
but 'dev-&gt;port_usb' associated to 'ncm-&gt;port' is not NULL.

And when ncm bind again to recover netdev, ncm object is reallocated
but usb0 interface is already associated to previous released ncm object.

Therefore, once usb0 interface is up and eth_start_xmit() is called,
released ncm object is dereferrenced and it might cause use-after-free memory.

[function unlink via configfs]
  usb0: eth_stop dev-&gt;port_usb=ffffff9b179c3200
  --&gt; error happens in usb_ep_enable().
  NCM: ncm_disable: ncm=ffffff9b179c3200
  --&gt; no gether_disconnect() since ncm-&gt;port.in_ep-&gt;enabled is false.
  NCM: ncm_unbind: ncm unbind ncm=ffffff9b179c3200
  NCM: ncm_free: ncm free ncm=ffffff9b179c3200   &lt;-- released ncm

[function link via configfs]
  NCM: ncm_alloc: ncm alloc ncm=ffffff9ac4f8a000
  NCM: ncm_bind: ncm bind ncm=ffffff9ac4f8a000
  NCM: ncm_set_alt: ncm=ffffff9ac4f8a000 alt=0
  usb0: eth_open dev-&gt;port_usb=ffffff9b179c3200  &lt;-- previous released ncm
  usb0: eth_start dev-&gt;port_usb=ffffff9b179c3200 &lt;--
  eth_start_xmit()
  --&gt; dev-&gt;wrap()
  Unable to handle kernel paging request at virtual address dead00000000014f

This patch addresses the issue by checking if 'ncm-&gt;netdev' is not NULL at
ncm_disable() to call gether_disconnect() to deassociate 'dev-&gt;port_usb'.
It's more reasonable to check 'ncm-&gt;netdev' to call gether_connect/disconnect
rather than check 'ncm-&gt;port.in_ep-&gt;enabled' since it might not be enabled
but the gether connection might be established.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223752">SUSE bug 1223752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc2: host: Fix dereference issue in DDMA completion flow.

Fixed variable dereference issue in DDMA completion flow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223741">SUSE bug 1223741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26998" ref_url="https://www.suse.com/security/cve/CVE-2024-26998" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: core: Clearing the circular buffer before NULLifying it

The circular buffer is NULLified in uart_tty_port_shutdown()
under the spin lock. However, the PM or other timer based callbacks
may still trigger after this event without knowning that buffer pointer
is not valid. Since the serial code is a bit inconsistent in checking
the buffer state (some rely on the head-tail positions, some on the
buffer pointer), it's better to have both aligned, i.e. buffer pointer
to be NULL and head-tail possitions to be the same, meaning it's empty.
This will prevent asynchronous calls to dereference NULL pointer as
reported recently in 8250 case:

  BUG: kernel NULL pointer dereference, address: 00000cf5
  Workqueue: pm pm_runtime_work
  EIP: serial8250_tx_chars (drivers/tty/serial/8250/8250_port.c:1809)
  ...
  ? serial8250_tx_chars (drivers/tty/serial/8250/8250_port.c:1809)
  __start_tx (drivers/tty/serial/8250/8250_port.c:1551)
  serial8250_start_tx (drivers/tty/serial/8250/8250_port.c:1654)
  serial_port_runtime_suspend (include/linux/serial_core.h:667 drivers/tty/serial/serial_port.c:63)
  __rpm_callback (drivers/base/power/runtime.c:393)
  ? serial_port_remove (drivers/tty/serial/serial_port.c:50)
  rpm_suspend (drivers/base/power/runtime.c:447)

The proposed change will prevent -&gt;start_tx() to be called during
suspend on shut down port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26998/">CVE-2024-26998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26998">CVE-2024-26998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223736">SUSE bug 1223736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial/pmac_zilog: Remove flawed mitigation for rx irq flood

The mitigation was intended to stop the irq completely. That may be
better than a hard lock-up but it turns out that you get a crash anyway
if you're using pmac_zilog as a serial console:

ttyPZ0: pmz: rx irq flood !
BUG: spinlock recursion on CPU#0, swapper/0

That's because the pr_err() call in pmz_receive_chars() results in
pmz_console_write() attempting to lock a spinlock already locked in
pmz_interrupt(). With CONFIG_DEBUG_SPINLOCK=y, this produces a fatal
BUG splat. The spinlock in question is the one in struct uart_port.

Even when it's not fatal, the serial port rx function ceases to work.
Also, the iteration limit doesn't play nicely with QEMU, as can be
seen in the bug report linked below.

A web search for other reports of the error message "pmz: rx irq flood"
didn't produce anything. So I don't think this code is needed any more.
Remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223754">SUSE bug 1223754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: mxs-auart: add spinlock around changing cts state

The uart_handle_cts_change() function in serial_core expects the caller
to hold uport-&gt;lock. For example, I have seen the below kernel splat,
when the Bluetooth driver is loaded on an i.MX28 board.

    [   85.119255] ------------[ cut here ]------------
    [   85.124413] WARNING: CPU: 0 PID: 27 at /drivers/tty/serial/serial_core.c:3453 uart_handle_cts_change+0xb4/0xec
    [   85.134694] Modules linked in: hci_uart bluetooth ecdh_generic ecc wlcore_sdio configfs
    [   85.143314] CPU: 0 PID: 27 Comm: kworker/u3:0 Not tainted 6.6.3-00021-gd62a2f068f92 #1
    [   85.151396] Hardware name: Freescale MXS (Device Tree)
    [   85.156679] Workqueue: hci0 hci_power_on [bluetooth]
    (...)
    [   85.191765]  uart_handle_cts_change from mxs_auart_irq_handle+0x380/0x3f4
    [   85.198787]  mxs_auart_irq_handle from __handle_irq_event_percpu+0x88/0x210
    (...)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223757">SUSE bug 1223757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27002" ref_url="https://www.suse.com/security/cve/CVE-2024-27002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: Do a runtime PM get on controllers during probe

mt8183-mfgcfg has a mutual dependency with genpd during the probing
stage, which leads to a deadlock in the following call stack:

CPU0:  genpd_lock --&gt; clk_prepare_lock
genpd_power_off_work_fn()
 genpd_lock()
 generic_pm_domain::power_off()
    clk_unprepare()
      clk_prepare_lock()

CPU1: clk_prepare_lock --&gt; genpd_lock
clk_register()
  __clk_core_init()
    clk_prepare_lock()
    clk_pm_runtime_get()
      genpd_lock()

Do a runtime PM get at the probe function to make sure clk_register()
won't acquire the genpd lock. Instead of only modifying mt8183-mfgcfg,
do this on all mediatek clock controller probings because we don't
believe this would cause any regression.

Verified on MT8183 and MT8192 Chromebooks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27002/">CVE-2024-27002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27002">CVE-2024-27002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223759">SUSE bug 1223759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27003" ref_url="https://www.suse.com/security/cve/CVE-2024-27003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: Get runtime PM before walking tree for clk_summary

Similar to the previous commit, we should make sure that all devices are
runtime resumed before printing the clk_summary through debugfs. Failure
to do so would result in a deadlock if the thread is resuming a device
to print clk state and that device is also runtime resuming in another
thread, e.g the screen is turning on and the display driver is starting
up. We remove the calls to clk_pm_runtime_{get,put}() in this path
because they're superfluous now that we know the devices are runtime
resumed. This also squashes a bug where the return value of
clk_pm_runtime_get() wasn't checked, leading to an RPM count underflow
on error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27003/">CVE-2024-27003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27003">CVE-2024-27003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223761">SUSE bug 1223761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: Get runtime PM before walking tree during disable_unused

Doug reported [1] the following hung task:

 INFO: task swapper/0:1 blocked for more than 122 seconds.
       Not tainted 5.15.149-21875-gf795ebc40eb8 #1
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:swapper/0       state:D stack:    0 pid:    1 ppid:     0 flags:0x00000008
 Call trace:
  __switch_to+0xf4/0x1f4
  __schedule+0x418/0xb80
  schedule+0x5c/0x10c
  rpm_resume+0xe0/0x52c
  rpm_resume+0x178/0x52c
  __pm_runtime_resume+0x58/0x98
  clk_pm_runtime_get+0x30/0xb0
  clk_disable_unused_subtree+0x58/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused_subtree+0x38/0x208
  clk_disable_unused+0x4c/0xe4
  do_one_initcall+0xcc/0x2d8
  do_initcall_level+0xa4/0x148
  do_initcalls+0x5c/0x9c
  do_basic_setup+0x24/0x30
  kernel_init_freeable+0xec/0x164
  kernel_init+0x28/0x120
  ret_from_fork+0x10/0x20
 INFO: task kworker/u16:0:9 blocked for more than 122 seconds.
       Not tainted 5.15.149-21875-gf795ebc40eb8 #1
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/u16:0   state:D stack:    0 pid:    9 ppid:     2 flags:0x00000008
 Workqueue: events_unbound deferred_probe_work_func
 Call trace:
  __switch_to+0xf4/0x1f4
  __schedule+0x418/0xb80
  schedule+0x5c/0x10c
  schedule_preempt_disabled+0x2c/0x48
  __mutex_lock+0x238/0x488
  __mutex_lock_slowpath+0x1c/0x28
  mutex_lock+0x50/0x74
  clk_prepare_lock+0x7c/0x9c
  clk_core_prepare_lock+0x20/0x44
  clk_prepare+0x24/0x30
  clk_bulk_prepare+0x40/0xb0
  mdss_runtime_resume+0x54/0x1c8
  pm_generic_runtime_resume+0x30/0x44
  __genpd_runtime_resume+0x68/0x7c
  genpd_runtime_resume+0x108/0x1f4
  __rpm_callback+0x84/0x144
  rpm_callback+0x30/0x88
  rpm_resume+0x1f4/0x52c
  rpm_resume+0x178/0x52c
  __pm_runtime_resume+0x58/0x98
  __device_attach+0xe0/0x170
  device_initial_probe+0x1c/0x28
  bus_probe_device+0x3c/0x9c
  device_add+0x644/0x814
  mipi_dsi_device_register_full+0xe4/0x170
  devm_mipi_dsi_device_register_full+0x28/0x70
  ti_sn_bridge_probe+0x1dc/0x2c0
  auxiliary_bus_probe+0x4c/0x94
  really_probe+0xcc/0x2c8
  __driver_probe_device+0xa8/0x130
  driver_probe_device+0x48/0x110
  __device_attach_driver+0xa4/0xcc
  bus_for_each_drv+0x8c/0xd8
  __device_attach+0xf8/0x170
  device_initial_probe+0x1c/0x28
  bus_probe_device+0x3c/0x9c
  deferred_probe_work_func+0x9c/0xd8
  process_one_work+0x148/0x518
  worker_thread+0x138/0x350
  kthread+0x138/0x1e0
  ret_from_fork+0x10/0x20

The first thread is walking the clk tree and calling
clk_pm_runtime_get() to power on devices required to read the clk
hardware via struct clk_ops::is_enabled(). This thread holds the clk
prepare_lock, and is trying to runtime PM resume a device, when it finds
that the device is in the process of resuming so the thread schedule()s
away waiting for the device to finish resuming before continuing. The
second thread is runtime PM resuming the same device, but the runtime
resume callback is calling clk_prepare(), trying to grab the
prepare_lock waiting on the first thread.

This is a classic ABBA deadlock. To properly fix the deadlock, we must
never runtime PM resume or suspend a device with the clk prepare_lock
held. Actually doing that is near impossible today because the global
prepare_lock would have to be dropped in the middle of the tree, the
device runtime PM resumed/suspended, and then the prepare_lock grabbed
again to ensure consistency of the clk tree topology. If anything
changes with the clk tree in the meantime, we've lost and will need to
start the operation all over again.

Luckily, most of the time we're simply incrementing or decrementing the
runtime PM count on an active device, so we don't have the chance to
schedule away with the prepare_lock held. Let's fix this immediate
problem that can be
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223762">SUSE bug 1223762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27005" ref_url="https://www.suse.com/security/cve/CVE-2024-27005" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

interconnect: Don't access req_list while it's being manipulated

The icc_lock mutex was split into separate icc_lock and icc_bw_lock
mutexes in [1] to avoid lockdep splats. However, this didn't adequately
protect access to icc_node::req_list.

The icc_set_bw() function will eventually iterate over req_list while
only holding icc_bw_lock, but req_list can be modified while only
holding icc_lock. This causes races between icc_set_bw(), of_icc_get(),
and icc_put().

Example A:

  CPU0                               CPU1
  ----                               ----
  icc_set_bw(path_a)
    mutex_lock(&amp;icc_bw_lock);
                                     icc_put(path_b)
                                       mutex_lock(&amp;icc_lock);
    aggregate_requests()
      hlist_for_each_entry(r, ...
                                       hlist_del(...
        &lt;r = invalid pointer&gt;

Example B:

  CPU0                               CPU1
  ----                               ----
  icc_set_bw(path_a)
    mutex_lock(&amp;icc_bw_lock);
                                     path_b = of_icc_get()
                                       of_icc_get_by_index()
                                         mutex_lock(&amp;icc_lock);
                                         path_find()
                                           path_init()
    aggregate_requests()
      hlist_for_each_entry(r, ...
                                             hlist_add_head(...
        &lt;r = invalid pointer&gt;

Fix this by ensuring icc_bw_lock is always held before manipulating
icc_node::req_list. The additional places icc_bw_lock is held don't
perform any memory allocations, so we should still be safe from the
original lockdep splats that motivated the separate locks.

[1] commit af42269c3523 ("interconnect: Fix locking for runpm vs reclaim")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27005/">CVE-2024-27005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27005">CVE-2024-27005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223800">SUSE bug 1223800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27006" ref_url="https://www.suse.com/security/cve/CVE-2024-27006" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/debugfs: Add missing count increment to thermal_debug_tz_trip_up()

The count field in struct trip_stats, representing the number of times
the zone temperature was above the trip point, needs to be incremented
in thermal_debug_tz_trip_up(), for two reasons.

First, if a trip point is crossed on the way up for the first time,
thermal_debug_update_temp() called from update_temperature() does
not see it because it has not been added to trips_crossed[] array
in the thermal zone's struct tz_debugfs object yet.  Therefore, when
thermal_debug_tz_trip_up() is called after that, the trip point's
count value is 0, and the attempt to divide by it during the average
temperature computation leads to a divide error which causes the kernel
to crash.  Setting the count to 1 before the division by incrementing it
fixes this problem.

Second, if a trip point is crossed on the way up, but it has been
crossed on the way up already before, its count value needs to be
incremented to make a record of the fact that the zone temperature is
above the trip now.  Without doing that, if the mitigations applied
after crossing the trip cause the zone temperature to drop below its
threshold, the count will not be updated for this episode at all and
the average temperature in the trip statistics record will be somewhat
higher than it should be.

Cc :6.8+ &lt;stable@vger.kernel.org&gt; # 6.8+
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27006/">CVE-2024-27006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27006">CVE-2024-27006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223801">SUSE bug 1223801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27007" ref_url="https://www.suse.com/security/cve/CVE-2024-27007" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: change src_folio after ensuring it's unpinned in UFFDIO_MOVE

Commit d7a08838ab74 ("mm: userfaultfd: fix unexpected change to src_folio
when UFFDIO_MOVE fails") moved the src_folio-&gt;{mapping, index} changing to
after clearing the page-table and ensuring that it's not pinned.  This
avoids failure of swapout+migration and possibly memory corruption.

However, the commit missed fixing it in the huge-page case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27007/">CVE-2024-27007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27007">CVE-2024-27007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223710">SUSE bug 1223710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: nv04: Fix out of bounds access

When Output Resource (dcb-&gt;or) value is assigned in
fabricate_dcb_output(), there may be out of bounds access to
dac_users array in case dcb-&gt;or is zero because ffs(dcb-&gt;or) is
used as index there.
The 'or' argument of fabricate_dcb_output() must be interpreted as a
number of bit to set, not value.

Utilize macros from 'enum nouveau_or' in calls instead of hardcoding.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223802">SUSE bug 1223802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27009" ref_url="https://www.suse.com/security/cve/CVE-2024-27009" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cio: fix race condition during online processing

A race condition exists in ccw_device_set_online() that can cause the
online process to fail, leaving the affected device in an inconsistent
state. As a result, subsequent attempts to set that device online fail
with return code ENODEV.

The problem occurs when a path verification request arrives after
a wait for final device state completed, but before the result state
is evaluated.

Fix this by ensuring that the CCW-device lock is held between
determining final state and checking result state.

Note that since:

commit 2297791c92d0 ("s390/cio: dont unregister subchannel from child-drivers")

path verification requests are much more likely to occur during boot,
resulting in an increased chance of this race condition occurring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27009/">CVE-2024-27009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27009">CVE-2024-27009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223699">SUSE bug 1223699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix mirred deadlock on device recursion

When the mirred action is used on a classful egress qdisc and a packet is
mirrored or redirected to self we hit a qdisc lock deadlock.
See trace below.

[..... other info removed for brevity....]
[   82.890906]
[   82.890906] ============================================
[   82.890906] WARNING: possible recursive locking detected
[   82.890906] 6.8.0-05205-g77fadd89fe2d-dirty #213 Tainted: G        W
[   82.890906] --------------------------------------------
[   82.890906] ping/418 is trying to acquire lock:
[   82.890906] ffff888006994110 (&amp;sch-&gt;q.lock){+.-.}-{3:3}, at:
__dev_queue_xmit+0x1778/0x3550
[   82.890906]
[   82.890906] but task is already holding lock:
[   82.890906] ffff888006994110 (&amp;sch-&gt;q.lock){+.-.}-{3:3}, at:
__dev_queue_xmit+0x1778/0x3550
[   82.890906]
[   82.890906] other info that might help us debug this:
[   82.890906]  Possible unsafe locking scenario:
[   82.890906]
[   82.890906]        CPU0
[   82.890906]        ----
[   82.890906]   lock(&amp;sch-&gt;q.lock);
[   82.890906]   lock(&amp;sch-&gt;q.lock);
[   82.890906]
[   82.890906]  *** DEADLOCK ***
[   82.890906]
[..... other info removed for brevity....]

Example setup (eth0-&gt;eth0) to recreate
tc qdisc add dev eth0 root handle 1: htb default 30
tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \
     action mirred egress redirect dev eth0

Another example(eth0-&gt;eth1-&gt;eth0) to recreate
tc qdisc add dev eth0 root handle 1: htb default 30
tc filter add dev eth0 handle 1: protocol ip prio 2 matchall \
     action mirred egress redirect dev eth1

tc qdisc add dev eth1 root handle 1: htb default 30
tc filter add dev eth1 handle 1: protocol ip prio 2 matchall \
     action mirred egress redirect dev eth0

We fix this by adding an owner field (CPU id) to struct Qdisc set after
root qdisc is entered. When the softirq enters it a second time, if the
qdisc owner is the same CPU, the packet is dropped to break the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223720">SUSE bug 1223720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix memleak in map from abort path

The delete set command does not rely on the transaction object for
element removal, therefore, a combination of delete element + delete set
from the abort path could result in restoring twice the refcount of the
mapping.

Check for inactive element in the next generation for the delete element
command in the abort path, skip restoring state if next generation bit
has been already cleared. This is similar to the activate logic using
the set walk iterator.

[ 6170.286929] ------------[ cut here ]------------
[ 6170.286939] WARNING: CPU: 6 PID: 790302 at net/netfilter/nf_tables_api.c:2086 nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.287071] Modules linked in: [...]
[ 6170.287633] CPU: 6 PID: 790302 Comm: kworker/6:2 Not tainted 6.9.0-rc3+ #365
[ 6170.287768] RIP: 0010:nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.287886] Code: df 48 8d 7d 58 e8 69 2e 3b df 48 8b 7d 58 e8 80 1b 37 df 48 8d 7d 68 e8 57 2e 3b df 48 8b 7d 68 e8 6e 1b 37 df 48 89 ef eb c4 &lt;0f&gt; 0b 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 0f
[ 6170.287895] RSP: 0018:ffff888134b8fd08 EFLAGS: 00010202
[ 6170.287904] RAX: 0000000000000001 RBX: ffff888125bffb28 RCX: dffffc0000000000
[ 6170.287912] RDX: 0000000000000003 RSI: ffffffffa20298ab RDI: ffff88811ebe4750
[ 6170.287919] RBP: ffff88811ebe4700 R08: ffff88838e812650 R09: fffffbfff0623a55
[ 6170.287926] R10: ffffffff8311d2af R11: 0000000000000001 R12: ffff888125bffb10
[ 6170.287933] R13: ffff888125bffb10 R14: dead000000000122 R15: dead000000000100
[ 6170.287940] FS:  0000000000000000(0000) GS:ffff888390b00000(0000) knlGS:0000000000000000
[ 6170.287948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 6170.287955] CR2: 00007fd31fc00710 CR3: 0000000133f60004 CR4: 00000000001706f0
[ 6170.287962] Call Trace:
[ 6170.287967]  &lt;TASK&gt;
[ 6170.287973]  ? __warn+0x9f/0x1a0
[ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.288092]  ? report_bug+0x1b1/0x1e0
[ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.288092]  ? report_bug+0x1b1/0x1e0
[ 6170.288104]  ? handle_bug+0x3c/0x70
[ 6170.288112]  ? exc_invalid_op+0x17/0x40
[ 6170.288120]  ? asm_exc_invalid_op+0x1a/0x20
[ 6170.288132]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]
[ 6170.288243]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
[ 6170.288366]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]
[ 6170.288483]  nf_tables_trans_destroy_work+0x588/0x590 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223803">SUSE bug 1223803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27012" ref_url="https://www.suse.com/security/cve/CVE-2024-27012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: restore set elements when delete set fails

From abort path, nft_mapelem_activate() needs to restore refcounters to
the original state. Currently, it uses the set-&gt;ops-&gt;walk() to iterate
over these set elements. The existing set iterator skips inactive
elements in the next generation, this does not work from the abort path
to restore the original state since it has to skip active elements
instead (not inactive ones).

This patch moves the check for inactive elements to the set iterator
callback, then it reverses the logic for the .activate case which
needs to skip active elements.

Toggle next generation bit for elements when delete set command is
invoked and call nft_clear() from .activate (abort) path to restore the
next generation bit.

The splat below shows an object in mappings memleak:

[43929.457523] ------------[ cut here ]------------
[43929.457532] WARNING: CPU: 0 PID: 1139 at include/net/netfilter/nf_tables.h:1237 nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]
[...]
[43929.458014] RIP: 0010:nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]
[43929.458076] Code: 83 f8 01 77 ab 49 8d 7c 24 08 e8 37 5e d0 de 49 8b 6c 24 08 48 8d 7d 50 e8 e9 5c d0 de 8b 45 50 8d 50 ff 89 55 50 85 c0 75 86 &lt;0f&gt; 0b eb 82 0f 0b eb b3 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90
[43929.458081] RSP: 0018:ffff888140f9f4b0 EFLAGS: 00010246
[43929.458086] RAX: 0000000000000000 RBX: ffff8881434f5288 RCX: dffffc0000000000
[43929.458090] RDX: 00000000ffffffff RSI: ffffffffa26d28a7 RDI: ffff88810ecc9550
[43929.458093] RBP: ffff88810ecc9500 R08: 0000000000000001 R09: ffffed10281f3e8f
[43929.458096] R10: 0000000000000003 R11: ffff0000ffff0000 R12: ffff8881434f52a0
[43929.458100] R13: ffff888140f9f5f4 R14: ffff888151c7a800 R15: 0000000000000002
[43929.458103] FS:  00007f0c687c4740(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[43929.458107] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[43929.458111] CR2: 00007f58dbe5b008 CR3: 0000000123602005 CR4: 00000000001706f0
[43929.458114] Call Trace:
[43929.458118]  &lt;TASK&gt;
[43929.458121]  ? __warn+0x9f/0x1a0
[43929.458127]  ? nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]
[43929.458188]  ? report_bug+0x1b1/0x1e0
[43929.458196]  ? handle_bug+0x3c/0x70
[43929.458200]  ? exc_invalid_op+0x17/0x40
[43929.458211]  ? nft_setelem_data_deactivate+0xd7/0xf0 [nf_tables]
[43929.458271]  ? nft_setelem_data_deactivate+0xe4/0xf0 [nf_tables]
[43929.458332]  nft_mapelem_deactivate+0x24/0x30 [nf_tables]
[43929.458392]  nft_rhash_walk+0xdd/0x180 [nf_tables]
[43929.458453]  ? __pfx_nft_rhash_walk+0x10/0x10 [nf_tables]
[43929.458512]  ? rb_insert_color+0x2e/0x280
[43929.458520]  nft_map_deactivate+0xdc/0x1e0 [nf_tables]
[43929.458582]  ? __pfx_nft_map_deactivate+0x10/0x10 [nf_tables]
[43929.458642]  ? __pfx_nft_mapelem_deactivate+0x10/0x10 [nf_tables]
[43929.458701]  ? __rcu_read_unlock+0x46/0x70
[43929.458709]  nft_delset+0xff/0x110 [nf_tables]
[43929.458769]  nft_flush_table+0x16f/0x460 [nf_tables]
[43929.458830]  nf_tables_deltable+0x501/0x580 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27012/">CVE-2024-27012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27012">CVE-2024-27012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223804">SUSE bug 1223804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: limit printing rate when illegal packet received by tun dev

vhost_worker will call tun call backs to receive packets. If too many
illegal packets arrives, tun_do_read will keep dumping packet contents.
When console is enabled, it will costs much more cpu time to dump
packet and soft lockup will be detected.

net_ratelimit mechanism can be used to limit the dumping rate.

PID: 33036    TASK: ffff949da6f20000  CPU: 23   COMMAND: "vhost-32980"
 #0 [fffffe00003fce50] crash_nmi_callback at ffffffff89249253
 #1 [fffffe00003fce58] nmi_handle at ffffffff89225fa3
 #2 [fffffe00003fceb0] default_do_nmi at ffffffff8922642e
 #3 [fffffe00003fced0] do_nmi at ffffffff8922660d
 #4 [fffffe00003fcef0] end_repeat_nmi at ffffffff89c01663
    [exception RIP: io_serial_in+20]
    RIP: ffffffff89792594  RSP: ffffa655314979e8  RFLAGS: 00000002
    RAX: ffffffff89792500  RBX: ffffffff8af428a0  RCX: 0000000000000000
    RDX: 00000000000003fd  RSI: 0000000000000005  RDI: ffffffff8af428a0
    RBP: 0000000000002710   R8: 0000000000000004   R9: 000000000000000f
    R10: 0000000000000000  R11: ffffffff8acbf64f  R12: 0000000000000020
    R13: ffffffff8acbf698  R14: 0000000000000058  R15: 0000000000000000
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 #5 [ffffa655314979e8] io_serial_in at ffffffff89792594
 #6 [ffffa655314979e8] wait_for_xmitr at ffffffff89793470
 #7 [ffffa65531497a08] serial8250_console_putchar at ffffffff897934f6
 #8 [ffffa65531497a20] uart_console_write at ffffffff8978b605
 #9 [ffffa65531497a48] serial8250_console_write at ffffffff89796558
 #10 [ffffa65531497ac8] console_unlock at ffffffff89316124
 #11 [ffffa65531497b10] vprintk_emit at ffffffff89317c07
 #12 [ffffa65531497b68] printk at ffffffff89318306
 #13 [ffffa65531497bc8] print_hex_dump at ffffffff89650765
 #14 [ffffa65531497ca8] tun_do_read at ffffffffc0b06c27 [tun]
 #15 [ffffa65531497d38] tun_recvmsg at ffffffffc0b06e34 [tun]
 #16 [ffffa65531497d68] handle_rx at ffffffffc0c5d682 [vhost_net]
 #17 [ffffa65531497ed0] vhost_worker at ffffffffc0c644dc [vhost]
 #18 [ffffa65531497f10] kthread at ffffffff892d2e72
 #19 [ffffa65531497f50] ret_from_fork at ffffffff89c0022f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223745">SUSE bug 1223745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Prevent deadlock while disabling aRFS

When disabling aRFS under the `priv-&gt;state_lock`, any scheduled
aRFS works are canceled using the `cancel_work_sync` function,
which waits for the work to end if it has already started.
However, while waiting for the work handler, the handler will
try to acquire the `state_lock` which is already acquired.

The worker acquires the lock to delete the rules if the state
is down, which is not the worker's responsibility since
disabling aRFS deletes the rules.

Add an aRFS state variable, which indicates whether the aRFS is
enabled and prevent adding rules when the aRFS is disabled.

Kernel log:

======================================================
WARNING: possible circular locking dependency detected
6.7.0-rc4_net_next_mlx5_5483eb2 #1 Tainted: G          I
------------------------------------------------------
ethtool/386089 is trying to acquire lock:
ffff88810f21ce68 ((work_completion)(&amp;rule-&gt;arfs_work)){+.+.}-{0:0}, at: __flush_work+0x74/0x4e0

but task is already holding lock:
ffff8884a1808cc0 (&amp;priv-&gt;state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (&amp;priv-&gt;state_lock){+.+.}-{3:3}:
       __mutex_lock+0x80/0xc90
       arfs_handle_work+0x4b/0x3b0 [mlx5_core]
       process_one_work+0x1dc/0x4a0
       worker_thread+0x1bf/0x3c0
       kthread+0xd7/0x100
       ret_from_fork+0x2d/0x50
       ret_from_fork_asm+0x11/0x20

-&gt; #0 ((work_completion)(&amp;rule-&gt;arfs_work)){+.+.}-{0:0}:
       __lock_acquire+0x17b4/0x2c80
       lock_acquire+0xd0/0x2b0
       __flush_work+0x7a/0x4e0
       __cancel_work_timer+0x131/0x1c0
       arfs_del_rules+0x143/0x1e0 [mlx5_core]
       mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]
       mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]
       ethnl_set_channels+0x28f/0x3b0
       ethnl_default_set_doit+0xec/0x240
       genl_family_rcv_msg_doit+0xd0/0x120
       genl_rcv_msg+0x188/0x2c0
       netlink_rcv_skb+0x54/0x100
       genl_rcv+0x24/0x40
       netlink_unicast+0x1a1/0x270
       netlink_sendmsg+0x214/0x460
       __sock_sendmsg+0x38/0x60
       __sys_sendto+0x113/0x170
       __x64_sys_sendto+0x20/0x30
       do_syscall_64+0x40/0xe0
       entry_SYSCALL_64_after_hwframe+0x46/0x4e

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;priv-&gt;state_lock);
                               lock((work_completion)(&amp;rule-&gt;arfs_work));
                               lock(&amp;priv-&gt;state_lock);
  lock((work_completion)(&amp;rule-&gt;arfs_work));

 *** DEADLOCK ***

3 locks held by ethtool/386089:
 #0: ffffffff82ea7210 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40
 #1: ffffffff82e94c88 (rtnl_mutex){+.+.}-{3:3}, at: ethnl_default_set_doit+0xd3/0x240
 #2: ffff8884a1808cc0 (&amp;priv-&gt;state_lock){+.+.}-{3:3}, at: mlx5e_ethtool_set_channels+0x53/0x200 [mlx5_core]

stack backtrace:
CPU: 15 PID: 386089 Comm: ethtool Tainted: G          I        6.7.0-rc4_net_next_mlx5_5483eb2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x60/0xa0
 check_noncircular+0x144/0x160
 __lock_acquire+0x17b4/0x2c80
 lock_acquire+0xd0/0x2b0
 ? __flush_work+0x74/0x4e0
 ? save_trace+0x3e/0x360
 ? __flush_work+0x74/0x4e0
 __flush_work+0x7a/0x4e0
 ? __flush_work+0x74/0x4e0
 ? __lock_acquire+0xa78/0x2c80
 ? lock_acquire+0xd0/0x2b0
 ? mark_held_locks+0x49/0x70
 __cancel_work_timer+0x131/0x1c0
 ? mark_held_locks+0x49/0x70
 arfs_del_rules+0x143/0x1e0 [mlx5_core]
 mlx5e_arfs_disable+0x1b/0x30 [mlx5_core]
 mlx5e_ethtool_set_channels+0xcb/0x200 [mlx5_core]
 ethnl_set_channels+0x28f/0x3b0
 ethnl_default_set_doit+0xec/0x240
 genl_family_rcv_msg_doit+0xd0/0x120
 genl_rcv_msg+0x188/0x2c0
 ? ethn
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223735">SUSE bug 1223735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: incorrect pppoe tuple

pppoe traffic reaching ingress path does not match the flowtable entry
because the pppoe header is expected to be at the network header offset.
This bug causes a mismatch in the flow table lookup, so pppoe packets
enter the classical forwarding path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223806">SUSE bug 1223806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: validate pppoe header

Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223807">SUSE bug 1223807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27017" ref_url="https://www.suse.com/security/cve/CVE-2024-27017" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: walk over current view on netlink dump

The generation mask can be updated while netlink dump is in progress.
The pipapo set backend walk iterator cannot rely on it to infer what
view of the datastructure is to be used. Add notation to specify if user
wants to read/update the set.

Based on patch from Florian Westphal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27017/">CVE-2024-27017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27017">CVE-2024-27017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223733">SUSE bug 1223733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27018" ref_url="https://www.suse.com/security/cve/CVE-2024-27018" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: br_netfilter: skip conntrack input hook for promisc packets

For historical reasons, when bridge device is in promisc mode, packets
that are directed to the taps follow bridge input hook path. This patch
adds a workaround to reset conntrack for these packets.

Jianbo Liu reports warning splats in their test infrastructure where
cloned packets reach the br_netfilter input hook to confirm the
conntrack object.

Scratch one bit from BR_INPUT_SKB_CB to annotate that this packet has
reached the input hook because it is passed up to the bridge device to
reach the taps.

[   57.571874] WARNING: CPU: 1 PID: 0 at net/bridge/br_netfilter_hooks.c:616 br_nf_local_in+0x157/0x180 [br_netfilter]
[   57.572749] Modules linked in: xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_isc si ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5ctl mlx5_core
[   57.575158] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0+ #19
[   57.575700] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[   57.576662] RIP: 0010:br_nf_local_in+0x157/0x180 [br_netfilter]
[   57.577195] Code: fe ff ff 41 bd 04 00 00 00 be 04 00 00 00 e9 4a ff ff ff be 04 00 00 00 48 89 ef e8 f3 a9 3c e1 66 83 ad b4 00 00 00 04 eb 91 &lt;0f&gt; 0b e9 f1 fe ff ff 0f 0b e9 df fe ff ff 48 89 df e8 b3 53 47 e1
[   57.578722] RSP: 0018:ffff88885f845a08 EFLAGS: 00010202
[   57.579207] RAX: 0000000000000002 RBX: ffff88812dfe8000 RCX: 0000000000000000
[   57.579830] RDX: ffff88885f845a60 RSI: ffff8881022dc300 RDI: 0000000000000000
[   57.580454] RBP: ffff88885f845a60 R08: 0000000000000001 R09: 0000000000000003
[   57.581076] R10: 00000000ffff1300 R11: 0000000000000002 R12: 0000000000000000
[   57.581695] R13: ffff8881047ffe00 R14: ffff888108dbee00 R15: ffff88814519b800
[   57.582313] FS:  0000000000000000(0000) GS:ffff88885f840000(0000) knlGS:0000000000000000
[   57.583040] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   57.583564] CR2: 000000c4206aa000 CR3: 0000000103847001 CR4: 0000000000370eb0
[   57.584194] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[   57.584820] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[   57.585440] Call Trace:
[   57.585721]  &lt;IRQ&gt;
[   57.585976]  ? __warn+0x7d/0x130
[   57.586323]  ? br_nf_local_in+0x157/0x180 [br_netfilter]
[   57.586811]  ? report_bug+0xf1/0x1c0
[   57.587177]  ? handle_bug+0x3f/0x70
[   57.587539]  ? exc_invalid_op+0x13/0x60
[   57.587929]  ? asm_exc_invalid_op+0x16/0x20
[   57.588336]  ? br_nf_local_in+0x157/0x180 [br_netfilter]
[   57.588825]  nf_hook_slow+0x3d/0xd0
[   57.589188]  ? br_handle_vlan+0x4b/0x110
[   57.589579]  br_pass_frame_up+0xfc/0x150
[   57.589970]  ? br_port_flags_change+0x40/0x40
[   57.590396]  br_handle_frame_finish+0x346/0x5e0
[   57.590837]  ? ipt_do_table+0x32e/0x430
[   57.591221]  ? br_handle_local_finish+0x20/0x20
[   57.591656]  br_nf_hook_thresh+0x4b/0xf0 [br_netfilter]
[   57.592286]  ? br_handle_local_finish+0x20/0x20
[   57.592802]  br_nf_pre_routing_finish+0x178/0x480 [br_netfilter]
[   57.593348]  ? br_handle_local_finish+0x20/0x20
[   57.593782]  ? nf_nat_ipv4_pre_routing+0x25/0x60 [nf_nat]
[   57.594279]  br_nf_pre_routing+0x24c/0x550 [br_netfilter]
[   57.594780]  ? br_nf_hook_thresh+0xf0/0xf0 [br_netfilter]
[   57.595280]  br_handle_frame+0x1f3/0x3d0
[   57.595676]  ? br_handle_local_finish+0x20/0x20
[   57.596118]  ? br_handle_frame_finish+0x5e0/0x5e0
[   57.596566]  __netif_receive_skb_core+0x25b/0xfc0
[   57.597017]  ? __napi_build_skb+0x37/0x40
[   57.597418]  __netif_receive_skb_list_core+0xfb/0x220
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27018/">CVE-2024-27018 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27018">CVE-2024-27018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223809">SUSE bug 1223809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()

nft_unregister_obj() can concurrent with __nft_obj_type_get(),
and there is not any protection when iterate over nf_tables_objects
list in __nft_obj_type_get(). Therefore, there is potential data-race
of nf_tables_objects list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_objects
list in __nft_obj_type_get(), and use rcu_read_lock() in the caller
nft_obj_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223813">SUSE bug 1223813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()

nft_unregister_expr() can concurrent with __nft_expr_type_get(),
and there is not any protection when iterate over nf_tables_expressions
list in __nft_expr_type_get(). Therefore, there is potential data-race
of nf_tables_expressions list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_expressions
list in __nft_expr_type_get(), and use rcu_read_lock() in the caller
nft_expr_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223815">SUSE bug 1223815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27021" ref_url="https://www.suse.com/security/cve/CVE-2024-27021" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: fix LED-related deadlock on module removal

Binding devm_led_classdev_register() to the netdev is problematic
because on module removal we get a RTNL-related deadlock. Fix this
by avoiding the device-managed LED functions.

Note: We can safely call led_classdev_unregister() for a LED even
if registering it failed, because led_classdev_unregister() detects
this and is a no-op in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27021/">CVE-2024-27021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27021">CVE-2024-27021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223730">SUSE bug 1223730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27022" ref_url="https://www.suse.com/security/cve/CVE-2024-27022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fork: defer linking file vma until vma is fully initialized

Thorvald reported a WARNING [1]. And the root cause is below race:

 CPU 1					CPU 2
 fork					hugetlbfs_fallocate
  dup_mmap				 hugetlbfs_punch_hole
   i_mmap_lock_write(mapping);
   vma_interval_tree_insert_after -- Child vma is visible through i_mmap tree.
   i_mmap_unlock_write(mapping);
   hugetlb_dup_vma_private -- Clear vma_lock outside i_mmap_rwsem!
					 i_mmap_lock_write(mapping);
   					 hugetlb_vmdelete_list
					  vma_interval_tree_foreach
					   hugetlb_vma_trylock_write -- Vma_lock is cleared.
   tmp-&gt;vm_ops-&gt;open -- Alloc new vma_lock outside i_mmap_rwsem!
					   hugetlb_vma_unlock_write -- Vma_lock is assigned!!!
					 i_mmap_unlock_write(mapping);

hugetlb_dup_vma_private() and hugetlb_vm_op_open() are called outside
i_mmap_rwsem lock while vma lock can be used in the same time.  Fix this
by deferring linking file vma until vma is fully initialized.  Those vmas
should be initialized first before they can be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27022/">CVE-2024-27022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27022">CVE-2024-27022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223774">SUSE bug 1223774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27023" ref_url="https://www.suse.com/security/cve/CVE-2024-27023" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: Fix missing release of 'active_io' for flush

submit_flushes
 atomic_set(&amp;mddev-&gt;flush_pending, 1);
 rdev_for_each_rcu(rdev, mddev)
  atomic_inc(&amp;mddev-&gt;flush_pending);
  bi-&gt;bi_end_io = md_end_flush
  submit_bio(bi);
                        /* flush io is done first */
                        md_end_flush
                         if (atomic_dec_and_test(&amp;mddev-&gt;flush_pending))
                          percpu_ref_put(&amp;mddev-&gt;active_io)
                          -&gt; active_io is not released

 if (atomic_dec_and_test(&amp;mddev-&gt;flush_pending))
  -&gt; missing release of active_io

For consequence, mddev_suspend() will wait for 'active_io' to be zero
forever.

Fix this problem by releasing 'active_io' in submit_flushes() if
'flush_pending' is decreased to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27023/">CVE-2024-27023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27023">CVE-2024-27023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223776">SUSE bug 1223776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/rds: fix WARNING in rds_conn_connect_if_down

If connection isn't established yet, get_mr() will fail, trigger connection after
get_mr().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223777">SUSE bug 1223777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: null check for nla_nest_start

nla_nest_start() may fail and return NULL. Insert a check and set errno
based on other call sites within the same source code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223778">SUSE bug 1223778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27026" ref_url="https://www.suse.com/security/cve/CVE-2024-27026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: Fix missing reserved tailroom

Use rbi-&gt;len instead of rcd-&gt;len for non-dataring packet.

Found issue:
  XDP_WARN: xdp_update_frame_from_buff(line:278): Driver BUG: missing reserved tailroom
  WARNING: CPU: 0 PID: 0 at net/core/xdp.c:586 xdp_warn+0xf/0x20
  CPU: 0 PID: 0 Comm: swapper/0 Tainted: G        W  O       6.5.1 #1
  RIP: 0010:xdp_warn+0xf/0x20
  ...
  ? xdp_warn+0xf/0x20
  xdp_do_redirect+0x15f/0x1c0
  vmxnet3_run_xdp+0x17a/0x400 [vmxnet3]
  vmxnet3_process_xdp+0xe4/0x760 [vmxnet3]
  ? vmxnet3_tq_tx_complete.isra.0+0x21e/0x2c0 [vmxnet3]
  vmxnet3_rq_rx_complete+0x7ad/0x1120 [vmxnet3]
  vmxnet3_poll_rx_only+0x2d/0xa0 [vmxnet3]
  __napi_poll+0x20/0x180
  net_rx_action+0x177/0x390
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27026/">CVE-2024-27026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27026">CVE-2024-27026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223700">SUSE bug 1223700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27027" ref_url="https://www.suse.com/security/cve/CVE-2024-27027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpll: fix dpll_xa_ref_*_del() for multiple registrations

Currently, if there are multiple registrations of the same pin on the
same dpll device, following warnings are observed:
WARNING: CPU: 5 PID: 2212 at drivers/dpll/dpll_core.c:143 dpll_xa_ref_pin_del.isra.0+0x21e/0x230
WARNING: CPU: 5 PID: 2212 at drivers/dpll/dpll_core.c:223 __dpll_pin_unregister+0x2b3/0x2c0

The problem is, that in both dpll_xa_ref_dpll_del() and
dpll_xa_ref_pin_del() registration is only removed from list in case the
reference count drops to zero. That is wrong, the registration has to
be removed always.

To fix this, remove the registration from the list and free
it unconditionally, instead of doing it only when the ref reference
counter reaches zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27027/">CVE-2024-27027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27027">CVE-2024-27027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223787">SUSE bug 1223787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-mt65xx: Fix NULL pointer access in interrupt handler

The TX buffer in spi_transfer can be a NULL pointer, so the interrupt
handler may end up writing to the invalid memory and cause crashes.

Add a check to trans-&gt;tx_buf before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223788">SUSE bug 1223788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27029" ref_url="https://www.suse.com/security/cve/CVE-2024-27029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix mmhub client id out-of-bounds access

Properly handle cid 0x140.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27029/">CVE-2024-27029 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27029">CVE-2024-27029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223789">SUSE bug 1223789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226184">SUSE bug 1226184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Use separate handlers for interrupts

For PF to AF interrupt vector and VF to AF vector same
interrupt handler is registered which is causing race condition.
When two interrupts are raised to two CPUs at same time
then two cores serve same event corrupting the data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223790">SUSE bug 1223790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27031" ref_url="https://www.suse.com/security/cve/CVE-2024-27031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix nfs_netfs_issue_read() xarray locking for writeback interrupt

The loop inside nfs_netfs_issue_read() currently does not disable
interrupts while iterating through pages in the xarray to submit
for NFS read.  This is not safe though since after taking xa_lock,
another page in the mapping could be processed for writeback inside
an interrupt, and deadlock can occur.  The fix is simple and clean
if we use xa_for_each_range(), which handles the iteration with RCU
while reducing code complexity.

The problem is easily reproduced with the following test:
 mount -o vers=3,fsc 127.0.0.1:/export /mnt/nfs
 dd if=/dev/zero of=/mnt/nfs/file1.bin bs=4096 count=1
 echo 3 &gt; /proc/sys/vm/drop_caches
 dd if=/mnt/nfs/file1.bin of=/dev/null
 umount /mnt/nfs

On the console with a lockdep-enabled kernel a message similar to
the following will be seen:

 ================================
 WARNING: inconsistent lock state
 6.7.0-lockdbg+ #10 Not tainted
 --------------------------------
 inconsistent {IN-SOFTIRQ-W} -&gt; {SOFTIRQ-ON-W} usage.
 test5/1708 [HC0[0]:SC0[0]:HE1:SE1] takes:
 ffff888127baa598 (&amp;xa-&gt;xa_lock#4){+.?.}-{3:3}, at:
nfs_netfs_issue_read+0x1b2/0x4b0 [nfs]
 {IN-SOFTIRQ-W} state was registered at:
   lock_acquire+0x144/0x380
   _raw_spin_lock_irqsave+0x4e/0xa0
   __folio_end_writeback+0x17e/0x5c0
   folio_end_writeback+0x93/0x1b0
   iomap_finish_ioend+0xeb/0x6a0
   blk_update_request+0x204/0x7f0
   blk_mq_end_request+0x30/0x1c0
   blk_complete_reqs+0x7e/0xa0
   __do_softirq+0x113/0x544
   __irq_exit_rcu+0xfe/0x120
   irq_exit_rcu+0xe/0x20
   sysvec_call_function_single+0x6f/0x90
   asm_sysvec_call_function_single+0x1a/0x20
   pv_native_safe_halt+0xf/0x20
   default_idle+0x9/0x20
   default_idle_call+0x67/0xa0
   do_idle+0x2b5/0x300
   cpu_startup_entry+0x34/0x40
   start_secondary+0x19d/0x1c0
   secondary_startup_64_no_verify+0x18f/0x19b
 irq event stamp: 176891
 hardirqs last  enabled at (176891): [&lt;ffffffffa67a0be4&gt;]
_raw_spin_unlock_irqrestore+0x44/0x60
 hardirqs last disabled at (176890): [&lt;ffffffffa67a0899&gt;]
_raw_spin_lock_irqsave+0x79/0xa0
 softirqs last  enabled at (176646): [&lt;ffffffffa515d91e&gt;]
__irq_exit_rcu+0xfe/0x120
 softirqs last disabled at (176633): [&lt;ffffffffa515d91e&gt;]
__irq_exit_rcu+0xfe/0x120

 other info that might help us debug this:
  Possible unsafe locking scenario:

        CPU0
        ----
   lock(&amp;xa-&gt;xa_lock#4);
   &lt;Interrupt&gt;
     lock(&amp;xa-&gt;xa_lock#4);

  *** DEADLOCK ***

 2 locks held by test5/1708:
  #0: ffff888127baa498 (&amp;sb-&gt;s_type-&gt;i_mutex_key#22){++++}-{4:4}, at:
      nfs_start_io_read+0x28/0x90 [nfs]
  #1: ffff888127baa650 (mapping.invalidate_lock#3){.+.+}-{4:4}, at:
      page_cache_ra_unbounded+0xa4/0x280

 stack backtrace:
 CPU: 6 PID: 1708 Comm: test5 Kdump: loaded Not tainted 6.7.0-lockdbg+
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39
04/01/2014
 Call Trace:
  dump_stack_lvl+0x5b/0x90
  mark_lock+0xb3f/0xd20
  __lock_acquire+0x77b/0x3360
  _raw_spin_lock+0x34/0x80
  nfs_netfs_issue_read+0x1b2/0x4b0 [nfs]
  netfs_begin_read+0x77f/0x980 [netfs]
  nfs_netfs_readahead+0x45/0x60 [nfs]
  nfs_readahead+0x323/0x5a0 [nfs]
  read_pages+0xf3/0x5c0
  page_cache_ra_unbounded+0x1c8/0x280
  filemap_get_pages+0x38c/0xae0
  filemap_read+0x206/0x5e0
  nfs_file_read+0xb7/0x140 [nfs]
  vfs_read+0x2a9/0x460
  ksys_read+0xb7/0x140
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27031/">CVE-2024-27031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27031">CVE-2024-27031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223805">SUSE bug 1223805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27032" ref_url="https://www.suse.com/security/cve/CVE-2024-27032" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid potential panic during recovery

During recovery, if FAULT_BLOCK is on, it is possible that
f2fs_reserve_new_block() will return -ENOSPC during recovery,
then it may trigger panic.

Also, if fault injection rate is 1 and only FAULT_BLOCK fault
type is on, it may encounter deadloop in loop of block reservation.

Let's change as below to fix these issues:
- remove bug_on() to avoid panic.
- limit the loop count of block reservation to avoid potential
deadloop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27032/">CVE-2024-27032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27032">CVE-2024-27032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223701">SUSE bug 1223701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27033" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27033" ref_url="https://www.suse.com/security/cve/CVE-2024-27033" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to remove unnecessary f2fs_bug_on() to avoid panic

verify_blkaddr() will trigger panic once we inject fault into
f2fs_is_valid_blkaddr(), fix to remove this unnecessary f2fs_bug_on().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27033/">CVE-2024-27033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27033">CVE-2024-27033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223702">SUSE bug 1223702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27034" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27034" ref_url="https://www.suse.com/security/cve/CVE-2024-27034" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix to cover normal cluster write with cp_rwsem

When we overwrite compressed cluster w/ normal cluster, we should
not unlock cp_rwsem during f2fs_write_raw_pages(), otherwise data
will be corrupted if partial blocks were persisted before CP &amp; SPOR,
due to cluster metadata wasn't updated atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27034/">CVE-2024-27034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27034">CVE-2024-27034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223703">SUSE bug 1223703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27035" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27035" ref_url="https://www.suse.com/security/cve/CVE-2024-27035" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix to guarantee persisting compressed blocks by CP

If data block in compressed cluster is not persisted with metadata
during checkpoint, after SPOR, the data may be corrupted, let's
guarantee to write compressed page by checkpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27035/">CVE-2024-27035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27035">CVE-2024-27035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223704">SUSE bug 1223704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27036" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27036" ref_url="https://www.suse.com/security/cve/CVE-2024-27036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix writeback data corruption

cifs writeback doesn't correctly handle the case where
cifs_extend_writeback() hits a point where it is considering an additional
folio, but this would overrun the wsize - at which point it drops out of
the xarray scanning loop and calls xas_pause().  The problem is that
xas_pause() advances the loop counter - thereby skipping that page.

What needs to happen is for xas_reset() to be called any time we decide we
don't want to process the page we're looking at, but rather send the
request we are building and start a new one.

Fix this by copying and adapting the netfslib writepages code as a
temporary measure, with cifs writeback intending to be offloaded to
netfslib in the near future.

This also fixes the issue with the use of filemap_get_folios_tag() causing
retry of a bunch of pages which the extender already dealt with.

This can be tested by creating, say, a 64K file somewhere not on cifs
(otherwise copy-offload may get underfoot), mounting a cifs share with a
wsize of 64000, copying the file to it and then comparing the original file
and the copy:

        dd if=/dev/urandom of=/tmp/64K bs=64k count=1
        mount //192.168.6.1/test /mnt -o user=...,pass=...,wsize=64000
        cp /tmp/64K /mnt/64K
        cmp /tmp/64K /mnt/64K

Without the fix, the cmp fails at position 64000 (or shortly thereafter).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27036/">CVE-2024-27036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27036">CVE-2024-27036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223810">SUSE bug 1223810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27037" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: zynq: Prevent null pointer dereference caused by kmalloc failure

The kmalloc() in zynq_clk_setup() will return null if the
physical memory has run out. As a result, if we use snprintf()
to write data to the null address, the null pointer dereference
bug will happen.

This patch uses a stack variable to replace the kmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223717">SUSE bug 1223717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: Fix clk_core_get NULL dereference

It is possible for clk_core_get to dereference a NULL in the following
sequence:

clk_core_get()
    of_clk_get_hw_from_clkspec()
        __of_clk_get_hw_from_provider()
            __clk_get_hw()

__clk_get_hw() can return NULL which is dereferenced by clk_core_get() at
hw-&gt;core.

Prior to commit dde4eff47c82 ("clk: Look for parents with clkdev based
clk_lookups") the check IS_ERR_OR_NULL() was performed which would have
caught the NULL.

Reading the description of this function it talks about returning NULL but
that cannot be so at the moment.

Update the function to check for hw before dereferencing it and return NULL
if hw is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223816">SUSE bug 1223816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()

'p_clk' is an array allocated just before the for loop for all clk that
need to be registered.
It is incremented at each loop iteration.

If a clk_register() call fails, 'p_clk' may point to something different
from what should be freed.

The best we can do, is to avoid this wrong release of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223821">SUSE bug 1223821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27040" ref_url="https://www.suse.com/security/cve/CVE-2024-27040" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add 'replay' NULL check in 'edp_set_replay_allow_active()'

In the first if statement, we're checking if 'replay' is NULL. But in
the second if statement, we're not checking if 'replay' is NULL again
before calling replay-&gt;funcs-&gt;replay_set_power_opt().

if (replay == NULL &amp;&amp; force_static)
    return false;

...

if (link-&gt;replay_settings.replay_feature_enabled &amp;&amp;
    replay-&gt;funcs-&gt;replay_set_power_opt) {
	replay-&gt;funcs-&gt;replay_set_power_opt(replay, *power_opts, panel_inst);
	link-&gt;replay_settings.replay_power_opt_active = *power_opts;
}

If 'replay' is NULL, this will cause a null pointer dereference.

Fixes the below found by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:895 edp_set_replay_allow_active() error: we previously assumed 'replay' could be null (see line 887)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27040/">CVE-2024-27040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27040">CVE-2024-27040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223711">SUSE bug 1223711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini()

Since 'adev-&gt;dm.dc' in amdgpu_dm_fini() might turn out to be NULL
before the call to dc_enable_dmub_notifications(), check
beforehand to ensure there will not be a possible NULL-ptr-deref
there.

Also, since commit 1e88eb1b2c25 ("drm/amd/display: Drop
CONFIG_DRM_AMD_DC_HDCP") there are two separate checks for NULL in
'adev-&gt;dm.dc' before dc_deinit_callbacks() and dc_dmub_srv_destroy().
Clean up by combining them all under one 'if'.

Found by Linux Verification Center (linuxtesting.org) with static
analysis tool SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223714">SUSE bug 1223714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27042" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()'

The issue arises when the array 'adev-&gt;vcn.vcn_config' is accessed
before checking if the index 'adev-&gt;vcn.num_vcn_inst' is within the
bounds of the array.

The fix involves moving the bounds check before the array access. This
ensures that 'adev-&gt;vcn.num_vcn_inst' is within the bounds of the array
before it is used as an index.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset 'adev-&gt;vcn.num_vcn_inst' after use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223823">SUSE bug 1223823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27043" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: edia: dvbdev: fix a use-after-free

In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed
in several error-handling paths. However, *pdvbdev is not set to NULL
after dvbdev's deallocation, causing use-after-frees in many places,
for example, in the following call chain:

budget_register
  |-&gt; dvb_dmxdev_init
        |-&gt; dvb_register_device
  |-&gt; dvb_dmxdev_release
        |-&gt; dvb_unregister_device
              |-&gt; dvb_remove_device
                    |-&gt; dvb_device_put
                          |-&gt; kref_put

When calling dvb_unregister_device, dmxdev-&gt;dvbdev (i.e. *pdvbdev in
dvb_register_device) could point to memory that had been freed in
dvb_register_device. Thereafter, this pointer is transferred to
kref_put and triggering a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223825">SUSE bug 1223825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27044" ref_url="https://www.suse.com/security/cve/CVE-2024-27044" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential NULL pointer dereferences in 'dcn10_set_output_transfer_func()'

The 'stream' pointer is used in dcn10_set_output_transfer_func() before
the check if 'stream' is NULL.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn10/dcn10_hwseq.c:1892 dcn10_set_output_transfer_func() warn: variable dereferenced before check 'stream' (see line 1875)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27044/">CVE-2024-27044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27044">CVE-2024-27044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223723">SUSE bug 1223723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()'

Tell snprintf() to store at most 10 bytes in the output buffer
instead of 30.

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223826">SUSE bug 1223826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: handle acti_netdevs allocation failure

The kmalloc_array() in nfp_fl_lag_do_work() will return null, if
the physical memory has run out. As a result, if we dereference
the acti_netdevs, the null pointer dereference bugs will happen.

This patch adds a check to judge whether allocation failure occurs.
If it happens, the delayed work will be rescheduled and try again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223827">SUSE bug 1223827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: fix phy_get_internal_delay accessing an empty array

The phy_get_internal_delay function could try to access to an empty
array in the case that the driver is calling phy_get_internal_delay
without defining delay_values and rx-internal-delay-ps or
tx-internal-delay-ps is defined to 0 in the device-tree.
This will lead to "unable to handle kernel NULL pointer dereference at
virtual address 0". To avoid this kernel oops, the test should be delay
&gt;= 0. As there is already delay &lt; 0 test just before, the test could
only be size == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223828">SUSE bug 1223828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27048" ref_url="https://www.suse.com/security/cve/CVE-2024-27048" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcm80211: handle pmk_op allocation failure

The kzalloc() in brcmf_pmksa_v3_op() will return null if the
physical memory has run out. As a result, if we dereference
the null value, the null pointer dereference bug will happen.

Return -ENOMEM from brcmf_pmksa_v3_op() if kzalloc() fails
for pmk_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27048/">CVE-2024-27048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27048">CVE-2024-27048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223760">SUSE bug 1223760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27049" ref_url="https://www.suse.com/security/cve/CVE-2024-27049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925e: fix use-after-free in free_irq()

From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test
to make sure the shared irq handler should be able to handle the unexpected
event after deregistration. For this case, let's apply MT76_REMOVED flag to
indicate the device was removed and do not run into the resource access
anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27049/">CVE-2024-27049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27049">CVE-2024-27049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223763">SUSE bug 1223763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231063">SUSE bug 1231063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return 0 in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223769">SUSE bug 1223769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work

The workqueue might still be running, when the driver is stopped. To
avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223829">SUSE bug 1223829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix RCU usage in connect path

With lockdep enabled, calls to the connect function from cfg802.11 layer
lead to the following warning:

=============================
WARNING: suspicious RCU usage
6.7.0-rc1-wt+ #333 Not tainted
-----------------------------
drivers/net/wireless/microchip/wilc1000/hif.c:386
suspicious rcu_dereference_check() usage!
[...]
stack backtrace:
CPU: 0 PID: 100 Comm: wpa_supplicant Not tainted 6.7.0-rc1-wt+ #333
Hardware name: Atmel SAMA5
 unwind_backtrace from show_stack+0x18/0x1c
 show_stack from dump_stack_lvl+0x34/0x48
 dump_stack_lvl from wilc_parse_join_bss_param+0x7dc/0x7f4
 wilc_parse_join_bss_param from connect+0x2c4/0x648
 connect from cfg80211_connect+0x30c/0xb74
 cfg80211_connect from nl80211_connect+0x860/0xa94
 nl80211_connect from genl_rcv_msg+0x3fc/0x59c
 genl_rcv_msg from netlink_rcv_skb+0xd0/0x1f8
 netlink_rcv_skb from genl_rcv+0x2c/0x3c
 genl_rcv from netlink_unicast+0x3b0/0x550
 netlink_unicast from netlink_sendmsg+0x368/0x688
 netlink_sendmsg from ____sys_sendmsg+0x190/0x430
 ____sys_sendmsg from ___sys_sendmsg+0x110/0x158
 ___sys_sendmsg from sys_sendmsg+0xe8/0x150
 sys_sendmsg from ret_fast_syscall+0x0/0x1c

This warning is emitted because in the connect path, when trying to parse
target BSS parameters, we dereference a RCU pointer whithout being in RCU
critical section.
Fix RCU dereference usage by moving it to a RCU read critical section. To
avoid wrapping the whole wilc_parse_join_bss_param under the critical
section, just use the critical section to copy ies data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-06-26"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223737">SUSE bug 1223737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27054" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix double module refcount decrement

Once the discipline is associated with the device, deleting the device
takes care of decrementing the module's refcount.  Doing it manually on
this error path causes refcount to artificially decrease on each error
while it should just stay the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223819">SUSE bug 1223819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27055" ref_url="https://www.suse.com/security/cve/CVE-2024-27055" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Don't call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active()

For wq_update_node_max_active(), @off_cpu of -1 indicates that no CPU is
going down. The function was incorrectly calling cpumask_test_cpu() with -1
CPU leading to oopses like the following on some archs:

  Unable to handle kernel paging request at virtual address ffff0002100296e0
  ..
  pc : wq_update_node_max_active+0x50/0x1fc
  lr : wq_update_node_max_active+0x1f0/0x1fc
  ...
  Call trace:
    wq_update_node_max_active+0x50/0x1fc
    apply_wqattrs_commit+0xf0/0x114
    apply_workqueue_attrs_locked+0x58/0xa0
    alloc_workqueue+0x5ac/0x774
    workqueue_init_early+0x460/0x540
    start_kernel+0x258/0x684
    __primary_switched+0xb8/0xc0
  Code: 9100a273 35000d01 53067f00 d0016dc1 (f8607a60)
  ---[ end trace 0000000000000000 ]---
  Kernel panic - not syncing: Attempted to kill the idle task!
  ---[ end Kernel panic - not syncing: Attempted to kill the idle task! ]---

Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27055/">CVE-2024-27055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27055">CVE-2024-27055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223811">SUSE bug 1223811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: ensure offloading TID queue exists

The resume code path assumes that the TX queue for the offloading TID
has been configured. At resume time it then tries to sync the write
pointer as it may have been updated by the firmware.

In the unusual event that no packets have been send on TID 0, the queue
will not have been allocated and this causes a crash. Fix this by
ensuring the queue exist at suspend time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223822">SUSE bug 1223822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27057" ref_url="https://www.suse.com/security/cve/CVE-2024-27057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: ipc4-pcm: Workaround for crashed firmware on system suspend

When the system is suspended while audio is active, the
sof_ipc4_pcm_hw_free() is invoked to reset the pipelines since during
suspend the DSP is turned off, streams will be re-started after resume.

If the firmware crashes during while audio is running (or when we reset
the stream before suspend) then the sof_ipc4_set_multi_pipeline_state()
will fail with IPC error and the state change is interrupted.
This will cause misalignment between the kernel and firmware state on next
DSP boot resulting errors returned by firmware for IPC messages, eventually
failing the audio resume.
On stream close the errors are ignored so the kernel state will be
corrected on the next DSP boot, so the second boot after the DSP panic.

If sof_ipc4_trigger_pipelines() is called from sof_ipc4_pcm_hw_free() then
state parameter is SOF_IPC4_PIPE_RESET and only in this case.

Treat a forced pipeline reset similarly to how we treat a pcm_free by
ignoring error on state sending to allow the kernel's state to be
consistent with the state the firmware will have after the next boot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27057/">CVE-2024-27057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27057">CVE-2024-27057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223831">SUSE bug 1223831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27058" ref_url="https://www.suse.com/security/cve/CVE-2024-27058" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tmpfs: fix race on handling dquot rbtree

A syzkaller reproducer found a race while attempting to remove dquot
information from the rb tree.

Fetching the rb_tree root node must also be protected by the
dqopt-&gt;dqio_sem, otherwise, giving the right timing, shmem_release_dquot()
will trigger a warning because it couldn't find a node in the tree, when
the real reason was the root node changing before the search starts:

Thread 1				Thread 2
- shmem_release_dquot()			- shmem_{acquire,release}_dquot()

- fetch ROOT				- Fetch ROOT

					- acquire dqio_sem
- wait dqio_sem

					- do something, triger a tree rebalance
					- release dqio_sem

- acquire dqio_sem
- start searching for the node, but
  from the wrong location, missing
  the node, and triggering a warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27058/">CVE-2024-27058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27058">CVE-2024-27058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223708">SUSE bug 1223708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command

The isd200 sub-driver in usb-storage uses the HEADS and SECTORS values
in the ATA ID information to calculate cylinder and head values when
creating a CDB for READ or WRITE commands.  The calculation involves
division and modulus operations, which will cause a crash if either of
these values is 0.  While this never happens with a genuine device, it
could happen with a flawed or subversive emulation, as reported by the
syzbot fuzzer.

Protect against this possibility by refusing to bind to the device if
either the ATA_ID_HEADS or ATA_ID_SECTORS value in the device's ID
information is 0.  This requires isd200_Initialization() to return a
negative error code when initialization fails; currently it always
returns 0 (even when there is an error).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223738">SUSE bug 1223738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27060" ref_url="https://www.suse.com/security/cve/CVE-2024-27060" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Fix NULL pointer dereference in tb_port_update_credits()

Olliver reported that his system crashes when plugging in Thunderbolt 1
device:

 BUG: kernel NULL pointer dereference, address: 0000000000000020
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 RIP: 0010:tb_port_do_update_credits+0x1b/0x130 [thunderbolt]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x23/0x70
  ? page_fault_oops+0x171/0x4e0
  ? exc_page_fault+0x7f/0x180
  ? asm_exc_page_fault+0x26/0x30
  ? tb_port_do_update_credits+0x1b/0x130
  ? tb_switch_update_link_attributes+0x83/0xd0
  tb_switch_add+0x7a2/0xfe0
  tb_scan_port+0x236/0x6f0
  tb_handle_hotplug+0x6db/0x900
  process_one_work+0x171/0x340
  worker_thread+0x27b/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xe5/0x120
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x31/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1b/0x30
  &lt;/TASK&gt;

This is due the fact that some Thunderbolt 1 devices only have one lane
adapter. Fix this by checking for the lane 1 before we read its credits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27060/">CVE-2024-27060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27060">CVE-2024-27060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223725">SUSE bug 1223725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27061" ref_url="https://www.suse.com/security/cve/CVE-2024-27061" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ce - Fix use after free in unprepare

sun8i_ce_cipher_unprepare should be called before
crypto_finalize_skcipher_request, because client callbacks may
immediately free memory, that isn't needed anymore. But it will be
used by unprepare after free. Before removing prepare/unprepare
callbacks it was handled by crypto engine in crypto_finalize_request.

Usually that results in a pointer dereference problem during a in
crypto selftest.
 Unable to handle kernel NULL pointer dereference at
                                      virtual address 0000000000000030
 Mem abort info:
   ESR = 0x0000000096000004
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x04: level 0 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=000000004716d000
 [0000000000000030] pgd=0000000000000000, p4d=0000000000000000
 Internal error: Oops: 0000000096000004 [#1] SMP

This problem is detected by KASAN as well.
 ==================================================================
 BUG: KASAN: slab-use-after-free in sun8i_ce_cipher_do_one+0x6e8/0xf80 [sun8i_ce]
 Read of size 8 at addr ffff00000dcdc040 by task 1c15000.crypto-/373

 Hardware name: Pine64 PinePhone (1.2) (DT)
 Call trace:
  dump_backtrace+0x9c/0x128
  show_stack+0x20/0x38
  dump_stack_lvl+0x48/0x60
  print_report+0xf8/0x5d8
  kasan_report+0x90/0xd0
  __asan_load8+0x9c/0xc0
  sun8i_ce_cipher_do_one+0x6e8/0xf80 [sun8i_ce]
  crypto_pump_work+0x354/0x620 [crypto_engine]
  kthread_worker_fn+0x244/0x498
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20

 Allocated by task 379:
  kasan_save_stack+0x3c/0x68
  kasan_set_track+0x2c/0x40
  kasan_save_alloc_info+0x24/0x38
  __kasan_kmalloc+0xd4/0xd8
  __kmalloc+0x74/0x1d0
  alg_test_skcipher+0x90/0x1f0
  alg_test+0x24c/0x830
  cryptomgr_test+0x38/0x60
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20

 Freed by task 379:
  kasan_save_stack+0x3c/0x68
  kasan_set_track+0x2c/0x40
  kasan_save_free_info+0x38/0x60
  __kasan_slab_free+0x100/0x170
  slab_free_freelist_hook+0xd4/0x1e8
  __kmem_cache_free+0x15c/0x290
  kfree+0x74/0x100
  kfree_sensitive+0x80/0xb0
  alg_test_skcipher+0x12c/0x1f0
  alg_test+0x24c/0x830
  cryptomgr_test+0x38/0x60
  kthread+0x168/0x178
  ret_from_fork+0x10/0x20

 The buggy address belongs to the object at ffff00000dcdc000
  which belongs to the cache kmalloc-256 of size 256
 The buggy address is located 64 bytes inside of
  freed 256-byte region [ffff00000dcdc000, ffff00000dcdc100)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27061/">CVE-2024-27061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27061">CVE-2024-27061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223833">SUSE bug 1223833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau: lock the client object tree.

It appears the client object tree has no locking unless I've missed
something else. Fix races around adding/removing client objects,
mostly vram bar mappings.

 4562.099306] general protection fault, probably for non-canonical address 0x6677ed422bceb80c: 0000 [#1] PREEMPT SMP PTI
[ 4562.099314] CPU: 2 PID: 23171 Comm: deqp-vk Not tainted 6.8.0-rc6+ #27
[ 4562.099324] Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021
[ 4562.099330] RIP: 0010:nvkm_object_search+0x1d/0x70 [nouveau]
[ 4562.099503] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 0f 1f 44 00 00 48 89 f8 48 85 f6 74 39 48 8b 87 a0 00 00 00 48 85 c0 74 12 &lt;48&gt; 8b 48 f8 48 39 ce 73 15 48 8b 40 10 48 85 c0 75 ee 48 c7 c0 fe
[ 4562.099506] RSP: 0000:ffffa94cc420bbf8 EFLAGS: 00010206
[ 4562.099512] RAX: 6677ed422bceb814 RBX: ffff98108791f400 RCX: ffff9810f26b8f58
[ 4562.099517] RDX: 0000000000000000 RSI: ffff9810f26b9158 RDI: ffff98108791f400
[ 4562.099519] RBP: ffff9810f26b9158 R08: 0000000000000000 R09: 0000000000000000
[ 4562.099521] R10: ffffa94cc420bc48 R11: 0000000000000001 R12: ffff9810f02a7cc0
[ 4562.099526] R13: 0000000000000000 R14: 00000000000000ff R15: 0000000000000007
[ 4562.099528] FS:  00007f629c5017c0(0000) GS:ffff98142c700000(0000) knlGS:0000000000000000
[ 4562.099534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4562.099536] CR2: 00007f629a882000 CR3: 000000017019e004 CR4: 00000000003706f0
[ 4562.099541] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4562.099542] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4562.099544] Call Trace:
[ 4562.099555]  &lt;TASK&gt;
[ 4562.099573]  ? die_addr+0x36/0x90
[ 4562.099583]  ? exc_general_protection+0x246/0x4a0
[ 4562.099593]  ? asm_exc_general_protection+0x26/0x30
[ 4562.099600]  ? nvkm_object_search+0x1d/0x70 [nouveau]
[ 4562.099730]  nvkm_ioctl+0xa1/0x250 [nouveau]
[ 4562.099861]  nvif_object_map_handle+0xc8/0x180 [nouveau]
[ 4562.099986]  nouveau_ttm_io_mem_reserve+0x122/0x270 [nouveau]
[ 4562.100156]  ? dma_resv_test_signaled+0x26/0xb0
[ 4562.100163]  ttm_bo_vm_fault_reserved+0x97/0x3c0 [ttm]
[ 4562.100182]  ? __mutex_unlock_slowpath+0x2a/0x270
[ 4562.100189]  nouveau_ttm_fault+0x69/0xb0 [nouveau]
[ 4562.100356]  __do_fault+0x32/0x150
[ 4562.100362]  do_fault+0x7c/0x560
[ 4562.100369]  __handle_mm_fault+0x800/0xc10
[ 4562.100382]  handle_mm_fault+0x17c/0x3e0
[ 4562.100388]  do_user_addr_fault+0x208/0x860
[ 4562.100395]  exc_page_fault+0x7f/0x200
[ 4562.100402]  asm_exc_page_fault+0x26/0x30
[ 4562.100412] RIP: 0033:0x9b9870
[ 4562.100419] Code: 85 a8 f7 ff ff 8b 8d 80 f7 ff ff 89 08 e9 18 f2 ff ff 0f 1f 84 00 00 00 00 00 44 89 32 e9 90 fa ff ff 0f 1f 84 00 00 00 00 00 &lt;44&gt; 89 32 e9 f8 f1 ff ff 0f 1f 84 00 00 00 00 00 66 44 89 32 e9 e7
[ 4562.100422] RSP: 002b:00007fff9ba2dc70 EFLAGS: 00010246
[ 4562.100426] RAX: 0000000000000004 RBX: 000000000dd65e10 RCX: 000000fff0000000
[ 4562.100428] RDX: 00007f629a882000 RSI: 00007f629a882000 RDI: 0000000000000066
[ 4562.100432] RBP: 00007fff9ba2e570 R08: 0000000000000000 R09: 0000000123ddf000
[ 4562.100434] R10: 0000000000000001 R11: 0000000000000246 R12: 000000007fffffff
[ 4562.100436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 4562.100446]  &lt;/TASK&gt;
[ 4562.100448] Modules linked in: nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink cmac bnep sunrpc iwlmvm intel_rapl_msr intel_rapl_common snd_sof_pci_intel_cnl x86_pkg_temp_thermal intel_powerclamp snd_sof_intel_hda_common mac80211 coretemp snd_soc_acpi_intel_match kvm_intel snd_soc_acpi snd_soc_hdac_hda snd_sof_pci snd_sof_xtensa_dsp snd_sof_intel_hda_mlink 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223834">SUSE bug 1223834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27063" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27063" ref_url="https://www.suse.com/security/cve/CVE-2024-27063" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: trigger: netdev: Fix kernel panic on interface rename trig notify

Commit d5e01266e7f5 ("leds: trigger: netdev: add additional specific link
speed mode") in the various changes, reworked the way to set the LINKUP
mode in commit cee4bd16c319 ("leds: trigger: netdev: Recheck
NETDEV_LED_MODE_LINKUP on dev rename") and moved it to a generic function.

This changed the logic where, in the previous implementation the dev
from the trigger event was used to check if the carrier was ok, but in
the new implementation with the generic function, the dev in
trigger_data is used instead.

This is problematic and cause a possible kernel panic due to the fact
that the dev in the trigger_data still reference the old one as the
new one (passed from the trigger event) still has to be hold and saved
in the trigger_data struct (done in the NETDEV_REGISTER case).

On calling of get_device_state(), an invalid net_dev is used and this
cause a kernel panic.

To handle this correctly, move the call to get_device_state() after the
new net_dev is correctly set in trigger_data (in the NETDEV_REGISTER
case) and correctly parse the new dev.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27063/">CVE-2024-27063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27063">CVE-2024-27063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223835">SUSE bug 1223835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27064" ref_url="https://www.suse.com/security/cve/CVE-2024-27064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix a memory leak in nf_tables_updchain

If nft_netdev_register_hooks() fails, the memory associated with
nft_stats is not freed, causing a memory leak.

This patch fixes it by moving nft_stats_alloc() down after
nft_netdev_register_hooks() succeeds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27064/">CVE-2024-27064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27064">CVE-2024-27064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223740">SUSE bug 1223740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not compare internal table flags on updates

Restore skipping transaction if table update does not modify flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223836">SUSE bug 1223836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27066" ref_url="https://www.suse.com/security/cve/CVE-2024-27066" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio: packed: fix unmap leak for indirect desc table

When use_dma_api and premapped are true, then the do_unmap is false.

Because the do_unmap is false, vring_unmap_extra_packed is not called by
detach_buf_packed.

  if (unlikely(vq-&gt;do_unmap)) {
                curr = id;
                for (i = 0; i &lt; state-&gt;num; i++) {
                        vring_unmap_extra_packed(vq,
                                                 &amp;vq-&gt;packed.desc_extra[curr]);
                        curr = vq-&gt;packed.desc_extra[curr].next;
                }
  }

So the indirect desc table is not unmapped. This causes the unmap leak.

So here, we check vq-&gt;use_dma_api instead. Synchronously, dma info is
updated based on use_dma_api judgment

This bug does not occur, because no driver use the premapped with
indirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27066/">CVE-2024-27066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27066">CVE-2024-27066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223817">SUSE bug 1223817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27067" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27067" ref_url="https://www.suse.com/security/cve/CVE-2024-27067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/evtchn: avoid WARN() when unbinding an event channel

When unbinding a user event channel, the related handler might be
called a last time in case the kernel was built with
CONFIG_DEBUG_SHIRQ. This might cause a WARN() in the handler.

Avoid that by adding an "unbinding" flag to struct user_event which
will short circuit the handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27067/">CVE-2024-27067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27067">CVE-2024-27067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223739">SUSE bug 1223739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27068" ref_url="https://www.suse.com/security/cve/CVE-2024-27068" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/mediatek/lvts_thermal: Fix a memory leak in an error handling path

If devm_krealloc() fails, then 'efuse' is leaking.
So free it to avoid a leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27068/">CVE-2024-27068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27068">CVE-2024-27068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223808">SUSE bug 1223808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27069" ref_url="https://www.suse.com/security/cve/CVE-2024-27069" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: relax WARN_ON in ovl_verify_area()

syzbot hit an assertion in copy up data loop which looks like it is
the result of a lower file whose size is being changed underneath
overlayfs.

This type of use case is documented to cause undefined behavior, so
returning EIO error for the copy up makes sense, but it should not be
causing a WARN_ON assertion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-05-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27069/">CVE-2024-27069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27069">CVE-2024-27069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223818">SUSE bug 1223818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27070" ref_url="https://www.suse.com/security/cve/CVE-2024-27070" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid use-after-free issue in f2fs_filemap_fault

syzbot reports a f2fs bug as below:

BUG: KASAN: slab-use-after-free in f2fs_filemap_fault+0xd1/0x2c0 fs/f2fs/file.c:49
Read of size 8 at addr ffff88807bb22680 by task syz-executor184/5058

CPU: 0 PID: 5058 Comm: syz-executor184 Not tainted 6.7.0-syzkaller-09928-g052d534373b7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e7/0x2d0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x163/0x540 mm/kasan/report.c:488
 kasan_report+0x142/0x170 mm/kasan/report.c:601
 f2fs_filemap_fault+0xd1/0x2c0 fs/f2fs/file.c:49
 __do_fault+0x131/0x450 mm/memory.c:4376
 do_shared_fault mm/memory.c:4798 [inline]
 do_fault mm/memory.c:4872 [inline]
 do_pte_missing mm/memory.c:3745 [inline]
 handle_pte_fault mm/memory.c:5144 [inline]
 __handle_mm_fault+0x23b7/0x72b0 mm/memory.c:5285
 handle_mm_fault+0x27e/0x770 mm/memory.c:5450
 do_user_addr_fault arch/x86/mm/fault.c:1364 [inline]
 handle_page_fault arch/x86/mm/fault.c:1507 [inline]
 exc_page_fault+0x456/0x870 arch/x86/mm/fault.c:1563
 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:570

The root cause is: in f2fs_filemap_fault(), vmf-&gt;vma may be not alive after
filemap_fault(), so it may cause use-after-free issue when accessing
vmf-&gt;vma-&gt;vm_flags in trace_f2fs_filemap_fault(). So it needs to keep vm_flags
in separated temporary variable for tracepoint use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27070/">CVE-2024-27070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27070">CVE-2024-27070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223706">SUSE bug 1223706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27071" ref_url="https://www.suse.com/security/cve/CVE-2024-27071" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

backlight: hx8357: Fix potential NULL pointer dereference

The "im" pins are optional. Add missing check in the hx8357_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27071/">CVE-2024-27071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27071">CVE-2024-27071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223734">SUSE bug 1223734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usbtv: Remove useless locks in usbtv_video_free()

Remove locks calls in usbtv_video_free() because
are useless and may led to a deadlock as reported here:
https://syzkaller.appspot.com/x/bisect.txt?x=166dc872180000
Also remove usbtv_stop() call since it will be called when
unregistering the device.

Before 'c838530d230b' this issue would only be noticed if you
disconnect while streaming and now it is noticeable even when
disconnecting while not streaming.


[hverkuil: fix minor spelling mistake in log message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223837">SUSE bug 1223837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ttpci: fix two memleaks in budget_av_attach

When saa7146_register_device and saa7146_vv_init fails, budget_av_attach
should free the resources it allocates, like the error-handling of
ttpci_budget_init does. Besides, there are two fixme comment refers to
such deallocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223843">SUSE bug 1223843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: go7007: fix a memleak in go7007_load_encoder

In go7007_load_encoder, bounce(i.e. go-&gt;boot_fw), is allocated without
a deallocation thereafter. After the following call chain:

saa7134_go7007_init
  |-&gt; go7007_boot_encoder
        |-&gt; go7007_load_encoder
  |-&gt; kfree(go)

go is freed and thus bounce is leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223844">SUSE bug 1223844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: avoid stack overflow warnings with clang

A previous patch worked around a KASAN issue in stv0367, now a similar
problem showed up with clang:

drivers/media/dvb-frontends/stv0367.c:1222:12: error: stack frame size (3624) exceeds limit (2048) in 'stv0367ter_set_frontend' [-Werror,-Wframe-larger-than]
 1214 | static int stv0367ter_set_frontend(struct dvb_frontend *fe)

Rework the stv0367_writereg() function to be simpler and mark both
register access functions as noinline_for_stack so the temporary
i2c_msg structures do not get duplicated on the stack when KASAN_STACK
is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-04"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223842">SUSE bug 1223842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak

Free the memory allocated in v4l2_ctrl_handler_init on release.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223779">SUSE bug 1223779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity

The entity-&gt;name (i.e. name) is allocated in v4l2_m2m_register_entity
but isn't freed in its following error-handling paths. This patch
adds such deallocation to prevent memleak of entity-&gt;name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223780">SUSE bug 1223780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-tpg: fix some memleaks in tpg_alloc

In tpg_alloc, resources should be deallocated in each and every
error-handling paths, since they are allocated in for statements.
Otherwise there would be memleaks because tpg_free is called only when
tpg_alloc return 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223781">SUSE bug 1223781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix NULL domain on device release

In the kdump kernel, the IOMMU operates in deferred_attach mode. In this
mode, info-&gt;domain may not yet be assigned by the time the release_device
function is called. It leads to the following crash in the crash kernel:

    BUG: kernel NULL pointer dereference, address: 000000000000003c
    ...
    RIP: 0010:do_raw_spin_lock+0xa/0xa0
    ...
    _raw_spin_lock_irqsave+0x1b/0x30
    intel_iommu_release_device+0x96/0x170
    iommu_deinit_device+0x39/0xf0
    __iommu_group_remove_device+0xa0/0xd0
    iommu_bus_notifier+0x55/0xb0
    notifier_call_chain+0x5a/0xd0
    blocking_notifier_call_chain+0x41/0x60
    bus_notify+0x34/0x50
    device_del+0x269/0x3d0
    pci_remove_bus_device+0x77/0x100
    p2sb_bar+0xae/0x1d0
    ...
    i801_probe+0x423/0x740

Use the release_domain mechanism to fix it. The scalable mode context
entry which is not part of release domain should be cleared in
release_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223742">SUSE bug 1223742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27080" ref_url="https://www.suse.com/security/cve/CVE-2024-27080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race when detecting delalloc ranges during fiemap

For fiemap we recently stopped locking the target extent range for the
whole duration of the fiemap call, in order to avoid a deadlock in a
scenario where the fiemap buffer happens to be a memory mapped range of
the same file. This use case is very unlikely to be useful in practice but
it may be triggered by fuzz testing (syzbot, etc).

This however introduced a race that makes us miss delalloc ranges for
file regions that are currently holes, so the caller of fiemap will not
be aware that there's data for some file regions. This can be quite
serious for some use cases - for example in coreutils versions before 9.0,
the cp program used fiemap to detect holes and data in the source file,
copying only regions with data (extents or delalloc) from the source file
to the destination file in order to preserve holes (see the documentation
for its --sparse command line option). This means that if cp was used
with a source file that had delalloc in a hole, the destination file could
end up without that data, which is effectively a data loss issue, if it
happened to hit the race described below.

The race happens like this:

1) Fiemap is called, without the FIEMAP_FLAG_SYNC flag, for a file that
   has delalloc in the file range [64M, 65M[, which is currently a hole;

2) Fiemap locks the inode in shared mode, then starts iterating the
   inode's subvolume tree searching for file extent items, without having
   the whole fiemap target range locked in the inode's io tree - the
   change introduced recently by commit b0ad381fa769 ("btrfs: fix
   deadlock with fiemap and extent locking"). It only locks ranges in
   the io tree when it finds a hole or prealloc extent since that
   commit;

3) Note that fiemap clones each leaf before using it, and this is to
   avoid deadlocks when locking a file range in the inode's io tree and
   the fiemap buffer is memory mapped to some file, because writing
   to the page with btrfs_page_mkwrite() will wait on any ordered extent
   for the page's range and the ordered extent needs to lock the range
   and may need to modify the same leaf, therefore leading to a deadlock
   on the leaf;

4) While iterating the file extent items in the cloned leaf before
   finding the hole in the range [64M, 65M[, the delalloc in that range
   is flushed and its ordered extent completes - meaning the corresponding
   file extent item is in the inode's subvolume tree, but not present in
   the cloned leaf that fiemap is iterating over;

5) When fiemap finds the hole in the [64M, 65M[ range by seeing the gap in
   the cloned leaf (or a file extent item with disk_bytenr == 0 in case
   the NO_HOLES feature is not enabled), it will lock that file range in
   the inode's io tree and then search for delalloc by checking for the
   EXTENT_DELALLOC bit in the io tree for that range and ordered extents
   (with btrfs_find_delalloc_in_range()). But it finds nothing since the
   delalloc in that range was already flushed and the ordered extent
   completed and is gone - as a result fiemap will not report that there's
   delalloc or an extent for the range [64M, 65M[, so user space will be
   mislead into thinking that there's a hole in that range.

This could actually be sporadically triggered with test case generic/094
from fstests, which reports a missing extent/delalloc range like this:

  generic/094 2s ... - output mismatch (see /home/fdmanana/git/hub/xfstests/results//generic/094.out.bad)
      --- tests/generic/094.out	2020-06-10 19:29:03.830519425 +0100
      +++ /home/fdmanana/git/hub/xfstests/results//generic/094.out.bad	2024-02-28 11:00:00.381071525 +0000
      @@ -1,3 +1,9 @@
       QA output created by 094
       fiemap run with sync
       fiemap run without sync
      +ERROR: couldn't find extent at 7
      +map is 'HHDDHPPDPHPH'
      +logical: [       5..       6] phys:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27080/">CVE-2024-27080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27080">CVE-2024-27080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223782">SUSE bug 1223782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27388" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: fix some memleaks in gssx_dec_option_array

The creds and oa-&gt;data need to be freed in the error-handling paths after
their allocation. So this patch add these deallocations in the
corresponding paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223744">SUSE bug 1223744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27389</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27389" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore: inode: Only d_invalidate() is needed

Unloading a modular pstore backend with records in pstorefs would
trigger the dput() double-drop warning:

  WARNING: CPU: 0 PID: 2569 at fs/dcache.c:762 dput.part.0+0x3f3/0x410

Using the combo of d_drop()/dput() (as mentioned in
Documentation/filesystems/vfs.rst) isn't the right approach here, and
leads to the reference counting problem seen above. Use d_invalidate()
and update the code to not bother checking for error codes that can
never happen.

---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27390" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27390" ref_url="https://www.suse.com/security/cve/CVE-2024-27390" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down()

As discussed in the past (commit 2d3916f31891 ("ipv6: fix skb drops
in igmp6_event_query() and igmp6_event_report()")) I think the
synchronize_net() call in ipv6_mc_down() is not needed.

Under load, synchronize_net() can last between 200 usec and 5 ms.

KASAN seems to agree as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27390/">CVE-2024-27390 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27390">CVE-2024-27390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223707">SUSE bug 1223707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27391" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27391" ref_url="https://www.suse.com/security/cve/CVE-2024-27391" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: do not realloc workqueue everytime an interface is added

Commit 09ed8bfc5215 ("wilc1000: Rename workqueue from "WILC_wq" to
"NETDEV-wq"") moved workqueue creation in wilc_netdev_ifc_init in order to
set the interface name in the workqueue name. However, while the driver
needs only one workqueue, the wilc_netdev_ifc_init is called each time we
add an interface over a phy, which in turns overwrite the workqueue with a
new one. This can be observed with the following commands:

for i in $(seq 0 10)
do
  iw phy phy0 interface add wlan1 type managed
  iw dev wlan1 del
done
ps -eo pid,comm|grep wlan

 39 kworker/R-wlan0
 98 kworker/R-wlan1
102 kworker/R-wlan1
105 kworker/R-wlan1
108 kworker/R-wlan1
111 kworker/R-wlan1
114 kworker/R-wlan1
117 kworker/R-wlan1
120 kworker/R-wlan1
123 kworker/R-wlan1
126 kworker/R-wlan1
129 kworker/R-wlan1

Fix this leakage by putting back hif_workqueue allocation in
wilc_cfg80211_init. Regarding the workqueue name, it is indeed relevant to
set it lowercase, however it is not  attached to a specific netdev, so
enforcing netdev name in the name is not so relevant. Still, enrich the
name with the wiphy name to make it clear which phy is using the workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27391/">CVE-2024-27391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27391">CVE-2024-27391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223709">SUSE bug 1223709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27392</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27392" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27392" ref_url="https://www.suse.com/security/cve/CVE-2024-27392" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: host: fix double-free of struct nvme_id_ns in ns_update_nuse()

When nvme_identify_ns() fails, it frees the pointer to the struct
nvme_id_ns before it returns. However, ns_update_nuse() calls kfree()
for the pointer even when nvme_identify_ns() fails. This results in
KASAN double-free, which was observed with blktests nvme/045 with
proposed patches [1] on the kernel v6.8-rc7. Fix the double-free by
skipping kfree() when nvme_identify_ns() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27392/">CVE-2024-27392 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27392">CVE-2024-27392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223713">SUSE bug 1223713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27393</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Add missing skb_mark_for_recycle

Notice that skb_mark_for_recycle() is introduced later than fixes tag in
commit 6a5bcd84e886 ("page_pool: Allow drivers to hint on SKB recycling").

It is believed that fixes tag were missing a call to page_pool_release_page()
between v5.9 to v5.14, after which is should have used skb_mark_for_recycle().
Since v6.6 the call page_pool_release_page() were removed (in
commit 535b9c61bdef ("net: page_pool: hide page_pool_release_page()")
and remaining callers converted (in commit 6bfef2ec0172 ("Merge branch
'net-page_pool-remove-page_pool_release_page'")).

This leak became visible in v6.8 via commit dba1b8a7ab68 ("mm/page_pool: catch
page_pool memory leaks").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224076">SUSE bug 1224076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27394</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27394" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27394" ref_url="https://www.suse.com/security/cve/CVE-2024-27394" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix Use-After-Free in tcp_ao_connect_init

Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal
of tcp_ao_connect_init, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.

To prevent this, it should be changed to hlist_for_each_entry_safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-11"/>
	<updated date="2024-05-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27394/">CVE-2024-27394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27394">CVE-2024-27394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224097">SUSE bug 1224097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27395</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27395" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: Fix Use-After-Free in ovs_ct_exit

Since kfree_rcu, which is called in the hlist_for_each_entry_rcu traversal
of ovs_ct_limit_exit, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.

To prevent this, it should be changed to hlist_for_each_entry_safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-11"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224098">SUSE bug 1224098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27396</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27396" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gtp: Fix Use-After-Free in gtp_dellink

Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal
of gtp_dellink, is not part of the RCU read critical section, it
is possible that the RCU grace period will pass during the traversal and
the key will be free.

To prevent this, it should be changed to hlist_for_each_entry_safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-11"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224096">SUSE bug 1224096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27398</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout

When the sco connection is established and then, the sco socket
is releasing, timeout_work will be scheduled to judge whether
the sco disconnection is timeout. The sock will be deallocated
later, but it is dereferenced again in sco_sock_timeout. As a
result, the use-after-free bugs will happen. The root cause is
shown below:

    Cleanup Thread               |      Worker Thread
sco_sock_release                 |
  sco_sock_close                 |
    __sco_sock_close             |
      sco_sock_set_timer         |
        schedule_delayed_work    |
  sco_sock_kill                  |    (wait a time)
    sock_put(sk) //FREE          |  sco_sock_timeout
                                 |    sock_hold(sk) //USE

The KASAN report triggered by POC is shown below:

[   95.890016] ==================================================================
[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0
[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7
...
[   95.890755] Workqueue: events sco_sock_timeout
[   95.890755] Call Trace:
[   95.890755]  &lt;TASK&gt;
[   95.890755]  dump_stack_lvl+0x45/0x110
[   95.890755]  print_address_description+0x78/0x390
[   95.890755]  print_report+0x11b/0x250
[   95.890755]  ? __virt_addr_valid+0xbe/0xf0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_report+0x139/0x170
[   95.890755]  ? update_load_avg+0xe5/0x9f0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_check_range+0x2c3/0x2e0
[   95.890755]  sco_sock_timeout+0x5e/0x1c0
[   95.890755]  process_one_work+0x561/0xc50
[   95.890755]  worker_thread+0xab2/0x13c0
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  kthread+0x279/0x300
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork+0x34/0x60
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork_asm+0x11/0x20
[   95.890755]  &lt;/TASK&gt;
[   95.890755]
[   95.890755] Allocated by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  __kasan_kmalloc+0x86/0x90
[   95.890755]  __kmalloc+0x17f/0x360
[   95.890755]  sk_prot_alloc+0xe1/0x1a0
[   95.890755]  sk_alloc+0x31/0x4e0
[   95.890755]  bt_sock_alloc+0x2b/0x2a0
[   95.890755]  sco_sock_create+0xad/0x320
[   95.890755]  bt_sock_create+0x145/0x320
[   95.890755]  __sock_create+0x2e1/0x650
[   95.890755]  __sys_socket+0xd0/0x280
[   95.890755]  __x64_sys_socket+0x75/0x80
[   95.890755]  do_syscall_64+0xc4/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] Freed by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  kasan_save_free_info+0x40/0x50
[   95.890755]  poison_slab_object+0x118/0x180
[   95.890755]  __kasan_slab_free+0x12/0x30
[   95.890755]  kfree+0xb2/0x240
[   95.890755]  __sk_destruct+0x317/0x410
[   95.890755]  sco_sock_release+0x232/0x280
[   95.890755]  sock_close+0xb2/0x210
[   95.890755]  __fput+0x37f/0x770
[   95.890755]  task_work_run+0x1ae/0x210
[   95.890755]  get_signal+0xe17/0xf70
[   95.890755]  arch_do_signal_or_restart+0x3f/0x520
[   95.890755]  syscall_exit_to_user_mode+0x55/0x120
[   95.890755]  do_syscall_64+0xd1/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] The buggy address belongs to the object at ffff88800c388000
[   95.890755]  which belongs to the cache kmalloc-1k of size 1024
[   95.890755] The buggy address is located 128 bytes inside of
[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)
[   95.890755]
[   95.890755] The buggy address belongs to the physical page:
[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388
[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   95.890755] ano
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225013">SUSE bug 1225013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27399</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27399" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout

There is a race condition between l2cap_chan_timeout() and
l2cap_chan_del(). When we use l2cap_chan_del() to delete the
channel, the chan-&gt;conn will be set to null. But the conn could
be dereferenced again in the mutex_lock() of l2cap_chan_timeout().
As a result the null pointer dereference bug will happen. The
KASAN report triggered by POC is shown below:

[  472.074580] ==================================================================
[  472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0
[  472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7
[  472.075308]
[  472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36
[  472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4
[  472.075308] Workqueue: events l2cap_chan_timeout
[  472.075308] Call Trace:
[  472.075308]  &lt;TASK&gt;
[  472.075308]  dump_stack_lvl+0x137/0x1a0
[  472.075308]  print_report+0x101/0x250
[  472.075308]  ? __virt_addr_valid+0x77/0x160
[  472.075308]  ? mutex_lock+0x68/0xc0
[  472.075308]  kasan_report+0x139/0x170
[  472.075308]  ? mutex_lock+0x68/0xc0
[  472.075308]  kasan_check_range+0x2c3/0x2e0
[  472.075308]  mutex_lock+0x68/0xc0
[  472.075308]  l2cap_chan_timeout+0x181/0x300
[  472.075308]  process_one_work+0x5d2/0xe00
[  472.075308]  worker_thread+0xe1d/0x1660
[  472.075308]  ? pr_cont_work+0x5e0/0x5e0
[  472.075308]  kthread+0x2b7/0x350
[  472.075308]  ? pr_cont_work+0x5e0/0x5e0
[  472.075308]  ? kthread_blkcg+0xd0/0xd0
[  472.075308]  ret_from_fork+0x4d/0x80
[  472.075308]  ? kthread_blkcg+0xd0/0xd0
[  472.075308]  ret_from_fork_asm+0x11/0x20
[  472.075308]  &lt;/TASK&gt;
[  472.075308] ==================================================================
[  472.094860] Disabling lock debugging due to kernel taint
[  472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158
[  472.096136] #PF: supervisor write access in kernel mode
[  472.096136] #PF: error_code(0x0002) - not-present page
[  472.096136] PGD 0 P4D 0
[  472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI
[  472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G    B              6.9.0-rc5-00356-g78c0094a146b #36
[  472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4
[  472.096136] Workqueue: events l2cap_chan_timeout
[  472.096136] RIP: 0010:mutex_lock+0x88/0xc0
[  472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88
[  472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246
[  472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865
[  472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78
[  472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f
[  472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000
[  472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00
[  472.096136] FS:  0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000
[  472.096136] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0
[  472.096136] Call Trace:
[  472.096136]  &lt;TASK&gt;
[  472.096136]  ? __die_body+0x8d/0xe0
[  472.096136]  ? page_fault_oops+0x6b8/0x9a0
[  472.096136]  ? kernelmode_fixup_or_oops+0x20c/0x2a0
[  472.096136]  ? do_user_addr_fault+0x1027/0x1340
[  472.096136]  ? _printk+0x7a/0xa0
[  472.096136]  ? mutex_lock+0x68/0xc0
[  472.096136]  ? add_taint+0x42/0xd0
[  472.096136]  ? exc_page_fault+0x6a/0x1b0
[  472.096136]  ? asm_exc_page_fault+0x26/0x30
[  472.096136]  ? mutex_lock+0x75/0xc0
[  472.096136]  ? mutex_lock+0x88/0xc0
[  472.096136]  ? mutex_lock+0x75/0xc0
[  472.096136]  l2cap_chan_timeo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224177">SUSE bug 1224177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27400</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27400" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2

This reverts drm/amdgpu: fix ftrace event amdgpu_bo_move always move
on same heap. The basic problem here is that after the move the old
location is simply not available any more.

Some fixes were suggested, but essentially we should call the move
notification before actually moving things because only this way we have
the correct order for DMA-buf and VM move notifications as well.

Also rework the statistic handling so that we don't update the eviction
counter before the move.

v2: add missing NULL check
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224180">SUSE bug 1224180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27402</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27402" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phonet/pep: fix racy skb_queue_empty() use

The receive queues are protected by their respective spin-lock, not
the socket lock. This could lead to skb_peek() unexpectedly
returning NULL or a pointer to an already dequeued socket buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224414">SUSE bug 1224414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27403</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_flow_offload: reset dst in route object after setting up flow

dst is transferred to the flow object, route object does not own it
anymore.  Reset dst in route object, otherwise if flow_offload_add()
fails, error path releases dst twice, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224415">SUSE bug 1224415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27404</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27404" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27404" ref_url="https://www.suse.com/security/cve/CVE-2024-27404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix data races on remote_id

Similar to the previous patch, address the data race on
remote_id, adding the suitable ONCE annotations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27404/">CVE-2024-27404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27404">CVE-2024-27404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224422">SUSE bug 1224422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27405</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27405" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs

It is observed sometimes when tethering is used over NCM with Windows 11
as host, at some instances, the gadget_giveback has one byte appended at
the end of a proper NTB. When the NTB is parsed, unwrap call looks for
any leftover bytes in SKB provided by u_ether and if there are any pending
bytes, it treats them as a separate NTB and parses it. But in case the
second NTB (as per unwrap call) is faulty/corrupt, all the datagrams that
were parsed properly in the first NTB and saved in rx_list are dropped.

Adding a few custom traces showed the following:
[002] d..1  7828.532866: dwc3_gadget_giveback: ep1out:
req 000000003868811a length 1025/16384 zsI ==&gt; 0
[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb toprocess: 1025
[002] d..1  7828.532867: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342
[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb seq: 0xce67
[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x400
[002] d..1  7828.532868: ncm_unwrap_ntb: K: ncm_unwrap_ntb ndp_len: 0x10
[002] d..1  7828.532869: ncm_unwrap_ntb: K: Parsed NTB with 1 frames

In this case, the giveback is of 1025 bytes and block length is 1024.
The rest 1 byte (which is 0x00) won't be parsed resulting in drop of
all datagrams in rx_list.

Same is case with packets of size 2048:
[002] d..1  7828.557948: dwc3_gadget_giveback: ep1out:
req 0000000011dfd96e length 2049/16384 zsI ==&gt; 0
[002] d..1  7828.557949: ncm_unwrap_ntb: K: ncm_unwrap_ntb nth: 1751999342
[002] d..1  7828.557950: ncm_unwrap_ntb: K: ncm_unwrap_ntb blk_len: 0x800

Lecroy shows one byte coming in extra confirming that the byte is coming
in from PC:

 Transfer 2959 - Bytes Transferred(1025)  Timestamp((18.524 843 590)
 - Transaction 8391 - Data(1025 bytes) Timestamp(18.524 843 590)
 --- Packet 4063861
       Data(1024 bytes)
       Duration(2.117us) Idle(14.700ns) Timestamp(18.524 843 590)
 --- Packet 4063863
       Data(1 byte)
       Duration(66.160ns) Time(282.000ns) Timestamp(18.524 845 722)

According to Windows driver, no ZLP is needed if wBlockLength is non-zero,
because the non-zero wBlockLength has already told the function side the
size of transfer to be expected. However, there are in-market NCM devices
that rely on ZLP as long as the wBlockLength is multiple of wMaxPacketSize.
To deal with such devices, it pads an extra 0 at end so the transfer is no
longer multiple of wMaxPacketSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224423">SUSE bug 1224423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27406</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27406" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27406" ref_url="https://www.suse.com/security/cve/CVE-2024-27406" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/Kconfig.debug: TEST_IOV_ITER depends on MMU

Trying to run the iov_iter unit test on a nommu system such as the qemu
kc705-nommu emulation results in a crash.

    KTAP version 1
    # Subtest: iov_iter
    # module: kunit_iov_iter
    1..9
BUG: failure at mm/nommu.c:318/vmap()!
Kernel panic - not syncing: BUG!

The test calls vmap() directly, but vmap() is not supported on nommu
systems, causing the crash.  TEST_IOV_ITER therefore needs to depend on
MMU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-05-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27406/">CVE-2024-27406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27406">CVE-2024-27406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224425">SUSE bug 1224425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27407</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27407" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27407" ref_url="https://www.suse.com/security/cve/CVE-2024-27407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fixed overflow check in mi_enum_attr()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27407/">CVE-2024-27407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27407">CVE-2024-27407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224429">SUSE bug 1224429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27408" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27408" ref_url="https://www.suse.com/security/cve/CVE-2024-27408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup

The Linked list element and pointer are not stored in the same memory as
the eDMA controller register. If the doorbell register is toggled before
the full write of the linked list a race condition error will occur.
In remote setup we can only use a readl to the memory to assure the full
write has occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27408/">CVE-2024-27408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27408">CVE-2024-27408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224430">SUSE bug 1224430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27409</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27409" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27409" ref_url="https://www.suse.com/security/cve/CVE-2024-27409" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: dw-edma: HDMA: Add sync read before starting the DMA transfer in remote setup

The Linked list element and pointer are not stored in the same memory as
the HDMA controller register. If the doorbell register is toggled before
the full write of the linked list a race condition error will occur.
In remote setup we can only use a readl to the memory to assure the full
write has occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-05-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27409/">CVE-2024-27409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27409">CVE-2024-27409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224431">SUSE bug 1224431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27410</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27410" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: reject iftype change with mesh ID change

It's currently possible to change the mesh ID when the
interface isn't yet in mesh mode, at the same time as
changing it into mesh mode. This leads to an overwrite
of data in the wdev-&gt;u union for the interface type it
currently has, causing cfg80211_change_iface() to do
wrong things when switching.

We could probably allow setting an interface to mesh
while setting the mesh ID at the same time by doing a
different order of operations here, but realistically
there's no userspace that's going to do this, so just
disallow changes in iftype when setting mesh ID.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224432">SUSE bug 1224432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27411</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27411" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27411" ref_url="https://www.suse.com/security/cve/CVE-2024-27411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: keep DMA buffers required for suspend/resume

Nouveau deallocates a few buffers post GPU init which are required for GPU suspend/resume to function correctly.
This is likely not as big an issue on systems where the NVGPU is the only GPU, but on multi-GPU set ups it leads to a regression where the kernel module errors and results in a system-wide rendering freeze.

This commit addresses that regression by moving the two buffers required for suspend and resume to be deallocated at driver unload instead of post init.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27411/">CVE-2024-27411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27411">CVE-2024-27411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224433">SUSE bug 1224433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27412</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27412" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: bq27xxx-i2c: Do not free non existing IRQ

The bq27xxx i2c-client may not have an IRQ, in which case
client-&gt;irq will be 0. bq27xxx_battery_i2c_probe() already has
an if (client-&gt;irq) check wrapping the request_threaded_irq().

But bq27xxx_battery_i2c_remove() unconditionally calls
free_irq(client-&gt;irq) leading to:

[  190.310742] ------------[ cut here ]------------
[  190.310843] Trying to free already-free IRQ 0
[  190.310861] WARNING: CPU: 2 PID: 1304 at kernel/irq/manage.c:1893 free_irq+0x1b8/0x310

Followed by a backtrace when unbinding the driver. Add
an if (client-&gt;irq) to bq27xxx_battery_i2c_remove() mirroring
probe() to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224437">SUSE bug 1224437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27413</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27413" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/capsule-loader: fix incorrect allocation size

gcc-14 notices that the allocation with sizeof(void) on 32-bit architectures
is not enough for a 64-bit phys_addr_t:

drivers/firmware/efi/capsule-loader.c: In function 'efi_capsule_open':
drivers/firmware/efi/capsule-loader.c:295:24: error: allocation of insufficient size '4' for type 'phys_addr_t' {aka 'long long unsigned int'} with size '8' [-Werror=alloc-size]
  295 |         cap_info-&gt;phys = kzalloc(sizeof(void *), GFP_KERNEL);
      |                        ^

Use the correct type instead here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225315">SUSE bug 1225315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27414</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27414" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27414" ref_url="https://www.suse.com/security/cve/CVE-2024-27414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back

In the commit d73ef2d69c0d ("rtnetlink: let rtnl_bridge_setlink checks
IFLA_BRIDGE_MODE length"), an adjustment was made to the old loop logic
in the function `rtnl_bridge_setlink` to enable the loop to also check
the length of the IFLA_BRIDGE_MODE attribute. However, this adjustment
removed the `break` statement and led to an error logic of the flags
writing back at the end of this function.

if (have_flags)
    memcpy(nla_data(attr), &amp;flags, sizeof(flags));
    // attr should point to IFLA_BRIDGE_FLAGS NLA !!!

Before the mentioned commit, the `attr` is granted to be IFLA_BRIDGE_FLAGS.
However, this is not necessarily true fow now as the updated loop will let
the attr point to the last NLA, even an invalid NLA which could cause
overflow writes.

This patch introduces a new variable `br_flag` to save the NLA pointer
that points to IFLA_BRIDGE_FLAGS and uses it to resolve the mentioned
error logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27414/">CVE-2024-27414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27414">CVE-2024-27414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224439">SUSE bug 1224439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27415</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27415" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27415" ref_url="https://www.suse.com/security/cve/CVE-2024-27415" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: bridge: confirm multicast packets before passing them up the stack

conntrack nf_confirm logic cannot handle cloned skbs referencing
the same nf_conn entry, which will happen for multicast (broadcast)
frames on bridges.

 Example:
    macvlan0
       |
      br0
     /  \
  ethX    ethY

 ethX (or Y) receives a L2 multicast or broadcast packet containing
 an IP packet, flow is not yet in conntrack table.

 1. skb passes through bridge and fake-ip (br_netfilter)Prerouting.
    -&gt; skb-&gt;_nfct now references a unconfirmed entry
 2. skb is broad/mcast packet. bridge now passes clones out on each bridge
    interface.
 3. skb gets passed up the stack.
 4. In macvlan case, macvlan driver retains clone(s) of the mcast skb
    and schedules a work queue to send them out on the lower devices.

    The clone skb-&gt;_nfct is not a copy, it is the same entry as the
    original skb.  The macvlan rx handler then returns RX_HANDLER_PASS.
 5. Normal conntrack hooks (in NF_INET_LOCAL_IN) confirm the orig skb.

The Macvlan broadcast worker and normal confirm path will race.

This race will not happen if step 2 already confirmed a clone. In that
case later steps perform skb_clone() with skb-&gt;_nfct already confirmed (in
hash table).  This works fine.

But such confirmation won't happen when eb/ip/nftables rules dropped the
packets before they reached the nf_confirm step in postrouting.

Pablo points out that nf_conntrack_bridge doesn't allow use of stateful
nat, so we can safely discard the nf_conn entry and let inet call
conntrack again.

This doesn't work for bridge netfilter: skb could have a nat
transformation. Also bridge nf prevents re-invocation of inet prerouting
via 'sabotage_in' hook.

Work around this problem by explicit confirmation of the entry at LOCAL_IN
time, before upper layer has a chance to clone the unconfirmed entry.

The downside is that this disables NAT and conntrack helpers.

Alternative fix would be to add locking to all code parts that deal with
unconfirmed packets, but even if that could be done in a sane way this
opens up other problems, for example:

-m physdev --physdev-out eth0 -j SNAT --snat-to 1.2.3.4
-m physdev --physdev-out eth1 -j SNAT --snat-to 1.2.3.5

For multicast case, only one of such conflicting mappings will be
created, conntrack only handles 1:1 NAT mappings.

Users should set create a setup that explicitly marks such traffic
NOTRACK (conntrack bypass) to avoid this, but we cannot auto-bypass
them, ruleset might have accept rules for untracked traffic already,
so user-visible behaviour would change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-27415/">CVE-2024-27415 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27415">CVE-2024-27415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224757">SUSE bug 1224757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27416</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27416" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST

If we received HCI_EV_IO_CAPA_REQUEST while
HCI_OP_READ_REMOTE_EXT_FEATURES is yet to be responded assume the remote
does support SSP since otherwise this event shouldn't be generated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224723">SUSE bug 1224723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27417</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()

It seems that if userspace provides a correct IFA_TARGET_NETNSID value
but no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()
returns -EINVAL with an elevated "struct net" refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224721">SUSE bug 1224721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27418</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27418" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27418" ref_url="https://www.suse.com/security/cve/CVE-2024-27418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mctp: take ownership of skb in mctp_local_output

Currently, mctp_local_output only takes ownership of skb on success, and
we may leak an skb if mctp_local_output fails in specific states; the
skb ownership isn't transferred until the actual output routing occurs.

Instead, make mctp_local_output free the skb on all error paths up to
the route action, so it always consumes the passed skb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27418/">CVE-2024-27418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27418">CVE-2024-27418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224720">SUSE bug 1224720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27431</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27431" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpumap: Zero-initialise xdp_rxq_info struct before running XDP program

When running an XDP program that is attached to a cpumap entry, we don't
initialise the xdp_rxq_info data structure being used in the xdp_buff
that backs the XDP program invocation. Tobias noticed that this leads to
random values being returned as the xdp_md-&gt;rx_queue_index value for XDP
programs running in a cpumap.

This means we're basically returning the contents of the uninitialised
memory, which is bad. Fix this by zero-initialising the rxq data
structure before running the XDP program.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224718">SUSE bug 1224718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27432</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27432" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix PPE hanging issue

A patch to resolve an issue was found in MediaTek's GPL-licensed SDK:
In the mtk_ppe_stop() function, the PPE scan mode is not disabled before
disabling the PPE. This can potentially lead to a hang during the process
of disabling the PPE.

Without this patch, the PPE may experience a hang during the reboot test.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224716">SUSE bug 1224716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27433</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27433" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27433" ref_url="https://www.suse.com/security/cve/CVE-2024-27433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: mediatek: mt7622-apmixedsys: Fix an error handling path in clk_mt8135_apmixed_probe()

'clk_data' is allocated with mtk_devm_alloc_clk_data(). So calling
mtk_free_clk_data() explicitly in the remove function would lead to a
double-free.

Remove the redundant call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27433/">CVE-2024-27433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27433">CVE-2024-27433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224711">SUSE bug 1224711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27434</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27434" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27434" ref_url="https://www.suse.com/security/cve/CVE-2024-27434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't set the MFP flag for the GTK

The firmware doesn't need the MFP flag for the GTK, it can even make the
firmware crash. in case the AP is configured with: group cipher TKIP and
MFPC. We would send the GTK with cipher = TKIP and MFP which is of course
not possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27434/">CVE-2024-27434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27434">CVE-2024-27434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224710">SUSE bug 1224710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27435</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27435" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix reconnection fail due to reserved tag allocation

We found a issue on production environment while using NVMe over RDMA,
admin_q reconnect failed forever while remote target and network is ok.
After dig into it, we found it may caused by a ABBA deadlock due to tag
allocation. In my case, the tag was hold by a keep alive request
waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the
request maked as idle and will not process before reset success. As
fabric_q shares tagset with admin_q, while reconnect remote target, we
need a tag for connect command, but the only one reserved tag was held
by keep alive command which waiting inside admin_q. As a result, we
failed to reconnect admin_q forever. In order to fix this issue, I
think we should keep two reserved tags for admin queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224717">SUSE bug 1224717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27436</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27436" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Stop parsing channels bits when all channels are found.

If a usb audio device sets more bits than the amount of channels
it could write outside of the map array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224803">SUSE bug 1224803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27437</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27437" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Disable auto-enable of exclusive INTx IRQ

Currently for devices requiring masking at the irqchip for INTx, ie.
devices without DisINTx support, the IRQ is enabled in request_irq()
and subsequently disabled as necessary to align with the masked status
flag.  This presents a window where the interrupt could fire between
these events, resulting in the IRQ incrementing the disable depth twice.
This would be unrecoverable for a user since the masked flag prevents
nested enables through vfio.

Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx
is never auto-enabled, then unmask as required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222625">SUSE bug 1222625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline

The absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of
interrupt affinity reconfiguration via procfs. Instead, the change is
deferred until the next instance of the interrupt being triggered on the
original CPU.

When the interrupt next triggers on the original CPU, the new affinity is
enforced within __irq_move_irq(). A vector is allocated from the new CPU,
but the old vector on the original CPU remains and is not immediately
reclaimed. Instead, apicd-&gt;move_in_progress is flagged, and the reclaiming
process is delayed until the next trigger of the interrupt on the new CPU.

Upon the subsequent triggering of the interrupt on the new CPU,
irq_complete_move() adds a task to the old CPU's vector_cleanup list if it
remains online. Subsequently, the timer on the old CPU iterates over its
vector_cleanup list, reclaiming old vectors.

However, a rare scenario arises if the old CPU is outgoing before the
interrupt triggers again on the new CPU.

In that case irq_force_complete_move() is not invoked on the outgoing CPU
to reclaim the old apicd-&gt;prev_vector because the interrupt isn't currently
affine to the outgoing CPU, and irq_needs_fixup() returns false. Even
though __vector_schedule_cleanup() is later called on the new CPU, it
doesn't reclaim apicd-&gt;prev_vector; instead, it simply resets both
apicd-&gt;move_in_progress and apicd-&gt;prev_vector to 0.

As a result, the vector remains unreclaimed in vector_matrix, leading to a
CPU vector leak.

To address this issue, move the invocation of irq_force_complete_move()
before the irq_needs_fixup() call to reclaim apicd-&gt;prev_vector, if the
interrupt is currently or used to be affine to the outgoing CPU.

Additionally, reclaim the vector in __vector_schedule_cleanup() as well,
following a warning message, although theoretically it should never see
apicd-&gt;move_in_progress with apicd-&gt;prev_cpu pointing to an offline CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226765">SUSE bug 1226765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32936" ref_url="https://www.suse.com/security/cve/CVE-2024-32936" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ti: j721e-csi2rx: Fix races while restarting DMA

After the frame is submitted to DMA, it may happen that the submitted
list is not updated soon enough, and the DMA callback is triggered
before that.

This can lead to kernel crashes, so move everything in a single
lock/unlock section to prevent such races.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32936/">CVE-2024-32936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32936">CVE-2024-32936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226921">SUSE bug 1226921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: libstub: only free priv.runtime_map when allocated

priv.runtime_map is only allocated when efi_novamap is not set.
Otherwise, it is an uninitialized value.  In the error path, it is freed
unconditionally.  Avoid passing an uninitialized value to free_pool.
Free priv.runtime_map only when it was allocated.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226768">SUSE bug 1226768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33847" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33847" ref_url="https://www.suse.com/security/cve/CVE-2024-33847" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: don't allow unaligned truncation on released compress inode

f2fs image may be corrupted after below testcase:
- mkfs.f2fs -O extra_attr,compression -f /dev/vdb
- mount /dev/vdb /mnt/f2fs
- touch /mnt/f2fs/file
- f2fs_io setflags compression /mnt/f2fs/file
- dd if=/dev/zero of=/mnt/f2fs/file bs=4k count=4
- f2fs_io release_cblocks /mnt/f2fs/file
- truncate -s 8192 /mnt/f2fs/file
- umount /mnt/f2fs
- fsck.f2fs /dev/vdb

[ASSERT] (fsck_chk_inode_blk:1256)  --&gt; ino: 0x5 has i_blocks: 0x00000002, but has 0x3 blocks
[FSCK] valid_block_count matching with CP             [Fail] [0x4, 0x5]
[FSCK] other corrupted bugs                           [Fail]

The reason is: partial truncation assume compressed inode has reserved
blocks, after partial truncation, valid block count may change w/o
.i_blocks and .total_valid_block_count update, result in corruption.

This patch only allow cluster size aligned truncation on released
compress inode for fixing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-33847/">CVE-2024-33847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33847">CVE-2024-33847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226922">SUSE bug 1226922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34027" ref_url="https://www.suse.com/security/cve/CVE-2024-34027" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock

It needs to cover {reserve,release}_compress_blocks() w/ cp_rwsem lock
to avoid racing with checkpoint, otherwise, filesystem metadata including
blkaddr in dnode, inode fields and .total_valid_block_count may be
corrupted after SPO case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-34027/">CVE-2024-34027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34027">CVE-2024-34027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226923">SUSE bug 1226923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34030" ref_url="https://www.suse.com/security/cve/CVE-2024-34030" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: of_property: Return error for int_map allocation failure

Return -ENOMEM from of_pci_prop_intr_map() if kcalloc() fails to prevent a
NULL pointer dereference in this case.

[bhelgaas: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34030/">CVE-2024-34030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34030">CVE-2024-34030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226924">SUSE bug 1226924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34777" ref_url="https://www.suse.com/security/cve/CVE-2024-34777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-mapping: benchmark: fix node id validation

While validating node ids in map_benchmark_ioctl(), node_possible() may
be provided with invalid argument outside of [0,MAX_NUMNODES-1] range
leading to:

BUG: KASAN: wild-memory-access in map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)
Read of size 8 at addr 1fffffff8ccb6398 by task dma_map_benchma/971
CPU: 7 PID: 971 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #37
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Call Trace:
 &lt;TASK&gt;
dump_stack_lvl (lib/dump_stack.c:117)
kasan_report (mm/kasan/report.c:603)
kasan_check_range (mm/kasan/generic.c:189)
variable_test_bit (arch/x86/include/asm/bitops.h:227) [inline]
arch_test_bit (arch/x86/include/asm/bitops.h:239) [inline]
_test_bit at (include/asm-generic/bitops/instrumented-non-atomic.h:142) [inline]
node_state (include/linux/nodemask.h:423) [inline]
map_benchmark_ioctl (kernel/dma/map_benchmark.c:214)
full_proxy_unlocked_ioctl (fs/debugfs/file.c:333)
__x64_sys_ioctl (fs/ioctl.c:890)
do_syscall_64 (arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Compare node ids with sane bounds first. NUMA_NO_NODE is considered a
special valid case meaning that benchmarking kthreads won't be bound to a
cpuset of a given node.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34777/">CVE-2024-34777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34777">CVE-2024-34777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226796">SUSE bug 1226796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35247" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: region: add owner module and take its refcount

The current implementation of the fpga region assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the region
during programming if the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_region
struct and use it to take the module's refcount. Modify the functions for
registering a region to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the region as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a region without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226948">SUSE bug 1226948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35784" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35784" ref_url="https://www.suse.com/security/cve/CVE-2024-35784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock with fiemap and extent locking

While working on the patchset to remove extent locking I got a lockdep
splat with fiemap and pagefaulting with my new extent lock replacement
lock.

This deadlock exists with our normal code, we just don't have lockdep
annotations with the extent locking so we've never noticed it.

Since we're copying the fiemap extent to user space on every iteration
we have the chance of pagefaulting.  Because we hold the extent lock for
the entire range we could mkwrite into a range in the file that we have
mmap'ed.  This would deadlock with the following stack trace

[&lt;0&gt;] lock_extent+0x28d/0x2f0
[&lt;0&gt;] btrfs_page_mkwrite+0x273/0x8a0
[&lt;0&gt;] do_page_mkwrite+0x50/0xb0
[&lt;0&gt;] do_fault+0xc1/0x7b0
[&lt;0&gt;] __handle_mm_fault+0x2fa/0x460
[&lt;0&gt;] handle_mm_fault+0xa4/0x330
[&lt;0&gt;] do_user_addr_fault+0x1f4/0x800
[&lt;0&gt;] exc_page_fault+0x7c/0x1e0
[&lt;0&gt;] asm_exc_page_fault+0x26/0x30
[&lt;0&gt;] rep_movs_alternative+0x33/0x70
[&lt;0&gt;] _copy_to_user+0x49/0x70
[&lt;0&gt;] fiemap_fill_next_extent+0xc8/0x120
[&lt;0&gt;] emit_fiemap_extent+0x4d/0xa0
[&lt;0&gt;] extent_fiemap+0x7f8/0xad0
[&lt;0&gt;] btrfs_fiemap+0x49/0x80
[&lt;0&gt;] __x64_sys_ioctl+0x3e1/0xb50
[&lt;0&gt;] do_syscall_64+0x94/0x1a0
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

I wrote an fstest to reproduce this deadlock without my replacement lock
and verified that the deadlock exists with our existing locking.

To fix this simply don't take the extent lock for the entire duration of
the fiemap.  This is safe in general because we keep track of where we
are when we're searching the tree, so if an ordered extent updates in
the middle of our fiemap call we'll still emit the correct extents
because we know what offset we were on before.

The only place we maintain the lock is searching delalloc.  Since the
delalloc stuff can change during writeback we want to lock the extent
range so we have a consistent view of delalloc at the time we're
checking to see if we need to set the delalloc flag.

With this patch applied we no longer deadlock with my testcase.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35784/">CVE-2024-35784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35784">CVE-2024-35784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224804">SUSE bug 1224804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35785" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35785" ref_url="https://www.suse.com/security/cve/CVE-2024-35785" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: optee: Fix kernel panic caused by incorrect error handling

The error path while failing to register devices on the TEE bus has a
bug leading to kernel panic as follows:

[   15.398930] Unable to handle kernel paging request at virtual address ffff07ed00626d7c
[   15.406913] Mem abort info:
[   15.409722]   ESR = 0x0000000096000005
[   15.413490]   EC = 0x25: DABT (current EL), IL = 32 bits
[   15.418814]   SET = 0, FnV = 0
[   15.421878]   EA = 0, S1PTW = 0
[   15.425031]   FSC = 0x05: level 1 translation fault
[   15.429922] Data abort info:
[   15.432813]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[   15.438310]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   15.443372]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   15.448697] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000d9e3e000
[   15.455413] [ffff07ed00626d7c] pgd=1800000bffdf9003, p4d=1800000bffdf9003, pud=0000000000000000
[   15.464146] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP

Commit 7269cba53d90 ("tee: optee: Fix supplicant based device enumeration")
lead to the introduction of this bug. So fix it appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35785/">CVE-2024-35785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35785">CVE-2024-35785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224724">SUSE bug 1224724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35786" ref_url="https://www.suse.com/security/cve/CVE-2024-35786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf

If VM_BIND is enabled on the client the legacy submission ioctl can't be
used, however if a client tries to do so regardless it will return an
error. In this case the clients mutex remained unlocked leading to a
deadlock inside nouveau_drm_postclose or any other nouveau ioctl call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35786/">CVE-2024-35786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35786">CVE-2024-35786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224714">SUSE bug 1224714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35787" ref_url="https://www.suse.com/security/cve/CVE-2024-35787" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/md-bitmap: fix incorrect usage for sb_index

Commit d7038f951828 ("md-bitmap: don't use -&gt;index for pages backing the
bitmap file") removed page-&gt;index from bitmap code, but left wrong code
logic for clustered-md. current code never set slot offset for cluster
nodes, will sometimes cause crash in clustered env.

Call trace (partly):
 md_bitmap_file_set_bit+0x110/0x1d8 [md_mod]
 md_bitmap_startwrite+0x13c/0x240 [md_mod]
 raid1_make_request+0x6b0/0x1c08 [raid1]
 md_handle_request+0x1dc/0x368 [md_mod]
 md_submit_bio+0x80/0xf8 [md_mod]
 __submit_bio+0x178/0x300
 submit_bio_noacct_nocheck+0x11c/0x338
 submit_bio_noacct+0x134/0x614
 submit_bio+0x28/0xdc
 submit_bh_wbc+0x130/0x1cc
 submit_bh+0x1c/0x28
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35787/">CVE-2024-35787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35787">CVE-2024-35787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224715">SUSE bug 1224715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35788" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35788" ref_url="https://www.suse.com/security/cve/CVE-2024-35788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix bounds check for dcn35 DcfClocks

[Why]
NumFclkLevelsEnabled is used for DcfClocks bounds check
instead of designated NumDcfClkLevelsEnabled.
That can cause array index out-of-bounds access.

[How]
Use designated variable for dcn35 DcfClocks bounds check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35788/">CVE-2024-35788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35788">CVE-2024-35788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224709">SUSE bug 1224709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes

When moving a station out of a VLAN and deleting the VLAN afterwards, the
fast_rx entry still holds a pointer to the VLAN's netdev, which can cause
use-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx
after the VLAN change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227320">SUSE bug 1227320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35790" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group

The DisplayPort driver's sysfs nodes may be present to the userspace before
typec_altmode_set_drvdata() completes in dp_altmode_probe. This means that
a sysfs read can trigger a NULL pointer error by deferencing dp-&gt;hpd in
hpd_show or dp-&gt;lock in pin_assignment_show, as dev_get_drvdata() returns
NULL in those cases.

Remove manual sysfs node creation in favor of adding attribute group as
default for devices bound to the driver. The ATTRIBUTE_GROUPS() macro is
not used here otherwise the path to the sysfs nodes is no longer compliant
with the ABI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224712">SUSE bug 1224712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region()

Do the cache flush of converted pages in svm_register_enc_region() before
dropping kvm-&gt;lock to fix use-after-free issues where region and/or its
array of pages could be freed by a different task, e.g. if userspace has
__unregister_enc_region_locked() already queued up for the region.

Note, the "obvious" alternative of using local variables doesn't fully
resolve the bug, as region-&gt;pages is also dynamically allocated.  I.e. the
region structure itself would be fine, but region-&gt;pages could be freed.

Flushing multiple pages under kvm-&gt;lock is unfortunate, but the entire
flow is a rare slow path, and the manual flush is only needed on CPUs that
lack coherency for encrypted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224725">SUSE bug 1224725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35792" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35792" ref_url="https://www.suse.com/security/cve/CVE-2024-35792" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: rk3288 - Fix use after free in unprepare

The unprepare call must be carried out before the finalize call
as the latter can free the request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35792/">CVE-2024-35792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35792">CVE-2024-35792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224713">SUSE bug 1224713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35793" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35793" ref_url="https://www.suse.com/security/cve/CVE-2024-35793" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

debugfs: fix wait/cancellation handling during remove

Ben Greear further reports deadlocks during concurrent debugfs
remove while files are being accessed, even though the code in
question now uses debugfs cancellations. Turns out that despite
all the review on the locking, we missed completely that the
logic is wrong: if the refcount hits zero we can finish (and
need not wait for the completion), but if it doesn't we have
to trigger all the cancellations. As written, we can _never_
get into the loop triggering the cancellations. Fix this, and
explain it better while at it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35793/">CVE-2024-35793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35793">CVE-2024-35793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224708">SUSE bug 1224708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35794" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35794" ref_url="https://www.suse.com/security/cve/CVE-2024-35794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-raid: really frozen sync_thread during suspend

1) commit f52f5c71f3d4 ("md: fix stopping sync thread") remove
   MD_RECOVERY_FROZEN from __md_stop_writes() and doesn't realize that
   dm-raid relies on __md_stop_writes() to frozen sync_thread
   indirectly. Fix this problem by adding MD_RECOVERY_FROZEN in
   md_stop_writes(), and since stop_sync_thread() is only used for
   dm-raid in this case, also move stop_sync_thread() to
   md_stop_writes().
2) The flag MD_RECOVERY_FROZEN doesn't mean that sync thread is frozen,
   it only prevent new sync_thread to start, and it can't stop the
   running sync thread; In order to frozen sync_thread, after seting the
   flag, stop_sync_thread() should be used.
3) The flag MD_RECOVERY_FROZEN doesn't mean that writes are stopped, use
   it as condition for md_stop_writes() in raid_postsuspend() doesn't
   look correct. Consider that reentrant stop_sync_thread() do nothing,
   always call md_stop_writes() in raid_postsuspend().
4) raid_message can set/clear the flag MD_RECOVERY_FROZEN at anytime,
   and if MD_RECOVERY_FROZEN is cleared while the array is suspended,
   new sync_thread can start unexpected. Fix this by disallow
   raid_message() to change sync_thread status during suspend.

Note that after commit f52f5c71f3d4 ("md: fix stopping sync thread"), the
test shell/lvconvert-raid-reshape.sh start to hang in stop_sync_thread(),
and with previous fixes, the test won't hang there anymore, however, the
test will still fail and complain that ext4 is corrupted. And with this
patch, the test won't hang due to stop_sync_thread() or fail due to ext4
is corrupted anymore. However, there is still a deadlock related to
dm-raid456 that will be fixed in following patches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35794/">CVE-2024-35794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35794">CVE-2024-35794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224706">SUSE bug 1224706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35795" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35795" ref_url="https://www.suse.com/security/cve/CVE-2024-35795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix deadlock while reading mqd from debugfs

An errant disk backup on my desktop got into debugfs and triggered the
following deadlock scenario in the amdgpu debugfs files. The machine
also hard-resets immediately after those lines are printed (although I
wasn't able to reproduce that part when reading by hand):

[ 1318.016074][ T1082] ======================================================
[ 1318.016607][ T1082] WARNING: possible circular locking dependency detected
[ 1318.017107][ T1082] 6.8.0-rc7-00015-ge0c8221b72c0 #17 Not tainted
[ 1318.017598][ T1082] ------------------------------------------------------
[ 1318.018096][ T1082] tar/1082 is trying to acquire lock:
[ 1318.018585][ T1082] ffff98c44175d6a0 (&amp;mm-&gt;mmap_lock){++++}-{3:3}, at: __might_fault+0x40/0x80
[ 1318.019084][ T1082]
[ 1318.019084][ T1082] but task is already holding lock:
[ 1318.020052][ T1082] ffff98c4c13f55f8 (reservation_ww_class_mutex){+.+.}-{3:3}, at: amdgpu_debugfs_mqd_read+0x6a/0x250 [amdgpu]
[ 1318.020607][ T1082]
[ 1318.020607][ T1082] which lock already depends on the new lock.
[ 1318.020607][ T1082]
[ 1318.022081][ T1082]
[ 1318.022081][ T1082] the existing dependency chain (in reverse order) is:
[ 1318.023083][ T1082]
[ 1318.023083][ T1082] -&gt; #2 (reservation_ww_class_mutex){+.+.}-{3:3}:
[ 1318.024114][ T1082]        __ww_mutex_lock.constprop.0+0xe0/0x12f0
[ 1318.024639][ T1082]        ww_mutex_lock+0x32/0x90
[ 1318.025161][ T1082]        dma_resv_lockdep+0x18a/0x330
[ 1318.025683][ T1082]        do_one_initcall+0x6a/0x350
[ 1318.026210][ T1082]        kernel_init_freeable+0x1a3/0x310
[ 1318.026728][ T1082]        kernel_init+0x15/0x1a0
[ 1318.027242][ T1082]        ret_from_fork+0x2c/0x40
[ 1318.027759][ T1082]        ret_from_fork_asm+0x11/0x20
[ 1318.028281][ T1082]
[ 1318.028281][ T1082] -&gt; #1 (reservation_ww_class_acquire){+.+.}-{0:0}:
[ 1318.029297][ T1082]        dma_resv_lockdep+0x16c/0x330
[ 1318.029790][ T1082]        do_one_initcall+0x6a/0x350
[ 1318.030263][ T1082]        kernel_init_freeable+0x1a3/0x310
[ 1318.030722][ T1082]        kernel_init+0x15/0x1a0
[ 1318.031168][ T1082]        ret_from_fork+0x2c/0x40
[ 1318.031598][ T1082]        ret_from_fork_asm+0x11/0x20
[ 1318.032011][ T1082]
[ 1318.032011][ T1082] -&gt; #0 (&amp;mm-&gt;mmap_lock){++++}-{3:3}:
[ 1318.032778][ T1082]        __lock_acquire+0x14bf/0x2680
[ 1318.033141][ T1082]        lock_acquire+0xcd/0x2c0
[ 1318.033487][ T1082]        __might_fault+0x58/0x80
[ 1318.033814][ T1082]        amdgpu_debugfs_mqd_read+0x103/0x250 [amdgpu]
[ 1318.034181][ T1082]        full_proxy_read+0x55/0x80
[ 1318.034487][ T1082]        vfs_read+0xa7/0x360
[ 1318.034788][ T1082]        ksys_read+0x70/0xf0
[ 1318.035085][ T1082]        do_syscall_64+0x94/0x180
[ 1318.035375][ T1082]        entry_SYSCALL_64_after_hwframe+0x46/0x4e
[ 1318.035664][ T1082]
[ 1318.035664][ T1082] other info that might help us debug this:
[ 1318.035664][ T1082]
[ 1318.036487][ T1082] Chain exists of:
[ 1318.036487][ T1082]   &amp;mm-&gt;mmap_lock --&gt; reservation_ww_class_acquire --&gt; reservation_ww_class_mutex
[ 1318.036487][ T1082]
[ 1318.037310][ T1082]  Possible unsafe locking scenario:
[ 1318.037310][ T1082]
[ 1318.037838][ T1082]        CPU0                    CPU1
[ 1318.038101][ T1082]        ----                    ----
[ 1318.038350][ T1082]   lock(reservation_ww_class_mutex);
[ 1318.038590][ T1082]                                lock(reservation_ww_class_acquire);
[ 1318.038839][ T1082]                                lock(reservation_ww_class_mutex);
[ 1318.039083][ T1082]   rlock(&amp;mm-&gt;mmap_lock);
[ 1318.039328][ T1082]
[ 1318.039328][ T1082]  *** DEADLOCK ***
[ 1318.039328][ T1082]
[ 1318.040029][ T1082] 1 lock held by tar/1082:
[ 1318.040259][ T1082]  #0: ffff98c4c13f55f8 (reservation_ww_class_mutex){+.+.}-{3:3}, at: amdgpu_debugfs_mqd_read+0x6a/0x250 [amdgpu]
[ 1318.040560][ T1082]
[ 1318.040560][ T1082] stack backtrace:
[
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35795/">CVE-2024-35795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35795">CVE-2024-35795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224634">SUSE bug 1224634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35796" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ll_temac: platform_get_resource replaced by wrong function

The function platform_get_resource was replaced with
devm_platform_ioremap_resource_byname and is called using 0 as name.

This eventually ends up in platform_get_resource_byname in the call
stack, where it causes a null pointer in strcmp.

	if (type == resource_type(r) &amp;&amp; !strcmp(r-&gt;name, name))

It should have been replaced with devm_platform_ioremap_resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224615">SUSE bug 1224615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35797" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35797" ref_url="https://www.suse.com/security/cve/CVE-2024-35797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: cachestat: fix two shmem bugs

When cachestat on shmem races with swapping and invalidation, there
are two possible bugs:

1) A swapin error can have resulted in a poisoned swap entry in the
   shmem inode's xarray. Calling get_shadow_from_swap_cache() on it
   will result in an out-of-bounds access to swapper_spaces[].

   Validate the entry with non_swap_entry() before going further.

2) When we find a valid swap entry in the shmem's inode, the shadow
   entry in the swapcache might not exist yet: swap IO is still in
   progress and we're before __remove_mapping; swapin, invalidation,
   or swapoff have removed the shadow from swapcache after we saw the
   shmem swap entry.

   This will send a NULL to workingset_test_recent(). The latter
   purely operates on pointer bits, so it won't crash - node 0, memcg
   ID 0, eviction timestamp 0, etc. are all valid inputs - but it's a
   bogus test. In theory that could result in a false "recently
   evicted" count.

   Such a false positive wouldn't be the end of the world. But for
   code clarity and (future) robustness, be explicit about this case.

   Bail on get_shadow_from_swap_cache() returning NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35797/">CVE-2024-35797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35797">CVE-2024-35797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224635">SUSE bug 1224635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35798" ref_url="https://www.suse.com/security/cve/CVE-2024-35798" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race in read_extent_buffer_pages()

There are reports from tree-checker that detects corrupted nodes,
without any obvious pattern so possibly an overwrite in memory.
After some debugging it turns out there's a race when reading an extent
buffer the uptodate status can be missed.

To prevent concurrent reads for the same extent buffer,
read_extent_buffer_pages() performs these checks:

    /* (1) */
    if (test_bit(EXTENT_BUFFER_UPTODATE, &amp;eb-&gt;bflags))
        return 0;

    /* (2) */
    if (test_and_set_bit(EXTENT_BUFFER_READING, &amp;eb-&gt;bflags))
        goto done;

At this point, it seems safe to start the actual read operation. Once
that completes, end_bbio_meta_read() does

    /* (3) */
    set_extent_buffer_uptodate(eb);

    /* (4) */
    clear_bit(EXTENT_BUFFER_READING, &amp;eb-&gt;bflags);

Normally, this is enough to ensure only one read happens, and all other
callers wait for it to finish before returning.  Unfortunately, there is
a racey interleaving:

    Thread A | Thread B | Thread C
    ---------+----------+---------
       (1)   |          |
             |    (1)   |
       (2)   |          |
       (3)   |          |
       (4)   |          |
             |    (2)   |
             |          |    (1)

When this happens, thread B kicks of an unnecessary read. Worse, thread
C will see UPTODATE set and return immediately, while the read from
thread B is still in progress.  This race could result in tree-checker
errors like this as the extent buffer is concurrently modified:

    BTRFS critical (device dm-0): corrupted node, root=256
    block=8550954455682405139 owner mismatch, have 11858205567642294356
    expect [256, 18446744073709551360]

Fix it by testing UPTODATE again after setting the READING bit, and if
it's been set, skip the unnecessary read.

[ minor update of changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35798/">CVE-2024-35798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35798">CVE-2024-35798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224503">SUSE bug 1224503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35799" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Prevent crash when disable stream

[Why]
Disabling stream encoder invokes a function that no longer exists.

[How]
Check if the function declaration is NULL in disable stream encoder.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224740">SUSE bug 1224740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35800" ref_url="https://www.suse.com/security/cve/CVE-2024-35800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: fix panic in kdump kernel

Check if get_next_variable() is actually valid pointer before
calling it. In kdump kernel this method is set to NULL that causes
panic during the kexec-ed kernel boot.

Tested with QEMU and OVMF firmware.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35800/">CVE-2024-35800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35800">CVE-2024-35800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224507">SUSE bug 1224507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD

Commit 672365477ae8 ("x86/fpu: Update XFD state where required") and
commit 8bf26758ca96 ("x86/fpu: Add XFD state to fpstate") introduced a
per CPU variable xfd_state to keep the MSR_IA32_XFD value cached, in
order to avoid unnecessary writes to the MSR.

On CPU hotplug MSR_IA32_XFD is reset to the init_fpstate.xfd, which
wipes out any stale state. But the per CPU cached xfd value is not
reset, which brings them out of sync.

As a consequence a subsequent xfd_update_state() might fail to update
the MSR which in turn can result in XRSTOR raising a #NM in kernel
space, which crashes the kernel.

To fix this, introduce xfd_set_state() to write xfd_state together
with MSR_IA32_XFD, and use it in all places that set MSR_IA32_XFD.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224732">SUSE bug 1224732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35802" ref_url="https://www.suse.com/security/cve/CVE-2024-35802" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-05-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35802/">CVE-2024-35802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35802">CVE-2024-35802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224737">SUSE bug 1224737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35803" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35803" ref_url="https://www.suse.com/security/cve/CVE-2024-35803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/efistub: Call mixed mode boot services on the firmware's stack

Normally, the EFI stub calls into the EFI boot services using the stack
that was live when the stub was entered. According to the UEFI spec,
this stack needs to be at least 128k in size - this might seem large but
all asynchronous processing and event handling in EFI runs from the same
stack and so quite a lot of space may be used in practice.

In mixed mode, the situation is a bit different: the bootloader calls
the 32-bit EFI stub entry point, which calls the decompressor's 32-bit
entry point, where the boot stack is set up, using a fixed allocation
of 16k. This stack is still in use when the EFI stub is started in
64-bit mode, and so all calls back into the EFI firmware will be using
the decompressor's limited boot stack.

Due to the placement of the boot stack right after the boot heap, any
stack overruns have gone unnoticed. However, commit

  5c4feadb0011983b ("x86/decompressor: Move global symbol references to C code")

moved the definition of the boot heap into C code, and now the boot
stack is placed right at the base of BSS, where any overruns will
corrupt the end of the .data section.

While it would be possible to work around this by increasing the size of
the boot stack, doing so would affect all x86 systems, and mixed mode
systems are a tiny (and shrinking) fraction of the x86 installed base.

So instead, record the firmware stack pointer value when entering from
the 32-bit firmware, and switch to this stack every time a EFI boot
service call is made.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35803/">CVE-2024-35803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35803">CVE-2024-35803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224742">SUSE bug 1224742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225314">SUSE bug 1225314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Mark target gfn of emulated atomic instruction as dirty

When emulating an atomic access on behalf of the guest, mark the target
gfn dirty if the CMPXCHG by KVM is attempted and doesn't fault.  This
fixes a bug where KVM effectively corrupts guest memory during live
migration by writing to guest memory without informing userspace that the
page is dirty.

Marking the page dirty got unintentionally dropped when KVM's emulated
CMPXCHG was converted to do a user access.  Before that, KVM explicitly
mapped the guest page into kernel memory, and marked the page dirty during
the unmap phase.

Mark the page dirty even if the CMPXCHG fails, as the old data is written
back on failure, i.e. the page is still written.  The value written is
guaranteed to be the same because the operation is atomic, but KVM's ABI
is that all writes are dirty logged regardless of the value written.  And
more importantly, that's what KVM did before the buggy commit.

Huge kudos to the folks on the Cc list (and many others), who did all the
actual work of triaging and debugging.

base-commit: 6769ea8da8a93ed4630f1ce64df6aafcaabfce64
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224638">SUSE bug 1224638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm snapshot: fix lockup in dm_exception_table_exit

There was reported lockup when we exit a snapshot with many exceptions.
Fix this by adding "cond_resched" to the loop that frees the exceptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224743">SUSE bug 1224743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Always disable interrupts when taking cgr_lock

smp_call_function_single disables IRQs when executing the callback. To
prevent deadlocks, we must disable IRQs when taking cgr_lock elsewhere.
This is already done by qman_update_cgr and qman_delete_cgr; fix the
other lockers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224699">SUSE bug 1224699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix corruption during on-line resize

We observed a corruption during on-line resize of a file system that is
larger than 16 TiB with 4k block size. With having more then 2^32 blocks
resize_inode is turned off by default by mke2fs. The issue can be
reproduced on a smaller file system for convenience by explicitly
turning off resize_inode. An on-line resize across an 8 GiB boundary (the
size of a meta block group in this setup) then leads to a corruption:

  dev=/dev/&lt;some_dev&gt; # should be &gt;= 16 GiB
  mkdir -p /corruption
  /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))
  mount -t ext4 $dev /corruption

  dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))
  sha1sum /corruption/test
  # 79d2658b39dcfd77274e435b0934028adafaab11  /corruption/test

  /sbin/resize2fs $dev $((2*2**21))
  # drop page cache to force reload the block from disk
  echo 1 &gt; /proc/sys/vm/drop_caches

  sha1sum /corruption/test
  # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3  /corruption/test

2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per
block group and 2^6 are the number of block groups that make a meta
block group.

The last checksum might be different depending on how the file is laid
out across the physical blocks. The actual corruption occurs at physical
block 63*2^15 = 2064384 which would be the location of the backup of the
meta block group's block descriptor. During the on-line resize the file
system will be converted to meta_bg starting at s_first_meta_bg which is
2 in the example - meaning all block groups after 16 GiB. However, in
ext4_flex_group_add we might add block groups that are not part of the
first meta block group yet. In the reproducer we achieved this by
substracting the size of a whole block group from the point where the
meta block group would start. This must be considered when updating the
backup block group descriptors to follow the non-meta_bg layout. The fix
is to add a test whether the group to add is already part of the meta
block group or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224735">SUSE bug 1224735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35808" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35808" ref_url="https://www.suse.com/security/cve/CVE-2024-35808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/dm-raid: don't call md_reap_sync_thread() directly

Currently md_reap_sync_thread() is called from raid_message() directly
without holding 'reconfig_mutex', this is definitely unsafe because
md_reap_sync_thread() can change many fields that is protected by
'reconfig_mutex'.

However, hold 'reconfig_mutex' here is still problematic because this
will cause deadlock, for example, commit 130443d60b1b ("md: refactor
idle/frozen_sync_thread() to fix deadlock").

Fix this problem by using stop_sync_thread() to unregister sync_thread,
like md/raid did.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35808/">CVE-2024-35808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35808">CVE-2024-35808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224623">SUSE bug 1224623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35810" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35810" ref_url="https://www.suse.com/security/cve/CVE-2024-35810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix the lifetime of the bo cursor memory

The cleanup can be dispatched while the atomic update is still active,
which means that the memory acquired in the atomic update needs to
not be invalidated by the cleanup. The buffer objects in vmw_plane_state
instead of using the builtin map_and_cache were trying to handle
the lifetime of the mapped memory themselves, leading to crashes.

Use the map_and_cache instead of trying to manage the lifetime of the
buffer objects held by the vmw_plane_state.

Fixes kernel oops'es in IGT's kms_cursor_legacy forked-bo.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35810/">CVE-2024-35810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35810">CVE-2024-35810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224626">SUSE bug 1224626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35813</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35813" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: core: Avoid negative index with array access

Commit 4d0c8d0aef63 ("mmc: core: Use mrq.sbc in close-ended ffu") assigns
prev_idata = idatas[i - 1], but doesn't check that the iterator i is
greater than zero. Let's fix this by adding a check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224618">SUSE bug 1224618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

swiotlb: Fix double-allocation of slots due to broken alignment handling

Commit bbb73a103fbb ("swiotlb: fix a braino in the alignment check fix"),
which was a fix for commit 0eee5ae10256 ("swiotlb: fix slot alignment
checks"), causes a functional regression with vsock in a virtual machine
using bouncing via a restricted DMA SWIOTLB pool.

When virtio allocates the virtqueues for the vsock device using
dma_alloc_coherent(), the SWIOTLB search can return page-unaligned
allocations if 'area-&gt;index' was left unaligned by a previous allocation
from the buffer:

 # Final address in brackets is the SWIOTLB address returned to the caller
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1645-1649/7168 (0x98326800)
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1649-1653/7168 (0x98328800)
 | virtio-pci 0000:00:07.0: orig_addr 0x0 alloc_size 0x2000, iotlb_align_mask 0x800 stride 0x2: got slot 1653-1657/7168 (0x9832a800)

This ends badly (typically buffer corruption and/or a hang) because
swiotlb_alloc() is expecting a page-aligned allocation and so blindly
returns a pointer to the 'struct page' corresponding to the allocation,
therefore double-allocating the first half (2KiB slot) of the 4KiB page.

Fix the problem by treating the allocation alignment separately to any
additional alignment requirements from the device, using the maximum
of the two as the stride to search the buffer slots and taking care
to ensure a minimum of page-alignment for buffers larger than a page.

This also resolves swiotlb allocation failures occuring due to the
inclusion of ~PAGE_MASK in 'iotlb_align_mask' for large allocations and
resulting in alignment requirements exceeding swiotlb_max_mapping_size().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224602">SUSE bug 1224602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion

The first kiocb_set_cancel_fn() argument may point at a struct kiocb
that is not embedded inside struct aio_kiocb. With the current code,
depending on the compiler, the req-&gt;ki_ctx read happens either before
the IOCB_AIO_RW test or after that test. Move the req-&gt;ki_ctx read such
that it is guaranteed that the IOCB_AIO_RW test happens first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35816" ref_url="https://www.suse.com/security/cve/CVE-2024-35816" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firewire: ohci: prevent leak of left-over IRQ on unbind

Commit 5a95f1ded28691e6 ("firewire: ohci: use devres for requested IRQ")
also removed the call to free_irq() in pci_remove(), leading to a
leftover irq of devm_request_irq() at pci_disable_msi() in pci_remove()
when unbinding the driver from the device

remove_proc_entry: removing non-empty directory 'irq/136', leaking at
least 'firewire_ohci'
Call Trace:
 ? remove_proc_entry+0x19c/0x1c0
 ? __warn+0x81/0x130
 ? remove_proc_entry+0x19c/0x1c0
 ? report_bug+0x171/0x1a0
 ? console_unlock+0x78/0x120
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? remove_proc_entry+0x19c/0x1c0
 unregister_irq_proc+0xf4/0x120
 free_desc+0x3d/0xe0
 ? kfree+0x29f/0x2f0
 irq_free_descs+0x47/0x70
 msi_domain_free_locked.part.0+0x19d/0x1d0
 msi_domain_free_irqs_all_locked+0x81/0xc0
 pci_free_msi_irqs+0x12/0x40
 pci_disable_msi+0x4c/0x60
 pci_remove+0x9d/0xc0 [firewire_ohci
     01b483699bebf9cb07a3d69df0aa2bee71db1b26]
 pci_device_remove+0x37/0xa0
 device_release_driver_internal+0x19f/0x200
 unbind_store+0xa1/0xb0

remove irq with devm_free_irq() before pci_disable_msi()
also remove it in fail_msi: of pci_probe() as this would lead to
an identical leak
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35816/">CVE-2024-35816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35816">CVE-2024-35816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224616">SUSE bug 1224616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag

Otherwise after the GTT bo is released, the GTT and gart space is freed
but amdgpu_ttm_backend_unbind will not clear the gart page table entry
and leave valid mapping entry pointing to the stale system page. Then
if GPU access the gart address mistakely, it will read undefined value
instead page fault, harder to debug and reproduce the real issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225313">SUSE bug 1225313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35818" ref_url="https://www.suse.com/security/cve/CVE-2024-35818" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Define the __io_aw() hook as mmiowb()

Commit fb24ea52f78e0d595852e ("drivers: Remove explicit invocations of
mmiowb()") remove all mmiowb() in drivers, but it says:

"NOTE: mmiowb() has only ever guaranteed ordering in conjunction with
spin_unlock(). However, pairing each mmiowb() removal in this patch with
the corresponding call to spin_unlock() is not at all trivial, so there
is a small chance that this change may regress any drivers incorrectly
relying on mmiowb() to order MMIO writes between CPUs using lock-free
synchronisation."

The mmio in radeon_ring_commit() is protected by a mutex rather than a
spinlock, but in the mutex fastpath it behaves similar to spinlock. We
can add mmiowb() calls in the radeon driver but the maintainer says he
doesn't like such a workaround, and radeon is not the only example of
mutex protected mmio.

So we should extend the mmiowb tracking system from spinlock to mutex,
and maybe other locking primitives. This is not easy and error prone, so
we solve it in the architectural code, by simply defining the __io_aw()
hook as mmiowb(). And we no longer need to override queued_spin_unlock()
so use the generic definition.

Without this, we get such an error when run 'glxgears' on weak ordering
architectures such as LoongArch:

radeon 0000:04:00.0: ring 0 stalled for more than 10324msec
radeon 0000:04:00.0: ring 3 stalled for more than 10240msec
radeon 0000:04:00.0: GPU lockup (current fence id 0x000000000001f412 last fence id 0x000000000001f414 on ring 3)
radeon 0000:04:00.0: GPU lockup (current fence id 0x000000000000f940 last fence id 0x000000000000f941 on ring 0)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
radeon 0000:04:00.0: scheduling IB failed (-35).
[drm:radeon_gem_va_ioctl [radeon]] *ERROR* Couldn't update BO_VA (-35)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-05-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35818/">CVE-2024-35818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35818">CVE-2024-35818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224744">SUSE bug 1224744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: fsl: qbman: Use raw spinlock for cgr_lock

smp_call_function always runs its callback in hard IRQ context, even on
PREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock
for cgr_lock to ensure we aren't waiting on a sleeping task.

Although this bug has existed for a while, it was not apparent until
commit ef2a8d5478b9 ("net: dpaa: Adjust queue depth on rate change")
which invokes smp_call_function_single via qman_update_cgr_safe every
time a link goes up or down.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224683">SUSE bug 1224683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubifs: Set page uptodate in the correct place

Page cache reads are lockless, so setting the freshly allocated page
uptodate before we've overwritten it with the data it's supposed to have
in it will allow a simultaneous reader to see old data.  Move the call
to SetPageUptodate into ubifs_write_end(), which is after we copied the
new data into the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224629">SUSE bug 1224629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: udc: remove warning when queue disabled ep

It is possible trigger below warning message from mass storage function,

WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104
pc : usb_ep_queue+0x7c/0x104
lr : fsg_main_thread+0x494/0x1b3c

Root cause is mass storage function try to queue request from main thread,
but other thread may already disable ep when function disable.

As there is no function failure in the driver, in order to avoid effort
to fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224739">SUSE bug 1224739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix unicode buffer corruption when deleting characters

This is the same issue that was fixed for the VGA text buffer in commit
39cdb68c64d8 ("vt: fix memory overlapping when deleting chars in the
buffer"). The cure is also the same i.e. replace memcpy() with memmove()
due to the overlaping buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224692">SUSE bug 1224692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35824" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35824" ref_url="https://www.suse.com/security/cve/CVE-2024-35824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume

When not configured for wakeup lis3lv02d_i2c_suspend() will call
lis3lv02d_poweroff() even if the device has already been turned off
by the runtime-suspend handler and if configured for wakeup and
the device is runtime-suspended at this point then it is not turned
back on to serve as a wakeup source.

Before commit b1b9f7a49440 ("misc: lis3lv02d_i2c: Add missing setting
of the reg_ctrl callback"), lis3lv02d_poweroff() failed to disable
the regulators which as a side effect made calling poweroff() twice ok.

Now that poweroff() correctly disables the regulators, doing this twice
triggers a WARN() in the regulator core:

unbalanced disables for regulator-dummy
WARNING: CPU: 1 PID: 92 at drivers/regulator/core.c:2999 _regulator_disable
...

Fix lis3lv02d_i2c_suspend() to not call poweroff() a second time if
already runtime-suspended and add a poweron() call when necessary to
make wakeup work.

lis3lv02d_i2c_resume() has similar issues, with an added weirness that
it always powers on the device if it is runtime suspended, after which
the first runtime-resume will call poweron() again, causing the enabled
count for the regulator to increase by 1 every suspend/resume. These
unbalanced regulator_enable() calls cause the regulator to never
be turned off and trigger the following WARN() on driver unbind:

WARNING: CPU: 1 PID: 1724 at drivers/regulator/core.c:2396 _regulator_put

Fix this by making lis3lv02d_i2c_resume() mirror the new suspend().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35824/">CVE-2024-35824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35824">CVE-2024-35824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224609">SUSE bug 1224609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35825" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: ncm: Fix handling of zero block length packets

While connecting to a Linux host with CDC_NCM_NTB_DEF_SIZE_TX
set to 65536, it has been observed that we receive short packets,
which come at interval of 5-10 seconds sometimes and have block
length zero but still contain 1-2 valid datagrams present.

According to the NCM spec:

"If wBlockLength = 0x0000, the block is terminated by a
short packet. In this case, the USB transfer must still
be shorter than dwNtbInMaxSize or dwNtbOutMaxSize. If
exactly dwNtbInMaxSize or dwNtbOutMaxSize bytes are sent,
and the size is a multiple of wMaxPacketSize for the
given pipe, then no ZLP shall be sent.

wBlockLength= 0x0000 must be used with extreme care, because
of the possibility that the host and device may get out of
sync, and because of test issues.

wBlockLength = 0x0000 allows the sender to reduce latency by
starting to send a very large NTB, and then shortening it when
the sender discovers that there's not sufficient data to justify
sending a large NTB"

However, there is a potential issue with the current implementation,
as it checks for the occurrence of multiple NTBs in a single
giveback by verifying if the leftover bytes to be processed is zero
or not. If the block length reads zero, we would process the same
NTB infintely because the leftover bytes is never zero and it leads
to a crash. Fix this by bailing out if block length reads zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224681">SUSE bug 1224681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35826" ref_url="https://www.suse.com/security/cve/CVE-2024-35826" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix page refcounts for unaligned buffers in __bio_release_pages()

Fix an incorrect number of pages being released for buffers that do not
start at the beginning of a page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35826/">CVE-2024-35826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35826">CVE-2024-35826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224610">SUSE bug 1224610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35827" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35827" ref_url="https://www.suse.com/security/cve/CVE-2024-35827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: fix overflow check in io_recvmsg_mshot_prep()

The "controllen" variable is type size_t (unsigned long).  Casting it
to int could lead to an integer underflow.

The check_add_overflow() function considers the type of the destination
which is type int.  If we add two positive values and the result cannot
fit in an integer then that's counted as an overflow.

However, if we cast "controllen" to an int and it turns negative, then
negative values *can* fit into an int type so there is no overflow.

Good: 100 + (unsigned long)-4 = 96  &lt;-- overflow
 Bad: 100 + (int)-4 = 96 &lt;-- no overflow

I deleted the cast of the sizeof() as well.  That's not a bug but the
cast is unnecessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35827/">CVE-2024-35827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35827">CVE-2024-35827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224606">SUSE bug 1224606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()

In the for statement of lbs_allocate_cmd_buffer(), if the allocation of
cmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to
be freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224622">SUSE bug 1224622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35829" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/lima: fix a memleak in lima_heap_alloc

When lima_vm_map_bo fails, the resources need to be deallocated, or
there will be memleaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224707">SUSE bug 1224707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: tc358743: register v4l2 async device only after successful setup

Ensure the device has been setup correctly before registering the v4l2
async device, thus allowing userspace to access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224680">SUSE bug 1224680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35831" ref_url="https://www.suse.com/security/cve/CVE-2024-35831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: Fix release of pinned pages when __io_uaddr_map fails

Looking at the error path of __io_uaddr_map, if we fail after pinning
the pages for any reasons, ret will be set to -EINVAL and the error
handler won't properly release the pinned pages.

I didn't manage to trigger it without forcing a failure, but it can
happen in real life when memory is heavily fragmented.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35831/">CVE-2024-35831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35831">CVE-2024-35831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224698">SUSE bug 1224698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35832" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35832" ref_url="https://www.suse.com/security/cve/CVE-2024-35832" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcachefs: kvfree bch_fs::snapshots in bch2_fs_snapshots_exit

bch_fs::snapshots is allocated by kvzalloc in __snapshot_t_mut.
It should be freed by kvfree not kfree.
Or umount will triger:

[  406.829178 ] BUG: unable to handle page fault for address: ffffe7b487148008
[  406.830676 ] #PF: supervisor read access in kernel mode
[  406.831643 ] #PF: error_code(0x0000) - not-present page
[  406.832487 ] PGD 0 P4D 0
[  406.832898 ] Oops: 0000 [#1] PREEMPT SMP PTI
[  406.833512 ] CPU: 2 PID: 1754 Comm: umount Kdump: loaded Tainted: G           OE      6.7.0-rc7-custom+ #90
[  406.834746 ] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
[  406.835796 ] RIP: 0010:kfree+0x62/0x140
[  406.836197 ] Code: 80 48 01 d8 0f 82 e9 00 00 00 48 c7 c2 00 00 00 80 48 2b 15 78 9f 1f 01 48 01 d0 48 c1 e8 0c 48 c1 e0 06 48 03 05 56 9f 1f 01 &lt;48&gt; 8b 50 08 48 89 c7 f6 c2 01 0f 85 b0 00 00 00 66 90 48 8b 07 f6
[  406.837810 ] RSP: 0018:ffffb9d641607e48 EFLAGS: 00010286
[  406.838213 ] RAX: ffffe7b487148000 RBX: ffffb9d645200000 RCX: ffffb9d641607dc4
[  406.838738 ] RDX: 000065bb00000000 RSI: ffffffffc0d88b84 RDI: ffffb9d645200000
[  406.839217 ] RBP: ffff9a4625d00068 R08: 0000000000000001 R09: 0000000000000001
[  406.839650 ] R10: 0000000000000001 R11: 000000000000001f R12: ffff9a4625d4da80
[  406.840055 ] R13: ffff9a4625d00000 R14: ffffffffc0e2eb20 R15: 0000000000000000
[  406.840451 ] FS:  00007f0a264ffb80(0000) GS:ffff9a4e2d500000(0000) knlGS:0000000000000000
[  406.840851 ] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  406.841125 ] CR2: ffffe7b487148008 CR3: 000000018c4d2000 CR4: 00000000000006f0
[  406.841464 ] Call Trace:
[  406.841583 ]  &lt;TASK&gt;
[  406.841682 ]  ? __die+0x1f/0x70
[  406.841828 ]  ? page_fault_oops+0x159/0x470
[  406.842014 ]  ? fixup_exception+0x22/0x310
[  406.842198 ]  ? exc_page_fault+0x1ed/0x200
[  406.842382 ]  ? asm_exc_page_fault+0x22/0x30
[  406.842574 ]  ? bch2_fs_release+0x54/0x280 [bcachefs]
[  406.842842 ]  ? kfree+0x62/0x140
[  406.842988 ]  ? kfree+0x104/0x140
[  406.843138 ]  bch2_fs_release+0x54/0x280 [bcachefs]
[  406.843390 ]  kobject_put+0xb7/0x170
[  406.843552 ]  deactivate_locked_super+0x2f/0xa0
[  406.843756 ]  cleanup_mnt+0xba/0x150
[  406.843917 ]  task_work_run+0x59/0xa0
[  406.844083 ]  exit_to_user_mode_prepare+0x197/0x1a0
[  406.844302 ]  syscall_exit_to_user_mode+0x16/0x40
[  406.844510 ]  do_syscall_64+0x4e/0xf0
[  406.844675 ]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[  406.844907 ] RIP: 0033:0x7f0a2664e4fb
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35832/">CVE-2024-35832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35832">CVE-2024-35832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224748">SUSE bug 1224748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA

This dma_alloc_coherent() is undone neither in the remove function, nor in
the error handling path of fsl_qdma_probe().

Switch to the managed version to fix both issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224632">SUSE bug 1224632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35834" ref_url="https://www.suse.com/security/cve/CVE-2024-35834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: recycle buffer in case Rx queue was full

Add missing xsk_buff_free() call when __xsk_rcv_zc() failed to produce
descriptor to XSK Rx queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35834/">CVE-2024-35834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35834">CVE-2024-35834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224620">SUSE bug 1224620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a double-free in arfs_create_groups

When `in` allocated by kvzalloc fails, arfs_create_groups will free
ft-&gt;g and return an error. However, arfs_create_table, the only caller of
arfs_create_groups, will hold this error and call to
mlx5e_destroy_flow_table, in which the ft-&gt;g will be freed again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224605">SUSE bug 1224605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35836" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35836" ref_url="https://www.suse.com/security/cve/CVE-2024-35836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpll: fix pin dump crash for rebound module

When a kernel module is unbound but the pin resources were not entirely
freed (other kernel module instance of the same PCI device have had kept
the reference to that pin), and kernel module is again bound, the pin
properties would not be updated (the properties are only assigned when
memory for the pin is allocated), prop pointer still points to the
kernel module memory of the kernel module which was deallocated on the
unbind.

If the pin dump is invoked in this state, the result is a kernel crash.
Prevent the crash by storing persistent pin properties in dpll subsystem,
copy the content from the kernel module when pin is allocated, instead of
using memory of the kernel module.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35836/">CVE-2024-35836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35836">CVE-2024-35836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224633">SUSE bug 1224633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mvpp2: clear BM pool before initialization

Register value persist after booting the kernel using
kexec which results in kernel panic. Thus clear the
BM pool registers before initialisation to fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224500">SUSE bug 1224500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35838" ref_url="https://www.suse.com/security/cve/CVE-2024-35838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix potential sta-link leak

When a station is allocated, links are added but not
set to valid yet (e.g. during connection to an AP MLD),
we might remove the station without ever marking links
valid, and leak them. Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35838/">CVE-2024-35838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35838">CVE-2024-35838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224613">SUSE bug 1224613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35840" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35840" ref_url="https://www.suse.com/security/cve/CVE-2024-35840" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: use OPTION_MPTCP_MPJ_SYNACK in subflow_finish_connect()

subflow_finish_connect() uses four fields (backup, join_id, thmac, none)
that may contain garbage unless OPTION_MPTCP_MPJ_SYNACK has been set
in mptcp_parse_option()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35840/">CVE-2024-35840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35840">CVE-2024-35840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224597">SUSE bug 1224597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35841" ref_url="https://www.suse.com/security/cve/CVE-2024-35841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls, fix WARNIING in __sk_msg_free

A splice with MSG_SPLICE_PAGES will cause tls code to use the
tls_sw_sendmsg_splice path in the TLS sendmsg code to move the user
provided pages from the msg into the msg_pl. This will loop over the
msg until msg_pl is full, checked by sk_msg_full(msg_pl). The user
can also set the MORE flag to hint stack to delay sending until receiving
more pages and ideally a full buffer.

If the user adds more pages to the msg than can fit in the msg_pl
scatterlist (MAX_MSG_FRAGS) we should ignore the MORE flag and send
the buffer anyways.

What actually happens though is we abort the msg to msg_pl scatterlist
setup and then because we forget to set 'full record' indicating we
can no longer consume data without a send we fallthrough to the 'continue'
path which will check if msg_data_left(msg) has more bytes to send and
then attempts to fit them in the already full msg_pl. Then next
iteration of sender doing send will encounter a full msg_pl and throw
the warning in the syzbot report.

To fix simply check if we have a full_record in splice code path and
if not send the msg regardless of MORE flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35841/">CVE-2024-35841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35841">CVE-2024-35841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224687">SUSE bug 1224687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35842" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35842" ref_url="https://www.suse.com/security/cve/CVE-2024-35842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: sof-common: Add NULL check for normal_link string

It's not granted that all entries of struct sof_conn_stream declare
a `normal_link` (a non-SOF, direct link) string, and this is the case
for SoCs that support only SOF paths (hence do not support both direct
and SOF usecases).

For example, in the case of MT8188 there is no normal_link string in
any of the sof_conn_stream entries and there will be more drivers
doing that in the future.

To avoid possible NULL pointer KPs, add a NULL check for `normal_link`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35842/">CVE-2024-35842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35842">CVE-2024-35842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224688">SUSE bug 1224688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35843" ref_url="https://www.suse.com/security/cve/CVE-2024-35843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Use device rbtree in iopf reporting path

The existing I/O page fault handler currently locates the PCI device by
calling pci_get_domain_bus_and_slot(). This function searches the list
of all PCI devices until the desired device is found. To improve lookup
efficiency, replace it with device_rbtree_find() to search the device
within the probed device rbtree.

The I/O page fault is initiated by the device, which does not have any
synchronization mechanism with the software to ensure that the device
stays in the probed device tree. Theoretically, a device could be released
by the IOMMU subsystem after device_rbtree_find() and before
iopf_get_dev_fault_param(), which would cause a use-after-free problem.

Add a mutex to synchronize the I/O page fault reporting path and the IOMMU
release device path. This lock doesn't introduce any performance overhead,
as the conflict between I/O page fault reporting and device releasing is
very rare.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35843/">CVE-2024-35843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35843">CVE-2024-35843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224751">SUSE bug 1224751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227368">SUSE bug 1227368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35844" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35844" ref_url="https://www.suse.com/security/cve/CVE-2024-35844" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: compress: fix reserve_cblocks counting error when out of space

When a file only needs one direct_node, performing the following
operations will cause the file to be unrepairable:

unisoc # ./f2fs_io compress test.apk
unisoc #df -h | grep dm-48
/dev/block/dm-48 112G 112G 1.2M 100% /data

unisoc # ./f2fs_io release_cblocks test.apk
924
unisoc # df -h | grep dm-48
/dev/block/dm-48 112G 112G 4.8M 100% /data

unisoc # dd if=/dev/random of=file4 bs=1M count=3
3145728 bytes (3.0 M) copied, 0.025 s, 120 M/s
unisoc # df -h | grep dm-48
/dev/block/dm-48 112G 112G 1.8M 100% /data

unisoc # ./f2fs_io reserve_cblocks test.apk
F2FS_IOC_RESERVE_COMPRESS_BLOCKS failed: No space left on device

adb reboot
unisoc # df -h  | grep dm-48
/dev/block/dm-48             112G 112G   11M 100% /data
unisoc # ./f2fs_io reserve_cblocks test.apk
0

This is because the file has only one direct_node. After returning
to -ENOSPC, reserved_blocks += ret will not be executed. As a result,
the reserved_blocks at this time is still 0, which is not the real
number of reserved blocks. Therefore, fsck cannot be set to repair
the file.

After this patch, the fsck flag will be set to fix this problem.

unisoc # df -h | grep dm-48
/dev/block/dm-48             112G 112G  1.8M 100% /data
unisoc # ./f2fs_io reserve_cblocks test.apk
F2FS_IOC_RESERVE_COMPRESS_BLOCKS failed: No space left on device

adb reboot then fsck will be executed
unisoc # df -h  | grep dm-48
/dev/block/dm-48             112G 112G   11M 100% /data
unisoc # ./f2fs_io reserve_cblocks test.apk
924
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35844/">CVE-2024-35844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35844">CVE-2024-35844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224594">SUSE bug 1224594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: dbg-tlv: ensure NUL termination

The iwl_fw_ini_debug_info_tlv is used as a string, so we must
ensure the string is terminated correctly before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224731">SUSE bug 1224731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35846" ref_url="https://www.suse.com/security/cve/CVE-2024-35846" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: zswap: fix shrinker NULL crash with cgroup_disable=memory

Christian reports a NULL deref in zswap that he bisected down to the zswap
shrinker.  The issue also cropped up in the bug trackers of libguestfs [1]
and the Red Hat bugzilla [2].

The problem is that when memcg is disabled with the boot time flag, the
zswap shrinker might get called with sc-&gt;memcg == NULL.  This is okay in
many places, like the lruvec operations.  But it crashes in
memcg_page_state() - which is only used due to the non-node accounting of
cgroup's the zswap memory to begin with.

Nhat spotted that the memcg can be NULL in the memcg-disabled case, and I
was then able to reproduce the crash locally as well.

[1] https://github.com/libguestfs/libguestfs/issues/139
[2] https://bugzilla.redhat.com/show_bug.cgi?id=2275252
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35846/">CVE-2024-35846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35846">CVE-2024-35846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224595">SUSE bug 1224595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35847" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Prevent double free on error

The error handling path in its_vpe_irq_domain_alloc() causes a double free
when its_vpe_init() fails after successfully allocating at least one
interrupt. This happens because its_vpe_irq_domain_free() frees the
interrupts along with the area bitmap and the vprop_page and
its_vpe_irq_domain_alloc() subsequently frees the area bitmap and the
vprop_page again.

Fix this by unconditionally invoking its_vpe_irq_domain_free() which
handles all cases correctly and by removing the bitmap/vprop_page freeing
from its_vpe_irq_domain_alloc().

[ tglx: Massaged change log ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224697">SUSE bug 1224697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eeprom: at24: fix memory corruption race condition

If the eeprom is not accessible, an nvmem device will be registered, the
read will fail, and the device will be torn down. If another driver
accesses the nvmem device after the teardown, it will reference
invalid memory.

Move the failure point before registering the nvmem device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224612">SUSE bug 1224612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix information leak in btrfs_ioctl_logical_to_ino()

Syzbot reported the following information leak for in
btrfs_ioctl_logical_to_ino():

  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
  BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40
   instrument_copy_to_user include/linux/instrumented.h:114 [inline]
   _copy_to_user+0xbc/0x110 lib/usercopy.c:40
   copy_to_user include/linux/uaccess.h:191 [inline]
   btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499
   btrfs_ioctl+0x714/0x1260
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:904 [inline]
   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890
   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890
   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Uninit was created at:
   __kmalloc_large_node+0x231/0x370 mm/slub.c:3921
   __do_kmalloc_node mm/slub.c:3954 [inline]
   __kmalloc_node+0xb07/0x1060 mm/slub.c:3973
   kmalloc_node include/linux/slab.h:648 [inline]
   kvmalloc_node+0xc0/0x2d0 mm/util.c:634
   kvmalloc include/linux/slab.h:766 [inline]
   init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779
   btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480
   btrfs_ioctl+0x714/0x1260
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:904 [inline]
   __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890
   __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890
   x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Bytes 40-65535 of 65536 are uninitialized
  Memory access of size 65536 starts at ffff888045a40000

This happens, because we're copying a 'struct btrfs_data_container' back
to user-space. This btrfs_data_container is allocated in
'init_data_container()' via kvmalloc(), which does not zero-fill the
memory.

Fix this by using kvzalloc() which zeroes out the memory on allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224733">SUSE bug 1224733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35850" ref_url="https://www.suse.com/security/cve/CVE-2024-35850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix NULL-deref on non-serdev setup

Qualcomm ROME controllers can be registered from the Bluetooth line
discipline and in this case the HCI UART serdev pointer is NULL.

Add the missing sanity check to prevent a NULL-pointer dereference when
setup() is called for a non-serdev controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35850/">CVE-2024-35850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35850">CVE-2024-35850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224600">SUSE bug 1224600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix NULL-deref on non-serdev suspend

Qualcomm ROME controllers can be registered from the Bluetooth line
discipline and in this case the HCI UART serdev pointer is NULL.

Add the missing sanity check to prevent a NULL-pointer dereference when
wakeup() is called for a non-serdev controller during suspend.

Just return true for now to restore the original behaviour and address
the crash with pre-6.2 kernels, which do not have commit e9b3e5b8c657
("Bluetooth: hci_qca: only assign wakeup with serial port support") that
causes the crash to happen already at setup() time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224509">SUSE bug 1224509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work

The rehash delayed work is rescheduled with a delay if the number of
credits at end of the work is not negative as supposedly it means that
the migration ended. Otherwise, it is rescheduled immediately.

After "mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
rehash" the above is no longer accurate as a non-negative number of
credits is no longer indicative of the migration being done. It can also
happen if the work encountered an error in which case the migration will
resume the next time the work is scheduled.

The significance of the above is that it is possible for the work to be
pending and associated with hints that were allocated when the migration
started. This leads to the hints being leaked [1] when the work is
canceled while pending as part of ACL region dismantle.

Fix by freeing the hints if hints are associated with a work that was
canceled while pending.

Blame the original commit since the reliance on not having a pending
work associated with hints is fragile.

[1]
unreferenced object 0xffff88810e7c3000 (size 256):
  comm "kworker/0:16", pid 176, jiffies 4295460353
  hex dump (first 32 bytes):
    00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80  .0......a.......
    00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00  ..a.@...........
  backtrace (crc 2544ddb9):
    [&lt;00000000cf8cfab3&gt;] kmalloc_trace+0x23f/0x2a0
    [&lt;000000004d9a1ad9&gt;] objagg_hints_get+0x42/0x390
    [&lt;000000000b143cf3&gt;] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400
    [&lt;0000000059bdb60a&gt;] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160
    [&lt;00000000e81fd734&gt;] process_one_work+0x59c/0xf20
    [&lt;00000000ceee9e81&gt;] worker_thread+0x799/0x12c0
    [&lt;00000000bda6fe39&gt;] kthread+0x246/0x300
    [&lt;0000000070056d23&gt;] ret_from_fork+0x34/0x70
    [&lt;00000000dea2b93e&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224502">SUSE bug 1224502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix memory leak during rehash

The rehash delayed work migrates filters from one region to another.
This is done by iterating over all chunks (all the filters with the same
priority) in the region and in each chunk iterating over all the
filters.

If the migration fails, the code tries to migrate the filters back to
the old region. However, the rollback itself can also fail in which case
another migration will be erroneously performed. Besides the fact that
this ping pong is not a very good idea, it also creates a problem.

Each virtual chunk references two chunks: The currently used one
('vchunk-&gt;chunk') and a backup ('vchunk-&gt;chunk2'). During migration the
first holds the chunk we want to migrate filters to and the second holds
the chunk we are migrating filters from.

The code currently assumes - but does not verify - that the backup chunk
does not exist (NULL) if the currently used chunk does not reference the
target region. This assumption breaks when we are trying to rollback a
rollback, resulting in the backup chunk being overwritten and leaked
[1].

Fix by not rolling back a failed rollback and add a warning to avoid
future cases.

[1]
WARNING: CPU: 5 PID: 1063 at lib/parman.c:291 parman_destroy+0x17/0x20
Modules linked in:
CPU: 5 PID: 1063 Comm: kworker/5:11 Tainted: G        W          6.9.0-rc2-custom-00784-gc6a05c468a0b #14
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:parman_destroy+0x17/0x20
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_region_fini+0x19/0x60
 mlxsw_sp_acl_tcam_region_destroy+0x49/0xf0
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x1f1/0x470
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224604">SUSE bug 1224604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash

The rehash delayed work migrates filters from one region to another
according to the number of available credits.

The migrated from region is destroyed at the end of the work if the
number of credits is non-negative as the assumption is that this is
indicative of migration being complete. This assumption is incorrect as
a non-negative number of credits can also be the result of a failed
migration.

The destruction of a region that still has filters referencing it can
result in a use-after-free [1].

Fix by not destroying the region if migration failed.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230
Read of size 8 at addr ffff8881735319e8 by task kworker/0:31/3858

CPU: 0 PID: 3858 Comm: kworker/0:31 Tainted: G        W          6.9.0-rc2-custom-00782-gf2275c2157d8 #5
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xce/0x670
 kasan_report+0xd7/0x110
 mlxsw_sp_acl_ctcam_region_entry_remove+0x21d/0x230
 mlxsw_sp_acl_ctcam_entry_del+0x2e/0x70
 mlxsw_sp_acl_atcam_entry_del+0x81/0x210
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3cd/0xb50
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 174:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 __kmalloc+0x19c/0x360
 mlxsw_sp_acl_tcam_region_create+0xdf/0x9c0
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x954/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30

Freed by task 7:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 poison_slab_object+0x102/0x170
 __kasan_slab_free+0x14/0x30
 kfree+0xc1/0x290
 mlxsw_sp_acl_tcam_region_destroy+0x272/0x310
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x731/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update

The rule activity update delayed work periodically traverses the list of
configured rules and queries their activity from the device.

As part of this task it accesses the entry pointed by 'ventry-&gt;entry',
but this entry can be changed concurrently by the rehash delayed work,
leading to a use-after-free [1].

Fix by closing the race and perform the activity query under the
'vregion-&gt;lock' mutex.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140
Read of size 8 at addr ffff8881054ed808 by task kworker/0:18/181

CPU: 0 PID: 181 Comm: kworker/0:18 Not tainted 6.9.0-rc2-custom-00781-gd5ab772d32f7 #2
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_rule_activity_update_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xce/0x670
 kasan_report+0xd7/0x110
 mlxsw_sp_acl_tcam_flower_rule_activity_get+0x121/0x140
 mlxsw_sp_acl_rule_activity_update_work+0x219/0x400
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 1039:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 __kmalloc+0x19c/0x360
 mlxsw_sp_acl_tcam_entry_create+0x7b/0x1f0
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x30d/0xb50
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30

Freed by task 1039:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 poison_slab_object+0x102/0x170
 __kasan_slab_free+0x14/0x30
 kfree+0xc1/0x290
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x3d7/0xb50
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x157/0x1300
 process_one_work+0x8eb/0x19b0
 worker_thread+0x6c9/0xf70
 kthread+0x2c9/0x3b0
 ret_from_fork+0x4d/0x80
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224694">SUSE bug 1224694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35856" ref_url="https://www.suse.com/security/cve/CVE-2024-35856" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: Fix double free of skb in coredump

hci_devcd_append() would free the skb on error so the caller don't
have to free it again otherwise it would cause the double free of skb.

Reported-by : Dan Carpenter &lt;dan.carpenter@linaro.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35856/">CVE-2024-35856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35856">CVE-2024-35856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224695">SUSE bug 1224695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp: prevent possible NULL dereferences from icmp_build_probe()

First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.

if (__in_dev_get_rcu(dev) &amp;&amp; __in_dev_get_rcu(dev)-&gt;ifa_list)

Second problem is a read from dev-&gt;ip6_ptr with no NULL check:

if (!list_empty(&amp;rcu_dereference(dev-&gt;ip6_ptr)-&gt;addr_list))

Use the correct RCU API to fix these.

v2: add missing include &lt;net/addrconf.h&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224619">SUSE bug 1224619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35858" ref_url="https://www.suse.com/security/cve/CVE-2024-35858" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bcmasp: fix memory leak when bringing down interface

When bringing down the TX rings we flush the rings but forget to
reclaimed the flushed packets. This leads to a memory leak since we
do not free the dma mapped buffers. This also leads to tx control
block corruption when bringing down the interface for power
management.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35858/">CVE-2024-35858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35858">CVE-2024-35858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224625">SUSE bug 1224625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35859" ref_url="https://www.suse.com/security/cve/CVE-2024-35859" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix module reference leakage from bdev_open_by_dev error path

At the time bdev_may_open() is called, module reference is grabbed
already, hence module reference should be released if bdev_may_open()
failed.

This problem is found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35859/">CVE-2024-35859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35859">CVE-2024-35859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224593">SUSE bug 1224593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: support deferring bpf_link dealloc to after RCU grace period

BPF link for some program types is passed as a "context" which can be
used by those BPF programs to look up additional information. E.g., for
multi-kprobes and multi-uprobes, link is used to fetch BPF cookie values.

Because of this runtime dependency, when bpf_link refcnt drops to zero
there could still be active BPF programs running accessing link data.

This patch adds generic support to defer bpf_link dealloc callback to
after RCU GP, if requested. This is done by exposing two different
deallocation callbacks, one synchronous and one deferred. If deferred
one is provided, bpf_link_free() will schedule dealloc_deferred()
callback to happen after RCU GP.

BPF is using two flavors of RCU: "classic" non-sleepable one and RCU
tasks trace one. The latter is used when sleepable BPF programs are
used. bpf_link_free() accommodates that by checking underlying BPF
program's sleepable flag, and goes either through normal RCU GP only for
non-sleepable, or through RCU tasks trace GP *and* then normal RCU GP
(taking into account rcu_trace_implies_rcu_gp() optimization), if BPF
program is sleepable.

We use this for multi-kprobe and multi-uprobe links, which dereference
link during program run. We also preventively switch raw_tp link to use
deferred dealloc callback, as upcoming changes in bpf-next tree expose
raw_tp link data (specifically, cookie value) to BPF program at runtime
as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224531">SUSE bug 1224531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225312">SUSE bug 1225312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_network_name_deleted()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225311">SUSE bug 1225311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in is_valid_oplock_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225011">SUSE bug 1225011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_valid_lease_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225309">SUSE bug 1225309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35865" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_is_valid_oplock_break()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224668">SUSE bug 1224668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_dump_full_key()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224667">SUSE bug 1224667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_show()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225012">SUSE bug 1225012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in cifs_stats_proc_write()

Skip sessions that are being teared down (status == SES_EXITING) to
avoid UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: guarantee refcounted children from parent session

Avoid potential use-after-free bugs when walking DFS referrals,
mounting and performing DFS failover by ensuring that all children
from parent @tcon-&gt;ses are also refcounted.  They're all needed across
the entire DFS mount.  Get rid of @tcon-&gt;dfs_ses_list while we're at
it, too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226328">SUSE bug 1226328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in smb2_reconnect_server()

The UAF bug is due to smb2_reconnect_server() accessing a session that
is already being teared down by another thread that is executing
__cifs_put_smb_ses().  This can happen when (a) the client has
connection to the server but no session or (b) another thread ends up
setting @ses-&gt;ses_status again to something different than
SES_EXITING.

To fix this, we need to make sure to unconditionally set
@ses-&gt;ses_status to SES_EXITING and prevent any other threads from
setting a new status while we're still tearing it down.

The following can be reproduced by adding some delay to right after
the ipc is freed in __cifs_put_smb_ses() - which will give
smb2_reconnect_server() worker a chance to run and then accessing
@ses-&gt;ipc:

kinit ...
mount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10
[disconnect srv]
ls /mnt/1 &amp;&gt;/dev/null
sleep 30
kdestroy
[reconnect srv]
sleep 10
umount /mnt/1
...
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
general protection fault, probably for non-canonical address
0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39
04/01/2014
Workqueue: cifsiod smb2_reconnect_server [cifs]
RIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0
Code: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad
de 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 &lt;48&gt; 8b 01 48 39 f8 75
7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8
RSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83
RAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b
RDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800
RBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000
R13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000
FS: 0000000000000000(0000) GS:ffff888157c00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? die_addr+0x36/0x90
 ? exc_general_protection+0x1c1/0x3f0
 ? asm_exc_general_protection+0x26/0x30
 ? __list_del_entry_valid_or_report+0x33/0xf0
 __cifs_put_smb_ses+0x1ae/0x500 [cifs]
 smb2_reconnect_server+0x4ed/0x710 [cifs]
 process_one_work+0x205/0x6b0
 worker_thread+0x191/0x360
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe2/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224672">SUSE bug 1224672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix GUP-fast succeeding on secretmem folios

folio_is_secretmem() currently relies on secretmem folios being LRU
folios, to save some cycles.

However, folios might reside in a folio batch without the LRU flag set, or
temporarily have their LRU flag cleared.  Consequently, the LRU flag is
unreliable for this purpose.

In particular, this is the case when secretmem_fault() allocates a fresh
page and calls filemap_add_folio()-&gt;folio_add_lru().  The folio might be
added to the per-cpu folio batch and won't get the LRU flag set until the
batch was drained using e.g., lru_add_drain().

Consequently, folio_is_secretmem() might not detect secretmem folios and
GUP-fast can succeed in grabbing a secretmem folio, crashing the kernel
when we would later try reading/writing to the folio, because the folio
has been unmapped from the directmap.

Fix it by removing that unreliable check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224530">SUSE bug 1224530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35873" ref_url="https://www.suse.com/security/cve/CVE-2024-35873" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Fix vector state restore in rt_sigreturn()

The RISC-V Vector specification states in "Appendix D: Calling
Convention for Vector State" [1] that "Executing a system call causes
all caller-saved vector registers (v0-v31, vl, vtype) and vstart to
become unspecified.". In the RISC-V kernel this is called "discarding
the vstate".

Returning from a signal handler via the rt_sigreturn() syscall, vector
discard is also performed. However, this is not an issue since the
vector state should be restored from the sigcontext, and therefore not
care about the vector discard.

The "live state" is the actual vector register in the running context,
and the "vstate" is the vector state of the task. A dirty live state,
means that the vstate and live state are not in synch.

When vectorized user_from_copy() was introduced, an bug sneaked in at
the restoration code, related to the discard of the live state.

An example when this go wrong:

  1. A userland application is executing vector code
  2. The application receives a signal, and the signal handler is
     entered.
  3. The application returns from the signal handler, using the
     rt_sigreturn() syscall.
  4. The live vector state is discarded upon entering the
     rt_sigreturn(), and the live state is marked as "dirty", indicating
     that the live state need to be synchronized with the current
     vstate.
  5. rt_sigreturn() restores the vstate, except the Vector registers,
     from the sigcontext
  6. rt_sigreturn() restores the Vector registers, from the sigcontext,
     and now the vectorized user_from_copy() is used. The dirty live
     state from the discard is saved to the vstate, making the vstate
     corrupt.
  7. rt_sigreturn() returns to the application, which crashes due to
     corrupted vstate.

Note that the vectorized user_from_copy() is invoked depending on the
value of CONFIG_RISCV_ISA_V_UCOPY_THRESHOLD. Default is 768, which
means that vlen has to be larger than 128b for this bug to trigger.

The fix is simply to mark the live state as non-dirty/clean prior
performing the vstate restore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35873/">CVE-2024-35873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35873">CVE-2024-35873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224529">SUSE bug 1224529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35874" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35874" ref_url="https://www.suse.com/security/cve/CVE-2024-35874" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aio: Fix null ptr deref in aio_complete() wakeup

list_del_init_careful() needs to be the last access to the wait queue
entry - it effectively unlocks access.

Previously, finish_wait() would see the empty list head and skip taking
the lock, and then we'd return - but the completion path would still
attempt to do the wakeup after the task_struct pointer had been
overwritten.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35874/">CVE-2024-35874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35874">CVE-2024-35874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224527">SUSE bug 1224527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/coco: Require seeding RNG with RDRAND on CoCo systems

There are few uses of CoCo that don't rely on working cryptography and
hence a working RNG. Unfortunately, the CoCo threat model means that the
VM host cannot be trusted and may actively work against guests to
extract secrets or manipulate computation. Since a malicious host can
modify or observe nearly all inputs to guests, the only remaining source
of entropy for CoCo guests is RDRAND.

If RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole
is meant to gracefully continue on gathering entropy from other sources,
but since there aren't other sources on CoCo, this is catastrophic.
This is mostly a concern at boot time when initially seeding the RNG, as
after that the consequences of a broken RDRAND are much more
theoretical.

So, try at boot to seed the RNG using 256 bits of RDRAND output. If this
fails, panic(). This will also trigger if the system is booted without
RDRAND, as RDRAND is essential for a safe CoCo boot.

Add this deliberately to be "just a CoCo x86 driver feature" and not
part of the RNG itself. Many device drivers and platforms have some
desire to contribute something to the RNG, and add_device_randomness()
is specifically meant for this purpose.

Any driver can call it with seed data of any quality, or even garbage
quality, and it can only possibly make the quality of the RNG better or
have no effect, but can never make it worse.

Rather than trying to build something into the core of the RNG, consider
the particular CoCo issue just a CoCo issue, and therefore separate it
all out into driver (well, arch/platform) code.

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224665">SUSE bug 1224665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm/pat: fix VM_PAT handling in COW mappings

PAT handling won't do the right thing in COW mappings: the first PTE (or,
in fact, all PTEs) can be replaced during write faults to point at anon
folios.  Reliably recovering the correct PFN and cachemode using
follow_phys() from PTEs will not work in COW mappings.

Using follow_phys(), we might just get the address+protection of the anon
folio (which is very wrong), or fail on swap/nonswap entries, failing
follow_phys() and triggering a WARN_ON_ONCE() in untrack_pfn() and
track_pfn_copy(), not properly calling free_pfn_range().

In free_pfn_range(), we either wouldn't call memtype_free() or would call
it with the wrong range, possibly leaking memory.

To fix that, let's update follow_phys() to refuse returning anon folios,
and fallback to using the stored PFN inside vma-&gt;vm_pgoff for COW mappings
if we run into that.

We will now properly handle untrack_pfn() with COW mappings, where we
don't need the cachemode.  We'll have to fail fork()-&gt;track_pfn_copy() if
the first page was replaced by an anon folio, though: we'd have to store
the cachemode in the VMA to make this work, likely growing the VMA size.

For now, lets keep it simple and let track_pfn_copy() just fail in that
case: it would have failed in the past with swap/nonswap entries already,
and it would have done the wrong thing with anon folios.

Simple reproducer to trigger the WARN_ON_ONCE() in untrack_pfn():

&lt;--- C reproducer ---&gt;
 #include &lt;stdio.h&gt;
 #include &lt;sys/mman.h&gt;
 #include &lt;unistd.h&gt;
 #include &lt;liburing.h&gt;

 int main(void)
 {
         struct io_uring_params p = {};
         int ring_fd;
         size_t size;
         char *map;

         ring_fd = io_uring_setup(1, &amp;p);
         if (ring_fd &lt; 0) {
                 perror("io_uring_setup");
                 return 1;
         }
         size = p.sq_off.array + p.sq_entries * sizeof(unsigned);

         /* Map the submission queue ring MAP_PRIVATE */
         map = mmap(0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE,
                    ring_fd, IORING_OFF_SQ_RING);
         if (map == MAP_FAILED) {
                 perror("mmap");
                 return 1;
         }

         /* We have at least one page. Let's COW it. */
         *map = 0;
         pause();
         return 0;
 }
&lt;--- C reproducer ---&gt;

On a system with 16 GiB RAM and swap configured:
 # ./iouring &amp;
 # memhog 16G
 # killall iouring
[  301.552930] ------------[ cut here ]------------
[  301.553285] WARNING: CPU: 7 PID: 1402 at arch/x86/mm/pat/memtype.c:1060 untrack_pfn+0xf4/0x100
[  301.553989] Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_g
[  301.558232] CPU: 7 PID: 1402 Comm: iouring Not tainted 6.7.5-100.fc38.x86_64 #1
[  301.558772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebu4
[  301.559569] RIP: 0010:untrack_pfn+0xf4/0x100
[  301.559893] Code: 75 c4 eb cf 48 8b 43 10 8b a8 e8 00 00 00 3b 6b 28 74 b8 48 8b 7b 30 e8 ea 1a f7 000
[  301.561189] RSP: 0018:ffffba2c0377fab8 EFLAGS: 00010282
[  301.561590] RAX: 00000000ffffffea RBX: ffff9208c8ce9cc0 RCX: 000000010455e047
[  301.562105] RDX: 07fffffff0eb1e0a RSI: 0000000000000000 RDI: ffff9208c391d200
[  301.562628] RBP: 0000000000000000 R08: ffffba2c0377fab8 R09: 0000000000000000
[  301.563145] R10: ffff9208d2292d50 R11: 0000000000000002 R12: 00007fea890e0000
[  301.563669] R13: 0000000000000000 R14: ffffba2c0377fc08 R15: 0000000000000000
[  301.564186] FS:  0000000000000000(0000) GS:ffff920c2fbc0000(0000) knlGS:0000000000000000
[  301.564773] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  301.565197] CR2: 00007fea88ee8a20 CR3: 00000001033a8000 CR4: 0000000000750ef0
[  301.565725] PKRU: 55555554
[  301.565944] Call Trace:
[  301.566148]  &lt;TASK&gt;
[  301.566325]  ? untrack_pfn+0xf4/0x100
[  301.566618]  ? __warn+0x81/0x130
[  301.566876]  ? untrack_pfn+0xf4/0x100
[  3
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224525">SUSE bug 1224525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: module: prevent NULL pointer dereference in vsnprintf()

In of_modalias(), we can get passed the str and len parameters which would
cause a kernel oops in vsnprintf() since it only allows passing a NULL ptr
when the length is also 0. Also, we need to filter out the negative values
of the len parameter as these will result in a really huge buffer since
snprintf() takes size_t parameter while ours is ssize_t...

Found by Linux Verification Center (linuxtesting.org) with the Svace static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: dynamic: Synchronize of_changeset_destroy() with the devlink removals

In the following sequence:
  1) of_platform_depopulate()
  2) of_overlay_remove()

During the step 1, devices are destroyed and devlinks are removed.
During the step 2, OF nodes are destroyed but
__of_changeset_entry_destroy() can raise warnings related to missing
of_node_put():
  ERROR: memory leak, expected refcount 1 instead of 2 ...

Indeed, during the devlink removals performed at step 1, the removal
itself releasing the device (and the attached of_node) is done by a job
queued in a workqueue and so, it is done asynchronously with respect to
function calls.
When the warning is present, of_node_put() will be called but wrongly
too late from the workqueue job.

In order to be sure that any ongoing devlink removals are done before
the of_node destruction, synchronize the of_changeset_destroy() with the
devlink removals.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224524">SUSE bug 1224524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35880" ref_url="https://www.suse.com/security/cve/CVE-2024-35880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: hold io_buffer_list reference over mmap

If we look up the kbuf, ensure that it doesn't get unregistered until
after we're done with it. Since we're inside mmap, we cannot safely use
the io_uring lock. Rely on the fact that we can lookup the buffer list
under RCU now and grab a reference to it, preventing it from being
unregistered until we're done with it. The lookup returns the
io_buffer_list directly with it referenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35880/">CVE-2024-35880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35880">CVE-2024-35880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224523">SUSE bug 1224523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35882" ref_url="https://www.suse.com/security/cve/CVE-2024-35882" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix a slow server-side memory leak with RPC-over-TCP

Jan Schunk reports that his small NFS servers suffer from memory
exhaustion after just a few days. A bisect shows that commit
e18e157bb5c8 ("SUNRPC: Send RPC message on TCP with a single
sock_sendmsg() call") is the first bad commit.

That commit assumed that sock_sendmsg() releases all the pages in
the underlying bio_vec array, but the reality is that it doesn't.
svc_xprt_release() releases the rqst's response pages, but the
record marker page fragment isn't one of those, so it is never
released.

This is a narrow fix that can be applied to stable kernels. A
more extensive fix is in the works.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35882/">CVE-2024-35882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35882">CVE-2024-35882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224522">SUSE bug 1224522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35883" ref_url="https://www.suse.com/security/cve/CVE-2024-35883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe

In function pci1xxxx_spi_probe, there is a potential null pointer that
may be caused by a failed memory allocation by the function devm_kzalloc.
Hence, a null pointer check needs to be added to prevent null pointer
dereferencing later in the code.

To fix this issue, spi_bus-&gt;spi_int[iter] should be checked. The memory
allocated by devm_kzalloc will be automatically released, so just directly
return -ENOMEM without worrying about memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35883/">CVE-2024-35883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35883">CVE-2024-35883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224521">SUSE bug 1224521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: do not accept non-tunnel GSO skbs landing in a tunnel

When rx-udp-gro-forwarding is enabled UDP packets might be GROed when
being forwarded. If such packets might land in a tunnel this can cause
various issues and udp_gro_receive makes sure this isn't the case by
looking for a matching socket. This is performed in
udp4/6_gro_lookup_skb but only in the current netns. This is an issue
with tunneled packets when the endpoint is in another netns. In such
cases the packets will be GROed at the UDP level, which leads to various
issues later on. The same thing can happen with rx-gro-list.

We saw this with geneve packets being GROed at the UDP level. In such
case gso_size is set; later the packet goes through the geneve rx path,
the geneve header is pulled, the offset are adjusted and frag_list skbs
are not adjusted with regard to geneve. When those skbs hit
skb_fragment, it will misbehave. Different outcomes are possible
depending on what the GROed skbs look like; from corrupted packets to
kernel crashes.

One example is a BUG_ON[1] triggered in skb_segment while processing the
frag_list. Because gso_size is wrong (geneve header was pulled)
skb_segment thinks there is "geneve header size" of data in frag_list,
although it's in fact the next packet. The BUG_ON itself has nothing to
do with the issue. This is only one of the potential issues.

Looking up for a matching socket in udp_gro_receive is fragile: the
lookup could be extended to all netns (not speaking about performances)
but nothing prevents those packets from being modified in between and we
could still not find a matching socket. It's OK to keep the current
logic there as it should cover most cases but we also need to make sure
we handle tunnel packets being GROed too early.

This is done by extending the checks in udp_unexpected_gso: GSO packets
lacking the SKB_GSO_UDP_TUNNEL/_CSUM bits and landing in a tunnel must
be segmented.

[1] kernel BUG at net/core/skbuff.c:4408!
    RIP: 0010:skb_segment+0xd2a/0xf70
    __udp_gso_segment+0xaa/0x560
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224520">SUSE bug 1224520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxbf_gige: stop interface during shutdown

The mlxbf_gige driver intermittantly encounters a NULL pointer
exception while the system is shutting down via "reboot" command.
The mlxbf_driver will experience an exception right after executing
its shutdown() method.  One example of this exception is:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000011d373000
[0000000000000070] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 96000004 [#1] SMP
CPU: 0 PID: 13 Comm: ksoftirqd/0 Tainted: G S         OE     5.15.0-bf.6.gef6992a #1
Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS 4.0.2.12669 Apr 21 2023
pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]
lr : mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]
sp : ffff8000080d3c10
x29: ffff8000080d3c10 x28: ffffcce72cbb7000 x27: ffff8000080d3d58
x26: ffff0000814e7340 x25: ffff331cd1a05000 x24: ffffcce72c4ea008
x23: ffff0000814e4b40 x22: ffff0000814e4d10 x21: ffff0000814e4128
x20: 0000000000000000 x19: ffff0000814e4a80 x18: ffffffffffffffff
x17: 000000000000001c x16: ffffcce72b4553f4 x15: ffff80008805b8a7
x14: 0000000000000000 x13: 0000000000000030 x12: 0101010101010101
x11: 7f7f7f7f7f7f7f7f x10: c2ac898b17576267 x9 : ffffcce720fa5404
x8 : ffff000080812138 x7 : 0000000000002e9a x6 : 0000000000000080
x5 : ffff00008de3b000 x4 : 0000000000000000 x3 : 0000000000000001
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]
 mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]
 __napi_poll+0x40/0x1c8
 net_rx_action+0x314/0x3a0
 __do_softirq+0x128/0x334
 run_ksoftirqd+0x54/0x6c
 smpboot_thread_fn+0x14c/0x190
 kthread+0x10c/0x110
 ret_from_fork+0x10/0x20
Code: 8b070000 f9000ea0 f95056c0 f86178a1 (b9407002)
---[ end trace 7cc3941aa0d8e6a4 ]---
Kernel panic - not syncing: Oops: Fatal exception in interrupt
Kernel Offset: 0x4ce722520000 from 0xffff800008000000
PHYS_OFFSET: 0x80000000
CPU features: 0x000005c1,a3330e5a
Memory Limit: none
---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

During system shutdown, the mlxbf_gige driver's shutdown() is always executed.
However, the driver's stop() method will only execute if networking interface
configuration logic within the Linux distribution has been setup to do so.

If shutdown() executes but stop() does not execute, NAPI remains enabled
and this can lead to an exception if NAPI is scheduled while the hardware
interface has only been partially deinitialized.

The networking interface managed by the mlxbf_gige driver must be properly
stopped during system shutdown so that IFF_UP is cleared, the hardware
interface is put into a clean state, and NAPI is fully deinitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224519">SUSE bug 1224519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix infinite recursion in fib6_dump_done().

syzkaller reported infinite recursive calls of fib6_dump_done() during
netlink socket destruction.  [1]

From the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then
the response was generated.  The following recvmmsg() resumed the dump
for IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due
to the fault injection.  [0]

  12:01:34 executing program 3:
  r0 = socket$nl_route(0x10, 0x3, 0x0)
  sendmsg$nl_route(r0, ... snip ...)
  recvmmsg(r0, ... snip ...) (fail_nth: 8)

Here, fib6_dump_done() was set to nlk_sk(sk)-&gt;cb.done, and the next call
of inet6_dump_fib() set it to nlk_sk(sk)-&gt;cb.args[3].  syzkaller stopped
receiving the response halfway through, and finally netlink_sock_destruct()
called nlk_sk(sk)-&gt;cb.done().

fib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-&gt;cb.done() if it
is still not NULL.  fib6_dump_end() rewrites nlk_sk(sk)-&gt;cb.done() by
nlk_sk(sk)-&gt;cb.args[3], but it has the same function, not NULL, calling
itself recursively and hitting the stack guard page.

To avoid the issue, let's set the destructor after kzalloc().

[0]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl (lib/dump_stack.c:117)
 should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)
 should_failslab (mm/slub.c:3733)
 kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)
 inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)
 rtnl_dump_all (net/core/rtnetlink.c:4029)
 netlink_dump (net/netlink/af_netlink.c:2269)
 netlink_recvmsg (net/netlink/af_netlink.c:1988)
 ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)
 ___sys_recvmsg (net/socket.c:2846)
 do_recvmmsg (net/socket.c:2943)
 __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)

[1]:
BUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)
stack guard page: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)
Code: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd &lt;53&gt; 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc9000d980000 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3
RDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358
RBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000
R13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68
FS:  0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;#DF&gt;
 &lt;/#DF&gt;
 &lt;TASK&gt;
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 ...
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
 netlink_sock_destruct (net/netlink/af_netlink.c:401)
 __sk_destruct (net/core/sock.c:2177 (discriminator 2))
 sk_destruct (net/core/sock.c:2224)
 __sk_free (net/core/sock.c:2235)
 sk_free (net/core/sock.c:2246)
 process_one_work (kernel/workqueue.c:3259)
 worker_thread (kernel/workqueue.c:3329 kernel/workqueue.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224670">SUSE bug 1224670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: fix use-after-free bugs caused by ax25_ds_del_timer

When the ax25 device is detaching, the ax25_dev_device_down()
calls ax25_ds_del_timer() to cleanup the slave_timer. When
the timer handler is running, the ax25_ds_del_timer() that
calls del_timer() in it will return directly. As a result,
the use-after-free bugs could happen, one of the scenarios
is shown below:

      (Thread 1)          |      (Thread 2)
                          | ax25_ds_timeout()
ax25_dev_device_down()    |
  ax25_ds_del_timer()     |
    del_timer()           |
  ax25_dev_put() //FREE   |
                          |  ax25_dev-&gt; //USE

In order to mitigate bugs, when the device is detaching, use
timer_shutdown_sync() to stop the timer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224663">SUSE bug 1224663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35888" ref_url="https://www.suse.com/security/cve/CVE-2024-35888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erspan: make sure erspan_base_hdr is present in skb-&gt;head

syzbot reported a problem in ip6erspan_rcv() [1]

Issue is that ip6erspan_rcv() (and erspan_rcv()) no longer make
sure erspan_base_hdr is present in skb linear part (skb-&gt;head)
before getting @ver field from it.

Add the missing pskb_may_pull() calls.

v2: Reload iph pointer in erspan_rcv() after pskb_may_pull()
    because skb-&gt;head might have changed.

[1]

 BUG: KMSAN: uninit-value in pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]
 BUG: KMSAN: uninit-value in pskb_may_pull include/linux/skbuff.h:2756 [inline]
 BUG: KMSAN: uninit-value in ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]
 BUG: KMSAN: uninit-value in gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610
  pskb_may_pull_reason include/linux/skbuff.h:2742 [inline]
  pskb_may_pull include/linux/skbuff.h:2756 [inline]
  ip6erspan_rcv net/ipv6/ip6_gre.c:541 [inline]
  gre_rcv+0x11f8/0x1930 net/ipv6/ip6_gre.c:610
  ip6_protocol_deliver_rcu+0x1d4c/0x2ca0 net/ipv6/ip6_input.c:438
  ip6_input_finish net/ipv6/ip6_input.c:483 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492
  ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586
  dst_input include/net/dst.h:460 [inline]
  ip6_rcv_finish+0x955/0x970 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ipv6_rcv+0xde/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5538 [inline]
  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5652
  netif_receive_skb_internal net/core/dev.c:5738 [inline]
  netif_receive_skb+0x58/0x660 net/core/dev.c:5798
  tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1549
  tun_get_user+0x5566/0x69e0 drivers/net/tun.c:2002
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2108 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb63/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xe0 fs/read_write.c:652
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3804 [inline]
  slab_alloc_node mm/slub.c:3845 [inline]
  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
  alloc_skb include/linux/skbuff.h:1318 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
  tun_alloc_skb drivers/net/tun.c:1525 [inline]
  tun_get_user+0x209a/0x69e0 drivers/net/tun.c:1846
  tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048
  call_write_iter include/linux/fs.h:2108 [inline]
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0xb63/0x1520 fs/read_write.c:590
  ksys_write+0x20f/0x4c0 fs/read_write.c:643
  __do_sys_write fs/read_write.c:655 [inline]
  __se_sys_write fs/read_write.c:652 [inline]
  __x64_sys_write+0x93/0xe0 fs/read_write.c:652
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

CPU: 1 PID: 5045 Comm: syz-executor114 Not tainted 6.9.0-rc1-syzkaller-00021-g962490525cff #0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35888/">CVE-2024-35888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224518">SUSE bug 1224518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix kernel panic on unknown packet types

In the very rare case where a packet type is unknown to the driver,
idpf_rx_process_skb_fields would return early without calling
eth_type_trans to set the skb protocol / the network layer handler.
This is especially problematic if tcpdump is running when such a
packet is received, i.e. it would cause a kernel panic.

Instead, call eth_type_trans for every single packet, even when
the packet type is unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224517">SUSE bug 1224517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gro: fix ownership transfer

If packets are GROed with fraglist they might be segmented later on and
continue their journey in the stack. In skb_segment_list those skbs can
be reused as-is. This is an issue as their destructor was removed in
skb_gro_receive_list but not the reference to their socket, and then
they can't be orphaned. Fix this by also removing the reference to the
socket.

For example this could be observed,

  kernel BUG at include/linux/skbuff.h:3131!  (skb_orphan)
  RIP: 0010:ip6_rcv_core+0x11bc/0x19a0
  Call Trace:
   ipv6_list_rcv+0x250/0x3f0
   __netif_receive_skb_list_core+0x49d/0x8f0
   netif_receive_skb_list_internal+0x634/0xd40
   napi_complete_done+0x1d2/0x7d0
   gro_cell_poll+0x118/0x1f0

A similar construction is found in skb_gro_receive, apply the same
change there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224516">SUSE bug 1224516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35891" ref_url="https://www.suse.com/security/cve/CVE-2024-35891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: micrel: Fix potential null pointer dereference

In lan8814_get_sig_rx() and lan8814_get_sig_tx() ptp_parse_header() may
return NULL as ptp_header due to abnormal packet type or corrupted packet.
Fix this bug by adding ptp_header check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35891/">CVE-2024-35891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35891">CVE-2024-35891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224513">SUSE bug 1224513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35892" ref_url="https://www.suse.com/security/cve/CVE-2024-35892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix lockdep splat in qdisc_tree_reduce_backlog()

qdisc_tree_reduce_backlog() is called with the qdisc lock held,
not RTNL.

We must use qdisc_lookup_rcu() instead of qdisc_lookup()

syzbot reported:

WARNING: suspicious RCU usage
6.1.74-syzkaller #0 Not tainted
-----------------------------
net/sched/sch_api.c:305 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
3 locks held by udevd/1142:
  #0: ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:306 [inline]
  #0: ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline]
  #0: ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: net_tx_action+0x64a/0x970 net/core/dev.c:5282
  #1: ffff888171861108 (&amp;sch-&gt;q.lock){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:350 [inline]
  #1: ffff888171861108 (&amp;sch-&gt;q.lock){+.-.}-{2:2}, at: net_tx_action+0x754/0x970 net/core/dev.c:5297
  #2: ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:306 [inline]
  #2: ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline]
  #2: ffffffff87c729a0 (rcu_read_lock){....}-{1:2}, at: qdisc_tree_reduce_backlog+0x84/0x580 net/sched/sch_api.c:792

stack backtrace:
CPU: 1 PID: 1142 Comm: udevd Not tainted 6.1.74-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  [&lt;ffffffff85b85f14&gt;] __dump_stack lib/dump_stack.c:88 [inline]
  [&lt;ffffffff85b85f14&gt;] dump_stack_lvl+0x1b1/0x28f lib/dump_stack.c:106
  [&lt;ffffffff85b86007&gt;] dump_stack+0x15/0x1e lib/dump_stack.c:113
  [&lt;ffffffff81802299&gt;] lockdep_rcu_suspicious+0x1b9/0x260 kernel/locking/lockdep.c:6592
  [&lt;ffffffff84f0054c&gt;] qdisc_lookup+0xac/0x6f0 net/sched/sch_api.c:305
  [&lt;ffffffff84f037c3&gt;] qdisc_tree_reduce_backlog+0x243/0x580 net/sched/sch_api.c:811
  [&lt;ffffffff84f5b78c&gt;] pfifo_tail_enqueue+0x32c/0x4b0 net/sched/sch_fifo.c:51
  [&lt;ffffffff84fbcf63&gt;] qdisc_enqueue include/net/sch_generic.h:833 [inline]
  [&lt;ffffffff84fbcf63&gt;] netem_dequeue+0xeb3/0x15d0 net/sched/sch_netem.c:723
  [&lt;ffffffff84eecab9&gt;] dequeue_skb net/sched/sch_generic.c:292 [inline]
  [&lt;ffffffff84eecab9&gt;] qdisc_restart net/sched/sch_generic.c:397 [inline]
  [&lt;ffffffff84eecab9&gt;] __qdisc_run+0x249/0x1e60 net/sched/sch_generic.c:415
  [&lt;ffffffff84d7aa96&gt;] qdisc_run+0xd6/0x260 include/net/pkt_sched.h:125
  [&lt;ffffffff84d85d29&gt;] net_tx_action+0x7c9/0x970 net/core/dev.c:5313
  [&lt;ffffffff85e002bd&gt;] __do_softirq+0x2bd/0x9bd kernel/softirq.c:616
  [&lt;ffffffff81568bca&gt;] invoke_softirq kernel/softirq.c:447 [inline]
  [&lt;ffffffff81568bca&gt;] __irq_exit_rcu+0xca/0x230 kernel/softirq.c:700
  [&lt;ffffffff81568ae9&gt;] irq_exit_rcu+0x9/0x20 kernel/softirq.c:712
  [&lt;ffffffff85b89f52&gt;] sysvec_apic_timer_interrupt+0x42/0x90 arch/x86/kernel/apic/apic.c:1107
  [&lt;ffffffff85c00ccb&gt;] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:656
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35892/">CVE-2024-35892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35892">CVE-2024-35892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224515">SUSE bug 1224515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_skbmod: prevent kernel-infoleak

syzbot found that tcf_skbmod_dump() was copying four bytes
from kernel stack to user space [1].

The issue here is that 'struct tc_skbmod' has a four bytes hole.

We need to clear the structure before filling fields.

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]
 BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
  instrument_copy_to_user include/linux/instrumented.h:114 [inline]
  copy_to_user_iter lib/iov_iter.c:24 [inline]
  iterate_ubuf include/linux/iov_iter.h:29 [inline]
  iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
  iterate_and_advance include/linux/iov_iter.h:271 [inline]
  _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
  copy_to_iter include/linux/uio.h:196 [inline]
  simple_copy_to_iter net/core/datagram.c:532 [inline]
  __skb_datagram_iter+0x185/0x1000 net/core/datagram.c:420
  skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
  skb_copy_datagram_msg include/linux/skbuff.h:4050 [inline]
  netlink_recvmsg+0x432/0x1610 net/netlink/af_netlink.c:1962
  sock_recvmsg_nosec net/socket.c:1046 [inline]
  sock_recvmsg+0x2c4/0x340 net/socket.c:1068
  __sys_recvfrom+0x35a/0x5f0 net/socket.c:2242
  __do_sys_recvfrom net/socket.c:2260 [inline]
  __se_sys_recvfrom net/socket.c:2256 [inline]
  __x64_sys_recvfrom+0x126/0x1d0 net/socket.c:2256
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was stored to memory at:
  pskb_expand_head+0x30f/0x19d0 net/core/skbuff.c:2253
  netlink_trim+0x2c2/0x330 net/netlink/af_netlink.c:1317
  netlink_unicast+0x9f/0x1260 net/netlink/af_netlink.c:1351
  nlmsg_unicast include/net/netlink.h:1144 [inline]
  nlmsg_notify+0x21d/0x2f0 net/netlink/af_netlink.c:2610
  rtnetlink_send+0x73/0x90 net/core/rtnetlink.c:741
  rtnetlink_maybe_send include/linux/rtnetlink.h:17 [inline]
  tcf_add_notify net/sched/act_api.c:2048 [inline]
  tcf_action_add net/sched/act_api.c:2071 [inline]
  tc_ctl_action+0x146e/0x19d0 net/sched/act_api.c:2119
  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2559
  rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6613
  netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
  netlink_unicast+0xf4c/0x1260 net/netlink/af_netlink.c:1361
  netlink_sendmsg+0x10df/0x11f0 net/netlink/af_netlink.c:1905
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  ____sys_sendmsg+0x877/0xb60 net/socket.c:2584
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
  __sys_sendmsg net/socket.c:2667 [inline]
  __do_sys_sendmsg net/socket.c:2676 [inline]
  __se_sys_sendmsg net/socket.c:2674 [inline]
  __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was stored to memory at:
  __nla_put lib/nlattr.c:1041 [inline]
  nla_put+0x1c6/0x230 lib/nlattr.c:1099
  tcf_skbmod_dump+0x23f/0xc20 net/sched/act_skbmod.c:256
  tcf_action_dump_old net/sched/act_api.c:1191 [inline]
  tcf_action_dump_1+0x85e/0x970 net/sched/act_api.c:1227
  tcf_action_dump+0x1fd/0x460 net/sched/act_api.c:1251
  tca_get_fill+0x519/0x7a0 net/sched/act_api.c:1628
  tcf_add_notify_msg net/sched/act_api.c:2023 [inline]
  tcf_add_notify net/sched/act_api.c:2042 [inline]
  tcf_action_add net/sched/act_api.c:2071 [inline]
  tc_ctl_action+0x1365/0x19d0 net/sched/act_api.c:2119
  rtnetlink_rcv_msg+0x1737/0x1900 net/core/rtnetlink.c:6595
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netli
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224512">SUSE bug 1224512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35894" ref_url="https://www.suse.com/security/cve/CVE-2024-35894" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: prevent BPF accessing lowat from a subflow socket.

Alexei reported the following splat:

 WARNING: CPU: 32 PID: 3276 at net/mptcp/subflow.c:1430 subflow_data_ready+0x147/0x1c0
 Modules linked in: dummy bpf_testmod(O) [last unloaded: bpf_test_no_cfi(O)]
 CPU: 32 PID: 3276 Comm: test_progs Tainted: GO       6.8.0-12873-g2c43c33bfd23
 Call Trace:
  &lt;TASK&gt;
  mptcp_set_rcvlowat+0x79/0x1d0
  sk_setsockopt+0x6c0/0x1540
  __bpf_setsockopt+0x6f/0x90
  bpf_sock_ops_setsockopt+0x3c/0x90
  bpf_prog_509ce5db2c7f9981_bpf_test_sockopt_int+0xb4/0x11b
  bpf_prog_dce07e362d941d2b_bpf_test_socket_sockopt+0x12b/0x132
  bpf_prog_348c9b5faaf10092_skops_sockopt+0x954/0xe86
  __cgroup_bpf_run_filter_sock_ops+0xbc/0x250
  tcp_connect+0x879/0x1160
  tcp_v6_connect+0x50c/0x870
  mptcp_connect+0x129/0x280
  __inet_stream_connect+0xce/0x370
  inet_stream_connect+0x36/0x50
  bpf_trampoline_6442491565+0x49/0xef
  inet_stream_connect+0x5/0x50
  __sys_connect+0x63/0x90
  __x64_sys_connect+0x14/0x20

The root cause of the issue is that bpf allows accessing mptcp-level
proto_ops from a tcp subflow scope.

Fix the issue detecting the problematic call and preventing any action.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35894/">CVE-2024-35894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35894">CVE-2024-35894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224514">SUSE bug 1224514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Prevent lock inversion deadlock in map delete elem

syzkaller started using corpuses where a BPF tracing program deletes
elements from a sockmap/sockhash map. Because BPF tracing programs can be
invoked from any interrupt context, locks taken during a map_delete_elem
operation must be hardirq-safe. Otherwise a deadlock due to lock inversion
is possible, as reported by lockdep:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;htab-&gt;buckets[i].lock);
                               local_irq_disable();
                               lock(&amp;host-&gt;lock);
                               lock(&amp;htab-&gt;buckets[i].lock);
  &lt;Interrupt&gt;
    lock(&amp;host-&gt;lock);

Locks in sockmap are hardirq-unsafe by design. We expects elements to be
deleted from sockmap/sockhash only in task (normal) context with interrupts
enabled, or in softirq context.

Detect when map_delete_elem operation is invoked from a context which is
_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an
error.

Note that map updates are not affected by this issue. BPF verifier does not
allow updating sockmap/sockhash from a BPF tracing program today.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: validate user input for expected length

I got multiple syzbot reports showing old bugs exposed
by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc
in cgroup/{s,g}etsockopt")

setsockopt() @optlen argument should be taken into account
before copying data.

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
 BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
Read of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238

CPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a
RIP: 0033:0x7fd22067dde9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8
 &lt;/TASK&gt;

Allocated by task 7238:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:4069 [inline]
  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082
  kmalloc_noprof include/linux/slab.h:664 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a

The buggy address belongs to the object at ffff88802cd73da0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 0 bytes inside of
 allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73
flags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)
page_type: 0xffffefff(slab)
raw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122
raw: ffff88802cd73020 000000008080007f 00000001ffffefff 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224662">SUSE bug 1224662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: discard table flag update with pending basechain deletion

Hook unregistration is deferred to the commit phase, same occurs with
hook updates triggered by the table dormant flag. When both commands are
combined, this results in deleting a basechain while leaving its hook
still registered in the core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224510">SUSE bug 1224510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()

nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can
concurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().
And thhere is not any protection when iterate over nf_tables_flowtables
list in __nft_flowtable_type_get(). Therefore, there is pertential
data-race of nf_tables_flowtables list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_flowtables list
in __nft_flowtable_type_get(), and use rcu_read_lock() in the caller
nft_flowtable_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224498">SUSE bug 1224498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: flush pending destroy work before exit_net release

Similar to 2c9f0293280e ("netfilter: nf_tables: flush pending destroy
work before netlink notifier") to address a race between exit_net and
the destroy workqueue.

The trace below shows an element to be released via destroy workqueue
while exit_net path (triggered via module removal) has already released
the set that is used in such transaction.

[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465
[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359
[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]
[ 1360.547984] Call Trace:
[ 1360.547991]  &lt;TASK&gt;
[ 1360.547998]  dump_stack_lvl+0x53/0x70
[ 1360.548014]  print_report+0xc4/0x610
[ 1360.548026]  ? __virt_addr_valid+0xba/0x160
[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548176]  kasan_report+0xae/0xe0
[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]
[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30
[ 1360.548591]  process_one_work+0x2f1/0x670
[ 1360.548610]  worker_thread+0x4d3/0x760
[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10
[ 1360.548640]  kthread+0x16b/0x1b0
[ 1360.548653]  ? __pfx_kthread+0x10/0x10
[ 1360.548665]  ret_from_fork+0x2f/0x50
[ 1360.548679]  ? __pfx_kthread+0x10/0x10
[ 1360.548690]  ret_from_fork_asm+0x1a/0x30
[ 1360.548707]  &lt;/TASK&gt;

[ 1360.548719] Allocated by task 192061:
[ 1360.548726]  kasan_save_stack+0x20/0x40
[ 1360.548739]  kasan_save_track+0x14/0x30
[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0
[ 1360.548760]  __kmalloc_node+0x1f1/0x450
[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]
[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]
[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]
[ 1360.548927]  netlink_unicast+0x367/0x4f0
[ 1360.548935]  netlink_sendmsg+0x34b/0x610
[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510
[ 1360.548953]  ___sys_sendmsg+0xc9/0x120
[ 1360.548961]  __sys_sendmsg+0xbe/0x140
[ 1360.548971]  do_syscall_64+0x55/0x120
[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d

[ 1360.548994] Freed by task 192222:
[ 1360.548999]  kasan_save_stack+0x20/0x40
[ 1360.549009]  kasan_save_track+0x14/0x30
[ 1360.549019]  kasan_save_free_info+0x3b/0x60
[ 1360.549028]  poison_slab_object+0x100/0x180
[ 1360.549036]  __kasan_slab_free+0x14/0x30
[ 1360.549042]  kfree+0xb6/0x260
[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]
[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]
[ 1360.549221]  ops_exit_list+0x50/0xa0
[ 1360.549229]  free_exit_list+0x101/0x140
[ 1360.549236]  unregister_pernet_operations+0x107/0x160
[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30
[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]
[ 1360.549345]  __do_sys_delete_module+0x253/0x370
[ 1360.549352]  do_syscall_64+0x55/0x120
[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d

(gdb) list *__nft_release_table+0x473
0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).
11349           list_for_each_entry_safe(flowtable, nf, &amp;table-&gt;flowtables, list) {
11350                   list_del(&amp;flowtable-&gt;list);
11351                   nft_use_dec(&amp;table-&gt;use);
11352                   nf_tables_flowtable_destroy(flowtable);
11353           }
11354           list_for_each_entry_safe(set, ns, &amp;table-&gt;sets, list) {
11355                   list_del(&amp;set-&gt;list);
11356                   nft_use_dec(&amp;table-&gt;use);
11357                   if (set-&gt;flags &amp; (NFT_SET_MAP | NFT_SET_OBJECT))
11358                           nft_map_deactivat
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224499">SUSE bug 1224499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject new basechain after table flag update

When dormant flag is toggled, hooks are disabled in the commit phase by
iterating over current chains in table (existing and new).

The following configuration allows for an inconsistent state:

  add table x
  add chain x y { type filter hook input priority 0; }
  add table x { flags dormant; }
  add chain x w { type filter hook input priority 1; }

which triggers the following warning when trying to unregister chain w
which is already unregistered.

[  127.322252] WARNING: CPU: 7 PID: 1211 at net/netfilter/core.c:50                                                                     1 __nf_unregister_net_hook+0x21a/0x260
[...]
[  127.322519] Call Trace:
[  127.322521]  &lt;TASK&gt;
[  127.322524]  ? __warn+0x9f/0x1a0
[  127.322531]  ? __nf_unregister_net_hook+0x21a/0x260
[  127.322537]  ? report_bug+0x1b1/0x1e0
[  127.322545]  ? handle_bug+0x3c/0x70
[  127.322552]  ? exc_invalid_op+0x17/0x40
[  127.322556]  ? asm_exc_invalid_op+0x1a/0x20
[  127.322563]  ? kasan_save_free_info+0x3b/0x60
[  127.322570]  ? __nf_unregister_net_hook+0x6a/0x260
[  127.322577]  ? __nf_unregister_net_hook+0x21a/0x260
[  127.322583]  ? __nf_unregister_net_hook+0x6a/0x260
[  127.322590]  ? __nf_tables_unregister_hook+0x8a/0xe0 [nf_tables]
[  127.322655]  nft_table_disable+0x75/0xf0 [nf_tables]
[  127.322717]  nf_tables_commit+0x2571/0x2620 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224497">SUSE bug 1224497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix Rx DMA datasize and skb_over_panic

mana_get_rxbuf_cfg() aligns the RX buffer's DMA datasize to be
multiple of 64. So a packet slightly bigger than mtu+14, say 1536,
can be received and cause skb_over_panic.

Sample dmesg:
[ 5325.237162] skbuff: skb_over_panic: text:ffffffffc043277a len:1536 put:1536 head:ff1100018b517000 data:ff1100018b517100 tail:0x700 end:0x6ea dev:&lt;NULL&gt;
[ 5325.243689] ------------[ cut here ]------------
[ 5325.245748] kernel BUG at net/core/skbuff.c:192!
[ 5325.247838] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 5325.258374] RIP: 0010:skb_panic+0x4f/0x60
[ 5325.302941] Call Trace:
[ 5325.304389]  &lt;IRQ&gt;
[ 5325.315794]  ? skb_panic+0x4f/0x60
[ 5325.317457]  ? asm_exc_invalid_op+0x1f/0x30
[ 5325.319490]  ? skb_panic+0x4f/0x60
[ 5325.321161]  skb_put+0x4e/0x50
[ 5325.322670]  mana_poll+0x6fa/0xb50 [mana]
[ 5325.324578]  __napi_poll+0x33/0x1e0
[ 5325.326328]  net_rx_action+0x12e/0x280

As discussed internally, this alignment is not necessary. To fix
this bug, remove it from the code. So oversized packets will be
marked as CQE_RX_TRUNCATED by NIC, and dropped.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/rds: fix possible cp null dereference

cp might be null, calling cp-&gt;cp_conn would produce null dereference

[Simon Horman adds:]

Analysis:

* cp is a parameter of __rds_rdma_map and is not reassigned.

* The following call-sites pass a NULL cp argument to __rds_rdma_map()

  - rds_get_mr()
  - rds_get_mr_for_dest

* Prior to the code above, the following assumes that cp may be NULL
  (which is indicative, but could itself be unnecessary)

	trans_private = rs-&gt;rs_transport-&gt;get_mr(
		sg, nents, rs, &amp;mr-&gt;r_key, cp ? cp-&gt;cp_conn : NULL,
		args-&gt;vec.addr, args-&gt;vec.bytes,
		need_odp ? ODP_ZEROBASED : ODP_NOT_NEEDED);

* The code modified by this patch is guarded by IS_ERR(trans_private),
  where trans_private is assigned as per the previous point in this analysis.

  The only implementation of get_mr that I could locate is rds_ib_get_mr()
  which can return an ERR_PTR if the conn (4th) argument is NULL.

* ret is set to PTR_ERR(trans_private).
  rds_ib_get_mr can return ERR_PTR(-ENODEV) if the conn (4th) argument is NULL.
  Thus ret may be -ENODEV in which case the code in question will execute.

Conclusion:
* cp may be NULL at the point where this patch adds a check;
  this patch does seem to address a possible bug
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224496">SUSE bug 1224496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35903" ref_url="https://www.suse.com/security/cve/CVE-2024-35903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/bpf: Fix IP after emitting call depth accounting

Adjust the IP passed to `emit_patch` so it calculates the correct offset
for the CALL instruction if `x86_call_depth_emit_accounting` emits code.
Otherwise we will skip some instructions and most likely crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35903/">CVE-2024-35903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35903">CVE-2024-35903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224493">SUSE bug 1224493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: avoid dereference of garbage after mount failure

In case kern_mount() fails and returns an error pointer return in the
error branch instead of continuing and dereferencing the error pointer.

While on it drop the never read static variable selinuxfs_mount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Protect against int overflow for stack access size

This patch re-introduces protection against the size of access to stack
memory being negative; the access size can appear negative as a result
of overflowing its signed int representation. This should not actually
happen, as there are other protections along the way, but we should
protect against it anyway. One code path was missing such protections
(fixed in the previous patch in the series), causing out-of-bounds array
accesses in check_stack_range_initialized(). This patch causes the
verification of a program with such a non-sensical access size to fail.

This check used to exist in a more indirect way, but was inadvertendly
removed in a833a17aeac7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226327">SUSE bug 1226327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxbf_gige: call request_irq() after NAPI initialized

The mlxbf_gige driver encounters a NULL pointer exception in
mlxbf_gige_open() when kdump is enabled.  The sequence to reproduce
the exception is as follows:
a) enable kdump
b) trigger kdump via "echo c &gt; /proc/sysrq-trigger"
c) kdump kernel executes
d) kdump kernel loads mlxbf_gige module
e) the mlxbf_gige module runs its open() as the
   the "oob_net0" interface is brought up
f) mlxbf_gige module will experience an exception
   during its open(), something like:

     Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
     Mem abort info:
       ESR = 0x0000000086000004
       EC = 0x21: IABT (current EL), IL = 32 bits
       SET = 0, FnV = 0
       EA = 0, S1PTW = 0
       FSC = 0x04: level 0 translation fault
     user pgtable: 4k pages, 48-bit VAs, pgdp=00000000e29a4000
     [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
     Internal error: Oops: 0000000086000004 [#1] SMP
     CPU: 0 PID: 812 Comm: NetworkManager Tainted: G           OE     5.15.0-1035-bluefield #37-Ubuntu
     Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.6.0.13024 Jan 19 2024
     pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
     pc : 0x0
     lr : __napi_poll+0x40/0x230
     sp : ffff800008003e00
     x29: ffff800008003e00 x28: 0000000000000000 x27: 00000000ffffffff
     x26: ffff000066027238 x25: ffff00007cedec00 x24: ffff800008003ec8
     x23: 000000000000012c x22: ffff800008003eb7 x21: 0000000000000000
     x20: 0000000000000001 x19: ffff000066027238 x18: 0000000000000000
     x17: ffff578fcb450000 x16: ffffa870b083c7c0 x15: 0000aaab010441d0
     x14: 0000000000000001 x13: 00726f7272655f65 x12: 6769675f6662786c
     x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa870b0842398
     x8 : 0000000000000004 x7 : fe5a48b9069706ea x6 : 17fdb11fc84ae0d2
     x5 : d94a82549d594f35 x4 : 0000000000000000 x3 : 0000000000400100
     x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000066027238
     Call trace:
      0x0
      net_rx_action+0x178/0x360
      __do_softirq+0x15c/0x428
      __irq_exit_rcu+0xac/0xec
      irq_exit+0x18/0x2c
      handle_domain_irq+0x6c/0xa0
      gic_handle_irq+0xec/0x1b0
      call_on_irq_stack+0x20/0x2c
      do_interrupt_handler+0x5c/0x70
      el1_interrupt+0x30/0x50
      el1h_64_irq_handler+0x18/0x2c
      el1h_64_irq+0x7c/0x80
      __setup_irq+0x4c0/0x950
      request_threaded_irq+0xf4/0x1bc
      mlxbf_gige_request_irqs+0x68/0x110 [mlxbf_gige]
      mlxbf_gige_open+0x5c/0x170 [mlxbf_gige]
      __dev_open+0x100/0x220
      __dev_change_flags+0x16c/0x1f0
      dev_change_flags+0x2c/0x70
      do_setlink+0x220/0xa40
      __rtnl_newlink+0x56c/0x8a0
      rtnl_newlink+0x58/0x84
      rtnetlink_rcv_msg+0x138/0x3c4
      netlink_rcv_skb+0x64/0x130
      rtnetlink_rcv+0x20/0x30
      netlink_unicast+0x2ec/0x360
      netlink_sendmsg+0x278/0x490
      __sock_sendmsg+0x5c/0x6c
      ____sys_sendmsg+0x290/0x2d4
      ___sys_sendmsg+0x84/0xd0
      __sys_sendmsg+0x70/0xd0
      __arm64_sys_sendmsg+0x2c/0x40
      invoke_syscall+0x78/0x100
      el0_svc_common.constprop.0+0x54/0x184
      do_el0_svc+0x30/0xac
      el0_svc+0x48/0x160
      el0t_64_sync_handler+0xa4/0x12c
      el0t_64_sync+0x1a4/0x1a8
     Code: bad PC value
     ---[ end trace 7d1c3f3bf9d81885 ]---
     Kernel panic - not syncing: Oops: Fatal exception in interrupt
     Kernel Offset: 0x2870a7a00000 from 0xffff800008000000
     PHYS_OFFSET: 0x80000000
     CPU features: 0x0,000005c1,a3332a5a
     Memory Limit: none
     ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

The exception happens because there is a pending RX interrupt before the
call to request_irq(RX IRQ) executes.  Then, the RX IRQ handler fires
immediately after this request_irq() completes. The
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224492">SUSE bug 1224492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35908" ref_url="https://www.suse.com/security/cve/CVE-2024-35908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: get psock ref after taking rxlock to avoid leak

At the start of tls_sw_recvmsg, we take a reference on the psock, and
then call tls_rx_reader_lock. If that fails, we return directly
without releasing the reference.

Instead of adding a new label, just take the reference after locking
has succeeded, since we don't need it before.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35908/">CVE-2024-35908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35908">CVE-2024-35908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224490">SUSE bug 1224490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35909" ref_url="https://www.suse.com/security/cve/CVE-2024-35909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: t7xx: Split 64bit accesses to fix alignment issues

Some of the registers are aligned on a 32bit boundary, causing
alignment faults on 64bit platforms.

 Unable to handle kernel paging request at virtual address ffffffc084a1d004
 Mem abort info:
 ESR = 0x0000000096000061
 EC = 0x25: DABT (current EL), IL = 32 bits
 SET = 0, FnV = 0
 EA = 0, S1PTW = 0
 FSC = 0x21: alignment fault
 Data abort info:
 ISV = 0, ISS = 0x00000061, ISS2 = 0x00000000
 CM = 0, WnR = 1, TnD = 0, TagAccess = 0
 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000046ad6000
 [ffffffc084a1d004] pgd=100000013ffff003, p4d=100000013ffff003, pud=100000013ffff003, pmd=0068000020a00711
 Internal error: Oops: 0000000096000061 [#1] SMP
 Modules linked in: mtk_t7xx(+) qcserial pppoe ppp_async option nft_fib_inet nf_flow_table_inet mt7921u(O) mt7921s(O) mt7921e(O) mt7921_common(O) iwlmvm(O) iwldvm(O) usb_wwan rndis_host qmi_wwan pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mt7996e(O) mt792x_usb(O) mt792x_lib(O) mt7915e(O) mt76_usb(O) mt76_sdio(O) mt76_connac_lib(O) mt76(O) mac80211(O) iwlwifi(O) huawei_cdc_ncm cfg80211(O) cdc_ncm cdc_ether wwan usbserial usbnet slhc sfp rtc_pcf8563 nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 mt6577_auxadc mdio_i2c libcrc32c compat(O) cdc_wdm cdc_acm at24 crypto_safexcel pwm_fan i2c_gpio i2c_smbus industrialio i2c_algo_bit i2c_mux_reg i2c_mux_pca954x i2c_mux_pca9541 i2c_mux_gpio i2c_mux dummy oid_registry tun sha512_arm64 sha1_ce sha1_generic seqiv
 md5 geniv des_generic libdes cbc authencesn authenc leds_gpio xhci_plat_hcd xhci_pci xhci_mtk_hcd xhci_hcd nvme nvme_core gpio_button_hotplug(O) dm_mirror dm_region_hash dm_log dm_crypt dm_mod dax usbcore usb_common ptp aquantia pps_core mii tpm encrypted_keys trusted
 CPU: 3 PID: 5266 Comm: kworker/u9:1 Tainted: G O 6.6.22 #0
 Hardware name: Bananapi BPI-R4 (DT)
 Workqueue: md_hk_wq t7xx_fsm_uninit [mtk_t7xx]
 pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : t7xx_cldma_hw_set_start_addr+0x1c/0x3c [mtk_t7xx]
 lr : t7xx_cldma_start+0xac/0x13c [mtk_t7xx]
 sp : ffffffc085d63d30
 x29: ffffffc085d63d30 x28: 0000000000000000 x27: 0000000000000000
 x26: 0000000000000000 x25: ffffff80c804f2c0 x24: ffffff80ca196c05
 x23: 0000000000000000 x22: ffffff80c814b9b8 x21: ffffff80c814b128
 x20: 0000000000000001 x19: ffffff80c814b080 x18: 0000000000000014
 x17: 0000000055c9806b x16: 000000007c5296d0 x15: 000000000f6bca68
 x14: 00000000dbdbdce4 x13: 000000001aeaf72a x12: 0000000000000001
 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
 x8 : ffffff80ca1ef6b4 x7 : ffffff80c814b818 x6 : 0000000000000018
 x5 : 0000000000000870 x4 : 0000000000000000 x3 : 0000000000000000
 x2 : 000000010a947000 x1 : ffffffc084a1d004 x0 : ffffffc084a1d004
 Call trace:
 t7xx_cldma_hw_set_start_addr+0x1c/0x3c [mtk_t7xx]
 t7xx_fsm_uninit+0x578/0x5ec [mtk_t7xx]
 process_one_work+0x154/0x2a0
 worker_thread+0x2ac/0x488
 kthread+0xe0/0xec
 ret_from_fork+0x10/0x20
 Code: f9400800 91001000 8b214001 d50332bf (f9000022)
 ---[ end trace 0000000000000000 ]---

The inclusion of io-64-nonatomic-lo-hi.h indicates that all 64bit
accesses can be replaced by pairs of nonatomic 32bit access.  Fix
alignment by forcing all accesses to be 32bit on 64bit platforms.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35909/">CVE-2024-35909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35909">CVE-2024-35909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224491">SUSE bug 1224491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35911" ref_url="https://www.suse.com/security/cve/CVE-2024-35911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix memory corruption bug with suspend and rebuild

The ice driver would previously panic after suspend. This is caused
from the driver *only* calling the ice_vsi_free_q_vectors() function by
itself, when it is suspending. Since commit b3e7b3a6ee92 ("ice: prevent
NULL pointer deref during reload") the driver has zeroed out
num_q_vectors, and only restored it in ice_vsi_cfg_def().

This further causes the ice_rebuild() function to allocate a zero length
buffer, after which num_q_vectors is updated, and then the new value of
num_q_vectors is used to index into the zero length buffer, which
corrupts memory.

The fix entails making sure all the code referencing num_q_vectors only
does so after it has been reset via ice_vsi_cfg_def().

I didn't perform a full bisect, but I was able to test against 6.1.77
kernel and that ice driver works fine for suspend/resume with no panic,
so sometime since then, this problem was introduced.

Also clean up an un-needed init of a local variable in the function
being modified.

PANIC from 6.8.0-rc1:

[1026674.915596] PM: suspend exit
[1026675.664697] ice 0000:17:00.1: PTP reset successful
[1026675.664707] ice 0000:17:00.1: 2755 msecs passed between update to cached PHC time
[1026675.667660] ice 0000:b1:00.0: PTP reset successful
[1026675.675944] ice 0000:b1:00.0: 2832 msecs passed between update to cached PHC time
[1026677.137733] ixgbe 0000:31:00.0 ens787: NIC Link is Up 1 Gbps, Flow Control: None
[1026677.190201] BUG: kernel NULL pointer dereference, address: 0000000000000010
[1026677.192753] ice 0000:17:00.0: PTP reset successful
[1026677.192764] ice 0000:17:00.0: 4548 msecs passed between update to cached PHC time
[1026677.197928] #PF: supervisor read access in kernel mode
[1026677.197933] #PF: error_code(0x0000) - not-present page
[1026677.197937] PGD 1557a7067 P4D 0
[1026677.212133] ice 0000:b1:00.1: PTP reset successful
[1026677.212143] ice 0000:b1:00.1: 4344 msecs passed between update to cached PHC time
[1026677.212575]
[1026677.243142] Oops: 0000 [#1] PREEMPT SMP NOPTI
[1026677.247918] CPU: 23 PID: 42790 Comm: kworker/23:0 Kdump: loaded Tainted: G        W          6.8.0-rc1+ #1
[1026677.257989] Hardware name: Intel Corporation M50CYP2SBSTD/M50CYP2SBSTD, BIOS SE5C620.86B.01.01.0005.2202160810 02/16/2022
[1026677.269367] Workqueue: ice ice_service_task [ice]
[1026677.274592] RIP: 0010:ice_vsi_rebuild_set_coalesce+0x130/0x1e0 [ice]
[1026677.281421] Code: 0f 84 3a ff ff ff 41 0f b7 74 ec 02 66 89 b0 22 02 00 00 81 e6 ff 1f 00 00 e8 ec fd ff ff e9 35 ff ff ff 48 8b 43 30 49 63 ed &lt;41&gt; 0f b7 34 24 41 83 c5 01 48 8b 3c e8 66 89 b7 aa 02 00 00 81 e6
[1026677.300877] RSP: 0018:ff3be62a6399bcc0 EFLAGS: 00010202
[1026677.306556] RAX: ff28691e28980828 RBX: ff28691e41099828 RCX: 0000000000188000
[1026677.314148] RDX: 0000000000000000 RSI: 0000000000000010 RDI: ff28691e41099828
[1026677.321730] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[1026677.329311] R10: 0000000000000007 R11: ffffffffffffffc0 R12: 0000000000000010
[1026677.336896] R13: 0000000000000000 R14: 0000000000000000 R15: ff28691e0eaa81a0
[1026677.344472] FS:  0000000000000000(0000) GS:ff28693cbffc0000(0000) knlGS:0000000000000000
[1026677.353000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1026677.359195] CR2: 0000000000000010 CR3: 0000000128df4001 CR4: 0000000000771ef0
[1026677.366779] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1026677.374369] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[1026677.381952] PKRU: 55555554
[1026677.385116] Call Trace:
[1026677.388023]  &lt;TASK&gt;
[1026677.390589]  ? __die+0x20/0x70
[1026677.394105]  ? page_fault_oops+0x82/0x160
[1026677.398576]  ? do_user_addr_fault+0x65/0x6a0
[1026677.403307]  ? exc_page_fault+0x6a/0x150
[1026677.407694]  ? asm_exc_page_fault+0x22/0x30
[1026677.412349]  ? ice_vsi_rebuild_set_coalesce+0x130/0x1e0 [ice]
[1026677.4186
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35911/">CVE-2024-35911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35911">CVE-2024-35911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224486">SUSE bug 1224486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: rfi: fix potential response leaks

If the rx payload length check fails, or if kmemdup() fails,
we still need to free the command response. Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224487">SUSE bug 1224487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35913" ref_url="https://www.suse.com/security/cve/CVE-2024-35913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: pick the version of SESSION_PROTECTION_NOTIF

When we want to know whether we should look for the mac_id or the
link_id in struct iwl_mvm_session_prot_notif, we should look at the
version of SESSION_PROTECTION_NOTIF.

This causes WARNINGs:

WARNING: CPU: 0 PID: 11403 at drivers/net/wireless/intel/iwlwifi/mvm/time-event.c:959 iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm]
RIP: 0010:iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm]
Code: 00 49 c7 84 24 48 07 00 00 00 00 00 00 41 c6 84 24 78 07 00 00 ff 4c 89 f7 e8 e9 71 54 d9 e9 7d fd ff ff 0f 0b e9 23 fe ff ff &lt;0f&gt; 0b e9 1c fe ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90
RSP: 0018:ffffb4bb00003d40 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff9ae63a361000 RCX: ffff9ae4a98b60d4
RDX: ffff9ae4588499c0 RSI: 0000000000000305 RDI: ffff9ae4a98b6358
RBP: ffffb4bb00003d68 R08: 0000000000000003 R09: 0000000000000010
R10: ffffb4bb00003d00 R11: 000000000000000f R12: ffff9ae441399050
R13: ffff9ae4761329e8 R14: 0000000000000001 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff9ae7af400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055fb75680018 CR3: 00000003dae32006 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? show_regs+0x69/0x80
 ? __warn+0x8d/0x150
 ? iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm]
 ? report_bug+0x196/0x1c0
 ? handle_bug+0x45/0x80
 ? exc_invalid_op+0x1c/0xb0
 ? asm_exc_invalid_op+0x1f/0x30
 ? iwl_mvm_rx_session_protect_notif+0x333/0x340 [iwlmvm]
 iwl_mvm_rx_common+0x115/0x340 [iwlmvm]
 iwl_mvm_rx_mq+0xa6/0x100 [iwlmvm]
 iwl_pcie_rx_handle+0x263/0xa10 [iwlwifi]
 iwl_pcie_napi_poll_msix+0x32/0xd0 [iwlwifi]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35913/">CVE-2024-35913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35913">CVE-2024-35913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224485">SUSE bug 1224485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix error cleanup path in nfsd_rename()

Commit a8b0026847b8 ("rename(): avoid a deadlock in the case of parents
having no common ancestor") added an error bail out path. However this
path does not drop the remount protection that has been acquired. Fix
the cleanup path to properly drop the remount protection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet

syzbot reported the following uninit-value access issue [1][2]:

nci_rx_work() parses and processes received packet. When the payload
length is zero, each message type handler reads uninitialized payload
and KMSAN detects this issue. The receipt of a packet with a zero-size
payload is considered unexpected, and therefore, such packets should be
silently discarded.

This patch resolved this issue by checking payload size before calling
each message type handler codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224479">SUSE bug 1224479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35916" ref_url="https://www.suse.com/security/cve/CVE-2024-35916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf: Fix NULL pointer dereference in sanitycheck()

If due to a memory allocation failure mock_chain() returns NULL, it is
passed to dma_fence_enable_sw_signaling() resulting in NULL pointer
dereference there.

Call dma_fence_enable_sw_signaling() only if mock_chain() succeeds.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35916/">CVE-2024-35916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35916">CVE-2024-35916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224480">SUSE bug 1224480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35917" ref_url="https://www.suse.com/security/cve/CVE-2024-35917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/bpf: Fix bpf_plt pointer arithmetic

Kui-Feng Lee reported a crash on s390x triggered by the
dummy_st_ops/dummy_init_ptr_arg test [1]:

  [&lt;0000000000000002&gt;] 0x2
  [&lt;00000000009d5cde&gt;] bpf_struct_ops_test_run+0x156/0x250
  [&lt;000000000033145a&gt;] __sys_bpf+0xa1a/0xd00
  [&lt;00000000003319dc&gt;] __s390x_sys_bpf+0x44/0x50
  [&lt;0000000000c4382c&gt;] __do_syscall+0x244/0x300
  [&lt;0000000000c59a40&gt;] system_call+0x70/0x98

This is caused by GCC moving memcpy() after assignments in
bpf_jit_plt(), resulting in NULL pointers being written instead of
the return and the target addresses.

Looking at the GCC internals, the reordering is allowed because the
alias analysis thinks that the memcpy() destination and the assignments'
left-hand-sides are based on different objects: new_plt and
bpf_plt_ret/bpf_plt_target respectively, and therefore they cannot
alias.

This is in turn due to a violation of the C standard:

  When two pointers are subtracted, both shall point to elements of the
  same array object, or one past the last element of the array object
  ...

From the C's perspective, bpf_plt_ret and bpf_plt are distinct objects
and cannot be subtracted. In the practical terms, doing so confuses the
GCC's alias analysis.

The code was written this way in order to let the C side know a few
offsets defined in the assembly. While nice, this is by no means
necessary. Fix the noncompliance by hardcoding these offsets.

[1] https://lore.kernel.org/bpf/c9923c1d-971d-4022-8dc8-1364e929d34c@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35917/">CVE-2024-35917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35917">CVE-2024-35917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224481">SUSE bug 1224481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35919" ref_url="https://www.suse.com/security/cve/CVE-2024-35919" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: adding lock to protect encoder context list

Add a lock for the ctx_list, to avoid accessing a NULL pointer
within the 'vpu_enc_ipi_handler' function when the ctx_list has
been deleted due to an unexpected behavior on the SCP IP block.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35919/">CVE-2024-35919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35919">CVE-2024-35919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224484">SUSE bug 1224484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35920" ref_url="https://www.suse.com/security/cve/CVE-2024-35920" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: adding lock to protect decoder context list

Add a lock for the ctx_list, to avoid accessing a NULL pointer
within the 'vpu_dec_ipi_handler' function when the ctx_list has
been deleted due to an unexpected behavior on the SCP IP block.

Hardware name: Google juniper sku16 board (DT)
pstate: 20400005 (nzCv daif +PAN -UAO -TCO BTYPE=--)
pc : vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec]
lr : scp_ipi_handler+0xd0/0x194 [mtk_scp]
sp : ffffffc0131dbbd0
x29: ffffffc0131dbbd0 x28: 0000000000000000
x27: ffffff9bb277f348 x26: ffffff9bb242ad00
x25: ffffffd2d440d3b8 x24: ffffffd2a13ff1d4
x23: ffffff9bb7fe85a0 x22: ffffffc0133fbdb0
x21: 0000000000000010 x20: ffffff9b050ea328
x19: ffffffc0131dbc08 x18: 0000000000001000
x17: 0000000000000000 x16: ffffffd2d461c6e0
x15: 0000000000000242 x14: 000000000000018f
x13: 000000000000004d x12: 0000000000000000
x11: 0000000000000001 x10: fffffffffffffff0
x9 : ffffff9bb6e793a8 x8 : 0000000000000000
x7 : 0000000000000000 x6 : 000000000000003f
x5 : 0000000000000040 x4 : fffffffffffffff0
x3 : 0000000000000020 x2 : ffffff9bb6e79080
x1 : 0000000000000010 x0 : ffffffc0131dbc08
Call trace:
vpu_dec_ipi_handler+0x58/0x1f8 [mtk_vcodec_dec (HASH:6c3f 2)]
scp_ipi_handler+0xd0/0x194 [mtk_scp (HASH:7046 3)]
mt8183_scp_irq_handler+0x44/0x88 [mtk_scp (HASH:7046 3)]
scp_irq_handler+0x48/0x90 [mtk_scp (HASH:7046 3)]
irq_thread_fn+0x38/0x94
irq_thread+0x100/0x1c0
kthread+0x140/0x1fc
ret_from_fork+0x10/0x30
Code: 54000088 f94ca50a eb14015f 54000060 (f9400108)
---[ end trace ace43ce36cbd5c93 ]---
Kernel panic - not syncing: Oops: Fatal exception
SMP: stopping secondary CPUs
Kernel Offset: 0x12c4000000 from 0xffffffc010000000
PHYS_OFFSET: 0xffffffe580000000
CPU features: 0x08240002,2188200c
Memory Limit: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35920/">CVE-2024-35920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35920">CVE-2024-35920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224483">SUSE bug 1224483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35921" ref_url="https://www.suse.com/security/cve/CVE-2024-35921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Fix oops when HEVC init fails

The stateless HEVC decoder saves the instance pointer in the context
regardless if the initialization worked or not. This caused a use after
free, when the pointer is freed in case of a failure in the deinit
function.
Only store the instance pointer when the initialization was successful,
to solve this issue.

 Hardware name: Acer Tomato (rev3 - 4) board (DT)
 pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : vcodec_vpu_send_msg+0x4c/0x190 [mtk_vcodec_dec]
 lr : vcodec_send_ap_ipi+0x78/0x170 [mtk_vcodec_dec]
 sp : ffff80008750bc20
 x29: ffff80008750bc20 x28: ffff1299f6d70000 x27: 0000000000000000
 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
 x23: ffff80008750bc98 x22: 000000000000a003 x21: ffffd45c4cfae000
 x20: 0000000000000010 x19: ffff1299fd668310 x18: 000000000000001a
 x17: 000000040044ffff x16: ffffd45cb15dc648 x15: 0000000000000000
 x14: ffff1299c08da1c0 x13: ffffd45cb1f87a10 x12: ffffd45cb2f5fe80
 x11: 0000000000000001 x10: 0000000000001b30 x9 : ffffd45c4d12b488
 x8 : 1fffe25339380d81 x7 : 0000000000000001 x6 : ffff1299c9c06c00
 x5 : 0000000000000132 x4 : 0000000000000000 x3 : 0000000000000000
 x2 : 0000000000000010 x1 : ffff80008750bc98 x0 : 0000000000000000
 Call trace:
  vcodec_vpu_send_msg+0x4c/0x190 [mtk_vcodec_dec]
  vcodec_send_ap_ipi+0x78/0x170 [mtk_vcodec_dec]
  vpu_dec_deinit+0x1c/0x30 [mtk_vcodec_dec]
  vdec_hevc_slice_deinit+0x30/0x98 [mtk_vcodec_dec]
  vdec_if_deinit+0x38/0x68 [mtk_vcodec_dec]
  mtk_vcodec_dec_release+0x20/0x40 [mtk_vcodec_dec]
  fops_vcodec_release+0x64/0x118 [mtk_vcodec_dec]
  v4l2_release+0x7c/0x100
  __fput+0x80/0x2d8
  __fput_sync+0x58/0x70
  __arm64_sys_close+0x40/0x90
  invoke_syscall+0x50/0x128
  el0_svc_common.constprop.0+0x48/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x38/0xd8
  el0t_64_sync_handler+0xc0/0xc8
  el0t_64_sync+0x1a8/0x1b0
 Code: d503201f f9401660 b900127f b900227f (f9400400)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35921/">CVE-2024-35921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35921">CVE-2024-35921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224477">SUSE bug 1224477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbmon: prevent division by zero in fb_videomode_from_videomode()

The expression htotal * vtotal can have a zero value on
overflow. It is necessary to prevent division by zero like in
fb_var_to_videomode().

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224660">SUSE bug 1224660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Limit read size on v1.2

Between UCSI 1.2 and UCSI 2.0, the size of the MESSAGE_IN region was
increased from 16 to 256. In order to avoid overflowing reads for older
systems, add a mechanism to use the read UCSI version to truncate read
sizes on UCSI v1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224657">SUSE bug 1224657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: prevent division by zero in blk_rq_stat_sum()

The expression dst-&gt;nr_samples + src-&gt;nr_samples may
have zero value on overflow. It is necessary to add
a check to avoid division by zero.

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224661">SUSE bug 1224661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35926" ref_url="https://www.suse.com/security/cve/CVE-2024-35926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: iaa - Fix async_disable descriptor leak

The disable_async paths of iaa_compress/decompress() don't free idxd
descriptors in the async_disable case. Currently this only happens in
the testcases where req-&gt;dst is set to null. Add a test to free them
in those paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35926/">CVE-2024-35926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35926">CVE-2024-35926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224655">SUSE bug 1224655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35927" ref_url="https://www.suse.com/security/cve/CVE-2024-35927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Check output polling initialized before disabling

In drm_kms_helper_poll_disable() check if output polling
support is initialized before disabling polling. If not flag
this as a warning.
Additionally in drm_mode_config_helper_suspend() and
drm_mode_config_helper_resume() calls, that re the callers of these
functions, avoid invoking them if polling is not initialized.
For drivers like hyperv-drm, that do not initialize connector
polling, if suspend is called without this check, it leads to
suspend failure with following stack
[  770.719392] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done.
[  770.720592] printk: Suspending console(s) (use no_console_suspend to debug)
[  770.948823] ------------[ cut here ]------------
[  770.948824] WARNING: CPU: 1 PID: 17197 at kernel/workqueue.c:3162 __flush_work.isra.0+0x212/0x230
[  770.948831] Modules linked in: rfkill nft_counter xt_conntrack xt_owner udf nft_compat crc_itu_t nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink vfat fat mlx5_ib ib_uverbs ib_core mlx5_core intel_rapl_msr intel_rapl_common kvm_amd ccp mlxfw kvm psample hyperv_drm tls drm_shmem_helper drm_kms_helper irqbypass pcspkr syscopyarea sysfillrect sysimgblt hv_balloon hv_utils joydev drm fuse xfs libcrc32c pci_hyperv pci_hyperv_intf sr_mod sd_mod cdrom t10_pi sg hv_storvsc scsi_transport_fc hv_netvsc serio_raw hyperv_keyboard hid_hyperv crct10dif_pclmul crc32_pclmul crc32c_intel hv_vmbus ghash_clmulni_intel dm_mirror dm_region_hash dm_log dm_mod
[  770.948863] CPU: 1 PID: 17197 Comm: systemd-sleep Not tainted 5.14.0-362.2.1.el9_3.x86_64 #1
[  770.948865] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022
[  770.948866] RIP: 0010:__flush_work.isra.0+0x212/0x230
[  770.948869] Code: 8b 4d 00 4c 8b 45 08 89 ca 48 c1 e9 04 83 e2 08 83 e1 0f 83 ca 02 89 c8 48 0f ba 6d 00 03 e9 25 ff ff ff 0f 0b e9 4e ff ff ff &lt;0f&gt; 0b 45 31 ed e9 44 ff ff ff e8 8f 89 b2 00 66 66 2e 0f 1f 84 00
[  770.948870] RSP: 0018:ffffaf4ac213fb10 EFLAGS: 00010246
[  770.948871] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8c992857
[  770.948872] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff9aad82b00330
[  770.948873] RBP: ffff9aad82b00330 R08: 0000000000000000 R09: ffff9aad87ee3d10
[  770.948874] R10: 0000000000000200 R11: 0000000000000000 R12: ffff9aad82b00330
[  770.948874] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[  770.948875] FS:  00007ff1b2f6bb40(0000) GS:ffff9aaf37d00000(0000) knlGS:0000000000000000
[  770.948878] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  770.948878] CR2: 0000555f345cb666 CR3: 00000001462dc005 CR4: 0000000000370ee0
[  770.948879] Call Trace:
[  770.948880]  &lt;TASK&gt;
[  770.948881]  ? show_trace_log_lvl+0x1c4/0x2df
[  770.948884]  ? show_trace_log_lvl+0x1c4/0x2df
[  770.948886]  ? __cancel_work_timer+0x103/0x190
[  770.948887]  ? __flush_work.isra.0+0x212/0x230
[  770.948889]  ? __warn+0x81/0x110
[  770.948891]  ? __flush_work.isra.0+0x212/0x230
[  770.948892]  ? report_bug+0x10a/0x140
[  770.948895]  ? handle_bug+0x3c/0x70
[  770.948898]  ? exc_invalid_op+0x14/0x70
[  770.948899]  ? asm_exc_invalid_op+0x16/0x20
[  770.948903]  ? __flush_work.isra.0+0x212/0x230
[  770.948905]  __cancel_work_timer+0x103/0x190
[  770.948907]  ? _raw_spin_unlock_irqrestore+0xa/0x30
[  770.948910]  drm_kms_helper_poll_disable+0x1e/0x40 [drm_kms_helper]
[  770.948923]  drm_mode_config_helper_suspend+0x1c/0x80 [drm_kms_helper]
[  770.948933]  ? __pfx_vmbus_suspend+0x10/0x10 [hv_vmbus]
[  770.948942]  hyperv_vmbus_suspend+0x17/0x40 [hyperv_drm]
[  770.948944]  ? __pfx_vmbus_suspend+0x10/0x10 [hv_vmbus]
[  770.948951]  dpm_run_callback+0x4c/0x140
[  770.948954]  __device_suspend_noir
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35927/">CVE-2024-35927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35927">CVE-2024-35927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224654">SUSE bug 1224654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35928" ref_url="https://www.suse.com/security/cve/CVE-2024-35928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35928/">CVE-2024-35928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35928">CVE-2024-35928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224653">SUSE bug 1224653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35929" ref_url="https://www.suse.com/security/cve/CVE-2024-35929" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock()

For the kernels built with CONFIG_RCU_NOCB_CPU_DEFAULT_ALL=y and
CONFIG_RCU_LAZY=y, the following scenarios will trigger WARN_ON_ONCE()
in the rcu_nocb_bypass_lock() and rcu_nocb_wait_contended() functions:

        CPU2                                               CPU11
kthread
rcu_nocb_cb_kthread                                       ksys_write
rcu_do_batch                                              vfs_write
rcu_torture_timer_cb                                      proc_sys_write
__kmem_cache_free                                         proc_sys_call_handler
kmemleak_free                                             drop_caches_sysctl_handler
delete_object_full                                        drop_slab
__delete_object                                           shrink_slab
put_object                                                lazy_rcu_shrink_scan
call_rcu                                                  rcu_nocb_flush_bypass
__call_rcu_commn                                            rcu_nocb_bypass_lock
                                                            raw_spin_trylock(&amp;rdp-&gt;nocb_bypass_lock) fail
                                                            atomic_inc(&amp;rdp-&gt;nocb_lock_contended);
rcu_nocb_wait_contended                                     WARN_ON_ONCE(smp_processor_id() != rdp-&gt;cpu);
 WARN_ON_ONCE(atomic_read(&amp;rdp-&gt;nocb_lock_contended))                                          |
                            |_ _ _ _ _ _ _ _ _ _same rdp and rdp-&gt;cpu != 11_ _ _ _ _ _ _ _ _ __|

Reproduce this bug with "echo 3 &gt; /proc/sys/vm/drop_caches".

This commit therefore uses rcu_nocb_try_flush_bypass() instead of
rcu_nocb_flush_bypass() in lazy_rcu_shrink_scan().  If the nocb_bypass
queue is being flushed, then rcu_nocb_try_flush_bypass will return
directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35929/">CVE-2024-35929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35929">CVE-2024-35929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224656">SUSE bug 1224656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()

The call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an
unsuccessful status.  In such cases, the elsiocb is not issued, the
completion is not called, and thus the elsiocb resource is leaked.

Check return value after calling lpfc_sli4_resume_rpi() and conditionally
release the elsiocb resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224651">SUSE bug 1224651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35931" ref_url="https://www.suse.com/security/cve/CVE-2024-35931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Skip do PCI error slot reset during RAS recovery

Why:
    The PCI error slot reset maybe triggered after inject ue to UMC multi times, this
    caused system hang.
    [  557.371857] amdgpu 0000:af:00.0: amdgpu: GPU reset succeeded, trying to resume
    [  557.373718] [drm] PCIE GART of 512M enabled.
    [  557.373722] [drm] PTB located at 0x0000031FED700000
    [  557.373788] [drm] VRAM is lost due to GPU reset!
    [  557.373789] [drm] PSP is resuming...
    [  557.547012] mlx5_core 0000:55:00.0: mlx5_pci_err_detected Device state = 1 pci_status: 0. Exit, result = 3, need reset
    [  557.547067] [drm] PCI error: detected callback, state(1)!!
    [  557.547069] [drm] No support for XGMI hive yet...
    [  557.548125] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 0. Enter
    [  557.607763] mlx5_core 0000:55:00.0: wait vital counter value 0x16b5b after 1 iterations
    [  557.607777] mlx5_core 0000:55:00.0: mlx5_pci_slot_reset Device state = 1 pci_status: 1. Exit, err = 0, result = 5, recovered
    [  557.610492] [drm] PCI error: slot reset callback!!
    ...
    [  560.689382] amdgpu 0000:3f:00.0: amdgpu: GPU reset(2) succeeded!
    [  560.689546] amdgpu 0000:5a:00.0: amdgpu: GPU reset(2) succeeded!
    [  560.689562] general protection fault, probably for non-canonical address 0x5f080b54534f611f: 0000 [#1] SMP NOPTI
    [  560.701008] CPU: 16 PID: 2361 Comm: kworker/u448:9 Tainted: G           OE     5.15.0-91-generic #101-Ubuntu
    [  560.712057] Hardware name: Microsoft C278A/C278A, BIOS C2789.5.BS.1C11.AG.1 11/08/2023
    [  560.720959] Workqueue: amdgpu-reset-hive amdgpu_ras_do_recovery [amdgpu]
    [  560.728887] RIP: 0010:amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]
    [  560.736891] Code: ff 41 89 c6 e9 1b ff ff ff 44 0f b6 45 b0 e9 4f ff ff ff be 01 00 00 00 4c 89 e7 e8 76 c9 8b ff 44 0f b6 45 b0 e9 3c fd ff ff &lt;48&gt; 83 ba 18 02 00 00 00 0f 84 6a f8 ff ff 48 8d 7a 78 be 01 00 00
    [  560.757967] RSP: 0018:ffa0000032e53d80 EFLAGS: 00010202
    [  560.763848] RAX: ffa00000001dfd10 RBX: ffa0000000197090 RCX: ffa0000032e53db0
    [  560.771856] RDX: 5f080b54534f5f07 RSI: 0000000000000000 RDI: ff11000128100010
    [  560.779867] RBP: ffa0000032e53df0 R08: 0000000000000000 R09: ffffffffffe77f08
    [  560.787879] R10: 0000000000ffff0a R11: 0000000000000001 R12: 0000000000000000
    [  560.795889] R13: ffa0000032e53e00 R14: 0000000000000000 R15: 0000000000000000
    [  560.803889] FS:  0000000000000000(0000) GS:ff11007e7e800000(0000) knlGS:0000000000000000
    [  560.812973] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [  560.819422] CR2: 000055a04c118e68 CR3: 0000000007410005 CR4: 0000000000771ee0
    [  560.827433] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [  560.835433] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
    [  560.843444] PKRU: 55555554
    [  560.846480] Call Trace:
    [  560.849225]  &lt;TASK&gt;
    [  560.851580]  ? show_trace_log_lvl+0x1d6/0x2ea
    [  560.856488]  ? show_trace_log_lvl+0x1d6/0x2ea
    [  560.861379]  ? amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]
    [  560.867778]  ? show_regs.part.0+0x23/0x29
    [  560.872293]  ? __die_body.cold+0x8/0xd
    [  560.876502]  ? die_addr+0x3e/0x60
    [  560.880238]  ? exc_general_protection+0x1c5/0x410
    [  560.885532]  ? asm_exc_general_protection+0x27/0x30
    [  560.891025]  ? amdgpu_device_gpu_recover.cold+0xbf1/0xcf5 [amdgpu]
    [  560.898323]  amdgpu_ras_do_recovery+0x1b2/0x210 [amdgpu]
    [  560.904520]  process_one_work+0x228/0x3d0
How:
    In RAS recovery, mode-1 reset is issued from RAS fatal error handling and expected
    all the nodes in a hive to be reset. no need to issue another mode-1 during this procedure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35931/">CVE-2024-35931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35931">CVE-2024-35931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224652">SUSE bug 1224652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: don't check if plane-&gt;state-&gt;fb == state-&gt;fb

Currently, when using non-blocking commits, we can see the following
kernel warning:

[  110.908514] ------------[ cut here ]------------
[  110.908529] refcount_t: underflow; use-after-free.
[  110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0
[  110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6
[  110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G         C         6.1.66-v8+ #32
[  110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)
[  110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  110.909132] pc : refcount_dec_not_one+0xb8/0xc0
[  110.909152] lr : refcount_dec_not_one+0xb4/0xc0
[  110.909170] sp : ffffffc00913b9c0
[  110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60
[  110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480
[  110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78
[  110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000
[  110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004
[  110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003
[  110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00
[  110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572
[  110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000
[  110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001
[  110.909434] Call trace:
[  110.909441]  refcount_dec_not_one+0xb8/0xc0
[  110.909461]  vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]
[  110.909903]  vc4_cleanup_fb+0x44/0x50 [vc4]
[  110.910315]  drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]
[  110.910669]  vc4_atomic_commit_tail+0x390/0x9dc [vc4]
[  110.911079]  commit_tail+0xb0/0x164 [drm_kms_helper]
[  110.911397]  drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]
[  110.911716]  drm_atomic_commit+0xb0/0xdc [drm]
[  110.912569]  drm_mode_atomic_ioctl+0x348/0x4b8 [drm]
[  110.913330]  drm_ioctl_kernel+0xec/0x15c [drm]
[  110.914091]  drm_ioctl+0x24c/0x3b0 [drm]
[  110.914850]  __arm64_sys_ioctl+0x9c/0xd4
[  110.914873]  invoke_syscall+0x4c/0x114
[  110.914897]  el0_svc_common+0xd0/0x118
[  110.914917]  do_el0_svc+0x38/0xd0
[  110.914936]  el0_svc+0x30/0x8c
[  110.914958]  el0t_64_sync_handler+0x84/0xf0
[  110.914979]  el0t_64_sync+0x18c/0x190
[  110.914996] ---[ end trace 0000000000000000 ]---

This happens because, although `prepare_fb` and `cleanup_fb` are
perfectly balanced, we cannot guarantee consistency in the check
plane-&gt;state-&gt;fb == state-&gt;fb. This means that sometimes we can increase
the refcount in `prepare_fb` and don't decrease it in `cleanup_fb`. The
opposite can also be true.

In fact, the struct drm_plane .state shouldn't be accessed directly
but instead, the `drm_atomic_get_new_plane_state()` helper function should
be used. So, we could stick to this check, but using
`drm_atomic_get_new_plane_state()`. But actually, this check is not re
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224650">SUSE bug 1224650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btintel: Fix null ptr deref in btintel_read_version

If hci_cmd_sync_complete() is triggered and skb is NULL, then
hdev-&gt;req_skb is NULL, which will cause this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224640">SUSE bug 1224640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()

Many syzbot reports show extreme rtnl pressure, and many of them hint
that smc acquires rtnl in netns creation for no good reason [1]

This patch returns early from smc_pnet_net_init()
if there is no netdevice yet.

I am not even sure why smc_pnet_create_pnetids_list() even exists,
because smc_pnet_netdev_event() is also calling
smc_pnet_add_base_pnetid() when handling NETDEV_UP event.

[1] extract of typical syzbot reports

2 locks held by syz-executor.3/12252:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12253:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12257:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12261:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.0/12265:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.3/12268:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12271:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12274:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12280:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224641">SUSE bug 1224641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: send: handle path ref underflow in header iterate_inode_ref()

Change BUG_ON to proper error handling if building the path buffer
fails. The pointers are not printed so we don't accidentally leak kernel
addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224645">SUSE bug 1224645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks()

The unhandled case in btrfs_relocate_sys_chunks() loop is a corruption,
as it could be caused only by two impossible conditions:

- at first the search key is set up to look for a chunk tree item, with
  offset -1, this is an inexact search and the key-&gt;offset will contain
  the correct offset upon a successful search, a valid chunk tree item
  cannot have an offset -1

- after first successful search, the found_key corresponds to a chunk
  item, the offset is decremented by 1 before the next loop, it's
  impossible to find a chunk item there due to alignment and size
  constraints
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224644">SUSE bug 1224644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: check A-MSDU format more carefully

If it looks like there's another subframe in the A-MSDU
but the header isn't fully there, we can end up reading
data out of bounds, only to discard later. Make this a
bit more careful and check if the subframe header can
even be present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: decrease MHI channel buffer length to 8KB

Currently buf_len field of ath11k_mhi_config_qca6390 is assigned
with 0, making MHI use a default size, 64KB, to allocate channel
buffers. This is likely to fail in some scenarios where system
memory is highly fragmented and memory compaction or reclaim is
not allowed.

There is a fail report which is caused by it:
kworker/u32:45: page allocation failure: order:4, mode:0x40c00(GFP_NOIO|__GFP_COMP), nodemask=(null),cpuset=/,mems_allowed=0
CPU: 0 PID: 19318 Comm: kworker/u32:45 Not tainted 6.8.0-rc3-1.gae4495f-default #1 openSUSE Tumbleweed (unreleased) 493b6d5b382c603654d7a81fc3c144d59a1dfceb
Workqueue: events_unbound async_run_entry_fn
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x47/0x60
 warn_alloc+0x13a/0x1b0
 ? srso_alias_return_thunk+0x5/0xfbef5
 ? __alloc_pages_direct_compact+0xab/0x210
 __alloc_pages_slowpath.constprop.0+0xd3e/0xda0
 __alloc_pages+0x32d/0x350
 ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 __kmalloc_large_node+0x72/0x110
 __kmalloc+0x37c/0x480
 ? mhi_map_single_no_bb+0x77/0xf0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 ? mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 mhi_prepare_channel+0x127/0x2d0 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 __mhi_prepare_for_transfer+0x44/0x80 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 ? __pfx_____mhi_prepare_for_transfer+0x10/0x10 [mhi 40df44e07c05479f7a6e7b90fba9f0e0031a7814]
 device_for_each_child+0x5c/0xa0
 ? __pfx_pci_pm_resume+0x10/0x10
 ath11k_core_resume+0x65/0x100 [ath11k a5094e22d7223135c40d93c8f5321cf09fd85e4e]
 ? srso_alias_return_thunk+0x5/0xfbef5
 ath11k_pci_pm_resume+0x32/0x60 [ath11k_pci 830b7bfc3ea80ebef32e563cafe2cb55e9cc73ec]
 ? srso_alias_return_thunk+0x5/0xfbef5
 dpm_run_callback+0x8c/0x1e0
 device_resume+0x104/0x340
 ? __pfx_dpm_watchdog_handler+0x10/0x10
 async_resume+0x1d/0x30
 async_run_entry_fn+0x32/0x120
 process_one_work+0x168/0x330
 worker_thread+0x2f5/0x410
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe8/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Actually those buffers are used only by QMI target -&gt; host communication.
And for WCN6855 and QCA6390, the largest packet size for that is less
than 6KB. So change buf_len field to 8KB, which results in order 1
allocation if page size is 4KB. In this way, we can at least save some
memory, and as well as decrease the possibility of allocation failure
in those scenarios.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224643">SUSE bug 1224643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-direct: Leak pages on dma_set_decrypted() failure

On TDX it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

DMA could free decrypted/shared pages if dma_set_decrypted() fails. This
should be a rare case. Just leak the pages in this case instead of
freeing them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224535">SUSE bug 1224535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/zone: Add a null pointer check to the psz_kmsg_read

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224537">SUSE bug 1224537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35942" ref_url="https://www.suse.com/security/cve/CVE-2024-35942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain

According to i.MX8MP RM and HDMI ADD, the fdcc clock is part of
hdmi rx verification IP that should not enable for HDMI TX.
But actually if the clock is disabled before HDMI/LCDIF probe,
LCDIF will not get pixel clock from HDMI PHY and print the error
logs:

[CRTC:39:crtc-2] vblank wait timed out
WARNING: CPU: 2 PID: 9 at drivers/gpu/drm/drm_atomic_helper.c:1634 drm_atomic_helper_wait_for_vblanks.part.0+0x23c/0x260

Add fdcc clock to LCDIF and HDMI TX power domains to fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35942/">CVE-2024-35942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35942">CVE-2024-35942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224589">SUSE bug 1224589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: ti: Add a null pointer check to the omap_prm_domain_init

devm_kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure. Ensure the allocation was successful
by checking the pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224649">SUSE bug 1224649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()

Syzkaller hit 'WARNING in dg_dispatch_as_host' bug.

memcpy: detected field-spanning write (size 56) of single field "&amp;dg_info-&gt;msg"
at drivers/misc/vmw_vmci/vmci_datagram.c:237 (size 24)

WARNING: CPU: 0 PID: 1555 at drivers/misc/vmw_vmci/vmci_datagram.c:237
dg_dispatch_as_host+0x88e/0xa60 drivers/misc/vmw_vmci/vmci_datagram.c:237

Some code commentry, based on my understanding:

544 #define VMCI_DG_SIZE(_dg) (VMCI_DG_HEADERSIZE + (size_t)(_dg)-&gt;payload_size)
/// This is 24 + payload_size

memcpy(&amp;dg_info-&gt;msg, dg, dg_size);
	Destination = dg_info-&gt;msg ---&gt; this is a 24 byte
					structure(struct vmci_datagram)
	Source = dg --&gt; this is a 24 byte structure (struct vmci_datagram)
	Size = dg_size = 24 + payload_size

{payload_size = 56-24 =32} -- Syzkaller managed to set payload_size to 32.

 35 struct delayed_datagram_info {
 36         struct datagram_entry *entry;
 37         struct work_struct work;
 38         bool in_dg_host_queue;
 39         /* msg and msg_payload must be together. */
 40         struct vmci_datagram msg;
 41         u8 msg_payload[];
 42 };

So those extra bytes of payload are copied into msg_payload[], a run time
warning is seen while fuzzing with Syzkaller.

One possible way to fix the warning is to split the memcpy() into
two parts -- one -- direct assignment of msg and second taking care of payload.

Gustavo quoted:
"Under FORTIFY_SOURCE we should not copy data across multiple members
in a structure."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224648">SUSE bug 1224648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: phy_device: Prevent nullptr exceptions on ISR

If phydev-&gt;irq is set unconditionally, check
for valid interrupt handler or fall back to polling mode to prevent
nullptr exceptions in interrupt service routine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224639">SUSE bug 1224639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35946" ref_url="https://www.suse.com/security/cve/CVE-2024-35946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: fix null pointer access when abort scan

During cancel scan we might use vif that weren't scanning.
Fix this by using the actual scanning vif.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35946/">CVE-2024-35946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35946">CVE-2024-35946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224646">SUSE bug 1224646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dyndbg: fix old BUG_ON in &gt;control parser

Fix a BUG_ON from 2009.  Even if it looks "unreachable" (I didn't
really look), lets make sure by removing it, doing pr_err and return
-EINVAL instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224647">SUSE bug 1224647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35948" ref_url="https://www.suse.com/security/cve/CVE-2024-35948" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcachefs: Check for journal entries overruning end of sb clean section

Fix a missing bounds check in superblock validation.

Note that we don't yet have repair code for this case - repair code for
individual items is generally low priority, since the whole superblock
is checksummed, validated prior to write, and we have backups.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-05-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35948/">CVE-2024-35948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35948">CVE-2024-35948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224702">SUSE bug 1224702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: make sure that WRITTEN is set on all metadata blocks

We previously would call btrfs_check_leaf() if we had the check
integrity code enabled, which meant that we could only run the extended
leaf checks if we had WRITTEN set on the header flags.

This leaves a gap in our checking, because we could end up with
corruption on disk where WRITTEN isn't set on the leaf, and then the
extended leaf checks don't get run which we rely on to validate all of
the item pointers to make sure we don't access memory outside of the
extent buffer.

However, since 732fab95abe2 ("btrfs: check-integrity: remove
CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call
btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only
ever call it on blocks that are being written out, and thus have WRITTEN
set, or that are being read in, which should have WRITTEN set.

Add checks to make sure we have WRITTEN set appropriately, and then make
sure __btrfs_check_leaf() always does the item checking.  This will
protect us from file systems that have been corrupted and no longer have
WRITTEN set on some of the blocks.

This was hit on a crafted image tweaking the WRITTEN bit and reported by
KASAN as out-of-bound access in the eb accessors. The example is a dir
item at the end of an eb.

  [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2
  [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI
  [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f]
  [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1
  [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0
  [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206
  [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0
  [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748
  [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9
  [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a
  [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8
  [2.621] FS:  00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000
  [2.621] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0
  [2.621] Call Trace:
  [2.621]  &lt;TASK&gt;
  [2.621]  ? show_regs+0x74/0x80
  [2.621]  ? die_addr+0x46/0xc0
  [2.621]  ? exc_general_protection+0x161/0x2a0
  [2.621]  ? asm_exc_general_protection+0x26/0x30
  [2.621]  ? btrfs_get_16+0x33a/0x6d0
  [2.621]  ? btrfs_get_16+0x34b/0x6d0
  [2.621]  ? btrfs_get_16+0x33a/0x6d0
  [2.621]  ? __pfx_btrfs_get_16+0x10/0x10
  [2.621]  ? __pfx_mutex_unlock+0x10/0x10
  [2.621]  btrfs_match_dir_item_name+0x101/0x1a0
  [2.621]  btrfs_lookup_dir_item+0x1f3/0x280
  [2.621]  ? __pfx_btrfs_lookup_dir_item+0x10/0x10
  [2.621]  btrfs_get_tree+0xd25/0x1910

[ copy more details from report ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229273">SUSE bug 1229273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2797-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex

The modes[] array contains pointers to modes on the connectors'
mode lists, which are protected by dev-&gt;mode_config.mutex.
Thus we need to extend modes[] the same protection or by the
time we use it the elements may already be pointing to
freed/reused memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225310">SUSE bug 1225310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr()

Subject: [PATCH] drm/panfrost: Fix the error path in
 panfrost_mmu_map_fault_addr()

If some the pages or sgt allocation failed, we shouldn't release the
pages ref we got earlier, otherwise we will end up with unbalanced
get/put_pages() calls. We should instead leave everything in place
and let the BO release function deal with extra cleanup when the object
is destroyed, or let the fault handler try again next time it's called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224701">SUSE bug 1224701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ast: Fix soft lockup

There is a while-loop in ast_dp_set_on_off() that could lead to
infinite-loop. This is because the register, VGACRI-Dx, checked in
this API is a scratch register actually controlled by a MCU, named
DPMCU, in BMC.

These scratch registers are protected by scu-lock. If suc-lock is not
off, DPMCU can not update these registers and then host will have soft
lockup due to never updated status.

DPMCU is used to control DP and relative registers to handshake with
host's VGA driver. Even the most time-consuming task, DP's link
training, is less than 100ms. 200ms should be enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224705">SUSE bug 1224705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35953" ref_url="https://www.suse.com/security/cve/CVE-2024-35953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Fix deadlock in context_xa

ivpu_device-&gt;context_xa is locked both in kernel thread and IRQ context.
It requires XA_FLAGS_LOCK_IRQ flag to be passed during initialization
otherwise the lock could be acquired from a thread and interrupted by
an IRQ that locks it for the second time causing the deadlock.

This deadlock was reported by lockdep and observed in internal tests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35953/">CVE-2024-35953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35953">CVE-2024-35953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224704">SUSE bug 1224704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35954" ref_url="https://www.suse.com/security/cve/CVE-2024-35954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Avoid sg device teardown race

sg_remove_sfp_usercontext() must not use sg_device_destroy() after calling
scsi_device_put().

sg_device_destroy() is accessing the parent scsi_device request_queue which
will already be set to NULL when the preceding call to scsi_device_put()
removed the last reference to the parent scsi_device.

The resulting NULL pointer exception will then crash the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35954/">CVE-2024-35954 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35954">CVE-2024-35954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224675">SUSE bug 1224675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kprobes: Fix possible use-after-free issue on kprobe registration

When unloading a module, its state is changing MODULE_STATE_LIVE -&gt;
 MODULE_STATE_GOING -&gt; MODULE_STATE_UNFORMED. Each change will take
a time. `is_module_text_address()` and `__module_text_address()`
works with MODULE_STATE_LIVE and MODULE_STATE_GOING.
If we use `is_module_text_address()` and `__module_text_address()`
separately, there is a chance that the first one is succeeded but the
next one is failed because module-&gt;state becomes MODULE_STATE_UNFORMED
between those operations.

In `check_kprobe_address_safe()`, if the second `__module_text_address()`
is failed, that is ignored because it expected a kernel_text address.
But it may have failed simply because module-&gt;state has been changed
to MODULE_STATE_UNFORMED. In this case, arm_kprobe() will try to modify
non-exist module text address (use-after-free).

To fix this problem, we should not use separated `is_module_text_address()`
and `__module_text_address()`, but use only `__module_text_address()`
once and do `try_module_get(module)` which is only available with
MODULE_STATE_LIVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224676">SUSE bug 1224676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations

Create subvolume, create snapshot and delete subvolume all use
btrfs_subvolume_reserve_metadata() to reserve metadata for the changes
done to the parent subvolume's fs tree, which cannot be mediated in the
normal way via start_transaction. When quota groups (squota or qgroups)
are enabled, this reserves qgroup metadata of type PREALLOC. Once the
operation is associated to a transaction, we convert PREALLOC to
PERTRANS, which gets cleared in bulk at the end of the transaction.

However, the error paths of these three operations were not implementing
this lifecycle correctly. They unconditionally converted the PREALLOC to
PERTRANS in a generic cleanup step regardless of errors or whether the
operation was fully associated to a transaction or not. This resulted in
error paths occasionally converting this rsv to PERTRANS without calling
record_root_in_trans successfully, which meant that unless that root got
recorded in the transaction by some other thread, the end of the
transaction would not free that root's PERTRANS, leaking it. Ultimately,
this resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount
for the leaked reservation.

The fix is to ensure that every qgroup PREALLOC reservation observes the
following properties:

1. any failure before record_root_in_trans is called successfully
   results in freeing the PREALLOC reservation.
2. after record_root_in_trans, we convert to PERTRANS, and now the
   transaction owns freeing the reservation.

This patch enforces those properties on the three operations. Without
it, generic/269 with squotas enabled at mkfs time would fail in ~5-10
runs on my system. With this patch, it ran successfully 1000 times in a
row.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224674">SUSE bug 1224674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35957" ref_url="https://www.suse.com/security/cve/CVE-2024-35957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix WARN_ON in iommu probe path

Commit 1a75cc710b95 ("iommu/vt-d: Use rbtree to track iommu probed
devices") adds all devices probed by the iommu driver in a rbtree
indexed by the source ID of each device. It assumes that each device
has a unique source ID. This assumption is incorrect and the VT-d
spec doesn't state this requirement either.

The reason for using a rbtree to track devices is to look up the device
with PCI bus and devfunc in the paths of handling ATS invalidation time
out error and the PRI I/O page faults. Both are PCI ATS feature related.

Only track the devices that have PCI ATS capabilities in the rbtree to
avoid unnecessary WARN_ON in the iommu probe path. Otherwise, on some
platforms below kernel splat will be displayed and the iommu probe results
in failure.

 WARNING: CPU: 3 PID: 166 at drivers/iommu/intel/iommu.c:158 intel_iommu_probe_device+0x319/0xd90
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0x7e/0x180
  ? intel_iommu_probe_device+0x319/0xd90
  ? report_bug+0x1f8/0x200
  ? handle_bug+0x3c/0x70
  ? exc_invalid_op+0x18/0x70
  ? asm_exc_invalid_op+0x1a/0x20
  ? intel_iommu_probe_device+0x319/0xd90
  ? debug_mutex_init+0x37/0x50
  __iommu_probe_device+0xf2/0x4f0
  iommu_probe_device+0x22/0x70
  iommu_bus_notifier+0x1e/0x40
  notifier_call_chain+0x46/0x150
  blocking_notifier_call_chain+0x42/0x60
  bus_notify+0x2f/0x50
  device_add+0x5ed/0x7e0
  platform_device_add+0xf5/0x240
  mfd_add_devices+0x3f9/0x500
  ? preempt_count_add+0x4c/0xa0
  ? up_write+0xa2/0x1b0
  ? __debugfs_create_file+0xe3/0x150
  intel_lpss_probe+0x49f/0x5b0
  ? pci_conf1_write+0xa3/0xf0
  intel_lpss_pci_probe+0xcf/0x110 [intel_lpss_pci]
  pci_device_probe+0x95/0x120
  really_probe+0xd9/0x370
  ? __pfx___driver_attach+0x10/0x10
  __driver_probe_device+0x73/0x150
  driver_probe_device+0x19/0xa0
  __driver_attach+0xb6/0x180
  ? __pfx___driver_attach+0x10/0x10
  bus_for_each_dev+0x77/0xd0
  bus_add_driver+0x114/0x210
  driver_register+0x5b/0x110
  ? __pfx_intel_lpss_pci_driver_init+0x10/0x10 [intel_lpss_pci]
  do_one_initcall+0x57/0x2b0
  ? kmalloc_trace+0x21e/0x280
  ? do_init_module+0x1e/0x210
  do_init_module+0x5f/0x210
  load_module+0x1d37/0x1fc0
  ? init_module_from_file+0x86/0xd0
  init_module_from_file+0x86/0xd0
  idempotent_init_module+0x17c/0x230
  __x64_sys_finit_module+0x56/0xb0
  do_syscall_64+0x6e/0x140
  entry_SYSCALL_64_after_hwframe+0x71/0x79
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35957/">CVE-2024-35957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35957">CVE-2024-35957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224673">SUSE bug 1224673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ena: Fix incorrect descriptor free behavior

ENA has two types of TX queues:
- queues which only process TX packets arriving from the network stack
- queues which only process TX packets forwarded to it by XDP_REDIRECT
  or XDP_TX instructions

The ena_free_tx_bufs() cycles through all descriptors in a TX queue
and unmaps + frees every descriptor that hasn't been acknowledged yet
by the device (uncompleted TX transactions).
The function assumes that the processed TX queue is necessarily from
the first category listed above and ends up using napi_consume_skb()
for descriptors belonging to an XDP specific queue.

This patch solves a bug in which, in case of a VF reset, the
descriptors aren't freed correctly, leading to crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224677">SUSE bug 1224677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix mlx5e_priv_init() cleanup flow

When mlx5e_priv_init() fails, the cleanup flow calls mlx5e_selq_cleanup which
calls mlx5e_selq_apply() that assures that the `priv-&gt;state_lock` is held using
lockdep_is_held().

Acquire the state_lock in mlx5e_selq_cleanup().

Kernel log:
=============================
WARNING: suspicious RCU usage
6.8.0-rc3_net_next_841a9b5 #1 Not tainted
-----------------------------
drivers/net/ethernet/mellanox/mlx5/core/en/selq.c:124 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
2 locks held by systemd-modules/293:
 #0: ffffffffa05067b0 (devices_rwsem){++++}-{3:3}, at: ib_register_client+0x109/0x1b0 [ib_core]
 #1: ffff8881096c65c0 (&amp;device-&gt;client_data_rwsem){++++}-{3:3}, at: add_client_context+0x104/0x1c0 [ib_core]

stack backtrace:
CPU: 4 PID: 293 Comm: systemd-modules Not tainted 6.8.0-rc3_net_next_841a9b5 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x8a/0xa0
 lockdep_rcu_suspicious+0x154/0x1a0
 mlx5e_selq_apply+0x94/0xa0 [mlx5_core]
 mlx5e_selq_cleanup+0x3a/0x60 [mlx5_core]
 mlx5e_priv_init+0x2be/0x2f0 [mlx5_core]
 mlx5_rdma_setup_rn+0x7c/0x1a0 [mlx5_core]
 rdma_init_netdev+0x4e/0x80 [ib_core]
 ? mlx5_rdma_netdev_free+0x70/0x70 [mlx5_core]
 ipoib_intf_init+0x64/0x550 [ib_ipoib]
 ipoib_intf_alloc+0x4e/0xc0 [ib_ipoib]
 ipoib_add_one+0xb0/0x360 [ib_ipoib]
 add_client_context+0x112/0x1c0 [ib_core]
 ib_register_client+0x166/0x1b0 [ib_core]
 ? 0xffffffffa0573000
 ipoib_init_module+0xeb/0x1a0 [ib_ipoib]
 do_one_initcall+0x61/0x250
 do_init_module+0x8a/0x270
 init_module_from_file+0x8b/0xd0
 idempotent_init_module+0x17d/0x230
 __x64_sys_finit_module+0x61/0xb0
 do_syscall_64+0x71/0x140
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224666">SUSE bug 1224666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Properly link new fs rules into the tree

Previously, add_rule_fg would only add newly created rules from the
handle into the tree when they had a refcount of 1. On the other hand,
create_flow_handle tries hard to find and reference already existing
identical rules instead of creating new ones.

These two behaviors can result in a situation where create_flow_handle
1) creates a new rule and references it, then
2) in a subsequent step during the same handle creation references it
   again,
resulting in a rule with a refcount of 2 that is not linked into the
tree, will have a NULL parent and root and will result in a crash when
the flow group is deleted because del_sw_hw_rule, invoked on rule
deletion, assumes node-&gt;parent is != NULL.

This happened in the wild, due to another bug related to incorrect
handling of duplicate pkt_reformat ids, which lead to the code in
create_flow_handle incorrectly referencing a just-added rule in the same
flow handle, resulting in the problem described above. Full details are
at [1].

This patch changes add_rule_fg to add new rules without parents into
the tree, properly initializing them and avoiding the crash. This makes
it more consistent with how rules are added to an FTE in
create_flow_handle.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224588">SUSE bug 1224588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Register devlink first under devlink lock

In case device is having a non fatal FW error during probe, the
driver will report the error to user via devlink. This will trigger
a WARN_ON, since mlx5 is calling devlink_register() last.
In order to avoid the WARN_ON[1], change mlx5 to invoke devl_register()
first under devlink lock.

[1]
WARNING: CPU: 5 PID: 227 at net/devlink/health.c:483 devlink_recover_notify.constprop.0+0xb8/0xc0
CPU: 5 PID: 227 Comm: kworker/u16:3 Not tainted 6.4.0-rc5_for_upstream_min_debug_2023_06_12_12_38 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_health0000:08:00.0 mlx5_fw_reporter_err_work [mlx5_core]
RIP: 0010:devlink_recover_notify.constprop.0+0xb8/0xc0
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x79/0x120
 ? devlink_recover_notify.constprop.0+0xb8/0xc0
 ? report_bug+0x17c/0x190
 ? handle_bug+0x3c/0x60
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? devlink_recover_notify.constprop.0+0xb8/0xc0
 devlink_health_report+0x4a/0x1c0
 mlx5_fw_reporter_err_work+0xa4/0xd0 [mlx5_core]
 process_one_work+0x1bb/0x3c0
 ? process_one_work+0x3c0/0x3c0
 worker_thread+0x4d/0x3c0
 ? process_one_work+0x3c0/0x3c0
 kthread+0xc6/0xf0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224585">SUSE bug 1224585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: complete validation of user input

In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.

In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:

if ((u64)optlen &lt; (u64)tmp.size + sizeof(tmp))
        return -EINVAL;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224583">SUSE bug 1224583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224582">SUSE bug 1224582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224581">SUSE bug 1224581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224579">SUSE bug 1224579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: Fix not validating setsockopt user input

syzbot reported rfcomm_sock_setsockopt_old() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old
net/bluetooth/rfcomm/sock.c:632 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70
net/bluetooth/rfcomm/sock.c:673
Read of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224576">SUSE bug 1224576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix not validating setsockopt user input

syzbot reported sco_sock_setsockopt() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90
net/bluetooth/sco.c:893
Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224587">SUSE bug 1224587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35968" ref_url="https://www.suse.com/security/cve/CVE-2024-35968" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pds_core: Fix pdsc_check_pci_health function to use work thread

When the driver notices fw_status == 0xff it tries to perform a PCI
reset on itself via pci_reset_function() in the context of the driver's
health thread. However, pdsc_reset_prepare calls
pdsc_stop_health_thread(), which attempts to stop/flush the health
thread. This results in a deadlock because the stop/flush will never
complete since the driver called pci_reset_function() from the health
thread context. Fix by changing the pdsc_check_pci_health_function()
to queue a newly introduced pdsc_pci_reset_thread() on the pdsc's
work queue.

Unloading the driver in the fw_down/dead state uncovered another issue,
which can be seen in the following trace:

WARNING: CPU: 51 PID: 6914 at kernel/workqueue.c:1450 __queue_work+0x358/0x440
[...]
RIP: 0010:__queue_work+0x358/0x440
[...]
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x85/0x140
 ? __queue_work+0x358/0x440
 ? report_bug+0xfc/0x1e0
 ? handle_bug+0x3f/0x70
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? __queue_work+0x358/0x440
 queue_work_on+0x28/0x30
 pdsc_devcmd_locked+0x96/0xe0 [pds_core]
 pdsc_devcmd_reset+0x71/0xb0 [pds_core]
 pdsc_teardown+0x51/0xe0 [pds_core]
 pdsc_remove+0x106/0x200 [pds_core]
 pci_device_remove+0x37/0xc0
 device_release_driver_internal+0xae/0x140
 driver_detach+0x48/0x90
 bus_remove_driver+0x6d/0xf0
 pci_unregister_driver+0x2e/0xa0
 pdsc_cleanup_module+0x10/0x780 [pds_core]
 __x64_sys_delete_module+0x142/0x2b0
 ? syscall_trace_enter.isra.18+0x126/0x1a0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fbd9d03a14b
[...]

Fix this by preventing the devcmd reset if the FW is not running.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35968/">CVE-2024-35968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35968">CVE-2024-35968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224570">SUSE bug 1224570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr

Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it
still means hlist_for_each_entry_rcu can return an item that got removed
from the list. The memory itself of such item is not freed thanks to RCU
but nothing guarantees the actual content of the memory is sane.

In particular, the reference count can be zero. This can happen if
ipv6_del_addr is called in parallel. ipv6_del_addr removes the entry
from inet6_addr_lst (hlist_del_init_rcu(&amp;ifp-&gt;addr_lst)) and drops all
references (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough
timing, this can happen:

1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.

2. Then, the whole ipv6_del_addr is executed for the given entry. The
   reference count drops to zero and kfree_rcu is scheduled.

3. ipv6_get_ifaddr continues and tries to increments the reference count
   (in6_ifa_hold).

4. The rcu is unlocked and the entry is freed.

5. The freed entry is returned.

Prevent increasing of the reference count in such case. The name
in6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.

[   41.506330] refcount_t: addition on 0; use-after-free.
[   41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130
[   41.507413] Modules linked in: veth bridge stp llc
[   41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14
[   41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
[   41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130
[   41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 &lt;0f&gt; 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff
[   41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282
[   41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000
[   41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900
[   41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff
[   41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000
[   41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48
[   41.514086] FS:  00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000
[   41.514726] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0
[   41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   41.516799] Call Trace:
[   41.517037]  &lt;TASK&gt;
[   41.517249]  ? __warn+0x7b/0x120
[   41.517535]  ? refcount_warn_saturate+0xa5/0x130
[   41.517923]  ? report_bug+0x164/0x190
[   41.518240]  ? handle_bug+0x3d/0x70
[   41.518541]  ? exc_invalid_op+0x17/0x70
[   41.520972]  ? asm_exc_invalid_op+0x1a/0x20
[   41.521325]  ? refcount_warn_saturate+0xa5/0x130
[   41.521708]  ipv6_get_ifaddr+0xda/0xe0
[   41.522035]  inet6_rtm_getaddr+0x342/0x3f0
[   41.522376]  ? __pfx_inet6_rtm_getaddr+0x10/0x10
[   41.522758]  rtnetlink_rcv_msg+0x334/0x3d0
[   41.523102]  ? netlink_unicast+0x30f/0x390
[   41.523445]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[   41.523832]  netlink_rcv_skb+0x53/0x100
[   41.524157]  netlink_unicast+0x23b/0x390
[   41.524484]  netlink_sendmsg+0x1f2/0x440
[   41.524826]  __sys_sendto+0x1d8/0x1f0
[   41.525145]  __x64_sys_sendto+0x1f/0x30
[   41.525467]  do_syscall_64+0xa5/0x1b0
[   41.525794]  entry_SYSCALL_64_after_hwframe+0x72/0x7a
[   41.526213] RIP: 0033:0x7fbc4cfcea9a
[   41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
[   41.527942] RSP: 002b:00007f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224580">SUSE bug 1224580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35970" ref_url="https://www.suse.com/security/cve/CVE-2024-35970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Clear stale u-&gt;oob_skb.

syzkaller started to report deadlock of unix_gc_lock after commit
4090fa373f0e ("af_unix: Replace garbage collection algorithm."), but
it just uncovers the bug that has been there since commit 314001f0bf92
("af_unix: Add OOB support").

The repro basically does the following.

  from socket import *
  from array import array

  c1, c2 = socketpair(AF_UNIX, SOCK_STREAM)
  c1.sendmsg([b'a'], [(SOL_SOCKET, SCM_RIGHTS, array("i", [c2.fileno()]))], MSG_OOB)
  c2.recv(1)  # blocked as no normal data in recv queue

  c2.close()  # done async and unblock recv()
  c1.close()  # done async and trigger GC

A socket sends its file descriptor to itself as OOB data and tries to
receive normal data, but finally recv() fails due to async close().

The problem here is wrong handling of OOB skb in manage_oob().  When
recvmsg() is called without MSG_OOB, manage_oob() is called to check
if the peeked skb is OOB skb.  In such a case, manage_oob() pops it
out of the receive queue but does not clear unix_sock(sk)-&gt;oob_skb.
This is wrong in terms of uAPI.

Let's say we send "hello" with MSG_OOB, and "world" without MSG_OOB.
The 'o' is handled as OOB data.  When recv() is called twice without
MSG_OOB, the OOB data should be lost.

  &gt;&gt;&gt; from socket import *
  &gt;&gt;&gt; c1, c2 = socketpair(AF_UNIX, SOCK_STREAM, 0)
  &gt;&gt;&gt; c1.send(b'hello', MSG_OOB)  # 'o' is OOB data
  5
  &gt;&gt;&gt; c1.send(b'world')
  5
  &gt;&gt;&gt; c2.recv(5)  # OOB data is not received
  b'hell'
  &gt;&gt;&gt; c2.recv(5)  # OOB date is skipped
  b'world'
  &gt;&gt;&gt; c2.recv(5, MSG_OOB)  # This should return an error
  b'o'

In the same situation, TCP actually returns -EINVAL for the last
recv().

Also, if we do not clear unix_sk(sk)-&gt;oob_skb, unix_poll() always set
EPOLLPRI even though the data has passed through by previous recv().

To avoid these issues, we must clear unix_sk(sk)-&gt;oob_skb when dequeuing
it from recv queue.

The reason why the old GC did not trigger the deadlock is because the
old GC relied on the receive queue to detect the loop.

When it is triggered, the socket with OOB data is marked as GC candidate
because file refcount == inflight count (1).  However, after traversing
all inflight sockets, the socket still has a positive inflight count (1),
thus the socket is excluded from candidates.  Then, the old GC lose the
chance to garbage-collect the socket.

With the old GC, the repro continues to create true garbage that will
never be freed nor detected by kmemleak as it's linked to the global
inflight list.  That's why we couldn't even notice the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35970/">CVE-2024-35970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35970">CVE-2024-35970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224584">SUSE bug 1224584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ks8851: Handle softirqs at the end of IRQ thread to fix hang

The ks8851_irq() thread may call ks8851_rx_pkts() in case there are
any packets in the MAC FIFO, which calls netif_rx(). This netif_rx()
implementation is guarded by local_bh_disable() and local_bh_enable().
The local_bh_enable() may call do_softirq() to run softirqs in case
any are pending. One of the softirqs is net_rx_action, which ultimately
reaches the driver .start_xmit callback. If that happens, the system
hangs. The entire call chain is below:

ks8851_start_xmit_par from netdev_start_xmit
netdev_start_xmit from dev_hard_start_xmit
dev_hard_start_xmit from sch_direct_xmit
sch_direct_xmit from __dev_queue_xmit
__dev_queue_xmit from __neigh_update
__neigh_update from neigh_update
neigh_update from arp_process.constprop.0
arp_process.constprop.0 from __netif_receive_skb_one_core
__netif_receive_skb_one_core from process_backlog
process_backlog from __napi_poll.constprop.0
__napi_poll.constprop.0 from net_rx_action
net_rx_action from __do_softirq
__do_softirq from call_with_stack
call_with_stack from do_softirq
do_softirq from __local_bh_enable_ip
__local_bh_enable_ip from netif_rx
netif_rx from ks8851_irq
ks8851_irq from irq_thread_fn
irq_thread_fn from irq_thread
irq_thread from kthread
kthread from ret_from_fork

The hang happens because ks8851_irq() first locks a spinlock in
ks8851_par.c ks8851_lock_par() spin_lock_irqsave(&amp;ksp-&gt;lock, ...)
and with that spinlock locked, calls netif_rx(). Once the execution
reaches ks8851_start_xmit_par(), it calls ks8851_lock_par() again
which attempts to claim the already locked spinlock again, and the
hang happens.

Move the do_softirq() call outside of the spinlock protected section
of ks8851_irq() by disabling BHs around the entire spinlock protected
section of ks8851_irq() handler. Place local_bh_enable() outside of
the spinlock protected section, so that it can trigger do_softirq()
without the ks8851_par.c ks8851_lock_par() spinlock being held, and
safely call ks8851_start_xmit_par() without attempting to lock the
already locked spinlock.

Since ks8851_irq() is protected by local_bh_disable()/local_bh_enable()
now, replace netif_rx() with __netif_rx() which is not duplicating the
local_bh_disable()/local_bh_enable() calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224578">SUSE bug 1224578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35972" ref_url="https://www.suse.com/security/cve/CVE-2024-35972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init()

If ulp = kzalloc() fails, the allocated edev will leak because it is
not properly assigned and the cleanup path will not be able to free it.
Fix it by assigning it properly immediately after allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35972/">CVE-2024-35972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35972">CVE-2024-35972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224577">SUSE bug 1224577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

geneve: fix header validation in geneve[6]_xmit_skb

syzbot is able to trigger an uninit-value in geneve_xmit() [1]

Problem : While most ip tunnel helpers (like ip_tunnel_get_dsfield())
uses skb_protocol(skb, true), pskb_inet_may_pull() is only using
skb-&gt;protocol.

If anything else than ETH_P_IPV6 or ETH_P_IP is found in skb-&gt;protocol,
pskb_inet_may_pull() does nothing at all.

If a vlan tag was provided by the caller (af_packet in the syzbot case),
the network header might not point to the correct location, and skb
linear part could be smaller than expected.

Add skb_vlan_inet_prepare() to perform a complete mac validation.

Use this in geneve for the moment, I suspect we need to adopt this
more broadly.

v4 - Jakub reported v3 broke l2_tos_ttl_inherit.sh selftest
   - Only call __vlan_get_protocol() for vlan types.

v2,v3 - Addressed Sabrina comments on v1 and v2

[1]

BUG: KMSAN: uninit-value in geneve_xmit_skb drivers/net/geneve.c:910 [inline]
 BUG: KMSAN: uninit-value in geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030
  geneve_xmit_skb drivers/net/geneve.c:910 [inline]
  geneve_xmit+0x302d/0x5420 drivers/net/geneve.c:1030
  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
  netdev_start_xmit include/linux/netdevice.h:4917 [inline]
  xmit_one net/core/dev.c:3531 [inline]
  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
  __dev_queue_xmit+0x348d/0x52c0 net/core/dev.c:4335
  dev_queue_xmit include/linux/netdevice.h:3091 [inline]
  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3081 [inline]
  packet_sendmsg+0x8bb0/0x9ef0 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3804 [inline]
  slab_alloc_node mm/slub.c:3845 [inline]
  kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
  __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
  alloc_skb include/linux/skbuff.h:1318 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
  packet_alloc_skb net/packet/af_packet.c:2930 [inline]
  packet_snd net/packet/af_packet.c:3024 [inline]
  packet_sendmsg+0x722d/0x9ef0 net/packet/af_packet.c:3113
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2191
  __do_sys_sendto net/socket.c:2203 [inline]
  __se_sys_sendto net/socket.c:2199 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2199
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

CPU: 0 PID: 5033 Comm: syz-executor346 Not tainted 6.9.0-rc1-syzkaller-00005-g928a87efa423 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224586">SUSE bug 1224586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35974" ref_url="https://www.suse.com/security/cve/CVE-2024-35974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix q-&gt;blkg_list corruption during disk rebind

Multiple gendisk instances can allocated/added for single request queue
in case of disk rebind. blkg may still stay in q-&gt;blkg_list when calling
blkcg_init_disk() for rebind, then q-&gt;blkg_list becomes corrupted.

Fix the list corruption issue by:

- add blkg_init_queue() to initialize q-&gt;blkg_list &amp; q-&gt;blkcg_mutex only
- move calling blkg_init_queue() into blk_alloc_queue()

The list corruption should be started since commit f1c006f1c685 ("blk-cgroup:
synchronize pd_free_fn() from blkg_free_workfn() and blkcg_deactivate_policy()")
which delays removing blkg from q-&gt;blkg_list into blkg_free_workfn().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35974/">CVE-2024-35974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35974">CVE-2024-35974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224573">SUSE bug 1224573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35975" ref_url="https://www.suse.com/security/cve/CVE-2024-35975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix transmit scheduler resource leak

Inorder to support shaping and scheduling, Upon class creation
Netdev driver allocates trasmit schedulers.

The previous patch which added support for Round robin scheduling has
a bug due to which driver is not freeing transmit schedulers post
class deletion.

This patch fixes the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35975/">CVE-2024-35975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35975">CVE-2024-35975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224569">SUSE bug 1224569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING

syzbot reported an illegal copy in xsk_setsockopt() [1]

Make sure to validate setsockopt() @optlen parameter.

[1]

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420
Read of size 4 at addr ffff888028c6cde3 by task syz-executor.0/7549

CPU: 0 PID: 7549 Comm: syz-executor.0 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7fb40587de69
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fb40665a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69
RDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006
RBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020001980 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08
 &lt;/TASK&gt;

Allocated by task 7549:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3966 [inline]
  __kmalloc+0x233/0x4a0 mm/slub.c:3979
  kmalloc include/linux/slab.h:632 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

The buggy address belongs to the object at ffff888028c6cde0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 1 bytes to the right of
 allocated 2-byte region [ffff888028c6cde0, ffff888028c6cde2)

The buggy address belongs to the physical page:
page:ffffea0000a31b00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028c6c9c0 pfn:0x28c6c
anon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffffff()
raw: 00fff00000000800 ffff888014c41280 0000000000000000 dead000000000001
raw: ffff888028c6c9c0 0000000080800057 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223
  set_page_owner include/linux/page_owner.h:31 [inline]
  post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533
  prep_new_page mm/page_alloc.c:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224575">SUSE bug 1224575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35977" ref_url="https://www.suse.com/security/cve/CVE-2024-35977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/chrome: cros_ec_uart: properly fix race condition

The cros_ec_uart_probe() function calls devm_serdev_device_open() before
it calls serdev_device_set_client_ops(). This can trigger a NULL pointer
dereference:

    BUG: kernel NULL pointer dereference, address: 0000000000000000
    ...
    Call Trace:
     &lt;TASK&gt;
     ...
     ? ttyport_receive_buf

A simplified version of crashing code is as follows:

    static inline size_t serdev_controller_receive_buf(struct serdev_controller *ctrl,
                                                      const u8 *data,
                                                      size_t count)
    {
            struct serdev_device *serdev = ctrl-&gt;serdev;

            if (!serdev || !serdev-&gt;ops-&gt;receive_buf) // CRASH!
                return 0;

            return serdev-&gt;ops-&gt;receive_buf(serdev, data, count);
    }

It assumes that if SERPORT_ACTIVE is set and serdev exists, serdev-&gt;ops
will also exist. This conflicts with the existing cros_ec_uart_probe()
logic, as it first calls devm_serdev_device_open() (which sets
SERPORT_ACTIVE), and only later sets serdev-&gt;ops via
serdev_device_set_client_ops().

Commit 01f95d42b8f4 ("platform/chrome: cros_ec_uart: fix race
condition") attempted to fix a similar race condition, but while doing
so, made the window of error for this race condition to happen much
wider.

Attempt to fix the race condition again, making sure we fully setup
before calling devm_serdev_device_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35977/">CVE-2024-35977 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35977">CVE-2024-35977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224568">SUSE bug 1224568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix memory leak in hci_req_sync_complete()

In 'hci_req_sync_complete()', always free the previous sync
request state before assigning reference to a new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224571">SUSE bug 1224571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

raid1: fix use-after-free for original bio in raid1_write_request()

r1_bio-&gt;bios[] is used to record new bios that will be issued to
underlying disks, however, in raid1_write_request(), r1_bio-&gt;bios[]
will set to the original bio temporarily. Meanwhile, if blocked rdev
is set, free_r1bio() will be called causing that all r1_bio-&gt;bios[]
to be freed:

raid1_write_request()
 r1_bio = alloc_r1bio(mddev, bio); -&gt; r1_bio-&gt;bios[] is NULL
 for (i = 0;  i &lt; disks; i++) -&gt; for each rdev in conf
  // first rdev is normal
  r1_bio-&gt;bios[0] = bio; -&gt; set to original bio
  // second rdev is blocked
  if (test_bit(Blocked, &amp;rdev-&gt;flags))
   break

 if (blocked_rdev)
  free_r1bio()
   put_all_bios()
    bio_put(r1_bio-&gt;bios[0]) -&gt; original bio is freed

Test scripts:

mdadm -CR /dev/md0 -l1 -n4 /dev/sd[abcd] --assume-clean
fio -filename=/dev/md0 -ioengine=libaio -rw=write -bs=4k -numjobs=1 \
    -iodepth=128 -name=test -direct=1
echo blocked &gt; /sys/block/md0/md/rd2/state

Test result:

BUG bio-264 (Not tainted): Object already free
-----------------------------------------------------------------------------

Allocated in mempool_alloc_slab+0x24/0x50 age=1 cpu=1 pid=869
 kmem_cache_alloc+0x324/0x480
 mempool_alloc_slab+0x24/0x50
 mempool_alloc+0x6e/0x220
 bio_alloc_bioset+0x1af/0x4d0
 blkdev_direct_IO+0x164/0x8a0
 blkdev_write_iter+0x309/0x440
 aio_write+0x139/0x2f0
 io_submit_one+0x5ca/0xb70
 __do_sys_io_submit+0x86/0x270
 __x64_sys_io_submit+0x22/0x30
 do_syscall_64+0xb1/0x210
 entry_SYSCALL_64_after_hwframe+0x6c/0x74
Freed in mempool_free_slab+0x1f/0x30 age=1 cpu=1 pid=869
 kmem_cache_free+0x28c/0x550
 mempool_free_slab+0x1f/0x30
 mempool_free+0x40/0x100
 bio_free+0x59/0x80
 bio_put+0xf0/0x220
 free_r1bio+0x74/0xb0
 raid1_make_request+0xadf/0x1150
 md_handle_request+0xc7/0x3b0
 md_submit_bio+0x76/0x130
 __submit_bio+0xd8/0x1d0
 submit_bio_noacct_nocheck+0x1eb/0x5c0
 submit_bio_noacct+0x169/0xd40
 submit_bio+0xee/0x1d0
 blkdev_direct_IO+0x322/0x8a0
 blkdev_write_iter+0x309/0x440
 aio_write+0x139/0x2f0

Since that bios for underlying disks are not allocated yet, fix this
problem by using mempool_free() directly to free the r1_bio.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224572">SUSE bug 1224572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: tlb: Fix TLBI RANGE operand

KVM/arm64 relies on TLBI RANGE feature to flush TLBs when the dirty
pages are collected by VMM and the page table entries become write
protected during live migration. Unfortunately, the operand passed
to the TLBI RANGE instruction isn't correctly sorted out due to the
commit 117940aa6e5f ("KVM: arm64: Define kvm_tlb_flush_vmid_range()").
It leads to crash on the destination VM after live migration because
TLBs aren't flushed completely and some of the dirty pages are missed.

For example, I have a VM where 8GB memory is assigned, starting from
0x40000000 (1GB). Note that the host has 4KB as the base page size.
In the middile of migration, kvm_tlb_flush_vmid_range() is executed
to flush TLBs. It passes MAX_TLBI_RANGE_PAGES as the argument to
__kvm_tlb_flush_vmid_range() and __flush_s2_tlb_range_op(). SCALE#3
and NUM#31, corresponding to MAX_TLBI_RANGE_PAGES, isn't supported
by __TLBI_RANGE_NUM(). In this specific case, -1 has been returned
from __TLBI_RANGE_NUM() for SCALE#3/2/1/0 and rejected by the loop
in the __flush_tlb_range_op() until the variable @scale underflows
and becomes -9, 0xffff708000040000 is set as the operand. The operand
is wrong since it's sorted out by __TLBI_VADDR_RANGE() according to
invalid @scale and @num.

Fix it by extending __TLBI_RANGE_NUM() to support the combination of
SCALE#3 and NUM#31. With the changes, [-1 31] instead of [-1 30] can
be returned from the macro, meaning the TLBs for 0x200000 pages in the
above example can be flushed in one shoot with SCALE#3 and NUM#31. The
macro TLBI_RANGE_MASK is dropped since no one uses it any more. The
comments are also adjusted accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224574">SUSE bug 1224574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35981" ref_url="https://www.suse.com/security/cve/CVE-2024-35981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Do not send RSS key if it is not supported

There is a bug when setting the RSS options in virtio_net that can break
the whole machine, getting the kernel into an infinite loop.

Running the following command in any QEMU virtual machine with virtionet
will reproduce this problem:

    # ethtool -X eth0  hfunc toeplitz

This is how the problem happens:

1) ethtool_set_rxfh() calls virtnet_set_rxfh()

2) virtnet_set_rxfh() calls virtnet_commit_rss_command()

3) virtnet_commit_rss_command() populates 4 entries for the rss
scatter-gather

4) Since the command above does not have a key, then the last
scatter-gatter entry will be zeroed, since rss_key_size == 0.
sg_buf_size = vi-&gt;rss_key_size;

5) This buffer is passed to qemu, but qemu is not happy with a buffer
with zero length, and do the following in virtqueue_map_desc() (QEMU
function):

  if (!sz) {
      virtio_error(vdev, "virtio: zero sized buffers are not allowed");

6) virtio_error() (also QEMU function) set the device as broken

    vdev-&gt;broken = true;

7) Qemu bails out, and do not repond this crazy kernel.

8) The kernel is waiting for the response to come back (function
virtnet_send_command())

9) The kernel is waiting doing the following :

      while (!virtqueue_get_buf(vi-&gt;cvq, &amp;tmp) &amp;&amp;
	     !virtqueue_is_broken(vi-&gt;cvq))
	      cpu_relax();

10) None of the following functions above is true, thus, the kernel
loops here forever. Keeping in mind that virtqueue_is_broken() does
not look at the qemu `vdev-&gt;broken`, so, it never realizes that the
vitio is broken at QEMU side.

Fix it by not sending RSS commands if the feature is not available in
the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35981/">CVE-2024-35981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35981">CVE-2024-35981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224565">SUSE bug 1224565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

batman-adv: Avoid infinite loop trying to resize local TT

If the MTU of one of an attached interface becomes too small to transmit
the local translation table then it must be resized to fit inside all
fragments (when enabled) or a single packet.

But if the MTU becomes too low to transmit even the header + the VLAN
specific part then the resizing of the local TT will never succeed. This
can for example happen when the usable space is 110 bytes and 11 VLANs are
on top of batman-adv. In this case, at least 116 byte would be needed.
There will just be an endless spam of

   batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (110)

in the log but the function will never finish. Problem here is that the
timeout will be halved all the time and will then stagnate at 0 and
therefore never be able to reduce the table even more.

There are other scenarios possible with a similar result. The number of
BATADV_TT_CLIENT_NOPURGE entries in the local TT can for example be too
high to fit inside a packet. Such a scenario can therefore happen also with
only a single VLAN + 7 non-purgable addresses - requiring at least 120
bytes.

While this should be handled proactively when:

* interface with too low MTU is added
* VLAN is added
* non-purgeable local mac is added
* MTU of an attached interface is reduced
* fragmentation setting gets disabled (which most likely requires dropping
  attached interfaces)

not all of these scenarios can be prevented because batman-adv is only
consuming events without the the possibility to prevent these actions
(non-purgable MAC address added, MTU of an attached interface is reduced).
It is therefore necessary to also make sure that the code is able to handle
also the situations when there were already incompatible system
configuration are present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224566">SUSE bug 1224566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35983" ref_url="https://www.suse.com/security/cve/CVE-2024-35983" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bounds: Use the right number of bits for power-of-two CONFIG_NR_CPUS

bits_per() rounds up to the next power of two when passed a power of
two.  This causes crashes on some machines and configurations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35983/">CVE-2024-35983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35983">CVE-2024-35983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224564">SUSE bug 1224564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: smbus: fix NULL function pointer dereference

Baruch reported an OOPS when using the designware controller as target
only. Target-only modes break the assumption of one transfer function
always being available. Fix this by always checking the pointer in
__i2c_transfer.

[wsa: dropped the simplification in core-smbus to avoid theoretical regressions]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224567">SUSE bug 1224567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35985" ref_url="https://www.suse.com/security/cve/CVE-2024-35985" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/eevdf: Prevent vlag from going out of bounds in reweight_eevdf()

It was possible to have pick_eevdf() return NULL, which then causes a
NULL-deref. This turned out to be due to entity_eligible() returning
falsely negative because of a s64 multiplcation overflow.

Specifically, reweight_eevdf() computes the vlag without considering
the limit placed upon vlag as update_entity_lag() does, and then the
scaling multiplication (remember that weight is 20bit fixed point) can
overflow. This then leads to the new vruntime being weird which then
causes the above entity_eligible() to go side-ways and claim nothing
is eligible.

Thus limit the range of vlag accordingly.

All this was quite rare, but fatal when it does happen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35985/">CVE-2024-35985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35985">CVE-2024-35985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224561">SUSE bug 1224561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35986" ref_url="https://www.suse.com/security/cve/CVE-2024-35986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: ti: tusb1210: Resolve charger-det crash if charger psy is unregistered

The power_supply frame-work is not really designed for there to be
long living in kernel references to power_supply devices.

Specifically unregistering a power_supply while some other code has
a reference to it triggers a WARN in power_supply_unregister():

	WARN_ON(atomic_dec_return(&amp;psy-&gt;use_cnt));

Folllowed by the power_supply still getting removed and the
backing data freed anyway, leaving the tusb1210 charger-detect code
with a dangling reference, resulting in a crash the next time
tusb1210_get_online() is called.

Fix this by only holding the reference in tusb1210_get_online()
freeing it at the end of the function. Note this still leaves
a theoretical race window, but it avoids the issue when manually
rmmod-ing the charger chip driver during development.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35986/">CVE-2024-35986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35986">CVE-2024-35986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224562">SUSE bug 1224562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix oops during rmmod on single-CPU platforms

During the removal of the idxd driver, registered offline callback is
invoked as part of the clean up process. However, on systems with only
one CPU online, no valid target is available to migrate the
perf context, resulting in a kernel oops:

    BUG: unable to handle page fault for address: 000000000002a2b8
    #PF: supervisor write access in kernel mode
    #PF: error_code(0x0002) - not-present page
    PGD 1470e1067 P4D 0
    Oops: 0002 [#1] PREEMPT SMP NOPTI
    CPU: 0 PID: 20 Comm: cpuhp/0 Not tainted 6.8.0-rc6-dsa+ #57
    Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023
    RIP: 0010:mutex_lock+0x2e/0x50
    ...
    Call Trace:
    &lt;TASK&gt;
    __die+0x24/0x70
    page_fault_oops+0x82/0x160
    do_user_addr_fault+0x65/0x6b0
    __pfx___rdmsr_safe_on_cpu+0x10/0x10
    exc_page_fault+0x7d/0x170
    asm_exc_page_fault+0x26/0x30
    mutex_lock+0x2e/0x50
    mutex_lock+0x1e/0x50
    perf_pmu_migrate_context+0x87/0x1f0
    perf_event_cpu_offline+0x76/0x90 [idxd]
    cpuhp_invoke_callback+0xa2/0x4f0
    __pfx_perf_event_cpu_offline+0x10/0x10 [idxd]
    cpuhp_thread_fun+0x98/0x150
    smpboot_thread_fn+0x27/0x260
    smpboot_thread_fn+0x1af/0x260
    __pfx_smpboot_thread_fn+0x10/0x10
    kthread+0x103/0x140
    __pfx_kthread+0x10/0x10
    ret_from_fork+0x31/0x50
    __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1b/0x30
    &lt;TASK&gt;

Fix the issue by preventing the migration of the perf context to an
invalid target.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224558">SUSE bug 1224558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma: xilinx_dpdma: Fix locking

There are several places where either chan-&gt;lock or chan-&gt;vchan.lock was
not held. Add appropriate locking. This fixes lockdep warnings like

[   31.077578] ------------[ cut here ]------------
[   31.077831] WARNING: CPU: 2 PID: 40 at drivers/dma/xilinx/xilinx_dpdma.c:834 xilinx_dpdma_chan_queue_transfer+0x274/0x5e0
[   31.077953] Modules linked in:
[   31.078019] CPU: 2 PID: 40 Comm: kworker/u12:1 Not tainted 6.6.20+ #98
[   31.078102] Hardware name: xlnx,zynqmp (DT)
[   31.078169] Workqueue: events_unbound deferred_probe_work_func
[   31.078272] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   31.078377] pc : xilinx_dpdma_chan_queue_transfer+0x274/0x5e0
[   31.078473] lr : xilinx_dpdma_chan_queue_transfer+0x270/0x5e0
[   31.078550] sp : ffffffc083bb2e10
[   31.078590] x29: ffffffc083bb2e10 x28: 0000000000000000 x27: ffffff880165a168
[   31.078754] x26: ffffff880164e920 x25: ffffff880164eab8 x24: ffffff880164d480
[   31.078920] x23: ffffff880165a148 x22: ffffff880164e988 x21: 0000000000000000
[   31.079132] x20: ffffffc082aa3000 x19: ffffff880164e880 x18: 0000000000000000
[   31.079295] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   31.079453] x14: 0000000000000000 x13: ffffff8802263dc0 x12: 0000000000000001
[   31.079613] x11: 0001ffc083bb2e34 x10: 0001ff880164e98f x9 : 0001ffc082aa3def
[   31.079824] x8 : 0001ffc082aa3dec x7 : 0000000000000000 x6 : 0000000000000516
[   31.079982] x5 : ffffffc7f8d43000 x4 : ffffff88003c9c40 x3 : ffffffffffffffff
[   31.080147] x2 : ffffffc7f8d43000 x1 : 00000000000000c0 x0 : 0000000000000000
[   31.080307] Call trace:
[   31.080340]  xilinx_dpdma_chan_queue_transfer+0x274/0x5e0
[   31.080518]  xilinx_dpdma_issue_pending+0x11c/0x120
[   31.080595]  zynqmp_disp_layer_update+0x180/0x3ac
[   31.080712]  zynqmp_dpsub_plane_atomic_update+0x11c/0x21c
[   31.080825]  drm_atomic_helper_commit_planes+0x20c/0x684
[   31.080951]  drm_atomic_helper_commit_tail+0x5c/0xb0
[   31.081139]  commit_tail+0x234/0x294
[   31.081246]  drm_atomic_helper_commit+0x1f8/0x210
[   31.081363]  drm_atomic_commit+0x100/0x140
[   31.081477]  drm_client_modeset_commit_atomic+0x318/0x384
[   31.081634]  drm_client_modeset_commit_locked+0x8c/0x24c
[   31.081725]  drm_client_modeset_commit+0x34/0x5c
[   31.081812]  __drm_fb_helper_restore_fbdev_mode_unlocked+0x104/0x168
[   31.081899]  drm_fb_helper_set_par+0x50/0x70
[   31.081971]  fbcon_init+0x538/0xc48
[   31.082047]  visual_init+0x16c/0x23c
[   31.082207]  do_bind_con_driver.isra.0+0x2d0/0x634
[   31.082320]  do_take_over_console+0x24c/0x33c
[   31.082429]  do_fbcon_takeover+0xbc/0x1b0
[   31.082503]  fbcon_fb_registered+0x2d0/0x34c
[   31.082663]  register_framebuffer+0x27c/0x38c
[   31.082767]  __drm_fb_helper_initial_config_and_unlock+0x5c0/0x91c
[   31.082939]  drm_fb_helper_initial_config+0x50/0x74
[   31.083012]  drm_fbdev_dma_client_hotplug+0xb8/0x108
[   31.083115]  drm_client_register+0xa0/0xf4
[   31.083195]  drm_fbdev_dma_setup+0xb0/0x1cc
[   31.083293]  zynqmp_dpsub_drm_init+0x45c/0x4e0
[   31.083431]  zynqmp_dpsub_probe+0x444/0x5e0
[   31.083616]  platform_probe+0x8c/0x13c
[   31.083713]  really_probe+0x258/0x59c
[   31.083793]  __driver_probe_device+0xc4/0x224
[   31.083878]  driver_probe_device+0x70/0x1c0
[   31.083961]  __device_attach_driver+0x108/0x1e0
[   31.084052]  bus_for_each_drv+0x9c/0x100
[   31.084125]  __device_attach+0x100/0x298
[   31.084207]  device_initial_probe+0x14/0x20
[   31.084292]  bus_probe_device+0xd8/0xdc
[   31.084368]  deferred_probe_work_func+0x11c/0x180
[   31.084451]  process_one_work+0x3ac/0x988
[   31.084643]  worker_thread+0x398/0x694
[   31.084752]  kthread+0x1bc/0x1c0
[   31.084848]  ret_from_fork+0x10/0x20
[   31.084932] irq event stamp: 64549
[   31.084970] hardirqs last  enabled at (64548): [&lt;ffffffc081adf35c&gt;] _raw_spin_unlock_irqrestore+0x80/0x90
[   31.085157]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224559">SUSE bug 1224559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35991" ref_url="https://www.suse.com/security/cve/CVE-2024-35991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Convert spinlock to mutex to lock evl workqueue

drain_workqueue() cannot be called safely in a spinlocked context due to
possible task rescheduling. In the multi-task scenario, calling
queue_work() while drain_workqueue() will lead to a Call Trace as
pushing a work on a draining workqueue is not permitted in spinlocked
context.
    Call Trace:
    &lt;TASK&gt;
    ? __warn+0x7d/0x140
    ? __queue_work+0x2b2/0x440
    ? report_bug+0x1f8/0x200
    ? handle_bug+0x3c/0x70
    ? exc_invalid_op+0x18/0x70
    ? asm_exc_invalid_op+0x1a/0x20
    ? __queue_work+0x2b2/0x440
    queue_work_on+0x28/0x30
    idxd_misc_thread+0x303/0x5a0 [idxd]
    ? __schedule+0x369/0xb40
    ? __pfx_irq_thread_fn+0x10/0x10
    ? irq_thread+0xbc/0x1b0
    irq_thread_fn+0x21/0x70
    irq_thread+0x102/0x1b0
    ? preempt_count_add+0x74/0xa0
    ? __pfx_irq_thread_dtor+0x10/0x10
    ? __pfx_irq_thread+0x10/0x10
    kthread+0x103/0x140
    ? __pfx_kthread+0x10/0x10
    ret_from_fork+0x31/0x50
    ? __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1b/0x30
    &lt;/TASK&gt;

The current implementation uses a spinlock to protect event log workqueue
and will lead to the Call Trace due to potential task rescheduling.

To address the locking issue, convert the spinlock to mutex, allowing
the drain_workqueue() to be called in a safe mutex-locked context.

This change ensures proper synchronization when accessing the event log
workqueue, preventing potential Call Trace and improving the overall
robustness of the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35991/">CVE-2024-35991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35991">CVE-2024-35991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224553">SUSE bug 1224553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35992" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35992" ref_url="https://www.suse.com/security/cve/CVE-2024-35992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: marvell: a3700-comphy: Fix out of bounds read

There is an out of bounds read access of 'gbe_phy_init_fix[fix_idx].addr'
every iteration after 'fix_idx' reaches 'ARRAY_SIZE(gbe_phy_init_fix)'.

Make sure 'gbe_phy_init[addr]' is used when all elements of
'gbe_phy_init_fix' array are handled.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35992/">CVE-2024-35992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35992">CVE-2024-35992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224555">SUSE bug 1224555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35993" ref_url="https://www.suse.com/security/cve/CVE-2024-35993" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: turn folio_test_hugetlb into a PageType

The current folio_test_hugetlb() can be fooled by a concurrent folio split
into returning true for a folio which has never belonged to hugetlbfs. 
This can't happen if the caller holds a refcount on it, but we have a few
places (memory-failure, compaction, procfs) which do not and should not
take a speculative reference.

Since hugetlb pages do not use individual page mapcounts (they are always
fully mapped and use the entire_mapcount field to record the number of
mappings), the PageType field is available now that page_mapcount()
ignores the value in this field.

In compaction and with CONFIG_DEBUG_VM enabled, the current implementation
can result in an oops, as reported by Luis. This happens since 9c5ccf2db04b
("mm: remove HUGETLB_PAGE_DTOR") effectively added some VM_BUG_ON() checks
in the PageHuge() testing path.

[willy@infradead.org: update vmcoreinfo]
  Link: https://lkml.kernel.org/r/ZgGZUvsdhaT1Va-T@casper.infradead.org
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35993/">CVE-2024-35993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35993">CVE-2024-35993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224560">SUSE bug 1224560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35994" ref_url="https://www.suse.com/security/cve/CVE-2024-35994" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: uefisecapp: Fix memory related IO errors and crashes

It turns out that while the QSEECOM APP_SEND command has specific fields
for request and response buffers, uefisecapp expects them both to be in
a single memory region. Failure to adhere to this has (so far) resulted
in either no response being written to the response buffer (causing an
EIO to be emitted down the line), the SCM call to fail with EINVAL
(i.e., directly from TZ/firmware), or the device to be hard-reset.

While this issue can be triggered deterministically, in the current form
it seems to happen rather sporadically (which is why it has gone
unnoticed during earlier testing). This is likely due to the two
kzalloc() calls (for request and response) being directly after each
other. Which means that those likely return consecutive regions most of
the time, especially when not much else is going on in the system.

Fix this by allocating a single memory region for both request and
response buffers, properly aligning both structs inside it. This
unfortunately also means that the qcom_scm_qseecom_app_send() interface
needs to be restructured, as it should no longer map the DMA regions
separately. Therefore, move the responsibility of DMA allocation (or
mapping) to the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35994/">CVE-2024-35994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35994">CVE-2024-35994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224556">SUSE bug 1224556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Use access_width over bit_width for system memory accesses

To align with ACPI 6.3+, since bit_width can be any 8-bit value, it
cannot be depended on to be always on a clean 8b boundary. This was
uncovered on the Cobalt 100 platform.

SError Interrupt on CPU26, code 0xbe000011 -- SError
 CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted 5.15.2.1-13 #1
 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
 pstate: 62400009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
 pc : cppc_get_perf_caps+0xec/0x410
 lr : cppc_get_perf_caps+0xe8/0x410
 sp : ffff8000155ab730
 x29: ffff8000155ab730 x28: ffff0080139d0038 x27: ffff0080139d0078
 x26: 0000000000000000 x25: ffff0080139d0058 x24: 00000000ffffffff
 x23: ffff0080139d0298 x22: ffff0080139d0278 x21: 0000000000000000
 x20: ffff00802b251910 x19: ffff0080139d0000 x18: ffffffffffffffff
 x17: 0000000000000000 x16: ffffdc7e111bad04 x15: ffff00802b251008
 x14: ffffffffffffffff x13: ffff013f1fd63300 x12: 0000000000000006
 x11: ffffdc7e128f4420 x10: 0000000000000000 x9 : ffffdc7e111badec
 x8 : ffff00802b251980 x7 : 0000000000000000 x6 : ffff0080139d0028
 x5 : 0000000000000000 x4 : ffff0080139d0018 x3 : 00000000ffffffff
 x2 : 0000000000000008 x1 : ffff8000155ab7a0 x0 : 0000000000000000
 Kernel panic - not syncing: Asynchronous SError Interrupt
 CPU: 26 PID: 1510 Comm: systemd-udevd Not tainted
5.15.2.1-13 #1
 Hardware name: MICROSOFT CORPORATION, BIOS MICROSOFT CORPORATION
 Call trace:
  dump_backtrace+0x0/0x1e0
  show_stack+0x24/0x30
  dump_stack_lvl+0x8c/0xb8
  dump_stack+0x18/0x34
  panic+0x16c/0x384
  add_taint+0x0/0xc0
  arm64_serror_panic+0x7c/0x90
  arm64_is_fatal_ras_serror+0x34/0xa4
  do_serror+0x50/0x6c
  el1h_64_error_handler+0x40/0x74
  el1h_64_error+0x7c/0x80
  cppc_get_perf_caps+0xec/0x410
  cppc_cpufreq_cpu_init+0x74/0x400 [cppc_cpufreq]
  cpufreq_online+0x2dc/0xa30
  cpufreq_add_dev+0xc0/0xd4
  subsys_interface_register+0x134/0x14c
  cpufreq_register_driver+0x1b0/0x354
  cppc_cpufreq_init+0x1a8/0x1000 [cppc_cpufreq]
  do_one_initcall+0x50/0x250
  do_init_module+0x60/0x27c
  load_module+0x2300/0x2570
  __do_sys_finit_module+0xa8/0x114
  __arm64_sys_finit_module+0x2c/0x3c
  invoke_syscall+0x78/0x100
  el0_svc_common.constprop.0+0x180/0x1a0
  do_el0_svc+0x84/0xa0
  el0_svc+0x2c/0xc0
  el0t_64_sync_handler+0xa4/0x12c
  el0t_64_sync+0x1a4/0x1a8

Instead, use access_width to determine the size and use the offset and
width to shift and mask the bits to read/write out. Make sure to add a
check for system memory since pcc redefines the access_width to
subspace id.

If access_width is not set, then fall back to using bit_width.

[ rjw: Subject and changelog edits, comment adjustments ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224557">SUSE bug 1224557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35996" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35996" ref_url="https://www.suse.com/security/cve/CVE-2024-35996" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpu: Re-enable CPU mitigations by default for !X86 architectures

Rename x86's to CPU_MITIGATIONS, define it in generic code, and force it
on for all architectures exception x86.  A recent commit to turn
mitigations off by default if SPECULATION_MITIGATIONS=n kinda sorta
missed that "cpu_mitigations" is completely generic, whereas
SPECULATION_MITIGATIONS is x86-specific.

Rename x86's SPECULATIVE_MITIGATIONS instead of keeping both and have it
select CPU_MITIGATIONS, as having two configs for the same thing is
unnecessary and confusing.  This will also allow x86 to use the knob to
manage mitigations that aren't strictly related to speculative
execution.

Use another Kconfig to communicate to common code that CPU_MITIGATIONS
is already defined instead of having x86's menu depend on the common
CPU_MITIGATIONS.  This allows keeping a single point of contact for all
of x86's mitigations, and it's not clear that other architectures *want*
to allow disabling mitigations at compile-time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35996/">CVE-2024-35996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35996">CVE-2024-35996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224551">SUSE bug 1224551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up

The flag I2C_HID_READ_PENDING is used to serialize I2C operations.
However, this is not necessary, because I2C core already has its own
locking for that.

More importantly, this flag can cause a lock-up: if the flag is set in
i2c_hid_xfer() and an interrupt happens, the interrupt handler
(i2c_hid_irq) will check this flag and return immediately without doing
anything, then the interrupt handler will be invoked again in an
infinite loop.

Since interrupt handler is an RT task, it takes over the CPU and the
flag-clearing task never gets scheduled, thus we have a lock-up.

Delete this unnecessary flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224552">SUSE bug 1224552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix lock ordering potential deadlock in cifs_sync_mid_result

Coverity spotted that the cifs_sync_mid_result function could deadlock

"Thread deadlock (ORDER_REVERSAL) lock_order: Calling spin_lock acquires
lock TCP_Server_Info.srv_lock while holding lock TCP_Server_Info.mid_lock"

Addresses-Coverity: 1590401 ("Thread deadlock (ORDER_REVERSAL)")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224549">SUSE bug 1224549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: missing lock when picking channel

Coverity spotted a place where we should have been holding the
channel lock when accessing the ses channel index.

Addresses-Coverity: 1582039 ("Data race condition (MISSING_LOCK)")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224550">SUSE bug 1224550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix missing hugetlb_lock for resv uncharge

There is a recent report on UFFDIO_COPY over hugetlb:

https://lore.kernel.org/all/000000000000ee06de0616177560@google.com/

350:	lockdep_assert_held(&amp;hugetlb_lock);

Should be an issue in hugetlb but triggered in an userfault context, where
it goes into the unlikely path where two threads modifying the resv map
together.  Mike has a fix in that path for resv uncharge but it looks like
the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()
will update the cgroup pointer, so it requires to be called with the lock
held.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224548">SUSE bug 1224548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36001" ref_url="https://www.suse.com/security/cve/CVE-2024-36001" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix the pre-flush when appending to a file in writethrough mode

In netfs_perform_write(), when the file is marked NETFS_ICTX_WRITETHROUGH
or O_*SYNC or RWF_*SYNC was specified, write-through caching is performed
on a buffered file.  When setting up for write-through, we flush any
conflicting writes in the region and wait for the write to complete,
failing if there's a write error to return.

The issue arises if we're writing at or above the EOF position because we
skip the flush and - more importantly - the wait.  This becomes a problem
if there's a partial folio at the end of the file that is being written out
and we want to make a write to it too.  Both the already-running write and
the write we start both want to clear the writeback mark, but whoever is
second causes a warning looking something like:

    ------------[ cut here ]------------
    R=00000012: folio 11 is not under writeback
    WARNING: CPU: 34 PID: 654 at fs/netfs/write_collect.c:105
    ...
    CPU: 34 PID: 654 Comm: kworker/u386:27 Tainted: G S ...
    ...
    Workqueue: events_unbound netfs_write_collection_worker
    ...
    RIP: 0010:netfs_writeback_lookup_folio

Fix this by making the flush-and-wait unconditional.  It will do nothing if
there are no folios in the pagecache and will return quickly if there are
no folios in the region specified.

Further, move the WBC attachment above the flush call as the flush is going
to attach a WBC and detach it again if it is not present - and since we
need one anyway we might as well share it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-05-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36001/">CVE-2024-36001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36001">CVE-2024-36001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224547">SUSE bug 1224547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36002" ref_url="https://www.suse.com/security/cve/CVE-2024-36002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpll: fix dpll_pin_on_pin_register() for multiple parent pins

In scenario where pin is registered with multiple parent pins via
dpll_pin_on_pin_register(..), all belonging to the same dpll device.
A second call to dpll_pin_on_pin_unregister(..) would cause a call trace,
as it tries to use already released registration resources (due to fix
introduced in b446631f355e). In this scenario pin was registered twice,
so resources are not yet expected to be release until each registered
pin/pin pair is unregistered.

Currently, the following crash/call trace is produced when ice driver is
removed on the system with installed E810T NIC which includes dpll device:

WARNING: CPU: 51 PID: 9155 at drivers/dpll/dpll_core.c:809 dpll_pin_ops+0x20/0x30
RIP: 0010:dpll_pin_ops+0x20/0x30
Call Trace:
 ? __warn+0x7f/0x130
 ? dpll_pin_ops+0x20/0x30
 dpll_msg_add_pin_freq+0x37/0x1d0
 dpll_cmd_pin_get_one+0x1c0/0x400
 ? __nlmsg_put+0x63/0x80
 dpll_pin_event_send+0x93/0x140
 dpll_pin_on_pin_unregister+0x3f/0x100
 ice_dpll_deinit_pins+0xa1/0x230 [ice]
 ice_remove+0xf1/0x210 [ice]

Fix by adding a parent pointer as a cookie when creating a registration,
also when searching for it. For the regular pins pass NULL, this allows to
create separated registration for each parent the pin is registered with.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36002/">CVE-2024-36002 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36002">CVE-2024-36002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224546">SUSE bug 1224546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36003" ref_url="https://www.suse.com/security/cve/CVE-2024-36003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix LAG and VF lock dependency in ice_reset_vf()

9f74a3dfcf83 ("ice: Fix VF Reset paths when interface in a failed over
aggregate"), the ice driver has acquired the LAG mutex in ice_reset_vf().
The commit placed this lock acquisition just prior to the acquisition of
the VF configuration lock.

If ice_reset_vf() acquires the configuration lock via the ICE_VF_RESET_LOCK
flag, this could deadlock with ice_vc_cfg_qs_msg() because it always
acquires the locks in the order of the VF configuration lock and then the
LAG mutex.

Lockdep reports this violation almost immediately on creating and then
removing 2 VF:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-rc6 #54 Tainted: G        W  O
------------------------------------------------------
kworker/60:3/6771 is trying to acquire lock:
ff40d43e099380a0 (&amp;vf-&gt;cfg_lock){+.+.}-{3:3}, at: ice_reset_vf+0x22f/0x4d0 [ice]

but task is already holding lock:
ff40d43ea1961210 (&amp;pf-&gt;lag_mutex){+.+.}-{3:3}, at: ice_reset_vf+0xb7/0x4d0 [ice]

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (&amp;pf-&gt;lag_mutex){+.+.}-{3:3}:
       __lock_acquire+0x4f8/0xb40
       lock_acquire+0xd4/0x2d0
       __mutex_lock+0x9b/0xbf0
       ice_vc_cfg_qs_msg+0x45/0x690 [ice]
       ice_vc_process_vf_msg+0x4f5/0x870 [ice]
       __ice_clean_ctrlq+0x2b5/0x600 [ice]
       ice_service_task+0x2c9/0x480 [ice]
       process_one_work+0x1e9/0x4d0
       worker_thread+0x1e1/0x3d0
       kthread+0x104/0x140
       ret_from_fork+0x31/0x50
       ret_from_fork_asm+0x1b/0x30

-&gt; #0 (&amp;vf-&gt;cfg_lock){+.+.}-{3:3}:
       check_prev_add+0xe2/0xc50
       validate_chain+0x558/0x800
       __lock_acquire+0x4f8/0xb40
       lock_acquire+0xd4/0x2d0
       __mutex_lock+0x9b/0xbf0
       ice_reset_vf+0x22f/0x4d0 [ice]
       ice_process_vflr_event+0x98/0xd0 [ice]
       ice_service_task+0x1cc/0x480 [ice]
       process_one_work+0x1e9/0x4d0
       worker_thread+0x1e1/0x3d0
       kthread+0x104/0x140
       ret_from_fork+0x31/0x50
       ret_from_fork_asm+0x1b/0x30

other info that might help us debug this:
 Possible unsafe locking scenario:
       CPU0                    CPU1
       ----                    ----
  lock(&amp;pf-&gt;lag_mutex);
                               lock(&amp;vf-&gt;cfg_lock);
                               lock(&amp;pf-&gt;lag_mutex);
  lock(&amp;vf-&gt;cfg_lock);

 *** DEADLOCK ***
4 locks held by kworker/60:3/6771:
 #0: ff40d43e05428b38 ((wq_completion)ice){+.+.}-{0:0}, at: process_one_work+0x176/0x4d0
 #1: ff50d06e05197e58 ((work_completion)(&amp;pf-&gt;serv_task)){+.+.}-{0:0}, at: process_one_work+0x176/0x4d0
 #2: ff40d43ea1960e50 (&amp;pf-&gt;vfs.table_lock){+.+.}-{3:3}, at: ice_process_vflr_event+0x48/0xd0 [ice]
 #3: ff40d43ea1961210 (&amp;pf-&gt;lag_mutex){+.+.}-{3:3}, at: ice_reset_vf+0xb7/0x4d0 [ice]

stack backtrace:
CPU: 60 PID: 6771 Comm: kworker/60:3 Tainted: G        W  O       6.8.0-rc6 #54
Hardware name:
Workqueue: ice ice_service_task [ice]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x4a/0x80
 check_noncircular+0x12d/0x150
 check_prev_add+0xe2/0xc50
 ? save_trace+0x59/0x230
 ? add_chain_cache+0x109/0x450
 validate_chain+0x558/0x800
 __lock_acquire+0x4f8/0xb40
 ? lockdep_hardirqs_on+0x7d/0x100
 lock_acquire+0xd4/0x2d0
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ? lock_is_held_type+0xc7/0x120
 __mutex_lock+0x9b/0xbf0
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ? rcu_is_watching+0x11/0x50
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ice_reset_vf+0x22f/0x4d0 [ice]
 ? process_one_work+0x176/0x4d0
 ice_process_vflr_event+0x98/0xd0 [ice]
 ice_service_task+0x1cc/0x480 [ice]
 process_one_work+0x1e9/0x4d0
 worker_thread+0x1e1/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x104/0x140
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x31/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

To avoid deadlock, we must acquire the LAG 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36003/">CVE-2024-36003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36003">CVE-2024-36003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224544">SUSE bug 1224544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not use WQ_MEM_RECLAIM flag for workqueue

Issue reported by customer during SRIOV testing, call trace:
When both i40e and the i40iw driver are loaded, a warning
in check_flush_dependency is being triggered. This seems
to be because of the i40e driver workqueue is allocated with
the WQ_MEM_RECLAIM flag, and the i40iw one is not.

Similar error was encountered on ice too and it was fixed by
removing the flag. Do the same for i40e too.

[Feb 9 09:08] ------------[ cut here ]------------
[  +0.000004] workqueue: WQ_MEM_RECLAIM i40e:i40e_service_task [i40e] is
flushing !WQ_MEM_RECLAIM infiniband:0x0
[  +0.000060] WARNING: CPU: 0 PID: 937 at kernel/workqueue.c:2966
check_flush_dependency+0x10b/0x120
[  +0.000007] Modules linked in: snd_seq_dummy snd_hrtimer snd_seq
snd_timer snd_seq_device snd soundcore nls_utf8 cifs cifs_arc4
nls_ucs2_utils rdma_cm iw_cm ib_cm cifs_md4 dns_resolver netfs qrtr
rfkill sunrpc vfat fat intel_rapl_msr intel_rapl_common irdma
intel_uncore_frequency intel_uncore_frequency_common ice ipmi_ssif
isst_if_common skx_edac nfit libnvdimm x86_pkg_temp_thermal
intel_powerclamp gnss coretemp ib_uverbs rapl intel_cstate ib_core
iTCO_wdt iTCO_vendor_support acpi_ipmi mei_me ipmi_si intel_uncore
ioatdma i2c_i801 joydev pcspkr mei ipmi_devintf lpc_ich
intel_pch_thermal i2c_smbus ipmi_msghandler acpi_power_meter acpi_pad
xfs libcrc32c ast sd_mod drm_shmem_helper t10_pi drm_kms_helper sg ixgbe
drm i40e ahci crct10dif_pclmul libahci crc32_pclmul igb crc32c_intel
libata ghash_clmulni_intel i2c_algo_bit mdio dca wmi dm_mirror
dm_region_hash dm_log dm_mod fuse
[  +0.000050] CPU: 0 PID: 937 Comm: kworker/0:3 Kdump: loaded Not
tainted 6.8.0-rc2-Feb-net_dev-Qiueue-00279-gbd43c5687e05 #1
[  +0.000003] Hardware name: Intel Corporation S2600BPB/S2600BPB, BIOS
SE5C620.86B.02.01.0013.121520200651 12/15/2020
[  +0.000001] Workqueue: i40e i40e_service_task [i40e]
[  +0.000024] RIP: 0010:check_flush_dependency+0x10b/0x120
[  +0.000003] Code: ff 49 8b 54 24 18 48 8d 8b b0 00 00 00 49 89 e8 48
81 c6 b0 00 00 00 48 c7 c7 b0 97 fa 9f c6 05 8a cc 1f 02 01 e8 35 b3 fd
ff &lt;0f&gt; 0b e9 10 ff ff ff 80 3d 78 cc 1f 02 00 75 94 e9 46 ff ff ff 90
[  +0.000002] RSP: 0018:ffffbd294976bcf8 EFLAGS: 00010282
[  +0.000002] RAX: 0000000000000000 RBX: ffff94d4c483c000 RCX:
0000000000000027
[  +0.000001] RDX: ffff94d47f620bc8 RSI: 0000000000000001 RDI:
ffff94d47f620bc0
[  +0.000001] RBP: 0000000000000000 R08: 0000000000000000 R09:
00000000ffff7fff
[  +0.000001] R10: ffffbd294976bb98 R11: ffffffffa0be65e8 R12:
ffff94c5451ea180
[  +0.000001] R13: ffff94c5ab5e8000 R14: ffff94c5c20b6e05 R15:
ffff94c5f1330ab0
[  +0.000001] FS:  0000000000000000(0000) GS:ffff94d47f600000(0000)
knlGS:0000000000000000
[  +0.000002] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  +0.000001] CR2: 00007f9e6f1fca70 CR3: 0000000038e20004 CR4:
00000000007706f0
[  +0.000000] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  +0.000001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[  +0.000001] PKRU: 55555554
[  +0.000001] Call Trace:
[  +0.000001]  &lt;TASK&gt;
[  +0.000002]  ? __warn+0x80/0x130
[  +0.000003]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  ? report_bug+0x195/0x1a0
[  +0.000005]  ? handle_bug+0x3c/0x70
[  +0.000003]  ? exc_invalid_op+0x14/0x70
[  +0.000002]  ? asm_exc_invalid_op+0x16/0x20
[  +0.000006]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  ? check_flush_dependency+0x10b/0x120
[  +0.000002]  __flush_workqueue+0x126/0x3f0
[  +0.000015]  ib_cache_cleanup_one+0x1c/0xe0 [ib_core]
[  +0.000056]  __ib_unregister_device+0x6a/0xb0 [ib_core]
[  +0.000023]  ib_unregister_device_and_put+0x34/0x50 [ib_core]
[  +0.000020]  i40iw_close+0x4b/0x90 [irdma]
[  +0.000022]  i40e_notify_client_of_netdev_close+0x54/0xc0 [i40e]
[  +0.000035]  i40e_service_task+0x126/0x190 [i40e]
[  +0.000024]  process_one_work+0x174/0x340
[  +0.000003]  worker_th
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224545">SUSE bug 1224545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: honor table dormant flag from netdev release event path

Check for table dormant flag otherwise netdev release event path tries
to unregister an already unregistered hook.

[524854.857999] ------------[ cut here ]------------
[524854.858010] WARNING: CPU: 0 PID: 3386599 at net/netfilter/core.c:501 __nf_unregister_net_hook+0x21a/0x260
[...]
[524854.858848] CPU: 0 PID: 3386599 Comm: kworker/u32:2 Not tainted 6.9.0-rc3+ #365
[524854.858869] Workqueue: netns cleanup_net
[524854.858886] RIP: 0010:__nf_unregister_net_hook+0x21a/0x260
[524854.858903] Code: 24 e8 aa 73 83 ff 48 63 43 1c 83 f8 01 0f 85 3d ff ff ff e8 98 d1 f0 ff 48 8b 3c 24 e8 8f 73 83 ff 48 63 43 1c e9 26 ff ff ff &lt;0f&gt; 0b 48 83 c4 18 48 c7 c7 00 68 e9 82 5b 5d 41 5c 41 5d 41 5e 41
[524854.858914] RSP: 0018:ffff8881e36d79e0 EFLAGS: 00010246
[524854.858926] RAX: 0000000000000000 RBX: ffff8881339ae790 RCX: ffffffff81ba524a
[524854.858936] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881c8a16438
[524854.858945] RBP: ffff8881c8a16438 R08: 0000000000000001 R09: ffffed103c6daf34
[524854.858954] R10: ffff8881e36d79a7 R11: 0000000000000000 R12: 0000000000000005
[524854.858962] R13: ffff8881c8a16000 R14: 0000000000000000 R15: ffff8881351b5a00
[524854.858971] FS:  0000000000000000(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[524854.858982] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[524854.858991] CR2: 00007fc9be0f16f4 CR3: 00000001437cc004 CR4: 00000000001706f0
[524854.859000] Call Trace:
[524854.859006]  &lt;TASK&gt;
[524854.859013]  ? __warn+0x9f/0x1a0
[524854.859027]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859044]  ? report_bug+0x1b1/0x1e0
[524854.859060]  ? handle_bug+0x3c/0x70
[524854.859071]  ? exc_invalid_op+0x17/0x40
[524854.859083]  ? asm_exc_invalid_op+0x1a/0x20
[524854.859100]  ? __nf_unregister_net_hook+0x6a/0x260
[524854.859116]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859135]  nf_tables_netdev_event+0x337/0x390 [nf_tables]
[524854.859304]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859461]  ? packet_notifier+0xb3/0x360
[524854.859476]  ? _raw_spin_unlock_irqrestore+0x11/0x40
[524854.859489]  ? dcbnl_netdevice_event+0x35/0x140
[524854.859507]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859661]  notifier_call_chain+0x7d/0x140
[524854.859677]  unregister_netdevice_many_notify+0x5e1/0xae0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224539">SUSE bug 1224539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix incorrect list API usage

Both the function that migrates all the chunks within a region and the
function that migrates all the entries within a chunk call
list_first_entry() on the respective lists without checking that the
lists are not empty. This is incorrect usage of the API, which leads to
the following warning [1].

Fix by returning if the lists are empty as there is nothing to migrate
in this case.

[1]
WARNING: CPU: 0 PID: 6437 at drivers/net/ethernet/mellanox/mlxsw/spectrum_acl_tcam.c:1266 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0&gt;
Modules linked in:
CPU: 0 PID: 6437 Comm: kworker/0:37 Not tainted 6.9.0-rc3-custom-00883-g94a65f079ef6 #39
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_sp_acl_tcam_vchunk_migrate_all+0x1f1/0x2c0
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x4a0
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224541">SUSE bug 1224541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix warning during rehash

As previously explained, the rehash delayed work migrates filters from
one region to another. This is done by iterating over all chunks (all
the filters with the same priority) in the region and in each chunk
iterating over all the filters.

When the work runs out of credits it stores the current chunk and entry
as markers in the per-work context so that it would know where to resume
the migration from the next time the work is scheduled.

Upon error, the chunk marker is reset to NULL, but without resetting the
entry markers despite being relative to it. This can result in migration
being resumed from an entry that does not belong to the chunk being
migrated. In turn, this will eventually lead to a chunk being iterated
over as if it is an entry. Because of how the two structures happen to
be defined, this does not lead to KASAN splats, but to warnings such as
[1].

Fix by creating a helper that resets all the markers and call it from
all the places the currently only reset the chunk marker. For good
measures also call it when starting a completely new rehash. Add a
warning to avoid future cases.

[1]
WARNING: CPU: 7 PID: 1076 at drivers/net/ethernet/mellanox/mlxsw/core_acl_flex_keys.c:407 mlxsw_afk_encode+0x242/0x2f0
Modules linked in:
CPU: 7 PID: 1076 Comm: kworker/7:24 Tainted: G        W          6.9.0-rc3-custom-00880-g29e61d91b77b #29
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_afk_encode+0x242/0x2f0
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_entry_add+0xd9/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_all+0x109/0x290
 mlxsw_sp_acl_tcam_vregion_rehash_work+0x6c/0x470
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224543">SUSE bug 1224543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36008</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: check for NULL idev in ip_route_use_hint()

syzbot was able to trigger a NULL deref in fib_validate_source()
in an old tree [1].

It appears the bug exists in latest trees.

All calls to __in_dev_get_rcu() must be checked for a NULL result.

[1]
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 2 PID: 3257 Comm: syz-executor.3 Not tainted 5.10.0-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
 RIP: 0010:fib_validate_source+0xbf/0x15a0 net/ipv4/fib_frontend.c:425
Code: 18 f2 f2 f2 f2 42 c7 44 20 23 f3 f3 f3 f3 48 89 44 24 78 42 c6 44 20 27 f3 e8 5d 88 48 fc 4c 89 e8 48 c1 e8 03 48 89 44 24 18 &lt;42&gt; 80 3c 20 00 74 08 4c 89 ef e8 d2 15 98 fc 48 89 5c 24 10 41 bf
RSP: 0018:ffffc900015fee40 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88800f7a4000 RCX: ffff88800f4f90c0
RDX: 0000000000000000 RSI: 0000000004001eac RDI: ffff8880160c64c0
RBP: ffffc900015ff060 R08: 0000000000000000 R09: ffff88800f7a4000
R10: 0000000000000002 R11: ffff88800f4f90c0 R12: dffffc0000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ffff88800f7a4000
FS:  00007f938acfe6c0(0000) GS:ffff888058c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f938acddd58 CR3: 000000001248e000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
  ip_route_use_hint+0x410/0x9b0 net/ipv4/route.c:2231
  ip_rcv_finish_core+0x2c4/0x1a30 net/ipv4/ip_input.c:327
  ip_list_rcv_finish net/ipv4/ip_input.c:612 [inline]
  ip_sublist_rcv+0x3ed/0xe50 net/ipv4/ip_input.c:638
  ip_list_rcv+0x422/0x470 net/ipv4/ip_input.c:673
  __netif_receive_skb_list_ptype net/core/dev.c:5572 [inline]
  __netif_receive_skb_list_core+0x6b1/0x890 net/core/dev.c:5620
  __netif_receive_skb_list net/core/dev.c:5672 [inline]
  netif_receive_skb_list_internal+0x9f9/0xdc0 net/core/dev.c:5764
  netif_receive_skb_list+0x55/0x3e0 net/core/dev.c:5816
  xdp_recv_frames net/bpf/test_run.c:257 [inline]
  xdp_test_run_batch net/bpf/test_run.c:335 [inline]
  bpf_test_run_xdp_live+0x1818/0x1d00 net/bpf/test_run.c:363
  bpf_prog_test_run_xdp+0x81f/0x1170 net/bpf/test_run.c:1376
  bpf_prog_test_run+0x349/0x3c0 kernel/bpf/syscall.c:3736
  __sys_bpf+0x45c/0x710 kernel/bpf/syscall.c:5115
  __do_sys_bpf kernel/bpf/syscall.c:5201 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:5199 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5199
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224540">SUSE bug 1224540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix netdev refcount issue

The dev_tracker is added to ax25_cb in ax25_bind(). When the
ax25 device is detaching, the dev_tracker of ax25_cb should be
deallocated in ax25_kill_by_device() instead of the dev_tracker
of ax25_dev. The log reported by ref_tracker is shown below:

[   80.884935] ref_tracker: reference already released.
[   80.885150] ref_tracker: allocated in:
[   80.885349]  ax25_dev_device_up+0x105/0x540
[   80.885730]  ax25_device_event+0xa4/0x420
[   80.885730]  notifier_call_chain+0xc9/0x1e0
[   80.885730]  __dev_notify_flags+0x138/0x280
[   80.885730]  dev_change_flags+0xd7/0x180
[   80.885730]  dev_ifsioc+0x6a9/0xa30
[   80.885730]  dev_ioctl+0x4d8/0xd90
[   80.885730]  sock_do_ioctl+0x1c2/0x2d0
[   80.885730]  sock_ioctl+0x38b/0x4f0
[   80.885730]  __se_sys_ioctl+0xad/0xf0
[   80.885730]  do_syscall_64+0xc4/0x1b0
[   80.885730]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   80.885730] ref_tracker: freed in:
[   80.885730]  ax25_device_event+0x272/0x420
[   80.885730]  notifier_call_chain+0xc9/0x1e0
[   80.885730]  dev_close_many+0x272/0x370
[   80.885730]  unregister_netdevice_many_notify+0x3b5/0x1180
[   80.885730]  unregister_netdev+0xcf/0x120
[   80.885730]  sixpack_close+0x11f/0x1b0
[   80.885730]  tty_ldisc_kill+0xcb/0x190
[   80.885730]  tty_ldisc_hangup+0x338/0x3d0
[   80.885730]  __tty_hangup+0x504/0x740
[   80.885730]  tty_release+0x46e/0xd80
[   80.885730]  __fput+0x37f/0x770
[   80.885730]  __x64_sys_close+0x7b/0xb0
[   80.885730]  do_syscall_64+0xc4/0x1b0
[   80.885730]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   80.893739] ------------[ cut here ]------------
[   80.894030] WARNING: CPU: 2 PID: 140 at lib/ref_tracker.c:255 ref_tracker_free+0x47b/0x6b0
[   80.894297] Modules linked in:
[   80.894929] CPU: 2 PID: 140 Comm: ax25_conn_rel_6 Not tainted 6.9.0-rc4-g8cd26fd90c1a #11
[   80.895190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qem4
[   80.895514] RIP: 0010:ref_tracker_free+0x47b/0x6b0
[   80.895808] Code: 83 c5 18 4c 89 eb 48 c1 eb 03 8a 04 13 84 c0 0f 85 df 01 00 00 41 83 7d 00 00 75 4b 4c 89 ff 9
[   80.896171] RSP: 0018:ffff888009edf8c0 EFLAGS: 00000286
[   80.896339] RAX: 1ffff1100141ac00 RBX: 1ffff1100149463b RCX: dffffc0000000000
[   80.896502] RDX: 0000000000000001 RSI: 0000000000000246 RDI: ffff88800a0d6518
[   80.896925] RBP: ffff888009edf9b0 R08: ffff88806d3288d3 R09: 1ffff1100da6511a
[   80.897212] R10: dffffc0000000000 R11: ffffed100da6511b R12: ffff88800a4a31d4
[   80.897859] R13: ffff88800a4a31d8 R14: dffffc0000000000 R15: ffff88800a0d6518
[   80.898279] FS:  00007fd88b7fe700(0000) GS:ffff88806d300000(0000) knlGS:0000000000000000
[   80.899436] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   80.900181] CR2: 00007fd88c001d48 CR3: 000000000993e000 CR4: 00000000000006f0
...
[   80.935774] ref_tracker: sp%d@000000000bb9df3d has 1/1 users at
[   80.935774]      ax25_bind+0x424/0x4e0
[   80.935774]      __sys_bind+0x1d9/0x270
[   80.935774]      __x64_sys_bind+0x75/0x80
[   80.935774]      do_syscall_64+0xc4/0x1b0
[   80.935774]      entry_SYSCALL_64_after_hwframe+0x67/0x6f

Change ax25_dev-&gt;dev_tracker to the dev_tracker of ax25_cb
in order to mitigate the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224542">SUSE bug 1224542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36010" ref_url="https://www.suse.com/security/cve/CVE-2024-36010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix string truncation warnings in igb_set_fw_version

Commit 1978d3ead82c ("intel: fix string truncation warnings")
fixes '-Wformat-truncation=' warnings in igb_main.c by using kasprintf.

drivers/net/ethernet/intel/igb/igb_main.c:3092:53: warning:'%d' directive output may be truncated writing between 1 and 5 bytes into a region of size between 1 and 13 [-Wformat-truncation=]
 3092 |                                  "%d.%d, 0x%08x, %d.%d.%d",
      |                                                     ^~
drivers/net/ethernet/intel/igb/igb_main.c:3092:34: note:directive argument in the range [0, 65535]
 3092 |                                  "%d.%d, 0x%08x, %d.%d.%d",
      |                                  ^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/ethernet/intel/igb/igb_main.c:3092:34: note:directive argument in the range [0, 65535]
drivers/net/ethernet/intel/igb/igb_main.c:3090:25: note:'snprintf' output between 23 and 43 bytes into a destination of size 32

kasprintf() returns a pointer to dynamically allocated memory
which can be NULL upon failure.

Fix this warning by using a larger space for adapter-&gt;fw_version,
and then fall back and continue to use snprintf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36010/">CVE-2024-36010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36010">CVE-2024-36010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225594">SUSE bug 1225594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36011" ref_url="https://www.suse.com/security/cve/CVE-2024-36011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: HCI: Fix potential null-ptr-deref

Fix potential null-ptr-deref in hci_le_big_sync_established_evt().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36011/">CVE-2024-36011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225579">SUSE bug 1225579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: msft: fix slab-use-after-free in msft_do_close()

Tying the msft-&gt;data lifetime to hdev by freeing it in
hci_release_dev() to fix the following case:

[use]
msft_do_close()
  msft = hdev-&gt;msft_data;
  if (!msft)                      ...(1) &lt;- passed.
    return;
  mutex_lock(&amp;msft-&gt;filter_lock); ...(4) &lt;- used after freed.

[free]
msft_unregister()
  msft = hdev-&gt;msft_data;
  hdev-&gt;msft_data = NULL;         ...(2)
  kfree(msft);                    ...(3) &lt;- msft is freed.

==================================================================
BUG: KASAN: slab-use-after-free in __mutex_lock_common
kernel/locking/mutex.c:587 [inline]
BUG: KASAN: slab-use-after-free in __mutex_lock+0x8f/0xc30
kernel/locking/mutex.c:752
Read of size 8 at addr ffff888106cbbca8 by task kworker/u5:2/309
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225502">SUSE bug 1225502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()

Extend a critical section to prevent chan from early freeing.
Also make the l2cap_connect() return type void. Nothing is using the
returned value but it is ugly to return a potentially freed pointer.
Making it void will help with backports because earlier kernels did use
the return value. Now the compile will break for kernels where this
patch is not a complete fix.

Call stack summary:

[use]
l2cap_bredr_sig_cmd
  l2cap_connect
    mutex_lock(&amp;conn-&gt;chan_lock);
  | chan = pchan-&gt;ops-&gt;new_connection(pchan); &lt;- alloc chan
  | __l2cap_chan_add(conn, chan);
  |   l2cap_chan_hold(chan);
  |   list_add(&amp;chan-&gt;list, &amp;conn-&gt;chan_l);   ... (1)
    mutex_unlock(&amp;conn-&gt;chan_lock);
    chan-&gt;conf_state              ... (4) &lt;- use after free

[free]
l2cap_conn_del
  mutex_lock(&amp;conn-&gt;chan_lock);
| foreach chan in conn-&gt;chan_l:            ... (2)
|   l2cap_chan_put(chan);
|     l2cap_chan_destroy
|       kfree(chan)               ... (3) &lt;- chan freed
  mutex_unlock(&amp;conn-&gt;chan_lock);

==================================================================
BUG: KASAN: slab-use-after-free in instrument_atomic_read
include/linux/instrumented.h:68 [inline]
BUG: KASAN: slab-use-after-free in _test_bit
include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
BUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0
net/bluetooth/l2cap_core.c:4260
Read of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225578">SUSE bug 1225578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/arm/malidp: fix a possible null pointer dereference

In malidp_mw_connector_reset, new memory is allocated with kzalloc, but
no check is performed. In order to prevent null pointer dereferencing,
ensure that mw_state is checked before calling
__drm_atomic_helper_connector_reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225593">SUSE bug 1225593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppdev: Add an error check in register_device

In register_device, the return value of ida_simple_get is unchecked,
in witch ida_simple_get will use an invalid index value.

To address this issue, index should be checked after ida_simple_get. When
the index value is abnormal, a warning message should be printed, the port
should be dropped, and the value should be recorded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225640">SUSE bug 1225640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix possible out-of-bounds in gsm0_receive()

Assuming the following:
- side A configures the n_gsm in basic option mode
- side B sends the header of a basic option mode frame with data length 1
- side A switches to advanced option mode
- side B sends 2 data bytes which exceeds gsm-&gt;len
  Reason: gsm-&gt;len is not used in advanced option mode.
- side A switches to basic option mode
- side B keeps sending until gsm0_receive() writes past gsm-&gt;buf
  Reason: Neither gsm-&gt;state nor gsm-&gt;len have been reset after
  reconfiguration.

Fix this by changing gsm-&gt;count to gsm-&gt;len comparison from equal to less
than. Also add upper limit checks against the constant MAX_MRU in
gsm0_receive() and gsm1_receive() to harden against memory corruption of
gsm-&gt;len and gsm-&gt;mru.

All other checks remain as we still need to limit the data according to the
user configuration and actual payload size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225642">SUSE bug 1225642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation

Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a
struct ifla_vf_vlan_info so the size of such attribute needs to be at least
of sizeof(struct ifla_vf_vlan_info) which is 14 bytes.
The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)
which is less than sizeof(struct ifla_vf_vlan_info) so this validation
is not enough and a too small attribute might be cast to a
struct ifla_vf_vlan_info, this might result in an out of bands
read access when accessing the saved (casted) entry in ivvl.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225681">SUSE bug 1225681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36018" ref_url="https://www.suse.com/security/cve/CVE-2024-36018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/uvmm: fix addr/range calcs for remap operations

dEQP-VK.sparse_resources.image_rebind.2d_array.r64i.128_128_8
was causing a remap operation like the below.

op_remap: prev: 0000003fffed0000 00000000000f0000 00000000a5abd18a 0000000000000000
op_remap: next:
op_remap: unmap: 0000003fffed0000 0000000000100000 0
op_map: map: 0000003ffffc0000 0000000000010000 000000005b1ba33c 00000000000e0000

This was resulting in an unmap operation from 0x3fffed0000+0xf0000, 0x100000
which was corrupting the pagetables and oopsing the kernel.

Fixes the prev + unmap range calcs to use start/end and map back to addr/range.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36018/">CVE-2024-36018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36018">CVE-2024-36018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225694">SUSE bug 1225694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36019" ref_url="https://www.suse.com/security/cve/CVE-2024-36019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: maple: Fix cache corruption in regcache_maple_drop()

When keeping the upper end of a cache block entry, the entry[] array
must be indexed by the offset from the base register of the block,
i.e. max - mas.index.

The code was indexing entry[] by only the register address, leading
to an out-of-bounds access that copied some part of the kernel
memory over the cache contents.

This bug was not detected by the regmap KUnit test because it only
tests with a block of registers starting at 0, so mas.index == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36019/">CVE-2024-36019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36019">CVE-2024-36019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225695">SUSE bug 1225695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix vf may be used uninitialized in this function warning

To fix the regression introduced by commit 52424f974bc5, which causes
servers hang in very hard to reproduce conditions with resets races.
Using two sources for the information is the root cause.
In this function before the fix bumping v didn't mean bumping vf
pointer. But the code used this variables interchangeably, so stale vf
could point to different/not intended vf.

Remove redundant "v" variable and iterate via single VF pointer across
whole function instead to guarantee VF pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225698">SUSE bug 1225698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when devlink reload during pf initialization

The devlink reload process will access the hardware resources,
but the register operation is done before the hardware is initialized.
So, processing the devlink reload during initialization may lead to kernel
crash. This patch fixes this by taking devl_lock during initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225699">SUSE bug 1225699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36022" ref_url="https://www.suse.com/security/cve/CVE-2024-36022" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Init zone device and drm client after mode-1 reset on reload

In passthrough environment, when amdgpu is reloaded after unload, mode-1
is triggered after initializing the necessary IPs, That init does not
include KFD, and KFD init waits until the reset is completed. KFD init
is called in the reset handler, but in this case, the zone device and
drm client is not initialized, causing app to create kernel panic.

v2: Removing the init KFD condition from amdgpu_amdkfd_drm_client_create.
As the previous version has the potential of creating DRM client twice.

v3: v2 patch results in SDMA engine hung as DRM open causes VM clear to SDMA
before SDMA init. Adding the condition to in drm client creation, on top of v1,
to guard against drm client creation call multiple times.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-06-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36022/">CVE-2024-36022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36022">CVE-2024-36022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225700">SUSE bug 1225700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36023" ref_url="https://www.suse.com/security/cve/CVE-2024-36023" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Julia Lawall reported this null pointer dereference, this should fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36023/">CVE-2024-36023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36023">CVE-2024-36023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225701">SUSE bug 1225701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36024" ref_url="https://www.suse.com/security/cve/CVE-2024-36024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Disable idle reallow as part of command/gpint execution

[Why]
Workaroud for a race condition where DMCUB is in the process of
committing to IPS1 during the handshake causing us to miss the
transition into IPS2 and touch the INBOX1 RPTR causing a HW hang.

[How]
Disable the reallow to ensure that we have enough of a gap between entry
and exit and we're not seeing back-to-back wake_and_executes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36024/">CVE-2024-36024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36024">CVE-2024-36024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225702">SUSE bug 1225702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()

The app_reply-&gt;elem[] array is allocated earlier in this function and it
has app_req.num_ports elements.  Thus this &gt; comparison needs to be &gt;= to
prevent memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225704">SUSE bug 1225704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11

While doing multiple S4 stress tests, GC/RLC/PMFW get into
an invalid state resulting into hard hangs.

Adding a GFX reset as workaround just before sending the
MP1_UNLOAD message avoids this failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225705">SUSE bug 1225705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36027" ref_url="https://www.suse.com/security/cve/CVE-2024-36027" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: do not flag ZEROOUT on non-dirty extent buffer

Btrfs clears the content of an extent buffer marked as
EXTENT_BUFFER_ZONED_ZEROOUT before the bio submission. This mechanism is
introduced to prevent a write hole of an extent buffer, which is once
allocated, marked dirty, but turns out unnecessary and cleaned up within
one transaction operation.

Currently, btrfs_clear_buffer_dirty() marks the extent buffer as
EXTENT_BUFFER_ZONED_ZEROOUT, and skips the entry function. If this call
happens while the buffer is under IO (with the WRITEBACK flag set,
without the DIRTY flag), we can add the ZEROOUT flag and clear the
buffer's content just before a bio submission. As a result:

1) it can lead to adding faulty delayed reference item which leads to a
   FS corrupted (EUCLEAN) error, and

2) it writes out cleared tree node on disk

The former issue is previously discussed in [1]. The corruption happens
when it runs a delayed reference update. So, on-disk data is safe.

[1] https://lore.kernel.org/linux-btrfs/3f4f2a0ff1a6c818050434288925bdcf3cd719e5.1709124777.git.naohiro.aota@wdc.com/

The latter one can reach on-disk data. But, as that node is already
processed by btrfs_clear_buffer_dirty(), that will be invalidated in the
next transaction commit anyway. So, the chance of hitting the corruption
is relatively small.

Anyway, we should skip flagging ZEROOUT on a non-DIRTY extent buffer, to
keep the content under IO intact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36027/">CVE-2024-36027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36027">CVE-2024-36027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225706">SUSE bug 1225706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36028" ref_url="https://www.suse.com/security/cve/CVE-2024-36028" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when dissolve_free_hugetlb_folio()

When I did memory failure tests recently, below warning occurs:

DEBUG_LOCKS_WARN_ON(1)
WARNING: CPU: 8 PID: 1011 at kernel/locking/lockdep.c:232 __lock_acquire+0xccb/0x1ca0
Modules linked in: mce_inject hwpoison_inject
CPU: 8 PID: 1011 Comm: bash Kdump: loaded Not tainted 6.9.0-rc3-next-20240410-00012-gdb69f219f4be #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
RIP: 0010:__lock_acquire+0xccb/0x1ca0
RSP: 0018:ffffa7a1c7fe3bd0 EFLAGS: 00000082
RAX: 0000000000000000 RBX: eb851eb853975fcf RCX: ffffa1ce5fc1c9c8
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffffa1ce5fc1c9c0
RBP: ffffa1c6865d3280 R08: ffffffffb0f570a8 R09: 0000000000009ffb
R10: 0000000000000286 R11: ffffffffb0f2ad50 R12: ffffa1c6865d3d10
R13: ffffa1c6865d3c70 R14: 0000000000000000 R15: 0000000000000004
FS:  00007ff9f32aa740(0000) GS:ffffa1ce5fc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff9f3134ba0 CR3: 00000008484e4000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0xbe/0x2d0
 _raw_spin_lock_irqsave+0x3a/0x60
 hugepage_subpool_put_pages.part.0+0xe/0xc0
 free_huge_folio+0x253/0x3f0
 dissolve_free_huge_page+0x147/0x210
 __page_handle_poison+0x9/0x70
 memory_failure+0x4e6/0x8c0
 hard_offline_page_store+0x55/0xa0
 kernfs_fop_write_iter+0x12c/0x1d0
 vfs_write+0x380/0x540
 ksys_write+0x64/0xe0
 do_syscall_64+0xbc/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff9f3114887
RSP: 002b:00007ffecbacb458 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007ff9f3114887
RDX: 000000000000000c RSI: 0000564494164e10 RDI: 0000000000000001
RBP: 0000564494164e10 R08: 00007ff9f31d1460 R09: 000000007fffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c
R13: 00007ff9f321b780 R14: 00007ff9f3217600 R15: 00007ff9f3216a00
 &lt;/TASK&gt;
Kernel panic - not syncing: kernel: panic_on_warn set ...
CPU: 8 PID: 1011 Comm: bash Kdump: loaded Not tainted 6.9.0-rc3-next-20240410-00012-gdb69f219f4be #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 panic+0x326/0x350
 check_panic_on_warn+0x4f/0x50
 __warn+0x98/0x190
 report_bug+0x18e/0x1a0
 handle_bug+0x3d/0x70
 exc_invalid_op+0x18/0x70
 asm_exc_invalid_op+0x1a/0x20
RIP: 0010:__lock_acquire+0xccb/0x1ca0
RSP: 0018:ffffa7a1c7fe3bd0 EFLAGS: 00000082
RAX: 0000000000000000 RBX: eb851eb853975fcf RCX: ffffa1ce5fc1c9c8
RDX: 00000000ffffffd8 RSI: 0000000000000027 RDI: ffffa1ce5fc1c9c0
RBP: ffffa1c6865d3280 R08: ffffffffb0f570a8 R09: 0000000000009ffb
R10: 0000000000000286 R11: ffffffffb0f2ad50 R12: ffffa1c6865d3d10
R13: ffffa1c6865d3c70 R14: 0000000000000000 R15: 0000000000000004
 lock_acquire+0xbe/0x2d0
 _raw_spin_lock_irqsave+0x3a/0x60
 hugepage_subpool_put_pages.part.0+0xe/0xc0
 free_huge_folio+0x253/0x3f0
 dissolve_free_huge_page+0x147/0x210
 __page_handle_poison+0x9/0x70
 memory_failure+0x4e6/0x8c0
 hard_offline_page_store+0x55/0xa0
 kernfs_fop_write_iter+0x12c/0x1d0
 vfs_write+0x380/0x540
 ksys_write+0x64/0xe0
 do_syscall_64+0xbc/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff9f3114887
RSP: 002b:00007ffecbacb458 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000c RCX: 00007ff9f3114887
RDX: 000000000000000c RSI: 0000564494164e10 RDI: 0000000000000001
RBP: 0000564494164e10 R08: 00007ff9f31d1460 R09: 000000007fffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c
R13: 00007ff9f321b780 R14: 00007ff9f3217600 R15: 00007ff9f3216a00
 &lt;/TASK&gt;

After git bisecting and digging into the code, I believe the root cause is
that _deferred_list field of folio is unioned with _hugetlb_subpool field.
In __update_and_free_hugetlb_folio(), folio-&gt;_deferred_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-06-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36028/">CVE-2024-36028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36028">CVE-2024-36028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225707">SUSE bug 1225707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci-msm: pervent access to suspended controller

Generic sdhci code registers LED device and uses host-&gt;runtime_suspended
flag to protect access to it. The sdhci-msm driver doesn't set this flag,
which causes a crash when LED is accessed while controller is runtime
suspended. Fix this by setting the flag correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225708">SUSE bug 1225708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36030" ref_url="https://www.suse.com/security/cve/CVE-2024-36030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: fix the double free in rvu_npc_freemem()

Clang static checker(scan-build) warning:
drivers/net/ethernet/marvell/octeontx2/af/rvu_npc.c:line 2184, column 2
Attempt to free released memory.

npc_mcam_rsrcs_deinit() has released 'mcam-&gt;counters.bmap'. Deleted this
redundant kfree() to fix this double free problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36030/">CVE-2024-36030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36030">CVE-2024-36030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225712">SUSE bug 1225712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226326">SUSE bug 1226326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36031" ref_url="https://www.suse.com/security/cve/CVE-2024-36031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

keys: Fix overwrite of key expiration on instantiation

The expiry time of a key is unconditionally overwritten during
instantiation, defaulting to turn it permanent. This causes a problem
for DNS resolution as the expiration set by user-space is overwritten to
TIME64_MAX, disabling further DNS updates. Fix this by restoring the
condition that key_set_expiry is only called when the pre-parser sets a
specific expiry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36031/">CVE-2024-36031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36031">CVE-2024-36031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225713">SUSE bug 1225713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix info leak when fetching fw build id

Add the missing sanity checks and move the 255-byte build-id buffer off
the stack to avoid leaking stack data through debugfs in case the
build-info reply is malformed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225720">SUSE bug 1225720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36033" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36033" ref_url="https://www.suse.com/security/cve/CVE-2024-36033" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix info leak when fetching board id

Add the missing sanity check when fetching the board id to avoid leaking
slab data when later requesting the firmware.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-06-01"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36033/">CVE-2024-36033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36033">CVE-2024-36033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225721">SUSE bug 1225721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: extend minimum interval restriction to entire cycle too

It is possible for syzbot to side-step the restriction imposed by the
blamed commit in the Fixes: tag, because the taprio UAPI permits a
cycle-time different from (and potentially shorter than) the sum of
entry intervals.

We need one more restriction, which is that the cycle time itself must
be larger than N * ETH_ZLEN bit times, where N is the number of schedule
entries. This restriction needs to apply regardless of whether the cycle
time came from the user or was the implicit, auto-calculated value, so
we move the existing "cycle == 0" check outside the "if "(!new-&gt;cycle_time)"
branch. This way covers both conditions and scenarios.

Add a selftest which illustrates the issue triggered by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226797">SUSE bug 1226797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: tproxy: bail out if IP has been disabled on the device

syzbot reports:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
[..]
RIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62
Call Trace:
 nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline]
 nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168

__in_dev_get_rcu() can return NULL, so check for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226798">SUSE bug 1226798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36281" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36281" ref_url="https://www.suse.com/security/cve/CVE-2024-36281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Use mlx5_ipsec_rx_status_destroy to correctly delete status rules

rx_create no longer allocates a modify_hdr instance that needs to be
cleaned up. The mlx5_modify_header_dealloc call will lead to a NULL pointer
dereference. A leak in the rules also previously occurred since there are
now two rules populated related to status.

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 109907067 P4D 109907067 PUD 116890067 PMD 0
  Oops: 0000 [#1] SMP
  CPU: 1 PID: 484 Comm: ip Not tainted 6.9.0-rc2-rrameshbabu+ #254
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS Arch Linux 1.16.3-1-1 04/01/2014
  RIP: 0010:mlx5_modify_header_dealloc+0xd/0x70
  &lt;snip&gt;
  Call Trace:
   &lt;TASK&gt;
   ? show_regs+0x60/0x70
   ? __die+0x24/0x70
   ? page_fault_oops+0x15f/0x430
   ? free_to_partial_list.constprop.0+0x79/0x150
   ? do_user_addr_fault+0x2c9/0x5c0
   ? exc_page_fault+0x63/0x110
   ? asm_exc_page_fault+0x27/0x30
   ? mlx5_modify_header_dealloc+0xd/0x70
   rx_create+0x374/0x590
   rx_add_rule+0x3ad/0x500
   ? rx_add_rule+0x3ad/0x500
   ? mlx5_cmd_exec+0x2c/0x40
   ? mlx5_create_ipsec_obj+0xd6/0x200
   mlx5e_accel_ipsec_fs_add_rule+0x31/0xf0
   mlx5e_xfrm_add_state+0x426/0xc00
  &lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36281/">CVE-2024-36281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36281">CVE-2024-36281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226799">SUSE bug 1226799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36286" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()

syzbot reported that nf_reinject() could be called without rcu_read_lock() :

WARNING: suspicious RCU usage
6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0 Not tainted

net/netfilter/nfnetlink_queue.c:263 suspicious rcu_dereference_check() usage!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-executor.4/13427:
  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2190 [inline]
  #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_core+0xa86/0x1830 kernel/rcu/tree.c:2471
  #1: ffff88801ca92958 (&amp;inst-&gt;lock){+.-.}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
  #1: ffff88801ca92958 (&amp;inst-&gt;lock){+.-.}-{2:2}, at: nfqnl_flush net/netfilter/nfnetlink_queue.c:405 [inline]
  #1: ffff88801ca92958 (&amp;inst-&gt;lock){+.-.}-{2:2}, at: instance_destroy_rcu+0x30/0x220 net/netfilter/nfnetlink_queue.c:172

stack backtrace:
CPU: 0 PID: 13427 Comm: syz-executor.4 Not tainted 6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Call Trace:
 &lt;IRQ&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712
  nf_reinject net/netfilter/nfnetlink_queue.c:323 [inline]
  nfqnl_reinject+0x6ec/0x1120 net/netfilter/nfnetlink_queue.c:397
  nfqnl_flush net/netfilter/nfnetlink_queue.c:410 [inline]
  instance_destroy_rcu+0x1ae/0x220 net/netfilter/nfnetlink_queue.c:172
  rcu_do_batch kernel/rcu/tree.c:2196 [inline]
  rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471
  handle_softirqs+0x2d6/0x990 kernel/softirq.c:554
  __do_softirq kernel/softirq.c:588 [inline]
  invoke_softirq kernel/softirq.c:428 [inline]
  __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:649
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
 &lt;/IRQ&gt;
 &lt;TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226801">SUSE bug 1226801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36288" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Fix loop termination condition in gss_free_in_token_pages()

The in_token-&gt;pages[] array is not NULL terminated. This results in
the following KASAN splat:

  KASAN: maybe wild-memory-access in range [0x04a2013400000008-0x04a201340000000f]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226834">SUSE bug 1226834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36476" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36476" ref_url="https://www.suse.com/security/cve/CVE-2024-36476" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs: Ensure 'ib_sge list' is accessible

Move the declaration of the 'ib_sge list' variable outside the
'always_invalidate' block to ensure it remains accessible for use
throughout the function.

Previously, 'ib_sge list' was declared within the 'always_invalidate'
block, limiting its accessibility, then caused a
'BUG: kernel NULL pointer dereference'[1].
 ? __die_body.cold+0x19/0x27
 ? page_fault_oops+0x15a/0x2d0
 ? search_module_extables+0x19/0x60
 ? search_bpf_extables+0x5f/0x80
 ? exc_page_fault+0x7e/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? memcpy_orig+0xd5/0x140
 rxe_mr_copy+0x1c3/0x200 [rdma_rxe]
 ? rxe_pool_get_index+0x4b/0x80 [rdma_rxe]
 copy_data+0xa5/0x230 [rdma_rxe]
 rxe_requester+0xd9b/0xf70 [rdma_rxe]
 ? finish_task_switch.isra.0+0x99/0x2e0
 rxe_sender+0x13/0x40 [rdma_rxe]
 do_task+0x68/0x1e0 [rdma_rxe]
 process_one_work+0x177/0x330
 worker_thread+0x252/0x390
 ? __pfx_worker_thread+0x10/0x10

This change ensures the variable is available for subsequent operations
that require it.

[1] https://lore.kernel.org/linux-rdma/6a1f3e8f-deb0-49f9-bc69-a9b03ecfcda7@fujitsu.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36476/">CVE-2024-36476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36476">CVE-2024-36476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235902">SUSE bug 1235902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36477" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer

The TPM SPI transfer mechanism uses MAX_SPI_FRAMESIZE for computing the
maximum transfer length and the size of the transfer buffer. As such, it
does not account for the 4 bytes of header that prepends the SPI data
frame. This can result in out-of-bounds accesses and was confirmed with
KASAN.

Introduce SPI_HDRSIZE to account for the header and use to allocate the
transfer buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226840">SUSE bug 1226840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36478" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues'

Writing 'power' and 'submit_queues' concurrently will trigger kernel
panic:

Test script:

modprobe null_blk nr_devices=0
mkdir -p /sys/kernel/config/nullb/nullb0
while true; do echo 1 &gt; submit_queues; echo 4 &gt; submit_queues; done &amp;
while true; do echo 1 &gt; power; echo 0 &gt; power; done

Test result:

BUG: kernel NULL pointer dereference, address: 0000000000000148
Oops: 0000 [#1] PREEMPT SMP
RIP: 0010:__lock_acquire+0x41d/0x28f0
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0x121/0x450
 down_write+0x5f/0x1d0
 simple_recursive_removal+0x12f/0x5c0
 blk_mq_debugfs_unregister_hctxs+0x7c/0x100
 blk_mq_update_nr_hw_queues+0x4a3/0x720
 nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
 nullb_device_submit_queues_store+0x79/0xf0 [null_blk]
 configfs_write_iter+0x119/0x1e0
 vfs_write+0x326/0x730
 ksys_write+0x74/0x150

This is because del_gendisk() can concurrent with
blk_mq_update_nr_hw_queues():

nullb_device_power_store	nullb_apply_submit_queues
 null_del_dev
 del_gendisk
				 nullb_update_nr_hw_queues
				  if (!dev-&gt;nullb)
				  // still set while gendisk is deleted
				   return 0
				  blk_mq_update_nr_hw_queues
 dev-&gt;nullb = NULL

Fix this problem by resuing the global mutex to protect
nullb_device_power_store() and nullb_update_nr_hw_queues() from configfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226841">SUSE bug 1226841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36479" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: bridge: add owner module and take its refcount

The current implementation of the fpga bridge assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the bridge if
the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_bridge
struct and use it to take the module's refcount. Modify the function for
registering a bridge to take an additional owner module parameter and
rename it to avoid conflicts. Use the old function name for a helper macro
that automatically sets the module that registers the bridge as the owner.
This ensures compatibility with existing low-level control modules and
reduces the chances of registering a bridge without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga bridge.

Other changes: opportunistically move put_device() from __fpga_bridge_get()
to fpga_bridge_get() and of_fpga_bridge_get() to improve code clarity since
the bridge device is taken in these functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226949">SUSE bug 1226949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36481" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36481" ref_url="https://www.suse.com/security/cve/CVE-2024-36481" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/probes: fix error check in parse_btf_field()

btf_find_struct_member() might return NULL or an error via the
ERR_PTR() macro. However, its caller in parse_btf_field() only checks
for the NULL condition. Fix this by using IS_ERR() and returning the
error up the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36481/">CVE-2024-36481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36481">CVE-2024-36481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226870">SUSE bug 1226870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36484" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36484" ref_url="https://www.suse.com/security/cve/CVE-2024-36484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: relax socket state check at accept time.

Christoph reported the following splat:

WARNING: CPU: 1 PID: 772 at net/ipv4/af_inet.c:761 __inet_accept+0x1f4/0x4a0
Modules linked in:
CPU: 1 PID: 772 Comm: syz-executor510 Not tainted 6.9.0-rc7-g7da7119fe22b #56
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
RIP: 0010:__inet_accept+0x1f4/0x4a0 net/ipv4/af_inet.c:759
Code: 04 38 84 c0 0f 85 87 00 00 00 41 c7 04 24 03 00 00 00 48 83 c4 10 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 ec b7 da fd &lt;0f&gt; 0b e9 7f fe ff ff e8 e0 b7 da fd 0f 0b e9 fe fe ff ff 89 d9 80
RSP: 0018:ffffc90000c2fc58 EFLAGS: 00010293
RAX: ffffffff836bdd14 RBX: 0000000000000000 RCX: ffff888104668000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff836bdb89 R09: fffff52000185f64
R10: dffffc0000000000 R11: fffff52000185f64 R12: dffffc0000000000
R13: 1ffff92000185f98 R14: ffff88810754d880 R15: ffff8881007b7800
FS:  000000001c772880(0000) GS:ffff88811b280000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb9fcf2e178 CR3: 00000001045d2002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 inet_accept+0x138/0x1d0 net/ipv4/af_inet.c:786
 do_accept+0x435/0x620 net/socket.c:1929
 __sys_accept4_file net/socket.c:1969 [inline]
 __sys_accept4+0x9b/0x110 net/socket.c:1999
 __do_sys_accept net/socket.c:2016 [inline]
 __se_sys_accept net/socket.c:2013 [inline]
 __x64_sys_accept+0x7d/0x90 net/socket.c:2013
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x58/0x100 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x4315f9
Code: fd ff 48 81 c4 80 00 00 00 e9 f1 fe ff ff 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 0f 83 ab b4 fd ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffdb26d9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002b
RAX: ffffffffffffffda RBX: 0000000000400300 RCX: 00000000004315f9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004
RBP: 00000000006e1018 R08: 0000000000400300 R09: 0000000000400300
R10: 0000000000400300 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000040cdf0 R14: 000000000040ce80 R15: 0000000000000055
 &lt;/TASK&gt;

The reproducer invokes shutdown() before entering the listener status.
After commit 94062790aedb ("tcp: defer shutdown(SEND_SHUTDOWN) for
TCP_SYN_RECV sockets"), the above causes the child to reach the accept
syscall in FIN_WAIT1 status.

Eric noted we can relax the existing assertion in __inet_accept()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36484/">CVE-2024-36484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226872">SUSE bug 1226872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix missing memory barrier in tls_init

In tls_init(), a write memory barrier is missing, and store-store
reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.

CPU0                               CPU1
-----                              -----
// In tls_init()
// In tls_ctx_create()
ctx = kzalloc()
ctx-&gt;sk_proto = READ_ONCE(sk-&gt;sk_prot) -(1)

// In update_sk_prot()
WRITE_ONCE(sk-&gt;sk_prot, tls_prots)     -(2)

                                   // In sock_common_setsockopt()
                                   READ_ONCE(sk-&gt;sk_prot)-&gt;setsockopt()

                                   // In tls_{setsockopt,getsockopt}()
                                   ctx-&gt;sk_proto-&gt;setsockopt()    -(3)

In the above scenario, when (1) and (2) are reordered, (3) can observe
the NULL value of ctx-&gt;sk_proto, causing NULL dereference.

To fix it, we rely on rcu_assign_pointer() which implies the release
barrier semantic. By moving rcu_assign_pointer() after ctx-&gt;sk_proto is
initialized, we can ensure that ctx-&gt;sk_proto are visible when
changing sk-&gt;sk_prot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226874">SUSE bug 1226874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: add missing firmware sanity checks

Add the missing sanity checks when parsing the firmware files before
downloading them to avoid accessing and corrupting memory beyond the
vmalloced buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225722">SUSE bug 1225722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36881" ref_url="https://www.suse.com/security/cve/CVE-2024-36881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/userfaultfd: reset ptes when close() for wr-protected ones

Userfaultfd unregister includes a step to remove wr-protect bits from all
the relevant pgtable entries, but that only covered an explicit
UFFDIO_UNREGISTER ioctl, not a close() on the userfaultfd itself.  Cover
that too.  This fixes a WARN trace.

The only user visible side effect is the user can observe leftover
wr-protect bits even if the user close()ed on an userfaultfd when
releasing the last reference of it.  However hopefully that should be
harmless, and nothing bad should happen even if so.

This change is now more important after the recent page-table-check
patch we merged in mm-unstable (446dd9ad37d0 ("mm/page_table_check:
support userfault wr-protect entries")), as we'll do sanity check on
uffd-wp bits without vma context.  So it's better if we can 100%
guarantee no uffd-wp bit leftovers, to make sure each report will be
valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36881/">CVE-2024-36881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36881">CVE-2024-36881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225718">SUSE bug 1225718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36882" ref_url="https://www.suse.com/security/cve/CVE-2024-36882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: use memalloc_nofs_save() in page_cache_ra_order()

See commit f2c817bed58d ("mm: use memalloc_nofs_save in readahead path"),
ensure that page_cache_ra_order() do not attempt to reclaim file-backed
pages too, or it leads to a deadlock, found issue when test ext4 large
folio.

 INFO: task DataXceiver for:7494 blocked for more than 120 seconds.
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:DataXceiver for state:D stack:0     pid:7494  ppid:1      flags:0x00000200
 Call trace:
  __switch_to+0x14c/0x240
  __schedule+0x82c/0xdd0
  schedule+0x58/0xf0
  io_schedule+0x24/0xa0
  __folio_lock+0x130/0x300
  migrate_pages_batch+0x378/0x918
  migrate_pages+0x350/0x700
  compact_zone+0x63c/0xb38
  compact_zone_order+0xc0/0x118
  try_to_compact_pages+0xb0/0x280
  __alloc_pages_direct_compact+0x98/0x248
  __alloc_pages+0x510/0x1110
  alloc_pages+0x9c/0x130
  folio_alloc+0x20/0x78
  filemap_alloc_folio+0x8c/0x1b0
  page_cache_ra_order+0x174/0x308
  ondemand_readahead+0x1c8/0x2b8
  page_cache_async_ra+0x68/0xb8
  filemap_readahead.isra.0+0x64/0xa8
  filemap_get_pages+0x3fc/0x5b0
  filemap_splice_read+0xf4/0x280
  ext4_file_splice_read+0x2c/0x48 [ext4]
  vfs_splice_read.part.0+0xa8/0x118
  splice_direct_to_actor+0xbc/0x288
  do_splice_direct+0x9c/0x108
  do_sendfile+0x328/0x468
  __arm64_sys_sendfile64+0x8c/0x148
  invoke_syscall+0x4c/0x118
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x4c/0x1f8
  el0t_64_sync_handler+0xc0/0xc8
  el0t_64_sync+0x188/0x190
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36882/">CVE-2024-36882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36882">CVE-2024-36882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225723">SUSE bug 1225723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36884" ref_url="https://www.suse.com/security/cve/CVE-2024-36884" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu: Use the correct type in nvidia_smmu_context_fault()

This was missed because of the function pointer indirection.

nvidia_smmu_context_fault() is also installed as a irq function, and the
'void *' was changed to a struct arm_smmu_domain. Since the iommu_domain
is embedded at a non-zero offset this causes nvidia_smmu_context_fault()
to miscompute the offset. Fixup the types.

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000120
  Mem abort info:
    ESR = 0x0000000096000004
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x04: level 0 translation fault
  Data abort info:
    ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
    CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
  user pgtable: 4k pages, 48-bit VAs, pgdp=0000000107c9f000
  [0000000000000120] pgd=0000000000000000, p4d=0000000000000000
  Internal error: Oops: 0000000096000004 [#1] SMP
  Modules linked in:
  CPU: 1 PID: 47 Comm: kworker/u25:0 Not tainted 6.9.0-0.rc7.58.eln136.aarch64 #1
  Hardware name: Unknown NVIDIA Jetson Orin NX/NVIDIA Jetson Orin NX, BIOS 3.1-32827747 03/19/2023
  Workqueue: events_unbound deferred_probe_work_func
  pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : nvidia_smmu_context_fault+0x1c/0x158
  lr : __free_irq+0x1d4/0x2e8
  sp : ffff80008044b6f0
  x29: ffff80008044b6f0 x28: ffff000080a60b18 x27: ffffd32b5172e970
  x26: 0000000000000000 x25: ffff0000802f5aac x24: ffff0000802f5a30
  x23: ffff0000802f5b60 x22: 0000000000000057 x21: 0000000000000000
  x20: ffff0000802f5a00 x19: ffff000087d4cd80 x18: ffffffffffffffff
  x17: 6234362066666666 x16: 6630303078302d30 x15: ffff00008156d888
  x14: 0000000000000000 x13: ffff0000801db910 x12: ffff00008156d6d0
  x11: 0000000000000003 x10: ffff0000801db918 x9 : ffffd32b50f94d9c
  x8 : 1fffe0001032fda1 x7 : ffff00008197ed00 x6 : 000000000000000f
  x5 : 000000000000010e x4 : 000000000000010e x3 : 0000000000000000
  x2 : ffffd32b51720cd8 x1 : ffff000087e6f700 x0 : 0000000000000057
  Call trace:
   nvidia_smmu_context_fault+0x1c/0x158
   __free_irq+0x1d4/0x2e8
   free_irq+0x3c/0x80
   devm_free_irq+0x64/0xa8
   arm_smmu_domain_free+0xc4/0x158
   iommu_domain_free+0x44/0xa0
   iommu_deinit_device+0xd0/0xf8
   __iommu_group_remove_device+0xcc/0xe0
   iommu_bus_notifier+0x64/0xa8
   notifier_call_chain+0x78/0x148
   blocking_notifier_call_chain+0x4c/0x90
   bus_notify+0x44/0x70
   device_del+0x264/0x3e8
   pci_remove_bus_device+0x84/0x120
   pci_remove_root_bus+0x5c/0xc0
   dw_pcie_host_deinit+0x38/0xe0
   tegra_pcie_config_rp+0xc0/0x1f0
   tegra_pcie_dw_probe+0x34c/0x700
   platform_probe+0x70/0xe8
   really_probe+0xc8/0x3a0
   __driver_probe_device+0x84/0x160
   driver_probe_device+0x44/0x130
   __device_attach_driver+0xc4/0x170
   bus_for_each_drv+0x90/0x100
   __device_attach+0xa8/0x1c8
   device_initial_probe+0x1c/0x30
   bus_probe_device+0xb0/0xc0
   deferred_probe_work_func+0xbc/0x120
   process_one_work+0x194/0x490
   worker_thread+0x284/0x3b0
   kthread+0xf4/0x108
   ret_from_fork+0x10/0x20
  Code: a9b97bfd 910003fd a9025bf5 f85a0035 (b94122a1)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-06-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36884/">CVE-2024-36884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36884">CVE-2024-36884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225727">SUSE bug 1225727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36885" ref_url="https://www.suse.com/security/cve/CVE-2024-36885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36885/">CVE-2024-36885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36885">CVE-2024-36885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225728">SUSE bug 1225728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36887" ref_url="https://www.suse.com/security/cve/CVE-2024-36887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

e1000e: change usleep_range to udelay in PHY mdic access

This is a partial revert of commit 6dbdd4de0362 ("e1000e: Workaround
for sporadic MDI error on Meteor Lake systems"). The referenced commit
used usleep_range inside the PHY access routines, which are sometimes
called from an atomic context. This can lead to a kernel panic in some
scenarios, such as cable disconnection and reconnection on vPro systems.

Solve this by changing the usleep_range calls back to udelay.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36887/">CVE-2024-36887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36887">CVE-2024-36887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225731">SUSE bug 1225731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36888" ref_url="https://www.suse.com/security/cve/CVE-2024-36888" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Fix selection of wake_cpu in kick_pool()

With cpu_possible_mask=0-63 and cpu_online_mask=0-7 the following
kernel oops was observed:

smp: Bringing up secondary CPUs ...
smp: Brought up 1 node, 8 CPUs
Unable to handle kernel pointer dereference in virtual kernel address space
Failing address: 0000000000000000 TEID: 0000000000000803
[..]
 Call Trace:
arch_vcpu_is_preempted+0x12/0x80
select_idle_sibling+0x42/0x560
select_task_rq_fair+0x29a/0x3b0
try_to_wake_up+0x38e/0x6e0
kick_pool+0xa4/0x198
__queue_work.part.0+0x2bc/0x3a8
call_timer_fn+0x36/0x160
__run_timers+0x1e2/0x328
__run_timer_base+0x5a/0x88
run_timer_softirq+0x40/0x78
__do_softirq+0x118/0x388
irq_exit_rcu+0xc0/0xd8
do_ext_irq+0xae/0x168
ext_int_handler+0xbe/0xf0
psw_idle_exit+0x0/0xc
default_idle_call+0x3c/0x110
do_idle+0xd4/0x158
cpu_startup_entry+0x40/0x48
rest_init+0xc6/0xc8
start_kernel+0x3c4/0x5e0
startup_continue+0x3c/0x50

The crash is caused by calling arch_vcpu_is_preempted() for an offline
CPU. To avoid this, select the cpu with cpumask_any_and_distribute()
to mask __pod_cpumask with cpu_online_mask. In case no cpu is left in
the pool, skip the assignment.

tj: This doesn't fully fix the bug as CPUs can still go down between picking
the target CPU and the wake call. Fixing that likely requires adding
cpu_online() test to either the sched or s390 arch code. However, regardless
of how that is fixed, workqueue shouldn't be picking a CPU which isn't
online as that would result in unpredictable and worse behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36888/">CVE-2024-36888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36888">CVE-2024-36888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225738">SUSE bug 1225738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_nxt is properly initialized on connect

Christoph reported a splat hinting at a corrupted snd_una:

  WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
  Modules linked in:
  CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
  Workqueue: events mptcp_worker
  RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
  Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8
  	8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe
  	&lt;0f&gt; 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9
  RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293
  RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4
  RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001
  RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
  R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000
  R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000
  FS:  0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0
  Call Trace:
   &lt;TASK&gt;
   __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]
   mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]
   __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615
   mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767
   process_one_work+0x1e0/0x560 kernel/workqueue.c:3254
   process_scheduled_works kernel/workqueue.c:3335 [inline]
   worker_thread+0x3c7/0x640 kernel/workqueue.c:3416
   kthread+0x121/0x170 kernel/kthread.c:388
   ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
   &lt;/TASK&gt;

When fallback to TCP happens early on a client socket, snd_nxt
is not yet initialized and any incoming ack will copy such value
into snd_una. If the mptcp worker (dumbly) tries mptcp-level
re-injection after such ack, that would unconditionally trigger a send
buffer cleanup using 'bad' snd_una values.

We could easily disable re-injection for fallback sockets, but such
dumb behavior already helped catching a few subtle issues and a very
low to zero impact in practice.

Instead address the issue always initializing snd_nxt (and write_seq,
for consistency) at connect time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-10-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225746">SUSE bug 1225746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slab: make __free(kfree) accept error pointers

Currently, if an automatically freed allocation is an error pointer that
will lead to a crash.  An example of this is in wm831x_gpio_dbg_show().

   171	char *label __free(kfree) = gpiochip_dup_line_label(chip, i);
   172	if (IS_ERR(label)) {
   173		dev_err(wm831x-&gt;dev, "Failed to duplicate label\n");
   174		continue;
   175  }

The auto clean up function should check for error pointers as well,
otherwise we're going to keep hitting issues like this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225714">SUSE bug 1225714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36891" ref_url="https://www.suse.com/security/cve/CVE-2024-36891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: fix mas_empty_area_rev() null pointer dereference

Currently the code calls mas_start() followed by mas_data_end() if the
maple state is MA_START, but mas_start() may return with the maple state
node == NULL.  This will lead to a null pointer dereference when checking
information in the NULL node, which is done in mas_data_end().

Avoid setting the offset if there is no node by waiting until after the
maple state is checked for an empty or single entry state.

A user could trigger the events to cause a kernel oops by unmapping all
vmas to produce an empty maple tree, then mapping a vma that would cause
the scenario described above.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36891/">CVE-2024-36891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36891">CVE-2024-36891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225710">SUSE bug 1225710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36892" ref_url="https://www.suse.com/security/cve/CVE-2024-36892" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: avoid zeroing outside-object freepointer for single free

Commit 284f17ac13fe ("mm/slub: handle bulk and single object freeing
separately") splits single and bulk object freeing in two functions
slab_free() and slab_free_bulk() which leads slab_free() to call
slab_free_hook() directly instead of slab_free_freelist_hook().

If `init_on_free` is set, slab_free_hook() zeroes the object.
Afterward, if `slub_debug=F` and `CONFIG_SLAB_FREELIST_HARDENED` are
set, the do_slab_free() slowpath executes freelist consistency
checks and try to decode a zeroed freepointer which leads to a
"Freepointer corrupt" detection in check_object().

During bulk free, slab_free_freelist_hook() isn't affected as it always
sets it objects freepointer using set_freepointer() to maintain its
reconstructed freelist after `init_on_free`.

For single free, object's freepointer thus needs to be avoided when
stored outside the object if `init_on_free` is set. The freepointer left
as is, check_object() may later detect an invalid pointer value due to
objects overflow.

To reproduce, set `slub_debug=FU init_on_free=1 log_level=7` on the
command line of a kernel build with `CONFIG_SLAB_FREELIST_HARDENED=y`.

dmesg sample log:
[   10.708715] =============================================================================
[   10.710323] BUG kmalloc-rnd-05-32 (Tainted: G    B           T ): Freepointer corrupt
[   10.712695] -----------------------------------------------------------------------------
[   10.712695]
[   10.712695] Slab 0xffffd8bdc400d580 objects=32 used=4 fp=0xffff9d9a80356f80 flags=0x200000000000a00(workingset|slab|node=0|zone=2)
[   10.716698] Object 0xffff9d9a80356600 @offset=1536 fp=0x7ee4f480ce0ecd7c
[   10.716698]
[   10.716698] Bytes b4 ffff9d9a803565f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
[   10.720703] Object   ffff9d9a80356600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
[   10.720703] Object   ffff9d9a80356610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
[   10.724696] Padding  ffff9d9a8035666c: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
[   10.724696] Padding  ffff9d9a8035667c: 00 00 00 00                                      ....
[   10.724696] FIX kmalloc-rnd-05-32: Object at 0xffff9d9a80356600 not freed
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36892/">CVE-2024-36892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36892">CVE-2024-36892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225716">SUSE bug 1225716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: Check for port partner validity before consuming it

typec_register_partner() does not guarantee partner registration
to always succeed. In the event of failure, port-&gt;partner is set
to the error value or NULL. Given that port-&gt;partner validity is
not checked, this results in the following crash:

Unable to handle kernel NULL pointer dereference at virtual address xx
 pc : run_state_machine+0x1bc8/0x1c08
 lr : run_state_machine+0x1b90/0x1c08
..
 Call trace:
   run_state_machine+0x1bc8/0x1c08
   tcpm_state_machine_work+0x94/0xe4
   kthread_worker_fn+0x118/0x328
   kthread+0x1d0/0x23c
   ret_from_fork+0x10/0x20

To prevent the crash, check for port-&gt;partner validity before
derefencing it in all the call sites.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225748">SUSE bug 1225748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete

FFS based applications can utilize the aio_cancel() callback to dequeue
pending USB requests submitted to the UDC.  There is a scenario where the
FFS application issues an AIO cancel call, while the UDC is handling a
soft disconnect.  For a DWC3 based implementation, the callstack looks
like the following:

    DWC3 Gadget                               FFS Application
dwc3_gadget_soft_disconnect()              ...
  --&gt; dwc3_stop_active_transfers()
    --&gt; dwc3_gadget_giveback(-ESHUTDOWN)
      --&gt; ffs_epfile_async_io_complete()   ffs_aio_cancel()
        --&gt; usb_ep_free_request()            --&gt; usb_ep_dequeue()

There is currently no locking implemented between the AIO completion
handler and AIO cancel, so the issue occurs if the completion routine is
running in parallel to an AIO cancel call coming from the FFS application.
As the completion call frees the USB request (io_data-&gt;req) the FFS
application is also referencing it for the usb_ep_dequeue() call.  This can
lead to accessing a stale/hanging pointer.

commit b566d38857fc ("usb: gadget: f_fs: use io_data-&gt;status consistently")
relocated the usb_ep_free_request() into ffs_epfile_async_io_complete().
However, in order to properly implement locking to mitigate this issue, the
spinlock can't be added to ffs_epfile_async_io_complete(), as
usb_ep_dequeue() (if successfully dequeuing a USB request) will call the
function driver's completion handler in the same context.  Hence, leading
into a deadlock.

Fix this issue by moving the usb_ep_free_request() back to
ffs_user_copy_worker(), and ensuring that it explicitly sets io_data-&gt;req
to NULL after freeing it within the ffs-&gt;eps_lock.  This resolves the race
condition above, as the ffs_aio_cancel() routine will not continue
attempting to dequeue a request that has already been freed, or the
ffs_user_copy_work() not freeing the USB request until the AIO cancel is
done referencing it.

This fix depends on
  commit b566d38857fc ("usb: gadget: f_fs: use io_data-&gt;status
  consistently")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226139">SUSE bug 1226139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36895" ref_url="https://www.suse.com/security/cve/CVE-2024-36895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: uvc: use correct buffer size when parsing configfs lists

This commit fixes uvc gadget support on 32-bit platforms.

Commit 0df28607c5cb ("usb: gadget: uvc: Generalise helper functions for
reuse") introduced a helper function __uvcg_iter_item_entries() to aid
with parsing lists of items on configfs attributes stores. This function
is a generalization of another very similar function, which used a
stack-allocated temporary buffer of fixed size for each item in the list
and used the sizeof() operator to check for potential buffer overruns.
The new function was changed to allocate the now variably sized temp
buffer on heap, but wasn't properly updated to also check for max buffer
size using the computed size instead of sizeof() operator.

As a result, the maximum item size was 7 (plus null terminator) on
64-bit platforms, and 3 on 32-bit ones. While 7 is accidentally just
barely enough, 3 is definitely too small for some of UVC configfs
attributes. For example, dwFrameInteval, specified in 100ns units,
usually has 6-digit item values, e.g. 166666 for 60fps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36895/">CVE-2024-36895 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36895">CVE-2024-36895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225750">SUSE bug 1225750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix access violation during port device removal

Testing with KASAN and syzkaller revealed a bug in port.c:disable_store():
usb_hub_to_struct_hub() can return NULL if the hub that the port belongs to
is concurrently removed, but the function does not check for this
possibility before dereferencing the returned value.

It turns out that the first dereference is unnecessary, since hub-&gt;intfdev
is the parent of the port device, so it can be changed easily.  Adding a
check for hub == NULL prevents further problems.

The same bug exists in the disable_show() routine, and it can be fixed the
same way.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225734">SUSE bug 1225734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Atom Integrated System Info v2_2 for DCN35

New request from KMD/VBIOS in order to support new UMA carveout
model. This fixes a null dereference from accessing
Ctx-&gt;dc_bios-&gt;integrated_info while it was NULL.

DAL parses through the BIOS and extracts the necessary
integrated_info but was missing a case for the new BIOS
version 2.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225735">SUSE bug 1225735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36898" ref_url="https://www.suse.com/security/cve/CVE-2024-36898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: fix uninitialised kfifo

If a line is requested with debounce, and that results in debouncing
in software, and the line is subsequently reconfigured to enable edge
detection then the allocation of the kfifo to contain edge events is
overlooked.  This results in events being written to and read from an
uninitialised kfifo.  Read events are returned to userspace.

Initialise the kfifo in the case where the software debounce is
already active.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36898/">CVE-2024-36898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36898">CVE-2024-36898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225736">SUSE bug 1225736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Fix use after free in lineinfo_changed_notify

The use-after-free issue occurs as follows: when the GPIO chip device file
is being closed by invoking gpio_chrdev_release(), watched_lines is freed
by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier
chain failed due to waiting write rwsem. Additionally, one of the GPIO
chip's lines is also in the release process and holds the notifier chain's
read rwsem. Consequently, a race condition leads to the use-after-free of
watched_lines.

Here is the typical stack when issue happened:

[free]
gpio_chrdev_release()
  --&gt; bitmap_free(cdev-&gt;watched_lines)                  &lt;-- freed
  --&gt; blocking_notifier_chain_unregister()
    --&gt; down_write(&amp;nh-&gt;rwsem)                          &lt;-- waiting rwsem
          --&gt; __down_write_common()
            --&gt; rwsem_down_write_slowpath()
                  --&gt; schedule_preempt_disabled()
                    --&gt; schedule()

[use]
st54spi_gpio_dev_release()
  --&gt; gpio_free()
    --&gt; gpiod_free()
      --&gt; gpiod_free_commit()
        --&gt; gpiod_line_state_notify()
          --&gt; blocking_notifier_call_chain()
            --&gt; down_read(&amp;nh-&gt;rwsem);                  &lt;-- held rwsem
            --&gt; notifier_call_chain()
              --&gt; lineinfo_changed_notify()
                --&gt; test_bit(xxxx, cdev-&gt;watched_lines) &lt;-- use after free

The side effect of the use-after-free issue is that a GPIO line event is
being generated for userspace where it shouldn't. However, since the chrdev
is being closed, userspace won't have the chance to read that event anyway.

To fix the issue, call the bitmap_free() function after the unregistration
of lineinfo_changed_nb notifier chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225739">SUSE bug 1225739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when devlink reload during initialization

The devlink reload process will access the hardware resources,
but the register operation is done before the hardware is initialized.
So, processing the devlink reload during initialization may lead to kernel
crash.

This patch fixes this by registering the devlink after
hardware initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225726">SUSE bug 1225726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent NULL dereference in ip6_output()

According to syzbot, there is a chance that ip6_dst_idev()
returns NULL in ip6_output(). Most places in IPv6 stack
deal with a NULL idev just fine, but not here.

syzbot reported:

general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]
CPU: 0 PID: 9775 Comm: syz-executor.4 Not tainted 6.9.0-rc5-syzkaller-00157-g6a30653b604a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:ip6_output+0x231/0x3f0 net/ipv6/ip6_output.c:237
Code: 3c 1e 00 49 89 df 74 08 4c 89 ef e8 19 58 db f7 48 8b 44 24 20 49 89 45 00 49 89 c5 48 8d 9d e0 05 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 0f b6 04 38 84 c0 4c 8b 74 24 28 0f 85 61 01 00 00 8b 1b 31 ff
RSP: 0018:ffffc9000927f0d8 EFLAGS: 00010202
RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000040000
RDX: ffffc900131f9000 RSI: 0000000000004f47 RDI: 0000000000004f48
RBP: 0000000000000000 R08: ffffffff8a1f0b9a R09: 1ffffffff1f51fad
R10: dffffc0000000000 R11: fffffbfff1f51fae R12: ffff8880293ec8c0
R13: ffff88805d7fc000 R14: 1ffff1100527d91a R15: dffffc0000000000
FS:  00007f135c6856c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000080 CR3: 0000000064096000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_xmit+0xefe/0x17f0 net/ipv6/ip6_output.c:358
  sctp_v6_xmit+0x9f2/0x13f0 net/sctp/ipv6.c:248
  sctp_packet_transmit+0x26ad/0x2ca0 net/sctp/output.c:653
  sctp_packet_singleton+0x22c/0x320 net/sctp/outqueue.c:783
  sctp_outq_flush_ctrl net/sctp/outqueue.c:914 [inline]
  sctp_outq_flush+0x6d5/0x3e20 net/sctp/outqueue.c:1212
  sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]
  sctp_do_sm+0x59cc/0x60c0 net/sctp/sm_sideeffect.c:1169
  sctp_primitive_ASSOCIATE+0x95/0xc0 net/sctp/primitive.c:73
  __sctp_connect+0x9cd/0xe30 net/sctp/socket.c:1234
  sctp_connect net/sctp/socket.c:4819 [inline]
  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834
  __sys_connect_file net/socket.c:2048 [inline]
  __sys_connect+0x2df/0x310 net/socket.c:2065
  __do_sys_connect net/socket.c:2075 [inline]
  __se_sys_connect net/socket.c:2072 [inline]
  __x64_sys_connect+0x7a/0x90 net/socket.c:2072
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225711">SUSE bug 1225711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action()

syzbot is able to trigger the following crash [1],
caused by unsafe ip6_dst_idev() use.

Indeed ip6_dst_idev() can return NULL, and must always be checked.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 31648 Comm: syz-executor.0 Not tainted 6.9.0-rc4-next-20240417-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 RIP: 0010:__fib6_rule_action net/ipv6/fib6_rules.c:237 [inline]
 RIP: 0010:fib6_rule_action+0x241/0x7b0 net/ipv6/fib6_rules.c:267
Code: 02 00 00 49 8d 9f d8 00 00 00 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 f9 32 bf f7 48 8b 1b 48 89 d8 48 c1 e8 03 &lt;42&gt; 80 3c 20 00 74 08 48 89 df e8 e0 32 bf f7 4c 8b 03 48 89 ef 4c
RSP: 0018:ffffc9000fc1f2f0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 1a772f98c8186700
RDX: 0000000000000003 RSI: ffffffff8bcac4e0 RDI: ffffffff8c1f9760
RBP: ffff8880673fb980 R08: ffffffff8fac15ef R09: 1ffffffff1f582bd
R10: dffffc0000000000 R11: fffffbfff1f582be R12: dffffc0000000000
R13: 0000000000000080 R14: ffff888076509000 R15: ffff88807a029a00
FS:  00007f55e82ca6c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31d23000 CR3: 0000000022b66000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  fib_rules_lookup+0x62c/0xdb0 net/core/fib_rules.c:317
  fib6_rule_lookup+0x1fd/0x790 net/ipv6/fib6_rules.c:108
  ip6_route_output_flags_noref net/ipv6/route.c:2637 [inline]
  ip6_route_output_flags+0x38e/0x610 net/ipv6/route.c:2649
  ip6_route_output include/net/ip6_route.h:93 [inline]
  ip6_dst_lookup_tail+0x189/0x11a0 net/ipv6/ip6_output.c:1120
  ip6_dst_lookup_flow+0xb9/0x180 net/ipv6/ip6_output.c:1250
  sctp_v6_get_dst+0x792/0x1e20 net/sctp/ipv6.c:326
  sctp_transport_route+0x12c/0x2e0 net/sctp/transport.c:455
  sctp_assoc_add_peer+0x614/0x15c0 net/sctp/associola.c:662
  sctp_connect_new_asoc+0x31d/0x6c0 net/sctp/socket.c:1099
  __sctp_connect+0x66d/0xe30 net/sctp/socket.c:1197
  sctp_connect net/sctp/socket.c:4819 [inline]
  sctp_inet_connect+0x149/0x1f0 net/sctp/socket.c:4834
  __sys_connect_file net/socket.c:2048 [inline]
  __sys_connect+0x2df/0x310 net/socket.c:2065
  __do_sys_connect net/socket.c:2075 [inline]
  __se_sys_connect net/socket.c:2072 [inline]
  __x64_sys_connect+0x7a/0x90 net/socket.c:2072
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225719">SUSE bug 1225719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36903" ref_url="https://www.suse.com/security/cve/CVE-2024-36903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix potential uninit-value access in __ip6_make_skb()

As it was done in commit fc1092f51567 ("ipv4: Fix uninit-value access in
__ip_make_skb()") for IPv4, check FLOWI_FLAG_KNOWN_NH on fl6-&gt;flowi6_flags
instead of testing HDRINCL on the socket to avoid a race condition which
causes uninit-value access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36903/">CVE-2024-36903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225741">SUSE bug 1225741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().

Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique()
with nice analysis.

Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for
timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's
sk_refcnt after putting it into ehash and releasing the bucket lock.

Thus, there is a small race window where other threads could try to
reuse the port during connect() and call sock_hold() in tcp_twsk_unique()
for the TIME-WAIT socket with zero refcnt.

If that happens, the refcnt taken by tcp_twsk_unique() is overwritten
and sock_put() will cause underflow, triggering a real use-after-free
somewhere else.

To avoid the use-after-free, we need to use refcount_inc_not_zero() in
tcp_twsk_unique() and give up on reusing the port if it returns false.

[0]:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110
CPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023
RIP: 0010:refcount_warn_saturate+0xe5/0x110
Code: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff &lt;0f&gt; 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8
RSP: 0018:ffffc90006b43b60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027
RDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0
RBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0
R10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84
R13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0
FS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? refcount_warn_saturate+0xe5/0x110
 ? __warn+0x81/0x130
 ? refcount_warn_saturate+0xe5/0x110
 ? report_bug+0x171/0x1a0
 ? refcount_warn_saturate+0xe5/0x110
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? refcount_warn_saturate+0xe5/0x110
 tcp_twsk_unique+0x186/0x190
 __inet_check_established+0x176/0x2d0
 __inet_hash_connect+0x74/0x7d0
 ? __pfx___inet_check_established+0x10/0x10
 tcp_v4_connect+0x278/0x530
 __inet_stream_connect+0x10f/0x3d0
 inet_stream_connect+0x3a/0x60
 __sys_connect+0xa8/0xd0
 __x64_sys_connect+0x18/0x20
 do_syscall_64+0x83/0x170
 entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f62c11a885d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d
RDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003
RBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0
R13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225733">SUSE bug 1225733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9381/1: kasan: clear stale stack poison

We found below OOB crash:

[   33.452494] ==================================================================
[   33.453513] BUG: KASAN: stack-out-of-bounds in refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec
[   33.454660] Write of size 164 at addr c1d03d30 by task swapper/0/0
[   33.455515]
[   33.455767] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           O       6.1.25-mainline #1
[   33.456880] Hardware name: Generic DT based system
[   33.457555]  unwind_backtrace from show_stack+0x18/0x1c
[   33.458326]  show_stack from dump_stack_lvl+0x40/0x4c
[   33.459072]  dump_stack_lvl from print_report+0x158/0x4a4
[   33.459863]  print_report from kasan_report+0x9c/0x148
[   33.460616]  kasan_report from kasan_check_range+0x94/0x1a0
[   33.461424]  kasan_check_range from memset+0x20/0x3c
[   33.462157]  memset from refresh_cpu_vm_stats.constprop.0+0xcc/0x2ec
[   33.463064]  refresh_cpu_vm_stats.constprop.0 from tick_nohz_idle_stop_tick+0x180/0x53c
[   33.464181]  tick_nohz_idle_stop_tick from do_idle+0x264/0x354
[   33.465029]  do_idle from cpu_startup_entry+0x20/0x24
[   33.465769]  cpu_startup_entry from rest_init+0xf0/0xf4
[   33.466528]  rest_init from arch_post_acpi_subsys_init+0x0/0x18
[   33.467397]
[   33.467644] The buggy address belongs to stack of task swapper/0/0
[   33.468493]  and is located at offset 112 in frame:
[   33.469172]  refresh_cpu_vm_stats.constprop.0+0x0/0x2ec
[   33.469917]
[   33.470165] This frame has 2 objects:
[   33.470696]  [32, 76) 'global_zone_diff'
[   33.470729]  [112, 276) 'global_node_diff'
[   33.471294]
[   33.472095] The buggy address belongs to the physical page:
[   33.472862] page:3cd72da8 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x41d03
[   33.473944] flags: 0x1000(reserved|zone=0)
[   33.474565] raw: 00001000 ed741470 ed741470 00000000 00000000 00000000 ffffffff 00000001
[   33.475656] raw: 00000000
[   33.476050] page dumped because: kasan: bad access detected
[   33.476816]
[   33.477061] Memory state around the buggy address:
[   33.477732]  c1d03c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.478630]  c1d03c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00
[   33.479526] &gt;c1d03d00: 00 04 f2 f2 f2 f2 00 00 00 00 00 00 f1 f1 f1 f1
[   33.480415]                                                ^
[   33.481195]  c1d03d80: 00 00 00 00 00 00 00 00 00 00 04 f3 f3 f3 f3 f3
[   33.482088]  c1d03e00: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[   33.482978] ==================================================================

We find the root cause of this OOB is that arm does not clear stale stack
poison in the case of cpuidle.

This patch refer to arch/arm64/kernel/sleep.S to resolve this issue.

From cited commit [1] that explain the problem

Functions which the compiler has instrumented for KASAN place poison on
the stack shadow upon entry and remove this poison prior to returning.

In the case of cpuidle, CPUs exit the kernel a number of levels deep in
C code.  Any instrumented functions on this critical path will leave
portions of the stack shadow poisoned.

If CPUs lose context and return to the kernel via a cold path, we
restore a prior context saved in __cpu_suspend_enter are forgotten, and
we never remove the poison they placed in the stack shadow area by
functions calls between this and the actual exit of the kernel.

Thus, (depending on stackframe layout) subsequent calls to instrumented
functions may hit this stale poison, resulting in (spurious) KASAN
splats to the console.

To avoid this, clear any stale poison from the idle thread for a CPU
prior to bringing a CPU online.

From cited commit [2]

Extend to check for CONFIG_KASAN_STACK

[1] commit 0d97e6d8024c ("arm64: kasan: clear stale stack poison")
[2] commit d56a9ef84bd0 ("kasan, arm64: unpoison stack only with CONFIG_KASAN_STACK")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225715">SUSE bug 1225715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36907" ref_url="https://www.suse.com/security/cve/CVE-2024-36907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36907/">CVE-2024-36907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36907">CVE-2024-36907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225751">SUSE bug 1225751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36908" ref_url="https://www.suse.com/security/cve/CVE-2024-36908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: do not WARN if iocg was already offlined

In iocg_pay_debt(), warn is triggered if 'active_list' is empty, which
is intended to confirm iocg is active when it has debt. However, warn
can be triggered during a blkcg or disk removal, if iocg_waitq_timer_fn()
is run at that time:

  WARNING: CPU: 0 PID: 2344971 at block/blk-iocost.c:1402 iocg_pay_debt+0x14c/0x190
  Call trace:
  iocg_pay_debt+0x14c/0x190
  iocg_kick_waitq+0x438/0x4c0
  iocg_waitq_timer_fn+0xd8/0x130
  __run_hrtimer+0x144/0x45c
  __hrtimer_run_queues+0x16c/0x244
  hrtimer_interrupt+0x2cc/0x7b0

The warn in this situation is meaningless. Since this iocg is being
removed, the state of the 'active_list' is irrelevant, and 'waitq_timer'
is canceled after removing 'active_list' in ioc_pd_free(), which ensures
iocg is freed after iocg_waitq_timer_fn() returns.

Therefore, add the check if iocg was already offlined to avoid warn
when removing a blkcg or disk.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36908/">CVE-2024-36908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36908">CVE-2024-36908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225743">SUSE bug 1225743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

The VMBus ring buffer code could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the struct
vmbus_gpadl for the ring buffers to decide whether to free the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225744">SUSE bug 1225744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Don't free decrypted memory

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

The VMBus device UIO driver could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the gpadl
to decide whether to free the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225717">SUSE bug 1225717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Don't free decrypted memory

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

The netvsc driver could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the gpadl
to decide whether to free the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225745">SUSE bug 1225745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

In order to make sure callers of vmbus_establish_gpadl() and
vmbus_teardown_gpadl() don't return decrypted/shared pages to
allocators, add a field in struct vmbus_gpadl to keep track of the
decryption status of the buffers. This will allow the callers to
know if they should free or leak the pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225752">SUSE bug 1225752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails

In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.

VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()
fails. Leak the pages if this happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225753">SUSE bug 1225753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip on writeback when it's not applicable

[WHY]
dynamic memory safety error detector (KASAN) catches and generates error
messages "BUG: KASAN: slab-out-of-bounds" as writeback connector does not
support certain features which are not initialized.

[HOW]
Skip them when connector type is DRM_MODE_CONNECTOR_WRITEBACK.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225757">SUSE bug 1225757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies

syzbot reported unsafe calls to copy_from_sockptr() [1]

Use copy_safe_from_sockptr() instead.

[1]

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
Read of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078

CPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255
  do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfd/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f7fac07fd89
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89
RDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225758">SUSE bug 1225758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: avoid out of bounds shift

UBSAN catches undefined behavior in blk-iocost, where sometimes
iocg-&gt;delay is shifted right by a number that is too large,
resulting in undefined behavior on some architectures.

[  186.556576] ------------[ cut here ]------------
UBSAN: shift-out-of-bounds in block/blk-iocost.c:1366:23
shift exponent 64 is too large for 64-bit type 'u64' (aka 'unsigned long long')
CPU: 16 PID: 0 Comm: swapper/16 Tainted: G S          E    N 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1
Hardware name: Quanta Twin Lakes MP/Twin Lakes Passive MP, BIOS F09_3A23 12/08/2020
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x8f/0xe0
 __ubsan_handle_shift_out_of_bounds+0x22c/0x280
 iocg_kick_delay+0x30b/0x310
 ioc_timer_fn+0x2fb/0x1f80
 __run_timer_base+0x1b6/0x250
...

Avoid that undefined behavior by simply taking the
"delay = 0" branch if the shift is too large.

I am not sure what the symptoms of an undefined value
delay will be, but I suspect it could be more than a
little annoying to debug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225759">SUSE bug 1225759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix overflow in blk_ioctl_discard()

There is no check for overflow of 'start + len' in blk_ioctl_discard().
Hung task occurs if submit an discard ioctl with the following param:
  start = 0x80000000000ff000, len = 0x8000000000fff000;
Add the overflow validation now.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225770">SUSE bug 1225770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check bloom filter map value size

This patch adds a missing check to bloom filter creating, rejecting
values above KMALLOC_MAX_SIZE. This brings the bloom map in line with
many other map types.

The lack of this protection can cause kernel crashes for value sizes
that overflow int's. Such a crash was caught by syzkaller. The next
patch adds more guard-rails at a lower level.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225766">SUSE bug 1225766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload

The session resources are used by FW and driver when session is offloaded,
once session is uploaded these resources are not used. The lock is not
required as these fields won't be used any longer. The offload and upload
calls are sequential, hence lock is not required.

This will suppress following BUG_ON():

[  449.843143] ------------[ cut here ]------------
[  449.848302] kernel BUG at mm/vmalloc.c:2727!
[  449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[  449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1
Rebooting.
[  449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016
[  449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]
[  449.882910] RIP: 0010:vunmap+0x2e/0x30
[  449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 &lt;0f&gt; 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41
[  449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206
[  449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005
[  449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000
[  449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf
[  449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000
[  449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0
[  449.953701] FS:  0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000
[  449.962732] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0
[  449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  449.993028] Call Trace:
[  449.995756]  __iommu_dma_free+0x96/0x100
[  450.000139]  bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]
[  450.006171]  bnx2fc_upload_session+0xce/0x100 [bnx2fc]
[  450.011910]  bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]
[  450.018136]  fc_rport_work+0x103/0x5b0 [libfc]
[  450.023103]  process_one_work+0x1e8/0x3c0
[  450.027581]  worker_thread+0x50/0x3b0
[  450.031669]  ? rescuer_thread+0x370/0x370
[  450.036143]  kthread+0x149/0x170
[  450.039744]  ? set_kthread_struct+0x40/0x40
[  450.044411]  ret_from_fork+0x22/0x30
[  450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls
[  450.048497]  libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler
[  450.159753] ---[ end trace 712de2c57c64abc8 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36920" ref_url="https://www.suse.com/security/cve/CVE-2024-36920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Avoid memcpy field-spanning write WARNING

When the "storcli2 show" command is executed for eHBA-9600, mpi3mr driver
prints this WARNING message:

  memcpy: detected field-spanning write (size 128) of single field "bsg_reply_buf-&gt;reply_buf" at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 (size 1)
  WARNING: CPU: 0 PID: 12760 at drivers/scsi/mpi3mr/mpi3mr_app.c:1658 mpi3mr_bsg_request+0x6b12/0x7f10 [mpi3mr]

The cause of the WARN is 128 bytes memcpy to the 1 byte size array "__u8
replay_buf[1]" in the struct mpi3mr_bsg_in_reply_buf. The array is intended
to be a flexible length array, so the WARN is a false positive.

To suppress the WARN, remove the constant number '1' from the array
declaration and clarify that it has flexible length. Also, adjust the
memory allocation size to match the change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36920/">CVE-2024-36920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36920">CVE-2024-36920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225768">SUSE bug 1225768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: guard against invalid STA ID on removal

Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would
result in out-of-bounds array accesses. This prevents issues should the
driver get into a bad state during error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225769">SUSE bug 1225769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225850">SUSE bug 1225850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36922" ref_url="https://www.suse.com/security/cve/CVE-2024-36922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: read txq-&gt;read_ptr under lock

If we read txq-&gt;read_ptr without lock, we can read the same
value twice, then obtain the lock, and reclaim from there
to two different places, but crucially reclaim the same
entry twice, resulting in the WARN_ONCE() a little later.
Fix that by reading txq-&gt;read_ptr under lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36922/">CVE-2024-36922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225805">SUSE bug 1225805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/9p: fix uninitialized values during inode evict

If an iget fails due to not being able to retrieve information
from the server then the inode structure is only partially
initialized.  When the inode gets evicted, references to
uninitialized structures (like fscache cookies) were being
made.

This patch checks for a bad_inode before doing anything other
than clearing the inode from the cache.  Since the inode is
bad, it shouldn't have any state associated with it that needs
to be written back (and there really isn't a way to complete
those anyways).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225815">SUSE bug 1225815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()

lpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the
hbalock.  Thus, lpfc_worker_wake_up() should not be called while holding the
hbalock to avoid potential deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36925" ref_url="https://www.suse.com/security/cve/CVE-2024-36925" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

swiotlb: initialise restricted pool list_head when SWIOTLB_DYNAMIC=y

Using restricted DMA pools (CONFIG_DMA_RESTRICTED_POOL=y) in conjunction
with dynamic SWIOTLB (CONFIG_SWIOTLB_DYNAMIC=y) leads to the following
crash when initialising the restricted pools at boot-time:

  | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
  | Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
  | pc : rmem_swiotlb_device_init+0xfc/0x1ec
  | lr : rmem_swiotlb_device_init+0xf0/0x1ec
  | Call trace:
  |  rmem_swiotlb_device_init+0xfc/0x1ec
  |  of_reserved_mem_device_init_by_idx+0x18c/0x238
  |  of_dma_configure_id+0x31c/0x33c
  |  platform_dma_configure+0x34/0x80

faddr2line reveals that the crash is in the list validation code:

  include/linux/list.h:83
  include/linux/rculist.h:79
  include/linux/rculist.h:106
  kernel/dma/swiotlb.c:306
  kernel/dma/swiotlb.c:1695

because add_mem_pool() is trying to list_add_rcu() to a NULL
'mem-&gt;pools'.

Fix the crash by initialising the 'mem-&gt;pools' list_head in
rmem_swiotlb_device_init() before calling add_mem_pool().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36925/">CVE-2024-36925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36925">CVE-2024-36925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225816">SUSE bug 1225816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE

At the time of LPAR boot up, partition firmware provides Open Firmware
property ibm,dma-window for the PE. This property is provided on the PCI
bus the PE is attached to.

There are execptions where the partition firmware might not provide this
property for the PE at the time of LPAR boot up. One of the scenario is
where the firmware has frozen the PE due to some error condition. This
PE is frozen for 24 hours or unless the whole system is reinitialized.

Within this time frame, if the LPAR is booted, the frozen PE will be
presented to the LPAR but ibm,dma-window property could be missing.

Today, under these circumstances, the LPAR oopses with NULL pointer
dereference, when configuring the PCI bus the PE is attached to.

  BUG: Kernel NULL pointer dereference on read at 0x000000c8
  Faulting instruction address: 0xc0000000001024c0
  Oops: Kernel access of bad area, sig: 7 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in:
  Supported: Yes
  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-150600.9-default #1
  Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_023) hv:phyp pSeries
  NIP:  c0000000001024c0 LR: c0000000001024b0 CTR: c000000000102450
  REGS: c0000000037db5c0 TRAP: 0300   Not tainted  (6.4.0-150600.9-default)
  MSR:  8000000002009033 &lt;SF,VEC,EE,ME,IR,DR,RI,LE&gt;  CR: 28000822  XER: 00000000
  CFAR: c00000000010254c DAR: 00000000000000c8 DSISR: 00080000 IRQMASK: 0
  ...
  NIP [c0000000001024c0] pci_dma_bus_setup_pSeriesLP+0x70/0x2a0
  LR [c0000000001024b0] pci_dma_bus_setup_pSeriesLP+0x60/0x2a0
  Call Trace:
    pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 (unreliable)
    pcibios_setup_bus_self+0x1c0/0x370
    __of_scan_bus+0x2f8/0x330
    pcibios_scan_phb+0x280/0x3d0
    pcibios_init+0x88/0x12c
    do_one_initcall+0x60/0x320
    kernel_init_freeable+0x344/0x3e4
    kernel_init+0x34/0x1d0
    ret_from_kernel_user_thread+0x14/0x1c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36927" ref_url="https://www.suse.com/security/cve/CVE-2024-36927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix uninit-value access in __ip_make_skb()

KMSAN reported uninit-value access in __ip_make_skb() [1].  __ip_make_skb()
tests HDRINCL to know if the skb has icmphdr. However, HDRINCL can cause a
race condition. If calling setsockopt(2) with IP_HDRINCL changes HDRINCL
while __ip_make_skb() is running, the function will access icmphdr in the
skb even if it is not included. This causes the issue reported by KMSAN.

Check FLOWI_FLAG_KNOWN_NH on fl4-&gt;flowi4_flags instead of testing HDRINCL
on the socket.

Also, fl4-&gt;fl4_icmp_type and fl4-&gt;fl4_icmp_code are not initialized. These
are union in struct flowi4 and are implicitly initialized by
flowi4_init_output(), but we should not rely on specific union layout.

Initialize these explicitly in raw_sendmsg().

[1]
BUG: KMSAN: uninit-value in __ip_make_skb+0x2b74/0x2d20 net/ipv4/ip_output.c:1481
 __ip_make_skb+0x2b74/0x2d20 net/ipv4/ip_output.c:1481
 ip_finish_skb include/net/ip.h:243 [inline]
 ip_push_pending_frames+0x4c/0x5c0 net/ipv4/ip_output.c:1508
 raw_sendmsg+0x2381/0x2690 net/ipv4/raw.c:654
 inet_sendmsg+0x27b/0x2a0 net/ipv4/af_inet.c:851
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x274/0x3c0 net/socket.c:745
 __sys_sendto+0x62c/0x7b0 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x130/0x200 net/socket.c:2199
 do_syscall_64+0xd8/0x1f0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3804 [inline]
 slab_alloc_node mm/slub.c:3845 [inline]
 kmem_cache_alloc_node+0x5f6/0xc50 mm/slub.c:3888
 kmalloc_reserve+0x13c/0x4a0 net/core/skbuff.c:577
 __alloc_skb+0x35a/0x7c0 net/core/skbuff.c:668
 alloc_skb include/linux/skbuff.h:1318 [inline]
 __ip_append_data+0x49ab/0x68c0 net/ipv4/ip_output.c:1128
 ip_append_data+0x1e7/0x260 net/ipv4/ip_output.c:1365
 raw_sendmsg+0x22b1/0x2690 net/ipv4/raw.c:648
 inet_sendmsg+0x27b/0x2a0 net/ipv4/af_inet.c:851
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x274/0x3c0 net/socket.c:745
 __sys_sendto+0x62c/0x7b0 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x130/0x200 net/socket.c:2199
 do_syscall_64+0xd8/0x1f0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

CPU: 1 PID: 15709 Comm: syz-executor.7 Not tainted 6.8.0-11567-gb3603fcb79b1 #25
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36927/">CVE-2024-36927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36927">CVE-2024-36927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225813">SUSE bug 1225813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/qeth: Fix kernel panic after setting hsuid

Symptom:
When the hsuid attribute is set for the first time on an IQD Layer3
device while the corresponding network interface is already UP,
the kernel will try to execute a napi function pointer that is NULL.

Example:
---------------------------------------------------------------------------
[ 2057.572696] illegal operation: 0001 ilc:1 [#1] SMP
[ 2057.572702] Modules linked in: af_iucv qeth_l3 zfcp scsi_transport_fc sunrpc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6
nft_reject nft_ct nf_tables_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables libcrc32c nfnetlink ghash_s390 prng xts aes_s390 des_s390 de
s_generic sha3_512_s390 sha3_256_s390 sha512_s390 vfio_ccw vfio_mdev mdev vfio_iommu_type1 eadm_sch vfio ext4 mbcache jbd2 qeth_l2 bridge stp llc dasd_eckd_mod qeth dasd_mod
 qdio ccwgroup pkey zcrypt
[ 2057.572739] CPU: 6 PID: 60182 Comm: stress_client Kdump: loaded Not tainted 4.18.0-541.el8.s390x #1
[ 2057.572742] Hardware name: IBM 3931 A01 704 (LPAR)
[ 2057.572744] Krnl PSW : 0704f00180000000 0000000000000002 (0x2)
[ 2057.572748]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3
[ 2057.572751] Krnl GPRS: 0000000000000004 0000000000000000 00000000a3b008d8 0000000000000000
[ 2057.572754]            00000000a3b008d8 cb923a29c779abc5 0000000000000000 00000000814cfd80
[ 2057.572756]            000000000000012c 0000000000000000 00000000a3b008d8 00000000a3b008d8
[ 2057.572758]            00000000bab6d500 00000000814cfd80 0000000091317e46 00000000814cfc68
[ 2057.572762] Krnl Code:#0000000000000000: 0000                illegal
                         &gt;0000000000000002: 0000                illegal
                          0000000000000004: 0000                illegal
                          0000000000000006: 0000                illegal
                          0000000000000008: 0000                illegal
                          000000000000000a: 0000                illegal
                          000000000000000c: 0000                illegal
                          000000000000000e: 0000                illegal
[ 2057.572800] Call Trace:
[ 2057.572801] ([&lt;00000000ec639700&gt;] 0xec639700)
[ 2057.572803]  [&lt;00000000913183e2&gt;] net_rx_action+0x2ba/0x398
[ 2057.572809]  [&lt;0000000091515f76&gt;] __do_softirq+0x11e/0x3a0
[ 2057.572813]  [&lt;0000000090ce160c&gt;] do_softirq_own_stack+0x3c/0x58
[ 2057.572817] ([&lt;0000000090d2cbd6&gt;] do_softirq.part.1+0x56/0x60)
[ 2057.572822]  [&lt;0000000090d2cc60&gt;] __local_bh_enable_ip+0x80/0x98
[ 2057.572825]  [&lt;0000000091314706&gt;] __dev_queue_xmit+0x2be/0xd70
[ 2057.572827]  [&lt;000003ff803dd6d6&gt;] afiucv_hs_send+0x24e/0x300 [af_iucv]
[ 2057.572830]  [&lt;000003ff803dd88a&gt;] iucv_send_ctrl+0x102/0x138 [af_iucv]
[ 2057.572833]  [&lt;000003ff803de72a&gt;] iucv_sock_connect+0x37a/0x468 [af_iucv]
[ 2057.572835]  [&lt;00000000912e7e90&gt;] __sys_connect+0xa0/0xd8
[ 2057.572839]  [&lt;00000000912e9580&gt;] sys_socketcall+0x228/0x348
[ 2057.572841]  [&lt;0000000091514e1a&gt;] system_call+0x2a6/0x2c8
[ 2057.572843] Last Breaking-Event-Address:
[ 2057.572844]  [&lt;0000000091317e44&gt;] __napi_poll+0x4c/0x1d8
[ 2057.572846]
[ 2057.572847] Kernel panic - not syncing: Fatal exception in interrupt
-------------------------------------------------------------------------------------------

Analysis:
There is one napi structure per out_q: card-&gt;qdio.out_qs[i].napi
The napi.poll functions are set during qeth_open().

Since
commit 1cfef80d4c2b ("s390/qeth: Don't call dev_close/dev_open (DOWN/UP)")
qeth_set_offline()/qeth_set_online() no longer call dev_close()/
dev_open(). So if qeth_free_qdio_queues() cleared
card-&gt;qdio.out_qs[i].napi.poll while the network interface was UP and the
card was offline, they are not set again.

Reproduction:
chzdev -e $devno layer2=0
ip link set dev $network_interface up
echo 0 &gt; /sys/bus/ccw
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225775">SUSE bug 1225775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: reject skb_copy(_expand) for fraglist GSO skbs

SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become
invalid. Return NULL if such an skb is passed to skb_copy or
skb_copy_expand, in order to prevent a crash on a potential later
call to skb_gso_segment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225814">SUSE bug 1225814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36930" ref_url="https://www.suse.com/security/cve/CVE-2024-36930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fix null pointer dereference within spi_sync

If spi_sync() is called with the non-empty queue and the same spi_message
is then reused, the complete callback for the message remains set while
the context is cleared, leading to a null pointer dereference when the
callback is invoked from spi_finalize_current_message().

With function inlining disabled, the call stack might look like this:

  _raw_spin_lock_irqsave from complete_with_flags+0x18/0x58
  complete_with_flags from spi_complete+0x8/0xc
  spi_complete from spi_finalize_current_message+0xec/0x184
  spi_finalize_current_message from spi_transfer_one_message+0x2a8/0x474
  spi_transfer_one_message from __spi_pump_transfer_message+0x104/0x230
  __spi_pump_transfer_message from __spi_transfer_message_noqueue+0x30/0xc4
  __spi_transfer_message_noqueue from __spi_sync+0x204/0x248
  __spi_sync from spi_sync+0x24/0x3c
  spi_sync from mcp251xfd_regmap_crc_read+0x124/0x28c [mcp251xfd]
  mcp251xfd_regmap_crc_read [mcp251xfd] from _regmap_raw_read+0xf8/0x154
  _regmap_raw_read from _regmap_bus_read+0x44/0x70
  _regmap_bus_read from _regmap_read+0x60/0xd8
  _regmap_read from regmap_read+0x3c/0x5c
  regmap_read from mcp251xfd_alloc_can_err_skb+0x1c/0x54 [mcp251xfd]
  mcp251xfd_alloc_can_err_skb [mcp251xfd] from mcp251xfd_irq+0x194/0xe70 [mcp251xfd]
  mcp251xfd_irq [mcp251xfd] from irq_thread_fn+0x1c/0x78
  irq_thread_fn from irq_thread+0x118/0x1f4
  irq_thread from kthread+0xd8/0xf4
  kthread from ret_from_fork+0x14/0x28

Fix this by also setting message-&gt;complete to NULL when the transfer is
complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36930/">CVE-2024-36930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36930">CVE-2024-36930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225830">SUSE bug 1225830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cio: Ensure the copied buf is NUL terminated

Currently, we allocate a lbuf-sized kernel buffer and copy lbuf from
userspace to that buffer. Later, we use scanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using scanf. Fix this issue by using memdup_user_nul instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225747">SUSE bug 1225747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36932" ref_url="https://www.suse.com/security/cve/CVE-2024-36932" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/debugfs: Prevent use-after-free from occurring after cdev removal

Since thermal_debug_cdev_remove() does not run under cdev-&gt;lock, it can
run in parallel with thermal_debug_cdev_state_update() and it may free
the struct thermal_debugfs object used by the latter after it has been
checked against NULL.

If that happens, thermal_debug_cdev_state_update() will access memory
that has been freed already causing the kernel to crash.

Address this by using cdev-&gt;lock in thermal_debug_cdev_remove() around
the cdev-&gt;debugfs value check (in case the same cdev is removed at the
same time in two different threads) and its reset to NULL.

Cc :6.8+ &lt;stable@vger.kernel.org&gt; # 6.8+
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36932/">CVE-2024-36932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36932">CVE-2024-36932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225831">SUSE bug 1225831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nsh: Restore skb-&gt;{protocol,data,mac_header} for outer header in nsh_gso_segment().

syzbot triggered various splats (see [0] and links) by a crafted GSO
packet of VIRTIO_NET_HDR_GSO_UDP layering the following protocols:

  ETH_P_8021AD + ETH_P_NSH + ETH_P_IPV6 + IPPROTO_UDP

NSH can encapsulate IPv4, IPv6, Ethernet, NSH, and MPLS.  As the inner
protocol can be Ethernet, NSH GSO handler, nsh_gso_segment(), calls
skb_mac_gso_segment() to invoke inner protocol GSO handlers.

nsh_gso_segment() does the following for the original skb before
calling skb_mac_gso_segment()

  1. reset skb-&gt;network_header
  2. save the original skb-&gt;{mac_heaeder,mac_len} in a local variable
  3. pull the NSH header
  4. resets skb-&gt;mac_header
  5. set up skb-&gt;mac_len and skb-&gt;protocol for the inner protocol.

and does the following for the segmented skb

  6. set ntohs(ETH_P_NSH) to skb-&gt;protocol
  7. push the NSH header
  8. restore skb-&gt;mac_header
  9. set skb-&gt;mac_header + mac_len to skb-&gt;network_header
 10. restore skb-&gt;mac_len

There are two problems in 6-7 and 8-9.

  (a)
  After 6 &amp; 7, skb-&gt;data points to the NSH header, so the outer header
  (ETH_P_8021AD in this case) is stripped when skb is sent out of netdev.

  Also, if NSH is encapsulated by NSH + Ethernet (so NSH-Ethernet-NSH),
  skb_pull() in the first nsh_gso_segment() will make skb-&gt;data point
  to the middle of the outer NSH or Ethernet header because the Ethernet
  header is not pulled by the second nsh_gso_segment().

  (b)
  While restoring skb-&gt;{mac_header,network_header} in 8 &amp; 9,
  nsh_gso_segment() does not assume that the data in the linear
  buffer is shifted.

  However, udp6_ufo_fragment() could shift the data and change
  skb-&gt;mac_header accordingly as demonstrated by syzbot.

  If this happens, even the restored skb-&gt;mac_header points to
  the middle of the outer header.

It seems nsh_gso_segment() has never worked with outer headers so far.

At the end of nsh_gso_segment(), the outer header must be restored for
the segmented skb, instead of the NSH header.

To do that, let's calculate the outer header position relatively from
the inner header and set skb-&gt;{data,mac_header,protocol} properly.

[0]:
BUG: KMSAN: uninit-value in ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]
BUG: KMSAN: uninit-value in ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
BUG: KMSAN: uninit-value in ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668
 ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:524 [inline]
 ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
 ipvlan_queue_xmit+0xf44/0x16b0 drivers/net/ipvlan/ipvlan_core.c:668
 ipvlan_start_xmit+0x5c/0x1a0 drivers/net/ipvlan/ipvlan_main.c:222
 __netdev_start_xmit include/linux/netdevice.h:4989 [inline]
 netdev_start_xmit include/linux/netdevice.h:5003 [inline]
 xmit_one net/core/dev.c:3547 [inline]
 dev_hard_start_xmit+0x244/0xa10 net/core/dev.c:3563
 __dev_queue_xmit+0x33ed/0x51c0 net/core/dev.c:4351
 dev_queue_xmit include/linux/netdevice.h:3171 [inline]
 packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3081 [inline]
 packet_sendmsg+0x8aef/0x9f10 net/packet/af_packet.c:3113
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 __sys_sendto+0x735/0xa10 net/socket.c:2191
 __do_sys_sendto net/socket.c:2203 [inline]
 __se_sys_sendto net/socket.c:2199 [inline]
 __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3819 [inline]
 slab_alloc_node mm/slub.c:3860 [inline]
 __do_kmalloc_node mm/slub.c:3980 [inline]
 __kmalloc_node_track_caller+0x705/0x1000 mm/slub.c:4001
 kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582
 __
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225832">SUSE bug 1225832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bna: ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225760">SUSE bug 1225760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36935" ref_url="https://www.suse.com/security/cve/CVE-2024-36935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count bytes
from userspace to that buffer. Later, we use sscanf on this buffer but we
don't ensure that the string is terminated inside the buffer, this can lead
to OOB read when using sscanf. Fix this issue by using memdup_user_nul
instead of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36935/">CVE-2024-36935 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36935">CVE-2024-36935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225763">SUSE bug 1225763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/unaccepted: touch soft lockup during memory accept

Commit 50e782a86c98 ("efi/unaccepted: Fix soft lockups caused by
parallel memory acceptance") has released the spinlock so other CPUs can
do memory acceptance in parallel and not triggers softlockup on other
CPUs.

However the softlock up was intermittent shown up if the memory of the
TD guest is large, and the timeout of softlockup is set to 1 second:

 RIP: 0010:_raw_spin_unlock_irqrestore
 Call Trace:
 ? __hrtimer_run_queues
 &lt;IRQ&gt;
 ? hrtimer_interrupt
 ? watchdog_timer_fn
 ? __sysvec_apic_timer_interrupt
 ? __pfx_watchdog_timer_fn
 ? sysvec_apic_timer_interrupt
 &lt;/IRQ&gt;
 ? __hrtimer_run_queues
 &lt;TASK&gt;
 ? hrtimer_interrupt
 ? asm_sysvec_apic_timer_interrupt
 ? _raw_spin_unlock_irqrestore
 ? __sysvec_apic_timer_interrupt
 ? sysvec_apic_timer_interrupt
 accept_memory
 try_to_accept_memory
 do_huge_pmd_anonymous_page
 get_page_from_freelist
 __handle_mm_fault
 __alloc_pages
 __folio_alloc
 ? __tdx_hypercall
 handle_mm_fault
 vma_alloc_folio
 do_user_addr_fault
 do_huge_pmd_anonymous_page
 exc_page_fault
 ? __do_huge_pmd_anonymous_page
 asm_exc_page_fault
 __handle_mm_fault

When the local irq is enabled at the end of accept_memory(), the
softlockup detects that the watchdog on single CPU has not been fed for
a while. That is to say, even other CPUs will not be blocked by
spinlock, the current CPU might be stunk with local irq disabled for a
while, which hurts not only nmi watchdog but also softlockup.

Chao Gao pointed out that the memory accept could be time costly and
there was similar report before. Thus to avoid any softlocup detection
during this stage, give the softlockup a flag to skip the timeout check
at the end of accept_memory(), by invoking touch_softlockup_watchdog().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225773">SUSE bug 1225773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: use flags field to disambiguate broadcast redirect

When redirecting a packet using XDP, the bpf_redirect_map() helper will set
up the redirect destination information in struct bpf_redirect_info (using
the __bpf_xdp_redirect_map() helper function), and the xdp_do_redirect()
function will read this information after the XDP program returns and pass
the frame on to the right redirect destination.

When using the BPF_F_BROADCAST flag to do multicast redirect to a whole
map, __bpf_xdp_redirect_map() sets the 'map' pointer in struct
bpf_redirect_info to point to the destination map to be broadcast. And
xdp_do_redirect() reacts to the value of this map pointer to decide whether
it's dealing with a broadcast or a single-value redirect. However, if the
destination map is being destroyed before xdp_do_redirect() is called, the
map pointer will be cleared out (by bpf_clear_redirect_map()) without
waiting for any XDP programs to stop running. This causes xdp_do_redirect()
to think that the redirect was to a single target, but the target pointer
is also NULL (since broadcast redirects don't have a single target), so
this causes a crash when a NULL pointer is passed to dev_map_enqueue().

To fix this, change xdp_do_redirect() to react directly to the presence of
the BPF_F_BROADCAST flag in the 'flags' value in struct bpf_redirect_info
to disambiguate between a single-target and a broadcast redirect. And only
read the 'map' pointer if the broadcast flag is set, aborting if that has
been cleared out in the meantime. This prevents the crash, while keeping
the atomic (cmpxchg-based) clearing of the map pointer itself, and without
adding any more checks in the non-broadcast fast path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225834">SUSE bug 1225834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue

Fix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which
syzbot reported [1].

[1]
BUG: KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue

write to 0xffff88814b3278b8 of 8 bytes by task 10724 on cpu 1:
 sk_psock_stop_verdict net/core/skmsg.c:1257 [inline]
 sk_psock_drop+0x13e/0x1f0 net/core/skmsg.c:843
 sk_psock_put include/linux/skmsg.h:459 [inline]
 sock_map_close+0x1a7/0x260 net/core/sock_map.c:1648
 unix_release+0x4b/0x80 net/unix/af_unix.c:1048
 __sock_release net/socket.c:659 [inline]
 sock_close+0x68/0x150 net/socket.c:1421
 __fput+0x2c1/0x660 fs/file_table.c:422
 __fput_sync+0x44/0x60 fs/file_table.c:507
 __do_sys_close fs/open.c:1556 [inline]
 __se_sys_close+0x101/0x1b0 fs/open.c:1541
 __x64_sys_close+0x1f/0x30 fs/open.c:1541
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

read to 0xffff88814b3278b8 of 8 bytes by task 10713 on cpu 0:
 sk_psock_data_ready include/linux/skmsg.h:464 [inline]
 sk_psock_skb_ingress_enqueue+0x32d/0x390 net/core/skmsg.c:555
 sk_psock_skb_ingress_self+0x185/0x1e0 net/core/skmsg.c:606
 sk_psock_verdict_apply net/core/skmsg.c:1008 [inline]
 sk_psock_verdict_recv+0x3e4/0x4a0 net/core/skmsg.c:1202
 unix_read_skb net/unix/af_unix.c:2546 [inline]
 unix_stream_read_skb+0x9e/0xf0 net/unix/af_unix.c:2682
 sk_psock_verdict_data_ready+0x77/0x220 net/core/skmsg.c:1223
 unix_stream_sendmsg+0x527/0x860 net/unix/af_unix.c:2339
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x140/0x180 net/socket.c:745
 ____sys_sendmsg+0x312/0x410 net/socket.c:2584
 ___sys_sendmsg net/socket.c:2638 [inline]
 __sys_sendmsg+0x1e9/0x280 net/socket.c:2667
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674
 do_syscall_64+0xd3/0x1d0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

value changed: 0xffffffff83d7feb0 -&gt; 0x0000000000000000

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 10713 Comm: syz-executor.4 Tainted: G        W          6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024

Prior to this, commit 4cd12c6065df ("bpf, sockmap: Fix NULL pointer
dereference in sk_psock_verdict_data_ready()") fixed one NULL pointer
similarly due to no protection of saved_data_ready. Here is another
different caller causing the same issue because of the same reason. So
we should protect it with sk_callback_lock read lock because the writer
side in the sk_psock_drop() uses "write_lock_bh(&amp;sk-&gt;sk_callback_lock);".

To avoid errors that could happen in future, I move those two pairs of
lock into the sk_psock_data_ready(), which is suggested by John Fastabend.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225761">SUSE bug 1225761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: Handle error of rpc_proc_register() in nfs_net_init().

syzkaller reported a warning [0] triggered while destroying immature
netns.

rpc_proc_register() was called in init_nfs_fs(), but its error
has been ignored since at least the initial commit 1da177e4c3f4
("Linux-2.6.12-rc2").

Recently, commit d47151b79e32 ("nfs: expose /proc/net/sunrpc/nfs
in net namespaces") converted the procfs to per-netns and made
the problem more visible.

Even when rpc_proc_register() fails, nfs_net_init() could succeed,
and thus nfs_net_exit() will be called while destroying the netns.

Then, remove_proc_entry() will be called for non-existing proc
directory and trigger the warning below.

Let's handle the error of rpc_proc_register() properly in nfs_net_init().

[0]:
name 'nfs'
WARNING: CPU: 1 PID: 1710 at fs/proc/generic.c:711 remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
Modules linked in:
CPU: 1 PID: 1710 Comm: syz-executor.2 Not tainted 6.8.0-12822-gcd51db110a7e #12
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:remove_proc_entry+0x1bb/0x2d0 fs/proc/generic.c:711
Code: 41 5d 41 5e c3 e8 85 09 b5 ff 48 c7 c7 88 58 64 86 e8 09 0e 71 02 e8 74 09 b5 ff 4c 89 e6 48 c7 c7 de 1b 80 84 e8 c5 ad 97 ff &lt;0f&gt; 0b eb b1 e8 5c 09 b5 ff 48 c7 c7 88 58 64 86 e8 e0 0d 71 02 eb
RSP: 0018:ffffc9000c6d7ce0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff8880422b8b00 RCX: ffffffff8110503c
RDX: ffff888030652f00 RSI: ffffffff81105045 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: ffffffff81bb62cb R12: ffffffff84807ffc
R13: ffff88804ad6fcc0 R14: ffffffff84807ffc R15: ffffffff85741ff8
FS:  00007f30cfba8640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff51afe8000 CR3: 000000005a60a005 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 rpc_proc_unregister+0x64/0x70 net/sunrpc/stats.c:310
 nfs_net_exit+0x1c/0x30 fs/nfs/inode.c:2438
 ops_exit_list+0x62/0xb0 net/core/net_namespace.c:170
 setup_net+0x46c/0x660 net/core/net_namespace.c:372
 copy_net_ns+0x244/0x590 net/core/net_namespace.c:505
 create_new_namespaces+0x2ed/0x770 kernel/nsproxy.c:110
 unshare_nsproxy_namespaces+0xae/0x160 kernel/nsproxy.c:228
 ksys_unshare+0x342/0x760 kernel/fork.c:3322
 __do_sys_unshare kernel/fork.c:3393 [inline]
 __se_sys_unshare kernel/fork.c:3391 [inline]
 __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3391
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x4f/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0x7f30d0febe5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007f30cfba7cc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
RAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f30d0febe5d
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c020600
RBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
R13: 000000000000000b R14: 00007f30d104c530 R15: 0000000000000000
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225838">SUSE bug 1225838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: core: delete incorrect free in pinctrl_enable()

The "pctldev" struct is allocated in devm_pinctrl_register_and_init().
It's a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),
so freeing it in pinctrl_enable() will lead to a double free.

The devm_pinctrl_dev_release() function frees the pindescs and destroys
the mutex as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225841">SUSE bug 1225841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: don't free NULL coalescing rule

If the parsing fails, we can dereference a NULL pointer here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: fix firmware check error path

A recent commit fixed the code that parses the firmware files before
downloading them to the controller but introduced a memory leak in case
the sanity checks ever fail.

Make sure to free the firmware buffer before returning on errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225843">SUSE bug 1225843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36943" ref_url="https://www.suse.com/security/cve/CVE-2024-36943" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc/task_mmu: fix loss of young/dirty bits during pagemap scan

make_uffd_wp_pte() was previously doing:

  pte = ptep_get(ptep);
  ptep_modify_prot_start(ptep);
  pte = pte_mkuffd_wp(pte);
  ptep_modify_prot_commit(ptep, pte);

But if another thread accessed or dirtied the pte between the first 2
calls, this could lead to loss of that information.  Since
ptep_modify_prot_start() gets and clears atomically, the following is the
correct pattern and prevents any possible race.  Any access after the
first call would see an invalid pte and cause a fault:

  pte = ptep_modify_prot_start(ptep);
  pte = pte_mkuffd_wp(pte);
  ptep_modify_prot_commit(ptep, pte);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36943/">CVE-2024-36943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36943">CVE-2024-36943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225844">SUSE bug 1225844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Reapply "drm/qxl: simplify qxl_fence_wait"

This reverts commit 07ed11afb68d94eadd4ffc082b97c2331307c5ea.

Stephen Rostedt reports:
 "I went to run my tests on my VMs and the tests hung on boot up.
  Unfortunately, the most I ever got out was:

  [   93.607888] Testing event system initcall: OK
  [   93.667730] Running tests on all trace events:
  [   93.669757] Testing all events: OK
  [   95.631064] ------------[ cut here ]------------
  Timed out after 60 seconds"

and further debugging points to a possible circular locking dependency
between the console_owner locking and the worker pool locking.

Reverting the commit allows Steve's VM to boot to completion again.

[ This may obviously result in the "[TTM] Buffer eviction failed"
  messages again, which was the reason for that original revert. But at
  this point this seems preferable to a non-booting system... ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225847">SUSE bug 1225847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix neighbour and rtable leak in smc_ib_find_route()

In smc_ib_find_route(), the neighbour found by neigh_lookup() and rtable
resolved by ip_route_output_flow() are not released or put before return.
It may cause the refcount leak, so fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225823">SUSE bug 1225823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phonet: fix rtm_phonet_notify() skb allocation

fill_route() stores three components in the skb:

- struct rtmsg
- RTA_DST (u8)
- RTA_OIF (u32)

Therefore, rtm_phonet_notify() should use

NLMSG_ALIGN(sizeof(struct rtmsg)) +
nla_total_size(1) +
nla_total_size(4)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225851">SUSE bug 1225851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

qibfs: fix dentry leak

simple_recursive_removal() drops the pinning references to all positives
in subtree.  For the cases when its argument has been kept alive by
the pinning alone that's exactly the right thing to do, but here
the argument comes from dcache lookup, that needs to be balanced by
explicit dput().

Fucked-up-by: Al Viro &lt;viro@zeniv.linux.org.uk&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225856">SUSE bug 1225856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36948" ref_url="https://www.suse.com/security/cve/CVE-2024-36948" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/xe_migrate: Cast to output precision before multiplying operands

Addressing potential overflow in result of  multiplication of two lower
precision (u32) operands before widening it to higher precision
(u64).

-v2
Fix commit message and description. (Rodrigo)

(cherry picked from commit 34820967ae7b45411f8f4f737c2d63b0c608e0d7)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36948/">CVE-2024-36948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36948">CVE-2024-36948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225845">SUSE bug 1225845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: sync all devices to wait all processes being evicted

If there are more than one device doing reset in parallel, the first
device will call kfd_suspend_all_processes() to evict all processes
on all devices, this call takes time to finish. other device will
start reset and recover without waiting. if the process has not been
evicted before doing recover, it will be restored, then caused page
fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225894">SUSE bug 1225894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firewire: ohci: mask bus reset interrupts between ISR and bottom half

In the FireWire OHCI interrupt handler, if a bus reset interrupt has
occurred, mask bus reset interrupts until bus_reset_work has serviced and
cleared the interrupt.

Normally, we always leave bus reset interrupts masked. We infer the bus
reset from the self-ID interrupt that happens shortly thereafter. A
scenario where we unmask bus reset interrupts was introduced in 2008 in
a007bb857e0b26f5d8b73c2ff90782d9c0972620: If
OHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we
will unmask bus reset interrupts so we can log them.

irq_handler logs the bus reset interrupt. However, we can't clear the bus
reset event flag in irq_handler, because we won't service the event until
later. irq_handler exits with the event flag still set. If the
corresponding interrupt is still unmasked, the first bus reset will
usually freeze the system due to irq_handler being called again each
time it exits. This freeze can be reproduced by loading firewire_ohci
with "modprobe firewire_ohci debug=-1" (to enable all debugging output).
Apparently there are also some cases where bus_reset_work will get called
soon enough to clear the event, and operation will continue normally.

This freeze was first reported a few months after a007bb85 was committed,
but until now it was never fixed. The debug level could safely be set
to -1 through sysfs after the module was loaded, but this would be
ineffectual in logging bus reset interrupts since they were only
unmasked during initialization.

irq_handler will now leave the event flag set but mask bus reset
interrupts, so irq_handler won't be called again and there will be no
freeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will
unmask the interrupt after servicing the event, so future interrupts
will be caught as desired.

As a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be
enabled through sysfs in addition to during initial module loading.
However, when enabled through sysfs, logging of bus reset interrupts will
be effective only starting with the second bus reset, after
bus_reset_work has executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225895">SUSE bug 1225895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36951" ref_url="https://www.suse.com/security/cve/CVE-2024-36951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: range check cp bad op exception interrupts

Due to a CP interrupt bug, bad packet garbage exception codes are raised.
Do a range check so that the debugger and runtime do not receive garbage
codes.
Update the user api to guard exception code type checking as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36951/">CVE-2024-36951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36951">CVE-2024-36951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225896">SUSE bug 1225896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Move NPIV's transport unregistration to after resource clean up

There are cases after NPIV deletion where the fabric switch still believes
the NPIV is logged into the fabric.  This occurs when a vport is
unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the
fabric.

Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including
the fabric D_ID, removes the last ndlp reference and frees the ndlp rport
object.  This sometimes causes the race condition where the final DA_ID and
LOGO are skipped from being sent to the fabric switch.

Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID
and LOGO are sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-05"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225898">SUSE bug 1225898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr()

vgic_v2_parse_attr() is responsible for finding the vCPU that matches
the user-provided CPUID, which (of course) may not be valid. If the ID
is invalid, kvm_get_vcpu_by_id() returns NULL, which isn't handled
gracefully.

Similar to the GICv3 uaccess flow, check that kvm_get_vcpu_by_id()
actually returns something and fail the ioctl if not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225812">SUSE bug 1225812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36954" ref_url="https://www.suse.com/security/cve/CVE-2024-36954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix a possible memleak in tipc_buf_append

__skb_linearize() doesn't free the skb when it fails, so move
'*buf = NULL' after __skb_linearize(), so that the skb can be
freed on the err path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36954/">CVE-2024-36954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225764">SUSE bug 1225764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node()

The documentation for device_get_named_child_node() mentions this
important point:

"
The caller is responsible for calling fwnode_handle_put() on the
returned fwnode pointer.
"

Add fwnode_handle_put() to avoid a leaked reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36956" ref_url="https://www.suse.com/security/cve/CVE-2024-36956" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/debugfs: Free all thermal zone debug memory on zone removal

Because thermal_debug_tz_remove() does not free all memory allocated for
thermal zone diagnostics, some of that memory becomes unreachable after
freeing the thermal zone's struct thermal_debugfs object.

Address this by making thermal_debug_tz_remove() free all of the memory
in question.

Cc :6.8+ &lt;stable@vger.kernel.org&gt; # 6.8+
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-11-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36956/">CVE-2024-36956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36956">CVE-2024-36956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225874">SUSE bug 1225874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: avoid off-by-one read from userspace

We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffer is NUL terminated, we use memdup_user_nul instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-01"/>
	<updated date="2024-12-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225762">SUSE bug 1225762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36958" ref_url="https://www.suse.com/security/cve/CVE-2024-36958" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix nfsd4_encode_fattr4() crasher

Ensure that args.acl is initialized early. It is used in an
unconditional call to kfree() on the way out of
nfsd4_encode_fattr4().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-06-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36958/">CVE-2024-36958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36958">CVE-2024-36958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225873">SUSE bug 1225873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map()

If we fail to allocate propname buffer, we need to drop the reference
count we just took. Because the pinctrl_dt_free_maps() includes the
droping operation, here we call it directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225839">SUSE bug 1225839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix invalid reads in fence signaled events

Correctly set the length of the drm_event to the size of the structure
that's actually used.

The length of the drm_event was set to the parent structure instead of
to the drm_vmw_event_fence which is supposed to be read. drm_read
uses the length parameter to copy the event to the user space thus
resuling in oob reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225872">SUSE bug 1225872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36961" ref_url="https://www.suse.com/security/cve/CVE-2024-36961" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/debugfs: Fix two locking issues with thermal zone debug

With the current thermal zone locking arrangement in the debugfs code,
user space can open the "mitigations" file for a thermal zone before
the zone's debugfs pointer is set which will result in a NULL pointer
dereference in tze_seq_start().

Moreover, thermal_debug_tz_remove() is not called under the thermal
zone lock, so it can run in parallel with the other functions accessing
the thermal zone's struct thermal_debugfs object.  Then, it may clear
tz-&gt;debugfs after one of those functions has checked it and the
struct thermal_debugfs object may be freed prematurely.

To address the first problem, pass a pointer to the thermal zone's
struct thermal_debugfs object to debugfs_create_file() in
thermal_debug_tz_add() and make tze_seq_start(), tze_seq_next(),
tze_seq_stop(), and tze_seq_show() retrieve it from s-&gt;private
instead of a pointer to the thermal zone object.  This will ensure
that tz_debugfs will be valid across the "mitigations" file accesses
until thermal_debugfs_remove_id() called by thermal_debug_tz_remove()
removes that file.

To address the second problem, use tz-&gt;lock in thermal_debug_tz_remove()
around the tz-&gt;debugfs value check (in case the same thermal zone is
removed at the same time in two different threads) and its reset to NULL.

Cc :6.8+ &lt;stable@vger.kernel.org&gt; # 6.8+
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-06-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36961/">CVE-2024-36961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36961">CVE-2024-36961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225857">SUSE bug 1225857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ks8851: Queue RX packets in IRQ handler instead of disabling BHs

Currently the driver uses local_bh_disable()/local_bh_enable() in its
IRQ handler to avoid triggering net_rx_action() softirq on exit from
netif_rx(). The net_rx_action() could trigger this driver .start_xmit
callback, which is protected by the same lock as the IRQ handler, so
calling the .start_xmit from netif_rx() from the IRQ handler critical
section protected by the lock could lead to an attempt to claim the
already claimed lock, and a hang.

The local_bh_disable()/local_bh_enable() approach works only in case
the IRQ handler is protected by a spinlock, but does not work if the
IRQ handler is protected by mutex, i.e. this works for KS8851 with
Parallel bus interface, but not for KS8851 with SPI bus interface.

Remove the BH manipulation and instead of calling netif_rx() inside
the IRQ handler code protected by the lock, queue all the received
SKBs in the IRQ handler into a queue first, and once the IRQ handler
exits the critical section protected by the lock, dequeue all the
queued SKBs and push them all into netif_rx(). At this point, it is
safe to trigger the net_rx_action() softirq, since the netif_rx()
call is outside of the lock that protects the IRQ handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225827">SUSE bug 1225827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36963" ref_url="https://www.suse.com/security/cve/CVE-2024-36963" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracefs: Reset permissions on remount if permissions are options

There's an inconsistency with the way permissions are handled in tracefs.
Because the permissions are generated when accessed, they default to the
root inode's permission if they were never set by the user. If the user
sets the permissions, then a flag is set and the permissions are saved via
the inode (for tracefs files) or an internal attribute field (for
eventfs).

But if a remount happens that specify the permissions, all the files that
were not changed by the user gets updated, but the ones that were are not.
If the user were to remount the file system with a given permission, then
all files and directories within that file system should be updated.

This can cause security issues if a file's permission was updated but the
admin forgot about it. They could incorrectly think that remounting with
permissions set would update all files, but miss some.

For example:

 # cd /sys/kernel/tracing
 # chgrp 1002 current_tracer
 # ls -l
[..]
 -rw-r-----  1 root root 0 May  1 21:25 buffer_size_kb
 -rw-r-----  1 root root 0 May  1 21:25 buffer_subbuf_size_kb
 -r--r-----  1 root root 0 May  1 21:25 buffer_total_size_kb
 -rw-r-----  1 root lkp  0 May  1 21:25 current_tracer
 -rw-r-----  1 root root 0 May  1 21:25 dynamic_events
 -r--r-----  1 root root 0 May  1 21:25 dyn_ftrace_total_info
 -r--r-----  1 root root 0 May  1 21:25 enabled_functions

Where current_tracer now has group "lkp".

 # mount -o remount,gid=1001 .
 # ls -l
 -rw-r-----  1 root tracing 0 May  1 21:25 buffer_size_kb
 -rw-r-----  1 root tracing 0 May  1 21:25 buffer_subbuf_size_kb
 -r--r-----  1 root tracing 0 May  1 21:25 buffer_total_size_kb
 -rw-r-----  1 root lkp     0 May  1 21:25 current_tracer
 -rw-r-----  1 root tracing 0 May  1 21:25 dynamic_events
 -r--r-----  1 root tracing 0 May  1 21:25 dyn_ftrace_total_info
 -r--r-----  1 root tracing 0 May  1 21:25 enabled_functions

Everything changed but the "current_tracer".

Add a new link list that keeps track of all the tracefs_inodes which has
the permission flags that tell if the file/dir should use the root inode's
permission or not. Then on remount, clear all the flags so that the
default behavior of using the root inode's permission is done for all
files and directories.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-06-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36963/">CVE-2024-36963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36963">CVE-2024-36963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225836">SUSE bug 1225836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/9p: only translate RWX permissions for plain 9P2000

Garbage in plain 9P2000's perm bits is allowed through, which causes it
to be able to set (among others) the suid bit. This was presumably not
the intent since the unix extended bits are handled explicitly and
conditionally on .u.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226325">SUSE bug 1226325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: mediatek: Make sure IPI buffer fits in L2TCM

The IPI buffer location is read from the firmware that we load to the
System Companion Processor, and it's not granted that both the SRAM
(L2TCM) size that is defined in the devicetree node is large enough
for that, and while this is especially true for multi-core SCP, it's
still useful to check on single-core variants as well.

Failing to perform this check may make this driver perform R/W
operations out of the L2TCM boundary, resulting (at best) in a
kernel panic.

To fix that, check that the IPI buffer fits, otherwise return a
failure and refuse to boot the relevant SCP core (or the SCP at
all, if this is single core).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226149">SUSE bug 1226149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36966" ref_url="https://www.suse.com/security/cve/CVE-2024-36966" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: reliably distinguish block based and fscache mode

When erofs_kill_sb() is called in block dev based mode, s_bdev may not
have been initialised yet, and if CONFIG_EROFS_FS_ONDEMAND is enabled,
it will be mistaken for fscache mode, and then attempt to free an anon_dev
that has never been allocated, triggering the following warning:

============================================
ida_free called for id=0 which is not allocated.
WARNING: CPU: 14 PID: 926 at lib/idr.c:525 ida_free+0x134/0x140
Modules linked in:
CPU: 14 PID: 926 Comm: mount Not tainted 6.9.0-rc3-dirty #630
RIP: 0010:ida_free+0x134/0x140
Call Trace:
 &lt;TASK&gt;
 erofs_kill_sb+0x81/0x90
 deactivate_locked_super+0x35/0x80
 get_tree_bdev+0x136/0x1e0
 vfs_get_tree+0x2c/0xf0
 do_new_mount+0x190/0x2f0
 [...]
============================================

Now when erofs_kill_sb() is called, erofs_sb_info must have been
initialised, so use sbi-&gt;fsid to distinguish between the two modes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36966/">CVE-2024-36966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36966">CVE-2024-36966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226154">SUSE bug 1226154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix memory leak in tpm2_key_encode()

'scratch' is never freed. Fix this by calling kfree() in the success, and
in the error case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226131">SUSE bug 1226131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix division by zero in setup_dsc_config

When slice_height is 0, the division by slice_height in the calculation
of the number of slices will cause a division by zero driver crash. This
leaves the kernel in a state that requires a reboot. This patch adds a
check to avoid the division by zero.

The stack trace below is for the 6.8.4 Kernel. I reproduced the issue on
a Z16 Gen 2 Lenovo Thinkpad with a Apple Studio Display monitor
connected via Thunderbolt. The amdgpu driver crashed with this exception
when I rebooted the system with the monitor connected.

kernel: ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447)
kernel: ? do_trap (arch/x86/kernel/traps.c:113 arch/x86/kernel/traps.c:154)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? do_error_trap (./arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:175)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? exc_divide_error (arch/x86/kernel/traps.c:194 (discriminator 2))
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: ? asm_exc_divide_error (./arch/x86/include/asm/idtentry.h:548)
kernel: ? setup_dsc_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1053) amdgpu
kernel: dc_dsc_compute_config (drivers/gpu/drm/amd/amdgpu/../display/dc/dsc/dc_dsc.c:1109) amdgpu

After applying this patch, the driver no longer crashes when the monitor
is connected and the system is rebooted. I believe this is the same
issue reported for 3113.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226155">SUSE bug 1226155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36970" ref_url="https://www.suse.com/security/cve/CVE-2024-36970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: Use request_module_nowait

This appears to work around a deadlock regression that came in
with the LED merge in 6.9.

The deadlock happens on my system with 24 iwlwifi radios, so maybe
it something like all worker threads are busy and some work that needs
to complete cannot complete.

[also remove unnecessary "load_module" var and now-wrong comment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36970/">CVE-2024-36970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36970">CVE-2024-36970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226127">SUSE bug 1226127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="TID000021562" ref_url="https://www.suse.com/support/kb/doc/?id=000021562" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

__dst_negative_advice() does not enforce proper RCU rules when
sk-&gt;dst_cache must be cleared, leading to possible UAF.

RCU rules are that we must first clear sk-&gt;sk_dst_cache,
then call dst_release(old_dst).

Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.

Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three -&gt;negative_advice()
existing methods must perform the sk_dst_reset() themselves.

Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.

Many thanks to Clement Lecigne for tracking this issue.

This old bug became visible after the blamed commit, using UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226324">SUSE bug 1226324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36972" ref_url="https://www.suse.com/security/cve/CVE-2024-36972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Update unix_sk(sk)-&gt;oob_skb under sk_receive_queue lock.

Billy Jheng Bing-Jhong reported a race between __unix_gc() and
queue_oob().

__unix_gc() tries to garbage-collect close()d inflight sockets,
and then if the socket has MSG_OOB in unix_sk(sk)-&gt;oob_skb, GC
will drop the reference and set NULL to it locklessly.

However, the peer socket still can send MSG_OOB message and
queue_oob() can update unix_sk(sk)-&gt;oob_skb concurrently, leading
NULL pointer dereference. [0]

To fix the issue, let's update unix_sk(sk)-&gt;oob_skb under the
sk_receive_queue's lock and take it everywhere we touch oob_skb.

Note that we defer kfree_skb() in manage_oob() to silence lockdep
false-positive (See [1]).

[0]:
BUG: kernel NULL pointer dereference, address: 0000000000000008
 PF: supervisor write access in kernel mode
 PF: error_code(0x0002) - not-present page
PGD 8000000009f5e067 P4D 8000000009f5e067 PUD 9f5d067 PMD 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc5-00191-gd091e579b864 #110
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: events delayed_fput
RIP: 0010:skb_dequeue (./include/linux/skbuff.h:2386 ./include/linux/skbuff.h:2402 net/core/skbuff.c:3847)
Code: 39 e3 74 3e 8b 43 10 48 89 ef 83 e8 01 89 43 10 49 8b 44 24 08 49 c7 44 24 08 00 00 00 00 49 8b 14 24 49 c7 04 24 00 00 00 00 &lt;48&gt; 89 42 08 48 89 10 e8 e7 c5 42 00 4c 89 e0 5b 5d 41 5c c3 cc cc
RSP: 0018:ffffc900001bfd48 EFLAGS: 00000002
RAX: 0000000000000000 RBX: ffff8880088f5ae8 RCX: 00000000361289f9
RDX: 0000000000000000 RSI: 0000000000000206 RDI: ffff8880088f5b00
RBP: ffff8880088f5b00 R08: 0000000000080000 R09: 0000000000000001
R10: 0000000000000003 R11: 0000000000000001 R12: ffff8880056b6a00
R13: ffff8880088f5280 R14: 0000000000000001 R15: ffff8880088f5a80
FS:  0000000000000000(0000) GS:ffff88807dd80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000008 CR3: 0000000006314000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 unix_release_sock (net/unix/af_unix.c:654)
 unix_release (net/unix/af_unix.c:1050)
 __sock_release (net/socket.c:660)
 sock_close (net/socket.c:1423)
 __fput (fs/file_table.c:423)
 delayed_fput (fs/file_table.c:444 (discriminator 3))
 process_one_work (kernel/workqueue.c:3259)
 worker_thread (kernel/workqueue.c:3329 kernel/workqueue.c:3416)
 kthread (kernel/kthread.c:388)
 ret_from_fork (arch/x86/kernel/process.c:153)
 ret_from_fork_asm (arch/x86/entry/entry_64.S:257)
 &lt;/TASK&gt;
Modules linked in:
CR2: 0000000000000008
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36972/">CVE-2024-36972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36972">CVE-2024-36972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226163">SUSE bug 1226163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36973" ref_url="https://www.suse.com/security/cve/CVE-2024-36973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()

When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function
gp_auxiliary_device_release() calls ida_free() and
kfree(aux_device_wrapper) to free memory. We should't
call them again in the error handling path.

Fix this by skipping the redundant cleanup functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36973/">CVE-2024-36973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36973">CVE-2024-36973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226457">SUSE bug 1226457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP

If one TCA_TAPRIO_ATTR_PRIOMAP attribute has been provided,
taprio_parse_mqprio_opt() must validate it, or userspace
can inject arbitrary data to the kernel, the second time
taprio_change() is called.

First call (with valid attributes) sets dev-&gt;num_tc
to a non zero value.

Second call (with arbitrary mqprio attributes)
returns early from taprio_parse_mqprio_opt()
and bad things can happen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227371">SUSE bug 1227371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Do not use WARN when encode fails

When asn1_encode_sequence() fails, WARN is not the correct solution.

1. asn1_encode_sequence() is not an internal function (located
   in lib/asn1_encode.c).
2. Location is known, which makes the stack trace useless.
3. Results a crash if panic_on_warn is set.

It is also noteworthy that the use of WARN is undocumented, and it
should be avoided unless there is a carefully considered rationale to
use it.

Replace WARN with pr_err, and print the return value instead, which is
only useful piece of information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226520">SUSE bug 1226520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36976" ref_url="https://www.suse.com/security/cve/CVE-2024-36976" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "media: v4l2-ctrls: show all owned controls in log_status"

This reverts commit 9801b5b28c6929139d6fceeee8d739cc67bb2739.

This patch introduced a potential deadlock scenario:

[Wed May  8 10:02:06 2024]  Possible unsafe locking scenario:

[Wed May  8 10:02:06 2024]        CPU0                    CPU1
[Wed May  8 10:02:06 2024]        ----                    ----
[Wed May  8 10:02:06 2024]   lock(vivid_ctrls:1620:(hdl_vid_cap)-&gt;_lock);
[Wed May  8 10:02:06 2024]                                lock(vivid_ctrls:1608:(hdl_user_vid)-&gt;_lock);
[Wed May  8 10:02:06 2024]                                lock(vivid_ctrls:1620:(hdl_vid_cap)-&gt;_lock);
[Wed May  8 10:02:06 2024]   lock(vivid_ctrls:1608:(hdl_user_vid)-&gt;_lock);

For now just revert.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36976/">CVE-2024-36976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36976">CVE-2024-36976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226511">SUSE bug 1226511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36977" ref_url="https://www.suse.com/security/cve/CVE-2024-36977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Wait unconditionally after issuing EndXfer command

Currently all controller IP/revisions except DWC3_usb3 &gt;= 310a
wait 1ms unconditionally for ENDXFER completion when IOC is not
set. This is because DWC_usb3 controller revisions &gt;= 3.10a
supports GUCTL2[14: Rst_actbitlater] bit which allows polling
CMDACT bit to know whether ENDXFER command is completed.

Consider a case where an IN request was queued, and parallelly
soft_disconnect was called (due to ffs_epfile_release). This
eventually calls stop_active_transfer with IOC cleared, hence
send_gadget_ep_cmd() skips waiting for CMDACT cleared during
EndXfer. For DWC3 controllers with revisions &gt;= 310a, we don't
forcefully wait for 1ms either, and we proceed by unmapping the
requests. If ENDXFER didn't complete by this time, it leads to
SMMU faults since the controller would still be accessing those
requests.

Fix this by ensuring ENDXFER completion by adding 1ms delay in
__dwc3_stop_active_transfer() unconditionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36977/">CVE-2024-36977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36977">CVE-2024-36977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226513">SUSE bug 1226513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: sch_multiq: fix possible OOB write in multiq_tune()

q-&gt;bands will be assigned to qopt-&gt;bands to execute subsequent code logic
after kmalloc. So the old q-&gt;bands should not be used in kmalloc.
Otherwise, an out-of-bounds write will occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36979" ref_url="https://www.suse.com/security/cve/CVE-2024-36979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mst: fix vlan use-after-free

syzbot reported a suspicious rcu usage[1] in bridge's mst code. While
fixing it I noticed that nothing prevents a vlan to be freed while
walking the list from the same path (br forward delay timer). Fix the rcu
usage and also make sure we are not accessing freed memory by making
br_mst_vlan_set_state use rcu read lock.

[1]
 WARNING: suspicious RCU usage
 6.9.0-rc6-syzkaller #0 Not tainted
 -----------------------------
 net/bridge/br_private.h:1599 suspicious rcu_dereference_protected() usage!
 ...
 stack backtrace:
 CPU: 1 PID: 8017 Comm: syz-executor.1 Not tainted 6.9.0-rc6-syzkaller #0
 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 Call Trace:
  &lt;IRQ&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712
  nbp_vlan_group net/bridge/br_private.h:1599 [inline]
  br_mst_set_state+0x1ea/0x650 net/bridge/br_mst.c:105
  br_set_state+0x28a/0x7b0 net/bridge/br_stp.c:47
  br_forward_delay_timer_expired+0x176/0x440 net/bridge/br_stp_timer.c:88
  call_timer_fn+0x18e/0x650 kernel/time/timer.c:1793
  expire_timers kernel/time/timer.c:1844 [inline]
  __run_timers kernel/time/timer.c:2418 [inline]
  __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2429
  run_timer_base kernel/time/timer.c:2438 [inline]
  run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2448
  __do_softirq+0x2c6/0x980 kernel/softirq.c:554
  invoke_softirq kernel/softirq.c:428 [inline]
  __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
  &lt;/IRQ&gt;
  &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
 RIP: 0010:lock_acquire+0x264/0x550 kernel/locking/lockdep.c:5758
 Code: 2b 00 74 08 4c 89 f7 e8 ba d1 84 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 &lt;4b&gt; c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25
 RSP: 0018:ffffc90013657100 EFLAGS: 00000206
 RAX: 0000000000000001 RBX: 1ffff920026cae2c RCX: 0000000000000001
 RDX: dffffc0000000000 RSI: ffffffff8bcaca00 RDI: ffffffff8c1eaa60
 RBP: ffffc90013657260 R08: ffffffff92efe507 R09: 1ffffffff25dfca0
 R10: dffffc0000000000 R11: fffffbfff25dfca1 R12: 1ffff920026cae28
 R13: dffffc0000000000 R14: ffffc90013657160 R15: 0000000000000246
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36979/">CVE-2024-36979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226604">SUSE bug 1226604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227369">SUSE bug 1227369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: manager: add owner module and take its refcount

The current implementation of the fpga manager assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the manager if
the parent device does not have a driver.

To address this problem, add a module owner pointer to the fpga_manager
struct and use it to take the module's refcount. Modify the functions for
registering the manager to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the manager as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a manager without setting the owner.

Also, update the documentation to keep it consistent with the new interface
for registering an fpga manager.

Other changes: opportunistically move put_device() from __fpga_mgr_get() to
fpga_mgr_get() and of_fpga_mgr_get() to improve code clarity since the
manager device is taken in these functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226950">SUSE bug 1226950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37026" ref_url="https://www.suse.com/security/cve/CVE-2024-37026" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Only use reserved BCS instances for usm migrate exec queue

The GuC context scheduling queue is 2 entires deep, thus it is possible
for a migration job to be stuck behind a fault if migration exec queue
shares engines with user jobs. This can deadlock as the migrate exec
queue is required to service page faults. Avoid deadlock by only using
reserved BCS instances for usm migrate exec queue.

(cherry picked from commit 04f4a70a183a688a60fe3882d6e4236ea02cfc67)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-06-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37026/">CVE-2024-37026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37026">CVE-2024-37026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226951">SUSE bug 1226951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential kernel bug due to lack of writeback flag waiting

Destructive writes to a block device on which nilfs2 is mounted can cause
a kernel bug in the folio/page writeback start routine or writeback end
routine (__folio_start_writeback in the log below):

 kernel BUG at mm/page-writeback.c:3070!
 Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
 ...
 RIP: 0010:__folio_start_writeback+0xbaa/0x10e0
 Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff
  e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 &lt;0f&gt;
  0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00
 ...
 Call Trace:
  &lt;TASK&gt;
  nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2]
  nilfs_segctor_construct+0x181/0x6b0 [nilfs2]
  nilfs_segctor_thread+0x548/0x11c0 [nilfs2]
  kthread+0x2f0/0x390
  ret_from_fork+0x4b/0x80
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;

This is because when the log writer starts a writeback for segment summary
blocks or a super root block that use the backing device's page cache, it
does not wait for the ongoing folio/page writeback, resulting in an
inconsistent writeback state.

Fix this issue by waiting for ongoing writebacks when putting
folios/pages on the backing device into writeback state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227066">SUSE bug 1227066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37354</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37354" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix crash on racing fsync and size-extending write into prealloc

We have been seeing crashes on duplicate keys in
btrfs_set_item_key_safe():

  BTRFS critical (device vdb): slot 4 key (450 108 8192) new key (450 108 8192)
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/ctree.c:2620!
  invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 PID: 3139 Comm: xfs_io Kdump: loaded Not tainted 6.9.0 #6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
  RIP: 0010:btrfs_set_item_key_safe+0x11f/0x290 [btrfs]

With the following stack trace:

  #0  btrfs_set_item_key_safe (fs/btrfs/ctree.c:2620:4)
  #1  btrfs_drop_extents (fs/btrfs/file.c:411:4)
  #2  log_one_extent (fs/btrfs/tree-log.c:4732:9)
  #3  btrfs_log_changed_extents (fs/btrfs/tree-log.c:4955:9)
  #4  btrfs_log_inode (fs/btrfs/tree-log.c:6626:9)
  #5  btrfs_log_inode_parent (fs/btrfs/tree-log.c:7070:8)
  #6  btrfs_log_dentry_safe (fs/btrfs/tree-log.c:7171:8)
  #7  btrfs_sync_file (fs/btrfs/file.c:1933:8)
  #8  vfs_fsync_range (fs/sync.c:188:9)
  #9  vfs_fsync (fs/sync.c:202:9)
  #10 do_fsync (fs/sync.c:212:9)
  #11 __do_sys_fdatasync (fs/sync.c:225:9)
  #12 __se_sys_fdatasync (fs/sync.c:223:1)
  #13 __x64_sys_fdatasync (fs/sync.c:223:1)
  #14 do_syscall_x64 (arch/x86/entry/common.c:52:14)
  #15 do_syscall_64 (arch/x86/entry/common.c:83:7)
  #16 entry_SYSCALL_64+0xaf/0x14c (arch/x86/entry/entry_64.S:121)

So we're logging a changed extent from fsync, which is splitting an
extent in the log tree. But this split part already exists in the tree,
triggering the BUG().

This is the state of the log tree at the time of the crash, dumped with
drgn (https://github.com/osandov/drgn/blob/main/contrib/btrfs_tree.py)
to get more details than btrfs_print_leaf() gives us:

  &gt;&gt;&gt; print_extent_buffer(prog.crashed_thread().stack_trace()[0]["eb"])
  leaf 33439744 level 0 items 72 generation 9 owner 18446744073709551610
  leaf 33439744 flags 0x100000000000000
  fs uuid e5bd3946-400c-4223-8923-190ef1f18677
  chunk uuid d58cb17e-6d02-494a-829a-18b7d8a399da
          item 0 key (450 INODE_ITEM 0) itemoff 16123 itemsize 160
                  generation 7 transid 9 size 8192 nbytes 8473563889606862198
                  block group 0 mode 100600 links 1 uid 0 gid 0 rdev 0
                  sequence 204 flags 0x10(PREALLOC)
                  atime 1716417703.220000000 (2024-05-22 15:41:43)
                  ctime 1716417704.983333333 (2024-05-22 15:41:44)
                  mtime 1716417704.983333333 (2024-05-22 15:41:44)
                  otime 17592186044416.000000000 (559444-03-08 01:40:16)
          item 1 key (450 INODE_REF 256) itemoff 16110 itemsize 13
                  index 195 namelen 3 name: 193
          item 2 key (450 XATTR_ITEM 1640047104) itemoff 16073 itemsize 37
                  location key (0 UNKNOWN.0 0) type XATTR
                  transid 7 data_len 1 name_len 6
                  name: user.a
                  data a
          item 3 key (450 EXTENT_DATA 0) itemoff 16020 itemsize 53
                  generation 9 type 1 (regular)
                  extent data disk byte 303144960 nr 12288
                  extent data offset 0 nr 4096 ram 12288
                  extent compression 0 (none)
          item 4 key (450 EXTENT_DATA 4096) itemoff 15967 itemsize 53
                  generation 9 type 2 (prealloc)
                  prealloc data disk byte 303144960 nr 12288
                  prealloc data offset 4096 nr 8192
          item 5 key (450 EXTENT_DATA 8192) itemoff 15914 itemsize 53
                  generation 9 type 2 (prealloc)
                  prealloc data disk byte 303144960 nr 12288
                  prealloc data offset 8192 nr 4096
  ...

So the real problem happened earlier: notice that items 4 (4k-12k) and 5
(8k-12k) overlap. Both are prealloc extents. Item 4 straddles i_size and
item 5 starts at i_size.

Here is the state of 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227101">SUSE bug 1227101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38306" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38306" ref_url="https://www.suse.com/security/cve/CVE-2024-38306" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: protect folio::private when attaching extent buffer folios

[BUG]
Since v6.8 there are rare kernel crashes reported by various people,
the common factor is bad page status error messages like this:

  BUG: Bad page state in process kswapd0  pfn:d6e840
  page: refcount:0 mapcount:0 mapping:000000007512f4f2 index:0x2796c2c7c
  pfn:0xd6e840
  aops:btree_aops ino:1
  flags: 0x17ffffe0000008(uptodate|node=0|zone=2|lastcpupid=0x3fffff)
  page_type: 0xffffffff()
  raw: 0017ffffe0000008 dead000000000100 dead000000000122 ffff88826d0be4c0
  raw: 00000002796c2c7c 0000000000000000 00000000ffffffff 0000000000000000
  page dumped because: non-NULL mapping

[CAUSE]
Commit 09e6cef19c9f ("btrfs: refactor alloc_extent_buffer() to
allocate-then-attach method") changes the sequence when allocating a new
extent buffer.

Previously we always called grab_extent_buffer() under
mapping-&gt;i_private_lock, to ensure the safety on modification on
folio::private (which is a pointer to extent buffer for regular
sectorsize).

This can lead to the following race:

Thread A is trying to allocate an extent buffer at bytenr X, with 4
4K pages, meanwhile thread B is trying to release the page at X + 4K
(the second page of the extent buffer at X).

           Thread A                |                 Thread B
-----------------------------------+-------------------------------------
                                   | btree_release_folio()
				   | | This is for the page at X + 4K,
				   | | Not page X.
				   | |
alloc_extent_buffer()              | |- release_extent_buffer()
|- filemap_add_folio() for the     | |  |- atomic_dec_and_test(eb-&gt;refs)
|  page at bytenr X (the first     | |  |
|  page).                          | |  |
|  Which returned -EEXIST.         | |  |
|                                  | |  |
|- filemap_lock_folio()            | |  |
|  Returned the first page locked. | |  |
|                                  | |  |
|- grab_extent_buffer()            | |  |
|  |- atomic_inc_not_zero()        | |  |
|  |  Returned false               | |  |
|  |- folio_detach_private()       | |  |- folio_detach_private() for X
|     |- folio_test_private()      | |     |- folio_test_private()
      |  Returned true             | |     |  Returned true
      |- folio_put()               |       |- folio_put()

Now there are two puts on the same folio at folio X, leading to refcount
underflow of the folio X, and eventually causing the BUG_ON() on the
page-&gt;mapping.

The condition is not that easy to hit:

- The release must be triggered for the middle page of an eb
  If the release is on the same first page of an eb, page lock would kick
  in and prevent the race.

- folio_detach_private() has a very small race window
  It's only between folio_test_private() and folio_clear_private().

That's exactly when mapping-&gt;i_private_lock is used to prevent such race,
and commit 09e6cef19c9f ("btrfs: refactor alloc_extent_buffer() to
allocate-then-attach method") screwed that up.

At that time, I thought the page lock would kick in as
filemap_release_folio() also requires the page to be locked, but forgot
the filemap_release_folio() only locks one page, not all pages of an
extent buffer.

[FIX]
Move all the code requiring i_private_lock into
attach_eb_folio_to_filemap(), so that everything is done with proper
lock protection.

Furthermore to prevent future problems, add an extra
lockdep_assert_locked() to ensure we're holding the proper lock.

To reproducer that is able to hit the race (takes a few minutes with
instrumented code inserting delays to alloc_extent_buffer()):

  #!/bin/sh
  drop_caches () {
	  while(true); do
		  echo 3 &gt; /proc/sys/vm/drop_caches
		  echo 1 &gt; /proc/sys/vm/compact_memory
	  done
  }

  run_tar () {
	  while(true); do
		  for x in `seq 1 80` ; do
			  tar cf /dev/zero /mnt &gt; /dev/null &amp;
		  done
		  wait
	  done
  }

  mkfs.btrfs -f -d single -m single
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38306/">CVE-2024-38306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38306">CVE-2024-38306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227087">SUSE bug 1227087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38381</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38381" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix uninit-value in nci_rx_work

syzbot reported the following uninit-value access issue [1]

nci_rx_work() parses received packet from ndev-&gt;rx_q. It should be
validated header size, payload size and total packet size before
processing the packet. If an invalid packet is detected, it should be
silently discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226878">SUSE bug 1226878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38384</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38384" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38384" ref_url="https://www.suse.com/security/cve/CVE-2024-38384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix list corruption from reorder of WRITE -&gt;lqueued

__blkcg_rstat_flush() can be run anytime, especially when blk_cgroup_bio_start
is being executed.

If WRITE of `-&gt;lqueued` is re-ordered with READ of 'bisc-&gt;lnode.next' in
the loop of __blkcg_rstat_flush(), `next_bisc` can be assigned with one
stat instance being added in blk_cgroup_bio_start(), then the local
list in __blkcg_rstat_flush() could be corrupted.

Fix the issue by adding one barrier.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38384/">CVE-2024-38384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38384">CVE-2024-38384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226938">SUSE bug 1226938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38385</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38385" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38385" ref_url="https://www.suse.com/security/cve/CVE-2024-38385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/irqdesc: Prevent use-after-free in irq_find_at_or_after()

irq_find_at_or_after() dereferences the interrupt descriptor which is
returned by mt_find() while neither holding sparse_irq_lock nor RCU read
lock, which means the descriptor can be freed between mt_find() and the
dereference:

    CPU0                            CPU1
    desc = mt_find()
                                    delayed_free_desc(desc)
    irq_desc_get_irq(desc)

The use-after-free is reported by KASAN:

    Call trace:
     irq_get_next_irq+0x58/0x84
     show_stat+0x638/0x824
     seq_read_iter+0x158/0x4ec
     proc_reg_read_iter+0x94/0x12c
     vfs_read+0x1e0/0x2c8

    Freed by task 4471:
     slab_free_freelist_hook+0x174/0x1e0
     __kmem_cache_free+0xa4/0x1dc
     kfree+0x64/0x128
     irq_kobj_release+0x28/0x3c
     kobject_put+0xcc/0x1e0
     delayed_free_desc+0x14/0x2c
     rcu_do_batch+0x214/0x720

Guard the access with a RCU read lock section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38385/">CVE-2024-38385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38385">CVE-2024-38385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227085">SUSE bug 1227085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38388</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38388" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup

Use the control private_free callback to free the associated data
block. This ensures that the memory won't leak, whatever way the
control gets destroyed.

The original implementation didn't actually remove the ALSA
controls in hda_cs_dsp_control_remove(). It only freed the internal
tracking structure. This meant it was possible to remove/unload the
amp driver while leaving its ALSA controls still present in the
soundcard. Obviously attempting to access them could cause segfaults
or at least dereferencing stale pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226890">SUSE bug 1226890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38390</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38390" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails

Calling a6xx_destroy() before adreno_gpu_init() leads to a null pointer
dereference on:

msm_gpu_cleanup() : platform_set_drvdata(gpu-&gt;pdev, NULL);

as gpu-&gt;pdev is only assigned in:

a6xx_gpu_init()
|_ adreno_gpu_init
    |_ msm_gpu_init()

Instead of relying on handwavy null checks down the cleanup chain,
explicitly de-allocate the LLC data and free a6xx_gpu instead.

Patchwork: https://patchwork.freedesktop.org/patch/588919/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226891">SUSE bug 1226891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38391</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38391" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38391" ref_url="https://www.suse.com/security/cve/CVE-2024-38391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38391/">CVE-2024-38391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226894">SUSE bug 1226894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: xmit: make sure we have at least eth header len bytes

syzbot triggered an uninit value[1] error in bridge device's xmit path
by sending a short (less than ETH_HLEN bytes) skb. To fix it check if
we can actually pull that amount instead of assuming.

Tested with dropwatch:
 drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)
 origin: software
 timestamp: Mon May 13 11:31:53 2024 778214037 nsec
 protocol: 0x88a8
 length: 2
 original length: 2
 drop reason: PKT_TOO_SMALL

[1]
BUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
 netdev_start_xmit include/linux/netdevice.h:4917 [inline]
 xmit_one net/core/dev.c:3531 [inline]
 dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
 __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 __bpf_tx_skb net/core/filter.c:2136 [inline]
 __bpf_redirect_common net/core/filter.c:2180 [inline]
 __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187
 ____bpf_clone_redirect net/core/filter.c:2460 [inline]
 bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432
 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997
 __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425
 bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058
 bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269
 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765
 x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38539" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38539" ref_url="https://www.suse.com/security/cve/CVE-2024-38539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix kmemleak in rdma_core observed during blktests nvme/rdma use siw

When running blktests nvme/rdma, the following kmemleak issue will appear.

kmemleak: Kernel memory leak detector initialized (mempool available:36041)
kmemleak: Automatic memory scanning thread started
kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak)

unreferenced object 0xffff88855da53400 (size 192):
  comm "rdma", pid 10630, jiffies 4296575922
  hex dump (first 32 bytes):
    37 00 00 00 00 00 00 00 c0 ff ff ff 1f 00 00 00  7...............
    10 34 a5 5d 85 88 ff ff 10 34 a5 5d 85 88 ff ff  .4.].....4.]....
  backtrace (crc 47f66721):
    [&lt;ffffffff911251bd&gt;] kmalloc_trace+0x30d/0x3b0
    [&lt;ffffffffc2640ff7&gt;] alloc_gid_entry+0x47/0x380 [ib_core]
    [&lt;ffffffffc2642206&gt;] add_modify_gid+0x166/0x930 [ib_core]
    [&lt;ffffffffc2643468&gt;] ib_cache_update.part.0+0x6d8/0x910 [ib_core]
    [&lt;ffffffffc2644e1a&gt;] ib_cache_setup_one+0x24a/0x350 [ib_core]
    [&lt;ffffffffc263949e&gt;] ib_register_device+0x9e/0x3a0 [ib_core]
    [&lt;ffffffffc2a3d389&gt;] 0xffffffffc2a3d389
    [&lt;ffffffffc2688cd8&gt;] nldev_newlink+0x2b8/0x520 [ib_core]
    [&lt;ffffffffc2645fe3&gt;] rdma_nl_rcv_msg+0x2c3/0x520 [ib_core]
    [&lt;ffffffffc264648c&gt;]
rdma_nl_rcv_skb.constprop.0.isra.0+0x23c/0x3a0 [ib_core]
    [&lt;ffffffff9270e7b5&gt;] netlink_unicast+0x445/0x710
    [&lt;ffffffff9270f1f1&gt;] netlink_sendmsg+0x761/0xc40
    [&lt;ffffffff9249db29&gt;] __sys_sendto+0x3a9/0x420
    [&lt;ffffffff9249dc8c&gt;] __x64_sys_sendto+0xdc/0x1b0
    [&lt;ffffffff92db0ad3&gt;] do_syscall_64+0x93/0x180
    [&lt;ffffffff92e00126&gt;] entry_SYSCALL_64_after_hwframe+0x71/0x79

The root cause: rdma_put_gid_attr is not called when sgid_attr is set
to ERR_PTR(-ENODEV).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38539/">CVE-2024-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38539">CVE-2024-38539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226608">SUSE bug 1226608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38540" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq

Undefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called
with hwq_attr-&gt;aux_depth != 0 and hwq_attr-&gt;aux_stride == 0.
In that case, "roundup_pow_of_two(hwq_attr-&gt;aux_stride)" gets called.
roundup_pow_of_two is documented as undefined for 0.

Fix it in the one caller that had this combination.

The undefined behavior was detected by UBSAN:
  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13
  shift exponent 64 is too large for 64-bit type 'long unsigned int'
  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4
  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ubsan_epilogue+0x5/0x30
   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec
   __roundup_pow_of_two+0x25/0x35 [bnxt_re]
   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]
   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]
   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __kmalloc+0x1b6/0x4f0
   ? create_qp.part.0+0x128/0x1c0 [ib_core]
   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]
   create_qp.part.0+0x128/0x1c0 [ib_core]
   ib_create_qp_kernel+0x50/0xd0 [ib_core]
   create_mad_qp+0x8e/0xe0 [ib_core]
   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]
   ib_mad_init_device+0x2be/0x680 [ib_core]
   add_client_context+0x10d/0x1a0 [ib_core]
   enable_device_and_get+0xe0/0x1d0 [ib_core]
   ib_register_device+0x53c/0x630 [ib_core]
   ? srso_alias_return_thunk+0x5/0xfbef5
   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]
   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]
   auxiliary_bus_probe+0x49/0x80
   ? driver_sysfs_add+0x57/0xc0
   really_probe+0xde/0x340
   ? pm_runtime_barrier+0x54/0x90
   ? __pfx___driver_attach+0x10/0x10
   __driver_probe_device+0x78/0x110
   driver_probe_device+0x1f/0xa0
   __driver_attach+0xba/0x1c0
   bus_for_each_dev+0x8f/0xe0
   bus_add_driver+0x146/0x220
   driver_register+0x72/0xd0
   __auxiliary_driver_register+0x6e/0xd0
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   do_one_initcall+0x5b/0x310
   do_init_module+0x90/0x250
   init_module_from_file+0x86/0xc0
   idempotent_init_module+0x121/0x2b0
   __x64_sys_finit_module+0x5e/0xb0
   do_syscall_64+0x82/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode_prepare+0x149/0x170
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode+0x75/0x230
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_syscall_64+0x8e/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __count_memcg_events+0x69/0x100
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? count_memcg_events.constprop.0+0x1a/0x30
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? handle_mm_fault+0x1f0/0x300
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_user_addr_fault+0x34e/0x640
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f4e5132821d
  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48
  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d
  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b
  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0
  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d
  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60
   &lt;/TASK&gt;
  ---[ end trace ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226582">SUSE bug 1226582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38541" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: module: add buffer overflow check in of_modalias()

In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227496">SUSE bug 1227496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38542" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38542" ref_url="https://www.suse.com/security/cve/CVE-2024-38542" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mana_ib: boundary check before installing cq callbacks

Add a boundary check inside mana_ib_install_cq_cb to prevent index overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38542/">CVE-2024-38542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38542">CVE-2024-38542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226591">SUSE bug 1226591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38543" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38543" ref_url="https://www.suse.com/security/cve/CVE-2024-38543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure

The kcalloc() in dmirror_device_evict_chunk() will return null if the
physical memory has run out.  As a result, if src_pfns or dst_pfns is
dereferenced, the null pointer dereference bug will happen.

Moreover, the device is going away.  If the kcalloc() fails, the pages
mapping a chunk could not be evicted.  So add a __GFP_NOFAIL flag in
kcalloc().

Finally, as there is no need to have physically contiguous memory, Switch
kcalloc() to kvcalloc() in order to avoid failing allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38543/">CVE-2024-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226594">SUSE bug 1226594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38544" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt

In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the
resp_pkts queue and then a decision is made whether to run the completer
task inline or schedule it. Finally the skb is dereferenced to bump a 'hw'
performance counter. This is wrong because if the completer task is
already running in a separate thread it may have already processed the skb
and freed it which can cause a seg fault.  This has been observed
infrequently in testing at high scale.

This patch fixes this by changing the order of enqueuing the packet until
after the counter is accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226597">SUSE bug 1226597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix UAF for cq async event

The refcount of CQ is not protected by locks. When CQ asynchronous
events and CQ destruction are concurrent, CQ may have been released,
which will cause UAF.

Use the xa_lock() to protect the CQ refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: vc4: Fix possible null pointer dereference

In vc4_hdmi_audio_init() of_get_address() may return
NULL which is later dereferenced. Fix this bug by adding NULL check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226593">SUSE bug 1226593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38547" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries

The allocation failure of mycs-&gt;yuv_scaler_binary in load_video_binaries()
is followed with a dereference of mycs-&gt;yuv_scaler_binary after the
following call chain:

sh_css_pipe_load_binaries()
  |-&gt; load_video_binaries(mycs-&gt;yuv_scaler_binary == NULL)
  |
  |-&gt; sh_css_pipe_unload_binaries()
        |-&gt; unload_video_binaries()

In unload_video_binaries(), it calls to ia_css_binary_unload with argument
&amp;pipe-&gt;pipe_settings.video.yuv_scaler_binary[i], which refers to the
same memory slot as mycs-&gt;yuv_scaler_binary. Thus, a null-pointer
dereference is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226632">SUSE bug 1226632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38548" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference

In cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is
assigned to mhdp_state-&gt;current_mode, and there is a dereference of it in
drm_mode_set_name(), which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate().

Fix this bug add a check of mhdp_state-&gt;current_mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228202">SUSE bug 1228202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Add 0 size check to mtk_drm_gem_obj

Add a check to mtk_drm_gem_init if we attempt to allocate a GEM object
of 0 bytes. Currently, no such check exists and the kernel will panic if
a userspace application attempts to allocate a 0x0 GBM buffer.

Tested by attempting to allocate a 0x0 GBM buffer on an MT8188 and
verifying that we now return EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226735">SUSE bug 1226735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38550" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: kirkwood: Fix potential NULL dereference

In kirkwood_dma_hw_params() mv_mbus_dram_info() returns NULL if
CONFIG_PLAT_ORION macro is not defined.
Fix this bug by adding NULL check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226633">SUSE bug 1226633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38551" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38551" ref_url="https://www.suse.com/security/cve/CVE-2024-38551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: Assign dummy when codec not specified for a DAI link

MediaTek sound card drivers are checking whether a DAI link is present
and used on a board to assign the correct parameters and this is done
by checking the codec DAI names at probe time.

If no real codec is present, assign the dummy codec to the DAI link
to avoid NULL pointer during string comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38551/">CVE-2024-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38551">CVE-2024-38551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226761">SUSE bug 1226761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38552" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential index out of bounds in color transformation function

Fixes index out of bounds issue in the color transformation function.
The issue could occur when the index 'i' exceeds the number of transfer
function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, an error message is
logged and the function returns false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226767">SUSE bug 1226767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fec: remove .ndo_poll_controller to avoid deadlocks

There is a deadlock issue found in sungem driver, please refer to the
commit ac0a230f719b ("eth: sungem: remove .ndo_poll_controller to avoid
deadlocks"). The root cause of the issue is that netpoll is in atomic
context and disable_irq() is called by .ndo_poll_controller interface
of sungem driver, however, disable_irq() might sleep. After analyzing
the implementation of fec_poll_controller(), the fec driver should have
the same issue. Due to the fec driver uses NAPI for TX completions, the
.ndo_poll_controller is unnecessary to be implemented in the fec driver,
so fec_poll_controller() can be safely removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226744">SUSE bug 1226744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38554" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix reference count leak issue of net_device

There is a reference count leak issue of the object "net_device" in
ax25_dev_device_down(). When the ax25 device is shutting down, the
ax25_dev_device_down() drops the reference count of net_device one
or zero times depending on if we goto unlock_put or not, which will
cause memory leak.

In order to solve the above issue, decrease the reference count of
net_device after dev-&gt;ax25_ptr is set to null.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226742">SUSE bug 1226742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38555" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Discard command completions in internal error

Fix use after free when FW completion arrives while device is in
internal error state. Avoid calling completion handler in this case,
since the device will flush the command interface and trigger all
completions manually.

Kernel log:
------------[ cut here ]------------
refcount_t: underflow; use-after-free.
...
RIP: 0010:refcount_warn_saturate+0xd8/0xe0
...
Call Trace:
&lt;IRQ&gt;
? __warn+0x79/0x120
? refcount_warn_saturate+0xd8/0xe0
? report_bug+0x17c/0x190
? handle_bug+0x3c/0x60
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? refcount_warn_saturate+0xd8/0xe0
cmd_ent_put+0x13b/0x160 [mlx5_core]
mlx5_cmd_comp_handler+0x5f9/0x670 [mlx5_core]
cmd_comp_notifier+0x1f/0x30 [mlx5_core]
notifier_call_chain+0x35/0xb0
atomic_notifier_call_chain+0x16/0x20
mlx5_eq_async_int+0xf6/0x290 [mlx5_core]
notifier_call_chain+0x35/0xb0
atomic_notifier_call_chain+0x16/0x20
irq_int_handler+0x19/0x30 [mlx5_core]
__handle_irq_event_percpu+0x4b/0x160
handle_irq_event+0x2e/0x80
handle_edge_irq+0x98/0x230
__common_interrupt+0x3b/0xa0
common_interrupt+0x7b/0xa0
&lt;/IRQ&gt;
&lt;TASK&gt;
asm_common_interrupt+0x22/0x40
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Add a timeout to acquire the command queue semaphore

Prevent forced completion handling on an entry that has not yet been
assigned an index, causing an out of bounds access on idx = -22.
Instead of waiting indefinitely for the sem, blocking flow now waits for
index to be allocated or a sem acquisition timeout before beginning the
timer for FW completion.

Kernel log example:
mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226774">SUSE bug 1226774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38557" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Reload only IB representors upon lag disable/enable

On lag disable, the bond IB device along with all of its
representors are destroyed, and then the slaves' representors get reloaded.

In case the slave IB representor load fails, the eswitch error flow
unloads all representors, including ethernet representors, where the
netdevs get detached and removed from lag bond. Such flow is inaccurate
as the lag driver is not responsible for loading/unloading ethernet
representors. Furthermore, the flow described above begins by holding
lag lock to prevent bond changes during disable flow. However, when
reaching the ethernet representors detachment from lag, the lag lock is
required again, triggering the following deadlock:

Call trace:
__switch_to+0xf4/0x148
__schedule+0x2c8/0x7d0
schedule+0x50/0xe0
schedule_preempt_disabled+0x18/0x28
__mutex_lock.isra.13+0x2b8/0x570
__mutex_lock_slowpath+0x1c/0x28
mutex_lock+0x4c/0x68
mlx5_lag_remove_netdev+0x3c/0x1a0 [mlx5_core]
mlx5e_uplink_rep_disable+0x70/0xa0 [mlx5_core]
mlx5e_detach_netdev+0x6c/0xb0 [mlx5_core]
mlx5e_netdev_change_profile+0x44/0x138 [mlx5_core]
mlx5e_netdev_attach_nic_profile+0x28/0x38 [mlx5_core]
mlx5e_vport_rep_unload+0x184/0x1b8 [mlx5_core]
mlx5_esw_offloads_rep_load+0xd8/0xe0 [mlx5_core]
mlx5_eswitch_reload_reps+0x74/0xd0 [mlx5_core]
mlx5_disable_lag+0x130/0x138 [mlx5_core]
mlx5_lag_disable_change+0x6c/0x70 [mlx5_core] // hold ldev-&gt;lock
mlx5_devlink_eswitch_mode_set+0xc0/0x410 [mlx5_core]
devlink_nl_cmd_eswitch_set_doit+0xdc/0x180
genl_family_rcv_msg_doit.isra.17+0xe8/0x138
genl_rcv_msg+0xe4/0x220
netlink_rcv_skb+0x44/0x108
genl_rcv+0x40/0x58
netlink_unicast+0x198/0x268
netlink_sendmsg+0x1d4/0x418
sock_sendmsg+0x54/0x60
__sys_sendto+0xf4/0x120
__arm64_sys_sendto+0x30/0x40
el0_svc_common+0x8c/0x120
do_el0_svc+0x30/0xa0
el0_svc+0x20/0x30
el0_sync_handler+0x90/0xb8
el0_sync+0x160/0x180

Thus, upon lag enable/disable, load and unload only the IB representors
of the slaves preventing the deadlock mentioned above.

While at it, refactor the mlx5_esw_offloads_rep_load() function to have
a static helper method for its internal logic, in symmetry with the
representor unload design.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226781">SUSE bug 1226781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix overwriting ct original tuple for ICMPv6

OVS_PACKET_CMD_EXECUTE has 3 main attributes:
 - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.
 - OVS_PACKET_ATTR_PACKET - Binary packet content.
 - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.

OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure
with the metadata like conntrack state, input port, recirculation id,
etc.  Then the packet itself gets parsed to populate the rest of the
keys from the packet headers.

Whenever the packet parsing code starts parsing the ICMPv6 header, it
first zeroes out fields in the key corresponding to Neighbor Discovery
information even if it is not an ND packet.

It is an 'ipv6.nd' field.  However, the 'ipv6' is a union that shares
the space between 'nd' and 'ct_orig' that holds the original tuple
conntrack metadata parsed from the OVS_PACKET_ATTR_KEY.

ND packets should not normally have conntrack state, so it's fine to
share the space, but normal ICMPv6 Echo packets or maybe other types of
ICMPv6 can have the state attached and it should not be overwritten.

The issue results in all but the last 4 bytes of the destination
address being wiped from the original conntrack tuple leading to
incorrect packet matching and potentially executing wrong actions
in case this packet recirculates within the datapath or goes back
to userspace.

ND fields should not be accessed in non-ND packets, so not clearing
them should be fine.  Executing memset() only for actual ND packets to
avoid the issue.

Initializing the whole thing before parsing is needed because ND packet
may not contain all the options.

The issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't
affect packets entering OVS datapath from network interfaces, because
in this case CT metadata is populated from skb after the packet is
already parsed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226783">SUSE bug 1226783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count from
userspace to that buffer. Later, we use kstrtouint on this buffer but we
don't ensure that the string is terminated inside the buffer, this can
lead to OOB read when using kstrtouint. Fix this issue by using
memdup_user_nul instead of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227495">SUSE bug 1227495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38560" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Ensure the copied buf is NUL terminated

Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from
userspace to that buffer. Later, we use sscanf on this buffer but we don't
ensure that the string is terminated inside the buffer, this can lead to
OOB read when using sscanf. Fix this issue by using memdup_user_nul instead
of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227319">SUSE bug 1227319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38561" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38561" ref_url="https://www.suse.com/security/cve/CVE-2024-38561" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit: Fix kthread reference

There is a race condition when a kthread finishes after the deadline and
before the call to kthread_stop(), which may lead to use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38561/">CVE-2024-38561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38561">CVE-2024-38561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226736">SUSE bug 1226736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38562" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38562" ref_url="https://www.suse.com/security/cve/CVE-2024-38562" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: Avoid address calculations via out of bounds array indexing

Before request-&gt;channels[] can be used, request-&gt;n_channels must be set.
Additionally, address calculations for memory after the "channels" array
need to be calculated from the allocation base ("request") rather than
via the first "out of bounds" index of "channels", otherwise run-time
bounds checking will throw a warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38562/">CVE-2024-38562 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226788">SUSE bug 1226788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38563" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38563" ref_url="https://www.suse.com/security/cve/CVE-2024-38563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature

Without this commit, reading chip temperature will cause memory leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38563/">CVE-2024-38563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38563">CVE-2024-38563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226743">SUSE bug 1226743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE

bpf_prog_attach uses attach_type_to_prog_type to enforce proper
attach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses
bpf_prog_get and relies on bpf_prog_attach_check_attach_type
to properly verify prog_type &lt;&gt; attach_type association.

Add missing attach_type enforcement for the link_create case.
Otherwise, it's currently possible to attach cgroup_skb prog
types to other cgroup hooks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228730">SUSE bug 1228730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ar5523: enable proper endpoint verification

Syzkaller reports [1] hitting a warning about an endpoint in use
not having an expected type to it.

Fix the issue by checking for the existence of all proper
endpoints with their according types intact.

Sadly, this patch has not been tested on real hardware.

[1] Syzkaller report:
------------[ cut here ]------------
usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 &lt;TASK&gt;
 ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275
 ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]
 ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]
 ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655
 usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:560 [inline]
 really_probe+0x249/0xb90 drivers/base/dd.c:639
 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808
 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936
 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427
 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008
 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487
 device_add+0xbd9/0x1e90 drivers/base/core.c:3517
 usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170
 usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238
 usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293
 call_driver_probe drivers/base/dd.c:560 [inline]
 really_probe+0x249/0xb90 drivers/base/dd.c:639
 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808
 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936
 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427
 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008
 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487
 device_add+0xbd9/0x1e90 drivers/base/core.c:3517
 usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573
 hub_port_connect drivers/usb/core/hub.c:5353 [inline]
 hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]
 port_event drivers/usb/core/hub.c:5653 [inline]
 hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735
 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
 worker_thread+0x669/0x1090 kernel/workqueue.c:2436
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226747">SUSE bug 1226747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38566" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38566" ref_url="https://www.suse.com/security/cve/CVE-2024-38566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix verifier assumptions about socket-&gt;sk

The verifier assumes that 'sk' field in 'struct socket' is valid
and non-NULL when 'socket' pointer itself is trusted and non-NULL.
That may not be the case when socket was just created and
passed to LSM socket_accept hook.
Fix this verifier assumption and adjust tests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38566/">CVE-2024-38566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38566">CVE-2024-38566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226790">SUSE bug 1226790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38568" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group

The perf tool allows users to create event groups through following
cmd [1], but the driver does not check whether the array index is out
of bounds when writing data to the event_group array. If the number of
events in an event_group is greater than HNS3_PMU_MAX_HW_EVENTS, the
memory write overflow of event_group array occurs.

Add array index check to fix the possible array out of bounds violation,
and return directly when write new events are written to array bounds.

There are 9 different events in an event_group.
[1] perf stat -e '{pmu/event1/, ... ,pmu/event9/}
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226771">SUSE bug 1226771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38569" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38569" ref_url="https://www.suse.com/security/cve/CVE-2024-38569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi_pcie: Fix out-of-bound access when valid event group

The perf tool allows users to create event groups through following
cmd [1], but the driver does not check whether the array index is out of
bounds when writing data to the event_group array. If the number of events
in an event_group is greater than HISI_PCIE_MAX_COUNTERS, the memory write
overflow of event_group array occurs.

Add array index check to fix the possible array out of bounds violation,
and return directly when write new events are written to array bounds.

There are 9 different events in an event_group.
[1] perf stat -e '{pmu/event1/, ... ,pmu/event9/}'
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38569/">CVE-2024-38569 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38569">CVE-2024-38569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226772">SUSE bug 1226772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix potential glock use-after-free on unmount

When a DLM lockspace is released and there ares still locks in that
lockspace, DLM will unlock those locks automatically.  Commit
fb6791d100d1b started exploiting this behavior to speed up filesystem
unmount: gfs2 would simply free glocks it didn't want to unlock and then
release the lockspace.  This didn't take the bast callbacks for
asynchronous lock contention notifications into account, which remain
active until until a lock is unlocked or its lockspace is released.

To prevent those callbacks from accessing deallocated objects, put the
glocks that should not be unlocked on the sd_dead_glocks list, release
the lockspace, and only then free those glocks.

As an additional measure, ignore unexpected ast and bast callbacks if
the receiving glock is dead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226775">SUSE bug 1226775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38571" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/tsens: Fix null pointer dereference

compute_intercept_slope() is called from calibrate_8960() (in tsens-8960.c)
as compute_intercept_slope(priv, p1, NULL, ONE_PT_CALIB) which lead to null
pointer dereference (if DEBUG or DYNAMIC_DEBUG set).
Fix this bug by adding null pointer check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226737">SUSE bug 1226737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38572" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38572" ref_url="https://www.suse.com/security/cve/CVE-2024-38572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix out-of-bound access of qmi_invoke_handler()

Currently, there is no terminator entry for ath12k_qmi_msg_handlers hence
facing below KASAN warning,

 ==================================================================
 BUG: KASAN: global-out-of-bounds in qmi_invoke_handler+0xa4/0x148
 Read of size 8 at addr ffffffd00a6428d8 by task kworker/u8:2/1273

 CPU: 0 PID: 1273 Comm: kworker/u8:2 Not tainted 5.4.213 #0
 Workqueue: qmi_msg_handler qmi_data_ready_work
 Call trace:
  dump_backtrace+0x0/0x20c
  show_stack+0x14/0x1c
  dump_stack+0xe0/0x138
  print_address_description.isra.5+0x30/0x330
  __kasan_report+0x16c/0x1bc
  kasan_report+0xc/0x14
  __asan_load8+0xa8/0xb0
  qmi_invoke_handler+0xa4/0x148
  qmi_handle_message+0x18c/0x1bc
  qmi_data_ready_work+0x4ec/0x528
  process_one_work+0x2c0/0x440
  worker_thread+0x324/0x4b8
  kthread+0x210/0x228
  ret_from_fork+0x10/0x18

 The address belongs to the variable:
  ath12k_mac_mon_status_filter_default+0x4bd8/0xfffffffffffe2300 [ath12k]
 [...]
 ==================================================================

Add a dummy terminator entry at the end to assist the qmi_invoke_handler()
in traversing up to the terminator entry without accessing an
out-of-boundary index.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38572/">CVE-2024-38572 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38572">CVE-2024-38572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226776">SUSE bug 1226776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cppc_cpufreq: Fix possible null pointer dereference

cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from
different places with various parameters. So cpufreq_cpu_get() can return
null as 'policy' in some circumstances.
Fix this bug by adding null return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226739">SUSE bug 1226739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38574" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38574" ref_url="https://www.suse.com/security/cve/CVE-2024-38574" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libbpf: Prevent null-pointer dereference when prog to load has no BTF

In bpf_objec_load_prog(), there's no guarantee that obj-&gt;btf is non-NULL
when passing it to btf__fd(), and this function does not perform any
check before dereferencing its argument (as bpf_object__btf_fd() used to
do). As a consequence, we get segmentation fault errors in bpftool (for
example) when trying to load programs that come without BTF information.

v2: Keep btf__fd() in the fix instead of reverting to bpf_object__btf_fd().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38574/">CVE-2024-38574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38574">CVE-2024-38574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226655">SUSE bug 1226655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38575" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38575" ref_url="https://www.suse.com/security/cve/CVE-2024-38575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: pcie: handle randbuf allocation failure

The kzalloc() in brcmf_pcie_download_fw_nvram() will return null
if the physical memory has run out. As a result, if we use
get_random_bytes() to generate random bytes in the randbuf, the
null pointer dereference bug will happen.

In order to prevent allocation failure, this patch adds a separate
function using buffer on kernel stack to generate random bytes in
the randbuf, which could prevent the kernel stack from overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38575/">CVE-2024-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226612">SUSE bug 1226612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38576" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38576" ref_url="https://www.suse.com/security/cve/CVE-2024-38576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix buffer overflow in print_cpu_stall_info()

The rcuc-starvation output from print_cpu_stall_info() might overflow the
buffer if there is a huge difference in jiffies difference.  The situation
might seem improbable, but computers sometimes get very confused about
time, which can result in full-sized integers, and, in this case,
buffer overflow.

Also, the unsigned jiffies difference is printed using %ld, which is
normally for signed integers.  This is intentional for debugging purposes,
but it is not obvious from the code.

This commit therefore changes sprintf() to snprintf() and adds a
clarifying comment about intention of %ld format.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38576/">CVE-2024-38576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38576">CVE-2024-38576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226623">SUSE bug 1226623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38577" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow

There is a possibility of buffer overflow in
show_rcu_tasks_trace_gp_kthread() if counters, passed
to sprintf() are huge. Counter numbers, needed for this
are unrealistically high, but buffer overflow is still
possible.

Use snprintf() with buffer size instead of sprintf().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38578" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ecryptfs: Fix buffer size for tag 66 packet

The 'TAG 66 Packet Format' description is missing the cipher code and
checksum fields that are packed into the message packet. As a result,
the buffer allocated for the packet is 3 bytes too small and
write_tag_66_packet() will write up to 3 bytes past the end of the
buffer.

Fix this by increasing the size of the allocation so the whole packet
will always fit in the buffer.

This fixes the below kasan slab-out-of-bounds bug:

  BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0
  Write of size 1 at addr ffff88800afbb2a5 by task touch/181

  CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x4c/0x70
   print_report+0xc5/0x610
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   ? kasan_complete_mode_report_info+0x44/0x210
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   kasan_report+0xc2/0x110
   ? ecryptfs_generate_key_packet_set+0x7d6/0xde0
   __asan_store1+0x62/0x80
   ecryptfs_generate_key_packet_set+0x7d6/0xde0
   ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10
   ? __alloc_pages+0x2e2/0x540
   ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d]
   ? dentry_open+0x8f/0xd0
   ecryptfs_write_metadata+0x30a/0x550
   ? __pfx_ecryptfs_write_metadata+0x10/0x10
   ? ecryptfs_get_lower_file+0x6b/0x190
   ecryptfs_initialize_file+0x77/0x150
   ecryptfs_create+0x1c2/0x2f0
   path_openat+0x17cf/0x1ba0
   ? __pfx_path_openat+0x10/0x10
   do_filp_open+0x15e/0x290
   ? __pfx_do_filp_open+0x10/0x10
   ? __kasan_check_write+0x18/0x30
   ? _raw_spin_lock+0x86/0xf0
   ? __pfx__raw_spin_lock+0x10/0x10
   ? __kasan_check_write+0x18/0x30
   ? alloc_fd+0xf4/0x330
   do_sys_openat2+0x122/0x160
   ? __pfx_do_sys_openat2+0x10/0x10
   __x64_sys_openat+0xef/0x170
   ? __pfx___x64_sys_openat+0x10/0x10
   do_syscall_64+0x60/0xd0
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8
  RIP: 0033:0x7f00a703fd67
  Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f
  RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
  RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67
  RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c
  RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000
  R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941
  R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040
   &lt;/TASK&gt;

  Allocated by task 181:
   kasan_save_stack+0x2f/0x60
   kasan_set_track+0x29/0x40
   kasan_save_alloc_info+0x25/0x40
   __kasan_kmalloc+0xc5/0xd0
   __kmalloc+0x66/0x160
   ecryptfs_generate_key_packet_set+0x6d2/0xde0
   ecryptfs_write_metadata+0x30a/0x550
   ecryptfs_initialize_file+0x77/0x150
   ecryptfs_create+0x1c2/0x2f0
   path_openat+0x17cf/0x1ba0
   do_filp_open+0x15e/0x290
   do_sys_openat2+0x122/0x160
   __x64_sys_openat+0xef/0x170
   do_syscall_64+0x60/0xd0
   entry_SYSCALL_64_after_hwframe+0x6e/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: bcm - Fix pointer arithmetic

In spu2_dump_omd() value of ptr is increased by ciph_key_len
instead of hash_iv_len which could lead to going beyond the
buffer boundaries.
Fix this bug by changing ciph_key_len to hash_iv_len.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226637">SUSE bug 1226637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

epoll: be better about file lifetimes

epoll can call out to vfs_poll() with a file pointer that may race with
the last 'fput()'. That would make f_count go down to zero, and while
the ep-&gt;mtx locking means that the resulting file pointer tear-down will
be blocked until the poll returns, it means that f_count is already
dead, and any use of it won't actually get a reference to the file any
more: it's dead regardless.

Make sure we have a valid ref on the file pointer before we call down to
vfs_poll() from the epoll routines.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226610">SUSE bug 1226610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38581" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/mes: fix use-after-free issue

Delete fence fallback timer to fix the ramdom
use-after-free issue.

v2: move to amdgpu_mes.c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226657">SUSE bug 1226657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential hang in nilfs_detach_log_writer()

Syzbot has reported a potential hang in nilfs_detach_log_writer() called
during nilfs2 unmount.

Analysis revealed that this is because nilfs_segctor_sync(), which
synchronizes with the log writer thread, can be called after
nilfs_segctor_destroy() terminates that thread, as shown in the call trace
below:

nilfs_detach_log_writer
  nilfs_segctor_destroy
    nilfs_segctor_kill_thread  --&gt; Shut down log writer thread
    flush_work
      nilfs_iput_work_func
        nilfs_dispose_list
          iput
            nilfs_evict_inode
              nilfs_transaction_commit
                nilfs_construct_segment (if inode needs sync)
                  nilfs_segctor_sync  --&gt; Attempt to synchronize with
                                          log writer thread
                           *** DEADLOCK ***

Fix this issue by changing nilfs_segctor_sync() so that the log writer
thread returns normally without synchronizing after it terminates, and by
forcing tasks that are already waiting to complete once after the thread
terminates.

The skipped inode metadata flushout will then be processed together in the
subsequent cleanup work in nilfs_segctor_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226658">SUSE bug 1226658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38583" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix use-after-free of timer for log writer thread

Patch series "nilfs2: fix log writer related issues".

This bug fix series covers three nilfs2 log writer-related issues,
including a timer use-after-free issue and potential deadlock issue on
unmount, and a potential freeze issue in event synchronization found
during their analysis.  Details are described in each commit log.


This patch (of 3):

A use-after-free issue has been reported regarding the timer sc_timer on
the nilfs_sc_info structure.

The problem is that even though it is used to wake up a sleeping log
writer thread, sc_timer is not shut down until the nilfs_sc_info structure
is about to be freed, and is used regardless of the thread's lifetime.

Fix this issue by limiting the use of sc_timer only while the log writer
thread is alive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226777">SUSE bug 1226777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227286">SUSE bug 1227286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38584" ref_url="https://www.suse.com/security/cve/CVE-2024-38584" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ti: icssg_prueth: Fix NULL pointer dereference in prueth_probe()

In the prueth_probe() function, if one of the calls to emac_phy_connect()
fails due to of_phy_connect() returning NULL, then the subsequent call to
phy_attached_info() will dereference a NULL pointer.

Check the return code of emac_phy_connect and fail cleanly if there is an
error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38584/">CVE-2024-38584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38584">CVE-2024-38584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226627">SUSE bug 1226627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38585" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38585" ref_url="https://www.suse.com/security/cve/CVE-2024-38585" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tools/nolibc/stdlib: fix memory error in realloc()

Pass user_p_len to memcpy() instead of heap-&gt;len to prevent realloc()
from copying an extra sizeof(heap) bytes from beyond the allocated
region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38585/">CVE-2024-38585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38585">CVE-2024-38585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226778">SUSE bug 1226778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: Fix possible ring buffer corruption on fragmented Tx packets.

An issue was found on the RTL8125b when transmitting small fragmented
packets, whereby invalid entries were inserted into the transmit ring
buffer, subsequently leading to calls to dma_unmap_single() with a null
address.

This was caused by rtl8169_start_xmit() not noticing changes to nr_frags
which may occur when small packets are padded (to work around hardware
quirks) in rtl8169_tso_csum_v2().

To fix this, postpone inspecting nr_frags until after any padding has been
applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226750">SUSE bug 1226750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38587" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

speakup: Fix sizeof() vs ARRAY_SIZE() bug

The "buf" pointer is an array of u16 values.  This code should be
using ARRAY_SIZE() (which is 256) instead of sizeof() (which is 512),
otherwise it can the still got out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226780">SUSE bug 1226780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38588" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix possible use-after-free issue in ftrace_location()

KASAN reports a bug:

  BUG: KASAN: use-after-free in ftrace_location+0x90/0x120
  Read of size 8 at addr ffff888141d40010 by task insmod/424
  CPU: 8 PID: 424 Comm: insmod Tainted: G        W          6.9.0-rc2+
  [...]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x68/0xa0
   print_report+0xcf/0x610
   kasan_report+0xb5/0xe0
   ftrace_location+0x90/0x120
   register_kprobe+0x14b/0xa40
   kprobe_init+0x2d/0xff0 [kprobe_example]
   do_one_initcall+0x8f/0x2d0
   do_init_module+0x13a/0x3c0
   load_module+0x3082/0x33d0
   init_module_from_file+0xd2/0x130
   __x64_sys_finit_module+0x306/0x440
   do_syscall_64+0x68/0x140
   entry_SYSCALL_64_after_hwframe+0x71/0x79

The root cause is that, in lookup_rec(), ftrace record of some address
is being searched in ftrace pages of some module, but those ftrace pages
at the same time is being freed in ftrace_release_mod() as the
corresponding module is being deleted:

           CPU1                       |      CPU2
  register_kprobes() {                | delete_module() {
    check_kprobe_address_safe() {     |
      arch_check_ftrace_location() {  |
        ftrace_location() {           |
          lookup_rec() // USE!        |   ftrace_release_mod() // Free!

To fix this issue:
  1. Hold rcu lock as accessing ftrace pages in ftrace_location_range();
  2. Use ftrace_location_range() instead of lookup_rec() in
     ftrace_location();
  3. Call synchronize_rcu() before freeing any ftrace pages both in
     ftrace_process_locs()/ftrace_release_mod()/ftrace_free_mem().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226837">SUSE bug 1226837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38590" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Modify the print level of CQE error

Too much print may lead to a panic in kernel. Change ibdev_err() to
ibdev_err_ratelimited(), and change the printing level of cqe dump
to debug level.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226839">SUSE bug 1226839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix deadlock on SRQ async events.

xa_lock for SRQ table may be required in AEQ. Use xa_store_irq()/
xa_erase_irq() to avoid deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226738">SUSE bug 1226738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38592" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38592" ref_url="https://www.suse.com/security/cve/CVE-2024-38592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Init `ddp_comp` with devm_kcalloc()

In the case where `conn_routes` is true we allocate an extra slot in
the `ddp_comp` array but mtk_drm_crtc_create() never seemed to
initialize it in the test case I ran. For me, this caused a later
crash when we looped through the array in mtk_drm_crtc_mode_valid().
This showed up for me when I booted with `slub_debug=FZPUA` which
poisons the memory initially. Without `slub_debug` I couldn't
reproduce, presumably because the later code handles the value being
NULL and in most cases (not guaranteed in all cases) the memory the
allocator returned started out as 0.

It really doesn't hurt to initialize the array with devm_kcalloc()
since the array is small and the overhead of initting a handful of
elements to 0 is small. In general initting memory to zero is a safer
practice and usually it's suggested to only use the non-initting alloc
functions if you really need to.

Let's switch the function to use an allocation function that zeros the
memory. For me, this avoids the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38592/">CVE-2024-38592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38592">CVE-2024-38592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226844">SUSE bug 1226844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38593" ref_url="https://www.suse.com/security/cve/CVE-2024-38593" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: micrel: Fix receiving the timestamp in the frame for lan8841

The blamed commit started to use the ptp workqueue to get the second
part of the timestamp. And when the port was set down, then this
workqueue is stopped. But if the config option NETWORK_PHY_TIMESTAMPING
is not enabled, then the ptp_clock is not initialized so then it would
crash when it would try to access the delayed work.
So then basically by setting up and then down the port, it would crash.
The fix consists in checking if the ptp_clock is initialized and only
then cancel the delayed work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38593/">CVE-2024-38593 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38593">CVE-2024-38593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226726">SUSE bug 1226726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38594" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: move the EST lock to struct stmmac_priv

Reinitialize the whole EST structure would also reset the mutex
lock which is embedded in the EST structure, and then trigger
the following warning. To address this, move the lock to struct
stmmac_priv. We also need to reacquire the mutex lock when doing
this initialization.

DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
WARNING: CPU: 3 PID: 505 at kernel/locking/mutex.c:587 __mutex_lock+0xd84/0x1068
 Modules linked in:
 CPU: 3 PID: 505 Comm: tc Not tainted 6.9.0-rc6-00053-g0106679839f7-dirty #29
 Hardware name: NXP i.MX8MPlus EVK board (DT)
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __mutex_lock+0xd84/0x1068
 lr : __mutex_lock+0xd84/0x1068
 sp : ffffffc0864e3570
 x29: ffffffc0864e3570 x28: ffffffc0817bdc78 x27: 0000000000000003
 x26: ffffff80c54f1808 x25: ffffff80c9164080 x24: ffffffc080d723ac
 x23: 0000000000000000 x22: 0000000000000002 x21: 0000000000000000
 x20: 0000000000000000 x19: ffffffc083bc3000 x18: ffffffffffffffff
 x17: ffffffc08117b080 x16: 0000000000000002 x15: ffffff80d2d40000
 x14: 00000000000002da x13: ffffff80d2d404b8 x12: ffffffc082b5a5c8
 x11: ffffffc082bca680 x10: ffffffc082bb2640 x9 : ffffffc082bb2698
 x8 : 0000000000017fe8 x7 : c0000000ffffefff x6 : 0000000000000001
 x5 : ffffff8178fe0d48 x4 : 0000000000000000 x3 : 0000000000000027
 x2 : ffffff8178fe0d50 x1 : 0000000000000000 x0 : 0000000000000000
 Call trace:
  __mutex_lock+0xd84/0x1068
  mutex_lock_nested+0x28/0x34
  tc_setup_taprio+0x118/0x68c
  stmmac_setup_tc+0x50/0xf0
  taprio_change+0x868/0xc9c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226734">SUSE bug 1226734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38595" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38595" ref_url="https://www.suse.com/security/cve/CVE-2024-38595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix peer devlink set for SF representor devlink port

The cited patch change register devlink flow, and neglect to reflect
the changes for peer devlink set logic. Peer devlink set is
triggering a call trace if done after devl_register.[1]

Hence, align peer devlink set logic with register devlink flow.

[1]
WARNING: CPU: 4 PID: 3394 at net/devlink/core.c:155 devlink_rel_nested_in_add+0x177/0x180
CPU: 4 PID: 3394 Comm: kworker/u40:1 Not tainted 6.9.0-rc4_for_linust_min_debug_2024_04_16_14_08 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_vhca_event0 mlx5_vhca_state_work_handler [mlx5_core]
RIP: 0010:devlink_rel_nested_in_add+0x177/0x180
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x78/0x120
 ? devlink_rel_nested_in_add+0x177/0x180
 ? report_bug+0x16d/0x180
 ? handle_bug+0x3c/0x60
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? devlink_port_init+0x30/0x30
 ? devlink_port_type_clear+0x50/0x50
 ? devlink_rel_nested_in_add+0x177/0x180
 ? devlink_rel_nested_in_add+0xdd/0x180
 mlx5_sf_mdev_event+0x74/0xb0 [mlx5_core]
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_sf_dev_probe+0x185/0x3e0 [mlx5_core]
 auxiliary_bus_probe+0x38/0x80
 ? driver_sysfs_add+0x51/0x80
 really_probe+0xc5/0x3a0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x64f/0x860
 __auxiliary_device_add+0x3b/0xa0
 mlx5_sf_dev_add+0x139/0x330 [mlx5_core]
 mlx5_sf_dev_state_change_handler+0x1e4/0x250 [mlx5_core]
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_vhca_state_work_handler+0x151/0x200 [mlx5_core]
 process_one_work+0x13f/0x2e0
 worker_thread+0x2bd/0x3c0
 ? rescuer_thread+0x410/0x410
 kthread+0xc4/0xf0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x2d/0x50
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38595/">CVE-2024-38595 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38595">CVE-2024-38595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226741">SUSE bug 1226741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg

A data-race condition has been identified in af_unix. In one data path,
the write function unix_release_sock() atomically writes to
sk-&gt;sk_shutdown using WRITE_ONCE. However, on the reader side,
unix_stream_sendmsg() does not read it atomically. Consequently, this
issue is causing the following KCSAN splat to occur:

	BUG: KCSAN: data-race in unix_release_sock / unix_stream_sendmsg

	write (marked) to 0xffff88867256ddbb of 1 bytes by task 7270 on cpu 28:
	unix_release_sock (net/unix/af_unix.c:640)
	unix_release (net/unix/af_unix.c:1050)
	sock_close (net/socket.c:659 net/socket.c:1421)
	__fput (fs/file_table.c:422)
	__fput_sync (fs/file_table.c:508)
	__se_sys_close (fs/open.c:1559 fs/open.c:1541)
	__x64_sys_close (fs/open.c:1541)
	x64_sys_call (arch/x86/entry/syscall_64.c:33)
	do_syscall_64 (arch/x86/entry/common.c:?)
	entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

	read to 0xffff88867256ddbb of 1 bytes by task 989 on cpu 14:
	unix_stream_sendmsg (net/unix/af_unix.c:2273)
	__sock_sendmsg (net/socket.c:730 net/socket.c:745)
	____sys_sendmsg (net/socket.c:2584)
	__sys_sendmmsg (net/socket.c:2638 net/socket.c:2724)
	__x64_sys_sendmmsg (net/socket.c:2753 net/socket.c:2750 net/socket.c:2750)
	x64_sys_call (arch/x86/entry/syscall_64.c:33)
	do_syscall_64 (arch/x86/entry/common.c:?)
	entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

	value changed: 0x01 -&gt; 0x03

The line numbers are related to commit dd5a440a31fa ("Linux 6.9-rc7").

Commit e1d09c2c2f57 ("af_unix: Fix data races around sk-&gt;sk_shutdown.")
addressed a comparable issue in the past regarding sk-&gt;sk_shutdown.
However, it overlooked resolving this particular data path.
This patch only offending unix_stream_sendmsg() function, since the
other reads seem to be protected by unix_state_lock() as discussed in
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-10-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226846">SUSE bug 1226846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eth: sungem: remove .ndo_poll_controller to avoid deadlocks

Erhard reports netpoll warnings from sungem:

  netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)
  WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c

gem_poll_controller() disables interrupts, which may sleep.
We can't sleep in netpoll, it has interrupts disabled completely.
Strangely, gem_poll_controller() doesn't even poll the completions,
and instead acts as if an interrupt has fired so it just schedules
NAPI and exits. None of this has been necessary for years, since
netpoll invokes NAPI directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226749">SUSE bug 1226749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix resync softlockup when bitmap size is less than array size

Is is reported that for dm-raid10, lvextend + lvchange --syncaction will
trigger following softlockup:

kernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]
CPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1
RIP: 0010:_raw_spin_unlock_irq+0x13/0x30
Call Trace:
 &lt;TASK&gt;
 md_bitmap_start_sync+0x6b/0xf0
 raid10_sync_request+0x25c/0x1b40 [raid10]
 md_do_sync+0x64b/0x1020
 md_thread+0xa7/0x170
 kthread+0xcf/0x100
 ret_from_fork+0x30/0x50
 ret_from_fork_asm+0x1a/0x30

And the detailed process is as follows:

md_do_sync
 j = mddev-&gt;resync_min
 while (j &lt; max_sectors)
  sectors = raid10_sync_request(mddev, j, &amp;skipped)
   if (!md_bitmap_start_sync(..., &amp;sync_blocks))
    // md_bitmap_start_sync set sync_blocks to 0
    return sync_blocks + sectors_skippe;
  // sectors = 0;
  j += sectors;
  // j never change

Root cause is that commit 301867b1c168 ("md/raid10: check
slab-out-of-bounds in md_bitmap_get_counter") return early from
md_bitmap_get_counter(), without setting returned blocks.

Fix this problem by always set returned blocks from
md_bitmap_get_counter"(), as it used to be.

Noted that this patch just fix the softlockup problem in kernel, the
case that bitmap size doesn't match array size still need to be fixed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226757">SUSE bug 1226757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jffs2: prevent xattr node from overflowing the eraseblock

Add a check to make sure that the requested xattr node size is no larger
than the eraseblock minus the cleanmarker.

Unlike the usual inode nodes, the xattr nodes aren't split into parts
and spread across multiple eraseblocks, which means that a xattr node
must not occupy more than one eraseblock. If the requested xattr value is
too large, the xattr node can spill onto the next eraseblock, overwriting
the nodes and causing errors such as:

jffs2: argh. node added in wrong place at 0x0000b050(2)
jffs2: nextblock 0x0000a000, expected at 0000b00c
jffs2: error: (823) do_verify_xattr_datum: node CRC failed at 0x01e050,
read=0xfc892c93, calc=0x000000
jffs2: notice: (823) jffs2_get_inode_nodes: Node header CRC failed
at 0x01e00c. {848f,2fc4,0fef511f,59a3d171}
jffs2: Node at 0x0000000c with length 0x00001044 would run over the
end of the erase block
jffs2: Perhaps the file system was created with the wrong erase size?
jffs2: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found
at 0x00000010: 0x1044 instead

This breaks the filesystem and can lead to KASAN crashes such as:

BUG: KASAN: slab-out-of-bounds in jffs2_sum_add_kvec+0x125e/0x15d0
Read of size 4 at addr ffff88802c31e914 by task repro/830
CPU: 0 PID: 830 Comm: repro Not tainted 6.9.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS Arch Linux 1.16.3-1-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xc4/0x620
 ? __virt_addr_valid+0x308/0x5b0
 kasan_report+0xc1/0xf0
 ? jffs2_sum_add_kvec+0x125e/0x15d0
 ? jffs2_sum_add_kvec+0x125e/0x15d0
 jffs2_sum_add_kvec+0x125e/0x15d0
 jffs2_flash_direct_writev+0xa8/0xd0
 jffs2_flash_writev+0x9c9/0xef0
 ? __x64_sys_setxattr+0xc4/0x160
 ? do_syscall_64+0x69/0x140
 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
 [...]

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227283">SUSE bug 1227283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: Fix deadlocks with kctl removals at disconnection

In snd_card_disconnect(), we set card-&gt;shutdown flag at the beginning,
call callbacks and do sync for card-&gt;power_ref_sleep waiters at the
end.  The callback may delete a kctl element, and this can lead to a
deadlock when the device was in the suspended state.  Namely:

* A process waits for the power up at snd_power_ref_and_wait() in
  snd_ctl_info() or read/write() inside card-&gt;controls_rwsem.

* The system gets disconnected meanwhile, and the driver tries to
  delete a kctl via snd_ctl_remove*(); it tries to take
  card-&gt;controls_rwsem again, but this is already locked by the
  above.  Since the sleeper isn't woken up, this deadlocks.

An easy fix is to wake up sleepers before processing the driver
disconnect callbacks but right after setting the card-&gt;shutdown flag.
Then all sleepers will abort immediately, and the code flows again.

So, basically this patch moves the wait_event() call at the right
timing.  While we're at it, just to be sure, call wait_event_all()
instead of wait_event(), although we don't use exclusive events on
this queue for now.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226864">SUSE bug 1226864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix a race between readers and resize checks

The reader code in rb_get_reader_page() swaps a new reader page into the
ring buffer by doing cmpxchg on old-&gt;list.prev-&gt;next to point it to the
new page. Following that, if the operation is successful,
old-&gt;list.next-&gt;prev gets updated too. This means the underlying
doubly-linked list is temporarily inconsistent, page-&gt;prev-&gt;next or
page-&gt;next-&gt;prev might not be equal back to page for some page in the
ring buffer.

The resize operation in ring_buffer_resize() can be invoked in parallel.
It calls rb_check_pages() which can detect the described inconsistency
and stop further tracing:

[  190.271762] ------------[ cut here ]------------
[  190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0
[  190.271789] Modules linked in: [...]
[  190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1
[  190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G            E      6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f
[  190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014
[  190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0
[  190.272023] Code: [...]
[  190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206
[  190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80
[  190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700
[  190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000
[  190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720
[  190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000
[  190.272053] FS:  00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000
[  190.272057] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0
[  190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  190.272077] Call Trace:
[  190.272098]  &lt;TASK&gt;
[  190.272189]  ring_buffer_resize+0x2ab/0x460
[  190.272199]  __tracing_resize_ring_buffer.part.0+0x23/0xa0
[  190.272206]  tracing_resize_ring_buffer+0x65/0x90
[  190.272216]  tracing_entries_write+0x74/0xc0
[  190.272225]  vfs_write+0xf5/0x420
[  190.272248]  ksys_write+0x67/0xe0
[  190.272256]  do_syscall_64+0x82/0x170
[  190.272363]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  190.272373] RIP: 0033:0x7f1bd657d263
[  190.272381] Code: [...]
[  190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263
[  190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001
[  190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000
[  190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500
[  190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002
[  190.272412]  &lt;/TASK&gt;
[  190.272414] ---[ end trace 0000000000000000 ]---

Note that ring_buffer_resize() calls rb_check_pages() only if the parent
trace_buffer has recording disabled. Recent commit d78ab792705c
("tracing: Stop current tracer when resizing buffer") causes that it is
now always the case which makes it more likely to experience this issue.

The window to hit this race is nonetheless very small. To help
reproducing it, one can add a delay loop in rb_get_reader_page():

 ret = rb_head_page_replace(reader, cpu_buffer-&gt;reader_page);
 if (!ret)
 	goto spin;
 for (unsigned i = 0; i &lt; 1U &lt;&lt; 26; i++)  /* inserted delay loop */
 	__asm__ __volatile__ ("" : : : "memory");
 rb_list_head(reader-&gt;list.next)-&gt;prev = &amp;cpu_buffer-&gt;reader_page-&gt;list;

.. 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226876">SUSE bug 1226876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix reference count leak issues of ax25_dev

The ax25_addr_ax25dev() and ax25_dev_device_down() exist a reference
count leak issue of the object "ax25_dev".

Memory leak issue in ax25_addr_ax25dev():

The reference count of the object "ax25_dev" can be increased multiple
times in ax25_addr_ax25dev(). This will cause a memory leak.

Memory leak issues in ax25_dev_device_down():

The reference count of ax25_dev is set to 1 in ax25_dev_device_up() and
then increase the reference count when ax25_dev is added to ax25_dev_list.
As a result, the reference count of ax25_dev is 2. But when the device is
shutting down. The ax25_dev_device_down() drops the reference count once
or twice depending on if we goto unlock_put or not, which will cause
memory leak.

As for the issue of ax25_addr_ax25dev(), it is impossible for one pointer
to be on a list twice. So add a break in ax25_addr_ax25dev(). As for the
issue of ax25_dev_device_down(), increase the reference count of ax25_dev
once in ax25_dev_device_up() and decrease the reference count of ax25_dev
after it is removed from the ax25_dev_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226613">SUSE bug 1226613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset()

pci_alloc_irq_vectors() allocates an irq vector. When devm_add_action()
fails, the irq vector is not freed, which leads to a memory leak.

Replace the devm_add_action with devm_add_action_or_reset to ensure
the irq vector can be destroyed when it fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226842">SUSE bug 1226842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38604" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38604" ref_url="https://www.suse.com/security/cve/CVE-2024-38604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: refine the EOF check in blkdev_iomap_begin

blkdev_iomap_begin rounds down the offset to the logical block size
before stashing it in iomap-&gt;offset and checking that it still is
inside the inode size.

Check the i_size check to the raw pos value so that we don't try a
zero size write if iter-&gt;pos is unaligned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38604/">CVE-2024-38604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38604">CVE-2024-38604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226866">SUSE bug 1226866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38605" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: core: Fix NULL module pointer assignment at card init

The commit 81033c6b584b ("ALSA: core: Warn on empty module")
introduced a WARN_ON() for a NULL module pointer passed at snd_card
object creation, and it also wraps the code around it with '#ifdef
MODULE'.  This works in most cases, but the devils are always in
details.  "MODULE" is defined when the target code (i.e. the sound
core) is built as a module; but this doesn't mean that the caller is
also built-in or not.  Namely, when only the sound core is built-in
(CONFIG_SND=y) while the driver is a module (CONFIG_SND_USB_AUDIO=m),
the passed module pointer is ignored even if it's non-NULL, and
card-&gt;module remains as NULL.  This would result in the missing module
reference up/down at the device open/close, leading to a race with the
code execution after the module removal.

For addressing the bug, move the assignment of card-&gt;module again out
of ifdef.  The WARN_ON() is still wrapped with ifdef because the
module can be really NULL when all sound drivers are built-in.

Note that we keep 'ifdef MODULE' for WARN_ON(), otherwise it would
lead to a false-positive NULL module check.  Admittedly it won't catch
perfectly, i.e. no check is performed when CONFIG_SND=y.  But, it's no
real problem as it's only for debugging, and the condition is pretty
rare.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226740">SUSE bug 1226740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38606" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38606" ref_url="https://www.suse.com/security/cve/CVE-2024-38606" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - validate slices count returned by FW

The function adf_send_admin_tl_start() enables the telemetry (TL)
feature on a QAT device by sending the ICP_QAT_FW_TL_START message to
the firmware. This triggers the FW to start writing TL data to a DMA
buffer in memory and returns an array containing the number of
accelerators of each type (slices) supported by this HW.
The pointer to this array is stored in the adf_tl_hw_data data
structure called slice_cnt.

The array slice_cnt is then used in the function tl_print_dev_data()
to report in debugfs only statistics about the supported accelerators.
An incorrect value of the elements in slice_cnt might lead to an out
of bounds memory read.
At the moment, there isn't an implementation of FW that returns a wrong
value, but for robustness validate the slice count array returned by FW.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38606/">CVE-2024-38606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38606">CVE-2024-38606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226871">SUSE bug 1226871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix netif state handling

mlx5e_suspend cleans resources only if netif_device_present() returns
true. However, mlx5e_resume changes the state of netif, via
mlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.
In the below case, the above leads to NULL-ptr Oops[1] and memory
leaks:

mlx5e_probe
 _mlx5e_resume
  mlx5e_attach_netdev
   mlx5e_nic_enable  &lt;-- netdev not reg, not calling netif_device_attach()
  register_netdev &lt;-- failed for some reason.
ERROR_FLOW:
 _mlx5e_suspend &lt;-- netif_device_present return false, resources aren't freed :(

Hence, clean resources in this case as well.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at0xffffffffffffffd6.
RSP: 0018:ffff888178aaf758 EFLAGS: 00010246
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x14c/0x3c0
 ? exc_page_fault+0x75/0x140
 ? asm_exc_page_fault+0x22/0x30
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]
 mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]
 mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]
 __mlx5_ib_add+0x34/0xd0 [mlx5_ib]
 mlx5r_probe+0xe1/0x210 [mlx5_ib]
 ? auxiliary_match_id+0x6a/0x90
 auxiliary_bus_probe+0x38/0x80
 ? driver_sysfs_add+0x51/0x80
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x637/0x840
 __auxiliary_device_add+0x3b/0xa0
 add_adev+0xc9/0x140 [mlx5_core]
 mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]
 mlx5_register_device+0x53/0xa0 [mlx5_core]
 mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]
 mlx5_init_one+0x3b/0x60 [mlx5_core]
 probe_one+0x44c/0x730 [mlx5_core]
 local_pci_probe+0x3e/0x90
 pci_device_probe+0xbf/0x210
 ? kernfs_create_link+0x5d/0xa0
 ? sysfs_do_create_link_sd+0x60/0xc0
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 pci_bus_add_device+0x54/0x80
 pci_iov_add_virtfn+0x2e6/0x320
 sriov_enable+0x208/0x420
 mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]
 sriov_numvfs_store+0xae/0x1a0
 kernfs_fop_write_iter+0x10c/0x1a0
 vfs_write+0x291/0x3c0
 ksys_write+0x5f/0xe0
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
 CR2: 0000000000000000
 ---[ end trace 0000000000000000  ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226746">SUSE bug 1226746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38609" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38609" ref_url="https://www.suse.com/security/cve/CVE-2024-38609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: connac: check for null before dereferencing

The wcid can be NULL. It should be checked for validity before
dereferencing it to avoid crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38609/">CVE-2024-38609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38609">CVE-2024-38609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226751">SUSE bug 1226751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38610" ref_url="https://www.suse.com/security/cve/CVE-2024-38610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/virt/acrn: fix PFNMAP PTE checks in acrn_vm_ram_map()

Patch series "mm: follow_pte() improvements and acrn follow_pte() fixes".

Patch #1 fixes a bunch of issues I spotted in the acrn driver.  It
compiles, that's all I know.  I'll appreciate some review and testing from
acrn folks.

Patch #2+#3 improve follow_pte(), passing a VMA instead of the MM, adding
more sanity checks, and improving the documentation.  Gave it a quick test
on x86-64 using VM_PAT that ends up using follow_pte().


This patch (of 3):

We currently miss handling various cases, resulting in a dangerous
follow_pte() (previously follow_pfn()) usage.

(1) We're not checking PTE write permissions.

Maybe we should simply always require pte_write() like we do for
pin_user_pages_fast(FOLL_WRITE)? Hard to tell, so let's check for
ACRN_MEM_ACCESS_WRITE for now.

(2) We're not rejecting refcounted pages.

As we are not using MMU notifiers, messing with refcounted pages is
dangerous and can result in use-after-free. Let's make sure to reject them.

(3) We are only looking at the first PTE of a bigger range.

We only lookup a single PTE, but memmap-&gt;len may span a larger area.
Let's loop over all involved PTEs and make sure the PFN range is
actually contiguous. Reject everything else: it couldn't have worked
either way, and rather made use access PFNs we shouldn't be accessing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38610/">CVE-2024-38610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38610">CVE-2024-38610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226758">SUSE bug 1226758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227284">SUSE bug 1227284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38611" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38611" ref_url="https://www.suse.com/security/cve/CVE-2024-38611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: i2c: et8ek8: Don't strip remove function when driver is builtin

Using __exit for the remove function results in the remove callback
being discarded with CONFIG_VIDEO_ET8EK8=y. When such a device gets
unbound (e.g. using sysfs or hotplug), the driver is just removed
without the cleanup being performed. This results in resource leaks. Fix
it by compiling in the remove callback unconditionally.

This also fixes a W=1 modpost warning:

	WARNING: modpost: drivers/media/i2c/et8ek8/et8ek8: section mismatch in reference: et8ek8_i2c_driver+0x10 (section: .data) -&gt; et8ek8_remove (section: .exit.text)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38611/">CVE-2024-38611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38611">CVE-2024-38611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226760">SUSE bug 1226760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38613</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38613" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38613" ref_url="https://www.suse.com/security/cve/CVE-2024-38613" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

m68k: Fix spinlock race in kernel thread creation

Context switching does take care to retain the correct lock owner across
the switch from 'prev' to 'next' tasks.  This does rely on interrupts
remaining disabled for the entire duration of the switch.

This condition is guaranteed for normal process creation and context
switching between already running processes, because both 'prev' and
'next' already have interrupts disabled in their saved copies of the
status register.

The situation is different for newly created kernel threads.  The status
register is set to PS_S in copy_thread(), which does leave the IPL at 0.
Upon restoring the 'next' thread's status register in switch_to() aka
resume(), interrupts then become enabled prematurely.  resume() then
returns via ret_from_kernel_thread() and schedule_tail() where run queue
lock is released (see finish_task_switch() and finish_lock_switch()).

A timer interrupt calling scheduler_tick() before the lock is released
in finish_task_switch() will find the lock already taken, with the
current task as lock owner.  This causes a spinlock recursion warning as
reported by Guenter Roeck.

As far as I can ascertain, this race has been opened in commit
533e6903bea0 ("m68k: split ret_from_fork(), simplify kernel_thread()")
but I haven't done a detailed study of kernel history so it may well
predate that commit.

Interrupts cannot be disabled in the saved status register copy for
kernel threads (init will complain about interrupts disabled when
finally starting user space).  Disable interrupts temporarily when
switching the tasks' register sets in resume().

Note that a simple oriw 0x700,%sr after restoring sr is not enough here
- this leaves enough of a race for the 'spinlock recursion' warning to
still be observed.

Tested on ARAnyM and qemu (Quadra 800 emulation).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38613/">CVE-2024-38613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38613">CVE-2024-38613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226753">SUSE bug 1226753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38614" ref_url="https://www.suse.com/security/cve/CVE-2024-38614" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

openrisc: traps: Don't send signals to kernel mode threads

OpenRISC exception handling sends signals to user processes on floating
point exceptions and trap instructions (for debugging) among others.
There is a bug where the trap handling logic may send signals to kernel
threads, we should not send these signals to kernel threads, if that
happens we treat it as an error.

This patch adds conditions to die if the kernel receives these
exceptions in kernel mode code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38614/">CVE-2024-38614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38614">CVE-2024-38614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226755">SUSE bug 1226755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: exit() callback is optional

The exit() callback is optional and shouldn't be called without checking
a valid pointer first.

Also, we must clear freq_table pointer even if the exit() callback isn't
present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226592">SUSE bug 1226592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: re-fix fortified-memset warning

The carl9170_tx_release() function sometimes triggers a fortified-memset
warning in my randconfig builds:

In file included from include/linux/string.h:254,
                 from drivers/net/wireless/ath/carl9170/tx.c:40:
In function 'fortify_memset_chk',
    inlined from 'carl9170_tx_release' at drivers/net/wireless/ath/carl9170/tx.c:283:2,
    inlined from 'kref_put' at include/linux/kref.h:65:3,
    inlined from 'carl9170_tx_put_skb' at drivers/net/wireless/ath/carl9170/tx.c:342:9:
include/linux/fortify-string.h:493:25: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning]
  493 |                         __write_overflow_field(p_size_field, size);

Kees previously tried to avoid this by using memset_after(), but it seems
this does not fully address the problem. I noticed that the memset_after()
here is done on a different part of the union (status) than the original
cast was from (rate_driver_data), which may confuse the compiler.

Unfortunately, the memset_after() trick does not work on driver_rates[]
because that is part of an anonymous struct, and I could not get
struct_group() to do this either. Using two separate memset() calls
on the two members does address the warning though.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226852">SUSE bug 1226852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38617" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38617" ref_url="https://www.suse.com/security/cve/CVE-2024-38617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit/fortify: Fix mismatched kvalloc()/vfree() usage

The kv*() family of tests were accidentally freeing with vfree() instead
of kvfree(). Use kvfree() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38617/">CVE-2024-38617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38617">CVE-2024-38617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226859">SUSE bug 1226859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38618" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: timer: Set lower bound of start tick time

Currently ALSA timer doesn't have the lower limit of the start tick
time, and it allows a very small size, e.g. 1 tick with 1ns resolution
for hrtimer.  Such a situation may lead to an unexpected RCU stall,
where  the callback repeatedly queuing the expire update, as reported
by fuzzer.

This patch introduces a sanity check of the timer start tick time, so
that the system returns an error when a too small start size is set.
As of this patch, the lower limit is hard-coded to 100us, which is
small enough but can still work somehow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226754">SUSE bug 1226754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Check whether the media is initialized

The member "uzonesize" of struct alauda_info will remain 0
if alauda_init_media() fails, potentially causing divide errors
in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the
  first initialization.
- Add an error check for the return value of alauda_init_media().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226861">SUSE bug 1226861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38621" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: stk1160: fix bounds checking in stk1160_copy_video()

The subtract in this condition is reversed.  The -&gt;length is the length
of the buffer.  The -&gt;bytesused is how many bytes we have copied thus
far.  When the condition is reversed that means the result of the
subtraction is always negative but since it's unsigned then the result
is a very high positive value.  That means the overflow check is never
true.

Additionally, the -&gt;bytesused doesn't actually work for this purpose
because we're not writing to "buf-&gt;mem + buf-&gt;bytesused".  Instead, the
math to calculate the destination where we are writing is a bit
involved.  You calculate the number of full lines already written,
multiply by two, skip a line if necessary so that we start on an odd
numbered line, and add the offset into the line.

To fix this buffer overflow, just take the actual destination where we
are writing, if the offset is already out of bounds print an error and
return.  Otherwise, write up to buf-&gt;length bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226895">SUSE bug 1226895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38622" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38622" ref_url="https://www.suse.com/security/cve/CVE-2024-38622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add callback function pointer check before its call

In dpu_core_irq_callback_handler() callback function pointer is compared to NULL,
but then callback function is unconditionally called by this pointer.
Fix this bug by adding conditional return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Patchwork: https://patchwork.freedesktop.org/patch/588237/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38622/">CVE-2024-38622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38622">CVE-2024-38622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226856">SUSE bug 1226856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38623" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38623" ref_url="https://www.suse.com/security/cve/CVE-2024-38623" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Use variable length array instead of fixed size

Should fix smatch warning:
	ntfs_set_label() error: __builtin_memcpy() 'uni-&gt;name' too small (20 vs 256)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38623/">CVE-2024-38623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38623">CVE-2024-38623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226851">SUSE bug 1226851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38624" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38624" ref_url="https://www.suse.com/security/cve/CVE-2024-38624" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Use 64 bit variable to avoid 32 bit overflow

For example, in the expression:
	vbo = 2 * vbo + skip
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38624/">CVE-2024-38624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38624">CVE-2024-38624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226858">SUSE bug 1226858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38625" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38625" ref_url="https://www.suse.com/security/cve/CVE-2024-38625" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Check 'folio' pointer for NULL

It can be NULL if bmap is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38625/">CVE-2024-38625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38625">CVE-2024-38625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226854">SUSE bug 1226854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38626" ref_url="https://www.suse.com/security/cve/CVE-2024-38626" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: clear FR_SENT when re-adding requests into pending list

The following warning was reported by lee bruce:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 8264 at fs/fuse/dev.c:300
  fuse_request_end+0x685/0x7e0 fs/fuse/dev.c:300
  Modules linked in:
  CPU: 0 PID: 8264 Comm: ab2 Not tainted 6.9.0-rc7
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
  RIP: 0010:fuse_request_end+0x685/0x7e0 fs/fuse/dev.c:300
  ......
  Call Trace:
  &lt;TASK&gt;
  fuse_dev_do_read.constprop.0+0xd36/0x1dd0 fs/fuse/dev.c:1334
  fuse_dev_read+0x166/0x200 fs/fuse/dev.c:1367
  call_read_iter include/linux/fs.h:2104 [inline]
  new_sync_read fs/read_write.c:395 [inline]
  vfs_read+0x85b/0xba0 fs/read_write.c:476
  ksys_read+0x12f/0x260 fs/read_write.c:619
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xce/0x260 arch/x86/entry/common.c:83
  entry_SYSCALL_64_after_hwframe+0x77/0x7f
  ......
  &lt;/TASK&gt;

The warning is due to the FUSE_NOTIFY_RESEND notify sent by the write()
syscall in the reproducer program and it happens as follows:

(1) calls fuse_dev_read() to read the INIT request
The read succeeds. During the read, bit FR_SENT will be set on the
request.
(2) calls fuse_dev_write() to send an USE_NOTIFY_RESEND notify
The resend notify will resend all processing requests, so the INIT
request is moved from processing list to pending list again.
(3) calls fuse_dev_read() with an invalid output address
fuse_dev_read() will try to copy the same INIT request to the output
address, but it will fail due to the invalid address, so the INIT
request is ended and triggers the warning in fuse_request_end().

Fix it by clearing FR_SENT when re-adding requests into pending list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38626/">CVE-2024-38626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38626">CVE-2024-38626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226853">SUSE bug 1226853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38627" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

stm class: Fix a double free in stm_register_device()

The put_device(&amp;stm-&gt;dev) call will trigger stm_device_release() which
frees "stm" so the vfree(stm) on the next line is a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226857">SUSE bug 1226857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38628" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind.

Hang on to the control IDs instead of pointers since those are correctly
handled with locks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226911">SUSE bug 1226911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38629" ref_url="https://www.suse.com/security/cve/CVE-2024-38629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Avoid unnecessary destruction of file_ida

file_ida is allocated during cdev open and is freed accordingly
during cdev release. This sequence is guaranteed by driver file
operations. Therefore, there is no need to destroy an already empty
file_ida when the WQ cdev is removed.

Worse, ida_free() in cdev release may happen after destruction of
file_ida per WQ cdev. This can lead to accessing an id in file_ida
after it has been destroyed, resulting in a kernel panic.

Remove ida_destroy(&amp;file_ida) to address these issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38629/">CVE-2024-38629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38629">CVE-2024-38629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226905">SUSE bug 1226905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38630" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger

When the cpu5wdt module is removing, the origin code uses del_timer() to
de-activate the timer. If the timer handler is running, del_timer() could
not stop it and will return directly. If the port region is released by
release_region() and then the timer handler cpu5wdt_trigger() calls outb()
to write into the region that is released, the use-after-free bug will
happen.

Change del_timer() to timer_shutdown_sync() in order that the timer handler
could be finished before the port region is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226908">SUSE bug 1226908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38631" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38631" ref_url="https://www.suse.com/security/cve/CVE-2024-38631" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: PAC1934: fix accessing out of bounds array index

Fix accessing out of bounds array index for average
current and voltage measurements. The device itself has
only 4 channels, but in sysfs there are "fake"
channels for the average voltages and currents too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38631/">CVE-2024-38631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38631">CVE-2024-38631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226862">SUSE bug 1226862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38632" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: fix potential memory leak in vfio_intx_enable()

If vfio_irq_ctx_alloc() failed will lead to 'name' memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226860">SUSE bug 1226860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38633" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: max3100: Update uart_driver_registered on driver removal

The removal of the last MAX3100 device triggers the removal of
the driver. However, code doesn't update the respective global
variable and after insmod — rmmod — insmod cycle the kernel
oopses:

  max3100 spi-PRP0001:01: max3100_probe: adding port 0
  BUG: kernel NULL pointer dereference, address: 0000000000000408
  ...
  RIP: 0010:serial_core_register_port+0xa0/0x840
  ...
   max3100_probe+0x1b6/0x280 [max3100]
   spi_probe+0x8d/0xb0

Update the actual state so next time UART driver will be registered
again.

Hugo also noticed, that the error path in the probe also affected
by having the variable set, and not cleared. Instead of clearing it
move the assignment after the successfull uart_register_driver() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226867">SUSE bug 1226867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38634" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change()

uart_handle_cts_change() has to be called with port lock taken,
Since we run it in a separate work, the lock may not be taken at
the time of running. Make sure that it's taken by explicitly doing
that. Without it we got a splat:

  WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0
  ...
  Workqueue: max3100-0 max3100_work [max3100]
  RIP: 0010:uart_handle_cts_change+0xa6/0xb0
  ...
   max3100_handlerx+0xc5/0x110 [max3100]
   max3100_work+0x12a/0x340 [max3100]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226868">SUSE bug 1226868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38635" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: cadence: fix invalid PDI offset

For some reason, we add an offset to the PDI, presumably to skip the
PDI0 and PDI1 which are reserved for BPT.

This code is however completely wrong and leads to an out-of-bounds
access. We were just lucky so far since we used only a couple of PDIs
and remained within the PDI array bounds.

A Fixes: tag is not provided since there are no known platforms where
the out-of-bounds would be accessed, and the initial code had problems
as well.

A follow-up patch completely removes this useless offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226863">SUSE bug 1226863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38636" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38636" ref_url="https://www.suse.com/security/cve/CVE-2024-38636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: multidev: fix to recognize valid zero block address

As reported by Yi Zhang in mailing list [1], kernel warning was catched
during zbd/010 test as below:

./check zbd/010
zbd/010 (test gap zone support with F2FS)                    [failed]
    runtime    ...  3.752s
    something found in dmesg:
    [ 4378.146781] run blktests zbd/010 at 2024-02-18 11:31:13
    [ 4378.192349] null_blk: module loaded
    [ 4378.209860] null_blk: disk nullb0 created
    [ 4378.413285] scsi_debug:sdebug_driver_probe: scsi_debug: trim
poll_queues to 0. poll_q/nr_hw = (0/1)
    [ 4378.422334] scsi host15: scsi_debug: version 0191 [20210520]
                     dev_size_mb=1024, opts=0x0, submit_queues=1, statistics=0
    [ 4378.434922] scsi 15:0:0:0: Direct-Access-ZBC Linux
scsi_debug       0191 PQ: 0 ANSI: 7
    [ 4378.443343] scsi 15:0:0:0: Power-on or device reset occurred
    [ 4378.449371] sd 15:0:0:0: Attached scsi generic sg5 type 20
    [ 4378.449418] sd 15:0:0:0: [sdf] Host-managed zoned block device
    ...
    (See '/mnt/tests/gitlab.com/api/v4/projects/19168116/repository/archive.zip/storage/blktests/blk/blktests/results/nodev/zbd/010.dmesg'

WARNING: CPU: 22 PID: 44011 at fs/iomap/iter.c:51
CPU: 22 PID: 44011 Comm: fio Not tainted 6.8.0-rc3+ #1
RIP: 0010:iomap_iter+0x32b/0x350
Call Trace:
 &lt;TASK&gt;
 __iomap_dio_rw+0x1df/0x830
 f2fs_file_read_iter+0x156/0x3d0 [f2fs]
 aio_read+0x138/0x210
 io_submit_one+0x188/0x8c0
 __x64_sys_io_submit+0x8c/0x1a0
 do_syscall_64+0x86/0x170
 entry_SYSCALL_64_after_hwframe+0x6e/0x76

Shinichiro Kawasaki helps to analyse this issue and proposes a potential
fixing patch in [2].

Quoted from reply of Shinichiro Kawasaki:

"I confirmed that the trigger commit is dbf8e63f48af as Yi reported. I took a
look in the commit, but it looks fine to me. So I thought the cause is not
in the commit diff.

I found the WARN is printed when the f2fs is set up with multiple devices,
and read requests are mapped to the very first block of the second device in the
direct read path. In this case, f2fs_map_blocks() and f2fs_map_blocks_cached()
modify map-&gt;m_pblk as the physical block address from each block device. It
becomes zero when it is mapped to the first block of the device. However,
f2fs_iomap_begin() assumes that map-&gt;m_pblk is the physical block address of the
whole f2fs, across the all block devices. It compares map-&gt;m_pblk against
NULL_ADDR == 0, then go into the unexpected branch and sets the invalid
iomap-&gt;length. The WARN catches the invalid iomap-&gt;length.

This WARN is printed even for non-zoned block devices, by following steps.

 - Create two (non-zoned) null_blk devices memory backed with 128MB size each:
   nullb0 and nullb1.
 # mkfs.f2fs /dev/nullb0 -c /dev/nullb1
 # mount -t f2fs /dev/nullb0 "${mount_dir}"
 # dd if=/dev/zero of="${mount_dir}/test.dat" bs=1M count=192
 # dd if="${mount_dir}/test.dat" of=/dev/null bs=1M count=192 iflag=direct

..."

So, the root cause of this issue is: when multi-devices feature is on,
f2fs_map_blocks() may return zero blkaddr in non-primary device, which is
a verified valid block address, however, f2fs_iomap_begin() treats it as
an invalid block address, and then it triggers the warning in iomap
framework code.

Finally, as discussed, we decide to use a more simple and direct way that
checking (map.m_flags &amp; F2FS_MAP_MAPPED) condition instead of
(map.m_pblk != NULL_ADDR) to fix this issue.

Thanks a lot for the effort of Yi Zhang and Shinichiro Kawasaki on this
issue.

[1] https://lore.kernel.org/linux-f2fs-devel/CAHj4cs-kfojYC9i0G73PRkYzcxCTex=-vugRFeP40g_URGvnfQ@mail.gmail.com/
[2] https://lore.kernel.org/linux-f2fs-devel/gngdj77k4picagsfdtiaa7gpgnup6fsgwzsltx6milmhegmjff@iax2n4wvrqye/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38636/">CVE-2024-38636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38636">CVE-2024-38636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226879">SUSE bug 1226879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

enic: Validate length of nl attributes in enic_set_vf_port

enic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE
is of length PORT_PROFILE_MAX and that the nl attributes
IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.
These attributes are validated (in the function do_setlink in rtnetlink.c)
using the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE
as NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and
IFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation
using the policy is for the max size of the attributes and not on exact
size so the length of these attributes might be less than the sizes that
enic_set_vf_port expects. This might cause an out of bands
read access in the memcpys of the data of these
attributes in enic_set_vf_port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226883">SUSE bug 1226883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/ap: Fix crash in AP internal function modify_bitmap()

A system crash like this

  Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403
  Fault in home space mode while using kernel ASCE.
  AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d
  Oops: 0038 ilc:3 [#1] PREEMPT SMP
  Modules linked in: mlx5_ib ...
  CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8
  Hardware name: IBM 3931 A01 704 (LPAR)
  Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
  Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3
  000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0
  000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff
  000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8
  Krnl Code: 0000014b75e7b5fc: a7840047            brc     8,0000014b75e7b68a
  0000014b75e7b600: 18b2                lr      %r11,%r2
  #0000014b75e7b602: a7f4000a            brc     15,0000014b75e7b616
  &gt;0000014b75e7b606: eb22d00000e6        laog    %r2,%r2,0(%r13)
  0000014b75e7b60c: a7680001            lhi     %r6,1
  0000014b75e7b610: 187b                lr      %r7,%r11
  0000014b75e7b612: 84960021            brxh    %r9,%r6,0000014b75e7b654
  0000014b75e7b616: 18e9                lr      %r14,%r9
  Call Trace:
  [&lt;0000014b75e7b606&gt;] ap_parse_bitmap_str+0x10e/0x1f8
  ([&lt;0000014b75e7b5dc&gt;] ap_parse_bitmap_str+0xe4/0x1f8)
  [&lt;0000014b75e7b758&gt;] apmask_store+0x68/0x140
  [&lt;0000014b75679196&gt;] kernfs_fop_write_iter+0x14e/0x1e8
  [&lt;0000014b75598524&gt;] vfs_write+0x1b4/0x448
  [&lt;0000014b7559894c&gt;] ksys_write+0x74/0x100
  [&lt;0000014b7618a440&gt;] __do_syscall+0x268/0x328
  [&lt;0000014b761a3558&gt;] system_call+0x70/0x98
  INFO: lockdep is turned off.
  Last Breaking-Event-Address:
  [&lt;0000014b75e7b636&gt;] ap_parse_bitmap_str+0x13e/0x1f8
  Kernel panic - not syncing: Fatal exception: panic_on_oops

occured when /sys/bus/ap/a[pq]mask was updated with a relative mask value
(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.

The fix is simple: use unsigned long values for the internal variables. The
correct checks are already in place in the function but a simple int for
the internal variables was used with the possibility to overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226996">SUSE bug 1226996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Allow delete from sockmap/sockhash only if update is allowed

We have seen an influx of syzkaller reports where a BPF program attached to
a tracepoint triggers a locking rule violation by performing a map_delete
on a sockmap/sockhash.

We don't intend to support this artificial use scenario. Extend the
existing verifier allowed-program-type check for updating sockmap/sockhash
to also cover deleting from a map.

From now on only BPF programs which were previously allowed to update
sockmap/sockhash can delete from these map types.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226885">SUSE bug 1226885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38663" ref_url="https://www.suse.com/security/cve/CVE-2024-38663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix list corruption from resetting io stat

Since commit 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()"),
each iostat instance is added to blkcg percpu list, so blkcg_reset_stats()
can't reset the stat instance by memset(), otherwise the llist may be
corrupted.

Fix the issue by only resetting the counter part.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38663/">CVE-2024-38663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226939">SUSE bug 1226939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38664" ref_url="https://www.suse.com/security/cve/CVE-2024-38664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: zynqmp_dpsub: Always register bridge

We must always register the DRM bridge, since zynqmp_dp_hpd_work_func
calls drm_bridge_hpd_notify, which in turn expects hpd_mutex to be
initialized. We do this before zynqmp_dpsub_drm_init since that calls
drm_bridge_attach. This fixes the following lockdep warning:

[   19.217084] ------------[ cut here ]------------
[   19.227530] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
[   19.227768] WARNING: CPU: 0 PID: 140 at kernel/locking/mutex.c:582 __mutex_lock+0x4bc/0x550
[   19.241696] Modules linked in:
[   19.244937] CPU: 0 PID: 140 Comm: kworker/0:4 Not tainted 6.6.20+ #96
[   19.252046] Hardware name: xlnx,zynqmp (DT)
[   19.256421] Workqueue: events zynqmp_dp_hpd_work_func
[   19.261795] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   19.269104] pc : __mutex_lock+0x4bc/0x550
[   19.273364] lr : __mutex_lock+0x4bc/0x550
[   19.277592] sp : ffffffc085c5bbe0
[   19.281066] x29: ffffffc085c5bbe0 x28: 0000000000000000 x27: ffffff88009417f8
[   19.288624] x26: ffffff8800941788 x25: ffffff8800020008 x24: ffffffc082aa3000
[   19.296227] x23: ffffffc080d90e3c x22: 0000000000000002 x21: 0000000000000000
[   19.303744] x20: 0000000000000000 x19: ffffff88002f5210 x18: 0000000000000000
[   19.311295] x17: 6c707369642e3030 x16: 3030613464662072 x15: 0720072007200720
[   19.318922] x14: 0000000000000000 x13: 284e4f5f4e524157 x12: 0000000000000001
[   19.326442] x11: 0001ffc085c5b940 x10: 0001ff88003f388b x9 : 0001ff88003f3888
[   19.334003] x8 : 0001ff88003f3888 x7 : 0000000000000000 x6 : 0000000000000000
[   19.341537] x5 : 0000000000000000 x4 : 0000000000001668 x3 : 0000000000000000
[   19.349054] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff88003f3880
[   19.356581] Call trace:
[   19.359160]  __mutex_lock+0x4bc/0x550
[   19.363032]  mutex_lock_nested+0x24/0x30
[   19.367187]  drm_bridge_hpd_notify+0x2c/0x6c
[   19.371698]  zynqmp_dp_hpd_work_func+0x44/0x54
[   19.376364]  process_one_work+0x3ac/0x988
[   19.380660]  worker_thread+0x398/0x694
[   19.384736]  kthread+0x1bc/0x1c0
[   19.388241]  ret_from_fork+0x10/0x20
[   19.392031] irq event stamp: 183
[   19.395450] hardirqs last  enabled at (183): [&lt;ffffffc0800b9278&gt;] finish_task_switch.isra.0+0xa8/0x2d4
[   19.405140] hardirqs last disabled at (182): [&lt;ffffffc081ad3754&gt;] __schedule+0x714/0xd04
[   19.413612] softirqs last  enabled at (114): [&lt;ffffffc080133de8&gt;] srcu_invoke_callbacks+0x158/0x23c
[   19.423128] softirqs last disabled at (110): [&lt;ffffffc080133de8&gt;] srcu_invoke_callbacks+0x158/0x23c
[   19.432614] ---[ end trace 0000000000000000 ]---

(cherry picked from commit 61ba791c4a7a09a370c45b70a81b8c7d4cf6b2ae)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38664/">CVE-2024-38664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38664">CVE-2024-38664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226941">SUSE bug 1226941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38667" ref_url="https://www.suse.com/security/cve/CVE-2024-38667" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: prevent pt_regs corruption for secondary idle threads

Top of the kernel thread stack should be reserved for pt_regs. However
this is not the case for the idle threads of the secondary boot harts.
Their stacks overlap with their pt_regs, so both may get corrupted.

Similar issue has been fixed for the primary hart, see c7cdd96eca28
("riscv: prevent stack corruption by reserving task_pt_regs(p) early").
However that fix was not propagated to the secondary harts. The problem
has been noticed in some CPU hotplug tests with V enabled. The function
smp_callin stored several registers on stack, corrupting top of pt_regs
structure including status field. As a result, kernel attempted to save
or restore inexistent V context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38667/">CVE-2024-38667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38667">CVE-2024-38667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226952">SUSE bug 1226952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf/sw-sync: don't enable IRQ from sync_print_obj()

Since commit a6aa8fca4d79 ("dma-buf/sw-sync: Reduce irqsave/irqrestore from
known context") by error replaced spin_unlock_irqrestore() with
spin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite
sync_print_obj() is called from sync_debugfs_show(), lockdep complains
inconsistent lock state warning.

Use plain spin_{lock,unlock}() for sync_print_obj(), for
sync_debugfs_show() is already using spin_{lock,unlock}_irq().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226886">SUSE bug 1226886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39276" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find()

Syzbot reports a warning as follows:

============================================
WARNING: CPU: 0 PID: 5075 at fs/mbcache.c:419 mb_cache_destroy+0x224/0x290
Modules linked in:
CPU: 0 PID: 5075 Comm: syz-executor199 Not tainted 6.9.0-rc6-gb947cc5bf6d7
RIP: 0010:mb_cache_destroy+0x224/0x290 fs/mbcache.c:419
Call Trace:
 &lt;TASK&gt;
 ext4_put_super+0x6d4/0xcd0 fs/ext4/super.c:1375
 generic_shutdown_super+0x136/0x2d0 fs/super.c:641
 kill_block_super+0x44/0x90 fs/super.c:1675
 ext4_kill_sb+0x68/0xa0 fs/ext4/super.c:7327
[...]
============================================

This is because when finding an entry in ext4_xattr_block_cache_find(), if
ext4_sb_bread() returns -ENOMEM, the ce's e_refcnt, which has already grown
in the __entry_find(), won't be put away, and eventually trigger the above
issue in mb_cache_destroy() due to reference count leakage.

So call mb_cache_entry_put() on the -ENOMEM error branch as a quick fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226993">SUSE bug 1226993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39277" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39277" ref_url="https://www.suse.com/security/cve/CVE-2024-39277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-mapping: benchmark: handle NUMA_NO_NODE correctly

cpumask_of_node() can be called for NUMA_NO_NODE inside do_map_benchmark()
resulting in the following sanitizer report:

UBSAN: array-index-out-of-bounds in ./arch/x86/include/asm/topology.h:72:28
index -1 is out of range for type 'cpumask [64][1]'
CPU: 1 PID: 990 Comm: dma_map_benchma Not tainted 6.9.0-rc6 #29
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Call Trace:
 &lt;TASK&gt;
dump_stack_lvl (lib/dump_stack.c:117)
ubsan_epilogue (lib/ubsan.c:232)
__ubsan_handle_out_of_bounds (lib/ubsan.c:429)
cpumask_of_node (arch/x86/include/asm/topology.h:72) [inline]
do_map_benchmark (kernel/dma/map_benchmark.c:104)
map_benchmark_ioctl (kernel/dma/map_benchmark.c:246)
full_proxy_unlocked_ioctl (fs/debugfs/file.c:333)
__x64_sys_ioctl (fs/ioctl.c:890)
do_syscall_64 (arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Use cpumask_of_node() in place when binding a kernel thread to a cpuset
of a particular node.

Note that the provided node id is checked inside map_benchmark_ioctl().
It's just a NUMA_NO_NODE case which is not handled properly later.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-39277/">CVE-2024-39277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39277">CVE-2024-39277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226909">SUSE bug 1226909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39282" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39282" ref_url="https://www.suse.com/security/cve/CVE-2024-39282" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: t7xx: Fix FSM command timeout issue

When driver processes the internal state change command, it use an
asynchronous thread to process the command operation. If the main
thread detects that the task has timed out, the asynchronous thread
will panic when executing the completion notification because the
main thread completion object has been released.

BUG: unable to handle page fault for address: fffffffffffffff8
PGD 1f283a067 P4D 1f283a067 PUD 1f283c067 PMD 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:complete_all+0x3e/0xa0
[...]
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x68/0xb0
 ? page_fault_oops+0x379/0x3e0
 ? exc_page_fault+0x69/0xa0
 ? asm_exc_page_fault+0x22/0x30
 ? complete_all+0x3e/0xa0
 fsm_main_thread+0xa3/0x9c0 [mtk_t7xx (HASH:1400 5)]
 ? __pfx_autoremove_wake_function+0x10/0x10
 kthread+0xd8/0x110
 ? __pfx_fsm_main_thread+0x10/0x10 [mtk_t7xx (HASH:1400 5)]
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x38/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;
[...]
CR2: fffffffffffffff8
---[ end trace 0000000000000000 ]---

Use the reference counter to ensure safe release as Sergey suggests:
https://lore.kernel.org/all/da90f64c-260a-4329-87bf-1f9ff20a5951@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39282/">CVE-2024-39282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39282">CVE-2024-39282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235903">SUSE bug 1235903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39291" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39291" ref_url="https://www.suse.com/security/cve/CVE-2024-39291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix buffer size in gfx_v9_4_3_init_ cp_compute_microcode() and rlc_microcode()

The function gfx_v9_4_3_init_microcode in gfx_v9_4_3.c was generating
about potential truncation of output when using the snprintf function.
The issue was due to the size of the buffer 'ucode_prefix' being too
small to accommodate the maximum possible length of the string being
written into it.

The string being written is "amdgpu/%s_mec.bin" or "amdgpu/%s_rlc.bin",
where %s is replaced by the value of 'chip_name'. The length of this
string without the %s is 16 characters. The warning message indicated
that 'chip_name' could be up to 29 characters long, resulting in a total
of 45 characters, which exceeds the buffer size of 30 characters.

To resolve this issue, the size of the 'ucode_prefix' buffer has been
reduced from 30 to 15. This ensures that the maximum possible length of
the string being written into the buffer will not exceed its size, thus
preventing potential buffer overflow and truncation issues.

Fixes the below with gcc W=1:
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c: In function 'gfx_v9_4_3_early_init':
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:379:52: warning: '%s' directive output may be truncated writing up to 29 bytes into a region of size 23 [-Wformat-truncation=]
  379 |         snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_rlc.bin", chip_name);
      |                                                    ^~
......
  439 |         r = gfx_v9_4_3_init_rlc_microcode(adev, ucode_prefix);
      |                                                 ~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:379:9: note: 'snprintf' output between 16 and 45 bytes into a destination of size 30
  379 |         snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_rlc.bin", chip_name);
      |         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:413:52: warning: '%s' directive output may be truncated writing up to 29 bytes into a region of size 23 [-Wformat-truncation=]
  413 |         snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_mec.bin", chip_name);
      |                                                    ^~
......
  443 |         r = gfx_v9_4_3_init_cp_compute_microcode(adev, ucode_prefix);
      |                                                        ~~~~~~~~~~~~
drivers/gpu/drm/amd/amdgpu/gfx_v9_4_3.c:413:9: note: 'snprintf' output between 16 and 45 bytes into a destination of size 30
  413 |         snprintf(fw_name, sizeof(fw_name), "amdgpu/%s_mec.bin", chip_name);
      |         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39291/">CVE-2024-39291 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39291">CVE-2024-39291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226934">SUSE bug 1226934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39292" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39292" ref_url="https://www.suse.com/security/cve/CVE-2024-39292" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: Add winch to winch_handlers before registering winch IRQ

Registering a winch IRQ is racy, an interrupt may occur before the winch is
added to the winch_handlers list.

If that happens, register_winch_irq() adds to that list a winch that is
scheduled to be (or has already been) freed, causing a panic later in
winch_cleanup().

Avoid the race by adding the winch to the winch_handlers list before
registering the IRQ, and rolling back if um_request_irq() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2024-06-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39292/">CVE-2024-39292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39292">CVE-2024-39292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226955">SUSE bug 1226955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39293" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39293" ref_url="https://www.suse.com/security/cve/CVE-2024-39293" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "xsk: Support redirect to any socket bound to the same umem"

This reverts commit 2863d665ea41282379f108e4da6c8a2366ba66db.

This patch introduced a potential kernel crash when multiple napi instances
redirect to the same AF_XDP socket. By removing the queue_index check, it is
possible for multiple napi instances to access the Rx ring at the same time,
which will result in a corrupted ring state which can lead to a crash when
flushing the rings in __xsk_flush(). This can happen when the linked list of
sockets to flush gets corrupted by concurrent accesses. A quick and small fix
is not possible, so let us revert this for now.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39293/">CVE-2024-39293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39293">CVE-2024-39293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227102">SUSE bug 1227102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39296" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39296" ref_url="https://www.suse.com/security/cve/CVE-2024-39296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix oops during rmmod

"rmmod bonding" causes an oops ever since commit cc317ea3d927 ("bonding:
remove redundant NULL check in debugfs function").  Here are the relevant
functions being called:

bonding_exit()
  bond_destroy_debugfs()
    debugfs_remove_recursive(bonding_debug_root);
    bonding_debug_root = NULL; &lt;--------- SET TO NULL HERE
  bond_netlink_fini()
    rtnl_link_unregister()
      __rtnl_link_unregister()
        unregister_netdevice_many_notify()
          bond_uninit()
            bond_debug_unregister()
              (commit removed check for bonding_debug_root == NULL)
              debugfs_remove()
              simple_recursive_removal()
                down_write() -&gt; OOPS

However, reverting the bad commit does not solve the problem completely
because the original code contains a race that could cause the same
oops, although it was much less likely to be triggered unintentionally:

CPU1
  rmmod bonding
    bonding_exit()
      bond_destroy_debugfs()
        debugfs_remove_recursive(bonding_debug_root);

CPU2
  echo -bond0 &gt; /sys/class/net/bonding_masters
    bond_uninit()
      bond_debug_unregister()
        if (!bonding_debug_root)

CPU1
        bonding_debug_root = NULL;

So do NOT revert the bad commit (since the removed checks were racy
anyway), and instead change the order of actions taken during module
removal.  The same oops can also happen if there is an error during
module init, so apply the same fix there.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39296/">CVE-2024-39296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39296">CVE-2024-39296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226989">SUSE bug 1226989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39298" ref_url="https://www.suse.com/security/cve/CVE-2024-39298" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/memory-failure: fix handling of dissolved but not taken off from buddy pages

When I did memory failure tests recently, below panic occurs:

page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8cee00
flags: 0x6fffe0000000000(node=1|zone=2|lastcpupid=0x7fff)
raw: 06fffe0000000000 dead000000000100 dead000000000122 0000000000000000
raw: 0000000000000000 0000000000000009 00000000ffffffff 0000000000000000
page dumped because: VM_BUG_ON_PAGE(!PageBuddy(page))
------------[ cut here ]------------
kernel BUG at include/linux/page-flags.h:1009!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:__del_page_from_free_list+0x151/0x180
RSP: 0018:ffffa49c90437998 EFLAGS: 00000046
RAX: 0000000000000035 RBX: 0000000000000009 RCX: ffff8dd8dfd1c9c8
RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff8dd8dfd1c9c0
RBP: ffffd901233b8000 R08: ffffffffab5511f8 R09: 0000000000008c69
R10: 0000000000003c15 R11: ffffffffab5511f8 R12: ffff8dd8fffc0c80
R13: 0000000000000001 R14: ffff8dd8fffc0c80 R15: 0000000000000009
FS:  00007ff916304740(0000) GS:ffff8dd8dfd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055eae50124c8 CR3: 00000008479e0000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 __rmqueue_pcplist+0x23b/0x520
 get_page_from_freelist+0x26b/0xe40
 __alloc_pages_noprof+0x113/0x1120
 __folio_alloc_noprof+0x11/0xb0
 alloc_buddy_hugetlb_folio.isra.0+0x5a/0x130
 __alloc_fresh_hugetlb_folio+0xe7/0x140
 alloc_pool_huge_folio+0x68/0x100
 set_max_huge_pages+0x13d/0x340
 hugetlb_sysctl_handler_common+0xe8/0x110
 proc_sys_call_handler+0x194/0x280
 vfs_write+0x387/0x550
 ksys_write+0x64/0xe0
 do_syscall_64+0xc2/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff916114887
RSP: 002b:00007ffec8a2fd78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000055eae500e350 RCX: 00007ff916114887
RDX: 0000000000000004 RSI: 000055eae500e390 RDI: 0000000000000003
RBP: 000055eae50104c0 R08: 0000000000000000 R09: 000055eae50104c0
R10: 0000000000000077 R11: 0000000000000246 R12: 0000000000000004
R13: 0000000000000004 R14: 00007ff916216b80 R15: 00007ff916216a00
 &lt;/TASK&gt;
Modules linked in: mce_inject hwpoison_inject
---[ end trace 0000000000000000 ]---

And before the panic, there had an warning about bad page state:

BUG: Bad page state in process page-types  pfn:8cee00
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8cee00
flags: 0x6fffe0000000000(node=1|zone=2|lastcpupid=0x7fff)
page_type: 0xffffff7f(buddy)
raw: 06fffe0000000000 ffffd901241c0008 ffffd901240f8008 0000000000000000
raw: 0000000000000000 0000000000000009 00000000ffffff7f 0000000000000000
page dumped because: nonzero mapcount
Modules linked in: mce_inject hwpoison_inject
CPU: 8 PID: 154211 Comm: page-types Not tainted 6.9.0-rc4-00499-g5544ec3178e2-dirty #22
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x83/0xa0
 bad_page+0x63/0xf0
 free_unref_page+0x36e/0x5c0
 unpoison_memory+0x50b/0x630
 simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110
 debugfs_attr_write+0x42/0x60
 full_proxy_write+0x5b/0x80
 vfs_write+0xcd/0x550
 ksys_write+0x64/0xe0
 do_syscall_64+0xc2/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f189a514887
RSP: 002b:00007ffdcd899718 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f189a514887
RDX: 0000000000000009 RSI: 00007ffdcd899730 RDI: 0000000000000003
RBP: 00007ffdcd8997a0 R08: 0000000000000000 R09: 00007ffdcd8994b2
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdcda199a8
R13: 0000000000404af1 R14: 000000000040ad78 R15: 00007f189a7a5040
 &lt;/TASK&gt;

The root cause should be the below race:

 memory_failure
  try_memory_failure_hugetlb
   me_huge_page
    __page_handle_poison
     dissolve_free_hugetlb_folio
     drain_all_pages -- Buddy page can be isolated e.g. for compaction.
     take_page_off_buddy -- Failed as page is not in the 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-07-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39298/">CVE-2024-39298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39298">CVE-2024-39298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227082">SUSE bug 1227082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/9p: fix uninit-value in p9_client_rpc()

Syzbot with the help of KMSAN reported the following error:

BUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]
BUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 trace_9p_client_res include/trace/events/9p.h:146 [inline]
 p9_client_rpc+0x1314/0x1340 net/9p/client.c:754
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Uninit was created at:
 __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598
 __alloc_pages_node include/linux/gfp.h:238 [inline]
 alloc_pages_node include/linux/gfp.h:261 [inline]
 alloc_slab_page mm/slub.c:2175 [inline]
 allocate_slab mm/slub.c:2338 [inline]
 new_slab+0x2de/0x1400 mm/slub.c:2391
 ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525
 __slab_alloc mm/slub.c:3610 [inline]
 __slab_alloc_node mm/slub.c:3663 [inline]
 slab_alloc_node mm/slub.c:3835 [inline]
 kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852
 p9_tag_alloc net/9p/client.c:278 [inline]
 p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641
 p9_client_rpc+0x27e/0x1340 net/9p/client.c:688
 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031
 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410
 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122
 legacy_get_tree+0x114/0x290 fs/fs_context.c:662
 vfs_get_tree+0xa7/0x570 fs/super.c:1797
 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352
 path_mount+0x742/0x1f20 fs/namespace.c:3679
 do_mount fs/namespace.c:3692 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x725/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875
 do_syscall_64+0xd5/0x1f0
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

If p9_check_errors() fails early in p9_client_rpc(), req-&gt;rc.tag
will not be properly initialized. However, trace_9p_client_res()
ends up trying to print it out anyway before p9_client_rpc()
finishes.

Fix this issue by assigning default values to p9_fcall fields
such as 'tag' and (just in case KMSAN unearths something new) 'id'
during the tag allocation stage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226994">SUSE bug 1226994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39371</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39371" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check for non-NULL file pointer in io_file_can_poll()

In earlier kernels, it was possible to trigger a NULL pointer
dereference off the forced async preparation path, if no file had
been assigned. The trace leading to that looks as follows:

BUG: kernel NULL pointer dereference, address: 00000000000000b0
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 67 PID: 1633 Comm: buf-ring-invali Not tainted 6.8.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 2/2/2022
RIP: 0010:io_buffer_select+0xc3/0x210
Code: 00 00 48 39 d1 0f 82 ae 00 00 00 48 81 4b 48 00 00 01 00 48 89 73 70 0f b7 50 0c 66 89 53 42 85 ed 0f 85 d2 00 00 00 48 8b 13 &lt;48&gt; 8b 92 b0 00 00 00 48 83 7a 40 00 0f 84 21 01 00 00 4c 8b 20 5b
RSP: 0018:ffffb7bec38c7d88 EFLAGS: 00010246
RAX: ffff97af2be61000 RBX: ffff97af234f1700 RCX: 0000000000000040
RDX: 0000000000000000 RSI: ffff97aecfb04820 RDI: ffff97af234f1700
RBP: 0000000000000000 R08: 0000000000200030 R09: 0000000000000020
R10: ffffb7bec38c7dc8 R11: 000000000000c000 R12: ffffb7bec38c7db8
R13: ffff97aecfb05800 R14: ffff97aecfb05800 R15: ffff97af2be5e000
FS:  00007f852f74b740(0000) GS:ffff97b1eeec0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000b0 CR3: 000000016deab005 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 ? __die+0x1f/0x60
 ? page_fault_oops+0x14d/0x420
 ? do_user_addr_fault+0x61/0x6a0
 ? exc_page_fault+0x6c/0x150
 ? asm_exc_page_fault+0x22/0x30
 ? io_buffer_select+0xc3/0x210
 __io_import_iovec+0xb5/0x120
 io_readv_prep_async+0x36/0x70
 io_queue_sqe_fallback+0x20/0x260
 io_submit_sqes+0x314/0x630
 __do_sys_io_uring_enter+0x339/0xbc0
 ? __do_sys_io_uring_register+0x11b/0xc50
 ? vm_mmap_pgoff+0xce/0x160
 do_syscall_64+0x5f/0x180
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0x55e0a110a67e
Code: ba cc 00 00 00 45 31 c0 44 0f b6 92 d0 00 00 00 31 d2 41 b9 08 00 00 00 41 83 e2 01 41 c1 e2 04 41 09 c2 b8 aa 01 00 00 0f 05 &lt;c3&gt; 90 89 30 eb a9 0f 1f 40 00 48 8b 42 20 8b 00 a8 06 75 af 85 f6

because the request is marked forced ASYNC and has a bad file fd, and
hence takes the forced async prep path.

Current kernels with the request async prep cleaned up can no longer hit
this issue, but for ease of backporting, let's add this safety check in
here too as it really doesn't hurt. For both cases, this will inevitably
end with a CQE posted with -EBADF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226990">SUSE bug 1226990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39461</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39461" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39461" ref_url="https://www.suse.com/security/cve/CVE-2024-39461" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: bcm: rpi: Assign -&gt;num before accessing -&gt;hws

Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with
__counted_by") annotated the hws member of 'struct clk_hw_onecell_data'
with __counted_by, which informs the bounds sanitizer about the number
of elements in hws, so that it can warn when hws is accessed out of
bounds. As noted in that change, the __counted_by member must be
initialized with the number of elements before the first array access
happens, otherwise there will be a warning from each access prior to the
initialization because the number of elements is zero. This occurs in
raspberrypi_discover_clocks() due to -&gt;num being assigned after -&gt;hws
has been accessed:

  UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-raspberrypi.c:374:4
  index 3 is out of range for type 'struct clk_hw *[] __counted_by(num)' (aka 'struct clk_hw *[]')

Move the -&gt;num initialization to before the first access of -&gt;hws, which
clears up the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39461/">CVE-2024-39461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39461">CVE-2024-39461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227093">SUSE bug 1227093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39462</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39462" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39462" ref_url="https://www.suse.com/security/cve/CVE-2024-39462" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: bcm: dvp: Assign -&gt;num before accessing -&gt;hws

Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with
__counted_by") annotated the hws member of 'struct clk_hw_onecell_data'
with __counted_by, which informs the bounds sanitizer about the number
of elements in hws, so that it can warn when hws is accessed out of
bounds. As noted in that change, the __counted_by member must be
initialized with the number of elements before the first array access
happens, otherwise there will be a warning from each access prior to the
initialization because the number of elements is zero. This occurs in
clk_dvp_probe() due to -&gt;num being assigned after -&gt;hws has been
accessed:

  UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-bcm2711-dvp.c:59:2
  index 0 is out of range for type 'struct clk_hw *[] __counted_by(num)' (aka 'struct clk_hw *[]')

Move the -&gt;num initialization to before the first access of -&gt;hws, which
clears up the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39462/">CVE-2024-39462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39462">CVE-2024-39462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227094">SUSE bug 1227094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39463</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39463" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

9p: add missing locking around taking dentry fid list

Fix a use-after-free on dentry's d_fsdata fid list when a thread
looks up a fid through dentry while another thread unlinks it:

UAF thread:
refcount_t: addition on 0; use-after-free.
 p9_fid_get linux/./include/net/9p/client.h:262
 v9fs_fid_find+0x236/0x280 linux/fs/9p/fid.c:129
 v9fs_fid_lookup_with_uid linux/fs/9p/fid.c:181
 v9fs_fid_lookup+0xbf/0xc20 linux/fs/9p/fid.c:314
 v9fs_vfs_getattr_dotl+0xf9/0x360 linux/fs/9p/vfs_inode_dotl.c:400
 vfs_statx+0xdd/0x4d0 linux/fs/stat.c:248

Freed by:
 p9_fid_destroy (inlined)
 p9_client_clunk+0xb0/0xe0 linux/net/9p/client.c:1456
 p9_fid_put linux/./include/net/9p/client.h:278
 v9fs_dentry_release+0xb5/0x140 linux/fs/9p/vfs_dentry.c:55
 v9fs_remove+0x38f/0x620 linux/fs/9p/vfs_inode.c:518
 vfs_unlink+0x29a/0x810 linux/fs/namei.c:4335

The problem is that d_fsdata was not accessed under d_lock, because
d_release() normally is only called once the dentry is otherwise no
longer accessible but since we also call it explicitly in v9fs_remove
that lock is required:
move the hlist out of the dentry under lock then unref its fids once
they are no longer accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227091">SUSE bug 1227091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39464</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39464" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39464" ref_url="https://www.suse.com/security/cve/CVE-2024-39464" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l: async: Fix notifier list entry init

struct v4l2_async_notifier has several list_head members, but only
waiting_list and done_list are initialized. notifier_entry was kept
'zeroed' leading to an uninitialized list_head.
This results in a NULL-pointer dereference if csi2_async_register() fails,
e.g. node for remote endpoint is disabled, and returns -ENOTCONN.
The following calls to v4l2_async_nf_unregister() results in a NULL
pointer dereference.
Add the missing list head initializer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39464/">CVE-2024-39464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39464">CVE-2024-39464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227084">SUSE bug 1227084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39465</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39465" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39465" ref_url="https://www.suse.com/security/cve/CVE-2024-39465" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mgb4: Fix double debugfs remove

Fixes an error where debugfs_remove_recursive() is called first on a parent
directory and then again on a child which causes a kernel panic.

[hverkuil: added Fixes/Cc tags]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39465/">CVE-2024-39465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39465">CVE-2024-39465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227095">SUSE bug 1227095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39466</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39466" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39466" ref_url="https://www.suse.com/security/cve/CVE-2024-39466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/qcom/lmh: Check for SCM availability at probe

Up until now, the necessary scm availability check has not been
performed, leading to possible null pointer dereferences (which did
happen for me on RB1).

Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39466/">CVE-2024-39466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39466">CVE-2024-39466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227089">SUSE bug 1227089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39467</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39467" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39467" ref_url="https://www.suse.com/security/cve/CVE-2024-39467" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to do sanity check on i_xattr_nid in sanity_check_inode()

syzbot reports a kernel bug as below:

F2FS-fs (loop0): Mounted with checkpoint version = 48b305e4
==================================================================
BUG: KASAN: slab-out-of-bounds in f2fs_test_bit fs/f2fs/f2fs.h:2933 [inline]
BUG: KASAN: slab-out-of-bounds in current_nat_addr fs/f2fs/node.h:213 [inline]
BUG: KASAN: slab-out-of-bounds in f2fs_get_node_info+0xece/0x1200 fs/f2fs/node.c:600
Read of size 1 at addr ffff88807a58c76c by task syz-executor280/5076

CPU: 1 PID: 5076 Comm: syz-executor280 Not tainted 6.9.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 f2fs_test_bit fs/f2fs/f2fs.h:2933 [inline]
 current_nat_addr fs/f2fs/node.h:213 [inline]
 f2fs_get_node_info+0xece/0x1200 fs/f2fs/node.c:600
 f2fs_xattr_fiemap fs/f2fs/data.c:1848 [inline]
 f2fs_fiemap+0x55d/0x1ee0 fs/f2fs/data.c:1925
 ioctl_fiemap fs/ioctl.c:220 [inline]
 do_vfs_ioctl+0x1c07/0x2e50 fs/ioctl.c:838
 __do_sys_ioctl fs/ioctl.c:902 [inline]
 __se_sys_ioctl+0x81/0x170 fs/ioctl.c:890
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The root cause is we missed to do sanity check on i_xattr_nid during
f2fs_iget(), so that in fiemap() path, current_nat_addr() will access
nat_bitmap w/ offset from invalid i_xattr_nid, result in triggering
kasan bug report, fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-06-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39467/">CVE-2024-39467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39467">CVE-2024-39467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226991">SUSE bug 1226991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39468</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39468" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix deadlock in smb2_find_smb_tcon()

Unlock cifs_tcp_ses_lock before calling cifs_put_smb_ses() to avoid such
deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227103">SUSE bug 1227103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39469</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39469" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors

The error handling in nilfs_empty_dir() when a directory folio/page read
fails is incorrect, as in the old ext2 implementation, and if the
folio/page cannot be read or nilfs_check_folio() fails, it will falsely
determine the directory as empty and corrupt the file system.

In addition, since nilfs_empty_dir() does not immediately return on a
failed folio/page read, but continues to loop, this can cause a long loop
with I/O if i_size of the directory's inode is also corrupted, causing the
log writer thread to wait and hang, as reported by syzbot.

Fix these issues by making nilfs_empty_dir() immediately return a false
value (0) if it fails to get a directory folio/page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226992">SUSE bug 1226992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39470</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39470" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39470" ref_url="https://www.suse.com/security/cve/CVE-2024-39470" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventfs: Fix a possible null pointer dereference in eventfs_find_events()

In function eventfs_find_events,there is a potential null pointer
that may be caused by calling update_events_attr which will perform
some operations on the members of the ei struct when ei is NULL.

Hence,When ei-&gt;is_freed is set,return NULL directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39470/">CVE-2024-39470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39470">CVE-2024-39470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226988">SUSE bug 1226988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39471</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39471" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add error handle to avoid out-of-bounds

if the sdma_v4_0_irq_id_to_seq return -EINVAL, the process should
be stop to avoid out-of-bounds read, so directly return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227096">SUSE bug 1227096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39472</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix log recovery buffer allocation for the legacy h_size fixup

Commit a70f9fe52daa ("xfs: detect and handle invalid iclog size set by
mkfs") added a fixup for incorrect h_size values used for the initial
umount record in old xfsprogs versions.  Later commit 0c771b99d6c9
("xfs: clean up calculation of LR header blocks") cleaned up the log
reover buffer calculation, but stoped using the fixed up h_size value
to size the log recovery buffer, which can lead to an out of bounds
access when the incorrect h_size does not come from the old mkfs
tool, but a fuzzer.

Fix this by open coding xlog_logrec_hblks and taking the fixed h_size
into account for this calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227432">SUSE bug 1227432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39473</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39473" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39473" ref_url="https://www.suse.com/security/cve/CVE-2024-39473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: ipc4-topology: Fix input format query of process modules without base extension

If a process module does not have base config extension then the same
format applies to all of it's inputs and the process-&gt;base_config_ext is
NULL, causing NULL dereference when specifically crafted topology and
sequences used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39473/">CVE-2024-39473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39473">CVE-2024-39473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227433">SUSE bug 1227433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39474</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39474" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39474" ref_url="https://www.suse.com/security/cve/CVE-2024-39474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc: fix vmalloc which may return null if called with __GFP_NOFAIL

commit a421ef303008 ("mm: allow !GFP_KERNEL allocations for kvmalloc")
includes support for __GFP_NOFAIL, but it presents a conflict with commit
dd544141b9eb ("vmalloc: back off when the current task is OOM-killed").  A
possible scenario is as follows:

process-a
__vmalloc_node_range(GFP_KERNEL | __GFP_NOFAIL)
    __vmalloc_area_node()
        vm_area_alloc_pages()
		--&gt; oom-killer send SIGKILL to process-a
        if (fatal_signal_pending(current)) break;
--&gt; return NULL;

To fix this, do not check fatal_signal_pending() in vm_area_alloc_pages()
if __GFP_NOFAIL set.

This issue occurred during OPLUS KASAN TEST. Below is part of the log
-&gt; oom-killer sends signal to process
[65731.222840] [ T1308] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/apps/uid_10198,task=gs.intelligence,pid=32454,uid=10198

[65731.259685] [T32454] Call trace:
[65731.259698] [T32454]  dump_backtrace+0xf4/0x118
[65731.259734] [T32454]  show_stack+0x18/0x24
[65731.259756] [T32454]  dump_stack_lvl+0x60/0x7c
[65731.259781] [T32454]  dump_stack+0x18/0x38
[65731.259800] [T32454]  mrdump_common_die+0x250/0x39c [mrdump]
[65731.259936] [T32454]  ipanic_die+0x20/0x34 [mrdump]
[65731.260019] [T32454]  atomic_notifier_call_chain+0xb4/0xfc
[65731.260047] [T32454]  notify_die+0x114/0x198
[65731.260073] [T32454]  die+0xf4/0x5b4
[65731.260098] [T32454]  die_kernel_fault+0x80/0x98
[65731.260124] [T32454]  __do_kernel_fault+0x160/0x2a8
[65731.260146] [T32454]  do_bad_area+0x68/0x148
[65731.260174] [T32454]  do_mem_abort+0x151c/0x1b34
[65731.260204] [T32454]  el1_abort+0x3c/0x5c
[65731.260227] [T32454]  el1h_64_sync_handler+0x54/0x90
[65731.260248] [T32454]  el1h_64_sync+0x68/0x6c

[65731.260269] [T32454]  z_erofs_decompress_queue+0x7f0/0x2258
--&gt; be-&gt;decompressed_pages = kvcalloc(be-&gt;nr_pages, sizeof(struct page *), GFP_KERNEL | __GFP_NOFAIL);
	kernel panic by NULL pointer dereference.
	erofs assume kvmalloc with __GFP_NOFAIL never return NULL.
[65731.260293] [T32454]  z_erofs_runqueue+0xf30/0x104c
[65731.260314] [T32454]  z_erofs_readahead+0x4f0/0x968
[65731.260339] [T32454]  read_pages+0x170/0xadc
[65731.260364] [T32454]  page_cache_ra_unbounded+0x874/0xf30
[65731.260388] [T32454]  page_cache_ra_order+0x24c/0x714
[65731.260411] [T32454]  filemap_fault+0xbf0/0x1a74
[65731.260437] [T32454]  __do_fault+0xd0/0x33c
[65731.260462] [T32454]  handle_mm_fault+0xf74/0x3fe0
[65731.260486] [T32454]  do_mem_abort+0x54c/0x1b34
[65731.260509] [T32454]  el0_da+0x44/0x94
[65731.260531] [T32454]  el0t_64_sync_handler+0x98/0xb4
[65731.260553] [T32454]  el0t_64_sync+0x198/0x19c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39474/">CVE-2024-39474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39474">CVE-2024-39474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227434">SUSE bug 1227434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39475</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39475" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: savage: Handle err return when savagefb_check_var failed

The commit 04e5eac8f3ab("fbdev: savage: Error out if pixclock equals zero")
checks the value of pixclock to avoid divide-by-zero error. However
the function savagefb_probe doesn't handle the error return of
savagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227435">SUSE bug 1227435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39476</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING

Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with
small possibility, the root cause is exactly the same as commit
bed9e27baf52 ("Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"")

However, Dan reported another hang after that, and junxiao investigated
the problem and found out that this is caused by plugged bio can't issue
from raid5d().

Current implementation in raid5d() has a weird dependence:

1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear
   MD_SB_CHANGE_PENDING;
2) raid5d() handles IO in a deadloop, until all IO are issued;
3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;

This behaviour is introduce before v2.6, and for consequence, if other
context hold 'reconfig_mutex', and md_check_recovery() can't update
super_block, then raid5d() will waste one cpu 100% by the deadloop, until
'reconfig_mutex' is released.

Refer to the implementation from raid1 and raid10, fix this problem by
skipping issue IO if MD_SB_CHANGE_PENDING is still set after
md_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'
is released. Meanwhile, the hang problem will be fixed as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227437">SUSE bug 1227437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39477</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39477" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39477" ref_url="https://www.suse.com/security/cve/CVE-2024-39477" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: do not call vma_add_reservation upon ENOMEM

sysbot reported a splat [1] on __unmap_hugepage_range().  This is because
vma_needs_reservation() can return -ENOMEM if
allocate_file_region_entries() fails to allocate the file_region struct
for the reservation.

Check for that and do not call vma_add_reservation() if that is the case,
otherwise region_abort() and region_del() will see that we do not have any
file_regions.

If we detect that vma_needs_reservation() returned -ENOMEM, we clear the
hugetlb_restore_reserve flag as if this reservation was still consumed, so
free_huge_folio() will not increment the resv count.

[1] https://lore.kernel.org/linux-mm/0000000000004096100617c58d54@google.com/T/#ma5983bc1ab18a54910da83416b3f89f3c7ee43aa
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39477/">CVE-2024-39477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39477">CVE-2024-39477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227439">SUSE bug 1227439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39478</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39478" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39478" ref_url="https://www.suse.com/security/cve/CVE-2024-39478" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: starfive - Do not free stack buffer

RSA text data uses variable length buffer allocated in software stack.
Calling kfree on it causes undefined behaviour in subsequent operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-39478/">CVE-2024-39478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39478">CVE-2024-39478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227440">SUSE bug 1227440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39479</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39479" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39479" ref_url="https://www.suse.com/security/cve/CVE-2024-39479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/hwmon: Get rid of devm

When both hwmon and hwmon drvdata (on which hwmon depends) are device
managed resources, the expectation, on device unbind, is that hwmon will be
released before drvdata. However, in i915 there are two separate code
paths, which both release either drvdata or hwmon and either can be
released before the other. These code paths (for device unbind) are as
follows (see also the bug referenced below):

Call Trace:
release_nodes+0x11/0x70
devres_release_group+0xb2/0x110
component_unbind_all+0x8d/0xa0
component_del+0xa5/0x140
intel_pxp_tee_component_fini+0x29/0x40 [i915]
intel_pxp_fini+0x33/0x80 [i915]
i915_driver_remove+0x4c/0x120 [i915]
i915_pci_remove+0x19/0x30 [i915]
pci_device_remove+0x32/0xa0
device_release_driver_internal+0x19c/0x200
unbind_store+0x9c/0xb0

and

Call Trace:
release_nodes+0x11/0x70
devres_release_all+0x8a/0xc0
device_unbind_cleanup+0x9/0x70
device_release_driver_internal+0x1c1/0x200
unbind_store+0x9c/0xb0

This means that in i915, if use devm, we cannot gurantee that hwmon will
always be released before drvdata. Which means that we have a uaf if hwmon
sysfs is accessed when drvdata has been released but hwmon hasn't.

The only way out of this seems to be do get rid of devm_ and release/free
everything explicitly during device unbind.

v2: Change commit message and other minor code changes
v3: Cleanup from i915_hwmon_register on error (Armin Wolf)
v4: Eliminate potential static analyzer warning (Rodrigo)
    Eliminate fetch_and_zero (Jani)
v5: Restore previous logic for ddat_gt-&gt;hwmon_dev error return (Andi)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39479/">CVE-2024-39479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39479">CVE-2024-39479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227443">SUSE bug 1227443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39480</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39480" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39480" ref_url="https://www.suse.com/security/cve/CVE-2024-39480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kdb: Fix buffer overflow during tab-complete

Currently, when the user attempts symbol completion with the Tab key, kdb
will use strncpy() to insert the completed symbol into the command buffer.
Unfortunately it passes the size of the source buffer rather than the
destination to strncpy() with predictably horrible results. Most obviously
if the command buffer is already full but cp, the cursor position, is in
the middle of the buffer, then we will write past the end of the supplied
buffer.

Fix this by replacing the dubious strncpy() calls with memmove()/memcpy()
calls plus explicit boundary checks to make sure we have enough space
before we start moving characters around.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39480/">CVE-2024-39480 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39480">CVE-2024-39480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227445">SUSE bug 1227445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39481</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39481" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39481" ref_url="https://www.suse.com/security/cve/CVE-2024-39481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mc: Fix graph walk in media_pipeline_start

The graph walk tries to follow all links, even if they are not between
pads. This causes a crash with, e.g. a MEDIA_LNK_FL_ANCILLARY_LINK link.

Fix this by allowing the walk to proceed only for MEDIA_LNK_FL_DATA_LINK
links.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39481/">CVE-2024-39481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39481">CVE-2024-39481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227446">SUSE bug 1227446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39482</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39482" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: fix variable length array abuse in btree_iter

btree_iter is used in two ways: either allocated on the stack with a
fixed size MAX_BSETS, or from a mempool with a dynamic size based on the
specific cache set. Previously, the struct had a fixed-length array of
size MAX_BSETS which was indexed out-of-bounds for the dynamically-sized
iterators, which causes UBSAN to complain.

This patch uses the same approach as in bcachefs's sort_iter and splits
the iterator into a btree_iter with a flexible array member and a
btree_iter_stack which embeds a btree_iter as well as a fixed-length
data array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-10-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227447">SUSE bug 1227447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39483</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39483" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39483" ref_url="https://www.suse.com/security/cve/CVE-2024-39483" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked

When requesting an NMI window, WARN on vNMI support being enabled if and
only if NMIs are actually masked, i.e. if the vCPU is already handling an
NMI.  KVM's ABI for NMIs that arrive simultanesouly (from KVM's point of
view) is to inject one NMI and pend the other.  When using vNMI, KVM pends
the second NMI simply by setting V_NMI_PENDING, and lets the CPU do the
rest (hardware automatically sets V_NMI_BLOCKING when an NMI is injected).

However, if KVM can't immediately inject an NMI, e.g. because the vCPU is
in an STI shadow or is running with GIF=0, then KVM will request an NMI
window and trigger the WARN (but still function correctly).

Whether or not the GIF=0 case makes sense is debatable, as the intent of
KVM's behavior is to provide functionality that is as close to real
hardware as possible.  E.g. if two NMIs are sent in quick succession, the
probability of both NMIs arriving in an STI shadow is infinitesimally low
on real hardware, but significantly larger in a virtual environment, e.g.
if the vCPU is preempted in the STI shadow.  For GIF=0, the argument isn't
as clear cut, because the window where two NMIs can collide is much larger
in bare metal (though still small).

That said, KVM should not have divergent behavior for the GIF=0 case based
on whether or not vNMI support is enabled.  And KVM has allowed
simultaneous NMIs with GIF=0 for over a decade, since commit 7460fb4a3400
("KVM: Fix simultaneous NMIs").  I.e. KVM's GIF=0 handling shouldn't be
modified without a *really* good reason to do so, and if KVM's behavior
were to be modified, it should be done irrespective of vNMI support.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-10-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39483/">CVE-2024-39483 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227494">SUSE bug 1227494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39484</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39484" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39484" ref_url="https://www.suse.com/security/cve/CVE-2024-39484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: davinci: Don't strip remove function when driver is builtin

Using __exit for the remove function results in the remove callback being
discarded with CONFIG_MMC_DAVINCI=y. When such a device gets unbound (e.g.
using sysfs or hotplug), the driver is just removed without the cleanup
being performed. This results in resource leaks. Fix it by compiling in the
remove callback unconditionally.

This also fixes a W=1 modpost warning:

WARNING: modpost: drivers/mmc/host/davinci_mmc: section mismatch in
reference: davinci_mmcsd_driver+0x10 (section: .data) -&gt;
davinci_mmcsd_remove (section: .exit.text)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39484/">CVE-2024-39484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39484">CVE-2024-39484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227493">SUSE bug 1227493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39485</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39485" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39485" ref_url="https://www.suse.com/security/cve/CVE-2024-39485" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l: async: Properly re-initialise notifier entry in unregister

The notifier_entry of a notifier is not re-initialised after unregistering
the notifier. This leads to dangling pointers being left there so use
list_del_init() to return the notifier_entry an empty list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-39485/">CVE-2024-39485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39485">CVE-2024-39485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227449">SUSE bug 1227449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39486</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39486" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39486" ref_url="https://www.suse.com/security/cve/CVE-2024-39486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/drm_file: Fix pid refcounting race

&lt;maarten.lankhorst@linux.intel.com&gt;, Maxime Ripard
&lt;mripard@kernel.org&gt;, Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

filp-&gt;pid is supposed to be a refcounted pointer; however, before this
patch, drm_file_update_pid() only increments the refcount of a struct
pid after storing a pointer to it in filp-&gt;pid and dropping the
dev-&gt;filelist_mutex, making the following race possible:

process A               process B
=========               =========
                        begin drm_file_update_pid
                        mutex_lock(&amp;dev-&gt;filelist_mutex)
                        rcu_replace_pointer(filp-&gt;pid, &lt;pid B&gt;, 1)
                        mutex_unlock(&amp;dev-&gt;filelist_mutex)
begin drm_file_update_pid
mutex_lock(&amp;dev-&gt;filelist_mutex)
rcu_replace_pointer(filp-&gt;pid, &lt;pid A&gt;, 1)
mutex_unlock(&amp;dev-&gt;filelist_mutex)
get_pid(&lt;pid A&gt;)
synchronize_rcu()
put_pid(&lt;pid B&gt;)   *** pid B reaches refcount 0 and is freed here ***
                        get_pid(&lt;pid B&gt;)   *** UAF ***
                        synchronize_rcu()
                        put_pid(&lt;pid A&gt;)

As far as I know, this race can only occur with CONFIG_PREEMPT_RCU=y
because it requires RCU to detect a quiescent state in code that is not
explicitly calling into the scheduler.

This race leads to use-after-free of a "struct pid".
It is probably somewhat hard to hit because process A has to pass
through a synchronize_rcu() operation while process B is between
mutex_unlock() and get_pid().

Fix it by ensuring that by the time a pointer to the current task's pid
is stored in the file, an extra reference to the pid has been taken.

This fix also removes the condition for synchronize_rcu(); I think
that optimization is unnecessary complexity, since in that case we
would usually have bailed out on the lockless check above.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39486/">CVE-2024-39486 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39486">CVE-2024-39486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227492">SUSE bug 1227492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39487</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()

In function bond_option_arp_ip_targets_set(), if newval-&gt;string is an
empty string, newval-&gt;string+1 will point to the byte after the
string, causing an out-of-bound read.

BUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418
Read of size 1 at addr ffff8881119c4781 by task syz-executor665/8107
CPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0xc1/0x5e0 mm/kasan/report.c:475
 kasan_report+0xbe/0xf0 mm/kasan/report.c:588
 strlen+0x7d/0xa0 lib/string.c:418
 __fortify_strlen include/linux/fortify-string.h:210 [inline]
 in4_pton+0xa3/0x3f0 net/core/utils.c:130
 bond_option_arp_ip_targets_set+0xc2/0x910
drivers/net/bonding/bond_options.c:1201
 __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767
 __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792
 bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817
 bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156
 dev_attr_store+0x54/0x80 drivers/base/core.c:2366
 sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136
 kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x96a/0xd80 fs/read_write.c:584
 ksys_write+0x122/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
---[ end trace ]---

Fix it by adding a check of string length before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227573">SUSE bug 1227573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39488</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39488" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY

When CONFIG_DEBUG_BUGVERBOSE=n, we fail to add necessary padding bytes
to bug_table entries, and as a result the last entry in a bug table will
be ignored, potentially leading to an unexpected panic(). All prior
entries in the table will be handled correctly.

The arm64 ABI requires that struct fields of up to 8 bytes are
naturally-aligned, with padding added within a struct such that struct
are suitably aligned within arrays.

When CONFIG_DEBUG_BUGVERPOSE=y, the layout of a bug_entry is:

	struct bug_entry {
		signed int      bug_addr_disp;	// 4 bytes
		signed int      file_disp;	// 4 bytes
		unsigned short  line;		// 2 bytes
		unsigned short  flags;		// 2 bytes
	}

... with 12 bytes total, requiring 4-byte alignment.

When CONFIG_DEBUG_BUGVERBOSE=n, the layout of a bug_entry is:

	struct bug_entry {
		signed int      bug_addr_disp;	// 4 bytes
		unsigned short  flags;		// 2 bytes
		&lt; implicit padding &gt;		// 2 bytes
	}

... with 8 bytes total, with 6 bytes of data and 2 bytes of trailing
padding, requiring 4-byte alginment.

When we create a bug_entry in assembly, we align the start of the entry
to 4 bytes, which implicitly handles padding for any prior entries.
However, we do not align the end of the entry, and so when
CONFIG_DEBUG_BUGVERBOSE=n, the final entry lacks the trailing padding
bytes.

For the main kernel image this is not a problem as find_bug() doesn't
depend on the trailing padding bytes when searching for entries:

	for (bug = __start___bug_table; bug &lt; __stop___bug_table; ++bug)
		if (bugaddr == bug_addr(bug))
			return bug;

However for modules, module_bug_finalize() depends on the trailing
bytes when calculating the number of entries:

	mod-&gt;num_bugs = sechdrs[i].sh_size / sizeof(struct bug_entry);

... and as the last bug_entry lacks the necessary padding bytes, this entry
will not be counted, e.g. in the case of a single entry:

	sechdrs[i].sh_size == 6
	sizeof(struct bug_entry) == 8;

	sechdrs[i].sh_size / sizeof(struct bug_entry) == 0;

Consequently module_find_bug() will miss the last bug_entry when it does:

	for (i = 0; i &lt; mod-&gt;num_bugs; ++i, ++bug)
		if (bugaddr == bug_addr(bug))
			goto out;

... which can lead to a kenrel panic due to an unhandled bug.

This can be demonstrated with the following module:

	static int __init buginit(void)
	{
		WARN(1, "hello\n");
		return 0;
	}

	static void __exit bugexit(void)
	{
	}

	module_init(buginit);
	module_exit(bugexit);
	MODULE_LICENSE("GPL");

... which will trigger a kernel panic when loaded:

	------------[ cut here ]------------
	hello
	Unexpected kernel BRK exception at EL1
	Internal error: BRK handler: 00000000f2000800 [#1] PREEMPT SMP
	Modules linked in: hello(O+)
	CPU: 0 PID: 50 Comm: insmod Tainted: G           O       6.9.1 #8
	Hardware name: linux,dummy-virt (DT)
	pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
	pc : buginit+0x18/0x1000 [hello]
	lr : buginit+0x18/0x1000 [hello]
	sp : ffff800080533ae0
	x29: ffff800080533ae0 x28: 0000000000000000 x27: 0000000000000000
	x26: ffffaba8c4e70510 x25: ffff800080533c30 x24: ffffaba8c4a28a58
	x23: 0000000000000000 x22: 0000000000000000 x21: ffff3947c0eab3c0
	x20: ffffaba8c4e3f000 x19: ffffaba846464000 x18: 0000000000000006
	x17: 0000000000000000 x16: ffffaba8c2492834 x15: 0720072007200720
	x14: 0720072007200720 x13: ffffaba8c49b27c8 x12: 0000000000000312
	x11: 0000000000000106 x10: ffffaba8c4a0a7c8 x9 : ffffaba8c49b27c8
	x8 : 00000000ffffefff x7 : ffffaba8c4a0a7c8 x6 : 80000000fffff000
	x5 : 0000000000000107 x4 : 0000000000000000 x3 : 0000000000000000
	x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff3947c0eab3c0
	Call trace:
	 buginit+0x18/0x1000 [hello]
	 do_one_initcall+0x80/0x1c8
	 do_init_module+0x60/0x218
	 load_module+0x1ba4/0x1d70
	 __do_sys_init_module+0x198/0x1d0
	 __arm64_sys_init_module+0x1c/0x28
	 invoke_syscall+0x48/0x114
	 el0_svc
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227618">SUSE bug 1227618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39489</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39489" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix memleak in seg6_hmac_init_algo

seg6_hmac_init_algo returns without cleaning up the previous allocations
if one fails, so it's going to leak all that memory and the crypto tfms.

Update seg6_hmac_exit to only free the memory when allocated, so we can
reuse the code directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227623">SUSE bug 1227623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39490</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39490" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix missing sk_buff release in seg6_input_core

The seg6_input() function is responsible for adding the SRH into a
packet, delegating the operation to the seg6_input_core(). This function
uses the skb_cow_head() to ensure that there is sufficient headroom in
the sk_buff for accommodating the link-layer header.
In the event that the skb_cow_header() function fails, the
seg6_input_core() catches the error but it does not release the sk_buff,
which will result in a memory leak.

This issue was introduced in commit af3b5158b89d ("ipv6: sr: fix BUG due
to headroom too small after SRH push") and persists even after commit
7a3f5b0de364 ("netfilter: add netfilter hooks to SRv6 data plane"),
where the entire seg6_input() code was refactored to deal with netfilter
hooks.

The proposed patch addresses the identified memory leak by requiring the
seg6_input_core() function to release the sk_buff in the event that
skb_cow_head() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227626">SUSE bug 1227626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39491</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39491" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39491" ref_url="https://www.suse.com/security/cve/CVE-2024-39491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: cs35l56: Fix lifetime of cs_dsp instance

The cs_dsp instance is initialized in the driver probe() so it
should be freed in the driver remove(). Also fix a missing call
to cs_dsp_remove() in the error path of cs35l56_hda_common_probe().

The call to cs_dsp_remove() was being done in the component unbind
callback cs35l56_hda_unbind(). This meant that if the driver was
unbound and then re-bound it would be using an uninitialized cs_dsp
instance.

It is best to initialize the cs_dsp instance in probe() so that it
can return an error if it fails. The component binding API doesn't
have any error handling so there's no way to handle a failure if
cs_dsp was initialized in the bind.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-39491/">CVE-2024-39491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39491">CVE-2024-39491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227627">SUSE bug 1227627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39492</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39492" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39492" ref_url="https://www.suse.com/security/cve/CVE-2024-39492" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: mtk-cmdq: Fix pm_runtime_get_sync() warning in mbox shutdown

The return value of pm_runtime_get_sync() in cmdq_mbox_shutdown()
will return 1 when pm runtime state is active, and we don't want to
get the warning message in this case.

So we change the return value &lt; 0 for WARN_ON().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39492/">CVE-2024-39492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39492">CVE-2024-39492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227619">SUSE bug 1227619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39493</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39493" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak

Using completion_done to determine whether the caller has gone
away only works after a complete call.  Furthermore it's still
possible that the caller has not yet called wait_for_completion,
resulting in another potential UAF.

Fix this by making the caller use cancel_work_sync and then freeing
the memory safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227620">SUSE bug 1227620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39494</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39494" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Fix use-after-free on a dentry's dname.name

-&gt;d_name.name can change on rename and the earlier value can be freed;
there are conditions sufficient to stabilize it (-&gt;d_lock on dentry,
-&gt;d_lock on its parent, -&gt;i_rwsem exclusive on the parent's inode,
rename_lock), but none of those are met at any of the sites. Take a stable
snapshot of the name instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227901">SUSE bug 1227901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39495</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39495" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39495" ref_url="https://www.suse.com/security/cve/CVE-2024-39495" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

greybus: Fix use-after-free bug in gb_interface_release due to race condition.

In gb_interface_create, &amp;intf-&gt;mode_switch_completion is bound with
gb_interface_mode_switch_work. Then it will be started by
gb_interface_request_mode_switch. Here is the relevant code.
if (!queue_work(system_long_wq, &amp;intf-&gt;mode_switch_work)) {
	...
}

If we call gb_interface_release to make cleanup, there may be an
unfinished work. This function will call kfree to free the object
"intf". However, if gb_interface_mode_switch_work is scheduled to
run after kfree, it may cause use-after-free error as
gb_interface_mode_switch_work will use the object "intf".
The possible execution flow that may lead to the issue is as follows:

CPU0                            CPU1

                            |   gb_interface_create
                            |   gb_interface_request_mode_switch
gb_interface_release        |
kfree(intf) (free)          |
                            |   gb_interface_mode_switch_work
                            |   mutex_lock(&amp;intf-&gt;mutex) (use)

Fix it by canceling the work before kfree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-07-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-39495/">CVE-2024-39495 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39495">CVE-2024-39495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227717">SUSE bug 1227717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39496</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39496" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39496" ref_url="https://www.suse.com/security/cve/CVE-2024-39496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: fix use-after-free due to race with dev replace

While loading a zone's info during creation of a block group, we can race
with a device replace operation and then trigger a use-after-free on the
device that was just replaced (source device of the replace operation).

This happens because at btrfs_load_zone_info() we extract a device from
the chunk map into a local variable and then use the device while not
under the protection of the device replace rwsem. So if there's a device
replace operation happening when we extract the device and that device
is the source of the replace operation, we will trigger a use-after-free
if before we finish using the device the replace operation finishes and
frees the device.

Fix this by enlarging the critical section under the protection of the
device replace rwsem so that all uses of the device are done inside the
critical section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39496/">CVE-2024-39496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39496">CVE-2024-39496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227719">SUSE bug 1227719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227904">SUSE bug 1227904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39497</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39497" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE)

Lack of check for copy-on-write (COW) mapping in drm_gem_shmem_mmap
allows users to call mmap with PROT_WRITE and MAP_PRIVATE flag
causing a kernel panic due to BUG_ON in vmf_insert_pfn_prot:
BUG_ON((vma-&gt;vm_flags &amp; VM_PFNMAP) &amp;&amp; is_cow_mapping(vma-&gt;vm_flags));

Return -EINVAL early if COW mapping is detected.

This bug affects all drm drivers using default shmem helpers.
It can be reproduced by this simple example:
void *ptr = mmap(0, size, PROT_WRITE, MAP_PRIVATE, fd, mmap_offset);
ptr[0] = 0;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227722">SUSE bug 1227722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39498</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39498" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39498" ref_url="https://www.suse.com/security/cve/CVE-2024-39498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mst: Fix NULL pointer dereference at drm_dp_add_payload_part2

[Why]
Commit:
- commit 5aa1dfcdf0a4 ("drm/mst: Refactor the flow for payload allocation/removement")
accidently overwrite the commit
- commit 54d217406afe ("drm: use mgr-&gt;dev in drm_dbg_kms in drm_dp_add_payload_part2")
which cause regression.

[How]
Recover the original NULL fix and remove the unnecessary input parameter 'state' for
drm_dp_add_payload_part2().

(cherry picked from commit 4545614c1d8da603e57b60dd66224d81b6ffc305)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39498/">CVE-2024-39498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39498">CVE-2024-39498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227723">SUSE bug 1227723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39499</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39499" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmci: prevent speculation leaks by sanitizing event in event_deliver()

Coverity spotted that event_msg is controlled by user-space,
event_msg-&gt;event_data.event is passed to event_deliver() and used
as an index without sanitization.

This change ensures that the event index is sanitized to mitigate any
possibility of speculative information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.

Only compile tested, no access to HW.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227725">SUSE bug 1227725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39500</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: avoid race between sock_map_close and sk_psock_put

sk_psock_get will return NULL if the refcount of psock has gone to 0, which
will happen when the last call of sk_psock_put is done. However,
sk_psock_drop may not have finished yet, so the close callback will still
point to sock_map_close despite psock being NULL.

This can be reproduced with a thread deleting an element from the sock map,
while the second one creates a socket, adds it to the map and closes it.

That will trigger the WARN_ON_ONCE:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 7220 at net/core/sock_map.c:1701 sock_map_close+0x2a2/0x2d0 net/core/sock_map.c:1701
Modules linked in:
CPU: 1 PID: 7220 Comm: syz-executor380 Not tainted 6.9.0-syzkaller-07726-g3c999d1ae3c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:sock_map_close+0x2a2/0x2d0 net/core/sock_map.c:1701
Code: df e8 92 29 88 f8 48 8b 1b 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 79 29 88 f8 4c 8b 23 eb 89 e8 4f 15 23 f8 90 &lt;0f&gt; 0b 90 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d e9 13 26 3d 02
RSP: 0018:ffffc9000441fda8 EFLAGS: 00010293
RAX: ffffffff89731ae1 RBX: ffffffff94b87540 RCX: ffff888029470000
RDX: 0000000000000000 RSI: ffffffff8bcab5c0 RDI: ffffffff8c1faba0
RBP: 0000000000000000 R08: ffffffff92f9b61f R09: 1ffffffff25f36c3
R10: dffffc0000000000 R11: fffffbfff25f36c4 R12: ffffffff89731840
R13: ffff88804b587000 R14: ffff88804b587000 R15: ffffffff89731870
FS:  000055555e080380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000207d4000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 unix_release+0x87/0xc0 net/unix/af_unix.c:1048
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbe/0x240 net/socket.c:1421
 __fput+0x42b/0x8a0 fs/file_table.c:422
 __do_sys_close fs/open.c:1556 [inline]
 __se_sys_close fs/open.c:1541 [inline]
 __x64_sys_close+0x7f/0x110 fs/open.c:1541
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb37d618070
Code: 00 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d4 e8 10 2c 00 00 80 3d 31 f0 07 00 00 74 17 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c
RSP: 002b:00007ffcd4a525d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fb37d618070
RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000100000000 R09: 0000000100000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Use sk_psock, which will only check that the pointer is not been set to
NULL yet, which should only happen after the callbacks are restored. If,
then, a reference can still be gotten, we may call sk_psock_stop and cancel
psock-&gt;work.

As suggested by Paolo Abeni, reorder the condition so the control flow is
less convoluted.

After that change, the reproducer does not trigger the WARN_ON_ONCE
anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227724">SUSE bug 1227724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39501</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39501" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: core: synchronize really_probe() and dev_uevent()

Synchronize the dev-&gt;driver usage in really_probe() and dev_uevent().
These can run in different threads, what can result in the following
race condition for dev-&gt;driver uninitialization:

Thread #1:
==========

really_probe() {
...
probe_failed:
...
device_unbind_cleanup(dev) {
    ...
    dev-&gt;driver = NULL;   // &lt;= Failed probe sets dev-&gt;driver to NULL
    ...
    }
...
}

Thread #2:
==========

dev_uevent() {
...
if (dev-&gt;driver)
      // If dev-&gt;driver is NULLed from really_probe() from here on,
      // after above check, the system crashes
      add_uevent_var(env, "DRIVER=%s", dev-&gt;driver-&gt;name);
...
}

really_probe() holds the lock, already. So nothing needs to be done
there. dev_uevent() is called with lock held, often, too. But not
always. What implies that we can't add any locking in dev_uevent()
itself. So fix this race by adding the lock to the non-protected
path. This is the path where above race is observed:

 dev_uevent+0x235/0x380
 uevent_show+0x10c/0x1f0  &lt;= Add lock here
 dev_attr_show+0x3a/0xa0
 sysfs_kf_seq_show+0x17c/0x250
 kernfs_seq_show+0x7c/0x90
 seq_read_iter+0x2d7/0x940
 kernfs_fop_read_iter+0xc6/0x310
 vfs_read+0x5bc/0x6b0
 ksys_read+0xeb/0x1b0
 __x64_sys_read+0x42/0x50
 x64_sys_call+0x27ad/0x2d30
 do_syscall_64+0xcd/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Similar cases are reported by syzkaller in

https://syzkaller.appspot.com/bug?extid=ffa8143439596313a85a

But these are regarding the *initialization* of dev-&gt;driver

dev-&gt;driver = drv;

As this switches dev-&gt;driver to non-NULL these reports can be considered
to be false-positives (which should be "fixed" by this commit, as well,
though).

The same issue was reported and tried to be fixed back in 2015 in

https://lore.kernel.org/lkml/1421259054-2574-1-git-send-email-a.sangwan@samsung.com/

already.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227754">SUSE bug 1227754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39502</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: fix use after netif_napi_del()

When queues are started, netif_napi_add() and napi_enable() are called.
If there are 4 queues and only 3 queues are used for the current
configuration, only 3 queues' napi should be registered and enabled.
The ionic_qcq_enable() checks whether the .poll pointer is not NULL for
enabling only the using queue' napi. Unused queues' napi will not be
registered by netif_napi_add(), so the .poll pointer indicates NULL.
But it couldn't distinguish whether the napi was unregistered or not
because netif_napi_del() doesn't reset the .poll pointer to NULL.
So, ionic_qcq_enable() calls napi_enable() for the queue, which was
unregistered by netif_napi_del().

Reproducer:
   ethtool -L &lt;interface name&gt; rx 1 tx 1 combined 0
   ethtool -L &lt;interface name&gt; rx 0 tx 0 combined 1
   ethtool -L &lt;interface name&gt; rx 0 tx 0 combined 4

Splat looks like:
kernel BUG at net/core/dev.c:6666!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 1057 Comm: kworker/3:3 Not tainted 6.10.0-rc2+ #16
Workqueue: events ionic_lif_deferred_work [ionic]
RIP: 0010:napi_enable+0x3b/0x40
Code: 48 89 c2 48 83 e2 f6 80 b9 61 09 00 00 00 74 0d 48 83 bf 60 01 00 00 00 74 03 80 ce 01 f0 4f
RSP: 0018:ffffb6ed83227d48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff97560cda0828 RCX: 0000000000000029
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff97560cda0a28
RBP: ffffb6ed83227d50 R08: 0000000000000400 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
R13: ffff97560ce3c1a0 R14: 0000000000000000 R15: ffff975613ba0a20
FS:  0000000000000000(0000) GS:ffff975d5f780000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8f734ee200 CR3: 0000000103e50000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? die+0x33/0x90
 ? do_trap+0xd9/0x100
 ? napi_enable+0x3b/0x40
 ? do_error_trap+0x83/0xb0
 ? napi_enable+0x3b/0x40
 ? napi_enable+0x3b/0x40
 ? exc_invalid_op+0x4e/0x70
 ? napi_enable+0x3b/0x40
 ? asm_exc_invalid_op+0x16/0x20
 ? napi_enable+0x3b/0x40
 ionic_qcq_enable+0xb7/0x180 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_start_queues+0xc4/0x290 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_link_status_check+0x11c/0x170 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_lif_deferred_work+0x129/0x280 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 process_one_work+0x145/0x360
 worker_thread+0x2bb/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xcc/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2d/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227755">SUSE bug 1227755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39503</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39503" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39503" ref_url="https://www.suse.com/security/cve/CVE-2024-39503" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type

Lion Ackermann reported that there is a race condition between namespace cleanup
in ipset and the garbage collection of the list:set type. The namespace
cleanup can destroy the list:set type of sets while the gc of the set type is
waiting to run in rcu cleanup. The latter uses data from the destroyed set which
thus leads use after free. The patch contains the following parts:

- When destroying all sets, first remove the garbage collectors, then wait
  if needed and then destroy the sets.
- Fix the badly ordered "wait then remove gc" for the destroy a single set
  case.
- Fix the missing rcu locking in the list:set type in the userspace test
  case.
- Use proper RCU list handlings in the list:set type.

The patch depends on c1193d9bbbd3 (netfilter: ipset: Add list flush to cancel_gc).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39503/">CVE-2024-39503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39503">CVE-2024-39503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227756">SUSE bug 1227756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39504</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39504" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39504" ref_url="https://www.suse.com/security/cve/CVE-2024-39504" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_inner: validate mandatory meta and payload

Check for mandatory netlink attributes in payload and meta expression
when used embedded from the inner expression, otherwise NULL pointer
dereference is possible from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39504/">CVE-2024-39504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227757">SUSE bug 1227757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39505</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39505" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/komeda: check for error-valued pointer

komeda_pipeline_get_state() may return an error-valued pointer, thus
check the pointer for negative or null value before dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227728">SUSE bug 1227728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39506</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39506" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet

In lio_vf_rep_copy_packet() pg_info-&gt;page is compared to a NULL value,
but then it is unconditionally passed to skb_add_rx_frag() which looks
strange and could lead to null pointer dereference.

lio_vf_rep_copy_packet() call trace looks like:
	octeon_droq_process_packets
	 octeon_droq_fast_process_packets
	  octeon_droq_dispatch_pkt
	   octeon_create_recv_info
	    ...search in the dispatch_list...
	     -&gt;disp_fn(rdisp-&gt;rinfo, ...)
	      lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)
In this path there is no code which sets pg_info-&gt;page to NULL.
So this check looks unneeded and doesn't solve potential problem.
But I guess the author had reason to add a check and I have no such card
and can't do real test.
In addition, the code in the function liquidio_push_packet() in
liquidio/lio_core.c does exactly the same.

Based on this, I consider the most acceptable compromise solution to
adjust this issue by moving skb_add_rx_frag() into conditional scope.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227729">SUSE bug 1227729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39507</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39507" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash problem in concurrent scenario

When link status change, the nic driver need to notify the roce
driver to handle this event, but at this time, the roce driver
may uninit, then cause kernel crash.

To fix the problem, when link status change, need to check
whether the roce registered, and when uninit, need to wait link
update finish.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227730">SUSE bug 1227730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39508</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39508" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/io-wq: Use set_bit() and test_bit() at worker-&gt;flags

Utilize set_bit() and test_bit() on worker-&gt;flags within io_uring/io-wq
to address potential data races.

The structure io_worker-&gt;flags may be accessed through various data
paths, leading to concurrency issues. When KCSAN is enabled, it reveals
data races occurring in io_worker_handle_work and
io_wq_activate_free_worker functions.

	 BUG: KCSAN: data-race in io_worker_handle_work / io_wq_activate_free_worker
	 write to 0xffff8885c4246404 of 4 bytes by task 49071 on cpu 28:
	 io_worker_handle_work (io_uring/io-wq.c:434 io_uring/io-wq.c:569)
	 io_wq_worker (io_uring/io-wq.c:?)
&lt;snip&gt;

	 read to 0xffff8885c4246404 of 4 bytes by task 49024 on cpu 5:
	 io_wq_activate_free_worker (io_uring/io-wq.c:? io_uring/io-wq.c:285)
	 io_wq_enqueue (io_uring/io-wq.c:947)
	 io_queue_iowq (io_uring/io_uring.c:524)
	 io_req_task_submit (io_uring/io_uring.c:1511)
	 io_handle_tw_list (io_uring/io_uring.c:1198)
&lt;snip&gt;

Line numbers against commit 18daea77cca6 ("Merge tag 'for-linus' of
git://git.kernel.org/pub/scm/virt/kvm/kvm").

These races involve writes and reads to the same memory location by
different tasks running on different CPUs. To mitigate this, refactor
the code to use atomic operations such as set_bit(), test_bit(), and
clear_bit() instead of basic "and" and "or" operations. This ensures
thread-safe manipulation of worker flags.

Also, move `create_index` to avoid holes in the structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227732">SUSE bug 1227732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39509</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39509" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: remove unnecessary WARN_ON() in implement()

Syzkaller hit a warning [1] in a call to implement() when trying
to write a value into a field of smaller size in an output report.

Since implement() already has a warn message printed out with the
help of hid_warn() and value in question gets trimmed with:
	...
	value &amp;= m;
	...
WARN_ON may be considered superfluous. Remove it to suppress future
syzkaller triggers.

[1]
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline]
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863
Modules linked in:
CPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:implement drivers/hid/hid-core.c:1451 [inline]
RIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863
...
Call Trace:
 &lt;TASK&gt;
 __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline]
 usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636
 hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:904 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227733">SUSE bug 1227733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39510</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39510" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39510" ref_url="https://www.suse.com/security/cve/CVE-2024-39510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix slab-use-after-free in cachefiles_ondemand_daemon_read()

We got the following issue in a fuzz test of randomly issuing the restore
command:

==================================================================
BUG: KASAN: slab-use-after-free in cachefiles_ondemand_daemon_read+0xb41/0xb60
Read of size 8 at addr ffff888122e84088 by task ondemand-04-dae/963

CPU: 13 PID: 963 Comm: ondemand-04-dae Not tainted 6.8.0-dirty #564
Call Trace:
 kasan_report+0x93/0xc0
 cachefiles_ondemand_daemon_read+0xb41/0xb60
 vfs_read+0x169/0xb50
 ksys_read+0xf5/0x1e0

Allocated by task 116:
 kmem_cache_alloc+0x140/0x3a0
 cachefiles_lookup_cookie+0x140/0xcd0
 fscache_cookie_state_machine+0x43c/0x1230
 [...]

Freed by task 792:
 kmem_cache_free+0xfe/0x390
 cachefiles_put_object+0x241/0x480
 fscache_cookie_state_machine+0x5c8/0x1230
 [...]
==================================================================

Following is the process that triggers the issue:

     mount  |   daemon_thread1    |    daemon_thread2
------------------------------------------------------------
cachefiles_withdraw_cookie
 cachefiles_ondemand_clean_object(object)
  cachefiles_ondemand_send_req
   REQ_A = kzalloc(sizeof(*req) + data_len)
   wait_for_completion(&amp;REQ_A-&gt;done)

            cachefiles_daemon_read
             cachefiles_ondemand_daemon_read
              REQ_A = cachefiles_ondemand_select_req
              msg-&gt;object_id = req-&gt;object-&gt;ondemand-&gt;ondemand_id
                                  ------ restore ------
                                  cachefiles_ondemand_restore
                                  xas_for_each(&amp;xas, req, ULONG_MAX)
                                   xas_set_mark(&amp;xas, CACHEFILES_REQ_NEW)

                                  cachefiles_daemon_read
                                   cachefiles_ondemand_daemon_read
                                    REQ_A = cachefiles_ondemand_select_req
              copy_to_user(_buffer, msg, n)
               xa_erase(&amp;cache-&gt;reqs, id)
               complete(&amp;REQ_A-&gt;done)
              ------ close(fd) ------
              cachefiles_ondemand_fd_release
               cachefiles_put_object
 cachefiles_put_object
  kmem_cache_free(cachefiles_object_jar, object)
                                    REQ_A-&gt;object-&gt;ondemand-&gt;ondemand_id
                                     // object UAF !!!

When we see the request within xa_lock, req-&gt;object must not have been
freed yet, so grab the reference count of object before xa_unlock to
avoid the above issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39510/">CVE-2024-39510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39510">CVE-2024-39510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227734">SUSE bug 1227734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39920" ref_url="https://www.suse.com/security/cve/CVE-2024-39920" source="SUSE CVE"/>
    <description>
    The TCP protocol in RFC 9293 has a timing side channel that makes it easier for remote attackers to infer the content of one TCP connection from a client system (to any server), when that client system is concurrently obtaining TCP data at a slow rate from an attacker-controlled server, aka the "SnailLoad" issue. For example, the attack can begin by measuring RTTs via the TCP segments whose role is to provide an ACK control bit and an Acknowledgment Number.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39920/">CVE-2024-39920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39920">CVE-2024-39920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227422">SUSE bug 1227422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40899" ref_url="https://www.suse.com/security/cve/CVE-2024-40899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix slab-use-after-free in cachefiles_ondemand_get_fd()

We got the following issue in a fuzz test of randomly issuing the restore
command:

==================================================================
BUG: KASAN: slab-use-after-free in cachefiles_ondemand_daemon_read+0x609/0xab0
Write of size 4 at addr ffff888109164a80 by task ondemand-04-dae/4962

CPU: 11 PID: 4962 Comm: ondemand-04-dae Not tainted 6.8.0-rc7-dirty #542
Call Trace:
 kasan_report+0x94/0xc0
 cachefiles_ondemand_daemon_read+0x609/0xab0
 vfs_read+0x169/0xb50
 ksys_read+0xf5/0x1e0

Allocated by task 626:
 __kmalloc+0x1df/0x4b0
 cachefiles_ondemand_send_req+0x24d/0x690
 cachefiles_create_tmpfile+0x249/0xb30
 cachefiles_create_file+0x6f/0x140
 cachefiles_look_up_object+0x29c/0xa60
 cachefiles_lookup_cookie+0x37d/0xca0
 fscache_cookie_state_machine+0x43c/0x1230
 [...]

Freed by task 626:
 kfree+0xf1/0x2c0
 cachefiles_ondemand_send_req+0x568/0x690
 cachefiles_create_tmpfile+0x249/0xb30
 cachefiles_create_file+0x6f/0x140
 cachefiles_look_up_object+0x29c/0xa60
 cachefiles_lookup_cookie+0x37d/0xca0
 fscache_cookie_state_machine+0x43c/0x1230
 [...]
==================================================================

Following is the process that triggers the issue:

     mount  |   daemon_thread1    |    daemon_thread2
------------------------------------------------------------
 cachefiles_ondemand_init_object
  cachefiles_ondemand_send_req
   REQ_A = kzalloc(sizeof(*req) + data_len)
   wait_for_completion(&amp;REQ_A-&gt;done)

            cachefiles_daemon_read
             cachefiles_ondemand_daemon_read
              REQ_A = cachefiles_ondemand_select_req
              cachefiles_ondemand_get_fd
              copy_to_user(_buffer, msg, n)
            process_open_req(REQ_A)
                                  ------ restore ------
                                  cachefiles_ondemand_restore
                                  xas_for_each(&amp;xas, req, ULONG_MAX)
                                   xas_set_mark(&amp;xas, CACHEFILES_REQ_NEW);

                                  cachefiles_daemon_read
                                   cachefiles_ondemand_daemon_read
                                    REQ_A = cachefiles_ondemand_select_req

             write(devfd, ("copen %u,%llu", msg-&gt;msg_id, size));
             cachefiles_ondemand_copen
              xa_erase(&amp;cache-&gt;reqs, id)
              complete(&amp;REQ_A-&gt;done)
   kfree(REQ_A)
                                    cachefiles_ondemand_get_fd(REQ_A)
                                     fd = get_unused_fd_flags
                                     file = anon_inode_getfile
                                     fd_install(fd, file)
                                     load = (void *)REQ_A-&gt;msg.data;
                                     load-&gt;fd = fd;
                                     // load UAF !!!

This issue is caused by issuing a restore command when the daemon is still
alive, which results in a request being processed multiple times thus
triggering a UAF. So to avoid this problem, add an additional reference
count to cachefiles_req, which is held while waiting and reading, and then
released when the waiting and reading is over.

Note that since there is only one reference count for waiting, we need to
avoid the same request being completed multiple times, so we can only
complete the request if it is successfully removed from the xarray.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40899/">CVE-2024-40899 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40899">CVE-2024-40899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227758">SUSE bug 1227758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: remove requests from xarray during flushing requests

Even with CACHEFILES_DEAD set, we can still read the requests, so in the
following concurrency the request may be used after it has been freed:

     mount  |   daemon_thread1    |    daemon_thread2
------------------------------------------------------------
 cachefiles_ondemand_init_object
  cachefiles_ondemand_send_req
   REQ_A = kzalloc(sizeof(*req) + data_len)
   wait_for_completion(&amp;REQ_A-&gt;done)
            cachefiles_daemon_read
             cachefiles_ondemand_daemon_read
                                  // close dev fd
                                  cachefiles_flush_reqs
                                   complete(&amp;REQ_A-&gt;done)
   kfree(REQ_A)
              xa_lock(&amp;cache-&gt;reqs);
              cachefiles_ondemand_select_req
                req-&gt;msg.opcode != CACHEFILES_OP_READ
                // req use-after-free !!!
              xa_unlock(&amp;cache-&gt;reqs);
                                   xa_destroy(&amp;cache-&gt;reqs)

Hence remove requests from cache-&gt;reqs when flushing them to avoid
accessing freed requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227760">SUSE bug 1227760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory

There is a potential out-of-bounds access when using test_bit() on a single
word. The test_bit() and set_bit() functions operate on long values, and
when testing or setting a single word, they can exceed the word
boundary. KASAN detects this issue and produces a dump:

	 BUG: KASAN: slab-out-of-bounds in _scsih_add_device.constprop.0 (./arch/x86/include/asm/bitops.h:60 ./include/asm-generic/bitops/instrumented-atomic.h:29 drivers/scsi/mpt3sas/mpt3sas_scsih.c:7331) mpt3sas

	 Write of size 8 at addr ffff8881d26e3c60 by task kworker/u1536:2/2965

For full log, please look at [1].

Make the allocation at least the size of sizeof(unsigned long) so that
set_bit() and test_bit() have sufficient room for read/write operations
without overwriting unallocated memory.

[1] Link: https://lore.kernel.org/all/ZkNcALr3W3KGYYJG@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227762">SUSE bug 1227762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: xattr: fix buffer overflow for invalid xattr

When an xattr size is not what is expected, it is printed out to the
kernel log in hex format as a form of debugging.  But when that xattr
size is bigger than the expected size, printing it out can cause an
access off the end of the buffer.

Fix this all up by properly restricting the size of the debug hex dump
in the kernel log.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps

There could be a potential use-after-free case in
tcpm_register_source_caps(). This could happen when:
 * new (say invalid) source caps are advertised
 * the existing source caps are unregistered
 * tcpm_register_source_caps() returns with an error as
   usb_power_delivery_register_capabilities() fails

This causes port-&gt;partner_source_caps to hold on to the now freed source
caps.

Reset port-&gt;partner_source_caps value to NULL after unregistering
existing source caps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227766">SUSE bug 1227766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages

The syzbot fuzzer found that the interrupt-URB completion callback in
the cdc-wdm driver was taking too long, and the driver's immediate
resubmission of interrupt URBs with -EPROTO status combined with the
dummy-hcd emulation to cause a CPU lockup:

cdc_wdm 1-1:1.0: nonzero urb status received: -71
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
CPU#0 Utilization every 4s during lockup:
	#1:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#2:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#3:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#4:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#5:  98% system,	  1% softirq,	  3% hardirq,	  0% idle
Modules linked in:
irq event stamp: 73096
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_emit_next_record kernel/printk/printk.c:2935 [inline]
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
softirqs last disabled at (73043): [&lt;ffff800080020de8&gt;] __do_softirq+0x14/0x20 kernel/softirq.c:588
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G        W          6.10.0-rc2-syzkaller-g8867bbd4a056 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024

Testing showed that the problem did not occur if the two error
messages -- the first two lines above -- were removed; apparently adding
material to the kernel log takes a surprisingly large amount of time.

In any case, the best approach for preventing these lockups and to
avoid spamming the log with thousands of error messages per second is
to ratelimit the two dev_err() calls.  Therefore we replace them with
dev_err_ratelimited().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227772">SUSE bug 1227772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible race in __fib6_drop_pcpu_from()

syzbot found a race in __fib6_drop_pcpu_from() [1]

If compiler reads more than once (*ppcpu_rt),
second read could read NULL, if another cpu clears
the value in rt6_get_pcpu_route().

Add a READ_ONCE() to prevent this race.

Also add rcu_read_lock()/rcu_read_unlock() because
we rely on RCU protection while dereferencing pcpu_rt.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000012: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
CPU: 0 PID: 7543 Comm: kworker/u8:17 Not tainted 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: netns cleanup_net
 RIP: 0010:__fib6_drop_pcpu_from.part.0+0x10a/0x370 net/ipv6/ip6_fib.c:984
Code: f8 48 c1 e8 03 80 3c 28 00 0f 85 16 02 00 00 4d 8b 3f 4d 85 ff 74 31 e8 74 a7 fa f7 49 8d bf 90 00 00 00 48 89 f8 48 c1 e8 03 &lt;80&gt; 3c 28 00 0f 85 1e 02 00 00 49 8b 87 90 00 00 00 48 8b 0c 24 48
RSP: 0018:ffffc900040df070 EFLAGS: 00010206
RAX: 0000000000000012 RBX: 0000000000000001 RCX: ffffffff89932e16
RDX: ffff888049dd1e00 RSI: ffffffff89932d7c RDI: 0000000000000091
RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000007
R10: 0000000000000001 R11: 0000000000000006 R12: ffff88807fa080b8
R13: fffffbfff1a9a07d R14: ffffed100ff41022 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32c26000 CR3: 000000005d56e000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  __fib6_drop_pcpu_from net/ipv6/ip6_fib.c:966 [inline]
  fib6_drop_pcpu_from net/ipv6/ip6_fib.c:1027 [inline]
  fib6_purge_rt+0x7f2/0x9f0 net/ipv6/ip6_fib.c:1038
  fib6_del_route net/ipv6/ip6_fib.c:1998 [inline]
  fib6_del+0xa70/0x17b0 net/ipv6/ip6_fib.c:2043
  fib6_clean_node+0x426/0x5b0 net/ipv6/ip6_fib.c:2205
  fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2127
  fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2175
  fib6_clean_tree+0xd7/0x120 net/ipv6/ip6_fib.c:2255
  __fib6_clean_all+0x100/0x2d0 net/ipv6/ip6_fib.c:2271
  rt6_sync_down_dev net/ipv6/route.c:4906 [inline]
  rt6_disable_ip+0x7ed/0xa00 net/ipv6/route.c:4911
  addrconf_ifdown.isra.0+0x117/0x1b40 net/ipv6/addrconf.c:3855
  addrconf_notify+0x223/0x19e0 net/ipv6/addrconf.c:3778
  notifier_call_chain+0xb9/0x410 kernel/notifier.c:93
  call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:1992
  call_netdevice_notifiers_extack net/core/dev.c:2030 [inline]
  call_netdevice_notifiers net/core/dev.c:2044 [inline]
  dev_close_many+0x333/0x6a0 net/core/dev.c:1585
  unregister_netdevice_many_notify+0x46d/0x19f0 net/core/dev.c:11193
  unregister_netdevice_many net/core/dev.c:11276 [inline]
  default_device_exit_batch+0x85b/0xae0 net/core/dev.c:11759
  ops_exit_list+0x128/0x180 net/core/net_namespace.c:178
  cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227761">SUSE bug 1227761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Always stop health timer during driver removal

Currently, if teardown_hca fails to execute during driver removal, mlx5
does not stop the health timer. Afterwards, mlx5 continue with driver
teardown. This may lead to a UAF bug, which results in page fault
Oops[1], since the health timer invokes after resources were freed.

Hence, stop the health monitor even if teardown_hca fails.

[1]
mlx5_core 0000:18:00.0: E-Switch: Unload vfs: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)
mlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)
mlx5_core 0000:18:00.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)
mlx5_core 0000:18:00.0: E-Switch: cleanup
mlx5_core 0000:18:00.0: wait_func:1155:(pid 1967079): TEARDOWN_HCA(0x103) timeout. Will cause a leak of a command resource
mlx5_core 0000:18:00.0: mlx5_function_close:1288:(pid 1967079): tear_down_hca failed, skip cleanup
BUG: unable to handle page fault for address: ffffa26487064230
PGD 100c00067 P4D 100c00067 PUD 100e5a067 PMD 105ed7067 PTE 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 0 Comm: swapper/0 Tainted: G           OE     -------  ---  6.7.0-68.fc38.x86_64 #1
Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0013.121520200651 12/15/2020
RIP: 0010:ioread32be+0x34/0x60
RSP: 0018:ffffa26480003e58 EFLAGS: 00010292
RAX: ffffa26487064200 RBX: ffff9042d08161a0 RCX: ffff904c108222c0
RDX: 000000010bbf1b80 RSI: ffffffffc055ddb0 RDI: ffffa26487064230
RBP: ffff9042d08161a0 R08: 0000000000000022 R09: ffff904c108222e8
R10: 0000000000000004 R11: 0000000000000441 R12: ffffffffc055ddb0
R13: ffffa26487064200 R14: ffffa26480003f00 R15: ffff904c108222c0
FS:  0000000000000000(0000) GS:ffff904c10800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffa26487064230 CR3: 00000002c4420006 CR4: 00000000007706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x171/0x4e0
 ? exc_page_fault+0x175/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 ? ioread32be+0x34/0x60
 mlx5_health_check_fatal_sensors+0x20/0x100 [mlx5_core]
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 poll_health+0x42/0x230 [mlx5_core]
 ? __next_timer_interrupt+0xbc/0x110
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 call_timer_fn+0x21/0x130
 ? __pfx_poll_health+0x10/0x10 [mlx5_core]
 __run_timers+0x222/0x2c0
 run_timer_softirq+0x1d/0x40
 __do_softirq+0xc9/0x2c8
 __irq_exit_rcu+0xa6/0xc0
 sysvec_apic_timer_interrupt+0x72/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:cpuidle_enter_state+0xcc/0x440
 ? cpuidle_enter_state+0xbd/0x440
 cpuidle_enter+0x2d/0x40
 do_idle+0x20d/0x270
 cpu_startup_entry+0x2a/0x30
 rest_init+0xd0/0xd0
 arch_call_rest_init+0xe/0x30
 start_kernel+0x709/0xa90
 x86_64_start_reservations+0x18/0x30
 x86_64_start_kernel+0x96/0xa0
 secondary_startup_64_no_verify+0x18f/0x19b
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227763">SUSE bug 1227763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40907" ref_url="https://www.suse.com/security/cve/CVE-2024-40907" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: fix kernel panic in XDP_TX action

In the XDP_TX path, ionic driver sends a packet to the TX path with rx
page and corresponding dma address.
After tx is done, ionic_tx_clean() frees that page.
But RX ring buffer isn't reset to NULL.
So, it uses a freed page, which causes kernel panic.

BUG: unable to handle page fault for address: ffff8881576c110c
PGD 773801067 P4D 773801067 PUD 87f086067 PMD 87efca067 PTE 800ffffea893e060
Oops: Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN NOPTI
CPU: 1 PID: 25 Comm: ksoftirqd/1 Not tainted 6.9.0+ #11
Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021
RIP: 0010:bpf_prog_f0b8caeac1068a55_balancer_ingress+0x3b/0x44f
Code: 00 53 41 55 41 56 41 57 b8 01 00 00 00 48 8b 5f 08 4c 8b 77 00 4c 89 f7 48 83 c7 0e 48 39 d8
RSP: 0018:ffff888104e6fa28 EFLAGS: 00010283
RAX: 0000000000000002 RBX: ffff8881576c1140 RCX: 0000000000000002
RDX: ffffffffc0051f64 RSI: ffffc90002d33048 RDI: ffff8881576c110e
RBP: ffff888104e6fa88 R08: 0000000000000000 R09: ffffed1027a04a23
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881b03a21a8
R13: ffff8881589f800f R14: ffff8881576c1100 R15: 00000001576c1100
FS: 0000000000000000(0000) GS:ffff88881ae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff8881576c110c CR3: 0000000767a90000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
&lt;TASK&gt;
? __die+0x20/0x70
? page_fault_oops+0x254/0x790
? __pfx_page_fault_oops+0x10/0x10
? __pfx_is_prefetch.constprop.0+0x10/0x10
? search_bpf_extables+0x165/0x260
? fixup_exception+0x4a/0x970
? exc_page_fault+0xcb/0xe0
? asm_exc_page_fault+0x22/0x30
? 0xffffffffc0051f64
? bpf_prog_f0b8caeac1068a55_balancer_ingress+0x3b/0x44f
? do_raw_spin_unlock+0x54/0x220
ionic_rx_service+0x11ab/0x3010 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
? ionic_tx_clean+0x29b/0xc60 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
? __pfx_ionic_tx_clean+0x10/0x10 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
? __pfx_ionic_rx_service+0x10/0x10 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
? ionic_tx_cq_service+0x25d/0xa00 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
? __pfx_ionic_rx_service+0x10/0x10 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
ionic_cq_service+0x69/0x150 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
ionic_txrx_napi+0x11a/0x540 [ionic 9180c3001ab627d82bbc5f3ebe8a0decaf6bb864]
__napi_poll.constprop.0+0xa0/0x440
net_rx_action+0x7e7/0xc30
? __pfx_net_rx_action+0x10/0x10
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40907/">CVE-2024-40907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40907">CVE-2024-40907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227765">SUSE bug 1227765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Set run context for rawtp test_run callback

syzbot reported crash when rawtp program executed through the
test_run interface calls bpf_get_attach_cookie helper or any
other helper that touches task-&gt;bpf_ctx pointer.

Setting the run context (task-&gt;bpf_ctx pointer) for test_run
callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227783">SUSE bug 1227783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a potential use-after-free in bpf_link_free()

After commit 1a80dbcb2dba, bpf_link can be freed by
link-&gt;ops-&gt;dealloc_deferred, but the code still tests and uses
link-&gt;ops-&gt;dealloc afterward, which leads to a use-after-free as
reported by syzbot. Actually, one of them should be sufficient, so
just call one of them instead of both. Also add a WARN_ON() in case
of any problematic implementation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227798">SUSE bug 1227798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228349">SUSE bug 1228349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: Fix refcount imbalance on inbound connections

When releasing a socket in ax25_release(), we call netdev_put() to
decrease the refcount on the associated ax.25 device. However, the
execution path for accepting an incoming connection never calls
netdev_hold(). This imbalance leads to refcount errors, and ultimately
to kernel crashes.

A typical call trace for the above situation will start with one of the
following errors:

    refcount_t: decrement hit 0; leaking memory.
    refcount_t: underflow; use-after-free.

And will then have a trace like:

    Call Trace:
    &lt;TASK&gt;
    ? show_regs+0x64/0x70
    ? __warn+0x83/0x120
    ? refcount_warn_saturate+0xb2/0x100
    ? report_bug+0x158/0x190
    ? prb_read_valid+0x20/0x30
    ? handle_bug+0x3e/0x70
    ? exc_invalid_op+0x1c/0x70
    ? asm_exc_invalid_op+0x1f/0x30
    ? refcount_warn_saturate+0xb2/0x100
    ? refcount_warn_saturate+0xb2/0x100
    ax25_release+0x2ad/0x360
    __sock_release+0x35/0xa0
    sock_close+0x19/0x20
    [...]

On reboot (or any attempt to remove the interface), the kernel gets
stuck in an infinite loop:

    unregister_netdevice: waiting for ax0 to become free. Usage count = 0

This patch corrects these issues by ensuring that we call netdev_hold()
and ax25_dev_hold() for new connections in ax25_accept(). This makes the
logic leading to ax25_accept() match the logic for ax25_bind(): in both
cases we increment the refcount, which is ultimately decremented in
ax25_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227902">SUSE bug 1227902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Lock wiphy in cfg80211_get_station

Wiphy should be locked before calling rdev_get_station() (see lockdep
assert in ieee80211_get_station()).

This fixes the following kernel NULL dereference:

 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
 Mem abort info:
   ESR = 0x0000000096000006
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x06: level 2 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000006
   CM = 0, WnR = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000
 [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000
 Internal error: Oops: 0000000096000006 [#1] SMP
 Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath
 CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705
 Hardware name: RPT (r1) (DT)
 Workqueue: bat_events batadv_v_elp_throughput_metric_update
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]
 lr : sta_set_sinfo+0xcc/0xbd4
 sp : ffff000007b43ad0
 x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98
 x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000
 x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc
 x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000
 x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d
 x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e
 x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000
 x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000
 x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90
 x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000
 Call trace:
  ath10k_sta_statistics+0x10/0x2dc [ath10k_core]
  sta_set_sinfo+0xcc/0xbd4
  ieee80211_get_station+0x2c/0x44
  cfg80211_get_station+0x80/0x154
  batadv_v_elp_get_throughput+0x138/0x1fc
  batadv_v_elp_throughput_metric_update+0x1c/0xa4
  process_one_work+0x1ec/0x414
  worker_thread+0x70/0x46c
  kthread+0xdc/0xe0
  ret_from_fork+0x10/0x20
 Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)

This happens because STA has time to disconnect and reconnect before
batadv_v_elp_throughput_metric_update() delayed work gets scheduled. In
this situation, ath10k_sta_state() can be in the middle of resetting
arsta data when the work queue get chance to be scheduled and ends up
accessing it. Locking wiphy prevents that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227792">SUSE bug 1227792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()

The ieee80211_sta_ps_deliver_wakeup() function takes sta-&gt;ps_lock to
synchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from
softirq context. However using only spin_lock() to get sta-&gt;ps_lock in
ieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute
on this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to
take this same lock ending in deadlock. Below is an example of rcu stall
that arises in such situation.

 rcu: INFO: rcu_sched self-detected stall on CPU
 rcu:    2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996
 rcu:    (t=42586894 jiffies g=2057 q=362405 ncpus=4)
 CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G        W          6.4.0-02158-g1b062f552873 #742
 Hardware name: RPT (r1) (DT)
 pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : queued_spin_lock_slowpath+0x58/0x2d0
 lr : invoke_tx_handlers_early+0x5b4/0x5c0
 sp : ffff00001ef64660
 x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8
 x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000
 x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000
 x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000
 x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80
 x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da
 x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440
 x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880
 x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000
 x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8
 Call trace:
  queued_spin_lock_slowpath+0x58/0x2d0
  ieee80211_tx+0x80/0x12c
  ieee80211_tx_pending+0x110/0x278
  tasklet_action_common.constprop.0+0x10c/0x144
  tasklet_action+0x20/0x28
  _stext+0x11c/0x284
  ____do_softirq+0xc/0x14
  call_on_irq_stack+0x24/0x34
  do_softirq_own_stack+0x18/0x20
  do_softirq+0x74/0x7c
  __local_bh_enable_ip+0xa0/0xa4
  _ieee80211_wake_txqs+0x3b0/0x4b8
  __ieee80211_wake_queue+0x12c/0x168
  ieee80211_add_pending_skbs+0xec/0x138
  ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480
  ieee80211_mps_sta_status_update.part.0+0xd8/0x11c
  ieee80211_mps_sta_status_update+0x18/0x24
  sta_apply_parameters+0x3bc/0x4c0
  ieee80211_change_station+0x1b8/0x2dc
  nl80211_set_station+0x444/0x49c
  genl_family_rcv_msg_doit.isra.0+0xa4/0xfc
  genl_rcv_msg+0x1b0/0x244
  netlink_rcv_skb+0x38/0x10c
  genl_rcv+0x34/0x48
  netlink_unicast+0x254/0x2bc
  netlink_sendmsg+0x190/0x3b4
  ____sys_sendmsg+0x1e8/0x218
  ___sys_sendmsg+0x68/0x8c
  __sys_sendmsg+0x44/0x84
  __arm64_sys_sendmsg+0x20/0x28
  do_el0_svc+0x6c/0xe8
  el0_svc+0x14/0x48
  el0t_64_sync_handler+0xb0/0xb4
  el0t_64_sync+0x14c/0x150

Using spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise
on the same CPU that is holding the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227790">SUSE bug 1227790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40913" ref_url="https://www.suse.com/security/cve/CVE-2024-40913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: defer exposing anon_fd until after copy_to_user() succeeds

After installing the anonymous fd, we can now see it in userland and close
it. However, at this point we may not have gotten the reference count of
the cache, but we will put it during colse fd, so this may cause a cache
UAF.

So grab the cache reference count before fd_install(). In addition, by
kernel convention, fd is taken over by the user land after fd_install(),
and the kernel should not call close_fd() after that, i.e., it should call
fd_install() after everything is ready, thus fd_install() is called after
copy_to_user() succeeds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40913/">CVE-2024-40913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40913">CVE-2024-40913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227839">SUSE bug 1227839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40914" ref_url="https://www.suse.com/security/cve/CVE-2024-40914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: don't unpoison huge_zero_folio

When I did memory failure tests recently, below panic occurs:

 kernel BUG at include/linux/mm.h:1135!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 9 PID: 137 Comm: kswapd1 Not tainted 6.9.0-rc4-00491-gd5ce28f156fe-dirty #14
 RIP: 0010:shrink_huge_zero_page_scan+0x168/0x1a0
 RSP: 0018:ffff9933c6c57bd0 EFLAGS: 00000246
 RAX: 000000000000003e RBX: 0000000000000000 RCX: ffff88f61fc5c9c8
 RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff88f61fc5c9c0
 RBP: ffffcd7c446b0000 R08: ffffffff9a9405f0 R09: 0000000000005492
 R10: 00000000000030ea R11: ffffffff9a9405f0 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: ffff88e703c4ac00
 FS:  0000000000000000(0000) GS:ffff88f61fc40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055f4da6e9878 CR3: 0000000c71048000 CR4: 00000000000006f0
 Call Trace:
  &lt;TASK&gt;
  do_shrink_slab+0x14f/0x6a0
  shrink_slab+0xca/0x8c0
  shrink_node+0x2d0/0x7d0
  balance_pgdat+0x33a/0x720
  kswapd+0x1f3/0x410
  kthread+0xd5/0x100
  ret_from_fork+0x2f/0x50
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;
 Modules linked in: mce_inject hwpoison_inject
 ---[ end trace 0000000000000000 ]---
 RIP: 0010:shrink_huge_zero_page_scan+0x168/0x1a0
 RSP: 0018:ffff9933c6c57bd0 EFLAGS: 00000246
 RAX: 000000000000003e RBX: 0000000000000000 RCX: ffff88f61fc5c9c8
 RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff88f61fc5c9c0
 RBP: ffffcd7c446b0000 R08: ffffffff9a9405f0 R09: 0000000000005492
 R10: 00000000000030ea R11: ffffffff9a9405f0 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: ffff88e703c4ac00
 FS:  0000000000000000(0000) GS:ffff88f61fc40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055f4da6e9878 CR3: 0000000c71048000 CR4: 00000000000006f0

The root cause is that HWPoison flag will be set for huge_zero_folio
without increasing the folio refcnt.  But then unpoison_memory() will
decrease the folio refcnt unexpectedly as it appears like a successfully
hwpoisoned folio leading to VM_BUG_ON_PAGE(page_ref_count(page) == 0) when
releasing huge_zero_folio.

Skip unpoisoning huge_zero_folio in unpoison_memory() to fix this issue. 
We're not prepared to unpoison huge_zero_folio yet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40914/">CVE-2024-40914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40914">CVE-2024-40914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227842">SUSE bug 1227842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40915" ref_url="https://www.suse.com/security/cve/CVE-2024-40915" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context

__kernel_map_pages() is a debug function which clears the valid bit in page
table entry for deallocated pages to detect illegal memory accesses to
freed pages.

This function set/clear the valid bit using __set_memory(). __set_memory()
acquires init_mm's semaphore, and this operation may sleep. This is
problematic, because  __kernel_map_pages() can be called in atomic context,
and thus is illegal to sleep. An example warning that this causes:

BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1578
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2, name: kthreadd
preempt_count: 2, expected: 0
CPU: 0 PID: 2 Comm: kthreadd Not tainted 6.9.0-g1d4c6d784ef6 #37
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
[&lt;ffffffff800060dc&gt;] dump_backtrace+0x1c/0x24
[&lt;ffffffff8091ef6e&gt;] show_stack+0x2c/0x38
[&lt;ffffffff8092baf8&gt;] dump_stack_lvl+0x5a/0x72
[&lt;ffffffff8092bb24&gt;] dump_stack+0x14/0x1c
[&lt;ffffffff8003b7ac&gt;] __might_resched+0x104/0x10e
[&lt;ffffffff8003b7f4&gt;] __might_sleep+0x3e/0x62
[&lt;ffffffff8093276a&gt;] down_write+0x20/0x72
[&lt;ffffffff8000cf00&gt;] __set_memory+0x82/0x2fa
[&lt;ffffffff8000d324&gt;] __kernel_map_pages+0x5a/0xd4
[&lt;ffffffff80196cca&gt;] __alloc_pages_bulk+0x3b2/0x43a
[&lt;ffffffff8018ee82&gt;] __vmalloc_node_range+0x196/0x6ba
[&lt;ffffffff80011904&gt;] copy_process+0x72c/0x17ec
[&lt;ffffffff80012ab4&gt;] kernel_clone+0x60/0x2fe
[&lt;ffffffff80012f62&gt;] kernel_thread+0x82/0xa0
[&lt;ffffffff8003552c&gt;] kthreadd+0x14a/0x1be
[&lt;ffffffff809357de&gt;] ret_from_fork+0xe/0x1c

Rewrite this function with apply_to_existing_page_range(). It is fine to
not have any locking, because __kernel_map_pages() works with pages being
allocated/deallocated and those pages are not changed by anyone else in the
meantime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40915/">CVE-2024-40915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40915">CVE-2024-40915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227843">SUSE bug 1227843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found

When reading EDID fails and driver reports no modes available, the DRM
core adds an artificial 1024x786 mode to the connector. Unfortunately
some variants of the Exynos HDMI (like the one in Exynos4 SoCs) are not
able to drive such mode, so report a safe 640x480 mode instead of nothing
in case of the EDID reading failure.

This fixes the following issue observed on Trats2 board since commit
13d5b040363c ("drm/exynos: do not return negative values from .get_modes()"):

[drm] Exynos DRM: using 11c00000.fimd device for DMA mapping operations
exynos-drm exynos-drm: bound 11c00000.fimd (ops fimd_component_ops)
exynos-drm exynos-drm: bound 12c10000.mixer (ops mixer_component_ops)
exynos-dsi 11c80000.dsi: [drm:samsung_dsim_host_attach] Attached s6e8aa0 device (lanes:4 bpp:24 mode-flags:0x10b)
exynos-drm exynos-drm: bound 11c80000.dsi (ops exynos_dsi_component_ops)
exynos-drm exynos-drm: bound 12d00000.hdmi (ops hdmi_component_ops)
[drm] Initialized exynos 1.1.0 20180330 for exynos-drm on minor 1
exynos-hdmi 12d00000.hdmi: [drm:hdmiphy_enable.part.0] *ERROR* PLL could not reach steady state
panel-samsung-s6e8aa0 11c80000.dsi.0: ID: 0xa2, 0x20, 0x8c
exynos-mixer 12c10000.mixer: timeout waiting for VSYNC
------------[ cut here ]------------
WARNING: CPU: 1 PID: 11 at drivers/gpu/drm/drm_atomic_helper.c:1682 drm_atomic_helper_wait_for_vblanks.part.0+0x2b0/0x2b8
[CRTC:70:crtc-1] vblank wait timed out
Modules linked in:
CPU: 1 PID: 11 Comm: kworker/u16:0 Not tainted 6.9.0-rc5-next-20240424 #14913
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound deferred_probe_work_func
Call trace:
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x68/0x88
 dump_stack_lvl from __warn+0x7c/0x1c4
 __warn from warn_slowpath_fmt+0x11c/0x1a8
 warn_slowpath_fmt from drm_atomic_helper_wait_for_vblanks.part.0+0x2b0/0x2b8
 drm_atomic_helper_wait_for_vblanks.part.0 from drm_atomic_helper_commit_tail_rpm+0x7c/0x8c
 drm_atomic_helper_commit_tail_rpm from commit_tail+0x9c/0x184
 commit_tail from drm_atomic_helper_commit+0x168/0x190
 drm_atomic_helper_commit from drm_atomic_commit+0xb4/0xe0
 drm_atomic_commit from drm_client_modeset_commit_atomic+0x23c/0x27c
 drm_client_modeset_commit_atomic from drm_client_modeset_commit_locked+0x60/0x1cc
 drm_client_modeset_commit_locked from drm_client_modeset_commit+0x24/0x40
 drm_client_modeset_commit from __drm_fb_helper_restore_fbdev_mode_unlocked+0x9c/0xc4
 __drm_fb_helper_restore_fbdev_mode_unlocked from drm_fb_helper_set_par+0x2c/0x3c
 drm_fb_helper_set_par from fbcon_init+0x3d8/0x550
 fbcon_init from visual_init+0xc0/0x108
 visual_init from do_bind_con_driver+0x1b8/0x3a4
 do_bind_con_driver from do_take_over_console+0x140/0x1ec
 do_take_over_console from do_fbcon_takeover+0x70/0xd0
 do_fbcon_takeover from fbcon_fb_registered+0x19c/0x1ac
 fbcon_fb_registered from register_framebuffer+0x190/0x21c
 register_framebuffer from __drm_fb_helper_initial_config_and_unlock+0x350/0x574
 __drm_fb_helper_initial_config_and_unlock from exynos_drm_fbdev_client_hotplug+0x6c/0xb0
 exynos_drm_fbdev_client_hotplug from drm_client_register+0x58/0x94
 drm_client_register from exynos_drm_bind+0x160/0x190
 exynos_drm_bind from try_to_bring_up_aggregate_device+0x200/0x2d8
 try_to_bring_up_aggregate_device from __component_add+0xb0/0x170
 __component_add from mixer_probe+0x74/0xcc
 mixer_probe from platform_probe+0x5c/0xb8
 platform_probe from really_probe+0xe0/0x3d8
 really_probe from __driver_probe_device+0x9c/0x1e4
 __driver_probe_device from driver_probe_device+0x30/0xc0
 driver_probe_device from __device_attach_driver+0xa8/0x120
 __device_attach_driver from bus_for_each_drv+0x80/0xcc
 bus_for_each_drv from __device_attach+0xac/0x1fc
 __device_attach from bus_probe_device+0x8c/0x90
 bus_probe_device from deferred_probe_work_func+0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227846">SUSE bug 1227846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40917" ref_url="https://www.suse.com/security/cve/CVE-2024-40917" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memblock: make memblock_set_node() also warn about use of MAX_NUMNODES

On an (old) x86 system with SRAT just covering space above 4Gb:

    ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0xfffffffff] hotplug

the commit referenced below leads to this NUMA configuration no longer
being refused by a CONFIG_NUMA=y kernel (previously

    NUMA: nodes only cover 6144MB of your 8185MB e820 RAM. Not used.
    No NUMA configuration found
    Faking a node at [mem 0x0000000000000000-0x000000027fffffff]

was seen in the log directly after the message quoted above), because of
memblock_validate_numa_coverage() checking for NUMA_NO_NODE (only). This
in turn led to memblock_alloc_range_nid()'s warning about MAX_NUMNODES
triggering, followed by a NULL deref in memmap_init() when trying to
access node 64's (NODE_SHIFT=6) node data.

To compensate said change, make memblock_set_node() warn on and adjust
a passed in value of MAX_NUMNODES, just like various other functions
already do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40917/">CVE-2024-40917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40917">CVE-2024-40917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227847">SUSE bug 1227847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40918" ref_url="https://www.suse.com/security/cve/CVE-2024-40918" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: Try to fix random segmentation faults in package builds

PA-RISC systems with PA8800 and PA8900 processors have had problems
with random segmentation faults for many years.  Systems with earlier
processors are much more stable.

Systems with PA8800 and PA8900 processors have a large L2 cache which
needs per page flushing for decent performance when a large range is
flushed. The combined cache in these systems is also more sensitive to
non-equivalent aliases than the caches in earlier systems.

The majority of random segmentation faults that I have looked at
appear to be memory corruption in memory allocated using mmap and
malloc.

My first attempt at fixing the random faults didn't work. On
reviewing the cache code, I realized that there were two issues
which the existing code didn't handle correctly. Both relate
to cache move-in. Another issue is that the present bit in PTEs
is racy.

1) PA-RISC caches have a mind of their own and they can speculatively
load data and instructions for a page as long as there is a entry in
the TLB for the page which allows move-in. TLBs are local to each
CPU. Thus, the TLB entry for a page must be purged before flushing
the page. This is particularly important on SMP systems.

In some of the flush routines, the flush routine would be called
and then the TLB entry would be purged. This was because the flush
routine needed the TLB entry to do the flush.

2) My initial approach to trying the fix the random faults was to
try and use flush_cache_page_if_present for all flush operations.
This actually made things worse and led to a couple of hardware
lockups. It finally dawned on me that some lines weren't being
flushed because the pte check code was racy. This resulted in
random inequivalent mappings to physical pages.

The __flush_cache_page tmpalias flush sets up its own TLB entry
and it doesn't need the existing TLB entry. As long as we can find
the pte pointer for the vm page, we can get the pfn and physical
address of the page. We can also purge the TLB entry for the page
before doing the flush. Further, __flush_cache_page uses a special
TLB entry that inhibits cache move-in.

When switching page mappings, we need to ensure that lines are
removed from the cache.  It is not sufficient to just flush the
lines to memory as they may come back.

This made it clear that we needed to implement all the required
flush operations using tmpalias routines. This includes flushes
for user and kernel pages.

After modifying the code to use tmpalias flushes, it became clear
that the random segmentation faults were not fully resolved. The
frequency of faults was worse on systems with a 64 MB L2 (PA8900)
and systems with more CPUs (rp4440).

The warning that I added to flush_cache_page_if_present to detect
pages that couldn't be flushed triggered frequently on some systems.

Helge and I looked at the pages that couldn't be flushed and found
that the PTE was either cleared or for a swap page. Ignoring pages
that were swapped out seemed okay but pages with cleared PTEs seemed
problematic.

I looked at routines related to pte_clear and noticed ptep_clear_flush.
The default implementation just flushes the TLB entry. However, it was
obvious that on parisc we need to flush the cache page as well. If
we don't flush the cache page, stale lines will be left in the cache
and cause random corruption. Once a PTE is cleared, there is no way
to find the physical address associated with the PTE and flush the
associated page at a later time.

I implemented an updated change with a parisc specific version of
ptep_clear_flush. It fixed the random data corruption on Helge's rp4440
and rp3440, as well as on my c8000.

At this point, I realized that I could restore the code where we only
flush in flush_cache_page_if_present if the page has been accessed.
However, for this, we also need to flush the cache when the accessed
bit is cleared in
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40918/">CVE-2024-40918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40918">CVE-2024-40918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227848">SUSE bug 1227848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send()

In case of token is released due to token-&gt;state == BNXT_HWRM_DEFERRED,
released token (set to NULL) is used in log messages. This issue is
expected to be prevented by HWRM_ERR_CODE_PF_UNAVAILABLE error code. But
this error code is returned by recent firmware. So some firmware may not
return it. This may lead to NULL pointer dereference.
Adjust this issue by adding token pointer check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227779">SUSE bug 1227779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40920" ref_url="https://www.suse.com/security/cve/CVE-2024-40920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mst: fix suspicious rcu usage in br_mst_set_state

I converted br_mst_set_state to RCU to avoid a vlan use-after-free
but forgot to change the vlan group dereference helper. Switch to vlan
group RCU deref helper to fix the suspicious rcu usage warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40920/">CVE-2024-40920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40920">CVE-2024-40920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227781">SUSE bug 1227781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40921" ref_url="https://www.suse.com/security/cve/CVE-2024-40921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state

Pass the already obtained vlan group pointer to br_mst_vlan_set_state()
instead of dereferencing it again. Each caller has already correctly
dereferenced it for their context. This change is required for the
following suspicious RCU dereference fix. No functional changes
intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40921/">CVE-2024-40921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40921">CVE-2024-40921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227784">SUSE bug 1227784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40922" ref_url="https://www.suse.com/security/cve/CVE-2024-40922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rsrc: don't lock while !TASK_RUNNING

There is a report of io_rsrc_ref_quiesce() locking a mutex while not
TASK_RUNNING, which is due to forgetting restoring the state back after
io_run_task_work_sig() and attempts to break out of the waiting loop.

do not call blocking ops when !TASK_RUNNING; state=1 set at
[&lt;ffffffff815d2494&gt;] prepare_to_wait+0xa4/0x380
kernel/sched/wait.c:237
WARNING: CPU: 2 PID: 397056 at kernel/sched/core.c:10099
__might_sleep+0x114/0x160 kernel/sched/core.c:10099
RIP: 0010:__might_sleep+0x114/0x160 kernel/sched/core.c:10099
Call Trace:
 &lt;TASK&gt;
 __mutex_lock_common kernel/locking/mutex.c:585 [inline]
 __mutex_lock+0xb4/0x940 kernel/locking/mutex.c:752
 io_rsrc_ref_quiesce+0x590/0x940 io_uring/rsrc.c:253
 io_sqe_buffers_unregister+0xa2/0x340 io_uring/rsrc.c:799
 __io_uring_register io_uring/register.c:424 [inline]
 __do_sys_io_uring_register+0x5b9/0x2400 io_uring/register.c:613
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd8/0x270 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40922/">CVE-2024-40922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40922">CVE-2024-40922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227785">SUSE bug 1227785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: disable rx data ring on dma allocation failure

When vmxnet3_rq_create() fails to allocate memory for rq-&gt;data_ring.base,
the subsequent call to vmxnet3_rq_destroy_all_rxdataring does not reset
rq-&gt;data_ring.desc_size for the data ring that failed, which presumably
causes the hypervisor to reference it on packet reception.

To fix this bug, rq-&gt;data_ring.desc_size needs to be set to 0 to tell
the hypervisor to disable this feature.

[   95.436876] kernel BUG at net/core/skbuff.c:207!
[   95.439074] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[   95.440411] CPU: 7 PID: 0 Comm: swapper/7 Not tainted 6.9.3-dirty #1
[   95.441558] Hardware name: VMware, Inc. VMware Virtual
Platform/440BX Desktop Reference Platform, BIOS 6.00 12/12/2018
[   95.443481] RIP: 0010:skb_panic+0x4d/0x4f
[   95.444404] Code: 4f 70 50 8b 87 c0 00 00 00 50 8b 87 bc 00 00 00 50
ff b7 d0 00 00 00 4c 8b 8f c8 00 00 00 48 c7 c7 68 e8 be 9f e8 63 58 f9
ff &lt;0f&gt; 0b 48 8b 14 24 48 c7 c1 d0 73 65 9f e8 a1 ff ff ff 48 8b 14 24
[   95.447684] RSP: 0018:ffffa13340274dd0 EFLAGS: 00010246
[   95.448762] RAX: 0000000000000089 RBX: ffff8fbbc72b02d0 RCX: 000000000000083f
[   95.450148] RDX: 0000000000000000 RSI: 00000000000000f6 RDI: 000000000000083f
[   95.451520] RBP: 000000000000002d R08: 0000000000000000 R09: ffffa13340274c60
[   95.452886] R10: ffffffffa04ed468 R11: 0000000000000002 R12: 0000000000000000
[   95.454293] R13: ffff8fbbdab3c2d0 R14: ffff8fbbdbd829e0 R15: ffff8fbbdbd809e0
[   95.455682] FS:  0000000000000000(0000) GS:ffff8fbeefd80000(0000) knlGS:0000000000000000
[   95.457178] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   95.458340] CR2: 00007fd0d1f650c8 CR3: 0000000115f28000 CR4: 00000000000406f0
[   95.459791] Call Trace:
[   95.460515]  &lt;IRQ&gt;
[   95.461180]  ? __die_body.cold+0x19/0x27
[   95.462150]  ? die+0x2e/0x50
[   95.462976]  ? do_trap+0xca/0x110
[   95.463973]  ? do_error_trap+0x6a/0x90
[   95.464966]  ? skb_panic+0x4d/0x4f
[   95.465901]  ? exc_invalid_op+0x50/0x70
[   95.466849]  ? skb_panic+0x4d/0x4f
[   95.467718]  ? asm_exc_invalid_op+0x1a/0x20
[   95.468758]  ? skb_panic+0x4d/0x4f
[   95.469655]  skb_put.cold+0x10/0x10
[   95.470573]  vmxnet3_rq_rx_complete+0x862/0x11e0 [vmxnet3]
[   95.471853]  vmxnet3_poll_rx_only+0x36/0xb0 [vmxnet3]
[   95.473185]  __napi_poll+0x2b/0x160
[   95.474145]  net_rx_action+0x2c6/0x3b0
[   95.475115]  handle_softirqs+0xe7/0x2a0
[   95.476122]  __irq_exit_rcu+0x97/0xb0
[   95.477109]  common_interrupt+0x85/0xa0
[   95.478102]  &lt;/IRQ&gt;
[   95.478846]  &lt;TASK&gt;
[   95.479603]  asm_common_interrupt+0x26/0x40
[   95.480657] RIP: 0010:pv_native_safe_halt+0xf/0x20
[   95.481801] Code: 22 d7 e9 54 87 01 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 93 ba 3b 00 fb f4 &lt;e9&gt; 2c 87 01 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90
[   95.485563] RSP: 0018:ffffa133400ffe58 EFLAGS: 00000246
[   95.486882] RAX: 0000000000004000 RBX: ffff8fbbc1d14064 RCX: 0000000000000000
[   95.488477] RDX: ffff8fbeefd80000 RSI: ffff8fbbc1d14000 RDI: 0000000000000001
[   95.490067] RBP: ffff8fbbc1d14064 R08: ffffffffa0652260 R09: 00000000000010d3
[   95.491683] R10: 0000000000000018 R11: ffff8fbeefdb4764 R12: ffffffffa0652260
[   95.493389] R13: ffffffffa06522e0 R14: 0000000000000001 R15: 0000000000000000
[   95.495035]  acpi_safe_halt+0x14/0x20
[   95.496127]  acpi_idle_do_entry+0x2f/0x50
[   95.497221]  acpi_idle_enter+0x7f/0xd0
[   95.498272]  cpuidle_enter_state+0x81/0x420
[   95.499375]  cpuidle_enter+0x2d/0x40
[   95.500400]  do_idle+0x1e5/0x240
[   95.501385]  cpu_startup_entry+0x29/0x30
[   95.502422]  start_secondary+0x11c/0x140
[   95.503454]  common_startup_64+0x13e/0x141
[   95.504466]  &lt;/TASK&gt;
[   95.505197] Modules linked in: nft_fib_inet nft_fib_ipv4
nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6
nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ip
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227786">SUSE bug 1227786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/dpt: Make DPT object unshrinkable

In some scenarios, the DPT object gets shrunk but
the actual framebuffer did not and thus its still
there on the DPT's vm-&gt;bound_list. Then it tries to
rewrite the PTEs via a stale CPU mapping. This causes panic.

[vsyrjala: Add TODO comment]
(cherry picked from commit 51064d471c53dcc8eddd2333c3f1c1d9131ba36c)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227787">SUSE bug 1227787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40925" ref_url="https://www.suse.com/security/cve/CVE-2024-40925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix request.queuelist usage in flush

Friedrich Weber reported a kernel crash problem and bisected to commit
81ada09cc25e ("blk-flush: reuse rq queuelist in flush state machine").

The root cause is that we use "list_move_tail(&amp;rq-&gt;queuelist, pending)"
in the PREFLUSH/POSTFLUSH sequences. But rq-&gt;queuelist.next == xxx since
it's popped out from plug-&gt;cached_rq in __blk_mq_alloc_requests_batch().
We don't initialize its queuelist just for this first request, although
the queuelist of all later popped requests will be initialized.

Fix it by changing to use "list_add_tail(&amp;rq-&gt;queuelist, pending)" so
rq-&gt;queuelist doesn't need to be initialized. It should be ok since rq
can't be on any list when PREFLUSH or POSTFLUSH, has no move actually.

Please note the commit 81ada09cc25e ("blk-flush: reuse rq queuelist in
flush state machine") also has another requirement that no drivers would
touch rq-&gt;queuelist after blk_mq_end_request() since we will reuse it to
add rq to the post-flush pending list in POSTFLUSH. If this is not true,
we will have to revert that commit IMHO.

This updated version adds "list_del_init(&amp;rq-&gt;queuelist)" in flush rq
callback since the dm layer may submit request of a weird invalid format
(REQ_FSEQ_PREFLUSH | REQ_FSEQ_POSTFLUSH), which causes double list_add
if without this "list_del_init(&amp;rq-&gt;queuelist)". The weird invalid format
problem should be fixed in dm layer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40925/">CVE-2024-40925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40925">CVE-2024-40925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227789">SUSE bug 1227789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40926" ref_url="https://www.suse.com/security/cve/CVE-2024-40926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: don't attempt to schedule hpd_work on headless cards

If the card doesn't have display hardware, hpd_work and hpd_lock are
left uninitialized which causes BUG when attempting to schedule hpd_work
on runtime PM resume.

Fix it by adding headless flag to DRM and skip any hpd if it's set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40926/">CVE-2024-40926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40926">CVE-2024-40926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227791">SUSE bug 1227791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Handle TD clearing for multiple streams case

When multiple streams are in use, multiple TDs might be in flight when
an endpoint is stopped. We need to issue a Set TR Dequeue Pointer for
each, to ensure everything is reset properly and the caches cleared.
Change the logic so that any N&gt;1 TDs found active for different streams
are deferred until after the first one is processed, calling
xhci_invalidate_cancelled_tds() again from xhci_handle_cmd_set_deq() to
queue another command until we are done with all of them. Also change
the error/"should never happen" paths to ensure we at least clear any
affected TDs, even if we can't issue a command to clear the hardware
cache, and complain loudly with an xhci_warn() if this ever happens.

This problem case dates back to commit e9df17eb1408 ("USB: xhci: Correct
assumptions about number of rings per endpoint.") early on in the XHCI
driver's life, when stream support was first added.
It was then identified but not fixed nor made into a warning in commit
674f8438c121 ("xhci: split handling halted endpoints into two steps"),
which added a FIXME comment for the problem case (without materially
changing the behavior as far as I can tell, though the new logic made
the problem more obvious).

Then later, in commit 94f339147fc3 ("xhci: Fix failure to give back some
cached cancelled URBs."), it was acknowledged again.

[Mathias: commit 94f339147fc3 ("xhci: Fix failure to give back some cached
cancelled URBs.") was a targeted regression fix to the previously mentioned
patch. Users reported issues with usb stuck after unmounting/disconnecting
UAS devices. This rolled back the TD clearing of multiple streams to its
original state.]

Apparently the commit author was aware of the problem (yet still chose
to submit it): It was still mentioned as a FIXME, an xhci_dbg() was
added to log the problem condition, and the remaining issue was mentioned
in the commit description. The choice of making the log type xhci_dbg()
for what is, at this point, a completely unhandled and known broken
condition is puzzling and unfortunate, as it guarantees that no actual
users would see the log in production, thereby making it nigh
undebuggable (indeed, even if you turn on DEBUG, the message doesn't
really hint at there being a problem at all).

It took me *months* of random xHC crashes to finally find a reliable
repro and be able to do a deep dive debug session, which could all have
been avoided had this unhandled, broken condition been actually reported
with a warning, as it should have been as a bug intentionally left in
unfixed (never mind that it shouldn't have been left in at all).

&gt; Another fix to solve clearing the caches of all stream rings with
&gt; cancelled TDs is needed, but not as urgent.

3 years after that statement and 14 years after the original bug was
introduced, I think it's finally time to fix it. And maybe next time
let's not leave bugs unfixed (that are actually worse than the original
bug), and let's actually get people to review kernel commits please.

Fixes xHC crashes and IOMMU faults with UAS devices when handling
errors/faults. Easiest repro is to use `hdparm` to mark an early sector
(e.g. 1024) on a disk as bad, then `cat /dev/sdX &gt; /dev/null` in a loop.
At least in the case of JMicron controllers, the read errors end up
having to cancel two TDs (for two queued requests to different streams)
and the one that didn't get cleared properly ends up faulting the xHC
entirely when it tries to access DMA pages that have since been unmapped,
referred to by the stale TDs. This normally happens quickly (after two
or three loops). After this fix, I left the `cat` in a loop running
overnight and experienced no xHC failures, with all read errors
recovered properly. Repro'd and tested on an Apple M1 Mac Mini
(dwc3 host).

On systems without an IOMMU, this bug would instead silently corrupt
freed memory, making this a
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227816">SUSE bug 1227816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40928" ref_url="https://www.suse.com/security/cve/CVE-2024-40928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool()

Clang static checker (scan-build) warning:
net/ethtool/ioctl.c:line 2233, column 2
Called function pointer is null (null dereference).

Return '-EOPNOTSUPP' when 'ops-&gt;get_ethtool_phy_stats' is NULL to fix
this typo error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40928/">CVE-2024-40928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227788">SUSE bug 1227788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: check n_ssids before accessing the ssids

In some versions of cfg80211, the ssids poinet might be a valid one even
though n_ssids is 0. Accessing the pointer in this case will cuase an
out-of-bound access. Fix this by checking n_ssids first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227774">SUSE bug 1227774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40930" ref_url="https://www.suse.com/security/cve/CVE-2024-40930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: validate HE operation element parsing

Validate that the HE operation element has the correct
length before parsing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40930/">CVE-2024-40930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40930">CVE-2024-40930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228236">SUSE bug 1228236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_una is properly initialized on connect

This is strictly related to commit fb7a0d334894 ("mptcp: ensure snd_nxt
is properly initialized on connect"). It turns out that syzkaller can
trigger the retransmit after fallback and before processing any other
incoming packet - so that snd_una is still left uninitialized.

Address the issue explicitly initializing snd_una together with snd_nxt
and write_seq.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227780">SUSE bug 1227780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/exynos/vidi: fix memory leak in .get_modes()

The duplicated EDID is never freed. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227828">SUSE bug 1227828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40933" ref_url="https://www.suse.com/security/cve/CVE-2024-40933" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: temperature: mlx90635: Fix ERR_PTR dereference in mlx90635_probe()

When devm_regmap_init_i2c() fails, regmap_ee could be error pointer,
instead of checking for IS_ERR(regmap_ee), regmap is checked which looks
like a copy paste error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40933/">CVE-2024-40933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40933">CVE-2024-40933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227794">SUSE bug 1227794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode()

Fix a memory leak on logi_dj_recv_send_report() error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227796">SUSE bug 1227796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: flush all requests after setting CACHEFILES_DEAD

In ondemand mode, when the daemon is processing an open request, if the
kernel flags the cache as CACHEFILES_DEAD, the cachefiles_daemon_write()
will always return -EIO, so the daemon can't pass the copen to the kernel.
Then the kernel process that is waiting for the copen triggers a hung_task.

Since the DEAD state is irreversible, it can only be exited by closing
/dev/cachefiles. Therefore, after calling cachefiles_io_error() to mark
the cache as CACHEFILES_DEAD, if in ondemand mode, flush all requests to
avoid the above hungtask. We may still be able to read some of the cached
data before closing the fd of /dev/cachefiles.

Note that this relies on the patch that adds reference counting to the req,
otherwise it may UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227797">SUSE bug 1227797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40936" ref_url="https://www.suse.com/security/cve/CVE-2024-40936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/region: Fix memregion leaks in devm_cxl_add_region()

Move the mode verification to __create_region() before allocating the
memregion to avoid the memregion leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40936/">CVE-2024-40936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227833">SUSE bug 1227833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: Clear napi-&gt;skb before dev_kfree_skb_any()

gve_rx_free_skb incorrectly leaves napi-&gt;skb referencing an skb after it
is freed with dev_kfree_skb_any(). This can result in a subsequent call
to napi_get_frags returning a dangling pointer.

Fix this by clearing napi-&gt;skb before the skb is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227903">SUSE bug 1227903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40938" ref_url="https://www.suse.com/security/cve/CVE-2024-40938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

landlock: Fix d_parent walk

The WARN_ON_ONCE() in collect_domain_accesses() can be triggered when
trying to link a root mount point.  This cannot work in practice because
this directory is mounted, but the VFS check is done after the call to
security_path_link().

Do not use source directory's d_parent when the source directory is the
mount point.

[mic: Fix commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40938/">CVE-2024-40938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40938">CVE-2024-40938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227840">SUSE bug 1227840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40939" ref_url="https://www.suse.com/security/cve/CVE-2024-40939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: iosm: Fix tainted pointer delete is case of region creation fail

In case of region creation fail in ipc_devlink_create_region(), previously
created regions delete process starts from tainted pointer which actually
holds error code value.
Fix this bug by decreasing region index before delete.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40939/">CVE-2024-40939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227799">SUSE bug 1227799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix tainted pointer delete is case of flow rules creation fail

In case of flow rule creation fail in mlx5_lag_create_port_sel_table(),
instead of previously created rules, the tainted pointer is deleted
deveral times.
Fix this bug by using correct flow rules pointers.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227800">SUSE bug 1227800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't read past the mfuart notifcation

In case the firmware sends a notification that claims it has more data
than it has, we will read past that was allocated for the notification.
Remove the print of the buffer, we won't see it by default. If needed,
we can see the content with tracing.

This was reported by KFENCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227771">SUSE bug 1227771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects

The hwmp code use objects of type mesh_preq_queue, added to a list in
ieee80211_if_mesh, to keep track of mpath we need to resolve. If the mpath
gets deleted, ex mesh interface is removed, the entries in that list will
never get cleaned. Fix this by flushing all corresponding items of the
preq_queue in mesh_path_flush_pending().

This should take care of KASAN reports like this:

unreferenced object 0xffff00000668d800 (size 128):
  comm "kworker/u8:4", pid 67, jiffies 4295419552 (age 1836.444s)
  hex dump (first 32 bytes):
    00 1f 05 09 00 00 ff ff 00 d5 68 06 00 00 ff ff  ..........h.....
    8e 97 ea eb 3e b8 01 00 00 00 00 00 00 00 00 00  ....&gt;...........
  backtrace:
    [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c
    [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80
    [&lt;0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8
    [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c
    [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4
    [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764
    [&lt;000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4
    [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440
    [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c
    [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4
    [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508
    [&lt;00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c
    [&lt;00000000b36425d1&gt;] worker_thread+0x9c/0x634
    [&lt;0000000005852dd5&gt;] kthread+0x1bc/0x1c4
    [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20
unreferenced object 0xffff000009051f00 (size 128):
  comm "kworker/u8:4", pid 67, jiffies 4295419553 (age 1836.440s)
  hex dump (first 32 bytes):
    90 d6 92 0d 00 00 ff ff 00 d8 68 06 00 00 ff ff  ..........h.....
    36 27 92 e4 02 e0 01 00 00 58 79 06 00 00 ff ff  6'.......Xy.....
  backtrace:
    [&lt;000000007302a0b6&gt;] __kmem_cache_alloc_node+0x1e0/0x35c
    [&lt;00000000049bd418&gt;] kmalloc_trace+0x34/0x80
    [&lt;0000000000d792bb&gt;] mesh_queue_preq+0x44/0x2a8
    [&lt;00000000c99c3696&gt;] mesh_nexthop_resolve+0x198/0x19c
    [&lt;00000000926bf598&gt;] ieee80211_xmit+0x1d0/0x1f4
    [&lt;00000000fc8c2284&gt;] __ieee80211_subif_start_xmit+0x30c/0x764
    [&lt;000000005926ee38&gt;] ieee80211_subif_start_xmit+0x9c/0x7a4
    [&lt;000000004c86e916&gt;] dev_hard_start_xmit+0x174/0x440
    [&lt;0000000023495647&gt;] __dev_queue_xmit+0xe24/0x111c
    [&lt;00000000cfe9ca78&gt;] batadv_send_skb_packet+0x180/0x1e4
    [&lt;000000007bacc5d5&gt;] batadv_v_elp_periodic_work+0x2f4/0x508
    [&lt;00000000adc3cd94&gt;] process_one_work+0x4b8/0xa1c
    [&lt;00000000b36425d1&gt;] worker_thread+0x9c/0x634
    [&lt;0000000005852dd5&gt;] kthread+0x1bc/0x1c4
    [&lt;000000005fccd770&gt;] ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227770">SUSE bug 1227770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix races between hole punching and AIO+DIO

After commit "ocfs2: return real error code in ocfs2_dio_wr_get_block",
fstests/generic/300 become from always failed to sometimes failed:

========================================================================
[  473.293420 ] run fstests generic/300

[  475.296983 ] JBD2: Ignoring recovery information on journal
[  475.302473 ] ocfs2: Mounting device (253,1) on (node local, slot 0) with ordered data mode.
[  494.290998 ] OCFS2: ERROR (device dm-1): ocfs2_change_extent_flag: Owner 5668 has an extent at cpos 78723 which can no longer be found
[  494.291609 ] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted.
[  494.292018 ] OCFS2: File system is now read-only.
[  494.292224 ] (kworker/19:11,2628,19):ocfs2_mark_extent_written:5272 ERROR: status = -30
[  494.292602 ] (kworker/19:11,2628,19):ocfs2_dio_end_io_write:2374 ERROR: status = -3
fio: io_u error on file /mnt/scratch/racer: Read-only file system: write offset=460849152, buflen=131072
=========================================================================

In __blockdev_direct_IO, ocfs2_dio_wr_get_block is called to add unwritten
extents to a list.  extents are also inserted into extent tree in
ocfs2_write_begin_nolock.  Then another thread call fallocate to puch a
hole at one of the unwritten extent.  The extent at cpos was removed by
ocfs2_remove_extent().  At end io worker thread, ocfs2_search_extent_list
found there is no such extent at the cpos.

    T1                        T2                T3
                              inode lock
                                ...
                                insert extents
                                ...
                              inode unlock
ocfs2_fallocate
 __ocfs2_change_file_space
  inode lock
  lock ip_alloc_sem
  ocfs2_remove_inode_range inode
   ocfs2_remove_btree_range
    ocfs2_remove_extent
    ^---remove the extent at cpos 78723
  ...
  unlock ip_alloc_sem
  inode unlock
                                       ocfs2_dio_end_io
                                        ocfs2_dio_end_io_write
                                         lock ip_alloc_sem
                                         ocfs2_mark_extent_written
                                          ocfs2_change_extent_flag
                                           ocfs2_search_extent_list
                                           ^---failed to find extent
                                          ...
                                          unlock ip_alloc_sem

In most filesystems, fallocate is not compatible with racing with AIO+DIO,
so fix it by adding to wait for all dio before fallocate/punch_hole like
ext4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227849">SUSE bug 1227849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40944" ref_url="https://www.suse.com/security/cve/CVE-2024-40944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/kexec: Fix bug with call depth tracking

The call to cc_platform_has() triggers a fault and system crash if call depth
tracking is active because the GS segment has been reset by load_segments() and
GS_BASE is now 0 but call depth tracking uses per-CPU variables to operate.

Call cc_platform_has() earlier in the function when GS is still valid.

  [ bp: Massage. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40944/">CVE-2024-40944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40944">CVE-2024-40944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227883">SUSE bug 1227883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Return right value in iommu_sva_bind_device()

iommu_sva_bind_device() should return either a sva bond handle or an
ERR_PTR value in error cases. Existing drivers (idxd and uacce) only
check the return value with IS_ERR(). This could potentially lead to
a kernel NULL pointer dereference issue if the function returns NULL
instead of an error pointer.

In reality, this doesn't cause any problems because iommu_sva_bind_device()
only returns NULL when the kernel is not configured with CONFIG_IOMMU_SVA.
In this case, iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) will
return an error, and the device drivers won't call iommu_sva_bind_device()
at all.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227802">SUSE bug 1227802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40947" ref_url="https://www.suse.com/security/cve/CVE-2024-40947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Avoid blocking in RCU read-side critical section

A panic happens in ima_match_policy:

BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
PGD 42f873067 P4D 0
Oops: 0000 [#1] SMP NOPTI
CPU: 5 PID: 1286325 Comm: kubeletmonit.sh
Kdump: loaded Tainted: P
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
               BIOS 0.0.0 02/06/2015
RIP: 0010:ima_match_policy+0x84/0x450
Code: 49 89 fc 41 89 cf 31 ed 89 44 24 14 eb 1c 44 39
      7b 18 74 26 41 83 ff 05 74 20 48 8b 1b 48 3b 1d
      f2 b9 f4 00 0f 84 9c 01 00 00 &lt;44&gt; 85 73 10 74 ea
      44 8b 6b 14 41 f6 c5 01 75 d4 41 f6 c5 02 74 0f
RSP: 0018:ff71570009e07a80 EFLAGS: 00010207
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000200
RDX: ffffffffad8dc7c0 RSI: 0000000024924925 RDI: ff3e27850dea2000
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffabfce739
R10: ff3e27810cc42400 R11: 0000000000000000 R12: ff3e2781825ef970
R13: 00000000ff3e2785 R14: 000000000000000c R15: 0000000000000001
FS:  00007f5195b51740(0000)
GS:ff3e278b12d40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000010 CR3: 0000000626d24002 CR4: 0000000000361ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 ima_get_action+0x22/0x30
 process_measurement+0xb0/0x830
 ? page_add_file_rmap+0x15/0x170
 ? alloc_set_pte+0x269/0x4c0
 ? prep_new_page+0x81/0x140
 ? simple_xattr_get+0x75/0xa0
 ? selinux_file_open+0x9d/0xf0
 ima_file_check+0x64/0x90
 path_openat+0x571/0x1720
 do_filp_open+0x9b/0x110
 ? page_counter_try_charge+0x57/0xc0
 ? files_cgroup_alloc_fd+0x38/0x60
 ? __alloc_fd+0xd4/0x250
 ? do_sys_open+0x1bd/0x250
 do_sys_open+0x1bd/0x250
 do_syscall_64+0x5d/0x1d0
 entry_SYSCALL_64_after_hwframe+0x65/0xca

Commit c7423dbdbc9e ("ima: Handle -ESTALE returned by
ima_filter_rule_match()") introduced call to ima_lsm_copy_rule within a
RCU read-side critical section which contains kmalloc with GFP_KERNEL.
This implies a possible sleep and violates limitations of RCU read-side
critical sections on non-PREEMPT systems.

Sleeping within RCU read-side critical section might cause
synchronize_rcu() returning early and break RCU protection, allowing a
UAF to happen.

The root cause of this issue could be described as follows:
|	Thread A	|	Thread B	|
|			|ima_match_policy	|
|			|  rcu_read_lock	|
|ima_lsm_update_rule	|			|
|  synchronize_rcu	|			|
|			|    kmalloc(GFP_KERNEL)|
|			|      sleep		|
==&gt; synchronize_rcu returns early
|  kfree(entry)		|			|
|			|    entry = entry-&gt;next|
==&gt; UAF happens and entry now becomes NULL (or could be anything).
|			|    entry-&gt;action	|
==&gt; Accessing entry might cause panic.

To fix this issue, we are converting all kmalloc that is called within
RCU read-side critical section to use GFP_ATOMIC.

[PM: fixed missing comment, long lines, !CONFIG_IMA_LSM_RULES case]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40947/">CVE-2024-40947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40947">CVE-2024-40947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227803">SUSE bug 1227803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40948" ref_url="https://www.suse.com/security/cve/CVE-2024-40948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_table_check: fix crash on ZONE_DEVICE

Not all pages may apply to pgtable check.  One example is ZONE_DEVICE
pages: they map PFNs directly, and they don't allocate page_ext at all
even if there's struct page around.  One may reference
devm_memremap_pages().

When both ZONE_DEVICE and page-table-check enabled, then try to map some
dax memories, one can trigger kernel bug constantly now when the kernel
was trying to inject some pfn maps on the dax device:

 kernel BUG at mm/page_table_check.c:55!

While it's pretty legal to use set_pxx_at() for ZONE_DEVICE pages for page
fault resolutions, skip all the checks if page_ext doesn't even exist in
pgtable checker, which applies to ZONE_DEVICE but maybe more.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40948/">CVE-2024-40948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40948">CVE-2024-40948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227801">SUSE bug 1227801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40949" ref_url="https://www.suse.com/security/cve/CVE-2024-40949" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: shmem: fix getting incorrect lruvec when replacing a shmem folio

When testing shmem swapin, I encountered the warning below on my machine. 
The reason is that replacing an old shmem folio with a new one causes
mem_cgroup_migrate() to clear the old folio's memcg data.  As a result,
the old folio cannot get the correct memcg's lruvec needed to remove
itself from the LRU list when it is being freed.  This could lead to
possible serious problems, such as LRU list crashes due to holding the
wrong LRU lock, and incorrect LRU statistics.

To fix this issue, we can fallback to use the mem_cgroup_replace_folio()
to replace the old shmem folio.

[ 5241.100311] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5d9960
[ 5241.100317] head: order:4 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 5241.100319] flags: 0x17fffe0000040068(uptodate|lru|head|swapbacked|node=0|zone=2|lastcpupid=0x3ffff)
[ 5241.100323] raw: 17fffe0000040068 fffffdffd6687948 fffffdffd69ae008 0000000000000000
[ 5241.100325] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 5241.100326] head: 17fffe0000040068 fffffdffd6687948 fffffdffd69ae008 0000000000000000
[ 5241.100327] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 5241.100328] head: 17fffe0000000204 fffffdffd6665801 ffffffffffffffff 0000000000000000
[ 5241.100329] head: 0000000a00000010 0000000000000000 00000000ffffffff 0000000000000000
[ 5241.100330] page dumped because: VM_WARN_ON_ONCE_FOLIO(!memcg &amp;&amp; !mem_cgroup_disabled())
[ 5241.100338] ------------[ cut here ]------------
[ 5241.100339] WARNING: CPU: 19 PID: 78402 at include/linux/memcontrol.h:775 folio_lruvec_lock_irqsave+0x140/0x150
[...]
[ 5241.100374] pc : folio_lruvec_lock_irqsave+0x140/0x150
[ 5241.100375] lr : folio_lruvec_lock_irqsave+0x138/0x150
[ 5241.100376] sp : ffff80008b38b930
[...]
[ 5241.100398] Call trace:
[ 5241.100399]  folio_lruvec_lock_irqsave+0x140/0x150
[ 5241.100401]  __page_cache_release+0x90/0x300
[ 5241.100404]  __folio_put+0x50/0x108
[ 5241.100406]  shmem_replace_folio+0x1b4/0x240
[ 5241.100409]  shmem_swapin_folio+0x314/0x528
[ 5241.100411]  shmem_get_folio_gfp+0x3b4/0x930
[ 5241.100412]  shmem_fault+0x74/0x160
[ 5241.100414]  __do_fault+0x40/0x218
[ 5241.100417]  do_shared_fault+0x34/0x1b0
[ 5241.100419]  do_fault+0x40/0x168
[ 5241.100420]  handle_pte_fault+0x80/0x228
[ 5241.100422]  __handle_mm_fault+0x1c4/0x440
[ 5241.100424]  handle_mm_fault+0x60/0x1f0
[ 5241.100426]  do_page_fault+0x120/0x488
[ 5241.100429]  do_translation_fault+0x4c/0x68
[ 5241.100431]  do_mem_abort+0x48/0xa0
[ 5241.100434]  el0_da+0x38/0xc0
[ 5241.100436]  el0t_64_sync_handler+0x68/0xc0
[ 5241.100437]  el0t_64_sync+0x14c/0x150
[ 5241.100439] ---[ end trace 0000000000000000 ]---

[baolin.wang@linux.alibaba.com: remove less helpful comments, per Matthew]
  Link: https://lkml.kernel.org/r/ccad3fe1375b468ebca3227b6b729f3eaf9d8046.1718423197.git.baolin.wang@linux.alibaba.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40949/">CVE-2024-40949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40949">CVE-2024-40949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227837">SUSE bug 1227837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40950" ref_url="https://www.suse.com/security/cve/CVE-2024-40950" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: huge_memory: fix misused mapping_large_folio_support() for anon folios

When I did a large folios split test, a WARNING "[ 5059.122759][ T166]
Cannot split file folio to non-0 order" was triggered.  But the test cases
are only for anonmous folios.  while mapping_large_folio_support() is only
reasonable for page cache folios.

In split_huge_page_to_list_to_order(), the folio passed to
mapping_large_folio_support() maybe anonmous folio.  The folio_test_anon()
check is missing.  So the split of the anonmous THP is failed.  This is
also the same for shmem_mapping().  We'd better add a check for both.  But
the shmem_mapping() in __split_huge_page() is not involved, as for
anonmous folios, the end parameter is set to -1, so (head[i].index &gt;= end)
is always false.  shmem_mapping() is not called.

Also add a VM_WARN_ON_ONCE() in mapping_large_folio_support() for anon
mapping, So we can detect the wrong use more easily.

THP folios maybe exist in the pagecache even the file system doesn't
support large folio, it is because when CONFIG_TRANSPARENT_HUGEPAGE is
enabled, khugepaged will try to collapse read-only file-backed pages to
THP.  But the mapping does not actually support multi order large folios
properly.

Using /sys/kernel/debug/split_huge_pages to verify this, with this patch,
large anon THP is successfully split and the warning is ceased.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40950/">CVE-2024-40950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40950">CVE-2024-40950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227838">SUSE bug 1227838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40951" ref_url="https://www.suse.com/security/cve/CVE-2024-40951" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix NULL pointer dereference in ocfs2_abort_trigger()

bdev-&gt;bd_super has been removed and commit 8887b94d9322 change the usage
from bdev-&gt;bd_super to b_assoc_map-&gt;host-&gt;i_sb.  Since ocfs2 hasn't set
bh-&gt;b_assoc_map, it will trigger NULL pointer dereference when calling
into ocfs2_abort_trigger().

Actually this was pointed out in history, see commit 74e364ad1b13.  But
I've made a mistake when reviewing commit 8887b94d9322 and then
re-introduce this regression.

Since we cannot revive bdev in buffer head, so fix this issue by
initializing all types of ocfs2 triggers when fill super, and then get the
specific ocfs2 trigger from ocfs2_caching_info when access journal.

[joseph.qi@linux.alibaba.com: v2]
  Link: https://lkml.kernel.org/r/20240602112045.1112708-1-joseph.qi@linux.alibaba.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40951/">CVE-2024-40951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40951">CVE-2024-40951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227804">SUSE bug 1227804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40952" ref_url="https://www.suse.com/security/cve/CVE-2024-40952" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix NULL pointer dereference in ocfs2_journal_dirty()

bdev-&gt;bd_super has been removed and commit 8887b94d9322 change the usage
from bdev-&gt;bd_super to b_assoc_map-&gt;host-&gt;i_sb.  This introduces the
following NULL pointer dereference in ocfs2_journal_dirty() since
b_assoc_map is still not initialized.  This can be easily reproduced by
running xfstests generic/186, which simulate no more credits.

[  134.351592] BUG: kernel NULL pointer dereference, address: 0000000000000000
...
[  134.355341] RIP: 0010:ocfs2_journal_dirty+0x14f/0x160 [ocfs2]
...
[  134.365071] Call Trace:
[  134.365312]  &lt;TASK&gt;
[  134.365524]  ? __die_body+0x1e/0x60
[  134.365868]  ? page_fault_oops+0x13d/0x4f0
[  134.366265]  ? __pfx_bit_wait_io+0x10/0x10
[  134.366659]  ? schedule+0x27/0xb0
[  134.366981]  ? exc_page_fault+0x6a/0x140
[  134.367356]  ? asm_exc_page_fault+0x26/0x30
[  134.367762]  ? ocfs2_journal_dirty+0x14f/0x160 [ocfs2]
[  134.368305]  ? ocfs2_journal_dirty+0x13d/0x160 [ocfs2]
[  134.368837]  ocfs2_create_new_meta_bhs.isra.51+0x139/0x2e0 [ocfs2]
[  134.369454]  ocfs2_grow_tree+0x688/0x8a0 [ocfs2]
[  134.369927]  ocfs2_split_and_insert.isra.67+0x35c/0x4a0 [ocfs2]
[  134.370521]  ocfs2_split_extent+0x314/0x4d0 [ocfs2]
[  134.371019]  ocfs2_change_extent_flag+0x174/0x410 [ocfs2]
[  134.371566]  ocfs2_add_refcount_flag+0x3fa/0x630 [ocfs2]
[  134.372117]  ocfs2_reflink_remap_extent+0x21b/0x4c0 [ocfs2]
[  134.372994]  ? inode_update_timestamps+0x4a/0x120
[  134.373692]  ? __pfx_ocfs2_journal_access_di+0x10/0x10 [ocfs2]
[  134.374545]  ? __pfx_ocfs2_journal_access_di+0x10/0x10 [ocfs2]
[  134.375393]  ocfs2_reflink_remap_blocks+0xe4/0x4e0 [ocfs2]
[  134.376197]  ocfs2_remap_file_range+0x1de/0x390 [ocfs2]
[  134.376971]  ? security_file_permission+0x29/0x50
[  134.377644]  vfs_clone_file_range+0xfe/0x320
[  134.378268]  ioctl_file_clone+0x45/0xa0
[  134.378853]  do_vfs_ioctl+0x457/0x990
[  134.379422]  __x64_sys_ioctl+0x6e/0xd0
[  134.379987]  do_syscall_64+0x5d/0x170
[  134.380550]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  134.381231] RIP: 0033:0x7fa4926397cb
[  134.381786] Code: 73 01 c3 48 8b 0d bd 56 38 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8d 56 38 00 f7 d8 64 89 01 48
[  134.383930] RSP: 002b:00007ffc2b39f7b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  134.384854] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fa4926397cb
[  134.385734] RDX: 00007ffc2b39f7f0 RSI: 000000004020940d RDI: 0000000000000003
[  134.386606] RBP: 0000000000000000 R08: 00111a82a4f015bb R09: 00007fa494221000
[  134.387476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  134.388342] R13: 0000000000f10000 R14: 0000558e844e2ac8 R15: 0000000000f10000
[  134.389207]  &lt;/TASK&gt;

Fix it by only aborting transaction and journal in ocfs2_journal_dirty()
now, and leave ocfs2_abort() later when detecting an aborted handle,
e.g. start next transaction. Also log the handle details in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40952/">CVE-2024-40952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40952">CVE-2024-40952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227805">SUSE bug 1227805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin()

Use {READ,WRITE}_ONCE() to access kvm-&gt;last_boosted_vcpu to ensure the
loads and stores are atomic.  In the extremely unlikely scenario the
compiler tears the stores, it's theoretically possible for KVM to attempt
to get a vCPU using an out-of-bounds index, e.g. if the write is split
into multiple 8-bit stores, and is paired with a 32-bit load on a VM with
257 vCPUs:

  CPU0                              CPU1
  last_boosted_vcpu = 0xff;

                                    (last_boosted_vcpu = 0x100)
                                    last_boosted_vcpu[15:8] = 0x01;
  i = (last_boosted_vcpu = 0x1ff)
                                    last_boosted_vcpu[7:0] = 0x00;

  vcpu = kvm-&gt;vcpu_array[0x1ff];

As detected by KCSAN:

  BUG: KCSAN: data-race in kvm_vcpu_on_spin [kvm] / kvm_vcpu_on_spin [kvm]

  write to 0xffffc90025a92344 of 4 bytes by task 4340 on cpu 16:
  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4112) kvm
  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel
  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?
		 arch/x86/kvm/vmx/vmx.c:6606) kvm_intel
  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm
  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm
  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm
  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)
  __x64_sys_ioctl (fs/ioctl.c:890)
  x64_sys_call (arch/x86/entry/syscall_64.c:33)
  do_syscall_64 (arch/x86/entry/common.c:?)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

  read to 0xffffc90025a92344 of 4 bytes by task 4342 on cpu 4:
  kvm_vcpu_on_spin (arch/x86/kvm/../../../virt/kvm/kvm_main.c:4069) kvm
  handle_pause (arch/x86/kvm/vmx/vmx.c:5929) kvm_intel
  vmx_handle_exit (arch/x86/kvm/vmx/vmx.c:?
			arch/x86/kvm/vmx/vmx.c:6606) kvm_intel
  vcpu_run (arch/x86/kvm/x86.c:11107 arch/x86/kvm/x86.c:11211) kvm
  kvm_arch_vcpu_ioctl_run (arch/x86/kvm/x86.c:?) kvm
  kvm_vcpu_ioctl (arch/x86/kvm/../../../virt/kvm/kvm_main.c:?) kvm
  __se_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:904 fs/ioctl.c:890)
  __x64_sys_ioctl (fs/ioctl.c:890)
  x64_sys_call (arch/x86/entry/syscall_64.c:33)
  do_syscall_64 (arch/x86/entry/common.c:?)
  entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

  value changed: 0x00000012 -&gt; 0x00000000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227806">SUSE bug 1227806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: do not leave a dangling sk pointer, when socket creation fails

It is possible to trigger a use-after-free by:
  * attaching an fentry probe to __sock_release() and the probe calling the
    bpf_get_socket_cookie() helper
  * running traceroute -I 1.1.1.1 on a freshly booted VM

A KASAN enabled kernel will log something like below (decoded and stripped):
==================================================================
BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
Read of size 8 at addr ffff888007110dd8 by task traceroute/299

CPU: 2 PID: 299 Comm: traceroute Tainted: G            E      6.10.0-rc2+ #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))
print_report (mm/kasan/report.c:378 mm/kasan/report.c:488)
? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
kasan_report (mm/kasan/report.c:603)
? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)
__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
bpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)
bpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e
bpf_trampoline_6442506592+0x47/0xaf
__sock_release (net/socket.c:652)
__sock_create (net/socket.c:1601)
...
Allocated by task 299 on cpu 2 at 78.328492s:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:68)
__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)
kmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)
sk_prot_alloc (net/core/sock.c:2075)
sk_alloc (net/core/sock.c:2134)
inet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)
__sock_create (net/socket.c:1572)
__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)
__x64_sys_socket (net/socket.c:1718)
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Freed by task 299 on cpu 2 at 78.328502s:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:68)
kasan_save_free_info (mm/kasan/generic.c:582)
poison_slab_object (mm/kasan/common.c:242)
__kasan_slab_free (mm/kasan/common.c:256)
kmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)
__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)
inet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)
__sock_create (net/socket.c:1572)
__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)
__x64_sys_socket (net/socket.c:1718)
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Fix this by clearing the struct socket reference in sk_common_release() to cover
all protocol families create functions, which may already attached the
reference to the sk object with sock_init_data().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228786">SUSE bug 1228786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40955" ref_url="https://www.suse.com/security/cve/CVE-2024-40955" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists()

We can trigger a slab-out-of-bounds with the following commands:

    mkfs.ext4 -F /dev/$disk 10G
    mount /dev/$disk /tmp/test
    echo 2147483647 &gt; /sys/fs/ext4/$disk/mb_group_prealloc
    echo test &gt; /tmp/test/file &amp;&amp; sync

==================================================================
BUG: KASAN: slab-out-of-bounds in ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
Read of size 8 at addr ffff888121b9d0f0 by task kworker/u2:0/11
CPU: 0 PID: 11 Comm: kworker/u2:0 Tainted: GL 6.7.0-next-20240118 #521
Call Trace:
 dump_stack_lvl+0x2c/0x50
 kasan_report+0xb6/0xf0
 ext4_mb_find_good_group_avg_frag_lists+0x8a/0x200 [ext4]
 ext4_mb_regular_allocator+0x19e9/0x2370 [ext4]
 ext4_mb_new_blocks+0x88a/0x1370 [ext4]
 ext4_ext_map_blocks+0x14f7/0x2390 [ext4]
 ext4_map_blocks+0x569/0xea0 [ext4]
 ext4_do_writepages+0x10f6/0x1bc0 [ext4]
[...]
==================================================================

The flow of issue triggering is as follows:

// Set s_mb_group_prealloc to 2147483647 via sysfs
ext4_mb_new_blocks
  ext4_mb_normalize_request
    ext4_mb_normalize_group_request
      ac-&gt;ac_g_ex.fe_len = EXT4_SB(sb)-&gt;s_mb_group_prealloc
  ext4_mb_regular_allocator
    ext4_mb_choose_next_group
      ext4_mb_choose_next_group_best_avail
        mb_avg_fragment_size_order
          order = fls(len) - 2 = 29
        ext4_mb_find_good_group_avg_frag_lists
          frag_list = &amp;sbi-&gt;s_mb_avg_fragment_size[order]
          if (list_empty(frag_list)) // Trigger SOOB!

At 4k block size, the length of the s_mb_avg_fragment_size list is 14,
but an oversized s_mb_group_prealloc is set, causing slab-out-of-bounds
to be triggered by an attempt to access an element at index 29.

Add a new attr_id attr_clusters_in_group with values in the range
[0, sbi-&gt;s_clusters_per_group] and declare mb_group_prealloc as
that type to fix the issue. In addition avoid returning an order
from mb_avg_fragment_size_order() greater than MB_NUM_ORDERS(sb)
and reduce some useless loops.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40955/">CVE-2024-40955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40955">CVE-2024-40955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227809">SUSE bug 1227809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list

Use list_for_each_entry_safe() to allow iterating through the list and
deleting the entry in the iteration process. The descriptor is freed via
idxd_desc_complete() and there's a slight chance may cause issue for
the list iterator when the descriptor is reused by another thread
without it being deleted from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228585">SUSE bug 1228585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40957" ref_url="https://www.suse.com/security/cve/CVE-2024-40957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors

input_action_end_dx4() and input_action_end_dx6() are called NF_HOOK() for
PREROUTING hook, in PREROUTING hook, we should passing a valid indev,
and a NULL outdev to NF_HOOK(), otherwise may trigger a NULL pointer
dereference, as below:

    [74830.647293] BUG: kernel NULL pointer dereference, address: 0000000000000090
    [74830.655633] #PF: supervisor read access in kernel mode
    [74830.657888] #PF: error_code(0x0000) - not-present page
    [74830.659500] PGD 0 P4D 0
    [74830.660450] Oops: 0000 [#1] PREEMPT SMP PTI
    ...
    [74830.664953] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
    [74830.666569] RIP: 0010:rpfilter_mt+0x44/0x15e [ipt_rpfilter]
    ...
    [74830.689725] Call Trace:
    [74830.690402]  &lt;IRQ&gt;
    [74830.690953]  ? show_trace_log_lvl+0x1c4/0x2df
    [74830.692020]  ? show_trace_log_lvl+0x1c4/0x2df
    [74830.693095]  ? ipt_do_table+0x286/0x710 [ip_tables]
    [74830.694275]  ? __die_body.cold+0x8/0xd
    [74830.695205]  ? page_fault_oops+0xac/0x140
    [74830.696244]  ? exc_page_fault+0x62/0x150
    [74830.697225]  ? asm_exc_page_fault+0x22/0x30
    [74830.698344]  ? rpfilter_mt+0x44/0x15e [ipt_rpfilter]
    [74830.699540]  ipt_do_table+0x286/0x710 [ip_tables]
    [74830.700758]  ? ip6_route_input+0x19d/0x240
    [74830.701752]  nf_hook_slow+0x3f/0xb0
    [74830.702678]  input_action_end_dx4+0x19b/0x1e0
    [74830.703735]  ? input_action_end_t+0xe0/0xe0
    [74830.704734]  seg6_local_input_core+0x2d/0x60
    [74830.705782]  lwtunnel_input+0x5b/0xb0
    [74830.706690]  __netif_receive_skb_one_core+0x63/0xa0
    [74830.707825]  process_backlog+0x99/0x140
    [74830.709538]  __napi_poll+0x2c/0x160
    [74830.710673]  net_rx_action+0x296/0x350
    [74830.711860]  __do_softirq+0xcb/0x2ac
    [74830.713049]  do_softirq+0x63/0x90

input_action_end_dx4() passing a NULL indev to NF_HOOK(), and finally
trigger a NULL dereference in rpfilter_mt()-&gt;rpfilter_is_loopback():

    static bool
    rpfilter_is_loopback(const struct sk_buff *skb,
          	       const struct net_device *in)
    {
            // in is NULL
            return skb-&gt;pkt_type == PACKET_LOOPBACK ||
          	 in-&gt;flags &amp; IFF_LOOPBACK;
    }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40957/">CVE-2024-40957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227811">SUSE bug 1227811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40958</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netns: Make get_net_ns() handle zero refcount net

Syzkaller hit a warning:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0
Modules linked in:
CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0xdf/0x1d0
Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 &lt;0f&gt; 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1
RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac
RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001
RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139
R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4
R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040
FS:  00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0xa3/0xc0
 ? __warn+0xa5/0x1c0
 ? refcount_warn_saturate+0xdf/0x1d0
 ? report_bug+0x1fc/0x2d0
 ? refcount_warn_saturate+0xdf/0x1d0
 ? handle_bug+0xa1/0x110
 ? exc_invalid_op+0x3c/0xb0
 ? asm_exc_invalid_op+0x1f/0x30
 ? __warn_printk+0xcc/0x140
 ? __warn_printk+0xd5/0x140
 ? refcount_warn_saturate+0xdf/0x1d0
 get_net_ns+0xa4/0xc0
 ? __pfx_get_net_ns+0x10/0x10
 open_related_ns+0x5a/0x130
 __tun_chr_ioctl+0x1616/0x2370
 ? __sanitizer_cov_trace_switch+0x58/0xa0
 ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30
 ? __pfx_tun_chr_ioctl+0x10/0x10
 tun_chr_ioctl+0x2f/0x40
 __x64_sys_ioctl+0x11b/0x160
 x64_sys_call+0x1211/0x20d0
 do_syscall_64+0x9e/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5b28f165d7
Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8
RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7
RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0
R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730
R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;
Kernel panic - not syncing: kernel: panic_on_warn set ...

This is trigger as below:
          ns0                                    ns1
tun_set_iff() //dev is tun0
   tun-&gt;dev = dev
//ip link set tun0 netns ns1
                                       put_net() //ref is 0
__tun_chr_ioctl() //TUNGETDEVNETNS
   net = dev_net(tun-&gt;dev);
   open_related_ns(&amp;net-&gt;ns, get_net_ns); //ns1
     get_net_ns()
        get_net() //addition on 0

Use maybe_get_net() in get_net_ns in case net's ref is zero to fix this
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227812">SUSE bug 1227812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()

ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.

syzbot reported:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker
 RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64
Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00
RSP: 0018:ffffc90000117378 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7
RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98
RBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000
R10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]
  xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]
  xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541
  xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835
  xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]
  xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201
  xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]
  xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309
  ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256
  send6+0x611/0xd20 drivers/net/wireguard/socket.c:139
  wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178
  wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200
  wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40
  wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227884">SUSE bug 1227884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible NULL dereference in rt6_probe()

syzbot caught a NULL dereference in rt6_probe() [1]

Bail out if  __in6_dev_get() returns NULL.

[1]
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]
CPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
 RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]
 RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758
Code: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19
RSP: 0018:ffffc900034af070 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000
RDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c
RBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a
R13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000
FS:  00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784
  nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496
  __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825
  find_rr_leaf net/ipv6/route.c:853 [inline]
  rt6_select net/ipv6/route.c:897 [inline]
  fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195
  ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231
  pol_lookup_func include/net/ip6_fib.h:616 [inline]
  fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121
  ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]
  ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651
  ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147
  ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250
  rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898
  inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  sock_write_iter+0x4b8/0x5c0 net/socket.c:1160
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x6b6/0x1140 fs/read_write.c:590
  ksys_write+0x1f8/0x260 fs/read_write.c:643
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227813">SUSE bug 1227813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible NULL deref in fib6_nh_init()

syzbot reminds us that in6_dev_get() can return NULL.

fib6_nh_init()
    ip6_validate_gw(  &amp;idev  )
        ip6_route_check_nh(  idev  )
            *idev = in6_dev_get(dev); // can be NULL

Oops: general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]
CPU: 0 PID: 11237 Comm: syz-executor.3 Not tainted 6.10.0-rc2-syzkaller-00249-gbe27b8965297 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
 RIP: 0010:fib6_nh_init+0x640/0x2160 net/ipv6/route.c:3606
Code: 00 00 fc ff df 4c 8b 64 24 58 48 8b 44 24 28 4c 8b 74 24 30 48 89 c1 48 89 44 24 28 48 8d 98 e0 05 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 0f b6 04 38 84 c0 0f 85 b3 17 00 00 8b 1b 31 ff 89 de e8 b8 8b
RSP: 0018:ffffc900032775a0 EFLAGS: 00010202
RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000000000
RDX: 0000000000000010 RSI: ffffc90003277a54 RDI: ffff88802b3a08d8
RBP: ffffc900032778b0 R08: 00000000000002fc R09: 0000000000000000
R10: 00000000000002fc R11: 0000000000000000 R12: ffff88802b3a08b8
R13: 1ffff9200064eec8 R14: ffffc90003277a00 R15: dffffc0000000000
FS:  00007f940feb06c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000245e8000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  ip6_route_info_create+0x99e/0x12b0 net/ipv6/route.c:3809
  ip6_route_add+0x28/0x160 net/ipv6/route.c:3853
  ipv6_route_ioctl+0x588/0x870 net/ipv6/route.c:4483
  inet6_ioctl+0x21a/0x280 net/ipv6/af_inet6.c:579
  sock_do_ioctl+0x158/0x460 net/socket.c:1222
  sock_ioctl+0x629/0x8e0 net/socket.c:1341
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f940f07cea9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227814">SUSE bug 1227814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40962" ref_url="https://www.suse.com/security/cve/CVE-2024-40962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: allocate dummy checksums for zoned NODATASUM writes

Shin'ichiro reported that when he's running fstests' test-case
btrfs/167 on emulated zoned devices, he's seeing the following NULL
pointer dereference in 'btrfs_zone_finish_endio()':

  Oops: general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]
  CPU: 4 PID: 2332440 Comm: kworker/u80:15 Tainted: G        W          6.10.0-rc2-kts+ #4
  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020
  Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]
  RIP: 0010:btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]

  RSP: 0018:ffff88867f107a90 EFLAGS: 00010206
  RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff893e5534
  RDX: 0000000000000011 RSI: 0000000000000004 RDI: 0000000000000088
  RBP: 0000000000000002 R08: 0000000000000001 R09: ffffed1081696028
  R10: ffff88840b4b0143 R11: ffff88834dfff600 R12: ffff88840b4b0000
  R13: 0000000000020000 R14: 0000000000000000 R15: ffff888530ad5210
  FS:  0000000000000000(0000) GS:ffff888e3f800000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f87223fff38 CR3: 00000007a7c6a002 CR4: 00000000007706f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   ? __die_body.cold+0x19/0x27
   ? die_addr+0x46/0x70
   ? exc_general_protection+0x14f/0x250
   ? asm_exc_general_protection+0x26/0x30
   ? do_raw_read_unlock+0x44/0x70
   ? btrfs_zone_finish_endio.part.0+0x34/0x160 [btrfs]
   btrfs_finish_one_ordered+0x5d9/0x19a0 [btrfs]
   ? __pfx_lock_release+0x10/0x10
   ? do_raw_write_lock+0x90/0x260
   ? __pfx_do_raw_write_lock+0x10/0x10
   ? __pfx_btrfs_finish_one_ordered+0x10/0x10 [btrfs]
   ? _raw_write_unlock+0x23/0x40
   ? btrfs_finish_ordered_zoned+0x5a9/0x850 [btrfs]
   ? lock_acquire+0x435/0x500
   btrfs_work_helper+0x1b1/0xa70 [btrfs]
   ? __schedule+0x10a8/0x60b0
   ? __pfx___might_resched+0x10/0x10
   process_one_work+0x862/0x1410
   ? __pfx_lock_acquire+0x10/0x10
   ? __pfx_process_one_work+0x10/0x10
   ? assign_work+0x16c/0x240
   worker_thread+0x5e6/0x1010
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x2c3/0x3a0
   ? trace_irq_enable.constprop.0+0xce/0x110
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x31/0x70
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

Enabling CONFIG_BTRFS_ASSERT revealed the following assertion to
trigger:

  assertion failed: !list_empty(&amp;ordered-&gt;list), in fs/btrfs/zoned.c:1815

This indicates, that we're missing the checksums list on the
ordered_extent. As btrfs/167 is doing a NOCOW write this is to be
expected.

Further analysis with drgn confirmed the assumption:

  &gt;&gt;&gt; inode = prog.crashed_thread().stack_trace()[11]['ordered'].inode
  &gt;&gt;&gt; btrfs_inode = drgn.container_of(inode, "struct btrfs_inode", \
         				"vfs_inode")
  &gt;&gt;&gt; print(btrfs_inode.flags)
  (u32)1

As zoned emulation mode simulates conventional zones on regular devices,
we cannot use zone-append for writing. But we're only attaching dummy
checksums if we're doing a zone-append write.

So for NOCOW zoned data writes on conventional zones, also attach a
dummy checksum.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40962/">CVE-2024-40962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40962">CVE-2024-40962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227815">SUSE bug 1227815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40963</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40963" ref_url="https://www.suse.com/security/cve/CVE-2024-40963" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mips: bmips: BCM6358: make sure CBR is correctly set

It was discovered that some device have CBR address set to 0 causing
kernel panic when arch_sync_dma_for_cpu_all is called.

This was notice in situation where the system is booted from TP1 and
BMIPS_GET_CBR() returns 0 instead of a valid address and
!!(read_c0_brcm_cmt_local() &amp; (1 &lt;&lt; 31)); not failing.

The current check whether RAC flush should be disabled or not are not
enough hence lets check if CBR is a valid address or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40963/">CVE-2024-40963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40963">CVE-2024-40963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227817">SUSE bug 1227817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40964" ref_url="https://www.suse.com/security/cve/CVE-2024-40964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: cs35l41: Possible null pointer dereference in cs35l41_hda_unbind()

The cs35l41_hda_unbind() function clears the hda_component entry
matching it's index and then dereferences the codec pointer held in the
first element of the hda_component array, this is an issue when the
device index was 0.

Instead use the codec pointer stashed in the cs35l41_hda structure as it
will still be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40964/">CVE-2024-40964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40964">CVE-2024-40964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227818">SUSE bug 1227818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: lpi2c: Avoid calling clk_get_rate during transfer

Instead of repeatedly calling clk_get_rate for each transfer, lock
the clock rate and cache the value.
A deadlock has been observed while adding tlv320aic32x4 audio codec to
the system. When this clock provider adds its clock, the clk mutex is
locked already, it needs to access i2c, which in return needs the mutex
for clk_get_rate as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227885">SUSE bug 1227885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: add the option to have a tty reject a new ldisc

... and use it to limit the virtual terminals to just N_TTY.  They are
kind of special, and in particular, the "con_write()" routine violates
the "writes cannot sleep" rule that some ldiscs rely on.

This avoids the

   BUG: sleeping function called from invalid context at kernel/printk/printk.c:2659

when N_GSM has been attached to a virtual console, and gsmld_write()
calls con_write() while holding a spinlock, and con_write() then tries
to get the console lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227886">SUSE bug 1227886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: imx: Introduce timeout when waiting on transmitter empty

By waiting at most 1 second for USR2_TXDC to be set, we avoid a potential
deadlock.

In case of the timeout, there is not much we can do, so we simply ignore
the transmitter state and optimistically try to continue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227891">SUSE bug 1227891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40968" ref_url="https://www.suse.com/security/cve/CVE-2024-40968" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: Octeon: Add PCIe link status check

The standard PCIe configuration read-write interface is used to
access the configuration space of the peripheral PCIe devices
of the mips processor after the PCIe link surprise down, it can
generate kernel panic caused by "Data bus error". So it is
necessary to add PCIe link status check for system protection.
When the PCIe link is down or in training, assigning a value
of 0 to the configuration address can prevent read-write behavior
to the configuration space of peripheral PCIe devices, thereby
preventing kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40968/">CVE-2024-40968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40968">CVE-2024-40968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227894">SUSE bug 1227894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40969" ref_url="https://www.suse.com/security/cve/CVE-2024-40969" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: don't set RO when shutting down f2fs

Shutdown does not check the error of thaw_super due to readonly, which
causes a deadlock like below.

f2fs_ioc_shutdown(F2FS_GOING_DOWN_FULLSYNC)        issue_discard_thread
 - bdev_freeze
  - freeze_super
 - f2fs_stop_checkpoint()
  - f2fs_handle_critical_error                     - sb_start_write
    - set RO                                         - waiting
 - bdev_thaw
  - thaw_super_locked
    - return -EINVAL, if sb_rdonly()
 - f2fs_stop_discard_thread
  -&gt; wait for kthread_stop(discard_thread);
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40969/">CVE-2024-40969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40969">CVE-2024-40969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227895">SUSE bug 1227895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Avoid hw_desc array overrun in dw-axi-dmac

I have a use case where nr_buffers = 3 and in which each descriptor is composed by 3
segments, resulting in the DMA channel descs_allocated to be 9. Since axi_desc_put()
handles the hw_desc considering the descs_allocated, this scenario would result in a
kernel panic (hw_desc array will be overrun).

To fix this, the proposal is to add a new member to the axi_dma_desc structure,
where we keep the number of allocated hw_descs (axi_desc_alloc()) and use it in
axi_desc_put() to handle the hw_desc array correctly.

Additionally I propose to remove the axi_chan_start_first_queued() call after completing
the transfer, since it was identified that unbalance can occur (started descriptors can
be interrupted and transfer ignored due to DMA channel not being enabled).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227899">SUSE bug 1227899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40971" ref_url="https://www.suse.com/security/cve/CVE-2024-40971" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: remove clear SB_INLINECRYPT flag in default_options

In f2fs_remount, SB_INLINECRYPT flag will be clear and re-set.
If create new file or open file during this gap, these files
will not use inlinecrypt. Worse case, it may lead to data
corruption if wrappedkey_v0 is enable.

Thread A:                               Thread B:

-f2fs_remount				-f2fs_file_open or f2fs_new_inode
  -default_options
	&lt;- clear SB_INLINECRYPT flag

                                          -fscrypt_select_encryption_impl

  -parse_options
	&lt;- set SB_INLINECRYPT again
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40971/">CVE-2024-40971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40971">CVE-2024-40971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227909">SUSE bug 1227909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: do not create EA inode under buffer lock

ext4_xattr_set_entry() creates new EA inodes while holding buffer lock
on the external xattr block. This is problematic as it nests all the
allocation locking (which acquires locks on other buffers) under the
buffer lock. This can even deadlock when the filesystem is corrupted and
e.g. quota file is setup to contain xattr block as data block. Move the
allocation of EA inode out of ext4_xattr_set_entry() into the callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227910">SUSE bug 1227910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mtk-vcodec: potential null pointer deference in SCP

The return value of devm_kzalloc() needs to be checked to avoid
NULL pointer deference. This is similar to CVE-2022-3113.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227890">SUSE bug 1227890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40975" ref_url="https://www.suse.com/security/cve/CVE-2024-40975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: x86-android-tablets: Unregister devices in reverse order

Not all subsystems support a device getting removed while there are
still consumers of the device with a reference to the device.

One example of this is the regulator subsystem. If a regulator gets
unregistered while there are still drivers holding a reference
a WARN() at drivers/regulator/core.c:5829 triggers, e.g.:

 WARNING: CPU: 1 PID: 1587 at drivers/regulator/core.c:5829 regulator_unregister
 Hardware name: Intel Corp. VALLEYVIEW C0 PLATFORM/BYT-T FFD8, BIOS BLADE_21.X64.0005.R00.1504101516 FFD8_X64_R_2015_04_10_1516 04/10/2015
 RIP: 0010:regulator_unregister
 Call Trace:
  &lt;TASK&gt;
  regulator_unregister
  devres_release_group
  i2c_device_remove
  device_release_driver_internal
  bus_remove_device
  device_del
  device_unregister
  x86_android_tablet_remove

On the Lenovo Yoga Tablet 2 series the bq24190 charger chip also provides
a 5V boost converter output for powering USB devices connected to the micro
USB port, the bq24190-charger driver exports this as a Vbus regulator.

On the 830 (8") and 1050 ("10") models this regulator is controlled by
a platform_device and x86_android_tablet_remove() removes platform_device-s
before i2c_clients so the consumer gets removed first.

But on the 1380 (13") model there is a lc824206xa micro-USB switch
connected over I2C and the extcon driver for that controls the regulator.
The bq24190 i2c-client *must* be registered first, because that creates
the regulator with the lc824206xa listed as its consumer. If the regulator
has not been registered yet the lc824206xa driver will end up getting
a dummy regulator.

Since in this case both the regulator provider and consumer are I2C
devices, the only way to ensure that the consumer is unregistered first
is to unregister the I2C devices in reverse order of in which they were
created.

For consistency and to avoid similar problems in the future change
x86_android_tablet_remove() to unregister all device types in reverse
order.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40975/">CVE-2024-40975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40975">CVE-2024-40975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227926">SUSE bug 1227926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/lima: mask irqs in timeout path before hard reset

There is a race condition in which a rendering job might take just long
enough to trigger the drm sched job timeout handler but also still
complete before the hard reset is done by the timeout handler.
This runs into race conditions not expected by the timeout handler.
In some very specific cases it currently may result in a refcount
imbalance on lima_pm_idle, with a stack dump such as:

[10136.669170] WARNING: CPU: 0 PID: 0 at drivers/gpu/drm/lima/lima_devfreq.c:205 lima_devfreq_record_idle+0xa0/0xb0
...
[10136.669459] pc : lima_devfreq_record_idle+0xa0/0xb0
...
[10136.669628] Call trace:
[10136.669634]  lima_devfreq_record_idle+0xa0/0xb0
[10136.669646]  lima_sched_pipe_task_done+0x5c/0xb0
[10136.669656]  lima_gp_irq_handler+0xa8/0x120
[10136.669666]  __handle_irq_event_percpu+0x48/0x160
[10136.669679]  handle_irq_event+0x4c/0xc0

We can prevent that race condition entirely by masking the irqs at the
beginning of the timeout handler, at which point we give up on waiting
for that job entirely.
The irqs will be enabled again at the next hard reset which is already
done as a recovery by the timeout handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227893">SUSE bug 1227893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921s: fix potential hung tasks during chip recovery

During chip recovery (e.g. chip reset), there is a possible situation that
kernel worker reset_work is holding the lock and waiting for kernel thread
stat_worker to be parked, while stat_worker is waiting for the release of
the same lock.
It causes a deadlock resulting in the dumping of hung tasks messages and
possible rebooting of the device.

This patch prevents the execution of stat_worker during the chip recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227950">SUSE bug 1227950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix crash while reading debugfs attribute

The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly
on a __user pointer, which results into the crash.

To fix this issue, use a small local stack buffer for sprintf() and then
call simple_read_from_buffer(), which in turns make the copy_to_user()
call.

BUG: unable to handle page fault for address: 00007f4801111000
PGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0
Oops: 0002 [#1] PREEMPT SMP PTI
Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023
RIP: 0010:memcpy_orig+0xcd/0x130
RSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202
RAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f
RDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000
RBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572
R10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff
R13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af
FS:  00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1a/0x60
 ? page_fault_oops+0x183/0x510
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x22/0x30
 ? memcpy_orig+0xcd/0x130
 vsnprintf+0x102/0x4c0
 sprintf+0x51/0x80
 qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]
 full_proxy_read+0x50/0x80
 vfs_read+0xa5/0x2e0
 ? folio_add_new_anon_rmap+0x44/0xa0
 ? set_pte_at+0x15/0x30
 ? do_pte_missing+0x426/0x7f0
 ksys_read+0xa5/0xe0
 do_syscall_64+0x58/0x80
 ? __count_memcg_events+0x46/0x90
 ? count_memcg_event_mm+0x3d/0x60
 ? handle_mm_fault+0x196/0x2f0
 ? do_user_addr_fault+0x267/0x890
 ? exc_page_fault+0x69/0x150
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f4800f20b4d
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227929">SUSE bug 1227929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40979" ref_url="https://www.suse.com/security/cve/CVE-2024-40979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix kernel crash during resume

Currently during resume, QMI target memory is not properly handled, resulting
in kernel crash in case DMA remap is not supported:

BUG: Bad page state in process kworker/u16:54  pfn:36e80
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x36e80
page dumped because: nonzero _refcount
Call Trace:
 bad_page
 free_page_is_bad_report
 __free_pages_ok
 __free_pages
 dma_direct_free
 dma_free_attrs
 ath12k_qmi_free_target_mem_chunk
 ath12k_qmi_msg_mem_request_cb

The reason is:
Once ath12k module is loaded, firmware sends memory request to host. In case
DMA remap not supported, ath12k refuses the first request due to failure in
allocating with large segment size:

ath12k_pci 0000:04:00.0: qmi firmware request memory request
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 7077888
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 8454144
ath12k_pci 0000:04:00.0: qmi dma allocation failed (7077888 B type 1), will try later with small size
ath12k_pci 0000:04:00.0: qmi delays mem_request 2
ath12k_pci 0000:04:00.0: qmi firmware request memory request

Later firmware comes back with more but small segments and allocation
succeeds:

ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 262144
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 524288
ath12k_pci 0000:04:00.0: qmi mem seg type 4 size 65536
ath12k_pci 0000:04:00.0: qmi mem seg type 1 size 524288

Now ath12k is working. If suspend is triggered, firmware will be reloaded
during resume. As same as before, firmware requests two large segments at
first. In ath12k_qmi_msg_mem_request_cb() segment count and size are
assigned:

	ab-&gt;qmi.mem_seg_count == 2
	ab-&gt;qmi.target_mem[0].size == 7077888
	ab-&gt;qmi.target_mem[1].size == 8454144

Then allocation failed like before and ath12k_qmi_free_target_mem_chunk()
is called to free all allocated segments. Note the first segment is skipped
because its v.addr is cleared due to allocation failure:

	chunk-&gt;v.addr = dma_alloc_coherent()

Also note that this leaks that segment because it has not been freed.

While freeing the second segment, a size of 8454144 is passed to
dma_free_coherent(). However remember that this segment is allocated at
the first time firmware is loaded, before suspend. So its real size is
524288, much smaller than 8454144. As a result kernel found we are freeing
some memory which is in use and thus cras
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40979/">CVE-2024-40979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40979">CVE-2024-40979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227855">SUSE bug 1227855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40980" ref_url="https://www.suse.com/security/cve/CVE-2024-40980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drop_monitor: replace spin_lock by raw_spin_lock

trace_drop_common() is called with preemption disabled, and it acquires
a spin_lock. This is problematic for RT kernels because spin_locks are
sleeping locks in this configuration, which causes the following splat:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 449, name: rcuc/47
preempt_count: 1, expected: 0
RCU nest depth: 2, expected: 2
5 locks held by rcuc/47/449:
 #0: ff1100086ec30a60 ((softirq_ctrl.lock)){+.+.}-{2:2}, at: __local_bh_disable_ip+0x105/0x210
 #1: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: rt_spin_lock+0xbf/0x130
 #2: ffffffffb394a280 (rcu_read_lock){....}-{1:2}, at: __local_bh_disable_ip+0x11c/0x210
 #3: ffffffffb394a160 (rcu_callback){....}-{0:0}, at: rcu_do_batch+0x360/0xc70
 #4: ff1100086ee07520 (&amp;data-&gt;lock){+.+.}-{2:2}, at: trace_drop_common.constprop.0+0xb5/0x290
irq event stamp: 139909
hardirqs last  enabled at (139908): [&lt;ffffffffb1df2b33&gt;] _raw_spin_unlock_irqrestore+0x63/0x80
hardirqs last disabled at (139909): [&lt;ffffffffb19bd03d&gt;] trace_drop_common.constprop.0+0x26d/0x290
softirqs last  enabled at (139892): [&lt;ffffffffb07a1083&gt;] __local_bh_enable_ip+0x103/0x170
softirqs last disabled at (139898): [&lt;ffffffffb0909b33&gt;] rcu_cpu_kthread+0x93/0x1f0
Preemption disabled at:
[&lt;ffffffffb1de786b&gt;] rt_mutex_slowunlock+0xab/0x2e0
CPU: 47 PID: 449 Comm: rcuc/47 Not tainted 6.9.0-rc2-rt1+ #7
Hardware name: Dell Inc. PowerEdge R650/0Y2G81, BIOS 1.6.5 04/15/2022
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x8c/0xd0
 dump_stack+0x14/0x20
 __might_resched+0x21e/0x2f0
 rt_spin_lock+0x5e/0x130
 ? trace_drop_common.constprop.0+0xb5/0x290
 ? skb_queue_purge_reason.part.0+0x1bf/0x230
 trace_drop_common.constprop.0+0xb5/0x290
 ? preempt_count_sub+0x1c/0xd0
 ? _raw_spin_unlock_irqrestore+0x4a/0x80
 ? __pfx_trace_drop_common.constprop.0+0x10/0x10
 ? rt_mutex_slowunlock+0x26a/0x2e0
 ? skb_queue_purge_reason.part.0+0x1bf/0x230
 ? __pfx_rt_mutex_slowunlock+0x10/0x10
 ? skb_queue_purge_reason.part.0+0x1bf/0x230
 trace_kfree_skb_hit+0x15/0x20
 trace_kfree_skb+0xe9/0x150
 kfree_skb_reason+0x7b/0x110
 skb_queue_purge_reason.part.0+0x1bf/0x230
 ? __pfx_skb_queue_purge_reason.part.0+0x10/0x10
 ? mark_lock.part.0+0x8a/0x520
...

trace_drop_common() also disables interrupts, but this is a minor issue
because we could easily replace it with a local_lock.

Replace the spin_lock with raw_spin_lock to avoid sleeping in atomic
context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40980/">CVE-2024-40980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227937">SUSE bug 1227937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

batman-adv: bypass empty buckets in batadv_purge_orig_ref()

Many syzbot reports are pointing to soft lockups in
batadv_purge_orig_ref() [1]

Root cause is unknown, but we can avoid spending too much
time there and perhaps get more interesting reports.

[1]

watchdog: BUG: soft lockup - CPU#0 stuck for 27s! [kworker/u4:6:621]
Modules linked in:
irq event stamp: 6182794
 hardirqs last  enabled at (6182793): [&lt;ffff8000801dae10&gt;] __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386
 hardirqs last disabled at (6182794): [&lt;ffff80008ad66a78&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
 hardirqs last disabled at (6182794): [&lt;ffff80008ad66a78&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
 softirqs last  enabled at (6182792): [&lt;ffff80008aab71c4&gt;] spin_unlock_bh include/linux/spinlock.h:396 [inline]
 softirqs last  enabled at (6182792): [&lt;ffff80008aab71c4&gt;] batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287
 softirqs last disabled at (6182790): [&lt;ffff80008aab61dc&gt;] spin_lock_bh include/linux/spinlock.h:356 [inline]
 softirqs last disabled at (6182790): [&lt;ffff80008aab61dc&gt;] batadv_purge_orig_ref+0x164/0x1228 net/batman-adv/originator.c:1271
CPU: 0 PID: 621 Comm: kworker/u4:6 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: bat_events batadv_purge_orig
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : should_resched arch/arm64/include/asm/preempt.h:79 [inline]
 pc : __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:388
 lr : __local_bh_enable_ip+0x224/0x44c kernel/softirq.c:386
sp : ffff800099007970
x29: ffff800099007980 x28: 1fffe00018fce1bd x27: dfff800000000000
x26: ffff0000d2620008 x25: ffff0000c7e70de8 x24: 0000000000000001
x23: 1fffe00018e57781 x22: dfff800000000000 x21: ffff80008aab71c4
x20: ffff0001b40136c0 x19: ffff0000c72bbc08 x18: 1fffe0001a817bb0
x17: ffff800125414000 x16: ffff80008032116c x15: 0000000000000001
x14: 1fffe0001ee9d610 x13: 0000000000000000 x12: 0000000000000003
x11: 0000000000000000 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 00000000005e5789 x7 : ffff80008aab61dc x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000006 x1 : 0000000000000080 x0 : ffff800125414000
Call trace:
  __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline]
  arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline]
  __local_bh_enable_ip+0x228/0x44c kernel/softirq.c:386
  __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
  _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:210
  spin_unlock_bh include/linux/spinlock.h:396 [inline]
  batadv_purge_orig_ref+0x114c/0x1228 net/batman-adv/originator.c:1287
  batadv_purge_orig+0x20/0x70 net/batman-adv/originator.c:1300
  process_one_work+0x694/0x1204 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x938/0xef4 kernel/workqueue.c:2787
  kthread+0x288/0x310 kernel/kthread.c:388
  ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.8.0-rc7-syzkaller-g707081b61156 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : arch_local_irq_enable+0x8/0xc arch/arm64/include/asm/irqflags.h:51
 lr : default_idle_call+0xf8/0x128 kernel/sched/idle.c:103
sp : ffff800093a17d30
x29: ffff800093a17d30 x28: dfff800000000000 x27: 1ffff00012742fb4
x26: ffff80008ec9d000 x25: 0000000000000000 x24: 0000000000000002
x23: 1ffff00011d93a74 x22: ffff80008ec9d3a0 x21: 0000000000000000
x20: ffff0000c19dbc00 x19: ffff8000802d0fd8 x18: 1fffe00036804396
x17: ffff80008ec9d000 x16: ffff8000802d089c x15: 0000000000000001
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227864">SUSE bug 1227864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ssb: Fix potential NULL pointer dereference in ssb_device_uevent()

The ssb_device_uevent() function first attempts to convert the 'dev' pointer
to 'struct ssb_device *'. However, it mistakenly dereferences 'dev' before
performing the NULL check, potentially leading to a NULL pointer
dereference if 'dev' is NULL.

To fix this issue, move the NULL check before dereferencing the 'dev' pointer,
ensuring that the pointer is valid before attempting to use it.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227865">SUSE bug 1227865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: force a dst refcount before doing decryption

As it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before
entering the xfrm type handlers"):

"Crypto requests might return asynchronous. In this case we leave the
 rcu protected region, so force a refcount on the skb's destination
 entry before we enter the xfrm type input/output handlers."

On TIPC decryption path it has the same problem, and skb_dst_force()
should be called before doing decryption to avoid a possible crash.

Shuang reported this issue when this warning is triggered:

  [] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc]
  [] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug
  [] Workqueue: crypto cryptd_queue_worker
  [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc]
  [] Call Trace:
  [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc]
  [] tipc_rcv+0xcf5/0x1060 [tipc]
  [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc]
  [] cryptd_aead_crypt+0xdb/0x190
  [] cryptd_queue_worker+0xed/0x190
  [] process_one_work+0x93d/0x17e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227819">SUSE bug 1227819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."

Undo the modifications made in commit d410ee5109a1 ("ACPICA: avoid
"Info: mapping multiple BARs. Your kernel is fine.""). The initial
purpose of this commit was to stop memory mappings for operation
regions from overlapping page boundaries, as it can trigger warnings
if different page attributes are present.

However, it was found that when this situation arises, mapping
continues until the boundary's end, but there is still an attempt to
read/write the entire length of the map, leading to a NULL pointer
deference. For example, if a four-byte mapping request is made but
only one byte is mapped because it hits the current page boundary's
end, a four-byte read/write attempt is still made, resulting in a NULL
pointer deference.

Instead, map the entire length, as the ACPI specification does not
mandate that it must be within the same page boundary. It is
permissible for it to be mapped across different regions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227820">SUSE bug 1227820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40985" ref_url="https://www.suse.com/security/cve/CVE-2024-40985" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tcp_ao: Don't leak ao_info on error-path

It seems I introduced it together with TCP_AO_CMDF_AO_REQUIRED, on
version 5 [1] of TCP-AO patches. Quite frustrative that having all these
selftests that I've written, running kmemtest &amp; kcov was always in todo.

[1]: https://lore.kernel.org/netdev/20230215183335.800122-5-dima@arista.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40985/">CVE-2024-40985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40985">CVE-2024-40985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227821">SUSE bug 1227821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40986" ref_url="https://www.suse.com/security/cve/CVE-2024-40986" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: xilinx: xdma: Fix data synchronisation in xdma_channel_isr()

Requests the vchan lock before using xdma-&gt;stop_request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40986/">CVE-2024-40986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40986">CVE-2024-40986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227822">SUSE bug 1227822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix UBSAN warning in kv_dpm.c

Adds bounds check for sumo_vid_mapping_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228235">SUSE bug 1228235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix UBSAN warning in kv_dpm.c

Adds bounds check for sumo_vid_mapping_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227957">SUSE bug 1227957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Disassociate vcpus from redistributor region on teardown

When tearing down a redistributor region, make sure we don't have
any dangling pointer to that region stored in a vcpu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228589">SUSE bug 1228589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Add check for srq max_sge attribute

max_sge attribute is passed by the user, and is inserted and used
unchecked, so verify that the value doesn't exceed maximum allowed value
before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227824">SUSE bug 1227824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40991" ref_url="https://www.suse.com/security/cve/CVE-2024-40991" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: k3-udma-glue: Fix of_k3_udma_glue_parse_chn_by_id()

The of_k3_udma_glue_parse_chn_by_id() helper function erroneously
invokes "of_node_put()" on the "udmax_np" device-node passed to it,
without having incremented its reference count at any point. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40991/">CVE-2024-40991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40991">CVE-2024-40991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227825">SUSE bug 1227825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40992" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40992" ref_url="https://www.suse.com/security/cve/CVE-2024-40992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix responder length checking for UD request packets

According to the IBA specification:
If a UD request packet is detected with an invalid length, the request
shall be an invalid request and it shall be silently dropped by
the responder. The responder then waits for a new request packet.

commit 689c5421bfe0 ("RDMA/rxe: Fix incorrect responder length checking")
defers responder length check for UD QPs in function `copy_data`.
But it introduces a regression issue for UD QPs.

When the packet size is too large to fit in the receive buffer.
`copy_data` will return error code -EINVAL. Then `send_data_in`
will return RESPST_ERR_MALFORMED_WQE. UD QP will transfer into
ERROR state.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40992/">CVE-2024-40992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40992">CVE-2024-40992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227826">SUSE bug 1227826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40993" ref_url="https://www.suse.com/security/cve/CVE-2024-40993" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Fix suspicious rcu_dereference_protected()

When destroying all sets, we are either in pernet exit phase or
are executing a "destroy all sets command" from userspace. The latter
was taken into account in ip_set_dereference() (nfnetlink mutex is held),
but the former was not. The patch adds the required check to
rcu_dereference_protected() in ip_set_dereference().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40993/">CVE-2024-40993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40993">CVE-2024-40993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227795">SUSE bug 1227795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: fix integer overflow in max_vclocks_store

On 32bit systems, the "4 * max" multiply can overflow.  Use kcalloc()
to do the allocation to prevent this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228587">SUSE bug 1228587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40995</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()

syzbot found hanging tasks waiting on rtnl_lock [1]

A reproducer is available in the syzbot bug.

When a request to add multiple actions with the same index is sent, the
second request will block forever on the first request. This holds
rtnl_lock, and causes tasks to hang.

Return -EAGAIN to prevent infinite looping, while keeping documented
behavior.

[1]

INFO: task kworker/1:0:5088 blocked for more than 143 seconds.
Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
&lt;TASK&gt;
context_switch kernel/sched/core.c:5409 [inline]
__schedule+0xf15/0x5d00 kernel/sched/core.c:6746
__schedule_loop kernel/sched/core.c:6823 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6838
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
wiphy_lock include/net/cfg80211.h:5953 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227830">SUSE bug 1227830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40996" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40996" ref_url="https://www.suse.com/security/cve/CVE-2024-40996" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Avoid splat in pskb_pull_reason

syzkaller builds (CONFIG_DEBUG_NET=y) frequently trigger a debug
hint in pskb_may_pull.

We'd like to retain this debug check because it might hint at integer
overflows and other issues (kernel code should pull headers, not huge
value).

In bpf case, this splat isn't interesting at all: such (nonsensical)
bpf programs are typically generated by a fuzzer anyway.

Do what Eric suggested and suppress such warning.

For CONFIG_DEBUG_NET=n we don't need the extra check because
pskb_may_pull will do the right thing: return an error without the
WARN() backtrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-23"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40996/">CVE-2024-40996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40996">CVE-2024-40996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227831">SUSE bug 1227831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: fix memory leak on CPU EPP exit

The cpudata memory from kzalloc() in amd_pstate_epp_cpu_init() is
not freed in the analogous exit function, so fix that.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227853">SUSE bug 1227853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super()

In the following concurrency we will access the uninitialized rs-&gt;lock:

ext4_fill_super
  ext4_register_sysfs
   // sysfs registered msg_ratelimit_interval_ms
                             // Other processes modify rs-&gt;interval to
                             // non-zero via msg_ratelimit_interval_ms
  ext4_orphan_cleanup
    ext4_msg(sb, KERN_INFO, "Errors on filesystem, "
      __ext4_msg
        ___ratelimit(&amp;(EXT4_SB(sb)-&gt;s_msg_ratelimit_state)
          if (!rs-&gt;interval)  // do nothing if interval is 0
            return 1;
          raw_spin_trylock_irqsave(&amp;rs-&gt;lock, flags)
            raw_spin_trylock(lock)
              _raw_spin_trylock
                __raw_spin_trylock
                  spin_acquire(&amp;lock-&gt;dep_map, 0, 1, _RET_IP_)
                    lock_acquire
                      __lock_acquire
                        register_lock_class
                          assign_lock_key
                            dump_stack();
  ratelimit_state_init(&amp;sbi-&gt;s_msg_ratelimit_state, 5 * HZ, 10);
    raw_spin_lock_init(&amp;rs-&gt;lock);
    // init rs-&gt;lock here

and get the following dump_stack:

=========================================================
INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504
[...]
Call Trace:
 dump_stack_lvl+0xc5/0x170
 dump_stack+0x18/0x30
 register_lock_class+0x740/0x7c0
 __lock_acquire+0x69/0x13a0
 lock_acquire+0x120/0x450
 _raw_spin_trylock+0x98/0xd0
 ___ratelimit+0xf6/0x220
 __ext4_msg+0x7f/0x160 [ext4]
 ext4_orphan_cleanup+0x665/0x740 [ext4]
 __ext4_fill_super+0x21ea/0x2b10 [ext4]
 ext4_fill_super+0x14d/0x360 [ext4]
[...]
=========================================================

Normally interval is 0 until s_msg_ratelimit_state is initialized, so
___ratelimit() does nothing. But registering sysfs precedes initializing
rs-&gt;lock, so it is possible to change rs-&gt;interval to a non-zero value
via the msg_ratelimit_interval_ms interface of sysfs while rs-&gt;lock is
uninitialized, and then a call to ext4_msg triggers the problem by
accessing an uninitialized rs-&gt;lock. Therefore register sysfs after all
initializations are complete to avoid such problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227866">SUSE bug 1227866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ena: Add validation for completion descriptors consistency

Validate that `first` flag is set only for the first
descriptor in multi-buffer packets.
In case of an invalid descriptor, a reset will occur.
A new reset reason for RX data corruption has been added.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-08-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227913">SUSE bug 1227913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block/ioctl: prefer different overflow check

Running syzkaller with the newly reintroduced signed integer overflow
sanitizer shows this report:

[   62.982337] ------------[ cut here ]------------
[   62.985692] cgroup: Invalid name
[   62.986211] UBSAN: signed-integer-overflow in ../block/ioctl.c:36:46
[   62.989370] 9pnet_fd: p9_fd_create_tcp (7343): problem connecting socket to 127.0.0.1
[   62.992992] 9223372036854775807 + 4095 cannot be represented in type 'long long'
[   62.997827] 9pnet_fd: p9_fd_create_tcp (7345): problem connecting socket to 127.0.0.1
[   62.999369] random: crng reseeded on system resumption
[   63.000634] GUP no longer grows the stack in syz-executor.2 (7353): 20002000-20003000 (20001000)
[   63.000668] CPU: 0 PID: 7353 Comm: syz-executor.2 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1
[   63.000677] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   63.000682] Call Trace:
[   63.000686]  &lt;TASK&gt;
[   63.000731]  dump_stack_lvl+0x93/0xd0
[   63.000919]  __get_user_pages+0x903/0xd30
[   63.001030]  __gup_longterm_locked+0x153e/0x1ba0
[   63.001041]  ? _raw_read_unlock_irqrestore+0x17/0x50
[   63.001072]  ? try_get_folio+0x29c/0x2d0
[   63.001083]  internal_get_user_pages_fast+0x1119/0x1530
[   63.001109]  iov_iter_extract_pages+0x23b/0x580
[   63.001206]  bio_iov_iter_get_pages+0x4de/0x1220
[   63.001235]  iomap_dio_bio_iter+0x9b6/0x1410
[   63.001297]  __iomap_dio_rw+0xab4/0x1810
[   63.001316]  iomap_dio_rw+0x45/0xa0
[   63.001328]  ext4_file_write_iter+0xdde/0x1390
[   63.001372]  vfs_write+0x599/0xbd0
[   63.001394]  ksys_write+0xc8/0x190
[   63.001403]  do_syscall_64+0xd4/0x1b0
[   63.001421]  ? arch_exit_to_user_mode_prepare+0x3a/0x60
[   63.001479]  entry_SYSCALL_64_after_hwframe+0x6f/0x77
[   63.001535] RIP: 0033:0x7f7fd3ebf539
[   63.001551] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   63.001562] RSP: 002b:00007f7fd32570c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   63.001584] RAX: ffffffffffffffda RBX: 00007f7fd3ff3f80 RCX: 00007f7fd3ebf539
[   63.001590] RDX: 4db6d1e4f7e43360 RSI: 0000000020000000 RDI: 0000000000000004
[   63.001595] RBP: 00007f7fd3f1e496 R08: 0000000000000000 R09: 0000000000000000
[   63.001599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   63.001604] R13: 0000000000000006 R14: 00007f7fd3ff3f80 R15: 00007ffd415ad2b8
...
[   63.018142] ---[ end trace ]---

Historically, the signed integer overflow sanitizer did not work in the
kernel due to its interaction with `-fwrapv` but this has since been
changed [1] in the newest version of Clang; It was re-enabled in the
kernel with Commit 557f8c582a9ba8ab ("ubsan: Reintroduce signed overflow
sanitizer").

Let's rework this overflow checking logic to not actually perform an
overflow during the check itself, thus avoiding the UBSAN splat.

[1]: https://github.com/llvm/llvm-project/pull/82432
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227867">SUSE bug 1227867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41001" ref_url="https://www.suse.com/security/cve/CVE-2024-41001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/sqpoll: work around a potential audit memory leak

kmemleak complains that there's a memory leak related to connect
handling:

unreferenced object 0xffff0001093bdf00 (size 128):
comm "iou-sqp-455", pid 457, jiffies 4294894164
hex dump (first 32 bytes):
02 00 fa ea 7f 00 00 01 00 00 00 00 00 00 00 00  ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
backtrace (crc 2e481b1a):
[&lt;00000000c0a26af4&gt;] kmemleak_alloc+0x30/0x38
[&lt;000000009c30bb45&gt;] kmalloc_trace+0x228/0x358
[&lt;000000009da9d39f&gt;] __audit_sockaddr+0xd0/0x138
[&lt;0000000089a93e34&gt;] move_addr_to_kernel+0x1a0/0x1f8
[&lt;000000000b4e80e6&gt;] io_connect_prep+0x1ec/0x2d4
[&lt;00000000abfbcd99&gt;] io_submit_sqes+0x588/0x1e48
[&lt;00000000e7c25e07&gt;] io_sq_thread+0x8a4/0x10e4
[&lt;00000000d999b491&gt;] ret_from_fork+0x10/0x20

which can can happen if:

1) The command type does something on the prep side that triggers an
   audit call.
2) The thread hasn't done any operations before this that triggered
   an audit call inside -&gt;issue(), where we have audit_uring_entry()
   and audit_uring_exit().

Work around this by issuing a blanket NOP operation before the SQPOLL
does anything.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41001/">CVE-2024-41001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41001">CVE-2024-41001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227869">SUSE bug 1227869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/sec - Fix memory leak for sec resource release

The AIV is one of the SEC resources. When releasing resources,
it need to release the AIV resources at the same time.
Otherwise, memory leakage occurs.

The aiv resource release is added to the sec resource release
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227870">SUSE bug 1227870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41003" ref_url="https://www.suse.com/security/cve/CVE-2024-41003" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix reg_set_min_max corruption of fake_reg

Juan reported that after doing some changes to buzzer [0] and implementing
a new fuzzing strategy guided by coverage, they noticed the following in
one of the probes:

  [...]
  13: (79) r6 = *(u64 *)(r0 +0)         ; R0=map_value(ks=4,vs=8) R6_w=scalar()
  14: (b7) r0 = 0                       ; R0_w=0
  15: (b4) w0 = -1                      ; R0_w=0xffffffff
  16: (74) w0 &gt;&gt;= 1                     ; R0_w=0x7fffffff
  17: (5c) w6 &amp;= w0                     ; R0_w=0x7fffffff R6_w=scalar(smin=smin32=0,smax=umax=umax32=0x7fffffff,var_off=(0x0; 0x7fffffff))
  18: (44) w6 |= 2                      ; R6_w=scalar(smin=umin=smin32=umin32=2,smax=umax=umax32=0x7fffffff,var_off=(0x2; 0x7ffffffd))
  19: (56) if w6 != 0x7ffffffd goto pc+1
  REG INVARIANTS VIOLATION (true_reg2): range bounds violation u64=[0x7fffffff, 0x7ffffffd] s64=[0x7fffffff, 0x7ffffffd] u32=[0x7fffffff, 0x7ffffffd] s32=[0x7fffffff, 0x7ffffffd] var_off=(0x7fffffff, 0x0)
  REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0x7fffffff, 0x7ffffffd] s64=[0x7fffffff, 0x7ffffffd] u32=[0x7fffffff, 0x7ffffffd] s32=[0x7fffffff, 0x7ffffffd] var_off=(0x7fffffff, 0x0)
  REG INVARIANTS VIOLATION (false_reg2): const tnum out of sync with range bounds u64=[0x0, 0xffffffffffffffff] s64=[0x8000000000000000, 0x7fffffffffffffff] u32=[0x0, 0xffffffff] s32=[0x80000000, 0x7fffffff] var_off=(0x7fffffff, 0x0)
  19: R6_w=0x7fffffff
  20: (95) exit

  from 19 to 21: R0=0x7fffffff R6=scalar(smin=umin=smin32=umin32=2,smax=umax=smax32=umax32=0x7ffffffe,var_off=(0x2; 0x7ffffffd)) R7=map_ptr(ks=4,vs=8) R9=ctx() R10=fp0 fp-24=map_ptr(ks=4,vs=8) fp-40=mmmmmmmm
  21: R0=0x7fffffff R6=scalar(smin=umin=smin32=umin32=2,smax=umax=smax32=umax32=0x7ffffffe,var_off=(0x2; 0x7ffffffd)) R7=map_ptr(ks=4,vs=8) R9=ctx() R10=fp0 fp-24=map_ptr(ks=4,vs=8) fp-40=mmmmmmmm
  21: (14) w6 -= 2147483632             ; R6_w=scalar(smin=umin=umin32=2,smax=umax=0xffffffff,smin32=0x80000012,smax32=14,var_off=(0x2; 0xfffffffd))
  22: (76) if w6 s&gt;= 0xe goto pc+1      ; R6_w=scalar(smin=umin=umin32=2,smax=umax=0xffffffff,smin32=0x80000012,smax32=13,var_off=(0x2; 0xfffffffd))
  23: (95) exit

  from 22 to 24: R0=0x7fffffff R6_w=14 R7=map_ptr(ks=4,vs=8) R9=ctx() R10=fp0 fp-24=map_ptr(ks=4,vs=8) fp-40=mmmmmmmm
  24: R0=0x7fffffff R6_w=14 R7=map_ptr(ks=4,vs=8) R9=ctx() R10=fp0 fp-24=map_ptr(ks=4,vs=8) fp-40=mmmmmmmm
  24: (14) w6 -= 14                     ; R6_w=0
  [...]

What can be seen here is a register invariant violation on line 19. After
the binary-or in line 18, the verifier knows that bit 2 is set but knows
nothing about the rest of the content which was loaded from a map value,
meaning, range is [2,0x7fffffff] with var_off=(0x2; 0x7ffffffd). When in
line 19 the verifier analyzes the branch, it splits the register states
in reg_set_min_max() into the registers of the true branch (true_reg1,
true_reg2) and the registers of the false branch (false_reg1, false_reg2).

Since the test is w6 != 0x7ffffffd, the src_reg is a known constant.
Internally, the verifier creates a "fake" register initialized as scalar
to the value of 0x7ffffffd, and then passes it onto reg_set_min_max(). Now,
for line 19, it is mathematically impossible to take the false branch of
this program, yet the verifier analyzes it. It is impossible because the
second bit of r6 will be set due to the prior or operation and the
constant in the condition has that bit unset (hex(fd) == binary(1111 1101).

When the verifier first analyzes the false / fall-through branch, it will
compute an intersection between the var_off of r6 and of the constant. This
is because the verifier creates a "fake" register initialized to the value
of the constant. The intersection result later refines both registers in
regs_refine_cond_op():

  [...]
  t = tnum_intersect(tnum_subreg(reg1-&gt;var_off), tnum_subreg(reg2-&gt;var_off));
  reg1-&gt;var_o
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41003/">CVE-2024-41003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41003">CVE-2024-41003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227850">SUSE bug 1227850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Build event generation tests only as modules

The kprobes and synth event generation test modules add events and lock
(get a reference) those event file reference in module init function,
and unlock and delete it in module exit function. This is because those
are designed for playing as modules.

If we make those modules as built-in, those events are left locked in the
kernel, and never be removed. This causes kprobe event self-test failure
as below.

[   97.349708] ------------[ cut here ]------------
[   97.353453] WARNING: CPU: 3 PID: 1 at kernel/trace/trace_kprobe.c:2133 kprobe_trace_self_tests_init+0x3f1/0x480
[   97.357106] Modules linked in:
[   97.358488] CPU: 3 PID: 1 Comm: swapper/0 Not tainted 6.9.0-g699646734ab5-dirty #14
[   97.361556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
[   97.363880] RIP: 0010:kprobe_trace_self_tests_init+0x3f1/0x480
[   97.365538] Code: a8 24 08 82 e9 ae fd ff ff 90 0f 0b 90 48 c7 c7 e5 aa 0b 82 e9 ee fc ff ff 90 0f 0b 90 48 c7 c7 2d 61 06 82 e9 8e fd ff ff 90 &lt;0f&gt; 0b 90 48 c7 c7 33 0b 0c 82 89 c6 e8 6e 03 1f ff 41 ff c7 e9 90
[   97.370429] RSP: 0000:ffffc90000013b50 EFLAGS: 00010286
[   97.371852] RAX: 00000000fffffff0 RBX: ffff888005919c00 RCX: 0000000000000000
[   97.373829] RDX: ffff888003f40000 RSI: ffffffff8236a598 RDI: ffff888003f40a68
[   97.375715] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
[   97.377675] R10: ffffffff811c9ae5 R11: ffffffff8120c4e0 R12: 0000000000000000
[   97.379591] R13: 0000000000000001 R14: 0000000000000015 R15: 0000000000000000
[   97.381536] FS:  0000000000000000(0000) GS:ffff88807dcc0000(0000) knlGS:0000000000000000
[   97.383813] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   97.385449] CR2: 0000000000000000 CR3: 0000000002244000 CR4: 00000000000006b0
[   97.387347] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   97.389277] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   97.391196] Call Trace:
[   97.391967]  &lt;TASK&gt;
[   97.392647]  ? __warn+0xcc/0x180
[   97.393640]  ? kprobe_trace_self_tests_init+0x3f1/0x480
[   97.395181]  ? report_bug+0xbd/0x150
[   97.396234]  ? handle_bug+0x3e/0x60
[   97.397311]  ? exc_invalid_op+0x1a/0x50
[   97.398434]  ? asm_exc_invalid_op+0x1a/0x20
[   97.399652]  ? trace_kprobe_is_busy+0x20/0x20
[   97.400904]  ? tracing_reset_all_online_cpus+0x15/0x90
[   97.402304]  ? kprobe_trace_self_tests_init+0x3f1/0x480
[   97.403773]  ? init_kprobe_trace+0x50/0x50
[   97.404972]  do_one_initcall+0x112/0x240
[   97.406113]  do_initcall_level+0x95/0xb0
[   97.407286]  ? kernel_init+0x1a/0x1a0
[   97.408401]  do_initcalls+0x3f/0x70
[   97.409452]  kernel_init_freeable+0x16f/0x1e0
[   97.410662]  ? rest_init+0x1f0/0x1f0
[   97.411738]  kernel_init+0x1a/0x1a0
[   97.412788]  ret_from_fork+0x39/0x50
[   97.413817]  ? rest_init+0x1f0/0x1f0
[   97.414844]  ret_from_fork_asm+0x11/0x20
[   97.416285]  &lt;/TASK&gt;
[   97.417134] irq event stamp: 13437323
[   97.418376] hardirqs last  enabled at (13437337): [&lt;ffffffff8110bc0c&gt;] console_unlock+0x11c/0x150
[   97.421285] hardirqs last disabled at (13437370): [&lt;ffffffff8110bbf1&gt;] console_unlock+0x101/0x150
[   97.423838] softirqs last  enabled at (13437366): [&lt;ffffffff8108e17f&gt;] handle_softirqs+0x23f/0x2a0
[   97.426450] softirqs last disabled at (13437393): [&lt;ffffffff8108e346&gt;] __irq_exit_rcu+0x66/0xd0
[   97.428850] ---[ end trace 0000000000000000 ]---

And also, since we can not cleanup dynamic_event file, ftracetest are
failed too.

To avoid these issues, build these tests only as modules.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227851">SUSE bug 1227851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netrom: Fix a memory leak in nr_heartbeat_expiry()

syzbot reported a memory leak in nr_create() [0].

Commit 409db27e3a2e ("netrom: Fix use-after-free of a listening socket.")
added sock_hold() to the nr_heartbeat_expiry() function, where
a) a socket has a SOCK_DESTROY flag or
b) a listening socket has a SOCK_DEAD flag.

But in the case "a," when the SOCK_DESTROY flag is set, the file descriptor
has already been closed and the nr_release() function has been called.
So it makes no sense to hold the reference count because no one will
call another nr_destroy_socket() and put it as in the case "b."

nr_connect
  nr_establish_data_link
    nr_start_heartbeat

nr_release
  switch (nr-&gt;state)
  case NR_STATE_3
    nr-&gt;state = NR_STATE_2
    sock_set_flag(sk, SOCK_DESTROY);

                        nr_rx_frame
                          nr_process_rx_frame
                            switch (nr-&gt;state)
                            case NR_STATE_2
                              nr_state2_machine()
                                nr_disconnect()
                                  nr_sk(sk)-&gt;state = NR_STATE_0
                                  sock_set_flag(sk, SOCK_DEAD)

                        nr_heartbeat_expiry
                          switch (nr-&gt;state)
                          case NR_STATE_0
                            if (sock_flag(sk, SOCK_DESTROY) ||
                               (sk-&gt;sk_state == TCP_LISTEN
                                 &amp;&amp; sock_flag(sk, SOCK_DEAD)))
                               sock_hold()  // ( !!! )
                               nr_destroy_socket()

To fix the memory leak, let's call sock_hold() only for a listening socket.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller.

[0]: https://syzkaller.appspot.com/bug?extid=d327a1f3b12e1e206c16
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227862">SUSE bug 1227862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: avoid too many retransmit packets

If a TCP socket is using TCP_USER_TIMEOUT, and the other peer
retracted its window to zero, tcp_retransmit_timer() can
retransmit a packet every two jiffies (2 ms for HZ=1000),
for about 4 minutes after TCP_USER_TIMEOUT has 'expired'.

The fix is to make sure tcp_rtx_probe0_timed_out() takes
icsk-&gt;icsk_user_timeout into account.

Before blamed commit, the socket would not timeout after
icsk-&gt;icsk_user_timeout, but would use standard exponential
backoff for the retransmits.

Also worth noting that before commit e89688e3e978 ("net: tcp:
fix unexcepted socket die when snd_wnd is 0"), the issue
would last 2 minutes instead of 4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227863">SUSE bug 1227863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix overrunning reservations in ringbuf

The BPF ring buffer internally is implemented as a power-of-2 sized circular
buffer, with two logical and ever-increasing counters: consumer_pos is the
consumer counter to show which logical position the consumer consumed the
data, and producer_pos which is the producer counter denoting the amount of
data reserved by all producers.

Each time a record is reserved, the producer that "owns" the record will
successfully advance producer counter. In user space each time a record is
read, the consumer of the data advanced the consumer counter once it finished
processing. Both counters are stored in separate pages so that from user
space, the producer counter is read-only and the consumer counter is read-write.

One aspect that simplifies and thus speeds up the implementation of both
producers and consumers is how the data area is mapped twice contiguously
back-to-back in the virtual memory, allowing to not take any special measures
for samples that have to wrap around at the end of the circular buffer data
area, because the next page after the last data page would be first data page
again, and thus the sample will still appear completely contiguous in virtual
memory.

Each record has a struct bpf_ringbuf_hdr { u32 len; u32 pg_off; } header for
book-keeping the length and offset, and is inaccessible to the BPF program.
Helpers like bpf_ringbuf_reserve() return `(void *)hdr + BPF_RINGBUF_HDR_SZ`
for the BPF program to use. Bing-Jhong and Muhammad reported that it is however
possible to make a second allocated memory chunk overlapping with the first
chunk and as a result, the BPF program is now able to edit first chunk's
header.

For example, consider the creation of a BPF_MAP_TYPE_RINGBUF map with size
of 0x4000. Next, the consumer_pos is modified to 0x3000 /before/ a call to
bpf_ringbuf_reserve() is made. This will allocate a chunk A, which is in
[0x0,0x3008], and the BPF program is able to edit [0x8,0x3008]. Now, lets
allocate a chunk B with size 0x3000. This will succeed because consumer_pos
was edited ahead of time to pass the `new_prod_pos - cons_pos &gt; rb-&gt;mask`
check. Chunk B will be in range [0x3008,0x6010], and the BPF program is able
to edit [0x3010,0x6010]. Due to the ring buffer memory layout mentioned
earlier, the ranges [0x0,0x4000] and [0x4000,0x8000] point to the same data
pages. This means that chunk B at [0x4000,0x4008] is chunk A's header.
bpf_ringbuf_submit() / bpf_ringbuf_discard() use the header's pg_off to then
locate the bpf_ringbuf itself via bpf_ringbuf_restore_from_rec(). Once chunk
B modified chunk A's header, then bpf_ringbuf_commit() refers to the wrong
page and could cause a crash.

Fix it by calculating the oldest pending_pos and check whether the range
from the oldest outstanding record to the newest would span beyond the ring
buffer size. If that is the case, then reject the request. We've tested with
the ring buffer benchmark in BPF selftests (./benchs/run_bench_ringbufs.sh)
before/after the fix and while it seems a bit slower on some benchmarks, it
is still not significantly enough to matter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41010" ref_url="https://www.suse.com/security/cve/CVE-2024-41010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix too early release of tcx_entry

Pedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reported
an issue that the tcx_entry can be released too early leading to a use
after free (UAF) when an active old-style ingress or clsact qdisc with a
shared tc block is later replaced by another ingress or clsact instance.

Essentially, the sequence to trigger the UAF (one example) can be as follows:

  1. A network namespace is created
  2. An ingress qdisc is created. This allocates a tcx_entry, and
     &amp;tcx_entry-&gt;miniq is stored in the qdisc's miniqp-&gt;p_miniq. At the
     same time, a tcf block with index 1 is created.
  3. chain0 is attached to the tcf block. chain0 must be connected to
     the block linked to the ingress qdisc to later reach the function
     tcf_chain0_head_change_cb_del() which triggers the UAF.
  4. Create and graft a clsact qdisc. This causes the ingress qdisc
     created in step 1 to be removed, thus freeing the previously linked
     tcx_entry:

     rtnetlink_rcv_msg()
       =&gt; tc_modify_qdisc()
         =&gt; qdisc_create()
           =&gt; clsact_init() [a]
         =&gt; qdisc_graft()
           =&gt; qdisc_destroy()
             =&gt; __qdisc_destroy()
               =&gt; ingress_destroy() [b]
                 =&gt; tcx_entry_free()
                   =&gt; kfree_rcu() // tcx_entry freed

  5. Finally, the network namespace is closed. This registers the
     cleanup_net worker, and during the process of releasing the
     remaining clsact qdisc, it accesses the tcx_entry that was
     already freed in step 4, causing the UAF to occur:

     cleanup_net()
       =&gt; ops_exit_list()
         =&gt; default_device_exit_batch()
           =&gt; unregister_netdevice_many()
             =&gt; unregister_netdevice_many_notify()
               =&gt; dev_shutdown()
                 =&gt; qdisc_put()
                   =&gt; clsact_destroy() [c]
                     =&gt; tcf_block_put_ext()
                       =&gt; tcf_chain0_head_change_cb_del()
                         =&gt; tcf_chain_head_change_item()
                           =&gt; clsact_chain_head_change()
                             =&gt; mini_qdisc_pair_swap() // UAF

There are also other variants, the gist is to add an ingress (or clsact)
qdisc with a specific shared block, then to replace that qdisc, waiting
for the tcx_entry kfree_rcu() to be executed and subsequently accessing
the current active qdisc's miniq one way or another.

The correct fix is to turn the miniq_active boolean into a counter. What
can be observed, at step 2 above, the counter transitions from 0-&gt;1, at
step [a] from 1-&gt;2 (in order for the miniq object to remain active during
the replacement), then in [b] from 2-&gt;1 and finally [c] 1-&gt;0 with the
eventual release. The reference counter in general ranges from [0,2] and
it does not need to be atomic since all access to the counter is protected
by the rtnl mutex. With this in place, there is no longer a UAF happening
and the tcx_entry is freed at the correct time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41010/">CVE-2024-41010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41010">CVE-2024-41010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228021">SUSE bug 1228021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: don't allow mapping the MMIO HDP page with large pages

We don't get the right offset in that case.  The GPU has
an unused 4K area of the register BAR space into which you can
remap registers.  We remap the HDP flush registers into this
space to allow userspace (CPU or GPU) to flush the HDP when it
updates VRAM.  However, on systems with &gt;4K pages, we end up
exposing PAGE_SIZE of MMIO space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228115">SUSE bug 1228115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filelock: Remove locks reliably when fcntl/close race is detected

When fcntl_setlk() races with close(), it removes the created lock with
do_lock_file_wait().
However, LSMs can allow the first do_lock_file_wait() that created the lock
while denying the second do_lock_file_wait() that tries to remove the lock.
Separately, posix_lock_file() could also fail to
remove a lock due to GFP_KERNEL allocation failure (when splitting a range
in the middle).

After the bug has been triggered, use-after-free reads will occur in
lock_get_status() when userspace reads /proc/locks. This can likely be used
to read arbitrary kernel memory, but can't corrupt kernel memory.

Fix it by calling locks_remove_posix() instead, which is designed to
reliably get rid of POSIX locks associated with the given file and
files_struct and is also used by filp_flush().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: don't walk off the end of a directory data block

This adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry
to make sure don't stray beyond valid memory region. Before patching, the
loop simply checks that the start offset of the dup and dep is within the
range. So in a crafted image, if last entry is xfs_dir2_data_unused, we
can change dup-&gt;length to dup-&gt;length-1 and leave 1 byte of space. In the
next traversal, this space will be considered as dup or dep. We may
encounter an out of bound read when accessing the fixed members.

In the patch, we make sure that the remaining bytes large enough to hold
an unused entry before accessing xfs_dir2_data_unused and
xfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make
sure that the remaining bytes large enough to hold a dirent with a
single-byte name before accessing xfs_dir2_data_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228405">SUSE bug 1228405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: add bounds checking to xlog_recover_process_data

There is a lack of verification of the space occupied by fixed members
of xlog_op_header in the xlog_recover_process_data.

We can create a crafted image to trigger an out of bounds read by
following these steps:
    1) Mount an image of xfs, and do some file operations to leave records
    2) Before umounting, copy the image for subsequent steps to simulate
       abnormal exit. Because umount will ensure that tail_blk and
       head_blk are the same, which will result in the inability to enter
       xlog_recover_process_data
    3) Write a tool to parse and modify the copied image in step 2
    4) Make the end of the xlog_op_header entries only 1 byte away from
       xlog_rec_header-&gt;h_size
    5) xlog_rec_header-&gt;h_num_logops++
    6) Modify xlog_rec_header-&gt;h_crc

Fix:
Add a check to make sure there is sufficient space to access fixed members
of xlog_op_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228408">SUSE bug 1228408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: add bounds checking to ocfs2_check_dir_entry()

This adds sanity checks for ocfs2_dir_entry to make sure all members of
ocfs2_dir_entry don't stray beyond valid memory region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228409">SUSE bug 1228409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry()

xattr in ocfs2 maybe 'non-indexed', which saved with additional space
requested.  It's better to check if the memory is out of bound before
memcmp, although this possibility mainly comes from crafted poisonous
images.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: don't walk off the end of ealist

Add a check before visiting the members of ea to
make sure each ea stays within the ealist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228403">SUSE bug 1228403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41018" ref_url="https://www.suse.com/security/cve/CVE-2024-41018" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add a check for attr_names and oatbl

Added out-of-bound checking for *ane (ATTR_NAME_ENTRY).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41018/">CVE-2024-41018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41018">CVE-2024-41018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228399">SUSE bug 1228399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41019" ref_url="https://www.suse.com/security/cve/CVE-2024-41019" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Validate ff offset

This adds sanity checks for ff offset. There is a check
on rt-&gt;first_free at first, but walking through by ff
without any check. If the second ff is a large offset.
We may encounter an out-of-bound read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41019/">CVE-2024-41019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41019">CVE-2024-41019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228532">SUSE bug 1228532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filelock: Fix fcntl/close race recovery compat path

When I wrote commit 3cad1bc01041 ("filelock: Remove locks reliably when
fcntl/close race is detected"), I missed that there are two copies of the
code I was patching: The normal version, and the version for 64-bit offsets
on 32-bit kernels.
Thanks to Greg KH for stumbling over this while doing the stable
backport...

Apply exactly the same fix to the compat path for 32-bit kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228427">SUSE bug 1228427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41021" ref_url="https://www.suse.com/security/cve/CVE-2024-41021" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()

There is no support for HWPOISON, MEMORY_FAILURE, or ARCH_HAS_COPY_MC on
s390. Therefore we do not expect to see VM_FAULT_HWPOISON in
do_exception().

However, since commit af19487f00f3 ("mm: make PTE_MARKER_SWAPIN_ERROR more
general"), it is possible to see VM_FAULT_HWPOISON in combination with
PTE_MARKER_POISONED, even on architectures that do not support HWPOISON
otherwise. In this case, we will end up on the BUG() in do_exception().

Fix this by treating VM_FAULT_HWPOISON the same as VM_FAULT_SIGBUS, similar
to x86 when MEMORY_FAILURE is not configured. Also print unexpected fault
flags, for easier debugging.

Note that VM_FAULT_HWPOISON_LARGE is not expected, because s390 cannot
support swap entries on other levels than PTE level.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41021/">CVE-2024-41021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41021">CVE-2024-41021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228428">SUSE bug 1228428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()

The "instance" variable needs to be signed for the error handling to work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228429">SUSE bug 1228429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/deadline: Fix task_struct reference leak

During the execution of the following stress test with linux-rt:

stress-ng --cyclic 30 --timeout 30 --minimize --quiet

kmemleak frequently reported a memory leak concerning the task_struct:

unreferenced object 0xffff8881305b8000 (size 16136):
  comm "stress-ng", pid 614, jiffies 4294883961 (age 286.412s)
  object hex dump (first 32 bytes):
    02 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00  .@..............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  debug hex dump (first 16 bytes):
    53 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00  S...............
  backtrace:
    [&lt;00000000046b6790&gt;] dup_task_struct+0x30/0x540
    [&lt;00000000c5ca0f0b&gt;] copy_process+0x3d9/0x50e0
    [&lt;00000000ced59777&gt;] kernel_clone+0xb0/0x770
    [&lt;00000000a50befdc&gt;] __do_sys_clone+0xb6/0xf0
    [&lt;000000001dbf2008&gt;] do_syscall_64+0x5d/0xf0
    [&lt;00000000552900ff&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

The issue occurs in start_dl_timer(), which increments the task_struct
reference count and sets a timer. The timer callback, dl_task_timer,
is supposed to decrement the reference count upon expiration. However,
if enqueue_task_dl() is called before the timer expires and cancels it,
the reference count is not decremented, leading to the leak.

This patch fixes the reference leak by ensuring the task_struct
reference count is properly decremented when the timer is canceled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228430">SUSE bug 1228430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41024" ref_url="https://www.suse.com/security/cve/CVE-2024-41024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41024/">CVE-2024-41024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41024">CVE-2024-41024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228525">SUSE bug 1228525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229274">SUSE bug 1229274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41025" ref_url="https://www.suse.com/security/cve/CVE-2024-41025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix memory leak in audio daemon attach operation

Audio PD daemon send the name as part of the init IOCTL call. This
name needs to be copied to kernel for which memory is allocated.
This memory is never freed which might result in memory leak. Free
the memory when it is not needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41025/">CVE-2024-41025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41025">CVE-2024-41025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228527">SUSE bug 1228527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41026" ref_url="https://www.suse.com/security/cve/CVE-2024-41026" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length

No check is done on the size of the data to be transmiited. This causes
a kernel panic when this size exceeds the sg_miter's length.

Limit the number of transmitted bytes to sgm-&gt;length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41026/">CVE-2024-41026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41026">CVE-2024-41026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228533">SUSE bug 1228533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41027" ref_url="https://www.suse.com/security/cve/CVE-2024-41027" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Fix userfaultfd_api to return EINVAL as expected

Currently if we request a feature that is not set in the Kernel config we
fail silently and return all the available features.  However, the man
page indicates we should return an EINVAL.

We need to fix this issue since we can end up with a Kernel warning should
a program request the feature UFFD_FEATURE_WP_UNPOPULATED on a kernel with
the config not set with this feature.

 [  200.812896] WARNING: CPU: 91 PID: 13634 at mm/memory.c:1660 zap_pte_range+0x43d/0x660
 [  200.820738] Modules linked in:
 [  200.869387] CPU: 91 PID: 13634 Comm: userfaultfd Kdump: loaded Not tainted 6.9.0-rc5+ #8
 [  200.877477] Hardware name: Dell Inc. PowerEdge R6525/0N7YGH, BIOS 2.7.3 03/30/2022
 [  200.885052] RIP: 0010:zap_pte_range+0x43d/0x660
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41027/">CVE-2024-41027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41027">CVE-2024-41027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228538">SUSE bug 1228538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41028" ref_url="https://www.suse.com/security/cve/CVE-2024-41028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: toshiba_acpi: Fix array out-of-bounds access

In order to use toshiba_dmi_quirks[] together with the standard DMI
matching functions, it must be terminated by a empty entry.

Since this entry is missing, an array out-of-bounds access occurs
every time the quirk list is processed.

Fix this by adding the terminating empty entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41028/">CVE-2024-41028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41028">CVE-2024-41028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228539">SUSE bug 1228539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41029" ref_url="https://www.suse.com/security/cve/CVE-2024-41029" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: core: limit cell sysfs permissions to main attribute ones

The cell sysfs attribute should not provide more access to the nvmem
data than the main attribute itself.
For example if nvme_config::root_only was set, the cell attribute
would still provide read access to everybody.

Mask out permissions not available on the main attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41029/">CVE-2024-41029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41029">CVE-2024-41029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228443">SUSE bug 1228443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41030" ref_url="https://www.suse.com/security/cve/CVE-2024-41030" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: discard write access to the directory open

may_open() does not allow a directory to be opened with the write access.
However, some writing flags set by client result in adding write access
on server, making ksmbd incompatible with FUSE file system. Simply, let's
discard the write access when opening a directory.

list_add corruption. next is NULL.
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:26!
pc : __list_add_valid+0x88/0xbc
lr : __list_add_valid+0x88/0xbc
Call trace:
__list_add_valid+0x88/0xbc
fuse_finish_open+0x11c/0x170
fuse_open_common+0x284/0x5e8
fuse_dir_open+0x14/0x24
do_dentry_open+0x2a4/0x4e0
dentry_open+0x50/0x80
smb2_open+0xbe4/0x15a4
handle_ksmbd_work+0x478/0x5ec
process_one_work+0x1b4/0x448
worker_thread+0x25c/0x430
kthread+0x104/0x1d4
ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41030/">CVE-2024-41030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41030">CVE-2024-41030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228444">SUSE bug 1228444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41031" ref_url="https://www.suse.com/security/cve/CVE-2024-41031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/filemap: skip to create PMD-sized page cache if needed

On ARM64, HPAGE_PMD_ORDER is 13 when the base page size is 64KB.  The
PMD-sized page cache can't be supported by xarray as the following error
messages indicate.

------------[ cut here ]------------
WARNING: CPU: 35 PID: 7484 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128
Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib  \
nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct    \
nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4    \
ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm      \
fuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64      \
sha1_ce virtio_net net_failover virtio_console virtio_blk failover \
dimlib virtio_mmio
CPU: 35 PID: 7484 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9
Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024
pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : xas_split_alloc+0xf8/0x128
lr : split_huge_page_to_list_to_order+0x1c4/0x720
sp : ffff800087a4f6c0
x29: ffff800087a4f6c0 x28: ffff800087a4f720 x27: 000000001fffffff
x26: 0000000000000c40 x25: 000000000000000d x24: ffff00010625b858
x23: ffff800087a4f720 x22: ffffffdfc0780000 x21: 0000000000000000
x20: 0000000000000000 x19: ffffffdfc0780000 x18: 000000001ff40000
x17: 00000000ffffffff x16: 0000018000000000 x15: 51ec004000000000
x14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020
x11: 51ec000000000000 x10: 51ece1c0ffff8000 x9 : ffffbeb961a44d28
x8 : 0000000000000003 x7 : ffffffdfc0456420 x6 : ffff0000e1aa6eb8
x5 : 20bf08b4fe778fca x4 : ffffffdfc0456420 x3 : 0000000000000c40
x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000
Call trace:
 xas_split_alloc+0xf8/0x128
 split_huge_page_to_list_to_order+0x1c4/0x720
 truncate_inode_partial_folio+0xdc/0x160
 truncate_inode_pages_range+0x1b4/0x4a8
 truncate_pagecache_range+0x84/0xa0
 xfs_flush_unmap_range+0x70/0x90 [xfs]
 xfs_file_fallocate+0xfc/0x4d8 [xfs]
 vfs_fallocate+0x124/0x2e8
 ksys_fallocate+0x4c/0xa0
 __arm64_sys_fallocate+0x24/0x38
 invoke_syscall.constprop.0+0x7c/0xd8
 do_el0_svc+0xb4/0xd0
 el0_svc+0x44/0x1d8
 el0t_64_sync_handler+0x134/0x150
 el0t_64_sync+0x17c/0x180

Fix it by skipping to allocate PMD-sized page cache when its size is
larger than MAX_PAGECACHE_ORDER.  For this specific case, we will fall to
regular path where the readahead window is determined by BDI's sysfs file
(read_ahead_kb).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41031/">CVE-2024-41031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41031">CVE-2024-41031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228454">SUSE bug 1228454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41032" ref_url="https://www.suse.com/security/cve/CVE-2024-41032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: vmalloc: check if a hash-index is in cpu_possible_mask

The problem is that there are systems where cpu_possible_mask has gaps
between set CPUs, for example SPARC.  In this scenario addr_to_vb_xa()
hash function can return an index which accesses to not-possible and not
setup CPU area using per_cpu() macro.  This results in an oops on SPARC.

A per-cpu vmap_block_queue is also used as hash table, incorrectly
assuming the cpu_possible_mask has no gaps.  Fix it by adjusting an index
to a next possible CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41032/">CVE-2024-41032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41032">CVE-2024-41032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228460">SUSE bug 1228460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41033</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41033" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41033" ref_url="https://www.suse.com/security/cve/CVE-2024-41033" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachestat: do not flush stats in recency check

syzbot detects that cachestat() is flushing stats, which can sleep, in its
RCU read section (see [1]).  This is done in the workingset_test_recent()
step (which checks if the folio's eviction is recent).

Move the stat flushing step to before the RCU read section of cachestat,
and skip stat flushing during the recency check.

[1]: https://lore.kernel.org/cgroups/000000000000f71227061bdf97e0@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41033/">CVE-2024-41033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41033">CVE-2024-41033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228465">SUSE bug 1228465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41034" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41034" ref_url="https://www.suse.com/security/cve/CVE-2024-41034" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug on rename operation of broken directory

Syzbot reported that in rename directory operation on broken directory on
nilfs2, __block_write_begin_int() called to prepare block write may fail
BUG_ON check for access exceeding the folio/page size.

This is because nilfs_dotdot(), which gets parent directory reference
entry ("..") of the directory to be moved or renamed, does not check
consistency enough, and may return location exceeding folio/page size for
broken directories.

Fix this issue by checking required directory entries ("." and "..") in
the first chunk of the directory in nilfs_dotdot().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41034/">CVE-2024-41034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41034">CVE-2024-41034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228474">SUSE bug 1228474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41035</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41035" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor

Syzbot has identified a bug in usbcore (see the Closes: tag below)
caused by our assumption that the reserved bits in an endpoint
descriptor's bEndpointAddress field will always be 0.  As a result of
the bug, the endpoint_is_duplicate() routine in config.c (and possibly
other routines as well) may believe that two descriptors are for
distinct endpoints, even though they have the same direction and
endpoint number.  This can lead to confusion, including the bug
identified by syzbot (two descriptors with matching endpoint numbers
and directions, where one was interrupt and the other was bulk).

To fix the bug, we will clear the reserved bits in bEndpointAddress
when we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1
specs say these bits are "Reserved, reset to zero".)  This requires us
to make a copy of the descriptor earlier in usb_parse_endpoint() and
use the copy instead of the original when checking for duplicates.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228485">SUSE bug 1228485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41036</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41036" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ks8851: Fix deadlock with the SPI chip variant

When SMP is enabled and spinlocks are actually functional then there is
a deadlock with the 'statelock' spinlock between ks8851_start_xmit_spi
and ks8851_irq:

    watchdog: BUG: soft lockup - CPU#0 stuck for 27s!
    call trace:
      queued_spin_lock_slowpath+0x100/0x284
      do_raw_spin_lock+0x34/0x44
      ks8851_start_xmit_spi+0x30/0xb8
      ks8851_start_xmit+0x14/0x20
      netdev_start_xmit+0x40/0x6c
      dev_hard_start_xmit+0x6c/0xbc
      sch_direct_xmit+0xa4/0x22c
      __qdisc_run+0x138/0x3fc
      qdisc_run+0x24/0x3c
      net_tx_action+0xf8/0x130
      handle_softirqs+0x1ac/0x1f0
      __do_softirq+0x14/0x20
      ____do_softirq+0x10/0x1c
      call_on_irq_stack+0x3c/0x58
      do_softirq_own_stack+0x1c/0x28
      __irq_exit_rcu+0x54/0x9c
      irq_exit_rcu+0x10/0x1c
      el1_interrupt+0x38/0x50
      el1h_64_irq_handler+0x18/0x24
      el1h_64_irq+0x64/0x68
      __netif_schedule+0x6c/0x80
      netif_tx_wake_queue+0x38/0x48
      ks8851_irq+0xb8/0x2c8
      irq_thread_fn+0x2c/0x74
      irq_thread+0x10c/0x1b0
      kthread+0xc8/0xd8
      ret_from_fork+0x10/0x20

This issue has not been identified earlier because tests were done on
a device with SMP disabled and so spinlocks were actually NOPs.

Now use spin_(un)lock_bh for TX queue related locking to avoid execution
of softirq work synchronously that would lead to a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228496">SUSE bug 1228496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41037" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41037" ref_url="https://www.suse.com/security/cve/CVE-2024-41037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda: fix null deref on system suspend entry

When system enters suspend with an active stream, SOF core
calls hw_params_upon_resume(). On Intel platforms with HDA DMA used
to manage the link DMA, this leads to call chain of

   hda_dsp_set_hw_params_upon_resume()
 -&gt; hda_dsp_dais_suspend()
 -&gt; hda_dai_suspend()
 -&gt; hda_ipc4_post_trigger()

A bug is hit in hda_dai_suspend() as hda_link_dma_cleanup() is run first,
which clears hext_stream-&gt;link_substream, and then hda_ipc4_post_trigger()
is called with a NULL snd_pcm_substream pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41037/">CVE-2024-41037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41037">CVE-2024-41037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228508">SUSE bug 1228508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41038</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers

Check that all fields of a V2 algorithm header fit into the available
firmware data buffer.

The wmfw V2 format introduced variable-length strings in the algorithm
block header. This means the overall header length is variable, and the
position of most fields varies depending on the length of the string
fields. Each field must be checked to ensure that it does not overflow
the firmware data buffer.

As this ia bugfix patch, the fixes avoid making any significant change to
the existing code. This makes it easier to review and less likely to
introduce new bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228509">SUSE bug 1228509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41039</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Fix overflow checking of wmfw header

Fix the checking that firmware file buffer is large enough for the
wmfw header, to prevent overrunning the buffer.

The original code tested that the firmware data buffer contained
enough bytes for the sums of the size of the structs

	wmfw_header + wmfw_adsp1_sizes + wmfw_footer

But wmfw_adsp1_sizes is only used on ADSP1 firmware. For ADSP2 and
Halo Core the equivalent struct is wmfw_adsp2_sizes, which is
4 bytes longer. So the length check didn't guarantee that there
are enough bytes in the firmware buffer for a header with
wmfw_adsp2_sizes.

This patch splits the length check into three separate parts. Each
of the wmfw_header, wmfw_adsp?_sizes and wmfw_footer are checked
separately before they are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228515">SUSE bug 1228515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix UAF when resolving a clash

KASAN reports the following UAF:

 BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]
 Read of size 1 at addr ffff888c07603600 by task handler130/6469

 Call Trace:
  &lt;IRQ&gt;
  dump_stack_lvl+0x48/0x70
  print_address_description.constprop.0+0x33/0x3d0
  print_report+0xc0/0x2b0
  kasan_report+0xd0/0x120
  __asan_load1+0x6c/0x80
  tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]
  tcf_ct_act+0x886/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491
  __irq_exit_rcu+0x82/0xc0
  irq_exit_rcu+0xe/0x20
  common_interrupt+0xa1/0xb0
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_common_interrupt+0x27/0x40

 Allocated by task 6469:
  kasan_save_stack+0x38/0x70
  kasan_set_track+0x25/0x40
  kasan_save_alloc_info+0x1e/0x40
  __kasan_krealloc+0x133/0x190
  krealloc+0xaa/0x130
  nf_ct_ext_add+0xed/0x230 [nf_conntrack]
  tcf_ct_act+0x1095/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491

 Freed by task 6469:
  kasan_save_stack+0x38/0x70
  kasan_set_track+0x25/0x40
  kasan_save_free_info+0x2b/0x60
  ____kasan_slab_free+0x180/0x1f0
  __kasan_slab_free+0x12/0x30
  slab_free_freelist_hook+0xd2/0x1a0
  __kmem_cache_free+0x1a2/0x2f0
  kfree+0x78/0x120
  nf_conntrack_free+0x74/0x130 [nf_conntrack]
  nf_ct_destroy+0xb2/0x140 [nf_conntrack]
  __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]
  nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]
  __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]
  tcf_ct_act+0x12ad/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491

The ct may be dropped if a clash has been resolved but is still passed to
the tcf_ct_flow_table_process_conn function for further usage. This issue
can be fixed by retrieving ct from skb again after confirming conntrack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228518">SUSE bug 1228518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().

syzkaller triggered the warning [0] in udp_v4_early_demux().

In udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount
of the looked-up sk and use sock_pfree() as skb-&gt;destructor, so we check
SOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace
period.

Currently, SOCK_RCU_FREE is flagged for a bound socket after being put
into the hash table.  Moreover, the SOCK_RCU_FREE check is done too early
in udp_v[46]_early_demux() and sk_lookup(), so there could be a small race
window:

  CPU1                                 CPU2
  ----                                 ----
  udp_v4_early_demux()                 udp_lib_get_port()
  |                                    |- hlist_add_head_rcu()
  |- sk = __udp4_lib_demux_lookup()    |
  |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));
                                       `- sock_set_flag(sk, SOCK_RCU_FREE)

We had the same bug in TCP and fixed it in commit 871019b22d1b ("net:
set SOCK_RCU_FREE before inserting socket into hashtable").

Let's apply the same fix for UDP.

[0]:
WARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Modules linked in:
CPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Code: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe &lt;0f&gt; 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52
RSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c
RDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001
RBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680
R13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e
FS:  00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349
 ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624
 __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738
 netif_receive_skb_internal net/core/dev.c:5824 [inline]
 netif_receive_skb+0x271/0x300 net/core/dev.c:5884
 tun_rx_batched drivers/net/tun.c:1549 [inline]
 tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002
 tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0x76f/0x8d0 fs/read_write.c:590
 ksys_write+0xbf/0x190 fs/read_write.c:643
 __do_sys_write fs/read_write.c:655 [inline]
 __se_sys_write fs/read_write.c:652 [inline]
 __x64_sys_write+0x41/0x50 fs/read_write.c:652
 x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fc44a68bc1f
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48
RSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f
R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228520">SUSE bug 1228520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41043" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41043" ref_url="https://www.suse.com/security/cve/CVE-2024-41043" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink_queue: drop bogus WARN_ON

Happens when rules get flushed/deleted while packet is out, so remove
this WARN_ON.

This WARN exists in one form or another since v4.14, no need to backport
this to older releases, hence use a more recent fixes tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41043/">CVE-2024-41043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41043">CVE-2024-41043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228529">SUSE bug 1228529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: reject claimed-as-LCP but actually malformed packets

Since 'ppp_async_encode()' assumes valid LCP packets (with code
from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that
LCP packet has an actual body beyond PPP_LCP header bytes, and
reject claimed-as-LCP but actually malformed data otherwise.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228530">SUSE bug 1228530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Defer work in bpf_timer_cancel_and_free

Currently, the same case as previous patch (two timer callbacks trying
to cancel each other) can be invoked through bpf_map_update_elem as
well, or more precisely, freeing map elements containing timers. Since
this relies on hrtimer_cancel as well, it is prone to the same deadlock
situation as the previous patch.

It would be sufficient to use hrtimer_try_to_cancel to fix this problem,
as the timer cannot be enqueued after async_cancel_and_free. Once
async_cancel_and_free has been done, the timer must be reinitialized
before it can be armed again. The callback running in parallel trying to
arm the timer will fail, and freeing bpf_hrtimer without waiting is
sufficient (given kfree_rcu), and bpf_timer_cb will return
HRTIMER_NORESTART, preventing the timer from being rearmed again.

However, there exists a UAF scenario where the callback arms the timer
before entering this function, such that if cancellation fails (due to
timer callback invoking this routine, or the target timer callback
running concurrently). In such a case, if the timer expiration is
significantly far in the future, the RCU grace period expiration
happening before it will free the bpf_hrtimer state and along with it
the struct hrtimer, that is enqueued.

Hence, it is clear cancellation needs to occur after
async_cancel_and_free, and yet it cannot be done inline due to deadlock
issues. We thus modify bpf_timer_cancel_and_free to defer work to the
global workqueue, adding a work_struct alongside rcu_head (both used at
_different_ points of time, so can share space).

Update existing code comments to reflect the new state of affairs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228531">SUSE bug 1228531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41046" ref_url="https://www.suse.com/security/cve/CVE-2024-41046" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: lantiq_etop: fix double free in detach

The number of the currently released descriptor is never incremented
which results in the same skb being released multiple times.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41046/">CVE-2024-41046 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41046">CVE-2024-41046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228536">SUSE bug 1228536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41047" ref_url="https://www.suse.com/security/cve/CVE-2024-41047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix XDP program unloading while removing the driver

The commit 6533e558c650 ("i40e: Fix reset path while removing
the driver") introduced a new PF state "__I40E_IN_REMOVE" to block
modifying the XDP program while the driver is being removed.
Unfortunately, such a change is useful only if the ".ndo_bpf()"
callback was called out of the rmmod context because unloading the
existing XDP program is also a part of driver removing procedure.
In other words, from the rmmod context the driver is expected to
unload the XDP program without reporting any errors. Otherwise,
the kernel warning with callstack is printed out to dmesg.

Example failing scenario:
 1. Load the i40e driver.
 2. Load the XDP program.
 3. Unload the i40e driver (using "rmmod" command).

The example kernel warning log:

[  +0.004646] WARNING: CPU: 94 PID: 10395 at net/core/dev.c:9290 unregister_netdevice_many_notify+0x7a9/0x870
[...]
[  +0.010959] RIP: 0010:unregister_netdevice_many_notify+0x7a9/0x870
[...]
[  +0.002726] Call Trace:
[  +0.002457]  &lt;TASK&gt;
[  +0.002119]  ? __warn+0x80/0x120
[  +0.003245]  ? unregister_netdevice_many_notify+0x7a9/0x870
[  +0.005586]  ? report_bug+0x164/0x190
[  +0.003678]  ? handle_bug+0x3c/0x80
[  +0.003503]  ? exc_invalid_op+0x17/0x70
[  +0.003846]  ? asm_exc_invalid_op+0x1a/0x20
[  +0.004200]  ? unregister_netdevice_many_notify+0x7a9/0x870
[  +0.005579]  ? unregister_netdevice_many_notify+0x3cc/0x870
[  +0.005586]  unregister_netdevice_queue+0xf7/0x140
[  +0.004806]  unregister_netdev+0x1c/0x30
[  +0.003933]  i40e_vsi_release+0x87/0x2f0 [i40e]
[  +0.004604]  i40e_remove+0x1a1/0x420 [i40e]
[  +0.004220]  pci_device_remove+0x3f/0xb0
[  +0.003943]  device_release_driver_internal+0x19f/0x200
[  +0.005243]  driver_detach+0x48/0x90
[  +0.003586]  bus_remove_driver+0x6d/0xf0
[  +0.003939]  pci_unregister_driver+0x2e/0xb0
[  +0.004278]  i40e_exit_module+0x10/0x5f0 [i40e]
[  +0.004570]  __do_sys_delete_module.isra.0+0x197/0x310
[  +0.005153]  do_syscall_64+0x85/0x170
[  +0.003684]  ? syscall_exit_to_user_mode+0x69/0x220
[  +0.004886]  ? do_syscall_64+0x95/0x170
[  +0.003851]  ? exc_page_fault+0x7e/0x180
[  +0.003932]  entry_SYSCALL_64_after_hwframe+0x71/0x79
[  +0.005064] RIP: 0033:0x7f59dc9347cb
[  +0.003648] Code: 73 01 c3 48 8b 0d 65 16 0c 00 f7 d8 64 89 01 48 83
c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f
05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 35 16 0c 00 f7 d8 64 89 01 48
[  +0.018753] RSP: 002b:00007ffffac99048 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0
[  +0.007577] RAX: ffffffffffffffda RBX: 0000559b9bb2f6e0 RCX: 00007f59dc9347cb
[  +0.007140] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 0000559b9bb2f748
[  +0.007146] RBP: 00007ffffac99070 R08: 1999999999999999 R09: 0000000000000000
[  +0.007133] R10: 00007f59dc9a5ac0 R11: 0000000000000206 R12: 0000000000000000
[  +0.007141] R13: 00007ffffac992d8 R14: 0000559b9bb2f6e0 R15: 0000000000000000
[  +0.007151]  &lt;/TASK&gt;
[  +0.002204] ---[ end trace 0000000000000000 ]---

Fix this by checking if the XDP program is being loaded or unloaded.
Then, block only loading a new program while "__I40E_IN_REMOVE" is set.
Also, move testing "__I40E_IN_REMOVE" flag to the beginning of XDP_SETUP
callback to avoid unnecessary operations and checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41047/">CVE-2024-41047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41047">CVE-2024-41047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228537">SUSE bug 1228537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

skmsg: Skip zero length skb in sk_msg_recvmsg

When running BPF selftests (./test_progs -t sockmap_basic) on a Loongarch
platform, the following kernel panic occurs:

  [...]
  Oops[#1]:
  CPU: 22 PID: 2824 Comm: test_progs Tainted: G           OE  6.10.0-rc2+ #18
  Hardware name: LOONGSON Dabieshan/Loongson-TC542F0, BIOS Loongson-UDK2018
     ... ...
     ra: 90000000048bf6c0 sk_msg_recvmsg+0x120/0x560
    ERA: 9000000004162774 copy_page_to_iter+0x74/0x1c0
   CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
   PRMD: 0000000c (PPLV0 +PIE +PWE)
   EUEN: 00000007 (+FPE +SXE +ASXE -BTE)
   ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)
  ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
   BADV: 0000000000000040
   PRID: 0014c011 (Loongson-64bit, Loongson-3C5000)
  Modules linked in: bpf_testmod(OE) xt_CHECKSUM xt_MASQUERADE xt_conntrack
  Process test_progs (pid: 2824, threadinfo=0000000000863a31, task=...)
  Stack : ...
  Call Trace:
  [&lt;9000000004162774&gt;] copy_page_to_iter+0x74/0x1c0
  [&lt;90000000048bf6c0&gt;] sk_msg_recvmsg+0x120/0x560
  [&lt;90000000049f2b90&gt;] tcp_bpf_recvmsg_parser+0x170/0x4e0
  [&lt;90000000049aae34&gt;] inet_recvmsg+0x54/0x100
  [&lt;900000000481ad5c&gt;] sock_recvmsg+0x7c/0xe0
  [&lt;900000000481e1a8&gt;] __sys_recvfrom+0x108/0x1c0
  [&lt;900000000481e27c&gt;] sys_recvfrom+0x1c/0x40
  [&lt;9000000004c076ec&gt;] do_syscall+0x8c/0xc0
  [&lt;9000000003731da4&gt;] handle_syscall+0xc4/0x160
  Code: ...
  ---[ end trace 0000000000000000 ]---
  Kernel panic - not syncing: Fatal exception
  Kernel relocated by 0x3510000
   .text @ 0x9000000003710000
   .data @ 0x9000000004d70000
   .bss  @ 0x9000000006469400
  ---[ end Kernel panic - not syncing: Fatal exception ]---
  [...]

This crash happens every time when running sockmap_skb_verdict_shutdown
subtest in sockmap_basic.

This crash is because a NULL pointer is passed to page_address() in the
sk_msg_recvmsg(). Due to the different implementations depending on the
architecture, page_address(NULL) will trigger a panic on Loongarch
platform but not on x86 platform. So this bug was hidden on x86 platform
for a while, but now it is exposed on Loongarch platform. The root cause
is that a zero length skb (skb-&gt;len == 0) was put on the queue.

This zero length skb is a TCP FIN packet, which was sent by shutdown(),
invoked in test_sockmap_skb_verdict_shutdown():

	shutdown(p1, SHUT_WR);

In this case, in sk_psock_skb_ingress_enqueue(), num_sge is zero, and no
page is put to this sge (see sg_set_page in sg_set_page), but this empty
sge is queued into ingress_msg list.

And in sk_msg_recvmsg(), this empty sge is used, and a NULL page is got by
sg_page(sge). Pass this NULL page to copy_page_to_iter(), which passes it
to kmap_local_page() and to page_address(), then kernel panics.

To solve this, we should skip this zero length skb. So in sk_msg_recvmsg(),
if copy is zero, that means it's a zero length skb, skip invoking
copy_page_to_iter(). We are using the EFAULT return triggered by
copy_page_to_iter to check for is_fin in tcp_bpf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228565">SUSE bug 1228565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filelock: fix potential use-after-free in posix_lock_inode

Light Hsieh reported a KASAN UAF warning in trace_posix_lock_inode().
The request pointer had been changed earlier to point to a lock entry
that was added to the inode's list. However, before the tracepoint could
fire, another task raced in and freed that lock.

Fix this by moving the tracepoint inside the spinlock, which should
ensure that this doesn't happen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228486">SUSE bug 1228486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41050" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41050" ref_url="https://www.suse.com/security/cve/CVE-2024-41050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: cyclic allocation of msg_id to avoid reuse

Reusing the msg_id after a maliciously completed reopen request may cause
a read request to remain unprocessed and result in a hung, as shown below:

       t1       |      t2       |      t3
-------------------------------------------------
cachefiles_ondemand_select_req
 cachefiles_ondemand_object_is_close(A)
 cachefiles_ondemand_set_object_reopening(A)
 queue_work(fscache_object_wq, &amp;info-&gt;work)
                ondemand_object_worker
                 cachefiles_ondemand_init_object(A)
                  cachefiles_ondemand_send_req(OPEN)
                    // get msg_id 6
                    wait_for_completion(&amp;req_A-&gt;done)
cachefiles_ondemand_daemon_read
 // read msg_id 6 req_A
 cachefiles_ondemand_get_fd
 copy_to_user
                                // Malicious completion msg_id 6
                                copen 6,-1
                                cachefiles_ondemand_copen
                                 complete(&amp;req_A-&gt;done)
                                 // will not set the object to close
                                 // because ondemand_id &amp;&amp; fd is valid.

                // ondemand_object_worker() is done
                // but the object is still reopening.

                                // new open req_B
                                cachefiles_ondemand_init_object(B)
                                 cachefiles_ondemand_send_req(OPEN)
                                 // reuse msg_id 6
process_open_req
 copen 6,A.size
 // The expected failed copen was executed successfully

Expect copen to fail, and when it does, it closes fd, which sets the
object to close, and then close triggers reopen again. However, due to
msg_id reuse resulting in a successful copen, the anonymous fd is not
closed until the daemon exits. Therefore read requests waiting for reopen
to complete may trigger hung task.

To avoid this issue, allocate the msg_id cyclically to avoid reusing the
msg_id for a very short duration of time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41050/">CVE-2024-41050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41050">CVE-2024-41050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228499">SUSE bug 1228499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41051" ref_url="https://www.suse.com/security/cve/CVE-2024-41051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: wait for ondemand_object_worker to finish when dropping object

When queuing ondemand_object_worker() to re-open the object,
cachefiles_object is not pinned. The cachefiles_object may be freed when
the pending read request is completed intentionally and the related
erofs is umounted. If ondemand_object_worker() runs after the object is
freed, it will incur use-after-free problem as shown below.

process A  processs B  process C  process D

cachefiles_ondemand_send_req()
// send a read req X
// wait for its completion

           // close ondemand fd
           cachefiles_ondemand_fd_release()
           // set object as CLOSE

                       cachefiles_ondemand_daemon_read()
                       // set object as REOPENING
                       queue_work(fscache_wq, &amp;info-&gt;ondemand_work)

                                // close /dev/cachefiles
                                cachefiles_daemon_release
                                cachefiles_flush_reqs
                                complete(&amp;req-&gt;done)

// read req X is completed
// umount the erofs fs
cachefiles_put_object()
// object will be freed
cachefiles_ondemand_deinit_obj_info()
kmem_cache_free(object)
                       // both info and object are freed
                       ondemand_object_worker()

When dropping an object, it is no longer necessary to reopen the object,
so use cancel_work_sync() to cancel or wait for ondemand_object_worker()
to finish.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-41051/">CVE-2024-41051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41051">CVE-2024-41051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228468">SUSE bug 1228468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41052" ref_url="https://www.suse.com/security/cve/CVE-2024-41052" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Init the count variable in collecting hot-reset devices

The count variable is used without initialization, it results in mistakes
in the device counting and crashes the userspace if the get hot reset info
path is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-41052/">CVE-2024-41052 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41052">CVE-2024-41052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228464">SUSE bug 1228464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41053" ref_url="https://www.suse.com/security/cve/CVE-2024-41053" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix ufshcd_abort_one racing issue

When ufshcd_abort_one is racing with the completion ISR, the completed tag
of the request's mq_hctx pointer will be set to NULL by ISR.  Return
success when request is completed by ISR because ufshcd_abort_one does not
need to do anything.

The racing flow is:

Thread A
ufshcd_err_handler					step 1
	...
	ufshcd_abort_one
		ufshcd_try_to_abort_task
			ufshcd_cmd_inflight(true)	step 3
		ufshcd_mcq_req_to_hwq
			blk_mq_unique_tag
				rq-&gt;mq_hctx-&gt;queue_num	step 5

Thread B
ufs_mtk_mcq_intr(cq complete ISR)			step 2
	scsi_done
		...
		__blk_mq_free_request
			rq-&gt;mq_hctx = NULL;		step 4

Below is KE back trace.
  ufshcd_try_to_abort_task: cmd at tag 41 not pending in the device.
  ufshcd_try_to_abort_task: cmd at tag=41 is cleared.
  Aborting tag 41 / CDB 0x28 succeeded
  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194
  pc : [0xffffffddd7a79bf8] blk_mq_unique_tag+0x8/0x14
  lr : [0xffffffddd6155b84] ufshcd_mcq_req_to_hwq+0x1c/0x40 [ufs_mediatek_mod_ise]
   do_mem_abort+0x58/0x118
   el1_abort+0x3c/0x5c
   el1h_64_sync_handler+0x54/0x90
   el1h_64_sync+0x68/0x6c
   blk_mq_unique_tag+0x8/0x14
   ufshcd_err_handler+0xae4/0xfa8 [ufs_mediatek_mod_ise]
   process_one_work+0x208/0x4fc
   worker_thread+0x228/0x438
   kthread+0x104/0x1d4
   ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41053/">CVE-2024-41053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41053">CVE-2024-41053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228519">SUSE bug 1228519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41054</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41054" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41054" ref_url="https://www.suse.com/security/cve/CVE-2024-41054" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix ufshcd_clear_cmd racing issue

When ufshcd_clear_cmd is racing with the completion ISR, the completed tag
of the request's mq_hctx pointer will be set to NULL by the ISR.  And
ufshcd_clear_cmd's call to ufshcd_mcq_req_to_hwq will get NULL pointer KE.
Return success when the request is completed by ISR because sq does not
need cleanup.

The racing flow is:

Thread A
ufshcd_err_handler					step 1
	ufshcd_try_to_abort_task
		ufshcd_cmd_inflight(true)		step 3
		ufshcd_clear_cmd
			...
			ufshcd_mcq_req_to_hwq
			blk_mq_unique_tag
				rq-&gt;mq_hctx-&gt;queue_num	step 5

Thread B
ufs_mtk_mcq_intr(cq complete ISR)			step 2
	scsi_done
		...
		__blk_mq_free_request
			rq-&gt;mq_hctx = NULL;		step 4

Below is KE back trace:

  ufshcd_try_to_abort_task: cmd pending in the device. tag = 6
  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000194
   pc : [0xffffffd589679bf8] blk_mq_unique_tag+0x8/0x14
   lr : [0xffffffd5862f95b4] ufshcd_mcq_sq_cleanup+0x6c/0x1cc [ufs_mediatek_mod_ise]
   Workqueue: ufs_eh_wq_0 ufshcd_err_handler [ufs_mediatek_mod_ise]
   Call trace:
    dump_backtrace+0xf8/0x148
    show_stack+0x18/0x24
    dump_stack_lvl+0x60/0x7c
    dump_stack+0x18/0x3c
    mrdump_common_die+0x24c/0x398 [mrdump]
    ipanic_die+0x20/0x34 [mrdump]
    notify_die+0x80/0xd8
    die+0x94/0x2b8
    __do_kernel_fault+0x264/0x298
    do_page_fault+0xa4/0x4b8
    do_translation_fault+0x38/0x54
    do_mem_abort+0x58/0x118
    el1_abort+0x3c/0x5c
    el1h_64_sync_handler+0x54/0x90
    el1h_64_sync+0x68/0x6c
    blk_mq_unique_tag+0x8/0x14
    ufshcd_clear_cmd+0x34/0x118 [ufs_mediatek_mod_ise]
    ufshcd_try_to_abort_task+0x2c8/0x5b4 [ufs_mediatek_mod_ise]
    ufshcd_err_handler+0xa7c/0xfa8 [ufs_mediatek_mod_ise]
    process_one_work+0x208/0x4fc
    worker_thread+0x228/0x438
    kthread+0x104/0x1d4
    ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-41054/">CVE-2024-41054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41054">CVE-2024-41054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228461">SUSE bug 1228461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41055" ref_url="https://www.suse.com/security/cve/CVE-2024-41055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: prevent derefencing NULL ptr in pfn_section_valid()

Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing
memory_section-&gt;usage") changed pfn_section_valid() to add a READ_ONCE()
call around "ms-&gt;usage" to fix a race with section_deactivate() where
ms-&gt;usage can be cleared.  The READ_ONCE() call, by itself, is not enough
to prevent NULL pointer dereference.  We need to check its value before
dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41055/">CVE-2024-41055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228521">SUSE bug 1228521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files

Use strnlen() instead of strlen() on the algorithm and coefficient name
string arrays in V1 wmfw files.

In V1 wmfw files the name is a NUL-terminated string in a fixed-size
array. cs_dsp should protect against overrunning the array if the NUL
terminator is missing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228480">SUSE bug 1228480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()

We got the following issue in our fault injection stress test:

==================================================================
BUG: KASAN: slab-use-after-free in cachefiles_withdraw_cookie+0x4d9/0x600
Read of size 8 at addr ffff888118efc000 by task kworker/u78:0/109

CPU: 13 PID: 109 Comm: kworker/u78:0 Not tainted 6.8.0-dirty #566
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 cachefiles_withdraw_cookie+0x4d9/0x600
 fscache_cookie_state_machine+0x5c8/0x1230
 fscache_cookie_worker+0x91/0x1c0
 process_one_work+0x7fa/0x1800
 [...]

Allocated by task 117:
 kmalloc_trace+0x1b3/0x3c0
 cachefiles_acquire_volume+0xf3/0x9c0
 fscache_create_volume_work+0x97/0x150
 process_one_work+0x7fa/0x1800
 [...]

Freed by task 120301:
 kfree+0xf1/0x2c0
 cachefiles_withdraw_cache+0x3fa/0x920
 cachefiles_put_unbind_pincount+0x1f6/0x250
 cachefiles_daemon_release+0x13b/0x290
 __fput+0x204/0xa00
 task_work_run+0x139/0x230
 do_exit+0x87a/0x29b0
 [...]
==================================================================

Following is the process that triggers the issue:

           p1                |             p2
------------------------------------------------------------
                              fscache_begin_lookup
                               fscache_begin_volume_access
                                fscache_cache_is_live(fscache_cache)
cachefiles_daemon_release
 cachefiles_put_unbind_pincount
  cachefiles_daemon_unbind
   cachefiles_withdraw_cache
    fscache_withdraw_cache
     fscache_set_cache_state(cache, FSCACHE_CACHE_IS_WITHDRAWN);
    cachefiles_withdraw_objects(cache)
    fscache_wait_for_objects(fscache)
      atomic_read(&amp;fscache_cache-&gt;object_count) == 0
                              fscache_perform_lookup
                               cachefiles_lookup_cookie
                                cachefiles_alloc_object
                                 refcount_set(&amp;object-&gt;ref, 1);
                                 object-&gt;volume = volume
                                 fscache_count_object(vcookie-&gt;cache);
                                  atomic_inc(&amp;fscache_cache-&gt;object_count)
    cachefiles_withdraw_volumes
     cachefiles_withdraw_volume
      fscache_withdraw_volume
      __cachefiles_free_volume
       kfree(cachefiles_volume)
                              fscache_cookie_state_machine
                               cachefiles_withdraw_cookie
                                cache = object-&gt;volume-&gt;cache;
                                // cachefiles_volume UAF !!!

After setting FSCACHE_CACHE_IS_WITHDRAWN, wait for all the cookie lookups
to complete first, and then wait for fscache_cache-&gt;object_count == 0 to
avoid the cookie exiting after the volume has been freed and triggering
the above issue. Therefore call fscache_withdraw_volume() before calling
cachefiles_withdraw_objects().

This way, after setting FSCACHE_CACHE_IS_WITHDRAWN, only the following two
cases will occur:
1) fscache_begin_lookup fails in fscache_begin_volume_access().
2) fscache_withdraw_volume() will ensure that fscache_count_object() has
   been executed before calling fscache_wait_for_objects().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228462">SUSE bug 1228462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229275">SUSE bug 1229275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix slab-use-after-free in fscache_withdraw_volume()

We got the following issue in our fault injection stress test:

==================================================================
BUG: KASAN: slab-use-after-free in fscache_withdraw_volume+0x2e1/0x370
Read of size 4 at addr ffff88810680be08 by task ondemand-04-dae/5798

CPU: 0 PID: 5798 Comm: ondemand-04-dae Not tainted 6.8.0-dirty #565
Call Trace:
 kasan_check_range+0xf6/0x1b0
 fscache_withdraw_volume+0x2e1/0x370
 cachefiles_withdraw_volume+0x31/0x50
 cachefiles_withdraw_cache+0x3ad/0x900
 cachefiles_put_unbind_pincount+0x1f6/0x250
 cachefiles_daemon_release+0x13b/0x290
 __fput+0x204/0xa00
 task_work_run+0x139/0x230

Allocated by task 5820:
 __kmalloc+0x1df/0x4b0
 fscache_alloc_volume+0x70/0x600
 __fscache_acquire_volume+0x1c/0x610
 erofs_fscache_register_volume+0x96/0x1a0
 erofs_fscache_register_fs+0x49a/0x690
 erofs_fc_fill_super+0x6c0/0xcc0
 vfs_get_super+0xa9/0x140
 vfs_get_tree+0x8e/0x300
 do_new_mount+0x28c/0x580
 [...]

Freed by task 5820:
 kfree+0xf1/0x2c0
 fscache_put_volume.part.0+0x5cb/0x9e0
 erofs_fscache_unregister_fs+0x157/0x1b0
 erofs_kill_sb+0xd9/0x1c0
 deactivate_locked_super+0xa3/0x100
 vfs_get_super+0x105/0x140
 vfs_get_tree+0x8e/0x300
 do_new_mount+0x28c/0x580
 [...]
==================================================================

Following is the process that triggers the issue:

        mount failed         |         daemon exit
------------------------------------------------------------
 deactivate_locked_super        cachefiles_daemon_release
  erofs_kill_sb
   erofs_fscache_unregister_fs
    fscache_relinquish_volume
     __fscache_relinquish_volume
      fscache_put_volume(fscache_volume, fscache_volume_put_relinquish)
       zero = __refcount_dec_and_test(&amp;fscache_volume-&gt;ref, &amp;ref);
                                 cachefiles_put_unbind_pincount
                                  cachefiles_daemon_unbind
                                   cachefiles_withdraw_cache
                                    cachefiles_withdraw_volumes
                                     list_del_init(&amp;volume-&gt;cache_link)
       fscache_free_volume(fscache_volume)
        cache-&gt;ops-&gt;free_volume
         cachefiles_free_volume
          list_del_init(&amp;cachefiles_volume-&gt;cache_link);
        kfree(fscache_volume)
                                     cachefiles_withdraw_volume
                                      fscache_withdraw_volume
                                       fscache_volume-&gt;n_accesses
                                       // fscache_volume UAF !!!

The fscache_volume in cache-&gt;volumes must not have been freed yet, but its
reference count may be 0. So use the new fscache_try_get_volume() helper
function try to get its reference count.

If the reference count of fscache_volume is 0, fscache_put_volume() is
freeing it, so wait for it to be removed from cache-&gt;volumes.

If its reference count is not 0, call cachefiles_withdraw_volume() with
reference count protection to avoid the above issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228459">SUSE bug 1228459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: fix uninit-value in copy_name

[syzbot reported]
BUG: KMSAN: uninit-value in sized_strscpy+0xc4/0x160
 sized_strscpy+0xc4/0x160
 copy_name+0x2af/0x320 fs/hfsplus/xattr.c:411
 hfsplus_listxattr+0x11e9/0x1a50 fs/hfsplus/xattr.c:750
 vfs_listxattr fs/xattr.c:493 [inline]
 listxattr+0x1f3/0x6b0 fs/xattr.c:840
 path_listxattr fs/xattr.c:864 [inline]
 __do_sys_listxattr fs/xattr.c:876 [inline]
 __se_sys_listxattr fs/xattr.c:873 [inline]
 __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873
 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3877 [inline]
 slab_alloc_node mm/slub.c:3918 [inline]
 kmalloc_trace+0x57b/0xbe0 mm/slub.c:4065
 kmalloc include/linux/slab.h:628 [inline]
 hfsplus_listxattr+0x4cc/0x1a50 fs/hfsplus/xattr.c:699
 vfs_listxattr fs/xattr.c:493 [inline]
 listxattr+0x1f3/0x6b0 fs/xattr.c:840
 path_listxattr fs/xattr.c:864 [inline]
 __do_sys_listxattr fs/xattr.c:876 [inline]
 __se_sys_listxattr fs/xattr.c:873 [inline]
 __x64_sys_listxattr+0x16b/0x2f0 fs/xattr.c:873
 x64_sys_call+0x2ba0/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:195
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
[Fix]
When allocating memory to strbuf, initialize memory to 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228573">SUSE bug 1228573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: check bo_va-&gt;bo is non-NULL before using it

The call to radeon_vm_clear_freed might clear bo_va-&gt;bo, so
we have to check it before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228567">SUSE bug 1228567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41061" ref_url="https://www.suse.com/security/cve/CVE-2024-41061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport

[Why]
Potential out of bounds access in dml2_calculate_rq_and_dlg_params()
because the value of out_lowest_state_idx used as an index for FCLKChangeSupport
array can be greater than 1.

[How]
Currently dml2 core specifies identical values for all FCLKChangeSupport
elements. Always use index 0 in the condition to avoid out of bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41061/">CVE-2024-41061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41061">CVE-2024-41061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228572">SUSE bug 1228572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bluetooth/l2cap: sync sock recv cb and release

The problem occurs between the system call to close the sock and hci_rx_work,
where the former releases the sock and the latter accesses it without lock protection.

           CPU0                       CPU1
           ----                       ----
           sock_close                 hci_rx_work
	   l2cap_sock_release         hci_acldata_packet
	   l2cap_sock_kill            l2cap_recv_frame
	   sk_free                    l2cap_conless_channel
	                              l2cap_sock_recv_cb

If hci_rx_work processes the data that needs to be received before the sock is
closed, then everything is normal; Otherwise, the work thread may access the
released sock when receiving data.

Add a chan mutex in the rx callback of the sock to achieve synchronization between
the sock release and recv cb.

Sock is dead, so set chan data to NULL, avoid others use invalid sock pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228578">SUSE bug 1228578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41063" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: cancel all works upon hci_unregister_dev()

syzbot is reporting that calling hci_release_dev() from hci_error_reset()
due to hci_dev_put() from hci_error_reset() can cause deadlock at
destroy_workqueue(), for hci_error_reset() is called from
hdev-&gt;req_workqueue which destroy_workqueue() needs to flush.

We need to make sure that hdev-&gt;{rx_work,cmd_work,tx_work} which are
queued into hdev-&gt;workqueue and hdev-&gt;{power_on,error_reset} which are
queued into hdev-&gt;req_workqueue are no longer running by the moment

       destroy_workqueue(hdev-&gt;workqueue);
       destroy_workqueue(hdev-&gt;req_workqueue);

are called from hci_release_dev().

Call cancel_work_sync() on these work items from hci_unregister_dev()
as soon as hdev-&gt;list is removed from hci_dev_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228580">SUSE bug 1228580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/eeh: avoid possible crash when edev-&gt;pdev changes

If a PCI device is removed during eeh_pe_report_edev(), edev-&gt;pdev
will change and can cause a crash, hold the PCI rescan/remove lock
while taking a copy of edev-&gt;pdev-&gt;bus.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228599">SUSE bug 1228599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Whitelist dtl slub object for copying to userspace

Reading the dispatch trace log from /sys/kernel/debug/powerpc/dtl/cpu-*
results in a BUG() when the config CONFIG_HARDENED_USERCOPY is enabled as
shown below.

    kernel BUG at mm/usercopy.c:102!
    Oops: Exception in kernel mode, sig: 5 [#1]
    LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries
    Modules linked in: xfs libcrc32c dm_service_time sd_mod t10_pi sg ibmvfc
    scsi_transport_fc ibmveth pseries_wdt dm_multipath dm_mirror dm_region_hash dm_log dm_mod fuse
    CPU: 27 PID: 1815 Comm: python3 Not tainted 6.10.0-rc3 #85
    Hardware name: IBM,9040-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_042) hv:phyp pSeries
    NIP:  c0000000005d23d4 LR: c0000000005d23d0 CTR: 00000000006ee6f8
    REGS: c000000120c078c0 TRAP: 0700   Not tainted  (6.10.0-rc3)
    MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 2828220f  XER: 0000000e
    CFAR: c0000000001fdc80 IRQMASK: 0
    [ ... GPRs omitted ... ]
    NIP [c0000000005d23d4] usercopy_abort+0x78/0xb0
    LR [c0000000005d23d0] usercopy_abort+0x74/0xb0
    Call Trace:
     usercopy_abort+0x74/0xb0 (unreliable)
     __check_heap_object+0xf8/0x120
     check_heap_object+0x218/0x240
     __check_object_size+0x84/0x1a4
     dtl_file_read+0x17c/0x2c4
     full_proxy_read+0x8c/0x110
     vfs_read+0xdc/0x3a0
     ksys_read+0x84/0x144
     system_call_exception+0x124/0x330
     system_call_vectored_common+0x15c/0x2ec
    --- interrupt: 3000 at 0x7fff81f3ab34

Commit 6d07d1cd300f ("usercopy: Restrict non-usercopy caches to size 0")
requires that only whitelisted areas in slab/slub objects can be copied to
userspace when usercopy hardening is enabled using CONFIG_HARDENED_USERCOPY.
Dtl contains hypervisor dispatch events which are expected to be read by
privileged users. Hence mark this safe for user access.
Specify useroffset=0 and usersize=DISPATCH_LOG_BYTES to whitelist the
entire object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228636">SUSE bug 1228636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: Add tx check to prevent skb leak

Below is a summary of how the driver stores a reference to an skb during
transmit:
    tx_buff[free_map[consumer_index]]-&gt;skb = new_skb;
    free_map[consumer_index] = IBMVNIC_INVALID_MAP;
    consumer_index ++;
Where variable data looks like this:
    free_map == [4, IBMVNIC_INVALID_MAP, IBMVNIC_INVALID_MAP, 0, 3]
                                               	consumer_index^
    tx_buff == [skb=null, skb=&lt;ptr&gt;, skb=&lt;ptr&gt;, skb=null, skb=null]

The driver has checks to ensure that free_map[consumer_index] pointed to
a valid index but there was no check to ensure that this index pointed
to an unused/null skb address. So, if, by some chance, our free_map and
tx_buff lists become out of sync then we were previously risking an
skb memory leak. This could then cause tcp congestion control to stop
sending packets, eventually leading to ETIMEDOUT.

Therefore, add a conditional to ensure that the skb address is null. If
not then warn the user (because this is still a bug that should be
patched) and free the old pointer to prevent memleak/tcp problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228640">SUSE bug 1228640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41067" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41067" ref_url="https://www.suse.com/security/cve/CVE-2024-41067" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: scrub: handle RST lookup error correctly

[BUG]
When running btrfs/060 with forced RST feature, it would crash the
following ASSERT() inside scrub_read_endio():

	ASSERT(sector_nr &lt; stripe-&gt;nr_sectors);

Before that, we would have tree dump from
btrfs_get_raid_extent_offset(), as we failed to find the RST entry for
the range.

[CAUSE]
Inside scrub_submit_extent_sector_read() every time we allocated a new
bbio we immediately called btrfs_map_block() to make sure there was some
RST range covering the scrub target.

But if btrfs_map_block() fails, we immediately call endio for the bbio,
while the bbio is newly allocated, it's completely empty.

Then inside scrub_read_endio(), we go through the bvecs to find
the sector number (as bi_sector is no longer reliable if the bio is
submitted to lower layers).

And since the bio is empty, such bvecs iteration would not find any
sector matching the sector, and return sector_nr == stripe-&gt;nr_sectors,
triggering the ASSERT().

[FIX]
Instead of calling btrfs_map_block() after allocating a new bbio, call
btrfs_map_block() first.

Since our only objective of calling btrfs_map_block() is only to update
stripe_len, there is really no need to do that after btrfs_alloc_bio().

This new timing would avoid the problem of handling empty bbio
completely, and in fact fixes a possible race window for the old code,
where if the submission thread is the only owner of the pending_io, the
scrub would never finish (since we didn't decrease the pending_io
counter).

Although the root cause of RST lookup failure still needs to be
addressed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-41067/">CVE-2024-41067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41067">CVE-2024-41067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228551">SUSE bug 1228551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Fix sclp_init() cleanup on failure

If sclp_init() fails it only partially cleans up: if there are multiple
failing calls to sclp_init() sclp_state_change_event will be added several
times to sclp_reg_list, which results in the following warning:

------------[ cut here ]------------
list_add double add: new=000003ffe1598c10, prev=000003ffe1598bf0, next=000003ffe1598c10.
WARNING: CPU: 0 PID: 1 at lib/list_debug.c:35 __list_add_valid_or_report+0xde/0xf8
CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-rc3
Krnl PSW : 0404c00180000000 000003ffe0d6076a (__list_add_valid_or_report+0xe2/0xf8)
           R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
...
Call Trace:
 [&lt;000003ffe0d6076a&gt;] __list_add_valid_or_report+0xe2/0xf8
([&lt;000003ffe0d60766&gt;] __list_add_valid_or_report+0xde/0xf8)
 [&lt;000003ffe0a8d37e&gt;] sclp_init+0x40e/0x450
 [&lt;000003ffe00009f2&gt;] do_one_initcall+0x42/0x1e0
 [&lt;000003ffe15b77a6&gt;] do_initcalls+0x126/0x150
 [&lt;000003ffe15b7a0a&gt;] kernel_init_freeable+0x1ba/0x1f8
 [&lt;000003ffe0d6650e&gt;] kernel_init+0x2e/0x180
 [&lt;000003ffe000301c&gt;] __ret_from_fork+0x3c/0x60
 [&lt;000003ffe0d759ca&gt;] ret_from_fork+0xa/0x30

Fix this by removing sclp_state_change_event from sclp_reg_list when
sclp_init() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228579">SUSE bug 1228579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: topology: Fix references to freed memory

Most users after parsing a topology file, release memory used by it, so
having pointer references directly into topology file contents is wrong.
Use devm_kmemdup(), to allocate memory as needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228645">SUSE bug 1228645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()

Al reported a possible use-after-free (UAF) in kvm_spapr_tce_attach_iommu_group().

It looks up `stt` from tablefd, but then continues to use it after doing
fdput() on the returned fd. After the fdput() the tablefd is free to be
closed by another thread. The close calls kvm_spapr_tce_release() and
then release_spapr_tce_table() (via call_rcu()) which frees `stt`.

Although there are calls to rcu_read_lock() in
kvm_spapr_tce_attach_iommu_group() they are not sufficient to prevent
the UAF, because `stt` is used outside the locked regions.

With an artifcial delay after the fdput() and a userspace program which
triggers the race, KASAN detects the UAF:

  BUG: KASAN: slab-use-after-free in kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]
  Read of size 4 at addr c000200027552c30 by task kvm-vfio/2505
  CPU: 54 PID: 2505 Comm: kvm-vfio Not tainted 6.10.0-rc3-next-20240612-dirty #1
  Hardware name: 8335-GTH POWER9 0x4e1202 opal:skiboot-v6.5.3-35-g1851b2a06 PowerNV
  Call Trace:
    dump_stack_lvl+0xb4/0x108 (unreliable)
    print_report+0x2b4/0x6ec
    kasan_report+0x118/0x2b0
    __asan_load4+0xb8/0xd0
    kvm_spapr_tce_attach_iommu_group+0x298/0x720 [kvm]
    kvm_vfio_set_attr+0x524/0xac0 [kvm]
    kvm_device_ioctl+0x144/0x240 [kvm]
    sys_ioctl+0x62c/0x1810
    system_call_exception+0x190/0x440
    system_call_vectored_common+0x15c/0x2ec
  ...
  Freed by task 0:
   ...
   kfree+0xec/0x3e0
   release_spapr_tce_table+0xd4/0x11c [kvm]
   rcu_core+0x568/0x16a0
   handle_softirqs+0x23c/0x920
   do_softirq_own_stack+0x6c/0x90
   do_softirq_own_stack+0x58/0x90
   __irq_exit_rcu+0x218/0x2d0
   irq_exit+0x30/0x80
   arch_local_irq_restore+0x128/0x230
   arch_local_irq_enable+0x1c/0x30
   cpuidle_enter_state+0x134/0x5cc
   cpuidle_enter+0x6c/0xb0
   call_cpuidle+0x7c/0x100
   do_idle+0x394/0x410
   cpu_startup_entry+0x60/0x70
   start_secondary+0x3fc/0x410
   start_secondary_prolog+0x10/0x14

Fix it by delaying the fdput() until `stt` is no longer in use, which
is effectively the entire function. To keep the patch minimal add a call
to fdput() at each of the existing return paths. Future work can convert
the function to goto or __cleanup style cleanup.

With the fix in place the test case no longer triggers the UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228581">SUSE bug 1228581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Avoid address calculations via out of bounds array indexing

req-&gt;n_channels must be set before req-&gt;channels[] can be used.

This patch fixes one of the issues encountered in [1].

[   83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4
[   83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]'
[...]
[   83.964264] Call Trace:
[   83.964267]  &lt;TASK&gt;
[   83.964269]  dump_stack_lvl+0x3f/0xc0
[   83.964274]  __ubsan_handle_out_of_bounds+0xec/0x110
[   83.964278]  ieee80211_prep_hw_scan+0x2db/0x4b0
[   83.964281]  __ieee80211_start_scan+0x601/0x990
[   83.964291]  nl80211_trigger_scan+0x874/0x980
[   83.964295]  genl_family_rcv_msg_doit+0xe8/0x160
[   83.964298]  genl_rcv_msg+0x240/0x270
[...]

[1] https://bugzilla.kernel.org/show_bug.cgi?id=218810
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: wext: add extra SIOCSIWSCAN data check

In 'cfg80211_wext_siwscan()', add extra check whether number of
channels passed via 'ioctl(sock, SIOCSIWSCAN, ...)' doesn't exceed
IW_MAX_FREQUENCIES and reject invalid request with -EINVAL otherwise.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228626">SUSE bug 1228626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: avoid double free special payload

If a discard request needs to be retried, and that retry may fail before
a new special payload is added, a double free will result. Clear the
RQF_SPECIAL_LOAD when the request is cleaned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228635">SUSE bug 1228635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41074" ref_url="https://www.suse.com/security/cve/CVE-2024-41074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: Set object to close if ondemand_id &lt; 0 in copen

If copen is maliciously called in the user mode, it may delete the request
corresponding to the random id. And the request may have not been read yet.

Note that when the object is set to reopen, the open request will be done
with the still reopen state in above case. As a result, the request
corresponding to this object is always skipped in select_req function, so
the read request is never completed and blocks other process.

Fix this issue by simply set object to close if its id &lt; 0 in copen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41074/">CVE-2024-41074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41074">CVE-2024-41074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228643">SUSE bug 1228643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41075" ref_url="https://www.suse.com/security/cve/CVE-2024-41075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: add consistency check for copen/cread

This prevents malicious processes from completing random copen/cread
requests and crashing the system. Added checks are listed below:

  * Generic, copen can only complete open requests, and cread can only
    complete read requests.
  * For copen, ondemand_id must not be 0, because this indicates that the
    request has not been read by the daemon.
  * For cread, the object corresponding to fd and req should be the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41075/">CVE-2024-41075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41075">CVE-2024-41075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228646">SUSE bug 1228646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix memory leak in nfs4_set_security_label

We leak nfs_fattr and nfs4_label every time we set a security xattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228649">SUSE bug 1228649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix quota root leak after quota disable failure

If during the quota disable we fail when cleaning the quota tree or when
deleting the root from the root tree, we jump to the 'out' label without
ever dropping the reference on the quota root, resulting in a leak of the
root since fs_info-&gt;quota_root is no longer pointing to the root (we have
set it to NULL just before those steps).

Fix this by always doing a btrfs_put_root() call under the 'out' label.
This is a problem that exists since qgroups were first added in 2012 by
commit bed92eae26cc ("Btrfs: qgroup implementation and prototypes"), but
back then we missed a kfree on the quota root and free_extent_buffer()
calls on its root and commit root nodes, since back then roots were not
yet reference counted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228655">SUSE bug 1228655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: always initialize cqe.result

The spec doesn't mandate that the first two double words (aka results)
for the command queue entry need to be set to 0 when they are not
used (not specified). Though, the target implemention returns 0 for TCP
and FC but not for RDMA.

Let's make RDMA behave the same and thus explicitly initializing the
result field. This prevents leaking any data from the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228615">SUSE bug 1228615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix possible deadlock in io_register_iowq_max_workers()

The io_register_iowq_max_workers() function calls io_put_sq_data(),
which acquires the sqd-&gt;lock without releasing the uring_lock.
Similar to the commit 009ad9f0c6ee ("io_uring: drop ctx-&gt;uring_lock
before acquiring sqd-&gt;lock"), this can lead to a potential deadlock
situation.

To resolve this issue, the uring_lock is released before calling
io_put_sq_data(), and then it is re-acquired after the function call.

This change ensures that the locks are acquired in the correct
order, preventing the possibility of a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228616">SUSE bug 1228616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ila: block BH in ila_output()

As explained in commit 1378817486d6 ("tipc: block BH
before using dst_cache"), net/core/dst_cache.c
helpers need to be called with BH disabled.

ila_output() is called from lwtunnel_output()
possibly from process context, and under rcu_read_lock().

We might be interrupted by a softirq, re-enter ila_output()
and corrupt dst_cache data structures.

Fix the race by using local_bh_disable().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228617">SUSE bug 1228617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fabrics: use reserved tag for reg read/write command

In some scenarios, if too many commands are issued by nvme command in
the same time by user tasks, this may exhaust all tags of admin_q. If
a reset (nvme reset or IO timeout) occurs before these commands finish,
reconnect routine may fail to update nvme regs due to insufficient tags,
which will cause kernel hang forever. In order to workaround this issue,
maybe we can let reg_read32()/reg_read64()/reg_write32() use reserved
tags. This maybe safe for nvmf:

1. For the disable ctrl path,  we will not issue connect command
2. For the enable ctrl / fw activate path, since connect and reg_xx()
   are called serially.

So the reserved tags may still be enough while reg_xx() use reserved tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228620">SUSE bug 1228620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41083" ref_url="https://www.suse.com/security/cve/CVE-2024-41083" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix netfs_page_mkwrite() to check folio-&gt;mapping is valid

Fix netfs_page_mkwrite() to check that folio-&gt;mapping is valid once it has
taken the folio lock (as filemap_page_mkwrite() does).  Without this,
generic/247 occasionally oopses with something like the following:

    BUG: kernel NULL pointer dereference, address: 0000000000000000
    #PF: supervisor read access in kernel mode
    #PF: error_code(0x0000) - not-present page

    RIP: 0010:trace_event_raw_event_netfs_folio+0x61/0xc0
    ...
    Call Trace:
     &lt;TASK&gt;
     ? __die_body+0x1a/0x60
     ? page_fault_oops+0x6e/0xa0
     ? exc_page_fault+0xc2/0xe0
     ? asm_exc_page_fault+0x22/0x30
     ? trace_event_raw_event_netfs_folio+0x61/0xc0
     trace_netfs_folio+0x39/0x40
     netfs_page_mkwrite+0x14c/0x1d0
     do_page_mkwrite+0x50/0x90
     do_pte_missing+0x184/0x200
     __handle_mm_fault+0x42d/0x500
     handle_mm_fault+0x121/0x1f0
     do_user_addr_fault+0x23e/0x3c0
     exc_page_fault+0xc2/0xe0
     asm_exc_page_fault+0x22/0x30

This is due to the invalidate_inode_pages2_range() issued at the end of the
DIO write interfering with the mmap'd writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41083/">CVE-2024-41083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41083">CVE-2024-41083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228476">SUSE bug 1228476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41084" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41084" ref_url="https://www.suse.com/security/cve/CVE-2024-41084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/region: Avoid null pointer dereference in region lookup

cxl_dpa_to_region() looks up a region based on a memdev and DPA.
It wrongly assumes an endpoint found mapping the DPA is also of
a fully assembled region. When not true it leads to a null pointer
dereference looking up the region name.

This appears during testing of region lookup after a failure to
assemble a BIOS defined region or if the lookup raced with the
assembly of the BIOS defined region.

Failure to clean up BIOS defined regions that fail assembly is an
issue in itself and a fix to that problem will alleviate some of
the impact. It will not alleviate the race condition so let's harden
this path.

The behavior change is that the kernel oops due to a null pointer
dereference is replaced with a dev_dbg() message noting that an
endpoint was mapped.

Additional comments are added so that future users of this function
can more clearly understand what it provides.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41084/">CVE-2024-41084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41084">CVE-2024-41084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228472">SUSE bug 1228472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41085" ref_url="https://www.suse.com/security/cve/CVE-2024-41085" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/mem: Fix no cxl_nvd during pmem region auto-assembling

When CXL subsystem is auto-assembling a pmem region during cxl
endpoint port probing, always hit below calltrace.

 BUG: kernel NULL pointer dereference, address: 0000000000000078
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 RIP: 0010:cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x24/0x70
  ? page_fault_oops+0x82/0x160
  ? do_user_addr_fault+0x65/0x6b0
  ? exc_page_fault+0x7d/0x170
  ? asm_exc_page_fault+0x26/0x30
  ? cxl_pmem_region_probe+0x22e/0x360 [cxl_pmem]
  ? cxl_pmem_region_probe+0x1ac/0x360 [cxl_pmem]
  cxl_bus_probe+0x1b/0x60 [cxl_core]
  really_probe+0x173/0x410
  ? __pfx___device_attach_driver+0x10/0x10
  __driver_probe_device+0x80/0x170
  driver_probe_device+0x1e/0x90
  __device_attach_driver+0x90/0x120
  bus_for_each_drv+0x84/0xe0
  __device_attach+0xbc/0x1f0
  bus_probe_device+0x90/0xa0
  device_add+0x51c/0x710
  devm_cxl_add_pmem_region+0x1b5/0x380 [cxl_core]
  cxl_bus_probe+0x1b/0x60 [cxl_core]

The cxl_nvd of the memdev needs to be available during the pmem region
probe. Currently the cxl_nvd is registered after the endpoint port probe.
The endpoint probe, in the case of autoassembly of regions, can cause a
pmem region probe requiring the not yet available cxl_nvd. Adjust the
sequence so this dependency is met.

This requires adding a port parameter to cxl_find_nvdimm_bridge() that
can be used to query the ancestor root port. The endpoint port is not
yet available, but will share a common ancestor with its parent, so
start the query from there instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41085/">CVE-2024-41085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41085">CVE-2024-41085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228478">SUSE bug 1228478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41086" ref_url="https://www.suse.com/security/cve/CVE-2024-41086" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcachefs: Fix sb_field_downgrade validation

- bch2_sb_downgrade_validate() wasn't checking for a downgrade entry
  extending past the end of the superblock section

- for_each_downgrade_entry() is used in to_text() and needs to work on
  malformed input; it also was missing a check for a field extending
  past the end of the section
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41086/">CVE-2024-41086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41086">CVE-2024-41086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228471">SUSE bug 1228471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: libata-core: Fix double free on error

If e.g. the ata_port_alloc() call in ata_host_alloc() fails, we will jump
to the err_out label, which will call devres_release_group().
devres_release_group() will trigger a call to ata_host_release().
ata_host_release() calls kfree(host), so executing the kfree(host) in
ata_host_alloc() will lead to a double free:

kernel BUG at mm/slub.c:553!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 11 PID: 599 Comm: (udev-worker) Not tainted 6.10.0-rc5 #47
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:kfree+0x2cf/0x2f0
Code: 5d 41 5e 41 5f 5d e9 80 d6 ff ff 4d 89 f1 41 b8 01 00 00 00 48 89 d9 48 89 da
RSP: 0018:ffffc90000f377f0 EFLAGS: 00010246
RAX: ffff888112b1f2c0 RBX: ffff888112b1f2c0 RCX: ffff888112b1f320
RDX: 000000000000400b RSI: ffffffffc02c9de5 RDI: ffff888112b1f2c0
RBP: ffffc90000f37830 R08: 0000000000000000 R09: 0000000000000000
R10: ffffc90000f37610 R11: 617461203a736b6e R12: ffffea00044ac780
R13: ffff888100046400 R14: ffffffffc02c9de5 R15: 0000000000000006
FS:  00007f2f1cabe980(0000) GS:ffff88813b380000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f2f1c3acf75 CR3: 0000000111724000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body.cold+0x19/0x27
 ? die+0x2e/0x50
 ? do_trap+0xca/0x110
 ? do_error_trap+0x6a/0x90
 ? kfree+0x2cf/0x2f0
 ? exc_invalid_op+0x50/0x70
 ? kfree+0x2cf/0x2f0
 ? asm_exc_invalid_op+0x1a/0x20
 ? ata_host_alloc+0xf5/0x120 [libata]
 ? ata_host_alloc+0xf5/0x120 [libata]
 ? kfree+0x2cf/0x2f0
 ata_host_alloc+0xf5/0x120 [libata]
 ata_host_alloc_pinfo+0x14/0xa0 [libata]
 ahci_init_one+0x6c9/0xd20 [ahci]

Ensure that we will not call kfree(host) twice, by performing the kfree()
only if the devres_open_group() call failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228740">SUSE bug 1228740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcp251xfd: fix infinite loop when xmit fails

When the mcp251xfd_start_xmit() function fails, the driver stops
processing messages, and the interrupt routine does not return,
running indefinitely even after killing the running application.

Error messages:
[  441.298819] mcp251xfd spi2.0 can0: ERROR in mcp251xfd_start_xmit: -16
[  441.306498] mcp251xfd spi2.0 can0: Transmit Event FIFO buffer not empty. (seq=0x000017c7, tef_tail=0x000017cf, tef_head=0x000017d0, tx_head=0x000017d3).
... and repeat forever.

The issue can be triggered when multiple devices share the same SPI
interface. And there is concurrent access to the bus.

The problem occurs because tx_ring-&gt;head increments even if
mcp251xfd_start_xmit() fails. Consequently, the driver skips one TX
package while still expecting a response in
mcp251xfd_handle_tefif_one().

Resolve the issue by starting a workqueue to write the tx obj
synchronously if err = -EBUSY. In case of another error, decrement
tx_ring-&gt;head, remove skb from the echo stack, and drop the message.

[mkl: use more imperative wording in patch description]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228469">SUSE bug 1228469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes

In nv17_tv_get_hd_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). The same applies to drm_cvt_mode().
Add a check to avoid null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228658">SUSE bug 1228658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tap: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tap_get_user_xdp() path, which could cause a corrupted skb to be
sent downstack. Even before the skb is transmitted, the
tap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more
than ETH_HLEN. Once transmitted, this could either cause out-of-bound
access beyond the actual length, or confuse the underlayer with incorrect
or inconsistent header length in the skb metadata.

In the alternative path, tap_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted.

This is to drop any frame shorter than the Ethernet header size just like
how tap_get_user() does.

CVE: CVE-2024-41090
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228714">SUSE bug 1228714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tun_xdp_one() path, which could cause a corrupted skb to be sent
downstack. Even before the skb is transmitted, the
tun_xdp_one--&gt;eth_type_trans() may access the Ethernet header although it
can be less than ETH_HLEN. Once transmitted, this could either cause
out-of-bound access beyond the actual length, or confuse the underlayer
with incorrect or inconsistent header length in the skb metadata.

In the alternative path, tun_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted for
IFF_TAP.

This is to drop any frame shorter than the Ethernet header size just like
how tun_get_user() does.

CVE: CVE-2024-41091
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228327">SUSE bug 1228327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Fix potential UAF by revoke of fence registers

CI has been sporadically reporting the following issue triggered by
igt@i915_selftest@live@hangcheck on ADL-P and similar machines:

&lt;6&gt; [414.049203] i915: Running intel_hangcheck_live_selftests/igt_reset_evict_fence
...
&lt;6&gt; [414.068804] i915 0000:00:02.0: [drm] GT0: GUC: submission enabled
&lt;6&gt; [414.068812] i915 0000:00:02.0: [drm] GT0: GUC: SLPC enabled
&lt;3&gt; [414.070354] Unable to pin Y-tiled fence; err:-4
&lt;3&gt; [414.071282] i915_vma_revoke_fence:301 GEM_BUG_ON(!i915_active_is_idle(&amp;fence-&gt;active))
...
&lt;4&gt;[  609.603992] ------------[ cut here ]------------
&lt;2&gt;[  609.603995] kernel BUG at drivers/gpu/drm/i915/gt/intel_ggtt_fencing.c:301!
&lt;4&gt;[  609.604003] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt;[  609.604006] CPU: 0 PID: 268 Comm: kworker/u64:3 Tainted: G     U  W          6.9.0-CI_DRM_14785-g1ba62f8cea9c+ #1
&lt;4&gt;[  609.604008] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023
&lt;4&gt;[  609.604010] Workqueue: i915 __i915_gem_free_work [i915]
&lt;4&gt;[  609.604149] RIP: 0010:i915_vma_revoke_fence+0x187/0x1f0 [i915]
...
&lt;4&gt;[  609.604271] Call Trace:
&lt;4&gt;[  609.604273]  &lt;TASK&gt;
...
&lt;4&gt;[  609.604716]  __i915_vma_evict+0x2e9/0x550 [i915]
&lt;4&gt;[  609.604852]  __i915_vma_unbind+0x7c/0x160 [i915]
&lt;4&gt;[  609.604977]  force_unbind+0x24/0xa0 [i915]
&lt;4&gt;[  609.605098]  i915_vma_destroy+0x2f/0xa0 [i915]
&lt;4&gt;[  609.605210]  __i915_gem_object_pages_fini+0x51/0x2f0 [i915]
&lt;4&gt;[  609.605330]  __i915_gem_free_objects.isra.0+0x6a/0xc0 [i915]
&lt;4&gt;[  609.605440]  process_scheduled_works+0x351/0x690
...

In the past, there were similar failures reported by CI from other IGT
tests, observed on other platforms.

Before commit 63baf4f3d587 ("drm/i915/gt: Only wait for GPU activity
before unbinding a GGTT fence"), i915_vma_revoke_fence() was waiting for
idleness of vma-&gt;active via fence_update().   That commit introduced
vma-&gt;fence-&gt;active in order for the fence_update() to be able to wait
selectively on that one instead of vma-&gt;active since only idleness of
fence registers was needed.  But then, another commit 0d86ee35097a
("drm/i915/gt: Make fence revocation unequivocal") replaced the call to
fence_update() in i915_vma_revoke_fence() with only fence_write(), and
also added that GEM_BUG_ON(!i915_active_is_idle(&amp;fence-&gt;active)) in front.
No justification was provided on why we might then expect idleness of
vma-&gt;fence-&gt;active without first waiting on it.

The issue can be potentially caused by a race among revocation of fence
registers on one side and sequential execution of signal callbacks invoked
on completion of a request that was using them on the other, still
processed in parallel to revocation of those fence registers.  Fix it by
waiting for idleness of vma-&gt;fence-&gt;active in i915_vma_revoke_fence().

(cherry picked from commit 24bb052d3dd499c5956abad5f7d8e4fd07da7fb1)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: avoid using null object of framebuffer

Instead of using state-&gt;fb-&gt;obj[0] directly, get object from framebuffer
by calling drm_gem_fb_get_obj() and return error code when object is
null to avoid using null object of framebuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228660">SUSE bug 1228660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41094" ref_url="https://www.suse.com/security/cve/CVE-2024-41094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/fbdev-dma: Only set smem_start is enable per module option

Only export struct fb_info.fix.smem_start if that is required by the
user and the memory does not come from vmalloc().

Setting struct fb_info.fix.smem_start breaks systems where DMA
memory is backed by vmalloc address space. An example error is
shown below.

[    3.536043] ------------[ cut here ]------------
[    3.540716] virt_to_phys used for non-linear address: 000000007fc4f540 (0xffff800086001000)
[    3.552628] WARNING: CPU: 4 PID: 61 at arch/arm64/mm/physaddr.c:12 __virt_to_phys+0x68/0x98
[    3.565455] Modules linked in:
[    3.568525] CPU: 4 PID: 61 Comm: kworker/u12:5 Not tainted 6.6.23-06226-g4986cc3e1b75-dirty #250
[    3.577310] Hardware name: NXP i.MX95 19X19 board (DT)
[    3.582452] Workqueue: events_unbound deferred_probe_work_func
[    3.588291] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    3.595233] pc : __virt_to_phys+0x68/0x98
[    3.599246] lr : __virt_to_phys+0x68/0x98
[    3.603276] sp : ffff800083603990
[    3.677939] Call trace:
[    3.680393]  __virt_to_phys+0x68/0x98
[    3.684067]  drm_fbdev_dma_helper_fb_probe+0x138/0x238
[    3.689214]  __drm_fb_helper_initial_config_and_unlock+0x2b0/0x4c0
[    3.695385]  drm_fb_helper_initial_config+0x4c/0x68
[    3.700264]  drm_fbdev_dma_client_hotplug+0x8c/0xe0
[    3.705161]  drm_client_register+0x60/0xb0
[    3.709269]  drm_fbdev_dma_setup+0x94/0x148

Additionally, DMA memory is assumed to by contiguous in physical
address space, which is not guaranteed by vmalloc().

Resolve this by checking the module flag drm_leak_fbdev_smem when
DRM allocated the instance of struct fb_info. Fbdev-dma then only
sets smem_start only if required (via FBINFO_HIDE_SMEM_START). Also
guarantee that the framebuffer is not located in vmalloc address
space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41094/">CVE-2024-41094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41094">CVE-2024-41094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228458">SUSE bug 1228458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes

In nv17_tv_get_ld_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228662">SUSE bug 1228662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41096" ref_url="https://www.suse.com/security/cve/CVE-2024-41096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/MSI: Fix UAF in msi_capability_init

KFENCE reports the following UAF:

 BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488

 Use-after-free read at 0x0000000024629571 (in kfence-#12):
  __pci_enable_msi_range+0x2c0/0x488
  pci_alloc_irq_vectors_affinity+0xec/0x14c
  pci_alloc_irq_vectors+0x18/0x28

 kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128

 allocated by task 81 on cpu 7 at 10.808142s:
  __kmem_cache_alloc_node+0x1f0/0x2bc
  kmalloc_trace+0x44/0x138
  msi_alloc_desc+0x3c/0x9c
  msi_domain_insert_msi_desc+0x30/0x78
  msi_setup_msi_desc+0x13c/0x184
  __pci_enable_msi_range+0x258/0x488
  pci_alloc_irq_vectors_affinity+0xec/0x14c
  pci_alloc_irq_vectors+0x18/0x28

 freed by task 81 on cpu 7 at 10.811436s:
  msi_domain_free_descs+0xd4/0x10c
  msi_domain_free_locked.part.0+0xc0/0x1d8
  msi_domain_alloc_irqs_all_locked+0xb4/0xbc
  pci_msi_setup_msi_irqs+0x30/0x4c
  __pci_enable_msi_range+0x2a8/0x488
  pci_alloc_irq_vectors_affinity+0xec/0x14c
  pci_alloc_irq_vectors+0x18/0x28

Descriptor allocation done in:
__pci_enable_msi_range
    msi_capability_init
        msi_setup_msi_desc
            msi_insert_msi_desc
                msi_domain_insert_msi_desc
                    msi_alloc_desc
                        ...

Freed in case of failure in __msi_domain_alloc_locked()
__pci_enable_msi_range
    msi_capability_init
        pci_msi_setup_msi_irqs
            msi_domain_alloc_irqs_all_locked
                msi_domain_alloc_locked
                    __msi_domain_alloc_locked =&gt; fails
                    msi_domain_free_locked
                        ...

That failure propagates back to pci_msi_setup_msi_irqs() in
msi_capability_init() which accesses the descriptor for unmasking in the
error exit path.

Cure it by copying the descriptor and using the copy for the error exit path
unmask operation.

[ tglx: Massaged change log ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41096/">CVE-2024-41096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228479">SUSE bug 1228479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: atm: cxacru: fix endpoint checking in cxacru_bind()

Syzbot is still reporting quite an old issue [1] that occurs due to
incomplete checking of present usb endpoints. As such, wrong
endpoints types may be used at urb sumbitting stage which in turn
triggers a warning in usb_submit_urb().

Fix the issue by verifying that required endpoint types are present
for both in and out endpoints, taking into account cmd endpoint type.

Unfortunately, this patch has not been tested on real hardware.

[1] Syzbot report:
usb 1-1: BOGUS urb xfer, pipe 1 != type 3
WARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
Modules linked in:
CPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: usb_hub_wq hub_event
RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502
...
Call Trace:
 cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649
 cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760
 cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209
 usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055
 cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363
 usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:517 [inline]
 really_probe+0x23c/0xcd0 drivers/base/dd.c:595
 __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747
 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777
 __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894
 bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427
 __device_attach+0x228/0x4a0 drivers/base/dd.c:965
 bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487
 device_add+0xc2f/0x2180 drivers/base/core.c:3354
 usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170
 usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238
 usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228513">SUSE bug 1228513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: libata-core: Fix null pointer dereference on error

If the ata_port_alloc() call in ata_host_alloc() fails,
ata_host_release() will get called.

However, the code in ata_host_release() tries to free ata_port struct
members unconditionally, which can lead to the following:

BUG: unable to handle page fault for address: 0000000000003990
PGD 0 P4D 0
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 10 PID: 594 Comm: (udev-worker) Not tainted 6.10.0-rc5 #44
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:ata_host_release.cold+0x2f/0x6e [libata]
Code: e4 4d 63 f4 44 89 e2 48 c7 c6 90 ad 32 c0 48 c7 c7 d0 70 33 c0 49 83 c6 0e 41
RSP: 0018:ffffc90000ebb968 EFLAGS: 00010246
RAX: 0000000000000041 RBX: ffff88810fb52e78 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff88813b3218c0 RDI: ffff88813b3218c0
RBP: ffff88810fb52e40 R08: 0000000000000000 R09: 6c65725f74736f68
R10: ffffc90000ebb738 R11: 73692033203a746e R12: 0000000000000004
R13: 0000000000000000 R14: 0000000000000011 R15: 0000000000000006
FS:  00007f6cc55b9980(0000) GS:ffff88813b300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000003990 CR3: 00000001122a2000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body.cold+0x19/0x27
 ? page_fault_oops+0x15a/0x2f0
 ? exc_page_fault+0x7e/0x180
 ? asm_exc_page_fault+0x26/0x30
 ? ata_host_release.cold+0x2f/0x6e [libata]
 ? ata_host_release.cold+0x2f/0x6e [libata]
 release_nodes+0x35/0xb0
 devres_release_group+0x113/0x140
 ata_host_alloc+0xed/0x120 [libata]
 ata_host_alloc_pinfo+0x14/0xa0 [libata]
 ahci_init_one+0x6c9/0xd20 [ahci]

Do not access ata_port struct members unconditionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228467">SUSE bug 1228467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41149" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41149" ref_url="https://www.suse.com/security/cve/CVE-2024-41149" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: avoid to reuse `hctx` not removed from cpuhp callback list

If the 'hctx' isn't removed from cpuhp callback list, we can't reuse it,
otherwise use-after-free may be triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41149/">CVE-2024-41149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41149">CVE-2024-41149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235698">SUSE bug 1235698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41932" ref_url="https://www.suse.com/security/cve/CVE-2024-41932" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: fix warning in sched_setaffinity

Commit 8f9ea86fdf99b added some logic to sched_setaffinity that included
a WARN when a per-task affinity assignment races with a cpuset update.

Specifically, we can have a race where a cpuset update results in the
task affinity no longer being a subset of the cpuset. That's fine; we
have a fallback to instead use the cpuset mask. However, we have a WARN
set up that will trigger if the cpuset mask has no overlap at all with
the requested task affinity. This shouldn't be a warning condition; its
trivial to create this condition.

Reproduced the warning by the following setup:

- $PID inside a cpuset cgroup
- another thread repeatedly switching the cpuset cpus from 1-2 to just 1
- another thread repeatedly setting the $PID affinity (via taskset) to 2
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41932/">CVE-2024-41932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41932">CVE-2024-41932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235699">SUSE bug 1235699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41935" ref_url="https://www.suse.com/security/cve/CVE-2024-41935" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to shrink read extent node in batches

We use rwlock to protect core structure data of extent tree during
its shrink, however, if there is a huge number of extent nodes in
extent tree, during shrink of extent tree, it may hold rwlock for
a very long time, which may trigger kernel hang issue.

This patch fixes to shrink read extent node in batches, so that,
critical region of the rwlock can be shrunk to avoid its extreme
long time hold.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41935/">CVE-2024-41935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41935">CVE-2024-41935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235702">SUSE bug 1235702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42064" ref_url="https://www.suse.com/security/cve/CVE-2024-42064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip pipe if the pipe idx not set properly

[why]
Driver crashes when pipe idx not set properly

[how]
Add code to skip the pipe that idx not set properly
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42064/">CVE-2024-42064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42064">CVE-2024-42064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228586">SUSE bug 1228586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42065" ref_url="https://www.suse.com/security/cve/CVE-2024-42065" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init

Add an explicit check to ensure that the mgr is not NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42065/">CVE-2024-42065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42065">CVE-2024-42065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228541">SUSE bug 1228541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42066" ref_url="https://www.suse.com/security/cve/CVE-2024-42066" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix potential integer overflow in page size calculation

Explicitly cast tbo-&gt;page_alignment to u64 before bit-shifting to
prevent overflow when assigning to min_page_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42066/">CVE-2024-42066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42066">CVE-2024-42066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228668">SUSE bug 1228668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42067" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42067" ref_url="https://www.suse.com/security/cve/CVE-2024-42067" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()

set_memory_rox() can fail, leaving memory unprotected.

Check return and bail out when bpf_jit_binary_lock_ro() returns
an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42067/">CVE-2024-42067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42067">CVE-2024-42067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228670">SUSE bug 1228670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix possible double free in error handling path

When auxiliary_device_add() returns error and then calls
auxiliary_device_uninit(), callback function adev_release
calls kfree(madev). We shouldn't call kfree(madev) again
in the error handling path. Set 'madev' to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228463">SUSE bug 1228463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers

register store validation for NFT_DATA_VALUE is conditional, however,
the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This
only requires a new helper function to infer the register type from the
set datatype so this conditional check can be removed. Otherwise,
pointer to chain object can be leaked through the registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-11-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228470">SUSE bug 1228470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42071" ref_url="https://www.suse.com/security/cve/CVE-2024-42071" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: use dev_consume_skb_any outside of napi

If we're not in a NAPI softirq context, we need to be careful
about how we call napi_consume_skb(), specifically we need to
call it with budget==0 to signal to it that we're not in a
safe context.

This was found while running some configuration stress testing
of traffic and a change queue config loop running, and this
curious note popped out:

[ 4371.402645] BUG: using smp_processor_id() in preemptible [00000000] code: ethtool/20545
[ 4371.402897] caller is napi_skb_cache_put+0x16/0x80
[ 4371.403120] CPU: 25 PID: 20545 Comm: ethtool Kdump: loaded Tainted: G           OE      6.10.0-rc3-netnext+ #8
[ 4371.403302] Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 01/23/2021
[ 4371.403460] Call Trace:
[ 4371.403613]  &lt;TASK&gt;
[ 4371.403758]  dump_stack_lvl+0x4f/0x70
[ 4371.403904]  check_preemption_disabled+0xc1/0xe0
[ 4371.404051]  napi_skb_cache_put+0x16/0x80
[ 4371.404199]  ionic_tx_clean+0x18a/0x240 [ionic]
[ 4371.404354]  ionic_tx_cq_service+0xc4/0x200 [ionic]
[ 4371.404505]  ionic_tx_flush+0x15/0x70 [ionic]
[ 4371.404653]  ? ionic_lif_qcq_deinit.isra.23+0x5b/0x70 [ionic]
[ 4371.404805]  ionic_txrx_deinit+0x71/0x190 [ionic]
[ 4371.404956]  ionic_reconfigure_queues+0x5f5/0xff0 [ionic]
[ 4371.405111]  ionic_set_ringparam+0x2e8/0x3e0 [ionic]
[ 4371.405265]  ethnl_set_rings+0x1f1/0x300
[ 4371.405418]  ethnl_default_set_doit+0xbb/0x160
[ 4371.405571]  genl_family_rcv_msg_doit+0xff/0x130
	[...]

I found that ionic_tx_clean() calls napi_consume_skb() which calls
napi_skb_cache_put(), but before that last call is the note
    /* Zero budget indicate non-NAPI context called us, like netpoll */
and
    DEBUG_NET_WARN_ON_ONCE(!in_softirq());

Those are pretty big hints that we're doing it wrong.  We can pass a
context hint down through the calls to let ionic_tx_clean() know what
we're doing so it can call napi_consume_skb() correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42071/">CVE-2024-42071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42071">CVE-2024-42071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228517">SUSE bug 1228517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42072" ref_url="https://www.suse.com/security/cve/CVE-2024-42072" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix may_goto with negative offset.

Zac's syzbot crafted a bpf prog that exposed two bugs in may_goto.
The 1st bug is the way may_goto is patched. When offset is negative
it should be patched differently.
The 2nd bug is in the verifier:
when current state may_goto_depth is equal to visited state may_goto_depth
it means there is an actual infinite loop. It's not correct to prune
exploration of the program at this point.
Note, that this check doesn't limit the program to only one may_goto insn,
since 2nd and any further may_goto will increment may_goto_depth only
in the queued state pushed for future exploration. The current state
will have may_goto_depth == 0 regardless of number of may_goto insns
and the verifier has to explore the program until bpf_exit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42072/">CVE-2024-42072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42072">CVE-2024-42072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228475">SUSE bug 1228475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42073" ref_url="https://www.suse.com/security/cve/CVE-2024-42073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems

The following two shared buffer operations make use of the Shared Buffer
Status Register (SBSR):

 # devlink sb occupancy snapshot pci/0000:01:00.0
 # devlink sb occupancy clearmax pci/0000:01:00.0

The register has two masks of 256 bits to denote on which ingress /
egress ports the register should operate on. Spectrum-4 has more than
256 ports, so the register was extended by cited commit with a new
'port_page' field.

However, when filling the register's payload, the driver specifies the
ports as absolute numbers and not relative to the first port of the port
page, resulting in memory corruptions [1].

Fix by specifying the ports relative to the first port of the port page.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_sb_occ_snapshot+0xb6d/0xbc0
Read of size 1 at addr ffff8881068cb00f by task devlink/1566
[...]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xc6/0x120
 print_report+0xce/0x670
 kasan_report+0xd7/0x110
 mlxsw_sp_sb_occ_snapshot+0xb6d/0xbc0
 mlxsw_devlink_sb_occ_snapshot+0x75/0xb0
 devlink_nl_sb_occ_snapshot_doit+0x1f9/0x2a0
 genl_family_rcv_msg_doit+0x20c/0x300
 genl_rcv_msg+0x567/0x800
 netlink_rcv_skb+0x170/0x450
 genl_rcv+0x2d/0x40
 netlink_unicast+0x547/0x830
 netlink_sendmsg+0x8d4/0xdb0
 __sys_sendto+0x49b/0x510
 __x64_sys_sendto+0xe5/0x1c0
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
[...]
Allocated by task 1:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 copy_verifier_state+0xbc2/0xfb0
 do_check_common+0x2c51/0xc7e0
 bpf_check+0x5107/0x9960
 bpf_prog_load+0xf0e/0x2690
 __sys_bpf+0x1a61/0x49d0
 __x64_sys_bpf+0x7d/0xc0
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 1:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 poison_slab_object+0x109/0x170
 __kasan_slab_free+0x14/0x30
 kfree+0xca/0x2b0
 free_verifier_state+0xce/0x270
 do_check_common+0x4828/0xc7e0
 bpf_check+0x5107/0x9960
 bpf_prog_load+0xf0e/0x2690
 __sys_bpf+0x1a61/0x49d0
 __x64_sys_bpf+0x7d/0xc0
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42073/">CVE-2024-42073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42073">CVE-2024-42073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228457">SUSE bug 1228457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: acp: add a null check for chip_pdev structure

When acp platform device creation is skipped, chip-&gt;chip_pdev value will
remain NULL. Add NULL check for chip-&gt;chip_pdev structure in
snd_acp_resume() function to avoid null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228481">SUSE bug 1228481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42075" ref_url="https://www.suse.com/security/cve/CVE-2024-42075" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix remap of arena.

The bpf arena logic didn't account for mremap operation. Add a refcnt for
multiple mmap events to prevent use-after-free in arena_vm_close.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42075/">CVE-2024-42075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42075">CVE-2024-42075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228473">SUSE bug 1228473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: can: j1939: Initialize unused data in j1939_send_one()

syzbot reported kernel-infoleak in raw_recvmsg() [1]. j1939_send_one()
creates full frame including unused data, but it doesn't initialize
it. This causes the kernel-infoleak issue. Fix this by initializing
unused data.

[1]
BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
 instrument_copy_to_user include/linux/instrumented.h:114 [inline]
 copy_to_user_iter lib/iov_iter.c:24 [inline]
 iterate_ubuf include/linux/iov_iter.h:29 [inline]
 iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
 iterate_and_advance include/linux/iov_iter.h:271 [inline]
 _copy_to_iter+0x366/0x2520 lib/iov_iter.c:185
 copy_to_iter include/linux/uio.h:196 [inline]
 memcpy_to_msg include/linux/skbuff.h:4113 [inline]
 raw_recvmsg+0x2b8/0x9e0 net/can/raw.c:1008
 sock_recvmsg_nosec net/socket.c:1046 [inline]
 sock_recvmsg+0x2c4/0x340 net/socket.c:1068
 ____sys_recvmsg+0x18a/0x620 net/socket.c:2803
 ___sys_recvmsg+0x223/0x840 net/socket.c:2845
 do_recvmmsg+0x4fc/0xfd0 net/socket.c:2939
 __sys_recvmmsg net/socket.c:3018 [inline]
 __do_sys_recvmmsg net/socket.c:3041 [inline]
 __se_sys_recvmmsg net/socket.c:3034 [inline]
 __x64_sys_recvmmsg+0x397/0x490 net/socket.c:3034
 x64_sys_call+0xf6c/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:300
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:3804 [inline]
 slab_alloc_node mm/slub.c:3845 [inline]
 kmem_cache_alloc_node+0x613/0xc50 mm/slub.c:3888
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:577
 __alloc_skb+0x35b/0x7a0 net/core/skbuff.c:668
 alloc_skb include/linux/skbuff.h:1313 [inline]
 alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6504
 sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2795
 sock_alloc_send_skb include/net/sock.h:1842 [inline]
 j1939_sk_alloc_skb net/can/j1939/socket.c:878 [inline]
 j1939_sk_send_loop net/can/j1939/socket.c:1142 [inline]
 j1939_sk_sendmsg+0xc0a/0x2730 net/can/j1939/socket.c:1277
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x30f/0x380 net/socket.c:745
 ____sys_sendmsg+0x877/0xb60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2674
 x64_sys_call+0xc4b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Bytes 12-15 of 16 are uninitialized
Memory access of size 16 starts at ffff888120969690
Data copied to user address 00000000200017c0

CPU: 1 PID: 5050 Comm: syz-executor198 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228484">SUSE bug 1228484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix DIO failure due to insufficient transaction credits

The code in ocfs2_dio_end_io_write() estimates number of necessary
transaction credits using ocfs2_calc_extend_credits().  This however does
not take into account that the IO could be arbitrarily large and can
contain arbitrary number of extents.

Extent tree manipulations do often extend the current transaction but not
in all of the cases.  For example if we have only single block extents in
the tree, ocfs2_mark_extent_written() will end up calling
ocfs2_replace_extent_rec() all the time and we will never extend the
current transaction and eventually exhaust all the transaction credits if
the IO contains many single block extents.  Once that happens a
WARN_ON(jbd2_handle_buffer_credits(handle) &lt;= 0) is triggered in
jbd2_journal_dirty_metadata() and subsequently OCFS2 aborts in response to
this error.  This was actually triggered by one of our customers on a
heavily fragmented OCFS2 filesystem.

To fix the issue make sure the transaction always has enough credits for
one extent insert before each call of ocfs2_mark_extent_written().

Heming Zhao said:

------
PANIC: "Kernel panic - not syncing: OCFS2: (device dm-1): panic forced after error"

PID: xxx  TASK: xxxx  CPU: 5  COMMAND: "SubmitThread-CA"
  #0 machine_kexec at ffffffff8c069932
  #1 __crash_kexec at ffffffff8c1338fa
  #2 panic at ffffffff8c1d69b9
  #3 ocfs2_handle_error at ffffffffc0c86c0c [ocfs2]
  #4 __ocfs2_abort at ffffffffc0c88387 [ocfs2]
  #5 ocfs2_journal_dirty at ffffffffc0c51e98 [ocfs2]
  #6 ocfs2_split_extent at ffffffffc0c27ea3 [ocfs2]
  #7 ocfs2_change_extent_flag at ffffffffc0c28053 [ocfs2]
  #8 ocfs2_mark_extent_written at ffffffffc0c28347 [ocfs2]
  #9 ocfs2_dio_end_io_write at ffffffffc0c2bef9 [ocfs2]
#10 ocfs2_dio_end_io at ffffffffc0c2c0f5 [ocfs2]
#11 dio_complete at ffffffff8c2b9fa7
#12 do_blockdev_direct_IO at ffffffff8c2bc09f
#13 ocfs2_direct_IO at ffffffffc0c2b653 [ocfs2]
#14 generic_file_direct_write at ffffffff8c1dcf14
#15 __generic_file_write_iter at ffffffff8c1dd07b
#16 ocfs2_file_write_iter at ffffffffc0c49f1f [ocfs2]
#17 aio_write at ffffffff8c2cc72e
#18 kmem_cache_alloc at ffffffff8c248dde
#19 do_io_submit at ffffffff8c2ccada
#20 do_syscall_64 at ffffffff8c004984
#21 entry_SYSCALL_64_after_hwframe at ffffffff8c8000ba
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42078" ref_url="https://www.suse.com/security/cve/CVE-2024-42078" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: initialise nfsd_info.mutex early.

nfsd_info.mutex can be dereferenced by svc_pool_stats_start()
immediately after the new netns is created.  Currently this can
trigger an oops.

Move the initialisation earlier before it can possibly be dereferenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42078/">CVE-2024-42078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42078">CVE-2024-42078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228477">SUSE bug 1228477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix NULL pointer dereference in gfs2_log_flush

In gfs2_jindex_free(), set sdp-&gt;sd_jdesc to NULL under the log flush
lock to provide exclusion against gfs2_log_flush().

In gfs2_log_flush(), check if sdp-&gt;sd_jdesc is non-NULL before
dereferencing it.  Otherwise, we could run into a NULL pointer
dereference when outstanding glock work races with an unmount
(glock_work_func -&gt; run_queue -&gt; do_xmote -&gt; inode_go_sync -&gt;
gfs2_log_flush).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228672">SUSE bug 1228672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/restrack: Fix potential invalid address access

struct rdma_restrack_entry's kern_name was set to KBUILD_MODNAME
in ib_create_cq(), while if the module exited but forgot del this
rdma_restrack_entry, it would cause a invalid address access in
rdma_restrack_clean() when print the owner of this rdma_restrack_entry.

These code is used to help find one forgotten PD release in one of the
ULPs. But it is not needed anymore, so delete them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228673">SUSE bug 1228673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42081" ref_url="https://www.suse.com/security/cve/CVE-2024-42081" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/xe_devcoredump: Check NULL before assignments

Assign 'xe_devcoredump_snapshot *' and 'xe_device *' only if
'coredump' is not NULL.

v2
- Fix commit messages.

v3
- Define variables before code.(Ashutosh/Jose)

v4
- Drop return check for coredump_to_xe. (Jose/Rodrigo)

v5
- Modify misleading commit message. (Matt)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42081/">CVE-2024-42081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42081">CVE-2024-42081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228676">SUSE bug 1228676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: Remove WARN() from __xdp_reg_mem_model()

syzkaller reports a warning in __xdp_reg_mem_model().

The warning occurs only if __mem_id_init_hash_table() returns an error. It
returns the error in two cases:

  1. memory allocation fails;
  2. rhashtable_init() fails when some fields of rhashtable_params
     struct are not initialized properly.

The second case cannot happen since there is a static const rhashtable_params
struct with valid fields. So, warning is only triggered when there is a
problem with memory allocation.

Thus, there is no sense in using WARN() to handle this error and it can be
safely removed.

WARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299

CPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299

Call Trace:
 xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344
 xdp_test_run_setup net/bpf/test_run.c:188 [inline]
 bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377
 bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267
 bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240
 __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649
 __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Found by Linux Verification Center (linuxtesting.org) with syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228482">SUSE bug 1228482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42083" ref_url="https://www.suse.com/security/cve/CVE-2024-42083" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: fix kernel panic due to multi-buffer handling

Currently, the ionic_run_xdp() doesn't handle multi-buffer packets
properly for XDP_TX and XDP_REDIRECT.
When a jumbo frame is received, the ionic_run_xdp() first makes xdp
frame with all necessary pages in the rx descriptor.
And if the action is either XDP_TX or XDP_REDIRECT, it should unmap
dma-mapping and reset page pointer to NULL for all pages, not only the
first page.
But it doesn't for SG pages. So, SG pages unexpectedly will be reused.
It eventually causes kernel panic.

Oops: general protection fault, probably for non-canonical address 0x504f4e4dbebc64ff: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.10.0-rc3+ #25
RIP: 0010:xdp_return_frame+0x42/0x90
Code: 01 75 12 5b 4c 89 e6 5d 31 c9 41 5c 31 d2 41 5d e9 73 fd ff ff 44 8b 6b 20 0f b7 43 0a 49 81 ed 68 01 00 00 49 29 c5 49 01 fd &lt;41&gt; 80 7d0
RSP: 0018:ffff99d00122ce08 EFLAGS: 00010202
RAX: 0000000000005453 RBX: ffff8d325f904000 RCX: 0000000000000001
RDX: 00000000670e1000 RSI: 000000011f90d000 RDI: 504f4e4d4c4b4a49
RBP: ffff99d003907740 R08: 0000000000000000 R09: 0000000000000000
R10: 000000011f90d000 R11: 0000000000000000 R12: ffff8d325f904010
R13: 504f4e4dbebc64fd R14: ffff8d3242b070c8 R15: ffff99d0039077c0
FS:  0000000000000000(0000) GS:ffff8d399f780000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f41f6c85e38 CR3: 000000037ac30000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? die_addr+0x33/0x90
 ? exc_general_protection+0x251/0x2f0
 ? asm_exc_general_protection+0x22/0x30
 ? xdp_return_frame+0x42/0x90
 ionic_tx_clean+0x211/0x280 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]
 ionic_tx_cq_service+0xd3/0x210 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]
 ionic_txrx_napi+0x41/0x1b0 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]
 __napi_poll.constprop.0+0x29/0x1b0
 net_rx_action+0x2c4/0x350
 handle_softirqs+0xf4/0x320
 irq_exit_rcu+0x78/0xa0
 common_interrupt+0x77/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42083/">CVE-2024-42083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42083">CVE-2024-42083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228514">SUSE bug 1228514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock

When config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system
to enter suspend status with below command:
echo mem &gt; /sys/power/state
There will be a deadlock issue occurring. Detailed invoking path as
below:
dwc3_suspend_common()
    spin_lock_irqsave(&amp;dwc-&gt;lock, flags);              &lt;-- 1st
    dwc3_gadget_suspend(dwc);
        dwc3_gadget_soft_disconnect(dwc);
            spin_lock_irqsave(&amp;dwc-&gt;lock, flags);      &lt;-- 2nd
This issue is exposed by commit c7ebd8149ee5 ("usb: dwc3: gadget: Fix
NULL pointer dereference in dwc3_gadget_suspend") that removes the code
of checking whether dwc-&gt;gadget_driver is NULL or not. It causes the
following code is executed and deadlock occurs when trying to get the
spinlock. In fact, the root cause is the commit 5265397f9442("usb: dwc3:
Remove DWC3 locking during gadget suspend/resume") that forgot to remove
the lock of otg mode. So, remove the redundant lock of otg mode during
gadget suspend/resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228456">SUSE bug 1228456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: chemical: bme680: Fix overflows in compensate() functions

There are cases in the compensate functions of the driver that
there could be overflows of variables due to bit shifting ops.
These implications were initially discussed here [1] and they
were mentioned in log message of Commit 1b3bd8592780 ("iio:
chemical: Add support for Bosch BME680 sensor").

[1]: https://lore.kernel.org/linux-iio/20180728114028.3c1bbe81@archlinux/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228452">SUSE bug 1228452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep

The ilitek-ili9881c controls the reset GPIO using the non-sleeping
gpiod_set_value() function. This complains loudly when the GPIO
controller needs to sleep. As the caller can sleep, use
gpiod_set_value_cansleep() to fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228677">SUSE bug 1228677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42088" ref_url="https://www.suse.com/security/cve/CVE-2024-42088" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link

Commit e70b8dd26711 ("ASoC: mediatek: mt8195: Remove afe-dai component
and rework codec link") removed the codec entry for the ETDM1_OUT_BE
dai link entirely instead of replacing it with COMP_EMPTY(). This worked
by accident as the remaining COMP_EMPTY() platform entry became the codec
entry, and the platform entry became completely empty, effectively the
same as COMP_DUMMY() since snd_soc_fill_dummy_dai() doesn't do anything
for platform entries.

This causes a KASAN out-of-bounds warning in mtk_soundcard_common_probe()
in sound/soc/mediatek/common/mtk-soundcard-driver.c:

	for_each_card_prelinks(card, i, dai_link) {
		if (adsp_node &amp;&amp; !strncmp(dai_link-&gt;name, "AFE_SOF", strlen("AFE_SOF")))
			dai_link-&gt;platforms-&gt;of_node = adsp_node;
		else if (!dai_link-&gt;platforms-&gt;name &amp;&amp; !dai_link-&gt;platforms-&gt;of_node)
			dai_link-&gt;platforms-&gt;of_node = platform_node;
	}

where the code expects the platforms array to have space for at least one entry.

Add an COMP_EMPTY() entry so that dai_link-&gt;platforms has space.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42088/">CVE-2024-42088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42088">CVE-2024-42088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228451">SUSE bug 1228451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: fsl-asoc-card: set priv-&gt;pdev before using it

priv-&gt;pdev pointer was set after being used in
fsl_asoc_card_audmux_init().
Move this assignment at the start of the probe function, so
sub-functions can correctly use pdev through priv.

fsl_asoc_card_audmux_init() dereferences priv-&gt;pdev to get access to the
dev struct, used with dev_err macros.
As priv is zero-initialised, there would be a NULL pointer dereference.
Note that if priv-&gt;dev is dereferenced before assignment but never used,
for example if there is no error to be printed, the driver won't crash
probably due to compiler optimisations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228450">SUSE bug 1228450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER

In create_pinctrl(), pinctrl_maps_mutex is acquired before calling
add_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()
calls pinctrl_free(). However, pinctrl_free() attempts to acquire
pinctrl_maps_mutex, which is already held by create_pinctrl(), leading to
a potential deadlock.

This patch resolves the issue by releasing pinctrl_maps_mutex before
calling pinctrl_free(), preventing the deadlock.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228449">SUSE bug 1228449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42091" ref_url="https://www.suse.com/security/cve/CVE-2024-42091" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Check pat.ops before dumping PAT settings

We may leave pat.ops unset when running on brand new platform or
when running as a VF.  While the former is unlikely, the latter
is valid (future) use case and will cause NPD when someone will
try to dump PAT settings by debugfs.

It's better to check pointer to pat.ops instead of specific .dump
hook, as we have this hook always defined for every .ops variant.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42091/">CVE-2024-42091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42091">CVE-2024-42091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228678">SUSE bug 1228678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: davinci: Validate the obtained number of IRQs

Value of pdata-&gt;gpio_unbanked is taken from Device Tree. In case of broken
DT due to any error this value can be any. Without this value validation
there can be out of chips-&gt;irqs array boundaries access in
davinci_gpio_probe().

Validate the obtained nirq value so that it won't exceed the maximum
number of IRQs per bank.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228447">SUSE bug 1228447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/dpaa2: Avoid explicit cpumask var allocation on stack

For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.

Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42094" ref_url="https://www.suse.com/security/cve/CVE-2024-42094" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/iucv: Avoid explicit cpumask var allocation on stack

For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.

Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42094/">CVE-2024-42094 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228679">SUSE bug 1228679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250_omap: Implementation of Errata i2310

As per Errata i2310[0], Erroneous timeout can be triggered,
if this Erroneous interrupt is not cleared then it may leads
to storm of interrupts, therefore apply Errata i2310 solution.

[0] https://www.ti.com/lit/pdf/sprz536 page 23
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228446">SUSE bug 1228446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86: stop playing stack games in profile_pc()

The 'profile_pc()' function is used for timer-based profiling, which
isn't really all that relevant any more to begin with, but it also ends
up making assumptions based on the stack layout that aren't necessarily
valid.

Basically, the code tries to account the time spent in spinlocks to the
caller rather than the spinlock, and while I support that as a concept,
it's not worth the code complexity or the KASAN warnings when no serious
profiling is done using timers anyway these days.

And the code really does depend on stack layout that is only true in the
simplest of cases.  We've lost the comment at some point (I think when
the 32-bit and 64-bit code was unified), but it used to say:

	Assume the lock function has either no stack frame or a copy
	of eflags from PUSHF.

which explains why it just blindly loads a word or two straight off the
stack pointer and then takes a minimal look at the values to just check
if they might be eflags or the return pc:

	Eflags always has bits 22 and up cleared unlike kernel addresses

but that basic stack layout assumption assumes that there isn't any lock
debugging etc going on that would complicate the code and cause a stack
frame.

It causes KASAN unhappiness reported for years by syzkaller [1] and
others [2].

With no real practical reason for this any more, just remove the code.

Just for historical interest, here's some background commits relating to
this code from 2006:

  0cb91a229364 ("i386: Account spinlocks to the caller during profiling for !FP kernels")
  31679f38d886 ("Simplify profile_pc on x86-64")

and a code unification from 2009:

  ef4512882dbe ("x86: time_32/64.c unify profile_pc")

but the basics of this thing actually goes back to before the git tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228633">SUSE bug 1228633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: emux: improve patch ioctl data validation

In load_data(), make the validation of and skipping over the main info
block match that in load_guspatch().

In load_guspatch(), add checking that the specified patch length matches
the actually supplied data, like load_data() already did.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228766">SUSE bug 1228766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ecdh - explicitly zeroize private_key

private_key is overwritten with the key parameter passed in by the
caller (if present), or alternatively a newly generated private key.
However, it is possible that the caller provides a key (or the newly
generated key) which is shorter than the previous key. In that
scenario, some key material from the previous key would not be
overwritten. The easiest solution is to explicitly zeroize the entire
private_key array first.

Note that this patch slightly changes the behavior of this function:
previously, if the ecc_gen_privkey failed, the old private_key would
remain. Now, the private_key is always zeroized. This behavior is
consistent with the case where params.key is set and ecc_is_key_valid
fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42099" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42099" ref_url="https://www.suse.com/security/cve/CVE-2024-42099" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: Fix invalid dereferencing of indirect CCW data pointer

Fix invalid dereferencing of indirect CCW data pointer in
dasd_eckd_dump_sense() that leads to a kernel panic in error cases.

When using indirect addressing for DASD CCWs (IDAW) the CCW CDA pointer
does not contain the data address itself but a pointer to the IDAL.
This needs to be translated from physical to virtual as well before
using it.

This dereferencing is also used for dasd_page_cache and also fixed
although it is very unlikely that this code path ever gets used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42099/">CVE-2024-42099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42099">CVE-2024-42099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228570">SUSE bug 1228570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42100" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42100" ref_url="https://www.suse.com/security/cve/CVE-2024-42100" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: sunxi-ng: common: Don't call hw_to_ccu_common on hw without common

In order to set the rate range of a hw sunxi_ccu_probe calls
hw_to_ccu_common() assuming all entries in desc-&gt;ccu_clks are contained
in a ccu_common struct. This assumption is incorrect and, in
consequence, causes invalid pointer de-references.

Remove the faulty call. Instead, add one more loop that iterates over
the ccu_clks and sets the rate range, if required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42100/">CVE-2024-42100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42100">CVE-2024-42100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228488">SUSE bug 1228488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42101" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes

In nouveau_connector_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a possible NULL pointer
dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228495">SUSE bug 1228495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42102" ref_url="https://www.suse.com/security/cve/CVE-2024-42102" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"

Patch series "mm: Avoid possible overflows in dirty throttling".

Dirty throttling logic assumes dirty limits in page units fit into
32-bits.  This patch series makes sure this is true (see patch 2/2 for
more details).


This patch (of 2):

This reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.

The commit is broken in several ways.  Firstly, the removed (u64) cast
from the multiplication will introduce a multiplication overflow on 32-bit
archs if wb_thresh * bg_thresh &gt;= 1&lt;&lt;32 (which is actually common - the
default settings with 4GB of RAM will trigger this).  Secondly, the
div64_u64() is unnecessarily expensive on 32-bit archs.  We have
div64_ul() in case we want to be safe &amp; cheap.  Thirdly, if dirty
thresholds are larger than 1&lt;&lt;32 pages, then dirty balancing is going to
blow up in many other spectacular ways anyway so trying to fix one
possible overflow is just moot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42102/">CVE-2024-42102 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233132">SUSE bug 1233132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42103" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42103" ref_url="https://www.suse.com/security/cve/CVE-2024-42103" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix adding block group to a reclaim list and the unused list during reclaim

There is a potential parallel list adding for retrying in
btrfs_reclaim_bgs_work and adding to the unused list. Since the block
group is removed from the reclaim list and it is on a relocation work,
it can be added into the unused list in parallel. When that happens,
adding it to the reclaim list will corrupt the list head and trigger
list corruption like below.

Fix it by taking fs_info-&gt;unused_bgs_lock.

  [177.504][T2585409] BTRFS error (device nullb1): error relocating ch= unk 2415919104
  [177.514][T2585409] list_del corruption. next-&gt;prev should be ff1100= 0344b119c0, but was ff11000377e87c70. (next=3Dff110002390cd9c0)
  [177.529][T2585409] ------------[ cut here ]------------
  [177.537][T2585409] kernel BUG at lib/list_debug.c:65!
  [177.545][T2585409] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
  [177.555][T2585409] CPU: 9 PID: 2585409 Comm: kworker/u128:2 Tainted: G        W          6.10.0-rc5-kts #1
  [177.568][T2585409] Hardware name: Supermicro SYS-520P-WTR/X12SPW-TF, BIOS 1.2 02/14/2022
  [177.579][T2585409] Workqueue: events_unbound btrfs_reclaim_bgs_work[btrfs]
  [177.589][T2585409] RIP: 0010:__list_del_entry_valid_or_report.cold+0x70/0x72
  [177.624][T2585409] RSP: 0018:ff11000377e87a70 EFLAGS: 00010286
  [177.633][T2585409] RAX: 000000000000006d RBX: ff11000344b119c0 RCX:0000000000000000
  [177.644][T2585409] RDX: 000000000000006d RSI: 0000000000000008 RDI:ffe21c006efd0f40
  [177.655][T2585409] RBP: ff110002e0509f78 R08: 0000000000000001 R09:ffe21c006efd0f08
  [177.665][T2585409] R10: ff11000377e87847 R11: 0000000000000000 R12:ff110002390cd9c0
  [177.676][T2585409] R13: ff11000344b119c0 R14: ff110002e0508000 R15:dffffc0000000000
  [177.687][T2585409] FS:  0000000000000000(0000) GS:ff11000fec880000(0000) knlGS:0000000000000000
  [177.700][T2585409] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [177.709][T2585409] CR2: 00007f06bc7b1978 CR3: 0000001021e86005 CR4:0000000000771ef0
  [177.720][T2585409] DR0: 0000000000000000 DR1: 0000000000000000 DR2:0000000000000000
  [177.731][T2585409] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:0000000000000400
  [177.742][T2585409] PKRU: 55555554
  [177.748][T2585409] Call Trace:
  [177.753][T2585409]  &lt;TASK&gt;
  [177.759][T2585409]  ? __die_body.cold+0x19/0x27
  [177.766][T2585409]  ? die+0x2e/0x50
  [177.772][T2585409]  ? do_trap+0x1ea/0x2d0
  [177.779][T2585409]  ? __list_del_entry_valid_or_report.cold+0x70/0x72
  [177.788][T2585409]  ? do_error_trap+0xa3/0x160
  [177.795][T2585409]  ? __list_del_entry_valid_or_report.cold+0x70/0x72
  [177.805][T2585409]  ? handle_invalid_op+0x2c/0x40
  [177.812][T2585409]  ? __list_del_entry_valid_or_report.cold+0x70/0x72
  [177.820][T2585409]  ? exc_invalid_op+0x2d/0x40
  [177.827][T2585409]  ? asm_exc_invalid_op+0x1a/0x20
  [177.834][T2585409]  ? __list_del_entry_valid_or_report.cold+0x70/0x72
  [177.843][T2585409]  btrfs_delete_unused_bgs+0x3d9/0x14c0 [btrfs]

There is a similar retry_list code in btrfs_delete_unused_bgs(), but it is
safe, AFAICS. Since the block group was in the unused list, the used bytes
should be 0 when it was added to the unused list. Then, it checks
block_group-&gt;{used,reserved,pinned} are still 0 under the
block_group-&gt;lock. So, they should be still eligible for the unused list,
not the reclaim list.

The reason it is safe there it's because because we're holding
space_info-&gt;groups_sem in write mode.

That means no other task can allocate from the block group, so while we
are at deleted_unused_bgs() it's not possible for other tasks to
allocate and deallocate extents from the block group, so it can't be
added to the unused list or the reclaim list by anyone else.

The bug can be reproduced by btrfs/166 after a few rounds. In practice
this can be hit when relocation cannot find more chunk space and ends
with ENOSPC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42103/">CVE-2024-42103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42103">CVE-2024-42103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228490">SUSE bug 1228490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: add missing check for inode numbers on directory entries

Syzbot reported that mounting and unmounting a specific pattern of
corrupted nilfs2 filesystem images causes a use-after-free of metadata
file inodes, which triggers a kernel bug in lru_add_fn().

As Jan Kara pointed out, this is because the link count of a metadata file
gets corrupted to 0, and nilfs_evict_inode(), which is called from iput(),
tries to delete that inode (ifile inode in this case).

The inconsistency occurs because directories containing the inode numbers
of these metadata files that should not be visible in the namespace are
read without checking.

Fix this issue by treating the inode numbers of these internal files as
errors in the sanity check helper when reading directory folios/pages.

Also thanks to Hillf Danton and Matthew Wilcox for their initial mm-layer
analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228654">SUSE bug 1228654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42105" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix inode number range checks

Patch series "nilfs2: fix potential issues related to reserved inodes".

This series fixes one use-after-free issue reported by syzbot, caused by
nilfs2's internal inode being exposed in the namespace on a corrupted
filesystem, and a couple of flaws that cause problems if the starting
number of non-reserved inodes written in the on-disk super block is
intentionally (or corruptly) changed from its default value.  


This patch (of 3):

In the current implementation of nilfs2, "nilfs-&gt;ns_first_ino", which
gives the first non-reserved inode number, is read from the superblock,
but its lower limit is not checked.

As a result, if a number that overlaps with the inode number range of
reserved inodes such as the root directory or metadata files is set in the
super block parameter, the inode number test macros (NILFS_MDT_INODE and
NILFS_VALID_INODE) will not function properly.

In addition, these test macros use left bit-shift calculations using with
the inode number as the shift count via the BIT macro, but the result of a
shift calculation that exceeds the bit width of an integer is undefined in
the C specification, so if "ns_first_ino" is set to a large value other
than the default value NILFS_USER_INO (=11), the macros may potentially
malfunction depending on the environment.

Fix these issues by checking the lower bound of "nilfs-&gt;ns_first_ino" and
by preventing bit shifts equal to or greater than the NILFS_USER_INO
constant in the inode number test macros.

Also, change the type of "ns_first_ino" from signed integer to unsigned
integer to avoid the need for type casting in comparisons such as the
lower bound check introduced this time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228665">SUSE bug 1228665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42106" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet_diag: Initialize pad field in struct inet_diag_req_v2

KMSAN reported uninit-value access in raw_lookup() [1]. Diag for raw
sockets uses the pad field in struct inet_diag_req_v2 for the
underlying protocol. This field corresponds to the sdiag_raw_protocol
field in struct inet_diag_req_raw.

inet_diag_get_exact_compat() converts inet_diag_req to
inet_diag_req_v2, but leaves the pad field uninitialized. So the issue
occurs when raw_lookup() accesses the sdiag_raw_protocol field.

Fix this by initializing the pad field in
inet_diag_get_exact_compat(). Also, do the same fix in
inet_diag_dump_compat() to avoid the similar issue in the future.

[1]
BUG: KMSAN: uninit-value in raw_lookup net/ipv4/raw_diag.c:49 [inline]
BUG: KMSAN: uninit-value in raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71
 raw_lookup net/ipv4/raw_diag.c:49 [inline]
 raw_sock_get+0x657/0x800 net/ipv4/raw_diag.c:71
 raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99
 inet_diag_cmd_exact+0x7d9/0x980
 inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]
 inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426
 sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282
 netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564
 sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297
 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
 netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361
 netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x332/0x3d0 net/socket.c:745
 ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639
 __sys_sendmsg net/socket.c:2668 [inline]
 __do_sys_sendmsg net/socket.c:2677 [inline]
 __se_sys_sendmsg net/socket.c:2675 [inline]
 __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675
 x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was stored to memory at:
 raw_sock_get+0x650/0x800 net/ipv4/raw_diag.c:71
 raw_diag_dump_one+0xa1/0x660 net/ipv4/raw_diag.c:99
 inet_diag_cmd_exact+0x7d9/0x980
 inet_diag_get_exact_compat net/ipv4/inet_diag.c:1404 [inline]
 inet_diag_rcv_msg_compat+0x469/0x530 net/ipv4/inet_diag.c:1426
 sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282
 netlink_rcv_skb+0x537/0x670 net/netlink/af_netlink.c:2564
 sock_diag_rcv+0x35/0x40 net/core/sock_diag.c:297
 netlink_unicast_kernel net/netlink/af_netlink.c:1335 [inline]
 netlink_unicast+0xe74/0x1240 net/netlink/af_netlink.c:1361
 netlink_sendmsg+0x10c6/0x1260 net/netlink/af_netlink.c:1905
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x332/0x3d0 net/socket.c:745
 ____sys_sendmsg+0x7f0/0xb70 net/socket.c:2585
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2639
 __sys_sendmsg net/socket.c:2668 [inline]
 __do_sys_sendmsg net/socket.c:2677 [inline]
 __se_sys_sendmsg net/socket.c:2675 [inline]
 __x64_sys_sendmsg+0x27e/0x4a0 net/socket.c:2675
 x64_sys_call+0x135e/0x3ce0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable req.i created at:
 inet_diag_get_exact_compat net/ipv4/inet_diag.c:1396 [inline]
 inet_diag_rcv_msg_compat+0x2a6/0x530 net/ipv4/inet_diag.c:1426
 sock_diag_rcv_msg+0x23d/0x740 net/core/sock_diag.c:282

CPU: 1 PID: 8888 Comm: syz-executor.6 Not tainted 6.10.0-rc4-00217-g35bb670d65fc #32
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228493">SUSE bug 1228493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42107" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Don't process extts if PTP is disabled

The ice_ptp_extts_event() function can race with ice_ptp_release() and
result in a NULL pointer dereference which leads to a kernel panic.

Panic occurs because the ice_ptp_extts_event() function calls
ptp_clock_event() with a NULL pointer. The ice driver has already
released the PTP clock by the time the interrupt for the next external
timestamp event occurs.

To fix this, modify the ice_ptp_extts_event() function to check the
PTP state and bail early if PTP is not ready.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228494">SUSE bug 1228494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42108" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42108" ref_url="https://www.suse.com/security/cve/CVE-2024-42108" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rswitch: Avoid use-after-free in rswitch_poll()

The use-after-free is actually in rswitch_tx_free(), which is inlined in
rswitch_poll(). Since `skb` and `gq-&gt;skbs[gq-&gt;dirty]` are in fact the
same pointer, the skb is first freed using dev_kfree_skb_any(), then the
value in skb-&gt;len is used to update the interface statistics.

Let's move around the instructions to use skb-&gt;len before the skb is
freed.

This bug is trivial to reproduce using KFENCE. It will trigger a splat
every few packets. A simple ARP request or ICMP echo request is enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42108/">CVE-2024-42108 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42108">CVE-2024-42108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228504">SUSE bug 1228504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42109" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42109" ref_url="https://www.suse.com/security/cve/CVE-2024-42109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: unconditionally flush pending work before notifier

syzbot reports:

KASAN: slab-uaf in nft_ctx_update include/net/netfilter/nf_tables.h:1831
KASAN: slab-uaf in nft_commit_release net/netfilter/nf_tables_api.c:9530
KASAN: slab-uaf int nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597
Read of size 2 at addr ffff88802b0051c4 by task kworker/1:1/45
[..]
Workqueue: events nf_tables_trans_destroy_work
Call Trace:
 nft_ctx_update include/net/netfilter/nf_tables.h:1831 [inline]
 nft_commit_release net/netfilter/nf_tables_api.c:9530 [inline]
 nf_tables_trans_destroy_work+0x152b/0x1750 net/netfilter/nf_tables_api.c:9597

Problem is that the notifier does a conditional flush, but its possible
that the table-to-be-removed is still referenced by transactions being
processed by the worker, so we need to flush unconditionally.

We could make the flush_work depend on whether we found a table to delete
in nf-next to avoid the flush for most cases.

AFAICS this problem is only exposed in nf-next, with
commit e169285f8c56 ("netfilter: nf_tables: do not store nft_ctx in transaction objects"),
with this commit applied there is an unconditional fetch of
table-&gt;family which is whats triggering the above splat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42109/">CVE-2024-42109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42109">CVE-2024-42109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228505">SUSE bug 1228505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()

The following is emitted when using idxd (DSA) dmanegine as the data
mover for ntb_transport that ntb_netdev uses.

[74412.546922] BUG: using smp_processor_id() in preemptible [00000000] code: irq/52-idxd-por/14526
[74412.556784] caller is netif_rx_internal+0x42/0x130
[74412.562282] CPU: 6 PID: 14526 Comm: irq/52-idxd-por Not tainted 6.9.5 #5
[74412.569870] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.E9I.1752.P05.2402080856 02/08/2024
[74412.581699] Call Trace:
[74412.584514]  &lt;TASK&gt;
[74412.586933]  dump_stack_lvl+0x55/0x70
[74412.591129]  check_preemption_disabled+0xc8/0xf0
[74412.596374]  netif_rx_internal+0x42/0x130
[74412.600957]  __netif_rx+0x20/0xd0
[74412.604743]  ntb_netdev_rx_handler+0x66/0x150 [ntb_netdev]
[74412.610985]  ntb_complete_rxc+0xed/0x140 [ntb_transport]
[74412.617010]  ntb_rx_copy_callback+0x53/0x80 [ntb_transport]
[74412.623332]  idxd_dma_complete_txd+0xe3/0x160 [idxd]
[74412.628963]  idxd_wq_thread+0x1a6/0x2b0 [idxd]
[74412.634046]  irq_thread_fn+0x21/0x60
[74412.638134]  ? irq_thread+0xa8/0x290
[74412.642218]  irq_thread+0x1a0/0x290
[74412.646212]  ? __pfx_irq_thread_fn+0x10/0x10
[74412.651071]  ? __pfx_irq_thread_dtor+0x10/0x10
[74412.656117]  ? __pfx_irq_thread+0x10/0x10
[74412.660686]  kthread+0x100/0x130
[74412.664384]  ? __pfx_kthread+0x10/0x10
[74412.668639]  ret_from_fork+0x31/0x50
[74412.672716]  ? __pfx_kthread+0x10/0x10
[74412.676978]  ret_from_fork_asm+0x1a/0x30
[74412.681457]  &lt;/TASK&gt;

The cause is due to the idxd driver interrupt completion handler uses
threaded interrupt and the threaded handler is not hard or soft interrupt
context. However __netif_rx() can only be called from interrupt context.
Change the call to netif_rx() in order to allow completion via normal
context for dmaengine drivers that utilize threaded irq handling.

While the following commit changed from netif_rx() to __netif_rx(),
baebdf48c360 ("net: dev: Makes sure netif_rx() can be invoked in any context."),
the change should've been a noop instead. However, the code precedes this
fix should've been using netif_rx_ni() or netif_rx_any_context().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228501">SUSE bug 1228501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42111" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42111" ref_url="https://www.suse.com/security/cve/CVE-2024-42111" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: always do the basic checks for btrfs_qgroup_inherit structure

[BUG]
Syzbot reports the following regression detected by KASAN:

  BUG: KASAN: slab-out-of-bounds in btrfs_qgroup_inherit+0x42e/0x2e20 fs/btrfs/qgroup.c:3277
  Read of size 8 at addr ffff88814628ca50 by task syz-executor318/5171

  CPU: 0 PID: 5171 Comm: syz-executor318 Not tainted 6.10.0-rc2-syzkaller-00010-g2ab795141095 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0x169/0x550 mm/kasan/report.c:488
   kasan_report+0x143/0x180 mm/kasan/report.c:601
   btrfs_qgroup_inherit+0x42e/0x2e20 fs/btrfs/qgroup.c:3277
   create_pending_snapshot+0x1359/0x29b0 fs/btrfs/transaction.c:1854
   create_pending_snapshots+0x195/0x1d0 fs/btrfs/transaction.c:1922
   btrfs_commit_transaction+0xf20/0x3740 fs/btrfs/transaction.c:2382
   create_snapshot+0x6a1/0x9e0 fs/btrfs/ioctl.c:875
   btrfs_mksubvol+0x58f/0x710 fs/btrfs/ioctl.c:1029
   btrfs_mksnapshot+0xb5/0xf0 fs/btrfs/ioctl.c:1075
   __btrfs_ioctl_snap_create+0x387/0x4b0 fs/btrfs/ioctl.c:1340
   btrfs_ioctl_snap_create_v2+0x1f2/0x3a0 fs/btrfs/ioctl.c:1422
   btrfs_ioctl+0x99e/0xc60
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:907 [inline]
   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7fcbf1992509
  RSP: 002b:00007fcbf1928218 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 00007fcbf1a1f618 RCX: 00007fcbf1992509
  RDX: 0000000020000280 RSI: 0000000050009417 RDI: 0000000000000003
  RBP: 00007fcbf1a1f610 R08: 00007ffea1298e97 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcbf19eb660
  R13: 00000000200002b8 R14: 00007fcbf19e60c0 R15: 0030656c69662f2e
   &lt;/TASK&gt;

And it also pinned it down to commit b5357cb268c4 ("btrfs: qgroup: do not
check qgroup inherit if qgroup is disabled").

[CAUSE]
That offending commit skips the whole qgroup inherit check if qgroup is
not enabled.

But that also skips the very basic checks like
num_ref_copies/num_excl_copies and the structure size checks.

Meaning if a qgroup enable/disable race is happening at the background,
and we pass a btrfs_qgroup_inherit structure when the qgroup is
disabled, the check would be completely skipped.

Then at the time of transaction commitment, qgroup is re-enabled and
btrfs_qgroup_inherit() is going to use the incorrect structure and
causing the above KASAN error.

[FIX]
Make btrfs_qgroup_check_inherit() only skip the source qgroup checks.
So that even if invalid btrfs_qgroup_inherit structure is passed in, we
can still reject invalid ones no matter if qgroup is enabled or not.

Furthermore we do already have an extra safety inside
btrfs_qgroup_inherit(), which would just ignore invalid qgroup sources,
so even if we only skip the qgroup source check we're still safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42111/">CVE-2024-42111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42111">CVE-2024-42111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228506">SUSE bug 1228506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42112" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42112" ref_url="https://www.suse.com/security/cve/CVE-2024-42112" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: txgbe: free isb resources at the right time

When using MSI/INTx interrupt, the shared interrupts are still being
handled in the device remove routine, before free IRQs. So isb memory
is still read after it is freed. Thus move wx_free_isb_resources()
from txgbe_close() to txgbe_remove(). And fix the improper isb free
action in txgbe_open() error handling path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42112/">CVE-2024-42112 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42112">CVE-2024-42112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228566">SUSE bug 1228566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42113" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42113" ref_url="https://www.suse.com/security/cve/CVE-2024-42113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: txgbe: initialize num_q_vectors for MSI/INTx interrupts

When using MSI/INTx interrupts, wx-&gt;num_q_vectors is uninitialized.
Thus there will be kernel panic in wx_alloc_q_vectors() to allocate
queue vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42113/">CVE-2024-42113 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42113">CVE-2024-42113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228568">SUSE bug 1228568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42114" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values

syzbot is able to trigger softlockups, setting NL80211_ATTR_TXQ_QUANTUM
to 2^31.

We had a similar issue in sch_fq, fixed with commit
d9e15a273306 ("pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM")

watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [kworker/1:0:24]
Modules linked in:
irq event stamp: 131135
 hardirqs last  enabled at (131134): [&lt;ffff80008ae8778c&gt;] __exit_to_kernel_mode arch/arm64/kernel/entry-common.c:85 [inline]
 hardirqs last  enabled at (131134): [&lt;ffff80008ae8778c&gt;] exit_to_kernel_mode+0xdc/0x10c arch/arm64/kernel/entry-common.c:95
 hardirqs last disabled at (131135): [&lt;ffff80008ae85378&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
 hardirqs last disabled at (131135): [&lt;ffff80008ae85378&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
 softirqs last  enabled at (125892): [&lt;ffff80008907e82c&gt;] neigh_hh_init net/core/neighbour.c:1538 [inline]
 softirqs last  enabled at (125892): [&lt;ffff80008907e82c&gt;] neigh_resolve_output+0x268/0x658 net/core/neighbour.c:1553
 softirqs last disabled at (125896): [&lt;ffff80008904166c&gt;] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19
CPU: 1 PID: 24 Comm: kworker/1:0 Not tainted 6.9.0-rc7-syzkaller-gfda5695d692c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: mld mld_ifc_work
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __list_del include/linux/list.h:195 [inline]
 pc : __list_del_entry include/linux/list.h:218 [inline]
 pc : list_move_tail include/linux/list.h:310 [inline]
 pc : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
 pc : ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
 lr : __list_del_entry include/linux/list.h:218 [inline]
 lr : list_move_tail include/linux/list.h:310 [inline]
 lr : fq_tin_dequeue include/net/fq_impl.h:112 [inline]
 lr : ieee80211_tx_dequeue+0x67c/0x3b4c net/mac80211/tx.c:3854
sp : ffff800093d36700
x29: ffff800093d36a60 x28: ffff800093d36960 x27: dfff800000000000
x26: ffff0000d800ad50 x25: ffff0000d800abe0 x24: ffff0000d800abf0
x23: ffff0000e0032468 x22: ffff0000e00324d4 x21: ffff0000d800abf0
x20: ffff0000d800abf8 x19: ffff0000d800abf0 x18: ffff800093d363c0
x17: 000000000000d476 x16: ffff8000805519dc x15: ffff7000127a6cc8
x14: 1ffff000127a6cc8 x13: 0000000000000004 x12: ffffffffffffffff
x11: ffff7000127a6cc8 x10: 0000000000ff0100 x9 : 0000000000000000
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffff80009287aa08 x4 : 0000000000000008 x3 : ffff80008034c7fc
x2 : ffff0000e0032468 x1 : 00000000da0e46b8 x0 : ffff0000e0032470
Call trace:
  __list_del include/linux/list.h:195 [inline]
  __list_del_entry include/linux/list.h:218 [inline]
  list_move_tail include/linux/list.h:310 [inline]
  fq_tin_dequeue include/net/fq_impl.h:112 [inline]
  ieee80211_tx_dequeue+0x6b8/0x3b4c net/mac80211/tx.c:3854
  wake_tx_push_queue net/mac80211/util.c:294 [inline]
  ieee80211_handle_wake_tx_queue+0x118/0x274 net/mac80211/util.c:315
  drv_wake_tx_queue net/mac80211/driver-ops.h:1350 [inline]
  schedule_and_wake_txq net/mac80211/driver-ops.h:1357 [inline]
  ieee80211_queue_skb+0x18e8/0x2244 net/mac80211/tx.c:1664
  ieee80211_tx+0x260/0x400 net/mac80211/tx.c:1966
  ieee80211_xmit+0x278/0x354 net/mac80211/tx.c:2062
  __ieee80211_subif_start_xmit+0xab8/0x122c net/mac80211/tx.c:4338
  ieee80211_subif_start_xmit+0xe0/0x438 net/mac80211/tx.c:4532
  __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
  netdev_start_xmit include/linux/netdevice.h:4917 [inline]
  xmit_one net/core/dev.c:3531 [inline]
  dev_hard_start_xmit+0x27c/0x938 net/core/dev.c:3547
  __dev_queue_xmit+0x1678/0x33fc net/core/dev.c:4341
  dev_queue_xmit include/linux/netdevice.h:3091 [inline]
  neigh_resolve_output+0x558/0x658 net/core/neighbour.c:1563
  neigh_output include/net/neighbour.h:542 [inline]
  ip6_fini
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228564">SUSE bug 1228564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42115" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jffs2: Fix potential illegal address access in jffs2_free_inode

During the stress testing of the jffs2 file system,the following
abnormal printouts were found:
[ 2430.649000] Unable to handle kernel paging request at virtual address 0069696969696948
[ 2430.649622] Mem abort info:
[ 2430.649829]   ESR = 0x96000004
[ 2430.650115]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 2430.650564]   SET = 0, FnV = 0
[ 2430.650795]   EA = 0, S1PTW = 0
[ 2430.651032]   FSC = 0x04: level 0 translation fault
[ 2430.651446] Data abort info:
[ 2430.651683]   ISV = 0, ISS = 0x00000004
[ 2430.652001]   CM = 0, WnR = 0
[ 2430.652558] [0069696969696948] address between user and kernel address ranges
[ 2430.653265] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[ 2430.654512] CPU: 2 PID: 20919 Comm: cat Not tainted 5.15.25-g512f31242bf6 #33
[ 2430.655008] Hardware name: linux,dummy-virt (DT)
[ 2430.655517] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 2430.656142] pc : kfree+0x78/0x348
[ 2430.656630] lr : jffs2_free_inode+0x24/0x48
[ 2430.657051] sp : ffff800009eebd10
[ 2430.657355] x29: ffff800009eebd10 x28: 0000000000000001 x27: 0000000000000000
[ 2430.658327] x26: ffff000038f09d80 x25: 0080000000000000 x24: ffff800009d38000
[ 2430.658919] x23: 5a5a5a5a5a5a5a5a x22: ffff000038f09d80 x21: ffff8000084f0d14
[ 2430.659434] x20: ffff0000bf9a6ac0 x19: 0169696969696940 x18: 0000000000000000
[ 2430.659969] x17: ffff8000b6506000 x16: ffff800009eec000 x15: 0000000000004000
[ 2430.660637] x14: 0000000000000000 x13: 00000001000820a1 x12: 00000000000d1b19
[ 2430.661345] x11: 0004000800000000 x10: 0000000000000001 x9 : ffff8000084f0d14
[ 2430.662025] x8 : ffff0000bf9a6b40 x7 : ffff0000bf9a6b48 x6 : 0000000003470302
[ 2430.662695] x5 : ffff00002e41dcc0 x4 : ffff0000bf9aa3b0 x3 : 0000000003470342
[ 2430.663486] x2 : 0000000000000000 x1 : ffff8000084f0d14 x0 : fffffc0000000000
[ 2430.664217] Call trace:
[ 2430.664528]  kfree+0x78/0x348
[ 2430.664855]  jffs2_free_inode+0x24/0x48
[ 2430.665233]  i_callback+0x24/0x50
[ 2430.665528]  rcu_do_batch+0x1ac/0x448
[ 2430.665892]  rcu_core+0x28c/0x3c8
[ 2430.666151]  rcu_core_si+0x18/0x28
[ 2430.666473]  __do_softirq+0x138/0x3cc
[ 2430.666781]  irq_exit+0xf0/0x110
[ 2430.667065]  handle_domain_irq+0x6c/0x98
[ 2430.667447]  gic_handle_irq+0xac/0xe8
[ 2430.667739]  call_on_irq_stack+0x28/0x54
The parameter passed to kfree was 5a5a5a5a, which corresponds to the target field of
the jffs_inode_info structure. It was found that all variables in the jffs_inode_info
structure were 5a5a5a5a, except for the first member sem. It is suspected that these
variables are not initialized because they were set to 5a5a5a5a during memory testing,
which is meant to detect uninitialized memory.The sem variable is initialized in the
function jffs2_i_init_once, while other members are initialized in
the function jffs2_init_inode_info.

The function jffs2_init_inode_info is called after iget_locked,
but in the iget_locked function, the destroy_inode process is triggered,
which releases the inode and consequently, the target member of the inode
is not initialized.In concurrent high pressure scenarios, iget_locked
may enter the destroy_inode branch as described in the code.

Since the destroy_inode functionality of jffs2 only releases the target,
the fix method is to set target to NULL in jffs2_i_init_once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228656">SUSE bug 1228656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42116" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42116" ref_url="https://www.suse.com/security/cve/CVE-2024-42116" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42116/">CVE-2024-42116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42116">CVE-2024-42116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228671">SUSE bug 1228671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42117" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42117" ref_url="https://www.suse.com/security/cve/CVE-2024-42117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: ASSERT when failing to find index by plane/stream id

[WHY]
find_disp_cfg_idx_by_plane_id and find_disp_cfg_idx_by_stream_id returns
an array index and they return -1 when not found; however, -1 is not a
valid index number.

[HOW]
When this happens, call ASSERT(), and return a positive number (which is
fewer than callers' array size) instead.

This fixes 4 OVERRUN and 2 NEGATIVE_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42117/">CVE-2024-42117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42117">CVE-2024-42117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228582">SUSE bug 1228582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42118" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42118" ref_url="https://www.suse.com/security/cve/CVE-2024-42118" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Do not return negative stream id for array

[WHY]
resource_stream_to_stream_idx returns an array index and it return -1
when not found; however, -1 is not a valid array index number.

[HOW]
When this happens, call ASSERT(), and return a zero instead.

This fixes an OVERRUN and an NEGATIVE_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42118/">CVE-2024-42118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42118">CVE-2024-42118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228583">SUSE bug 1228583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42119" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip finding free audio for unknown engine_id

[WHY]
ENGINE_ID_UNKNOWN = -1 and can not be used as an array index. Plus, it
also means it is uninitialized and does not need free audio.

[HOW]
Skip and return NULL.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228584">SUSE bug 1228584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42120" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check pipe offset before setting vblank

pipe_ctx has a size of MAX_PIPES so checking its index before accessing
the array.

This fixes an OVERRUN issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228588">SUSE bug 1228588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42121" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check index msg_id before read or write

[WHAT]
msg_id is used as an array index and it cannot be a negative value, and
therefore cannot be equal to MOD_HDCP_MESSAGE_ID_INVALID (-1).

[HOW]
Check whether msg_id is valid before reading and setting.

This fixes 4 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228590">SUSE bug 1228590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42122" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL pointer check for kzalloc

[Why &amp; How]
Check return pointer of kzalloc before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228591">SUSE bug 1228591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42123" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42123" ref_url="https://www.suse.com/security/cve/CVE-2024-42123" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix double free err_addr pointer warnings

In amdgpu_umc_bad_page_polling_timeout, the amdgpu_umc_handle_bad_pages
will be run many times so that double free err_addr in some special case.
So set the err_addr to NULL to avoid the warnings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42123/">CVE-2024-42123 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42123">CVE-2024-42123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228702">SUSE bug 1228702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42124" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Make qedf_execute_tmf() non-preemptible

Stop calling smp_processor_id() from preemptible code in
qedf_execute_tmf90.  This results in BUG_ON() when running an RT kernel.

[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646
[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228705">SUSE bug 1228705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42125" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42125" ref_url="https://www.suse.com/security/cve/CVE-2024-42125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: fw: scan offload prohibit all 6 GHz channel if no 6 GHz sband

We have some policy via BIOS to block uses of 6 GHz. In this case, 6 GHz
sband will be NULL even if it is WiFi 7 chip. So, add NULL handling here
to avoid crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42125/">CVE-2024-42125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42125">CVE-2024-42125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228674">SUSE bug 1228674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt.

nmi_enter()/nmi_exit() touches per cpu variables which can lead to kernel
crash when invoked during real mode interrupt handling (e.g. early HMI/MCE
interrupt handler) if percpu allocation comes from vmalloc area.

Early HMI/MCE handlers are called through DEFINE_INTERRUPT_HANDLER_NMI()
wrapper which invokes nmi_enter/nmi_exit calls. We don't see any issue when
percpu allocation is from the embedded first chunk. However with
CONFIG_NEED_PER_CPU_PAGE_FIRST_CHUNK enabled there are chances where percpu
allocation can come from the vmalloc area.

With kernel command line "percpu_alloc=page" we can force percpu allocation
to come from vmalloc area and can see kernel crash in machine_check_early:

[    1.215714] NIP [c000000000e49eb4] rcu_nmi_enter+0x24/0x110
[    1.215717] LR [c0000000000461a0] machine_check_early+0xf0/0x2c0
[    1.215719] --- interrupt: 200
[    1.215720] [c000000fffd73180] [0000000000000000] 0x0 (unreliable)
[    1.215722] [c000000fffd731b0] [0000000000000000] 0x0
[    1.215724] [c000000fffd73210] [c000000000008364] machine_check_early_common+0x134/0x1f8

Fix this by avoiding use of nmi_enter()/nmi_exit() in real mode if percpu
first chunk is not embedded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/lima: fix shared irq handling on driver remove

lima uses a shared interrupt, so the interrupt handlers must be prepared
to be called at any time. At driver removal time, the clocks are
disabled early and the interrupts stay registered until the very end of
the remove process due to the devm usage.
This is potentially a bug as the interrupts access device registers
which assumes clocks are enabled. A crash can be triggered by removing
the driver in a kernel with CONFIG_DEBUG_SHIRQ enabled.
This patch frees the interrupts at each lima device finishing callback
so that the handlers are already unregistered by the time we fully
disable clocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228721">SUSE bug 1228721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42128" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42128" ref_url="https://www.suse.com/security/cve/CVE-2024-42128" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: an30259a: Use devm_mutex_init() for mutex initialization

In this driver LEDs are registered using devm_led_classdev_register()
so they are automatically unregistered after module's remove() is done.
led_classdev_unregister() calls module's led_set_brightness() to turn off
the LEDs and that callback uses mutex which was destroyed already
in module's remove() so use devm API instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42128/">CVE-2024-42128 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42128">CVE-2024-42128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228684">SUSE bug 1228684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42129" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42129" ref_url="https://www.suse.com/security/cve/CVE-2024-42129" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: mlxreg: Use devm_mutex_init() for mutex initialization

In this driver LEDs are registered using devm_led_classdev_register()
so they are automatically unregistered after module's remove() is done.
led_classdev_unregister() calls module's led_set_brightness() to turn off
the LEDs and that callback uses mutex which was destroyed already
in module's remove() so use devm API instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42129/">CVE-2024-42129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42129">CVE-2024-42129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228681">SUSE bug 1228681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42130" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc/nci: Add the inconsistency check between the input data length and count

write$nci(r0, &amp;(0x7f0000000740)=ANY=[@ANYBLOB="610501"], 0xf)

Syzbot constructed a write() call with a data length of 3 bytes but a count value
of 15, which passed too little data to meet the basic requirements of the function
nci_rf_intf_activated_ntf_packet().

Therefore, increasing the comparison between data length and count value to avoid
problems caused by inconsistent data length and count.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228687">SUSE bug 1228687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: avoid overflows in dirty throttling logic

The dirty throttling logic is interspersed with assumptions that dirty
limits in PAGE_SIZE units fit into 32-bit (so that various multiplications
fit into 64-bits).  If limits end up being larger, we will hit overflows,
possible divisions by 0 etc.  Fix these problems by never allowing so
large dirty limits as they have dubious practical value anyway.  For
dirty_bytes / dirty_background_bytes interfaces we can just refuse to set
so large limits.  For dirty_ratio / dirty_background_ratio it isn't so
simple as the dirty limit is computed from the amount of available memory
which can change due to memory hotplug etc.  So when converting dirty
limits from ratios to numbers of pages, we just don't allow the result to
exceed UINT_MAX.

This is root-only triggerable problem which occurs when the operator
sets dirty limits to &gt;16 TB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228650">SUSE bug 1228650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42132" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42132" ref_url="https://www.suse.com/security/cve/CVE-2024-42132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bluetooth/hci: disallow setting handle bigger than HCI_CONN_HANDLE_MAX

Syzbot hit warning in hci_conn_del() caused by freeing handle that was
not allocated using ida allocator.

This is caused by handle bigger than HCI_CONN_HANDLE_MAX passed by
hci_le_big_sync_established_evt(), which makes code think it's unset
connection.

Add same check for handle upper bound as in hci_conn_set_handle() to
prevent warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42132/">CVE-2024-42132 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42132">CVE-2024-42132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228492">SUSE bug 1228492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42133" ref_url="https://www.suse.com/security/cve/CVE-2024-42133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Ignore too large handle values in BIG

hci_le_big_sync_established_evt is necessary to filter out cases where the
handle value is belonging to ida id range, otherwise ida will be erroneously
released in hci_conn_cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42133/">CVE-2024-42133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228511">SUSE bug 1228511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231419">SUSE bug 1231419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42134" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42134" ref_url="https://www.suse.com/security/cve/CVE-2024-42134" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-pci: Check if is_avq is NULL

[bug]
In the virtio_pci_common.c function vp_del_vqs, vp_dev-&gt;is_avq is involved
to determine whether it is admin virtqueue, but this function vp_dev-&gt;is_avq
 may be empty. For installations, virtio_pci_legacy does not assign a value
 to vp_dev-&gt;is_avq.

[fix]
Check whether it is vp_dev-&gt;is_avq before use.

[test]
Test with virsh Attach device
Before this patch, the following command would crash the guest system

After applying the patch, everything seems to be working fine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42134/">CVE-2024-42134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42134">CVE-2024-42134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228664">SUSE bug 1228664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42135" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42135" ref_url="https://www.suse.com/security/cve/CVE-2024-42135" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost_task: Handle SIGKILL by flushing work and exiting

Instead of lingering until the device is closed, this has us handle
SIGKILL by:

1. marking the worker as killed so we no longer try to use it with
   new virtqueues and new flush operations.
2. setting the virtqueue to worker mapping so no new works are queued.
3. running all the exiting works.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42135/">CVE-2024-42135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42135">CVE-2024-42135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228765">SUSE bug 1228765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42136" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42136" ref_url="https://www.suse.com/security/cve/CVE-2024-42136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cdrom: rearrange last_media_change check to avoid unintentional overflow

When running syzkaller with the newly reintroduced signed integer wrap
sanitizer we encounter this splat:

[  366.015950] UBSAN: signed-integer-overflow in ../drivers/cdrom/cdrom.c:2361:33
[  366.021089] -9223372036854775808 - 346321 cannot be represented in type '__s64' (aka 'long long')
[  366.025894] program syz-executor.4 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  366.027502] CPU: 5 PID: 28472 Comm: syz-executor.7 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1
[  366.027512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  366.027518] Call Trace:
[  366.027523]  &lt;TASK&gt;
[  366.027533]  dump_stack_lvl+0x93/0xd0
[  366.027899]  handle_overflow+0x171/0x1b0
[  366.038787] ata1.00: invalid multi_count 32 ignored
[  366.043924]  cdrom_ioctl+0x2c3f/0x2d10
[  366.063932]  ? __pm_runtime_resume+0xe6/0x130
[  366.071923]  sr_block_ioctl+0x15d/0x1d0
[  366.074624]  ? __pfx_sr_block_ioctl+0x10/0x10
[  366.077642]  blkdev_ioctl+0x419/0x500
[  366.080231]  ? __pfx_blkdev_ioctl+0x10/0x10
...

Historically, the signed integer overflow sanitizer did not work in the
kernel due to its interaction with `-fwrapv` but this has since been
changed [1] in the newest version of Clang. It was re-enabled in the
kernel with Commit 557f8c582a9ba8ab ("ubsan: Reintroduce signed overflow
sanitizer").

Let's rearrange the check to not perform any arithmetic, thus not
tripping the sanitizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42136/">CVE-2024-42136 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42136">CVE-2024-42136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228758">SUSE bug 1228758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42137" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot

Commit 272970be3dab ("Bluetooth: hci_qca: Fix driver shutdown on closed
serdev") will cause below regression issue:

BT can't be enabled after below steps:
cold boot -&gt; enable BT -&gt; disable BT -&gt; warm reboot -&gt; BT enable failure
if property enable-gpios is not configured within DT|ACPI for QCA6390.

The commit is to fix a use-after-free issue within qca_serdev_shutdown()
by adding condition to avoid the serdev is flushed or wrote after closed
but also introduces this regression issue regarding above steps since the
VSC is not sent to reset controller during warm reboot.

Fixed by sending the VSC to reset controller within qca_serdev_shutdown()
once BT was ever enabled, and the use-after-free issue is also fixed by
this change since the serdev is still opened before it is flushed or wrote.

Verified by the reported machine Dell XPS 13 9310 laptop over below two
kernel commits:
commit e00fc2700a3f ("Bluetooth: btusb: Fix triggering coredump
implementation for QCA") of bluetooth-next tree.
commit b23d98d46d28 ("Bluetooth: btusb: Fix triggering coredump
implementation for QCA") of linus mainline tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228563">SUSE bug 1228563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42138" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42138" ref_url="https://www.suse.com/security/cve/CVE-2024-42138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file

In case of invalid INI file mlxsw_linecard_types_init() deallocates memory
but doesn't reset pointer to NULL and returns 0. In case of any error
occurred after mlxsw_linecard_types_init() call, mlxsw_linecards_init()
calls mlxsw_linecard_types_fini() which performs memory deallocation again.

Add pointer reset to NULL.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42138/">CVE-2024-42138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42138">CVE-2024-42138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228500">SUSE bug 1228500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42139" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix improper extts handling

Extts events are disabled and enabled by the application ts2phc.
However, in case where the driver is removed when the application is
running, a specific extts event remains enabled and can cause a kernel
crash.
As a side effect, when the driver is reloaded and application is started
again, remaining extts event for the channel from a previous run will
keep firing and the message "extts on unexpected channel" might be
printed to the user.

To avoid that, extts events shall be disabled when PTP is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228503">SUSE bug 1228503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42140" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42140" ref_url="https://www.suse.com/security/cve/CVE-2024-42140" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: kexec: Avoid deadlock in kexec crash path

If the kexec crash code is called in the interrupt context, the
machine_kexec_mask_interrupts() function will trigger a deadlock while
trying to acquire the irqdesc spinlock and then deactivate irqchip in
irq_set_irqchip_state() function.

Unlike arm64, riscv only requires irq_eoi handler to complete EOI and
keeping irq_set_irqchip_state() will only leave this possible deadlock
without any use. So we simply remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42140/">CVE-2024-42140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42140">CVE-2024-42140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228569">SUSE bug 1228569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42141" ref_url="https://www.suse.com/security/cve/CVE-2024-42141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Check socket flag instead of hcon

This fixes the following Smatch static checker warning:

net/bluetooth/iso.c:1364 iso_sock_recvmsg()
error: we previously assumed 'pi-&gt;conn-&gt;hcon' could be null (line 1359)

net/bluetooth/iso.c
1347 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,
1348                             size_t len, int flags)
1349 {
1350         struct sock *sk = sock-&gt;sk;
1351         struct iso_pinfo *pi = iso_pi(sk);
1352
1353         BT_DBG("sk %p", sk);
1354
1355         if (test_and_clear_bit(BT_SK_DEFER_SETUP,
                                      &amp;bt_sk(sk)-&gt;flags)) {
1356                 lock_sock(sk);
1357                 switch (sk-&gt;sk_state) {
1358                 case BT_CONNECT2:
1359                         if (pi-&gt;conn-&gt;hcon &amp;&amp;
                                     ^^^^^^^^^^^^^^ If -&gt;hcon is NULL

1360                             test_bit(HCI_CONN_PA_SYNC,
                                         &amp;pi-&gt;conn-&gt;hcon-&gt;flags)) {
1361                                 iso_conn_big_sync(sk);
1362                                 sk-&gt;sk_state = BT_LISTEN;
1363                         } else {
--&gt; 1364                         iso_conn_defer_accept(pi-&gt;conn-&gt;hcon);
                                                       ^^^^^^^^^^^^^^
                                                       then we're toast

1365                                 sk-&gt;sk_state = BT_CONFIG;
1366                         }
1367                         release_sock(sk);
1368                         return 0;
1369                 case BT_CONNECTED:
1370                         if (test_bit(BT_SK_PA_SYNC,
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42141/">CVE-2024-42141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42141">CVE-2024-42141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228502">SUSE bug 1228502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42142" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: E-switch, Create ingress ACL when needed

Currently, ingress acl is used for three features. It is created only
when vport metadata match and prio tag are enabled. But active-backup
lag mode also uses it. It is independent of vport metadata match and
prio tag. And vport metadata match can be disabled using the
following devlink command:

 # devlink dev param set pci/0000:08:00.0 name esw_port_metadata \
	value false cmode runtime

If ingress acl is not created, will hit panic when creating drop rule
for active-backup lag mode. If always create it, there will be about
5% performance degradation.

Fix it by creating ingress acl when needed. If esw_port_metadata is
true, ingress acl exists, then create drop rule using existing
ingress acl. If esw_port_metadata is false, create ingress acl and
then create drop rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228491">SUSE bug 1228491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42144" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42144" ref_url="https://www.suse.com/security/cve/CVE-2024-42144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal/drivers/mediatek/lvts_thermal: Check NULL ptr on lvts_data

Verify that lvts_data is not NULL before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42144/">CVE-2024-42144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42144">CVE-2024-42144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228666">SUSE bug 1228666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Implement a limit on UMAD receive List

The existing behavior of ib_umad, which maintains received MAD
packets in an unbounded list, poses a risk of uncontrolled growth.
As user-space applications extract packets from this list, the rate
of extraction may not match the rate of incoming packets, leading
to potential list overflow.

To address this, we introduce a limit to the size of the list. After
considering typical scenarios, such as OpenSM processing, which can
handle approximately 100k packets per second, and the 1-second retry
timeout for most packets, we set the list size limit to 200k. Packets
received beyond this limit are dropped, assuming they are likely timed
out by the time they are handled by user-space.

Notably, packets queued on the receive list due to reasons like
timed-out sends are preserved even when the list is full.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-17"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228744">SUSE bug 1228744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42146" ref_url="https://www.suse.com/security/cve/CVE-2024-42146" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Add outer runtime_pm protection to xe_live_ktest@xe_dma_buf

Any kunit doing any memory access should get their own runtime_pm
outer references since they don't use the standard driver API
entries. In special this dma_buf from the same driver.

Found by pre-merge CI on adding WARN calls for unprotected
inner callers:

&lt;6&gt; [318.639739]     # xe_dma_buf_kunit: running xe_test_dmabuf_import_same_driver
&lt;4&gt; [318.639957] ------------[ cut here ]------------
&lt;4&gt; [318.639967] xe 0000:4d:00.0: Missing outer runtime PM protection
&lt;4&gt; [318.640049] WARNING: CPU: 117 PID: 3832 at drivers/gpu/drm/xe/xe_pm.c:533 xe_pm_runtime_get_noresume+0x48/0x60 [xe]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42146/">CVE-2024-42146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42146">CVE-2024-42146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228751">SUSE bug 1228751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42147" ref_url="https://www.suse.com/security/cve/CVE-2024-42147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/debugfs - Fix debugfs uninit process issue

During the zip probe process, the debugfs failure does not stop
the probe. When debugfs initialization fails, jumping to the
error branch will also release regs, in addition to its own
rollback operation.

As a result, it may be released repeatedly during the regs
uninit process. Therefore, the null check needs to be added to
the regs uninit process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42147/">CVE-2024-42147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42147">CVE-2024-42147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228764">SUSE bug 1228764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42148" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnx2x: Fix multiple UBSAN array-index-out-of-bounds

Fix UBSAN warnings that occur when using a system with 32 physical
cpu cores or more, or when the user defines a number of Ethernet
queues greater than or equal to FP_SB_MAX_E1x using the num_queues
module parameter.

Currently there is a read/write out of bounds that occurs on the array
"struct stats_query_entry query" present inside the "bnx2x_fw_stats_req"
struct in "drivers/net/ethernet/broadcom/bnx2x/bnx2x.h".
Looking at the definition of the "struct stats_query_entry query" array:

struct stats_query_entry query[FP_SB_MAX_E1x+
         BNX2X_FIRST_QUEUE_QUERY_IDX];

FP_SB_MAX_E1x is defined as the maximum number of fast path interrupts and
has a value of 16, while BNX2X_FIRST_QUEUE_QUERY_IDX has a value of 3
meaning the array has a total size of 19.
Since accesses to "struct stats_query_entry query" are offset-ted by
BNX2X_FIRST_QUEUE_QUERY_IDX, that means that the total number of Ethernet
queues should not exceed FP_SB_MAX_E1x (16). However one of these queues
is reserved for FCOE and thus the number of Ethernet queues should be set
to [FP_SB_MAX_E1x -1] (15) if FCOE is enabled or [FP_SB_MAX_E1x] (16) if
it is not.

This is also described in a comment in the source code in
drivers/net/ethernet/broadcom/bnx2x/bnx2x.h just above the Macro definition
of FP_SB_MAX_E1x. Below is the part of this explanation that it important
for this patch

/*
  * The total number of L2 queues, MSIX vectors and HW contexts (CIDs) is
  * control by the number of fast-path status blocks supported by the
  * device (HW/FW). Each fast-path status block (FP-SB) aka non-default
  * status block represents an independent interrupts context that can
  * serve a regular L2 networking queue. However special L2 queues such
  * as the FCoE queue do not require a FP-SB and other components like
  * the CNIC may consume FP-SB reducing the number of possible L2 queues
  *
  * If the maximum number of FP-SB available is X then:
  * a. If CNIC is supported it consumes 1 FP-SB thus the max number of
  *    regular L2 queues is Y=X-1
  * b. In MF mode the actual number of L2 queues is Y= (X-1/MF_factor)
  * c. If the FCoE L2 queue is supported the actual number of L2 queues
  *    is Y+1
  * d. The number of irqs (MSIX vectors) is either Y+1 (one extra for
  *    slow-path interrupts) or Y+2 if CNIC is supported (one additional
  *    FP interrupt context for the CNIC).
  * e. The number of HW context (CID count) is always X or X+1 if FCoE
  *    L2 queue is supported. The cid for the FCoE L2 queue is always X.
  */

However this driver also supports NICs that use the E2 controller which can
handle more queues due to having more FP-SB represented by FP_SB_MAX_E2.
Looking at the commits when the E2 support was added, it was originally
using the E1x parameters: commit f2e0899f0f27 ("bnx2x: Add 57712 support").
Back then FP_SB_MAX_E2 was set to 16 the same as E1x. However the driver
was later updated to take full advantage of the E2 instead of having it be
limited to the capabilities of the E1x. But as far as we can tell, the
array "stats_query_entry query" was still limited to using the FP-SB
available to the E1x cards as part of an oversignt when the driver was
updated to take full advantage of the E2, and now with the driver being
aware of the greater queue size supported by E2 NICs, it causes the UBSAN
warnings seen in the stack traces below.

This patch increases the size of the "stats_query_entry query" array by
replacing FP_SB_MAX_E1x with FP_SB_MAX_E2 to be large enough to handle
both types of NICs.

Stack traces:

UBSAN: array-index-out-of-bounds in
       drivers/net/ethernet/broadcom/bnx2x/bnx2x_stats.c:1529:11
index 20 is out of range for type 'stats_query_entry [19]'
CPU: 12 PID: 858 Comm: systemd-network Not tainted 6.9.0-060900rc7-generic
	     #202405052133
Hardware name: HP ProLiant DL360 Gen9/ProLiant DL360 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228487">SUSE bug 1228487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42149" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42149" ref_url="https://www.suse.com/security/cve/CVE-2024-42149" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: don't misleadingly warn during thaw operations

The block device may have been frozen before it was claimed by a
filesystem. Concurrently another process might try to mount that
frozen block device and has temporarily claimed the block device for
that purpose causing a concurrent fs_bdev_thaw() to end up here. The
mounter is already about to abort mounting because they still saw an
elevanted bdev-&gt;bd_fsfreeze_count so get_bdev_super() will return
NULL in that case.

For example, P1 calls dm_suspend() which calls into bdev_freeze() before
the block device has been claimed by the filesystem. This brings
bdev-&gt;bd_fsfreeze_count to 1 and no call into fs_bdev_freeze() is
required.

Now P2 tries to mount that frozen block device. It claims it and checks
bdev-&gt;bd_fsfreeze_count. As it's elevated it aborts mounting.

In the meantime P3 called dm_resume(). P3 sees that the block device is
already claimed by a filesystem and calls into fs_bdev_thaw().

P3 takes a passive reference and realizes that the filesystem isn't
ready yet. P3 puts itself to sleep to wait for the filesystem to become
ready.

P2 now puts the last active reference to the filesystem and marks it as
dying. P3 gets woken, sees that the filesystem is dying and
get_bdev_super() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42149/">CVE-2024-42149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42149">CVE-2024-42149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228562">SUSE bug 1228562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42150" ref_url="https://www.suse.com/security/cve/CVE-2024-42150" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: txgbe: remove separate irq request for MSI and INTx

When using MSI or INTx interrupts, request_irq() for pdev-&gt;irq will
conflict with request_threaded_irq() for txgbe-&gt;misc.irq, to cause
system crash. So remove txgbe_request_irq() for MSI/INTx case, and
rename txgbe_request_msix_irqs() since it only request for queue irqs.

Add wx-&gt;misc_irq_domain to determine whether the driver creates an IRQ
domain and threaded request the IRQs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42150/">CVE-2024-42150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42150">CVE-2024-42150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228498">SUSE bug 1228498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42151" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42151" ref_url="https://www.suse.com/security/cve/CVE-2024-42151" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable

Test case dummy_st_ops/dummy_init_ret_value passes NULL as the first
parameter of the test_1() function. Mark this parameter as nullable to
make verifier aware of such possibility.
Otherwise, NULL check in the test_1() code:

      SEC("struct_ops/test_1")
      int BPF_PROG(test_1, struct bpf_dummy_ops_state *state)
      {
            if (!state)
                    return ...;

            ... access state ...
      }

Might be removed by verifier, thus triggering NULL pointer dereference
under certain conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42151/">CVE-2024-42151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42151">CVE-2024-42151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228719">SUSE bug 1228719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a possible leak when destroy a ctrl during qp establishment

In nvmet_sq_destroy we capture sq-&gt;ctrl early and if it is non-NULL we
know that a ctrl was allocated (in the admin connect request handler)
and we need to release pending AERs, clear ctrl-&gt;sqs and sq-&gt;ctrl
(for nvme-loop primarily), and drop the final reference on the ctrl.

However, a small window is possible where nvmet_sq_destroy starts (as
a result of the client giving up and disconnecting) concurrently with
the nvme admin connect cmd (which may be in an early stage). But *before*
kill_and_confirm of sq-&gt;ref (i.e. the admin connect managed to get an sq
live reference). In this case, sq-&gt;ctrl was allocated however after it was
captured in a local variable in nvmet_sq_destroy.
This prevented the final reference drop on the ctrl.

Solve this by re-capturing the sq-&gt;ctrl after all inflight request has
completed, where for sure sq-&gt;ctrl reference is final, and move forward
based on that.

This issue was observed in an environment with many hosts connecting
multiple ctrls simoutanuosly, creating a delay in allocating a ctrl
leading up to this race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228724">SUSE bug 1228724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42153" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42153" ref_url="https://www.suse.com/security/cve/CVE-2024-42153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: pnx: Fix potential deadlock warning from del_timer_sync() call in isr

When del_timer_sync() is called in an interrupt context it throws a warning
because of potential deadlock. The timer is used only to exit from
wait_for_completion() after a timeout so replacing the call with
wait_for_completion_timeout() allows to remove the problematic timer and
its related functions altogether.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42153/">CVE-2024-42153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42153">CVE-2024-42153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228510">SUSE bug 1228510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42154" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_metrics: validate source addr length

I don't see anything checking that TCP_METRICS_ATTR_SADDR_IPV4
is at least 4 bytes long, and the policy doesn't have an entry
for this attribute at all (neither does it for IPv6 but v6 is
manually validated).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228507">SUSE bug 1228507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42155" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Wipe copies of protected- and secure-keys

Although the clear-key of neither protected- nor secure-keys is
accessible, this key material should only be visible to the calling
process. So wipe all copies of protected- or secure-keys from stack,
even in case of an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228733">SUSE bug 1228733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Wipe copies of clear-key structures on failure

Wipe all sensitive data from stack for all IOCTLs, which convert a
clear-key into a protected- or secure-key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228722">SUSE bug 1228722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42157" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Wipe sensitive data on failure

Wipe sensitive data from stack also if the copy_to_user() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228727">SUSE bug 1228727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42158" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Use kfree_sensitive() to fix Coccinelle warnings

Replace memzero_explicit() and kfree() with kfree_sensitive() to fix
warnings reported by Coccinelle:

WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1506)
WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1643)
WARNING opportunity for kfree_sensitive/kvfree_sensitive (line 1770)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-10"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228720">SUSE bug 1228720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42159" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42159" ref_url="https://www.suse.com/security/cve/CVE-2024-42159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Sanitise num_phys

Information is stored in mr_sas_port-&gt;phy_mask, values larger then size of
this field shouldn't be allowed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42159/">CVE-2024-42159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42159">CVE-2024-42159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228754">SUSE bug 1228754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228755">SUSE bug 1228755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42160" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42160" ref_url="https://www.suse.com/security/cve/CVE-2024-42160" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: check validation of fault attrs in f2fs_build_fault_attr()

- It missed to check validation of fault attrs in parse_options(),
let's fix to add check condition in f2fs_build_fault_attr().
- Use f2fs_build_fault_attr() in __sbi_store() to clean up code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42160/">CVE-2024-42160 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42160">CVE-2024-42160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228725">SUSE bug 1228725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42161" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD

[Changes from V1:
 - Use a default branch in the switch statement to initialize `val'.]

GCC warns that `val' may be used uninitialized in the
BPF_CRE_READ_BITFIELD macro, defined in bpf_core_read.h as:

	[...]
	unsigned long long val;						      \
	[...]								      \
	switch (__CORE_RELO(s, field, BYTE_SIZE)) {			      \
	case 1: val = *(const unsigned char *)p; break;			      \
	case 2: val = *(const unsigned short *)p; break;		      \
	case 4: val = *(const unsigned int *)p; break;			      \
	case 8: val = *(const unsigned long long *)p; break;		      \
        }       							      \
	[...]
	val;								      \
	}								      \

This patch adds a default entry in the switch statement that sets
`val' to zero in order to avoid the warning, and random values to be
used in case __builtin_preserve_field_info returns unexpected values
for BPF_FIELD_BYTE_SIZE.

Tested in bpf-next master.
No regressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228756">SUSE bug 1228756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42162" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: Account for stopped queues when reading NIC stats

We now account for the fact that the NIC might send us stats for a
subset of queues. Without this change, gve_get_ethtool_stats might make
an invalid access on the priv-&gt;stats_report-&gt;stats array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228706">SUSE bug 1228706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42223" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: tda10048: Fix integer overflow

state-&gt;xtal_hz can be up to 16M, so it can overflow a 32 bit integer
when multiplied by pll_mfactor.

Create a new 64 bit variable to hold the calculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228726">SUSE bug 1228726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: Correct check for empty list

Since commit a3c53be55c95 ("net: dsa: mv88e6xxx: Support multiple MDIO
busses") mv88e6xxx_default_mdio_bus() has checked that the
return value of list_first_entry() is non-NULL.

This appears to be intended to guard against the list chip-&gt;mdios being
empty.  However, it is not the correct check as the implementation of
list_first_entry is not designed to return NULL for empty lists.

Instead, use list_first_entry_or_null() which does return NULL if the
list is empty.

Flagged by Smatch.
Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228723">SUSE bug 1228723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: replace skb_put with skb_put_zero

Avoid potentially reusing uninitialized data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228710">SUSE bug 1228710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42226" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228709">SUSE bug 1228709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42227" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42227" ref_url="https://www.suse.com/security/cve/CVE-2024-42227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix overlapping copy within dml_core_mode_programming

[WHY]
&amp;mode_lib-&gt;mp.Watermark and &amp;locals-&gt;Watermark are
the same address. memcpy may lead to unexpected behavior.

[HOW]
memmove should be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42227/">CVE-2024-42227 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42227">CVE-2024-42227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228707">SUSE bug 1228707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42228" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019753.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc

Initialize the size before calling amdgpu_vce_cs_reloc, such as case 0x03000001.
V2: To really improve the handling we would actually
   need to have a separate value of 0xffffffff.(Christian)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-11-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228667">SUSE bug 1228667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: aead,cipher - zeroize key buffer after use

I.G 9.7.B for FIPS 140-3 specifies that variables temporarily holding
cryptographic information should be zeroized once they are no longer
needed. Accomplish this by using kfree_sensitive for buffers that
previously held the private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42230" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Fix scv instruction crash with kexec

kexec on pseries disables AIL (reloc_on_exc), required for scv
instruction support, before other CPUs have been shut down. This means
they can execute scv instructions after AIL is disabled, which causes an
interrupt at an unexpected entry location that crashes the kernel.

Change the kexec sequence to disable AIL after other CPUs have been
brought down.

As a refresher, the real-mode scv interrupt vector is 0x17000, and the
fixed-location head code probably couldn't easily deal with implementing
such high addresses so it was just decided not to support that interrupt
at all.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228489">SUSE bug 1228489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42231" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42231" ref_url="https://www.suse.com/security/cve/CVE-2024-42231" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zoned: fix calc_available_free_space() for zoned mode

calc_available_free_space() returns the total size of metadata (or
system) block groups, which can be allocated from unallocated disk
space. The logic is wrong on zoned mode in two places.

First, the calculation of data_chunk_size is wrong. We always allocate
one zone as one chunk, and no partial allocation of a zone. So, we
should use zone_size (= data_sinfo-&gt;chunk_size) as it is.

Second, the result "avail" may not be zone aligned. Since we always
allocate one zone as one chunk on zoned mode, returning non-zone size
aligned bytes will result in less pressure on the async metadata reclaim
process.

This is serious for the nearly full state with a large zone size device.
Allowing over-commit too much will result in less async reclaim work and
end up in ENOSPC. We can align down to the zone size to avoid that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42231/">CVE-2024-42231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42231">CVE-2024-42231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228571">SUSE bug 1228571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix race between delayed_work() and ceph_monc_stop()

The way the delayed work is handled in ceph_monc_stop() is prone to
races with mon_fault() and possibly also finish_hunting().  Both of
these can requeue the delayed work which wouldn't be canceled by any of
the following code in case that happens after cancel_delayed_work_sync()
runs -- __close_session() doesn't mess with the delayed work in order
to avoid interfering with the hunting interval logic.  This part was
missed in commit b5d91704f53e ("libceph: behave in mon_fault() if
cur_mon &lt; 0") and use-after-free can still ensue on monc and objects
that hang off of it, with monc-&gt;auth and monc-&gt;monmap being
particularly susceptible to quickly being reused.

To fix this:

- clear monc-&gt;cur_mon and monc-&gt;hunting as part of closing the session
  in ceph_monc_stop()
- bail from delayed_work() if monc-&gt;cur_mon is cleared, similar to how
  it's done in mon_fault() and finish_hunting() (based on monc-&gt;hunting)
- call cancel_delayed_work_sync() after the session is closed
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229458">SUSE bug 1229458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42233" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42233" ref_url="https://www.suse.com/security/cve/CVE-2024-42233" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filemap: replace pte_offset_map() with pte_offset_map_nolock()

The vmf-&gt;ptl in filemap_fault_recheck_pte_none() is still set from
handle_pte_fault().  But at the same time, we did a pte_unmap(vmf-&gt;pte). 
After a pte_unmap(vmf-&gt;pte) unmap and rcu_read_unlock(), the page table
may be racily changed and vmf-&gt;ptl maybe fails to protect the actual page
table.  Fix this by replacing pte_offset_map() with
pte_offset_map_nolock().

As David said, the PTL pointer might be stale so if we continue to use
it infilemap_fault_recheck_pte_none(), it might trigger UAF.  Also, if
the PTL fails, the issue fixed by commit 58f327f2ce80 ("filemap: avoid
unnecessary major faults in filemap_fault()") might reappear.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42233/">CVE-2024-42233 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42233">CVE-2024-42233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228960">SUSE bug 1228960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42234" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42234" ref_url="https://www.suse.com/security/cve/CVE-2024-42234" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix crashes from deferred split racing folio migration

Even on 6.10-rc6, I've been seeing elusive "Bad page state"s (often on
flags when freeing, yet the flags shown are not bad: PG_locked had been
set and cleared??), and VM_BUG_ON_PAGE(page_ref_count(page) == 0)s from
deferred_split_scan()'s folio_put(), and a variety of other BUG and WARN
symptoms implying double free by deferred split and large folio migration.

6.7 commit 9bcef5973e31 ("mm: memcg: fix split queue list crash when large
folio migration") was right to fix the memcg-dependent locking broken in
85ce2c517ade ("memcontrol: only transfer the memcg data for migration"),
but missed a subtlety of deferred_split_scan(): it moves folios to its own
local list to work on them without split_queue_lock, during which time
folio-&gt;_deferred_list is not empty, but even the "right" lock does nothing
to secure the folio and the list it is on.

Fortunately, deferred_split_scan() is careful to use folio_try_get(): so
folio_migrate_mapping() can avoid the race by folio_undo_large_rmappable()
while the old folio's reference count is temporarily frozen to 0 - adding
such a freeze in the !mapping case too (originally, folio lock and
unmapping and no swap cache left an anon folio unreachable, so no freezing
was needed there: but the deferred split queue offers a way to reach it).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42234/">CVE-2024-42234 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42234">CVE-2024-42234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228962">SUSE bug 1228962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42235" ref_url="https://www.suse.com/security/cve/CVE-2024-42235" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/mm: Add NULL pointer check to crst_table_free() base_crst_free()

crst_table_free() used to work with NULL pointers before the conversion
to ptdescs.  Since crst_table_free() can be called with a NULL pointer
(error handling in crst_table_upgrade() add an explicit check.

Also add the same check to base_crst_free() for consistency reasons.

In real life this should not happen, since order two GFP_KERNEL
allocations will not fail, unless FAIL_PAGE_ALLOC is enabled and used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42235/">CVE-2024-42235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42235">CVE-2024-42235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228963">SUSE bug 1228963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()

Userspace provided string 's' could trivially have the length zero. Left
unchecked this will firstly result in an OOB read in the form
`if (str[0 - 1] == '\n') followed closely by an OOB write in the form
`str[0 - 1] = '\0'`.

There is already a validating check to catch strings that are too long.
Let's supply an additional check for invalid strings that are too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228964">SUSE bug 1228964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Validate payload length before processing block

Move the payload length check in cs_dsp_load() and cs_dsp_coeff_load()
to be done before the block is processed.

The check that the length of a block payload does not exceed the number
of remaining bytes in the firwmware file buffer was being done near the
end of the loop iteration. However, some code before that check used the
length field without validating it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228992">SUSE bug 1228992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42238" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: cs_dsp: Return error if block header overflows file

Return an error from cs_dsp_power_up() if a block header is longer
than the amount of data left in the file.

The previous code in cs_dsp_load() and cs_dsp_load_coeff() would loop
while there was enough data left in the file for a valid region. This
protected against overrunning the end of the file data, but it didn't
abort the file processing with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228991">SUSE bug 1228991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42239" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fail bpf_timer_cancel when callback is being cancelled

Given a schedule:

timer1 cb			timer2 cb

bpf_timer_cancel(timer2);	bpf_timer_cancel(timer1);

Both bpf_timer_cancel calls would wait for the other callback to finish
executing, introducing a lockup.

Add an atomic_t count named 'cancelling' in bpf_hrtimer. This keeps
track of all in-flight cancellation requests for a given BPF timer.
Whenever cancelling a BPF timer, we must check if we have outstanding
cancellation requests, and if so, we must fail the operation with an
error (-EDEADLK) since cancellation is synchronous and waits for the
callback to finish executing. This implies that we can enter a deadlock
situation involving two or more timer callbacks executing in parallel
and attempting to cancel one another.

Note that we avoid incrementing the cancelling counter for the target
timer (the one being cancelled) if bpf_timer_cancel is not invoked from
a callback, to avoid spurious errors. The whole point of detecting
cur-&gt;cancelling and returning -EDEADLK is to not enter a busy wait loop
(which may or may not lead to a lockup). This does not apply in case the
caller is in a non-callback context, the other side can continue to
cancel as it sees fit without running into errors.

Background on prior attempts:

Earlier versions of this patch used a bool 'cancelling' bit and used the
following pattern under timer-&gt;lock to publish cancellation status.

lock(t-&gt;lock);
t-&gt;cancelling = true;
mb();
if (cur-&gt;cancelling)
	return -EDEADLK;
unlock(t-&gt;lock);
hrtimer_cancel(t-&gt;timer);
t-&gt;cancelling = false;

The store outside the critical section could overwrite a parallel
requests t-&gt;cancelling assignment to true, to ensure the parallely
executing callback observes its cancellation status.

It would be necessary to clear this cancelling bit once hrtimer_cancel
is done, but lack of serialization introduced races. Another option was
explored where bpf_timer_start would clear the bit when (re)starting the
timer under timer-&gt;lock. This would ensure serialized access to the
cancelling bit, but may allow it to be cleared before in-flight
hrtimer_cancel has finished executing, such that lockups can occur
again.

Thus, we choose an atomic counter to keep track of all outstanding
cancellation requests and use it to prevent lockups in case callbacks
attempt to cancel each other while executing in parallel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228979">SUSE bug 1228979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42240" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/bhi: Avoid warning in #DB handler due to BHI mitigation

When BHI mitigation is enabled, if SYSENTER is invoked with the TF flag set
then entry_SYSENTER_compat() uses CLEAR_BRANCH_HISTORY and calls the
clear_bhb_loop() before the TF flag is cleared. This causes the #DB handler
(exc_debug_kernel()) to issue a warning because single-step is used outside the
entry_SYSENTER_compat() function.

To address this issue, entry_SYSENTER_compat() should use CLEAR_BRANCH_HISTORY
after making sure the TF flag is cleared.

The problem can be reproduced with the following sequence:

  $ cat sysenter_step.c
  int main()
  { asm("pushf; pop %ax; bts $8,%ax; push %ax; popf; sysenter"); }

  $ gcc -o sysenter_step sysenter_step.c

  $ ./sysenter_step
  Segmentation fault (core dumped)

The program is expected to crash, and the #DB handler will issue a warning.

Kernel log:

  WARNING: CPU: 27 PID: 7000 at arch/x86/kernel/traps.c:1009 exc_debug_kernel+0xd2/0x160
  ...
  RIP: 0010:exc_debug_kernel+0xd2/0x160
  ...
  Call Trace:
  &lt;#DB&gt;
   ? show_regs+0x68/0x80
   ? __warn+0x8c/0x140
   ? exc_debug_kernel+0xd2/0x160
   ? report_bug+0x175/0x1a0
   ? handle_bug+0x44/0x90
   ? exc_invalid_op+0x1c/0x70
   ? asm_exc_invalid_op+0x1f/0x30
   ? exc_debug_kernel+0xd2/0x160
   exc_debug+0x43/0x50
   asm_exc_debug+0x1e/0x40
  RIP: 0010:clear_bhb_loop+0x0/0xb0
  ...
  &lt;/#DB&gt;
  &lt;TASK&gt;
   ? entry_SYSENTER_compat_after_hwframe+0x6e/0x8d
  &lt;/TASK&gt;

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42241" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42241" ref_url="https://www.suse.com/security/cve/CVE-2024-42241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/shmem: disable PMD-sized page cache if needed

For shmem files, it's possible that PMD-sized page cache can't be
supported by xarray.  For example, 512MB page cache on ARM64 when the base
page size is 64KB can't be supported by xarray.  It leads to errors as the
following messages indicate when this sort of xarray entry is split.

WARNING: CPU: 34 PID: 7578 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128
Modules linked in: binfmt_misc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6   \
nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject        \
nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4  \
ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse xfs  \
libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net \
net_failover virtio_console virtio_blk failover dimlib virtio_mmio
CPU: 34 PID: 7578 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #9
Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024
pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : xas_split_alloc+0xf8/0x128
lr : split_huge_page_to_list_to_order+0x1c4/0x720
sp : ffff8000882af5f0
x29: ffff8000882af5f0 x28: ffff8000882af650 x27: ffff8000882af768
x26: 0000000000000cc0 x25: 000000000000000d x24: ffff00010625b858
x23: ffff8000882af650 x22: ffffffdfc0900000 x21: 0000000000000000
x20: 0000000000000000 x19: ffffffdfc0900000 x18: 0000000000000000
x17: 0000000000000000 x16: 0000018000000000 x15: 52f8004000000000
x14: 0000e00000000000 x13: 0000000000002000 x12: 0000000000000020
x11: 52f8000000000000 x10: 52f8e1c0ffff6000 x9 : ffffbeb9619a681c
x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff00010b02ddb0
x5 : ffffbeb96395e378 x4 : 0000000000000000 x3 : 0000000000000cc0
x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000
Call trace:
 xas_split_alloc+0xf8/0x128
 split_huge_page_to_list_to_order+0x1c4/0x720
 truncate_inode_partial_folio+0xdc/0x160
 shmem_undo_range+0x2bc/0x6a8
 shmem_fallocate+0x134/0x430
 vfs_fallocate+0x124/0x2e8
 ksys_fallocate+0x4c/0xa0
 __arm64_sys_fallocate+0x24/0x38
 invoke_syscall.constprop.0+0x7c/0xd8
 do_el0_svc+0xb4/0xd0
 el0_svc+0x44/0x1d8
 el0t_64_sync_handler+0x134/0x150
 el0t_64_sync+0x17c/0x180

Fix it by disabling PMD-sized page cache when HPAGE_PMD_ORDER is larger
than MAX_PAGECACHE_ORDER.  As Matthew Wilcox pointed, the page cache in a
shmem file isn't represented by a multi-index entry and doesn't have this
limitation when the xarry entry is split until commit 6b24ca4a1a8d ("mm:
Use multi-index entries in the page cache").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42241/">CVE-2024-42241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42241">CVE-2024-42241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228986">SUSE bug 1228986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42242" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42242" ref_url="https://www.suse.com/security/cve/CVE-2024-42242" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci: Fix max_seg_size for 64KiB PAGE_SIZE

blk_queue_max_segment_size() ensured:

	if (max_size &lt; PAGE_SIZE)
		max_size = PAGE_SIZE;

whereas:

blk_validate_limits() makes it an error:

	if (WARN_ON_ONCE(lim-&gt;max_segment_size &lt; PAGE_SIZE))
		return -EINVAL;

The change from one to the other, exposed sdhci which was setting maximum
segment size too low in some circumstances.

Fix the maximum segment size when it is too low.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42242/">CVE-2024-42242 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42242">CVE-2024-42242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228990">SUSE bug 1228990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42243" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42243" ref_url="https://www.suse.com/security/cve/CVE-2024-42243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray

Patch series "mm/filemap: Limit page cache size to that supported by
xarray", v2.

Currently, xarray can't support arbitrary page cache size.  More details
can be found from the WARN_ON() statement in xas_split_alloc().  In our
test whose code is attached below, we hit the WARN_ON() on ARM64 system
where the base page size is 64KB and huge page size is 512MB.  The issue
was reported long time ago and some discussions on it can be found here
[1].

[1] https://www.spinics.net/lists/linux-xfs/msg75404.html

In order to fix the issue, we need to adjust MAX_PAGECACHE_ORDER to one
supported by xarray and avoid PMD-sized page cache if needed.  The code
changes are suggested by David Hildenbrand.

PATCH[1] adjusts MAX_PAGECACHE_ORDER to that supported by xarray
PATCH[2-3] avoids PMD-sized page cache in the synchronous readahead path
PATCH[4] avoids PMD-sized page cache for shmem files if needed

Test program
============
# cat test.c
#define _GNU_SOURCE
#include &lt;stdio.h&gt;
#include &lt;stdlib.h&gt;
#include &lt;unistd.h&gt;
#include &lt;string.h&gt;
#include &lt;fcntl.h&gt;
#include &lt;errno.h&gt;
#include &lt;sys/syscall.h&gt;
#include &lt;sys/mman.h&gt;

#define TEST_XFS_FILENAME	"/tmp/data"
#define TEST_SHMEM_FILENAME	"/dev/shm/data"
#define TEST_MEM_SIZE		0x20000000

int main(int argc, char **argv)
{
	const char *filename;
	int fd = 0;
	void *buf = (void *)-1, *p;
	int pgsize = getpagesize();
	int ret;

	if (pgsize != 0x10000) {
		fprintf(stderr, "64KB base page size is required\n");
		return -EPERM;
	}

	system("echo force &gt; /sys/kernel/mm/transparent_hugepage/shmem_enabled");
	system("rm -fr /tmp/data");
	system("rm -fr /dev/shm/data");
	system("echo 1 &gt; /proc/sys/vm/drop_caches");

	/* Open xfs or shmem file */
	filename = TEST_XFS_FILENAME;
	if (argc &gt; 1 &amp;&amp; !strcmp(argv[1], "shmem"))
		filename = TEST_SHMEM_FILENAME;

	fd = open(filename, O_CREAT | O_RDWR | O_TRUNC);
	if (fd &lt; 0) {
		fprintf(stderr, "Unable to open &lt;%s&gt;\n", filename);
		return -EIO;
	}

	/* Extend file size */
	ret = ftruncate(fd, TEST_MEM_SIZE);
	if (ret) {
		fprintf(stderr, "Error %d to ftruncate()\n", ret);
		goto cleanup;
	}

	/* Create VMA */
	buf = mmap(NULL, TEST_MEM_SIZE,
		   PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
	if (buf == (void *)-1) {
		fprintf(stderr, "Unable to mmap &lt;%s&gt;\n", filename);
		goto cleanup;
	}

	fprintf(stdout, "mapped buffer at 0x%p\n", buf);
	ret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);
        if (ret) {
		fprintf(stderr, "Unable to madvise(MADV_HUGEPAGE)\n");
		goto cleanup;
	}

	/* Populate VMA */
	ret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_WRITE);
	if (ret) {
		fprintf(stderr, "Error %d to madvise(MADV_POPULATE_WRITE)\n", ret);
		goto cleanup;
	}

	/* Punch the file to enforce xarray split */
	ret = fallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,
        		TEST_MEM_SIZE - pgsize, pgsize);
	if (ret)
		fprintf(stderr, "Error %d to fallocate()\n", ret);

cleanup:
	if (buf != (void *)-1)
		munmap(buf, TEST_MEM_SIZE);
	if (fd &gt; 0)
		close(fd);

	return 0;
}

# gcc test.c -o test
# cat /proc/1/smaps | grep KernelPageSize | head -n 1
KernelPageSize:       64 kB
# ./test shmem
   :
------------[ cut here ]------------
WARNING: CPU: 17 PID: 5253 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128
Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib  \
nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct    \
nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4    \
ip_set nf_tables rfkill nfnetlink vfat fat virtio_balloon          \
drm fuse xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64  \
virtio_net sha1_ce net_failover failover virtio_console virtio_blk \
dimlib virtio_mmio
CPU: 17 PID: 5253 Comm: test Kdump: loaded Tainted: G W 6.10.0-rc5-gavin+ #12
Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024
pstate: 83400005 (Nzcv daif +PAN -UAO +TC
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42243/">CVE-2024-42243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42243">CVE-2024-42243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229001">SUSE bug 1229001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: serial: mos7840: fix crash on resume

Since commit c49cfa917025 ("USB: serial: use generic method if no
alternative is provided in usb serial layer"), USB serial core calls the
generic resume implementation when the driver has not provided one.

This can trigger a crash on resume with mos7840 since support for
multiple read URBs was added back in 2011. Specifically, both port read
URBs are now submitted on resume for open ports, but the context pointer
of the second URB is left set to the core rather than mos7840 port
structure.

Fix this by implementing dedicated suspend and resume functions for
mos7840.

Tested with Delock 87414 USB 2.0 to 4x serial adapter.

[ johan: analyse crash and rewrite commit message; set busy flag on
         resume; drop bulk-in check; drop unnecessary usb_kill_urb() ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228967">SUSE bug 1228967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42245" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42245" ref_url="https://www.suse.com/security/cve/CVE-2024-42245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "sched/fair: Make sure to try to detach at least one movable task"

This reverts commit b0defa7ae03ecf91b8bfd10ede430cff12fcbd06.

b0defa7ae03ec changed the load balancing logic to ignore env.max_loop if
all tasks examined to that point were pinned. The goal of the patch was
to make it more likely to be able to detach a task buried in a long list
of pinned tasks. However, this has the unfortunate side effect of
creating an O(n) iteration in detach_tasks(), as we now must fully
iterate every task on a cpu if all or most are pinned. Since this load
balance code is done with rq lock held, and often in softirq context, it
is very easy to trigger hard lockups. We observed such hard lockups with
a user who affined O(10k) threads to a single cpu.

When I discussed this with Vincent he initially suggested that we keep
the limit on the number of tasks to detach, but increase the number of
tasks we can search. However, after some back and forth on the mailing
list, he recommended we instead revert the original patch, as it seems
likely no one was actually getting hit by the original issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42245/">CVE-2024-42245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42245">CVE-2024-42245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228978">SUSE bug 1228978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket

When using a BPF program on kernel_connect(), the call can return -EPERM. This
causes xs_tcp_setup_socket() to loop forever, filling up the syslog and causing
the kernel to potentially freeze up.

Neil suggested:

  This will propagate -EPERM up into other layers which might not be ready
  to handle it. It might be safer to map EPERM to an error we would be more
  likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.

ECONNREFUSED as error seems reasonable. For programs setting a different error
can be out of reach (see handling in 4fbac77d2d09) in particular on kernels
which do not have f10d05966196 ("bpf: Make BPF_PROG_RUN_ARRAY return -err
instead of allow boolean"), thus given that it is better to simply remap for
consistent behavior. UDP does handle EPERM in xs_udp_send_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228989">SUSE bug 1228989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42247" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: allowedips: avoid unaligned 64-bit memory accesses

On the parisc platform, the kernel issues kernel warnings because
swap_endian() tries to load a 128-bit IPv6 address from an unaligned
memory location:

 Kernel: unaligned access to 0x55f4688c in wg_allowedips_insert_v6+0x2c/0x80 [wireguard] (iir 0xf3010df)
 Kernel: unaligned access to 0x55f46884 in wg_allowedips_insert_v6+0x38/0x80 [wireguard] (iir 0xf2010dc)

Avoid such unaligned memory accesses by instead using the
get_unaligned_be64() helper macro.

[Jason: replace src[8] in original patch with src+8]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228988">SUSE bug 1228988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42248" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42248" ref_url="https://www.suse.com/security/cve/CVE-2024-42248" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: ma35d1: Add a NULL check for of_node

The pdev-&gt;dev.of_node can be NULL if the "serial" node is absent.
Add a NULL check to return an error in such cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42248/">CVE-2024-42248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42248">CVE-2024-42248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228965">SUSE bug 1228965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42249" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42249" ref_url="https://www.suse.com/security/cve/CVE-2024-42249" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: don't unoptimize message in spi_async()

Calling spi_maybe_unoptimize_message() in spi_async() is wrong because
the message is likely to be in the queue and not transferred yet. This
can corrupt the message while it is being used by the controller driver.

spi_maybe_unoptimize_message() is already called in the correct place
in spi_finalize_current_message() to balance the call to
spi_maybe_optimize_message() in spi_async().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42249/">CVE-2024-42249 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42249">CVE-2024-42249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228987">SUSE bug 1228987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42250" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42250" ref_url="https://www.suse.com/security/cve/CVE-2024-42250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: add missing lock protection when polling

Add missing lock protection in poll routine when iterating xarray,
otherwise:

Even with RCU read lock held, only the slot of the radix tree is
ensured to be pinned there, while the data structure (e.g. struct
cachefiles_req) stored in the slot has no such guarantee.  The poll
routine will iterate the radix tree and dereference cachefiles_req
accordingly.  Thus RCU read lock is not adequate in this case and
spinlock is needed here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42250/">CVE-2024-42250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42250">CVE-2024-42250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228977">SUSE bug 1228977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42251" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42251" ref_url="https://www.suse.com/security/cve/CVE-2024-42251" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: page_ref: remove folio_try_get_rcu()

The below bug was reported on a non-SMP kernel:

[  275.267158][ T4335] ------------[ cut here ]------------
[  275.267949][ T4335] kernel BUG at include/linux/page_ref.h:275!
[  275.268526][ T4335] invalid opcode: 0000 [#1] KASAN PTI
[  275.269001][ T4335] CPU: 0 PID: 4335 Comm: trinity-c3 Not tainted 6.7.0-rc4-00061-gefa7df3e3bb5 #1
[  275.269787][ T4335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[  275.270679][ T4335] RIP: 0010:try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))
[  275.272813][ T4335] RSP: 0018:ffffc90005dcf650 EFLAGS: 00010202
[  275.273346][ T4335] RAX: 0000000000000246 RBX: ffffea00066e0000 RCX: 0000000000000000
[  275.274032][ T4335] RDX: fffff94000cdc007 RSI: 0000000000000004 RDI: ffffea00066e0034
[  275.274719][ T4335] RBP: ffffea00066e0000 R08: 0000000000000000 R09: fffff94000cdc006
[  275.275404][ T4335] R10: ffffea00066e0037 R11: 0000000000000000 R12: 0000000000000136
[  275.276106][ T4335] R13: ffffea00066e0034 R14: dffffc0000000000 R15: ffffea00066e0008
[  275.276790][ T4335] FS:  00007fa2f9b61740(0000) GS:ffffffff89d0d000(0000) knlGS:0000000000000000
[  275.277570][ T4335] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  275.278143][ T4335] CR2: 00007fa2f6c00000 CR3: 0000000134b04000 CR4: 00000000000406f0
[  275.278833][ T4335] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  275.279521][ T4335] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  275.280201][ T4335] Call Trace:
[  275.280499][ T4335]  &lt;TASK&gt;
[ 275.280751][ T4335] ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447)
[ 275.281087][ T4335] ? do_trap (arch/x86/kernel/traps.c:112 arch/x86/kernel/traps.c:153)
[ 275.281463][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))
[ 275.281884][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))
[ 275.282300][ T4335] ? do_error_trap (arch/x86/kernel/traps.c:174)
[ 275.282711][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))
[ 275.283129][ T4335] ? handle_invalid_op (arch/x86/kernel/traps.c:212)
[ 275.283561][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))
[ 275.283990][ T4335] ? exc_invalid_op (arch/x86/kernel/traps.c:264)
[ 275.284415][ T4335] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568)
[ 275.284859][ T4335] ? try_get_folio (include/linux/page_ref.h:275 (discriminator 3) mm/gup.c:79 (discriminator 3))
[ 275.285278][ T4335] try_grab_folio (mm/gup.c:148)
[ 275.285684][ T4335] __get_user_pages (mm/gup.c:1297 (discriminator 1))
[ 275.286111][ T4335] ? __pfx___get_user_pages (mm/gup.c:1188)
[ 275.286579][ T4335] ? __pfx_validate_chain (kernel/locking/lockdep.c:3825)
[ 275.287034][ T4335] ? mark_lock (kernel/locking/lockdep.c:4656 (discriminator 1))
[ 275.287416][ T4335] __gup_longterm_locked (mm/gup.c:1509 mm/gup.c:2209)
[ 275.288192][ T4335] ? __pfx___gup_longterm_locked (mm/gup.c:2204)
[ 275.288697][ T4335] ? __pfx_lock_acquire (kernel/locking/lockdep.c:5722)
[ 275.289135][ T4335] ? __pfx___might_resched (kernel/sched/core.c:10106)
[ 275.289595][ T4335] pin_user_pages_remote (mm/gup.c:3350)
[ 275.290041][ T4335] ? __pfx_pin_user_pages_remote (mm/gup.c:3350)
[ 275.290545][ T4335] ? find_held_lock (kernel/locking/lockdep.c:5244 (discriminator 1))
[ 275.290961][ T4335] ? mm_access (kernel/fork.c:1573)
[ 275.291353][ T4335] process_vm_rw_single_vec+0x142/0x360
[ 275.291900][ T4335] ? __pfx_process_vm_rw_single_vec+0x10/0x10
[ 275.292471][ T4335] ? mm_access (kernel/fork.c:1573)
[ 275.292859][ T4335] process_vm_rw_core+0x272/0x4e0
[ 275.293384][ T4335] ? hlock_class (a
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42251/">CVE-2024-42251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42251">CVE-2024-42251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228993">SUSE bug 1228993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42252" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42252" ref_url="https://www.suse.com/security/cve/CVE-2024-42252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

closures: Change BUG_ON() to WARN_ON()

If a BUG_ON() can be hit in the wild, it shouldn't be a BUG_ON()

For reference, this has popped up once in the CI, and we'll need more
info to debug it:

03240 ------------[ cut here ]------------
03240 kernel BUG at lib/closure.c:21!
03240 kernel BUG at lib/closure.c:21!
03240 Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
03240 Modules linked in:
03240 CPU: 15 PID: 40534 Comm: kworker/u80:1 Not tainted 6.10.0-rc4-ktest-ga56da69799bd #25570
03240 Hardware name: linux,dummy-virt (DT)
03240 Workqueue: btree_update btree_interior_update_work
03240 pstate: 00001005 (nzcv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)
03240 pc : closure_put+0x224/0x2a0
03240 lr : closure_put+0x24/0x2a0
03240 sp : ffff0000d12071c0
03240 x29: ffff0000d12071c0 x28: dfff800000000000 x27: ffff0000d1207360
03240 x26: 0000000000000040 x25: 0000000000000040 x24: 0000000000000040
03240 x23: ffff0000c1f20180 x22: 0000000000000000 x21: ffff0000c1f20168
03240 x20: 0000000040000000 x19: ffff0000c1f20140 x18: 0000000000000001
03240 x17: 0000000000003aa0 x16: 0000000000003ad0 x15: 1fffe0001c326974
03240 x14: 0000000000000a1e x13: 0000000000000000 x12: 1fffe000183e402d
03240 x11: ffff6000183e402d x10: dfff800000000000 x9 : ffff6000183e402e
03240 x8 : 0000000000000001 x7 : 00009fffe7c1bfd3 x6 : ffff0000c1f2016b
03240 x5 : ffff0000c1f20168 x4 : ffff6000183e402e x3 : ffff800081391954
03240 x2 : 0000000000000001 x1 : 0000000000000000 x0 : 00000000a8000000
03240 Call trace:
03240  closure_put+0x224/0x2a0
03240  bch2_check_for_deadlock+0x910/0x1028
03240  bch2_six_check_for_deadlock+0x1c/0x30
03240  six_lock_slowpath.isra.0+0x29c/0xed0
03240  six_lock_ip_waiter+0xa8/0xf8
03240  __bch2_btree_node_lock_write+0x14c/0x298
03240  bch2_trans_lock_write+0x6d4/0xb10
03240  __bch2_trans_commit+0x135c/0x5520
03240  btree_interior_update_work+0x1248/0x1c10
03240  process_scheduled_works+0x53c/0xd90
03240  worker_thread+0x370/0x8c8
03240  kthread+0x258/0x2e8
03240  ret_from_fork+0x10/0x20
03240 Code: aa1303e0 d63f0020 a94363f7 17ffff8c (d4210000)
03240 ---[ end trace 0000000000000000 ]---
03240 Kernel panic - not syncing: Oops - BUG: Fatal exception
03240 SMP: stopping secondary CPUs
03241 SMP: failed to stop secondary CPUs 13,15
03241 Kernel Offset: disabled
03241 CPU features: 0x00,00000003,80000008,4240500b
03241 Memory Limit: none
03241 ---[ end Kernel panic - not syncing: Oops - BUG: Fatal exception ]---
03246 ========= FAILED TIMEOUT copygc_torture_no_checksum in 7200s
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42252/">CVE-2024-42252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42252">CVE-2024-42252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229004">SUSE bug 1229004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42253" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: pca953x: fix pca953x_irq_bus_sync_unlock race

Ensure that `i2c_lock' is held when setting interrupt latch and mask in
pca953x_irq_bus_sync_unlock() in order to avoid races.

The other (non-probe) call site pca953x_gpio_set_multiple() ensures the
lock is held before calling pca953x_write_regs().

The problem occurred when a request raced against irq_bus_sync_unlock()
approximately once per thousand reboots on an i.MX8MP based system.

 * Normal case

   0-0022: write register AI|3a {03,02,00,00,01} Input latch P0
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3

 * Race case

   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|08 {03,02,00,00,01} *** Wrong register ***
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229005">SUSE bug 1229005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42254" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42254" ref_url="https://www.suse.com/security/cve/CVE-2024-42254" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix error pbuf checking

Syz reports a problem, which boils down to NULL vs IS_ERR inconsistent
error handling in io_alloc_pbuf_ring().

KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
RIP: 0010:__io_remove_buffers+0xac/0x700 io_uring/kbuf.c:341
Call Trace:
 &lt;TASK&gt;
 io_put_bl io_uring/kbuf.c:378 [inline]
 io_destroy_buffers+0x14e/0x490 io_uring/kbuf.c:392
 io_ring_ctx_free+0xa00/0x1070 io_uring/io_uring.c:2613
 io_ring_exit_work+0x80f/0x8a0 io_uring/io_uring.c:2844
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd40 kernel/workqueue.c:3390
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42254/">CVE-2024-42254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42254">CVE-2024-42254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228997">SUSE bug 1228997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42255" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42255" ref_url="https://www.suse.com/security/cve/CVE-2024-42255" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Use auth only after NULL check in tpm_buf_check_hmac_response()

Dereference auth after NULL check in tpm_buf_check_hmac_response().
Otherwise, unless tpm2_sessions_init() was called, a call can cause NULL
dereference, when TCG_TPM2_HMAC is enabled.

[jarkko: adjusted the commit message.]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42255/">CVE-2024-42255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42255">CVE-2024-42255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228994">SUSE bug 1228994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42256" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42256" ref_url="https://www.suse.com/security/cve/CVE-2024-42256" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix server re-repick on subrequest retry

When a subrequest is marked for needing retry, netfs will call
cifs_prepare_write() which will make cifs repick the server for the op
before renegotiating credits; it then calls cifs_issue_write() which
invokes smb2_async_writev() - which re-repicks the server.

If a different server is then selected, this causes the increment of
server-&gt;in_flight to happen against one record and the decrement to happen
against another, leading to misaccounting.

Fix this by just removing the repick code in smb2_async_writev().  As this
is only called from netfslib-driven code, cifs_prepare_write() should
always have been called first, and so server should never be NULL and the
preparatory step is repeated in the event that we do a retry.

The problem manifests as a warning looking something like:

 WARNING: CPU: 4 PID: 72896 at fs/smb/client/smb2ops.c:97 smb2_add_credits+0x3f0/0x9e0 [cifs]
 ...
 RIP: 0010:smb2_add_credits+0x3f0/0x9e0 [cifs]
 ...
  smb2_writev_callback+0x334/0x560 [cifs]
  cifs_demultiplex_thread+0x77a/0x11b0 [cifs]
  kthread+0x187/0x1d0
  ret_from_fork+0x34/0x60
  ret_from_fork_asm+0x1a/0x30

Which may be triggered by a number of different xfstests running against an
Azure server in multichannel mode.  generic/249 seems the most repeatable,
but generic/215, generic/249 and generic/308 may also show it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42256/">CVE-2024-42256 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42256">CVE-2024-42256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228995">SUSE bug 1228995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42257" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42257" ref_url="https://www.suse.com/security/cve/CVE-2024-42257" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: use memtostr_pad() for s_volume_name

As with the other strings in struct ext4_super_block, s_volume_name is
not NUL terminated. The other strings were marked in commit 072ebb3bffe6
("ext4: add nonstring annotations to ext4.h"). Using strscpy() isn't
the right replacement for strncpy(); it should use memtostr_pad()
instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42257/">CVE-2024-42257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42257">CVE-2024-42257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228996">SUSE bug 1228996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42258" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42258" ref_url="https://www.suse.com/security/cve/CVE-2024-42258" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: huge_memory: use !CONFIG_64BIT to relax huge page alignment on 32 bit machines

Yves-Alexis Perez reported commit 4ef9ad19e176 ("mm: huge_memory: don't
force huge page alignment on 32 bit") didn't work for x86_32 [1].  It is
because x86_32 uses CONFIG_X86_32 instead of CONFIG_32BIT.

!CONFIG_64BIT should cover all 32 bit machines.

[1] https://lore.kernel.org/linux-mm/CAHbLzkr1LwH3pcTgM+aGQ31ip2bKqiqEQ8=FQB+t2c3dhNKNHA@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42258/">CVE-2024-42258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42258">CVE-2024-42258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229090">SUSE bug 1229090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42259" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Fix Virtual Memory mapping boundaries calculation

Calculating the size of the mapped area as the lesser value
between the requested size and the actual size does not consider
the partial mapping offset. This can cause page fault access.

Fix the calculation of the starting and ending addresses, the
total size is now deduced from the difference between the end and
start addresses.

Additionally, the calculations have been rewritten in a clearer
and more understandable form.

[Joonas: Add Requires: tag]
Requires: 60a2066c5005 ("drm/i915/gem: Adjust vma offset for framebuffer mmap offset")
(cherry picked from commit 97b6784753da06d9d40232328efc5c5367e53417)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229156">SUSE bug 1229156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42260" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42260" ref_url="https://www.suse.com/security/cve/CVE-2024-42260" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Validate passed in drm syncobj handles in the performance extension

If userspace provides an unknown or invalid handle anywhere in the handle
array the rest of the driver will not handle that well.

Fix it by checking handle was looked up successfully or otherwise fail the
extension by jumping into the existing unwind.

(cherry picked from commit a546b7e4d73c23838d7e4d2c92882b3ca902d213)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42260/">CVE-2024-42260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42260">CVE-2024-42260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229295">SUSE bug 1229295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42261" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42261" ref_url="https://www.suse.com/security/cve/CVE-2024-42261" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Validate passed in drm syncobj handles in the timestamp extension

If userspace provides an unknown or invalid handle anywhere in the handle
array the rest of the driver will not handle that well.

Fix it by checking handle was looked up successfully or otherwise fail the
extension by jumping into the existing unwind.

(cherry picked from commit 8d1276d1b8f738c3afe1457d4dff5cc66fc848a3)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42261/">CVE-2024-42261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42261">CVE-2024-42261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229325">SUSE bug 1229325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42262" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42262" ref_url="https://www.suse.com/security/cve/CVE-2024-42262" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Fix potential memory leak in the performance extension

If fetching of userspace memory fails during the main loop, all drm sync
objs looked up until that point will be leaked because of the missing
drm_syncobj_put.

Fix it by exporting and using a common cleanup helper.

(cherry picked from commit 484de39fa5f5b7bd0c5f2e2c5265167250ef7501)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42262/">CVE-2024-42262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42262">CVE-2024-42262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229331">SUSE bug 1229331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42263" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42263" ref_url="https://www.suse.com/security/cve/CVE-2024-42263" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Fix potential memory leak in the timestamp extension

If fetching of userspace memory fails during the main loop, all drm sync
objs looked up until that point will be leaked because of the missing
drm_syncobj_put.

Fix it by exporting and using a common cleanup helper.

(cherry picked from commit 753ce4fea62182c77e1691ab4f9022008f25b62e)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42263/">CVE-2024-42263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42263">CVE-2024-42263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229332">SUSE bug 1229332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42264" ref_url="https://www.suse.com/security/cve/CVE-2024-42264" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Prevent out of bounds access in performance query extensions

Check that the number of perfmons userspace is passing in the copy and
reset extensions is not greater than the internal kernel storage where
the ids will be copied into.

(cherry picked from commit f32b5128d2c440368b5bf3a7a356823e235caabb)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42264/">CVE-2024-42264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42264">CVE-2024-42264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229333">SUSE bug 1229333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42266" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42266" ref_url="https://www.suse.com/security/cve/CVE-2024-42266" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: make cow_file_range_inline() honor locked_page on error

The btrfs buffered write path runs through __extent_writepage() which
has some tricky return value handling for writepage_delalloc().
Specifically, when that returns 1, we exit, but for other return values
we continue and end up calling btrfs_folio_end_all_writers(). If the
folio has been unlocked (note that we check the PageLocked bit at the
start of __extent_writepage()), this results in an assert panic like
this one from syzbot:

  BTRFS: error (device loop0 state EAL) in free_log_tree:3267: errno=-5 IO failure
  BTRFS warning (device loop0 state EAL): Skipping commit of aborted transaction.
  BTRFS: error (device loop0 state EAL) in cleanup_transaction:2018: errno=-5 IO failure
  assertion failed: folio_test_locked(folio), in fs/btrfs/subpage.c:871
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/subpage.c:871!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
  CPU: 1 PID: 5090 Comm: syz-executor225 Not tainted
  6.10.0-syzkaller-05505-gb1bc554e009e #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
  Google 06/27/2024
  RIP: 0010:btrfs_folio_end_all_writers+0x55b/0x610 fs/btrfs/subpage.c:871
  Code: e9 d3 fb ff ff e8 25 22 c2 fd 48 c7 c7 c0 3c 0e 8c 48 c7 c6 80 3d
  0e 8c 48 c7 c2 60 3c 0e 8c b9 67 03 00 00 e8 66 47 ad 07 90 &lt;0f&gt; 0b e8
  6e 45 b0 07 4c 89 ff be 08 00 00 00 e8 21 12 25 fe 4c 89
  RSP: 0018:ffffc900033d72e0 EFLAGS: 00010246
  RAX: 0000000000000045 RBX: 00fff0000000402c RCX: 663b7a08c50a0a00
  RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
  RBP: ffffc900033d73b0 R08: ffffffff8176b98c R09: 1ffff9200067adfc
  R10: dffffc0000000000 R11: fffff5200067adfd R12: 0000000000000001
  R13: dffffc0000000000 R14: 0000000000000000 R15: ffffea0001cbee80
  FS:  0000000000000000(0000) GS:ffff8880b9500000(0000)
  knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f5f076012f8 CR3: 000000000e134000 CR4: 00000000003506f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
  &lt;TASK&gt;
  __extent_writepage fs/btrfs/extent_io.c:1597 [inline]
  extent_write_cache_pages fs/btrfs/extent_io.c:2251 [inline]
  btrfs_writepages+0x14d7/0x2760 fs/btrfs/extent_io.c:2373
  do_writepages+0x359/0x870 mm/page-writeback.c:2656
  filemap_fdatawrite_wbc+0x125/0x180 mm/filemap.c:397
  __filemap_fdatawrite_range mm/filemap.c:430 [inline]
  __filemap_fdatawrite mm/filemap.c:436 [inline]
  filemap_flush+0xdf/0x130 mm/filemap.c:463
  btrfs_release_file+0x117/0x130 fs/btrfs/file.c:1547
  __fput+0x24a/0x8a0 fs/file_table.c:422
  task_work_run+0x24f/0x310 kernel/task_work.c:222
  exit_task_work include/linux/task_work.h:40 [inline]
  do_exit+0xa2f/0x27f0 kernel/exit.c:877
  do_group_exit+0x207/0x2c0 kernel/exit.c:1026
  __do_sys_exit_group kernel/exit.c:1037 [inline]
  __se_sys_exit_group kernel/exit.c:1035 [inline]
  __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1035
  x64_sys_call+0x2634/0x2640
  arch/x86/include/generated/asm/syscalls_64.h:232
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
  entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7f5f075b70c9
  Code: Unable to access opcode bytes at
  0x7f5f075b709f.

I was hitting the same issue by doing hundreds of accelerated runs of
generic/475, which also hits IO errors by design.

I instrumented that reproducer with bpftrace and found that the
undesirable folio_unlock was coming from the following callstack:

  folio_unlock+5
  __process_pages_contig+475
  cow_file_range_inline.constprop.0+230
  cow_file_range+803
  btrfs_run_delalloc_range+566
  writepage_delalloc+332
  __extent_writepage # inlined in my stacktrace, but I added it here
  extent_write_cache_pages+622

Looking at the bisected-to pa
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42266/">CVE-2024-42266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42266">CVE-2024-42266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229384">SUSE bug 1229384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42267" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42267" ref_url="https://www.suse.com/security/cve/CVE-2024-42267" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv/mm: Add handling for VM_FAULT_SIGSEGV in mm_fault_error()

Handle VM_FAULT_SIGSEGV in the page fault path so that we correctly
kill the process and we don't BUG() the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42267/">CVE-2024-42267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42267">CVE-2024-42267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229387">SUSE bug 1229387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42268" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix missing lock on sync reset reload

On sync reset reload work, when remote host updates devlink on reload
actions performed on that host, it misses taking devlink lock before
calling devlink_remote_reload_actions_performed() which results in
triggering lock assert like the following:

WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50
…
 CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S      W          6.10.0-rc2+ #116
 Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015
 Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core]
 RIP: 0010:devl_assert_locked+0x3e/0x50
…
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0xa4/0x210
  ? devl_assert_locked+0x3e/0x50
  ? report_bug+0x160/0x280
  ? handle_bug+0x3f/0x80
  ? exc_invalid_op+0x17/0x40
  ? asm_exc_invalid_op+0x1a/0x20
  ? devl_assert_locked+0x3e/0x50
  devlink_notify+0x88/0x2b0
  ? mlx5_attach_device+0x20c/0x230 [mlx5_core]
  ? __pfx_devlink_notify+0x10/0x10
  ? process_one_work+0x4b6/0xbb0
  process_one_work+0x4b6/0xbb0
[…]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229391">SUSE bug 1229391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42269" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42269" ref_url="https://www.suse.com/security/cve/CVE-2024-42269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().

ip6table_nat_table_init() accesses net-&gt;gen-&gt;ptr[ip6table_nat_net_ops.id],
but the function is exposed to user space before the entry is allocated
via register_pernet_subsys().

Let's call register_pernet_subsys() before xt_register_template().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42269/">CVE-2024-42269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42269">CVE-2024-42269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229402">SUSE bug 1229402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42270" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42270" ref_url="https://www.suse.com/security/cve/CVE-2024-42270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: iptables: Fix null-ptr-deref in iptable_nat_table_init().

We had a report that iptables-restore sometimes triggered null-ptr-deref
at boot time. [0]

The problem is that iptable_nat_table_init() is exposed to user space
before the kernel fully initialises netns.

In the small race window, a user could call iptable_nat_table_init()
that accesses net_generic(net, iptable_nat_net_id), which is available
only after registering iptable_nat_net_ops.

Let's call register_pernet_subsys() before xt_register_template().

[0]:
bpfilter: Loaded bpfilter_umh pid 11702
Started bpfilter
BUG: kernel NULL pointer dereference, address: 0000000000000013
 PF: supervisor write access in kernel mode
 PF: error_code(0x0002) - not-present page
PGD 0 P4D 0
PREEMPT SMP NOPTI
CPU: 2 PID: 11879 Comm: iptables-restor Not tainted 6.1.92-99.174.amzn2023.x86_64 #1
Hardware name: Amazon EC2 c6i.4xlarge/, BIOS 1.0 10/16/2017
RIP: 0010:iptable_nat_table_init (net/ipv4/netfilter/iptable_nat.c:87 net/ipv4/netfilter/iptable_nat.c:121) iptable_nat
Code: 10 4c 89 f6 48 89 ef e8 0b 19 bb ff 41 89 c4 85 c0 75 38 41 83 c7 01 49 83 c6 28 41 83 ff 04 75 dc 48 8b 44 24 08 48 8b 0c 24 &lt;48&gt; 89 08 4c 89 ef e8 a2 3b a2 cf 48 83 c4 10 44 89 e0 5b 5d 41 5c
RSP: 0018:ffffbef902843cd0 EFLAGS: 00010246
RAX: 0000000000000013 RBX: ffff9f4b052caa20 RCX: ffff9f4b20988d80
RDX: 0000000000000000 RSI: 0000000000000064 RDI: ffffffffc04201c0
RBP: ffff9f4b29394000 R08: ffff9f4b07f77258 R09: ffff9f4b07f77240
R10: 0000000000000000 R11: ffff9f4b09635388 R12: 0000000000000000
R13: ffff9f4b1a3c6c00 R14: ffff9f4b20988e20 R15: 0000000000000004
FS:  00007f6284340000(0000) GS:ffff9f51fe280000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000013 CR3: 00000001d10a6005 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? show_trace_log_lvl (arch/x86/kernel/dumpstack.c:259)
 ? show_trace_log_lvl (arch/x86/kernel/dumpstack.c:259)
 ? xt_find_table_lock (net/netfilter/x_tables.c:1259)
 ? __die_body.cold (arch/x86/kernel/dumpstack.c:478 arch/x86/kernel/dumpstack.c:420)
 ? page_fault_oops (arch/x86/mm/fault.c:727)
 ? exc_page_fault (./arch/x86/include/asm/irqflags.h:40 ./arch/x86/include/asm/irqflags.h:75 arch/x86/mm/fault.c:1470 arch/x86/mm/fault.c:1518)
 ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:570)
 ? iptable_nat_table_init (net/ipv4/netfilter/iptable_nat.c:87 net/ipv4/netfilter/iptable_nat.c:121) iptable_nat
 xt_find_table_lock (net/netfilter/x_tables.c:1259)
 xt_request_find_table_lock (net/netfilter/x_tables.c:1287)
 get_info (net/ipv4/netfilter/ip_tables.c:965)
 ? security_capable (security/security.c:809 (discriminator 13))
 ? ns_capable (kernel/capability.c:376 kernel/capability.c:397)
 ? do_ipt_get_ctl (net/ipv4/netfilter/ip_tables.c:1656)
 ? bpfilter_send_req (net/bpfilter/bpfilter_kern.c:52) bpfilter
 nf_getsockopt (net/netfilter/nf_sockopt.c:116)
 ip_getsockopt (net/ipv4/ip_sockglue.c:1827)
 __sys_getsockopt (net/socket.c:2327)
 __x64_sys_getsockopt (net/socket.c:2342 net/socket.c:2339 net/socket.c:2339)
 do_syscall_64 (arch/x86/entry/common.c:51 arch/x86/entry/common.c:81)
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:121)
RIP: 0033:0x7f62844685ee
Code: 48 8b 0d 45 28 0f 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 37 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 09
RSP: 002b:00007ffd1f83d638 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
RAX: ffffffffffffffda RBX: 00007ffd1f83d680 RCX: 00007f62844685ee
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000004
RBP: 0000000000000004 R08: 00007ffd1f83d670 R09: 0000558798ffa2a0
R10: 00007ffd1f83d680 R11: 0000000000000246 R12: 00007ffd1f83e3b2
R13: 00007f6284
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42270/">CVE-2024-42270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42270">CVE-2024-42270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229404">SUSE bug 1229404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42271" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/iucv: fix use after free in iucv_sock_close()

iucv_sever_path() is called from process context and from bh context.
iucv-&gt;path is used as indicator whether somebody else is taking care of
severing the path (or it is already removed / never existed).
This needs to be done with atomic compare and swap, otherwise there is a
small window where iucv_sock_close() will try to work with a path that has
already been severed and freed by iucv_callback_connrej() called by
iucv_tasklet_fn().

Example:
[452744.123844] Call Trace:
[452744.123845] ([&lt;0000001e87f03880&gt;] 0x1e87f03880)
[452744.123966]  [&lt;00000000d593001e&gt;] iucv_path_sever+0x96/0x138
[452744.124330]  [&lt;000003ff801ddbca&gt;] iucv_sever_path+0xc2/0xd0 [af_iucv]
[452744.124336]  [&lt;000003ff801e01b6&gt;] iucv_sock_close+0xa6/0x310 [af_iucv]
[452744.124341]  [&lt;000003ff801e08cc&gt;] iucv_sock_release+0x3c/0xd0 [af_iucv]
[452744.124345]  [&lt;00000000d574794e&gt;] __sock_release+0x5e/0xe8
[452744.124815]  [&lt;00000000d5747a0c&gt;] sock_close+0x34/0x48
[452744.124820]  [&lt;00000000d5421642&gt;] __fput+0xba/0x268
[452744.124826]  [&lt;00000000d51b382c&gt;] task_work_run+0xbc/0xf0
[452744.124832]  [&lt;00000000d5145710&gt;] do_notify_resume+0x88/0x90
[452744.124841]  [&lt;00000000d5978096&gt;] system_call+0xe2/0x2c8
[452744.125319] Last Breaking-Event-Address:
[452744.125321]  [&lt;00000000d5930018&gt;] iucv_path_sever+0x90/0x138
[452744.125324]
[452744.125325] Kernel panic - not syncing: Fatal exception in interrupt

Note that bh_lock_sock() is not serializing the tasklet context against
process context, because the check for sock_owned_by_user() and
corresponding handling is missing.

Ideas for a future clean-up patch:
A) Correct usage of bh_lock_sock() in tasklet context, as described in
Re-enqueue, if needed. This may require adding return values to the
tasklet functions and thus changes to all users of iucv.

B) Change iucv tasklet into worker and use only lock_sock() in af_iucv.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229401">SUSE bug 1229401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42272" ref_url="https://www.suse.com/security/cve/CVE-2024-42272" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: act_ct: take care of padding in struct zones_ht_key

Blamed commit increased lookup key size from 2 bytes to 16 bytes,
because zones_ht_key got a struct net pointer.

Make sure rhashtable_lookup() is not using the padding bytes
which are not initialized.

 BUG: KMSAN: uninit-value in rht_ptr_rcu include/linux/rhashtable.h:376 [inline]
 BUG: KMSAN: uninit-value in __rhashtable_lookup include/linux/rhashtable.h:607 [inline]
 BUG: KMSAN: uninit-value in rhashtable_lookup include/linux/rhashtable.h:646 [inline]
 BUG: KMSAN: uninit-value in rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
 BUG: KMSAN: uninit-value in tcf_ct_flow_table_get+0x611/0x2260 net/sched/act_ct.c:329
  rht_ptr_rcu include/linux/rhashtable.h:376 [inline]
  __rhashtable_lookup include/linux/rhashtable.h:607 [inline]
  rhashtable_lookup include/linux/rhashtable.h:646 [inline]
  rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
  tcf_ct_flow_table_get+0x611/0x2260 net/sched/act_ct.c:329
  tcf_ct_init+0xa67/0x2890 net/sched/act_ct.c:1408
  tcf_action_init_1+0x6cc/0xb30 net/sched/act_api.c:1425
  tcf_action_init+0x458/0xf00 net/sched/act_api.c:1488
  tcf_action_add net/sched/act_api.c:2061 [inline]
  tc_ctl_action+0x4be/0x19d0 net/sched/act_api.c:2118
  rtnetlink_rcv_msg+0x12fc/0x1410 net/core/rtnetlink.c:6647
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2550
  rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6665
  netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]
  netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1357
  netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1901
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  ____sys_sendmsg+0x877/0xb60 net/socket.c:2597
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2651
  __sys_sendmsg net/socket.c:2680 [inline]
  __do_sys_sendmsg net/socket.c:2689 [inline]
  __se_sys_sendmsg net/socket.c:2687 [inline]
  __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2687
  x64_sys_call+0x2dd6/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:47
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable key created at:
  tcf_ct_flow_table_get+0x4a/0x2260 net/sched/act_ct.c:324
  tcf_ct_init+0xa67/0x2890 net/sched/act_ct.c:1408
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42272/">CVE-2024-42272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42272">CVE-2024-42272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229397">SUSE bug 1229397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42273" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42273" ref_url="https://www.suse.com/security/cve/CVE-2024-42273" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: assign CURSEG_ALL_DATA_ATGC if blkaddr is valid

mkdir /mnt/test/comp
f2fs_io setflags compression /mnt/test/comp
dd if=/dev/zero of=/mnt/test/comp/testfile bs=16k count=1
truncate --size 13 /mnt/test/comp/testfile

In the above scenario, we can get a BUG_ON.
 kernel BUG at fs/f2fs/segment.c:3589!
 Call Trace:
  do_write_page+0x78/0x390 [f2fs]
  f2fs_outplace_write_data+0x62/0xb0 [f2fs]
  f2fs_do_write_data_page+0x275/0x740 [f2fs]
  f2fs_write_single_data_page+0x1dc/0x8f0 [f2fs]
  f2fs_write_multi_pages+0x1e5/0xae0 [f2fs]
  f2fs_write_cache_pages+0xab1/0xc60 [f2fs]
  f2fs_write_data_pages+0x2d8/0x330 [f2fs]
  do_writepages+0xcf/0x270
  __writeback_single_inode+0x44/0x350
  writeback_sb_inodes+0x242/0x530
  __writeback_inodes_wb+0x54/0xf0
  wb_writeback+0x192/0x310
  wb_workfn+0x30d/0x400

The reason is we gave CURSEG_ALL_DATA_ATGC to COMPR_ADDR where the
page was set the gcing flag by set_cluster_dirty().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42273/">CVE-2024-42273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42273">CVE-2024-42273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229377">SUSE bug 1229377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42274" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "ALSA: firewire-lib: operate for period elapse event in process context"

Commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period elapse event
in process context") removed the process context workqueue from
amdtp_domain_stream_pcm_pointer() and update_pcm_pointers() to remove
its overhead.

With RME Fireface 800, this lead to a regression since
Kernels 5.14.0, causing an AB/BA deadlock competition for the
substream lock with eventual system freeze under ALSA operation:

thread 0:
    * (lock A) acquire substream lock by
	snd_pcm_stream_lock_irq() in
	snd_pcm_status64()
    * (lock B) wait for tasklet to finish by calling
    	tasklet_unlock_spin_wait() in
	tasklet_disable_in_atomic() in
	ohci_flush_iso_completions() of ohci.c

thread 1:
    * (lock B) enter tasklet
    * (lock A) attempt to acquire substream lock,
    	waiting for it to be released:
	snd_pcm_stream_lock_irqsave() in
    	snd_pcm_period_elapsed() in
	update_pcm_pointers() in
	process_ctx_payloads() in
	process_rx_packets() of amdtp-stream.c

? tasklet_unlock_spin_wait
 &lt;/NMI&gt;
 &lt;TASK&gt;
ohci_flush_iso_completions firewire_ohci
amdtp_domain_stream_pcm_pointer snd_firewire_lib
snd_pcm_update_hw_ptr0 snd_pcm
snd_pcm_status64 snd_pcm

? native_queued_spin_lock_slowpath
 &lt;/NMI&gt;
 &lt;IRQ&gt;
_raw_spin_lock_irqsave
snd_pcm_period_elapsed snd_pcm
process_rx_packets snd_firewire_lib
irq_target_callback snd_firewire_lib
handle_it_packet firewire_ohci
context_tasklet firewire_ohci

Restore the process context work queue to prevent deadlock
AB/BA deadlock competition for ALSA substream lock of
snd_pcm_stream_lock_irq() in snd_pcm_status64()
and snd_pcm_stream_lock_irqsave() in snd_pcm_period_elapsed().

revert commit 7ba5ca32fe6e ("ALSA: firewire-lib: operate for period
elapse event in process context")

Replace inline description to prevent future deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229417">SUSE bug 1229417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42275" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42275" ref_url="https://www.suse.com/security/cve/CVE-2024-42275" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fix error code in drm_client_buffer_vmap_local()

This function accidentally returns zero/success on the failure path.
It leads to locking issues and an uninitialized *map_copy in the
caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42275/">CVE-2024-42275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42275">CVE-2024-42275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229412">SUSE bug 1229412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42276" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: add missing condition check for existence of mapped data

nvme_map_data() is called when request has physical segments, hence
the nvme_unmap_data() should have same condition to avoid dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229410">SUSE bug 1229410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42277" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: sprd: Avoid NULL deref in sprd_iommu_hw_en

In sprd_iommu_cleanup() before calling function sprd_iommu_hw_en()
dom-&gt;sdev is equal to NULL, which leads to null dereference.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229409">SUSE bug 1229409</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42278" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42278" ref_url="https://www.suse.com/security/cve/CVE-2024-42278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: TAS2781: Fix tasdev_load_calibrated_data()

This function has a reversed if statement so it's either a no-op or it
leads to a NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42278/">CVE-2024-42278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229403">SUSE bug 1229403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42279" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42279" ref_url="https://www.suse.com/security/cve/CVE-2024-42279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer

While transmitting with rx_len == 0, the RX FIFO is not going to be
emptied in the interrupt handler. A subsequent transfer could then
read crap from the previous transfer out of the RX FIFO into the
start RX buffer. The core provides a register that will empty the RX and
TX FIFOs, so do that before each transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42279/">CVE-2024-42279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42279">CVE-2024-42279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229390">SUSE bug 1229390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42280" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: Fix a use after free in hfcmulti_tx()

Don't dereference *sp after calling dev_kfree_skb(*sp).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229388">SUSE bug 1229388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42281" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a segment issue when downgrading gso_size

Linearize the skb when downgrading gso_size because it may trigger a
BUG_ON() later when the skb is segmented as described in [1,2].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229386">SUSE bug 1229386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42282" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42282" ref_url="https://www.suse.com/security/cve/CVE-2024-42282" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mediatek: Fix potential NULL pointer dereference in dummy net_device handling

Move the freeing of the dummy net_device from mtk_free_dev() to
mtk_remove().

Previously, if alloc_netdev_dummy() failed in mtk_probe(),
eth-&gt;dummy_dev would be NULL. The error path would then call
mtk_free_dev(), which in turn called free_netdev() assuming dummy_dev
was allocated (but it was not), potentially causing a NULL pointer
dereference.

By moving free_netdev() to mtk_remove(), we ensure it's only called when
mtk_probe() has succeeded and dummy_dev is fully allocated. This
addresses a potential NULL pointer dereference detected by Smatch[1].
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42282/">CVE-2024-42282 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42282">CVE-2024-42282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229385">SUSE bug 1229385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: Initialize all fields in dumped nexthops

struct nexthop_grp contains two reserved fields that are not initialized by
nla_put_nh_group(), and carry garbage. This can be observed e.g. with
strace (edited for clarity):

    # ip nexthop add id 1 dev lo
    # ip nexthop add id 101 group 1
    # strace -e recvmsg ip nexthop get id 101
    ...
    recvmsg(... [{nla_len=12, nla_type=NHA_GROUP},
                 [{id=1, weight=0, resvd1=0x69, resvd2=0x67}]] ...) = 52

The fields are reserved and therefore not currently used. But as they are, they
leak kernel memory, and the fact they are not just zero complicates repurposing
of the fields for new ends. Initialize the full structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229383">SUSE bug 1229383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Return non-zero value from tipc_udp_addr2str() on error

tipc_udp_addr2str() should return non-zero value if the UDP media
address is invalid. Otherwise, a buffer overflow access can occur in
tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
media address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229382">SUSE bug 1229382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42285" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix a use-after-free related to destroying CM IDs

iw_conn_req_handler() associates a new struct rdma_id_private (conn_id) with
an existing struct iw_cm_id (cm_id) as follows:

        conn_id-&gt;cm_id.iw = cm_id;
        cm_id-&gt;context = conn_id;
        cm_id-&gt;cm_handler = cma_iw_handler;

rdma_destroy_id() frees both the cm_id and the struct rdma_id_private. Make
sure that cm_work_handler() does not trigger a use-after-free by only
freeing of the struct rdma_id_private after all pending work has finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229381">SUSE bug 1229381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42286" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: validate nvme_local_port correctly

The driver load failed with error message,

qla2xxx [0000:04:00.0]-ffff:0: register_localport failed: ret=ffffffef

and with a kernel crash,

	BUG: unable to handle kernel NULL pointer dereference at 0000000000000070
	Workqueue: events_unbound qla_register_fcport_fn [qla2xxx]
	RIP: 0010:nvme_fc_register_remoteport+0x16/0x430 [nvme_fc]
	RSP: 0018:ffffaaa040eb3d98 EFLAGS: 00010282
	RAX: 0000000000000000 RBX: ffff9dfb46b78c00 RCX: 0000000000000000
	RDX: ffff9dfb46b78da8 RSI: ffffaaa040eb3e08 RDI: 0000000000000000
	RBP: ffff9dfb612a0a58 R08: ffffffffaf1d6270 R09: 3a34303a30303030
	R10: 34303a303030305b R11: 2078787832616c71 R12: ffff9dfb46b78dd4
	R13: ffff9dfb46b78c24 R14: ffff9dfb41525300 R15: ffff9dfb46b78da8
	FS:  0000000000000000(0000) GS:ffff9dfc67c00000(0000) knlGS:0000000000000000
	CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
	CR2: 0000000000000070 CR3: 000000018da10004 CR4: 00000000000206f0
	Call Trace:
	qla_nvme_register_remote+0xeb/0x1f0 [qla2xxx]
	? qla2x00_dfs_create_rport+0x231/0x270 [qla2xxx]
	qla2x00_update_fcport+0x2a1/0x3c0 [qla2xxx]
	qla_register_fcport_fn+0x54/0xc0 [qla2xxx]

Exit the qla_nvme_register_remote() function when qla_nvme_register_hba()
fails and correctly validate nvme_local_port.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229395">SUSE bug 1229395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42287" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Complete command early within lock

A crash was observed while performing NPIV and FW reset,

 BUG: kernel NULL pointer dereference, address: 000000000000001c
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 1 PREEMPT_RT SMP NOPTI
 RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0
 RSP: 0018:ffffc90026f47b88 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000002
 RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8881041130d0
 RBP: ffff8881041130d0 R08: 0000000000000000 R09: 0000000000000034
 R10: ffffc90026f47c48 R11: 0000000000000031 R12: 0000000000000000
 R13: 0000000000000000 R14: ffff8881565e4a20 R15: 0000000000000000
 FS: 00007f4c69ed3d00(0000) GS:ffff889faac80000(0000) knlGS:0000000000000000
 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000000001c CR3: 0000000288a50002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1a/0x60
 ? page_fault_oops+0x16f/0x4a0
 ? do_user_addr_fault+0x174/0x7f0
 ? exc_page_fault+0x69/0x1a0
 ? asm_exc_page_fault+0x22/0x30
 ? dma_direct_unmap_sg+0x51/0x1e0
 ? preempt_count_sub+0x96/0xe0
 qla2xxx_qpair_sp_free_dma+0x29f/0x3b0 [qla2xxx]
 qla2xxx_qpair_sp_compl+0x60/0x80 [qla2xxx]
 __qla2x00_abort_all_cmds+0xa2/0x450 [qla2xxx]

The command completion was done early while aborting the commands in driver
unload path but outside lock to avoid the WARN_ON condition of performing
dma_free_attr within the lock. However this caused race condition while
command completion via multiple paths causing system crash.

Hence complete the command early in unload path but within the lock to
avoid race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229392">SUSE bug 1229392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42288" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix for possible memory corruption

Init Control Block is dereferenced incorrectly.  Correctly dereference ICB
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229398">SUSE bug 1229398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42289" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: During vport delete send async logout explicitly

During vport delete, it is observed that during unload we hit a crash
because of stale entries in outstanding command array.  For all these stale
I/O entries, eh_abort was issued and aborted (fast_fail_io = 2009h) but
I/Os could not complete while vport delete is in process of deleting.

  BUG: kernel NULL pointer dereference, address: 000000000000001c
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  Workqueue: qla2xxx_wq qla_do_work [qla2xxx]
  RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0
  RSP: 0018:ffffa1e1e150fc68 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000001
  RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8ce208a7a0d0
  RBP: ffff8ce208a7a0d0 R08: 0000000000000000 R09: ffff8ce378aac9c8
  R10: ffff8ce378aac8a0 R11: ffffa1e1e150f9d8 R12: 0000000000000000
  R13: 0000000000000000 R14: ffff8ce378aac9c8 R15: 0000000000000000
  FS:  0000000000000000(0000) GS:ffff8d217f000000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000000000001c CR3: 0000002089acc000 CR4: 0000000000350ee0
  Call Trace:
  &lt;TASK&gt;
  qla2xxx_qpair_sp_free_dma+0x417/0x4e0
  ? qla2xxx_qpair_sp_compl+0x10d/0x1a0
  ? qla2x00_status_entry+0x768/0x2830
  ? newidle_balance+0x2f0/0x430
  ? dequeue_entity+0x100/0x3c0
  ? qla24xx_process_response_queue+0x6a1/0x19e0
  ? __schedule+0x2d5/0x1140
  ? qla_do_work+0x47/0x60
  ? process_one_work+0x267/0x440
  ? process_one_work+0x440/0x440
  ? worker_thread+0x2d/0x3d0
  ? process_one_work+0x440/0x440
  ? kthread+0x156/0x180
  ? set_kthread_struct+0x50/0x50
  ? ret_from_fork+0x22/0x30
  &lt;/TASK&gt;

Send out async logout explicitly for all the ports during vport delete.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229399">SUSE bug 1229399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42290" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42290" ref_url="https://www.suse.com/security/cve/CVE-2024-42290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/imx-irqsteer: Handle runtime power management correctly

The power domain is automatically activated from clk_prepare(). However, on
certain platforms like i.MX8QM and i.MX8QXP, the power-on handling invokes
sleeping functions, which triggers the 'scheduling while atomic' bug in the
context switch path during device probing:

 BUG: scheduling while atomic: kworker/u13:1/48/0x00000002
 Call trace:
  __schedule_bug+0x54/0x6c
  __schedule+0x7f0/0xa94
  schedule+0x5c/0xc4
  schedule_preempt_disabled+0x24/0x40
  __mutex_lock.constprop.0+0x2c0/0x540
  __mutex_lock_slowpath+0x14/0x20
  mutex_lock+0x48/0x54
  clk_prepare_lock+0x44/0xa0
  clk_prepare+0x20/0x44
  imx_irqsteer_resume+0x28/0xe0
  pm_generic_runtime_resume+0x2c/0x44
  __genpd_runtime_resume+0x30/0x80
  genpd_runtime_resume+0xc8/0x2c0
  __rpm_callback+0x48/0x1d8
  rpm_callback+0x6c/0x78
  rpm_resume+0x490/0x6b4
  __pm_runtime_resume+0x50/0x94
  irq_chip_pm_get+0x2c/0xa0
  __irq_do_set_handler+0x178/0x24c
  irq_set_chained_handler_and_data+0x60/0xa4
  mxc_gpio_probe+0x160/0x4b0

Cure this by implementing the irq_bus_lock/sync_unlock() interrupt chip
callbacks and handle power management in them as they are invoked from
non-atomic context.

[ tglx: Rewrote change log, added Fixes tag ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42290/">CVE-2024-42290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42290">CVE-2024-42290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229379">SUSE bug 1229379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42291" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Add a per-VF limit on number of FDIR filters

While the iavf driver adds a s/w limit (128) on the number of FDIR
filters that the VF can request, a malicious VF driver can request more
than that and exhaust the resources for other VFs.

Add a similar limit in ice.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229374">SUSE bug 1229374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kobject_uevent: Fix OOB access within zap_modalias_env()

zap_modalias_env() wrongly calculates size of memory block to move, so
will cause OOB memory access issue if variable MODALIAS is not the last
one within its @env parameter, fixed by correcting size to memmove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229373">SUSE bug 1229373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42293" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42293" ref_url="https://www.suse.com/security/cve/CVE-2024-42293" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: mm: Fix lockless walks with static and dynamic page-table folding

Lina reports random oopsen originating from the fast GUP code when
16K pages are used with 4-level page-tables, the fourth level being
folded at runtime due to lack of LPA2.

In this configuration, the generic implementation of
p4d_offset_lockless() will return a 'p4d_t *' corresponding to the
'pgd_t' allocated on the stack of the caller, gup_fast_pgd_range().
This is normally fine, but when the fourth level of page-table is folded
at runtime, pud_offset_lockless() will offset from the address of the
'p4d_t' to calculate the address of the PUD in the same page-table page.
This results in a stray stack read when the 'p4d_t' has been allocated
on the stack and can send the walker into the weeds.

Fix the problem by providing our own definition of p4d_offset_lockless()
when CONFIG_PGTABLE_LEVELS &lt;= 4 which returns the real page-table
pointer rather than the address of the local stack variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42293/">CVE-2024-42293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42293">CVE-2024-42293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229372">SUSE bug 1229372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42294" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42294" ref_url="https://www.suse.com/security/cve/CVE-2024-42294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix deadlock between sd_remove &amp; sd_release

Our test report the following hung task:

[ 2538.459400] INFO: task "kworker/0:0":7 blocked for more than 188 seconds.
[ 2538.459427] Call trace:
[ 2538.459430]  __switch_to+0x174/0x338
[ 2538.459436]  __schedule+0x628/0x9c4
[ 2538.459442]  schedule+0x7c/0xe8
[ 2538.459447]  schedule_preempt_disabled+0x24/0x40
[ 2538.459453]  __mutex_lock+0x3ec/0xf04
[ 2538.459456]  __mutex_lock_slowpath+0x14/0x24
[ 2538.459459]  mutex_lock+0x30/0xd8
[ 2538.459462]  del_gendisk+0xdc/0x350
[ 2538.459466]  sd_remove+0x30/0x60
[ 2538.459470]  device_release_driver_internal+0x1c4/0x2c4
[ 2538.459474]  device_release_driver+0x18/0x28
[ 2538.459478]  bus_remove_device+0x15c/0x174
[ 2538.459483]  device_del+0x1d0/0x358
[ 2538.459488]  __scsi_remove_device+0xa8/0x198
[ 2538.459493]  scsi_forget_host+0x50/0x70
[ 2538.459497]  scsi_remove_host+0x80/0x180
[ 2538.459502]  usb_stor_disconnect+0x68/0xf4
[ 2538.459506]  usb_unbind_interface+0xd4/0x280
[ 2538.459510]  device_release_driver_internal+0x1c4/0x2c4
[ 2538.459514]  device_release_driver+0x18/0x28
[ 2538.459518]  bus_remove_device+0x15c/0x174
[ 2538.459523]  device_del+0x1d0/0x358
[ 2538.459528]  usb_disable_device+0x84/0x194
[ 2538.459532]  usb_disconnect+0xec/0x300
[ 2538.459537]  hub_event+0xb80/0x1870
[ 2538.459541]  process_scheduled_works+0x248/0x4dc
[ 2538.459545]  worker_thread+0x244/0x334
[ 2538.459549]  kthread+0x114/0x1bc

[ 2538.461001] INFO: task "fsck.":15415 blocked for more than 188 seconds.
[ 2538.461014] Call trace:
[ 2538.461016]  __switch_to+0x174/0x338
[ 2538.461021]  __schedule+0x628/0x9c4
[ 2538.461025]  schedule+0x7c/0xe8
[ 2538.461030]  blk_queue_enter+0xc4/0x160
[ 2538.461034]  blk_mq_alloc_request+0x120/0x1d4
[ 2538.461037]  scsi_execute_cmd+0x7c/0x23c
[ 2538.461040]  ioctl_internal_command+0x5c/0x164
[ 2538.461046]  scsi_set_medium_removal+0x5c/0xb0
[ 2538.461051]  sd_release+0x50/0x94
[ 2538.461054]  blkdev_put+0x190/0x28c
[ 2538.461058]  blkdev_release+0x28/0x40
[ 2538.461063]  __fput+0xf8/0x2a8
[ 2538.461066]  __fput_sync+0x28/0x5c
[ 2538.461070]  __arm64_sys_close+0x84/0xe8
[ 2538.461073]  invoke_syscall+0x58/0x114
[ 2538.461078]  el0_svc_common+0xac/0xe0
[ 2538.461082]  do_el0_svc+0x1c/0x28
[ 2538.461087]  el0_svc+0x38/0x68
[ 2538.461090]  el0t_64_sync_handler+0x68/0xbc
[ 2538.461093]  el0t_64_sync+0x1a8/0x1ac

  T1:				T2:
  sd_remove
  del_gendisk
  __blk_mark_disk_dead
  blk_freeze_queue_start
  ++q-&gt;mq_freeze_depth
  				bdev_release
 				mutex_lock(&amp;disk-&gt;open_mutex)
  				sd_release
 				scsi_execute_cmd
 				blk_queue_enter
 				wait_event(!q-&gt;mq_freeze_depth)
  mutex_lock(&amp;disk-&gt;open_mutex)

SCSI does not set GD_OWNS_QUEUE, so QUEUE_FLAG_DYING is not set in
this scenario. This is a classic ABBA deadlock. To fix the deadlock,
make sure we don't try to acquire disk-&gt;open_mutex after freezing
the queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42294/">CVE-2024-42294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229371">SUSE bug 1229371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42295" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: handle inconsistent state in nilfs_btnode_create_block()

Syzbot reported that a buffer state inconsistency was detected in
nilfs_btnode_create_block(), triggering a kernel bug.

It is not appropriate to treat this inconsistency as a bug; it can occur
if the argument block address (the buffer index of the newly created
block) is a virtual block number and has been reallocated due to
corruption of the bitmap used to manage its allocation state.

So, modify nilfs_btnode_create_block() and its callers to treat it as a
possible filesystem error, rather than triggering a kernel bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229370">SUSE bug 1229370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42296" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42296" ref_url="https://www.suse.com/security/cve/CVE-2024-42296" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix return value of f2fs_convert_inline_inode()

If device is readonly, make f2fs_convert_inline_inode()
return EROFS instead of zero, otherwise it may trigger
panic during writeback of inline inode's dirty page as
below:

 f2fs_write_single_data_page+0xbb6/0x1e90 fs/f2fs/data.c:2888
 f2fs_write_cache_pages fs/f2fs/data.c:3187 [inline]
 __f2fs_write_data_pages fs/f2fs/data.c:3342 [inline]
 f2fs_write_data_pages+0x1efe/0x3a90 fs/f2fs/data.c:3369
 do_writepages+0x359/0x870 mm/page-writeback.c:2634
 filemap_fdatawrite_wbc+0x125/0x180 mm/filemap.c:397
 __filemap_fdatawrite_range mm/filemap.c:430 [inline]
 file_write_and_wait_range+0x1aa/0x290 mm/filemap.c:788
 f2fs_do_sync_file+0x68a/0x1ae0 fs/f2fs/file.c:276
 generic_write_sync include/linux/fs.h:2806 [inline]
 f2fs_file_write_iter+0x7bd/0x24e0 fs/f2fs/file.c:4977
 call_write_iter include/linux/fs.h:2114 [inline]
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0xa72/0xc90 fs/read_write.c:590
 ksys_write+0x1a0/0x2c0 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42296/">CVE-2024-42296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42296">CVE-2024-42296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229405">SUSE bug 1229405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42297" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42297" ref_url="https://www.suse.com/security/cve/CVE-2024-42297" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to don't dirty inode for readonly filesystem

syzbot reports f2fs bug as below:

kernel BUG at fs/f2fs/inode.c:933!
RIP: 0010:f2fs_evict_inode+0x1576/0x1590 fs/f2fs/inode.c:933
Call Trace:
 evict+0x2a4/0x620 fs/inode.c:664
 dispose_list fs/inode.c:697 [inline]
 evict_inodes+0x5f8/0x690 fs/inode.c:747
 generic_shutdown_super+0x9d/0x2c0 fs/super.c:675
 kill_block_super+0x44/0x90 fs/super.c:1667
 kill_f2fs_super+0x303/0x3b0 fs/f2fs/super.c:4894
 deactivate_locked_super+0xc1/0x130 fs/super.c:484
 cleanup_mnt+0x426/0x4c0 fs/namespace.c:1256
 task_work_run+0x24a/0x300 kernel/task_work.c:180
 ptrace_notify+0x2cd/0x380 kernel/signal.c:2399
 ptrace_report_syscall include/linux/ptrace.h:411 [inline]
 ptrace_report_syscall_exit include/linux/ptrace.h:473 [inline]
 syscall_exit_work kernel/entry/common.c:251 [inline]
 syscall_exit_to_user_mode_prepare kernel/entry/common.c:278 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline]
 syscall_exit_to_user_mode+0x15c/0x280 kernel/entry/common.c:296
 do_syscall_64+0x50/0x110 arch/x86/entry/common.c:88
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

The root cause is:
- do_sys_open
 - f2fs_lookup
  - __f2fs_find_entry
   - f2fs_i_depth_write
    - f2fs_mark_inode_dirty_sync
     - f2fs_dirty_inode
      - set_inode_flag(inode, FI_DIRTY_INODE)

- umount
 - kill_f2fs_super
  - kill_block_super
   - generic_shutdown_super
    - sync_filesystem
    : sb is readonly, skip sync_filesystem()
    - evict_inodes
     - iput
      - f2fs_evict_inode
       - f2fs_bug_on(sbi, is_inode_flag_set(inode, FI_DIRTY_INODE))
       : trigger kernel panic

When we try to repair i_current_depth in readonly filesystem, let's
skip dirty inode to avoid panic in later f2fs_evict_inode().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42297/">CVE-2024-42297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42297">CVE-2024-42297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229406">SUSE bug 1229406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42298" ref_url="https://www.suse.com/security/cve/CVE-2024-42298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: fsl: fsl_qmc_audio: Check devm_kasprintf() returned value

devm_kasprintf() can return a NULL pointer on failure but this returned
value is not checked.

Fix this lack and check the returned value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42298/">CVE-2024-42298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42298">CVE-2024-42298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229369">SUSE bug 1229369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42299" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42299" ref_url="https://www.suse.com/security/cve/CVE-2024-42299" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Update log-&gt;page_{mask,bits} if log-&gt;page_size changed

If an NTFS file system is mounted to another system with different
PAGE_SIZE from the original system, log-&gt;page_size will change in
log_replay(), but log-&gt;page_{mask,bits} don't change correspondingly.
This will cause a panic because "u32 bytes = log-&gt;page_size - page_off"
will get a negative value in the later read_log_page().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42299/">CVE-2024-42299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42299">CVE-2024-42299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229368">SUSE bug 1229368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42300" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42300" ref_url="https://www.suse.com/security/cve/CVE-2024-42300" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix race in z_erofs_get_gbuf()

In z_erofs_get_gbuf(), the current task may be migrated to another
CPU between `z_erofs_gbuf_id()` and `spin_lock(&amp;gbuf-&gt;lock)`.

Therefore, z_erofs_put_gbuf() will trigger the following issue
which was found by stress test:

&lt;2&gt;[772156.434168] kernel BUG at fs/erofs/zutil.c:58!
..
&lt;4&gt;[772156.435007]
&lt;4&gt;[772156.439237] CPU: 0 PID: 3078 Comm: stress Kdump: loaded Tainted: G            E      6.10.0-rc7+ #2
&lt;4&gt;[772156.439239] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 1.0.0 01/01/2017
&lt;4&gt;[772156.439241] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
&lt;4&gt;[772156.439243] pc : z_erofs_put_gbuf+0x64/0x70 [erofs]
&lt;4&gt;[772156.439252] lr : z_erofs_lz4_decompress+0x600/0x6a0 [erofs]
..
&lt;6&gt;[772156.445958] stress (3127): drop_caches: 1
&lt;4&gt;[772156.446120] Call trace:
&lt;4&gt;[772156.446121]  z_erofs_put_gbuf+0x64/0x70 [erofs]
&lt;4&gt;[772156.446761]  z_erofs_lz4_decompress+0x600/0x6a0 [erofs]
&lt;4&gt;[772156.446897]  z_erofs_decompress_queue+0x740/0xa10 [erofs]
&lt;4&gt;[772156.447036]  z_erofs_runqueue+0x428/0x8c0 [erofs]
&lt;4&gt;[772156.447160]  z_erofs_readahead+0x224/0x390 [erofs]
..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42300/">CVE-2024-42300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42300">CVE-2024-42300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229367">SUSE bug 1229367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dev/parport: fix the array out-of-bounds risk

Fixed array out-of-bounds issues caused by sprintf
by replacing it with snprintf for safer data copying,
ensuring the destination buffer is not overflowed.

Below is the stack trace I encountered during the actual issue:

[ 66.575408s] [pid:5118,cpu4,QThread,4]Kernel panic - not syncing: stack-protector:
Kernel stack is corrupted in: do_hardware_base_addr+0xcc/0xd0 [parport]
[ 66.575408s] [pid:5118,cpu4,QThread,5]CPU: 4 PID: 5118 Comm:
QThread Tainted: G S W O 5.10.97-arm64-desktop #7100.57021.2
[ 66.575439s] [pid:5118,cpu4,QThread,6]TGID: 5087 Comm: EFileApp
[ 66.575439s] [pid:5118,cpu4,QThread,7]Hardware name: HUAWEI HUAWEI QingYun
PGUX-W515x-B081/SP1PANGUXM, BIOS 1.00.07 04/29/2024
[ 66.575439s] [pid:5118,cpu4,QThread,8]Call trace:
[ 66.575469s] [pid:5118,cpu4,QThread,9] dump_backtrace+0x0/0x1c0
[ 66.575469s] [pid:5118,cpu4,QThread,0] show_stack+0x14/0x20
[ 66.575469s] [pid:5118,cpu4,QThread,1] dump_stack+0xd4/0x10c
[ 66.575500s] [pid:5118,cpu4,QThread,2] panic+0x1d8/0x3bc
[ 66.575500s] [pid:5118,cpu4,QThread,3] __stack_chk_fail+0x2c/0x38
[ 66.575500s] [pid:5118,cpu4,QThread,4] do_hardware_base_addr+0xcc/0xd0 [parport]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal

Keith reports a use-after-free when a DPC event occurs concurrently to
hot-removal of the same portion of the hierarchy:

The dpc_handler() awaits readiness of the secondary bus below the
Downstream Port where the DPC event occurred.  To do so, it polls the
config space of the first child device on the secondary bus.  If that
child device is concurrently removed, accesses to its struct pci_dev
cause the kernel to oops.

That's because pci_bridge_wait_for_secondary_bus() neglects to hold a
reference on the child device.  Before v6.3, the function was only
called on resume from system sleep or on runtime resume.  Holding a
reference wasn't necessary back then because the pciehp IRQ thread
could never run concurrently.  (On resume from system sleep, IRQs are
not enabled until after the resume_noirq phase.  And runtime resume is
always awaited before a PCI device is removed.)

However starting with v6.3, pci_bridge_wait_for_secondary_bus() is also
called on a DPC event.  Commit 53b54ad074de ("PCI/DPC: Await readiness
of secondary bus after reset"), which introduced that, failed to
appreciate that pci_bridge_wait_for_secondary_bus() now needs to hold a
reference on the child device because dpc_handler() and pciehp may
indeed run concurrently.  The commit was backported to v5.10+ stable
kernels, so that's the oldest one affected.

Add the missing reference acquisition.

Abridged stack trace:

  BUG: unable to handle page fault for address: 00000000091400c0
  CPU: 15 PID: 2464 Comm: irq/53-pcie-dpc 6.9.0
  RIP: pci_bus_read_config_dword+0x17/0x50
  pci_dev_wait()
  pci_bridge_wait_for_secondary_bus()
  dpc_reset_link()
  pcie_do_recovery()
  dpc_handler()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229366">SUSE bug 1229366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42303" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42303" ref_url="https://www.suse.com/security/cve/CVE-2024-42303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx-pxp: Fix ERR_PTR dereference in pxp_probe()

devm_regmap_init_mmio() can fail, add a check and bail out in case of
error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42303/">CVE-2024-42303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42303">CVE-2024-42303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229365">SUSE bug 1229365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: make sure the first directory block is not a hole

The syzbot constructs a directory that has no dirblock but is non-inline,
i.e. the first directory block is a hole. And no errors are reported when
creating files in this directory in the following flow.

    ext4_mknod
     ...
      ext4_add_entry
        // Read block 0
        ext4_read_dirblock(dir, block, DIRENT)
          bh = ext4_bread(NULL, inode, block, 0)
          if (!bh &amp;&amp; (type == INDEX || type == DIRENT_HTREE))
          // The first directory block is a hole
          // But type == DIRENT, so no error is reported.

After that, we get a directory block without '.' and '..' but with a valid
dentry. This may cause some code that relies on dot or dotdot (such as
make_indexed_dir()) to crash.

Therefore when ext4_read_dirblock() finds that the first directory block
is a hole report that the filesystem is corrupted and return an error to
avoid loading corrupted data from disk causing something bad.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229364">SUSE bug 1229364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42305</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: check dot and dotdot of dx_root before making dir indexed

Syzbot reports a issue as follows:
============================================
BUG: unable to handle page fault for address: ffffed11022e24fe
PGD 23ffee067 P4D 23ffee067 PUD 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 PID: 5079 Comm: syz-executor306 Not tainted 6.10.0-rc5-g55027e689933 #0
Call Trace:
 &lt;TASK&gt;
 make_indexed_dir+0xdaf/0x13c0 fs/ext4/namei.c:2341
 ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2451
 ext4_rename fs/ext4/namei.c:3936 [inline]
 ext4_rename2+0x26e5/0x4370 fs/ext4/namei.c:4214
[...]
============================================

The immediate cause of this problem is that there is only one valid dentry
for the block to be split during do_split, so split==0 results in out of
bounds accesses to the map triggering the issue.

    do_split
      unsigned split
      dx_make_map
       count = 1
      split = count/2 = 0;
      continued = hash2 == map[split - 1].hash;
       ---&gt; map[4294967295]

The maximum length of a filename is 255 and the minimum block size is 1024,
so it is always guaranteed that the number of entries is greater than or
equal to 2 when do_split() is called.

But syzbot's crafted image has no dot and dotdot in dir, and the dentry
distribution in dirblock is as follows:

  bus     dentry1          hole           dentry2           free
|xx--|xx-------------|...............|xx-------------|...............|
0   12 (8+248)=256  268     256     524 (8+256)=264 788     236     1024

So when renaming dentry1 increases its name_len length by 1, neither hole
nor free is sufficient to hold the new dentry, and make_indexed_dir() is
called.

In make_indexed_dir() it is assumed that the first two entries of the
dirblock must be dot and dotdot, so bus and dentry1 are left in dx_root
because they are treated as dot and dotdot, and only dentry2 is moved
to the new leaf block. That's why count is equal to 1.

Therefore add the ext4_check_dx_root() helper function to add more sanity
checks to dot and dotdot before starting the conversion to avoid the above
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229363">SUSE bug 1229363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42306</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42306" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid using corrupted block bitmap buffer

When the filesystem block bitmap is corrupted, we detect the corruption
while loading the bitmap and fail the allocation with error. However the
next allocation from the same bitmap will notice the bitmap buffer is
already loaded and tries to allocate from the bitmap with mixed results
(depending on the exact nature of the bitmap corruption). Fix the
problem by using BH_verified bit to indicate whether the bitmap is valid
or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229362">SUSE bug 1229362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42307</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42307" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42307" ref_url="https://www.suse.com/security/cve/CVE-2024-42307" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path

Dan Carpenter reported a Smack static checker warning:
   fs/smb/client/cifsfs.c:1981 init_cifs()
   error: we previously assumed 'serverclose_wq' could be null (see line 1895)

The patch which introduced the serverclose workqueue used the wrong
oredering in error paths in init_cifs() for freeing it on errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42307/">CVE-2024-42307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42307">CVE-2024-42307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229361">SUSE bug 1229361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42308</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42308" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229411">SUSE bug 1229411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42309</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42309" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes

In psb_intel_lvds_get_modes(), the return value of drm_mode_duplicate() is
assigned to mode, which will lead to a possible NULL pointer dereference
on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229359">SUSE bug 1229359</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42310</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42310" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes

In cdv_intel_lvds_get_modes(), the return value of drm_mode_duplicate()
is assigned to mode, which will lead to a NULL pointer dereference on
failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229358">SUSE bug 1229358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42311</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42311" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode()

Syzbot reports uninitialized value access issue as below:

loop0: detected capacity change from 0 to 64
=====================================================
BUG: KMSAN: uninit-value in hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30
 hfs_revalidate_dentry+0x307/0x3f0 fs/hfs/sysdep.c:30
 d_revalidate fs/namei.c:862 [inline]
 lookup_fast+0x89e/0x8e0 fs/namei.c:1649
 walk_component fs/namei.c:2001 [inline]
 link_path_walk+0x817/0x1480 fs/namei.c:2332
 path_lookupat+0xd9/0x6f0 fs/namei.c:2485
 filename_lookup+0x22e/0x740 fs/namei.c:2515
 user_path_at_empty+0x8b/0x390 fs/namei.c:2924
 user_path_at include/linux/namei.h:57 [inline]
 do_mount fs/namespace.c:3689 [inline]
 __do_sys_mount fs/namespace.c:3898 [inline]
 __se_sys_mount+0x66b/0x810 fs/namespace.c:3875
 __x64_sys_mount+0xe4/0x140 fs/namespace.c:3875
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

BUG: KMSAN: uninit-value in hfs_ext_read_extent fs/hfs/extent.c:196 [inline]
BUG: KMSAN: uninit-value in hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366
 hfs_ext_read_extent fs/hfs/extent.c:196 [inline]
 hfs_get_block+0x92d/0x1620 fs/hfs/extent.c:366
 block_read_full_folio+0x4ff/0x11b0 fs/buffer.c:2271
 hfs_read_folio+0x55/0x60 fs/hfs/inode.c:39
 filemap_read_folio+0x148/0x4f0 mm/filemap.c:2426
 do_read_cache_folio+0x7c8/0xd90 mm/filemap.c:3553
 do_read_cache_page mm/filemap.c:3595 [inline]
 read_cache_page+0xfb/0x2f0 mm/filemap.c:3604
 read_mapping_page include/linux/pagemap.h:755 [inline]
 hfs_btree_open+0x928/0x1ae0 fs/hfs/btree.c:78
 hfs_mdb_get+0x260c/0x3000 fs/hfs/mdb.c:204
 hfs_fill_super+0x1fb1/0x2790 fs/hfs/super.c:406
 mount_bdev+0x628/0x920 fs/super.c:1359
 hfs_mount+0xcd/0xe0 fs/hfs/super.c:456
 legacy_get_tree+0x167/0x2e0 fs/fs_context.c:610
 vfs_get_tree+0xdc/0x5d0 fs/super.c:1489
 do_new_mount+0x7a9/0x16f0 fs/namespace.c:3145
 path_mount+0xf98/0x26a0 fs/namespace.c:3475
 do_mount fs/namespace.c:3488 [inline]
 __do_sys_mount fs/namespace.c:3697 [inline]
 __se_sys_mount+0x919/0x9e0 fs/namespace.c:3674
 __ia32_sys_mount+0x15b/0x1b0 fs/namespace.c:3674
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

Uninit was created at:
 __alloc_pages+0x9a6/0xe00 mm/page_alloc.c:4590
 __alloc_pages_node include/linux/gfp.h:238 [inline]
 alloc_pages_node include/linux/gfp.h:261 [inline]
 alloc_slab_page mm/slub.c:2190 [inline]
 allocate_slab mm/slub.c:2354 [inline]
 new_slab+0x2d7/0x1400 mm/slub.c:2407
 ___slab_alloc+0x16b5/0x3970 mm/slub.c:3540
 __slab_alloc mm/slub.c:3625 [inline]
 __slab_alloc_node mm/slub.c:3678 [inline]
 slab_alloc_node mm/slub.c:3850 [inline]
 kmem_cache_alloc_lru+0x64d/0xb30 mm/slub.c:3879
 alloc_inode_sb include/linux/fs.h:3018 [inline]
 hfs_alloc_inode+0x5a/0xc0 fs/hfs/super.c:165
 alloc_inode+0x83/0x440 fs/inode.c:260
 new_inode_pseudo fs/inode.c:1005 [inline]
 new_inode+0x38/0x4f0 fs/inode.c:1031
 hfs_new_inode+0x61/0x1010 fs/hfs/inode.c:186
 hfs_mkdir+0x54/0x250 fs/hfs/dir.c:228
 vfs_mkdir+0x49a/0x700 fs/namei.c:4126
 do_mkdirat+0x529/0x810 fs/namei.c:4149
 __do_sys_mkdirat fs/namei.c:4164 [inline]
 __se_sys_mkdirat fs/namei.c:4162 [inline]
 __x64_sys_mkdirat+0xc8/0x120 fs/namei.c:4162
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

It missed to initialize .tz_secondswest, .cached_start and .cached_blocks
fields in struct hfs_inode_info after hfs_alloc_inode(), fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229413">SUSE bug 1229413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42312</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysctl: always initialize i_uid/i_gid

Always initialize i_uid/i_gid inside the sysfs core so set_ownership()
can safely skip setting them.

Commit 5ec27ec735ba ("fs/proc/proc_sysctl.c: fix the default values of
i_uid/i_gid on /proc/sys inodes.") added defaults for i_uid/i_gid when
set_ownership() was not implemented. It also missed adjusting
net_ctl_set_ownership() to use the same default values in case the
computation of a better value failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229357">SUSE bug 1229357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42313</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42313" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: fix use after free in vdec_close

There appears to be a possible use after free with vdec_close().
The firmware will add buffer release work to the work queue through
HFI callbacks as a normal part of decoding. Randomly closing the
decoder device from userspace during normal decoding can incur
a read after free for inst.

Fix it by cancelling the work in vdec_close.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229356">SUSE bug 1229356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42314</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42314" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42314" ref_url="https://www.suse.com/security/cve/CVE-2024-42314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix extent map use-after-free when adding pages to compressed bio

At add_ra_bio_pages() we are accessing the extent map to calculate
'add_size' after we dropped our reference on the extent map, resulting
in a use-after-free. Fix this by computing 'add_size' before dropping our
extent map reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42314/">CVE-2024-42314 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42314">CVE-2024-42314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229355">SUSE bug 1229355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42315</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42315" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix potential deadlock on __exfat_get_dentry_set

When accessing a file with more entries than ES_MAX_ENTRY_NUM, the bh-array
is allocated in __exfat_get_entry_set. The problem is that the bh-array is
allocated with GFP_KERNEL. It does not make sense. In the following cases,
a deadlock for sbi-&gt;s_lock between the two processes may occur.

       CPU0                CPU1
       ----                ----
  kswapd
   balance_pgdat
    lock(fs_reclaim)
                      exfat_iterate
                       lock(&amp;sbi-&gt;s_lock)
                       exfat_readdir
                        exfat_get_uniname_from_ext_entry
                         exfat_get_dentry_set
                          __exfat_get_dentry_set
                           kmalloc_array
                            ...
                            lock(fs_reclaim)
    ...
    evict
     exfat_evict_inode
      lock(&amp;sbi-&gt;s_lock)

To fix this, let's allocate bh-array with GFP_NOFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229354">SUSE bug 1229354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42316</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42316" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42316" ref_url="https://www.suse.com/security/cve/CVE-2024-42316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mglru: fix div-by-zero in vmpressure_calc_level()

evict_folios() uses a second pass to reclaim folios that have gone through
page writeback and become clean before it finishes the first pass, since
folio_rotate_reclaimable() cannot handle those folios due to the
isolation.

The second pass tries to avoid potential double counting by deducting
scan_control-&gt;nr_scanned.  However, this can result in underflow of
nr_scanned, under a condition where shrink_folio_list() does not increment
nr_scanned, i.e., when folio_trylock() fails.

The underflow can cause the divisor, i.e., scale=scanned+reclaimed in
vmpressure_calc_level(), to become zero, resulting in the following crash:

  [exception RIP: vmpressure_work_fn+101]
  process_one_work at ffffffffa3313f2b

Since scan_control-&gt;nr_scanned has no established semantics, the potential
double counting has minimal risks.  Therefore, fix the problem by not
deducting scan_control-&gt;nr_scanned in evict_folios().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42316/">CVE-2024-42316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229353">SUSE bug 1229353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42317</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42317" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42317" ref_url="https://www.suse.com/security/cve/CVE-2024-42317" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: avoid PMD-size page cache if needed

xarray can't support arbitrary page cache size.  the largest and supported
page cache size is defined as MAX_PAGECACHE_ORDER by commit 099d90642a71
("mm/filemap: make MAX_PAGECACHE_ORDER acceptable to xarray").  However,
it's possible to have 512MB page cache in the huge memory's collapsing
path on ARM64 system whose base page size is 64KB.  512MB page cache is
breaking the limitation and a warning is raised when the xarray entry is
split as shown in the following example.

[root@dhcp-10-26-1-207 ~]# cat /proc/1/smaps | grep KernelPageSize
KernelPageSize:       64 kB
[root@dhcp-10-26-1-207 ~]# cat /tmp/test.c
   :
int main(int argc, char **argv)
{
	const char *filename = TEST_XFS_FILENAME;
	int fd = 0;
	void *buf = (void *)-1, *p;
	int pgsize = getpagesize();
	int ret = 0;

	if (pgsize != 0x10000) {
		fprintf(stdout, "System with 64KB base page size is required!\n");
		return -EPERM;
	}

	system("echo 0 &gt; /sys/devices/virtual/bdi/253:0/read_ahead_kb");
	system("echo 1 &gt; /proc/sys/vm/drop_caches");

	/* Open the xfs file */
	fd = open(filename, O_RDONLY);
	assert(fd &gt; 0);

	/* Create VMA */
	buf = mmap(NULL, TEST_MEM_SIZE, PROT_READ, MAP_SHARED, fd, 0);
	assert(buf != (void *)-1);
	fprintf(stdout, "mapped buffer at 0x%p\n", buf);

	/* Populate VMA */
	ret = madvise(buf, TEST_MEM_SIZE, MADV_NOHUGEPAGE);
	assert(ret == 0);
	ret = madvise(buf, TEST_MEM_SIZE, MADV_POPULATE_READ);
	assert(ret == 0);

	/* Collapse VMA */
	ret = madvise(buf, TEST_MEM_SIZE, MADV_HUGEPAGE);
	assert(ret == 0);
	ret = madvise(buf, TEST_MEM_SIZE, MADV_COLLAPSE);
	if (ret) {
		fprintf(stdout, "Error %d to madvise(MADV_COLLAPSE)\n", errno);
		goto out;
	}

	/* Split xarray entry. Write permission is needed */
	munmap(buf, TEST_MEM_SIZE);
	buf = (void *)-1;
	close(fd);
	fd = open(filename, O_RDWR);
	assert(fd &gt; 0);
	fallocate(fd, FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE,
 		  TEST_MEM_SIZE - pgsize, pgsize);
out:
	if (buf != (void *)-1)
		munmap(buf, TEST_MEM_SIZE);
	if (fd &gt; 0)
		close(fd);

	return ret;
}

[root@dhcp-10-26-1-207 ~]# gcc /tmp/test.c -o /tmp/test
[root@dhcp-10-26-1-207 ~]# /tmp/test
 ------------[ cut here ]------------
 WARNING: CPU: 25 PID: 7560 at lib/xarray.c:1025 xas_split_alloc+0xf8/0x128
 Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib    \
 nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct      \
 nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4      \
 ip_set rfkill nf_tables nfnetlink vfat fat virtio_balloon drm fuse   \
 xfs libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_net  \
 sha1_ce net_failover virtio_blk virtio_console failover dimlib virtio_mmio
 CPU: 25 PID: 7560 Comm: test Kdump: loaded Not tainted 6.10.0-rc7-gavin+ #9
 Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-1.el9 05/24/2024
 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
 pc : xas_split_alloc+0xf8/0x128
 lr : split_huge_page_to_list_to_order+0x1c4/0x780
 sp : ffff8000ac32f660
 x29: ffff8000ac32f660 x28: ffff0000e0969eb0 x27: ffff8000ac32f6c0
 x26: 0000000000000c40 x25: ffff0000e0969eb0 x24: 000000000000000d
 x23: ffff8000ac32f6c0 x22: ffffffdfc0700000 x21: 0000000000000000
 x20: 0000000000000000 x19: ffffffdfc0700000 x18: 0000000000000000
 x17: 0000000000000000 x16: ffffd5f3708ffc70 x15: 0000000000000000
 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
 x11: ffffffffffffffc0 x10: 0000000000000040 x9 : ffffd5f3708e692c
 x8 : 0000000000000003 x7 : 0000000000000000 x6 : ffff0000e0969eb8
 x5 : ffffd5f37289e378 x4 : 0000000000000000 x3 : 0000000000000c40
 x2 : 000000000000000d x1 : 000000000000000c x0 : 0000000000000000
 Call trace:
  xas_split_alloc+0xf8/0x128
  split_huge_page_to_list_to_order+0x1c4/0x780
  truncate_inode_partial_folio+0xdc/0x160
  truncate_inode_pages_range+0x1b4/0x4a8
  truncate_pagecache_range+0x84/0xa
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42317/">CVE-2024-42317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42317">CVE-2024-42317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229352">SUSE bug 1229352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42318</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42318" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

landlock: Don't lose track of restrictions on cred_transfer

When a process' cred struct is replaced, this _almost_ always invokes
the cred_prepare LSM hook; but in one special case (when
KEYCTL_SESSION_TO_PARENT updates the parent's credentials), the
cred_transfer LSM hook is used instead.  Landlock only implements the
cred_prepare hook, not cred_transfer, so KEYCTL_SESSION_TO_PARENT causes
all information on Landlock restrictions to be lost.

This basically means that a process with the ability to use the fork()
and keyctl() syscalls can get rid of all Landlock restrictions on
itself.

Fix it by adding a cred_transfer hook that does the same thing as the
existing cred_prepare hook. (Implemented by having hook_cred_prepare()
call hook_cred_transfer() so that the two functions are less likely to
accidentally diverge in the future.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229351">SUSE bug 1229351</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42319" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()

When mtk-cmdq unbinds, a WARN_ON message with condition
pm_runtime_get_sync() &lt; 0 occurs.

According to the call tracei below:
  cmdq_mbox_shutdown
  mbox_free_channel
  mbox_controller_unregister
  __devm_mbox_controller_unregister
  ...

The root cause can be deduced to be calling pm_runtime_get_sync() after
calling pm_runtime_disable() as observed below:
1. CMDQ driver uses devm_mbox_controller_register() in cmdq_probe()
   to bind the cmdq device to the mbox_controller, so
   devm_mbox_controller_unregister() will automatically unregister
   the device bound to the mailbox controller when the device-managed
   resource is removed. That means devm_mbox_controller_unregister()
   and cmdq_mbox_shoutdown() will be called after cmdq_remove().
2. CMDQ driver also uses devm_pm_runtime_enable() in cmdq_probe() after
   devm_mbox_controller_register(), so that devm_pm_runtime_disable()
   will be called after cmdq_remove(), but before
   devm_mbox_controller_unregister().

To fix this problem, cmdq_probe() needs to move
devm_mbox_controller_register() after devm_pm_runtime_enable() to make
devm_pm_runtime_disable() be called after
devm_mbox_controller_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229350">SUSE bug 1229350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42320</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42320" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix error checks in dasd_copy_pair_store()

dasd_add_busid() can return an error via ERR_PTR() if an allocation
fails. However, two callsites in dasd_copy_pair_store() do not check
the result, potentially resulting in a NULL pointer dereference. Fix
this by checking the result with IS_ERR() and returning the error up
the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229349">SUSE bug 1229349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42321</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42321" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42321" ref_url="https://www.suse.com/security/cve/CVE-2024-42321" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE

The following splat is easy to reproduce upstream as well as in -stable
kernels. Florian Westphal provided the following commit:

  d1dab4f71d37 ("net: add and use __skb_get_hash_symmetric_net")

but this complementary fix has been also suggested by Willem de Bruijn
and it can be easily backported to -stable kernel which consists in
using DEBUG_NET_WARN_ON_ONCE instead to silence the following splat
given __skb_get_hash() is used by the nftables tracing infrastructure to
to identify packets in traces.

[69133.561393] ------------[ cut here ]------------
[69133.561404] WARNING: CPU: 0 PID: 43576 at net/core/flow_dissector.c:1104 __skb_flow_dissect+0x134f/
[...]
[69133.561944] CPU: 0 PID: 43576 Comm: socat Not tainted 6.10.0-rc7+ #379
[69133.561959] RIP: 0010:__skb_flow_dissect+0x134f/0x2ad0
[69133.561970] Code: 83 f9 04 0f 84 b3 00 00 00 45 85 c9 0f 84 aa 00 00 00 41 83 f9 02 0f 84 81 fc ff
ff 44 0f b7 b4 24 80 00 00 00 e9 8b f9 ff ff &lt;0f&gt; 0b e9 20 f3 ff ff 41 f6 c6 20 0f 84 e4 ef ff ff 48 8d 7b 12 e8
[69133.561979] RSP: 0018:ffffc90000006fc0 EFLAGS: 00010246
[69133.561988] RAX: 0000000000000000 RBX: ffffffff82f33e20 RCX: ffffffff81ab7e19
[69133.561994] RDX: dffffc0000000000 RSI: ffffc90000007388 RDI: ffff888103a1b418
[69133.562001] RBP: ffffc90000007310 R08: 0000000000000000 R09: 0000000000000000
[69133.562007] R10: ffffc90000007388 R11: ffffffff810cface R12: ffff888103a1b400
[69133.562013] R13: 0000000000000000 R14: ffffffff82f33e2a R15: ffffffff82f33e28
[69133.562020] FS:  00007f40f7131740(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[69133.562027] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[69133.562033] CR2: 00007f40f7346ee0 CR3: 000000015d200001 CR4: 00000000001706f0
[69133.562040] Call Trace:
[69133.562044]  &lt;IRQ&gt;
[69133.562049]  ? __warn+0x9f/0x1a0
[ 1211.841384]  ? __skb_flow_dissect+0x107e/0x2860
[...]
[ 1211.841496]  ? bpf_flow_dissect+0x160/0x160
[ 1211.841753]  __skb_get_hash+0x97/0x280
[ 1211.841765]  ? __skb_get_hash_symmetric+0x230/0x230
[ 1211.841776]  ? mod_find+0xbf/0xe0
[ 1211.841786]  ? get_stack_info_noinstr+0x12/0xe0
[ 1211.841798]  ? bpf_ksym_find+0x56/0xe0
[ 1211.841807]  ? __rcu_read_unlock+0x2a/0x70
[ 1211.841819]  nft_trace_init+0x1b9/0x1c0 [nf_tables]
[ 1211.841895]  ? nft_trace_notify+0x830/0x830 [nf_tables]
[ 1211.841964]  ? get_stack_info+0x2b/0x80
[ 1211.841975]  ? nft_do_chain_arp+0x80/0x80 [nf_tables]
[ 1211.842044]  nft_do_chain+0x79c/0x850 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42321/">CVE-2024-42321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42321">CVE-2024-42321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229348">SUSE bug 1229348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42322</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: properly dereference pe in ip_vs_add_service

Use pe directly to resolve sparse warning:

  net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229347">SUSE bug 1229347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43098" ref_url="https://www.suse.com/security/cve/CVE-2024-43098" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: Use i3cdev-&gt;desc-&gt;info instead of calling i3c_device_get_info() to avoid deadlock

A deadlock may happen since the i3c_master_register() acquires
&amp;i3cbus-&gt;lock twice. See the log below.
Use i3cdev-&gt;desc-&gt;info instead of calling i3c_device_info() to
avoid acquiring the lock twice.

v2:
  - Modified the title and commit message

============================================
WARNING: possible recursive locking detected
6.11.0-mainline
--------------------------------------------
init/1 is trying to acquire lock:
f1ffff80a6a40dc0 (&amp;i3cbus-&gt;lock){++++}-{3:3}, at: i3c_bus_normaluse_lock

but task is already holding lock:
f1ffff80a6a40dc0 (&amp;i3cbus-&gt;lock){++++}-{3:3}, at: i3c_master_register

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&amp;i3cbus-&gt;lock);
  lock(&amp;i3cbus-&gt;lock);

 *** DEADLOCK ***

 May be due to missing lock nesting notation

2 locks held by init/1:
 #0: fcffff809b6798f8 (&amp;dev-&gt;mutex){....}-{3:3}, at: __driver_attach
 #1: f1ffff80a6a40dc0 (&amp;i3cbus-&gt;lock){++++}-{3:3}, at: i3c_master_register

stack backtrace:
CPU: 6 UID: 0 PID: 1 Comm: init
Call trace:
 dump_backtrace+0xfc/0x17c
 show_stack+0x18/0x28
 dump_stack_lvl+0x40/0xc0
 dump_stack+0x18/0x24
 print_deadlock_bug+0x388/0x390
 __lock_acquire+0x18bc/0x32ec
 lock_acquire+0x134/0x2b0
 down_read+0x50/0x19c
 i3c_bus_normaluse_lock+0x14/0x24
 i3c_device_get_info+0x24/0x58
 i3c_device_uevent+0x34/0xa4
 dev_uevent+0x310/0x384
 kobject_uevent_env+0x244/0x414
 kobject_uevent+0x14/0x20
 device_add+0x278/0x460
 device_register+0x20/0x34
 i3c_master_register_new_i3c_devs+0x78/0x154
 i3c_master_register+0x6a0/0x6d4
 mtk_i3c_master_probe+0x3b8/0x4d8
 platform_probe+0xa0/0xe0
 really_probe+0x114/0x454
 __driver_probe_device+0xa0/0x15c
 driver_probe_device+0x3c/0x1ac
 __driver_attach+0xc4/0x1f0
 bus_for_each_dev+0x104/0x160
 driver_attach+0x24/0x34
 bus_add_driver+0x14c/0x294
 driver_register+0x68/0x104
 __platform_driver_register+0x20/0x30
 init_module+0x20/0xfe4
 do_one_initcall+0x184/0x464
 do_init_module+0x58/0x1ec
 load_module+0xefc/0x10c8
 __arm64_sys_finit_module+0x238/0x33c
 invoke_syscall+0x58/0x10c
 el0_svc_common+0xa8/0xdc
 do_el0_svc+0x1c/0x28
 el0_svc+0x50/0xac
 el0t_64_sync_handler+0x70/0xbc
 el0t_64_sync+0x1a8/0x1ac
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43098/">CVE-2024-43098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43098">CVE-2024-43098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235703">SUSE bug 1235703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43815" ref_url="https://www.suse.com/security/cve/CVE-2024-43815" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: mxs-dcp - Ensure payload is zero when using key slot

We could leak stack memory through the payload field when running
AES with a key from one of the hardware's key slots. Fix this by
ensuring the payload field is set to 0 in such cases.

This does not affect the common use case when the key is supplied
from main memory via the descriptor payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43815/">CVE-2024-43815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43815">CVE-2024-43815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229310">SUSE bug 1229310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43816</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43816" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages

On big endian architectures, it is possible to run into a memory out of
bounds pointer dereference when FCP targets are zoned.

In lpfc_prep_embed_io, the memcpy(ptr, fcp_cmnd, sgl-&gt;sge_len) is
referencing a little endian formatted sgl-&gt;sge_len value.  So, the memcpy
can cause big endian systems to crash.

Redefine the *sgl ptr as a struct sli4_sge_le to make it clear that we are
referring to a little endian formatted data structure.  And, update the
routine with proper le32_to_cpu macro usages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229318">SUSE bug 1229318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: missing check virtio

Two missing check in virtio_net_hdr_to_skb() allowed syzbot
to crash kernels again

1. After the skb_segment function the buffer may become non-linear
(nr_frags != 0), but since the SKBTX_SHARED_FRAG flag is not set anywhere
the __skb_linearize function will not be executed, then the buffer will
remain non-linear. Then the condition (offset &gt;= skb_headlen(skb))
becomes true, which causes WARN_ON_ONCE in skb_checksum_help.

2. The struct sk_buff and struct virtio_net_hdr members must be
mathematically related.
(gso_size) must be greater than (needed) otherwise WARN_ON_ONCE.
(remainder) must be greater than (needed) otherwise WARN_ON_ONCE.
(remainder) may be 0 if division is without remainder.

offset+2 (4191) &gt; skb_headlen() (1116)
WARNING: CPU: 1 PID: 5084 at net/core/dev.c:3303 skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303
Modules linked in:
CPU: 1 PID: 5084 Comm: syz-executor336 Not tainted 6.7.0-rc3-syzkaller-00014-gdf60cee26a2e #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
RIP: 0010:skb_checksum_help+0x5e2/0x740 net/core/dev.c:3303
Code: 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 52 01 00 00 44 89 e2 2b 53 74 4c 89 ee 48 c7 c7 40 57 e9 8b e8 af 8f dd f8 90 &lt;0f&gt; 0b 90 90 e9 87 fe ff ff e8 40 0f 6e f9 e9 4b fa ff ff 48 89 ef
RSP: 0018:ffffc90003a9f338 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff888025125780 RCX: ffffffff814db209
RDX: ffff888015393b80 RSI: ffffffff814db216 RDI: 0000000000000001
RBP: ffff8880251257f4 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000045c
R13: 000000000000105f R14: ffff8880251257f0 R15: 000000000000105d
FS:  0000555555c24380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002000f000 CR3: 0000000023151000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ip_do_fragment+0xa1b/0x18b0 net/ipv4/ip_output.c:777
 ip_fragment.constprop.0+0x161/0x230 net/ipv4/ip_output.c:584
 ip_finish_output_gso net/ipv4/ip_output.c:286 [inline]
 __ip_finish_output net/ipv4/ip_output.c:308 [inline]
 __ip_finish_output+0x49c/0x650 net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 NF_HOOK_COND include/linux/netfilter.h:303 [inline]
 ip_output+0x13b/0x2a0 net/ipv4/ip_output.c:433
 dst_output include/net/dst.h:451 [inline]
 ip_local_out+0xaf/0x1a0 net/ipv4/ip_output.c:129
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ipip6_tunnel_xmit net/ipv6/sit.c:1034 [inline]
 sit_tunnel_xmit+0xed2/0x28f0 net/ipv6/sit.c:1076
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3545 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3561
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4346
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 packet_xmit+0x257/0x380 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x24ca/0x5240 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0xd5/0x180 net/socket.c:745
 __sys_sendto+0x255/0x340 net/socket.c:2190
 __do_sys_sendto net/socket.c:2202 [inline]
 __se_sys_sendto net/socket.c:2198 [inline]
 __x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Found by Linux Verification Center (linuxtesting.org) with Syzkaller
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: Adjust error handling in case of absent codec device

acpi_get_first_physical_node() can return NULL in several cases (no such
device, ACPI table error, reference count drop to 0, etc).
Existing check just emit error message, but doesn't perform return.
Then this NULL pointer is passed to devm_acpi_dev_add_driver_gpios()
where it is dereferenced.

Adjust this error handling by adding error code return.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229296">SUSE bug 1229296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kvm: s390: Reject memory region operations for ucontrol VMs

This change rejects the KVM_SET_USER_MEMORY_REGION and
KVM_SET_USER_MEMORY_REGION2 ioctls when called on a ucontrol VM.
This is necessary since ucontrol VMs have kvm-&gt;arch.gmap set to 0 and
would thus result in a null pointer dereference further in.
Memory management needs to be performed in userspace and using the
ioctls KVM_S390_UCAS_MAP and KVM_S390_UCAS_UNMAP.

Also improve s390 specific documentation for KVM_SET_USER_MEMORY_REGION
and KVM_SET_USER_MEMORY_REGION2.

[frankja@linux.ibm.com: commit message spelling fix, subject prefix fix]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229290">SUSE bug 1229290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43820" ref_url="https://www.suse.com/security/cve/CVE-2024-43820" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume

rm-raid devices will occasionally trigger the following warning when
being resumed after a table load because DM_RECOVERY_RUNNING is set:

WARNING: CPU: 7 PID: 5660 at drivers/md/dm-raid.c:4105 raid_resume+0xee/0x100 [dm_raid]

The failing check is:
WARN_ON_ONCE(test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery));

This check is designed to make sure that the sync thread isn't
registered, but md_check_recovery can set MD_RECOVERY_RUNNING without
the sync_thread ever getting registered. Instead of checking if
MD_RECOVERY_RUNNING is set, check if sync_thread is non-NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43820/">CVE-2024-43820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43820">CVE-2024-43820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229311">SUSE bug 1229311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix a possible null pointer dereference

In function lpfc_xcvr_data_show, the memory allocation with kmalloc might
fail, thereby making rdp_context a null pointer. In the following context
and functions that use this pointer, there are dereferencing operations,
leading to null pointer dereference.

To fix this issue, a null pointer check should be added. If it is null,
use scnprintf to notify the user and return len.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229315">SUSE bug 1229315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43822" ref_url="https://www.suse.com/security/cve/CVE-2024-43822" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoc: PCM6240: Return directly after a failed devm_kzalloc() in pcmdevice_i2c_probe()

The value "-ENOMEM" was assigned to the local variable "ret"
in one if branch after a devm_kzalloc() call failed at the beginning.
This error code will trigger then a pcmdevice_remove() call with a passed
null pointer so that an undesirable dereference will be performed.
Thus return the appropriate error code directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43822/">CVE-2024-43822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43822">CVE-2024-43822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229343">SUSE bug 1229343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()

If IORESOURCE_MEM is not provided in Device Tree due to
any error, resource_list_first_type() will return NULL and
pci_parse_request_of_pci_ranges() will just emit a warning.

This will cause a NULL pointer dereference. Fix this bug by adding NULL
return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229303">SUSE bug 1229303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43824" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43824" ref_url="https://www.suse.com/security/cve/CVE-2024-43824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-test: Make use of cached 'epc_features' in pci_epf_test_core_init()

Instead of getting the epc_features from pci_epc_get_features() API, use
the cached pci_epf_test::epc_features value to avoid the NULL check. Since
the NULL check is already performed in pci_epf_test_bind(), having one more
check in pci_epf_test_core_init() is redundant and it is not possible to
hit the NULL pointer dereference.

Also with commit a01e7214bef9 ("PCI: endpoint: Remove "core_init_notifier"
flag"), 'epc_features' got dereferenced without the NULL check, leading to
the following false positive Smatch warning:

  drivers/pci/endpoint/functions/pci-epf-test.c:784 pci_epf_test_core_init() error: we previously assumed 'epc_features' could be null (see line 747)

Thus, remove the redundant NULL check and also use the epc_features::
{msix_capable/msi_capable} flags directly to avoid local variables.

[kwilczynski: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43824/">CVE-2024-43824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43824">CVE-2024-43824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229320">SUSE bug 1229320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43825" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43825" ref_url="https://www.suse.com/security/cve/CVE-2024-43825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: Fix the sorting functionality in iio_gts_build_avail_time_table

The sorting in iio_gts_build_avail_time_table is not working as intended.
It could result in an out-of-bounds access when the time is zero.

Here are more details:

1. When the gts-&gt;itime_table[i].time_us is zero, e.g., the time
sequence is `3, 0, 1`, the inner for-loop will not terminate and do
out-of-bound writes. This is because once `times[j] &gt; new`, the value
`new` will be added in the current position and the `times[j]` will be
moved to `j+1` position, which makes the if-condition always hold.
Meanwhile, idx will be added one, making the loop keep running without
termination and out-of-bound write.
2. If none of the gts-&gt;itime_table[i].time_us is zero, the elements
will just be copied without being sorted as described in the comment
"Sort times from all tables to one and remove duplicates".

For more details, please refer to
https://lore.kernel.org/all/6dd0d822-046c-4dd2-9532-79d7ab96ec05@gmail.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43825/">CVE-2024-43825 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43825">CVE-2024-43825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229298">SUSE bug 1229298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43826</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43826" ref_url="https://www.suse.com/security/cve/CVE-2024-43826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: pass explicit offset/count to trace events

nfs_folio_length is unsafe to use without having the folio locked and a
check for a NULL -&gt;f_mapping that protects against truncations and can
lead to kernel crashes.  E.g. when running xfstests generic/065 with
all nfs trace points enabled.

Follow the model of the XFS trace points and pass in an explіcit offset
and length.  This has the additional benefit that these values can
be more accurate as some of the users touch partial folio ranges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43826/">CVE-2024-43826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43826">CVE-2024-43826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229294">SUSE bug 1229294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43827" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43827" ref_url="https://www.suse.com/security/cve/CVE-2024-43827" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check before access structs

In enable_phantom_plane, we should better check null pointer before
accessing various structs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43827/">CVE-2024-43827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43827">CVE-2024-43827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229293">SUSE bug 1229293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix infinite loop when replaying fast_commit

When doing fast_commit replay an infinite loop may occur due to an
uninitialized extent_status struct.  ext4_ext_determine_insert_hole() does
not detect the replay and calls ext4_es_find_extent_range(), which will
return immediately without initializing the 'es' variable.

Because 'es' contains garbage, an integer overflow may happen causing an
infinite loop in this function, easily reproducible using fstest generic/039.

This commit fixes this issue by unconditionally initializing the structure
in function ext4_es_find_extent_range().

Thanks to Zhang Yi, for figuring out the real problem!
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229394">SUSE bug 1229394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43829</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43829" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/qxl: Add check for drm_cvt_mode

Add check for the return value of drm_cvt_mode() and return the error if
it fails in order to avoid NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229341">SUSE bug 1229341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: trigger: Unregister sysfs attributes before calling deactivate()

Triggers which have trigger specific sysfs attributes typically store
related data in trigger-data allocated by the activate() callback and
freed by the deactivate() callback.

Calling device_remove_groups() after calling deactivate() leaves a window
where the sysfs attributes show/store functions could be called after
deactivation and then operate on the just freed trigger-data.

Move the device_remove_groups() call to before deactivate() to close
this race window.

This also makes the deactivation path properly do things in reverse order
of the activation path which calls the activate() callback before calling
device_add_groups().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229305">SUSE bug 1229305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Handle invalid decoder vsi

Handle an invalid decoder vsi in vpu_dec_init to ensure the decoder vsi
is valid for future use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229309">SUSE bug 1229309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43832" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43832" ref_url="https://www.suse.com/security/cve/CVE-2024-43832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/uv: Don't call folio_wait_writeback() without a folio reference

folio_wait_writeback() requires that no spinlocks are held and that
a folio reference is held, as documented. After we dropped the PTL, the
folio could get freed concurrently. So grab a temporary reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43832/">CVE-2024-43832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43832">CVE-2024-43832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229380">SUSE bug 1229380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43833" ref_url="https://www.suse.com/security/cve/CVE-2024-43833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l: async: Fix NULL pointer dereference in adding ancillary links

In v4l2_async_create_ancillary_links(), ancillary links are created for
lens and flash sub-devices. These are sub-device to sub-device links and
if the async notifier is related to a V4L2 device, the source sub-device
of the ancillary link is NULL, leading to a NULL pointer dereference.
Check the notifier's sd field is non-NULL in
v4l2_async_create_ancillary_links().

[Sakari Ailus: Reword the subject and commit messages slightly.]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43833/">CVE-2024-43833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43833">CVE-2024-43833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229299">SUSE bug 1229299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: fix invalid wait context of page_pool_destroy()

If the driver uses a page pool, it creates a page pool with
page_pool_create().
The reference count of page pool is 1 as default.
A page pool will be destroyed only when a reference count reaches 0.
page_pool_destroy() is used to destroy page pool, it decreases a
reference count.
When a page pool is destroyed, -&gt;disconnect() is called, which is
mem_allocator_disconnect().
This function internally acquires mutex_lock().

If the driver uses XDP, it registers a memory model with
xdp_rxq_info_reg_mem_model().
The xdp_rxq_info_reg_mem_model() internally increases a page pool
reference count if a memory model is a page pool.
Now the reference count is 2.

To destroy a page pool, the driver should call both page_pool_destroy()
and xdp_unreg_mem_model().
The xdp_unreg_mem_model() internally calls page_pool_destroy().
Only page_pool_destroy() decreases a reference count.

If a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we
will face an invalid wait context warning.
Because xdp_unreg_mem_model() calls page_pool_destroy() with
rcu_read_lock().
The page_pool_destroy() internally acquires mutex_lock().

Splat looks like:
=============================
[ BUG: Invalid wait context ]
6.10.0-rc6+ #4 Tainted: G W
-----------------------------
ethtool/1806 is trying to lock:
ffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150
other info that might help us debug this:
context-{5:5}
3 locks held by ethtool/1806:
stack backtrace:
CPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed
Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x7e/0xc0
__lock_acquire+0x1681/0x4de0
? _printk+0x64/0xe0
? __pfx_mark_lock.part.0+0x10/0x10
? __pfx___lock_acquire+0x10/0x10
lock_acquire+0x1b3/0x580
? mem_allocator_disconnect+0x73/0x150
? __wake_up_klogd.part.0+0x16/0xc0
? __pfx_lock_acquire+0x10/0x10
? dump_stack_lvl+0x91/0xc0
__mutex_lock+0x15c/0x1690
? mem_allocator_disconnect+0x73/0x150
? __pfx_prb_read_valid+0x10/0x10
? mem_allocator_disconnect+0x73/0x150
? __pfx_llist_add_batch+0x10/0x10
? console_unlock+0x193/0x1b0
? lockdep_hardirqs_on+0xbe/0x140
? __pfx___mutex_lock+0x10/0x10
? tick_nohz_tick_stopped+0x16/0x90
? __irq_work_queue_local+0x1e5/0x330
? irq_work_queue+0x39/0x50
? __wake_up_klogd.part.0+0x79/0xc0
? mem_allocator_disconnect+0x73/0x150
mem_allocator_disconnect+0x73/0x150
? __pfx_mem_allocator_disconnect+0x10/0x10
? mark_held_locks+0xa5/0xf0
? rcu_is_watching+0x11/0xb0
page_pool_release+0x36e/0x6d0
page_pool_destroy+0xd7/0x440
xdp_unreg_mem_model+0x1a7/0x2a0
? __pfx_xdp_unreg_mem_model+0x10/0x10
? kfree+0x125/0x370
? bnxt_free_ring.isra.0+0x2eb/0x500
? bnxt_free_mem+0x5ac/0x2500
xdp_rxq_info_unreg+0x4a/0xd0
bnxt_free_mem+0x1356/0x2500
bnxt_close_nic+0xf0/0x3b0
? __pfx_bnxt_close_nic+0x10/0x10
? ethnl_parse_bit+0x2c6/0x6d0
? __pfx___nla_validate_parse+0x10/0x10
? __pfx_ethnl_parse_bit+0x10/0x10
bnxt_set_features+0x2a8/0x3e0
__netdev_update_features+0x4dc/0x1370
? ethnl_parse_bitset+0x4ff/0x750
? __pfx_ethnl_parse_bitset+0x10/0x10
? __pfx___netdev_update_features+0x10/0x10
? mark_held_locks+0xa5/0xf0
? _raw_spin_unlock_irqrestore+0x42/0x70
? __pm_runtime_resume+0x7d/0x110
ethnl_set_features+0x32d/0xa20

To fix this problem, it uses rhashtable_lookup_fast() instead of
rhashtable_lookup() with rcu_read_lock().
Using xa without rcu_read_lock() here is safe.
xa is freed by __xdp_mem_allocator_rcu_free() and this is called by
call_rcu() of mem_xa_remove().
The mem_xa_remove() is called by page_pool_destroy() if a reference
count reaches 0.
The xa is already protected by the reference count mechanism well in the
control plane.
So removing rcu_read_lock() for page_pool_destroy() is safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229314">SUSE bug 1229314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43835" ref_url="https://www.suse.com/security/cve/CVE-2024-43835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Fix napi_skb_cache_put warning

After the commit bdacf3e34945 ("net: Use nested-BH locking for
napi_alloc_cache.") was merged, the following warning began to appear:

	 WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0

	  __warn+0x12f/0x340
	  napi_skb_cache_put+0x82/0x4b0
	  napi_skb_cache_put+0x82/0x4b0
	  report_bug+0x165/0x370
	  handle_bug+0x3d/0x80
	  exc_invalid_op+0x1a/0x50
	  asm_exc_invalid_op+0x1a/0x20
	  __free_old_xmit+0x1c8/0x510
	  napi_skb_cache_put+0x82/0x4b0
	  __free_old_xmit+0x1c8/0x510
	  __free_old_xmit+0x1c8/0x510
	  __pfx___free_old_xmit+0x10/0x10

The issue arises because virtio is assuming it's running in NAPI context
even when it's not, such as in the netpoll case.

To resolve this, modify virtnet_poll_tx() to only set NAPI when budget
is available. Same for virtnet_poll_cleantx(), which always assumed that
it was in a NAPI context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43835/">CVE-2024-43835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43835">CVE-2024-43835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229289">SUSE bug 1229289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43836" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43836" ref_url="https://www.suse.com/security/cve/CVE-2024-43836" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethtool: pse-pd: Fix possible null-deref

Fix a possible null dereference when a PSE supports both c33 and PoDL, but
only one of the netlink attributes is specified. The c33 or PoDL PSE
capabilities are already validated in the ethnl_set_pse_validate() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43836/">CVE-2024-43836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43836">CVE-2024-43836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229308">SUSE bug 1229308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix null pointer dereference in resolve_prog_type() for BPF_PROG_TYPE_EXT

When loading a EXT program without specifying `attr-&gt;attach_prog_fd`,
the `prog-&gt;aux-&gt;dst_prog` will be null. At this time, calling
resolve_prog_type() anywhere will result in a null pointer dereference.

Example stack trace:

[    8.107863] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
[    8.108262] Mem abort info:
[    8.108384]   ESR = 0x0000000096000004
[    8.108547]   EC = 0x25: DABT (current EL), IL = 32 bits
[    8.108722]   SET = 0, FnV = 0
[    8.108827]   EA = 0, S1PTW = 0
[    8.108939]   FSC = 0x04: level 0 translation fault
[    8.109102] Data abort info:
[    8.109203]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    8.109399]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    8.109614]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    8.109836] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101354000
[    8.110011] [0000000000000004] pgd=0000000000000000, p4d=0000000000000000
[    8.112624] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    8.112783] Modules linked in:
[    8.113120] CPU: 0 PID: 99 Comm: may_access_dire Not tainted 6.10.0-rc3-next-20240613-dirty #1
[    8.113230] Hardware name: linux,dummy-virt (DT)
[    8.113390] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    8.113429] pc : may_access_direct_pkt_data+0x24/0xa0
[    8.113746] lr : add_subprog_and_kfunc+0x634/0x8e8
[    8.113798] sp : ffff80008283b9f0
[    8.113813] x29: ffff80008283b9f0 x28: ffff800082795048 x27: 0000000000000001
[    8.113881] x26: ffff0000c0bb2600 x25: 0000000000000000 x24: 0000000000000000
[    8.113897] x23: ffff0000c1134000 x22: 000000000001864f x21: ffff0000c1138000
[    8.113912] x20: 0000000000000001 x19: ffff0000c12b8000 x18: ffffffffffffffff
[    8.113929] x17: 0000000000000000 x16: 0000000000000000 x15: 0720072007200720
[    8.113944] x14: 0720072007200720 x13: 0720072007200720 x12: 0720072007200720
[    8.113958] x11: 0720072007200720 x10: 0000000000f9fca4 x9 : ffff80008021f4e4
[    8.113991] x8 : 0101010101010101 x7 : 746f72705f6d656d x6 : 000000001e0e0f5f
[    8.114006] x5 : 000000000001864f x4 : ffff0000c12b8000 x3 : 000000000000001c
[    8.114020] x2 : 0000000000000002 x1 : 0000000000000000 x0 : 0000000000000000
[    8.114126] Call trace:
[    8.114159]  may_access_direct_pkt_data+0x24/0xa0
[    8.114202]  bpf_check+0x3bc/0x28c0
[    8.114214]  bpf_prog_load+0x658/0xa58
[    8.114227]  __sys_bpf+0xc50/0x2250
[    8.114240]  __arm64_sys_bpf+0x28/0x40
[    8.114254]  invoke_syscall.constprop.0+0x54/0xf0
[    8.114273]  do_el0_svc+0x4c/0xd8
[    8.114289]  el0_svc+0x3c/0x140
[    8.114305]  el0t_64_sync_handler+0x134/0x150
[    8.114331]  el0t_64_sync+0x168/0x170
[    8.114477] Code: 7100707f 54000081 f9401c00 f9403800 (b9400403)
[    8.118672] ---[ end trace 0000000000000000 ]---

One way to fix it is by forcing `attach_prog_fd` non-empty when
bpf_prog_load(). But this will lead to `libbpf_probe_bpf_prog_type`
API broken which use verifier log to probe prog type and will log
nothing if we reject invalid EXT prog before bpf_check().

Another way is by adding null check in resolve_prog_type().

The issue was introduced by commit 4a9c7bbe2ed4 ("bpf: Resolve to
prog-&gt;aux-&gt;dst_prog-&gt;type only for BPF_PROG_TYPE_EXT") which wanted
to correct type resolution for BPF_PROG_TYPE_TRACING programs. Before
that, the type resolution of BPF_PROG_TYPE_EXT prog actually follows
the logic below:

  prog-&gt;aux-&gt;dst_prog ? prog-&gt;aux-&gt;dst_prog-&gt;type : prog-&gt;type;

It implies that when EXT program is not yet attached to `dst_prog`,
the prog type should be EXT itself. This code worked fine in the past.
So just keep using it.

Fix this by returning `prog-&gt;type` for BPF_PROG_TYPE_EXT if `dst_prog`
is not present in resolve_prog_type().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229297">SUSE bug 1229297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43838" ref_url="https://www.suse.com/security/cve/CVE-2024-43838" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix overflow check in adjust_jmp_off()

adjust_jmp_off() incorrectly used the insn-&gt;imm field for all overflow check,
which is incorrect as that should only be done or the BPF_JMP32 | BPF_JA case,
not the general jump instruction case. Fix it by using insn-&gt;off for overflow
check in the general case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43838/">CVE-2024-43838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43838">CVE-2024-43838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229322">SUSE bug 1229322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bna: adjust 'name' buf size of bna_tcb and bna_ccb structures

To have enough space to write all possible sprintf() args. Currently
'name' size is 16, but the first '%s' specifier may already need at
least 16 characters, since 'bnad-&gt;netdev-&gt;name' is used there.

For '%d' specifiers, assume that they require:
 * 1 char for 'tx_id + tx_info-&gt;tcb[i]-&gt;id' sum, BNAD_MAX_TXQ_PER_TX is 8
 * 2 chars for 'rx_id + rx_info-&gt;rx_ctrl[i].ccb-&gt;id', BNAD_MAX_RXP_PER_RX
   is 16

And replace sprintf with snprintf.

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229301">SUSE bug 1229301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43840</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43840" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43840" ref_url="https://www.suse.com/security/cve/CVE-2024-43840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fix trampoline for BPF_TRAMP_F_CALL_ORIG

When BPF_TRAMP_F_CALL_ORIG is set, the trampoline calls
__bpf_tramp_enter() and __bpf_tramp_exit() functions, passing them
the struct bpf_tramp_image *im pointer as an argument in R0.

The trampoline generation code uses emit_addr_mov_i64() to emit
instructions for moving the bpf_tramp_image address into R0, but
emit_addr_mov_i64() assumes the address to be in the vmalloc() space
and uses only 48 bits. Because bpf_tramp_image is allocated using
kzalloc(), its address can use more than 48-bits, in this case the
trampoline will pass an invalid address to __bpf_tramp_enter/exit()
causing a kernel crash.

Fix this by using emit_a64_mov_i64() in place of emit_addr_mov_i64()
as it can work with addresses that are greater than 48-bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43840/">CVE-2024-43840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43840">CVE-2024-43840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229344">SUSE bug 1229344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: virt_wifi: avoid reporting connection success with wrong SSID

When user issues a connection with a different SSID than the one
virt_wifi has advertised, the __cfg80211_connect_result() will
trigger the warning: WARN_ON(bss_not_found).

The issue is because the connection code in virt_wifi does not
check the SSID from user space (it only checks the BSSID), and
virt_wifi will call cfg80211_connect_result() with WLAN_STATUS_SUCCESS
even if the SSID is different from the one virt_wifi has advertised.
Eventually cfg80211 won't be able to find the cfg80211_bss and generate
the warning.

Fixed it by checking the SSID (from user space) in the connection code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229304">SUSE bug 1229304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43842" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()

In rtw89_sta_info_get_iter() 'status-&gt;he_gi' is compared to array size.
But then 'rate-&gt;he_gi' is used as array index instead of 'status-&gt;he_gi'.
This can lead to go beyond array boundaries in case of 'rate-&gt;he_gi' is
not equal to 'status-&gt;he_gi' and is bigger than array size. Looks like
"copy-paste" mistake.

Fix this mistake by replacing 'rate-&gt;he_gi' with 'status-&gt;he_gi'.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229317">SUSE bug 1229317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43843" ref_url="https://www.suse.com/security/cve/CVE-2024-43843" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv, bpf: Fix out-of-bounds issue when preparing trampoline image

We get the size of the trampoline image during the dry run phase and
allocate memory based on that size. The allocated image will then be
populated with instructions during the real patch phase. But after
commit 26ef208c209a ("bpf: Use arch_bpf_trampoline_size"), the `im`
argument is inconsistent in the dry run and real patch phase. This may
cause emit_imm in RV64 to generate a different number of instructions
when generating the 'im' address, potentially causing out-of-bounds
issues. Let's emit the maximum number of instructions for the "im"
address during dry run to fix this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43843/">CVE-2024-43843 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43843">CVE-2024-43843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229321">SUSE bug 1229321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43844" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43844" ref_url="https://www.suse.com/security/cve/CVE-2024-43844" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: wow: fix GTK offload H2C skbuff issue

We mistakenly put skb too large and that may exceed skb-&gt;end.
Therefore, we fix it.

skbuff: skb_over_panic: text:ffffffffc09e9a9d len:416 put:204 head:ffff8fba04eca780 data:ffff8fba04eca7e0 tail:0x200 end:0x140 dev:&lt;NULL&gt;
------------[ cut here ]------------
kernel BUG at net/core/skbuff.c:192!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 4747 Comm: kworker/u4:44 Tainted: G           O       6.6.30-02659-gc18865c4dfbd #1 86547039b47e46935493f615ee31d0b2d711d35e
Hardware name: HP Meep/Meep, BIOS Google_Meep.11297.262.0 03/18/2021
Workqueue: events_unbound async_run_entry_fn
RIP: 0010:skb_panic+0x5d/0x60
Code: c6 63 8b 8f bb 4c 0f 45 f6 48 c7 c7 4d 89 8b bb 48 89 ce 44 89 d1 41 56 53 41 53 ff b0 c8 00 00 00 e8 27 5f 23 00 48 83 c4 20 &lt;0f&gt; 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44
RSP: 0018:ffffaa700144bad0 EFLAGS: 00010282
RAX: 0000000000000089 RBX: 0000000000000140 RCX: 14432c5aad26c900
RDX: 0000000000000000 RSI: 00000000ffffdfff RDI: 0000000000000001
RBP: ffffaa700144bae0 R08: 0000000000000000 R09: ffffaa700144b920
R10: 00000000ffffdfff R11: ffffffffbc28fbc0 R12: ffff8fba4e57a010
R13: 0000000000000000 R14: ffffffffbb8f8b63 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8fba7bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007999c4ad1000 CR3: 000000015503a000 CR4: 0000000000350ee0
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1f/0x70
 ? die+0x3d/0x60
 ? do_trap+0xa4/0x110
 ? skb_panic+0x5d/0x60
 ? do_error_trap+0x6d/0x90
 ? skb_panic+0x5d/0x60
 ? handle_invalid_op+0x30/0x40
 ? skb_panic+0x5d/0x60
 ? exc_invalid_op+0x3c/0x50
 ? asm_exc_invalid_op+0x16/0x20
 ? skb_panic+0x5d/0x60
 skb_put+0x49/0x50
 rtw89_fw_h2c_wow_gtk_ofld+0xbd/0x220 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]
 rtw89_wow_resume+0x31f/0x540 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]
 rtw89_ops_resume+0x2b/0xa0 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5]
 ieee80211_reconfig+0x84/0x13e0 [mac80211 818a894e3b77da6298269c59ed7cdff065a4ed52]
 ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]
 ? dev_printk_emit+0x51/0x70
 ? _dev_info+0x6e/0x90
 ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]
 wiphy_resume+0x89/0x180 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]
 ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]
 dpm_run_callback+0x3c/0x140
 device_resume+0x1f9/0x3c0
 ? __pfx_dpm_watchdog_handler+0x10/0x10
 async_resume+0x1d/0x30
 async_run_entry_fn+0x29/0xd0
 process_scheduled_works+0x1d8/0x3d0
 worker_thread+0x1fc/0x2f0
 kthread+0xed/0x110
 ? __pfx_worker_thread+0x10/0x10
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x38/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;
Modules linked in: ccm 8021q r8153_ecm cdc_ether usbnet r8152 mii dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc uinput rfcomm cmac algif_hash rtw89_8922ae(O) algif_skcipher rtw89_8922a(O) af_alg rtw89_pci(O) rtw89_core(O) btusb(O) snd_soc_sst_bxt_da7219_max98357a btbcm(O) snd_soc_hdac_hdmi btintel(O) snd_soc_intel_hda_dsp_common snd_sof_probes btrtl(O) btmtk(O) snd_hda_codec_hdmi snd_soc_dmic uvcvideo videobuf2_vmalloc uvc videobuf2_memops videobuf2_v4l2 videobuf2_common snd_sof_pci_intel_apl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda soundwire_intel soundwire_generic_allocation snd_sof_intel_hda_mlink soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp mac80211 snd_soc_acpi_intel_match snd_soc_acpi snd_sof snd_sof_utils soundwire_bus snd_soc_max98357a snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_da7219 snd_hda_codec snd_hwdep snd_hda_core veth ip6table_nat xt_MASQUERADE xt_cgroup fuse bluetooth ecdh_generic
 cfg80211 ecc
gsmi: Log Shutdown 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43844/">CVE-2024-43844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43844">CVE-2024-43844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229288">SUSE bug 1229288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43845" ref_url="https://www.suse.com/security/cve/CVE-2024-43845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Fix bogus checksum computation in udf_rename()

Syzbot reports uninitialized memory access in udf_rename() when updating
checksum of '..' directory entry of a moved directory. This is indeed
true as we pass on-stack diriter.fi to the udf_update_tag() and because
that has only struct fileIdentDesc included in it and not the impUse or
name fields, the checksumming function is going to checksum random stack
contents beyond the end of the structure. This is actually harmless
because the following udf_fiiter_write_fi() will recompute the checksum
from on-disk buffers where everything is properly included. So all that
is needed is just removing the bogus calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43845/">CVE-2024-43845 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43845">CVE-2024-43845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229389">SUSE bug 1229389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib: objagg: Fix general protection fault

The library supports aggregation of objects into other objects only if
the parent object does not have a parent itself. That is, nesting is not
supported.

Aggregation happens in two cases: Without and with hints, where hints
are a pre-computed recommendation on how to aggregate the provided
objects.

Nesting is not possible in the first case due to a check that prevents
it, but in the second case there is no check because the assumption is
that nesting cannot happen when creating objects based on hints. The
violation of this assumption leads to various warnings and eventually to
a general protection fault [1].

Before fixing the root cause, error out when nesting happens and warn.

[1]
general protection fault, probably for non-canonical address 0xdead000000000d90: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 1083 Comm: kworker/1:9 Tainted: G        W          6.9.0-rc6-custom-gd9b4f1cca7fb #7
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_entry_add+0x256/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270
 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229360">SUSE bug 1229360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43847" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43847" ref_url="https://www.suse.com/security/cve/CVE-2024-43847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix invalid memory access while processing fragmented packets

The monitor ring and the reo reinject ring share the same ring mask index.
When the driver receives an interrupt for the reo reinject ring, the
monitor ring is also processed, leading to invalid memory access. Since
monitor support is not yet enabled in ath12k, the ring mask for the monitor
ring should be removed.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43847/">CVE-2024-43847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43847">CVE-2024-43847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229291">SUSE bug 1229291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43848" ref_url="https://www.suse.com/security/cve/CVE-2024-43848" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix TTLM teardown work

The worker calculates the wrong sdata pointer, so if it ever
runs, it'll crash. Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43848/">CVE-2024-43848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43848">CVE-2024-43848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229302">SUSE bug 1229302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: pdr: protect locator_addr with the main mutex

If the service locator server is restarted fast enough, the PDR can
rewrite locator_addr fields concurrently. Protect them by placing
modification of those fields under the main pdr-&gt;lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229307">SUSE bug 1229307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43850" ref_url="https://www.suse.com/security/cve/CVE-2024-43850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: icc-bwmon: Fix refcount imbalance seen during bwmon_remove

The following warning is seen during bwmon_remove due to refcount
imbalance, fix this by releasing the OPPs after use.

Logs:
WARNING: at drivers/opp/core.c:1640 _opp_table_kref_release+0x150/0x158
Hardware name: Qualcomm Technologies, Inc. X1E80100 CRD (DT)
...
Call trace:
_opp_table_kref_release+0x150/0x158
dev_pm_opp_remove_table+0x100/0x1b4
devm_pm_opp_of_table_release+0x10/0x1c
devm_action_release+0x14/0x20
devres_release_all+0xa4/0x104
device_unbind_cleanup+0x18/0x60
device_release_driver_internal+0x1ec/0x228
driver_detach+0x50/0x98
bus_remove_driver+0x6c/0xbc
driver_unregister+0x30/0x60
platform_driver_unregister+0x14/0x20
bwmon_driver_exit+0x18/0x524 [icc_bwmon]
__arm64_sys_delete_module+0x184/0x264
invoke_syscall+0x48/0x118
el0_svc_common.constprop.0+0xc8/0xe8
do_el0_svc+0x20/0x2c
el0_svc+0x34/0xdc
el0t_64_sync_handler+0x13c/0x158
el0t_64_sync+0x190/0x194
--[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43850/">CVE-2024-43850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43850">CVE-2024-43850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229316">SUSE bug 1229316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43851" ref_url="https://www.suse.com/security/cve/CVE-2024-43851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: xilinx: rename cpu_number1 to dummy_cpu_number

The per cpu variable cpu_number1 is passed to xlnx_event_handler as
argument "dev_id", but it is not used in this function. So drop the
initialization of this variable and rename it to dummy_cpu_number.
This patch is to fix the following call trace when the kernel option
CONFIG_DEBUG_ATOMIC_SLEEP is enabled:

BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
    in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
    preempt_count: 1, expected: 0
    CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53
    Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT)
    Call trace:
     dump_backtrace+0xd0/0xe0
     show_stack+0x18/0x40
     dump_stack_lvl+0x7c/0xa0
     dump_stack+0x18/0x34
     __might_resched+0x10c/0x140
     __might_sleep+0x4c/0xa0
     __kmem_cache_alloc_node+0xf4/0x168
     kmalloc_trace+0x28/0x38
     __request_percpu_irq+0x74/0x138
     xlnx_event_manager_probe+0xf8/0x298
     platform_probe+0x68/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43851/">CVE-2024-43851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43851">CVE-2024-43851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229313">SUSE bug 1229313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43852" ref_url="https://www.suse.com/security/cve/CVE-2024-43852" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ltc2991) re-order conditions to fix off by one bug

LTC2991_T_INT_CH_NR is 4.  The st-&gt;temp_en[] array has LTC2991_MAX_CHANNEL
(4) elements.  Thus if "channel" is equal to LTC2991_T_INT_CH_NR then we
have read one element beyond the end of the array.  Flip the conditions
around so that we check if "channel" is valid before using it as an array
index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43852/">CVE-2024-43852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43852">CVE-2024-43852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229300">SUSE bug 1229300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: Prevent UAF in proc_cpuset_show()

An UAF can happen when /proc/cpuset is read as reported in [1].

This can be reproduced by the following methods:
1.add an mdelay(1000) before acquiring the cgroup_lock In the
 cgroup_path_ns function.
2.$cat /proc/&lt;pid&gt;/cpuset   repeatly.
3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/
$umount /sys/fs/cgroup/cpuset/   repeatly.

The race that cause this bug can be shown as below:

(umount)		|	(cat /proc/&lt;pid&gt;/cpuset)
css_release		|	proc_cpuset_show
css_release_work_fn	|	css = task_get_css(tsk, cpuset_cgrp_id);
css_free_rwork_fn	|	cgroup_path_ns(css-&gt;cgroup, ...);
cgroup_destroy_root	|	mutex_lock(&amp;cgroup_mutex);
rebind_subsystems	|
cgroup_free_root 	|
			|	// cgrp was freed, UAF
			|	cgroup_path_ns_locked(cgrp,..);

When the cpuset is initialized, the root node top_cpuset.css.cgrp
will point to &amp;cgrp_dfl_root.cgrp. In cgroup v1, the mount operation will
allocate cgroup_root, and top_cpuset.css.cgrp will point to the allocated
&amp;cgroup_root.cgrp. When the umount operation is executed,
top_cpuset.css.cgrp will be rebound to &amp;cgrp_dfl_root.cgrp.

The problem is that when rebinding to cgrp_dfl_root, there are cases
where the cgroup_root allocated by setting up the root for cgroup v1
is cached. This could lead to a Use-After-Free (UAF) if it is
subsequently freed. The descendant cgroups of cgroup v1 can only be
freed after the css is released. However, the css of the root will never
be released, yet the cgroup_root should be freed when it is unmounted.
This means that obtaining a reference to the css of the root does
not guarantee that css.cgrp-&gt;root will not be freed.

Fix this problem by using rcu_read_lock in proc_cpuset_show().
As cgroup_root is kfree_rcu after commit d23b5c577715
("cgroup: Make operations on the cgroup root_list RCU safe"),
css-&gt;cgroup won't be freed during the critical section.
To call cgroup_path_ns_locked, css_set_lock is needed, so it is safe to
replace task_get_css with task_css.

[1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: initialize integrity buffer to zero before writing it to media

Metadata added by bio_integrity_prep is using plain kmalloc, which leads
to random kernel memory being written media.  For PI metadata this is
limited to the app tag that isn't used by kernel generated metadata,
but for non-PI metadata the entire buffer leaks kernel memory.

Fix this by adding the __GFP_ZERO flag to allocations for writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43855" ref_url="https://www.suse.com/security/cve/CVE-2024-43855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix deadlock between mddev_suspend and flush bio

Deadlock occurs when mddev is being suspended while some flush bio is in
progress. It is a complex issue.

T1. the first flush is at the ending stage, it clears 'mddev-&gt;flush_bio'
    and tries to submit data, but is blocked because mddev is suspended
    by T4.
T2. the second flush sets 'mddev-&gt;flush_bio', and attempts to queue
    md_submit_flush_data(), which is already running (T1) and won't
    execute again if on the same CPU as T1.
T3. the third flush inc active_io and tries to flush, but is blocked because
    'mddev-&gt;flush_bio' is not NULL (set by T2).
T4. mddev_suspend() is called and waits for active_io dec to 0 which is inc
    by T3.

  T1		T2		T3		T4
  (flush 1)	(flush 2)	(third 3)	(suspend)
  md_submit_flush_data
   mddev-&gt;flush_bio = NULL;
   .
   .	 	md_flush_request
   .	  	 mddev-&gt;flush_bio = bio
   .	  	 queue submit_flushes
   .		 .
   .		 .		md_handle_request
   .		 .		 active_io + 1
   .		 .		 md_flush_request
   .		 .		  wait !mddev-&gt;flush_bio
   .		 .
   .		 .				mddev_suspend
   .		 .				 wait !active_io
   .		 .
   .		 submit_flushes
   .		 queue_work md_submit_flush_data
   .		 //md_submit_flush_data is already running (T1)
   .
   md_handle_request
    wait resume

The root issue is non-atomic inc/dec of active_io during flush process.
active_io is dec before md_submit_flush_data is queued, and inc soon
after md_submit_flush_data() run.
  md_flush_request
    active_io + 1
    submit_flushes
      active_io - 1
      md_submit_flush_data
        md_handle_request
        active_io + 1
          make_request
        active_io - 1

If active_io is dec after md_handle_request() instead of within
submit_flushes(), make_request() can be called directly intead of
md_handle_request() in md_submit_flush_data(), and active_io will
only inc and dec once in the whole flush process. Deadlock will be
fixed.

Additionally, the only difference between fixing the issue and before is
that there is no return error handling of make_request(). But after
previous patch cleaned md_write_start(), make_requst() only return error
in raid5_make_request() by dm-raid, see commit 41425f96d7aa ("dm-raid456,
md/raid456: fix a deadlock for dm-raid456 while io concurrent with
reshape)". Since dm always splits data and flush operation into two
separate io, io size of flush submitted by dm always is 0, make_request()
will not be called in md_submit_flush_data(). To prevent future
modifications from introducing issues, add WARN_ON to ensure
make_request() no error is returned in this context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43855/">CVE-2024-43855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229342">SUSE bug 1229342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma: fix call order in dmam_free_coherent

dmam_free_coherent() frees a DMA allocation, which makes the
freed vaddr available for reuse, then calls devres_destroy()
to remove and free the data structure used to track the DMA
allocation. Between the two calls, it is possible for a
concurrent task to make an allocation with the same vaddr
and add it to the devres list.

If this happens, there will be two entries in the devres list
with the same vaddr and devres_destroy() can free the wrong
entry, triggering the WARN_ON() in dmam_match.

Fix by destroying the devres entry before freeing the DMA
allocation.

  kokonut //net/encryption
    http://sponge2/b9145fe6-0f72-4325-ac2f-a84d81075b03
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229346">SUSE bug 1229346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43857" ref_url="https://www.suse.com/security/cve/CVE-2024-43857" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix null reference error when checking end of zone

This patch fixes a potentially null pointer being accessed by
is_end_zone_blkaddr() that checks the last block of a zone
when f2fs is mounted as a single device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43857/">CVE-2024-43857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43857">CVE-2024-43857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229306">SUSE bug 1229306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix array-index-out-of-bounds in diFree
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229414">SUSE bug 1229414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43859" ref_url="https://www.suse.com/security/cve/CVE-2024-43859" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to truncate preallocated blocks in f2fs_file_open()

chenyuwen reports a f2fs bug as below:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000011
 fscrypt_set_bio_crypt_ctx+0x78/0x1e8
 f2fs_grab_read_bio+0x78/0x208
 f2fs_submit_page_read+0x44/0x154
 f2fs_get_read_data_page+0x288/0x5f4
 f2fs_get_lock_data_page+0x60/0x190
 truncate_partial_data_page+0x108/0x4fc
 f2fs_do_truncate_blocks+0x344/0x5f0
 f2fs_truncate_blocks+0x6c/0x134
 f2fs_truncate+0xd8/0x200
 f2fs_iget+0x20c/0x5ac
 do_garbage_collect+0x5d0/0xf6c
 f2fs_gc+0x22c/0x6a4
 f2fs_disable_checkpoint+0xc8/0x310
 f2fs_fill_super+0x14bc/0x1764
 mount_bdev+0x1b4/0x21c
 f2fs_mount+0x20/0x30
 legacy_get_tree+0x50/0xbc
 vfs_get_tree+0x5c/0x1b0
 do_new_mount+0x298/0x4cc
 path_mount+0x33c/0x5fc
 __arm64_sys_mount+0xcc/0x15c
 invoke_syscall+0x60/0x150
 el0_svc_common+0xb8/0xf8
 do_el0_svc+0x28/0xa0
 el0_svc+0x24/0x84
 el0t_64_sync_handler+0x88/0xec

It is because inode.i_crypt_info is not initialized during below path:
- mount
 - f2fs_fill_super
  - f2fs_disable_checkpoint
   - f2fs_gc
    - f2fs_iget
     - f2fs_truncate

So, let's relocate truncation of preallocated blocks to f2fs_file_open(),
after fscrypt_file_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43859/">CVE-2024-43859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43859">CVE-2024-43859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229393">SUSE bug 1229393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: imx_rproc: Skip over memory region when node value is NULL

In imx_rproc_addr_init() "nph = of_count_phandle_with_args()" just counts
number of phandles. But phandles may be empty. So of_parse_phandle() in
the parsing loop (0 &lt; a &lt; nph) may return NULL which is later dereferenced.
Adjust this issue by adding NULL-return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[Fixed title to fit within the prescribed 70-75 charcters]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229319">SUSE bug 1229319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: qmi_wwan: fix memory leak for not ip packets

Free the unused skb when not ip packets arrive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229553">SUSE bug 1229553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43862" ref_url="https://www.suse.com/security/cve/CVE-2024-43862" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wan: fsl_qmc_hdlc: Convert carrier_lock spinlock to a mutex

The carrier_lock spinlock protects the carrier detection. While it is
held, framer_get_status() is called which in turn takes a mutex.
This is not correct and can lead to a deadlock.

A run with PROVE_LOCKING enabled detected the issue:
  [ BUG: Invalid wait context ]
  ...
  c204ddbc (&amp;framer-&gt;mutex){+.+.}-{3:3}, at: framer_get_status+0x40/0x78
  other info that might help us debug this:
  context-{4:4}
  2 locks held by ifconfig/146:
  #0: c0926a38 (rtnl_mutex){+.+.}-{3:3}, at: devinet_ioctl+0x12c/0x664
  #1: c2006a40 (&amp;qmc_hdlc-&gt;carrier_lock){....}-{2:2}, at: qmc_hdlc_framer_set_carrier+0x30/0x98

Avoid the spinlock usage and convert carrier_lock to a mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43862/">CVE-2024-43862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43862">CVE-2024-43862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229499">SUSE bug 1229499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix a deadlock in dma buf fence polling

Introduce a version of the fence ops that on release doesn't remove
the fence from the pending list, and thus doesn't require a lock to
fix poll-&gt;fence wait-&gt;fence unref deadlocks.

vmwgfx overwrites the wait callback to iterate over the list of all
fences and update their status, to do that it holds a lock to prevent
the list modifcations from other threads. The fence destroy callback
both deletes the fence and removes it from the list of pending
fences, for which it holds a lock.

dma buf polling cb unrefs a fence after it's been signaled: so the poll
calls the wait, which signals the fences, which are being destroyed.
The destruction tries to acquire the lock on the pending fences list
which it can never get because it's held by the wait from which it
was called.

Old bug, but not a lot of userspace apps were using dma-buf polling
interfaces. Fix those, in particular this fixes KDE stalls/deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229497">SUSE bug 1229497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43864" ref_url="https://www.suse.com/security/cve/CVE-2024-43864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix CT entry update leaks of modify header context

The cited commit allocates a new modify header to replace the old
one when updating CT entry. But if failed to allocate a new one, eg.
exceed the max number firmware can support, modify header will be
an error pointer that will trigger a panic when deallocating it. And
the old modify header point is copied to old attr. When the old
attr is freed, the old modify header is lost.

Fix it by restoring the old attr to attr when failed to allocate a
new modify header context. So when the CT entry is freed, the right
modify header context will be freed. And the panic of accessing
error pointer is also fixed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43864/">CVE-2024-43864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43864">CVE-2024-43864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229496">SUSE bug 1229496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43865" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43865" ref_url="https://www.suse.com/security/cve/CVE-2024-43865" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/fpu: Re-add exception handling in load_fpu_state()

With the recent rewrite of the fpu code exception handling for the
lfpc instruction within load_fpu_state() was erroneously removed.

Add it again to prevent that loading invalid floating point register
values cause an unhandled specification exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43865/">CVE-2024-43865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43865">CVE-2024-43865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229498">SUSE bug 1229498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Always drain health in shutdown callback

There is no point in recovery during device shutdown. if health
work started need to wait for it to avoid races and NULL pointer
access.

Hence, drain health WQ on shutdown callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229495">SUSE bug 1229495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau: prime: fix refcount underflow

Calling nouveau_bo_ref() on a nouveau_bo without initializing it (and
hence the backing ttm_bo) leads to a refcount underflow.

Instead of calling nouveau_bo_ref() in the unwind path of
drm_gem_object_init(), clean things up manually.

(cherry picked from commit 1b93f3e89d03cfc576636e195466a0d728ad8de5)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229493">SUSE bug 1229493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43868" ref_url="https://www.suse.com/security/cve/CVE-2024-43868" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv/purgatory: align riscv_kernel_entry

When alignment handling is delegated to the kernel, everything must be
word-aligned in purgatory, since the trap handler is then set to the
kexec one. Without the alignment, hitting the exception would
ultimately crash. On other occasions, the kernel's handler would take
care of exceptions.
This has been tested on a JH7110 SoC with oreboot and its SBI delegating
unaligned access exceptions and the kernel configured to handle them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43868/">CVE-2024-43868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43868">CVE-2024-43868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229492">SUSE bug 1229492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43869" ref_url="https://www.suse.com/security/cve/CVE-2024-43869" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix event leak upon exec and file release

The perf pending task work is never waited upon the matching event
release. In the case of a child event, released via free_event()
directly, this can potentially result in a leaked event, such as in the
following scenario that doesn't even require a weak IRQ work
implementation to trigger:

schedule()
   prepare_task_switch()
=======&gt; &lt;NMI&gt;
      perf_event_overflow()
         event-&gt;pending_sigtrap = ...
         irq_work_queue(&amp;event-&gt;pending_irq)
&lt;======= &lt;/NMI&gt;
      perf_event_task_sched_out()
          event_sched_out()
              event-&gt;pending_sigtrap = 0;
              atomic_long_inc_not_zero(&amp;event-&gt;refcount)
              task_work_add(&amp;event-&gt;pending_task)
   finish_lock_switch()
=======&gt; &lt;IRQ&gt;
   perf_pending_irq()
      //do nothing, rely on pending task work
&lt;======= &lt;/IRQ&gt;

begin_new_exec()
   perf_event_exit_task()
      perf_event_exit_event()
         // If is child event
         free_event()
            WARN(atomic_long_cmpxchg(&amp;event-&gt;refcount, 1, 0) != 1)
            // event is leaked

Similar scenarios can also happen with perf_event_remove_on_exec() or
simply against concurrent perf_event_release().

Fix this with synchonizing against the possibly remaining pending task
work while freeing the event, just like is done with remaining pending
IRQ work. This means that the pending task callback neither need nor
should hold a reference to the event, preventing it from ever beeing
freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43869/">CVE-2024-43869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43869">CVE-2024-43869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229491">SUSE bug 1229491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43870" ref_url="https://www.suse.com/security/cve/CVE-2024-43870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix event leak upon exit

When a task is scheduled out, pending sigtrap deliveries are deferred
to the target task upon resume to userspace via task_work.

However failures while adding an event's callback to the task_work
engine are ignored. And since the last call for events exit happen
after task work is eventually closed, there is a small window during
which pending sigtrap can be queued though ignored, leaking the event
refcount addition such as in the following scenario:

    TASK A
    -----

    do_exit()
       exit_task_work(tsk);

       &lt;IRQ&gt;
       perf_event_overflow()
          event-&gt;pending_sigtrap = pending_id;
          irq_work_queue(&amp;event-&gt;pending_irq);
       &lt;/IRQ&gt;
    =========&gt; PREEMPTION: TASK A -&gt; TASK B
       event_sched_out()
          event-&gt;pending_sigtrap = 0;
          atomic_long_inc_not_zero(&amp;event-&gt;refcount)
          // FAILS: task work has exited
          task_work_add(&amp;event-&gt;pending_task)
       [...]
       &lt;IRQ WORK&gt;
       perf_pending_irq()
          // early return: event-&gt;oncpu = -1
       &lt;/IRQ WORK&gt;
       [...]
    =========&gt; TASK B -&gt; TASK A
       perf_event_exit_task(tsk)
          perf_event_exit_event()
             free_event()
                WARN(atomic_long_cmpxchg(&amp;event-&gt;refcount, 1, 0) != 1)
                // leak event due to unexpected refcount == 2

As a result the event is never released while the task exits.

Fix this with appropriate task_work_add()'s error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43870/">CVE-2024-43870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43870">CVE-2024-43870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229494">SUSE bug 1229494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devres: Fix memory leakage caused by driver API devm_free_percpu()

It will cause memory leakage when use driver API devm_free_percpu()
to free memory allocated by devm_alloc_percpu(), fixed by using
devres_release() instead of devres_destroy() within devm_free_percpu().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229490">SUSE bug 1229490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix soft lockup under heavy CEQE load

CEQEs are handled in interrupt handler currently. This may cause the
CPU core staying in interrupt context too long and lead to soft lockup
under heavy load.

Handle CEQEs in BH workqueue and set an upper limit for the number of
CEQE handled by a single call of work handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229489">SUSE bug 1229489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost/vsock: always initialize seqpacket_allow

There are two issues around seqpacket_allow:
1. seqpacket_allow is not initialized when socket is
   created. Thus if features are never set, it will be
   read uninitialized.
2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
   then seqpacket_allow will not be cleared appropriately
   (existing apps I know about don't usually do this but
    it's legal and there's no way to be sure no one relies
    on this).

To fix:
	- initialize seqpacket_allow after allocation
	- set it unconditionally in set_features
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229488">SUSE bug 1229488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43874" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43874" ref_url="https://www.suse.com/security/cve/CVE-2024-43874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix null pointer dereference in __sev_snp_shutdown_locked

Fix a null pointer dereference induced by DEBUG_TEST_DRIVER_REMOVE.
Return from __sev_snp_shutdown_locked() if the psp_device or the
sev_device structs are not initialized. Without the fix, the driver will
produce the following splat:

   ccp 0000:55:00.5: enabling device (0000 -&gt; 0002)
   ccp 0000:55:00.5: sev enabled
   ccp 0000:55:00.5: psp enabled
   BUG: kernel NULL pointer dereference, address: 00000000000000f0
   #PF: supervisor read access in kernel mode
   #PF: error_code(0x0000) - not-present page
   PGD 0 P4D 0
   Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI
   CPU: 262 PID: 1 Comm: swapper/0 Not tainted 6.9.0-rc1+ #29
   RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150
   Code: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 &lt;4c&gt; 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83
   RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286
   RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000
   RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb2ea4014b808
   RBP: ffffb2ea4014b7e8 R08: 0000000000000106 R09: 000000000003d9c0
   R10: 0000000000000001 R11: ffffffffa39ff070 R12: ffff9e49d40590c8
   R13: 0000000000000000 R14: ffffb2ea4014b808 R15: 0000000000000000
   FS:  0000000000000000(0000) GS:ffff9e58b1e00000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00000000000000f0 CR3: 0000000418a3e001 CR4: 0000000000770ef0
   PKRU: 55555554
   Call Trace:
    &lt;TASK&gt;
    ? __die_body+0x6f/0xb0
    ? __die+0xcc/0xf0
    ? page_fault_oops+0x330/0x3a0
    ? save_trace+0x2a5/0x360
    ? do_user_addr_fault+0x583/0x630
    ? exc_page_fault+0x81/0x120
    ? asm_exc_page_fault+0x2b/0x30
    ? __sev_snp_shutdown_locked+0x2e/0x150
    __sev_firmware_shutdown+0x349/0x5b0
    ? pm_runtime_barrier+0x66/0xe0
    sev_dev_destroy+0x34/0xb0
    psp_dev_destroy+0x27/0x60
    sp_destroy+0x39/0x90
    sp_pci_remove+0x22/0x60
    pci_device_remove+0x4e/0x110
    really_probe+0x271/0x4e0
    __driver_probe_device+0x8f/0x160
    driver_probe_device+0x24/0x120
    __driver_attach+0xc7/0x280
    ? driver_attach+0x30/0x30
    bus_for_each_dev+0x10d/0x130
    driver_attach+0x22/0x30
    bus_add_driver+0x171/0x2b0
    ? unaccepted_memory_init_kdump+0x20/0x20
    driver_register+0x67/0x100
    __pci_register_driver+0x83/0x90
    sp_pci_init+0x22/0x30
    sp_mod_init+0x13/0x30
    do_one_initcall+0xb8/0x290
    ? sched_clock_noinstr+0xd/0x10
    ? local_clock_noinstr+0x3e/0x100
    ? stack_depot_save_flags+0x21e/0x6a0
    ? local_clock+0x1c/0x60
    ? stack_depot_save_flags+0x21e/0x6a0
    ? sched_clock_noinstr+0xd/0x10
    ? local_clock_noinstr+0x3e/0x100
    ? __lock_acquire+0xd90/0xe30
    ? sched_clock_noinstr+0xd/0x10
    ? local_clock_noinstr+0x3e/0x100
    ? __create_object+0x66/0x100
    ? local_clock+0x1c/0x60
    ? __create_object+0x66/0x100
    ? parameq+0x1b/0x90
    ? parse_one+0x6d/0x1d0
    ? parse_args+0xd7/0x1f0
    ? do_initcall_level+0x180/0x180
    do_initcall_level+0xb0/0x180
    do_initcalls+0x60/0xa0
    ? kernel_init+0x1f/0x1d0
    do_basic_setup+0x41/0x50
    kernel_init_freeable+0x1ac/0x230
    ? rest_init+0x1f0/0x1f0
    kernel_init+0x1f/0x1d0
    ? rest_init+0x1f0/0x1f0
    ret_from_fork+0x3d/0x50
    ? rest_init+0x1f0/0x1f0
    ret_from_fork_asm+0x11/0x20
    &lt;/TASK&gt;
   Modules linked in:
   CR2: 00000000000000f0
   ---[ end trace 0000000000000000 ]---
   RIP: 0010:__sev_snp_shutdown_locked+0x2e/0x150
   Code: 00 55 48 89 e5 41 57 41 56 41 54 53 48 83 ec 10 41 89 f7 49 89 fe 65 48 8b 04 25 28 00 00 00 48 89 45 d8 48 8b 05 6a 5a 7f 06 &lt;4c&gt; 8b a0 f0 00 00 00 41 0f b6 9c 24 a2 00 00 00 48 83 fb 02 0f 83
   RSP: 0018:ffffb2ea4014b7b8 EFLAGS: 00010286
   RAX: 0000000000000000 RBX: ffff9e4acd2e0a28 RCX: 0000000000000000
   RDX: 0000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43874/">CVE-2024-43874 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43874">CVE-2024-43874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229487">SUSE bug 1229487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43875" ref_url="https://www.suse.com/security/cve/CVE-2024-43875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Clean up error handling in vpci_scan_bus()

Smatch complains about inconsistent NULL checking in vpci_scan_bus():

    drivers/pci/endpoint/functions/pci-epf-vntb.c:1024 vpci_scan_bus() error: we previously assumed 'vpci_bus' could be null (see line 1021)

Instead of printing an error message and then crashing we should return
an error code and clean up.

Also the NULL check is reversed so it prints an error for success
instead of failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43875/">CVE-2024-43875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43875">CVE-2024-43875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229486">SUSE bug 1229486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43876" ref_url="https://www.suse.com/security/cve/CVE-2024-43876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: rcar: Demote WARN() to dev_warn_ratelimited() in rcar_pcie_wakeup()

Avoid large backtrace, it is sufficient to warn the user that there has
been a link problem. Either the link has failed and the system is in need
of maintenance, or the link continues to work and user has been informed.
The message from the warning can be looked up in the sources.

This makes an actual link issue less verbose.

First of all, this controller has a limitation in that the controller
driver has to assist the hardware with transition to L1 link state by
writing L1IATN to PMCTRL register, the L1 and L0 link state switching
is not fully automatic on this controller.

In case of an ASMedia ASM1062 PCIe SATA controller which does not support
ASPM, on entry to suspend or during platform pm_test, the SATA controller
enters D3hot state and the link enters L1 state. If the SATA controller
wakes up before rcar_pcie_wakeup() was called and returns to D0, the link
returns to L0 before the controller driver even started its transition to
L1 link state. At this point, the SATA controller did send an PM_ENTER_L1
DLLP to the PCIe controller and the PCIe controller received it, and the
PCIe controller did set PMSR PMEL1RX bit.

Once rcar_pcie_wakeup() is called, if the link is already back in L0 state
and PMEL1RX bit is set, the controller driver has no way to determine if
it should perform the link transition to L1 state, or treat the link as if
it is in L0 state. Currently the driver attempts to perform the transition
to L1 link state unconditionally, which in this specific case fails with a
PMSR L1FAEG poll timeout, however the link still works as it is already
back in L0 state.

Reduce this warning verbosity. In case the link is really broken, the
rcar_pcie_config_access() would fail, otherwise it will succeed and any
system with this controller and ASM1062 can suspend without generating
a backtrace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43876/">CVE-2024-43876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43876">CVE-2024-43876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229485">SUSE bug 1229485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43877" ref_url="https://www.suse.com/security/cve/CVE-2024-43877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pci: ivtv: Add check for DMA map result

In case DMA fails, 'dma-&gt;SG_length' is 0. This value is later used to
access 'dma-&gt;SGarray[dma-&gt;SG_length - 1]', which will cause out of
bounds access.

Add check to return early on invalid value. Adjust warnings accordingly.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43877/">CVE-2024-43877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43877">CVE-2024-43877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229484">SUSE bug 1229484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43878" ref_url="https://www.suse.com/security/cve/CVE-2024-43878" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: Fix input error path memory access

When there is a misconfiguration of input state slow path
KASAN report error. Fix this error.
west login:
[   52.987278] eth1: renamed from veth11
[   53.078814] eth1: renamed from veth21
[   53.181355] eth1: renamed from veth31
[   54.921702] ==================================================================
[   54.922602] BUG: KASAN: wild-memory-access in xfrmi_rcv_cb+0x2d/0x295
[   54.923393] Read of size 8 at addr 6b6b6b6b00000000 by task ping/512
[   54.924169]
[   54.924386] CPU: 0 PID: 512 Comm: ping Not tainted 6.9.0-08574-gcd29a4313a1b #25
[   54.925290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   54.926401] Call Trace:
[   54.926731]  &lt;IRQ&gt;
[   54.927009]  dump_stack_lvl+0x2a/0x3b
[   54.927478]  kasan_report+0x84/0xa6
[   54.927930]  ? xfrmi_rcv_cb+0x2d/0x295
[   54.928410]  xfrmi_rcv_cb+0x2d/0x295
[   54.928872]  ? xfrm4_rcv_cb+0x3d/0x5e
[   54.929354]  xfrm4_rcv_cb+0x46/0x5e
[   54.929804]  xfrm_rcv_cb+0x7e/0xa1
[   54.930240]  xfrm_input+0x1b3a/0x1b96
[   54.930715]  ? xfrm_offload+0x41/0x41
[   54.931182]  ? raw_rcv+0x292/0x292
[   54.931617]  ? nf_conntrack_confirm+0xa2/0xa2
[   54.932158]  ? skb_sec_path+0xd/0x3f
[   54.932610]  ? xfrmi_input+0x90/0xce
[   54.933066]  xfrm4_esp_rcv+0x33/0x54
[   54.933521]  ip_protocol_deliver_rcu+0xd7/0x1b2
[   54.934089]  ip_local_deliver_finish+0x110/0x120
[   54.934659]  ? ip_protocol_deliver_rcu+0x1b2/0x1b2
[   54.935248]  NF_HOOK.constprop.0+0xf8/0x138
[   54.935767]  ? ip_sublist_rcv_finish+0x68/0x68
[   54.936317]  ? secure_tcpv6_ts_off+0x23/0x168
[   54.936859]  ? ip_protocol_deliver_rcu+0x1b2/0x1b2
[   54.937454]  ? __xfrm_policy_check2.constprop.0+0x18d/0x18d
[   54.938135]  NF_HOOK.constprop.0+0xf8/0x138
[   54.938663]  ? ip_sublist_rcv_finish+0x68/0x68
[   54.939220]  ? __xfrm_policy_check2.constprop.0+0x18d/0x18d
[   54.939904]  ? ip_local_deliver_finish+0x120/0x120
[   54.940497]  __netif_receive_skb_one_core+0xc9/0x107
[   54.941121]  ? __netif_receive_skb_list_core+0x1c2/0x1c2
[   54.941771]  ? blk_mq_start_stopped_hw_queues+0xc7/0xf9
[   54.942413]  ? blk_mq_start_stopped_hw_queue+0x38/0x38
[   54.943044]  ? virtqueue_get_buf_ctx+0x295/0x46b
[   54.943618]  process_backlog+0xb3/0x187
[   54.944102]  __napi_poll.constprop.0+0x57/0x1a7
[   54.944669]  net_rx_action+0x1cb/0x380
[   54.945150]  ? __napi_poll.constprop.0+0x1a7/0x1a7
[   54.945744]  ? vring_new_virtqueue+0x17a/0x17a
[   54.946300]  ? note_interrupt+0x2cd/0x367
[   54.946805]  handle_softirqs+0x13c/0x2c9
[   54.947300]  do_softirq+0x5f/0x7d
[   54.947727]  &lt;/IRQ&gt;
[   54.948014]  &lt;TASK&gt;
[   54.948300]  __local_bh_enable_ip+0x48/0x62
[   54.948832]  __neigh_event_send+0x3fd/0x4ca
[   54.949361]  neigh_resolve_output+0x1e/0x210
[   54.949896]  ip_finish_output2+0x4bf/0x4f0
[   54.950410]  ? __ip_finish_output+0x171/0x1b8
[   54.950956]  ip_send_skb+0x25/0x57
[   54.951390]  raw_sendmsg+0xf95/0x10c0
[   54.951850]  ? check_new_pages+0x45/0x71
[   54.952343]  ? raw_hash_sk+0x21b/0x21b
[   54.952815]  ? kernel_init_pages+0x42/0x51
[   54.953337]  ? prep_new_page+0x44/0x51
[   54.953811]  ? get_page_from_freelist+0x72b/0x915
[   54.954390]  ? signal_pending_state+0x77/0x77
[   54.954936]  ? preempt_count_sub+0x14/0xb3
[   54.955450]  ? __might_resched+0x8a/0x240
[   54.955951]  ? __might_sleep+0x25/0xa0
[   54.956424]  ? first_zones_zonelist+0x2c/0x43
[   54.956977]  ? __rcu_read_lock+0x2d/0x3a
[   54.957476]  ? __pte_offset_map+0x32/0xa4
[   54.957980]  ? __might_resched+0x8a/0x240
[   54.958483]  ? __might_sleep+0x25/0xa0
[   54.958963]  ? inet_send_prepare+0x54/0x54
[   54.959478]  ? sock_sendmsg_nosec+0x42/0x6c
[   54.960000]  sock_sendmsg_nosec+0x42/0x6c
[   54.960502]  __sys_sendto+0x15d/0x1cc
[   54.960966]  ? __x64_sys_getpeername+0x44/0x44
[   54.961522]  ? __handle_mm_fault+0x679/0xae4
[   54.962068]  ? find_vma+0x6b/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-08-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43878/">CVE-2024-43878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43878">CVE-2024-43878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229483">SUSE bug 1229483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()

Currently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in
cfg80211_calculate_bitrate_he(), leading to below warning:

kernel: invalid HE MCS: bw:6, ru:6
kernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]

Fix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229482">SUSE bug 1229482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_erp: Fix object nesting warning

ACLs in Spectrum-2 and newer ASICs can reside in the algorithmic TCAM
(A-TCAM) or in the ordinary circuit TCAM (C-TCAM). The former can
contain more ACLs (i.e., tc filters), but the number of masks in each
region (i.e., tc chain) is limited.

In order to mitigate the effects of the above limitation, the device
allows filters to share a single mask if their masks only differ in up
to 8 consecutive bits. For example, dst_ip/25 can be represented using
dst_ip/24 with a delta of 1 bit. The C-TCAM does not have a limit on the
number of masks being used (and therefore does not support mask
aggregation), but can contain a limited number of filters.

The driver uses the "objagg" library to perform the mask aggregation by
passing it objects that consist of the filter's mask and whether the
filter is to be inserted into the A-TCAM or the C-TCAM since filters in
different TCAMs cannot share a mask.

The set of created objects is dependent on the insertion order of the
filters and is not necessarily optimal. Therefore, the driver will
periodically ask the library to compute a more optimal set ("hints") by
looking at all the existing objects.

When the library asks the driver whether two objects can be aggregated
the driver only compares the provided masks and ignores the A-TCAM /
C-TCAM indication. This is the right thing to do since the goal is to
move as many filters as possible to the A-TCAM. The driver also forbids
two identical masks from being aggregated since this can only happen if
one was intentionally put in the C-TCAM to avoid a conflict in the
A-TCAM.

The above can result in the following set of hints:

H1: {mask X, A-TCAM} -&gt; H2: {mask Y, A-TCAM} // X is Y + delta
H3: {mask Y, C-TCAM} -&gt; H4: {mask Z, A-TCAM} // Y is Z + delta

After getting the hints from the library the driver will start migrating
filters from one region to another while consulting the computed hints
and instructing the device to perform a lookup in both regions during
the transition.

Assuming a filter with mask X is being migrated into the A-TCAM in the
new region, the hints lookup will return H1. Since H2 is the parent of
H1, the library will try to find the object associated with it and
create it if necessary in which case another hints lookup (recursive)
will be performed. This hints lookup for {mask Y, A-TCAM} will either
return H2 or H3 since the driver passes the library an object comparison
function that ignores the A-TCAM / C-TCAM indication.

This can eventually lead to nested objects which are not supported by
the library [1].

Fix by removing the object comparison function from both the driver and
the library as the driver was the only user. That way the lookup will
only return exact matches.

I do not have a reliable reproducer that can reproduce the issue in a
timely manner, but before the fix the issue would reproduce in several
minutes and with the fix it does not reproduce in over an hour.

Note that the current usefulness of the hints is limited because they
include the C-TCAM indication and represent aggregation that cannot
actually happen. This will be addressed in net-next.

[1]
WARNING: CPU: 0 PID: 153 at lib/objagg.c:170 objagg_obj_parent_assign+0xb5/0xd0
Modules linked in:
CPU: 0 PID: 153 Comm: kworker/0:18 Not tainted 6.9.0-rc6-custom-g70fbc2c1c38b #42
Hardware name: Mellanox Technologies Ltd. MSN3700C/VMOD0008, BIOS 5.11 10/10/2018
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:objagg_obj_parent_assign+0xb5/0xd0
[...]
Call Trace:
 &lt;TASK&gt;
 __objagg_obj_get+0x2bb/0x580
 objagg_obj_get+0xe/0x80
 mlxsw_sp_acl_erp_mask_get+0xb5/0xf0
 mlxsw_sp_acl_atcam_entry_add+0xe8/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270
 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510
 process_one_work+0x151/0x370
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229481">SUSE bug 1229481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43881" ref_url="https://www.suse.com/security/cve/CVE-2024-43881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: change DMA direction while mapping reinjected packets

For fragmented packets, ath12k reassembles each fragment as a normal
packet and then reinjects it into HW ring. In this case, the DMA
direction should be DMA_TO_DEVICE, not DMA_FROM_DEVICE. Otherwise,
an invalid payload may be reinjected into the HW and
subsequently delivered to the host.

Given that arbitrary memory can be allocated to the skb buffer,
knowledge about the data contained in the reinjected buffer is lacking.
Consequently, there's a risk of private information being leaked.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43881/">CVE-2024-43881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43881">CVE-2024-43881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229480">SUSE bug 1229480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exec: Fix ToCToU between perm check and set-uid/gid usage

When opening a file for exec via do_filp_open(), permission checking is
done against the file's metadata at that moment, and on success, a file
pointer is passed back. Much later in the execve() code path, the file
metadata (specifically mode, uid, and gid) is used to determine if/how
to set the uid and gid. However, those values may have changed since the
permissions check, meaning the execution may gain unintended privileges.

For example, if a file could change permissions from executable and not
set-id:

---------x 1 root root 16048 Aug  7 13:16 target

to set-id and non-executable:

---S------ 1 root root 16048 Aug  7 13:16 target

it is possible to gain root privileges when execution should have been
disallowed.

While this race condition is rare in real-world scenarios, it has been
observed (and proven exploitable) when package managers are updating
the setuid bits of installed programs. Such files start with being
world-executable but then are adjusted to be group-exec with a set-uid
bit. For example, "chmod o-x,u+s target" makes "target" executable only
by uid "root" and gid "cdrom", while also becoming setuid-root:

-rwxr-xr-x 1 root cdrom 16048 Aug  7 13:16 target

becomes:

-rwsr-xr-- 1 root cdrom 16048 Aug  7 13:16 target

But racing the chmod means users without group "cdrom" membership can
get the permission to execute "target" just before the chmod, and when
the chmod finishes, the exec reaches brpm_fill_uid(), and performs the
setuid to root, violating the expressed authorization of "only cdrom
group members can setuid to root".

Re-check that we still have execute permissions in case the metadata
has changed. It would be better to keep a copy from the perm-check time,
but until we can do that refactoring, the least-bad option is to do a
full inode_permission() call (under inode lock). It is understood that
this is safe against dead-locks, but hardly optimal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-22"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229504">SUSE bug 1229504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: vhci-hcd: Do not drop references before new references are gained

At a few places the driver carries stale pointers
to references that can still be used. Make sure that does not happen.
This strictly speaking closes ZDI-CAN-22273, though there may be
similar races in the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-25"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Add error handling to pair_device()

hci_conn_params_add() never checks for a NULL value and could lead to a NULL
pointer dereference causing a crash.

Fixed by adding error handling in the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229739">SUSE bug 1229739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43886" ref_url="https://www.suse.com/security/cve/CVE-2024-43886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check in resource_log_pipe_topology_update

[WHY]
When switching from "Extend" to "Second Display Only" we sometimes
call resource_get_otg_master_for_stream on a stream for the eDP,
which is disconnected. This leads to a null pointer dereference.

[HOW]
Added a null check in dc_resource.c/resource_log_pipe_topology_update.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43886/">CVE-2024-43886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43886">CVE-2024-43886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229748">SUSE bug 1229748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43887" ref_url="https://www.suse.com/security/cve/CVE-2024-43887" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tcp: Disable TCP-AO static key after RCU grace period

The lifetime of TCP-AO static_key is the same as the last
tcp_ao_info. On the socket destruction tcp_ao_info ceases to be
with RCU grace period, while tcp-ao static branch is currently deferred
destructed. The static key definition is
: DEFINE_STATIC_KEY_DEFERRED_FALSE(tcp_ao_needed, HZ);

which means that if RCU grace period is delayed by more than a second
and tcp_ao_needed is in the process of disablement, other CPUs may
yet see tcp_ao_info which atent dead, but soon-to-be.
And that breaks the assumption of static_key_fast_inc_not_disabled().

See the comment near the definition:
&gt; * The caller must make sure that the static key can't get disabled while
&gt; * in this function. It doesn't patch jump labels, only adds a user to
&gt; * an already enabled static key.

Originally it was introduced in commit eb8c507296f6 ("jump_label:
Prevent key-&gt;enabled int overflow"), which is needed for the atomic
contexts, one of which would be the creation of a full socket from a
request socket. In that atomic context, it's known by the presence
of the key (md5/ao) that the static branch is already enabled.
So, the ref counter for that static branch is just incremented
instead of holding the proper mutex.
static_key_fast_inc_not_disabled() is just a helper for such usage
case. But it must not be used if the static branch could get disabled
in parallel as it's not protected by jump_label_mutex and as a result,
races with jump_label_update() implementation details.

Happened on netdev test-bot[1], so not a theoretical issue:

[] jump_label: Fatal kernel bug, unexpected op at tcp_inbound_hash+0x1a7/0x870 [ffffffffa8c4e9b7] (eb 50 0f 1f 44 != 66 90 0f 1f 00)) size:2 type:1
[] ------------[ cut here ]------------
[] kernel BUG at arch/x86/kernel/jump_label.c:73!
[] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
[] CPU: 3 PID: 243 Comm: kworker/3:3 Not tainted 6.10.0-virtme #1
[] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[] Workqueue: events jump_label_update_timeout
[] RIP: 0010:__jump_label_patch+0x2f6/0x350
...
[] Call Trace:
[]  &lt;TASK&gt;
[]  arch_jump_label_transform_queue+0x6c/0x110
[]  __jump_label_update+0xef/0x350
[]  __static_key_slow_dec_cpuslocked.part.0+0x3c/0x60
[]  jump_label_update_timeout+0x2c/0x40
[]  process_one_work+0xe3b/0x1670
[]  worker_thread+0x587/0xce0
[]  kthread+0x28a/0x350
[]  ret_from_fork+0x31/0x70
[]  ret_from_fork_asm+0x1a/0x30
[]  &lt;/TASK&gt;
[] Modules linked in: veth
[] ---[ end trace 0000000000000000 ]---
[] RIP: 0010:__jump_label_patch+0x2f6/0x350

[1]: https://netdev-3.bots.linux.dev/vmksft-tcp-ao-dbg/results/696681/5-connect-deny-ipv6/stderr
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43887/">CVE-2024-43887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43887">CVE-2024-43887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229749">SUSE bug 1229749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43888" ref_url="https://www.suse.com/security/cve/CVE-2024-43888" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: list_lru: fix UAF for memory cgroup

The mem_cgroup_from_slab_obj() is supposed to be called under rcu lock or
cgroup_mutex or others which could prevent returned memcg from being
freed.  Fix it by adding missing rcu read lock.

Found by code inspection.

[songmuchun@bytedance.com: only grab rcu lock when necessary, per Vlastimil]
  Link: https://lkml.kernel.org/r/20240801024603.1865-1-songmuchun@bytedance.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43888/">CVE-2024-43888 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43888">CVE-2024-43888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229763">SUSE bug 1229763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix possible divide-by-0 panic in padata_mt_helper()

We are hit with a not easily reproducible divide-by-0 panic in padata.c at
bootup time.

  [   10.017908] Oops: divide error: 0000 1 PREEMPT SMP NOPTI
  [   10.017908] CPU: 26 PID: 2627 Comm: kworker/u1666:1 Not tainted 6.10.0-15.el10.x86_64 #1
  [   10.017908] Hardware name: Lenovo ThinkSystem SR950 [7X12CTO1WW]/[7X12CTO1WW], BIOS [PSE140J-2.30] 07/20/2021
  [   10.017908] Workqueue: events_unbound padata_mt_helper
  [   10.017908] RIP: 0010:padata_mt_helper+0x39/0xb0
    :
  [   10.017963] Call Trace:
  [   10.017968]  &lt;TASK&gt;
  [   10.018004]  ? padata_mt_helper+0x39/0xb0
  [   10.018084]  process_one_work+0x174/0x330
  [   10.018093]  worker_thread+0x266/0x3a0
  [   10.018111]  kthread+0xcf/0x100
  [   10.018124]  ret_from_fork+0x31/0x50
  [   10.018138]  ret_from_fork_asm+0x1a/0x30
  [   10.018147]  &lt;/TASK&gt;

Looking at the padata_mt_helper() function, the only way a divide-by-0
panic can happen is when ps-&gt;chunk_size is 0.  The way that chunk_size is
initialized in padata_do_multithreaded(), chunk_size can be 0 when the
min_chunk in the passed-in padata_mt_job structure is 0.

Fix this divide-by-0 panic by making sure that chunk_size will be at least
1 no matter what the input parameters are.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229743">SUSE bug 1229743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix overflow in get_free_elt()

"tracing_map-&gt;next_elt" in get_free_elt() is at risk of overflowing.

Once it overflows, new elements can still be inserted into the tracing_map
even though the maximum number of elements (`max_elts`) has been reached.
Continuing to insert elements after the overflow could result in the
tracing_map containing "tracing_map-&gt;max_size" elements, leaving no empty
entries.
If any attempt is made to insert an element into a full tracing_map using
`__tracing_map_insert()`, it will cause an infinite loop with preemption
disabled, leading to a CPU hang problem.

Fix this by preventing any further increments to "tracing_map-&gt;next_elt"
once it reaches "tracing_map-&gt;max_elt".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229764">SUSE bug 1229764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43891" ref_url="https://www.suse.com/security/cve/CVE-2024-43891" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Have format file honor EVENT_FILE_FL_FREED

When eventfs was introduced, special care had to be done to coordinate the
freeing of the file meta data with the files that are exposed to user
space. The file meta data would have a ref count that is set when the file
is created and would be decremented and freed after the last user that
opened the file closed it. When the file meta data was to be freed, it
would set a flag (EVENT_FILE_FL_FREED) to denote that the file is freed,
and any new references made (like new opens or reads) would fail as it is
marked freed. This allowed other meta data to be freed after this flag was
set (under the event_mutex).

All the files that were dynamically created in the events directory had a
pointer to the file meta data and would call event_release() when the last
reference to the user space file was closed. This would be the time that it
is safe to free the file meta data.

A shortcut was made for the "format" file. It's i_private would point to
the "call" entry directly and not point to the file's meta data. This is
because all format files are the same for the same "call", so it was
thought there was no reason to differentiate them.  The other files
maintain state (like the "enable", "trigger", etc). But this meant if the
file were to disappear, the "format" file would be unaware of it.

This caused a race that could be trigger via the user_events test (that
would create dynamic events and free them), and running a loop that would
read the user_events format files:

In one console run:

 # cd tools/testing/selftests/user_events
 # while true; do ./ftrace_test; done

And in another console run:

 # cd /sys/kernel/tracing/
 # while true; do cat events/user_events/__test_event/format; done 2&gt;/dev/null

With KASAN memory checking, it would trigger a use-after-free bug report
(which was a real bug). This was because the format file was not checking
the file's meta data flag "EVENT_FILE_FL_FREED", so it would access the
event that the file meta data pointed to after the event was freed.

After inspection, there are other locations that were found to not check
the EVENT_FILE_FL_FREED flag when accessing the trace_event_file. Add a
new helper function: event_file_file() that will make sure that the
event_mutex is held, and will return NULL if the trace_event_file has the
EVENT_FILE_FL_FREED flag set. Have the first reference of the struct file
pointer use event_file_file() and check for NULL. Later uses can still use
the event_file_data() helper function if the event_mutex is still held and
was not released since the event_file_file() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43891/">CVE-2024-43891 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43891">CVE-2024-43891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229762">SUSE bug 1229762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcg: protect concurrent access to mem_cgroup_idr

Commit 73f576c04b94 ("mm: memcontrol: fix cgroup creation failure after
many small jobs") decoupled the memcg IDs from the CSS ID space to fix the
cgroup creation failures.  It introduced IDR to maintain the memcg ID
space.  The IDR depends on external synchronization mechanisms for
modifications.  For the mem_cgroup_idr, the idr_alloc() and idr_replace()
happen within css callback and thus are protected through cgroup_mutex
from concurrent modifications.  However idr_remove() for mem_cgroup_idr
was not protected against concurrency and can be run concurrently for
different memcgs when they hit their refcnt to zero.  Fix that.

We have been seeing list_lru based kernel crashes at a low frequency in
our fleet for a long time.  These crashes were in different part of
list_lru code including list_lru_add(), list_lru_del() and reparenting
code.  Upon further inspection, it looked like for a given object (dentry
and inode), the super_block's list_lru didn't have list_lru_one for the
memcg of that object.  The initial suspicions were either the object is
not allocated through kmem_cache_alloc_lru() or somehow
memcg_list_lru_alloc() failed to allocate list_lru_one() for a memcg but
returned success.  No evidence were found for these cases.

Looking more deeply, we started seeing situations where valid memcg's id
is not present in mem_cgroup_idr and in some cases multiple valid memcgs
have same id and mem_cgroup_idr is pointing to one of them.  So, the most
reasonable explanation is that these situations can happen due to race
between multiple idr_remove() calls or race between
idr_alloc()/idr_replace() and idr_remove().  These races are causing
multiple memcgs to acquire the same ID and then offlining of one of them
would cleanup list_lrus on the system for all of them.  Later access from
other memcgs to the list_lru cause crashes due to missing list_lru_one.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229761">SUSE bug 1229761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: core: check uartclk for zero to avoid divide by zero

Calling ioctl TIOCSSERIAL with an invalid baud_base can
result in uartclk being zero, which will result in a
divide by zero error in uart_get_divisor(). The check for
uartclk being zero in uart_set_info() needs to be done
before other settings are made as subsequent calls to
ioctl TIOCSSERIAL for the same port would be impacted if
the uartclk check was done where uartclk gets set.

Oops: divide error: 0000  PREEMPT SMP KASAN PTI
RIP: 0010:uart_get_divisor (drivers/tty/serial/serial_core.c:580)
Call Trace:
 &lt;TASK&gt;
serial8250_get_divisor (drivers/tty/serial/8250/8250_port.c:2576
    drivers/tty/serial/8250/8250_port.c:2589)
serial8250_do_set_termios (drivers/tty/serial/8250/8250_port.c:502
    drivers/tty/serial/8250/8250_port.c:2741)
serial8250_set_termios (drivers/tty/serial/8250/8250_port.c:2862)
uart_change_line_settings (./include/linux/spinlock.h:376
    ./include/linux/serial_core.h:608 drivers/tty/serial/serial_core.c:222)
uart_port_startup (drivers/tty/serial/serial_core.c:342)
uart_startup (drivers/tty/serial/serial_core.c:368)
uart_set_info (drivers/tty/serial/serial_core.c:1034)
uart_set_info_user (drivers/tty/serial/serial_core.c:1059)
tty_set_serial (drivers/tty/tty_io.c:2637)
tty_ioctl (drivers/tty/tty_io.c:2647 drivers/tty/tty_io.c:2791)
__x64_sys_ioctl (fs/ioctl.c:52 fs/ioctl.c:907
    fs/ioctl.c:893 fs/ioctl.c:893)
do_syscall_64 (arch/x86/entry/common.c:52
    (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1))
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Rule: add
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229759">SUSE bug 1229759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: fix null pointer dereference in drm_client_modeset_probe

In drm_client_modeset_probe(), the return value of drm_mode_duplicate() is
assigned to modeset-&gt;mode, which will lead to a possible NULL pointer
dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229746">SUSE bug 1229746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip Recompute DSC Params if no Stream on Link

[why]
Encounter NULL pointer dereference uner mst + dsc setup.

BUG: kernel NULL pointer dereference, address: 0000000000000008
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP NOPTI
    CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2
    Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022
    RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
    Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
    RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
    RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
    RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
    RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
    R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
    R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
    FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0
    Call Trace:
&lt;TASK&gt;
     ? __die+0x23/0x70
     ? page_fault_oops+0x171/0x4e0
     ? plist_add+0xbe/0x100
     ? exc_page_fault+0x7c/0x180
     ? asm_exc_page_fault+0x26/0x30
     ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
     ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
     compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     drm_atomic_check_only+0x5c5/0xa40
     drm_mode_atomic_ioctl+0x76e/0xbc0

[how]
dsc recompute should be skipped if no mode change detected on the new
request. If detected, keep checking whether the stream is already on
current state or not.

(cherry picked from commit 8151a6c13111b465dbabe07c19f572f7cbd16fef)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229755">SUSE bug 1229755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43896" ref_url="https://www.suse.com/security/cve/CVE-2024-43896" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: cs-amp-lib: Fix NULL pointer crash if efi.get_variable is NULL

Call efi_rt_services_supported() to check that efi.get_variable exists
before calling it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43896/">CVE-2024-43896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43896">CVE-2024-43896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229751">SUSE bug 1229751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: drop bad gso csum_start and offset in virtio_net_hdr

Tighten csum_start and csum_offset checks in virtio_net_hdr_to_skb
for GSO packets.

The function already checks that a checksum requested with
VIRTIO_NET_HDR_F_NEEDS_CSUM is in skb linear. But for GSO packets
this might not hold for segs after segmentation.

Syzkaller demonstrated to reach this warning in skb_checksum_help

	offset = skb_checksum_start_offset(skb);
	ret = -EINVAL;
	if (WARN_ON_ONCE(offset &gt;= skb_headlen(skb)))

By injecting a TSO packet:

WARNING: CPU: 1 PID: 3539 at net/core/dev.c:3284 skb_checksum_help+0x3d0/0x5b0
 ip_do_fragment+0x209/0x1b20 net/ipv4/ip_output.c:774
 ip_finish_output_gso net/ipv4/ip_output.c:279 [inline]
 __ip_finish_output+0x2bd/0x4b0 net/ipv4/ip_output.c:301
 iptunnel_xmit+0x50c/0x930 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x2296/0x2c70 net/ipv4/ip_tunnel.c:813
 __gre_xmit net/ipv4/ip_gre.c:469 [inline]
 ipgre_xmit+0x759/0xa60 net/ipv4/ip_gre.c:661
 __netdev_start_xmit include/linux/netdevice.h:4850 [inline]
 netdev_start_xmit include/linux/netdevice.h:4864 [inline]
 xmit_one net/core/dev.c:3595 [inline]
 dev_hard_start_xmit+0x261/0x8c0 net/core/dev.c:3611
 __dev_queue_xmit+0x1b97/0x3c90 net/core/dev.c:4261
 packet_snd net/packet/af_packet.c:3073 [inline]

The geometry of the bad input packet at tcp_gso_segment:

[   52.003050][ T8403] skb len=12202 headroom=244 headlen=12093 tailroom=0
[   52.003050][ T8403] mac=(168,24) mac_len=24 net=(192,52) trans=244
[   52.003050][ T8403] shinfo(txflags=0 nr_frags=1 gso(size=1552 type=3 segs=0))
[   52.003050][ T8403] csum(0x60000c7 start=199 offset=1536
ip_summed=3 complete_sw=0 valid=0 level=0)

Mitigate with stricter input validation.

csum_offset: for GSO packets, deduce the correct value from gso_type.
This is already done for USO. Extend it to TSO. Let UFO be:
udp[46]_ufo_fragment ignores these fields and always computes the
checksum in software.

csum_start: finding the real offset requires parsing to the transport
header. Do not add a parser, use existing segmentation parsing. Thanks
to SKB_GSO_DODGY, that also catches bad packets that are hw offloaded.
Again test both TSO and USO. Do not test UFO for the above reason, and
do not test UDP tunnel offload.

GSO packet are almost always CHECKSUM_PARTIAL. USO packets may be
CHECKSUM_NONE since commit 10154dbded6d6 ("udp: Allow GSO transmit
from devices with no checksum offload"), but then still these fields
are initialized correctly in udp4_hwcsum/udp6_hwcsum_outgoing. So no
need to test for ip_summed == CHECKSUM_PARTIAL first.

This revises an existing fix mentioned in the Fixes tag, which broke
small packets with GSO offload, as detected by kselftests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229752">SUSE bug 1229752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229753">SUSE bug 1229753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null pointer deref in dcn20_resource.c

Fixes a hang thats triggered when MPV is run on a DCN401 dGPU:

mpv --hwdec=vaapi --vo=gpu --hwdec-codecs=all

and then enabling fullscreen playback (double click on the video)

The following calltrace will be seen:

[  181.843989] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  181.843997] #PF: supervisor instruction fetch in kernel mode
[  181.844003] #PF: error_code(0x0010) - not-present page
[  181.844009] PGD 0 P4D 0
[  181.844020] Oops: 0010 [#1] PREEMPT SMP NOPTI
[  181.844028] CPU: 6 PID: 1892 Comm: gnome-shell Tainted: G        W  OE      6.5.0-41-generic #41~22.04.2-Ubuntu
[  181.844038] Hardware name: System manufacturer System Product Name/CROSSHAIR VI HERO, BIOS 6302 10/23/2018
[  181.844044] RIP: 0010:0x0
[  181.844079] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[  181.844084] RSP: 0018:ffffb593c2b8f7b0 EFLAGS: 00010246
[  181.844093] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000004
[  181.844099] RDX: ffffb593c2b8f804 RSI: ffffb593c2b8f7e0 RDI: ffff9e3c8e758400
[  181.844105] RBP: ffffb593c2b8f7b8 R08: ffffb593c2b8f9c8 R09: ffffb593c2b8f96c
[  181.844110] R10: 0000000000000000 R11: 0000000000000000 R12: ffffb593c2b8f9c8
[  181.844115] R13: 0000000000000001 R14: ffff9e3c88000000 R15: 0000000000000005
[  181.844121] FS:  00007c6e323bb5c0(0000) GS:ffff9e3f85f80000(0000) knlGS:0000000000000000
[  181.844128] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  181.844134] CR2: ffffffffffffffd6 CR3: 0000000140fbe000 CR4: 00000000003506e0
[  181.844141] Call Trace:
[  181.844146]  &lt;TASK&gt;
[  181.844153]  ? show_regs+0x6d/0x80
[  181.844167]  ? __die+0x24/0x80
[  181.844179]  ? page_fault_oops+0x99/0x1b0
[  181.844192]  ? do_user_addr_fault+0x31d/0x6b0
[  181.844204]  ? exc_page_fault+0x83/0x1b0
[  181.844216]  ? asm_exc_page_fault+0x27/0x30
[  181.844237]  dcn20_get_dcc_compression_cap+0x23/0x30 [amdgpu]
[  181.845115]  amdgpu_dm_plane_validate_dcc.constprop.0+0xe5/0x180 [amdgpu]
[  181.845985]  amdgpu_dm_plane_fill_plane_buffer_attributes+0x300/0x580 [amdgpu]
[  181.846848]  fill_dc_plane_info_and_addr+0x258/0x350 [amdgpu]
[  181.847734]  fill_dc_plane_attributes+0x162/0x350 [amdgpu]
[  181.848748]  dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu]
[  181.849791]  ? dm_update_plane_state.constprop.0+0x4e3/0x6b0 [amdgpu]
[  181.850840]  amdgpu_dm_atomic_check+0xdfe/0x1760 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229754">SUSE bug 1229754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: xc2028: avoid use-after-free in load_firmware_cb()

syzkaller reported use-after-free in load_firmware_cb() [1].
The reason is because the module allocated a struct tuner in tuner_probe(),
and then the module initialization failed, the struct tuner was released.
A worker which created during module initialization accesses this struct
tuner later, it caused use-after-free.

The process is as follows:

task-6504           worker_thread
tuner_probe                             &lt;= alloc dvb_frontend [2]
...
request_firmware_nowait                 &lt;= create a worker
...
tuner_remove                            &lt;= free dvb_frontend
...
                    request_firmware_work_func  &lt;= the firmware is ready
                    load_firmware_cb    &lt;= but now the dvb_frontend has been freed

To fix the issue, check the dvd_frontend in load_firmware_cb(), if it is
null, report a warning and just return.

[1]:
    ==================================================================
     BUG: KASAN: use-after-free in load_firmware_cb+0x1310/0x17a0
     Read of size 8 at addr ffff8000d7ca2308 by task kworker/2:3/6504

     Call trace:
      load_firmware_cb+0x1310/0x17a0
      request_firmware_work_func+0x128/0x220
      process_one_work+0x770/0x1824
      worker_thread+0x488/0xea0
      kthread+0x300/0x430
      ret_from_fork+0x10/0x20

     Allocated by task 6504:
      kzalloc
      tuner_probe+0xb0/0x1430
      i2c_device_probe+0x92c/0xaf0
      really_probe+0x678/0xcd0
      driver_probe_device+0x280/0x370
      __device_attach_driver+0x220/0x330
      bus_for_each_drv+0x134/0x1c0
      __device_attach+0x1f4/0x410
      device_initial_probe+0x20/0x30
      bus_probe_device+0x184/0x200
      device_add+0x924/0x12c0
      device_register+0x24/0x30
      i2c_new_device+0x4e0/0xc44
      v4l2_i2c_new_subdev_board+0xbc/0x290
      v4l2_i2c_new_subdev+0xc8/0x104
      em28xx_v4l2_init+0x1dd0/0x3770

     Freed by task 6504:
      kfree+0x238/0x4e4
      tuner_remove+0x144/0x1c0
      i2c_device_remove+0xc8/0x290
      __device_release_driver+0x314/0x5fc
      device_release_driver+0x30/0x44
      bus_remove_device+0x244/0x490
      device_del+0x350/0x900
      device_unregister+0x28/0xd0
      i2c_unregister_device+0x174/0x1d0
      v4l2_device_unregister+0x224/0x380
      em28xx_v4l2_init+0x1d90/0x3770

     The buggy address belongs to the object at ffff8000d7ca2000
      which belongs to the cache kmalloc-2k of size 2048
     The buggy address is located 776 bytes inside of
      2048-byte region [ffff8000d7ca2000, ffff8000d7ca2800)
     The buggy address belongs to the page:
     page:ffff7fe00035f280 count:1 mapcount:0 mapping:ffff8000c001f000 index:0x0
     flags: 0x7ff800000000100(slab)
     raw: 07ff800000000100 ffff7fe00049d880 0000000300000003 ffff8000c001f000
     raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
     page dumped because: kasan: bad access detected

     Memory state around the buggy address:
      ffff8000d7ca2200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ffff8000d7ca2280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
     &gt;ffff8000d7ca2300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                           ^
      ffff8000d7ca2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ffff8000d7ca2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
     ==================================================================

[2]
    Actually, it is allocated for struct tuner, and dvb_frontend is inside.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229756">SUSE bug 1229756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43901" ref_url="https://www.suse.com/security/cve/CVE-2024-43901" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix NULL pointer dereference for DTN log in DCN401

When users run the command:

cat /sys/kernel/debug/dri/0/amdgpu_dm_dtn_log

The following NULL pointer dereference happens:

[  +0.000003] BUG: kernel NULL pointer dereference, address: NULL
[  +0.000005] #PF: supervisor instruction fetch in kernel mode
[  +0.000002] #PF: error_code(0x0010) - not-present page
[  +0.000002] PGD 0 P4D 0
[  +0.000004] Oops: 0010 [#1] PREEMPT SMP NOPTI
[  +0.000003] RIP: 0010:0x0
[  +0.000008] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[...]
[  +0.000002] PKRU: 55555554
[  +0.000002] Call Trace:
[  +0.000002]  &lt;TASK&gt;
[  +0.000003]  ? show_regs+0x65/0x70
[  +0.000006]  ? __die+0x24/0x70
[  +0.000004]  ? page_fault_oops+0x160/0x470
[  +0.000006]  ? do_user_addr_fault+0x2b5/0x690
[  +0.000003]  ? prb_read_valid+0x1c/0x30
[  +0.000005]  ? exc_page_fault+0x8c/0x1a0
[  +0.000005]  ? asm_exc_page_fault+0x27/0x30
[  +0.000012]  dcn10_log_color_state+0xf9/0x510 [amdgpu]
[  +0.000306]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000003]  ? vsnprintf+0x2fb/0x600
[  +0.000009]  dcn10_log_hw_state+0xfd0/0xfe0 [amdgpu]
[  +0.000218]  ? __mod_memcg_lruvec_state+0xe8/0x170
[  +0.000008]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000002]  ? debug_smp_processor_id+0x17/0x20
[  +0.000003]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000002]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000002]  ? set_ptes.isra.0+0x2b/0x90
[  +0.000004]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000002]  ? _raw_spin_unlock+0x19/0x40
[  +0.000004]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000002]  ? do_anonymous_page+0x337/0x700
[  +0.000004]  dtn_log_read+0x82/0x120 [amdgpu]
[  +0.000207]  full_proxy_read+0x66/0x90
[  +0.000007]  vfs_read+0xb0/0x340
[  +0.000005]  ? __count_memcg_events+0x79/0xe0
[  +0.000002]  ? srso_alias_return_thunk+0x5/0xfbef5
[  +0.000003]  ? count_memcg_events.constprop.0+0x1e/0x40
[  +0.000003]  ? handle_mm_fault+0xb2/0x370
[  +0.000003]  ksys_read+0x6b/0xf0
[  +0.000004]  __x64_sys_read+0x19/0x20
[  +0.000003]  do_syscall_64+0x60/0x130
[  +0.000004]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[  +0.000003] RIP: 0033:0x7fdf32f147e2
[...]

This error happens when the color log tries to read the gamut remap
information from DCN401 which is not initialized in the dcn401_dpp_funcs
which leads to a null pointer dereference. This commit addresses this
issue by adding a proper guard to access the gamut_remap callback in
case the specific ASIC did not implement this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43901/">CVE-2024-43901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43901">CVE-2024-43901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229765">SUSE bug 1229765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null checker before passing variables

Checks null pointer before passing variables to functions.

This fixes 3 NULL_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229767">SUSE bug 1229767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229781">SUSE bug 1229781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null checks for 'stream' and 'plane' before dereferencing

This commit adds null checks for the 'stream' and 'plane' variables in
the dcn30_apply_idle_power_optimizations function. These variables were
previously assumed to be null at line 922, but they were used later in
the code without checking if they were null. This could potentially lead
to a null pointer dereference, which would cause a crash.

The null checks ensure that 'stream' and 'plane' are not null before
they are used, preventing potential crashes.

Fixes the below static smatch checker:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:938 dcn30_apply_idle_power_optimizations() error: we previously assumed 'stream' could be null (see line 922)
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:940 dcn30_apply_idle_power_optimizations() error: we previously assumed 'plane' could be null (see line 922)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229768">SUSE bug 1229768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr

Check return value and conduct null pointer handling to avoid null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229784">SUSE bug 1229784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43906" ref_url="https://www.suse.com/security/cve/CVE-2024-43906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/admgpu: fix dereferencing null pointer context

When user space sets an invalid ta type, the pointer context will be empty.
So it need to check the pointer context before using it
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43906/">CVE-2024-43906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43906">CVE-2024-43906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229785">SUSE bug 1229785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules

Check the pointer value to fix potential null pointer
dereference
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229787">SUSE bug 1229787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the null pointer dereference to ras_manager

Check ras_manager before using it
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-07"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229788">SUSE bug 1229788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/pm: Fix the null pointer dereference for smu7

optimize the code to avoid pass a null pointer (hwmgr-&gt;backend)
to function smu7_update_edc_leakage_table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229789">SUSE bug 1229789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43910" ref_url="https://www.suse.com/security/cve/CVE-2024-43910" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses

Currently, it's possible to pass in a modified CONST_PTR_TO_DYNPTR to
a global function as an argument. The adverse effects of this is that
BPF helpers can continue to make use of this modified
CONST_PTR_TO_DYNPTR from within the context of the global function,
which can unintentionally result in out-of-bounds memory accesses and
therefore compromise overall system stability i.e.

[  244.157771] BUG: KASAN: slab-out-of-bounds in bpf_dynptr_data+0x137/0x140
[  244.161345] Read of size 8 at addr ffff88810914be68 by task test_progs/302
[  244.167151] CPU: 0 PID: 302 Comm: test_progs Tainted: G O E 6.10.0-rc3-00131-g66b586715063 #533
[  244.174318] Call Trace:
[  244.175787]  &lt;TASK&gt;
[  244.177356]  dump_stack_lvl+0x66/0xa0
[  244.179531]  print_report+0xce/0x670
[  244.182314]  ? __virt_addr_valid+0x200/0x3e0
[  244.184908]  kasan_report+0xd7/0x110
[  244.187408]  ? bpf_dynptr_data+0x137/0x140
[  244.189714]  ? bpf_dynptr_data+0x137/0x140
[  244.192020]  bpf_dynptr_data+0x137/0x140
[  244.194264]  bpf_prog_b02a02fdd2bdc5fa_global_call_bpf_dynptr_data+0x22/0x26
[  244.198044]  bpf_prog_b0fe7b9d7dc3abde_callback_adjust_bpf_dynptr_reg_off+0x1f/0x23
[  244.202136]  bpf_user_ringbuf_drain+0x2c7/0x570
[  244.204744]  ? 0xffffffffc0009e58
[  244.206593]  ? __pfx_bpf_user_ringbuf_drain+0x10/0x10
[  244.209795]  bpf_prog_33ab33f6a804ba2d_user_ringbuf_callback_const_ptr_to_dynptr_reg_off+0x47/0x4b
[  244.215922]  bpf_trampoline_6442502480+0x43/0xe3
[  244.218691]  __x64_sys_prlimit64+0x9/0xf0
[  244.220912]  do_syscall_64+0xc1/0x1d0
[  244.223043]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  244.226458] RIP: 0033:0x7ffa3eb8f059
[  244.228582] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8f 1d 0d 00 f7 d8 64 89 01 48
[  244.241307] RSP: 002b:00007ffa3e9c6eb8 EFLAGS: 00000206 ORIG_RAX: 000000000000012e
[  244.246474] RAX: ffffffffffffffda RBX: 00007ffa3e9c7cdc RCX: 00007ffa3eb8f059
[  244.250478] RDX: 00007ffa3eb162b4 RSI: 0000000000000000 RDI: 00007ffa3e9c7fb0
[  244.255396] RBP: 00007ffa3e9c6ed0 R08: 00007ffa3e9c76c0 R09: 0000000000000000
[  244.260195] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffff80
[  244.264201] R13: 000000000000001c R14: 00007ffc5d6b4260 R15: 00007ffa3e1c7000
[  244.268303]  &lt;/TASK&gt;

Add a check_func_arg_reg_off() to the path in which the BPF verifier
verifies the arguments of global function arguments, specifically
those which take an argument of type ARG_PTR_TO_DYNPTR |
MEM_RDONLY. Also, process_dynptr_func() doesn't appear to perform any
explicit and strict type matching on the supplied register type, so
let's also enforce that a register either type PTR_TO_STACK or
CONST_PTR_TO_DYNPTR is by the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43910/">CVE-2024-43910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43910">CVE-2024-43910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229832">SUSE bug 1229832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229835">SUSE bug 1229835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43911" ref_url="https://www.suse.com/security/cve/CVE-2024-43911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix NULL dereference at band check in starting tx ba session

In MLD connection, link_data/link_conf are dynamically allocated. They
don't point to vif-&gt;bss_conf. So, there will be no chanreq assigned to
vif-&gt;bss_conf and then the chan will be NULL. Tweak the code to check
ht_supported/vht_supported/has_he/has_eht on sta deflink.

Crash log (with rtw89 version under MLO development):
[ 9890.526087] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 9890.526102] #PF: supervisor read access in kernel mode
[ 9890.526105] #PF: error_code(0x0000) - not-present page
[ 9890.526109] PGD 0 P4D 0
[ 9890.526114] Oops: 0000 [#1] PREEMPT SMP PTI
[ 9890.526119] CPU: 2 PID: 6367 Comm: kworker/u16:2 Kdump: loaded Tainted: G           OE      6.9.0 #1
[ 9890.526123] Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB3WW (2.73 ) 11/28/2018
[ 9890.526126] Workqueue: phy2 rtw89_core_ba_work [rtw89_core]
[ 9890.526203] RIP: 0010:ieee80211_start_tx_ba_session (net/mac80211/agg-tx.c:618 (discriminator 1)) mac80211
[ 9890.526279] Code: f7 e8 d5 93 3e ea 48 83 c4 28 89 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 49 8b 84 24 e0 f1 ff ff 48 8b 80 90 1b 00 00 &lt;83&gt; 38 03 0f 84 37 fe ff ff bb ea ff ff ff eb cc 49 8b 84 24 10 f3
All code
========
   0:	f7 e8                	imul   %eax
   2:	d5                   	(bad)
   3:	93                   	xchg   %eax,%ebx
   4:	3e ea                	ds (bad)
   6:	48 83 c4 28          	add    $0x28,%rsp
   a:	89 d8                	mov    %ebx,%eax
   c:	5b                   	pop    %rbx
   d:	41 5c                	pop    %r12
   f:	41 5d                	pop    %r13
  11:	41 5e                	pop    %r14
  13:	41 5f                	pop    %r15
  15:	5d                   	pop    %rbp
  16:	c3                   	retq
  17:	cc                   	int3
  18:	cc                   	int3
  19:	cc                   	int3
  1a:	cc                   	int3
  1b:	49 8b 84 24 e0 f1 ff 	mov    -0xe20(%r12),%rax
  22:	ff
  23:	48 8b 80 90 1b 00 00 	mov    0x1b90(%rax),%rax
  2a:*	83 38 03             	cmpl   $0x3,(%rax)		&lt;-- trapping instruction
  2d:	0f 84 37 fe ff ff    	je     0xfffffffffffffe6a
  33:	bb ea ff ff ff       	mov    $0xffffffea,%ebx
  38:	eb cc                	jmp    0x6
  3a:	49                   	rex.WB
  3b:	8b                   	.byte 0x8b
  3c:	84 24 10             	test   %ah,(%rax,%rdx,1)
  3f:	f3                   	repz

Code starting with the faulting instruction
===========================================
   0:	83 38 03             	cmpl   $0x3,(%rax)
   3:	0f 84 37 fe ff ff    	je     0xfffffffffffffe40
   9:	bb ea ff ff ff       	mov    $0xffffffea,%ebx
   e:	eb cc                	jmp    0xffffffffffffffdc
  10:	49                   	rex.WB
  11:	8b                   	.byte 0x8b
  12:	84 24 10             	test   %ah,(%rax,%rdx,1)
  15:	f3                   	repz
[ 9890.526285] RSP: 0018:ffffb8db09013d68 EFLAGS: 00010246
[ 9890.526291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9308e0d656c8
[ 9890.526295] RDX: 0000000000000000 RSI: ffffffffab99460b RDI: ffffffffab9a7685
[ 9890.526300] RBP: ffffb8db09013db8 R08: 0000000000000000 R09: 0000000000000873
[ 9890.526304] R10: ffff9308e0d64800 R11: 0000000000000002 R12: ffff9308e5ff6e70
[ 9890.526308] R13: ffff930952500e20 R14: ffff9309192a8c00 R15: 0000000000000000
[ 9890.526313] FS:  0000000000000000(0000) GS:ffff930b4e700000(0000) knlGS:0000000000000000
[ 9890.526316] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 9890.526318] CR2: 0000000000000000 CR3: 0000000391c58005 CR4: 00000000001706f0
[ 9890.526321] Call Trace:
[ 9890.526324]  &lt;TASK&gt;
[ 9890.526327] ? show_regs (arch/x86/kernel/dumpstack.c:479)
[ 9890.526335] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)
[ 9890.526340] ? page_fault_oops (arch/x86/mm/fault.c:713)
[ 9890.526347] ? search_module_extables (kernel/module/main.c:3256 (discriminator
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-08"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43911/">CVE-2024-43911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43911">CVE-2024-43911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229827">SUSE bug 1229827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: disallow setting special AP channel widths

Setting the AP channel width is meant for use with the normal
20/40/... MHz channel width progression, and switching around
in S1G or narrow channels isn't supported. Disallow that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229830">SUSE bug 1229830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43913" ref_url="https://www.suse.com/security/cve/CVE-2024-43913" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: apple: fix device reference counting

Drivers must call nvme_uninit_ctrl after a successful nvme_init_ctrl.
Split the allocation side out to make the error handling boundary easier
to navigate. The apple driver had been doing this wrong, leaking the
controller device memory on a tagset failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43913/">CVE-2024-43913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43913">CVE-2024-43913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229833">SUSE bug 1229833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: avoid BUG_ON() while continue reshape after reassembling

Currently, mdadm support --revert-reshape to abort the reshape while
reassembling, as the test 07revert-grow. However, following BUG_ON()
can be triggerred by the test:

kernel BUG at drivers/md/raid5.c:6278!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
irq event stamp: 158985
CPU: 6 PID: 891 Comm: md0_reshape Not tainted 6.9.0-03335-g7592a0b0049a #94
RIP: 0010:reshape_request+0x3f1/0xe60
Call Trace:
 &lt;TASK&gt;
 raid5_sync_request+0x43d/0x550
 md_do_sync+0xb7a/0x2110
 md_thread+0x294/0x2b0
 kthread+0x147/0x1c0
 ret_from_fork+0x59/0x70
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Root cause is that --revert-reshape update the raid_disks from 5 to 4,
while reshape position is still set, and after reassembling the array,
reshape position will be read from super block, then during reshape the
checking of 'writepos' that is caculated by old reshape position will
fail.

Fix this panic the easy way first, by converting the BUG_ON() to
WARN_ON(), and stop the reshape if checkings fail.

Noted that mdadm must fix --revert-shape as well, and probably md/raid
should enhance metadata validation as well, however this means
reassemble will fail and there must be user tools to fix the wrong
metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229790">SUSE bug 1229790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: prevent potential speculation leaks in gpio_device_get_desc()

Userspace may trigger a speculative read of an address outside the gpio
descriptor array.
Users can do that by calling gpio_ioctl() with an offset out of range.
Offset is copied from user and then used as an array index to get
the gpio descriptor without sanitization in gpio_device_get_desc().

This change ensures that the offset is sanitized by using
array_index_nospec() to mitigate any possibility of speculative
information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229837">SUSE bug 1229837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix UAFs when destroying the queues

The second tagged commit started sometimes (very rarely, but possible)
throwing WARNs from
net/core/page_pool.c:page_pool_disable_direct_recycling().
Turned out idpf frees interrupt vectors with embedded NAPIs *before*
freeing the queues making page_pools' NAPI pointers lead to freed
memory before these pools are destroyed by libeth.
It's not clear whether there are other accesses to the freed vectors
when destroying the queues, but anyway, we usually free queue/interrupt
vectors only when the queues are destroyed and the NAPIs are guaranteed
to not be referenced anywhere.

Invert the allocation and freeing logic making queue/interrupt vectors
be allocated first and freed last. Vectors don't require queues to be
present, so this is safe. Additionally, this change allows to remove
that useless queue-&gt;q_vector pointer cleanup, as vectors are still
valid when freeing the queues (+ both are freed within one function,
so it's not clear why nullify the pointers at all).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44933" ref_url="https://www.suse.com/security/cve/CVE-2024-44933" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en : Fix memory out-of-bounds in bnxt_fill_hw_rss_tbl()

A recent commit has modified the code in __bnxt_reserve_rings() to
set the default RSS indirection table to default only when the number
of RX rings is changing.  While this works for newer firmware that
requires RX ring reservations, it causes the regression on older
firmware not requiring RX ring resrvations (BNXT_NEW_RM() returns
false).

With older firmware, RX ring reservations are not required and so
hw_resc-&gt;resv_rx_rings is not always set to the proper value.  The
comparison:

if (old_rx_rings != bp-&gt;hw_resc.resv_rx_rings)

in __bnxt_reserve_rings() may be false even when the RX rings are
changing.  This will cause __bnxt_reserve_rings() to skip setting
the default RSS indirection table to default to match the current
number of RX rings.  This may later cause bnxt_fill_hw_rss_tbl() to
use an out-of-range index.

We already have bnxt_check_rss_tbl_no_rmgr() to handle exactly this
scenario.  We just need to move it up in bnxt_need_reserve_rings()
to be called unconditionally when using older firmware.  Without the
fix, if the TX rings are changing, we'll skip the
bnxt_check_rss_tbl_no_rmgr() call and __bnxt_reserve_rings() may also
skip the bnxt_set_dflt_rss_indir_tbl() call for the reason explained
in the last paragraph.  Without setting the default RSS indirection
table to default, it causes the regression:

BUG: KASAN: slab-out-of-bounds in __bnxt_hwrm_vnic_set_rss+0xb79/0xe40
Read of size 2 at addr ffff8881c5809618 by task ethtool/31525
Call Trace:
__bnxt_hwrm_vnic_set_rss+0xb79/0xe40
 bnxt_hwrm_vnic_rss_cfg_p5+0xf7/0x460
 __bnxt_setup_vnic_p5+0x12e/0x270
 __bnxt_open_nic+0x2262/0x2f30
 bnxt_open_nic+0x5d/0xf0
 ethnl_set_channels+0x5d4/0xb30
 ethnl_default_set_doit+0x2f1/0x620
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-08-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44933/">CVE-2024-44933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44933">CVE-2024-44933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229791">SUSE bug 1229791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44934" ref_url="https://www.suse.com/security/cve/CVE-2024-44934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mcast: wait for previous gc cycles when removing port

syzbot hit a use-after-free[1] which is caused because the bridge doesn't
make sure that all previous garbage has been collected when removing a
port. What happens is:
      CPU 1                   CPU 2
 start gc cycle           remove port
                         acquire gc lock first
 wait for lock
                         call br_multicasg_gc() directly
 acquire lock now but    free port
 the port can be freed
 while grp timers still
 running

Make sure all previous gc cycles have finished by using flush_work before
freeing the port.

[1]
  BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861
  Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699

  CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
  Call Trace:
   &lt;IRQ&gt;
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0xc3/0x620 mm/kasan/report.c:488
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861
   call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792
   expire_timers kernel/time/timer.c:1843 [inline]
   __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417
   __run_timer_base kernel/time/timer.c:2428 [inline]
   __run_timer_base kernel/time/timer.c:2421 [inline]
   run_timer_base+0x111/0x190 kernel/time/timer.c:2437
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44934/">CVE-2024-44934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229809">SUSE bug 1229809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: Fix null-ptr-deref in reuseport_add_sock().

syzbot reported a null-ptr-deref while accessing sk2-&gt;sk_reuseport_cb in
reuseport_add_sock(). [0]

The repro first creates a listener with SO_REUSEPORT.  Then, it creates
another listener on the same port and concurrently closes the first
listener.

The second listen() calls reuseport_add_sock() with the first listener as
sk2, where sk2-&gt;sk_reuseport_cb is not expected to be cleared concurrently,
but the close() does clear it by reuseport_detach_sock().

The problem is SCTP does not properly synchronise reuseport_alloc(),
reuseport_add_sock(), and reuseport_detach_sock().

The caller of reuseport_alloc() and reuseport_{add,detach}_sock() must
provide synchronisation for sockets that are classified into the same
reuseport group.

Otherwise, such sockets form multiple identical reuseport groups, and
all groups except one would be silently dead.

  1. Two sockets call listen() concurrently
  2. No socket in the same group found in sctp_ep_hashtable[]
  3. Two sockets call reuseport_alloc() and form two reuseport groups
  4. Only one group hit first in __sctp_rcv_lookup_endpoint() receives
      incoming packets

Also, the reported null-ptr-deref could occur.

TCP/UDP guarantees that would not happen by holding the hash bucket lock.

Let's apply the locking strategy to __sctp_hash_endpoint() and
__sctp_unhash_endpoint().

[0]:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
CPU: 1 UID: 0 PID: 10230 Comm: syz-executor119 Not tainted 6.10.0-syzkaller-12585-g301927d2d2eb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:reuseport_add_sock+0x27e/0x5e0 net/core/sock_reuseport.c:350
Code: 00 0f b7 5d 00 bf 01 00 00 00 89 de e8 1b a4 ff f7 83 fb 01 0f 85 a3 01 00 00 e8 6d a0 ff f7 49 8d 7e 12 48 89 f8 48 c1 e8 03 &lt;42&gt; 0f b6 04 28 84 c0 0f 85 4b 02 00 00 41 0f b7 5e 12 49 8d 7e 14
RSP: 0018:ffffc9000b947c98 EFLAGS: 00010202
RAX: 0000000000000002 RBX: ffff8880252ddf98 RCX: ffff888079478000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000012
RBP: 0000000000000001 R08: ffffffff8993e18d R09: 1ffffffff1fef385
R10: dffffc0000000000 R11: fffffbfff1fef386 R12: ffff8880252ddac0
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f24e45b96c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcced5f7b8 CR3: 00000000241be000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __sctp_hash_endpoint net/sctp/input.c:762 [inline]
 sctp_hash_endpoint+0x52a/0x600 net/sctp/input.c:790
 sctp_listen_start net/sctp/socket.c:8570 [inline]
 sctp_inet_listen+0x767/0xa20 net/sctp/socket.c:8625
 __sys_listen_socket net/socket.c:1883 [inline]
 __sys_listen+0x1b7/0x230 net/socket.c:1894
 __do_sys_listen net/socket.c:1902 [inline]
 __se_sys_listen net/socket.c:1900 [inline]
 __x64_sys_listen+0x5a/0x70 net/socket.c:1900
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f24e46039b9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f24e45b9228 EFLAGS: 00000246 ORIG_RAX: 0000000000000032
RAX: ffffffffffffffda RBX: 00007f24e468e428 RCX: 00007f24e46039b9
RDX: 00007f24e46039b9 RSI: 0000000000000003 RDI: 0000000000000004
RBP: 00007f24e468e420 R08: 00007f24e45b96c0 R09: 00007f24e45b96c0
R10: 00007f24e45b96c0 R11: 0000000000000246 R12: 00007f24e468e42c
R13:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229810">SUSE bug 1229810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44936" ref_url="https://www.suse.com/security/cve/CVE-2024-44936" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: rt5033: Bring back i2c_set_clientdata

Commit 3a93da231c12 ("power: supply: rt5033: Use devm_power_supply_register() helper")
reworked the driver to use devm. While at it, the i2c_set_clientdata
was dropped along with the remove callback. Unfortunately other parts
of the driver also rely on i2c clientdata so this causes kernel oops.

Bring the call back to fix the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44936/">CVE-2024-44936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44936">CVE-2024-44936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229811">SUSE bug 1229811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44937" ref_url="https://www.suse.com/security/cve/CVE-2024-44937" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel-vbtn: Protect ACPI notify handler against recursion

Since commit e2ffcda16290 ("ACPI: OSL: Allow Notify () handlers to run on
all CPUs") ACPI notify handlers like the intel-vbtn notify_handler() may
run on multiple CPU cores racing with themselves.

This race gets hit on Dell Venue 7140 tablets when undocking from
the keyboard, causing the handler to try and register priv-&gt;switches_dev
twice, as can be seen from the dev_info() message getting logged twice:

[ 83.861800] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event
[ 83.861858] input: Intel Virtual Switches as /devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17
[ 83.861865] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event

After which things go seriously wrong:
[ 83.861872] sysfs: cannot create duplicate filename '/devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17'
...
[ 83.861967] kobject: kobject_add_internal failed for input17 with -EEXIST, don't try to register things with the same name in the same directory.
[ 83.877338] BUG: kernel NULL pointer dereference, address: 0000000000000018
...

Protect intel-vbtn notify_handler() from racing with itself with a mutex
to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44937/">CVE-2024-44937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44937">CVE-2024-44937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229812">SUSE bug 1229812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix shift-out-of-bounds in dbDiscardAG

When searching for the next smaller log2 block, BLKSTOL2() returned 0,
causing shift exponent -1 to be negative.

This patch fixes the issue by exiting the loop directly when negative
shift is found.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229793">SUSE bug 1229793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix null ptr deref in dtInsertEntry

[syzbot reported]
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 5061 Comm: syz-executor404 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:dtInsertEntry+0xd0c/0x1780 fs/jfs/jfs_dtree.c:3713
...
[Analyze]
In dtInsertEntry(), when the pointer h has the same value as p, after writing
name in UniStrncpy_to_le(), p-&gt;header.flag will be cleared. This will cause the
previously true judgment "p-&gt;header.flag &amp; BT-LEAF" to change to no after writing
the name operation, this leads to entering an incorrect branch and accessing the
uninitialized object ih when judging this condition for the second time.

[Fix]
After got the page, check freelist first, if freelist == 0 then exit dtInsert()
and return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-09-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229820">SUSE bug 1229820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44941" ref_url="https://www.suse.com/security/cve/CVE-2024-44941" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to cover read extent cache access with lock

syzbot reports a f2fs bug as below:

BUG: KASAN: slab-use-after-free in sanity_check_extent_cache+0x370/0x410 fs/f2fs/extent_cache.c:46
Read of size 4 at addr ffff8880739ab220 by task syz-executor200/5097

CPU: 0 PID: 5097 Comm: syz-executor200 Not tainted 6.9.0-rc6-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 sanity_check_extent_cache+0x370/0x410 fs/f2fs/extent_cache.c:46
 do_read_inode fs/f2fs/inode.c:509 [inline]
 f2fs_iget+0x33e1/0x46e0 fs/f2fs/inode.c:560
 f2fs_nfs_get_inode+0x74/0x100 fs/f2fs/super.c:3237
 generic_fh_to_dentry+0x9f/0xf0 fs/libfs.c:1413
 exportfs_decode_fh_raw+0x152/0x5f0 fs/exportfs/expfs.c:444
 exportfs_decode_fh+0x3c/0x80 fs/exportfs/expfs.c:584
 do_handle_to_path fs/fhandle.c:155 [inline]
 handle_to_path fs/fhandle.c:210 [inline]
 do_handle_open+0x495/0x650 fs/fhandle.c:226
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

We missed to cover sanity_check_extent_cache() w/ extent cache lock,
so, below race case may happen, result in use after free issue.

- f2fs_iget
 - do_read_inode
  - f2fs_init_read_extent_tree
  : add largest extent entry in to cache
					- shrink
					 - f2fs_shrink_read_extent_tree
					  - __shrink_extent_tree
					   - __detach_extent_node
					   : drop largest extent entry
  - sanity_check_extent_cache
  : access et-&gt;largest w/o lock

let's refactor sanity_check_extent_cache() to avoid extent cache access
and call it before f2fs_init_read_extent_tree() to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-09-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44941/">CVE-2024-44941 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44941">CVE-2024-44941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229842">SUSE bug 1229842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44943" ref_url="https://www.suse.com/security/cve/CVE-2024-44943" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: gup: stop abusing try_grab_folio

A kernel warning was reported when pinning folio in CMA memory when
launching SEV virtual machine.  The splat looks like:

[  464.325306] WARNING: CPU: 13 PID: 6734 at mm/gup.c:1313 __get_user_pages+0x423/0x520
[  464.325464] CPU: 13 PID: 6734 Comm: qemu-kvm Kdump: loaded Not tainted 6.6.33+ #6
[  464.325477] RIP: 0010:__get_user_pages+0x423/0x520
[  464.325515] Call Trace:
[  464.325520]  &lt;TASK&gt;
[  464.325523]  ? __get_user_pages+0x423/0x520
[  464.325528]  ? __warn+0x81/0x130
[  464.325536]  ? __get_user_pages+0x423/0x520
[  464.325541]  ? report_bug+0x171/0x1a0
[  464.325549]  ? handle_bug+0x3c/0x70
[  464.325554]  ? exc_invalid_op+0x17/0x70
[  464.325558]  ? asm_exc_invalid_op+0x1a/0x20
[  464.325567]  ? __get_user_pages+0x423/0x520
[  464.325575]  __gup_longterm_locked+0x212/0x7a0
[  464.325583]  internal_get_user_pages_fast+0xfb/0x190
[  464.325590]  pin_user_pages_fast+0x47/0x60
[  464.325598]  sev_pin_memory+0xca/0x170 [kvm_amd]
[  464.325616]  sev_mem_enc_register_region+0x81/0x130 [kvm_amd]

Per the analysis done by yangge, when starting the SEV virtual machine, it
will call pin_user_pages_fast(..., FOLL_LONGTERM, ...) to pin the memory. 
But the page is in CMA area, so fast GUP will fail then fallback to the
slow path due to the longterm pinnalbe check in try_grab_folio().

The slow path will try to pin the pages then migrate them out of CMA area.
But the slow path also uses try_grab_folio() to pin the page, it will
also fail due to the same check then the above warning is triggered.

In addition, the try_grab_folio() is supposed to be used in fast path and
it elevates folio refcount by using add ref unless zero.  We are guaranteed
to have at least one stable reference in slow path, so the simple atomic add
could be used.  The performance difference should be trivial, but the
misuse may be confusing and misleading.

Redefined try_grab_folio() to try_grab_folio_fast(), and try_grab_page()
to try_grab_folio(), and use them in the proper paths.  This solves both
the abuse and the kernel warning.

The proper naming makes their usecase more clear and should prevent from
abusing in the future.

peterx said:

: The user will see the pin fails, for gpu-slow it further triggers the WARN
: right below that failure (as in the original report):
: 
:         folio = try_grab_folio(page, page_increm - 1,
:                                 foll_flags);
:         if (WARN_ON_ONCE(!folio)) { &lt;------------------------ here
:                 /*
:                         * Release the 1st page ref if the
:                         * folio is problematic, fail hard.
:                         */
:                 gup_put_folio(page_folio(page), 1,
:                                 foll_flags);
:                 ret = -EFAULT;
:                 goto out;
:         }

[1] https://lore.kernel.org/linux-mm/1719478388-31917-1-git-send-email-yangge1116@126.com/

[shy828301@gmail.com: fix implicit declaration of function try_grab_folio_fast]
  Link: https://lkml.kernel.org/r/CAHbLzkowMSso-4Nufc9hcMehQsK9PNz3OSu-+eniU-2Mm-xjhA@mail.gmail.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44943/">CVE-2024-44943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44943">CVE-2024-44943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229870">SUSE bug 1229870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: use helper function to calculate expect ID

Delete expectation path is missing a call to the nf_expect_get_id()
helper function to calculate the expectation ID, otherwise LSB of the
expectation object address is leaked to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229899">SUSE bug 1229899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44945" ref_url="https://www.suse.com/security/cve/CVE-2024-44945" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nfnetlink: Initialise extack before use in ACKs

Add missing extack initialisation when ACKing BATCH_BEGIN and BATCH_END.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2024-09-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44945/">CVE-2024-44945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44945">CVE-2024-44945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230012">SUSE bug 1230012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kcm: Serialise kcm_sendmsg() for the same socket.

syzkaller reported UAF in kcm_release(). [0]

The scenario is

  1. Thread A builds a skb with MSG_MORE and sets kcm-&gt;seq_skb.

  2. Thread A resumes building skb from kcm-&gt;seq_skb but is blocked
     by sk_stream_wait_memory()

  3. Thread B calls sendmsg() concurrently, finishes building kcm-&gt;seq_skb
     and puts the skb to the write queue

  4. Thread A faces an error and finally frees skb that is already in the
     write queue

  5. kcm_release() does double-free the skb in the write queue

When a thread is building a MSG_MORE skb, another thread must not touch it.

Let's add a per-sk mutex and serialise kcm_sendmsg().

[0]:
BUG: KASAN: slab-use-after-free in __skb_unlink include/linux/skbuff.h:2366 [inline]
BUG: KASAN: slab-use-after-free in __skb_dequeue include/linux/skbuff.h:2385 [inline]
BUG: KASAN: slab-use-after-free in __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline]
BUG: KASAN: slab-use-after-free in __skb_queue_purge include/linux/skbuff.h:3181 [inline]
BUG: KASAN: slab-use-after-free in kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691
Read of size 8 at addr ffff0000ced0fc80 by task syz-executor329/6167

CPU: 1 PID: 6167 Comm: syz-executor329 Tainted: G    B              6.8.0-rc5-syzkaller-g9abbc24128bc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call trace:
 dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:291
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:298
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x178/0x518 mm/kasan/report.c:488
 kasan_report+0xd8/0x138 mm/kasan/report.c:601
 __asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381
 __skb_unlink include/linux/skbuff.h:2366 [inline]
 __skb_dequeue include/linux/skbuff.h:2385 [inline]
 __skb_queue_purge_reason include/linux/skbuff.h:3175 [inline]
 __skb_queue_purge include/linux/skbuff.h:3181 [inline]
 kcm_release+0x170/0x4c8 net/kcm/kcmsock.c:1691
 __sock_release net/socket.c:659 [inline]
 sock_close+0xa4/0x1e8 net/socket.c:1421
 __fput+0x30c/0x738 fs/file_table.c:376
 ____fput+0x20/0x30 fs/file_table.c:404
 task_work_run+0x230/0x2e0 kernel/task_work.c:180
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0x618/0x1f64 kernel/exit.c:871
 do_group_exit+0x194/0x22c kernel/exit.c:1020
 get_signal+0x1500/0x15ec kernel/signal.c:2893
 do_signal+0x23c/0x3b44 arch/arm64/kernel/signal.c:1249
 do_notify_resume+0x74/0x1f4 arch/arm64/kernel/entry-common.c:148
 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline]
 exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline]
 el0_svc+0xac/0x168 arch/arm64/kernel/entry-common.c:713
 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598

Allocated by task 6166:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_alloc_info+0x70/0x84 mm/kasan/generic.c:626
 unpoison_slab_object mm/kasan/common.c:314 [inline]
 __kasan_slab_alloc+0x74/0x8c mm/kasan/common.c:340
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slub.c:3813 [inline]
 slab_alloc_node mm/slub.c:3860 [inline]
 kmem_cache_alloc_node+0x204/0x4c0 mm/slub.c:3903
 __alloc_skb+0x19c/0x3d8 net/core/skbuff.c:641
 alloc_skb include/linux/skbuff.h:1296 [inline]
 kcm_sendmsg+0x1d3c/0x2124 net/kcm/kcmsock.c:783
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 sock_sendmsg+0x220/0x2c0 net/socket.c:768
 splice_to_socket+0x7cc/0xd58 fs/splice.c:889
 do_splice_from fs/splice.c:941 [inline]
 direct_splice_actor+0xec/0x1d8 fs/splice.c:1164
 splice_direct_to_actor+0x438/0xa0c fs/splice.c:1108
 do_splice_direct_actor 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230016">SUSE bug 1230016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: Initialize beyond-EOF page contents before setting uptodate

fuse_notify_store(), unlike fuse_do_readpage(), does not enable page
zeroing (because it can be used to change partial page contents).

So fuse_notify_store() must be more careful to fully initialize page
contents (including parts of the page that are beyond end-of-file)
before marking the page uptodate.

The current code can leave beyond-EOF page contents uninitialized, which
makes these uninitialized page contents visible to userspace via mmap().

This is an information leak, but only affects systems which do not
enable init-on-alloc (via CONFIG_INIT_ON_ALLOC_DEFAULT_ON=y or the
corresponding kernel command line parameter).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-12-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230098">SUSE bug 1230098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44948</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mtrr: Check if fixed MTRRs exist before saving them

MTRRs have an obsolete fixed variant for fine grained caching control
of the 640K-1MB region that uses separate MSRs. This fixed variant has
a separate capability bit in the MTRR capability MSR.

So far all x86 CPUs which support MTRR have this separate bit set, so it
went unnoticed that mtrr_save_state() does not check the capability bit
before accessing the fixed MTRR MSRs.

Though on a CPU that does not support the fixed MTRR capability this
results in a #GP.  The #GP itself is harmless because the RDMSR fault is
handled gracefully, but results in a WARN_ON().

Add the missing capability check to prevent this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230174">SUSE bug 1230174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44949" ref_url="https://www.suse.com/security/cve/CVE-2024-44949" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parisc: fix a possible DMA corruption

ARCH_DMA_MINALIGN was defined as 16 - this is too small - it may be
possible that two unrelated 16-byte allocations share a cache line. If
one of these allocations is written using DMA and the other is written
using cached write, the value that was written with DMA may be
corrupted.

This commit changes ARCH_DMA_MINALIGN to be 128 on PA20 and 32 on PA1.1 -
that's the largest possible cache line size.

As different parisc microarchitectures have different cache line size, we
define arch_slab_minalign(), cache_line_size() and
dma_get_cache_alignment() so that the kernel may tune slab cache
parameters dynamically, based on the detected cache line size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44949/">CVE-2024-44949 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44949">CVE-2024-44949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230167">SUSE bug 1230167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44950</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: fix invalid FIFO access with special register set

When enabling access to the special register set, Receiver time-out and
RHR interrupts can happen. In this case, the IRQ handler will try to read
from the FIFO thru the RHR register at address 0x00, but address 0x00 is
mapped to DLL register, resulting in erroneous FIFO reading.

Call graph example:
    sc16is7xx_startup(): entry
    sc16is7xx_ms_proc(): entry
    sc16is7xx_set_termios(): entry
    sc16is7xx_set_baud(): DLH/DLL = $009C --&gt; access special register set
    sc16is7xx_port_irq() entry            --&gt; IIR is 0x0C
    sc16is7xx_handle_rx() entry
    sc16is7xx_fifo_read(): --&gt; unable to access FIFO (RHR) because it is
                               mapped to DLL (LCR=LCR_CONF_MODE_A)
    sc16is7xx_set_baud(): exit --&gt; Restore access to general register set

Fix the problem by claiming the efr_lock mutex when accessing the Special
register set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230180">SUSE bug 1230180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44951" ref_url="https://www.suse.com/security/cve/CVE-2024-44951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: sc16is7xx: fix TX fifo corruption

Sometimes, when a packet is received on channel A at almost the same time
as a packet is about to be transmitted on channel B, we observe with a
logic analyzer that the received packet on channel A is transmitted on
channel B. In other words, the Tx buffer data on channel B is corrupted
with data from channel A.

The problem appeared since commit 4409df5866b7 ("serial: sc16is7xx: change
EFR lock to operate on each channels"), which changed the EFR locking to
operate on each channel instead of chip-wise.

This commit has introduced a regression, because the EFR lock is used not
only to protect the EFR registers access, but also, in a very obscure and
undocumented way, to protect access to the data buffer, which is shared by
the Tx and Rx handlers, but also by each channel of the IC.

Fix this regression first by switching to kfifo_out_linear_ptr() in
sc16is7xx_handle_tx() to eliminate the need for a shared Rx/Tx buffer.

Secondly, replace the chip-wise Rx buffer with a separate Rx buffer for
each channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44951/">CVE-2024-44951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44951">CVE-2024-44951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230181">SUSE bug 1230181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44952</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-11-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230178">SUSE bug 1230178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44953" ref_url="https://www.suse.com/security/cve/CVE-2024-44953" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix deadlock during RTC update

There is a deadlock when runtime suspend waits for the flush of RTC work,
and the RTC work calls ufshcd_rpm_get_sync() to wait for runtime resume.

Here is deadlock backtrace:

kworker/0:1     D 4892.876354 10 10971 4859 0x4208060 0x8 10 0 120 670730152367
ptr            f0ffff80c2e40000 0 1 0x00000001 0x000000ff 0x000000ff 0x000000ff
&lt;ffffffee5e71ddb0&gt; __switch_to+0x1a8/0x2d4
&lt;ffffffee5e71e604&gt; __schedule+0x684/0xa98
&lt;ffffffee5e71ea60&gt; schedule+0x48/0xc8
&lt;ffffffee5e725f78&gt; schedule_timeout+0x48/0x170
&lt;ffffffee5e71fb74&gt; do_wait_for_common+0x108/0x1b0
&lt;ffffffee5e71efe0&gt; wait_for_completion+0x44/0x60
&lt;ffffffee5d6de968&gt; __flush_work+0x39c/0x424
&lt;ffffffee5d6decc0&gt; __cancel_work_sync+0xd8/0x208
&lt;ffffffee5d6dee2c&gt; cancel_delayed_work_sync+0x14/0x28
&lt;ffffffee5e2551b8&gt; __ufshcd_wl_suspend+0x19c/0x480
&lt;ffffffee5e255fb8&gt; ufshcd_wl_runtime_suspend+0x3c/0x1d4
&lt;ffffffee5dffd80c&gt; scsi_runtime_suspend+0x78/0xc8
&lt;ffffffee5df93580&gt; __rpm_callback+0x94/0x3e0
&lt;ffffffee5df90b0c&gt; rpm_suspend+0x2d4/0x65c
&lt;ffffffee5df91448&gt; __pm_runtime_suspend+0x80/0x114
&lt;ffffffee5dffd95c&gt; scsi_runtime_idle+0x38/0x6c
&lt;ffffffee5df912f4&gt; rpm_idle+0x264/0x338
&lt;ffffffee5df90f14&gt; __pm_runtime_idle+0x80/0x110
&lt;ffffffee5e24ce44&gt; ufshcd_rtc_work+0x128/0x1e4
&lt;ffffffee5d6e3a40&gt; process_one_work+0x26c/0x650
&lt;ffffffee5d6e65c8&gt; worker_thread+0x260/0x3d8
&lt;ffffffee5d6edec8&gt; kthread+0x110/0x134
&lt;ffffffee5d616b18&gt; ret_from_fork+0x10/0x20

Skip updating RTC if RPM state is not RPM_ACTIVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44953/">CVE-2024-44953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44953">CVE-2024-44953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230168">SUSE bug 1230168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: line6: Fix racy access to midibuf

There can be concurrent accesses to line6 midibuf from both the URB
completion callback and the rawmidi API access.  This could be a cause
of KMSAN warning triggered by syzkaller below (so put as reported-by
here).

This patch protects the midibuf call of the former code path with a
spinlock for avoiding the possible races.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230176">SUSE bug 1230176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44955" ref_url="https://www.suse.com/security/cve/CVE-2024-44955" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Don't refer to dc_sink in is_dsc_need_re_compute

[Why]
When unplug one of monitors connected after mst hub, encounter null pointer dereference.

It's due to dc_sink get released immediately in early_unregister() or detect_ctx(). When
commit new state which directly referring to info stored in dc_sink will cause null pointer
dereference.

[how]
Remove redundant checking condition. Relevant condition should already be covered by checking
if dsc_aux is null or not. Also reset dsc_aux to NULL when the connector is disconnected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44955/">CVE-2024-44955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44955">CVE-2024-44955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230177">SUSE bug 1230177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44956" ref_url="https://www.suse.com/security/cve/CVE-2024-44956" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/preempt_fence: enlarge the fence critical section

It is really easy to introduce subtle deadlocks in
preempt_fence_work_func() since we operate on single global ordered-wq
for signalling our preempt fences behind the scenes, so even though we
signal a particular fence, everything in the callback should be in the
fence critical section, since blocking in the callback will prevent
other published fences from signalling. If we enlarge the fence critical
section to cover the entire callback, then lockdep should be able to
understand this better, and complain if we grab a sensitive lock like
vm-&gt;lock, which is also held when waiting on preempt fences.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44956/">CVE-2024-44956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44956">CVE-2024-44956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230172">SUSE bug 1230172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44957</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44957" ref_url="https://www.suse.com/security/cve/CVE-2024-44957" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen: privcmd: Switch from mutex to spinlock for irqfds

irqfd_wakeup() gets EPOLLHUP, when it is called by
eventfd_release() by way of wake_up_poll(&amp;ctx-&gt;wqh, EPOLLHUP), which
gets called under spin_lock_irqsave(). We can't use a mutex here as it
will lead to a deadlock.

Fix it by switching over to a spin lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44957/">CVE-2024-44957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44957">CVE-2024-44957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230187">SUSE bug 1230187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44959</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44959" ref_url="https://www.suse.com/security/cve/CVE-2024-44959" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracefs: Use generic inode RCU for synchronizing freeing

With structure layout randomization enabled for 'struct inode' we need to
avoid overlapping any of the RCU-used / initialized-only-once members,
e.g. i_lru or i_sb_list to not corrupt related list traversals when making
use of the rcu_head.

For an unlucky structure layout of 'struct inode' we may end up with the
following splat when running the ftrace selftests:

[&lt;...&gt;] list_del corruption, ffff888103ee2cb0-&gt;next (tracefs_inode_cache+0x0/0x4e0 [slab object]) is NULL (prev is tracefs_inode_cache+0x78/0x4e0 [slab object])
[&lt;...&gt;] ------------[ cut here ]------------
[&lt;...&gt;] kernel BUG at lib/list_debug.c:54!
[&lt;...&gt;] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[&lt;...&gt;] CPU: 3 PID: 2550 Comm: mount Tainted: G                 N  6.8.12-grsec+ #122 ed2f536ca62f28b087b90e3cc906a8d25b3ddc65
[&lt;...&gt;] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
[&lt;...&gt;] RIP: 0010:[&lt;ffffffff84656018&gt;] __list_del_entry_valid_or_report+0x138/0x3e0
[&lt;...&gt;] Code: 48 b8 99 fb 65 f2 ff ff ff ff e9 03 5c d9 fc cc 48 b8 99 fb 65 f2 ff ff ff ff e9 33 5a d9 fc cc 48 b8 99 fb 65 f2 ff ff ff ff &lt;0f&gt; 0b 4c 89 e9 48 89 ea 48 89 ee 48 c7 c7 60 8f dd 89 31 c0 e8 2f
[&lt;...&gt;] RSP: 0018:fffffe80416afaf0 EFLAGS: 00010283
[&lt;...&gt;] RAX: 0000000000000098 RBX: ffff888103ee2cb0 RCX: 0000000000000000
[&lt;...&gt;] RDX: ffffffff84655fe8 RSI: ffffffff89dd8b60 RDI: 0000000000000001
[&lt;...&gt;] RBP: ffff888103ee2cb0 R08: 0000000000000001 R09: fffffbd0082d5f25
[&lt;...&gt;] R10: fffffe80416af92f R11: 0000000000000001 R12: fdf99c16731d9b6d
[&lt;...&gt;] R13: 0000000000000000 R14: ffff88819ad4b8b8 R15: 0000000000000000
[&lt;...&gt;] RBX: tracefs_inode_cache+0x0/0x4e0 [slab object]
[&lt;...&gt;] RDX: __list_del_entry_valid_or_report+0x108/0x3e0
[&lt;...&gt;] RSI: __func__.47+0x4340/0x4400
[&lt;...&gt;] RBP: tracefs_inode_cache+0x0/0x4e0 [slab object]
[&lt;...&gt;] RSP: process kstack fffffe80416afaf0+0x7af0/0x8000 [mount 2550 2550]
[&lt;...&gt;] R09: kasan shadow of process kstack fffffe80416af928+0x7928/0x8000 [mount 2550 2550]
[&lt;...&gt;] R10: process kstack fffffe80416af92f+0x792f/0x8000 [mount 2550 2550]
[&lt;...&gt;] R14: tracefs_inode_cache+0x78/0x4e0 [slab object]
[&lt;...&gt;] FS:  00006dcb380c1840(0000) GS:ffff8881e0600000(0000) knlGS:0000000000000000
[&lt;...&gt;] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[&lt;...&gt;] CR2: 000076ab72b30e84 CR3: 000000000b088004 CR4: 0000000000360ef0 shadow CR4: 0000000000360ef0
[&lt;...&gt;] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[&lt;...&gt;] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[&lt;...&gt;] ASID: 0003
[&lt;...&gt;] Stack:
[&lt;...&gt;]  ffffffff818a2315 00000000f5c856ee ffffffff896f1840 ffff888103ee2cb0
[&lt;...&gt;]  ffff88812b6b9750 0000000079d714b6 fffffbfff1e9280b ffffffff8f49405f
[&lt;...&gt;]  0000000000000001 0000000000000000 ffff888104457280 ffffffff8248b392
[&lt;...&gt;] Call Trace:
[&lt;...&gt;]  &lt;TASK&gt;
[&lt;...&gt;]  [&lt;ffffffff818a2315&gt;] ? lock_release+0x175/0x380 fffffe80416afaf0
[&lt;...&gt;]  [&lt;ffffffff8248b392&gt;] list_lru_del+0x152/0x740 fffffe80416afb48
[&lt;...&gt;]  [&lt;ffffffff8248ba93&gt;] list_lru_del_obj+0x113/0x280 fffffe80416afb88
[&lt;...&gt;]  [&lt;ffffffff8940fd19&gt;] ? _atomic_dec_and_lock+0x119/0x200 fffffe80416afb90
[&lt;...&gt;]  [&lt;ffffffff8295b244&gt;] iput_final+0x1c4/0x9a0 fffffe80416afbb8
[&lt;...&gt;]  [&lt;ffffffff8293a52b&gt;] dentry_unlink_inode+0x44b/0xaa0 fffffe80416afbf8
[&lt;...&gt;]  [&lt;ffffffff8293fefc&gt;] __dentry_kill+0x23c/0xf00 fffffe80416afc40
[&lt;...&gt;]  [&lt;ffffffff8953a85f&gt;] ? __this_cpu_preempt_check+0x1f/0xa0 fffffe80416afc48
[&lt;...&gt;]  [&lt;ffffffff82949ce5&gt;] ? shrink_dentry_list+0x1c5/0x760 fffffe80416afc70
[&lt;...&gt;]  [&lt;ffffffff82949b71&gt;] ? shrink_dentry_list+0x51/0x760 fffffe80416afc78
[&lt;...&gt;]  [&lt;ffffffff82949da8&gt;] shrink_dentry_list+0x288/0x760 fffffe80416afc80
[&lt;...&gt;]  [&lt;ffffffff8294ae75&gt;] shrink_dcache_sb+0x155/0x420 fffffe80416afcc8
[&lt;...&gt;]  [&lt;ffffffff8953a7c3&gt;] ? debug_smp_processor_id+0x23/0xa0 fffffe80416afce0
[&lt;...&gt;]  [&lt;ffffffff8294ad20&gt;] ? do_one_tre
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44959/">CVE-2024-44959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44959">CVE-2024-44959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230188">SUSE bug 1230188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44961" ref_url="https://www.suse.com/security/cve/CVE-2024-44961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Forward soft recovery errors to userspace

As we discussed before[1], soft recovery should be
forwarded to userspace, or we can get into a really
bad state where apps will keep submitting hanging
command buffers cascading us to a hard reset.

1: https://lore.kernel.org/all/bf23d5ed-9a6b-43e7-84ee-8cbfd0d60f18@froggi.es/
(cherry picked from commit 434967aadbbbe3ad9103cc29e9a327de20fdba01)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44961/">CVE-2024-44961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44961">CVE-2024-44961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230207">SUSE bug 1230207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44962</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44962" ref_url="https://www.suse.com/security/cve/CVE-2024-44962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloading

When unload the btnxpuart driver, its associated timer will be deleted.
If the timer happens to be modified at this moment, it leads to the
kernel call this timer even after the driver unloaded, resulting in
kernel panic.
Use timer_shutdown_sync() instead of del_timer_sync() to prevent rearming.

panic log:
  Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP
  Modules linked in: algif_hash algif_skcipher af_alg moal(O) mlan(O) crct10dif_ce polyval_ce polyval_generic   snd_soc_imx_card snd_soc_fsl_asoc_card snd_soc_imx_audmux mxc_jpeg_encdec v4l2_jpeg snd_soc_wm8962 snd_soc_fsl_micfil   snd_soc_fsl_sai flexcan snd_soc_fsl_utils ap130x rpmsg_ctrl imx_pcm_dma can_dev rpmsg_char pwm_fan fuse [last unloaded:   btnxpuart]
  CPU: 5 PID: 723 Comm: memtester Tainted: G           O       6.6.23-lts-next-06207-g4aef2658ac28 #1
  Hardware name: NXP i.MX95 19X19 board (DT)
  pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : 0xffff80007a2cf464
  lr : call_timer_fn.isra.0+0x24/0x80
...
  Call trace:
   0xffff80007a2cf464
   __run_timers+0x234/0x280
   run_timer_softirq+0x20/0x40
   __do_softirq+0x100/0x26c
   ____do_softirq+0x10/0x1c
   call_on_irq_stack+0x24/0x4c
   do_softirq_own_stack+0x1c/0x2c
   irq_exit_rcu+0xc0/0xdc
   el0_interrupt+0x54/0xd8
   __el0_irq_handler_common+0x18/0x24
   el0t_64_irq_handler+0x10/0x1c
   el0t_64_irq+0x190/0x194
  Code: ???????? ???????? ???????? ???????? (????????)
  ---[ end trace 0000000000000000 ]---
  Kernel panic - not syncing: Oops: Fatal exception in interrupt
  SMP: stopping secondary CPUs
  Kernel Offset: disabled
  CPU features: 0x0,c0000000,40028143,1000721b
  Memory Limit: none
  ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44962/">CVE-2024-44962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44962">CVE-2024-44962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230213">SUSE bug 1230213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leaks and crashes while performing a soft reset

The second tagged commit introduced a UAF, as it removed restoring
q_vector-&gt;vport pointers after reinitializating the structures.
This is due to that all queue allocation functions are performed here
with the new temporary vport structure and those functions rewrite
the backpointers to the vport. Then, this new struct is freed and
the pointers start leading to nowhere.

But generally speaking, the current logic is very fragile. It claims
to be more reliable when the system is low on memory, but in fact, it
consumes two times more memory as at the moment of running this
function, there are two vports allocated with their queues and vectors.
Moreover, it claims to prevent the driver from running into "bad state",
but in fact, any error during the rebuild leaves the old vport in the
partially allocated state.
Finally, if the interface is down when the function is called, it always
allocates a new queue set, but when the user decides to enable the
interface later on, vport_open() allocates them once again, IOW there's
a clear memory leak here.

Just don't allocate a new queue set when performing a reset, that solves
crashes and memory leaks. Readd the old queue number and reopen the
interface on rollback - that solves limbo states when the device is left
disabled and/or without HW queues enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44965" ref_url="https://www.suse.com/security/cve/CVE-2024-44965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm: Fix pti_clone_pgtable() alignment assumption

Guenter reported dodgy crashes on an i386-nosmp build using GCC-11
that had the form of endless traps until entry stack exhaust and then
#DF from the stack guard.

It turned out that pti_clone_pgtable() had alignment assumptions on
the start address, notably it hard assumes start is PMD aligned. This
is true on x86_64, but very much not true on i386.

These assumptions can cause the end condition to malfunction, leading
to a 'short' clone. Guess what happens when the user mapping has a
short copy of the entry text?

Use the correct increment form for addr to avoid alignment
assumptions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44965/">CVE-2024-44965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44965">CVE-2024-44965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230221">SUSE bug 1230221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44966</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44966" ref_url="https://www.suse.com/security/cve/CVE-2024-44966" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binfmt_flat: Fix corruption when not offsetting data start

Commit 04d82a6d0881 ("binfmt_flat: allow not offsetting data start")
introduced a RISC-V specific variant of the FLAT format which does
not allocate any space for the (obsolete) array of shared library
pointers. However, it did not disable the code which initializes the
array, resulting in the corruption of sizeof(long) bytes before the DATA
segment, generally the end of the TEXT segment.

Introduce MAX_SHARED_LIBS_UPDATE which depends on the state of
CONFIG_BINFMT_FLAT_NO_DATA_START_OFFSET to guard the initialization of
the shared library pointer region so that it will only be initialized
if space is reserved for it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-44966/">CVE-2024-44966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44966">CVE-2024-44966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230223">SUSE bug 1230223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44967</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mgag200: Bind I2C lifetime to DRM device

Managed cleanup with devm_add_action_or_reset() will release the I2C
adapter when the underlying Linux device goes away. But the connector
still refers to it, so this cleanup leaves behind a stale pointer
in struct drm_connector.ddc.

Bind the lifetime of the I2C adapter to the connector's lifetime by
using DRM's managed release. When the DRM device goes away (after
the Linux device) DRM will first clean up the connector and then
clean up the I2C adapter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230224">SUSE bug 1230224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44968" ref_url="https://www.suse.com/security/cve/CVE-2024-44968" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tick/broadcast: Move per CPU pointer access into the atomic section

The recent fix for making the take over of the broadcast timer more
reliable retrieves a per CPU pointer in preemptible context.

This went unnoticed as compilers hoist the access into the non-preemptible
region where the pointer is actually used. But of course it's valid that
the compiler keeps it at the place where the code puts it which rightfully
triggers:

  BUG: using smp_processor_id() in preemptible [00000000] code:
       caller is hotplug_cpu__broadcast_tick_pull+0x1c/0xc0

Move it to the actual usage site which is in a non-preemptible region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44968/">CVE-2024-44968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44968">CVE-2024-44968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230199">SUSE bug 1230199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Prevent release of buffer in I/O

When a task waiting for completion of a Store Data operation is
interrupted, an attempt is made to halt this operation. If this attempt
fails due to a hardware or firmware problem, there is a chance that the
SCLP facility might store data into buffers referenced by the original
operation at a later time.

Handle this situation by not releasing the referenced data buffers if
the halt attempt fails. For current use cases, this might result in a
leak of few pages of memory in case of a rare hardware/firmware
malfunction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230200">SUSE bug 1230200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink

When all the strides in a WQE have been consumed, the WQE is unlinked
from the WQ linked list (mlx5_wq_ll_pop()). For SHAMPO, it is possible
to receive CQEs with 0 consumed strides for the same WQE even after the
WQE is fully consumed and unlinked. This triggers an additional unlink
for the same wqe which corrupts the linked list.

Fix this scenario by accepting 0 sized consumed strides without
unlinking the WQE again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230209">SUSE bug 1230209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register()

bcm_sf2_mdio_register() calls of_phy_find_device() and then
phy_device_remove() in a loop to remove existing PHY devices.
of_phy_find_device() eventually calls bus_find_device(), which calls
get_device() on the returned struct device * to increment the refcount.
The current implementation does not decrement the refcount, which causes
memory leak.

This commit adds the missing phy_device_free() call to decrement the
refcount via put_device() to balance the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230211">SUSE bug 1230211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44972" ref_url="https://www.suse.com/security/cve/CVE-2024-44972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not clear page dirty inside extent_write_locked_range()

[BUG]
For subpage + zoned case, the following workload can lead to rsv data
leak at unmount time:

  # mkfs.btrfs -f -s 4k $dev
  # mount $dev $mnt
  # fsstress -w -n 8 -d $mnt -s 1709539240
  0/0: fiemap - no filename
  0/1: copyrange read - no filename
  0/2: write - no filename
  0/3: rename - no source filename
  0/4: creat f0 x:0 0 0
  0/4: creat add id=0,parent=-1
  0/5: writev f0[259 1 0 0 0 0] [778052,113,965] 0
  0/6: ioctl(FIEMAP) f0[259 1 0 0 224 887097] [1294220,2291618343991484791,0x10000] -1
  0/7: dwrite - xfsctl(XFS_IOC_DIOINFO) f0[259 1 0 0 224 887097] return 25, fallback to stat()
  0/7: dwrite f0[259 1 0 0 224 887097] [696320,102400] 0
  # umount $mnt

The dmesg includes the following rsv leak detection warning (all call
trace skipped):

  ------------[ cut here ]------------
  WARNING: CPU: 2 PID: 4528 at fs/btrfs/inode.c:8653 btrfs_destroy_inode+0x1e0/0x200 [btrfs]
  ---[ end trace 0000000000000000 ]---
  ------------[ cut here ]------------
  WARNING: CPU: 2 PID: 4528 at fs/btrfs/inode.c:8654 btrfs_destroy_inode+0x1a8/0x200 [btrfs]
  ---[ end trace 0000000000000000 ]---
  ------------[ cut here ]------------
  WARNING: CPU: 2 PID: 4528 at fs/btrfs/inode.c:8660 btrfs_destroy_inode+0x1a0/0x200 [btrfs]
  ---[ end trace 0000000000000000 ]---
  BTRFS info (device sda): last unmount of filesystem 1b4abba9-de34-4f07-9e7f-157cf12a18d6
  ------------[ cut here ]------------
  WARNING: CPU: 3 PID: 4528 at fs/btrfs/block-group.c:4434 btrfs_free_block_groups+0x338/0x500 [btrfs]
  ---[ end trace 0000000000000000 ]---
  BTRFS info (device sda): space_info DATA has 268218368 free, is not full
  BTRFS info (device sda): space_info total=268435456, used=204800, pinned=0, reserved=0, may_use=12288, readonly=0 zone_unusable=0
  BTRFS info (device sda): global_block_rsv: size 0 reserved 0
  BTRFS info (device sda): trans_block_rsv: size 0 reserved 0
  BTRFS info (device sda): chunk_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_refs_rsv: size 0 reserved 0
  ------------[ cut here ]------------
  WARNING: CPU: 3 PID: 4528 at fs/btrfs/block-group.c:4434 btrfs_free_block_groups+0x338/0x500 [btrfs]
  ---[ end trace 0000000000000000 ]---
  BTRFS info (device sda): space_info METADATA has 267796480 free, is not full
  BTRFS info (device sda): space_info total=268435456, used=131072, pinned=0, reserved=0, may_use=262144, readonly=0 zone_unusable=245760
  BTRFS info (device sda): global_block_rsv: size 0 reserved 0
  BTRFS info (device sda): trans_block_rsv: size 0 reserved 0
  BTRFS info (device sda): chunk_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_block_rsv: size 0 reserved 0
  BTRFS info (device sda): delayed_refs_rsv: size 0 reserved 0

Above $dev is a tcmu-runner emulated zoned HDD, which has a max zone
append size of 64K, and the system has 64K page size.

[CAUSE]
I have added several trace_printk() to show the events (header skipped):

  &gt; btrfs_dirty_pages: r/i=5/259 dirty start=774144 len=114688
  &gt; btrfs_dirty_pages: r/i=5/259 dirty part of page=720896 off_in_page=53248 len_in_page=12288
  &gt; btrfs_dirty_pages: r/i=5/259 dirty part of page=786432 off_in_page=0 len_in_page=65536
  &gt; btrfs_dirty_pages: r/i=5/259 dirty part of page=851968 off_in_page=0 len_in_page=36864

The above lines show our buffered write has dirtied 3 pages of inode
259 of root 5:

  704K             768K              832K              896K
  I           |////I/////////////////I///////////|     I
              756K                               868K

  |///| is the dirtied range using subpage bitmaps. and 'I' is the page
  boundary.

  Meanwhile all three pages (704K, 768K, 832K) have their PageDirty
  flag set.

  &gt; btrfs_direct_write: r/i=5/259 start dio filepos=696320 len=102400

Then direct IO writ
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2024-10-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44972/">CVE-2024-44972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44972">CVE-2024-44972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230212">SUSE bug 1230212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44973" ref_url="https://www.suse.com/security/cve/CVE-2024-44973" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: do not call do_slab_free for kfence object

In 782f8906f805 the freeing of kfence objects was moved from deep
inside do_slab_free to the wrapper functions outside. This is a nice
change, but unfortunately it missed one spot in __kmem_cache_free_bulk.

This results in a crash like this:

BUG skbuff_head_cache (Tainted: G S  B       E     ): Padding overwritten. 0xffff88907fea0f00-0xffff88907fea0fff @offset=3840

slab_err (mm/slub.c:1129)
free_to_partial_list (mm/slub.c:? mm/slub.c:4036)
slab_pad_check (mm/slub.c:864 mm/slub.c:1290)
check_slab (mm/slub.c:?)
free_to_partial_list (mm/slub.c:3171 mm/slub.c:4036)
kmem_cache_alloc_bulk (mm/slub.c:? mm/slub.c:4495 mm/slub.c:4586 mm/slub.c:4635)
napi_build_skb (net/core/skbuff.c:348 net/core/skbuff.c:527 net/core/skbuff.c:549)

All the other callers to do_slab_free appear to be ok.

Add a kfence_free check in __kmem_cache_free_bulk to avoid the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44973/">CVE-2024-44973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44973">CVE-2024-44973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230214">SUSE bug 1230214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44974" ref_url="https://www.suse.com/security/cve/CVE-2024-44974" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: avoid possible UaF when selecting endp

select_local_address() and select_signal_address() both select an
endpoint entry from the list inside an RCU protected section, but return
a reference to it, to be read later on. If the entry is dereferenced
after the RCU unlock, reading info could cause a Use-after-Free.

A simple solution is to copy the required info while inside the RCU
protected section to avoid any risk of UaF later. The address ID might
need to be modified later to handle the ID0 case later, so a copy seems
OK to deal with.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-44974/">CVE-2024-44974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44974">CVE-2024-44974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230235">SUSE bug 1230235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44975</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44975" ref_url="https://www.suse.com/security/cve/CVE-2024-44975" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: fix panic caused by partcmd_update

We find a bug as below:
BUG: unable to handle page fault for address: 00000003
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 358 Comm: bash Tainted: G        W I        6.6.0-10893-g60d6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/4
RIP: 0010:partition_sched_domains_locked+0x483/0x600
Code: 01 48 85 d2 74 0d 48 83 05 29 3f f8 03 01 f3 48 0f bc c2 89 c0 48 9
RSP: 0018:ffffc90000fdbc58 EFLAGS: 00000202
RAX: 0000000100000003 RBX: ffff888100b3dfa0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000002fe80
RBP: ffff888100b3dfb0 R08: 0000000000000001 R09: 0000000000000000
R10: ffffc90000fdbcb0 R11: 0000000000000004 R12: 0000000000000002
R13: ffff888100a92b48 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f44a5425740(0000) GS:ffff888237d80000(0000) knlGS:0000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000100030973 CR3: 000000010722c000 CR4: 00000000000006e0
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x8c/0xa0
 ? __die_body+0x23/0xa0
 ? __die+0x3a/0x50
 ? page_fault_oops+0x1d2/0x5c0
 ? partition_sched_domains_locked+0x483/0x600
 ? search_module_extables+0x2a/0xb0
 ? search_exception_tables+0x67/0x90
 ? kernelmode_fixup_or_oops+0x144/0x1b0
 ? __bad_area_nosemaphore+0x211/0x360
 ? up_read+0x3b/0x50
 ? bad_area_nosemaphore+0x1a/0x30
 ? exc_page_fault+0x890/0xd90
 ? __lock_acquire.constprop.0+0x24f/0x8d0
 ? __lock_acquire.constprop.0+0x24f/0x8d0
 ? asm_exc_page_fault+0x26/0x30
 ? partition_sched_domains_locked+0x483/0x600
 ? partition_sched_domains_locked+0xf0/0x600
 rebuild_sched_domains_locked+0x806/0xdc0
 update_partition_sd_lb+0x118/0x130
 cpuset_write_resmask+0xffc/0x1420
 cgroup_file_write+0xb2/0x290
 kernfs_fop_write_iter+0x194/0x290
 new_sync_write+0xeb/0x160
 vfs_write+0x16f/0x1d0
 ksys_write+0x81/0x180
 __x64_sys_write+0x21/0x30
 x64_sys_call+0x2f25/0x4630
 do_syscall_64+0x44/0xb0
 entry_SYSCALL_64_after_hwframe+0x78/0xe2
RIP: 0033:0x7f44a553c887

It can be reproduced with cammands:
cd /sys/fs/cgroup/
mkdir test
cd test/
echo +cpuset &gt; ../cgroup.subtree_control
echo root &gt; cpuset.cpus.partition
cat /sys/fs/cgroup/cpuset.cpus.effective
0-3
echo 0-3 &gt; cpuset.cpus // taking away all cpus from root

This issue is caused by the incorrect rebuilding of scheduling domains.
In this scenario, test/cpuset.cpus.partition should be an invalid root
and should not trigger the rebuilding of scheduling domains. When calling
update_parent_effective_cpumask with partcmd_update, if newmask is not
null, it should recheck newmask whether there are cpus is available
for parect/cs that has tasks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-04"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="8.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44975/">CVE-2024-44975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44975">CVE-2024-44975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230237">SUSE bug 1230237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44976" ref_url="https://www.suse.com/security/cve/CVE-2024-44976" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: pata_macio: Fix DMA table overflow

Kolbj?rn and Jon?š reported that their 32-bit PowerMacs were crashing
in pata-macio since commit 09fe2bfa6b83 ("ata: pata_macio: Fix
max_segment_size with PAGE_SIZE == 64K").

For example:

  kernel BUG at drivers/ata/pata_macio.c:544!
  Oops: Exception in kernel mode, sig: 5 [#1]
  BE PAGE_SIZE=4K MMU=Hash SMP NR_CPUS=2 DEBUG_PAGEALLOC PowerMac
  ...
  NIP pata_macio_qc_prep+0xf4/0x190
  LR  pata_macio_qc_prep+0xfc/0x190
  Call Trace:
    0xc1421660 (unreliable)
    ata_qc_issue+0x14c/0x2d4
    __ata_scsi_queuecmd+0x200/0x53c
    ata_scsi_queuecmd+0x50/0xe0
    scsi_queue_rq+0x788/0xb1c
    __blk_mq_issue_directly+0x58/0xf4
    blk_mq_plug_issue_direct+0x8c/0x1b4
    blk_mq_flush_plug_list.part.0+0x584/0x5e0
    __blk_flush_plug+0xf8/0x194
    __submit_bio+0x1b8/0x2e0
    submit_bio_noacct_nocheck+0x230/0x304
    btrfs_work_helper+0x200/0x338
    process_one_work+0x1a8/0x338
    worker_thread+0x364/0x4c0
    kthread+0x100/0x104
    start_kernel_thread+0x10/0x14

That commit increased max_segment_size to 64KB, with the justification
that the SCSI core was already using that size when PAGE_SIZE == 64KB,
and that there was existing logic to split over-sized requests.

However with a sufficiently large request, the splitting logic causes
each sg to be split into two commands in the DMA table, leading to
overflow of the DMA table, triggering the BUG_ON().

With default settings the bug doesn't trigger, because the request size
is limited by max_sectors_kb == 1280, however max_sectors_kb can be
increased, and apparently some distros do that by default using udev
rules.

Fix the bug for 4KB kernels by reverting to the old max_segment_size.

For 64KB kernels the sg_tablesize needs to be halved, to allow for the
possibility that each sg will be split into two.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44976/">CVE-2024-44976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44976">CVE-2024-44976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230203">SUSE bug 1230203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Validate TA binary size

Add TA binary size validation to avoid OOB write.

(cherry picked from commit c0a04e3570d72aaf090962156ad085e37c62e442)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230217">SUSE bug 1230217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44978" ref_url="https://www.suse.com/security/cve/CVE-2024-44978" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Free job before xe_exec_queue_put

Free job depends on job-&gt;vm being valid, the last xe_exec_queue_put can
destroy the VM. Prevent UAF by freeing job before xe_exec_queue_put.

(cherry picked from commit 32a42c93b74c8ca6d0915ea3eba21bceff53042f)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44978/">CVE-2024-44978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44978">CVE-2024-44978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230218">SUSE bug 1230218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44979" ref_url="https://www.suse.com/security/cve/CVE-2024-44979" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix missing workqueue destroy in xe_gt_pagefault

On driver reload we never free up the memory for the pagefault and
access counter workqueues. Add those destroy calls here.

(cherry picked from commit 7586fc52b14e0b8edd0d1f8a434e0de2078b7b2b)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44979/">CVE-2024-44979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44979">CVE-2024-44979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230202">SUSE bug 1230202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44980" ref_url="https://www.suse.com/security/cve/CVE-2024-44980" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix opregion leak

Being part o the display, ideally the setup and cleanup would be done by
display itself. However this is a bigger refactor that needs to be done
on both i915 and xe. For now, just fix the leak:

unreferenced object 0xffff8881a0300008 (size 192):
  comm "modprobe", pid 4354, jiffies 4295647021
  hex dump (first 32 bytes):
    00 00 87 27 81 88 ff ff 18 80 9b 00 00 c9 ff ff  ...'............
    18 81 9b 00 00 c9 ff ff 00 00 00 00 00 00 00 00  ................
  backtrace (crc 99260e31):
    [&lt;ffffffff823ce65b&gt;] kmemleak_alloc+0x4b/0x80
    [&lt;ffffffff81493be2&gt;] kmalloc_trace_noprof+0x312/0x3d0
    [&lt;ffffffffa1345679&gt;] intel_opregion_setup+0x89/0x700 [xe]
    [&lt;ffffffffa125bfaf&gt;] xe_display_init_noirq+0x2f/0x90 [xe]
    [&lt;ffffffffa1199ec3&gt;] xe_device_probe+0x7a3/0xbf0 [xe]
    [&lt;ffffffffa11f3713&gt;] xe_pci_probe+0x333/0x5b0 [xe]
    [&lt;ffffffff81af6be8&gt;] local_pci_probe+0x48/0xb0
    [&lt;ffffffff81af8778&gt;] pci_device_probe+0xc8/0x280
    [&lt;ffffffff81d09048&gt;] really_probe+0xf8/0x390
    [&lt;ffffffff81d0937a&gt;] __driver_probe_device+0x8a/0x170
    [&lt;ffffffff81d09503&gt;] driver_probe_device+0x23/0xb0
    [&lt;ffffffff81d097b7&gt;] __driver_attach+0xc7/0x190
    [&lt;ffffffff81d0628d&gt;] bus_for_each_dev+0x7d/0xd0
    [&lt;ffffffff81d0851e&gt;] driver_attach+0x1e/0x30
    [&lt;ffffffff81d07ac7&gt;] bus_add_driver+0x117/0x250

(cherry picked from commit 6f4e43a2f771b737d991142ec4f6d4b7ff31fbb4)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44980/">CVE-2024-44980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44980">CVE-2024-44980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230219">SUSE bug 1230219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44981" ref_url="https://www.suse.com/security/cve/CVE-2024-44981" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Fix UBSAN 'subtraction overflow' error in shift_and_mask()

UBSAN reports the following 'subtraction overflow' error when booting
in a virtual machine on Android:

 | Internal error: UBSAN: integer subtraction overflow: 00000000f2005515 [#1] PREEMPT SMP
 | Modules linked in:
 | CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.10.0-00006-g3cbe9e5abd46-dirty #4
 | Hardware name: linux,dummy-virt (DT)
 | pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 | pc : cancel_delayed_work+0x34/0x44
 | lr : cancel_delayed_work+0x2c/0x44
 | sp : ffff80008002ba60
 | x29: ffff80008002ba60 x28: 0000000000000000 x27: 0000000000000000
 | x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
 | x23: 0000000000000000 x22: 0000000000000000 x21: ffff1f65014cd3c0
 | x20: ffffc0e84c9d0da0 x19: ffffc0e84cab3558 x18: ffff800080009058
 | x17: 00000000247ee1f8 x16: 00000000247ee1f8 x15: 00000000bdcb279d
 | x14: 0000000000000001 x13: 0000000000000075 x12: 00000a0000000000
 | x11: ffff1f6501499018 x10: 00984901651fffff x9 : ffff5e7cc35af000
 | x8 : 0000000000000001 x7 : 3d4d455453595342 x6 : 000000004e514553
 | x5 : ffff1f6501499265 x4 : ffff1f650ff60b10 x3 : 0000000000000620
 | x2 : ffff80008002ba78 x1 : 0000000000000000 x0 : 0000000000000000
 | Call trace:
 |  cancel_delayed_work+0x34/0x44
 |  deferred_probe_extend_timeout+0x20/0x70
 |  driver_register+0xa8/0x110
 |  __platform_driver_register+0x28/0x3c
 |  syscon_init+0x24/0x38
 |  do_one_initcall+0xe4/0x338
 |  do_initcall_level+0xac/0x178
 |  do_initcalls+0x5c/0xa0
 |  do_basic_setup+0x20/0x30
 |  kernel_init_freeable+0x8c/0xf8
 |  kernel_init+0x28/0x1b4
 |  ret_from_fork+0x10/0x20
 | Code: f9000fbf 97fffa2f 39400268 37100048 (d42aa2a0)
 | ---[ end trace 0000000000000000 ]---
 | Kernel panic - not syncing: UBSAN: integer subtraction overflow: Fatal exception

This is due to shift_and_mask() using a signed immediate to construct
the mask and being called with a shift of 31 (WORK_OFFQ_POOL_SHIFT) so
that it ends up decrementing from INT_MIN.

Use an unsigned constant '1U' to generate the mask in shift_and_mask().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-44981/">CVE-2024-44981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44981">CVE-2024-44981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230238">SUSE bug 1230238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails

If the dpu_format_populate_layout() fails, then FB is prepared, but not
cleaned up. This ends up leaking the pin_count on the GEM object and
causes a splat during DRM file closure:

msm_obj-&gt;pin_count
WARNING: CPU: 2 PID: 569 at drivers/gpu/drm/msm/msm_gem.c:121 update_lru_locked+0xc4/0xcc
[...]
Call trace:
 update_lru_locked+0xc4/0xcc
 put_pages+0xac/0x100
 msm_gem_free_object+0x138/0x180
 drm_gem_object_free+0x1c/0x30
 drm_gem_object_handle_put_unlocked+0x108/0x10c
 drm_gem_object_release_handle+0x58/0x70
 idr_for_each+0x68/0xec
 drm_gem_release+0x28/0x40
 drm_file_free+0x174/0x234
 drm_release+0xb0/0x160
 __fput+0xc0/0x2c8
 __fput_sync+0x50/0x5c
 __arm64_sys_close+0x38/0x7c
 invoke_syscall+0x48/0x118
 el0_svc_common.constprop.0+0x40/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x4c/0x120
 el0t_64_sync_handler+0x100/0x12c
 el0t_64_sync+0x190/0x194
irq event stamp: 129818
hardirqs last  enabled at (129817): [&lt;ffffa5f6d953fcc0&gt;] console_unlock+0x118/0x124
hardirqs last disabled at (129818): [&lt;ffffa5f6da7dcf04&gt;] el1_dbg+0x24/0x8c
softirqs last  enabled at (129808): [&lt;ffffa5f6d94afc18&gt;] handle_softirqs+0x4c8/0x4e8
softirqs last disabled at (129785): [&lt;ffffa5f6d94105e4&gt;] __do_softirq+0x14/0x20

Patchwork: https://patchwork.freedesktop.org/patch/600714/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230204">SUSE bug 1230204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44983" ref_url="https://www.suse.com/security/cve/CVE-2024-44983" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: validate vlan header

Ensure there is sufficient room to access the protocol field of the
VLAN header, validate it once before the flowtable lookup.

=====================================================
BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32
 nf_flow_offload_inet_hook+0x45a/0x5f0 net/netfilter/nf_flow_table_inet.c:32
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
 nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]
 nf_ingress net/core/dev.c:5440 [inline]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-12-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44983/">CVE-2024-44983 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44983">CVE-2024-44983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230239">SUSE bug 1230239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44984" ref_url="https://www.suse.com/security/cve/CVE-2024-44984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix double DMA unmapping for XDP_REDIRECT

Remove the dma_unmap_page_attrs() call in the driver's XDP_REDIRECT
code path.  This should have been removed when we let the page pool
handle the DMA mapping.  This bug causes the warning:

WARNING: CPU: 7 PID: 59 at drivers/iommu/dma-iommu.c:1198 iommu_dma_unmap_page+0xd5/0x100
CPU: 7 PID: 59 Comm: ksoftirqd/7 Tainted: G        W          6.8.0-1010-gcp #11-Ubuntu
Hardware name: Dell Inc. PowerEdge R7525/0PYVT1, BIOS 2.15.2 04/02/2024
RIP: 0010:iommu_dma_unmap_page+0xd5/0x100
Code: 89 ee 48 89 df e8 cb f2 69 ff 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff 45 31 c0 e9 ab 17 71 00 &lt;0f&gt; 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 31 d2 31 c9
RSP: 0018:ffffab1fc0597a48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff99ff838280c8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffab1fc0597a78 R08: 0000000000000002 R09: ffffab1fc0597c1c
R10: ffffab1fc0597cd3 R11: ffff99ffe375acd8 R12: 00000000e65b9000
R13: 0000000000000050 R14: 0000000000001000 R15: 0000000000000002
FS:  0000000000000000(0000) GS:ffff9a06efb80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000565c34c37210 CR3: 00000005c7e3e000 CR4: 0000000000350ef0
? show_regs+0x6d/0x80
? __warn+0x89/0x150
? iommu_dma_unmap_page+0xd5/0x100
? report_bug+0x16a/0x190
? handle_bug+0x51/0xa0
? exc_invalid_op+0x18/0x80
? iommu_dma_unmap_page+0xd5/0x100
? iommu_dma_unmap_page+0x35/0x100
dma_unmap_page_attrs+0x55/0x220
? bpf_prog_4d7e87c0d30db711_xdp_dispatcher+0x64/0x9f
bnxt_rx_xdp+0x237/0x520 [bnxt_en]
bnxt_rx_pkt+0x640/0xdd0 [bnxt_en]
__bnxt_poll_work+0x1a1/0x3d0 [bnxt_en]
bnxt_poll+0xaa/0x1e0 [bnxt_en]
__napi_poll+0x33/0x1e0
net_rx_action+0x18a/0x2f0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-12"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-44984/">CVE-2024-44984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44984">CVE-2024-44984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230240">SUSE bug 1230240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44985" ref_url="https://www.suse.com/security/cve/CVE-2024-44985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible UAF in ip6_xmit()

If skb_expand_head() returns NULL, skb has been freed
and the associated dst/idev could also have been freed.

We must use rcu_read_lock() to prevent a possible UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44985/">CVE-2024-44985 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44985">CVE-2024-44985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230206">SUSE bug 1230206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible UAF in ip6_finish_output2()

If skb_expand_head() returns NULL, skb has been freed
and associated dst/idev could also have been freed.

We need to hold rcu_read_lock() to make sure the dst and
associated idev are alive.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230230">SUSE bug 1230230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent UAF in ip6_send_skb()

syzbot reported an UAF in ip6_send_skb() [1]

After ip6_local_out() has returned, we no longer can safely
dereference rt, unless we hold rcu_read_lock().

A similar issue has been fixed in commit
a688caa34beb ("ipv6: take rcu lock in rawv6_send_hdrinc()")

Another potential issue in ip6_finish_output2() is handled in a
separate patch.

[1]
 BUG: KASAN: slab-use-after-free in ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964
Read of size 8 at addr ffff88806dde4858 by task syz.1.380/6530

CPU: 1 UID: 0 PID: 6530 Comm: syz.1.380 Not tainted 6.11.0-rc3-syzkaller-00306-gdf6cbc62cc9b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:93 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964
  rawv6_push_pending_frames+0x75c/0x9e0 net/ipv6/raw.c:588
  rawv6_sendmsg+0x19c7/0x23c0 net/ipv6/raw.c:926
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  sock_write_iter+0x2dd/0x400 net/socket.c:1160
 do_iter_readv_writev+0x60a/0x890
  vfs_writev+0x37c/0xbb0 fs/read_write.c:971
  do_writev+0x1b1/0x350 fs/read_write.c:1018
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f936bf79e79
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f936cd7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 00007f936c115f80 RCX: 00007f936bf79e79
RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000004
RBP: 00007f936bfe7916 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f936c115f80 R15: 00007fff2860a7a8
 &lt;/TASK&gt;

Allocated by task 6530:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  unpoison_slab_object mm/kasan/common.c:312 [inline]
  __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338
  kasan_slab_alloc include/linux/kasan.h:201 [inline]
  slab_post_alloc_hook mm/slub.c:3988 [inline]
  slab_alloc_node mm/slub.c:4037 [inline]
  kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4044
  dst_alloc+0x12b/0x190 net/core/dst.c:89
  ip6_blackhole_route+0x59/0x340 net/ipv6/route.c:2670
  make_blackhole net/xfrm/xfrm_policy.c:3120 [inline]
  xfrm_lookup_route+0xd1/0x1c0 net/xfrm/xfrm_policy.c:3313
  ip6_dst_lookup_flow+0x13e/0x180 net/ipv6/ip6_output.c:1257
  rawv6_sendmsg+0x1283/0x23c0 net/ipv6/raw.c:898
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
  ___sys_sendmsg net/socket.c:2651 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 45:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
  poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
  __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
  kasan_slab_free include/linux/kasan.h:184 [inline]
  slab_free_hook mm/slub.c:2252 [inline]
  slab_free mm/slub.c:4473 [inline]
  kmem_cache_free+0x145/0x350 mm/slub.c:4548
  dst_destroy+0x2ac/0x460 net/core/dst.c:124
  rcu_do_batch kernel/rcu/tree.c:2569 [inline]
  rcu_core+0xafd/0x1830 kernel/rcu/tree.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: mv88e6xxx: Fix out-of-bound access

If an ATU violation was caused by a CPU Load operation, the SPID could
be larger than DSA_MAX_PORTS (the size of mv88e6xxx_chip.ports[] array).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230192">SUSE bug 1230192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix xfrm real_dev null pointer dereference

We shouldn't set real_dev to NULL because packets can be in transit and
xfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume
real_dev is set.

 Example trace:
 kernel: BUG: unable to handle page fault for address: 0000000000001030
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: #PF: supervisor write access in kernel mode
 kernel: #PF: error_code(0x0002) - not-present page
 kernel: PGD 0 P4D 0
 kernel: Oops: 0002 [#1] PREEMPT SMP
 kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12
 kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
 kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 &lt;83&gt; 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:
 kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60
 kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00
 kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014
 kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000
 kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000
 kernel: FS:  00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die+0x1f/0x60
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ? page_fault_oops+0x142/0x4c0
 kernel:  ? do_user_addr_fault+0x65/0x670
 kernel:  ? kvm_read_and_reset_apf_flags+0x3b/0x50
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel:  ? exc_page_fault+0x7b/0x180
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? nsim_bpf_uninit+0x50/0x50 [netdevsim]
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel:  bond_ipsec_offload_ok+0x7b/0x90 [bonding]
 kernel:  xfrm_output+0x61/0x3b0
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ip_push_pending_frames+0x56/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230193">SUSE bug 1230193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix null pointer deref in bond_ipsec_offload_ok

We must check if there is an active slave before dereferencing the pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230194">SUSE bug 1230194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44991</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44991" ref_url="https://www.suse.com/security/cve/CVE-2024-44991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: prevent concurrent execution of tcp_sk_exit_batch

Its possible that two threads call tcp_sk_exit_batch() concurrently,
once from the cleanup_net workqueue, once from a task that failed to clone
a new netns.  In the latter case, error unwinding calls the exit handlers
in reverse order for the 'failed' netns.

tcp_sk_exit_batch() calls tcp_twsk_purge().
Problem is that since commit b099ce2602d8 ("net: Batch inet_twsk_purge"),
this function picks up twsk in any dying netns, not just the one passed
in via exit_batch list.

This means that the error unwind of setup_net() can "steal" and destroy
timewait sockets belonging to the exiting netns.

This allows the netns exit worker to proceed to call

WARN_ON_ONCE(!refcount_dec_and_test(&amp;net-&gt;ipv4.tcp_death_row.tw_refcount));

without the expected 1 -&gt; 0 transition, which then splats.

At same time, error unwind path that is also running inet_twsk_purge()
will splat as well:

WARNING: .. at lib/refcount.c:31 refcount_warn_saturate+0x1ed/0x210
...
 refcount_dec include/linux/refcount.h:351 [inline]
 inet_twsk_kill+0x758/0x9c0 net/ipv4/inet_timewait_sock.c:70
 inet_twsk_deschedule_put net/ipv4/inet_timewait_sock.c:221
 inet_twsk_purge+0x725/0x890 net/ipv4/inet_timewait_sock.c:304
 tcp_sk_exit_batch+0x1c/0x170 net/ipv4/tcp_ipv4.c:3522
 ops_exit_list+0x128/0x180 net/core/net_namespace.c:178
 setup_net+0x714/0xb40 net/core/net_namespace.c:375
 copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508
 create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110

... because refcount_dec() of tw_refcount unexpectedly dropped to 0.

This doesn't seem like an actual bug (no tw sockets got lost and I don't
see a use-after-free) but as erroneous trigger of debug check.

Add a mutex to force strict ordering: the task that calls tcp_twsk_purge()
blocks other task from doing final _dec_and_test before mutex-owner has
removed all tw sockets of dying netns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44991/">CVE-2024-44991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44991">CVE-2024-44991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230195">SUSE bug 1230195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44992" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44992" ref_url="https://www.suse.com/security/cve/CVE-2024-44992" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb/client: avoid possible NULL dereference in cifs_free_subrequest()

Clang static checker (scan-build) warning:
	cifsglob.h:line 890, column 3
	Access to field 'ops' results in a dereference of a null pointer.

Commit 519be989717c ("cifs: Add a tracepoint to track credits involved in
R/W requests") adds a check for 'rdata-&gt;server', and let clang throw this
warning about NULL dereference.

When 'rdata-&gt;credits.value != 0 &amp;&amp; rdata-&gt;server == NULL' happens,
add_credits_and_wake_if() will call rdata-&gt;server-&gt;ops-&gt;add_credits().
This will cause NULL dereference problem. Add a check for 'rdata-&gt;server'
to avoid NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44992/">CVE-2024-44992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44992">CVE-2024-44992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230196">SUSE bug 1230196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44993</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44993" ref_url="https://www.suse.com/security/cve/CVE-2024-44993" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Fix out-of-bounds read in `v3d_csd_job_run()`

When enabling UBSAN on Raspberry Pi 5, we get the following warning:

[  387.894977] UBSAN: array-index-out-of-bounds in drivers/gpu/drm/v3d/v3d_sched.c:320:3
[  387.903868] index 7 is out of range for type '__u32 [7]'
[  387.909692] CPU: 0 PID: 1207 Comm: kworker/u16:2 Tainted: G        WC         6.10.3-v8-16k-numa #151
[  387.919166] Hardware name: Raspberry Pi 5 Model B Rev 1.0 (DT)
[  387.925961] Workqueue: v3d_csd drm_sched_run_job_work [gpu_sched]
[  387.932525] Call trace:
[  387.935296]  dump_backtrace+0x170/0x1b8
[  387.939403]  show_stack+0x20/0x38
[  387.942907]  dump_stack_lvl+0x90/0xd0
[  387.946785]  dump_stack+0x18/0x28
[  387.950301]  __ubsan_handle_out_of_bounds+0x98/0xd0
[  387.955383]  v3d_csd_job_run+0x3a8/0x438 [v3d]
[  387.960707]  drm_sched_run_job_work+0x520/0x6d0 [gpu_sched]
[  387.966862]  process_one_work+0x62c/0xb48
[  387.971296]  worker_thread+0x468/0x5b0
[  387.975317]  kthread+0x1c4/0x1e0
[  387.978818]  ret_from_fork+0x10/0x20
[  387.983014] ---[ end trace ]---

This happens because the UAPI provides only seven configuration
registers and we are reading the eighth position of this u32 array.

Therefore, fix the out-of-bounds read in `v3d_csd_job_run()` by
accessing only seven positions on the '__u32 [7]' array. The eighth
register exists indeed on V3D 7.1, but it isn't currently used. That
being so, let's guarantee that it remains unused and add a note that it
could be set in a future patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44993/">CVE-2024-44993 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44993">CVE-2024-44993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230197">SUSE bug 1230197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44994" ref_url="https://www.suse.com/security/cve/CVE-2024-44994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Restore lost return in iommu_report_device_fault()

When iommu_report_device_fault gets called with a partial fault it is
supposed to collect the fault into the group and then return.

Instead the return was accidently deleted which results in trying to
process the fault and an eventual crash.

Deleting the return was a typo, put it back.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44994/">CVE-2024-44994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44994">CVE-2024-44994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230198">SUSE bug 1230198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44996</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44996" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44996" ref_url="https://www.suse.com/security/cve/CVE-2024-44996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: fix recursive -&gt;recvmsg calls

After a vsock socket has been added to a BPF sockmap, its prot-&gt;recvmsg
has been replaced with vsock_bpf_recvmsg(). Thus the following
recursiion could happen:

vsock_bpf_recvmsg()
 -&gt; __vsock_recvmsg()
  -&gt; vsock_connectible_recvmsg()
   -&gt; prot-&gt;recvmsg()
    -&gt; vsock_bpf_recvmsg() again

We need to fix it by calling the original -&gt;recvmsg() without any BPF
sockmap logic in __vsock_recvmsg().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44996/">CVE-2024-44996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44996">CVE-2024-44996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230205">SUSE bug 1230205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44997</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44997" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44997" ref_url="https://www.suse.com/security/cve/CVE-2024-44997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_wed: fix use-after-free panic in mtk_wed_setup_tc_block_cb()

When there are multiple ap interfaces on one band and with WED on,
turning the interface down will cause a kernel panic on MT798X.

Previously, cb_priv was freed in mtk_wed_setup_tc_block() without
marking NULL,and mtk_wed_setup_tc_block_cb() didn't check the value, too.

Assign NULL after free cb_priv in mtk_wed_setup_tc_block() and check NULL
in mtk_wed_setup_tc_block_cb().

----------
Unable to handle kernel paging request at virtual address 0072460bca32b4f5
Call trace:
 mtk_wed_setup_tc_block_cb+0x4/0x38
 0xffffffc0794084bc
 tcf_block_playback_offloads+0x70/0x1e8
 tcf_block_unbind+0x6c/0xc8
...
---------
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44997/">CVE-2024-44997 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44997">CVE-2024-44997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230232">SUSE bug 1230232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: idt77252: prevent use after free in dequeue_rx()

We can't dereference "skb" after calling vcc-&gt;push() because the skb
is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230171">SUSE bug 1230171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: pull network headers in gtp_dev_xmit()

syzbot/KMSAN reported use of uninit-value in get_dev_xmit() [1]

We must make sure the IPv4 or Ipv6 header is pulled in skb-&gt;head
before accessing fields in them.

Use pskb_inet_may_pull() to fix this issue.

[1]
BUG: KMSAN: uninit-value in ipv6_pdp_find drivers/net/gtp.c:220 [inline]
 BUG: KMSAN: uninit-value in gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]
 BUG: KMSAN: uninit-value in gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281
  ipv6_pdp_find drivers/net/gtp.c:220 [inline]
  gtp_build_skb_ip6 drivers/net/gtp.c:1229 [inline]
  gtp_dev_xmit+0x1424/0x2540 drivers/net/gtp.c:1281
  __netdev_start_xmit include/linux/netdevice.h:4913 [inline]
  netdev_start_xmit include/linux/netdevice.h:4922 [inline]
  xmit_one net/core/dev.c:3580 [inline]
  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3596
  __dev_queue_xmit+0x358c/0x5610 net/core/dev.c:4423
  dev_queue_xmit include/linux/netdevice.h:3105 [inline]
  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3145 [inline]
  packet_sendmsg+0x90e3/0xa3a0 net/packet/af_packet.c:3177
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2204
  __do_sys_sendto net/socket.c:2216 [inline]
  __se_sys_sendto net/socket.c:2212 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212
  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:3994 [inline]
  slab_alloc_node mm/slub.c:4037 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4080
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:583
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:674
  alloc_skb include/linux/skbuff.h:1320 [inline]
  alloc_skb_with_frags+0xc8/0xbf0 net/core/skbuff.c:6526
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2815
  packet_alloc_skb net/packet/af_packet.c:2994 [inline]
  packet_snd net/packet/af_packet.c:3088 [inline]
  packet_sendmsg+0x749c/0xa3a0 net/packet/af_packet.c:3177
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  __sys_sendto+0x685/0x830 net/socket.c:2204
  __do_sys_sendto net/socket.c:2216 [inline]
  __se_sys_sendto net/socket.c:2212 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2212
  x64_sys_call+0x3799/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:45
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 7115 Comm: syz.1.515 Not tainted 6.11.0-rc1-syzkaller-00043-g94ede2a3e913 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230233">SUSE bug 1230233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/netfs/fscache_cookie: add missing "n_accesses" check

This fixes a NULL pointer dereference bug due to a data race which
looks like this:

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 33 PID: 16573 Comm: kworker/u97:799 Not tainted 6.8.7-cm4all1-hp+ #43
  Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 10/17/2018
  Workqueue: events_unbound netfs_rreq_write_to_cache_work
  RIP: 0010:cachefiles_prepare_write+0x30/0xa0
  Code: 57 41 56 45 89 ce 41 55 49 89 cd 41 54 49 89 d4 55 53 48 89 fb 48 83 ec 08 48 8b 47 08 48 83 7f 10 00 48 89 34 24 48 8b 68 20 &lt;48&gt; 8b 45 08 4c 8b 38 74 45 49 8b 7f 50 e8 4e a9 b0 ff 48 8b 73 10
  RSP: 0018:ffffb4e78113bde0 EFLAGS: 00010286
  RAX: ffff976126be6d10 RBX: ffff97615cdb8438 RCX: 0000000000020000
  RDX: ffff97605e6c4c68 RSI: ffff97605e6c4c60 RDI: ffff97615cdb8438
  RBP: 0000000000000000 R08: 0000000000278333 R09: 0000000000000001
  R10: ffff97605e6c4600 R11: 0000000000000001 R12: ffff97605e6c4c68
  R13: 0000000000020000 R14: 0000000000000001 R15: ffff976064fe2c00
  FS:  0000000000000000(0000) GS:ffff9776dfd40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000008 CR3: 000000005942c002 CR4: 00000000001706f0
  Call Trace:
   &lt;TASK&gt;
   ? __die+0x1f/0x70
   ? page_fault_oops+0x15d/0x440
   ? search_module_extables+0xe/0x40
   ? fixup_exception+0x22/0x2f0
   ? exc_page_fault+0x5f/0x100
   ? asm_exc_page_fault+0x22/0x30
   ? cachefiles_prepare_write+0x30/0xa0
   netfs_rreq_write_to_cache_work+0x135/0x2e0
   process_one_work+0x137/0x2c0
   worker_thread+0x2e9/0x400
   ? __pfx_worker_thread+0x10/0x10
   kthread+0xcc/0x100
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x30/0x50
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1b/0x30
   &lt;/TASK&gt;
  Modules linked in:
  CR2: 0000000000000008
  ---[ end trace 0000000000000000 ]---

This happened because fscache_cookie_state_machine() was slow and was
still running while another process invoked fscache_unuse_cookie();
this led to a fscache_cookie_lru_do_one() call, setting the
FSCACHE_COOKIE_DO_LRU_DISCARD flag, which was picked up by
fscache_cookie_state_machine(), withdrawing the cookie via
cachefiles_withdraw_cookie(), clearing cookie-&gt;cache_priv.

At the same time, yet another process invoked
cachefiles_prepare_write(), which found a NULL pointer in this code
line:

  struct cachefiles_object *object = cachefiles_cres_object(cres);

The next line crashes, obviously:

  struct cachefiles_cache *cache = object-&gt;volume-&gt;cache;

During cachefiles_prepare_write(), the "n_accesses" counter is
non-zero (via fscache_begin_operation()).  The cookie must not be
withdrawn until it drops to zero.

The counter is checked by fscache_cookie_state_machine() before
switching to FSCACHE_COOKIE_STATE_RELINQUISHING and
FSCACHE_COOKIE_STATE_WITHDRAWING (in "case
FSCACHE_COOKIE_STATE_FAILED"), but not for
FSCACHE_COOKIE_STATE_LRU_DISCARDING ("case
FSCACHE_COOKIE_STATE_ACTIVE").

This patch adds the missing check.  With a non-zero access counter,
the function returns and the next fscache_end_cookie_access() call
will queue another fscache_cookie_state_machine() call to handle the
still-pending FSCACHE_COOKIE_DO_LRU_DISCARD.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230170">SUSE bug 1230170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix RX buf alloc_size alignment and atomic op panic

The MANA driver's RX buffer alloc_size is passed into napi_build_skb() to
create SKB. skb_shinfo(skb) is located at the end of skb, and its alignment
is affected by the alloc_size passed into napi_build_skb(). The size needs
to be aligned properly for better performance and atomic operations.
Otherwise, on ARM64 CPU, for certain MTU settings like 4000, atomic
operations may panic on the skb_shinfo(skb)-&gt;dataref due to alignment fault.

To fix this bug, add proper alignment to the alloc_size calculation.

Sample panic info:
[  253.298819] Unable to handle kernel paging request at virtual address ffff000129ba5cce
[  253.300900] Mem abort info:
[  253.301760]   ESR = 0x0000000096000021
[  253.302825]   EC = 0x25: DABT (current EL), IL = 32 bits
[  253.304268]   SET = 0, FnV = 0
[  253.305172]   EA = 0, S1PTW = 0
[  253.306103]   FSC = 0x21: alignment fault
Call trace:
 __skb_clone+0xfc/0x198
 skb_clone+0x78/0xe0
 raw6_local_deliver+0xfc/0x228
 ip6_protocol_deliver_rcu+0x80/0x500
 ip6_input_finish+0x48/0x80
 ip6_input+0x48/0xc0
 ip6_sublist_rcv_finish+0x50/0x78
 ip6_sublist_rcv+0x1cc/0x2b8
 ipv6_list_rcv+0x100/0x150
 __netif_receive_skb_list_core+0x180/0x220
 netif_receive_skb_list_internal+0x198/0x2a8
 __napi_poll+0x138/0x250
 net_rx_action+0x148/0x330
 handle_softirqs+0x12c/0x3a0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230244">SUSE bug 1230244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45002" ref_url="https://www.suse.com/security/cve/CVE-2024-45002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtla/osnoise: Prevent NULL dereference in error handling

If the "tool-&gt;data" allocation fails then there is no need to call
osnoise_free_top() and, in fact, doing so will lead to a NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45002/">CVE-2024-45002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45002">CVE-2024-45002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230169">SUSE bug 1230169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfs: Don't evict inode under the inode lru traversing context

The inode reclaiming process(See function prune_icache_sb) collects all
reclaimable inodes and mark them with I_FREEING flag at first, at that
time, other processes will be stuck if they try getting these inodes
(See function find_inode_fast), then the reclaiming process destroy the
inodes by function dispose_list(). Some filesystems(eg. ext4 with
ea_inode feature, ubifs with xattr) may do inode lookup in the inode
evicting callback function, if the inode lookup is operated under the
inode lru traversing context, deadlock problems may happen.

Case 1: In function ext4_evict_inode(), the ea inode lookup could happen
        if ea_inode feature is enabled, the lookup process will be stuck
	under the evicting context like this:

 1. File A has inode i_reg and an ea inode i_ea
 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru-&gt;i_ea
 3. Then, following three processes running like this:

    PA                              PB
 echo 2 &gt; /proc/sys/vm/drop_caches
  shrink_slab
   prune_dcache_sb
   // i_reg is added into lru, lru-&gt;i_ea-&gt;i_reg
   prune_icache_sb
    list_lru_walk_one
     inode_lru_isolate
      i_ea-&gt;i_state |= I_FREEING // set inode state
     inode_lru_isolate
      __iget(i_reg)
      spin_unlock(&amp;i_reg-&gt;i_lock)
      spin_unlock(lru_lock)
                                     rm file A
                                      i_reg-&gt;nlink = 0
      iput(i_reg) // i_reg-&gt;nlink is 0, do evict
       ext4_evict_inode
        ext4_xattr_delete_inode
         ext4_xattr_inode_dec_ref_all
          ext4_xattr_inode_iget
           ext4_iget(i_ea-&gt;i_ino)
            iget_locked
             find_inode_fast
              __wait_on_freeing_inode(i_ea) ----→ AA deadlock
    dispose_list // cannot be executed by prune_icache_sb
     wake_up_bit(&amp;i_ea-&gt;i_state)

Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file
        deleting process holds BASEHD's wbuf-&gt;io_mutex while getting the
	xattr inode, which could race with inode reclaiming process(The
        reclaiming process could try locking BASEHD's wbuf-&gt;io_mutex in
	inode evicting function), then an ABBA deadlock problem would
	happen as following:

 1. File A has inode ia and a xattr(with inode ixa), regular file B has
    inode ib and a xattr.
 2. getfattr(A, xattr_buf) // ixa is added into lru // lru-&gt;ixa
 3. Then, following three processes running like this:

        PA                PB                        PC
                echo 2 &gt; /proc/sys/vm/drop_caches
                 shrink_slab
                  prune_dcache_sb
                  // ib and ia are added into lru, lru-&gt;ixa-&gt;ib-&gt;ia
                  prune_icache_sb
                   list_lru_walk_one
                    inode_lru_isolate
                     ixa-&gt;i_state |= I_FREEING // set inode state
                    inode_lru_isolate
                     __iget(ib)
                     spin_unlock(&amp;ib-&gt;i_lock)
                     spin_unlock(lru_lock)
                                                   rm file B
                                                    ib-&gt;nlink = 0
 rm file A
  iput(ia)
   ubifs_evict_inode(ia)
    ubifs_jnl_delete_inode(ia)
     ubifs_jnl_write_inode(ia)
      make_reservation(BASEHD) // Lock wbuf-&gt;io_mutex
      ubifs_iget(ixa-&gt;i_ino)
       iget_locked
        find_inode_fast
         __wait_on_freeing_inode(ixa)
          |          iput(ib) // ib-&gt;nlink is 0, do evict
          |           ubifs_evict_inode
          |            ubifs_jnl_delete_inode(ib)
          ↓             ubifs_jnl_write_inode
     ABBA deadlock ←-----make_reservation(BASEHD)
                   dispose_list // cannot be executed by prune_icache_sb
                    wake_up_bit(&amp;ixa-&gt;i_state)

Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING
to pin the inode in memory while inode_lru_isolate(
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45004" ref_url="https://www.suse.com/security/cve/CVE-2024-45004" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: dcp: fix leak of blob encryption key

Trusted keys unseal the key blob on load, but keep the sealed payload in
the blob field so that every subsequent read (export) will simply
convert this field to hex and send it to userspace.

With DCP-based trusted keys, we decrypt the blob encryption key (BEK)
in the Kernel due hardware limitations and then decrypt the blob payload.
BEK decryption is done in-place which means that the trusted key blob
field is modified and it consequently holds the BEK in plain text.
Every subsequent read of that key thus send the plain text BEK instead
of the encrypted BEK to userspace.

This issue only occurs when importing a trusted DCP-based key and
then exporting it again. This should rarely happen as the common use cases
are to either create a new trusted key and export it, or import a key
blob and then just use it without exporting it again.

Fix this by performing BEK decryption and encryption in a dedicated
buffer. Further always wipe the plain text BEK buffer to prevent leaking
the key via uninitialized memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45004/">CVE-2024-45004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45004">CVE-2024-45004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230246">SUSE bug 1230246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45005" ref_url="https://www.suse.com/security/cve/CVE-2024-45005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: fix validity interception issue when gisa is switched off

We might run into a SIE validity if gisa has been disabled either via using
kernel parameter "kvm.use_gisa=0" or by setting the related sysfs
attribute to N (echo N &gt;/sys/module/kvm/parameters/use_gisa).

The validity is caused by an invalid value in the SIE control block's
gisa designation. That happens because we pass the uninitialized gisa
origin to virt_to_phys() before writing it to the gisa designation.

To fix this we return 0 in kvm_s390_get_gisa_desc() if the origin is 0.
kvm_s390_get_gisa_desc() is used to determine which gisa designation to
set in the SIE control block. A value of 0 in the gisa designation disables
gisa usage.

The issue surfaces in the host kernel with the following kernel message as
soon a new kvm guest start is attemted.

kvm: unhandled validity intercept 0x1011
WARNING: CPU: 0 PID: 781237 at arch/s390/kvm/intercept.c:101 kvm_handle_sie_intercept+0x42e/0x4d0 [kvm]
Modules linked in: vhost_net tap tun xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT xt_tcpudp nft_compat x_tables nf_nat_tftp nf_conntrack_tftp vfio_pci_core irqbypass vhost_vsock vmw_vsock_virtio_transport_common vsock vhost vhost_iotlb kvm nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables sunrpc mlx5_ib ib_uverbs ib_core mlx5_core uvdevice s390_trng eadm_sch vfio_ccw zcrypt_cex4 mdev vfio_iommu_type1 vfio sch_fq_codel drm i2c_core loop drm_panel_orientation_quirks configfs nfnetlink lcs ctcm fsm dm_service_time ghash_s390 prng chacha_s390 libchacha aes_s390 des_s390 libdes sha3_512_s390 sha3_256_s390 sha512_s390 sha256_s390 sha1_s390 sha_common dm_mirror dm_region_hash dm_log zfcp scsi_transport_fc scsi_dh_rdac scsi_dh_emc scsi_dh_alua pkey zcrypt dm_multipath rng_core autofs4 [last unloaded: vfio_pci]
CPU: 0 PID: 781237 Comm: CPU 0/KVM Not tainted 6.10.0-08682-gcad9f11498ea #6
Hardware name: IBM 3931 A01 701 (LPAR)
Krnl PSW : 0704c00180000000 000003d93deb0122 (kvm_handle_sie_intercept+0x432/0x4d0 [kvm])
           R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
Krnl GPRS: 000003d900000027 000003d900000023 0000000000000028 000002cd00000000
           000002d063a00900 00000359c6daf708 00000000000bebb5 0000000000001eff
           000002cfd82e9000 000002cfd80bc000 0000000000001011 000003d93deda412
           000003ff8962df98 000003d93de77ce0 000003d93deb011e 00000359c6daf960
Krnl Code: 000003d93deb0112: c020fffe7259	larl	%r2,000003d93de7e5c4
           000003d93deb0118: c0e53fa8beac	brasl	%r14,000003d9bd3c7e70
          #000003d93deb011e: af000000		mc	0,0
          &gt;000003d93deb0122: a728ffea		lhi	%r2,-22
           000003d93deb0126: a7f4fe24		brc	15,000003d93deafd6e
           000003d93deb012a: 9101f0b0		tm	176(%r15),1
           000003d93deb012e: a774fe48		brc	7,000003d93deafdbe
           000003d93deb0132: 40a0f0ae		sth	%r10,174(%r15)
Call Trace:
 [&lt;000003d93deb0122&gt;] kvm_handle_sie_intercept+0x432/0x4d0 [kvm]
([&lt;000003d93deb011e&gt;] kvm_handle_sie_intercept+0x42e/0x4d0 [kvm])
 [&lt;000003d93deacc10&gt;] vcpu_post_run+0x1d0/0x3b0 [kvm]
 [&lt;000003d93deaceda&gt;] __vcpu_run+0xea/0x2d0 [kvm]
 [&lt;000003d93dead9da&gt;] kvm_arch_vcpu_ioctl_run+0x16a/0x430 [kvm]
 [&lt;000003d93de93ee0&gt;] kvm_vcpu_ioctl+0x190/0x7c0 [kvm]
 [&lt;000003d9bd728b4e&gt;] vfs_ioctl+0x2e/0x70
 [&lt;000003d9bd72a092&gt;] __s390x_sys_ioctl+0xc2/0xd0
 [&lt;000003d9be0e9222&gt;] __do_syscall+0x1f2/0x2e0
 [&lt;000003d9be0f9a90&gt;] system_call+0x70/0x98
Last Breaking-Event-Address:
 [&lt;000003d9bd3c7f58&gt;] __warn_printk+0xe8/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45005/">CVE-2024-45005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45005">CVE-2024-45005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230173">SUSE bug 1230173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45006</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration

re-enumerating full-speed devices after a failed address device command
can trigger a NULL pointer dereference.

Full-speed devices may need to reconfigure the endpoint 0 Max Packet Size
value during enumeration. Usb core calls usb_ep0_reinit() in this case,
which ends up calling xhci_configure_endpoint().

On Panther point xHC the xhci_configure_endpoint() function will
additionally check and reserve bandwidth in software. Other hosts do
this in hardware

If xHC address device command fails then a new xhci_virt_device structure
is allocated as part of re-enabling the slot, but the bandwidth table
pointers are not set up properly here.
This triggers the NULL pointer dereference the next time usb_ep0_reinit()
is called and xhci_configure_endpoint() tries to check and reserve
bandwidth

[46710.713538] usb 3-1: new full-speed USB device number 5 using xhci_hcd
[46710.713699] usb 3-1: Device not responding to setup address.
[46710.917684] usb 3-1: Device not responding to setup address.
[46711.125536] usb 3-1: device not accepting address 5, error -71
[46711.125594] BUG: kernel NULL pointer dereference, address: 0000000000000008
[46711.125600] #PF: supervisor read access in kernel mode
[46711.125603] #PF: error_code(0x0000) - not-present page
[46711.125606] PGD 0 P4D 0
[46711.125610] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
[46711.125615] CPU: 1 PID: 25760 Comm: kworker/1:2 Not tainted 6.10.3_2 #1
[46711.125620] Hardware name: Gigabyte Technology Co., Ltd.
[46711.125623] Workqueue: usb_hub_wq hub_event [usbcore]
[46711.125668] RIP: 0010:xhci_reserve_bandwidth (drivers/usb/host/xhci.c

Fix this by making sure bandwidth table pointers are set up correctly
after a failed address device command, and additionally by avoiding
checking for bandwidth in cases like this where no actual endpoints are
added or removed, i.e. only context for default control endpoint 0 is
evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230247">SUSE bug 1230247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45007</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: xillybus: Don't destroy workqueue from work item running on it

Triggered by a kref decrement, destroy_workqueue() may be called from
within a work item for destroying its own workqueue. This illegal
situation is averted by adding a module-global workqueue for exclusive
use of the offending work item. Other work items continue to be queued
on per-device workqueues to ensure performance.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230175">SUSE bug 1230175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45009" ref_url="https://www.suse.com/security/cve/CVE-2024-45009" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: only decrement add_addr_accepted for MPJ req

Adding the following warning ...

  WARN_ON_ONCE(msk-&gt;pm.add_addr_accepted == 0)

... before decrementing the add_addr_accepted counter helped to find a
bug when running the "remove single subflow" subtest from the
mptcp_join.sh selftest.

Removing a 'subflow' endpoint will first trigger a RM_ADDR, then the
subflow closure. Before this patch, and upon the reception of the
RM_ADDR, the other peer will then try to decrement this
add_addr_accepted. That's not correct because the attached subflows have
not been created upon the reception of an ADD_ADDR.

A way to solve that is to decrement the counter only if the attached
subflow was an MP_JOIN to a remote id that was not 0, and initiated by
the host receiving the RM_ADDR.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45009/">CVE-2024-45009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45009">CVE-2024-45009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230438">SUSE bug 1230438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45010" ref_url="https://www.suse.com/security/cve/CVE-2024-45010" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: only mark 'subflow' endp as available

Adding the following warning ...

  WARN_ON_ONCE(msk-&gt;pm.local_addr_used == 0)

... before decrementing the local_addr_used counter helped to find a bug
when running the "remove single address" subtest from the mptcp_join.sh
selftests.

Removing a 'signal' endpoint will trigger the removal of all subflows
linked to this endpoint via mptcp_pm_nl_rm_addr_or_subflow() with
rm_type == MPTCP_MIB_RMSUBFLOW. This will decrement the local_addr_used
counter, which is wrong in this case because this counter is linked to
'subflow' endpoints, and here it is a 'signal' endpoint that is being
removed.

Now, the counter is decremented, only if the ID is being used outside
of mptcp_pm_nl_rm_addr_or_subflow(), only for 'subflow' endpoints, and
if the ID is not 0 -- local_addr_used is not taking into account these
ones. This marking of the ID as being available, and the decrement is
done no matter if a subflow using this ID is currently available,
because the subflow could have been closed before.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45010/">CVE-2024-45010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45010">CVE-2024-45010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230439">SUSE bug 1230439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: xillybus: Check USB endpoints when probing device

Ensure, as the driver probes the device, that all endpoints that the
driver may attempt to access exist and are of the correct type.

All XillyUSB devices must have a Bulk IN and Bulk OUT endpoint at
address 1. This is verified in xillyusb_setup_base_eps().

On top of that, a XillyUSB device may have additional Bulk OUT
endpoints. The information about these endpoints' addresses is deduced
from a data structure (the IDT) that the driver fetches from the device
while probing it. These endpoints are checked in setup_channels().

A XillyUSB device never has more than one IN endpoint, as all data
towards the host is multiplexed in this single Bulk IN endpoint. This is
why setup_channels() only checks OUT endpoints.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230440">SUSE bug 1230440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45012" ref_url="https://www.suse.com/security/cve/CVE-2024-45012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/firmware: use dma non-coherent allocator

Currently, enabling SG_DEBUG in the kernel will cause nouveau to hit a
BUG() on startup, when the iommu is enabled:

kernel BUG at include/linux/scatterlist.h:187!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 7 PID: 930 Comm: (udev-worker) Not tainted 6.9.0-rc3Lyude-Test+ #30
Hardware name: MSI MS-7A39/A320M GAMING PRO (MS-7A39), BIOS 1.I0 01/22/2019
RIP: 0010:sg_init_one+0x85/0xa0
Code: 69 88 32 01 83 e1 03 f6 c3 03 75 20 a8 01 75 1e 48 09 cb 41 89 54
24 08 49 89 1c 24 41 89 6c 24 0c 5b 5d 41 5c e9 7b b9 88 00 &lt;0f&gt; 0b 0f 0b
0f 0b 48 8b 05 5e 46 9a 01 eb b2 66 66 2e 0f 1f 84 00
RSP: 0018:ffffa776017bf6a0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffa77600d87000 RCX: 000000000000002b
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffa77680d87000
RBP: 000000000000e000 R08: 0000000000000000 R09: 0000000000000000
R10: ffff98f4c46aa508 R11: 0000000000000000 R12: ffff98f4c46aa508
R13: ffff98f4c46aa008 R14: ffffa77600d4a000 R15: ffffa77600d4a018
FS:  00007feeb5aae980(0000) GS:ffff98f5c4dc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f22cb9a4520 CR3: 00000001043ba000 CR4: 00000000003506f0
Call Trace:
 &lt;TASK&gt;
 ? die+0x36/0x90
 ? do_trap+0xdd/0x100
 ? sg_init_one+0x85/0xa0
 ? do_error_trap+0x65/0x80
 ? sg_init_one+0x85/0xa0
 ? exc_invalid_op+0x50/0x70
 ? sg_init_one+0x85/0xa0
 ? asm_exc_invalid_op+0x1a/0x20
 ? sg_init_one+0x85/0xa0
 nvkm_firmware_ctor+0x14a/0x250 [nouveau]
 nvkm_falcon_fw_ctor+0x42/0x70 [nouveau]
 ga102_gsp_booter_ctor+0xb4/0x1a0 [nouveau]
 r535_gsp_oneinit+0xb3/0x15f0 [nouveau]
 ? srso_return_thunk+0x5/0x5f
 ? srso_return_thunk+0x5/0x5f
 ? nvkm_udevice_new+0x95/0x140 [nouveau]
 ? srso_return_thunk+0x5/0x5f
 ? srso_return_thunk+0x5/0x5f
 ? ktime_get+0x47/0xb0

Fix this by using the non-coherent allocator instead, I think there
might be a better answer to this, but it involve ripping up some of
APIs using sg lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45012/">CVE-2024-45012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45012">CVE-2024-45012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230441">SUSE bug 1230441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: move stopping keep-alive into nvme_uninit_ctrl()

Commit 4733b65d82bd ("nvme: start keep-alive after admin queue setup")
moves starting keep-alive from nvme_start_ctrl() into
nvme_init_ctrl_finish(), but don't move stopping keep-alive into
nvme_uninit_ctrl(), so keep-alive work can be started and keep pending
after failing to start controller, finally use-after-free is triggered if
nvme host driver is unloaded.

This patch fixes kernel panic when running nvme/004 in case that connection
failure is triggered, by moving stopping keep-alive into nvme_uninit_ctrl().

This way is reasonable because keep-alive is now started in
nvme_init_ctrl_finish().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45014" ref_url="https://www.suse.com/security/cve/CVE-2024-45014" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/boot: Avoid possible physmem_info segment corruption

When physical memory for the kernel image is allocated it does not
consider extra memory required for offsetting the image start to
match it with the lower 20 bits of KASLR virtual base address. That
might lead to kernel access beyond its memory range.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45014/">CVE-2024-45014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45014">CVE-2024-45014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230443">SUSE bug 1230443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45015</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: move dpu_encoder's connector assignment to atomic_enable()

For cases where the crtc's connectors_changed was set without enable/active
getting toggled , there is an atomic_enable() call followed by an
atomic_disable() but without an atomic_mode_set().

This results in a NULL ptr access for the dpu_encoder_get_drm_fmt() call in
the atomic_enable() as the dpu_encoder's connector was cleared in the
atomic_disable() but not re-assigned as there was no atomic_mode_set() call.

Fix the NULL ptr access by moving the assignment for atomic_enable() and also
use drm_atomic_get_new_connector_for_encoder() to get the connector from
the atomic_state.

Patchwork: https://patchwork.freedesktop.org/patch/606729/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230444">SUSE bug 1230444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45017</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45017" ref_url="https://www.suse.com/security/cve/CVE-2024-45017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix IPsec RoCE MPV trace call

Prevent the call trace below from happening, by not allowing IPsec
creation over a slave, if master device doesn't support IPsec.

WARNING: CPU: 44 PID: 16136 at kernel/locking/rwsem.c:240 down_read+0x75/0x94
Modules linked in: esp4_offload esp4 act_mirred act_vlan cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa mst_pciconf(OE) nfsv3 nfs_acl nfs lockd grace fscache netfs xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill cuse fuse rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi rdma_cm ib_ipoib iw_cm ib_cm ipmi_ssif intel_rapl_msr intel_rapl_common amd64_edac edac_mce_amd kvm_amd kvm irqbypass crct10dif_pclmul crc32_pclmul mlx5_ib ghash_clmulni_intel sha1_ssse3 dell_smbios ib_uverbs aesni_intel crypto_simd dcdbas wmi_bmof dell_wmi_descriptor cryptd pcspkr ib_core acpi_ipmi sp5100_tco ccp i2c_piix4 ipmi_si ptdma k10temp ipmi_devintf ipmi_msghandler acpi_power_meter acpi_cpufreq ext4 mbcache jbd2 sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect mlx5_core sysimgblt fb_sys_fops cec
 ahci libahci mlxfw drm pci_hyperv_intf libata tg3 sha256_ssse3 tls megaraid_sas i2c_algo_bit psample wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mst_pci]
CPU: 44 PID: 16136 Comm: kworker/44:3 Kdump: loaded Tainted: GOE 5.15.0-20240509.el8uek.uek7_u3_update_v6.6_ipsec_bf.x86_64 #2
Hardware name: Dell Inc. PowerEdge R7525/074H08, BIOS 2.0.3 01/15/2021
Workqueue: events xfrm_state_gc_task
RIP: 0010:down_read+0x75/0x94
Code: 00 48 8b 45 08 65 48 8b 14 25 80 fc 01 00 83 e0 02 48 09 d0 48 83 c8 01 48 89 45 08 5d 31 c0 89 c2 89 c6 89 c7 e9 cb 88 3b 00 &lt;0f&gt; 0b 48 8b 45 08 a8 01 74 b2 a8 02 75 ae 48 89 c2 48 83 ca 02 f0
RSP: 0018:ffffb26387773da8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffa08b658af900 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ff886bc5e1366f2f RDI: 0000000000000000
RBP: ffffa08b658af940 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffa0a9bfb31540
R13: ffffa0a9bfb37900 R14: 0000000000000000 R15: ffffa0a9bfb37905
FS:  0000000000000000(0000) GS:ffffa0a9bfb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055a45ed814e8 CR3: 000000109038a000 CR4: 0000000000350ee0
Call Trace:
 &lt;TASK&gt;
 ? show_trace_log_lvl+0x1d6/0x2f9
 ? show_trace_log_lvl+0x1d6/0x2f9
 ? mlx5_devcom_for_each_peer_begin+0x29/0x60 [mlx5_core]
 ? down_read+0x75/0x94
 ? __warn+0x80/0x113
 ? down_read+0x75/0x94
 ? report_bug+0xa4/0x11d
 ? handle_bug+0x35/0x8b
 ? exc_invalid_op+0x14/0x75
 ? asm_exc_invalid_op+0x16/0x1b
 ? down_read+0x75/0x94
 ? down_read+0xe/0x94
 mlx5_devcom_for_each_peer_begin+0x29/0x60 [mlx5_core]
 mlx5_ipsec_fs_roce_tx_destroy+0xb1/0x130 [mlx5_core]
 tx_destroy+0x1b/0xc0 [mlx5_core]
 tx_ft_put+0x53/0xc0 [mlx5_core]
 mlx5e_xfrm_free_state+0x45/0x90 [mlx5_core]
 ___xfrm_state_destroy+0x10f/0x1a2
 xfrm_state_gc_task+0x81/0xa9
 process_one_work+0x1f1/0x3c6
 worker_thread+0x53/0x3e4
 ? process_one_work.cold+0x46/0x3c
 kthread+0x127/0x144
 ? set_kthread_struct+0x60/0x52
 ret_from_fork+0x22/0x2d
 &lt;/TASK&gt;
---[ end trace 5ef7896144d398e1 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45017/">CVE-2024-45017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45017">CVE-2024-45017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230430">SUSE bug 1230430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45018</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: initialise extack before use

Fix missing initialisation of extack in flow offload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230431">SUSE bug 1230431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45019" ref_url="https://www.suse.com/security/cve/CVE-2024-45019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Take state lock during tx timeout reporter

mlx5e_safe_reopen_channels() requires the state lock taken. The
referenced changed in the Fixes tag removed the lock to fix another
issue. This patch adds it back but at a later point (when calling
mlx5e_safe_reopen_channels()) to avoid the deadlock referenced in the
Fixes tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45019/">CVE-2024-45019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45019">CVE-2024-45019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230432">SUSE bug 1230432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a kernel verifier crash in stacksafe()

Daniel Hodges reported a kernel verifier crash when playing with sched-ext.
Further investigation shows that the crash is due to invalid memory access
in stacksafe(). More specifically, it is the following code:

    if (exact != NOT_EXACT &amp;&amp;
        old-&gt;stack[spi].slot_type[i % BPF_REG_SIZE] !=
        cur-&gt;stack[spi].slot_type[i % BPF_REG_SIZE])
            return false;

The 'i' iterates old-&gt;allocated_stack.
If cur-&gt;allocated_stack &lt; old-&gt;allocated_stack the out-of-bound
access will happen.

To fix the issue add 'i &gt;= cur-&gt;allocated_stack' check such that if
the condition is true, stacksafe() should fail. Otherwise,
cur-&gt;stack[spi].slot_type[i % BPF_REG_SIZE] memory access is legal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230433">SUSE bug 1230433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcg_write_event_control(): fix a user-triggerable oops

we are *not* guaranteed that anything past the terminating NUL
is mapped (let alone initialized with anything sane).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45022" ref_url="https://www.suse.com/security/cve/CVE-2024-45022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0

The __vmap_pages_range_noflush() assumes its argument pages** contains
pages with the same page shift.  However, since commit e9c3cda4d86e ("mm,
vmalloc: fix high order __GFP_NOFAIL allocations"), if gfp_flags includes
__GFP_NOFAIL with high order in vm_area_alloc_pages() and page allocation
failed for high order, the pages** may contain two different page shifts
(high order and order-0).  This could lead __vmap_pages_range_noflush() to
perform incorrect mappings, potentially resulting in memory corruption.

Users might encounter this as follows (vmap_allow_huge = true, 2M is for
PMD_SIZE):

kvmalloc(2M, __GFP_NOFAIL|GFP_X)
    __vmalloc_node_range_noprof(vm_flags=VM_ALLOW_HUGE_VMAP)
        vm_area_alloc_pages(order=9) ---&gt; order-9 allocation failed and fallback to order-0
            vmap_pages_range()
                vmap_pages_range_noflush()
                    __vmap_pages_range_noflush(page_shift = 21) ----&gt; wrong mapping happens

We can remove the fallback code because if a high-order allocation fails,
__vmalloc_node_range_noprof() will retry with order-0.  Therefore, it is
unnecessary to fallback to order-0 here.  Therefore, fix this by removing
the fallback code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45022/">CVE-2024-45022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45022">CVE-2024-45022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230435">SUSE bug 1230435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45023" ref_url="https://www.suse.com/security/cve/CVE-2024-45023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix data corruption for degraded array with slow disk

read_balance() will avoid reading from slow disks as much as possible,
however, if valid data only lands in slow disks, and a new normal disk
is still in recovery, unrecovered data can be read:

raid1_read_request
 read_balance
  raid1_should_read_first
  -&gt; return false
  choose_best_rdev
  -&gt; normal disk is not recovered, return -1
  choose_bb_rdev
  -&gt; missing the checking of recovery, return the normal disk
 -&gt; read unrecovered data

Root cause is that the checking of recovery is missing in
choose_bb_rdev(). Hence add such checking to fix the problem.

Also fix similar problem in choose_slow_rdev().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45023/">CVE-2024-45023 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45023">CVE-2024-45023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230455">SUSE bug 1230455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45024</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45024" ref_url="https://www.suse.com/security/cve/CVE-2024-45024" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix hugetlb vs. core-mm PT locking

We recently made GUP's common page table walking code to also walk hugetlb
VMAs without most hugetlb special-casing, preparing for the future of
having less hugetlb-specific page table walking code in the codebase. 
Turns out that we missed one page table locking detail: page table locking
for hugetlb folios that are not mapped using a single PMD/PUD.

Assume we have hugetlb folio that spans multiple PTEs (e.g., 64 KiB
hugetlb folios on arm64 with 4 KiB base page size).  GUP, as it walks the
page tables, will perform a pte_offset_map_lock() to grab the PTE table
lock.

However, hugetlb that concurrently modifies these page tables would
actually grab the mm-&gt;page_table_lock: with USE_SPLIT_PTE_PTLOCKS, the
locks would differ.  Something similar can happen right now with hugetlb
folios that span multiple PMDs when USE_SPLIT_PMD_PTLOCKS.

This issue can be reproduced [1], for example triggering:

[ 3105.936100] ------------[ cut here ]------------
[ 3105.939323] WARNING: CPU: 31 PID: 2732 at mm/gup.c:142 try_grab_folio+0x11c/0x188
[ 3105.944634] Modules linked in: [...]
[ 3105.974841] CPU: 31 PID: 2732 Comm: reproducer Not tainted 6.10.0-64.eln141.aarch64 #1
[ 3105.980406] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20240524-4.fc40 05/24/2024
[ 3105.986185] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 3105.991108] pc : try_grab_folio+0x11c/0x188
[ 3105.994013] lr : follow_page_pte+0xd8/0x430
[ 3105.996986] sp : ffff80008eafb8f0
[ 3105.999346] x29: ffff80008eafb900 x28: ffffffe8d481f380 x27: 00f80001207cff43
[ 3106.004414] x26: 0000000000000001 x25: 0000000000000000 x24: ffff80008eafba48
[ 3106.009520] x23: 0000ffff9372f000 x22: ffff7a54459e2000 x21: ffff7a546c1aa978
[ 3106.014529] x20: ffffffe8d481f3c0 x19: 0000000000610041 x18: 0000000000000001
[ 3106.019506] x17: 0000000000000001 x16: ffffffffffffffff x15: 0000000000000000
[ 3106.024494] x14: ffffb85477fdfe08 x13: 0000ffff9372ffff x12: 0000000000000000
[ 3106.029469] x11: 1fffef4a88a96be1 x10: ffff7a54454b5f0c x9 : ffffb854771b12f0
[ 3106.034324] x8 : 0008000000000000 x7 : ffff7a546c1aa980 x6 : 0008000000000080
[ 3106.038902] x5 : 00000000001207cf x4 : 0000ffff9372f000 x3 : ffffffe8d481f000
[ 3106.043420] x2 : 0000000000610041 x1 : 0000000000000001 x0 : 0000000000000000
[ 3106.047957] Call trace:
[ 3106.049522]  try_grab_folio+0x11c/0x188
[ 3106.051996]  follow_pmd_mask.constprop.0.isra.0+0x150/0x2e0
[ 3106.055527]  follow_page_mask+0x1a0/0x2b8
[ 3106.058118]  __get_user_pages+0xf0/0x348
[ 3106.060647]  faultin_page_range+0xb0/0x360
[ 3106.063651]  do_madvise+0x340/0x598

Let's make huge_pte_lockptr() effectively use the same PT locks as any
core-mm page table walker would.  Add ptep_lockptr() to obtain the PTE
page table lock using a pte pointer -- unfortunately we cannot convert
pte_lockptr() because virt_to_page() doesn't work with kmap'ed page tables
we can have with CONFIG_HIGHPTE.

Handle CONFIG_PGTABLE_LEVELS correctly by checking in reverse order, such
that when e.g., CONFIG_PGTABLE_LEVELS==2 with
PGDIR_SIZE==P4D_SIZE==PUD_SIZE==PMD_SIZE will work as expected.  Document
why that works.

There is one ugly case: powerpc 8xx, whereby we have an 8 MiB hugetlb
folio being mapped using two PTE page tables.  While hugetlb wants to take
the PMD table lock, core-mm would grab the PTE table lock of one of both
PTE page tables.  In such corner cases, we have to make sure that both
locks match, which is (fortunately!) currently guaranteed for 8xx as it
does not support SMP and consequently doesn't use split PT locks.

[1] https://lore.kernel.org/all/1bbfcc7f-f222-45a5-ac44-c5a1381c596d@redhat.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45024/">CVE-2024-45024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45024">CVE-2024-45024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230452">SUSE bug 1230452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dasd: fix error recovery leading to data corruption on ESE devices

Extent Space Efficient (ESE) or thin provisioned volumes need to be
formatted on demand during usual IO processing.

The dasd_ese_needs_format function checks for error codes that signal
the non existence of a proper track format.

The check for incorrect length is to imprecise since other error cases
leading to transport of insufficient data also have this flag set.
This might lead to data corruption in certain error cases for example
during a storage server warmstart.

Fix by removing the check for incorrect length and replacing by
explicitly checking for invalid track format in transport mode.

Also remove the check for file protected since this is not a valid
ESE handling case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45027" ref_url="https://www.suse.com/security/cve/CVE-2024-45027" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Check for xhci-&gt;interrupters being allocated in xhci_mem_clearup()

If xhci_mem_init() fails, it calls into xhci_mem_cleanup() to mop
up the damage. If it fails early enough, before xhci-&gt;interrupters
is allocated but after xhci-&gt;max_interrupters has been set, which
happens in most (all?) cases, things get uglier, as xhci_mem_cleanup()
unconditionally derefences xhci-&gt;interrupters. With prejudice.

Gate the interrupt freeing loop with a check on xhci-&gt;interrupters
being non-NULL.

Found while debugging a DMA allocation issue that led the XHCI driver
on this exact path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45027/">CVE-2024-45027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45027">CVE-2024-45027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230453">SUSE bug 1230453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: mmc_test: Fix NULL dereference on allocation failure

If the "test-&gt;highmem = alloc_pages()" allocation fails then calling
__free_pages(test-&gt;highmem) will result in a NULL dereference.  Also
change the error code to -ENOMEM instead of returning success.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230450">SUSE bug 1230450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: tegra: Do not mark ACPI devices as irq safe

On ACPI machines, the tegra i2c module encounters an issue due to a
mutex being called inside a spinlock. This leads to the following bug:

	BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585
	...

	Call trace:
	__might_sleep
	__mutex_lock_common
	mutex_lock_nested
	acpi_subsys_runtime_resume
	rpm_resume
	tegra_i2c_xfer

The problem arises because during __pm_runtime_resume(), the spinlock
&amp;dev-&gt;power.lock is acquired before rpm_resume() is called. Later,
rpm_resume() invokes acpi_subsys_runtime_resume(), which relies on
mutexes, triggering the error.

To address this issue, devices on ACPI are now marked as not IRQ-safe,
considering the dependency of acpi_subsys_runtime_resume() on mutexes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230451">SUSE bug 1230451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45030" ref_url="https://www.suse.com/security/cve/CVE-2024-45030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: cope with large MAX_SKB_FRAGS

Sabrina reports that the igb driver does not cope well with large
MAX_SKB_FRAG values: setting MAX_SKB_FRAG to 45 causes payload
corruption on TX.

An easy reproducer is to run ssh to connect to the machine.  With
MAX_SKB_FRAGS=17 it works, with MAX_SKB_FRAGS=45 it fails.  This has
been reported originally in
https://bugzilla.redhat.com/show_bug.cgi?id=2265320

The root cause of the issue is that the driver does not take into
account properly the (possibly large) shared info size when selecting
the ring layout, and will try to fit two packets inside the same 4K
page even when the 1st fraglist will trump over the 2nd head.

Address the issue by checking if 2K buffers are insufficient.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45030/">CVE-2024-45030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45030">CVE-2024-45030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230457">SUSE bug 1230457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45828" ref_url="https://www.suse.com/security/cve/CVE-2024-45828" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Mask ring interrupts before ring stop request

Bus cleanup path in DMA mode may trigger a RING_OP_STAT interrupt when
the ring is being stopped. Depending on timing between ring stop request
completion, interrupt handler removal and code execution this may lead
to a NULL pointer dereference in hci_dma_irq_handler() if it gets to run
after the io_data pointer is set to NULL in hci_dma_cleanup().

Prevent this my masking the ring interrupts before ring stop request.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45828/">CVE-2024-45828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45828">CVE-2024-45828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235705">SUSE bug 1235705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46672" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46672" ref_url="https://www.suse.com/security/cve/CVE-2024-46672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: cfg80211: Handle SSID based pmksa deletion

wpa_supplicant 2.11 sends since 1efdba5fdc2c ("Handle PMKSA flush in the
driver for SAE/OWE offload cases") SSID based PMKSA del commands.
brcmfmac is not prepared and tries to dereference the NULL bssid and
pmkid pointers in cfg80211_pmksa. PMKID_V3 operations support SSID based
updates so copy the SSID.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-13"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46672/">CVE-2024-46672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46672">CVE-2024-46672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230459">SUSE bug 1230459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: aacraid: Fix double-free on probe failure

aac_probe_one() calls hardware-specific init functions through the
aac_driver_ident::init pointer, all of which eventually call down to
aac_init_adapter().

If aac_init_adapter() fails after allocating memory for aac_dev::queues,
it frees the memory but does not clear that member.

After the hardware-specific init function returns an error,
aac_probe_one() goes down an error path that frees the memory pointed to
by aac_dev::queues, resulting.in a double-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230506">SUSE bug 1230506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46674" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: st: fix probed platform device ref count on probe error path

The probe function never performs any paltform device allocation, thus
error path "undo_platform_dev_alloc" is entirely bogus.  It drops the
reference count from the platform device being probed.  If error path is
triggered, this will lead to unbalanced device reference counts and
premature release of device resources, thus possible use-after-free when
releasing remaining devm-managed resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230599">SUSE bug 1230599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: Prevent USB core invalid event buffer address access

This commit addresses an issue where the USB core could access an
invalid event buffer address during runtime suspend, potentially causing
SMMU faults and other memory issues in Exynos platforms. The problem
arises from the following sequence.
        1. In dwc3_gadget_suspend, there is a chance of a timeout when
        moving the USB core to the halt state after clearing the
        run/stop bit by software.
        2. In dwc3_core_exit, the event buffer is cleared regardless of
        the USB core's status, which may lead to an SMMU faults and
        other memory issues. if the USB core tries to access the event
        buffer address.

To prevent this hardware quirk on Exynos platforms, this commit ensures
that the event buffer address is not cleared by software  when the USB
core is active during runtime suspend by checking its status before
clearing the buffer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230533">SUSE bug 1230533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Add poll mod list filling check

In case of im_protocols value is 1 and tm_protocols value is 0 this
combination successfully passes the check
'if (!im_protocols &amp;&amp; !tm_protocols)' in the nfc_start_poll().
But then after pn533_poll_create_mod_list() call in pn533_start_poll()
poll mod list will remain empty and dev-&gt;poll_mod_count will remain 0
which lead to division by zero.

Normally no im protocol has value 1 in the mask, so this combination is
not expected by driver. But these protocol values actually come from
userspace via Netlink interface (NFC_CMD_START_POLL operation). So a
broken or malicious program may pass a message containing a "bad"
combination of protocol parameter values so that dev-&gt;poll_mod_count
is not incremented inside pn533_poll_create_mod_list(), thus leading
to division by zero.
Call trace looks like:
nfc_genl_start_poll()
  nfc_start_poll()
    -&gt;start_poll()
    pn533_start_poll()

Add poll mod list filling check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230535">SUSE bug 1230535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46677" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gtp: fix a potential NULL pointer dereference

When sockfd_lookup() fails, gtp_encap_enable_socket() returns a
NULL pointer, but its callers only check for error pointers thus miss
the NULL pointer case.

Fix it by returning an error pointer with the error code carried from
sockfd_lookup().

(I found this bug during code inspection.)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230549">SUSE bug 1230549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46678" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: change ipsec_lock from spin lock to mutex

In the cited commit, bond-&gt;ipsec_lock is added to protect ipsec_list,
hence xdo_dev_state_add and xdo_dev_state_delete are called inside
this lock. As ipsec_lock is a spin lock and such xfrmdev ops may sleep,
"scheduling while atomic" will be triggered when changing bond's
active slave.

[  101.055189] BUG: scheduling while atomic: bash/902/0x00000200
[  101.055726] Modules linked in:
[  101.058211] CPU: 3 PID: 902 Comm: bash Not tainted 6.9.0-rc4+ #1
[  101.058760] Hardware name:
[  101.059434] Call Trace:
[  101.059436]  &lt;TASK&gt;
[  101.060873]  dump_stack_lvl+0x51/0x60
[  101.061275]  __schedule_bug+0x4e/0x60
[  101.061682]  __schedule+0x612/0x7c0
[  101.062078]  ? __mod_timer+0x25c/0x370
[  101.062486]  schedule+0x25/0xd0
[  101.062845]  schedule_timeout+0x77/0xf0
[  101.063265]  ? asm_common_interrupt+0x22/0x40
[  101.063724]  ? __bpf_trace_itimer_state+0x10/0x10
[  101.064215]  __wait_for_common+0x87/0x190
[  101.064648]  ? usleep_range_state+0x90/0x90
[  101.065091]  cmd_exec+0x437/0xb20 [mlx5_core]
[  101.065569]  mlx5_cmd_do+0x1e/0x40 [mlx5_core]
[  101.066051]  mlx5_cmd_exec+0x18/0x30 [mlx5_core]
[  101.066552]  mlx5_crypto_create_dek_key+0xea/0x120 [mlx5_core]
[  101.067163]  ? bonding_sysfs_store_option+0x4d/0x80 [bonding]
[  101.067738]  ? kmalloc_trace+0x4d/0x350
[  101.068156]  mlx5_ipsec_create_sa_ctx+0x33/0x100 [mlx5_core]
[  101.068747]  mlx5e_xfrm_add_state+0x47b/0xaa0 [mlx5_core]
[  101.069312]  bond_change_active_slave+0x392/0x900 [bonding]
[  101.069868]  bond_option_active_slave_set+0x1c2/0x240 [bonding]
[  101.070454]  __bond_opt_set+0xa6/0x430 [bonding]
[  101.070935]  __bond_opt_set_notify+0x2f/0x90 [bonding]
[  101.071453]  bond_opt_tryset_rtnl+0x72/0xb0 [bonding]
[  101.071965]  bonding_sysfs_store_option+0x4d/0x80 [bonding]
[  101.072567]  kernfs_fop_write_iter+0x10c/0x1a0
[  101.073033]  vfs_write+0x2d8/0x400
[  101.073416]  ? alloc_fd+0x48/0x180
[  101.073798]  ksys_write+0x5f/0xe0
[  101.074175]  do_syscall_64+0x52/0x110
[  101.074576]  entry_SYSCALL_64_after_hwframe+0x4b/0x53

As bond_ipsec_add_sa_all and bond_ipsec_del_sa_all are only called
from bond_change_active_slave, which requires holding the RTNL lock.
And bond_ipsec_add_sa and bond_ipsec_del_sa are xfrm state
xdo_dev_state_add and xdo_dev_state_delete APIs, which are in user
context. So ipsec_lock doesn't have to be spin lock, change it to
mutex, and thus the above issue can be resolved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230550">SUSE bug 1230550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: check device is present when getting link settings

A sysfs reader can race with a device reset or removal, attempting to
read device state when the device is not actually present. eg:

     [exception RIP: qed_get_current_link+17]
  #8 [ffffb9e4f2907c48] qede_get_link_ksettings at ffffffffc07a994a [qede]
  #9 [ffffb9e4f2907cd8] __rh_call_get_link_ksettings at ffffffff992b01a3
 #10 [ffffb9e4f2907d38] __ethtool_get_link_ksettings at ffffffff992b04e4
 #11 [ffffb9e4f2907d90] duplex_show at ffffffff99260300
 #12 [ffffb9e4f2907e38] dev_attr_show at ffffffff9905a01c
 #13 [ffffb9e4f2907e50] sysfs_kf_seq_show at ffffffff98e0145b
 #14 [ffffb9e4f2907e68] seq_read at ffffffff98d902e3
 #15 [ffffb9e4f2907ec8] vfs_read at ffffffff98d657d1
 #16 [ffffb9e4f2907f00] ksys_read at ffffffff98d65c3f
 #17 [ffffb9e4f2907f38] do_syscall_64 at ffffffff98a052fb

 crash&gt; struct net_device.state ffff9a9d21336000
    state = 5,

state 5 is __LINK_STATE_START (0b1) and __LINK_STATE_NOCARRIER (0b100).
The device is not present, note lack of __LINK_STATE_PRESENT (0b10).

This is the same sort of panic as observed in commit 4224cfd7fb65
("net-sysfs: add check for netdevice being present to speed_show").

There are many other callers of __ethtool_get_link_ksettings() which
don't have a device presence check.

Move this check into ethtool to protect all callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230556">SUSE bug 1230556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46680" ref_url="https://www.suse.com/security/cve/CVE-2024-46680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btnxpuart: Fix random crash seen while removing driver

This fixes the random kernel crash seen while removing the driver, when
running the load/unload test over multiple iterations.

1) modprobe btnxpuart
2) hciconfig hci0 reset
3) hciconfig (check hci0 interface up with valid BD address)
4) modprobe -r btnxpuart
Repeat steps 1 to 4

The ps_wakeup() call in btnxpuart_close() schedules the psdata-&gt;work(),
which gets scheduled after module is removed, causing a kernel crash.

This hidden issue got highlighted after enabling Power Save by default
in 4183a7be7700 (Bluetooth: btnxpuart: Enable Power Save feature on
startup)

The new ps_cleanup() deasserts UART break immediately while closing
serdev device, cancels any scheduled ps_work and destroys the ps_lock
mutex.

[   85.884604] Unable to handle kernel paging request at virtual address ffffd4a61638f258
[   85.884624] Mem abort info:
[   85.884625]   ESR = 0x0000000086000007
[   85.884628]   EC = 0x21: IABT (current EL), IL = 32 bits
[   85.884633]   SET = 0, FnV = 0
[   85.884636]   EA = 0, S1PTW = 0
[   85.884638]   FSC = 0x07: level 3 translation fault
[   85.884642] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000041dd0000
[   85.884646] [ffffd4a61638f258] pgd=1000000095fff003, p4d=1000000095fff003, pud=100000004823d003, pmd=100000004823e003, pte=0000000000000000
[   85.884662] Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP
[   85.890932] Modules linked in: algif_hash algif_skcipher af_alg overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce polyval_generic snd_soc_imx_spdif snd_soc_imx_card snd_soc_ak5558 snd_soc_ak4458 caam secvio error snd_soc_fsl_spdif snd_soc_fsl_micfil snd_soc_fsl_sai snd_soc_fsl_utils gpio_ir_recv rc_core fuse [last unloaded: btnxpuart(O)]
[   85.927297] CPU: 1 PID: 67 Comm: kworker/1:3 Tainted: G           O       6.1.36+g937b1be4345a #1
[   85.936176] Hardware name: FSL i.MX8MM EVK board (DT)
[   85.936182] Workqueue: events 0xffffd4a61638f380
[   85.936198] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   85.952817] pc : 0xffffd4a61638f258
[   85.952823] lr : 0xffffd4a61638f258
[   85.952827] sp : ffff8000084fbd70
[   85.952829] x29: ffff8000084fbd70 x28: 0000000000000000 x27: 0000000000000000
[   85.963112] x26: ffffd4a69133f000 x25: ffff4bf1c8540990 x24: ffff4bf215b87305
[   85.963119] x23: ffff4bf215b87300 x22: ffff4bf1c85409d0 x21: ffff4bf1c8540970
[   85.977382] x20: 0000000000000000 x19: ffff4bf1c8540880 x18: 0000000000000000
[   85.977391] x17: 0000000000000000 x16: 0000000000000133 x15: 0000ffffe2217090
[   85.977399] x14: 0000000000000001 x13: 0000000000000133 x12: 0000000000000139
[   85.977407] x11: 0000000000000001 x10: 0000000000000a60 x9 : ffff8000084fbc50
[   85.977417] x8 : ffff4bf215b7d000 x7 : ffff4bf215b83b40 x6 : 00000000000003e8
[   85.977424] x5 : 00000000410fd030 x4 : 0000000000000000 x3 : 0000000000000000
[   85.977432] x2 : 0000000000000000 x1 : ffff4bf1c4265880 x0 : 0000000000000000
[   85.977443] Call trace:
[   85.977446]  0xffffd4a61638f258
[   85.977451]  0xffffd4a61638f3e8
[   85.977455]  process_one_work+0x1d4/0x330
[   85.977464]  worker_thread+0x6c/0x430
[   85.977471]  kthread+0x108/0x10c
[   85.977476]  ret_from_fork+0x10/0x20
[   85.977488] Code: bad PC value
[   85.977491] ---[ end trace 0000000000000000 ]---

Preset since v6.9.11
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46680/">CVE-2024-46680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46680">CVE-2024-46680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230557">SUSE bug 1230557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46682" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46682" ref_url="https://www.suse.com/security/cve/CVE-2024-46682" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: prevent panic for nfsv4.0 closed files in nfs4_show_open

Prior to commit 3f29cc82a84c ("nfsd: split sc_status out of
sc_type") states_show() relied on sc_type field to be of valid
type before calling into a subfunction to show content of a
particular stateid. From that commit, we split the validity of
the stateid into sc_status and no longer changed sc_type to 0
while unhashing the stateid. This resulted in kernel oopsing
for nfsv4.0 opens that stay around and in nfs4_show_open()
would derefence sc_file which was NULL.

Instead, for closed open stateids forgo displaying information
that relies of having a valid sc_file.

To reproduce: mount the server with 4.0, read and close
a file and then on the server cat /proc/fs/nfsd/clients/2/states

[  513.590804] Call trace:
[  513.590925]  _raw_spin_lock+0xcc/0x160
[  513.591119]  nfs4_show_open+0x78/0x2c0 [nfsd]
[  513.591412]  states_show+0x44c/0x488 [nfsd]
[  513.591681]  seq_read_iter+0x5d8/0x760
[  513.591896]  seq_read+0x188/0x208
[  513.592075]  vfs_read+0x148/0x470
[  513.592241]  ksys_read+0xcc/0x178
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46682/">CVE-2024-46682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46682">CVE-2024-46682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230559">SUSE bug 1230559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46683" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46683" ref_url="https://www.suse.com/security/cve/CVE-2024-46683" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: prevent UAF around preempt fence

The fence lock is part of the queue, therefore in the current design
anything locking the fence should then also hold a ref to the queue to
prevent the queue from being freed.

However, currently it looks like we signal the fence and then drop the
queue ref, but if something is waiting on the fence, the waiter is
kicked to wake up at some later point, where upon waking up it first
grabs the lock before checking the fence state. But if we have already
dropped the queue ref, then the lock might already be freed as part of
the queue, leading to uaf.

To prevent this, move the fence lock into the fence itself so we don't
run into lifetime issues. Alternative might be to have device level
lock, or only release the queue in the fence release callback, however
that might require pushing to another worker to avoid locking issues.

References: https://gitlab.freedesktop.org/drm/xe/kernel/-/issues/2454
References: https://gitlab.freedesktop.org/drm/xe/kernel/-/issues/2342
References: https://gitlab.freedesktop.org/drm/xe/kernel/-/issues/2020
(cherry picked from commit 7116c35aacedc38be6d15bd21b2fc936eed0008b)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46683/">CVE-2024-46683 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46683">CVE-2024-46683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230560">SUSE bug 1230560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46684" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46684" ref_url="https://www.suse.com/security/cve/CVE-2024-46684" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binfmt_elf_fdpic: fix AUXV size calculation when ELF_HWCAP2 is defined

create_elf_fdpic_tables() does not correctly account the space for the
AUX vector when an architecture has ELF_HWCAP2 defined. Prior to the
commit 10e29251be0e ("binfmt_elf_fdpic: fix /proc/&lt;pid&gt;/auxv") it
resulted in the last entry of the AUX vector being set to zero, but with
that change it results in a kernel BUG.

Fix that by adding one to the number of AUXV entries (nitems) when
ELF_HWCAP2 is defined.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46684/">CVE-2024-46684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46684">CVE-2024-46684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230514">SUSE bug 1230514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: single: fix potential NULL dereference in pcs_get_function()

pinmux_generic_get_function() can return NULL and the pointer 'function'
was dereferenced without checking against NULL. Add checking of pointer
'function' in pcs_get_function().

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230515">SUSE bug 1230515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46686" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req()

This happens when called from SMB2_read() while using rdma
and reaching the rdma_readwrite_threshold.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230517">SUSE bug 1230517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46687" ref_url="https://www.suse.com/security/cve/CVE-2024-46687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk()

[BUG]
There is an internal report that KASAN is reporting use-after-free, with
the following backtrace:

  BUG: KASAN: slab-use-after-free in btrfs_check_read_bio+0xa68/0xb70 [btrfs]
  Read of size 4 at addr ffff8881117cec28 by task kworker/u16:2/45
  CPU: 1 UID: 0 PID: 45 Comm: kworker/u16:2 Not tainted 6.11.0-rc2-next-20240805-default+ #76
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]
  Call Trace:
   dump_stack_lvl+0x61/0x80
   print_address_description.constprop.0+0x5e/0x2f0
   print_report+0x118/0x216
   kasan_report+0x11d/0x1f0
   btrfs_check_read_bio+0xa68/0xb70 [btrfs]
   process_one_work+0xce0/0x12a0
   worker_thread+0x717/0x1250
   kthread+0x2e3/0x3c0
   ret_from_fork+0x2d/0x70
   ret_from_fork_asm+0x11/0x20

  Allocated by task 20917:
   kasan_save_stack+0x37/0x60
   kasan_save_track+0x10/0x30
   __kasan_slab_alloc+0x7d/0x80
   kmem_cache_alloc_noprof+0x16e/0x3e0
   mempool_alloc_noprof+0x12e/0x310
   bio_alloc_bioset+0x3f0/0x7a0
   btrfs_bio_alloc+0x2e/0x50 [btrfs]
   submit_extent_page+0x4d1/0xdb0 [btrfs]
   btrfs_do_readpage+0x8b4/0x12a0 [btrfs]
   btrfs_readahead+0x29a/0x430 [btrfs]
   read_pages+0x1a7/0xc60
   page_cache_ra_unbounded+0x2ad/0x560
   filemap_get_pages+0x629/0xa20
   filemap_read+0x335/0xbf0
   vfs_read+0x790/0xcb0
   ksys_read+0xfd/0x1d0
   do_syscall_64+0x6d/0x140
   entry_SYSCALL_64_after_hwframe+0x4b/0x53

  Freed by task 20917:
   kasan_save_stack+0x37/0x60
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x37/0x50
   __kasan_slab_free+0x4b/0x60
   kmem_cache_free+0x214/0x5d0
   bio_free+0xed/0x180
   end_bbio_data_read+0x1cc/0x580 [btrfs]
   btrfs_submit_chunk+0x98d/0x1880 [btrfs]
   btrfs_submit_bio+0x33/0x70 [btrfs]
   submit_one_bio+0xd4/0x130 [btrfs]
   submit_extent_page+0x3ea/0xdb0 [btrfs]
   btrfs_do_readpage+0x8b4/0x12a0 [btrfs]
   btrfs_readahead+0x29a/0x430 [btrfs]
   read_pages+0x1a7/0xc60
   page_cache_ra_unbounded+0x2ad/0x560
   filemap_get_pages+0x629/0xa20
   filemap_read+0x335/0xbf0
   vfs_read+0x790/0xcb0
   ksys_read+0xfd/0x1d0
   do_syscall_64+0x6d/0x140
   entry_SYSCALL_64_after_hwframe+0x4b/0x53

[CAUSE]
Although I cannot reproduce the error, the report itself is good enough
to pin down the cause.

The call trace is the regular endio workqueue context, but the
free-by-task trace is showing that during btrfs_submit_chunk() we
already hit a critical error, and is calling btrfs_bio_end_io() to error
out.  And the original endio function called bio_put() to free the whole
bio.

This means a double freeing thus causing use-after-free, e.g.:

1. Enter btrfs_submit_bio() with a read bio
   The read bio length is 128K, crossing two 64K stripes.

2. The first run of btrfs_submit_chunk()

2.1 Call btrfs_map_block(), which returns 64K
2.2 Call btrfs_split_bio()
    Now there are two bios, one referring to the first 64K, the other
    referring to the second 64K.
2.3 The first half is submitted.

3. The second run of btrfs_submit_chunk()

3.1 Call btrfs_map_block(), which by somehow failed
    Now we call btrfs_bio_end_io() to handle the error

3.2 btrfs_bio_end_io() calls the original endio function
    Which is end_bbio_data_read(), and it calls bio_put() for the
    original bio.

    Now the original bio is freed.

4. The submitted first 64K bio finished
   Now we call into btrfs_check_read_bio() and tries to advance the bio
   iter.
   But since the original bio (thus its iter) is already freed, we
   trigger the above use-after free.

   And even if the memory is not poisoned/corrupted, we will later call
   the original endio function, causing a double freeing.

[FIX]
Instead of calling btrfs_bio_end_io(), call btrfs_orig_bbio_end_io(),
which has the extra check on split bios and do the pr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46687/">CVE-2024-46687 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46687">CVE-2024-46687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230518">SUSE bug 1230518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46688" ref_url="https://www.suse.com/security/cve/CVE-2024-46688" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix out-of-bound access when z_erofs_gbuf_growsize() partially fails

If z_erofs_gbuf_growsize() partially fails on a global buffer due to
memory allocation failure or fault injection (as reported by syzbot [1]),
new pages need to be freed by comparing to the existing pages to avoid
memory leaks.

However, the old gbuf-&gt;pages[] array may not be large enough, which can
lead to null-ptr-deref or out-of-bound access.

Fix this by checking against gbuf-&gt;nrpages in advance.

[1] https://lore.kernel.org/r/000000000000f7b96e062018c6e3@google.com
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-46688/">CVE-2024-46688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46688">CVE-2024-46688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230523">SUSE bug 1230523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: cmd-db: Map shared memory as WC, not WB

Linux does not write into cmd-db region. This region of memory is write
protected by XPU. XPU may sometime falsely detect clean cache eviction
as "write" into the write protected region leading to secure interrupt
which causes an endless loop somewhere in Trust Zone.

The only reason it is working right now is because Qualcomm Hypervisor
maps the same region as Non-Cacheable memory in Stage 2 translation
tables. The issue manifests if we want to use another hypervisor (like
Xen or KVM), which does not know anything about those specific mappings.

Changing the mapping of cmd-db memory from MEMREMAP_WB to MEMREMAP_WT/WC
removes dependency on correct mappings in Stage 2 tables. This patch
fixes the issue by updating the mapping to MEMREMAP_WC.

I tested this on SA8155P with Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230524">SUSE bug 1230524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46690" ref_url="https://www.suse.com/security/cve/CVE-2024-46690" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix nfsd4_deleg_getattr_conflict in presence of third party lease

It is not safe to dereference fl-&gt;c.flc_owner without first confirming
fl-&gt;fl_lmops is the expected manager.  nfsd4_deleg_getattr_conflict()
tests fl_lmops but largely ignores the result and assumes that flc_owner
is an nfs4_delegation anyway.  This is wrong.

With this patch we restore the "!= &amp;nfsd_lease_mng_ops" case to behave
as it did before the change mentioned below.  This is the same as the
current code, but without any reference to a possible delegation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46690/">CVE-2024-46690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46690">CVE-2024-46690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230525">SUSE bug 1230525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46691" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46691" ref_url="https://www.suse.com/security/cve/CVE-2024-46691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Move unregister out of atomic section

Commit '9329933699b3 ("soc: qcom: pmic_glink: Make client-lock
non-sleeping")' moved the pmic_glink client list under a spinlock, as it
is accessed by the rpmsg/glink callback, which in turn is invoked from
IRQ context.

This means that ucsi_unregister() is now called from atomic context,
which isn't feasible as it's expecting a sleepable context. An effort is
under way to get GLINK to invoke its callbacks in a sleepable context,
but until then lets schedule the unregistration.

A side effect of this is that ucsi_unregister() can now happen
after the remote processor, and thereby the communication link with it, is
gone. pmic_glink_send() is amended with a check to avoid the resulting NULL
pointer dereference.
This does however result in the user being informed about this error by
the following entry in the kernel log:

  ucsi_glink.pmic_glink_ucsi pmic_glink.ucsi.0: failed to send UCSI write request: -5
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46691/">CVE-2024-46691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46691">CVE-2024-46691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230526">SUSE bug 1230526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46692" ref_url="https://www.suse.com/security/cve/CVE-2024-46692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: scm: Mark get_wq_ctx() as atomic call

Currently get_wq_ctx() is wrongly configured as a standard call. When two
SMC calls are in sleep and one SMC wakes up, it calls get_wq_ctx() to
resume the corresponding sleeping thread. But if get_wq_ctx() is
interrupted, goes to sleep and another SMC call is waiting to be allocated
a waitq context, it leads to a deadlock.

To avoid this get_wq_ctx() must be an atomic call and can't be a standard
SMC call. Hence mark get_wq_ctx() as a fast call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46692/">CVE-2024-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46692">CVE-2024-46692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230520">SUSE bug 1230520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46693" ref_url="https://www.suse.com/security/cve/CVE-2024-46693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: pmic_glink: Fix race during initialization

As pointed out by Stephen Boyd it is possible that during initialization
of the pmic_glink child drivers, the protection-domain notifiers fires,
and the associated work is scheduled, before the client registration
returns and as a result the local "client" pointer has been initialized.

The outcome of this is a NULL pointer dereference as the "client"
pointer is blindly dereferenced.

Timeline provided by Stephen:
 CPU0                               CPU1
 ----                               ----
 ucsi-&gt;client = NULL;
 devm_pmic_glink_register_client()
  client-&gt;pdr_notify(client-&gt;priv, pg-&gt;client_state)
   pmic_glink_ucsi_pdr_notify()
    schedule_work(&amp;ucsi-&gt;register_work)
    &lt;schedule away&gt;
                                    pmic_glink_ucsi_register()
                                     ucsi_register()
                                      pmic_glink_ucsi_read_version()
                                       pmic_glink_ucsi_read()
                                        pmic_glink_ucsi_read()
                                         pmic_glink_send(ucsi-&gt;client)
                                         &lt;client is NULL BAD&gt;
 ucsi-&gt;client = client // Too late!

This code is identical across the altmode, battery manager and usci
child drivers.

Resolve this by splitting the allocation of the "client" object and the
registration thereof into two operations.

This only happens if the protection domain registry is populated at the
time of registration, which by the introduction of commit '1ebcde047c54
("soc: qcom: add pd-mapper implementation")' became much more likely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46693/">CVE-2024-46693 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46693">CVE-2024-46693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230521">SUSE bug 1230521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46694" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: avoid using null object of framebuffer

Instead of using state-&gt;fb-&gt;obj[0] directly, get object from framebuffer
by calling drm_gem_fb_get_obj() and return error code when object is
null to avoid using null object of framebuffer.

(cherry picked from commit 73dd0ad9e5dad53766ea3e631303430116f834b3)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230511">SUSE bug 1230511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46695" ref_url="https://www.suse.com/security/cve/CVE-2024-46695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux,smack: don't bypass permissions check in inode_setsecctx hook

Marek Gresko reports that the root user on an NFS client is able to
change the security labels on files on an NFS filesystem that is
exported with root squashing enabled.

The end of the kerneldoc comment for __vfs_setxattr_noperm() states:

 *  This function requires the caller to lock the inode's i_mutex before it
 *  is executed. It also assumes that the caller will make the appropriate
 *  permission checks.

nfsd_setattr() does do permissions checking via fh_verify() and
nfsd_permission(), but those don't do all the same permissions checks
that are done by security_inode_setxattr() and its related LSM hooks do.

Since nfsd_setattr() is the only consumer of security_inode_setsecctx(),
simplest solution appears to be to replace the call to
__vfs_setxattr_noperm() with a call to __vfs_setxattr_locked().  This
fixes the above issue and has the added benefit of causing nfsd to
recall conflicting delegations on a file when a client tries to change
its security label.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46695/">CVE-2024-46695 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230519">SUSE bug 1230519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46696" ref_url="https://www.suse.com/security/cve/CVE-2024-46696" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix potential UAF in nfsd4_cb_getattr_release

Once we drop the delegation reference, the fields embedded in it are no
longer safe to access. Do that last.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46696/">CVE-2024-46696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46696">CVE-2024-46696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230512">SUSE bug 1230512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46697" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46697" ref_url="https://www.suse.com/security/cve/CVE-2024-46697" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: ensure that nfsd4_fattr_args.context is zeroed out

If nfsd4_encode_fattr4 ends up doing a "goto out" before we get to
checking for the security label, then args.context will be set to
uninitialized junk on the stack, which we'll then try to free.
Initialize it early.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46697/">CVE-2024-46697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46697">CVE-2024-46697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230522">SUSE bug 1230522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46698" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46698" ref_url="https://www.suse.com/security/cve/CVE-2024-46698" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

video/aperture: optionally match the device in sysfb_disable()

In aperture_remove_conflicting_pci_devices(), we currently only
call sysfb_disable() on vga class devices.  This leads to the
following problem when the pimary device is not VGA compatible:

1. A PCI device with a non-VGA class is the boot display
2. That device is probed first and it is not a VGA device so
   sysfb_disable() is not called, but the device resources
   are freed by aperture_detach_platform_device()
3. Non-primary GPU has a VGA class and it ends up calling sysfb_disable()
4. NULL pointer dereference via sysfb_disable() since the resources
   have already been freed by aperture_detach_platform_device() when
   it was called by the other device.

Fix this by passing a device pointer to sysfb_disable() and checking
the device to determine if we should execute it or not.

v2: Fix build when CONFIG_SCREEN_INFO is not set
v3: Move device check into the mutex
    Drop primary variable in aperture_remove_conflicting_pci_devices()
    Drop __init on pci sysfb_pci_dev_is_enabled()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46698/">CVE-2024-46698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46698">CVE-2024-46698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230510">SUSE bug 1230510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46699" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46699" ref_url="https://www.suse.com/security/cve/CVE-2024-46699" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Disable preemption while updating GPU stats

We forgot to disable preemption around the write_seqcount_begin/end() pair
while updating GPU stats:

  [ ] WARNING: CPU: 2 PID: 12 at include/linux/seqlock.h:221 __seqprop_assert.isra.0+0x128/0x150 [v3d]
  [ ] Workqueue: v3d_bin drm_sched_run_job_work [gpu_sched]
 &lt;...snip...&gt;
  [ ] Call trace:
  [ ]  __seqprop_assert.isra.0+0x128/0x150 [v3d]
  [ ]  v3d_job_start_stats.isra.0+0x90/0x218 [v3d]
  [ ]  v3d_bin_job_run+0x23c/0x388 [v3d]
  [ ]  drm_sched_run_job_work+0x520/0x6d0 [gpu_sched]
  [ ]  process_one_work+0x62c/0xb48
  [ ]  worker_thread+0x468/0x5b0
  [ ]  kthread+0x1c4/0x1e0
  [ ]  ret_from_fork+0x10/0x20

Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46699/">CVE-2024-46699 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46699">CVE-2024-46699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230509">SUSE bug 1230509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46700" ref_url="https://www.suse.com/security/cve/CVE-2024-46700" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/mes: fix mes ring buffer overflow

wait memory room until enough before writing mes packets
to avoid ring buffer overflow.

v2: squash in sched_hw_submission fix

(cherry picked from commit 34e087e8920e635c62e2ed6a758b0cd27f836d13)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46700/">CVE-2024-46700 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46700">CVE-2024-46700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230508">SUSE bug 1230508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46701" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46701" ref_url="https://www.suse.com/security/cve/CVE-2024-46701" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libfs: fix infinite directory reads for offset dir

After we switch tmpfs dir operations from simple_dir_operations to
simple_offset_dir_operations, every rename happened will fill new dentry
to dest dir's maple tree(&amp;SHMEM_I(inode)-&gt;dir_offsets-&gt;mt) with a free
key starting with octx-&gt;newx_offset, and then set newx_offset equals to
free key + 1. This will lead to infinite readdir combine with rename
happened at the same time, which fail generic/736 in xfstests(detail show
as below).

1. create 5000 files(1 2 3...) under one dir
2. call readdir(man 3 readdir) once, and get one entry
3. rename(entry, "TEMPFILE"), then rename("TEMPFILE", entry)
4. loop 2~3, until readdir return nothing or we loop too many
   times(tmpfs break test with the second condition)

We choose the same logic what commit 9b378f6ad48cf ("btrfs: fix infinite
directory reads") to fix it, record the last_index when we open dir, and
do not emit the entry which index &gt;= last_index. The file-&gt;private_data
now used in offset dir can use directly to do this, and we also update
the last_index when we llseek the dir file.

[brauner: only update last_index after seek when offset is zero like Jan suggested]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46701/">CVE-2024-46701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46701">CVE-2024-46701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230588">SUSE bug 1230588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Mark XDomain as unplugged when router is removed

I noticed that when we do discrete host router NVM upgrade and it gets
hot-removed from the PCIe side as a result of NVM firmware authentication,
if there is another host connected with enabled paths we hang in tearing
them down. This is due to fact that the Thunderbolt networking driver
also tries to cleanup the paths and ends up blocking in
tb_disconnect_xdomain_paths() waiting for the domain lock.

However, at this point we already cleaned the paths in tb_stop() so
there is really no need for tb_disconnect_xdomain_paths() to do that
anymore. Furthermore it already checks if the XDomain is unplugged and
bails out early so take advantage of that and mark the XDomain as
unplugged when we remove the parent router.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230589">SUSE bug 1230589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46703" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46703" ref_url="https://www.suse.com/security/cve/CVE-2024-46703" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "serial: 8250_omap: Set the console genpd always on if no console suspend"

This reverts commit 68e6939ea9ec3d6579eadeab16060339cdeaf940.

Kevin reported that this causes a crash during suspend on platforms that
dont use PM domains.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46703/">CVE-2024-46703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46703">CVE-2024-46703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230593">SUSE bug 1230593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46704" ref_url="https://www.suse.com/security/cve/CVE-2024-46704" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Fix spruious data race in __flush_work()

When flushing a work item for cancellation, __flush_work() knows that it
exclusively owns the work item through its PENDING bit. 134874e2eee9
("workqueue: Allow cancel_work_sync() and disable_work() from atomic
contexts on BH work items") added a read of @work-&gt;data to determine whether
to use busy wait for BH work items that are being canceled. While the read
is safe when @from_cancel, @work-&gt;data was read before testing @from_cancel
to simplify code structure:

	data = *work_data_bits(work);
	if (from_cancel &amp;&amp;
	    !WARN_ON_ONCE(data &amp; WORK_STRUCT_PWQ) &amp;&amp; (data &amp; WORK_OFFQ_BH)) {

While the read data was never used if !@from_cancel, this could trigger
KCSAN data race detection spuriously:

  ==================================================================
  BUG: KCSAN: data-race in __flush_work / __flush_work

  write to 0xffff8881223aa3e8 of 8 bytes by task 3998 on cpu 0:
   instrument_write include/linux/instrumented.h:41 [inline]
   ___set_bit include/asm-generic/bitops/instrumented-non-atomic.h:28 [inline]
   insert_wq_barrier kernel/workqueue.c:3790 [inline]
   start_flush_work kernel/workqueue.c:4142 [inline]
   __flush_work+0x30b/0x570 kernel/workqueue.c:4178
   flush_work kernel/workqueue.c:4229 [inline]
   ...

  read to 0xffff8881223aa3e8 of 8 bytes by task 50 on cpu 1:
   __flush_work+0x42a/0x570 kernel/workqueue.c:4188
   flush_work kernel/workqueue.c:4229 [inline]
   flush_delayed_work+0x66/0x70 kernel/workqueue.c:4251
   ...

  value changed: 0x0000000000400000 -&gt; 0xffff88810006c00d

Reorganize the code so that @from_cancel is tested before @work-&gt;data is
accessed. The only problem is triggering KCSAN detection spuriously. This
shouldn't need READ_ONCE() or other access qualifiers.

No functional changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46704/">CVE-2024-46704 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46704">CVE-2024-46704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230590">SUSE bug 1230590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46705" ref_url="https://www.suse.com/security/cve/CVE-2024-46705" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: reset mmio mappings with devm

Set our various mmio mappings to NULL. This should make it easier to
catch something rogue trying to mess with mmio after device removal. For
example, we might unmap everything and then start hitting some mmio
address which has already been unmamped by us and then remapped by
something else, causing all kinds of carnage.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46705/">CVE-2024-46705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46705">CVE-2024-46705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230583">SUSE bug 1230583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46706" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46706" ref_url="https://www.suse.com/security/cve/CVE-2024-46706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: fsl_lpuart: mark last busy before uart_add_one_port

With "earlycon initcall_debug=1 loglevel=8" in bootargs, kernel
sometimes boot hang. It is because normal console still is not ready,
but runtime suspend is called, so early console putchar will hang
in waiting TRDE set in UARTSTAT.

The lpuart driver has auto suspend delay set to 3000ms, but during
uart_add_one_port, a child device serial ctrl will added and probed with
its pm runtime enabled(see serial_ctrl.c).
The runtime suspend call path is:
device_add
     |-&gt; bus_probe_device
           |-&gt;device_initial_probe
	           |-&gt;__device_attach
                         |-&gt; pm_runtime_get_sync(dev-&gt;parent);
			 |-&gt; pm_request_idle(dev);
			 |-&gt; pm_runtime_put(dev-&gt;parent);

So in the end, before normal console ready, the lpuart get runtime
suspended. And earlycon putchar will hang.

To address the issue, mark last busy just after pm_runtime_enable,
three seconds is long enough to switch from bootconsole to normal
console.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-10-10"/>
	<severity>Low</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46706/">CVE-2024-46706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46706">CVE-2024-46706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230580">SUSE bug 1230580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46707" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3

On a system with a GICv3, if a guest hasn't been configured with
GICv3 and that the host is not capable of GICv2 emulation,
a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2.

We therefore try to emulate the SGI access, only to hit a NULL
pointer as no private interrupt is allocated (no GIC, remember?).

The obvious fix is to give the guest what it deserves, in the
shape of a UNDEF exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230582">SUSE bug 1230582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46708" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46708" ref_url="https://www.suse.com/security/cve/CVE-2024-46708" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: qcom: x1e80100: Fix special pin offsets

Remove the erroneus 0x100000 offset to prevent the boards from crashing
on pin state setting, as well as for the intended state changes to take
effect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46708/">CVE-2024-46708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46708">CVE-2024-46708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230538">SUSE bug 1230538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46709" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46709" ref_url="https://www.suse.com/security/cve/CVE-2024-46709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix prime with external buffers

Make sure that for external buffers mapping goes through the dma_buf
interface instead of trying to access pages directly.

External buffers might not provide direct access to readable/writable
pages so to make sure the bo's created from external dma_bufs can be
read dma_buf interface has to be used.

Fixes crashes in IGT's kms_prime with vgem. Regular desktop usage won't
trigger this due to the fact that virtual machines will not have
multiple GPUs but it enables better test coverage in IGT.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46709/">CVE-2024-46709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46709">CVE-2024-46709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230539">SUSE bug 1230539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46710" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46710" ref_url="https://www.suse.com/security/cve/CVE-2024-46710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Prevent unmapping active read buffers

The kms paths keep a persistent map active to read and compare the cursor
buffer. These maps can race with each other in simple scenario where:
a) buffer "a" mapped for update
b) buffer "a" mapped for compare
c) do the compare
d) unmap "a" for compare
e) update the cursor
f) unmap "a" for update
At step "e" the buffer has been unmapped and the read contents is bogus.

Prevent unmapping of active read buffers by simply keeping a count of
how many paths have currently active maps and unmap only when the count
reaches 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46710/">CVE-2024-46710 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46710">CVE-2024-46710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230540">SUSE bug 1230540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46711" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46711" ref_url="https://www.suse.com/security/cve/CVE-2024-46711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: fix ID 0 endp usage after multiple re-creations

'local_addr_used' and 'add_addr_accepted' are decremented for addresses
not related to the initial subflow (ID0), because the source and
destination addresses of the initial subflows are known from the
beginning: they don't count as "additional local address being used" or
"ADD_ADDR being accepted".

It is then required not to increment them when the entrypoint used by
the initial subflow is removed and re-added during a connection. Without
this modification, this entrypoint cannot be removed and re-added more
than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46711/">CVE-2024-46711 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46711">CVE-2024-46711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230542">SUSE bug 1230542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46712" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46712" ref_url="https://www.suse.com/security/cve/CVE-2024-46712" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Disable coherent dumb buffers without 3d

Coherent surfaces make only sense if the host renders to them using
accelerated apis. Without 3d the entire content of dumb buffers stays
in the guest making all of the extra work they're doing to synchronize
between guest and host useless.

Configurations without 3d also tend to run with very low graphics
memory limits. The pinned console fb, mob cursors and graphical login
manager tend to run out of 16MB graphics memory that those guests use.

Fix it by making sure the coherent dumb buffers are only used on
configs with 3d enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-14"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46712/">CVE-2024-46712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46712">CVE-2024-46712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230543">SUSE bug 1230543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46714" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip wbscl_set_scaler_filter if filter is null

Callers can pass null in filter (i.e. from returned from the function
wbscl_get_filter_coeffs_16p) and a null check is added to ensure that is
not the case.

This fixes 4 NULL_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230699">SUSE bug 1230699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver: iio: add missing checks on iio_info's callback access

Some callbacks from iio_info structure are accessed without any check, so
if a driver doesn't implement them trying to access the corresponding
sysfs entries produce a kernel oops such as:

[ 2203.527791] Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute
[...]
[ 2203.783416] Call trace:
[ 2203.783429]  iio_read_channel_info_avail from dev_attr_show+0x18/0x48
[ 2203.789807]  dev_attr_show from sysfs_kf_seq_show+0x90/0x120
[ 2203.794181]  sysfs_kf_seq_show from seq_read_iter+0xd0/0x4e4
[ 2203.798555]  seq_read_iter from vfs_read+0x238/0x2a0
[ 2203.802236]  vfs_read from ksys_read+0xa4/0xd4
[ 2203.805385]  ksys_read from ret_fast_syscall+0x0/0x54
[ 2203.809135] Exception stack(0xe0badfa8 to 0xe0badff0)
[ 2203.812880] dfa0:                   00000003 b6f10f80 00000003 b6eab000 00020000 00000000
[ 2203.819746] dfc0: 00000003 b6f10f80 7ff00000 00000003 00000003 00000000 00020000 00000000
[ 2203.826619] dfe0: b6e1bc88 bed80958 b6e1bc94 b6e1bcb0
[ 2203.830363] Code: bad PC value
[ 2203.832695] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230700">SUSE bug 1230700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46716" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor

Remove list_del call in msgdma_chan_desc_cleanup, this should be the role
of msgdma_free_descriptor. In consequence replace list_add_tail with
list_move_tail in msgdma_free_descriptor.

This fixes the path:
   msgdma_free_chan_resources -&gt; msgdma_free_descriptors -&gt;
   msgdma_free_desc_list -&gt; msgdma_free_descriptor

which does not correctly free the descriptors as first nodes were not
removed from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-12-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46717" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: SHAMPO, Fix incorrect page release

Under the following conditions:
1) No skb created yet
2) header_size == 0 (no SHAMPO header)
3) header_index + 1 % MLX5E_SHAMPO_WQ_HEADER_PER_PAGE == 0 (this is the
   last page fragment of a SHAMPO header page)

a new skb is formed with a page that is NOT a SHAMPO header page (it
is a regular data page). Further down in the same function
(mlx5e_handle_rx_cqe_mpwrq_shampo()), a SHAMPO header page from
header_index is released. This is wrong and it leads to SHAMPO header
pages being released more than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230719">SUSE bug 1230719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46718" ref_url="https://www.suse.com/security/cve/CVE-2024-46718" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Don't overmap identity VRAM mapping

Overmapping the identity VRAM mapping is triggering hardware bugs on
certain platforms. Use 2M pages for the last unaligned (to 1G) VRAM
chunk.

v2:
 - Always use 2M pages for last chunk (Fei Yang)
 - break loop when 2M pages are used
 - Add assert for usable_size being 2M aligned
v3:
 - Fix checkpatch
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46718/">CVE-2024-46718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46718">CVE-2024-46718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230721">SUSE bug 1230721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46719" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Fix null pointer dereference in trace

ucsi_register_altmode checks IS_ERR for the alt pointer and treats
NULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled,
ucsi_register_displayport returns NULL which causes a NULL pointer
dereference in trace. Rather than return NULL, call
typec_port_register_altmode to register DisplayPort alternate mode
as a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-12-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230722">SUSE bug 1230722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix dereference after null check

check the pointer hive before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230724">SUSE bug 1230724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix mc_data out-of-bounds read warning

Clear warning that read mc_data[i-1] may out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230712">SUSE bug 1230712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix ucode out-of-bounds read warning

Clear warning that read ucode[] may out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230702">SUSE bug 1230702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number

Check the fb_channel_number range to avoid the array out-of-bounds
read error
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230725">SUSE bug 1230725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds write warning

Check the ring type value to fix the out-of-bounds
write warning
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230705">SUSE bug 1230705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46726" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Ensure index calculation will not overflow

[WHY &amp; HOW]
Make sure vmid0p72_idx, vnom0p8_idx and vmax0p9_idx calculation will
never overflow and exceess array size.

This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230706">SUSE bug 1230706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46727" ref_url="https://www.suse.com/security/cve/CVE-2024-46727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add otg_master NULL check within resource_log_pipe_topology_update

[Why]
Coverity reports NULL_RETURN warning.

[How]
Add otg_master NULL check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46727/">CVE-2024-46727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46727">CVE-2024-46727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230707">SUSE bug 1230707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46728" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check index for aux_rd_interval before using

aux_rd_interval has size of 7 and should be checked.

This fixes 3 OVERRUN and 1 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230703">SUSE bug 1230703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46729" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46729" ref_url="https://www.suse.com/security/cve/CVE-2024-46729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix incorrect size calculation for loop

[WHY]
fe_clk_en has size of 5 but sizeof(fe_clk_en) has byte size 20 which is
lager than the array size.

[HOW]
Divide byte size 20 by its element size.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46729/">CVE-2024-46729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46729">CVE-2024-46729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230704">SUSE bug 1230704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46730" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Ensure array index tg_inst won't be -1

[WHY &amp; HOW]
tg_inst will be a negative if timing_generator_count equals 0, which
should be checked before used.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230701">SUSE bug 1230701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46731" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix the Out-of-bounds read warning

using index i - 1U may beyond element index
for mc_data[] when i = 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230709">SUSE bug 1230709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46732" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Assign linear_pitch_alignment even for VM

[Description]
Assign linear_pitch_alignment so we don't cause a divide by 0
error in VM environments
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230711">SUSE bug 1230711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46733" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46733" ref_url="https://www.suse.com/security/cve/CVE-2024-46733" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix qgroup reserve leaks in cow_file_range

In the buffered write path, the dirty page owns the qgroup reserve until
it creates an ordered_extent.

Therefore, any errors that occur before the ordered_extent is created
must free that reservation, or else the space is leaked. The fstest
generic/475 exercises various IO error paths, and is able to trigger
errors in cow_file_range where we fail to get to allocating the ordered
extent. Note that because we *do* clear delalloc, we are likely to
remove the inode from the delalloc list, so the inodes/pages to not have
invalidate/launder called on them in the commit abort path.

This results in failures at the unmount stage of the test that look like:

  BTRFS: error (device dm-8 state EA) in cleanup_transaction:2018: errno=-5 IO failure
  BTRFS: error (device dm-8 state EA) in btrfs_replace_file_extents:2416: errno=-5 IO failure
  BTRFS warning (device dm-8 state EA): qgroup 0/5 has unreleased space, type 0 rsv 28672
  ------------[ cut here ]------------
  WARNING: CPU: 3 PID: 22588 at fs/btrfs/disk-io.c:4333 close_ctree+0x222/0x4d0 [btrfs]
  Modules linked in: btrfs blake2b_generic libcrc32c xor zstd_compress raid6_pq
  CPU: 3 PID: 22588 Comm: umount Kdump: loaded Tainted: G W          6.10.0-rc7-gab56fde445b8 #21
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
  RIP: 0010:close_ctree+0x222/0x4d0 [btrfs]
  RSP: 0018:ffffb4465283be00 EFLAGS: 00010202
  RAX: 0000000000000001 RBX: ffffa1a1818e1000 RCX: 0000000000000001
  RDX: 0000000000000000 RSI: ffffb4465283bbe0 RDI: ffffa1a19374fcb8
  RBP: ffffa1a1818e13c0 R08: 0000000100028b16 R09: 0000000000000000
  R10: 0000000000000003 R11: 0000000000000003 R12: ffffa1a18ad7972c
  R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
  FS:  00007f9168312b80(0000) GS:ffffa1a4afcc0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f91683c9140 CR3: 000000010acaa000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   ? close_ctree+0x222/0x4d0 [btrfs]
   ? __warn.cold+0x8e/0xea
   ? close_ctree+0x222/0x4d0 [btrfs]
   ? report_bug+0xff/0x140
   ? handle_bug+0x3b/0x70
   ? exc_invalid_op+0x17/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? close_ctree+0x222/0x4d0 [btrfs]
   generic_shutdown_super+0x70/0x160
   kill_anon_super+0x11/0x40
   btrfs_kill_super+0x11/0x20 [btrfs]
   deactivate_locked_super+0x2e/0xa0
   cleanup_mnt+0xb5/0x150
   task_work_run+0x57/0x80
   syscall_exit_to_user_mode+0x121/0x130
   do_syscall_64+0xab/0x1a0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7f916847a887
  ---[ end trace 0000000000000000 ]---
  BTRFS error (device dm-8 state EA): qgroup reserved space leaked

Cases 2 and 3 in the out_reserve path both pertain to this type of leak
and must free the reserved qgroup data. Because it is already an error
path, I opted not to handle the possible errors in
btrfs_free_qgroup_data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46733/">CVE-2024-46733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46733">CVE-2024-46733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230708">SUSE bug 1230708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46734" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46734" ref_url="https://www.suse.com/security/cve/CVE-2024-46734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race between direct IO write and fsync when using same fd

If we have 2 threads that are using the same file descriptor and one of
them is doing direct IO writes while the other is doing fsync, we have a
race where we can end up either:

1) Attempt a fsync without holding the inode's lock, triggering an
   assertion failures when assertions are enabled;

2) Do an invalid memory access from the fsync task because the file private
   points to memory allocated on stack by the direct IO task and it may be
   used by the fsync task after the stack was destroyed.

The race happens like this:

1) A user space program opens a file descriptor with O_DIRECT;

2) The program spawns 2 threads using libpthread for example;

3) One of the threads uses the file descriptor to do direct IO writes,
   while the other calls fsync using the same file descriptor.

4) Call task A the thread doing direct IO writes and task B the thread
   doing fsyncs;

5) Task A does a direct IO write, and at btrfs_direct_write() sets the
   file's private to an on stack allocated private with the member
   'fsync_skip_inode_lock' set to true;

6) Task B enters btrfs_sync_file() and sees that there's a private
   structure associated to the file which has 'fsync_skip_inode_lock' set
   to true, so it skips locking the inode's VFS lock;

7) Task A completes the direct IO write, and resets the file's private to
   NULL since it had no prior private and our private was stack allocated.
   Then it unlocks the inode's VFS lock;

8) Task B enters btrfs_get_ordered_extents_for_logging(), then the
   assertion that checks the inode's VFS lock is held fails, since task B
   never locked it and task A has already unlocked it.

The stack trace produced is the following:

   assertion failed: inode_is_locked(&amp;inode-&gt;vfs_inode), in fs/btrfs/ordered-data.c:983
   ------------[ cut here ]------------
   kernel BUG at fs/btrfs/ordered-data.c:983!
   Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
   CPU: 9 PID: 5072 Comm: worker Tainted: G     U     OE      6.10.5-1-default #1 openSUSE Tumbleweed 69f48d427608e1c09e60ea24c6c55e2ca1b049e8
   Hardware name: Acer Predator PH315-52/Covini_CFS, BIOS V1.12 07/28/2020
   RIP: 0010:btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs]
   Code: 50 d6 86 c0 e8 (...)
   RSP: 0018:ffff9e4a03dcfc78 EFLAGS: 00010246
   RAX: 0000000000000054 RBX: ffff9078a9868e98 RCX: 0000000000000000
   RDX: 0000000000000000 RSI: ffff907dce4a7800 RDI: ffff907dce4a7800
   RBP: ffff907805518800 R08: 0000000000000000 R09: ffff9e4a03dcfb38
   R10: ffff9e4a03dcfb30 R11: 0000000000000003 R12: ffff907684ae7800
   R13: 0000000000000001 R14: ffff90774646b600 R15: 0000000000000000
   FS:  00007f04b96006c0(0000) GS:ffff907dce480000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00007f32acbfc000 CR3: 00000001fd4fa005 CR4: 00000000003726f0
   Call Trace:
    &lt;TASK&gt;
    ? __die_body.cold+0x14/0x24
    ? die+0x2e/0x50
    ? do_trap+0xca/0x110
    ? do_error_trap+0x6a/0x90
    ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a]
    ? exc_invalid_op+0x50/0x70
    ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a]
    ? asm_exc_invalid_op+0x1a/0x20
    ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a]
    ? btrfs_get_ordered_extents_for_logging.cold+0x1f/0x42 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a]
    btrfs_sync_file+0x21a/0x4d0 [btrfs bb26272d49b4cdc847cf3f7faadd459b62caee9a]
    ? __seccomp_filter+0x31d/0x4f0
    __x64_sys_fdatasync+0x4f/0x90
    do_syscall_64+0x82/0x160
    ? do_futex+0xcb/0x190
    ? __x64_sys_futex+0x10e/0x1d0
    ? switch_fpu_return+0x4f/0xd0
    ? syscall_exit_to_user_mode+0x72/0x220
    ? do_syscall_64+0x8e/0x160
    ? syscall_exit_to_user_mod
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46734/">CVE-2024-46734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46734">CVE-2024-46734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230726">SUSE bug 1230726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46735</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46735" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46735" ref_url="https://www.suse.com/security/cve/CVE-2024-46735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk_drv: fix NULL pointer dereference in ublk_ctrl_start_recovery()

When two UBLK_CMD_START_USER_RECOVERY commands are submitted, the
first one sets 'ubq-&gt;ubq_daemon' to NULL, and the second one triggers
WARN in ublk_queue_reinit() and subsequently a NULL pointer dereference
issue.

Fix it by adding the check in ublk_ctrl_start_recovery() and return
immediately in case of zero 'ub-&gt;nr_queues_ready'.

  BUG: kernel NULL pointer dereference, address: 0000000000000028
  RIP: 0010:ublk_ctrl_start_recovery.constprop.0+0x82/0x180
  Call Trace:
   &lt;TASK&gt;
   ? __die+0x20/0x70
   ? page_fault_oops+0x75/0x170
   ? exc_page_fault+0x64/0x140
   ? asm_exc_page_fault+0x22/0x30
   ? ublk_ctrl_start_recovery.constprop.0+0x82/0x180
   ublk_ctrl_uring_cmd+0x4f7/0x6c0
   ? pick_next_task_idle+0x26/0x40
   io_uring_cmd+0x9a/0x1b0
   io_issue_sqe+0x193/0x3f0
   io_wq_submit_work+0x9b/0x390
   io_worker_handle_work+0x165/0x360
   io_wq_worker+0xcb/0x2f0
   ? finish_task_switch.isra.0+0x203/0x290
   ? finish_task_switch.isra.0+0x203/0x290
   ? __pfx_io_wq_worker+0x10/0x10
   ret_from_fork+0x2d/0x50
   ? __pfx_io_wq_worker+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46735/">CVE-2024-46735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46735">CVE-2024-46735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230727">SUSE bug 1230727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46736" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46736" ref_url="https://www.suse.com/security/cve/CVE-2024-46736" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix double put of @cfile in smb2_rename_path()

If smb2_set_path_attr() is called with a valid @cfile and returned
-EINVAL, we need to call cifs_get_writable_path() again as the
reference of @cfile was already dropped by previous smb2_compound_op()
call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46736/">CVE-2024-46736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46736">CVE-2024-46736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230728">SUSE bug 1230728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46737</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fix kernel crash if commands allocation fails

If the commands allocation fails in nvmet_tcp_alloc_cmds()
the kernel crashes in nvmet_tcp_release_queue_work() because of
a NULL pointer dereference.

  nvmet: failed to install queue 0 cntlid 1 ret 6
  Unable to handle kernel NULL pointer dereference at
         virtual address 0000000000000008

Fix the bug by setting queue-&gt;nr_cmds to zero in case
nvmet_tcp_alloc_cmd() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230730">SUSE bug 1230730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: Fix use-after-free when removing resource in vmci_resource_remove()

When removing a resource from vmci_resource_table in
vmci_resource_remove(), the search is performed using the resource
handle by comparing context and resource fields.

It is possible though to create two resources with different types
but same handle (same context and resource fields).

When trying to remove one of the resources, vmci_resource_remove()
may not remove the intended one, but the object will still be freed
as in the case of the datagram type in vmci_datagram_destroy_handle().
vmci_resource_table will still hold a pointer to this freed resource
leading to a use-after-free vulnerability.

BUG: KASAN: use-after-free in vmci_handle_is_equal include/linux/vmw_vmci_defs.h:142 [inline]
BUG: KASAN: use-after-free in vmci_resource_remove+0x3a1/0x410 drivers/misc/vmw_vmci/vmci_resource.c:147
Read of size 4 at addr ffff88801c16d800 by task syz-executor197/1592
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x82/0xa9 lib/dump_stack.c:106
 print_address_description.constprop.0+0x21/0x366 mm/kasan/report.c:239
 __kasan_report.cold+0x7f/0x132 mm/kasan/report.c:425
 kasan_report+0x38/0x51 mm/kasan/report.c:442
 vmci_handle_is_equal include/linux/vmw_vmci_defs.h:142 [inline]
 vmci_resource_remove+0x3a1/0x410 drivers/misc/vmw_vmci/vmci_resource.c:147
 vmci_qp_broker_detach+0x89a/0x11b9 drivers/misc/vmw_vmci/vmci_queue_pair.c:2182
 ctx_free_ctx+0x473/0xbe1 drivers/misc/vmw_vmci/vmci_context.c:444
 kref_put include/linux/kref.h:65 [inline]
 vmci_ctx_put drivers/misc/vmw_vmci/vmci_context.c:497 [inline]
 vmci_ctx_destroy+0x170/0x1d6 drivers/misc/vmw_vmci/vmci_context.c:195
 vmci_host_close+0x125/0x1ac drivers/misc/vmw_vmci/vmci_host.c:143
 __fput+0x261/0xa34 fs/file_table.c:282
 task_work_run+0xf0/0x194 kernel/task_work.c:164
 tracehook_notify_resume include/linux/tracehook.h:189 [inline]
 exit_to_user_mode_loop+0x184/0x189 kernel/entry/common.c:187
 exit_to_user_mode_prepare+0x11b/0x123 kernel/entry/common.c:220
 __syscall_exit_to_user_mode_work kernel/entry/common.c:302 [inline]
 syscall_exit_to_user_mode+0x18/0x42 kernel/entry/common.c:313
 do_syscall_64+0x41/0x85 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x6e/0x0

This change ensures the type is also checked when removing
the resource from vmci_resource_table in vmci_resource_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230731">SUSE bug 1230731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind

For primary VM Bus channels, primary_channel pointer is always NULL. This
pointer is valid only for the secondary channels. Also, rescind callback
is meant for primary channels only.

Fix NULL pointer dereference by retrieving the device_obj from the parent
for the primary channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-10-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230732">SUSE bug 1230732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46740" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46740" ref_url="https://www.suse.com/security/cve/CVE-2024-46740" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix UAF caused by offsets overwrite

Binder objects are processed and copied individually into the target
buffer during transactions. Any raw data in-between these objects is
copied as well. However, this raw data copy lacks an out-of-bounds
check. If the raw data exceeds the data section size then the copy
overwrites the offsets section. This eventually triggers an error that
attempts to unwind the processed objects. However, at this point the
offsets used to index these objects are now corrupted.

Unwinding with corrupted offsets can result in decrements of arbitrary
nodes and lead to their premature release. Other users of such nodes are
left with a dangling pointer triggering a use-after-free. This issue is
made evident by the following KASAN report (trimmed):

  ==================================================================
  BUG: KASAN: slab-use-after-free in _raw_spin_lock+0xe4/0x19c
  Write of size 4 at addr ffff47fc91598f04 by task binder-util/743

  CPU: 9 UID: 0 PID: 743 Comm: binder-util Not tainted 6.11.0-rc4 #1
  Hardware name: linux,dummy-virt (DT)
  Call trace:
   _raw_spin_lock+0xe4/0x19c
   binder_free_buf+0x128/0x434
   binder_thread_write+0x8a4/0x3260
   binder_ioctl+0x18f0/0x258c
  [...]

  Allocated by task 743:
   __kmalloc_cache_noprof+0x110/0x270
   binder_new_node+0x50/0x700
   binder_transaction+0x413c/0x6da8
   binder_thread_write+0x978/0x3260
   binder_ioctl+0x18f0/0x258c
  [...]

  Freed by task 745:
   kfree+0xbc/0x208
   binder_thread_read+0x1c5c/0x37d4
   binder_ioctl+0x16d8/0x258c
  [...]
  ==================================================================

To avoid this issue, let's check that the raw data copy is within the
boundaries of the data section.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46740/">CVE-2024-46740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46740">CVE-2024-46740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230734">SUSE bug 1230734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46741" ref_url="https://www.suse.com/security/cve/CVE-2024-46741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix double free of 'buf' in error path

smatch warning:
drivers/misc/fastrpc.c:1926 fastrpc_req_mmap() error: double free of 'buf'

In fastrpc_req_mmap() error path, the fastrpc buffer is freed in
fastrpc_req_munmap_impl() if unmap is successful.

But in the end, there is an unconditional call to fastrpc_buf_free().
So the above case triggers the double free of fastrpc buf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-10"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46741/">CVE-2024-46741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46741">CVE-2024-46741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230749">SUSE bug 1230749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46742" ref_url="https://www.suse.com/security/cve/CVE-2024-46742" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb/server: fix potential null-ptr-deref of lease_ctx_info in smb2_open()

null-ptr-deref will occur when (req_op_level == SMB2_OPLOCK_LEVEL_LEASE)
and parse_lease_state() return NULL.

Fix this by check if 'lease_ctx_info' is NULL.

Additionally, remove the redundant parentheses in
parse_durable_handle_context().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46742/">CVE-2024-46742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46742">CVE-2024-46742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230750">SUSE bug 1230750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of/irq: Prevent device address out-of-bounds read in interrupt map walk

When of_irq_parse_raw() is invoked with a device address smaller than
the interrupt parent node (from #address-cells property), KASAN detects
the following out-of-bounds read when populating the initial match table
(dyndbg="func of_irq_parse_* +p"):

  OF: of_irq_parse_one: dev=/soc@0/picasso/watchdog, index=0
  OF:  parent=/soc@0/pci@878000000000/gpio0@17,0, intsize=2
  OF:  intspec=4
  OF: of_irq_parse_raw: ipar=/soc@0/pci@878000000000/gpio0@17,0, size=2
  OF:  -&gt; addrsize=3
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in of_irq_parse_raw+0x2b8/0x8d0
  Read of size 4 at addr ffffff81beca5608 by task bash/764

  CPU: 1 PID: 764 Comm: bash Tainted: G           O       6.1.67-484c613561-nokia_sm_arm64 #1
  Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.01-12.24.03-dirty 01/01/2023
  Call trace:
   dump_backtrace+0xdc/0x130
   show_stack+0x1c/0x30
   dump_stack_lvl+0x6c/0x84
   print_report+0x150/0x448
   kasan_report+0x98/0x140
   __asan_load4+0x78/0xa0
   of_irq_parse_raw+0x2b8/0x8d0
   of_irq_parse_one+0x24c/0x270
   parse_interrupts+0xc0/0x120
   of_fwnode_add_links+0x100/0x2d0
   fw_devlink_parse_fwtree+0x64/0xc0
   device_add+0xb38/0xc30
   of_device_add+0x64/0x90
   of_platform_device_create_pdata+0xd0/0x170
   of_platform_bus_create+0x244/0x600
   of_platform_notify+0x1b0/0x254
   blocking_notifier_call_chain+0x9c/0xd0
   __of_changeset_entry_notify+0x1b8/0x230
   __of_changeset_apply_notify+0x54/0xe4
   of_overlay_fdt_apply+0xc04/0xd94
   ...

  The buggy address belongs to the object at ffffff81beca5600
   which belongs to the cache kmalloc-128 of size 128
  The buggy address is located 8 bytes inside of
   128-byte region [ffffff81beca5600, ffffff81beca5680)

  The buggy address belongs to the physical page:
  page:00000000230d3d03 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1beca4
  head:00000000230d3d03 order:1 compound_mapcount:0 compound_pincount:0
  flags: 0x8000000000010200(slab|head|zone=2)
  raw: 8000000000010200 0000000000000000 dead000000000122 ffffff810000c300
  raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffffff81beca5500: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffffff81beca5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  &gt;ffffff81beca5600: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                        ^
   ffffff81beca5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffffff81beca5700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
  ==================================================================
  OF:  -&gt; got it !

Prevent the out-of-bounds read by copying the device address into a
buffer of sufficient size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230756">SUSE bug 1230756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: sanity check symbolic link size

Syzkiller reports a "KMSAN: uninit-value in pick_link" bug.

This is caused by an uninitialised page, which is ultimately caused
by a corrupted symbolic link size read from disk.

The reason why the corrupted symlink size causes an uninitialised
page is due to the following sequence of events:

1. squashfs_read_inode() is called to read the symbolic
   link from disk.  This assigns the corrupted value
   3875536935 to inode-&gt;i_size.

2. Later squashfs_symlink_read_folio() is called, which assigns
   this corrupted value to the length variable, which being a
   signed int, overflows producing a negative number.

3. The following loop that fills in the page contents checks that
   the copied bytes is less than length, which being negative means
   the loop is skipped, producing an uninitialised page.

This patch adds a sanity check which checks that the symbolic
link size is not larger than expected.

--

V2: fix spelling mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230747">SUSE bug 1230747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - reject requests with unreasonable number of slots


When exercising uinput interface syzkaller may try setting up device
with a really large number of slots, which causes memory allocation
failure in input_mt_init_slots(). While this allocation failure is
handled properly and request is rejected, it results in syzkaller
reports. Additionally, such request may put undue burden on the
system which will try to free a lot of memory for a bogus request.

Fix it by limiting allowed number of slots to 100. This can easily
be extended if we see devices that can track more than 100 contacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230748">SUSE bug 1230748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: free driver_data after destroying hid device

HID driver callbacks aren't called anymore once hid_destroy_device() has
been called. Hence, hid driver_data should be freed only after the
hid_destroy_device() function returned as driver_data is used in several
callbacks.

I observed a crash with kernel 6.10.0 on my T14s Gen 3, after enabling
KASAN to debug memory allocation, I got this output:

  [   13.050438] ==================================================================
  [   13.054060] BUG: KASAN: slab-use-after-free in amd_sfh_get_report+0x3ec/0x530 [amd_sfh]
  [   13.054809] psmouse serio1: trackpoint: Synaptics TrackPoint firmware: 0x02, buttons: 3/3
  [   13.056432] Read of size 8 at addr ffff88813152f408 by task (udev-worker)/479

  [   13.060970] CPU: 5 PID: 479 Comm: (udev-worker) Not tainted 6.10.0-arch1-2 #1 893bb55d7f0073f25c46adbb49eb3785fefd74b0
  [   13.063978] Hardware name: LENOVO 21CQCTO1WW/21CQCTO1WW, BIOS R22ET70W (1.40 ) 03/21/2024
  [   13.067860] Call Trace:
  [   13.069383] input: TPPS/2 Synaptics TrackPoint as /devices/platform/i8042/serio1/input/input8
  [   13.071486]  &lt;TASK&gt;
  [   13.071492]  dump_stack_lvl+0x5d/0x80
  [   13.074870] snd_hda_intel 0000:33:00.6: enabling device (0000 -&gt; 0002)
  [   13.078296]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.082199]  print_report+0x174/0x505
  [   13.085776]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
  [   13.089367]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.093255]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.097464]  kasan_report+0xc8/0x150
  [   13.101461]  ? amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.105802]  amd_sfh_get_report+0x3ec/0x530 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.110303]  amdtp_hid_request+0xb8/0x110 [amd_sfh 05f43221435b5205f734cd9da29399130f398a38]
  [   13.114879]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.119450]  sensor_hub_get_feature+0x1d3/0x540 [hid_sensor_hub 3f13be3016ff415bea03008d45d99da837ee3082]
  [   13.124097]  hid_sensor_parse_common_attributes+0x4d0/0xad0 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]
  [   13.127404]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.131925]  ? __pfx_hid_sensor_parse_common_attributes+0x10/0x10 [hid_sensor_iio_common c3a5cbe93969c28b122609768bbe23efe52eb8f5]
  [   13.136455]  ? _raw_spin_lock_irqsave+0x96/0xf0
  [   13.140197]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
  [   13.143602]  ? devm_iio_device_alloc+0x34/0x50 [industrialio 3d261d5e5765625d2b052be40e526d62b1d2123b]
  [   13.147234]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.150446]  ? __devm_add_action+0x167/0x1d0
  [   13.155061]  hid_gyro_3d_probe+0x120/0x7f0 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]
  [   13.158581]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.161814]  platform_probe+0xa2/0x150
  [   13.165029]  really_probe+0x1e3/0x8a0
  [   13.168243]  __driver_probe_device+0x18c/0x370
  [   13.171500]  driver_probe_device+0x4a/0x120
  [   13.175000]  __driver_attach+0x190/0x4a0
  [   13.178521]  ? __pfx___driver_attach+0x10/0x10
  [   13.181771]  bus_for_each_dev+0x106/0x180
  [   13.185033]  ? __pfx__raw_spin_lock+0x10/0x10
  [   13.188229]  ? __pfx_bus_for_each_dev+0x10/0x10
  [   13.191446]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.194382]  bus_add_driver+0x29e/0x4d0
  [   13.197328]  driver_register+0x1a5/0x360
  [   13.200283]  ? __pfx_hid_gyro_3d_platform_driver_init+0x10/0x10 [hid_sensor_gyro_3d 63da36a143b775846ab2dbb86c343b401b5e3172]
  [   13.203362]  do_one_initcall+0xa7/0x380
  [   13.206432]  ? __pfx_do_one_initcall+0x10/0x10
  [   13.210175]  ? srso_alias_return_thunk+0x5/0xfbef5
  [   13.213211]  ? kasan_unpoison+0x44/0x70
  [   13.216688]  do_init_module+0x238/0x750
  [   13.2196
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230751">SUSE bug 1230751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup

report_fixup for the Cougar 500k Gaming Keyboard was not verifying
that the report descriptor size was correct before accessing it
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230752">SUSE bug 1230752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46748" ref_url="https://www.suse.com/security/cve/CVE-2024-46748" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: Set the max subreq size for cache writes to MAX_RW_COUNT

Set the maximum size of a subrequest that writes to cachefiles to be
MAX_RW_COUNT so that we don't overrun the maximum write we can make to the
backing filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46748/">CVE-2024-46748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46748">CVE-2024-46748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230744">SUSE bug 1230744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46749" ref_url="https://www.suse.com/security/cve/CVE-2024-46749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btnxpuart: Fix Null pointer dereference in btnxpuart_flush()

This adds a check before freeing the rx-&gt;skb in flush and close
functions to handle the kernel crash seen while removing driver after FW
download fails or before FW download completes.

dmesg log:
[   54.634586] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000080
[   54.643398] Mem abort info:
[   54.646204]   ESR = 0x0000000096000004
[   54.649964]   EC = 0x25: DABT (current EL), IL = 32 bits
[   54.655286]   SET = 0, FnV = 0
[   54.658348]   EA = 0, S1PTW = 0
[   54.661498]   FSC = 0x04: level 0 translation fault
[   54.666391] Data abort info:
[   54.669273]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[   54.674768]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   54.674771]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   54.674775] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000048860000
[   54.674780] [0000000000000080] pgd=0000000000000000, p4d=0000000000000000
[   54.703880] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[   54.710152] Modules linked in: btnxpuart(-) overlay fsl_jr_uio caam_jr caamkeyblob_desc caamhash_desc caamalg_desc crypto_engine authenc libdes crct10dif_ce polyval_ce polyval_generic snd_soc_imx_spdif snd_soc_imx_card snd_soc_ak5558 snd_soc_ak4458 caam secvio error snd_soc_fsl_micfil snd_soc_fsl_spdif snd_soc_fsl_sai snd_soc_fsl_utils imx_pcm_dma gpio_ir_recv rc_core sch_fq_codel fuse
[   54.744357] CPU: 3 PID: 72 Comm: kworker/u9:0 Not tainted 6.6.3-otbr-g128004619037 #2
[   54.744364] Hardware name: FSL i.MX8MM EVK board (DT)
[   54.744368] Workqueue: hci0 hci_power_on
[   54.757244] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   54.757249] pc : kfree_skb_reason+0x18/0xb0
[   54.772299] lr : btnxpuart_flush+0x40/0x58 [btnxpuart]
[   54.782921] sp : ffff8000805ebca0
[   54.782923] x29: ffff8000805ebca0 x28: ffffa5c6cf1869c0 x27: ffffa5c6cf186000
[   54.782931] x26: ffff377b84852400 x25: ffff377b848523c0 x24: ffff377b845e7230
[   54.782938] x23: ffffa5c6ce8dbe08 x22: ffffa5c6ceb65410 x21: 00000000ffffff92
[   54.782945] x20: ffffa5c6ce8dbe98 x19: ffffffffffffffac x18: ffffffffffffffff
[   54.807651] x17: 0000000000000000 x16: ffffa5c6ce2824ec x15: ffff8001005eb857
[   54.821917] x14: 0000000000000000 x13: ffffa5c6cf1a02e0 x12: 0000000000000642
[   54.821924] x11: 0000000000000040 x10: ffffa5c6cf19d690 x9 : ffffa5c6cf19d688
[   54.821931] x8 : ffff377b86000028 x7 : 0000000000000000 x6 : 0000000000000000
[   54.821938] x5 : ffff377b86000000 x4 : 0000000000000000 x3 : 0000000000000000
[   54.843331] x2 : 0000000000000000 x1 : 0000000000000002 x0 : ffffffffffffffac
[   54.857599] Call trace:
[   54.857601]  kfree_skb_reason+0x18/0xb0
[   54.863878]  btnxpuart_flush+0x40/0x58 [btnxpuart]
[   54.863888]  hci_dev_open_sync+0x3a8/0xa04
[   54.872773]  hci_power_on+0x54/0x2e4
[   54.881832]  process_one_work+0x138/0x260
[   54.881842]  worker_thread+0x32c/0x438
[   54.881847]  kthread+0x118/0x11c
[   54.881853]  ret_from_fork+0x10/0x20
[   54.896406] Code: a9be7bfd 910003fd f9000bf3 aa0003f3 (b940d400)
[   54.896410] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46749/">CVE-2024-46749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46749">CVE-2024-46749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230780">SUSE bug 1230780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Add missing bridge lock to pci_bus_lock()

One of the true positives that the cfg_access_lock lockdep effort
identified is this sequence:

  WARNING: CPU: 14 PID: 1 at drivers/pci/pci.c:4886 pci_bridge_secondary_bus_reset+0x5d/0x70
  RIP: 0010:pci_bridge_secondary_bus_reset+0x5d/0x70
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0x8c/0x190
   ? pci_bridge_secondary_bus_reset+0x5d/0x70
   ? report_bug+0x1f8/0x200
   ? handle_bug+0x3c/0x70
   ? exc_invalid_op+0x18/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? pci_bridge_secondary_bus_reset+0x5d/0x70
   pci_reset_bus+0x1d8/0x270
   vmd_probe+0x778/0xa10
   pci_device_probe+0x95/0x120

Where pci_reset_bus() users are triggering unlocked secondary bus resets.
Ironically pci_bus_reset(), several calls down from pci_reset_bus(), uses
pci_bus_lock() before issuing the reset which locks everything *but* the
bridge itself.

For the same motivation as adding:

  bridge = pci_upstream_bridge(dev);
  if (bridge)
    pci_dev_lock(bridge);

to pci_reset_function() for the "bus" and "cxl_bus" reset cases, add
pci_dev_lock() for @bus-&gt;self to pci_bus_lock().

[bhelgaas: squash in recursive locking deadlock fix from Keith Busch:
https://lore.kernel.org/r/20240711193650.701834-1-kbusch@meta.com]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230783">SUSE bug 1230783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't BUG_ON() when 0 reference count at btrfs_lookup_extent_info()

Instead of doing a BUG_ON() handle the error by returning -EUCLEAN,
aborting the transaction and logging an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230786">SUSE bug 1230786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46752" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: replace BUG_ON() with error handling at update_ref_for_cow()

Instead of a BUG_ON() just return an error, log an error message and
abort the transaction in case we find an extent buffer belonging to the
relocation tree that doesn't have the full backref flag set. This is
unexpected and should never happen (save for bugs or a potential bad
memory).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230794">SUSE bug 1230794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: handle errors from btrfs_dec_ref() properly

In walk_up_proc() we BUG_ON(ret) from btrfs_dec_ref().  This is
incorrect, we have proper error handling here, return the error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230796">SUSE bug 1230796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Remove tst_run from lwt_seg6local_prog_ops.

The syzbot reported that the lwt_seg6 related BPF ops can be invoked
via bpf_test_run() without without entering input_action_end_bpf()
first.

Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL
probably didn't work since it was introduced in commit 04d4b274e2a
("ipv6: sr: Add seg6local action End.BPF"). The reason is that the
per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self
test case but each BPF function expects it.

Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230801">SUSE bug 1230801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46755" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id()

mwifiex_get_priv_by_id() returns the priv pointer corresponding to
the bss_num and bss_type, but without checking if the priv is actually
currently in use.
Unused priv pointers do not have a wiphy attached to them which can
lead to NULL pointer dereferences further down the callstack.  Fix
this by returning only used priv pointers which have priv-&gt;bss_mode
set to something else than NL80211_IFTYPE_UNSPECIFIED.

Said NULL pointer dereference happened when an Accesspoint was started
with wpa_supplicant -i mlan0 with this config:

network={
        ssid="somessid"
        mode=2
        frequency=2412
        key_mgmt=WPA-PSK WPA-PSK-SHA256
        proto=RSN
        group=CCMP
        pairwise=CCMP
        psk="12345678"
}

When waiting for the AP to be established, interrupting wpa_supplicant
with &lt;ctrl-c&gt; and starting it again this happens:

| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000140
| Mem abort info:
|   ESR = 0x0000000096000004
|   EC = 0x25: DABT (current EL), IL = 32 bits
|   SET = 0, FnV = 0
|   EA = 0, S1PTW = 0
|   FSC = 0x04: level 0 translation fault
| Data abort info:
|   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
|   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
|   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
| user pgtable: 4k pages, 48-bit VAs, pgdp=0000000046d96000
| [0000000000000140] pgd=0000000000000000, p4d=0000000000000000
| Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
| Modules linked in: caam_jr caamhash_desc spidev caamalg_desc crypto_engine authenc libdes mwifiex_sdio
+mwifiex crct10dif_ce cdc_acm onboard_usb_hub fsl_imx8_ddr_perf imx8m_ddrc rtc_ds1307 lm75 rtc_snvs
+imx_sdma caam imx8mm_thermal spi_imx error imx_cpufreq_dt fuse ip_tables x_tables ipv6
| CPU: 0 PID: 8 Comm: kworker/0:1 Not tainted 6.9.0-00007-g937242013fce-dirty #18
| Hardware name: somemachine (DT)
| Workqueue: events sdio_irq_work
| pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : mwifiex_get_cfp+0xd8/0x15c [mwifiex]
| lr : mwifiex_get_cfp+0x34/0x15c [mwifiex]
| sp : ffff8000818b3a70
| x29: ffff8000818b3a70 x28: ffff000006bfd8a5 x27: 0000000000000004
| x26: 000000000000002c x25: 0000000000001511 x24: 0000000002e86bc9
| x23: ffff000006bfd996 x22: 0000000000000004 x21: ffff000007bec000
| x20: 000000000000002c x19: 0000000000000000 x18: 0000000000000000
| x17: 000000040044ffff x16: 00500072b5503510 x15: ccc283740681e517
| x14: 0201000101006d15 x13: 0000000002e8ff43 x12: 002c01000000ffb1
| x11: 0100000000000000 x10: 02e8ff43002c0100 x9 : 0000ffb100100157
| x8 : ffff000003d20000 x7 : 00000000000002f1 x6 : 00000000ffffe124
| x5 : 0000000000000001 x4 : 0000000000000003 x3 : 0000000000000000
| x2 : 0000000000000000 x1 : 0001000000011001 x0 : 0000000000000000
| Call trace:
|  mwifiex_get_cfp+0xd8/0x15c [mwifiex]
|  mwifiex_parse_single_response_buf+0x1d0/0x504 [mwifiex]
|  mwifiex_handle_event_ext_scan_report+0x19c/0x2f8 [mwifiex]
|  mwifiex_process_sta_event+0x298/0xf0c [mwifiex]
|  mwifiex_process_event+0x110/0x238 [mwifiex]
|  mwifiex_main_process+0x428/0xa44 [mwifiex]
|  mwifiex_sdio_interrupt+0x64/0x12c [mwifiex_sdio]
|  process_sdio_pending_irqs+0x64/0x1b8
|  sdio_irq_work+0x4c/0x7c
|  process_one_work+0x148/0x2a0
|  worker_thread+0x2fc/0x40c
|  kthread+0x110/0x114
|  ret_from_fork+0x10/0x20
| Code: a94153f3 a8c37bfd d50323bf d65f03c0 (f940a000)
| ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230802">SUSE bug 1230802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2025-01-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230812">SUSE bug 1230812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46760" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46760" ref_url="https://www.suse.com/security/cve/CVE-2024-46760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: usb: schedule rx work after everything is set up

Right now it's possible to hit NULL pointer dereference in
rtw_rx_fill_rx_status on hw object and/or its fields because
initialization routine can start getting USB replies before
rtw_dev is fully setup.

The stack trace looks like this:

rtw_rx_fill_rx_status
rtw8821c_query_rx_desc
rtw_usb_rx_handler
...
queue_work
rtw_usb_read_port_complete
...
usb_submit_urb
rtw_usb_rx_resubmit
rtw_usb_init_rx
rtw_usb_probe

So while we do the async stuff rtw_usb_probe continues and calls
rtw_register_hw, which does all kinds of initialization (e.g.
via ieee80211_register_hw) that rtw_rx_fill_rx_status relies on.

Fix this by moving the first usb_submit_urb after everything
is set up.

For me, this bug manifested as:
[    8.893177] rtw_8821cu 1-1:1.2: band wrong, packet dropped
[    8.910904] rtw_8821cu 1-1:1.2: hw-&gt;conf.chandef.chan NULL in rtw_rx_fill_rx_status
because I'm using Larry's backport of rtw88 driver with the NULL
checks in rtw_rx_fill_rx_status.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46760/">CVE-2024-46760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46760">CVE-2024-46760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230753">SUSE bug 1230753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv

The hotplug driver for powerpc (pci/hotplug/pnv_php.c) causes a kernel
crash when we try to hot-unplug/disable the PCIe switch/bridge from
the PHB.

The crash occurs because although the MSI data structure has been
released during disable/hot-unplug path and it has been assigned
with NULL, still during unregistration the code was again trying to
explicitly disable the MSI which causes the NULL pointer dereference and
kernel crash.

The patch fixes the check during unregistration path to prevent invoking
pci_disable_msi/msix() since its data structure is already freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230761">SUSE bug 1230761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46762</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46762" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46762" ref_url="https://www.suse.com/security/cve/CVE-2024-46762" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen: privcmd: Fix possible access to a freed kirqfd instance

Nothing prevents simultaneous ioctl calls to privcmd_irqfd_assign() and
privcmd_irqfd_deassign(). If that happens, it is possible that a kirqfd
created and added to the irqfds_list by privcmd_irqfd_assign() may get
removed by another thread executing privcmd_irqfd_deassign(), while the
former is still using it after dropping the locks.

This can lead to a situation where an already freed kirqfd instance may
be accessed and cause kernel oops.

Use SRCU locking to prevent the same, as is done for the KVM
implementation for irqfds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46762/">CVE-2024-46762 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46762">CVE-2024-46762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230799">SUSE bug 1230799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46764" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46764" ref_url="https://www.suse.com/security/cve/CVE-2024-46764" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: add check for invalid name in btf_name_valid_section()

If the length of the name string is 1 and the value of name[0] is NULL
byte, an OOB vulnerability occurs in btf_name_valid_section() and the
return value is true, so the invalid name passes the check.

To solve this, you need to check if the first position is NULL byte and
if the first character is printable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46764/">CVE-2024-46764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46764">CVE-2024-46764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230804">SUSE bug 1230804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46765" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46765" ref_url="https://www.suse.com/security/cve/CVE-2024-46765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: protect XDP configuration with a mutex

The main threat to data consistency in ice_xdp() is a possible asynchronous
PF reset. It can be triggered by a user or by TX timeout handler.

XDP setup and PF reset code access the same resources in the following
sections:
* ice_vsi_close() in ice_prepare_for_reset() - already rtnl-locked
* ice_vsi_rebuild() for the PF VSI - not protected
* ice_vsi_open() - already rtnl-locked

With an unfortunate timing, such accesses can result in a crash such as the
one below:

[ +1.999878] ice 0000:b1:00.0: Registered XDP mem model MEM_TYPE_XSK_BUFF_POOL on Rx ring 14
[ +2.002992] ice 0000:b1:00.0: Registered XDP mem model MEM_TYPE_XSK_BUFF_POOL on Rx ring 18
[Mar15 18:17] ice 0000:b1:00.0 ens801f0np0: NETDEV WATCHDOG: CPU: 38: transmit queue 14 timed out 80692736 ms
[ +0.000093] ice 0000:b1:00.0 ens801f0np0: tx_timeout: VSI_num: 6, Q 14, NTC: 0x0, HW_HEAD: 0x0, NTU: 0x0, INT: 0x4000001
[ +0.000012] ice 0000:b1:00.0 ens801f0np0: tx_timeout recovery level 1, txqueue 14
[ +0.394718] ice 0000:b1:00.0: PTP reset successful
[ +0.006184] BUG: kernel NULL pointer dereference, address: 0000000000000098
[ +0.000045] #PF: supervisor read access in kernel mode
[ +0.000023] #PF: error_code(0x0000) - not-present page
[ +0.000023] PGD 0 P4D 0
[ +0.000018] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ +0.000023] CPU: 38 PID: 7540 Comm: kworker/38:1 Not tainted 6.8.0-rc7 #1
[ +0.000031] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0014.082620210524 08/26/2021
[ +0.000036] Workqueue: ice ice_service_task [ice]
[ +0.000183] RIP: 0010:ice_clean_tx_ring+0xa/0xd0 [ice]
[...]
[ +0.000013] Call Trace:
[ +0.000016] &lt;TASK&gt;
[ +0.000014] ? __die+0x1f/0x70
[ +0.000029] ? page_fault_oops+0x171/0x4f0
[ +0.000029] ? schedule+0x3b/0xd0
[ +0.000027] ? exc_page_fault+0x7b/0x180
[ +0.000022] ? asm_exc_page_fault+0x22/0x30
[ +0.000031] ? ice_clean_tx_ring+0xa/0xd0 [ice]
[ +0.000194] ice_free_tx_ring+0xe/0x60 [ice]
[ +0.000186] ice_destroy_xdp_rings+0x157/0x310 [ice]
[ +0.000151] ice_vsi_decfg+0x53/0xe0 [ice]
[ +0.000180] ice_vsi_rebuild+0x239/0x540 [ice]
[ +0.000186] ice_vsi_rebuild_by_type+0x76/0x180 [ice]
[ +0.000145] ice_rebuild+0x18c/0x840 [ice]
[ +0.000145] ? delay_tsc+0x4a/0xc0
[ +0.000022] ? delay_tsc+0x92/0xc0
[ +0.000020] ice_do_reset+0x140/0x180 [ice]
[ +0.000886] ice_service_task+0x404/0x1030 [ice]
[ +0.000824] process_one_work+0x171/0x340
[ +0.000685] worker_thread+0x277/0x3a0
[ +0.000675] ? preempt_count_add+0x6a/0xa0
[ +0.000677] ? _raw_spin_lock_irqsave+0x23/0x50
[ +0.000679] ? __pfx_worker_thread+0x10/0x10
[ +0.000653] kthread+0xf0/0x120
[ +0.000635] ? __pfx_kthread+0x10/0x10
[ +0.000616] ret_from_fork+0x2d/0x50
[ +0.000612] ? __pfx_kthread+0x10/0x10
[ +0.000604] ret_from_fork_asm+0x1b/0x30
[ +0.000604] &lt;/TASK&gt;

The previous way of handling this through returning -EBUSY is not viable,
particularly when destroying AF_XDP socket, because the kernel proceeds
with removal anyway.

There is plenty of code between those calls and there is no need to create
a large critical section that covers all of them, same as there is no need
to protect ice_vsi_rebuild() with rtnl_lock().

Add xdp_state_lock mutex to protect ice_vsi_rebuild() and ice_xdp().

Leaving unprotected sections in between would result in two states that
have to be considered:
1. when the VSI is closed, but not yet rebuild
2. when VSI is already rebuild, but not yet open

The latter case is actually already handled through !netif_running() case,
we just need to adjust flag checking a little. The former one is not as
trivial, because between ice_vsi_close() and ice_vsi_rebuild(), a lot of
hardware interaction happens, this can make adding/deleting rings exit
with an error. Luckily, VSI rebuild is pending and can apply new
configuration for us in a managed fashion.

Therefore, add an additional VSI state flag ICE_VSI_REBUILD_PENDING to
indicate that ice_x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46765/">CVE-2024-46765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46765">CVE-2024-46765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230807">SUSE bug 1230807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46766" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46766" ref_url="https://www.suse.com/security/cve/CVE-2024-46766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: move netif_queue_set_napi to rtnl-protected sections

Currently, netif_queue_set_napi() is called from ice_vsi_rebuild() that is
not rtnl-locked when called from the reset. This creates the need to take
the rtnl_lock just for a single function and complicates the
synchronization with .ndo_bpf. At the same time, there no actual need to
fill napi-to-queue information at this exact point.

Fill napi-to-queue information when opening the VSI and clear it when the
VSI is being closed. Those routines are already rtnl-locked.

Also, rewrite napi-to-queue assignment in a way that prevents inclusion of
XDP queues, as this leads to out-of-bounds writes, such as one below.

[  +0.000004] BUG: KASAN: slab-out-of-bounds in netif_queue_set_napi+0x1c2/0x1e0
[  +0.000012] Write of size 8 at addr ffff889881727c80 by task bash/7047
[  +0.000006] CPU: 24 PID: 7047 Comm: bash Not tainted 6.10.0-rc2+ #2
[  +0.000004] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0014.082620210524 08/26/2021
[  +0.000003] Call Trace:
[  +0.000003]  &lt;TASK&gt;
[  +0.000002]  dump_stack_lvl+0x60/0x80
[  +0.000007]  print_report+0xce/0x630
[  +0.000007]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[  +0.000007]  ? __virt_addr_valid+0x1c9/0x2c0
[  +0.000005]  ? netif_queue_set_napi+0x1c2/0x1e0
[  +0.000003]  kasan_report+0xe9/0x120
[  +0.000004]  ? netif_queue_set_napi+0x1c2/0x1e0
[  +0.000004]  netif_queue_set_napi+0x1c2/0x1e0
[  +0.000005]  ice_vsi_close+0x161/0x670 [ice]
[  +0.000114]  ice_dis_vsi+0x22f/0x270 [ice]
[  +0.000095]  ice_pf_dis_all_vsi.constprop.0+0xae/0x1c0 [ice]
[  +0.000086]  ice_prepare_for_reset+0x299/0x750 [ice]
[  +0.000087]  pci_dev_save_and_disable+0x82/0xd0
[  +0.000006]  pci_reset_function+0x12d/0x230
[  +0.000004]  reset_store+0xa0/0x100
[  +0.000006]  ? __pfx_reset_store+0x10/0x10
[  +0.000002]  ? __pfx_mutex_lock+0x10/0x10
[  +0.000004]  ? __check_object_size+0x4c1/0x640
[  +0.000007]  kernfs_fop_write_iter+0x30b/0x4a0
[  +0.000006]  vfs_write+0x5d6/0xdf0
[  +0.000005]  ? fd_install+0x180/0x350
[  +0.000005]  ? __pfx_vfs_write+0x10/0xA10
[  +0.000004]  ? do_fcntl+0x52c/0xcd0
[  +0.000004]  ? kasan_save_track+0x13/0x60
[  +0.000003]  ? kasan_save_free_info+0x37/0x60
[  +0.000006]  ksys_write+0xfa/0x1d0
[  +0.000003]  ? __pfx_ksys_write+0x10/0x10
[  +0.000002]  ? __x64_sys_fcntl+0x121/0x180
[  +0.000004]  ? _raw_spin_lock+0x87/0xe0
[  +0.000005]  do_syscall_64+0x80/0x170
[  +0.000007]  ? _raw_spin_lock+0x87/0xe0
[  +0.000004]  ? __pfx__raw_spin_lock+0x10/0x10
[  +0.000003]  ? file_close_fd_locked+0x167/0x230
[  +0.000005]  ? syscall_exit_to_user_mode+0x7d/0x220
[  +0.000005]  ? do_syscall_64+0x8c/0x170
[  +0.000004]  ? do_syscall_64+0x8c/0x170
[  +0.000003]  ? do_syscall_64+0x8c/0x170
[  +0.000003]  ? fput+0x1a/0x2c0
[  +0.000004]  ? filp_close+0x19/0x30
[  +0.000004]  ? do_dup2+0x25a/0x4c0
[  +0.000004]  ? __x64_sys_dup2+0x6e/0x2e0
[  +0.000002]  ? syscall_exit_to_user_mode+0x7d/0x220
[  +0.000004]  ? do_syscall_64+0x8c/0x170
[  +0.000003]  ? __count_memcg_events+0x113/0x380
[  +0.000005]  ? handle_mm_fault+0x136/0x820
[  +0.000005]  ? do_user_addr_fault+0x444/0xa80
[  +0.000004]  ? clear_bhb_loop+0x25/0x80
[  +0.000004]  ? clear_bhb_loop+0x25/0x80
[  +0.000002]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  +0.000005] RIP: 0033:0x7f2033593154
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46766/">CVE-2024-46766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46766">CVE-2024-46766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230762">SUSE bug 1230762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46767" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46767" ref_url="https://www.suse.com/security/cve/CVE-2024-46767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: Fix missing of_node_put() for leds

The call of of_get_child_by_name() will cause refcount incremented
for leds, if it succeeds, it should call of_node_put() to decrease
it, fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46767/">CVE-2024-46767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46767">CVE-2024-46767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230787">SUSE bug 1230787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46768" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46768" ref_url="https://www.suse.com/security/cve/CVE-2024-46768" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (hp-wmi-sensors) Check if WMI event data exists

The BIOS can choose to return no event data in response to a
WMI event, so the ACPI object passed to the WMI notify handler
can be NULL.

Check for such a situation and ignore the event in such a case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46768/">CVE-2024-46768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46768">CVE-2024-46768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230765">SUSE bug 1230765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46769" ref_url="https://www.suse.com/security/cve/CVE-2024-46769" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: intel: Add check devm_kasprintf() returned value

intel_spi_populate_chip() use devm_kasprintf() to set pdata-&gt;name.
This can return a NULL pointer on failure but this returned value
is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46769/">CVE-2024-46769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46769">CVE-2024-46769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230789">SUSE bug 1230789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46771" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Remove proc entry when dev is unregistered.

syzkaller reported a warning in bcm_connect() below. [0]

The repro calls connect() to vxcan1, removes vxcan1, and calls
connect() with ifindex == 0.

Calling connect() for a BCM socket allocates a proc entry.
Then, bcm_sk(sk)-&gt;bound is set to 1 to prevent further connect().

However, removing the bound device resets bcm_sk(sk)-&gt;bound to 0
in bcm_notify().

The 2nd connect() tries to allocate a proc entry with the same
name and sets NULL to bcm_sk(sk)-&gt;bcm_proc_read, leaking the
original proc entry.

Since the proc entry is available only for connect()ed sockets,
let's clean up the entry when the bound netdev is unregistered.

[0]:
proc_dir_entry 'can-bcm/2456' already registered
WARNING: CPU: 1 PID: 394 at fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375
Modules linked in:
CPU: 1 PID: 394 Comm: syz-executor403 Not tainted 6.10.0-rc7-g852e42cc2dd4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375
Code: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 &lt;0f&gt; 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48
RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246
RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002
RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0
R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec
FS:  00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220
 bcm_connect+0x472/0x840 net/can/bcm.c:1673
 __sys_connect_file net/socket.c:2049 [inline]
 __sys_connect+0x5d2/0x690 net/socket.c:2066
 __do_sys_connect net/socket.c:2076 [inline]
 __se_sys_connect net/socket.c:2073 [inline]
 __x64_sys_connect+0x8f/0x100 net/socket.c:2073
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fbd708b0e5d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48
RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d
RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040
R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098
R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000
 &lt;/TASK&gt;
remove_proc_entry: removing non-empty directory 'net/can-bcm', leaking at least '2456'
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230766">SUSE bug 1230766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46772" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46772" ref_url="https://www.suse.com/security/cve/CVE-2024-46772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check denominator crb_pipes before used

[WHAT &amp; HOW]
A denominator cannot be 0, and is checked before used.

This fixes 2 DIVIDE_BY_ZERO issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46772/">CVE-2024-46772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46772">CVE-2024-46772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230772">SUSE bug 1230772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check denominator pbn_div before used

[WHAT &amp; HOW]
A denominator cannot be 0, and is checked before used.

This fixes 1 DIVIDE_BY_ZERO issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230791">SUSE bug 1230791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46774" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas()

Smatch warns:

  arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() warn: potential
  spectre issue 'args.args' [r] (local cap)

The 'nargs' and 'nret' locals come directly from a user-supplied
buffer and are used as indexes into a small stack-based array and as
inputs to copy_to_user() after they are subject to bounds checks.

Use array_index_nospec() after the bounds checks to clamp these values
for speculative execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Validate function returns

[WHAT &amp; HOW]
Function return values must be checked before data can be used
in subsequent functions.

This fixes 4 CHECKED_RETURN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230774">SUSE bug 1230774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46776" ref_url="https://www.suse.com/security/cve/CVE-2024-46776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Run DC_LOG_DC after checking link-&gt;link_enc

[WHAT]
The DC_LOG_DC should be run after link-&gt;link_enc is checked, not before.

This fixes 1 REVERSE_INULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46776/">CVE-2024-46776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46776">CVE-2024-46776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230775">SUSE bug 1230775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46778" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46778" ref_url="https://www.suse.com/security/cve/CVE-2024-46778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check UnboundedRequestEnabled's value

CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled
is a pointer (i.e. dml_bool_t *UnboundedRequestEnabled), and thus
if (p-&gt;UnboundedRequestEnabled) checks its address, not bool value.

This fixes 1 REVERSE_INULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46778/">CVE-2024-46778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46778">CVE-2024-46778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230776">SUSE bug 1230776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46779" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46779" ref_url="https://www.suse.com/security/cve/CVE-2024-46779" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imagination: Free pvr_vm_gpuva after unlink

This caused a measurable memory leak. Although the individual
allocations are small, the leaks occurs in a high-usage codepath
(remapping or unmapping device memory) so they add up quickly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46779/">CVE-2024-46779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46779">CVE-2024-46779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230770">SUSE bug 1230770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: protect references to superblock parameters exposed in sysfs

The superblock buffers of nilfs2 can not only be overwritten at runtime
for modifications/repairs, but they are also regularly swapped, replaced
during resizing, and even abandoned when degrading to one side due to
backing device issues.  So, accessing them requires mutual exclusion using
the reader/writer semaphore "nilfs-&gt;ns_sem".

Some sysfs attribute show methods read this superblock buffer without the
necessary mutual exclusion, which can cause problems with pointer
dereferencing and memory access, so fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230808">SUSE bug 1230808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46781" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix missing cleanup on rollforward recovery error

In an error injection test of a routine for mount-time recovery, KASAN
found a use-after-free bug.

It turned out that if data recovery was performed using partial logs
created by dsync writes, but an error occurred before starting the log
writer to create a recovered checkpoint, the inodes whose data had been
recovered were left in the ns_dirty_files list of the nilfs object and
were not freed.

Fix this issue by cleaning up inodes that have read the recovery data if
the recovery routine fails midway before the log writer starts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230768">SUSE bug 1230768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: fix return value of tcp_bpf_sendmsg()

When we cork messages in psock-&gt;cork, the last message triggers the
flushing will result in sending a sk_msg larger than the current
message size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes
negative at least in the following case:

468         case __SK_DROP:
469         default:
470                 sk_msg_free_partial(sk, msg, tosend);
471                 sk_msg_apply_bytes(psock, tosend);
472                 *copied -= (tosend + delta); // &lt;==== HERE
473                 return -EACCES;

Therefore, it could lead to the following BUG with a proper value of
'copied' (thanks to syzbot). We should not use negative 'copied' as a
return value here.

  ------------[ cut here ]------------
  kernel BUG at net/socket.c:733!
  Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
  Modules linked in:
  CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0
  Hardware name: linux,dummy-virt (DT)
  pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
  pc : sock_sendmsg_nosec net/socket.c:733 [inline]
  pc : sock_sendmsg_nosec net/socket.c:728 [inline]
  pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745
  lr : sock_sendmsg_nosec net/socket.c:730 [inline]
  lr : __sock_sendmsg+0x54/0x60 net/socket.c:745
  sp : ffff800088ea3b30
  x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000
  x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000
  x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90
  x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001
  x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0
  x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000
  x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900
  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef
  Call trace:
   sock_sendmsg_nosec net/socket.c:733 [inline]
   __sock_sendmsg+0x5c/0x60 net/socket.c:745
   ____sys_sendmsg+0x274/0x2ac net/socket.c:2597
   ___sys_sendmsg+0xac/0x100 net/socket.c:2651
   __sys_sendmsg+0x84/0xe0 net/socket.c:2680
   __do_sys_sendmsg net/socket.c:2689 [inline]
   __se_sys_sendmsg net/socket.c:2687 [inline]
   __arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49
   el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151
   el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598
  Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000)
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230810">SUSE bug 1230810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46784" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup

Currently napi_disable() gets called during rxq and txq cleanup,
even before napi is enabled and hrtimer is initialized. It causes
kernel panic.

? page_fault_oops+0x136/0x2b0
  ? page_counter_cancel+0x2e/0x80
  ? do_user_addr_fault+0x2f2/0x640
  ? refill_obj_stock+0xc4/0x110
  ? exc_page_fault+0x71/0x160
  ? asm_exc_page_fault+0x27/0x30
  ? __mmdrop+0x10/0x180
  ? __mmdrop+0xec/0x180
  ? hrtimer_active+0xd/0x50
  hrtimer_try_to_cancel+0x2c/0xf0
  hrtimer_cancel+0x15/0x30
  napi_disable+0x65/0x90
  mana_destroy_rxq+0x4c/0x2f0
  mana_create_rxq.isra.0+0x56c/0x6d0
  ? mana_uncfg_vport+0x50/0x50
  mana_alloc_queues+0x21b/0x320
  ? skb_dequeue+0x5f/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46785" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46785" ref_url="https://www.suse.com/security/cve/CVE-2024-46785" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventfs: Use list_del_rcu() for SRCU protected list variable

Chi Zhiling reported:

  We found a null pointer accessing in tracefs[1], the reason is that the
  variable 'ei_child' is set to LIST_POISON1, that means the list was
  removed in eventfs_remove_rec. so when access the ei_child-&gt;is_freed, the
  panic triggered.

  by the way, the following script can reproduce this panic

  loop1 (){
      while true
      do
          echo "p:kp submit_bio" &gt; /sys/kernel/debug/tracing/kprobe_events
          echo "" &gt; /sys/kernel/debug/tracing/kprobe_events
      done
  }
  loop2 (){
      while true
      do
          tree /sys/kernel/debug/tracing/events/kprobes/
      done
  }
  loop1 &amp;
  loop2

  [1]:
  [ 1147.959632][T17331] Unable to handle kernel paging request at virtual address dead000000000150
  [ 1147.968239][T17331] Mem abort info:
  [ 1147.971739][T17331]   ESR = 0x0000000096000004
  [ 1147.976172][T17331]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1147.982171][T17331]   SET = 0, FnV = 0
  [ 1147.985906][T17331]   EA = 0, S1PTW = 0
  [ 1147.989734][T17331]   FSC = 0x04: level 0 translation fault
  [ 1147.995292][T17331] Data abort info:
  [ 1147.998858][T17331]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
  [ 1148.005023][T17331]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  [ 1148.010759][T17331]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
  [ 1148.016752][T17331] [dead000000000150] address between user and kernel address ranges
  [ 1148.024571][T17331] Internal error: Oops: 0000000096000004 [#1] SMP
  [ 1148.030825][T17331] Modules linked in: team_mode_loadbalance team nlmon act_gact cls_flower sch_ingress bonding tls macvlan dummy ib_core bridge stp llc veth amdgpu amdxcp mfd_core gpu_sched drm_exec drm_buddy radeon crct10dif_ce video drm_suballoc_helper ghash_ce drm_ttm_helper sha2_ce ttm sha256_arm64 i2c_algo_bit sha1_ce sbsa_gwdt cp210x drm_display_helper cec sr_mod cdrom drm_kms_helper binfmt_misc sg loop fuse drm dm_mod nfnetlink ip_tables autofs4 [last unloaded: tls]
  [ 1148.072808][T17331] CPU: 3 PID: 17331 Comm: ls Tainted: G        W         ------- ----  6.6.43 #2
  [ 1148.081751][T17331] Source Version: 21b3b386e948bedd29369af66f3e98ab01b1c650
  [ 1148.088783][T17331] Hardware name: Greatwall GW-001M1A-FTF/GW-001M1A-FTF, BIOS KunLun BIOS V4.0 07/16/2020
  [ 1148.098419][T17331] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1148.106060][T17331] pc : eventfs_iterate+0x2c0/0x398
  [ 1148.111017][T17331] lr : eventfs_iterate+0x2fc/0x398
  [ 1148.115969][T17331] sp : ffff80008d56bbd0
  [ 1148.119964][T17331] x29: ffff80008d56bbf0 x28: ffff001ff5be2600 x27: 0000000000000000
  [ 1148.127781][T17331] x26: ffff001ff52ca4e0 x25: 0000000000009977 x24: dead000000000100
  [ 1148.135598][T17331] x23: 0000000000000000 x22: 000000000000000b x21: ffff800082645f10
  [ 1148.143415][T17331] x20: ffff001fddf87c70 x19: ffff80008d56bc90 x18: 0000000000000000
  [ 1148.151231][T17331] x17: 0000000000000000 x16: 0000000000000000 x15: ffff001ff52ca4e0
  [ 1148.159048][T17331] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  [ 1148.166864][T17331] x11: 0000000000000000 x10: 0000000000000000 x9 : ffff8000804391d0
  [ 1148.174680][T17331] x8 : 0000000180000000 x7 : 0000000000000018 x6 : 0000aaab04b92862
  [ 1148.182498][T17331] x5 : 0000aaab04b92862 x4 : 0000000080000000 x3 : 0000000000000068
  [ 1148.190314][T17331] x2 : 000000000000000f x1 : 0000000000007ea8 x0 : 0000000000000001
  [ 1148.198131][T17331] Call trace:
  [ 1148.201259][T17331]  eventfs_iterate+0x2c0/0x398
  [ 1148.205864][T17331]  iterate_dir+0x98/0x188
  [ 1148.210036][T17331]  __arm64_sys_getdents64+0x78/0x160
  [ 1148.215161][T17331]  invoke_syscall+0x78/0x108
  [ 1148.219593][T17331]  el0_svc_common.constprop.0+0x48/0xf0
  [ 1148.224977][T17331]  do_el0_svc+0x24/0x38
  [ 1148.228974][T17331]  el0_svc+0x40/0x168
  [ 1148.232798][T17
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46785/">CVE-2024-46785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46785">CVE-2024-46785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230811">SUSE bug 1230811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF

The fscache_cookie_lru_timer is initialized when the fscache module
is inserted, but is not deleted when the fscache module is removed.
If timer_reduce() is called before removing the fscache module,
the fscache_cookie_lru_timer will be added to the timer list of
the current cpu. Afterwards, a use-after-free will be triggered
in the softIRQ after removing the fscache module, as follows:

==================================================================
BUG: unable to handle page fault for address: fffffbfff803c9e9
 PF: supervisor read access in kernel mode
 PF: error_code(0x0000) - not-present page
PGD 21ffea067 P4D 21ffea067 PUD 21ffe6067 PMD 110a7c067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.11.0-rc3 #855
Tainted: [W]=WARN
RIP: 0010:__run_timer_base.part.0+0x254/0x8a0
Call Trace:
 &lt;IRQ&gt;
 tmigr_handle_remote_up+0x627/0x810
 __walk_groups.isra.0+0x47/0x140
 tmigr_handle_remote+0x1fa/0x2f0
 handle_softirqs+0x180/0x590
 irq_exit_rcu+0x84/0xb0
 sysvec_apic_timer_interrupt+0x6e/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:default_idle+0xf/0x20
 default_idle_call+0x38/0x60
 do_idle+0x2b5/0x300
 cpu_startup_entry+0x54/0x60
 start_secondary+0x20d/0x280
 common_startup_64+0x13e/0x148
 &lt;/TASK&gt;
Modules linked in: [last unloaded: netfs]
==================================================================

Therefore delete fscache_cookie_lru_timer when removing the fscahe module.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230813">SUSE bug 1230813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix checks for huge PMDs

Patch series "userfaultfd: fix races around pmd_trans_huge() check", v2.

The pmd_trans_huge() code in mfill_atomic() is wrong in three different
ways depending on kernel version:

1. The pmd_trans_huge() check is racy and can lead to a BUG_ON() (if you hit
   the right two race windows) - I've tested this in a kernel build with
   some extra mdelay() calls. See the commit message for a description
   of the race scenario.
   On older kernels (before 6.5), I think the same bug can even
   theoretically lead to accessing transhuge page contents as a page table
   if you hit the right 5 narrow race windows (I haven't tested this case).
2. As pointed out by Qi Zheng, pmd_trans_huge() is not sufficient for
   detecting PMDs that don't point to page tables.
   On older kernels (before 6.5), you'd just have to win a single fairly
   wide race to hit this.
   I've tested this on 6.1 stable by racing migration (with a mdelay()
   patched into try_to_migrate()) against UFFDIO_ZEROPAGE - on my x86
   VM, that causes a kernel oops in ptlock_ptr().
3. On newer kernels (&gt;=6.5), for shmem mappings, khugepaged is allowed
   to yank page tables out from under us (though I haven't tested that),
   so I think the BUG_ON() checks in mfill_atomic() are just wrong.

I decided to write two separate fixes for these (one fix for bugs 1+2, one
fix for bug 3), so that the first fix can be backported to kernels
affected by bugs 1+2.


This patch (of 2):

This fixes two issues.

I discovered that the following race can occur:

  mfill_atomic                other thread
  ============                ============
                              &lt;zap PMD&gt;
  pmdp_get_lockless() [reads none pmd]
  &lt;bail if trans_huge&gt;
  &lt;if none:&gt;
                              &lt;pagefault creates transhuge zeropage&gt;
    __pte_alloc [no-op]
                              &lt;zap PMD&gt;
  &lt;bail if pmd_trans_huge(*dst_pmd)&gt;
  BUG_ON(pmd_none(*dst_pmd))

I have experimentally verified this in a kernel with extra mdelay() calls;
the BUG_ON(pmd_none(*dst_pmd)) triggers.

On kernels newer than commit 0d940a9b270b ("mm/pgtable: allow
pte_offset_map[_lock]() to fail"), this can't lead to anything worse than
a BUG_ON(), since the page table access helpers are actually designed to
deal with page tables concurrently disappearing; but on older kernels
(&lt;=6.4), I think we could probably theoretically race past the two
BUG_ON() checks and end up treating a hugepage as a page table.

The second issue is that, as Qi Zheng pointed out, there are other types
of huge PMDs that pmd_trans_huge() can't catch: devmap PMDs and swap PMDs
(in particular, migration PMDs).

On &lt;=6.4, this is worse than the first issue: If mfill_atomic() runs on a
PMD that contains a migration entry (which just requires winning a single,
fairly wide race), it will pass the PMD to pte_offset_map_lock(), which
assumes that the PMD points to a page table.

Breakage follows: First, the kernel tries to take the PTE lock (which will
crash or maybe worse if there is no "struct page" for the address bits in
the migration entry PMD - I think at least on X86 there usually is no
corresponding "struct page" thanks to the PTE inversion mitigation, amd64
looks different).

If that didn't crash, the kernel would next try to write a PTE into what
it wrongly thinks is a page table.

As part of fixing these issues, get rid of the check for pmd_trans_huge()
before __pte_alloc() - that's redundant, we're going to have to check for
that after the __pte_alloc() anyway.

Backport note: pmdp_get_lockless() is pmd_read_atomic() in older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230815">SUSE bug 1230815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46788" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46788" ref_url="https://www.suse.com/security/cve/CVE-2024-46788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/osnoise: Use a cpumask to know what threads are kthreads

The start_kthread() and stop_thread() code was not always called with the
interface_lock held. This means that the kthread variable could be
unexpectedly changed causing the kthread_stop() to be called on it when it
should not have been, leading to:

 while true; do
   rtla timerlat top -u -q &amp; PID=$!;
   sleep 5;
   kill -INT $PID;
   sleep 0.001;
   kill -TERM $PID;
   wait $PID;
  done

Causing the following OOPS:

 Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI
 KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
 CPU: 5 UID: 0 PID: 885 Comm: timerlatu/5 Not tainted 6.11.0-rc4-test-00002-gbc754cc76d1b-dirty #125 a533010b71dab205ad2f507188ce8c82203b0254
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 RIP: 0010:hrtimer_active+0x58/0x300
 Code: 48 c1 ee 03 41 54 48 01 d1 48 01 d6 55 53 48 83 ec 20 80 39 00 0f 85 30 02 00 00 49 8b 6f 30 4c 8d 75 10 4c 89 f0 48 c1 e8 03 &lt;0f&gt; b6 3c 10 4c 89 f0 83 e0 07 83 c0 03 40 38 f8 7c 09 40 84 ff 0f
 RSP: 0018:ffff88811d97f940 EFLAGS: 00010202
 RAX: 0000000000000002 RBX: ffff88823c6b5b28 RCX: ffffed10478d6b6b
 RDX: dffffc0000000000 RSI: ffffed10478d6b6c RDI: ffff88823c6b5b28
 RBP: 0000000000000000 R08: ffff88823c6b5b58 R09: ffff88823c6b5b60
 R10: ffff88811d97f957 R11: 0000000000000010 R12: 00000000000a801d
 R13: ffff88810d8b35d8 R14: 0000000000000010 R15: ffff88823c6b5b28
 FS:  0000000000000000(0000) GS:ffff88823c680000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000561858ad7258 CR3: 000000007729e001 CR4: 0000000000170ef0
 Call Trace:
  &lt;TASK&gt;
  ? die_addr+0x40/0xa0
  ? exc_general_protection+0x154/0x230
  ? asm_exc_general_protection+0x26/0x30
  ? hrtimer_active+0x58/0x300
  ? __pfx_mutex_lock+0x10/0x10
  ? __pfx_locks_remove_file+0x10/0x10
  hrtimer_cancel+0x15/0x40
  timerlat_fd_release+0x8e/0x1f0
  ? security_file_release+0x43/0x80
  __fput+0x372/0xb10
  task_work_run+0x11e/0x1f0
  ? _raw_spin_lock+0x85/0xe0
  ? __pfx_task_work_run+0x10/0x10
  ? poison_slab_object+0x109/0x170
  ? do_exit+0x7a0/0x24b0
  do_exit+0x7bd/0x24b0
  ? __pfx_migrate_enable+0x10/0x10
  ? __pfx_do_exit+0x10/0x10
  ? __pfx_read_tsc+0x10/0x10
  ? ktime_get+0x64/0x140
  ? _raw_spin_lock_irq+0x86/0xe0
  do_group_exit+0xb0/0x220
  get_signal+0x17ba/0x1b50
  ? vfs_read+0x179/0xa40
  ? timerlat_fd_read+0x30b/0x9d0
  ? __pfx_get_signal+0x10/0x10
  ? __pfx_timerlat_fd_read+0x10/0x10
  arch_do_signal_or_restart+0x8c/0x570
  ? __pfx_arch_do_signal_or_restart+0x10/0x10
  ? vfs_read+0x179/0xa40
  ? ksys_read+0xfe/0x1d0
  ? __pfx_ksys_read+0x10/0x10
  syscall_exit_to_user_mode+0xbc/0x130
  do_syscall_64+0x74/0x110
  ? __pfx___rseq_handle_notify_resume+0x10/0x10
  ? __pfx_ksys_read+0x10/0x10
  ? fpregs_restore_userregs+0xdb/0x1e0
  ? fpregs_restore_userregs+0xdb/0x1e0
  ? syscall_exit_to_user_mode+0x116/0x130
  ? do_syscall_64+0x74/0x110
  ? do_syscall_64+0x74/0x110
  ? do_syscall_64+0x74/0x110
  entry_SYSCALL_64_after_hwframe+0x71/0x79
 RIP: 0033:0x7ff0070eca9c
 Code: Unable to access opcode bytes at 0x7ff0070eca72.
 RSP: 002b:00007ff006dff8c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
 RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00007ff0070eca9c
 RDX: 0000000000000400 RSI: 00007ff006dff9a0 RDI: 0000000000000003
 RBP: 00007ff006dffde0 R08: 0000000000000000 R09: 00007ff000000ba0
 R10: 00007ff007004b08 R11: 0000000000000246 R12: 0000000000000003
 R13: 00007ff006dff9a0 R14: 0000000000000007 R15: 0000000000000008
  &lt;/TASK&gt;
 Modules linked in: snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hwdep snd_hda_core
 ---[ end trace 0000000000000000 ]---

This is because it would mistakenly call kthread_stop() on a user space
thread making it "exit" before it actually exits.

Since kthread
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46788/">CVE-2024-46788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46788">CVE-2024-46788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230817">SUSE bug 1230817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46789</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46789" ref_url="https://www.suse.com/security/cve/CVE-2024-46789" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: add check for s-&gt;flags in the alloc_tagging_slab_free_hook

When enable CONFIG_MEMCG &amp; CONFIG_KFENCE &amp; CONFIG_KMEMLEAK, the following
warning always occurs,This is because the following call stack occurred:
mem_pool_alloc
    kmem_cache_alloc_noprof
        slab_alloc_node
            kfence_alloc

Once the kfence allocation is successful,slab-&gt;obj_exts will not be empty,
because it has already been assigned a value in kfence_init_pool.

Since in the prepare_slab_obj_exts_hook function,we perform a check for
s-&gt;flags &amp; (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE),the alloc_tag_add function
will not be called as a result.Therefore,ref-&gt;ct remains NULL.

However,when we call mem_pool_free,since obj_ext is not empty, it
eventually leads to the alloc_tag_sub scenario being invoked.  This is
where the warning occurs.

So we should add corresponding checks in the alloc_tagging_slab_free_hook.
For __GFP_NO_OBJ_EXT case,I didn't see the specific case where it's using
kfence,so I won't add the corresponding check in
alloc_tagging_slab_free_hook for now.

[    3.734349] ------------[ cut here ]------------
[    3.734807] alloc_tag was not set
[    3.735129] WARNING: CPU: 4 PID: 40 at ./include/linux/alloc_tag.h:130 kmem_cache_free+0x444/0x574
[    3.735866] Modules linked in: autofs4
[    3.736211] CPU: 4 UID: 0 PID: 40 Comm: ksoftirqd/4 Tainted: G        W          6.11.0-rc3-dirty #1
[    3.736969] Tainted: [W]=WARN
[    3.737258] Hardware name: QEMU KVM Virtual Machine, BIOS unknown 2/2/2022
[    3.737875] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    3.738501] pc : kmem_cache_free+0x444/0x574
[    3.738951] lr : kmem_cache_free+0x444/0x574
[    3.739361] sp : ffff80008357bb60
[    3.739693] x29: ffff80008357bb70 x28: 0000000000000000 x27: 0000000000000000
[    3.740338] x26: ffff80008207f000 x25: ffff000b2eb2fd60 x24: ffff0000c0005700
[    3.740982] x23: ffff8000804229e4 x22: ffff800082080000 x21: ffff800081756000
[    3.741630] x20: fffffd7ff8253360 x19: 00000000000000a8 x18: ffffffffffffffff
[    3.742274] x17: ffff800ab327f000 x16: ffff800083398000 x15: ffff800081756df0
[    3.742919] x14: 0000000000000000 x13: 205d344320202020 x12: 5b5d373038343337
[    3.743560] x11: ffff80008357b650 x10: 000000000000005d x9 : 00000000ffffffd0
[    3.744231] x8 : 7f7f7f7f7f7f7f7f x7 : ffff80008237bad0 x6 : c0000000ffff7fff
[    3.744907] x5 : ffff80008237ba78 x4 : ffff8000820bbad0 x3 : 0000000000000001
[    3.745580] x2 : 68d66547c09f7800 x1 : 68d66547c09f7800 x0 : 0000000000000000
[    3.746255] Call trace:
[    3.746530]  kmem_cache_free+0x444/0x574
[    3.746931]  mem_pool_free+0x44/0xf4
[    3.747306]  free_object_rcu+0xc8/0xdc
[    3.747693]  rcu_do_batch+0x234/0x8a4
[    3.748075]  rcu_core+0x230/0x3e4
[    3.748424]  rcu_core_si+0x14/0x1c
[    3.748780]  handle_softirqs+0x134/0x378
[    3.749189]  run_ksoftirqd+0x70/0x9c
[    3.749560]  smpboot_thread_fn+0x148/0x22c
[    3.749978]  kthread+0x10c/0x118
[    3.750323]  ret_from_fork+0x10/0x20
[    3.750696] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46789/">CVE-2024-46789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46789">CVE-2024-46789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230816">SUSE bug 1230816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46790</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46790" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46790" ref_url="https://www.suse.com/security/cve/CVE-2024-46790" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

codetag: debug: mark codetags for poisoned page as empty

When PG_hwpoison pages are freed they are treated differently in
free_pages_prepare() and instead of being released they are isolated.

Page allocation tag counters are decremented at this point since the page
is considered not in use.  Later on when such pages are released by
unpoison_memory(), the allocation tag counters will be decremented again
and the following warning gets reported:

[  113.930443][ T3282] ------------[ cut here ]------------
[  113.931105][ T3282] alloc_tag was not set
[  113.931576][ T3282] WARNING: CPU: 2 PID: 3282 at ./include/linux/alloc_tag.h:130 pgalloc_tag_sub.part.66+0x154/0x164
[  113.932866][ T3282] Modules linked in: hwpoison_inject fuse ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 ipt_REJECT nf_reject_ipv4 xt_conntrack ebtable_nat ebtable_broute ip6table_nat ip6table_man4
[  113.941638][ T3282] CPU: 2 UID: 0 PID: 3282 Comm: madvise11 Kdump: loaded Tainted: G        W          6.11.0-rc4-dirty #18
[  113.943003][ T3282] Tainted: [W]=WARN
[  113.943453][ T3282] Hardware name: QEMU KVM Virtual Machine, BIOS unknown 2/2/2022
[  113.944378][ T3282] pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  113.945319][ T3282] pc : pgalloc_tag_sub.part.66+0x154/0x164
[  113.946016][ T3282] lr : pgalloc_tag_sub.part.66+0x154/0x164
[  113.946706][ T3282] sp : ffff800087093a10
[  113.947197][ T3282] x29: ffff800087093a10 x28: ffff0000d7a9d400 x27: ffff80008249f0a0
[  113.948165][ T3282] x26: 0000000000000000 x25: ffff80008249f2b0 x24: 0000000000000000
[  113.949134][ T3282] x23: 0000000000000001 x22: 0000000000000001 x21: 0000000000000000
[  113.950597][ T3282] x20: ffff0000c08fcad8 x19: ffff80008251e000 x18: ffffffffffffffff
[  113.952207][ T3282] x17: 0000000000000000 x16: 0000000000000000 x15: ffff800081746210
[  113.953161][ T3282] x14: 0000000000000000 x13: 205d323832335420 x12: 5b5d353031313339
[  113.954120][ T3282] x11: ffff800087093500 x10: 000000000000005d x9 : 00000000ffffffd0
[  113.955078][ T3282] x8 : 7f7f7f7f7f7f7f7f x7 : ffff80008236ba90 x6 : c0000000ffff7fff
[  113.956036][ T3282] x5 : ffff000b34bf4dc8 x4 : ffff8000820aba90 x3 : 0000000000000001
[  113.956994][ T3282] x2 : ffff800ab320f000 x1 : 841d1e35ac932e00 x0 : 0000000000000000
[  113.957962][ T3282] Call trace:
[  113.958350][ T3282]  pgalloc_tag_sub.part.66+0x154/0x164
[  113.959000][ T3282]  pgalloc_tag_sub+0x14/0x1c
[  113.959539][ T3282]  free_unref_page+0xf4/0x4b8
[  113.960096][ T3282]  __folio_put+0xd4/0x120
[  113.960614][ T3282]  folio_put+0x24/0x50
[  113.961103][ T3282]  unpoison_memory+0x4f0/0x5b0
[  113.961678][ T3282]  hwpoison_unpoison+0x30/0x48 [hwpoison_inject]
[  113.962436][ T3282]  simple_attr_write_xsigned.isra.34+0xec/0x1cc
[  113.963183][ T3282]  simple_attr_write+0x38/0x48
[  113.963750][ T3282]  debugfs_attr_write+0x54/0x80
[  113.964330][ T3282]  full_proxy_write+0x68/0x98
[  113.964880][ T3282]  vfs_write+0xdc/0x4d0
[  113.965372][ T3282]  ksys_write+0x78/0x100
[  113.965875][ T3282]  __arm64_sys_write+0x24/0x30
[  113.966440][ T3282]  invoke_syscall+0x7c/0x104
[  113.966984][ T3282]  el0_svc_common.constprop.1+0x88/0x104
[  113.967652][ T3282]  do_el0_svc+0x2c/0x38
[  113.968893][ T3282]  el0_svc+0x3c/0x1b8
[  113.969379][ T3282]  el0t_64_sync_handler+0x98/0xbc
[  113.969980][ T3282]  el0t_64_sync+0x19c/0x1a0
[  113.970511][ T3282] ---[ end trace 0000000000000000 ]---

To fix this, clear the page tag reference after the page got isolated
and accounted for.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46790/">CVE-2024-46790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46790">CVE-2024-46790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230818">SUSE bug 1230818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open

The mcp251x_hw_wake() function is called with the mpc_lock mutex held and
disables the interrupt handler so that no interrupts can be processed while
waking the device. If an interrupt has already occurred then waiting for
the interrupt handler to complete will deadlock because it will be trying
to acquire the same mutex.

CPU0                           CPU1
----                           ----
mcp251x_open()
 mutex_lock(&amp;priv-&gt;mcp_lock)
  request_threaded_irq()
                               &lt;interrupt&gt;
                               mcp251x_can_ist()
                                mutex_lock(&amp;priv-&gt;mcp_lock)
  mcp251x_hw_wake()
   disable_irq() &lt;-- deadlock

Use disable_irq_nosync() instead because the interrupt handler does
everything while holding the mutex so it doesn't matter if it's still
running.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230821">SUSE bug 1230821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46792" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46792" ref_url="https://www.suse.com/security/cve/CVE-2024-46792" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: misaligned: Restrict user access to kernel memory

raw_copy_{to,from}_user() do not call access_ok(), so this code allowed
userspace to access any virtual memory address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46792/">CVE-2024-46792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46792">CVE-2024-46792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230819">SUSE bug 1230819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46793" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46793" ref_url="https://www.suse.com/security/cve/CVE-2024-46793" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: Boards: Fix NULL pointer deref in BYT/CHT boards harder

Since commit 13f58267cda3 ("ASoC: soc.h: don't create dummy Component
via COMP_DUMMY()") dummy codecs declared like this:

SND_SOC_DAILINK_DEF(dummy,
        DAILINK_COMP_ARRAY(COMP_DUMMY()));

expand to:

static struct snd_soc_dai_link_component dummy[] = {
};

Which means that dummy is a zero sized array and thus dais[i].codecs should
not be dereferenced *at all* since it points to the address of the next
variable stored in the data section as the "dummy" variable has an address
but no size, so even dereferencing dais[0] is already an out of bounds
array reference.

Which means that the if (dais[i].codecs-&gt;name) check added in
commit 7d99a70b6595 ("ASoC: Intel: Boards: Fix NULL pointer deref
in BYT/CHT boards") relies on that the part of the next variable which
the name member maps to just happens to be NULL.

Which apparently so far it usually is, except when it isn't
and then it results in crashes like this one:

[   28.795659] BUG: unable to handle page fault for address: 0000000000030011
...
[   28.795780] Call Trace:
[   28.795787]  &lt;TASK&gt;
...
[   28.795862]  ? strcmp+0x18/0x40
[   28.795872]  0xffffffffc150c605
[   28.795887]  platform_probe+0x40/0xa0
...
[   28.795979]  ? __pfx_init_module+0x10/0x10 [snd_soc_sst_bytcr_wm5102]

Really fix things this time around by checking dais.num_codecs != 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46793/">CVE-2024-46793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46793">CVE-2024-46793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230824">SUSE bug 1230824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46794" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Fix data leak in mmio_read()

The mmio_read() function makes a TDVMCALL to retrieve MMIO data for an
address from the VMM.

Sean noticed that mmio_read() unintentionally exposes the value of an
initialized variable (val) on the stack to the VMM.

This variable is only needed as an output value. It did not need to be
passed to the VMM in the first place.

Do not send the original value of *val to the VMM.

[ dhansen: clarify what 'val' is used for. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-11-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230825">SUSE bug 1230825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46795" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46795" ref_url="https://www.suse.com/security/cve/CVE-2024-46795" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: unset the binding mark of a reused connection

Steve French reported null pointer dereference error from sha256 lib.
cifs.ko can send session setup requests on reused connection.
If reused connection is used for binding session, conn-&gt;binding can
still remain true and generate_preauth_hash() will not set
sess-&gt;Preauth_HashValue and it will be NULL.
It is used as a material to create an encryption key in
ksmbd_gen_smb311_encryptionkey. -&gt;Preauth_HashValue cause null pointer
dereference error from crypto_shash_update().

BUG: kernel NULL pointer dereference, address: 0000000000000000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 8 PID: 429254 Comm: kworker/8:39
Hardware name: LENOVO 20MAS08500/20MAS08500, BIOS N2CET69W (1.52 )
Workqueue: ksmbd-io handle_ksmbd_work [ksmbd]
RIP: 0010:lib_sha256_base_do_update.isra.0+0x11e/0x1d0 [sha256_ssse3]
&lt;TASK&gt;
? show_regs+0x6d/0x80
? __die+0x24/0x80
? page_fault_oops+0x99/0x1b0
? do_user_addr_fault+0x2ee/0x6b0
? exc_page_fault+0x83/0x1b0
? asm_exc_page_fault+0x27/0x30
? __pfx_sha256_transform_rorx+0x10/0x10 [sha256_ssse3]
? lib_sha256_base_do_update.isra.0+0x11e/0x1d0 [sha256_ssse3]
? __pfx_sha256_transform_rorx+0x10/0x10 [sha256_ssse3]
? __pfx_sha256_transform_rorx+0x10/0x10 [sha256_ssse3]
_sha256_update+0x77/0xa0 [sha256_ssse3]
sha256_avx2_update+0x15/0x30 [sha256_ssse3]
crypto_shash_update+0x1e/0x40
hmac_update+0x12/0x20
crypto_shash_update+0x1e/0x40
generate_key+0x234/0x380 [ksmbd]
generate_smb3encryptionkey+0x40/0x1c0 [ksmbd]
ksmbd_gen_smb311_encryptionkey+0x72/0xa0 [ksmbd]
ntlm_authenticate.isra.0+0x423/0x5d0 [ksmbd]
smb2_sess_setup+0x952/0xaa0 [ksmbd]
__process_request+0xa3/0x1d0 [ksmbd]
__handle_ksmbd_work+0x1c4/0x2f0 [ksmbd]
handle_ksmbd_work+0x2d/0xa0 [ksmbd]
process_one_work+0x16c/0x350
worker_thread+0x306/0x440
? __pfx_worker_thread+0x10/0x10
kthread+0xef/0x120
? __pfx_kthread+0x10/0x10
ret_from_fork+0x44/0x70
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1b/0x30
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46795/">CVE-2024-46795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46795">CVE-2024-46795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230822">SUSE bug 1230822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46796</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46796" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46796" ref_url="https://www.suse.com/security/cve/CVE-2024-46796" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix double put of @cfile in smb2_set_path_size()

If smb2_compound_op() is called with a valid @cfile and returned
-EINVAL, we need to call cifs_get_writable_path() before retrying it
as the reference of @cfile was already dropped by previous call.

This fixes the following KASAN splat when running fstests generic/013
against Windows Server 2022:

  CIFS: Attempting to mount //w22-fs0/scratch
  run fstests generic/013 at 2024-09-02 19:48:59
  ==================================================================
  BUG: KASAN: slab-use-after-free in detach_if_pending+0xab/0x200
  Write of size 8 at addr ffff88811f1a3730 by task kworker/3:2/176

  CPU: 3 UID: 0 PID: 176 Comm: kworker/3:2 Not tainted 6.11.0-rc6 #2
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40
  04/01/2014
  Workqueue: cifsoplockd cifs_oplock_break [cifs]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ? detach_if_pending+0xab/0x200
   print_report+0x156/0x4d9
   ? detach_if_pending+0xab/0x200
   ? __virt_addr_valid+0x145/0x300
   ? __phys_addr+0x46/0x90
   ? detach_if_pending+0xab/0x200
   kasan_report+0xda/0x110
   ? detach_if_pending+0xab/0x200
   detach_if_pending+0xab/0x200
   timer_delete+0x96/0xe0
   ? __pfx_timer_delete+0x10/0x10
   ? rcu_is_watching+0x20/0x50
   try_to_grab_pending+0x46/0x3b0
   __cancel_work+0x89/0x1b0
   ? __pfx___cancel_work+0x10/0x10
   ? kasan_save_track+0x14/0x30
   cifs_close_deferred_file+0x110/0x2c0 [cifs]
   ? __pfx_cifs_close_deferred_file+0x10/0x10 [cifs]
   ? __pfx_down_read+0x10/0x10
   cifs_oplock_break+0x4c1/0xa50 [cifs]
   ? __pfx_cifs_oplock_break+0x10/0x10 [cifs]
   ? lock_is_held_type+0x85/0xf0
   ? mark_held_locks+0x1a/0x90
   process_one_work+0x4c6/0x9f0
   ? find_held_lock+0x8a/0xa0
   ? __pfx_process_one_work+0x10/0x10
   ? lock_acquired+0x220/0x550
   ? __list_add_valid_or_report+0x37/0x100
   worker_thread+0x2e4/0x570
   ? __kthread_parkme+0xd1/0xf0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x17f/0x1c0
   ? kthread+0xda/0x1c0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x31/0x60
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 1118:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   __kasan_kmalloc+0xaa/0xb0
   cifs_new_fileinfo+0xc8/0x9d0 [cifs]
   cifs_atomic_open+0x467/0x770 [cifs]
   lookup_open.isra.0+0x665/0x8b0
   path_openat+0x4c3/0x1380
   do_filp_open+0x167/0x270
   do_sys_openat2+0x129/0x160
   __x64_sys_creat+0xad/0xe0
   do_syscall_64+0xbb/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Freed by task 83:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   kasan_save_free_info+0x3b/0x70
   poison_slab_object+0xe9/0x160
   __kasan_slab_free+0x32/0x50
   kfree+0xf2/0x300
   process_one_work+0x4c6/0x9f0
   worker_thread+0x2e4/0x570
   kthread+0x17f/0x1c0
   ret_from_fork+0x31/0x60
   ret_from_fork_asm+0x1a/0x30

  Last potentially related work creation:
   kasan_save_stack+0x30/0x50
   __kasan_record_aux_stack+0xad/0xc0
   insert_work+0x29/0xe0
   __queue_work+0x5ea/0x760
   queue_work_on+0x6d/0x90
   _cifsFileInfo_put+0x3f6/0x770 [cifs]
   smb2_compound_op+0x911/0x3940 [cifs]
   smb2_set_path_size+0x228/0x270 [cifs]
   cifs_set_file_size+0x197/0x460 [cifs]
   cifs_setattr+0xd9c/0x14b0 [cifs]
   notify_change+0x4e3/0x740
   do_truncate+0xfa/0x180
   vfs_truncate+0x195/0x200
   __x64_sys_truncate+0x109/0x150
   do_syscall_64+0xbb/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46796/">CVE-2024-46796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46796">CVE-2024-46796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230832">SUSE bug 1230832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46797</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46797" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46797" ref_url="https://www.suse.com/security/cve/CVE-2024-46797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/qspinlock: Fix deadlock in MCS queue

If an interrupt occurs in queued_spin_lock_slowpath() after we increment
qnodesp-&gt;count and before node-&gt;lock is initialized, another CPU might
see stale lock values in get_tail_qnode(). If the stale lock value happens
to match the lock on that CPU, then we write to the "next" pointer of
the wrong qnode. This causes a deadlock as the former CPU, once it becomes
the head of the MCS queue, will spin indefinitely until it's "next" pointer
is set by its successor in the queue.

Running stress-ng on a 16 core (16EC/16VP) shared LPAR, results in
occasional lockups similar to the following:

   $ stress-ng --all 128 --vm-bytes 80% --aggressive \
               --maximize --oomable --verify  --syslog \
               --metrics  --times  --timeout 5m

   watchdog: CPU 15 Hard LOCKUP
   ......
   NIP [c0000000000b78f4] queued_spin_lock_slowpath+0x1184/0x1490
   LR [c000000001037c5c] _raw_spin_lock+0x6c/0x90
   Call Trace:
    0xc000002cfffa3bf0 (unreliable)
    _raw_spin_lock+0x6c/0x90
    raw_spin_rq_lock_nested.part.135+0x4c/0xd0
    sched_ttwu_pending+0x60/0x1f0
    __flush_smp_call_function_queue+0x1dc/0x670
    smp_ipi_demux_relaxed+0xa4/0x100
    xive_muxed_ipi_action+0x20/0x40
    __handle_irq_event_percpu+0x80/0x240
    handle_irq_event_percpu+0x2c/0x80
    handle_percpu_irq+0x84/0xd0
    generic_handle_irq+0x54/0x80
    __do_irq+0xac/0x210
    __do_IRQ+0x74/0xd0
    0x0
    do_IRQ+0x8c/0x170
    hardware_interrupt_common_virt+0x29c/0x2a0
   --- interrupt: 500 at queued_spin_lock_slowpath+0x4b8/0x1490
   ......
   NIP [c0000000000b6c28] queued_spin_lock_slowpath+0x4b8/0x1490
   LR [c000000001037c5c] _raw_spin_lock+0x6c/0x90
   --- interrupt: 500
    0xc0000029c1a41d00 (unreliable)
    _raw_spin_lock+0x6c/0x90
    futex_wake+0x100/0x260
    do_futex+0x21c/0x2a0
    sys_futex+0x98/0x270
    system_call_exception+0x14c/0x2f0
    system_call_vectored_common+0x15c/0x2ec

The following code flow illustrates how the deadlock occurs.
For the sake of brevity, assume that both locks (A and B) are
contended and we call the queued_spin_lock_slowpath() function.

        CPU0                                   CPU1
        ----                                   ----
  spin_lock_irqsave(A)                          |
  spin_unlock_irqrestore(A)                     |
    spin_lock(B)                                |
         |                                      |
         ▼                                      |
   id = qnodesp-&gt;count++;                       |
  (Note that nodes[0].lock == A)                |
         |                                      |
         ▼                                      |
      Interrupt                                 |
  (happens before "nodes[0].lock = B")          |
         |                                      |
         ▼                                      |
  spin_lock_irqsave(A)                          |
         |                                      |
         ▼                                      |
   id = qnodesp-&gt;count++                        |
   nodes[1].lock = A                            |
         |                                      |
         ▼                                      |
  Tail of MCS queue                             |
         |                             spin_lock_irqsave(A)
         ▼                                      |
  Head of MCS queue                             ▼
         |                             CPU0 is previous tail
         ▼                                      |
   Spin indefinitely                            ▼
  (until "nodes[1].next != NULL")      prev = get_tail_qnode(A, CPU0)
                                                |
                                                ▼
                                       prev == &amp;qnodes[CPU0].nodes[0]
                                     (as qnodes
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46797/">CVE-2024-46797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46797">CVE-2024-46797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230831">SUSE bug 1230831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object

When using kernel with the following extra config,

  - CONFIG_KASAN=y
  - CONFIG_KASAN_GENERIC=y
  - CONFIG_KASAN_INLINE=y
  - CONFIG_KASAN_VMALLOC=y
  - CONFIG_FRAME_WARN=4096

kernel detects that snd_pcm_suspend_all() access a freed
'snd_soc_pcm_runtime' object when the system is suspended, which
leads to a use-after-free bug:

[   52.047746] BUG: KASAN: use-after-free in snd_pcm_suspend_all+0x1a8/0x270
[   52.047765] Read of size 1 at addr ffff0000b9434d50 by task systemd-sleep/2330

[   52.047785] Call trace:
[   52.047787]  dump_backtrace+0x0/0x3c0
[   52.047794]  show_stack+0x34/0x50
[   52.047797]  dump_stack_lvl+0x68/0x8c
[   52.047802]  print_address_description.constprop.0+0x74/0x2c0
[   52.047809]  kasan_report+0x210/0x230
[   52.047815]  __asan_report_load1_noabort+0x3c/0x50
[   52.047820]  snd_pcm_suspend_all+0x1a8/0x270
[   52.047824]  snd_soc_suspend+0x19c/0x4e0

The snd_pcm_sync_stop() has a NULL check on 'substream-&gt;runtime' before
making any access. So we need to always set 'substream-&gt;runtime' to NULL
everytime we kfree() it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230830">SUSE bug 1230830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46799" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46799" ref_url="https://www.suse.com/security/cve/CVE-2024-46799" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: ti: am65-cpsw: Fix NULL dereference on XDP_TX

If number of TX queues are set to 1 we get a NULL pointer
dereference during XDP_TX.

~# ethtool -L eth0 tx 1
~# ./xdp-trafficgen udp -A &lt;ipv6-src&gt; -a &lt;ipv6-dst&gt; eth0 -t 2
Transmitting on eth0 (ifindex 2)
[  241.135257] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000030

Fix this by using actual TX queues instead of max TX queues
when picking the TX channel in am65_cpsw_ndo_xdp_xmit().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46799/">CVE-2024-46799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46799">CVE-2024-46799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230823">SUSE bug 1230823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46801" ref_url="https://www.suse.com/security/cve/CVE-2024-46801" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libfs: fix get_stashed_dentry()

get_stashed_dentry() tries to optimistically retrieve a stashed dentry
from a provided location.  It needs to ensure to hold rcu lock before it
dereference the stashed location to prevent UAF issues.  Use
rcu_dereference() instead of READ_ONCE() it's effectively equivalent
with some lockdep bells and whistles and it communicates clearly that
this expects rcu protection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46801/">CVE-2024-46801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46801">CVE-2024-46801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230829">SUSE bug 1230829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: added NULL check at start of dc_validate_stream

[Why]
prevent invalid memory access

[How]
check if dc and stream are NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231111">SUSE bug 1231111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46803</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46803" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46803" ref_url="https://www.suse.com/security/cve/CVE-2024-46803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Check debug trap enable before write dbg_ev_file

In interrupt context, write dbg_ev_file will be run by work queue. It
will cause write dbg_ev_file execution after debug_trap_disable, which
will cause NULL pointer access.
v2: cancel work "debug_event_workarea" before set dbg_ev_file as NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46803/">CVE-2024-46803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46803">CVE-2024-46803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231131">SUSE bug 1231131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add array index check for hdcp ddc access

[Why]
Coverity reports OVERRUN warning. Do not check if array
index valid.

[How]
Check msg_id valid and valid array index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231132">SUSE bug 1231132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix the waring dereferencing hive

Check the amdgpu_hive_info *hive that maybe is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231135">SUSE bug 1231135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46806" ref_url="https://www.suse.com/security/cve/CVE-2024-46806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the warning division or modulo by zero

Checks the partition mode and returns an error for an invalid mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46806/">CVE-2024-46806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231136">SUSE bug 1231136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: Check tbo resource pointer

Validate tbo resource pointer, skip if NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231138">SUSE bug 1231138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46808</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46808" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46808" ref_url="https://www.suse.com/security/cve/CVE-2024-46808" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add missing NULL pointer check within dpcd_extend_address_range

[Why &amp; How]
ASSERT if return NULL from kcalloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46808/">CVE-2024-46808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46808">CVE-2024-46808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231140">SUSE bug 1231140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check BIOS images before it is used

BIOS images may fail to load and null checks are added before they are
used.

This fixes 6 NULL_RETURNS issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231148">SUSE bug 1231148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46810</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46810" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ

Make sure the connector is fully initialized before signalling any
HPD events via drm_kms_helper_hotplug_event(), otherwise this may
lead to NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231178">SUSE bug 1231178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46811</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46811" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box

[Why]
Coverity reports OVERRUN warning. soc.num_states could
be 40. But array range of bw_params-&gt;clk_table.entries is 8.

[How]
Assert if soc.num_states greater than 8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231179">SUSE bug 1231179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46812</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46812" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration

[Why]
Coverity reports Memory - illegal accesses.

[How]
Skip inactive planes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231187">SUSE bug 1231187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46814</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check msg_id before processing transcation

[WHY &amp; HOW]
HDCP_MESSAGE_ID_INVALID (-1) is not a valid msg_id nor is it a valid
array index, and it needs checking before used.

This fixes 4 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231194">SUSE bug 1231194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46815</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46815" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[]

[WHY &amp; HOW]
num_valid_sets needs to be checked to avoid a negative index when
accessing reader_wm_sets[num_valid_sets - 1].

This fixes an OVERRUN issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231196">SUSE bug 1231196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46817</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6

[Why]
Coverity reports OVERRUN warning. Should abort amdgpu_dm
initialize.

[How]
Return failure to amdgpu_dm_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231201">SUSE bug 1231201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46818</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46818" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check gpio_id before used as array index

[WHY &amp; HOW]
GPIO_ID_UNKNOWN (-1) is not a valid value for array index and therefore
should be checked in advance.

This fixes 5 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231204">SUSE bug 1231204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46819</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: the warning dereferencing obj for nbio_v7_4

if ras_manager obj null, don't print NBIO err data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231202">SUSE bug 1231202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46820</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46820" ref_url="https://www.suse.com/security/cve/CVE-2024-46820" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend

We do not directly enable/disable VCN IRQ in vcn 5.0.0.
And we do not handle the IRQ state as well. So the calls to
disable IRQ and set state are removed. This effectively gets
rid of the warining of
      "WARN_ON(!amdgpu_irq_enabled(adev, src, type))"
in amdgpu_irq_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46820/">CVE-2024-46820 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46820">CVE-2024-46820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231168">SUSE bug 1231168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46821</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix negative array index read

Avoid using the negative values
for clk_idex as an index into an array pptable-&gt;DpmDescriptor.

V2: fix clk_index return check (Tim Huang)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231169">SUSE bug 1231169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46822</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry

In a review discussion of the changes to support vCPU hotplug where
a check was added on the GICC being enabled if was online, it was
noted that there is need to map back to the cpu and use that to index
into a cpumask. As such, a valid ID is needed.

If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible
for the entry in cpu_madt_gicc[cpu] == NULL.  This function would
then cause a NULL pointer dereference.   Whilst a path to trigger
this has not been established, harden this caller against the
possibility.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231120">SUSE bug 1231120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46823</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46823" ref_url="https://www.suse.com/security/cve/CVE-2024-46823" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit/overflow: Fix UB in overflow_allocation_test

The 'device_name' array doesn't exist out of the
'overflow_allocation_test' function scope. However, it is being used as
a driver name when calling 'kunit_driver_create' from
'kunit_device_register'. It produces the kernel panic with KASAN
enabled.

Since this variable is used in one place only, remove it and pass the
device name into kunit_device_register directly as an ascii string.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46823/">CVE-2024-46823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46823">CVE-2024-46823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231121">SUSE bug 1231121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46824</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46824" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46824" ref_url="https://www.suse.com/security/cve/CVE-2024-46824" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Require drivers to supply the cache_invalidate_user ops

If drivers don't do this then iommufd will oops invalidation ioctls with
something like:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
  Mem abort info:
    ESR = 0x0000000086000004
    EC = 0x21: IABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x04: level 0 translation fault
  user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101059000
  [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
  Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
  Modules linked in:
  CPU: 2 PID: 371 Comm: qemu-system-aar Not tainted 6.8.0-rc7-gde77230ac23a #9
  Hardware name: linux,dummy-virt (DT)
  pstate: 81400809 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=-c)
  pc : 0x0
  lr : iommufd_hwpt_invalidate+0xa4/0x204
  sp : ffff800080f3bcc0
  x29: ffff800080f3bcf0 x28: ffff0000c369b300 x27: 0000000000000000
  x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
  x23: 0000000000000000 x22: 00000000c1e334a0 x21: ffff0000c1e334a0
  x20: ffff800080f3bd38 x19: ffff800080f3bd58 x18: 0000000000000000
  x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff8240d6d8
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
  x8 : 0000001000000002 x7 : 0000fffeac1ec950 x6 : 0000000000000000
  x5 : ffff800080f3bd78 x4 : 0000000000000003 x3 : 0000000000000002
  x2 : 0000000000000000 x1 : ffff800080f3bcc8 x0 : ffff0000c6034d80
  Call trace:
   0x0
   iommufd_fops_ioctl+0x154/0x274
   __arm64_sys_ioctl+0xac/0xf0
   invoke_syscall+0x48/0x110
   el0_svc_common.constprop.0+0x40/0xe0
   do_el0_svc+0x1c/0x28
   el0_svc+0x34/0xb4
   el0t_64_sync_handler+0x120/0x12c
   el0t_64_sync+0x190/0x194

All existing drivers implement this op for nesting, this is mostly a
bisection aid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46824/">CVE-2024-46824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46824">CVE-2024-46824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231113">SUSE bug 1231113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46825</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46825" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46825" ref_url="https://www.suse.com/security/cve/CVE-2024-46825" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: use IWL_FW_CHECK for link ID check

The lookup function iwl_mvm_rcu_fw_link_id_to_link_conf() is
normally called with input from the firmware, so it should use
IWL_FW_CHECK() instead of WARN_ON().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46825/">CVE-2024-46825 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46825">CVE-2024-46825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231170">SUSE bug 1231170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46827</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46827" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46827" ref_url="https://www.suse.com/security/cve/CVE-2024-46827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix firmware crash due to invalid peer nss

Currently, if the access point receives an association
request containing an Extended HE Capabilities Information
Element with an invalid MCS-NSS, it triggers a firmware
crash.

This issue arises when EHT-PHY capabilities shows support
for a bandwidth and MCS-NSS set for that particular
bandwidth is filled by zeros and due to this, driver obtains
peer_nss as 0 and sending this value to firmware causes
crash.

Address this issue by implementing a validation step for
the peer_nss value before passing it to the firmware. If
the value is greater than zero, proceed with forwarding
it to the firmware. However, if the value is invalid,
reject the association request to prevent potential
firmware crashes.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46827/">CVE-2024-46827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46827">CVE-2024-46827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231171">SUSE bug 1231171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46828</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: fix bulk flow accounting logic for host fairness

In sch_cake, we keep track of the count of active bulk flows per host,
when running in dst/src host fairness mode, which is used as the
round-robin weight when iterating through flows. The count of active
bulk flows is updated whenever a flow changes state.

This has a peculiar interaction with the hash collision handling: when a
hash collision occurs (after the set-associative hashing), the state of
the hash bucket is simply updated to match the new packet that collided,
and if host fairness is enabled, that also means assigning new per-host
state to the flow. For this reason, the bulk flow counters of the
host(s) assigned to the flow are decremented, before new state is
assigned (and the counters, which may not belong to the same host
anymore, are incremented again).

Back when this code was introduced, the host fairness mode was always
enabled, so the decrement was unconditional. When the configuration
flags were introduced the *increment* was made conditional, but
the *decrement* was not. Which of course can lead to a spurious
decrement (and associated wrap-around to U16_MAX).

AFAICT, when host fairness is disabled, the decrement and wrap-around
happens as soon as a hash collision occurs (which is not that common in
itself, due to the set-associative hashing). However, in most cases this
is harmless, as the value is only used when host fairness mode is
enabled. So in order to trigger an array overflow, sch_cake has to first
be configured with host fairness disabled, and while running in this
mode, a hash collision has to occur to cause the overflow. Then, the
qdisc has to be reconfigured to enable host fairness, which leads to the
array out-of-bounds because the wrapped-around value is retained and
used as an array index. It seems that syzbot managed to trigger this,
which is quite impressive in its own right.

This patch fixes the issue by introducing the same conditional check on
decrement as is used on increment.

The original bug predates the upstreaming of cake, but the commit listed
in the Fixes tag touched that code, meaning that this patch won't apply
before that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231114">SUSE bug 1231114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46830</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire kvm-&gt;srcu when handling KVM_SET_VCPU_EVENTS

Grab kvm-&gt;srcu when processing KVM_SET_VCPU_EVENTS, as KVM will forcibly
leave nested VMX/SVM if SMM mode is being toggled, and leaving nested VMX
reads guest memory.

Note, kvm_vcpu_ioctl_x86_set_vcpu_events() can also be called from KVM_RUN
via sync_regs(), which already holds SRCU.  I.e. trying to precisely use
kvm_vcpu_srcu_read_lock() around the problematic SMM code would cause
problems.  Acquiring SRCU isn't all that expensive, so for simplicity,
grab it unconditionally for KVM_SET_VCPU_EVENTS.

 =============================
 WARNING: suspicious RCU usage
 6.10.0-rc7-332d2c1d713e-next-vm #552 Not tainted
 -----------------------------
 include/linux/kvm_host.h:1027 suspicious rcu_dereference_check() usage!

 other info that might help us debug this:

 rcu_scheduler_active = 2, debug_locks = 1
 1 lock held by repro/1071:
  #0: ffff88811e424430 (&amp;vcpu-&gt;mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x7d/0x970 [kvm]

 stack backtrace:
 CPU: 15 PID: 1071 Comm: repro Not tainted 6.10.0-rc7-332d2c1d713e-next-vm #552
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x7f/0x90
  lockdep_rcu_suspicious+0x13f/0x1a0
  kvm_vcpu_gfn_to_memslot+0x168/0x190 [kvm]
  kvm_vcpu_read_guest+0x3e/0x90 [kvm]
  nested_vmx_load_msr+0x6b/0x1d0 [kvm_intel]
  load_vmcs12_host_state+0x432/0xb40 [kvm_intel]
  vmx_leave_nested+0x30/0x40 [kvm_intel]
  kvm_vcpu_ioctl_x86_set_vcpu_events+0x15d/0x2b0 [kvm]
  kvm_arch_vcpu_ioctl+0x1107/0x1750 [kvm]
  ? mark_held_locks+0x49/0x70
  ? kvm_vcpu_ioctl+0x7d/0x970 [kvm]
  ? kvm_vcpu_ioctl+0x497/0x970 [kvm]
  kvm_vcpu_ioctl+0x497/0x970 [kvm]
  ? lock_acquire+0xba/0x2d0
  ? find_held_lock+0x2b/0x80
  ? do_user_addr_fault+0x40c/0x6f0
  ? lock_release+0xb7/0x270
  __x64_sys_ioctl+0x82/0xb0
  do_syscall_64+0x6c/0x170
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7ff11eb1b539
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231116">SUSE bug 1231116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46831</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46831" ref_url="https://www.suse.com/security/cve/CVE-2024-46831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: microchip: vcap: Fix use-after-free error in kunit test

This is a clear use-after-free error. We remove it, and rely on checking
the return code of vcap_del_rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46831/">CVE-2024-46831 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46831">CVE-2024-46831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231117">SUSE bug 1231117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236242">SUSE bug 1236242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009705046" comment="kernel-rt is not affected"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46832</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46832" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46832" ref_url="https://www.suse.com/security/cve/CVE-2024-46832" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: cevt-r4k: Don't call get_c0_compare_int if timer irq is installed

This avoids warning:

[    0.118053] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283

Caused by get_c0_compare_int on secondary CPU.

We also skipped saving IRQ number to struct clock_event_device *cd as
it's never used by clockevent core, as per comments it's only meant
for "non CPU local devices".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46832/">CVE-2024-46832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46832">CVE-2024-46832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231172">SUSE bug 1231172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46833</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46833" ref_url="https://www.suse.com/security/cve/CVE-2024-46833" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: void array out of bound when loop tnl_num

When query reg inf of SSU, it loops tnl_num times. However, tnl_num comes
from hardware and the length of array is a fixed value. To void array out
of bound, make sure the loop time is not greater than the length of array
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46833/">CVE-2024-46833 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46833">CVE-2024-46833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231119">SUSE bug 1231119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46834</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: fail closed if we can't get max channel used in indirection tables

Commit 0d1b7d6c9274 ("bnxt: fix crashes when reducing ring count with
active RSS contexts") proves that allowing indirection table to contain
channels with out of bounds IDs may lead to crashes. Currently the
max channel check in the core gets skipped if driver can't fetch
the indirection table or when we can't allocate memory.

Both of those conditions should be extremely rare but if they do
happen we should try to be safe and fail the channel change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231096">SUSE bug 1231096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46835</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix smatch static checker warning

adev-&gt;gfx.imu.funcs could be NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231098">SUSE bug 1231098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46836</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46836" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46836" ref_url="https://www.suse.com/security/cve/CVE-2024-46836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: aspeed_udc: validate endpoint index for ast udc

We should verify the bound of the array to assure that host
may not manipulate the index to point past endpoint array.

Found by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46836/">CVE-2024-46836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46836">CVE-2024-46836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231092">SUSE bug 1231092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46837</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46837" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46837" ref_url="https://www.suse.com/security/cve/CVE-2024-46837" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Restrict high priorities on group_create

We were allowing any users to create a high priority group without any
permission checks. As a result, this was allowing possible denial of
service.

We now only allow the DRM master or users with the CAP_SYS_NICE
capability to set higher priorities than PANTHOR_GROUP_PRIORITY_MEDIUM.

As the sole user of that uAPI lives in Mesa and hardcode a value of
MEDIUM [1], this should be safe to do.

Additionally, as those checks are performed at the ioctl level,
panthor_group_create now only check for priority level validity.

[1]https://gitlab.freedesktop.org/mesa/mesa/-/blob/f390835074bdf162a63deb0311d1a6de527f9f89/src/gallium/drivers/panfrost/pan_csf.c#L1038
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46837/">CVE-2024-46837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46837">CVE-2024-46837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231099">SUSE bug 1231099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46838" ref_url="https://www.suse.com/security/cve/CVE-2024-46838" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: don't BUG_ON() if khugepaged yanks our page table

Since khugepaged was changed to allow retracting page tables in file
mappings without holding the mmap lock, these BUG_ON()s are wrong - get
rid of them.

We could also remove the preceding "if (unlikely(...))" block, but then we
could reach pte_offset_map_lock() with transhuge pages not just for file
mappings but also for anonymous mappings - which would probably be fine
but I think is not necessarily expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46838/">CVE-2024-46838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46838">CVE-2024-46838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231107">SUSE bug 1231107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46839" ref_url="https://www.suse.com/security/cve/CVE-2024-46839" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46839/">CVE-2024-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231095">SUSE bug 1231095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46842</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46842" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info

The MBX_TIMEOUT return code is not handled in lpfc_get_sfp_info and the
routine unconditionally frees submitted mailbox commands regardless of
return status.  The issue is that for MBX_TIMEOUT cases, when firmware
returns SFP information at a later time, that same mailbox memory region
references previously freed memory in its cmpl routine.

Fix by adding checks for the MBX_TIMEOUT return code.  During mailbox
resource cleanup, check the mbox flag to make sure that the wait did not
timeout.  If the MBOX_WAKE flag is not set, then do not free the resources
because it will be freed when firmware completes the mailbox at a later
time in its cmpl routine.

Also, increase the timeout from 30 to 60 seconds to accommodate boot
scripts requiring longer timeouts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231101">SUSE bug 1231101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46843" ref_url="https://www.suse.com/security/cve/CVE-2024-46843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Remove SCSI host only if added

If host tries to remove ufshcd driver from a UFS device it would cause a
kernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before
adding a SCSI host with scsi_add_host and MCQ is enabled since SCSI host
has been defered after MCQ configuration introduced by commit 0cab4023ec7b
("scsi: ufs: core: Defer adding host to SCSI if MCQ is supported").

To guarantee that SCSI host is removed only if it has been added, set the
scsi_host_added flag to true after adding a SCSI host and check whether it
is set or not before removing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46843/">CVE-2024-46843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46843">CVE-2024-46843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231100">SUSE bug 1231100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46845</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46845" ref_url="https://www.suse.com/security/cve/CVE-2024-46845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/timerlat: Only clear timer if a kthread exists

The timerlat tracer can use user space threads to check for osnoise and
timer latency. If the program using this is killed via a SIGTERM, the
threads are shutdown one at a time and another tracing instance can start
up resetting the threads before they are fully closed. That causes the
hrtimer assigned to the kthread to be shutdown and freed twice when the
dying thread finally closes the file descriptors, causing a use-after-free
bug.

Only cancel the hrtimer if the associated thread is still around. Also add
the interface_lock around the resetting of the tlat_var-&gt;kthread.

Note, this is just a quick fix that can be backported to stable. A real
fix is to have a better synchronization between the shutdown of old
threads and the starting of new ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46845/">CVE-2024-46845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46845">CVE-2024-46845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231076">SUSE bug 1231076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46846</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46846" ref_url="https://www.suse.com/security/cve/CVE-2024-46846" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: rockchip: Resolve unbalanced runtime PM / system PM handling

Commit e882575efc77 ("spi: rockchip: Suspend and resume the bus during
NOIRQ_SYSTEM_SLEEP_PM ops") stopped respecting runtime PM status and
simply disabled clocks unconditionally when suspending the system. This
causes problems when the device is already runtime suspended when we go
to sleep -- in which case we double-disable clocks and produce a
WARNing.

Switch back to pm_runtime_force_{suspend,resume}(), because that still
seems like the right thing to do, and the aforementioned commit makes no
explanation why it stopped using it.

Also, refactor some of the resume() error handling, because it's not
actually a good idea to re-disable clocks on failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46846/">CVE-2024-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46846">CVE-2024-46846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231075">SUSE bug 1231075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46847</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46847" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46847" ref_url="https://www.suse.com/security/cve/CVE-2024-46847" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: vmalloc: ensure vmap_block is initialised before adding to queue

Commit 8c61291fd850 ("mm: fix incorrect vbq reference in
purge_fragmented_block") extended the 'vmap_block' structure to contain a
'cpu' field which is set at allocation time to the id of the initialising
CPU.

When a new 'vmap_block' is being instantiated by new_vmap_block(), the
partially initialised structure is added to the local 'vmap_block_queue'
xarray before the 'cpu' field has been initialised.  If another CPU is
concurrently walking the xarray (e.g.  via vm_unmap_aliases()), then it
may perform an out-of-bounds access to the remote queue thanks to an
uninitialised index.

This has been observed as UBSAN errors in Android:

 | Internal error: UBSAN: array index out of bounds: 00000000f2005512 [#1] PREEMPT SMP
 |
 | Call trace:
 |  purge_fragmented_block+0x204/0x21c
 |  _vm_unmap_aliases+0x170/0x378
 |  vm_unmap_aliases+0x1c/0x28
 |  change_memory_common+0x1dc/0x26c
 |  set_memory_ro+0x18/0x24
 |  module_enable_ro+0x98/0x238
 |  do_init_module+0x1b0/0x310

Move the initialisation of 'vb-&gt;cpu' in new_vmap_block() ahead of the
addition to the xarray.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46847/">CVE-2024-46847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46847">CVE-2024-46847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231074">SUSE bug 1231074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46848</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Limit the period on Haswell

Running the ltp test cve-2015-3290 concurrently reports the following
warnings.

perfevents: irq loop stuck!
  WARNING: CPU: 31 PID: 32438 at arch/x86/events/intel/core.c:3174
  intel_pmu_handle_irq+0x285/0x370
  Call Trace:
   &lt;NMI&gt;
   ? __warn+0xa4/0x220
   ? intel_pmu_handle_irq+0x285/0x370
   ? __report_bug+0x123/0x130
   ? intel_pmu_handle_irq+0x285/0x370
   ? __report_bug+0x123/0x130
   ? intel_pmu_handle_irq+0x285/0x370
   ? report_bug+0x3e/0xa0
   ? handle_bug+0x3c/0x70
   ? exc_invalid_op+0x18/0x50
   ? asm_exc_invalid_op+0x1a/0x20
   ? irq_work_claim+0x1e/0x40
   ? intel_pmu_handle_irq+0x285/0x370
   perf_event_nmi_handler+0x3d/0x60
   nmi_handle+0x104/0x330

Thanks to Thomas Gleixner's analysis, the issue is caused by the low
initial period (1) of the frequency estimation algorithm, which triggers
the defects of the HW, specifically erratum HSW11 and HSW143. (For the
details, please refer https://lore.kernel.org/lkml/87plq9l5d2.ffs@tglx/)

The HSW11 requires a period larger than 100 for the INST_RETIRED.ALL
event, but the initial period in the freq mode is 1. The erratum is the
same as the BDM11, which has been supported in the kernel. A minimum
period of 128 is enforced as well on HSW.

HSW143 is regarding that the fixed counter 1 may overcount 32 with the
Hyper-Threading is enabled. However, based on the test, the hardware
has more issues than it tells. Besides the fixed counter 1, the message
'interrupt took too long' can be observed on any counter which was armed
with a period &lt; 32 and two events expired in the same NMI. A minimum
period of 32 is enforced for the rest of the events.
The recommended workaround code of the HSW143 is not implemented.
Because it only addresses the issue for the fixed counter. It brings
extra overhead through extra MSR writing. No related overcounting issue
has been reported so far.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231072">SUSE bug 1231072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: meson: axg-card: fix 'use-after-free'

Buffer 'card-&gt;dai_link' is reallocated in 'meson_card_reallocate_links()',
so move 'pad' pointer initialization after this function when memory is
already reallocated.

Kasan bug report:

==================================================================
BUG: KASAN: slab-use-after-free in axg_card_add_link+0x76c/0x9bc
Read of size 8 at addr ffff000000e8b260 by task modprobe/356

CPU: 0 PID: 356 Comm: modprobe Tainted: G O 6.9.12-sdkernel #1
Call trace:
 dump_backtrace+0x94/0xec
 show_stack+0x18/0x24
 dump_stack_lvl+0x78/0x90
 print_report+0xfc/0x5c0
 kasan_report+0xb8/0xfc
 __asan_load8+0x9c/0xb8
 axg_card_add_link+0x76c/0x9bc [snd_soc_meson_axg_sound_card]
 meson_card_probe+0x344/0x3b8 [snd_soc_meson_card_utils]
 platform_probe+0x8c/0xf4
 really_probe+0x110/0x39c
 __driver_probe_device+0xb8/0x18c
 driver_probe_device+0x108/0x1d8
 __driver_attach+0xd0/0x25c
 bus_for_each_dev+0xe0/0x154
 driver_attach+0x34/0x44
 bus_add_driver+0x134/0x294
 driver_register+0xa8/0x1e8
 __platform_driver_register+0x44/0x54
 axg_card_pdrv_init+0x20/0x1000 [snd_soc_meson_axg_sound_card]
 do_one_initcall+0xdc/0x25c
 do_init_module+0x10c/0x334
 load_module+0x24c4/0x26cc
 init_module_from_file+0xd4/0x128
 __arm64_sys_finit_module+0x1f4/0x41c
 invoke_syscall+0x60/0x188
 el0_svc_common.constprop.0+0x78/0x13c
 do_el0_svc+0x30/0x40
 el0_svc+0x38/0x78
 el0t_64_sync_handler+0x100/0x12c
 el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231256">SUSE bug 1231256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46850" ref_url="https://www.suse.com/security/cve/CVE-2024-46850" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid race between dcn35_set_drr() and dc_state_destruct()

dc_state_destruct() nulls the resource context of the DC state. The pipe
context passed to dcn35_set_drr() is a member of this resource context.

If dc_state_destruct() is called parallel to the IRQ processing (which
calls dcn35_set_drr() at some point), we can end up using already nulled
function callback fields of struct stream_resource.

The logic in dcn35_set_drr() already tries to avoid this, by checking tg
against NULL. But if the nulling happens exactly after the NULL check and
before the next access, then we get a race.

Avoid this by copying tg first to a local variable, and then use this
variable for all the operations. This should work, as long as nobody
frees the resource pool where the timing generators live.

(cherry picked from commit 0607a50c004798a96e62c089a4c34c220179dcb5)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46850/">CVE-2024-46850 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46850">CVE-2024-46850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231080">SUSE bug 1231080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46851" ref_url="https://www.suse.com/security/cve/CVE-2024-46851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid race between dcn10_set_drr() and dc_state_destruct()

dc_state_destruct() nulls the resource context of the DC state. The pipe
context passed to dcn10_set_drr() is a member of this resource context.

If dc_state_destruct() is called parallel to the IRQ processing (which
calls dcn10_set_drr() at some point), we can end up using already nulled
function callback fields of struct stream_resource.

The logic in dcn10_set_drr() already tries to avoid this, by checking tg
against NULL. But if the nulling happens exactly after the NULL check and
before the next access, then we get a race.

Avoid this by copying tg first to a local variable, and then use this
variable for all the operations. This should work, as long as nobody
frees the resource pool where the timing generators live.

(cherry picked from commit a3cc326a43bdc48fbdf53443e1027a03e309b643)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46851/">CVE-2024-46851 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46851">CVE-2024-46851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231081">SUSE bug 1231081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46852" ref_url="https://www.suse.com/security/cve/CVE-2024-46852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf: heaps: Fix off-by-one in CMA heap fault handler

Until VM_DONTEXPAND was added in commit 1c1914d6e8c6 ("dma-buf: heaps:
Don't track CMA dma-buf pages under RssFile") it was possible to obtain
a mapping larger than the buffer size via mremap and bypass the overflow
check in dma_buf_mmap_internal. When using such a mapping to attempt to
fault past the end of the buffer, the CMA heap fault handler also checks
the fault offset against the buffer size, but gets the boundary wrong by
1. Fix the boundary check so that we don't read off the end of the pages
array and insert an arbitrary page in the mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46852/">CVE-2024-46852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46852">CVE-2024-46852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231082">SUSE bug 1231082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: nxp-fspi: fix the KASAN report out-of-bounds bug

Change the memcpy length to fix the out-of-bounds issue when writing the
data that is not 4 byte aligned to TX FIFO.

To reproduce the issue, write 3 bytes data to NOR chip.

dd if=3b of=/dev/mtd0
[   36.926103] ==================================================================
[   36.933409] BUG: KASAN: slab-out-of-bounds in nxp_fspi_exec_op+0x26ec/0x2838
[   36.940514] Read of size 4 at addr ffff00081037c2a0 by task dd/455
[   36.946721]
[   36.948235] CPU: 3 UID: 0 PID: 455 Comm: dd Not tainted 6.11.0-rc5-gc7b0e37c8434 #1070
[   36.956185] Hardware name: Freescale i.MX8QM MEK (DT)
[   36.961260] Call trace:
[   36.963723]  dump_backtrace+0x90/0xe8
[   36.967414]  show_stack+0x18/0x24
[   36.970749]  dump_stack_lvl+0x78/0x90
[   36.974451]  print_report+0x114/0x5cc
[   36.978151]  kasan_report+0xa4/0xf0
[   36.981670]  __asan_report_load_n_noabort+0x1c/0x28
[   36.986587]  nxp_fspi_exec_op+0x26ec/0x2838
[   36.990800]  spi_mem_exec_op+0x8ec/0xd30
[   36.994762]  spi_mem_no_dirmap_read+0x190/0x1e0
[   36.999323]  spi_mem_dirmap_write+0x238/0x32c
[   37.003710]  spi_nor_write_data+0x220/0x374
[   37.007932]  spi_nor_write+0x110/0x2e8
[   37.011711]  mtd_write_oob_std+0x154/0x1f0
[   37.015838]  mtd_write_oob+0x104/0x1d0
[   37.019617]  mtd_write+0xb8/0x12c
[   37.022953]  mtdchar_write+0x224/0x47c
[   37.026732]  vfs_write+0x1e4/0x8c8
[   37.030163]  ksys_write+0xec/0x1d0
[   37.033586]  __arm64_sys_write+0x6c/0x9c
[   37.037539]  invoke_syscall+0x6c/0x258
[   37.041327]  el0_svc_common.constprop.0+0x160/0x22c
[   37.046244]  do_el0_svc+0x44/0x5c
[   37.049589]  el0_svc+0x38/0x78
[   37.052681]  el0t_64_sync_handler+0x13c/0x158
[   37.057077]  el0t_64_sync+0x190/0x194
[   37.060775]
[   37.062274] Allocated by task 455:
[   37.065701]  kasan_save_stack+0x2c/0x54
[   37.069570]  kasan_save_track+0x20/0x3c
[   37.073438]  kasan_save_alloc_info+0x40/0x54
[   37.077736]  __kasan_kmalloc+0xa0/0xb8
[   37.081515]  __kmalloc_noprof+0x158/0x2f8
[   37.085563]  mtd_kmalloc_up_to+0x120/0x154
[   37.089690]  mtdchar_write+0x130/0x47c
[   37.093469]  vfs_write+0x1e4/0x8c8
[   37.096901]  ksys_write+0xec/0x1d0
[   37.100332]  __arm64_sys_write+0x6c/0x9c
[   37.104287]  invoke_syscall+0x6c/0x258
[   37.108064]  el0_svc_common.constprop.0+0x160/0x22c
[   37.112972]  do_el0_svc+0x44/0x5c
[   37.116319]  el0_svc+0x38/0x78
[   37.119401]  el0t_64_sync_handler+0x13c/0x158
[   37.123788]  el0t_64_sync+0x190/0x194
[   37.127474]
[   37.128977] The buggy address belongs to the object at ffff00081037c2a0
[   37.128977]  which belongs to the cache kmalloc-8 of size 8
[   37.141177] The buggy address is located 0 bytes inside of
[   37.141177]  allocated 3-byte region [ffff00081037c2a0, ffff00081037c2a3)
[   37.153465]
[   37.154971] The buggy address belongs to the physical page:
[   37.160559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89037c
[   37.168596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.175149] page_type: 0xfdffffff(slab)
[   37.179021] raw: 0bfffe0000000000 ffff000800002500 dead000000000122 0000000000000000
[   37.186788] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000
[   37.194553] page dumped because: kasan: bad access detected
[   37.200144]
[   37.201647] Memory state around the buggy address:
[   37.206460]  ffff00081037c180: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
[   37.213701]  ffff00081037c200: fa fc fc fc 05 fc fc fc 03 fc fc fc 02 fc fc fc
[   37.220946] &gt;ffff00081037c280: 06 fc fc fc 03 fc fc fc fc fc fc fc fc fc fc fc
[   37.228186]                                ^
[   37.232473]  ffff00081037c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.239718]  ffff00081037c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.246962] ==============================================================
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231083">SUSE bug 1231083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_socket: fix sk refcount leaks

We must put 'sk' reference before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231085">SUSE bug 1231085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46856" ref_url="https://www.suse.com/security/cve/CVE-2024-46856" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: dp83822: Fix NULL pointer dereference on DP83825 devices

The probe() function is only used for DP83822 and DP83826 PHY,
leaving the private data pointer uninitialized for the DP83825 models
which causes a NULL pointer dereference in the recently introduced/changed
functions dp8382x_config_init() and dp83822_set_wol().

Add the dp8382x_probe() function, so all PHY models will have a valid
private data pointer to fix this issue and also prevent similar issues
in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46856/">CVE-2024-46856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46856">CVE-2024-46856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231086">SUSE bug 1231086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix bridge mode operations when there are no VFs

Currently, trying to set the bridge mode attribute when numvfs=0 leads to a
crash:

bridge link set dev eth2 hwmode vepa

[  168.967392] BUG: kernel NULL pointer dereference, address: 0000000000000030
[...]
[  168.969989] RIP: 0010:mlx5_add_flow_rules+0x1f/0x300 [mlx5_core]
[...]
[  168.976037] Call Trace:
[  168.976188]  &lt;TASK&gt;
[  168.978620]  _mlx5_eswitch_set_vepa_locked+0x113/0x230 [mlx5_core]
[  168.979074]  mlx5_eswitch_set_vepa+0x7f/0xa0 [mlx5_core]
[  168.979471]  rtnl_bridge_setlink+0xe9/0x1f0
[  168.979714]  rtnetlink_rcv_msg+0x159/0x400
[  168.980451]  netlink_rcv_skb+0x54/0x100
[  168.980675]  netlink_unicast+0x241/0x360
[  168.980918]  netlink_sendmsg+0x1f6/0x430
[  168.981162]  ____sys_sendmsg+0x3bb/0x3f0
[  168.982155]  ___sys_sendmsg+0x88/0xd0
[  168.985036]  __sys_sendmsg+0x59/0xa0
[  168.985477]  do_syscall_64+0x79/0x150
[  168.987273]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  168.987773] RIP: 0033:0x7f8f7950f917

(esw-&gt;fdb_table.legacy.vepa_fdb is null)

The bridge mode is only relevant when there are multiple functions per
port. Therefore, prevent setting and getting this setting when there are no
VFs.

Note that after this change, there are no settings to change on the PF
interface using `bridge link` when there are no VFs, so the interface no
longer appears in the `bridge link` output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231087">SUSE bug 1231087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46858" ref_url="https://www.suse.com/security/cve/CVE-2024-46858" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: Fix uaf in __timer_delete_sync

There are two paths to access mptcp_pm_del_add_timer, result in a race
condition:

     CPU1				CPU2
     ====                               ====
     net_rx_action
     napi_poll                          netlink_sendmsg
     __napi_poll                        netlink_unicast
     process_backlog                    netlink_unicast_kernel
     __netif_receive_skb                genl_rcv
     __netif_receive_skb_one_core       netlink_rcv_skb
     NF_HOOK                            genl_rcv_msg
     ip_local_deliver_finish            genl_family_rcv_msg
     ip_protocol_deliver_rcu            genl_family_rcv_msg_doit
     tcp_v4_rcv                         mptcp_pm_nl_flush_addrs_doit
     tcp_v4_do_rcv                      mptcp_nl_remove_addrs_list
     tcp_rcv_established                mptcp_pm_remove_addrs_and_subflows
     tcp_data_queue                     remove_anno_list_by_saddr
     mptcp_incoming_options             mptcp_pm_del_add_timer
     mptcp_pm_del_add_timer             kfree(entry)

In remove_anno_list_by_saddr(running on CPU2), after leaving the critical
zone protected by "pm.lock", the entry will be released, which leads to the
occurrence of uaf in the mptcp_pm_del_add_timer(running on CPU1).

Keeping a reference to add_timer inside the lock, and calling
sk_stop_timer_sync() with this reference, instead of "entry-&gt;add_timer".

Move list_del(&amp;entry-&gt;list) to mptcp_pm_del_add_timer and inside the pm lock,
do not directly access any members of the entry outside the pm lock, which
can avoid similar "entry-&gt;x" uaf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46858/">CVE-2024-46858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231088">SUSE bug 1231088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses

The panasonic laptop code in various places uses the SINF array with index
values of 0 - SINF_CUR_BRIGHT(0x0d) without checking that the SINF array
is big enough.

Not all panasonic laptops have this many SINF array entries, for example
the Toughbook CF-18 model only has 10 SINF array entries. So it only
supports the AC+DC brightness entries and mute.

Check that the SINF array has a minimum size which covers all AC+DC
brightness entries and refuse to load if the SINF array is smaller.

For higher SINF indexes hide the sysfs attributes when the SINF array
does not contain an entry for that attribute, avoiding show()/store()
accessing the array out of bounds and add bounds checking to the probe()
and resume() code accessing these.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231089">SUSE bug 1231089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46860</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46860" ref_url="https://www.suse.com/security/cve/CVE-2024-46860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix NULL pointer access in mt7921_ipv6_addr_change

When disabling wifi mt7921_ipv6_addr_change() is called as a notifier.
At this point mvif-&gt;phy is already NULL so we cannot use it here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46860/">CVE-2024-46860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46860">CVE-2024-46860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231093">SUSE bug 1231093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46861" ref_url="https://www.suse.com/security/cve/CVE-2024-46861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: ipheth: do not stop RX on failing RX callback

RX callbacks can fail for multiple reasons:

* Payload too short
* Payload formatted incorrecly (e.g. bad NCM framing)
* Lack of memory

None of these should cause the driver to seize up.

Make such failures non-critical and continue processing further
incoming URBs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46861/">CVE-2024-46861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46861">CVE-2024-46861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231102">SUSE bug 1231102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46862" ref_url="https://www.suse.com/security/cve/CVE-2024-46862" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: soc-acpi-intel-mtl-match: add missing empty item

There is no links_num in struct snd_soc_acpi_mach {}, and we test
!link-&gt;num_adr as a condition to end the loop in hda_sdw_machine_select().
So an empty item in struct snd_soc_acpi_link_adr array is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46862/">CVE-2024-46862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46862">CVE-2024-46862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231091">SUSE bug 1231091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46863" ref_url="https://www.suse.com/security/cve/CVE-2024-46863" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: soc-acpi-intel-lnl-match: add missing empty item

There is no links_num in struct snd_soc_acpi_mach {}, and we test
!link-&gt;num_adr as a condition to end the loop in hda_sdw_machine_select().
So an empty item in struct snd_soc_acpi_link_adr array is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46863/">CVE-2024-46863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46863">CVE-2024-46863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231097">SUSE bug 1231097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: fix kexec crash due to VP assist page corruption

commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when
CPUs go online/offline") introduces a new cpuhp state for hyperv
initialization.

cpuhp_setup_state() returns the state number if state is
CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.
For the hyperv case, since a new cpuhp state was introduced it would
return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call
is conditioned upon "hyperv_init_cpuhp &gt; 0". This will never be true and
so hv_cpu_die() won't be called on all CPUs. This means the VP assist page
won't be reset. When the kexec kernel tries to setup the VP assist page
again, the hypervisor corrupts the memory region of the old VP assist page
causing a panic in case the kexec kernel is using that memory elsewhere.
This was originally fixed in commit dfe94d4086e4 ("x86/hyperv: Fix kexec
panic/hang issues").

Get rid of hyperv_init_cpuhp entirely since we are no longer using a
dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with
cpuhp_remove_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231108">SUSE bug 1231108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46865" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46865" ref_url="https://www.suse.com/security/cve/CVE-2024-46865" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fou: fix initialization of grc

The grc must be initialize first. There can be a condition where if
fou is NULL, goto out will be executed and grc would be used
uninitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46865/">CVE-2024-46865 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46865">CVE-2024-46865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231103">SUSE bug 1231103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46866" ref_url="https://www.suse.com/security/cve/CVE-2024-46866" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/client: add missing bo locking in show_meminfo()

bo_meminfo() wants to inspect bo state like tt and the ttm resource,
however this state can change at any point leading to stuff like NPD and
UAF, if the bo lock is not held. Grab the bo lock when calling
bo_meminfo(), ensuring we drop any spinlocks first. In the case of
object_idr we now also need to hold a ref.

v2 (MattB)
  - Also add xe_bo_assert_held()

(cherry picked from commit 4f63d712fa104c3ebefcb289d1e733e86d8698c7)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46866/">CVE-2024-46866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46866">CVE-2024-46866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231109">SUSE bug 1231109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46867" ref_url="https://www.suse.com/security/cve/CVE-2024-46867" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/client: fix deadlock in show_meminfo()

There is a real deadlock as well as sleeping in atomic() bug in here, if
the bo put happens to be the last ref, since bo destruction wants to
grab the same spinlock and sleeping locks.  Fix that by dropping the ref
using xe_bo_put_deferred(), and moving the final commit outside of the
lock. Dropping the lock around the put is tricky since the bo can go
out of scope and delete itself from the list, making it difficult to
navigate to the next list entry.

(cherry picked from commit 0083b8e6f11d7662283a267d4ce7c966812ffd8a)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46867/">CVE-2024-46867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46867">CVE-2024-46867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231106">SUSE bug 1231106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46868</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46868" ref_url="https://www.suse.com/security/cve/CVE-2024-46868" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: uefisecapp: Fix deadlock in qcuefi_acquire()

If the __qcuefi pointer is not set, then in the original code, we would
hold onto the lock.  That means that if we tried to set it later, then
it would cause a deadlock.  Drop the lock on the error path.  That's
what all the callers are expecting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46868/">CVE-2024-46868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46868">CVE-2024-46868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231104">SUSE bug 1231104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46869" ref_url="https://www.suse.com/security/cve/CVE-2024-46869" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btintel_pcie: Allocate memory for driver private data

Fix driver not allocating memory for struct btintel_data which is used
to store internal data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46869/">CVE-2024-46869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46869">CVE-2024-46869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231173">SUSE bug 1231173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46870" ref_url="https://www.suse.com/security/cve/CVE-2024-46870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Disable DMCUB timeout for DCN35

[Why]
DMCUB can intermittently take longer than expected to process commands.

Old ASIC policy was to continue while logging a diagnostic error - which
works fine for ASIC without IPS, but with IPS this could lead to a race
condition where we attempt to access DCN state while it's inaccessible,
leading to a system hang when the NIU port is not disabled or register
accesses that timeout and the display configuration in an undefined
state.

[How]
We need to investigate why these accesses take longer than expected, but
for now we should disable the timeout on DCN35 to avoid this race
condition. Since the waits happen only at lower interrupt levels the
risk of taking too long at higher IRQ and causing a system watchdog
timeout are minimal.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46870/">CVE-2024-46870 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46870">CVE-2024-46870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231435">SUSE bug 1231435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX

[Why &amp; How]
It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller
number to create array dmub_callback &amp; dmub_thread_offload has potential to access
item out of array bound. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231434">SUSE bug 1231434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46896" ref_url="https://www.suse.com/security/cve/CVE-2024-46896" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: don't access invalid sched

Since 2320c9e6a768 ("drm/sched: memset() 'job' in drm_sched_job_init()")
accessing job-&gt;base.sched can produce unexpected results as the initialisation
of (*job)-&gt;base.sched done in amdgpu_job_alloc is overwritten by the
memset.

This commit fixes an issue when a CS would fail validation and would
be rejected after job-&gt;num_ibs is incremented. In this case,
amdgpu_ib_free(ring-&gt;adev, ...) will be called, which would crash the
machine because the ring value is bogus.

To fix this, pass a NULL pointer to amdgpu_ib_free(): we can do this
because the device is actually not used in this function.

The next commit will remove the ring argument completely.

(cherry picked from commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46896/">CVE-2024-46896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46896">CVE-2024-46896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235707">SUSE bug 1235707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47141" ref_url="https://www.suse.com/security/cve/CVE-2024-47141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinmux: Use sequential access to access desc-&gt;pinmux data

When two client of the same gpio call pinctrl_select_state() for the
same functionality, we are seeing NULL pointer issue while accessing
desc-&gt;mux_owner.

Let's say two processes A, B executing in pin_request() for the same pin
and process A updates the desc-&gt;mux_usecount but not yet updated the
desc-&gt;mux_owner while process B see the desc-&gt;mux_usecount which got
updated by A path and further executes strcmp and while accessing
desc-&gt;mux_owner it crashes with NULL pointer.

Serialize the access to mux related setting with a mutex lock.

	cpu0 (process A)			cpu1(process B)

pinctrl_select_state() {		  pinctrl_select_state() {
  pin_request() {				pin_request() {
  ...
						 ....
    } else {
         desc-&gt;mux_usecount++;
    						desc-&gt;mux_usecount &amp;&amp; strcmp(desc-&gt;mux_owner, owner)) {

         if (desc-&gt;mux_usecount &gt; 1)
               return 0;
         desc-&gt;mux_owner = owner;

  }						}
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47141/">CVE-2024-47141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235708">SUSE bug 1235708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47143" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47143" ref_url="https://www.suse.com/security/cve/CVE-2024-47143" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-debug: fix a possible deadlock on radix_lock

radix_lock() shouldn't be held while holding dma_hash_entry[idx].lock
otherwise, there's a possible deadlock scenario when
dma debug API is called holding rq_lock():

CPU0                   CPU1                       CPU2
dma_free_attrs()
check_unmap()          add_dma_entry()            __schedule() //out
                                                  (A) rq_lock()
get_hash_bucket()
(A) dma_entry_hash
                                                  check_sync()
                       (A) radix_lock()           (W) dma_entry_hash
dma_entry_free()
(W) radix_lock()
                       // CPU2's one
                       (W) rq_lock()

CPU1 situation can happen when it extending radix tree and
it tries to wake up kswapd via wake_all_kswapd().

CPU2 situation can happen while perf_event_task_sched_out()
(i.e. dma sync operation is called while deleting perf_event using
 etm and etr tmc which are Arm Coresight hwtracing driver backends).

To remove this possible situation, call dma_entry_free() after
put_hash_bucket() in check_unmap().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47143/">CVE-2024-47143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47143">CVE-2024-47143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235710">SUSE bug 1235710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47408</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47408" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47408" ref_url="https://www.suse.com/security/cve/CVE-2024-47408" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: check smcd_v2_ext_offset when receiving proposal msg

When receiving proposal msg in server, the field smcd_v2_ext_offset in
proposal msg is from the remote client and can not be fully trusted.
Once the value of smcd_v2_ext_offset exceed the max value, there has
the chance to access wrong address, and crash may happen.

This patch checks the value of smcd_v2_ext_offset before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47408/">CVE-2024-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47408">CVE-2024-47408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235711">SUSE bug 1235711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47658" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47658" ref_url="https://www.suse.com/security/cve/CVE-2024-47658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: stm32/cryp - call finalize with bh disabled

The finalize operation in interrupt mode produce a produces a spinlock
recursion warning. The reason is the fact that BH must be disabled
during this process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47658/">CVE-2024-47658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47658">CVE-2024-47658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231436">SUSE bug 1231436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47659" ref_url="https://www.suse.com/security/cve/CVE-2024-47659" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smack: tcp: ipv4, fix incorrect labeling

Currently, Smack mirrors the label of incoming tcp/ipv4 connections:
when a label 'foo' connects to a label 'bar' with tcp/ipv4,
'foo' always gets 'foo' in returned ipv4 packets. So,
1) returned packets are incorrectly labeled ('foo' instead of 'bar')
2) 'bar' can write to 'foo' without being authorized to write.

Here is a scenario how to see this:

* Take two machines, let's call them C and S,
   with active Smack in the default state
   (no settings, no rules, no labeled hosts, only builtin labels)

* At S, add Smack rule 'foo bar w'
   (labels 'foo' and 'bar' are instantiated at S at this moment)

* At S, at label 'bar', launch a program
   that listens for incoming tcp/ipv4 connections

* From C, at label 'foo', connect to the listener at S.
   (label 'foo' is instantiated at C at this moment)
   Connection succeedes and works.

* Send some data in both directions.
* Collect network traffic of this connection.

All packets in both directions are labeled with the CIPSO
of the label 'foo'. Hence, label 'bar' writes to 'foo' without
being authorized, and even without ever being known at C.

If anybody cares: exactly the same happens with DCCP.

This behavior 1st manifested in release 2.6.29.4 (see Fixes below)
and it looks unintentional. At least, no explanation was provided.

I changed returned packes label into the 'bar',
to bring it into line with the Smack documentation claims.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" cvss4="4.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47659/">CVE-2024-47659 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47659">CVE-2024-47659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231437">SUSE bug 1231437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid overflow from uint32_t to uint8_t

[WHAT &amp; HOW]
dmub_rb_cmd's ramping_boundary has size of uint8_t and it is assigned
0xFFFF. Fix it by changing it to uint8_t with value of 0xFF.

This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231496">SUSE bug 1231496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47662" ref_url="https://www.suse.com/security/cve/CVE-2024-47662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Remove register from DCN35 DMCUB diagnostic collection

[Why]
These registers should not be read from driver and triggering the
security violation when DMCUB work times out and diagnostics are
collected blocks Z8 entry.

[How]
Remove the register read from DCN35.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47662/">CVE-2024-47662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47662">CVE-2024-47662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231440">SUSE bug 1231440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: iio: frequency: ad9834: Validate frequency parameter value

In ad9834_write_frequency() clk_get_rate() can return 0. In such case
ad9834_calc_freqreg() call will lead to division by zero. Checking
'if (fout &gt; (clk_freq / 2))' doesn't protect in case of 'fout' is 0.
ad9834_write_frequency() is called from ad9834_write(), where fout is
taken from text buffer, which can contain any value.

Modify parameters checking.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231441">SUSE bug 1231441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware

If the value of max_speed_hz is 0, it may cause a division by zero
error in hisi_calc_effective_speed().
The value of max_speed_hz is provided by firmware.
Firmware is generally considered as a trusted domain. However, as
division by zero errors can cause system failure, for defense measure,
the value of max_speed is validated here. So 0 is regarded as invalid
and an error code is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231442">SUSE bug 1231442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47665" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup

Definitely condition dma_get_cache_alignment * defined value &gt; 256
during driver initialization is not reason to BUG_ON(). Turn that to
graceful error out with -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231452">SUSE bug 1231452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0)

Errata #i2037 in AM65x/DRA80xM Processors Silicon Revision 1.0
(SPRZ452D_July 2018_Revised December 2019 [1]) mentions when an
inbound PCIe TLP spans more than two internal AXI 128-byte bursts,
the bus may corrupt the packet payload and the corrupt data may
cause associated applications or the processor to hang.

The workaround for Errata #i2037 is to limit the maximum read
request size and maximum payload size to 128 bytes. Add workaround
for Errata #i2037 here.

The errata and workaround is applicable only to AM65x SR 1.0 and
later versions of the silicon will have this fixed.

[1] -&gt; https://www.ti.com/lit/er/sprz452i/sprz452i.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231481">SUSE bug 1231481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()

If we need to increase the tree depth, allocate a new node, and then
race with another thread that increased the tree depth before us, we'll
still have a preallocated node that might be used later.

If we then use that node for a new non-root node, it'll still have a
pointer to the old root instead of being zeroed - fix this by zeroing it
in the cmpxchg failure path.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-13"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: usbtmc: prevent kernel-usb-infoleak

The syzbot reported a kernel-usb-infoleak in usbtmc_write,
we need to clear the structure before filling fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231541">SUSE bug 1231541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47674" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: avoid leaving partial pfn mappings around in error case

As Jann points out, PFN mappings are special, because unlike normal
memory mappings, there is no lifetime information associated with the
mapping - it is just a raw mapping of PFNs with no reference counting of
a 'struct page'.

That's all very much intentional, but it does mean that it's easy to
mess up the cleanup in case of errors.  Yes, a failed mmap() will always
eventually clean up any partial mappings, but without any explicit
lifetime in the page table mapping itself, it's very easy to do the
error handling in the wrong order.

In particular, it's easy to mistakenly free the physical backing store
before the page tables are actually cleaned up and (temporarily) have
stale dangling PTE entries.

To make this situation less error-prone, just make sure that any partial
pfn mapping is torn down early, before any other error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-16"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231676">SUSE bug 1231676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47675" ref_url="https://www.suse.com/security/cve/CVE-2024-47675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()

If bpf_link_prime() fails, bpf_uprobe_multi_link_attach() goes to the
error_free label and frees the array of bpf_uprobe's without calling
bpf_uprobe_unregister().

This leaks bpf_uprobe-&gt;uprobe and worse, this frees bpf_uprobe-&gt;consumer
without removing it from the uprobe-&gt;consumers list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47675/">CVE-2024-47675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47675">CVE-2024-47675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231926">SUSE bug 1231926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47676" ref_url="https://www.suse.com/security/cve/CVE-2024-47676" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway

Syzbot reports a UAF in hugetlb_fault().  This happens because
vmf_anon_prepare() could drop the per-VMA lock and allow the current VMA
to be freed before hugetlb_vma_unlock_read() is called.

We can fix this by using a modified version of vmf_anon_prepare() that
doesn't release the VMA lock on failure, and then release it ourselves
after hugetlb_vma_unlock_read().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47676/">CVE-2024-47676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47676">CVE-2024-47676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231927">SUSE bug 1231927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232898">SUSE bug 1232898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47677" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47677" ref_url="https://www.suse.com/security/cve/CVE-2024-47677" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: resolve memory leak from exfat_create_upcase_table()

If exfat_load_upcase_table reaches end and returns -EINVAL,
allocated memory doesn't get freed and while
exfat_load_default_upcase_table allocates more memory, leading to a
memory leak.

Here's link to syzkaller crash report illustrating this issue:
https://syzkaller.appspot.com/text?tag=CrashReport&amp;x=1406c201980000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47677/">CVE-2024-47677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47677">CVE-2024-47677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231853">SUSE bug 1231853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47680" ref_url="https://www.suse.com/security/cve/CVE-2024-47680" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: check discard support for conventional zones

As the helper function f2fs_bdev_support_discard() shows, f2fs checks if
the target block devices support discard by calling
bdev_max_discard_sectors() and bdev_is_zoned(). This check works well
for most cases, but it does not work for conventional zones on zoned
block devices. F2fs assumes that zoned block devices support discard,
and calls __submit_discard_cmd(). When __submit_discard_cmd() is called
for sequential write required zones, it works fine since
__submit_discard_cmd() issues zone reset commands instead of discard
commands. However, when __submit_discard_cmd() is called for
conventional zones, __blkdev_issue_discard() is called even when the
devices do not support discard.

The inappropriate __blkdev_issue_discard() call was not a problem before
the commit 30f1e7241422 ("block: move discard checks into the ioctl
handler") because __blkdev_issue_discard() checked if the target devices
support discard or not. If not, it returned EOPNOTSUPP. After the
commit, __blkdev_issue_discard() no longer checks it. It always returns
zero and sets NULL to the given bio pointer. This NULL pointer triggers
f2fs_bug_on() in __submit_discard_cmd(). The BUG is recreated with the
commands below at the umount step, where /dev/nullb0 is a zoned null_blk
with 5GB total size, 128MB zone size and 10 conventional zones.

$ mkfs.f2fs -f -m /dev/nullb0
$ mount /dev/nullb0 /mnt
$ for ((i=0;i&lt;5;i++)); do dd if=/dev/zero of=/mnt/test bs=65536 count=1600 conv=fsync; done
$ umount /mnt

To fix the BUG, avoid the inappropriate __blkdev_issue_discard() call.
When discard is requested for conventional zones, check if the device
supports discard or not. If not, return EOPNOTSUPP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47680/">CVE-2024-47680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47680">CVE-2024-47680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231970">SUSE bug 1231970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47681" ref_url="https://www.suse.com/security/cve/CVE-2024-47681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he

Fix the NULL pointer dereference in mt7996_mcu_sta_bfer_he
routine adding an sta interface to the mt7996 driver.

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47681/">CVE-2024-47681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47681">CVE-2024-47681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231855">SUSE bug 1231855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47682" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sd: Fix off-by-one error in sd_read_block_characteristics()

Ff the device returns page 0xb1 with length 8 (happens with qemu v2.x, for
example), sd_read_block_characteristics() may attempt an out-of-bounds
memory access when accessing the zoned field at offset 8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231856">SUSE bug 1231856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47683" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47683" ref_url="https://www.suse.com/security/cve/CVE-2024-47683" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip Recompute DSC Params if no Stream on Link

[why]
Encounter NULL pointer dereference uner mst + dsc setup.

BUG: kernel NULL pointer dereference, address: 0000000000000008
    PGD 0 P4D 0
    Oops: 0000 [#1] PREEMPT SMP NOPTI
    CPU: 4 PID: 917 Comm: sway Not tainted 6.3.9-arch1-1 #1 124dc55df4f5272ccb409f39ef4872fc2b3376a2
    Hardware name: LENOVO 20NKS01Y00/20NKS01Y00, BIOS R12ET61W(1.31 ) 07/28/2022
    RIP: 0010:drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper]
    Code: 01 00 00 48 8b 85 60 05 00 00 48 63 80 88 00 00 00 3b 43 28 0f 8d 2e 01 00 00 48 8b 53 30 48 8d 04 80 48 8d 04 c2 48 8b 40 18 &lt;48&gt; 8&gt;
    RSP: 0018:ffff960cc2df77d8 EFLAGS: 00010293
    RAX: 0000000000000000 RBX: ffff8afb87e81280 RCX: 0000000000000224
    RDX: ffff8afb9ee37c00 RSI: ffff8afb8da1a578 RDI: ffff8afb87e81280
    RBP: ffff8afb83d67000 R08: 0000000000000001 R09: ffff8afb9652f850
    R10: ffff960cc2df7908 R11: 0000000000000002 R12: 0000000000000000
    R13: ffff8afb8d7688a0 R14: ffff8afb8da1a578 R15: 0000000000000224
    FS:  00007f4dac35ce00(0000) GS:ffff8afe30b00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000000000000008 CR3: 000000010ddc6000 CR4: 00000000003506e0
    Call Trace:
&lt;TASK&gt;
     ? __die+0x23/0x70
     ? page_fault_oops+0x171/0x4e0
     ? plist_add+0xbe/0x100
     ? exc_page_fault+0x7c/0x180
     ? asm_exc_page_fault+0x26/0x30
     ? drm_dp_atomic_find_time_slots+0x5e/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
     ? drm_dp_atomic_find_time_slots+0x28/0x260 [drm_display_helper 0e67723696438d8e02b741593dd50d80b44c2026]
     compute_mst_dsc_configs_for_link+0x2ff/0xa40 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     ? fill_plane_buffer_attributes+0x419/0x510 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     compute_mst_dsc_configs_for_state+0x1e1/0x250 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     amdgpu_dm_atomic_check+0xecd/0x1190 [amdgpu 62e600d2a75e9158e1cd0a243bdc8e6da040c054]
     drm_atomic_check_only+0x5c5/0xa40
     drm_mode_atomic_ioctl+0x76e/0xbc0

[how]
dsc recompute should be skipped if no mode change detected on the new
request. If detected, keep checking whether the stream is already on
current state or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47683/">CVE-2024-47683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47683">CVE-2024-47683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231975">SUSE bug 1231975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47686</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47686" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47686" ref_url="https://www.suse.com/security/cve/CVE-2024-47686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate()

The psc-&gt;div[] array has psc-&gt;num_div elements.  These values come from
when we call clk_hw_register_div().  It's adc_divisors and
ARRAY_SIZE(adc_divisors)) and so on.  So this condition needs to be &gt;=
instead of &gt; to prevent an out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47686/">CVE-2024-47686 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47686">CVE-2024-47686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232000">SUSE bug 1232000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: Fix invalid mr resource destroy

Certain error paths from mlx5_vdpa_dev_add() can end up releasing mr
resources which never got initialized in the first place.

This patch adds the missing check in mlx5_vdpa_destroy_mr_resources()
to block releasing non-initialized mr resources.

Reference trace:

  mlx5_core 0000:08:00.2: mlx5_vdpa_dev_add:3274:(pid 2700) warning: No mac address provisioned?
  BUG: kernel NULL pointer dereference, address: 0000000000000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 140216067 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 8 PID: 2700 Comm: vdpa Kdump: loaded Not tainted 5.14.0-496.el9.x86_64 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:vhost_iotlb_del_range+0xf/0xe0 [vhost_iotlb]
  Code: [...]
  RSP: 0018:ff1c823ac23077f0 EFLAGS: 00010246
  RAX: ffffffffc1a21a60 RBX: ffffffff899567a0 RCX: 0000000000000000
  RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000000000000
  RBP: ff1bda1f7c21e800 R08: 0000000000000000 R09: ff1c823ac2307670
  R10: ff1c823ac2307668 R11: ffffffff8a9e7b68 R12: 0000000000000000
  R13: 0000000000000000 R14: ff1bda1f43e341a0 R15: 00000000ffffffea
  FS:  00007f56eba7c740(0000) GS:ff1bda269f800000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000104d90001 CR4: 0000000000771ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:

   ? show_trace_log_lvl+0x1c4/0x2df
   ? show_trace_log_lvl+0x1c4/0x2df
   ? mlx5_vdpa_free+0x3d/0x150 [mlx5_vdpa]
   ? __die_body.cold+0x8/0xd
   ? page_fault_oops+0x134/0x170
   ? __irq_work_queue_local+0x2b/0xc0
   ? irq_work_queue+0x2c/0x50
   ? exc_page_fault+0x62/0x150
   ? asm_exc_page_fault+0x22/0x30
   ? __pfx_mlx5_vdpa_free+0x10/0x10 [mlx5_vdpa]
   ? vhost_iotlb_del_range+0xf/0xe0 [vhost_iotlb]
   mlx5_vdpa_free+0x3d/0x150 [mlx5_vdpa]
   vdpa_release_dev+0x1e/0x50 [vdpa]
   device_release+0x31/0x90
   kobject_cleanup+0x37/0x130
   mlx5_vdpa_dev_add+0x2d2/0x7a0 [mlx5_vdpa]
   vdpa_nl_cmd_dev_add_set_doit+0x277/0x4c0 [vdpa]
   genl_family_rcv_msg_doit+0xd9/0x130
   genl_family_rcv_msg+0x14d/0x220
   ? __pfx_vdpa_nl_cmd_dev_add_set_doit+0x10/0x10 [vdpa]
   ? _copy_to_user+0x1a/0x30
   ? move_addr_to_user+0x4b/0xe0
   genl_rcv_msg+0x47/0xa0
   ? __import_iovec+0x46/0x150
   ? __pfx_genl_rcv_msg+0x10/0x10
   netlink_rcv_skb+0x54/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x245/0x370
   netlink_sendmsg+0x206/0x440
   __sys_sendto+0x1dc/0x1f0
   ? do_read_fault+0x10c/0x1d0
   ? do_pte_missing+0x10d/0x190
   __x64_sys_sendto+0x20/0x30
   do_syscall_64+0x5c/0xf0
   ? __count_memcg_events+0x4f/0xb0
   ? mm_account_fault+0x6c/0x100
   ? handle_mm_fault+0x116/0x270
   ? do_user_addr_fault+0x1d6/0x6a0
   ? do_syscall_64+0x6b/0xf0
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   entry_SYSCALL_64_after_hwframe+0x78/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232003">SUSE bug 1232003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47688" ref_url="https://www.suse.com/security/cve/CVE-2024-47688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: Fix a potential null-ptr-deref in module_add_driver()

Inject fault while probing of-fpga-region, if kasprintf() fails in
module_add_driver(), the second sysfs_remove_link() in exit path will cause
null-ptr-deref as below because kernfs_name_hash() will call strlen() with
NULL driver_name.

Fix it by releasing resources based on the exit path sequence.

	 KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
	 Mem abort info:
	   ESR = 0x0000000096000005
	   EC = 0x25: DABT (current EL), IL = 32 bits
	   SET = 0, FnV = 0
	   EA = 0, S1PTW = 0
	   FSC = 0x05: level 1 translation fault
	 Data abort info:
	   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
	   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
	   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
	 [dfffffc000000000] address between user and kernel address ranges
	 Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
	 Dumping ftrace buffer:
	    (ftrace buffer empty)
	 Modules linked in: of_fpga_region(+) fpga_region fpga_bridge cfg80211 rfkill 8021q garp mrp stp llc ipv6 [last unloaded: of_fpga_region]
	 CPU: 2 UID: 0 PID: 2036 Comm: modprobe Not tainted 6.11.0-rc2-g6a0e38264012 #295
	 Hardware name: linux,dummy-virt (DT)
	 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
	 pc : strlen+0x24/0xb0
	 lr : kernfs_name_hash+0x1c/0xc4
	 sp : ffffffc081f97380
	 x29: ffffffc081f97380 x28: ffffffc081f97b90 x27: ffffff80c821c2a0
	 x26: ffffffedac0be418 x25: 0000000000000000 x24: ffffff80c09d2000
	 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
	 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000001840
	 x17: 0000000000000000 x16: 0000000000000000 x15: 1ffffff8103f2e42
	 x14: 00000000f1f1f1f1 x13: 0000000000000004 x12: ffffffb01812d61d
	 x11: 1ffffff01812d61c x10: ffffffb01812d61c x9 : dfffffc000000000
	 x8 : 0000004fe7ed29e4 x7 : ffffff80c096b0e7 x6 : 0000000000000001
	 x5 : ffffff80c096b0e0 x4 : 1ffffffdb990efa2 x3 : 0000000000000000
	 x2 : 0000000000000000 x1 : dfffffc000000000 x0 : 0000000000000000
	 Call trace:
	  strlen+0x24/0xb0
	  kernfs_name_hash+0x1c/0xc4
	  kernfs_find_ns+0x118/0x2e8
	  kernfs_remove_by_name_ns+0x80/0x100
	  sysfs_remove_link+0x74/0xa8
	  module_add_driver+0x278/0x394
	  bus_add_driver+0x1f0/0x43c
	  driver_register+0xf4/0x3c0
	  __platform_driver_register+0x60/0x88
	  of_fpga_region_init+0x20/0x1000 [of_fpga_region]
	  do_one_initcall+0x110/0x788
	  do_init_module+0x1dc/0x5c8
	  load_module+0x3c38/0x4cac
	  init_module_from_file+0xd4/0x128
	  idempotent_init_module+0x2cc/0x528
	  __arm64_sys_finit_module+0xac/0x100
	  invoke_syscall+0x6c/0x258
	  el0_svc_common.constprop.0+0x160/0x22c
	  do_el0_svc+0x44/0x5c
	  el0_svc+0x48/0xb8
	  el0t_64_sync_handler+0x13c/0x158
	  el0t_64_sync+0x190/0x194
	 Code: f2fbffe1 a90157f4 12000802 aa0003f5 (38e16861)
	 ---[ end trace 0000000000000000 ]---
	 Kernel panic - not syncing: Oops: Fatal exception
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47688/">CVE-2024-47688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47688">CVE-2024-47688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232009">SUSE bug 1232009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47689" ref_url="https://www.suse.com/security/cve/CVE-2024-47689" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error()

syzbot reports a f2fs bug as below:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 58 at kernel/rcu/sync.c:177 rcu_sync_dtor+0xcd/0x180 kernel/rcu/sync.c:177
CPU: 1 UID: 0 PID: 58 Comm: kworker/1:2 Not tainted 6.10.0-syzkaller-12562-g1722389b0d86 #0
Workqueue: events destroy_super_work
RIP: 0010:rcu_sync_dtor+0xcd/0x180 kernel/rcu/sync.c:177
Call Trace:
 percpu_free_rwsem+0x41/0x80 kernel/locking/percpu-rwsem.c:42
 destroy_super_work+0xec/0x130 fs/super.c:282
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd40 kernel/workqueue.c:3390
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

As Christian Brauner pointed out [1]: the root cause is f2fs sets
SB_RDONLY flag in internal function, rather than setting the flag
covered w/ sb-&gt;s_umount semaphore via remount procedure, then below
race condition causes this bug:

- freeze_super()
 - sb_wait_write(sb, SB_FREEZE_WRITE)
 - sb_wait_write(sb, SB_FREEZE_PAGEFAULT)
 - sb_wait_write(sb, SB_FREEZE_FS)
					- f2fs_handle_critical_error
					 - sb-&gt;s_flags |= SB_RDONLY
- thaw_super
 - thaw_super_locked
  - sb_rdonly() is true, so it skips
    sb_freeze_unlock(sb, SB_FREEZE_FS)
  - deactivate_locked_super

Since f2fs has almost the same logic as ext4 [2] when handling critical
error in filesystem if it mounts w/ errors=remount-ro option:
- set CP_ERROR_FLAG flag which indicates filesystem is stopped
- record errors to superblock
- set SB_RDONLY falg
Once we set CP_ERROR_FLAG flag, all writable interfaces can detect the
flag and stop any further updates on filesystem. So, it is safe to not
set SB_RDONLY flag, let's remove the logic and keep in line w/ ext4 [3].

[1] https://lore.kernel.org/all/20240729-himbeeren-funknetz-96e62f9c7aee@brauner
[2] https://lore.kernel.org/all/20240729132721.hxih6ehigadqf7wx@quack3
[3] https://lore.kernel.org/linux-ext4/20240805201241.27286-1-jack@suse.cz
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47689/">CVE-2024-47689 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47689">CVE-2024-47689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232010">SUSE bug 1232010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47690" ref_url="https://www.suse.com/security/cve/CVE-2024-47690" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: get rid of online repaire on corrupted directory

syzbot reports a f2fs bug as below:

kernel BUG at fs/f2fs/inode.c:896!
RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896
Call Trace:
 evict+0x532/0x950 fs/inode.c:704
 dispose_list fs/inode.c:747 [inline]
 evict_inodes+0x5f9/0x690 fs/inode.c:797
 generic_shutdown_super+0x9d/0x2d0 fs/super.c:627
 kill_block_super+0x44/0x90 fs/super.c:1696
 kill_f2fs_super+0x344/0x690 fs/f2fs/super.c:4898
 deactivate_locked_super+0xc4/0x130 fs/super.c:473
 cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373
 task_work_run+0x24f/0x310 kernel/task_work.c:228
 ptrace_notify+0x2d2/0x380 kernel/signal.c:2402
 ptrace_report_syscall include/linux/ptrace.h:415 [inline]
 ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]
 syscall_exit_work+0xc6/0x190 kernel/entry/common.c:173
 syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]
 syscall_exit_to_user_mode+0x279/0x370 kernel/entry/common.c:218
 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0010:f2fs_evict_inode+0x1598/0x15c0 fs/f2fs/inode.c:896

Online repaire on corrupted directory in f2fs_lookup() can generate
dirty data/meta while racing w/ readonly remount, it may leave dirty
inode after filesystem becomes readonly, however, checkpoint() will
skips flushing dirty inode in a state of readonly mode, result in
above panic.

Let's get rid of online repaire in f2fs_lookup(), and leave the work
to fsck.f2fs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47690/">CVE-2024-47690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47690">CVE-2024-47690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232011">SUSE bug 1232011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47691" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47691" ref_url="https://www.suse.com/security/cve/CVE-2024-47691" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()

syzbot reports a f2fs bug as below:

 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_report+0xe8/0x550 mm/kasan/report.c:491
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
 atomic_fetch_add_relaxed include/linux/atomic/atomic-instrumented.h:252 [inline]
 __refcount_add include/linux/refcount.h:184 [inline]
 __refcount_inc include/linux/refcount.h:241 [inline]
 refcount_inc include/linux/refcount.h:258 [inline]
 get_task_struct include/linux/sched/task.h:118 [inline]
 kthread_stop+0xca/0x630 kernel/kthread.c:704
 f2fs_stop_gc_thread+0x65/0xb0 fs/f2fs/gc.c:210
 f2fs_do_shutdown+0x192/0x540 fs/f2fs/file.c:2283
 f2fs_ioc_shutdown fs/f2fs/file.c:2325 [inline]
 __f2fs_ioctl+0x443a/0xbe60 fs/f2fs/file.c:4325
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The root cause is below race condition, it may cause use-after-free
issue in sbi-&gt;gc_th pointer.

- remount
 - f2fs_remount
  - f2fs_stop_gc_thread
   - kfree(gc_th)
				- f2fs_ioc_shutdown
				 - f2fs_do_shutdown
				  - f2fs_stop_gc_thread
				   - kthread_stop(gc_th-&gt;f2fs_gc_task)
   : sbi-&gt;gc_thread = NULL;

We will call f2fs_do_shutdown() in two paths:
- for f2fs_ioc_shutdown() path, we should grab sb-&gt;s_umount semaphore
for fixing.
- for f2fs_shutdown() path, it's safe since caller has already grabbed
sb-&gt;s_umount semaphore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47691/">CVE-2024-47691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47691">CVE-2024-47691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232012">SUSE bug 1232012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: return -EINVAL when namelen is 0

When we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may
result in namelen being 0, which will cause memdup_user() to return
ZERO_SIZE_PTR.
When we access the name.data that has been assigned the value of
ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is
triggered.

[ T1205] ==================================================================
[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260
[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205
[ T1205]
[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406
[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014
[ T1205] Call Trace:
[ T1205]  dump_stack+0x9a/0xd0
[ T1205]  ? nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  __kasan_report.cold+0x34/0x84
[ T1205]  ? nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  kasan_report+0x3a/0x50
[ T1205]  nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  ? nfsd4_release_lockowner+0x410/0x410
[ T1205]  cld_pipe_downcall+0x5ca/0x760
[ T1205]  ? nfsd4_cld_tracking_exit+0x1d0/0x1d0
[ T1205]  ? down_write_killable_nested+0x170/0x170
[ T1205]  ? avc_policy_seqno+0x28/0x40
[ T1205]  ? selinux_file_permission+0x1b4/0x1e0
[ T1205]  rpc_pipe_write+0x84/0xb0
[ T1205]  vfs_write+0x143/0x520
[ T1205]  ksys_write+0xc9/0x170
[ T1205]  ? __ia32_sys_read+0x50/0x50
[ T1205]  ? ktime_get_coarse_real_ts64+0xfe/0x110
[ T1205]  ? ktime_get_coarse_real_ts64+0xa2/0x110
[ T1205]  do_syscall_64+0x33/0x40
[ T1205]  entry_SYSCALL_64_after_hwframe+0x67/0xd1
[ T1205] RIP: 0033:0x7fdbdb761bc7
[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 514
[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7
[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008
[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001
[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b
[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000
[ T1205] ==================================================================

Fix it by checking namelen.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231857">SUSE bug 1231857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/core: Fix ib_cache_setup_one error flow cleanup

When ib_cache_update return an error, we exit ib_cache_setup_one
instantly with no proper cleanup, even though before this we had
already successfully done gid_table_setup_one, that results in
the kernel WARN below.

Do proper cleanup using gid_table_cleanup_one before returning
the err in order to fix the issue.

WARNING: CPU: 4 PID: 922 at drivers/infiniband/core/cache.c:806 gid_table_release_one+0x181/0x1a0
Modules linked in:
CPU: 4 UID: 0 PID: 922 Comm: c_repro Not tainted 6.11.0-rc1+ #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:gid_table_release_one+0x181/0x1a0
Code: 44 8b 38 75 0c e8 2f cb 34 ff 4d 8b b5 28 05 00 00 e8 23 cb 34 ff 44 89 f9 89 da 4c 89 f6 48 c7 c7 d0 58 14 83 e8 4f de 21 ff &lt;0f&gt; 0b 4c 8b 75 30 e9 54 ff ff ff 48 8    3 c4 10 5b 5d 41 5c 41 5d 41
RSP: 0018:ffffc90002b835b0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c8527
RDX: 0000000000000000 RSI: ffffffff811c8534 RDI: 0000000000000001
RBP: ffff8881011b3d00 R08: ffff88810b3abe00 R09: 205d303839303631
R10: 666572207972746e R11: 72746e6520444947 R12: 0000000000000001
R13: ffff888106390000 R14: ffff8881011f2110 R15: 0000000000000001
FS:  00007fecc3b70800(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000340 CR3: 000000010435a001 CR4: 00000000003706b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x94/0xa0
 ? __warn+0x9e/0x1c0
 ? gid_table_release_one+0x181/0x1a0
 ? report_bug+0x1f9/0x340
 ? gid_table_release_one+0x181/0x1a0
 ? handle_bug+0xa2/0x110
 ? exc_invalid_op+0x31/0xa0
 ? asm_exc_invalid_op+0x16/0x20
 ? __warn_printk+0xc7/0x180
 ? __warn_printk+0xd4/0x180
 ? gid_table_release_one+0x181/0x1a0
 ib_device_release+0x71/0xe0
 ? __pfx_ib_device_release+0x10/0x10
 device_release+0x44/0xd0
 kobject_put+0x135/0x3d0
 put_device+0x20/0x30
 rxe_net_add+0x7d/0xa0
 rxe_newlink+0xd7/0x190
 nldev_newlink+0x1b0/0x2a0
 ? __pfx_nldev_newlink+0x10/0x10
 rdma_nl_rcv_msg+0x1ad/0x2e0
 rdma_nl_rcv_skb.constprop.0+0x176/0x210
 netlink_unicast+0x2de/0x400
 netlink_sendmsg+0x306/0x660
 __sock_sendmsg+0x110/0x120
 ____sys_sendmsg+0x30e/0x390
 ___sys_sendmsg+0x9b/0xf0
 ? kstrtouint+0x6e/0xa0
 ? kstrtouint_from_user+0x7c/0xb0
 ? get_pid_task+0xb0/0xd0
 ? proc_fail_nth_write+0x5b/0x140
 ? __fget_light+0x9a/0x200
 ? preempt_count_add+0x47/0xa0
 __sys_sendmsg+0x61/0xd0
 do_syscall_64+0x50/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232013">SUSE bug 1232013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47694" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47694" ref_url="https://www.suse.com/security/cve/CVE-2024-47694" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mlx5: Fix UMR pd cleanup on error flow of driver init

The cited commit moves the pd allocation from function
mlx5r_umr_resource_cleanup() to a new function mlx5r_umr_cleanup().
So the fix in commit [1] is broken. In error flow, will hit panic [2].

Fix it by checking pd pointer to avoid panic if it is NULL;

[1] RDMA/mlx5: Fix UMR cleanup on error flow of driver init
[2]
 [  347.567063] infiniband mlx5_0: Couldn't register device with driver model
 [  347.591382] BUG: kernel NULL pointer dereference, address: 0000000000000020
 [  347.593438] #PF: supervisor read access in kernel mode
 [  347.595176] #PF: error_code(0x0000) - not-present page
 [  347.596962] PGD 0 P4D 0
 [  347.601361] RIP: 0010:ib_dealloc_pd_user+0x12/0xc0 [ib_core]
 [  347.604171] RSP: 0018:ffff888106293b10 EFLAGS: 00010282
 [  347.604834] RAX: 0000000000000000 RBX: 000000000000000e RCX: 0000000000000000
 [  347.605672] RDX: ffff888106293ad0 RSI: 0000000000000000 RDI: 0000000000000000
 [  347.606529] RBP: 0000000000000000 R08: ffff888106293ae0 R09: ffff888106293ae0
 [  347.607379] R10: 0000000000000a06 R11: 0000000000000000 R12: 0000000000000000
 [  347.608224] R13: ffffffffa0704dc0 R14: 0000000000000001 R15: 0000000000000001
 [  347.609067] FS:  00007fdc720cd9c0(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000
 [  347.610094] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [  347.610727] CR2: 0000000000000020 CR3: 0000000103012003 CR4: 0000000000370eb0
 [  347.611421] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 [  347.612113] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 [  347.612804] Call Trace:
 [  347.613130]  &lt;TASK&gt;
 [  347.613417]  ? __die+0x20/0x60
 [  347.613793]  ? page_fault_oops+0x150/0x3e0
 [  347.614243]  ? free_msg+0x68/0x80 [mlx5_core]
 [  347.614840]  ? cmd_exec+0x48f/0x11d0 [mlx5_core]
 [  347.615359]  ? exc_page_fault+0x74/0x130
 [  347.615808]  ? asm_exc_page_fault+0x22/0x30
 [  347.616273]  ? ib_dealloc_pd_user+0x12/0xc0 [ib_core]
 [  347.616801]  mlx5r_umr_cleanup+0x23/0x90 [mlx5_ib]
 [  347.617365]  mlx5_ib_stage_pre_ib_reg_umr_cleanup+0x36/0x40 [mlx5_ib]
 [  347.618025]  __mlx5_ib_add+0x96/0xd0 [mlx5_ib]
 [  347.618539]  mlx5r_probe+0xe9/0x310 [mlx5_ib]
 [  347.619032]  ? kernfs_add_one+0x107/0x150
 [  347.619478]  ? __mlx5_ib_add+0xd0/0xd0 [mlx5_ib]
 [  347.619984]  auxiliary_bus_probe+0x3e/0x90
 [  347.620448]  really_probe+0xc5/0x3a0
 [  347.620857]  __driver_probe_device+0x80/0x160
 [  347.621325]  driver_probe_device+0x1e/0x90
 [  347.621770]  __driver_attach+0xec/0x1c0
 [  347.622213]  ? __device_attach_driver+0x100/0x100
 [  347.622724]  bus_for_each_dev+0x71/0xc0
 [  347.623151]  bus_add_driver+0xed/0x240
 [  347.623570]  driver_register+0x58/0x100
 [  347.623998]  __auxiliary_driver_register+0x6a/0xc0
 [  347.624499]  ? driver_register+0xae/0x100
 [  347.624940]  ? 0xffffffffa0893000
 [  347.625329]  mlx5_ib_init+0x16a/0x1e0 [mlx5_ib]
 [  347.625845]  do_one_initcall+0x4a/0x2a0
 [  347.626273]  ? gcov_event+0x2e2/0x3a0
 [  347.626706]  do_init_module+0x8a/0x260
 [  347.627126]  init_module_from_file+0x8b/0xd0
 [  347.627596]  __x64_sys_finit_module+0x1ca/0x2f0
 [  347.628089]  do_syscall_64+0x4c/0x100
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47694/">CVE-2024-47694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47694">CVE-2024-47694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232014">SUSE bug 1232014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds

In the function init_conns(), after the create_con() and create_cm() for
loop if something fails. In the cleanup for loop after the destroy tag, we
access out of bound memory because cid is set to clt_path-&gt;s.con_num.

This commits resets the cid to clt_path-&gt;s.con_num - 1, to stay in bounds
in the cleanup loop later.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231931">SUSE bug 1231931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency

In the commit aee2424246f9 ("RDMA/iwcm: Fix a use-after-free related to
destroying CM IDs"), the function flush_workqueue is invoked to flush the
work queue iwcm_wq.

But at that time, the work queue iwcm_wq was created via the function
alloc_ordered_workqueue without the flag WQ_MEM_RECLAIM.

Because the current process is trying to flush the whole iwcm_wq, if
iwcm_wq doesn't have the flag WQ_MEM_RECLAIM, verify that the current
process is not reclaiming memory or running on a workqueue which doesn't
have the flag WQ_MEM_RECLAIM as that can break forward-progress guarantee
leading to a deadlock.

The call trace is as below:

[  125.350876][ T1430] Call Trace:
[  125.356281][ T1430]  &lt;TASK&gt;
[ 125.361285][ T1430] ? __warn (kernel/panic.c:693)
[ 125.367640][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.375689][ T1430] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[ 125.382505][ T1430] ? handle_bug (arch/x86/kernel/traps.c:239)
[ 125.388987][ T1430] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[ 125.395831][ T1430] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)
[ 125.403125][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.410984][ T1430] ? check_flush_dependency (kernel/workqueue.c:3706 (discriminator 9))
[ 125.418764][ T1430] __flush_workqueue (kernel/workqueue.c:3970)
[ 125.426021][ T1430] ? __pfx___might_resched (kernel/sched/core.c:10151)
[ 125.433431][ T1430] ? destroy_cm_id (drivers/infiniband/core/iwcm.c:375) iw_cm
[ 125.441209][ T1430] ? __pfx___flush_workqueue (kernel/workqueue.c:3910)
[ 125.473900][ T1430] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:107 include/linux/atomic/atomic-arch-fallback.h:2170 include/linux/atomic/atomic-instrumented.h:1302 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:187 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)
[ 125.473909][ T1430] ? __pfx__raw_spin_lock_irqsave (kernel/locking/spinlock.c:161)
[ 125.482537][ T1430] _destroy_id (drivers/infiniband/core/cma.c:2044) rdma_cm
[ 125.495072][ T1430] nvme_rdma_free_queue (drivers/nvme/host/rdma.c:656 drivers/nvme/host/rdma.c:650) nvme_rdma
[ 125.505827][ T1430] nvme_rdma_reset_ctrl_work (drivers/nvme/host/rdma.c:2180) nvme_rdma
[ 125.505831][ T1430] process_one_work (kernel/workqueue.c:3231)
[ 125.515122][ T1430] worker_thread (kernel/workqueue.c:3306 kernel/workqueue.c:3393)
[ 125.515127][ T1430] ? __pfx_worker_thread (kernel/workqueue.c:3339)
[ 125.531837][ T1430] kthread (kernel/kthread.c:389)
[ 125.539864][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.550628][ T1430] ret_from_fork (arch/x86/kernel/process.c:147)
[ 125.558840][ T1430] ? __pfx_kthread (kernel/kthread.c:342)
[ 125.558844][ T1430] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)
[  125.566487][ T1430]  &lt;/TASK&gt;
[  125.566488][ T1430] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231864">SUSE bug 1231864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47700" ref_url="https://www.suse.com/security/cve/CVE-2024-47700" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: check stripe size compatibility on remount as well

We disable stripe size in __ext4_fill_super if it is not a multiple of
the cluster ratio however this check is missed when trying to remount.
This can leave us with cases where stripe &lt; cluster_ratio after
remount:set making EXT4_B2C(sbi-&gt;s_stripe) become 0 that can cause some
unforeseen bugs like divide by 0.

Fix that by adding the check in remount path as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47700/">CVE-2024-47700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47700">CVE-2024-47700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231919">SUSE bug 1231919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47702" ref_url="https://www.suse.com/security/cve/CVE-2024-47702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fail verification for sign-extension of packet data/data_end/data_meta

syzbot reported a kernel crash due to
  commit 1f1e864b6555 ("bpf: Handle sign-extenstin ctx member accesses").
The reason is due to sign-extension of 32-bit load for
packet data/data_end/data_meta uapi field.

The original code looks like:
        r2 = *(s32 *)(r1 + 76) /* load __sk_buff-&gt;data */
        r3 = *(u32 *)(r1 + 80) /* load __sk_buff-&gt;data_end */
        r0 = r2
        r0 += 8
        if r3 &gt; r0 goto +1
        ...
Note that __sk_buff-&gt;data load has 32-bit sign extension.

After verification and convert_ctx_accesses(), the final asm code looks like:
        r2 = *(u64 *)(r1 +208)
        r2 = (s32)r2
        r3 = *(u64 *)(r1 +80)
        r0 = r2
        r0 += 8
        if r3 &gt; r0 goto pc+1
        ...
Note that 'r2 = (s32)r2' may make the kernel __sk_buff-&gt;data address invalid
which may cause runtime failure.

Currently, in C code, typically we have
        void *data = (void *)(long)skb-&gt;data;
        void *data_end = (void *)(long)skb-&gt;data_end;
        ...
and it will generate
        r2 = *(u64 *)(r1 +208)
        r3 = *(u64 *)(r1 +80)
        r0 = r2
        r0 += 8
        if r3 &gt; r0 goto pc+1

If we allow sign-extension,
        void *data = (void *)(long)(int)skb-&gt;data;
        void *data_end = (void *)(long)skb-&gt;data_end;
        ...
the generated code looks like
        r2 = *(u64 *)(r1 +208)
        r2 &lt;&lt;= 32
        r2 s&gt;&gt;= 32
        r3 = *(u64 *)(r1 +80)
        r0 = r2
        r0 += 8
        if r3 &gt; r0 goto pc+1
and this will cause verification failure since "r2 &lt;&lt;= 32" is not allowed
as "r2" is a packet pointer.

To fix this issue for case
  r2 = *(s32 *)(r1 + 76) /* load __sk_buff-&gt;data */
this patch added additional checking in is_valid_access() callback
function for packet data/data_end/data_meta access. If those accesses
are with sign-extenstion, the verification will fail.

  [1] https://lore.kernel.org/bpf/000000000000c90eee061d236d37@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47702/">CVE-2024-47702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47702">CVE-2024-47702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231924">SUSE bug 1231924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47703" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, lsm: Add check for BPF LSM return value

A bpf prog returning a positive number attached to file_alloc_security
hook makes kernel panic.

This happens because file system can not filter out the positive number
returned by the LSM prog using IS_ERR, and misinterprets this positive
number as a file pointer.

Given that hook file_alloc_security never returned positive number
before the introduction of BPF LSM, and other BPF LSM hooks may
encounter similar issues, this patch adds LSM return value check
in verifier, to ensure no unexpected value is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231946">SUSE bug 1231946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it

[WHAT &amp; HOW]
Functions dp_enable_link_phy and dp_disable_link_phy can pass link_res
without initializing hpo_dp_link_enc and it is necessary to check for
null before dereferencing.

This fixes 2 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231944">SUSE bug 1231944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix potential invalid pointer dereference in blk_add_partition

The blk_add_partition() function initially used a single if-condition
(IS_ERR(part)) to check for errors when adding a partition. This was
modified to handle the specific case of -ENXIO separately, allowing the
function to proceed without logging the error in this case. However,
this change unintentionally left a path where md_autodetect_dev()
could be called without confirming that part is a valid pointer.

This commit separates the error handling logic by splitting the
initial if-condition, improving code readability and handling specific
error scenarios explicitly. The function now distinguishes the general
error case from -ENXIO without altering the existing behavior of
md_autodetect_dev() calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231872">SUSE bug 1231872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47708" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47708" ref_url="https://www.suse.com/security/cve/CVE-2024-47708" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netkit: Assign missing bpf_net_context

During the introduction of struct bpf_net_context handling for
XDP-redirect, the netkit driver has been missed, which also requires it
because NETKIT_REDIRECT invokes skb_do_redirect() which is accessing the
per-CPU variables. Otherwise we see the following crash:

	BUG: kernel NULL pointer dereference, address: 0000000000000038
	bpf_redirect()
	netkit_xmit()
	dev_hard_start_xmit()

Set the bpf_net_context before invoking netkit_xmit() program within the
netkit driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47708/">CVE-2024-47708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47708">CVE-2024-47708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231933">SUSE bug 1231933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47709" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry().

syzbot reported a warning in bcm_release(). [0]

The blamed change fixed another warning that is triggered when
connect() is issued again for a socket whose connect()ed device has
been unregistered.

However, if the socket is just close()d without the 2nd connect(), the
remaining bo-&gt;bcm_proc_read triggers unnecessary remove_proc_entry()
in bcm_release().

Let's clear bo-&gt;bcm_proc_read after remove_proc_entry() in bcm_notify().

[0]
name '4986'
WARNING: CPU: 0 PID: 5234 at fs/proc/generic.c:711 remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Modules linked in:
CPU: 0 UID: 0 PID: 5234 Comm: syz-executor606 Not tainted 6.11.0-rc5-syzkaller-00178-g5517ae241919 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:remove_proc_entry+0x2e7/0x5d0 fs/proc/generic.c:711
Code: ff eb 05 e8 cb 1e 5e ff 48 8b 5c 24 10 48 c7 c7 e0 f7 aa 8e e8 2a 38 8e 09 90 48 c7 c7 60 3a 1b 8c 48 89 de e8 da 42 20 ff 90 &lt;0f&gt; 0b 90 90 48 8b 44 24 18 48 c7 44 24 40 0e 36 e0 45 49 c7 04 07
RSP: 0018:ffffc9000345fa20 EFLAGS: 00010246
RAX: 2a2d0aee2eb64600 RBX: ffff888032f1f548 RCX: ffff888029431e00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000345fb08 R08: ffffffff8155b2f2 R09: 1ffff1101710519a
R10: dffffc0000000000 R11: ffffed101710519b R12: ffff888011d38640
R13: 0000000000000004 R14: 0000000000000000 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcfb52722f0 CR3: 000000000e734000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 bcm_release+0x250/0x880 net/can/bcm.c:1578
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbc/0x240 net/socket.c:1421
 __fput+0x24a/0x8a0 fs/file_table.c:422
 task_work_run+0x24f/0x310 kernel/task_work.c:228
 exit_task_work include/linux/task_work.h:40 [inline]
 do_exit+0xa2f/0x27f0 kernel/exit.c:882
 do_group_exit+0x207/0x2c0 kernel/exit.c:1031
 __do_sys_exit_group kernel/exit.c:1042 [inline]
 __se_sys_exit_group kernel/exit.c:1040 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1040
 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcfb51ee969
Code: Unable to access opcode bytes at 0x7fcfb51ee93f.
RSP: 002b:00007ffce0109ca8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007fcfb51ee969
RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
RBP: 00007fcfb526f3b0 R08: ffffffffffffffb8 R09: 0000555500000000
R10: 0000555500000000 R11: 0000000000000246 R12: 00007fcfb526f3b0
R13: 0000000000000000 R14: 00007fcfb5271ee0 R15: 00007fcfb51bf160
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232048">SUSE bug 1232048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47710" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: Add a cond_resched() in sock_hash_free()

Several syzbot soft lockup reports all have in common sock_hash_free()

If a map with a large number of buckets is destroyed, we need to yield
the cpu when needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232049">SUSE bug 1232049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47711" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47711" ref_url="https://www.suse.com/security/cve/CVE-2024-47711" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Don't return OOB skb in manage_oob().

syzbot reported use-after-free in unix_stream_recv_urg(). [0]

The scenario is

  1. send(MSG_OOB)
  2. recv(MSG_OOB)
     -&gt; The consumed OOB remains in recv queue
  3. send(MSG_OOB)
  4. recv()
     -&gt; manage_oob() returns the next skb of the consumed OOB
     -&gt; This is also OOB, but unix_sk(sk)-&gt;oob_skb is not cleared
  5. recv(MSG_OOB)
     -&gt; unix_sk(sk)-&gt;oob_skb is used but already freed

The recent commit 8594d9b85c07 ("af_unix: Don't call skb_get() for OOB
skb.") uncovered the issue.

If the OOB skb is consumed and the next skb is peeked in manage_oob(),
we still need to check if the skb is OOB.

Let's do so by falling back to the following checks in manage_oob()
and add the test case in selftest.

Note that we need to add a similar check for SIOCATMARK.

[0]:
BUG: KASAN: slab-use-after-free in unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959
Read of size 4 at addr ffff8880326abcc4 by task syz-executor178/5235

CPU: 0 UID: 0 PID: 5235 Comm: syz-executor178 Not tainted 6.11.0-rc5-syzkaller-00742-gfbdaffe41adc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 unix_stream_read_actor+0xa6/0xb0 net/unix/af_unix.c:2959
 unix_stream_recv_urg+0x1df/0x320 net/unix/af_unix.c:2640
 unix_stream_read_generic+0x2456/0x2520 net/unix/af_unix.c:2778
 unix_stream_recvmsg+0x22b/0x2c0 net/unix/af_unix.c:2996
 sock_recvmsg_nosec net/socket.c:1046 [inline]
 sock_recvmsg+0x22f/0x280 net/socket.c:1068
 ____sys_recvmsg+0x1db/0x470 net/socket.c:2816
 ___sys_recvmsg net/socket.c:2858 [inline]
 __sys_recvmsg+0x2f0/0x3e0 net/socket.c:2888
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5360d6b4e9
Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff29b3a458 EFLAGS: 00000246 ORIG_RAX: 000000000000002f
RAX: ffffffffffffffda RBX: 00007fff29b3a638 RCX: 00007f5360d6b4e9
RDX: 0000000000002001 RSI: 0000000020000640 RDI: 0000000000000003
RBP: 00007f5360dde610 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 00007fff29b3a628 R14: 0000000000000001 R15: 0000000000000001
 &lt;/TASK&gt;

Allocated by task 5235:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 unpoison_slab_object mm/kasan/common.c:312 [inline]
 __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338
 kasan_slab_alloc include/linux/kasan.h:201 [inline]
 slab_post_alloc_hook mm/slub.c:3988 [inline]
 slab_alloc_node mm/slub.c:4037 [inline]
 kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4080
 __alloc_skb+0x1c3/0x440 net/core/skbuff.c:667
 alloc_skb include/linux/skbuff.h:1320 [inline]
 alloc_skb_with_frags+0xc3/0x770 net/core/skbuff.c:6528
 sock_alloc_send_pskb+0x91a/0xa60 net/core/sock.c:2815
 sock_alloc_send_skb include/net/sock.h:1778 [inline]
 queue_oob+0x108/0x680 net/unix/af_unix.c:2198
 unix_stream_sendmsg+0xd24/0xf80 net/unix/af_unix.c:2351
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:745
 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
 ___sys_sendmsg net/socket.c:2651 [inline]
 __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5235:
 kasan_save_stack mm/kasan/common.c:47
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47711/">CVE-2024-47711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47711">CVE-2024-47711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232054">SUSE bug 1232054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47712" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param

In the `wilc_parse_join_bss_param` function, the TSF field of the `ies`
structure is accessed after the RCU read-side critical section is
unlocked. According to RCU usage rules, this is illegal. Reusing this
pointer can lead to unpredictable behavior, including accessing memory
that has been updated or causing use-after-free issues.

This possible bug was identified using a static analysis tool developed
by myself, specifically designed to detect RCU-related issues.

To address this, the TSF value is now stored in a local variable
`ies_tsf` before the RCU lock is released. The `param-&gt;tsf_lo` field is
then assigned using this local variable, ensuring that the TSF value is
safely accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232017">SUSE bug 1232017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47714" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47714" ref_url="https://www.suse.com/security/cve/CVE-2024-47714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: use hweight16 to get correct tx antenna

The chainmask is u16 so using hweight8 cannot get correct tx_ant.
Without this patch, the tx_ant of band 2 would be -1 and lead to the
following issue:
BUG: KASAN: stack-out-of-bounds in mt7996_mcu_add_sta+0x12e0/0x16e0 [mt7996e]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47714/">CVE-2024-47714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47714">CVE-2024-47714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232018">SUSE bug 1232018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7915: fix oops on non-dbdc mt7986

mt7915_band_config() sets band_idx = 1 on the main phy for mt7986
with MT7975_ONE_ADIE or MT7976_ONE_ADIE.

Commit 0335c034e726 ("wifi: mt76: fix race condition related to
checking tx queue fill status") introduced a dereference of the
phys array indirectly indexed by band_idx via wcid-&gt;phy_idx in
mt76_wcid_cleanup(). This caused the following Oops on affected
mt7986 devices:

 Unable to handle kernel read from unreadable memory at virtual address 0000000000000024
 Mem abort info:
   ESR = 0x0000000096000005
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x05: level 1 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000005
   CM = 0, WnR = 0
 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000
 [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
 Internal error: Oops: 0000000096000005 [#1] SMP
 Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...
 CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0
 Hardware name: ZyXEL EX5700 (Telenor) (DT)
 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : mt76_wcid_cleanup+0x84/0x22c [mt76]
 lr : mt76_wcid_cleanup+0x64/0x22c [mt76]
 sp : ffffffc00a803700
 x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00
 x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001
 x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8
 x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000
 x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0
 x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000
 x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28
 x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000
 x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001
 x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024
 Call trace:
  mt76_wcid_cleanup+0x84/0x22c [mt76]
  __mt76_sta_remove+0x70/0xbc [mt76]
  mt76_sta_state+0x8c/0x1a4 [mt76]
  mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]
  drv_sta_state+0x144/0x274 [mac80211]
  sta_info_move_state+0x1cc/0x2a4 [mac80211]
  sta_set_sinfo+0xaf8/0xc24 [mac80211]
  sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]

  ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]
  cfg80211_check_station_change+0x1360/0x4710 [cfg80211]
  genl_family_rcv_msg_doit+0xb4/0x110
  genl_rcv_msg+0xd0/0x1bc
  netlink_rcv_skb+0x58/0x120
  genl_rcv+0x34/0x50
  netlink_unicast+0x1f0/0x2ec
  netlink_sendmsg+0x198/0x3d0
  ____sys_sendmsg+0x1b0/0x210
  ___sys_sendmsg+0x80/0xf0
  __sys_sendmsg+0x44/0xa0
  __arm64_sys_sendmsg+0x20/0x30
  invoke_syscall.constprop.0+0x4c/0xe0
  do_el0_svc+0x40/0xd0
  el0_svc+0x14/0x4c
  el0t_64_sync_handler+0x100/0x110
  el0t_64_sync+0x15c/0x160
 Code: d2800002 910092c0 52800023 f9800011 (885f7c01)
 ---[ end trace 7e42dd9a39ed2281 ]---

Fix by using mt76_dev_phy() which will map band_idx to the correct phy
for all hardware combinations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231860">SUSE bug 1231860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47716" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47716" ref_url="https://www.suse.com/security/cve/CVE-2024-47716" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros

Floating point instructions in userspace can crash some arm kernels
built with clang/LLD 17.0.6:

    BUG: unsupported FP instruction in kernel mode
    FPEXC == 0xc0000780
    Internal error: Oops - undefined instruction: 0 [#1] ARM
    CPU: 0 PID: 196 Comm: vfp-reproducer Not tainted 6.10.0 #1
    Hardware name: BCM2835
    PC is at vfp_support_entry+0xc8/0x2cc
    LR is at do_undefinstr+0xa8/0x250
    pc : [&lt;c0101d50&gt;]    lr : [&lt;c010a80c&gt;]    psr: a0000013
    sp : dc8d1f68  ip : 60000013  fp : bedea19c
    r10: ec532b17  r9 : 00000010  r8 : 0044766c
    r7 : c0000780  r6 : ec532b17  r5 : c1c13800  r4 : dc8d1fb0
    r3 : c10072c4  r2 : c0101c88  r1 : ec532b17  r0 : 0044766c
    Flags: NzCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
    Control: 00c5387d  Table: 0251c008  DAC: 00000051
    Register r0 information: non-paged memory
    Register r1 information: vmalloc memory
    Register r2 information: non-slab/vmalloc memory
    Register r3 information: non-slab/vmalloc memory
    Register r4 information: 2-page vmalloc region
    Register r5 information: slab kmalloc-cg-2k
    Register r6 information: vmalloc memory
    Register r7 information: non-slab/vmalloc memory
    Register r8 information: non-paged memory
    Register r9 information: zero-size pointer
    Register r10 information: vmalloc memory
    Register r11 information: non-paged memory
    Register r12 information: non-paged memory
    Process vfp-reproducer (pid: 196, stack limit = 0x61aaaf8b)
    Stack: (0xdc8d1f68 to 0xdc8d2000)
    1f60:                   0000081f b6f69300 0000000f c10073f4 c10072c4 dc8d1fb0
    1f80: ec532b17 0c532b17 0044766c b6f9ccd8 00000000 c010a80c 00447670 60000010
    1fa0: ffffffff c1c13800 00c5387d c0100f10 b6f68af8 00448fc0 00000000 bedea188
    1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c
    1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff 00000000 00000000
    Call trace:
    [&lt;c0101d50&gt;] (vfp_support_entry) from [&lt;c010a80c&gt;] (do_undefinstr+0xa8/0x250)
    [&lt;c010a80c&gt;] (do_undefinstr) from [&lt;c0100f10&gt;] (__und_usr+0x70/0x80)
    Exception stack(0xdc8d1fb0 to 0xdc8d1ff8)
    1fa0:                                     b6f68af8 00448fc0 00000000 bedea188
    1fc0: bedea314 00000001 00448ebc b6f9d000 00447608 b6f9ccd8 00000000 bedea19c
    1fe0: bede9198 bedea188 b6e1061c 0044766c 60000010 ffffffff
    Code: 0a000061 e3877202 e594003c e3a09010 (eef16a10)
    ---[ end trace 0000000000000000 ]---
    Kernel panic - not syncing: Fatal exception in interrupt
    ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---

This is a minimal userspace reproducer on a Raspberry Pi Zero W:

    #include &lt;stdio.h&gt;
    #include &lt;math.h&gt;

    int main(void)
    {
            double v = 1.0;
            printf("%fn", NAN + *(volatile double *)&amp;v);
            return 0;
    }

Another way to consistently trigger the oops is:

    calvin@raspberry-pi-zero-w ~$ python -c "import json"

The bug reproduces only when the kernel is built with DYNAMIC_DEBUG=n,
because the pr_debug() calls act as barriers even when not activated.

This is the output from the same kernel source built with the same
compiler and DYNAMIC_DEBUG=y, where the userspace reproducer works as
expected:

    VFP: bounce: trigger ec532b17 fpexc c0000780
    VFP: emulate: INST=0xee377b06 SCR=0x00000000
    VFP: bounce: trigger eef1fa10 fpexc c0000780
    VFP: emulate: INST=0xeeb40b40 SCR=0x00000000
    VFP: raising exceptions 30000000

    calvin@raspberry-pi-zero-w ~$ ./vfp-reproducer
    nan

Crudely grepping for vmsr/vmrs instructions in the otherwise nearly
idential text for vfp_support_entry() makes the problem obvious:

    vmlinux.llvm.good [0xc0101cb8] &lt;+48&gt;:  vmrs   r7, fpexc
    vmlinux.llvm.good [0xc0101cd8] &lt;+80&gt;:  vmsr   fpexc, r0
    vmlinux.llvm.good [0xc0101d20
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47716/">CVE-2024-47716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47716">CVE-2024-47716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232053">SUSE bug 1232053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47717" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47717" ref_url="https://www.suse.com/security/cve/CVE-2024-47717" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RISC-V: KVM: Don't zero-out PMU snapshot area before freeing data

With the latest Linux-6.11-rc3, the below NULL pointer crash is observed
when SBI PMU snapshot is enabled for the guest and the guest is forcefully
powered-off.

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000508
  Oops [#1]
  Modules linked in: kvm
  CPU: 0 UID: 0 PID: 61 Comm: term-poll Not tainted 6.11.0-rc3-00018-g44d7178dd77a #3
  Hardware name: riscv-virtio,qemu (DT)
  epc : __kvm_write_guest_page+0x94/0xa6 [kvm]
   ra : __kvm_write_guest_page+0x54/0xa6 [kvm]
  epc : ffffffff01590e98 ra : ffffffff01590e58 sp : ffff8f80001f39b0
   gp : ffffffff81512a60 tp : ffffaf80024872c0 t0 : ffffaf800247e000
   t1 : 00000000000007e0 t2 : 0000000000000000 s0 : ffff8f80001f39f0
   s1 : 00007fff89ac4000 a0 : ffffffff015dd7e8 a1 : 0000000000000086
   a2 : 0000000000000000 a3 : ffffaf8000000000 a4 : ffffaf80024882c0
   a5 : 0000000000000000 a6 : ffffaf800328d780 a7 : 00000000000001cc
   s2 : ffffaf800197bd00 s3 : 00000000000828c4 s4 : ffffaf800248c000
   s5 : ffffaf800247d000 s6 : 0000000000001000 s7 : 0000000000001000
   s8 : 0000000000000000 s9 : 00007fff861fd500 s10: 0000000000000001
   s11: 0000000000800000 t3 : 00000000000004d3 t4 : 00000000000004d3
   t5 : ffffffff814126e0 t6 : ffffffff81412700
  status: 0000000200000120 badaddr: 0000000000000508 cause: 000000000000000d
  [&lt;ffffffff01590e98&gt;] __kvm_write_guest_page+0x94/0xa6 [kvm]
  [&lt;ffffffff015943a6&gt;] kvm_vcpu_write_guest+0x56/0x90 [kvm]
  [&lt;ffffffff015a175c&gt;] kvm_pmu_clear_snapshot_area+0x42/0x7e [kvm]
  [&lt;ffffffff015a1972&gt;] kvm_riscv_vcpu_pmu_deinit.part.0+0xe0/0x14e [kvm]
  [&lt;ffffffff015a2ad0&gt;] kvm_riscv_vcpu_pmu_deinit+0x1a/0x24 [kvm]
  [&lt;ffffffff0159b344&gt;] kvm_arch_vcpu_destroy+0x28/0x4c [kvm]
  [&lt;ffffffff0158e420&gt;] kvm_destroy_vcpus+0x5a/0xda [kvm]
  [&lt;ffffffff0159930c&gt;] kvm_arch_destroy_vm+0x14/0x28 [kvm]
  [&lt;ffffffff01593260&gt;] kvm_destroy_vm+0x168/0x2a0 [kvm]
  [&lt;ffffffff015933d4&gt;] kvm_put_kvm+0x3c/0x58 [kvm]
  [&lt;ffffffff01593412&gt;] kvm_vm_release+0x22/0x2e [kvm]

Clearly, the kvm_vcpu_write_guest() function is crashing because it is
being called from kvm_pmu_clear_snapshot_area() upon guest tear down.

To address the above issue, simplify the kvm_pmu_clear_snapshot_area() to
not zero-out PMU snapshot area from kvm_pmu_clear_snapshot_area() because
the guest is anyway being tore down.

The kvm_pmu_clear_snapshot_area() is also called when guest changes
PMU snapshot area of a VCPU but even in this case the previous PMU
snaphsot area must not be zeroed-out because the guest might have
reclaimed the pervious PMU snapshot area for some other purpose.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47717/">CVE-2024-47717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47717">CVE-2024-47717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232041">SUSE bug 1232041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: always wait for both firmware loading attempts

In 'rtw_wait_firmware_completion()', always wait for both (regular and
wowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'
has failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue
'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually
the wowlan one) is still in progress, causing UAF detected by KASAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232015">SUSE bug 1232015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47719" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Protect against overflow of ALIGN() during iova allocation

Userspace can supply an iova and uptr such that the target iova alignment
becomes really big and ALIGN() overflows which corrupts the selected area
range during allocation. CONFIG_IOMMUFD_TEST can detect this:

   WARNING: CPU: 1 PID: 5092 at drivers/iommu/iommufd/io_pagetable.c:268 iopt_alloc_area_pages drivers/iommu/iommufd/io_pagetable.c:268 [inline]
   WARNING: CPU: 1 PID: 5092 at drivers/iommu/iommufd/io_pagetable.c:268 iopt_map_pages+0xf95/0x1050 drivers/iommu/iommufd/io_pagetable.c:352
   Modules linked in:
   CPU: 1 PID: 5092 Comm: syz-executor294 Not tainted 6.10.0-rc5-syzkaller-00294-g3ffea9a7a6f7 #0
   Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
   RIP: 0010:iopt_alloc_area_pages drivers/iommu/iommufd/io_pagetable.c:268 [inline]
   RIP: 0010:iopt_map_pages+0xf95/0x1050 drivers/iommu/iommufd/io_pagetable.c:352
   Code: fc e9 a4 f3 ff ff e8 1a 8b 4c fc 41 be e4 ff ff ff e9 8a f3 ff ff e8 0a 8b 4c fc 90 0f 0b 90 e9 37 f5 ff ff e8 fc 8a 4c fc 90 &lt;0f&gt; 0b 90 e9 68 f3 ff ff 48 c7 c1 ec 82 ad 8f 80 e1 07 80 c1 03 38
   RSP: 0018:ffffc90003ebf9e0 EFLAGS: 00010293
   RAX: ffffffff85499fa4 RBX: 00000000ffffffef RCX: ffff888079b49e00
   RDX: 0000000000000000 RSI: 00000000ffffffef RDI: 0000000000000000
   RBP: ffffc90003ebfc50 R08: ffffffff85499b30 R09: ffffffff85499942
   R10: 0000000000000002 R11: ffff888079b49e00 R12: ffff8880228e0010
   R13: 0000000000000000 R14: 1ffff920007d7f68 R15: ffffc90003ebfd00
   FS:  000055557d760380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00000000005fdeb8 CR3: 000000007404a000 CR4: 00000000003506f0
   DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
   DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
   Call Trace:
    &lt;TASK&gt;
    iommufd_ioas_copy+0x610/0x7b0 drivers/iommu/iommufd/ioas.c:274
    iommufd_fops_ioctl+0x4d9/0x5a0 drivers/iommu/iommufd/main.c:421
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:907 [inline]
    __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
    do_syscall_x64 arch/x86/entry/common.c:52 [inline]
    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

Cap the automatic alignment to the huge page size, which is probably a
better idea overall. Huge automatic alignments can fragment and chew up
the available IOVA space without any reason.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231865">SUSE bug 1231865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231866">SUSE bug 1231866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the  dcn30_set_output_transfer_func function. Previously,
set_output_gamma was being checked for nullity at line 386, but then it
was being dereferenced without any nullity check at line 401. This
could potentially lead to a null pointer dereference error if
set_output_gamma is indeed null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a nullity check for
set_output_gamma before the call to set_output_gamma at line 401. If
set_output_gamma is null, we log an error message and do not call the
function.

This fix prevents a potential null pointer dereference error.

drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:401 dcn30_set_output_transfer_func()
error: we previously assumed 'mpc-&gt;funcs-&gt;set_output_gamma' could be null (see line 386)

drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c
    373 bool dcn30_set_output_transfer_func(struct dc *dc,
    374                                 struct pipe_ctx *pipe_ctx,
    375                                 const struct dc_stream_state *stream)
    376 {
    377         int mpcc_id = pipe_ctx-&gt;plane_res.hubp-&gt;inst;
    378         struct mpc *mpc = pipe_ctx-&gt;stream_res.opp-&gt;ctx-&gt;dc-&gt;res_pool-&gt;mpc;
    379         const struct pwl_params *params = NULL;
    380         bool ret = false;
    381
    382         /* program OGAM or 3DLUT only for the top pipe*/
    383         if (pipe_ctx-&gt;top_pipe == NULL) {
    384                 /*program rmu shaper and 3dlut in MPC*/
    385                 ret = dcn30_set_mpc_shaper_3dlut(pipe_ctx, stream);
    386                 if (ret == false &amp;&amp; mpc-&gt;funcs-&gt;set_output_gamma) {
                                            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ If this is NULL

    387                         if (stream-&gt;out_transfer_func.type == TF_TYPE_HWPWL)
    388                                 params = &amp;stream-&gt;out_transfer_func.pwl;
    389                         else if (pipe_ctx-&gt;stream-&gt;out_transfer_func.type ==
    390                                         TF_TYPE_DISTRIBUTED_POINTS &amp;&amp;
    391                                         cm3_helper_translate_curve_to_hw_format(
    392                                         &amp;stream-&gt;out_transfer_func,
    393                                         &amp;mpc-&gt;blender_params, false))
    394                                 params = &amp;mpc-&gt;blender_params;
    395                          /* there are no ROM LUTs in OUTGAM */
    396                         if (stream-&gt;out_transfer_func.type == TF_TYPE_PREDEFINED)
    397                                 BREAK_TO_DEBUGGER();
    398                 }
    399         }
    400
--&gt; 401         mpc-&gt;funcs-&gt;set_output_gamma(mpc, mpcc_id, params);
                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Then it will crash

    402         return ret;
    403 }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232043">SUSE bug 1232043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47721" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47721" ref_url="https://www.suse.com/security/cve/CVE-2024-47721" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading

The handler of firmware C2H event RTW89_MAC_C2H_FUNC_READ_WOW_CAM isn't
implemented, but driver expects number of handlers is
NUM_OF_RTW89_MAC_C2H_FUNC_WOW causing out-of-bounds access. Fix it by
removing ID.

Addresses-Coverity-ID: 1598775 ("Out-of-bounds read")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47721/">CVE-2024-47721 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47721">CVE-2024-47721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232052">SUSE bug 1232052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix out-of-bounds in dbNextAG() and diAlloc()

In dbNextAG() , there is no check for the case where bmp-&gt;db_numag is
greater or same than MAXAG due to a polluted image, which causes an
out-of-bounds. Therefore, a bounds check should be added in dbMount().

And in dbNextAG(), a check for the case where agpref is greater than
bmp-&gt;db_numag should be added, so an out-of-bounds exception should be
prevented.

Additionally, a check for the case where agno is greater or same than
MAXAG should be added in diAlloc() to prevent out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232050">SUSE bug 1232050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232051">SUSE bug 1232051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47724" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47724" ref_url="https://www.suse.com/security/cve/CVE-2024-47724" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: use work queue to process beacon tx event

Commit 3a415daa3e8b ("wifi: ath11k: add P2P IE in beacon template")
from Feb 28, 2024 (linux-next), leads to the following Smatch static
checker warning:

drivers/net/wireless/ath/ath11k/wmi.c:1742 ath11k_wmi_p2p_go_bcn_ie()
warn: sleeping in atomic context

The reason is that ath11k_bcn_tx_status_event() will directly call might
sleep function ath11k_wmi_cmd_send() during RCU read-side critical
sections. The call trace is like:

ath11k_bcn_tx_status_event()
-&gt; rcu_read_lock()
-&gt; ath11k_mac_bcn_tx_event()
	-&gt; ath11k_mac_setup_bcn_tmpl()
	……
		-&gt; ath11k_wmi_bcn_tmpl()
			-&gt; ath11k_wmi_cmd_send()
-&gt; rcu_read_unlock()

Commit 886433a98425 ("ath11k: add support for BSS color change") added the
ath11k_mac_bcn_tx_event(), commit 01e782c89108 ("ath11k: fix warning
of RCU usage for ath11k_mac_get_arvif_by_vdev_id()") added the RCU lock
to avoid warning but also introduced this BUG.

Use work queue to avoid directly calling ath11k_mac_bcn_tx_event()
during RCU critical sections. No need to worry about the deletion of vif
because cancel_work_sync() will drop the work if it doesn't start or
block vif deletion until the running work is done.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47724/">CVE-2024-47724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47724">CVE-2024-47724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232073">SUSE bug 1232073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47725" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47725" ref_url="https://www.suse.com/security/cve/CVE-2024-47725" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-10-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47725/">CVE-2024-47725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47725">CVE-2024-47725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232074">SUSE bug 1232074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47726</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47726" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47726" ref_url="https://www.suse.com/security/cve/CVE-2024-47726" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to wait dio completion

It should wait all existing dio write IOs before block removal,
otherwise, previous direct write IO may overwrite data in the
block which may be reused by other inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47726/">CVE-2024-47726 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47726">CVE-2024-47726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232113">SUSE bug 1232113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Fix "in-kernel MMIO" check

TDX only supports kernel-initiated MMIO operations. The handle_mmio()
function checks if the #VE exception occurred in the kernel and rejects
the operation if it did not.

However, userspace can deceive the kernel into performing MMIO on its
behalf. For example, if userspace can point a syscall to an MMIO address,
syscall does get_user() or put_user() on it, triggering MMIO #VE. The
kernel will treat the #VE as in-kernel MMIO.

Ensure that the target MMIO address is within the kernel before decoding
instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232116">SUSE bug 1232116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47728" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error

For all non-tracing helpers which formerly had ARG_PTR_TO_{LONG,INT} as input
arguments, zero the value for the case of an error as otherwise it could leak
memory. For tracing, it is not needed given CAP_PERFMON can already read all
kernel memory anyway hence bpf_get_func_arg() and bpf_get_func_ret() is skipped
in here.

Also, the MTU helpers mtu_len pointer value is being written but also read.
Technically, the MEM_UNINIT should not be there in order to always force init.
Removing MEM_UNINIT needs more verifier rework though: MEM_UNINIT right now
implies two things actually: i) write into memory, ii) memory does not have
to be initialized. If we lift MEM_UNINIT, it then becomes: i) read into memory,
ii) memory must be initialized. This means that for bpf_*_check_mtu() we're
readding the issue we're trying to fix, that is, it would then be able to
write back into things like .rodata BPF maps. Follow-up work will rework the
MEM_UNINIT semantics such that the intent can be better expressed. For now
just clear the *mtu_len on error path which can be lifted later again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232076">SUSE bug 1232076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47729" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47729" ref_url="https://www.suse.com/security/cve/CVE-2024-47729" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Use reserved copy engine for user binds on faulting devices

User binds map to engines with can fault, faults depend on user binds
completion, thus we can deadlock. Avoid this by using reserved copy
engine for user binds on faulting devices.

While we are here, normalize bind queue creation with a helper.

v2:
 - Pass in extensions to bind queue creation (CI)
v3:
 - s/resevered/reserved (Lucas)
 - Fix NULL hwe check (Jonathan)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47729/">CVE-2024-47729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47729">CVE-2024-47729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232077">SUSE bug 1232077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47730" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/qm - inject error before stopping queue

The master ooo cannot be completely closed when the
accelerator core reports memory error. Therefore, the driver
needs to inject the qm error to close the master ooo. Currently,
the qm error is injected after stopping queue, memory may be
released immediately after stopping queue, causing the device to
access the released memory. Therefore, error is injected to close master
ooo before stopping queue to ensure that the device does not access
the released memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232075">SUSE bug 1232075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47731</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47731" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47731" ref_url="https://www.suse.com/security/cve/CVE-2024-47731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: Fix ali_drw_pmu driver interrupt status clearing

The alibaba_uncore_pmu driver forgot to clear all interrupt status
in the interrupt processing function. After the PMU counter overflow
interrupt occurred, an interrupt storm occurred, causing the system
to hang.

Therefore, clear the correct interrupt status in the interrupt handling
function to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47731/">CVE-2024-47731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47731">CVE-2024-47731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232117">SUSE bug 1232117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47732</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47732" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47732" ref_url="https://www.suse.com/security/cve/CVE-2024-47732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: iaa - Fix potential use after free bug

The free_device_compression_mode(iaa_device, device_mode) function frees
"device_mode" but it iss passed to iaa_compression_modes[i]-&gt;free() a few
lines later resulting in a use after free.

The good news is that, so far as I can tell, nothing implements the
-&gt;free() function and the use after free happens in dead code.  But, with
this fix, when something does implement it, we'll be ready.  :)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47732/">CVE-2024-47732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47732">CVE-2024-47732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232109">SUSE bug 1232109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47733</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47733" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47733" ref_url="https://www.suse.com/security/cve/CVE-2024-47733" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Delete subtree of 'fs/netfs' when netfs module exits

In netfs_init() or fscache_proc_init(), we create dentry under 'fs/netfs',
but in netfs_exit(), we only delete the proc entry of 'fs/netfs' without
deleting its subtree. This triggers the following WARNING:

==================================================================
remove_proc_entry: removing non-empty directory 'fs/netfs', leaking at least 'requests'
WARNING: CPU: 4 PID: 566 at fs/proc/generic.c:717 remove_proc_entry+0x160/0x1c0
Modules linked in: netfs(-)
CPU: 4 UID: 0 PID: 566 Comm: rmmod Not tainted 6.11.0-rc3 #860
RIP: 0010:remove_proc_entry+0x160/0x1c0
Call Trace:
 &lt;TASK&gt;
 netfs_exit+0x12/0x620 [netfs]
 __do_sys_delete_module.isra.0+0x14c/0x2e0
 do_syscall_64+0x4b/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
==================================================================

Therefore use remove_proc_subtree() instead of remove_proc_entry() to
fix the above problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47733/">CVE-2024-47733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47733">CVE-2024-47733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232110">SUSE bug 1232110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47734</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47734" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47734" ref_url="https://www.suse.com/security/cve/CVE-2024-47734" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()

syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce
this[1], one bond device (bond1) has xdpdrv, which increases
bpf_master_redirect_enabled_key. Another bond device (bond0) which is
unsupported by XDP but its slave (veth3) has xdpgeneric that returns
XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().
To reduce unnecessary warnings and improve log management, we need to
delete the WARN_ON_ONCE() and add ratelimit to the netdev_err().

[1] Steps to reproduce:
    # Needs tx_xdp with return XDP_TX;
    ip l add veth0 type veth peer veth1
    ip l add veth3 type veth peer veth4
    ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP
    ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default
    ip l set veth0 master bond1
    ip l set bond1 up
    # Increases bpf_master_redirect_enabled_key
    ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx
    ip l set veth3 master bond0
    ip l set bond0 up
    ip l set veth4 up
    # Triggers WARN_ON_ONCE() from the xdp_master_redirect()
    ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47734/">CVE-2024-47734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47734">CVE-2024-47734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232055">SUSE bug 1232055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47736</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47736" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47736" ref_url="https://www.suse.com/security/cve/CVE-2024-47736" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: handle overlapped pclusters out of crafted images properly

syzbot reported a task hang issue due to a deadlock case where it is
waiting for the folio lock of a cached folio that will be used for
cache I/Os.

After looking into the crafted fuzzed image, I found it's formed with
several overlapped big pclusters as below:

 Ext:   logical offset   |  length :     physical offset    |  length
   0:        0..   16384 |   16384 :     151552..    167936 |   16384
   1:    16384..   32768 |   16384 :     155648..    172032 |   16384
   2:    32768..   49152 |   16384 :  537223168.. 537239552 |   16384
...

Here, extent 0/1 are physically overlapped although it's entirely
_impossible_ for normal filesystem images generated by mkfs.

First, managed folios containing compressed data will be marked as
up-to-date and then unlocked immediately (unlike in-place folios) when
compressed I/Os are complete.  If physical blocks are not submitted in
the incremental order, there should be separate BIOs to avoid dependency
issues.  However, the current code mis-arranges z_erofs_fill_bio_vec()
and BIO submission which causes unexpected BIO waits.

Second, managed folios will be connected to their own pclusters for
efficient inter-queries.  However, this is somewhat hard to implement
easily if overlapped big pclusters exist.  Again, these only appear in
fuzzed images so let's simply fall back to temporary short-lived pages
for correctness.

Additionally, it justifies that referenced managed folios cannot be
truncated for now and reverts part of commit 2080ca1ed3e4 ("erofs: tidy
up `struct z_erofs_bvec`") for simplicity although it shouldn't be any
difference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47736/">CVE-2024-47736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47736">CVE-2024-47736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232112">SUSE bug 1232112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47738</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't use rate mask for offchannel TX either

Like the commit ab9177d83c04 ("wifi: mac80211: don't use rate mask for
scanning"), ignore incorrect settings to avoid no supported rate warning
reported by syzbot.

The syzbot did bisect and found cause is commit 9df66d5b9f45 ("cfg80211:
fix default HE tx bitrate mask in 2G band"), which however corrects
bitmask of HE MCS and recognizes correctly settings of empty legacy rate
plus HE MCS rate instead of returning -EINVAL.

As suggestions [1], follow the change of SCAN TX to consider this case of
offchannel TX as well.

[1] https://lore.kernel.org/linux-wireless/6ab2dc9c3afe753ca6fdcdd1421e7a1f47e87b84.camel@sipsolutions.net/T/#m2ac2a6d2be06a37c9c47a3d8a44b4f647ed4f024
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232114">SUSE bug 1232114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: use integer wrap around to prevent deadlock on seq_nr overflow

When submitting more than 2^32 padata objects to padata_do_serial, the
current sorting implementation incorrectly sorts padata objects with
overflowed seq_nr, causing them to be placed before existing objects in
the reorder list. This leads to a deadlock in the serialization process
as padata_find_next cannot match padata-&gt;seq_nr and pd-&gt;processed
because the padata instance with overflowed seq_nr will be selected
next.

To fix this, we use an unsigned integer wrap around to correctly sort
padata objects in scenarios with integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232124">SUSE bug 1232124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47740" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47740" ref_url="https://www.suse.com/security/cve/CVE-2024-47740" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: Require FMODE_WRITE for atomic write ioctls

The F2FS ioctls for starting and committing atomic writes check for
inode_owner_or_capable(), but this does not give LSMs like SELinux or
Landlock an opportunity to deny the write access - if the caller's FSUID
matches the inode's UID, inode_owner_or_capable() immediately returns true.

There are scenarios where LSMs want to deny a process the ability to write
particular files, even files that the FSUID of the process owns; but this
can currently partially be bypassed using atomic write ioctls in two ways:

 - F2FS_IOC_START_ATOMIC_REPLACE + F2FS_IOC_COMMIT_ATOMIC_WRITE can
   truncate an inode to size 0
 - F2FS_IOC_START_ATOMIC_WRITE + F2FS_IOC_ABORT_ATOMIC_WRITE can revert
   changes another process concurrently made to a file

Fix it by requiring FMODE_WRITE for these operations, just like for
F2FS_IOC_MOVE_RANGE. Since any legitimate caller should only be using these
ioctls when intending to write into the file, that seems unlikely to break
anything.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47740/">CVE-2024-47740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47740">CVE-2024-47740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231867">SUSE bug 1231867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47741" ref_url="https://www.suse.com/security/cve/CVE-2024-47741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix race setting file private on concurrent lseek using same fd

When doing concurrent lseek(2) system calls against the same file
descriptor, using multiple threads belonging to the same process, we have
a short time window where a race happens and can result in a memory leak.

The race happens like this:

1) A program opens a file descriptor for a file and then spawns two
   threads (with the pthreads library for example), lets call them
   task A and task B;

2) Task A calls lseek with SEEK_DATA or SEEK_HOLE and ends up at
   file.c:find_desired_extent() while holding a read lock on the inode;

3) At the start of find_desired_extent(), it extracts the file's
   private_data pointer into a local variable named 'private', which has
   a value of NULL;

4) Task B also calls lseek with SEEK_DATA or SEEK_HOLE, locks the inode
   in shared mode and enters file.c:find_desired_extent(), where it also
   extracts file-&gt;private_data into its local variable 'private', which
   has a NULL value;

5) Because it saw a NULL file private, task A allocates a private
   structure and assigns to the file structure;

6) Task B also saw a NULL file private so it also allocates its own file
   private and then assigns it to the same file structure, since both
   tasks are using the same file descriptor.

   At this point we leak the private structure allocated by task A.

Besides the memory leak, there's also the detail that both tasks end up
using the same cached state record in the private structure (struct
btrfs_file_private::llseek_cached_state), which can result in a
use-after-free problem since one task can free it while the other is
still using it (only one task took a reference count on it). Also, sharing
the cached state is not a good idea since it could result in incorrect
results in the future - right now it should not be a problem because it
end ups being used only in extent-io-tree.c:count_range_bits() where we do
range validation before using the cached state.

Fix this by protecting the private assignment and check of a file while
holding the inode's spinlock and keep track of the task that allocated
the private, so that it's used only by that task in order to prevent
user-after-free issues with the cached state record as well as potentially
using it incorrectly in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47741/">CVE-2024-47741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47741">CVE-2024-47741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231869">SUSE bug 1231869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231870">SUSE bug 1231870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47743" ref_url="https://www.suse.com/security/cve/CVE-2024-47743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: prevent NULL pointer dereference in find_asymmetric_key()

In find_asymmetric_key(), if all NULLs are passed in the id_{0,1,2}
arguments, the kernel will first emit WARN but then have an oops
because id_2 gets dereferenced anyway.

Add the missing id_2 check and move WARN_ON() to the final else branch
to avoid duplicate NULL checks.

Found by Linux Verification Center (linuxtesting.org) with Svace static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47743/">CVE-2024-47743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47743">CVE-2024-47743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232129">SUSE bug 1232129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47744" ref_url="https://www.suse.com/security/cve/CVE-2024-47744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock

Use a dedicated mutex to guard kvm_usage_count to fix a potential deadlock
on x86 due to a chain of locks and SRCU synchronizations.  Translating the
below lockdep splat, CPU1 #6 will wait on CPU0 #1, CPU0 #8 will wait on
CPU2 #3, and CPU2 #7 will wait on CPU1 #4 (if there's a writer, due to the
fairness of r/w semaphores).

    CPU0                     CPU1                     CPU2
1   lock(&amp;kvm-&gt;slots_lock);
2                                                     lock(&amp;vcpu-&gt;mutex);
3                                                     lock(&amp;kvm-&gt;srcu);
4                            lock(cpu_hotplug_lock);
5                            lock(kvm_lock);
6                            lock(&amp;kvm-&gt;slots_lock);
7                                                     lock(cpu_hotplug_lock);
8   sync(&amp;kvm-&gt;srcu);

Note, there are likely more potential deadlocks in KVM x86, e.g. the same
pattern of taking cpu_hotplug_lock outside of kvm_lock likely exists with
__kvmclock_cpufreq_notifier():

  cpuhp_cpufreq_online()
  |
  -&gt; cpufreq_online()
     |
     -&gt; cpufreq_gov_performance_limits()
        |
        -&gt; __cpufreq_driver_target()
           |
           -&gt; __target_index()
              |
              -&gt; cpufreq_freq_transition_begin()
                 |
                 -&gt; cpufreq_notify_transition()
                    |
                    -&gt; ... __kvmclock_cpufreq_notifier()

But, actually triggering such deadlocks is beyond rare due to the
combination of dependencies and timings involved.  E.g. the cpufreq
notifier is only used on older CPUs without a constant TSC, mucking with
the NX hugepage mitigation while VMs are running is very uncommon, and
doing so while also onlining/offlining a CPU (necessary to generate
contention on cpu_hotplug_lock) would be even more unusual.

The most robust solution to the general cpu_hotplug_lock issue is likely
to switch vm_list to be an RCU-protected list, e.g. so that x86's cpufreq
notifier doesn't to take kvm_lock.  For now, settle for fixing the most
blatant deadlock, as switching to an RCU-protected list is a much more
involved change, but add a comment in locking.rst to call out that care
needs to be taken when walking holding kvm_lock and walking vm_list.

  ======================================================
  WARNING: possible circular locking dependency detected
  6.10.0-smp--c257535a0c9d-pip #330 Tainted: G S         O
  ------------------------------------------------------
  tee/35048 is trying to acquire lock:
  ff6a80eced71e0a8 (&amp;kvm-&gt;slots_lock){+.+.}-{3:3}, at: set_nx_huge_pages+0x179/0x1e0 [kvm]

  but task is already holding lock:
  ffffffffc07abb08 (kvm_lock){+.+.}-{3:3}, at: set_nx_huge_pages+0x14a/0x1e0 [kvm]

  which lock already depends on the new lock.

   the existing dependency chain (in reverse order) is:

  -&gt; #3 (kvm_lock){+.+.}-{3:3}:
         __mutex_lock+0x6a/0xb40
         mutex_lock_nested+0x1f/0x30
         kvm_dev_ioctl+0x4fb/0xe50 [kvm]
         __se_sys_ioctl+0x7b/0xd0
         __x64_sys_ioctl+0x21/0x30
         x64_sys_call+0x15d0/0x2e60
         do_syscall_64+0x83/0x160
         entry_SYSCALL_64_after_hwframe+0x76/0x7e

  -&gt; #2 (cpu_hotplug_lock){++++}-{0:0}:
         cpus_read_lock+0x2e/0xb0
         static_key_slow_inc+0x16/0x30
         kvm_lapic_set_base+0x6a/0x1c0 [kvm]
         kvm_set_apic_base+0x8f/0xe0 [kvm]
         kvm_set_msr_common+0x9ae/0xf80 [kvm]
         vmx_set_msr+0xa54/0xbe0 [kvm_intel]
         __kvm_set_msr+0xb6/0x1a0 [kvm]
         kvm_arch_vcpu_ioctl+0xeca/0x10c0 [kvm]
         kvm_vcpu_ioctl+0x485/0x5b0 [kvm]
         __se_sys_ioctl+0x7b/0xd0
         __x64_sys_ioctl+0x21/0x30
         x64_sys_call+0x15d0/0x2e60
         do_syscall_64+0x83/0x160
         entry_SYSCALL_64_after_hwframe+0x76/0x7e

  -&gt; #1 (&amp;kvm-&gt;srcu){.+.+}-{0:0}:
         __synchronize_srcu+0x44/0x1a0
      
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47744/">CVE-2024-47744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47744">CVE-2024-47744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232132">SUSE bug 1232132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47746" ref_url="https://www.suse.com/security/cve/CVE-2024-47746" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set

This may be a typo. The comment has said shared locks are
not allowed when this bit is set. If using shared lock, the
wait in `fuse_file_cached_io_open` may be forever.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47746/">CVE-2024-47746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47746">CVE-2024-47746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232137">SUSE bug 1232137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition

In the ether3_probe function, a timer is initialized with a callback
function ether3_ledoff, bound to &amp;prev(dev)-&gt;timer. Once the timer is
started, there is a risk of a race condition if the module or device
is removed, triggering the ether3_remove function to perform cleanup.
The sequence of operations that may lead to a UAF bug is as follows:

CPU0                                    CPU1

                      |  ether3_ledoff
ether3_remove         |
  free_netdev(dev);   |
  put_devic           |
  kfree(dev);         |
 |  ether3_outw(priv(dev)-&gt;regs.config2 |= CFG2_CTRLO, REG_CONFIG2);
                      | // use dev

Fix it by ensuring that the timer is canceled before proceeding with
the cleanup in ether3_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232146">SUSE bug 1232146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost_vdpa: assign irq bypass producer token correctly

We used to call irq_bypass_unregister_producer() in
vhost_vdpa_setup_vq_irq() which is problematic as we don't know if the
token pointer is still valid or not.

Actually, we use the eventfd_ctx as the token so the life cycle of the
token should be bound to the VHOST_SET_VRING_CALL instead of
vhost_vdpa_setup_vq_irq() which could be called by set_status().

Fixing this by setting up irq bypass producer's token when handling
VHOST_SET_VRING_CALL and un-registering the producer before calling
vhost_vring_ioctl() to prevent a possible use after free as eventfd
could have been released in vhost_vring_ioctl(). And such registering
and unregistering will only be done if DRIVER_OK is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232177">SUSE bug 1232177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47750" ref_url="https://www.suse.com/security/cve/CVE-2024-47750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08

Currently rsv_qp is freed before ib_unregister_device() is called
on HIP08. During the time interval, users can still dereg MR and
rsv_qp will be used in this process, leading to a UAF. Move the
release of rsv_qp after calling ib_unregister_device() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47750/">CVE-2024-47750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47750">CVE-2024-47750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232182">SUSE bug 1232182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232829">SUSE bug 1232829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47751" ref_url="https://www.suse.com/security/cve/CVE-2024-47751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()

Within kirin_pcie_parse_port(), the pcie-&gt;num_slots is compared to
pcie-&gt;gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead
to an overflow.

Thus, fix condition to pcie-&gt;num_slots + 1 &gt;= MAX_PCI_SLOTS and move
pcie-&gt;num_slots increment below the if-statement to avoid out-of-bounds
array access.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[kwilczynski: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47751/">CVE-2024-47751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47751">CVE-2024-47751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232127">SUSE bug 1232127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47752" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47752" ref_url="https://www.suse.com/security/cve/CVE-2024-47752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Fix H264 stateless decoder smatch warning

Fix a smatch static checker warning on vdec_h264_req_if.c.
Which leads to a kernel crash when fb is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47752/">CVE-2024-47752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47752">CVE-2024-47752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232130">SUSE bug 1232130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47753" ref_url="https://www.suse.com/security/cve/CVE-2024-47753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning

Fix a smatch static checker warning on vdec_vp8_req_if.c.
Which leads to a kernel crash when fb is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47753/">CVE-2024-47753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47753">CVE-2024-47753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231868">SUSE bug 1231868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47754" ref_url="https://www.suse.com/security/cve/CVE-2024-47754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning

Fix a smatch static checker warning on vdec_h264_req_multi_if.c.
Which leads to a kernel crash when fb is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47754/">CVE-2024-47754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47754">CVE-2024-47754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232131">SUSE bug 1232131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Fix if-statement expression in ks_pcie_quirk()

This code accidentally uses &amp;&amp; where || was intended.  It potentially
results in a NULL dereference.

Thus, fix the if-statement expression to use the correct condition.

[kwilczynski: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232185">SUSE bug 1232185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47794</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47794" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47794" ref_url="https://www.suse.com/security/cve/CVE-2024-47794" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Prevent tailcall infinite loop caused by freplace

There is a potential infinite loop issue that can occur when using a
combination of tail calls and freplace.

In an upcoming selftest, the attach target for entry_freplace of
tailcall_freplace.c is subprog_tc of tc_bpf2bpf.c, while the tail call in
entry_freplace leads to entry_tc. This results in an infinite loop:

entry_tc -&gt; subprog_tc -&gt; entry_freplace --tailcall-&gt; entry_tc.

The problem arises because the tail_call_cnt in entry_freplace resets to
zero each time entry_freplace is executed, causing the tail call mechanism
to never terminate, eventually leading to a kernel panic.

To fix this issue, the solution is twofold:

1. Prevent updating a program extended by an freplace program to a
   prog_array map.
2. Prevent extending a program that is already part of a prog_array map
   with an freplace program.

This ensures that:

* If a program or its subprogram has been extended by an freplace program,
  it can no longer be updated to a prog_array map.
* If a program has been added to a prog_array map, neither it nor its
  subprograms can be extended by an freplace program.

Moreover, an extension program should not be tailcalled. As such, return
-EINVAL if the program has a type of BPF_PROG_TYPE_EXT when adding it to a
prog_array map.

Additionally, fix a minor code style issue by replacing eight spaces with a
tab for proper formatting.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47794/">CVE-2024-47794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47794">CVE-2024-47794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235712">SUSE bug 1235712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47809" ref_url="https://www.suse.com/security/cve/CVE-2024-47809" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dlm: fix possible lkb_resource null dereference

This patch fixes a possible null pointer dereference when this function is
called from request_lock() as lkb-&gt;lkb_resource is not assigned yet,
only after validate_lock_args() by calling attach_lkb(). Another issue
is that a resource name could be a non printable bytearray and we cannot
assume to be ASCII coded.

The log functionality is probably never being hit when DLM is used in
normal way and no debug logging is enabled. The null pointer dereference
can only occur on a new created lkb that does not have the resource
assigned yet, it probably never hits the null pointer dereference but we
should be sure that other changes might not change this behaviour and we
actually can hit the mentioned null pointer dereference.

In this patch we just drop the printout of the resource name, the lkb id
is enough to make a possible connection to a resource name if this
exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47809/">CVE-2024-47809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47809">CVE-2024-47809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235714">SUSE bug 1235714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48873" ref_url="https://www.suse.com/security/cve/CVE-2024-48873" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: check return value of ieee80211_probereq_get() for RNR

The return value of ieee80211_probereq_get() might be NULL, so check it
before using to avoid NULL pointer access.

Addresses-Coverity-ID: 1529805 ("Dereference null return value")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48873/">CVE-2024-48873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235716">SUSE bug 1235716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48875" ref_url="https://www.suse.com/security/cve/CVE-2024-48875" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't take dev_replace rwsem on task already holding it

Running fstests btrfs/011 with MKFS_OPTIONS="-O rst" to force the usage of
the RAID stripe-tree, we get the following splat from lockdep:

 BTRFS info (device sdd): dev_replace from /dev/sdd (devid 1) to /dev/sdb started

 ============================================
 WARNING: possible recursive locking detected
 6.11.0-rc3-btrfs-for-next #599 Not tainted
 --------------------------------------------
 btrfs/2326 is trying to acquire lock:
 ffff88810f215c98 (&amp;fs_info-&gt;dev_replace.rwsem){++++}-{3:3}, at: btrfs_map_block+0x39f/0x2250

 but task is already holding lock:
 ffff88810f215c98 (&amp;fs_info-&gt;dev_replace.rwsem){++++}-{3:3}, at: btrfs_map_block+0x39f/0x2250

 other info that might help us debug this:
  Possible unsafe locking scenario:

        CPU0
        ----
   lock(&amp;fs_info-&gt;dev_replace.rwsem);
   lock(&amp;fs_info-&gt;dev_replace.rwsem);

  *** DEADLOCK ***

  May be due to missing lock nesting notation

 1 lock held by btrfs/2326:
  #0: ffff88810f215c98 (&amp;fs_info-&gt;dev_replace.rwsem){++++}-{3:3}, at: btrfs_map_block+0x39f/0x2250

 stack backtrace:
 CPU: 1 UID: 0 PID: 2326 Comm: btrfs Not tainted 6.11.0-rc3-btrfs-for-next #599
 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x5b/0x80
  __lock_acquire+0x2798/0x69d0
  ? __pfx___lock_acquire+0x10/0x10
  ? __pfx___lock_acquire+0x10/0x10
  lock_acquire+0x19d/0x4a0
  ? btrfs_map_block+0x39f/0x2250
  ? __pfx_lock_acquire+0x10/0x10
  ? find_held_lock+0x2d/0x110
  ? lock_is_held_type+0x8f/0x100
  down_read+0x8e/0x440
  ? btrfs_map_block+0x39f/0x2250
  ? __pfx_down_read+0x10/0x10
  ? do_raw_read_unlock+0x44/0x70
  ? _raw_read_unlock+0x23/0x40
  btrfs_map_block+0x39f/0x2250
  ? btrfs_dev_replace_by_ioctl+0xd69/0x1d00
  ? btrfs_bio_counter_inc_blocked+0xd9/0x2e0
  ? __kasan_slab_alloc+0x6e/0x70
  ? __pfx_btrfs_map_block+0x10/0x10
  ? __pfx_btrfs_bio_counter_inc_blocked+0x10/0x10
  ? kmem_cache_alloc_noprof+0x1f2/0x300
  ? mempool_alloc_noprof+0xed/0x2b0
  btrfs_submit_chunk+0x28d/0x17e0
  ? __pfx_btrfs_submit_chunk+0x10/0x10
  ? bvec_alloc+0xd7/0x1b0
  ? bio_add_folio+0x171/0x270
  ? __pfx_bio_add_folio+0x10/0x10
  ? __kasan_check_read+0x20/0x20
  btrfs_submit_bio+0x37/0x80
  read_extent_buffer_pages+0x3df/0x6c0
  btrfs_read_extent_buffer+0x13e/0x5f0
  read_tree_block+0x81/0xe0
  read_block_for_search+0x4bd/0x7a0
  ? __pfx_read_block_for_search+0x10/0x10
  btrfs_search_slot+0x78d/0x2720
  ? __pfx_btrfs_search_slot+0x10/0x10
  ? lock_is_held_type+0x8f/0x100
  ? kasan_save_track+0x14/0x30
  ? __kasan_slab_alloc+0x6e/0x70
  ? kmem_cache_alloc_noprof+0x1f2/0x300
  btrfs_get_raid_extent_offset+0x181/0x820
  ? __pfx_lock_acquire+0x10/0x10
  ? __pfx_btrfs_get_raid_extent_offset+0x10/0x10
  ? down_read+0x194/0x440
  ? __pfx_down_read+0x10/0x10
  ? do_raw_read_unlock+0x44/0x70
  ? _raw_read_unlock+0x23/0x40
  btrfs_map_block+0x5b5/0x2250
  ? __pfx_btrfs_map_block+0x10/0x10
  scrub_submit_initial_read+0x8fe/0x11b0
  ? __pfx_scrub_submit_initial_read+0x10/0x10
  submit_initial_group_read+0x161/0x3a0
  ? lock_release+0x20e/0x710
  ? __pfx_submit_initial_group_read+0x10/0x10
  ? __pfx_lock_release+0x10/0x10
  scrub_simple_mirror.isra.0+0x3eb/0x580
  scrub_stripe+0xe4d/0x1440
  ? lock_release+0x20e/0x710
  ? __pfx_scrub_stripe+0x10/0x10
  ? __pfx_lock_release+0x10/0x10
  ? do_raw_read_unlock+0x44/0x70
  ? _raw_read_unlock+0x23/0x40
  scrub_chunk+0x257/0x4a0
  scrub_enumerate_chunks+0x64c/0xf70
  ? __mutex_unlock_slowpath+0x147/0x5f0
  ? __pfx_scrub_enumerate_chunks+0x10/0x10
  ? bit_wait_timeout+0xb0/0x170
  ? __up_read+0x189/0x700
  ? scrub_workers_get+0x231/0x300
  ? up_write+0x490/0x4f0
  btrfs_scrub_dev+0x52e/0xcd0
  ? create_pending_snapshots+0x230/0x250
  ? __pfx_btrfs_scrub_dev+0x10/0x10
  btrfs_dev_replace_by_ioctl+0xd69/0x1d00
  ? lock_acquire+0x19d/0x4a0
  ? __pfx_btrfs_dev_replace_by_ioctl+0x10/0x10
  ?
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48875/">CVE-2024-48875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48875">CVE-2024-48875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235725">SUSE bug 1235725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48876" ref_url="https://www.suse.com/security/cve/CVE-2024-48876" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

stackdepot: fix stack_depot_save_flags() in NMI context

Per documentation, stack_depot_save_flags() was meant to be usable from
NMI context if STACK_DEPOT_FLAG_CAN_ALLOC is unset.  However, it still
would try to take the pool_lock in an attempt to save a stack trace in the
current pool (if space is available).

This could result in deadlock if an NMI is handled while pool_lock is
already held.  To avoid deadlock, only try to take the lock in NMI context
and give up if unsuccessful.

The documentation is fixed to clearly convey this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48876/">CVE-2024-48876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48876">CVE-2024-48876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235726">SUSE bug 1235726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48881" ref_url="https://www.suse.com/security/cve/CVE-2024-48881" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again

Commit 028ddcac477b ("bcache: Remove unnecessary NULL point check in
node allocations") leads a NULL pointer deference in cache_set_flush().

1721         if (!IS_ERR_OR_NULL(c-&gt;root))
1722                 list_add(&amp;c-&gt;root-&gt;list, &amp;c-&gt;btree_cache);

&gt;From the above code in cache_set_flush(), if previous registration code
fails before allocating c-&gt;root, it is possible c-&gt;root is NULL as what
it is initialized. __bch_btree_node_alloc() never returns NULL but
c-&gt;root is possible to be NULL at above line 1721.

This patch replaces IS_ERR() by IS_ERR_OR_NULL() to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48881/">CVE-2024-48881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48881">CVE-2024-48881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235727">SUSE bug 1235727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49568" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49568" ref_url="https://www.suse.com/security/cve/CVE-2024-49568" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg

When receiving proposal msg in server, the fields v2_ext_offset/
eid_cnt/ism_gid_cnt in proposal msg are from the remote client
and can not be fully trusted. Especially the field v2_ext_offset,
once exceed the max value, there has the chance to access wrong
address, and crash may happen.

This patch checks the fields v2_ext_offset/eid_cnt/ism_gid_cnt
before using them.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49568/">CVE-2024-49568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49568">CVE-2024-49568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235728">SUSE bug 1235728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49569" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49569" ref_url="https://www.suse.com/security/cve/CVE-2024-49569" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: unquiesce admin_q before destroy it

Kernel will hang on destroy admin_q while we create ctrl failed, such
as following calltrace:

PID: 23644    TASK: ff2d52b40f439fc0  CPU: 2    COMMAND: "nvme"
 #0 [ff61d23de260fb78] __schedule at ffffffff8323bc15
 #1 [ff61d23de260fc08] schedule at ffffffff8323c014
 #2 [ff61d23de260fc28] blk_mq_freeze_queue_wait at ffffffff82a3dba1
 #3 [ff61d23de260fc78] blk_freeze_queue at ffffffff82a4113a
 #4 [ff61d23de260fc90] blk_cleanup_queue at ffffffff82a33006
 #5 [ff61d23de260fcb0] nvme_rdma_destroy_admin_queue at ffffffffc12686ce
 #6 [ff61d23de260fcc8] nvme_rdma_setup_ctrl at ffffffffc1268ced
 #7 [ff61d23de260fd28] nvme_rdma_create_ctrl at ffffffffc126919b
 #8 [ff61d23de260fd68] nvmf_dev_write at ffffffffc024f362
 #9 [ff61d23de260fe38] vfs_write at ffffffff827d5f25
    RIP: 00007fda7891d574  RSP: 00007ffe2ef06958  RFLAGS: 00000202
    RAX: ffffffffffffffda  RBX: 000055e8122a4d90  RCX: 00007fda7891d574
    RDX: 000000000000012b  RSI: 000055e8122a4d90  RDI: 0000000000000004
    RBP: 00007ffe2ef079c0   R8: 000000000000012b   R9: 000055e8122a4d90
    R10: 0000000000000000  R11: 0000000000000202  R12: 0000000000000004
    R13: 000055e8122923c0  R14: 000000000000012b  R15: 00007fda78a54500
    ORIG_RAX: 0000000000000001  CS: 0033  SS: 002b

This due to we have quiesced admi_q before cancel requests, but forgot
to unquiesce before destroy it, as a result we fail to drain the
pending requests, and hang on blk_mq_freeze_queue_wait() forever. Here
try to reuse nvme_rdma_teardown_admin_queue() to fix this issue and
simplify the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49569/">CVE-2024-49569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235730">SUSE bug 1235730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49571" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49571" ref_url="https://www.suse.com/security/cve/CVE-2024-49571" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49571/">CVE-2024-49571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49571">CVE-2024-49571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235733">SUSE bug 1235733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49573" ref_url="https://www.suse.com/security/cve/CVE-2024-49573" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49573/">CVE-2024-49573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49573">CVE-2024-49573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235743">SUSE bug 1235743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos

In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL
referencing a non-existing BTF type, function bpf_core_calc_relo_insn
would cause a null pointer deference.

Fix this by adding a proper check upper in call stack, as malformed
relocation records could be passed from user space.

Simplest reproducer is a program:

    r0 = 0
    exit

With a single relocation record:

    .insn_off = 0,          /* patch first instruction */
    .type_id = 100500,      /* this type id does not exist */
    .access_str_off = 6,    /* offset of string "0" */
    .kind = BPF_CORE_TYPE_ID_LOCAL,

See the link for original reproducer or next commit for a test case.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232189">SUSE bug 1232189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49851</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command
transmission. However if the command fails no rollback of this
preparation is done. This can result in transient handles being leaked
if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission
failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232134">SUSE bug 1232134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49852</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()

The kref_put() function will call nport-&gt;release if the refcount drops to
zero.  The nport-&gt;release release function is _efc_nport_free() which frees
"nport".  But then we dereference "nport" on the next line which is a use
after free.  Re-order these lines to avoid the use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232819">SUSE bug 1232819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49853</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49853" ref_url="https://www.suse.com/security/cve/CVE-2024-49853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix double free in OPTEE transport

Channels can be shared between protocols, avoid freeing the same channel
descriptors twice when unloading the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49853/">CVE-2024-49853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49853">CVE-2024-49853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232192">SUSE bug 1232192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232828">SUSE bug 1232828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49854</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49854" ref_url="https://www.suse.com/security/cve/CVE-2024-49854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49854/">CVE-2024-49854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49854">CVE-2024-49854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232193">SUSE bug 1232193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236571">SUSE bug 1236571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49855</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix race between timeout and normal completion

If request timetout is handled by nbd_requeue_cmd(), normal completion
has to be stopped for avoiding to complete this requeued request, other
use-after-free can be triggered.

Fix the race by clearing NBD_CMD_INFLIGHT in nbd_requeue_cmd(), meantime
make sure that cmd-&gt;lock is grabbed for clearing the flag and the
requeue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232195">SUSE bug 1232195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232900">SUSE bug 1232900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49856</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49856" ref_url="https://www.suse.com/security/cve/CVE-2024-49856" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sgx: Fix deadlock in SGX NUMA node search

When the current node doesn't have an EPC section configured by firmware
and all other EPC sections are used up, CPU can get stuck inside the
while loop that looks for an available EPC page from remote nodes
indefinitely, leading to a soft lockup. Note how nid_of_current will
never be equal to nid in that while loop because nid_of_current is not
set in sgx_numa_mask.

Also worth mentioning is that it's perfectly fine for the firmware not
to setup an EPC section on a node. While setting up an EPC section on
each node can enhance performance, it is not a requirement for
functionality.

Rework the loop to start and end on *a* node that has SGX memory. This
avoids the deadlock looking for the current SGX-lacking node to show up
in the loop when it never will.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49856/">CVE-2024-49856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49856">CVE-2024-49856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232202">SUSE bug 1232202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49857" ref_url="https://www.suse.com/security/cve/CVE-2024-49857" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: set the cipher for secured NDP ranging

The cipher pointer is not set, but is derefereced trying to set its
content, which leads to a NULL pointer dereference.
Fix it by pointing to the cipher parameter before dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49857/">CVE-2024-49857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49857">CVE-2024-49857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232203">SUSE bug 1232203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49858</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption

The TPM event log table is a Linux specific construct, where the data
produced by the GetEventLog() boot service is cached in memory, and
passed on to the OS using an EFI configuration table.

The use of EFI_LOADER_DATA here results in the region being left
unreserved in the E820 memory map constructed by the EFI stub, and this
is the memory description that is passed on to the incoming kernel by
kexec, which is therefore unaware that the region should be reserved.

Even though the utility of the TPM2 event log after a kexec is
questionable, any corruption might send the parsing code off into the
weeds and crash the kernel. So let's use EFI_ACPI_RECLAIM_MEMORY
instead, which is always treated as reserved by the E820 conversion
logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232251">SUSE bug 1232251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49859</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49859" ref_url="https://www.suse.com/security/cve/CVE-2024-49859" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to check atomic_file in f2fs ioctl interfaces

Some f2fs ioctl interfaces like f2fs_ioc_set_pin_file(),
f2fs_move_file_range(), and f2fs_defragment_range() missed to
check atomic_write status, which may cause potential race issue,
fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49859/">CVE-2024-49859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49859">CVE-2024-49859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232252">SUSE bug 1232252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49861</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix helper writes to read-only maps

Lonial found an issue that despite user- and BPF-side frozen BPF map
(like in case of .rodata), it was still possible to write into it from
a BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}
as arguments.

In check_func_arg() when the argument is as mentioned, the meta-&gt;raw_mode
is never set. Later, check_helper_mem_access(), under the case of
PTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the
subsequent call to check_map_access_type() and given the BPF map is
read-only it succeeds.

The helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT
when results are written into them as opposed to read out of them. The
latter indicates that it's okay to pass a pointer to uninitialized memory
as the memory is written to anyway.

However, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM
just with additional alignment requirement. So it is better to just get
rid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the
fixed size memory types. For this, add MEM_ALIGNED to additionally ensure
alignment given these helpers write directly into the args via *&lt;ptr&gt; = val.
The .arg*_size has been initialized reflecting the actual sizeof(*&lt;ptr&gt;).

MEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated
argument types, since in !MEM_FIXED_SIZE cases the verifier does not know
the buffer size a priori and therefore cannot blindly write *&lt;ptr&gt; = val.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232254">SUSE bug 1232254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49862</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powercap: intel_rapl: Fix off by one in get_rpi()

The rp-&gt;priv-&gt;rpi array is either rpi_msr or rpi_tpmi which have
NR_RAPL_PRIMITIVES number of elements.  Thus the &gt; needs to be &gt;=
to prevent an off by one access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231871">SUSE bug 1231871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49863</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()

Since commit 3f8ca2e115e5 ("vhost/scsi: Extract common handling code
from control queue handler") a null pointer dereference bug can be
triggered when guest sends an SCSI AN request.

In vhost_scsi_ctl_handle_vq(), `vc.target` is assigned with
`&amp;v_req.tmf.lun[1]` within a switch-case block and is then passed to
vhost_scsi_get_req() which extracts `vc-&gt;req` and `tpg`. However, for
a `VIRTIO_SCSI_T_AN_*` request, tpg is not required, so `vc.target` is
set to NULL in this branch. Later, in vhost_scsi_get_req(),
`vc-&gt;target` is dereferenced without being checked, leading to a null
pointer dereference bug. This bug can be triggered from guest.

When this bug occurs, the vhost_worker process is killed while holding
`vq-&gt;mutex` and the corresponding tpg will remain occupied
indefinitely.

Below is the KASAN report:
Oops: general protection fault, probably for non-canonical address
0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 840 Comm: poc Not tainted 6.10.0+ #1
Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS
1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:vhost_scsi_get_req+0x165/0x3a0
Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 2b 02 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 65 30 4c 89 e2 48 c1 ea 03 &lt;0f&gt; b6
04 02 4c 89 e2 83 e2 07 38 d0 7f 08 84 c0 0f 85 be 01 00 00
RSP: 0018:ffff888017affb50 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88801b000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888017affcb8
RBP: ffff888017affb80 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffff888017affc88 R14: ffff888017affd1c R15: ffff888017993000
FS:  000055556e076500(0000) GS:ffff88806b100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200027c0 CR3: 0000000010ed0004 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x86/0xa0
 ? die_addr+0x4b/0xd0
 ? exc_general_protection+0x163/0x260
 ? asm_exc_general_protection+0x27/0x30
 ? vhost_scsi_get_req+0x165/0x3a0
 vhost_scsi_ctl_handle_vq+0x2a4/0xca0
 ? __pfx_vhost_scsi_ctl_handle_vq+0x10/0x10
 ? __switch_to+0x721/0xeb0
 ? __schedule+0xda5/0x5710
 ? __kasan_check_write+0x14/0x30
 ? _raw_spin_lock+0x82/0xf0
 vhost_scsi_ctl_handle_kick+0x52/0x90
 vhost_run_work_list+0x134/0x1b0
 vhost_task_fn+0x121/0x350
...
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---

Let's add a check in vhost_scsi_get_req.

[whitespace fixes]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232255">SUSE bug 1232255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49864</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix a race between socket set up and I/O thread creation

In rxrpc_open_socket(), it sets up the socket and then sets up the I/O
thread that will handle it.  This is a problem, however, as there's a gap
between the two phases in which a packet may come into rxrpc_encap_rcv()
from the UDP packet but we oops when trying to wake the not-yet created I/O
thread.

As a quick fix, just make rxrpc_encap_rcv() discard the packet if there's
no I/O thread yet.

A better, but more intrusive fix would perhaps be to rearrange things such
that the socket creation is done by the I/O thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232256">SUSE bug 1232256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49865</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49865" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49865" ref_url="https://www.suse.com/security/cve/CVE-2024-49865" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/vm: move xa_alloc to prevent UAF

Evil user can guess the next id of the vm before the ioctl completes and
then call vm destroy ioctl to trigger UAF since create ioctl is still
referencing the same vm. Move the xa_alloc all the way to the end to
prevent this.

v2:
 - Rebase

(cherry picked from commit dcfd3971327f3ee92765154baebbaece833d3ca9)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49865/">CVE-2024-49865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49865">CVE-2024-49865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232257">SUSE bug 1232257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232901">SUSE bug 1232901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49866</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/timerlat: Fix a race during cpuhp processing

There is another found exception that the "timerlat/1" thread was
scheduled on CPU0, and lead to timer corruption finally:

```
ODEBUG: init active (active state 0) object: ffff888237c2e108 object type: hrtimer hint: timerlat_irq+0x0/0x220
WARNING: CPU: 0 PID: 426 at lib/debugobjects.c:518 debug_print_object+0x7d/0xb0
Modules linked in:
CPU: 0 UID: 0 PID: 426 Comm: timerlat/1 Not tainted 6.11.0-rc7+ #45
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
RIP: 0010:debug_print_object+0x7d/0xb0
...
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x7c/0x110
 ? debug_print_object+0x7d/0xb0
 ? report_bug+0xf1/0x1d0
 ? prb_read_valid+0x17/0x20
 ? handle_bug+0x3f/0x70
 ? exc_invalid_op+0x13/0x60
 ? asm_exc_invalid_op+0x16/0x20
 ? debug_print_object+0x7d/0xb0
 ? debug_print_object+0x7d/0xb0
 ? __pfx_timerlat_irq+0x10/0x10
 __debug_object_init+0x110/0x150
 hrtimer_init+0x1d/0x60
 timerlat_main+0xab/0x2d0
 ? __pfx_timerlat_main+0x10/0x10
 kthread+0xb7/0xe0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2d/0x40
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
```

After tracing the scheduling event, it was discovered that the migration
of the "timerlat/1" thread was performed during thread creation. Further
analysis confirmed that it is because the CPU online processing for
osnoise is implemented through workers, which is asynchronous with the
offline processing. When the worker was scheduled to create a thread, the
CPU may has already been removed from the cpu_online_mask during the offline
process, resulting in the inability to select the right CPU:

T1                       | T2
[CPUHP_ONLINE]           | cpu_device_down()
osnoise_hotplug_workfn() |
                         |     cpus_write_lock()
                         |     takedown_cpu(1)
                         |     cpus_write_unlock()
[CPUHP_OFFLINE]          |
    cpus_read_lock()     |
    start_kthread(1)     |
    cpus_read_unlock()   |

To fix this, skip online processing if the CPU is already offline.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232259">SUSE bug 1232259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49867</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49867" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: wait for fixup workers before stopping cleaner kthread during umount

During unmount, at close_ctree(), we have the following steps in this order:

1) Park the cleaner kthread - this doesn't destroy the kthread, it basically
   halts its execution (wake ups against it work but do nothing);

2) We stop the cleaner kthread - this results in freeing the respective
   struct task_struct;

3) We call btrfs_stop_all_workers() which waits for any jobs running in all
   the work queues and then free the work queues.

Syzbot reported a case where a fixup worker resulted in a crash when doing
a delayed iput on its inode while attempting to wake up the cleaner at
btrfs_add_delayed_iput(), because the task_struct of the cleaner kthread
was already freed. This can happen during unmount because we don't wait
for any fixup workers still running before we call kthread_stop() against
the cleaner kthread, which stops and free all its resources.

Fix this by waiting for any fixup workers at close_ctree() before we call
kthread_stop() against the cleaner and run pending delayed iputs.

The stack traces reported by syzbot were the following:

  BUG: KASAN: slab-use-after-free in __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065
  Read of size 8 at addr ffff8880272a8a18 by task kworker/u8:3/52

  CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.12.0-rc1-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  Workqueue: btrfs-fixup btrfs_work_helper
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0x169/0x550 mm/kasan/report.c:488
   kasan_report+0x143/0x180 mm/kasan/report.c:601
   __lock_acquire+0x77/0x2050 kernel/locking/lockdep.c:5065
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825
   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
   _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
   class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]
   try_to_wake_up+0xb0/0x1480 kernel/sched/core.c:4154
   btrfs_writepage_fixup_worker+0xc16/0xdf0 fs/btrfs/inode.c:2842
   btrfs_work_helper+0x390/0xc50 fs/btrfs/async-thread.c:314
   process_one_work kernel/workqueue.c:3229 [inline]
   process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
   worker_thread+0x870/0xd30 kernel/workqueue.c:3391
   kthread+0x2f0/0x390 kernel/kthread.c:389
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   &lt;/TASK&gt;

  Allocated by task 2:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
   unpoison_slab_object mm/kasan/common.c:319 [inline]
   __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
   kasan_slab_alloc include/linux/kasan.h:247 [inline]
   slab_post_alloc_hook mm/slub.c:4086 [inline]
   slab_alloc_node mm/slub.c:4135 [inline]
   kmem_cache_alloc_node_noprof+0x16b/0x320 mm/slub.c:4187
   alloc_task_struct_node kernel/fork.c:180 [inline]
   dup_task_struct+0x57/0x8c0 kernel/fork.c:1107
   copy_process+0x5d1/0x3d50 kernel/fork.c:2206
   kernel_clone+0x223/0x880 kernel/fork.c:2787
   kernel_thread+0x1bc/0x240 kernel/fork.c:2849
   create_kthread kernel/kthread.c:412 [inline]
   kthreadd+0x60d/0x810 kernel/kthread.c:765
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

  Freed by task 61:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
   kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
   poison_slab_object mm/kasan/common.c:247 [inline]
   __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
   kasan_slab_free include/linux/kasan.h:230 [inline]
   slab_free_h
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232271">SUSE bug 1232271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49869</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49869" ref_url="https://www.suse.com/security/cve/CVE-2024-49869" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: send: fix buffer overflow detection when copying path to cache entry

Starting with commit c0247d289e73 ("btrfs: send: annotate struct
name_cache_entry with __counted_by()") we annotated the variable length
array "name" from the name_cache_entry structure with __counted_by() to
improve overflow detection. However that alone was not correct, because
the length of that array does not match the "name_len" field - it matches
that plus 1 to include the NUL string terminator, so that makes a
fortified kernel think there's an overflow and report a splat like this:

  strcpy: detected buffer overflow: 20 byte write of buffer size 19
  WARNING: CPU: 3 PID: 3310 at __fortify_report+0x45/0x50
  CPU: 3 UID: 0 PID: 3310 Comm: btrfs Not tainted 6.11.0-prnet #1
  Hardware name: CompuLab Ltd.  sbc-ihsw/Intense-PC2 (IPC2), BIOS IPC2_3.330.7 X64 03/15/2018
  RIP: 0010:__fortify_report+0x45/0x50
  Code: 48 8b 34 (...)
  RSP: 0018:ffff97ebc0d6f650 EFLAGS: 00010246
  RAX: 7749924ef60fa600 RBX: ffff8bf5446a521a RCX: 0000000000000027
  RDX: 00000000ffffdfff RSI: ffff97ebc0d6f548 RDI: ffff8bf84e7a1cc8
  RBP: ffff8bf548574080 R08: ffffffffa8c40e10 R09: 0000000000005ffd
  R10: 0000000000000004 R11: ffffffffa8c70e10 R12: ffff8bf551eef400
  R13: 0000000000000000 R14: 0000000000000013 R15: 00000000000003a8
  FS:  00007fae144de8c0(0000) GS:ffff8bf84e780000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fae14691690 CR3: 00000001027a2003 CR4: 00000000001706f0
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0x12a/0x1d0
   ? __fortify_report+0x45/0x50
   ? report_bug+0x154/0x1c0
   ? handle_bug+0x42/0x70
   ? exc_invalid_op+0x1a/0x50
   ? asm_exc_invalid_op+0x1a/0x20
   ? __fortify_report+0x45/0x50
   __fortify_panic+0x9/0x10
  __get_cur_name_and_parent+0x3bc/0x3c0
   get_cur_path+0x207/0x3b0
   send_extent_data+0x709/0x10d0
   ? find_parent_nodes+0x22df/0x25d0
   ? mas_nomem+0x13/0x90
   ? mtree_insert_range+0xa5/0x110
   ? btrfs_lru_cache_store+0x5f/0x1e0
   ? iterate_extent_inodes+0x52d/0x5a0
   process_extent+0xa96/0x11a0
   ? __pfx_lookup_backref_cache+0x10/0x10
   ? __pfx_store_backref_cache+0x10/0x10
   ? __pfx_iterate_backrefs+0x10/0x10
   ? __pfx_check_extent_item+0x10/0x10
   changed_cb+0x6fa/0x930
   ? tree_advance+0x362/0x390
   ? memcmp_extent_buffer+0xd7/0x160
   send_subvol+0xf0a/0x1520
   btrfs_ioctl_send+0x106b/0x11d0
   ? __pfx___clone_root_cmp_sort+0x10/0x10
   _btrfs_ioctl_send+0x1ac/0x240
   btrfs_ioctl+0x75b/0x850
   __se_sys_ioctl+0xca/0x150
   do_syscall_64+0x85/0x160
   ? __count_memcg_events+0x69/0x100
   ? handle_mm_fault+0x1327/0x15c0
   ? __se_sys_rt_sigprocmask+0xf1/0x180
   ? syscall_exit_to_user_mode+0x75/0xa0
   ? do_syscall_64+0x91/0x160
   ? do_user_addr_fault+0x21d/0x630
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7fae145eeb4f
  Code: 00 48 89 (...)
  RSP: 002b:00007ffdf1cb09b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fae145eeb4f
  RDX: 00007ffdf1cb0ad0 RSI: 0000000040489426 RDI: 0000000000000004
  RBP: 00000000000078fe R08: 00007fae144006c0 R09: 00007ffdf1cb0927
  R10: 0000000000000008 R11: 0000000000000246 R12: 00007ffdf1cb1ce8
  R13: 0000000000000003 R14: 000055c499fab2e0 R15: 0000000000000004
   &lt;/TASK&gt;

Fix this by not storing the NUL string terminator since we don't actually
need it for name cache entries, this way "name_len" corresponds to the
actual size of the "name" array. This requires marking the "name" array
field with __nonstring and using memcpy() instead of strcpy() as
recommended by the guidelines at:

   https://github.com/KSPP/linux/issues/90
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49869/">CVE-2024-49869 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49869">CVE-2024-49869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232278">SUSE bug 1232278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49870</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix dentry leak in cachefiles_open_file()

A dentry leak may be caused when a lookup cookie and a cull are concurrent:

            P1             |             P2
-----------------------------------------------------------
cachefiles_lookup_cookie
  cachefiles_look_up_object
    lookup_one_positive_unlocked
     // get dentry
                            cachefiles_cull
                              inode-&gt;i_flags |= S_KERNEL_FILE;
    cachefiles_open_file
      cachefiles_mark_inode_in_use
        __cachefiles_mark_inode_in_use
          can_use = false
          if (!(inode-&gt;i_flags &amp; S_KERNEL_FILE))
            can_use = true
	  return false
        return false
        // Returns an error but doesn't put dentry

After that the following WARNING will be triggered when the backend folder
is umounted:

==================================================================
BUG: Dentry 000000008ad87947{i=7a,n=Dx_1_1.img}  still in use (1) [unmount of ext4 sda]
WARNING: CPU: 4 PID: 359261 at fs/dcache.c:1767 umount_check+0x5d/0x70
CPU: 4 PID: 359261 Comm: umount Not tainted 6.6.0-dirty #25
RIP: 0010:umount_check+0x5d/0x70
Call Trace:
 &lt;TASK&gt;
 d_walk+0xda/0x2b0
 do_one_tree+0x20/0x40
 shrink_dcache_for_umount+0x2c/0x90
 generic_shutdown_super+0x20/0x160
 kill_block_super+0x1a/0x40
 ext4_kill_sb+0x22/0x40
 deactivate_locked_super+0x35/0x80
 cleanup_mnt+0x104/0x160
==================================================================

Whether cachefiles_open_file() returns true or false, the reference count
obtained by lookup_positive_unlocked() in cachefiles_look_up_object()
should be released.

Therefore release that reference count in cachefiles_look_up_object() to
fix the above issue and simplify the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232279">SUSE bug 1232279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49871</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: adp5589-keys - fix NULL pointer dereference

We register a devm action to call adp5589_clear_config() and then pass
the i2c client as argument so that we can call i2c_get_clientdata() in
order to get our device object. However, i2c_set_clientdata() is only
being set at the end of the probe function which means that we'll get a
NULL pointer dereference in case the probe function fails early.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232287">SUSE bug 1232287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49872" ref_url="https://www.suse.com/security/cve/CVE-2024-49872" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/gup: fix memfd_pin_folios alloc race panic

If memfd_pin_folios tries to create a hugetlb page, but someone else
already did, then folio gets the value -EEXIST here:

        folio = memfd_alloc_folio(memfd, start_idx);
        if (IS_ERR(folio)) {
                ret = PTR_ERR(folio);
                if (ret != -EEXIST)
                        goto err;

then on the next trip through the "while start_idx" loop we panic here:

        if (folio) {
                folio_put(folio);

To fix, set the folio to NULL on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49872/">CVE-2024-49872 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49872">CVE-2024-49872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232288">SUSE bug 1232288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49873</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49873" ref_url="https://www.suse.com/security/cve/CVE-2024-49873" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/filemap: fix filemap_get_folios_contig THP panic

Patch series "memfd-pin huge page fixes".

Fix multiple bugs that occur when using memfd_pin_folios with hugetlb
pages and THP.  The hugetlb bugs only bite when the page is not yet
faulted in when memfd_pin_folios is called.  The THP bug bites when the
starting offset passed to memfd_pin_folios is not huge page aligned.  See
the commit messages for details.


This patch (of 5):

memfd_pin_folios on memory backed by THP panics if the requested start
offset is not huge page aligned:

BUG: kernel NULL pointer dereference, address: 0000000000000036
RIP: 0010:filemap_get_folios_contig+0xdf/0x290
RSP: 0018:ffffc9002092fbe8 EFLAGS: 00010202
RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000002

The fault occurs here, because xas_load returns a folio with value 2:

    filemap_get_folios_contig()
        for (folio = xas_load(&amp;xas); folio &amp;&amp; xas.xa_index &lt;= end;
                        folio = xas_next(&amp;xas)) {
                ...
                if (!folio_try_get(folio))   &lt;-- BOOM

"2" is an xarray sibling entry.  We get it because memfd_pin_folios does
not round the indices passed to filemap_get_folios_contig to huge page
boundaries for THP, so we load from the middle of a huge page range see a
sibling.  (It does round for hugetlbfs, at the is_file_hugepages test).

To fix, if the folio is a sibling, then return the next index as the
starting point for the next call to filemap_get_folios_contig.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49873/">CVE-2024-49873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49873">CVE-2024-49873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232291">SUSE bug 1232291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49874" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49874" ref_url="https://www.suse.com/security/cve/CVE-2024-49874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition

In the svc_i3c_master_probe function, &amp;master-&gt;hj_work is bound with
svc_i3c_master_hj_work, &amp;master-&gt;ibi_work is bound with
svc_i3c_master_ibi_work. And svc_i3c_master_ibi_work  can start the
hj_work, svc_i3c_master_irq_handler can start the ibi_work.

If we remove the module which will call svc_i3c_master_remove to
make cleanup, it will free master-&gt;base through i3c_master_unregister
while the work mentioned above will be used. The sequence of operations
that may lead to a UAF bug is as follows:

CPU0                                         CPU1

                                    | svc_i3c_master_hj_work
svc_i3c_master_remove               |
i3c_master_unregister(&amp;master-&gt;base)|
device_unregister(&amp;master-&gt;dev)     |
device_release                      |
//free master-&gt;base                 |
                                    | i3c_master_do_daa(&amp;master-&gt;base)
                                    | //use master-&gt;base

Fix it by ensuring that the work is canceled before proceeding with the
cleanup in svc_i3c_master_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49874/">CVE-2024-49874 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49874">CVE-2024-49874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232295">SUSE bug 1232295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49876" ref_url="https://www.suse.com/security/cve/CVE-2024-49876" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: fix UAF around queue destruction

We currently do stuff like queuing the final destruction step on a
random system wq, which will outlive the driver instance. With bad
timing we can teardown the driver with one or more work workqueue still
being alive leading to various UAF splats. Add a fini step to ensure
user queues are properly torn down. At this point GuC should already be
nuked so queue itself should no longer be referenced from hw pov.

v2 (Matt B)
 - Looks much safer to use a waitqueue and then just wait for the
   xa_array to become empty before triggering the drain.

(cherry picked from commit 861108666cc0e999cffeab6aff17b662e68774e3)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49876/">CVE-2024-49876 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49876">CVE-2024-49876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232336">SUSE bug 1232336</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate

When doing cleanup, if flags without OCFS2_BH_READAHEAD, it may trigger
NULL pointer dereference in the following ocfs2_set_buffer_uptodate() if
bh is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232339">SUSE bug 1232339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

resource: fix region_intersects() vs add_memory_driver_managed()

On a system with CXL memory, the resource tree (/proc/iomem) related to
CXL memory may look like something as follows.

490000000-50fffffff : CXL Window 0
  490000000-50fffffff : region0
    490000000-50fffffff : dax0.0
      490000000-50fffffff : System RAM (kmem)

Because drivers/dax/kmem.c calls add_memory_driver_managed() during
onlining CXL memory, which makes "System RAM (kmem)" a descendant of "CXL
Window X".  This confuses region_intersects(), which expects all "System
RAM" resources to be at the top level of iomem_resource.  This can lead to
bugs.

For example, when the following command line is executed to write some
memory in CXL memory range via /dev/mem,

 $ dd if=data of=/dev/mem bs=$((1 &lt;&lt; 10)) seek=$((0x490000000 &gt;&gt; 10)) count=1
 dd: error writing '/dev/mem': Bad address
 1+0 records in
 0+0 records out
 0 bytes copied, 0.0283507 s, 0.0 kB/s

the command fails as expected.  However, the error code is wrong.  It
should be "Operation not permitted" instead of "Bad address".  More
seriously, the /dev/mem permission checking in devmem_is_allowed() passes
incorrectly.  Although the accessing is prevented later because ioremap()
isn't allowed to map system RAM, it is a potential security issue.  During
command executing, the following warning is reported in the kernel log for
calling ioremap() on system RAM.

 ioremap on RAM at 0x0000000490000000 - 0x0000000490000fff
 WARNING: CPU: 2 PID: 416 at arch/x86/mm/ioremap.c:216 __ioremap_caller.constprop.0+0x131/0x35d
 Call Trace:
  memremap+0xcb/0x184
  xlate_dev_mem_ptr+0x25/0x2f
  write_mem+0x94/0xfb
  vfs_write+0x128/0x26d
  ksys_write+0xac/0xfe
  do_syscall_64+0x9a/0xfd
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

The details of command execution process are as follows.  In the above
resource tree, "System RAM" is a descendant of "CXL Window 0" instead of a
top level resource.  So, region_intersects() will report no System RAM
resources in the CXL memory region incorrectly, because it only checks the
top level resources.  Consequently, devmem_is_allowed() will return 1
(allow access via /dev/mem) for CXL memory region incorrectly. 
Fortunately, ioremap() doesn't allow to map System RAM and reject the
access.

So, region_intersects() needs to be fixed to work correctly with the
resource tree with "System RAM" not at top level as above.  To fix it, if
we found a unmatched resource in the top level, we will continue to search
matched resources in its descendant resources.  So, we will not miss any
matched resources in resource tree anymore.

In the new implementation, an example resource tree

|------------- "CXL Window 0" ------------|
|-- "System RAM" --|

will behave similar as the following fake resource tree for
region_intersects(, IORESOURCE_SYSTEM_RAM, ),

|-- "System RAM" --||-- "CXL Window 0a" --|

Where "CXL Window 0a" is part of the original "CXL Window 0" that
isn't covered by "System RAM".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232340">SUSE bug 1232340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: omapdrm: Add missing check for alloc_ordered_workqueue

As it may return NULL pointer and cause NULL pointer dereference. Add check
for the return value of alloc_ordered_workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232349">SUSE bug 1232349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49880" ref_url="https://www.suse.com/security/cve/CVE-2024-49880" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix off by one issue in alloc_flex_gd()

Wesley reported an issue:

==================================================================
EXT4-fs (dm-5): resizing filesystem from 7168 to 786432 blocks
------------[ cut here ]------------
kernel BUG at fs/ext4/resize.c:324!
CPU: 9 UID: 0 PID: 3576 Comm: resize2fs Not tainted 6.11.0+ #27
RIP: 0010:ext4_resize_fs+0x1212/0x12d0
Call Trace:
 __ext4_ioctl+0x4e0/0x1800
 ext4_ioctl+0x12/0x20
 __x64_sys_ioctl+0x99/0xd0
 x64_sys_call+0x1206/0x20d0
 do_syscall_64+0x72/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
==================================================================

While reviewing the patch, Honza found that when adjusting resize_bg in
alloc_flex_gd(), it was possible for flex_gd-&gt;resize_bg to be bigger than
flexbg_size.

The reproduction of the problem requires the following:

 o_group = flexbg_size * 2 * n;
 o_size = (o_group + 1) * group_size;
 n_group: [o_group + flexbg_size, o_group + flexbg_size * 2)
 o_size = (n_group + 1) * group_size;

Take n=0,flexbg_size=16 as an example:

              last:15
|o---------------|--------------n-|
o_group:0    resize to      n_group:30

The corresponding reproducer is:

img=test.img
rm -f $img
truncate -s 600M $img
mkfs.ext4 -F $img -b 1024 -G 16 8M
dev=`losetup -f --show $img`
mkdir -p /tmp/test
mount $dev /tmp/test
resize2fs $dev 248M

Delete the problematic plus 1 to fix the issue, and add a WARN_ON_ONCE()
to prevent the issue from happening again.

[ Note: another reproucer which this commit fixes is:

  img=test.img
  rm -f $img
  truncate -s 25MiB $img
  mkfs.ext4 -b 4096 -E nodiscard,lazy_itable_init=0,lazy_journal_init=0 $img
  truncate -s 3GiB $img
  dev=`losetup -f --show $img`
  mkdir -p /tmp/test
  mount $dev /tmp/test
  resize2fs $dev 3G
  umount $dev
  losetup -d $dev

  -- TYT ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49880/">CVE-2024-49880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49880">CVE-2024-49880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232205">SUSE bug 1232205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49885" ref_url="https://www.suse.com/security/cve/CVE-2024-49885" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: avoid zeroing kmalloc redzone

Since commit 946fa0dbf2d8 ("mm/slub: extend redzone check to extra
allocated kmalloc space than requested"), setting orig_size treats
the wasted space (object_size - orig_size) as a redzone. However with
init_on_free=1 we clear the full object-&gt;size, including the redzone.

Additionally we clear the object metadata, including the stored orig_size,
making it zero, which makes check_object() treat the whole object as a
redzone.

These issues lead to the following BUG report with "slub_debug=FUZ
init_on_free=1":

[    0.000000] =============================================================================
[    0.000000] BUG kmalloc-8 (Not tainted): kmalloc Redzone overwritten
[    0.000000] -----------------------------------------------------------------------------
[    0.000000]
[    0.000000] 0xffff000010032858-0xffff00001003285f @offset=2136. First byte 0x0 instead of 0xcc
[    0.000000] FIX kmalloc-8: Restoring kmalloc Redzone 0xffff000010032858-0xffff00001003285f=0xcc
[    0.000000] Slab 0xfffffdffc0400c80 objects=36 used=23 fp=0xffff000010032a18 flags=0x3fffe0000000200(workingset|node=0|zone=0|lastcpupid=0x1ffff)
[    0.000000] Object 0xffff000010032858 @offset=2136 fp=0xffff0000100328c8
[    0.000000]
[    0.000000] Redzone  ffff000010032850: cc cc cc cc cc cc cc cc                          ........
[    0.000000] Object   ffff000010032858: cc cc cc cc cc cc cc cc                          ........
[    0.000000] Redzone  ffff000010032860: cc cc cc cc cc cc cc cc                          ........
[    0.000000] Padding  ffff0000100328b4: 00 00 00 00 00 00 00 00 00 00 00 00              ............
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.11.0-rc3-next-20240814-00004-g61844c55c3f4 #144
[    0.000000] Hardware name: NXP i.MX95 19X19 board (DT)
[    0.000000] Call trace:
[    0.000000]  dump_backtrace+0x90/0xe8
[    0.000000]  show_stack+0x18/0x24
[    0.000000]  dump_stack_lvl+0x74/0x8c
[    0.000000]  dump_stack+0x18/0x24
[    0.000000]  print_trailer+0x150/0x218
[    0.000000]  check_object+0xe4/0x454
[    0.000000]  free_to_partial_list+0x2f8/0x5ec

To address the issue, use orig_size to clear the used area. And restore
the value of orig_size after clear the remaining area.

When CONFIG_SLUB_DEBUG not defined, (get_orig_size()' directly returns
s-&gt;object_size. So when using memset to init the area, the size can simply
be orig_size, as orig_size returns object_size when CONFIG_SLUB_DEBUG not
enabled. And orig_size can never be bigger than object_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49885/">CVE-2024-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49885">CVE-2024-49885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232197">SUSE bug 1232197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug

Attaching SST PCI device to VM causes "BUG: KASAN: slab-out-of-bounds".
kasan report:
[   19.411889] ==================================================================
[   19.413702] BUG: KASAN: slab-out-of-bounds in _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.415634] Read of size 8 at addr ffff888829e65200 by task cpuhp/16/113
[   19.417368]
[   19.418627] CPU: 16 PID: 113 Comm: cpuhp/16 Tainted: G            E      6.9.0 #10
[   19.420435] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022
[   19.422687] Call Trace:
[   19.424091]  &lt;TASK&gt;
[   19.425448]  dump_stack_lvl+0x5d/0x80
[   19.426963]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.428694]  print_report+0x19d/0x52e
[   19.430206]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[   19.431837]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.433539]  kasan_report+0xf0/0x170
[   19.435019]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.436709]  _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.438379]  ? __pfx_sched_clock_cpu+0x10/0x10
[   19.439910]  isst_if_cpu_online+0x406/0x58f [isst_if_common]
[   19.441573]  ? __pfx_isst_if_cpu_online+0x10/0x10 [isst_if_common]
[   19.443263]  ? ttwu_queue_wakelist+0x2c1/0x360
[   19.444797]  cpuhp_invoke_callback+0x221/0xec0
[   19.446337]  cpuhp_thread_fun+0x21b/0x610
[   19.447814]  ? __pfx_cpuhp_thread_fun+0x10/0x10
[   19.449354]  smpboot_thread_fn+0x2e7/0x6e0
[   19.450859]  ? __pfx_smpboot_thread_fn+0x10/0x10
[   19.452405]  kthread+0x29c/0x350
[   19.453817]  ? __pfx_kthread+0x10/0x10
[   19.455253]  ret_from_fork+0x31/0x70
[   19.456685]  ? __pfx_kthread+0x10/0x10
[   19.458114]  ret_from_fork_asm+0x1a/0x30
[   19.459573]  &lt;/TASK&gt;
[   19.460853]
[   19.462055] Allocated by task 1198:
[   19.463410]  kasan_save_stack+0x30/0x50
[   19.464788]  kasan_save_track+0x14/0x30
[   19.466139]  __kasan_kmalloc+0xaa/0xb0
[   19.467465]  __kmalloc+0x1cd/0x470
[   19.468748]  isst_if_cdev_register+0x1da/0x350 [isst_if_common]
[   19.470233]  isst_if_mbox_init+0x108/0xff0 [isst_if_mbox_msr]
[   19.471670]  do_one_initcall+0xa4/0x380
[   19.472903]  do_init_module+0x238/0x760
[   19.474105]  load_module+0x5239/0x6f00
[   19.475285]  init_module_from_file+0xd1/0x130
[   19.476506]  idempotent_init_module+0x23b/0x650
[   19.477725]  __x64_sys_finit_module+0xbe/0x130
[   19.476506]  idempotent_init_module+0x23b/0x650
[   19.477725]  __x64_sys_finit_module+0xbe/0x130
[   19.478920]  do_syscall_64+0x82/0x160
[   19.480036]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   19.481292]
[   19.482205] The buggy address belongs to the object at ffff888829e65000
 which belongs to the cache kmalloc-512 of size 512
[   19.484818] The buggy address is located 0 bytes to the right of
 allocated 512-byte region [ffff888829e65000, ffff888829e65200)
[   19.487447]
[   19.488328] The buggy address belongs to the physical page:
[   19.489569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888829e60c00 pfn:0x829e60
[   19.491140] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.492466] anon flags: 0x57ffffc0000840(slab|head|node=1|zone=2|lastcpupid=0x1fffff)
[   19.493914] page_type: 0xffffffff()
[   19.494988] raw: 0057ffffc0000840 ffff88810004cc80 0000000000000000 0000000000000001
[   19.496451] raw: ffff888829e60c00 0000000080200018 00000001ffffffff 0000000000000000
[   19.497906] head: 0057ffffc0000840 ffff88810004cc80 0000000000000000 0000000000000001
[   19.499379] head: ffff888829e60c00 0000000080200018 00000001ffffffff 0000000000000000
[   19.500844] head: 0057ffffc0000003 ffffea0020a79801 ffffea0020a79848 00000000ffffffff
[   19.502316] head: 0000000800000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.503784] page dumped because: k
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232196">SUSE bug 1232196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49887" ref_url="https://www.suse.com/security/cve/CVE-2024-49887" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to don't panic system for no free segment fault injection

f2fs: fix to don't panic system for no free segment fault injection

syzbot reports a f2fs bug as below:

F2FS-fs (loop0): inject no free segment in get_new_segment of __allocate_new_segment+0x1ce/0x940 fs/f2fs/segment.c:3167
F2FS-fs (loop0): Stopped filesystem due to reason: 7
------------[ cut here ]------------
kernel BUG at fs/f2fs/segment.c:2748!
CPU: 0 UID: 0 PID: 5109 Comm: syz-executor304 Not tainted 6.11.0-rc6-syzkaller-00363-g89f5e14d05b4 #0
RIP: 0010:get_new_segment fs/f2fs/segment.c:2748 [inline]
RIP: 0010:new_curseg+0x1f61/0x1f70 fs/f2fs/segment.c:2836
Call Trace:
 __allocate_new_segment+0x1ce/0x940 fs/f2fs/segment.c:3167
 f2fs_allocate_new_section fs/f2fs/segment.c:3181 [inline]
 f2fs_allocate_pinning_section+0xfa/0x4e0 fs/f2fs/segment.c:3195
 f2fs_expand_inode_data+0x5d6/0xbb0 fs/f2fs/file.c:1799
 f2fs_fallocate+0x448/0x960 fs/f2fs/file.c:1903
 vfs_fallocate+0x553/0x6c0 fs/open.c:334
 do_vfs_ioctl+0x2592/0x2e50 fs/ioctl.c:886
 __do_sys_ioctl fs/ioctl.c:905 [inline]
 __se_sys_ioctl+0x81/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0010:get_new_segment fs/f2fs/segment.c:2748 [inline]
RIP: 0010:new_curseg+0x1f61/0x1f70 fs/f2fs/segment.c:2836

The root cause is when we inject no free segment fault into f2fs,
we should not panic system, fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49887/">CVE-2024-49887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49887">CVE-2024-49887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232206">SUSE bug 1232206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49888" ref_url="https://www.suse.com/security/cve/CVE-2024-49888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a sdiv overflow issue

Zac Ecob reported a problem where a bpf program may cause kernel crash due
to the following error:
  Oops: divide error: 0000 [#1] PREEMPT SMP KASAN PTI

The failure is due to the below signed divide:
  LLONG_MIN/-1 where LLONG_MIN equals to -9,223,372,036,854,775,808.
LLONG_MIN/-1 is supposed to give a positive number 9,223,372,036,854,775,808,
but it is impossible since for 64-bit system, the maximum positive
number is 9,223,372,036,854,775,807. On x86_64, LLONG_MIN/-1 will
cause a kernel exception. On arm64, the result for LLONG_MIN/-1 is
LLONG_MIN.

Further investigation found all the following sdiv/smod cases may trigger
an exception when bpf program is running on x86_64 platform:
  - LLONG_MIN/-1 for 64bit operation
  - INT_MIN/-1 for 32bit operation
  - LLONG_MIN%-1 for 64bit operation
  - INT_MIN%-1 for 32bit operation
where -1 can be an immediate or in a register.

On arm64, there are no exceptions:
  - LLONG_MIN/-1 = LLONG_MIN
  - INT_MIN/-1 = INT_MIN
  - LLONG_MIN%-1 = 0
  - INT_MIN%-1 = 0
where -1 can be an immediate or in a register.

Insn patching is needed to handle the above cases and the patched codes
produced results aligned with above arm64 result. The below are pseudo
codes to handle sdiv/smod exceptions including both divisor -1 and divisor 0
and the divisor is stored in a register.

sdiv:
      tmp = rX
      tmp += 1 /* [-1, 0] -&gt; [0, 1]
      if tmp &gt;(unsigned) 1 goto L2
      if tmp == 0 goto L1
      rY = 0
  L1:
      rY = -rY;
      goto L3
  L2:
      rY /= rX
  L3:

smod:
      tmp = rX
      tmp += 1 /* [-1, 0] -&gt; [0, 1]
      if tmp &gt;(unsigned) 1 goto L1
      if tmp == 1 (is64 ? goto L2 : goto L3)
      rY = 0;
      goto L2
  L1:
      rY %= rX
  L2:
      goto L4  // only when !is64
  L3:
      wY = wY  // only when !is64
  L4:

  [1] https://lore.kernel.org/bpf/tPJLTEh7S_DxFEqAI2Ji5MBSoZVg7_G-Py2iaZpAaWtM961fFTWtsnlzwvTbzBzaUzwQAoNATXKUlt0LZOFgnDcIyKCswAnAGdUF3LBrhGQ=@protonmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49888/">CVE-2024-49888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49888">CVE-2024-49888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232208">SUSE bug 1232208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49889" ref_url="https://www.suse.com/security/cve/CVE-2024-49889" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid use-after-free in ext4_ext_show_leaf()

In ext4_find_extent(), path may be freed by error or be reallocated, so
using a previously saved *ppath may have been freed and thus may trigger
use-after-free, as follows:

ext4_split_extent
  path = *ppath;
  ext4_split_extent_at(ppath)
  path = ext4_find_extent(ppath)
  ext4_split_extent_at(ppath)
    // ext4_find_extent fails to free path
    // but zeroout succeeds
  ext4_ext_show_leaf(inode, path)
    eh = path[depth].p_hdr
    // path use-after-free !!!

Similar to ext4_split_extent_at(), we use *ppath directly as an input to
ext4_ext_show_leaf(). Fix a spelling error by the way.

Same problem in ext4_ext_handle_unwritten_extents(). Since 'path' is only
used in ext4_ext_show_leaf(), remove 'path' and use *ppath directly.

This issue is triggered only when EXT_DEBUG is defined and therefore does
not affect functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49889/">CVE-2024-49889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232215">SUSE bug 1232215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Initialize get_bytes_per_element's default to 1

Variables, used as denominators and maybe not assigned to other values,
should not be 0. bytes_per_element_y &amp; bytes_per_element_c are
initialized by get_bytes_per_element() which should never return 0.

This fixes 10 DIVIDE_BY_ZERO issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232220">SUSE bug 1232220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49893" ref_url="https://www.suse.com/security/cve/CVE-2024-49893" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check stream_status before it is used

[WHAT &amp; HOW]
dc_state_get_stream_status can return null, and therefore null must be
checked before stream_status is used.

This fixes 1 NULL_RETURNS issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49893/">CVE-2024-49893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49893">CVE-2024-49893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232350">SUSE bug 1232350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation

This commit addresses a potential index out of bounds issue in the
`cm3_helper_translate_curve_to_degamma_hw_format` function in the DCN30
color  management module. The issue could occur when the index 'i'
exceeds the  number of transfer function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, the function returns
false to indicate an error.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:338 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:339 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:340 cm3_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232352">SUSE bug 1232352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check phantom_stream before it is used

dcn32_enable_phantom_stream can return null, so returned value
must be checked before used.

This fixes 1 NULL_RETURNS issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232355">SUSE bug 1232355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49898" ref_url="https://www.suse.com/security/cve/CVE-2024-49898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null-initialized variables

[WHAT &amp; HOW]
drr_timing and subvp_pipe are initialized to null and they are not
always assigned new values. It is necessary to check for null before
dereferencing.

This fixes 2 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49898/">CVE-2024-49898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49898">CVE-2024-49898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232222">SUSE bug 1232222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs

There are some cases, such as the one uncovered by Commit 46d4efcccc68
("drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails")
where

msm_gpu_cleanup() : platform_set_drvdata(gpu-&gt;pdev, NULL);

is called on gpu-&gt;pdev == NULL, as the GPU device has not been fully
initialized yet.

Turns out that there's more than just the aforementioned path that
causes this to happen (e.g. the case when there's speedbin data in the
catalog, but opp-supported-hw is missing in DT).

Assigning msm_gpu-&gt;pdev earlier seems like the least painful solution
to this, therefore do so.

Patchwork: https://patchwork.freedesktop.org/patch/602742/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232305">SUSE bug 1232305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: check if leafidx greater than num leaves per dmap tree

syzbot report a out of bounds in dbSplit, it because dmt_leafidx greater
than num leaves per dmap tree, add a checking for dmt_leafidx in dbFindLeaf.

Shaggy:
Modified sanity check to apply to control pages as well as leaf pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232378">SUSE bug 1232378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232379">SUSE bug 1232379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: Fix uaf in dbFreeBits

[syzbot reported]
==================================================================
BUG: KASAN: slab-use-after-free in __mutex_lock_common kernel/locking/mutex.c:587 [inline]
BUG: KASAN: slab-use-after-free in __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752
Read of size 8 at addr ffff8880229254b0 by task syz-executor357/5216

CPU: 0 UID: 0 PID: 5216 Comm: syz-executor357 Not tainted 6.11.0-rc3-syzkaller-00156-gd7a5aa4b3c00 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 __mutex_lock_common kernel/locking/mutex.c:587 [inline]
 __mutex_lock+0xfe/0xd70 kernel/locking/mutex.c:752
 dbFreeBits+0x7ea/0xd90 fs/jfs/jfs_dmap.c:2390
 dbFreeDmap fs/jfs/jfs_dmap.c:2089 [inline]
 dbFree+0x35b/0x680 fs/jfs/jfs_dmap.c:409
 dbDiscardAG+0x8a9/0xa20 fs/jfs/jfs_dmap.c:1650
 jfs_ioc_trim+0x433/0x670 fs/jfs/jfs_discard.c:100
 jfs_ioctl+0x2d0/0x3e0 fs/jfs/ioctl.c:131
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83

Freed by task 5218:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2252 [inline]
 slab_free mm/slub.c:4473 [inline]
 kfree+0x149/0x360 mm/slub.c:4594
 dbUnmount+0x11d/0x190 fs/jfs/jfs_dmap.c:278
 jfs_mount_rw+0x4ac/0x6a0 fs/jfs/jfs_mount.c:247
 jfs_remount+0x3d1/0x6b0 fs/jfs/super.c:454
 reconfigure_super+0x445/0x880 fs/super.c:1083
 vfs_cmd_reconfigure fs/fsopen.c:263 [inline]
 vfs_fsconfig_locked fs/fsopen.c:292 [inline]
 __do_sys_fsconfig fs/fsopen.c:473 [inline]
 __se_sys_fsconfig+0xb6e/0xf80 fs/fsopen.c:345
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[Analysis]
There are two paths (dbUnmount and jfs_ioc_trim) that generate race
condition when accessing bmap, which leads to the occurrence of uaf.

Use the lock s_umount to synchronize them, in order to avoid uaf caused
by race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232362">SUSE bug 1232362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233020">SUSE bug 1233020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49904" ref_url="https://www.suse.com/security/cve/CVE-2024-49904" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add list empty check to avoid null pointer issue

Add list empty check to avoid null pointer issues in some corner cases.
- list_for_each_entry_safe()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49904/">CVE-2024-49904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49904">CVE-2024-49904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232356">SUSE bug 1232356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2)

This commit adds a null check for the 'afb' variable in the
amdgpu_dm_plane_handle_cursor_update function. Previously, 'afb' was
assumed to be null, but was used later in the code without a null check.
This could potentially lead to a null pointer dereference.

Changes since v1:
- Moved the null check for 'afb' to the line where 'afb' is used. (Alex)

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_plane.c:1298 amdgpu_dm_plane_handle_cursor_update() error: we previously assumed 'afb' could be null (see line 1252)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232357">SUSE bug 1232357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointer before try to access it

[why &amp; how]
Change the order of the pipe_ctx-&gt;plane_state check to ensure that
plane_state is not null before accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232332">SUSE bug 1232332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before using dc-&gt;clk_mgr

[WHY &amp; HOW]
dc-&gt;clk_mgr is null checked previously in the same function, indicating
it might be null.

Passing "dc" to "dc-&gt;hwss.apply_idle_power_optimizations", which
dereferences null "dc-&gt;clk_mgr". (The function pointer resolves to
"dcn35_apply_idle_power_optimizations".)

This fixes 1 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232334">SUSE bug 1232334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2)

This commit adds a null check for the 'afb' variable in the
amdgpu_dm_update_cursor function. Previously, 'afb' was assumed to be
null at line 8388, but was used later in the code without a null check.
This could potentially lead to a null pointer dereference.

Changes since v1:
- Moved the null check for 'afb' to the line where 'afb' is used. (Alex)

Fixes the below:
drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm.c:8433 amdgpu_dm_update_cursor()
	error: we previously assumed 'afb' could be null (see line 8388)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the dcn32_set_output_transfer_func function. Previously,
set_output_gamma was being checked for null, but then it was being
dereferenced without any null check. This could lead to a null pointer
dereference if set_output_gamma is null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a null check for set_output_gamma
before the call to set_output_gamma.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232337">SUSE bug 1232337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49910" ref_url="https://www.suse.com/security/cve/CVE-2024-49910" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the dcn401_set_output_transfer_func function. Previously,
set_output_gamma was being checked for null, but then it was being
dereferenced without any null check. This could lead to a null pointer
dereference if set_output_gamma is null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a null check for set_output_gamma
before the call to set_output_gamma.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49910/">CVE-2024-49910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49910">CVE-2024-49910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232365">SUSE bug 1232365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func

This commit adds a null check for the set_output_gamma function pointer
in the dcn20_set_output_transfer_func function. Previously,
set_output_gamma was being checked for null at line 1030, but then it
was being dereferenced without any null check at line 1048. This could
potentially lead to a null pointer dereference error if set_output_gamma
is null.

To fix this, we now ensure that set_output_gamma is not null before
dereferencing it. We do this by adding a null check for set_output_gamma
before the call to set_output_gamma at line 1048.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232366">SUSE bug 1232366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream'

This commit adds a null check for 'stream_status' in the function
'planes_changed_for_existing_stream'. Previously, the code assumed
'stream_status' could be null, but did not handle the case where it was
actually null. This could lead to a null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/core/dc_resource.c:3784 planes_changed_for_existing_stream() error: we previously assumed 'stream_status' could be null (see line 3774)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232367">SUSE bug 1232367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream

This commit addresses a null pointer dereference issue in the
`commit_planes_for_stream` function at line 4140. The issue could occur
when `top_pipe_to_program` is null.

The fix adds a check to ensure `top_pipe_to_program` is not null before
accessing its stream_res. This prevents a null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/core/dc.c:4140 commit_planes_for_stream() error: we previously assumed 'top_pipe_to_program' could be null (see line 3906)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232307">SUSE bug 1232307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe

This commit addresses a null pointer dereference issue in the
`dcn20_program_pipe` function. The issue could occur when
`pipe_ctx-&gt;plane_state` is null.

The fix adds a check to ensure `pipe_ctx-&gt;plane_state` is not null
before accessing. This prevents a null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn20/dcn20_hwseq.c:1925 dcn20_program_pipe() error: we previously assumed 'pipe_ctx-&gt;plane_state' could be null (see line 1877)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232369">SUSE bug 1232369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49915" ref_url="https://www.suse.com/security/cve/CVE-2024-49915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw

This commit addresses a potential null pointer dereference issue in the
`dcn32_init_hw` function. The issue could occur when `dc-&gt;clk_mgr` is
null.

The fix adds a check to ensure `dc-&gt;clk_mgr` is not null before
accessing its functions. This prevents a potential null pointer
dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn32/dcn32_hwseq.c:961 dcn32_init_hw() error: we previously assumed 'dc-&gt;clk_mgr' could be null (see line 782)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49915/">CVE-2024-49915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49915">CVE-2024-49915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231963">SUSE bug 1231963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49916" ref_url="https://www.suse.com/security/cve/CVE-2024-49916" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn401_init_hw

This commit addresses a potential null pointer dereference issue in the
`dcn401_init_hw` function. The issue could occur when `dc-&gt;clk_mgr` or
`dc-&gt;clk_mgr-&gt;funcs` is null.

The fix adds a check to ensure `dc-&gt;clk_mgr` and `dc-&gt;clk_mgr-&gt;funcs` is
not null before accessing its functions. This prevents a potential null
pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn401/dcn401_hwseq.c:416 dcn401_init_hw() error: we previously assumed 'dc-&gt;clk_mgr' could be null (see line 225)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49916/">CVE-2024-49916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49916">CVE-2024-49916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231964">SUSE bug 1231964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn30_init_hw

This commit addresses a potential null pointer dereference issue in the
`dcn30_init_hw` function. The issue could occur when `dc-&gt;clk_mgr` or
`dc-&gt;clk_mgr-&gt;funcs` is null.

The fix adds a check to ensure `dc-&gt;clk_mgr` and `dc-&gt;clk_mgr-&gt;funcs` is
not null before accessing its functions. This prevents a potential null
pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn30/dcn30_hwseq.c:789 dcn30_init_hw() error: we previously assumed 'dc-&gt;clk_mgr' could be null (see line 628)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231965">SUSE bug 1231965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer

This commit addresses a potential null pointer dereference issue in the
`dcn32_acquire_idle_pipe_for_head_pipe_in_layer` function. The issue
could occur when `head_pipe` is null.

The fix adds a check to ensure `head_pipe` is not null before asserting
it. If `head_pipe` is null, the function returns NULL to prevent a
potential null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn32/dcn32_resource.c:2690 dcn32_acquire_idle_pipe_for_head_pipe_in_layer() error: we previously assumed 'head_pipe' could be null (see line 2681)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231967">SUSE bug 1231967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer

This commit addresses a potential null pointer dereference issue in the
`dcn201_acquire_free_pipe_for_layer` function. The issue could occur
when `head_pipe` is null.

The fix adds a check to ensure `head_pipe` is not null before asserting
it. If `head_pipe` is null, the function returns NULL to prevent a
potential null pointer dereference.

Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn201/dcn201_resource.c:1016 dcn201_acquire_free_pipe_for_layer() error: we previously assumed 'head_pipe' could be null (see line 1010)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231968">SUSE bug 1231968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before multiple uses

[WHAT &amp; HOW]
Poniters, such as stream_enc and dc-&gt;bw_vbios, are null checked previously
in the same function, so Coverity warns "implies that stream_enc and
dc-&gt;bw_vbios might be null". They are used multiple times in the
subsequent code and need to be checked.

This fixes 10 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232313">SUSE bug 1232313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before used

[WHAT &amp; HOW]
Poniters, such as dc-&gt;clk_mgr, are null checked previously in the same
function, so Coverity warns "implies that "dc-&gt;clk_mgr" might be null".
As a result, these pointers need to be checked when used again.

This fixes 10 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232371">SUSE bug 1232371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointers before using them

[WHAT &amp; HOW]
These pointers are null checked previously in the same function,
indicating they might be null as reported by Coverity. As a result,
they need to be checked when used again.

This fixes 3 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232374">SUSE bug 1232374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags

[WHAT &amp; HOW]
"dcn20_validate_apply_pipe_split_flags" dereferences merge, and thus it
cannot be a null pointer. Let's pass a valid pointer to avoid null
dereference.

This fixes 2 FORWARD_NULL issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232361">SUSE bug 1232361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: pxafb: Fix possible use after free in pxafb_task()

In the pxafb_probe function, it calls the pxafb_init_fbinfo function,
after which &amp;fbi-&gt;task is associated with pxafb_task. Moreover,
within this pxafb_init_fbinfo function, the pxafb_blank function
within the &amp;pxafb_ops struct is capable of scheduling work.

If we remove the module which will call pxafb_remove to make cleanup,
it will call unregister_framebuffer function which can call
do_unregister_framebuffer to free fbi-&gt;fb through
put_fb_info(fb_info), while the work mentioned above will be used.
The sequence of operations that may lead to a UAF bug is as follows:

CPU0                                                CPU1

                                   | pxafb_task
pxafb_remove                       |
unregister_framebuffer(info)       |
do_unregister_framebuffer(fb_info) |
put_fb_info(fb_info)               |
// free fbi-&gt;fb                    | set_ctrlr_state(fbi, state)
                                   | __pxafb_lcd_power(fbi, 0)
                                   | fbi-&gt;lcd_power(on, &amp;fbi-&gt;fb.var)
                                   | //use fbi-&gt;fb

Fix it by ensuring that the work is canceled before proceeding
with the cleanup in pxafb_remove.

Note that only root user can remove the driver at runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-19"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232364">SUSE bug 1232364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49926" ref_url="https://www.suse.com/security/cve/CVE-2024-49926" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb()

For kernels built with CONFIG_FORCE_NR_CPUS=y, the nr_cpu_ids is
defined as NR_CPUS instead of the number of possible cpus, this
will cause the following system panic:

smpboot: Allowing 4 CPUs, 0 hotplug CPUs
...
setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:512 nr_node_ids:1
...
BUG: unable to handle page fault for address: ffffffff9911c8c8
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 15 Comm: rcu_tasks_trace Tainted: G W
6.6.21 #1 5dc7acf91a5e8e9ac9dcfc35bee0245691283ea6
RIP: 0010:rcu_tasks_need_gpcb+0x25d/0x2c0
RSP: 0018:ffffa371c00a3e60 EFLAGS: 00010082
CR2: ffffffff9911c8c8 CR3: 000000040fa20005 CR4: 00000000001706f0
Call Trace:
&lt;TASK&gt;
? __die+0x23/0x80
? page_fault_oops+0xa4/0x180
? exc_page_fault+0x152/0x180
? asm_exc_page_fault+0x26/0x40
? rcu_tasks_need_gpcb+0x25d/0x2c0
? __pfx_rcu_tasks_kthread+0x40/0x40
rcu_tasks_one_gp+0x69/0x180
rcu_tasks_kthread+0x94/0xc0
kthread+0xe8/0x140
? __pfx_kthread+0x40/0x40
ret_from_fork+0x34/0x80
? __pfx_kthread+0x40/0x40
ret_from_fork_asm+0x1b/0x80
&lt;/TASK&gt;

Considering that there may be holes in the CPU numbers, use the
maximum possible cpu number, instead of nr_cpu_ids, for configuring
enqueue and dequeue limits.

[ neeraj.upadhyay: Fix htmldocs build error reported by Stephen Rothwell ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49926/">CVE-2024-49926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49926">CVE-2024-49926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232247">SUSE bug 1232247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid reading out of bounds when loading TX power FW elements

Because the loop-expression will do one more time before getting false from
cond-expression, the original code copied one more entry size beyond valid
region.

Fix it by moving the entry copy to loop-body.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232250">SUSE bug 1232250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: avoid NULL pointer dereference

iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta
pointer is not NULL.
It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is
dereferencing the ieee80211_sta pointer.
If sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL
pointer.
Fix this by checking the sta pointer before retrieving the mvmsta
from it. If sta is not NULL, then mvmsta isn't either.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232253">SUSE bug 1232253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix array out-of-bound access in SoC stats

Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a
maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx()
function access ath11k_soc_dp_stats::hal_reo_error using the REO
destination SRNG ring ID, which is incorrect. SRNG ring ID differ from
normal ring ID, and this usage leads to out-of-bounds array access. To fix
this issue, modify ath11k_dp_process_rx() to use the normal ring ID
directly instead of the SRNG ring ID to avoid out-of-bounds array access.

Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232261">SUSE bug 1232261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49931" ref_url="https://www.suse.com/security/cve/CVE-2024-49931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix array out-of-bound access in SoC stats

Currently, the ath12k_soc_dp_stats::hal_reo_error array is defined with a
maximum size of DP_REO_DST_RING_MAX. However, the ath12k_dp_rx_process()
function access ath12k_soc_dp_stats::hal_reo_error using the REO
destination SRNG ring ID, which is incorrect. SRNG ring ID differ from
normal ring ID, and this usage leads to out-of-bounds array access. To
fix this issue, modify ath12k_dp_rx_process() to use the normal ring ID
directly instead of the SRNG ring ID to avoid out-of-bounds array access.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49931/">CVE-2024-49931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49931">CVE-2024-49931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232275">SUSE bug 1232275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232277">SUSE bug 1232277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49932" ref_url="https://www.suse.com/security/cve/CVE-2024-49932" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't readahead the relocation inode on RST

On relocation we're doing readahead on the relocation inode, but if the
filesystem is backed by a RAID stripe tree we can get ENOENT (e.g. due to
preallocated extents not being mapped in the RST) from the lookup.

But readahead doesn't handle the error and submits invalid reads to the
device, causing an assertion in the scatter-gather list code:

  BTRFS info (device nvme1n1): balance: start -d -m -s
  BTRFS info (device nvme1n1): relocating block group 6480920576 flags data|raid0
  BTRFS error (device nvme1n1): cannot find raid-stripe for logical [6481928192, 6481969152] devid 2, profile raid0
  ------------[ cut here ]------------
  kernel BUG at include/linux/scatterlist.h:115!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 PID: 1012 Comm: btrfs Not tainted 6.10.0-rc7+ #567
  RIP: 0010:__blk_rq_map_sg+0x339/0x4a0
  RSP: 0018:ffffc90001a43820 EFLAGS: 00010202
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffea00045d4802
  RDX: 0000000117520000 RSI: 0000000000000000 RDI: ffff8881027d1000
  RBP: 0000000000003000 R08: ffffea00045d4902 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000001000 R12: ffff8881003d10b8
  R13: ffffc90001a438f0 R14: 0000000000000000 R15: 0000000000003000
  FS:  00007fcc048a6900(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000002cd11000 CR3: 00000001109ea001 CR4: 0000000000370eb0
  Call Trace:
   &lt;TASK&gt;
   ? __die_body.cold+0x14/0x25
   ? die+0x2e/0x50
   ? do_trap+0xca/0x110
   ? do_error_trap+0x65/0x80
   ? __blk_rq_map_sg+0x339/0x4a0
   ? exc_invalid_op+0x50/0x70
   ? __blk_rq_map_sg+0x339/0x4a0
   ? asm_exc_invalid_op+0x1a/0x20
   ? __blk_rq_map_sg+0x339/0x4a0
   nvme_prep_rq.part.0+0x9d/0x770
   nvme_queue_rq+0x7d/0x1e0
   __blk_mq_issue_directly+0x2a/0x90
   ? blk_mq_get_budget_and_tag+0x61/0x90
   blk_mq_try_issue_list_directly+0x56/0xf0
   blk_mq_flush_plug_list.part.0+0x52b/0x5d0
   __blk_flush_plug+0xc6/0x110
   blk_finish_plug+0x28/0x40
   read_pages+0x160/0x1c0
   page_cache_ra_unbounded+0x109/0x180
   relocate_file_extent_cluster+0x611/0x6a0
   ? btrfs_search_slot+0xba4/0xd20
   ? balance_dirty_pages_ratelimited_flags+0x26/0xb00
   relocate_data_extent.constprop.0+0x134/0x160
   relocate_block_group+0x3f2/0x500
   btrfs_relocate_block_group+0x250/0x430
   btrfs_relocate_chunk+0x3f/0x130
   btrfs_balance+0x71b/0xef0
   ? kmalloc_trace_noprof+0x13b/0x280
   btrfs_ioctl+0x2c2e/0x3030
   ? kvfree_call_rcu+0x1e6/0x340
   ? list_lru_add_obj+0x66/0x80
   ? mntput_no_expire+0x3a/0x220
   __x64_sys_ioctl+0x96/0xc0
   do_syscall_64+0x54/0x110
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7fcc04514f9b
  Code: Unable to access opcode bytes at 0x7fcc04514f71.
  RSP: 002b:00007ffeba923370 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
  RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fcc04514f9b
  RDX: 00007ffeba923460 RSI: 00000000c4009420 RDI: 0000000000000003
  RBP: 0000000000000000 R08: 0000000000000013 R09: 0000000000000001
  R10: 00007fcc043fbba8 R11: 0000000000000246 R12: 00007ffeba924fc5
  R13: 00007ffeba923460 R14: 0000000000000002 R15: 00000000004d4bb0
   &lt;/TASK&gt;
  Modules linked in:
  ---[ end trace 0000000000000000 ]---
  RIP: 0010:__blk_rq_map_sg+0x339/0x4a0
  RSP: 0018:ffffc90001a43820 EFLAGS: 00010202
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffea00045d4802
  RDX: 0000000117520000 RSI: 0000000000000000 RDI: ffff8881027d1000
  RBP: 0000000000003000 R08: ffffea00045d4902 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000001000 R12: ffff8881003d10b8
  R13: ffffc90001a438f0 R14: 0000000000000000 R15: 0000000000003000
  FS:  00007fcc048a6900(0000) GS:ffff88813bc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fcc04514f71 CR3: 00000001109ea001 CR4: 0000000000370eb0
  Kernel p
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49932/">CVE-2024-49932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49932">CVE-2024-49932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232376">SUSE bug 1232376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk_iocost: fix more out of bound shifts

Recently running UBSAN caught few out of bound shifts in the
ioc_forgive_debts() function:

UBSAN: shift-out-of-bounds in block/blk-iocost.c:2142:38
shift exponent 80 is too large for 64-bit type 'u64' (aka 'unsigned long
long')
...
UBSAN: shift-out-of-bounds in block/blk-iocost.c:2144:30
shift exponent 80 is too large for 64-bit type 'u64' (aka 'unsigned long
long')
...
Call Trace:
&lt;IRQ&gt;
dump_stack_lvl+0xca/0x130
__ubsan_handle_shift_out_of_bounds+0x22c/0x280
? __lock_acquire+0x6441/0x7c10
ioc_timer_fn+0x6cec/0x7750
? blk_iocost_init+0x720/0x720
? call_timer_fn+0x5d/0x470
call_timer_fn+0xfa/0x470
? blk_iocost_init+0x720/0x720
__run_timer_base+0x519/0x700
...

Actual impact of this issue was not identified but I propose to fix the
undefined behaviour.
The proposed fix to prevent those out of bound shifts consist of
precalculating exponent before using it the shift operations by taking
min value from the actual exponent and maximum possible number of bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232368">SUSE bug 1232368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49937</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Set correct chandef when starting CAC

When starting CAC in a mode other than AP mode, it return a
"WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]"
caused by the chandef.chan being null at the end of CAC.

Solution: Ensure the channel definition is set for the different modes
when starting CAC to avoid getting a NULL 'chan' at the end of CAC.

 Call Trace:
  ? show_regs.part.0+0x14/0x16
  ? __warn+0x67/0xc0
  ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]
  ? report_bug+0xa7/0x130
  ? exc_overflow+0x30/0x30
  ? handle_bug+0x27/0x50
  ? exc_invalid_op+0x18/0x60
  ? handle_exception+0xf6/0xf6
  ? exc_overflow+0x30/0x30
  ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]
  ? exc_overflow+0x30/0x30
  ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]
  ? regulatory_propagate_dfs_state.cold+0x1b/0x4c [cfg80211]
  ? cfg80211_propagate_cac_done_wk+0x1a/0x30 [cfg80211]
  ? process_one_work+0x165/0x280
  ? worker_thread+0x120/0x3f0
  ? kthread+0xc2/0xf0
  ? process_one_work+0x280/0x280
  ? kthread_complete_and_exit+0x20/0x20
  ? ret_from_fork+0x19/0x24

[shorten subject, remove OCB, reorder cases to match previous list]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232427">SUSE bug 1232427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid to add interface to list twice when SER

If SER L2 occurs during the WoWLAN resume flow, the add interface flow
is triggered by ieee80211_reconfig(). However, due to
rtw89_wow_resume() return failure, it will cause the add interface flow
to be executed again, resulting in a double add list and causing a kernel
panic. Therefore, we have added a check to prevent double adding of the
list.

list_add double add: new=ffff99d6992e2010, prev=ffff99d6992e2010, next=ffff99d695302628.
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:37!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G        W  O       6.6.30-02659-gc18865c4dfbd #1 770df2933251a0e3c888ba69d1053a817a6376a7
Hardware name: HP Grunt/Grunt, BIOS Google_Grunt.11031.169.0 06/24/2021
Workqueue: events_freezable ieee80211_restart_work [mac80211]
RIP: 0010:__list_add_valid_or_report+0x5e/0xb0
Code: c7 74 18 48 39 ce 74 13 b0 01 59 5a 5e 5f 41 58 41 59 41 5a 5d e9 e2 d6 03 00 cc 48 c7 c7 8d 4f 17 83 48 89 c2 e8 02 c0 00 00 &lt;0f&gt; 0b 48 c7 c7 aa 8c 1c 83 e8 f4 bf 00 00 0f 0b 48 c7 c7 c8 bc 12
RSP: 0018:ffffa91b8007bc50 EFLAGS: 00010246
RAX: 0000000000000058 RBX: ffff99d6992e0900 RCX: a014d76c70ef3900
RDX: ffffa91b8007bae8 RSI: 00000000ffffdfff RDI: 0000000000000001
RBP: ffffa91b8007bc88 R08: 0000000000000000 R09: ffffa91b8007bae0
R10: 00000000ffffdfff R11: ffffffff83a79800 R12: ffff99d695302060
R13: ffff99d695300900 R14: ffff99d6992e1be0 R15: ffff99d6992e2010
FS:  0000000000000000(0000) GS:ffff99d6aac00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000078fbdba43480 CR3: 000000010e464000 CR4: 00000000001506f0
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1f/0x70
 ? die+0x3d/0x60
 ? do_trap+0xa4/0x110
 ? __list_add_valid_or_report+0x5e/0xb0
 ? do_error_trap+0x6d/0x90
 ? __list_add_valid_or_report+0x5e/0xb0
 ? handle_invalid_op+0x30/0x40
 ? __list_add_valid_or_report+0x5e/0xb0
 ? exc_invalid_op+0x3c/0x50
 ? asm_exc_invalid_op+0x16/0x20
 ? __list_add_valid_or_report+0x5e/0xb0
 rtw89_ops_add_interface+0x309/0x310 [rtw89_core 7c32b1ee6854761c0321027c8a58c5160e41f48f]
 drv_add_interface+0x5c/0x130 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 ieee80211_reconfig+0x241/0x13d0 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 ? finish_wait+0x3e/0x90
 ? synchronize_rcu_expedited+0x174/0x260
 ? sync_rcu_exp_done_unlocked+0x50/0x50
 ? wake_bit_function+0x40/0x40
 ieee80211_restart_work+0xf0/0x140 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 process_scheduled_works+0x1e5/0x480
 worker_thread+0xea/0x1e0
 kthread+0xdb/0x110
 ? move_linked_works+0x90/0x90
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork+0x3b/0x50
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;
Modules linked in: dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc rfcomm cmac uinput algif_hash algif_skcipher af_alg btusb btrtl iio_trig_hrtimer industrialio_sw_trigger btmtk industrialio_configfs btbcm btintel uvcvideo videobuf2_vmalloc iio_trig_sysfs videobuf2_memops videobuf2_v4l2 videobuf2_common uvc snd_hda_codec_hdmi veth snd_hda_intel snd_intel_dspcfg acpi_als snd_hda_codec industrialio_triggered_buffer kfifo_buf snd_hwdep industrialio i2c_piix4 snd_hda_core designware_i2s ip6table_nat snd_soc_max98357a xt_MASQUERADE xt_cgroup snd_soc_acp_rt5682_mach fuse rtw89_8922ae(O) rtw89_8922a(O) rtw89_pci(O) rtw89_core(O) 8021q mac80211(O) bluetooth ecdh_generic ecc cfg80211 r8152 mii joydev
gsmi: Log Shutdown Reason 0x03
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232381">SUSE bug 1232381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49941" ref_url="https://www.suse.com/security/cve/CVE-2024-49941" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: Fix potential NULL pointer dereference in gpiod_get_label()

In `gpiod_get_label()`, it is possible that `srcu_dereference_check()` may
return a NULL pointer, leading to a scenario where `label-&gt;str` is accessed
without verifying if `label` itself is NULL.

This patch adds a proper NULL check for `label` before accessing
`label-&gt;str`. The check for `label-&gt;str != NULL` is removed because
`label-&gt;str` can never be NULL if `label` is not NULL.

This fixes the issue where the label name was being printed as `(efault)`
when dumping the sysfs GPIO file when `label == NULL`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49941/">CVE-2024-49941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49941">CVE-2024-49941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232169">SUSE bug 1232169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49942" ref_url="https://www.suse.com/security/cve/CVE-2024-49942" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Prevent null pointer access in xe_migrate_copy

xe_migrate_copy designed to copy content of TTM resources. When source
resource is null, it will trigger a NULL pointer dereference in
xe_migrate_copy. To avoid this situation, update lacks source flag to
true for this case, the flag will trigger xe_migrate_clear rather than
xe_migrate_copy.

Issue trace:
&lt;7&gt; [317.089847] xe 0000:00:02.0: [drm:xe_migrate_copy [xe]] Pass 14,
 sizes: 4194304 &amp; 4194304
&lt;7&gt; [317.089945] xe 0000:00:02.0: [drm:xe_migrate_copy [xe]] Pass 15,
 sizes: 4194304 &amp; 4194304
&lt;1&gt; [317.128055] BUG: kernel NULL pointer dereference, address:
 0000000000000010
&lt;1&gt; [317.128064] #PF: supervisor read access in kernel mode
&lt;1&gt; [317.128066] #PF: error_code(0x0000) - not-present page
&lt;6&gt; [317.128069] PGD 0 P4D 0
&lt;4&gt; [317.128071] Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt; [317.128074] CPU: 1 UID: 0 PID: 1440 Comm: kunit_try_catch Tainted:
 G     U           N 6.11.0-rc7-xe #1
&lt;4&gt; [317.128078] Tainted: [U]=USER, [N]=TEST
&lt;4&gt; [317.128080] Hardware name: Intel Corporation Lunar Lake Client
 Platform/LNL-M LP5 RVP1, BIOS LNLMFWI1.R00.3221.D80.2407291239 07/29/2024
&lt;4&gt; [317.128082] RIP: 0010:xe_migrate_copy+0x66/0x13e0 [xe]
&lt;4&gt; [317.128158] Code: 00 00 48 89 8d e0 fe ff ff 48 8b 40 10 4c 89 85 c8
 fe ff ff 44 88 8d bd fe ff ff 65 48 8b 3c 25 28 00 00 00 48 89 7d d0 31
 ff &lt;8b&gt; 79 10 48 89 85 a0 fe ff ff 48 8b 00 48 89 b5 d8 fe ff ff 83 ff
&lt;4&gt; [317.128162] RSP: 0018:ffffc9000167f9f0 EFLAGS: 00010246
&lt;4&gt; [317.128164] RAX: ffff8881120d8028 RBX: ffff88814d070428 RCX:
 0000000000000000
&lt;4&gt; [317.128166] RDX: ffff88813cb99c00 RSI: 0000000004000000 RDI:
 0000000000000000
&lt;4&gt; [317.128168] RBP: ffffc9000167fbb8 R08: ffff88814e7b1f08 R09:
 0000000000000001
&lt;4&gt; [317.128170] R10: 0000000000000001 R11: 0000000000000001 R12:
 ffff88814e7b1f08
&lt;4&gt; [317.128172] R13: ffff88814e7b1f08 R14: ffff88813cb99c00 R15:
 0000000000000001
&lt;4&gt; [317.128174] FS:  0000000000000000(0000) GS:ffff88846f280000(0000)
 knlGS:0000000000000000
&lt;4&gt; [317.128176] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&lt;4&gt; [317.128178] CR2: 0000000000000010 CR3: 000000011f676004 CR4:
 0000000000770ef0
&lt;4&gt; [317.128180] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
 0000000000000000
&lt;4&gt; [317.128182] DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7:
 0000000000000400
&lt;4&gt; [317.128184] PKRU: 55555554
&lt;4&gt; [317.128185] Call Trace:
&lt;4&gt; [317.128187]  &lt;TASK&gt;
&lt;4&gt; [317.128189]  ? show_regs+0x67/0x70
&lt;4&gt; [317.128194]  ? __die_body+0x20/0x70
&lt;4&gt; [317.128196]  ? __die+0x2b/0x40
&lt;4&gt; [317.128198]  ? page_fault_oops+0x15f/0x4e0
&lt;4&gt; [317.128203]  ? do_user_addr_fault+0x3fb/0x970
&lt;4&gt; [317.128205]  ? lock_acquire+0xc7/0x2e0
&lt;4&gt; [317.128209]  ? exc_page_fault+0x87/0x2b0
&lt;4&gt; [317.128212]  ? asm_exc_page_fault+0x27/0x30
&lt;4&gt; [317.128216]  ? xe_migrate_copy+0x66/0x13e0 [xe]
&lt;4&gt; [317.128263]  ? __lock_acquire+0xb9d/0x26f0
&lt;4&gt; [317.128265]  ? __lock_acquire+0xb9d/0x26f0
&lt;4&gt; [317.128267]  ? sg_free_append_table+0x20/0x80
&lt;4&gt; [317.128271]  ? lock_acquire+0xc7/0x2e0
&lt;4&gt; [317.128273]  ? mark_held_locks+0x4d/0x80
&lt;4&gt; [317.128275]  ? trace_hardirqs_on+0x1e/0xd0
&lt;4&gt; [317.128278]  ? _raw_spin_unlock_irqrestore+0x31/0x60
&lt;4&gt; [317.128281]  ? __pm_runtime_resume+0x60/0xa0
&lt;4&gt; [317.128284]  xe_bo_move+0x682/0xc50 [xe]
&lt;4&gt; [317.128315]  ? lock_is_held_type+0xaa/0x120
&lt;4&gt; [317.128318]  ttm_bo_handle_move_mem+0xe5/0x1a0 [ttm]
&lt;4&gt; [317.128324]  ttm_bo_validate+0xd1/0x1a0 [ttm]
&lt;4&gt; [317.128328]  shrink_test_run_device+0x721/0xc10 [xe]
&lt;4&gt; [317.128360]  ? find_held_lock+0x31/0x90
&lt;4&gt; [317.128363]  ? lock_release+0xd1/0x2a0
&lt;4&gt; [317.128365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
 [kunit]
&lt;4&gt; [317.128370]  xe_bo_shrink_kunit+0x11/0x20 [xe]
&lt;4&gt; [317.128397]  kunit_try_run_case+0x6e/0x150 [kunit]
&lt;4&gt; [317.128400]  ? trace_hardirqs_on+0x1e/0xd0
&lt;4&gt; [317.128402]  ? _raw_spin_unlock_irqrestore+0x31/0x60
&lt;4&gt; [317.128404]  kunit_generic_run_threadfn_adapter+0x1e/0x40 [ku
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49942/">CVE-2024-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49942">CVE-2024-49942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232168">SUSE bug 1232168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49943" ref_url="https://www.suse.com/security/cve/CVE-2024-49943" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc_submit: add missing locking in wedged_fini

Any non-wedged queue can have a zero refcount here and can be running
concurrently with an async queue destroy, therefore dereferencing the
queue ptr to check wedge status after the lookup can trigger UAF if
queue is not wedged.  Fix this by keeping the submission_state lock held
around the check to postpone the free and make the check safe, before
dropping again around the put() to avoid the deadlock.

(cherry picked from commit d28af0b6b9580b9f90c265a7da0315b0ad20bbfd)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49943/">CVE-2024-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49943">CVE-2024-49943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232167">SUSE bug 1232167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: do not assume bh is held in ppp_channel_bridge_input()

Networking receive path is usually handled from BH handler.
However, some protocols need to acquire the socket lock, and
packets might be stored in the socket backlog is the socket was
owned by a user process.

In this case, release_sock(), __release_sock(), and sk_backlog_rcv()
might call the sk-&gt;sk_backlog_rcv() handler in process context.

sybot caught ppp was not considering this case in
ppp_channel_bridge_input() :

WARNING: inconsistent lock state
6.11.0-rc7-syzkaller-g5f5673607153 #0 Not tainted
--------------------------------
inconsistent {SOFTIRQ-ON-W} -&gt; {IN-SOFTIRQ-W} usage.
ksoftirqd/1/24 [HC0[0]:SC1[1]:HE1:SE0] takes:
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
{SOFTIRQ-ON-W} state was registered at:
   lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5759
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x48/0x60 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
   ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
   pppoe_rcv_core+0xfc/0x314 drivers/net/ppp/pppoe.c:379
   sk_backlog_rcv include/net/sock.h:1111 [inline]
   __release_sock+0x1a8/0x3d8 net/core/sock.c:3004
   release_sock+0x68/0x1b8 net/core/sock.c:3558
   pppoe_sendmsg+0xc8/0x5d8 drivers/net/ppp/pppoe.c:903
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg net/socket.c:745 [inline]
   __sys_sendto+0x374/0x4f4 net/socket.c:2204
   __do_sys_sendto net/socket.c:2216 [inline]
   __se_sys_sendto net/socket.c:2212 [inline]
   __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2212
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
irq event stamp: 282914
 hardirqs last  enabled at (282914): [&lt;ffff80008b42e30c&gt;] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
 hardirqs last  enabled at (282914): [&lt;ffff80008b42e30c&gt;] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194
 hardirqs last disabled at (282913): [&lt;ffff80008b42e13c&gt;] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline]
 hardirqs last disabled at (282913): [&lt;ffff80008b42e13c&gt;] _raw_spin_lock_irqsave+0x2c/0x7c kernel/locking/spinlock.c:162
 softirqs last  enabled at (282904): [&lt;ffff8000801f8e88&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
 softirqs last  enabled at (282904): [&lt;ffff8000801f8e88&gt;] handle_softirqs+0xa3c/0xbfc kernel/softirq.c:582
 softirqs last disabled at (282909): [&lt;ffff8000801fbdf8&gt;] run_ksoftirqd+0x70/0x158 kernel/softirq.c:928

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&amp;pch-&gt;downl);
  &lt;Interrupt&gt;
    lock(&amp;pch-&gt;downl);

 *** DEADLOCK ***

1 lock held by ksoftirqd/1/24:
  #0: ffff80008f74dfa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:325

stack backtrace:
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call trace:
  dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319
  show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326
  __dump_sta
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232164">SUSE bug 1232164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: test for not too small csum_start in virtio_net_hdr_to_skb()

syzbot was able to trigger this warning [1], after injecting a
malicious packet through af_packet, setting skb-&gt;csum_start and thus
the transport header to an incorrect value.

We can at least make sure the transport header is after
the end of the network header (with a estimated minimal size).

[1]
[   67.873027] skb len=4096 headroom=16 headlen=14 tailroom=0
mac=(-1,-1) mac_len=0 net=(16,-6) trans=10
shinfo(txflags=0 nr_frags=1 gso(size=0 type=0 segs=0))
csum(0xa start=10 offset=0 ip_summed=3 complete_sw=0 valid=0 level=0)
hash(0x0 sw=0 l4=0) proto=0x0800 pkttype=0 iif=0
priority=0x0 mark=0x0 alloc_cpu=10 vlan_all=0x0
encapsulation=0 inner(proto=0x0000, mac=0, net=0, trans=0)
[   67.877172] dev name=veth0_vlan feat=0x000061164fdd09e9
[   67.877764] sk family=17 type=3 proto=0
[   67.878279] skb linear:   00000000: 00 00 10 00 00 00 00 00 0f 00 00 00 08 00
[   67.879128] skb frag:     00000000: 0e 00 07 00 00 00 28 00 08 80 1c 00 04 00 00 02
[   67.879877] skb frag:     00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.880647] skb frag:     00000020: 00 00 02 00 00 00 08 00 1b 00 00 00 00 00 00 00
[   67.881156] skb frag:     00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.881753] skb frag:     00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.882173] skb frag:     00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.882790] skb frag:     00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.883171] skb frag:     00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.883733] skb frag:     00000080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.884206] skb frag:     00000090: 00 00 00 00 00 00 00 00 00 00 69 70 76 6c 61 6e
[   67.884704] skb frag:     000000a0: 31 00 00 00 00 00 00 00 00 00 2b 00 00 00 00 00
[   67.885139] skb frag:     000000b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.885677] skb frag:     000000c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.886042] skb frag:     000000d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.886408] skb frag:     000000e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.887020] skb frag:     000000f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.887384] skb frag:     00000100: 00 00
[   67.887878] ------------[ cut here ]------------
[   67.887908] offset (-6) &gt;= skb_headlen() (14)
[   67.888445] WARNING: CPU: 10 PID: 2088 at net/core/dev.c:3332 skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.889353] Modules linked in: macsec macvtap macvlan hsr wireguard curve25519_x86_64 libcurve25519_generic libchacha20poly1305 chacha_x86_64 libchacha poly1305_x86_64 dummy bridge sr_mod cdrom evdev pcspkr i2c_piix4 9pnet_virtio 9p 9pnet netfs
[   67.890111] CPU: 10 UID: 0 PID: 2088 Comm: b363492833 Not tainted 6.11.0-virtme #1011
[   67.890183] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   67.890309] RIP: 0010:skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891043] Call Trace:
[   67.891173]  &lt;TASK&gt;
[   67.891274] ? __warn (kernel/panic.c:741)
[   67.891320] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891333] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[   67.891348] ? handle_bug (arch/x86/kernel/traps.c:239)
[   67.891363] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[   67.891372] ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)
[   67.891388] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891399] ? skb_checksum_help (net/core/dev.c:3332 (discriminator 2))
[   67.891416] ip_do_fragment (net/ipv4/ip_output.c:777 (discriminator 1))
[   67.891448] ? __ip_local_out (./include/linux/skbuff.h:1146 ./include/net/l3mdev.h:196 ./include/net/l3mdev.h:213 ne
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232162">SUSE bug 1232162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49949</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: avoid potential underflow in qdisc_pkt_len_init() with UFO

After commit 7c6d2ecbda83 ("net: be more gentle about silly gso
requests coming from user") virtio_net_hdr_to_skb() had sanity check
to detect malicious attempts from user space to cook a bad GSO packet.

Then commit cf9acc90c80ec ("net: virtio_net_hdr_to_skb: count
transport header in UFO") while fixing one issue, allowed user space
to cook a GSO packet with the following characteristic :

IPv4 SKB_GSO_UDP, gso_size=3, skb-&gt;len = 28.

When this packet arrives in qdisc_pkt_len_init(), we end up
with hdr_len = 28 (IPv4 header + UDP header), matching skb-&gt;len

Then the following sets gso_segs to 0 :

gso_segs = DIV_ROUND_UP(skb-&gt;len - hdr_len,
                        shinfo-&gt;gso_size);

Then later we set qdisc_skb_cb(skb)-&gt;pkt_len to back to zero :/

qdisc_skb_cb(skb)-&gt;pkt_len += (gso_segs - 1) * hdr_len;

This leads to the following crash in fq_codel [1]

qdisc_pkt_len_init() is best effort, we only want an estimation
of the bytes sent on the wire, not crashing the kernel.

This patch is fixing this particular issue, a following one
adds more sanity checks for another potential bug.

[1]
[   70.724101] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   70.724561] #PF: supervisor read access in kernel mode
[   70.724561] #PF: error_code(0x0000) - not-present page
[   70.724561] PGD 10ac61067 P4D 10ac61067 PUD 107ee2067 PMD 0
[   70.724561] Oops: Oops: 0000 [#1] SMP NOPTI
[   70.724561] CPU: 11 UID: 0 PID: 2163 Comm: b358537762 Not tainted 6.11.0-virtme #991
[   70.724561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.724561] RIP: 0010:fq_codel_enqueue (net/sched/sch_fq_codel.c:120 net/sched/sch_fq_codel.c:168 net/sched/sch_fq_codel.c:230) sch_fq_codel
[ 70.724561] Code: 24 08 49 c1 e1 06 44 89 7c 24 18 45 31 ed 45 31 c0 31 ff 89 44 24 14 4c 03 8b 90 01 00 00 eb 04 39 ca 73 37 4d 8b 39 83 c7 01 &lt;49&gt; 8b 17 49 89 11 41 8b 57 28 45 8b 5f 34 49 c7 07 00 00 00 00 49
All code
========
   0:	24 08                	and    $0x8,%al
   2:	49 c1 e1 06          	shl    $0x6,%r9
   6:	44 89 7c 24 18       	mov    %r15d,0x18(%rsp)
   b:	45 31 ed             	xor    %r13d,%r13d
   e:	45 31 c0             	xor    %r8d,%r8d
  11:	31 ff                	xor    %edi,%edi
  13:	89 44 24 14          	mov    %eax,0x14(%rsp)
  17:	4c 03 8b 90 01 00 00 	add    0x190(%rbx),%r9
  1e:	eb 04                	jmp    0x24
  20:	39 ca                	cmp    %ecx,%edx
  22:	73 37                	jae    0x5b
  24:	4d 8b 39             	mov    (%r9),%r15
  27:	83 c7 01             	add    $0x1,%edi
  2a:*	49 8b 17             	mov    (%r15),%rdx		&lt;-- trapping instruction
  2d:	49 89 11             	mov    %rdx,(%r9)
  30:	41 8b 57 28          	mov    0x28(%r15),%edx
  34:	45 8b 5f 34          	mov    0x34(%r15),%r11d
  38:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  3f:	49                   	rex.WB

Code starting with the faulting instruction
===========================================
   0:	49 8b 17             	mov    (%r15),%rdx
   3:	49 89 11             	mov    %rdx,(%r9)
   6:	41 8b 57 28          	mov    0x28(%r15),%edx
   a:	45 8b 5f 34          	mov    0x34(%r15),%r11d
   e:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  15:	49                   	rex.WB
[   70.724561] RSP: 0018:ffff95ae85e6fb90 EFLAGS: 00000202
[   70.724561] RAX: 0000000002000000 RBX: ffff95ae841de000 RCX: 0000000000000000
[   70.724561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
[   70.724561] RBP: ffff95ae85e6fbf8 R08: 0000000000000000 R09: ffff95b710a30000
[   70.724561] R10: 0000000000000000 R11: bdf289445ce31881 R12: ffff95ae85e6fc58
[   70.724561] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000000
[   70.724561] FS:  000000002c5c1380(0000) GS:ffff95bd7fcc0000(0000) knlGS:0000000000000000
[   70.724561] CS:  0010 DS: 0000 ES: 0000 C
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232160">SUSE bug 1232160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49951</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49951" ref_url="https://www.suse.com/security/cve/CVE-2024-49951" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible crash on mgmt_index_removed

If mgmt_index_removed is called while there are commands queued on
cmd_sync it could lead to crashes like the bellow trace:

0x0000053D: __list_del_entry_valid_or_report+0x98/0xdc
0x0000053D: mgmt_pending_remove+0x18/0x58 [bluetooth]
0x0000053E: mgmt_remove_adv_monitor_complete+0x80/0x108 [bluetooth]
0x0000053E: hci_cmd_sync_work+0xbc/0x164 [bluetooth]

So while handling mgmt_index_removed this attempts to dequeue
commands passed as user_data to cmd_sync.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49951/">CVE-2024-49951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232158">SUSE bug 1232158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49953</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49953" ref_url="https://www.suse.com/security/cve/CVE-2024-49953" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice

The km.state is not checked in driver's delayed work. When
xfrm_state_check_expire() is called, the state can be reset to
XFRM_STATE_EXPIRED, even if it is XFRM_STATE_DEAD already. This
happens when xfrm state is deleted, but not freed yet. As
__xfrm_state_delete() is called again in xfrm timer, the following
crash occurs.

To fix this issue, skip xfrm_state_check_expire() if km.state is not
XFRM_STATE_VALID.

 Oops: general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] SMP
 CPU: 5 UID: 0 PID: 7448 Comm: kworker/u102:2 Not tainted 6.11.0-rc2+ #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 Workqueue: mlx5e_ipsec: eth%d mlx5e_ipsec_handle_sw_limits [mlx5_core]
 RIP: 0010:__xfrm_state_delete+0x3d/0x1b0
 Code: 0f 84 8b 01 00 00 48 89 fd c6 87 c8 00 00 00 05 48 8d bb 40 10 00 00 e8 11 04 1a 00 48 8b 95 b8 00 00 00 48 8b 85 c0 00 00 00 &lt;48&gt; 89 42 08 48 89 10 48 8b 55 10 48 b8 00 01 00 00 00 00 ad de 48
 RSP: 0018:ffff88885f945ec8 EFLAGS: 00010246
 RAX: dead000000000122 RBX: ffffffff82afa940 RCX: 0000000000000036
 RDX: dead000000000100 RSI: 0000000000000000 RDI: ffffffff82afb980
 RBP: ffff888109a20340 R08: ffff88885f945ea0 R09: 0000000000000000
 R10: 0000000000000000 R11: ffff88885f945ff8 R12: 0000000000000246
 R13: ffff888109a20340 R14: ffff88885f95f420 R15: ffff88885f95f400
 FS:  0000000000000000(0000) GS:ffff88885f940000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f2163102430 CR3: 00000001128d6001 CR4: 0000000000370eb0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  ? die_addr+0x33/0x90
  ? exc_general_protection+0x1a2/0x390
  ? asm_exc_general_protection+0x22/0x30
  ? __xfrm_state_delete+0x3d/0x1b0
  ? __xfrm_state_delete+0x2f/0x1b0
  xfrm_timer_handler+0x174/0x350
  ? __xfrm_state_delete+0x1b0/0x1b0
  __hrtimer_run_queues+0x121/0x270
  hrtimer_run_softirq+0x88/0xd0
  handle_softirqs+0xcc/0x270
  do_softirq+0x3c/0x50
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  __local_bh_enable_ip+0x47/0x50
  mlx5e_ipsec_handle_sw_limits+0x7d/0x90 [mlx5_core]
  process_one_work+0x137/0x2d0
  worker_thread+0x28d/0x3a0
  ? rescuer_thread+0x480/0x480
  kthread+0xb8/0xe0
  ? kthread_park+0x80/0x80
  ret_from_fork+0x2d/0x50
  ? kthread_park+0x80/0x80
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49953/">CVE-2024-49953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49953">CVE-2024-49953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232156">SUSE bug 1232156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49954</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

static_call: Replace pointless WARN_ON() in static_call_module_notify()

static_call_module_notify() triggers a WARN_ON(), when memory allocation
fails in __static_call_add_module().

That's not really justified, because the failure case must be correctly
handled by the well known call chain and the error code is passed
through to the initiating userspace application.

A memory allocation fail is not a fatal problem, but the WARN_ON() takes
the machine out when panic_on_warn is set.

Replace it with a pr_warn().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232155">SUSE bug 1232155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49955</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49955" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: battery: Fix possible crash when unregistering a battery hook

When a battery hook returns an error when adding a new battery, then
the battery hook is automatically unregistered.
However the battery hook provider cannot know that, so it will later
call battery_hook_unregister() on the already unregistered battery
hook, resulting in a crash.

Fix this by using the list head to mark already unregistered battery
hooks as already being unregistered so that they can be ignored by
battery_hook_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232154">SUSE bug 1232154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49956</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49956" ref_url="https://www.suse.com/security/cve/CVE-2024-49956" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: fix double destroy_workqueue error

When gfs2_fill_super() fails, destroy_workqueue() is called within
gfs2_gl_hash_clear(), and the subsequent code path calls
destroy_workqueue() on the same work queue again.

This issue can be fixed by setting the work queue pointer to NULL after
the first destroy_workqueue() call and checking for a NULL pointer
before attempting to destroy the work queue again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49956/">CVE-2024-49956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49956">CVE-2024-49956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232153">SUSE bug 1232153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49960</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix timer use-after-free on failed mount

Syzbot has found an ODEBUG bug in ext4_fill_super

The del_timer_sync function cancels the s_err_report timer,
which reminds about filesystem errors daily. We should
guarantee the timer is no longer active before kfree(sbi).

When filesystem mounting fails, the flow goes to failed_mount3,
where an error occurs when ext4_stop_mmpd is called, causing
a read I/O failure. This triggers the ext4_handle_error function
that ultimately re-arms the timer,
leaving the s_err_report timer active before kfree(sbi) is called.

Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232803">SUSE bug 1232803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49961</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49961" ref_url="https://www.suse.com/security/cve/CVE-2024-49961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: i2c: ar0521: Use cansleep version of gpiod_set_value()

If we use GPIO reset from I2C port expander, we must use *_cansleep()
variant of GPIO functions.
This was not done in ar0521_power_on()/ar0521_power_off() functions.
Let's fix that.

------------[ cut here ]------------
WARNING: CPU: 0 PID: 11 at drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x74/0x7c
Modules linked in:
CPU: 0 PID: 11 Comm: kworker/u16:0 Not tainted 6.10.0 #53
Hardware name: Diasom DS-RK3568-SOM-EVB (DT)
Workqueue: events_unbound deferred_probe_work_func
pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : gpiod_set_value+0x74/0x7c
lr : ar0521_power_on+0xcc/0x290
sp : ffffff8001d7ab70
x29: ffffff8001d7ab70 x28: ffffff80027dcc90 x27: ffffff8003c82000
x26: ffffff8003ca9250 x25: ffffffc080a39c60 x24: ffffff8003ca9088
x23: ffffff8002402720 x22: ffffff8003ca9080 x21: ffffff8003ca9088
x20: 0000000000000000 x19: ffffff8001eb2a00 x18: ffffff80efeeac80
x17: 756d2d6332692f30 x16: 0000000000000000 x15: 0000000000000000
x14: ffffff8001d91d40 x13: 0000000000000016 x12: ffffffc080e98930
x11: ffffff8001eb2880 x10: 0000000000000890 x9 : ffffff8001d7a9f0
x8 : ffffff8001d92570 x7 : ffffff80efeeac80 x6 : 000000003fc6e780
x5 : ffffff8001d91c80 x4 : 0000000000000002 x3 : 0000000000000000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000001
Call trace:
 gpiod_set_value+0x74/0x7c
 ar0521_power_on+0xcc/0x290
...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49961/">CVE-2024-49961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49961">CVE-2024-49961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232148">SUSE bug 1232148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49964</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49964" ref_url="https://www.suse.com/security/cve/CVE-2024-49964" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix memfd_pin_folios free_huge_pages leak

memfd_pin_folios followed by unpin_folios fails to restore free_huge_pages
if the pages were not already faulted in, because the folio refcount for
pages created by memfd_alloc_folio never goes to 0.  memfd_pin_folios
needs another folio_put to undo the folio_try_get below:

memfd_alloc_folio()
  alloc_hugetlb_folio_nodemask()
    dequeue_hugetlb_folio_nodemask()
      dequeue_hugetlb_folio_node_exact()
        folio_ref_unfreeze(folio, 1);    ; adds 1 refcount
  folio_try_get()                        ; adds 1 refcount
  hugetlb_add_to_page_cache()            ; adds 512 refcount (on x86)

With the fix, after memfd_pin_folios + unpin_folios, the refcount for the
(unfaulted) page is 512, which is correct, as the refcount for a faulted
unpinned page is 513.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49964/">CVE-2024-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49964">CVE-2024-49964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232144">SUSE bug 1232144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49965</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove unreasonable unlock in ocfs2_read_blocks

Patch series "Misc fixes for ocfs2_read_blocks", v5.

This series contains 2 fixes for ocfs2_read_blocks().  The first patch fix
the issue reported by syzbot, which detects bad unlock balance in
ocfs2_read_blocks().  The second patch fixes an issue reported by Heming
Zhao when reviewing above fix.


This patch (of 2):

There was a lock release before exiting, so remove the unreasonable unlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232142">SUSE bug 1232142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49968</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: filesystems without casefold feature cannot be mounted with siphash

When mounting the ext4 filesystem, if the default hash version is set to
DX_HASH_SIPHASH but the casefold feature is not set, exit the mounting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232264">SUSE bug 1232264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49969</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix index out of bounds in DCN30 color transformation

This commit addresses a potential index out of bounds issue in the
`cm3_helper_translate_curve_to_hw_format` function in the DCN30 color
management module. The issue could occur when the index 'i' exceeds the
number of transfer function points (TRANSFER_FUNC_POINTS).

The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds, the function returns
false to indicate an error.

drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:180 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.red' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:181 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.green' 1025 &lt;= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn30/dcn30_cm_common.c:182 cm3_helper_translate_curve_to_hw_format() error: buffer overflow 'output_tf-&gt;tf_pts.blue' 1025 &lt;= s32max
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232524">SUSE bug 1232524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49970</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49970" ref_url="https://www.suse.com/security/cve/CVE-2024-49970" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Implement bounds check for stream encoder creation in DCN401

'stream_enc_regs' array is an array of dcn10_stream_enc_registers
structures. The array is initialized with four elements, corresponding
to the four calls to stream_enc_regs() in the array initializer. This
means that valid indices for this array are 0, 1, 2, and 3.

The error message 'stream_enc_regs' 4 &lt;= 5 below, is indicating that
there is an attempt to access this array with an index of 5, which is
out of bounds. This could lead to undefined behavior

Here, eng_id is used as an index to access the stream_enc_regs array. If
eng_id is 5, this would result in an out-of-bounds access on the
stream_enc_regs array.

Thus fixing Buffer overflow error in dcn401_stream_encoder_create

Found by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn401/dcn401_resource.c:1209 dcn401_stream_encoder_create() error: buffer overflow 'stream_enc_regs' 4 &lt;= 5
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49970/">CVE-2024-49970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49970">CVE-2024-49970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232516">SUSE bug 1232516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49971</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49971" ref_url="https://www.suse.com/security/cve/CVE-2024-49971" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Increase array size of dummy_boolean

[WHY]
dml2_core_shared_mode_support and dml_core_mode_support access the third
element of dummy_boolean, i.e. hw_debug5 = &amp;s-&gt;dummy_boolean[2], when
dummy_boolean has size of 2. Any assignment to hw_debug5 causes an
OVERRUN.

[HOW]
Increase dummy_boolean's array size to 3.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49971/">CVE-2024-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49971">CVE-2024-49971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232473">SUSE bug 1232473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49972</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49972" ref_url="https://www.suse.com/security/cve/CVE-2024-49972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Deallocate DML memory if allocation fails

[Why]
When DC state create DML memory allocation fails, memory is not
deallocated subsequently, resulting in uninitialized structure
that is not NULL.

[How]
Deallocate memory if DML memory allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49972/">CVE-2024-49972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49972">CVE-2024-49972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232315">SUSE bug 1232315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49973</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: add tally counter fields added with RTL8125

RTL8125 added fields to the tally counter, what may result in the chip
dma'ing these new fields to unallocated memory. Therefore make sure
that the allocated memory area is big enough to hold all of the
tally counter values, even if we use only parts of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232105">SUSE bug 1232105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49974</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Limit the number of concurrent async COPY operations

Nothing appears to limit the number of concurrent async COPY
operations that clients can start. In addition, AFAICT each async
COPY can copy an unlimited number of 4MB chunks, so can run for a
long time. Thus IMO async COPY can become a DoS vector.

Add a restriction mechanism that bounds the number of concurrent
background COPY operations. Start simple and try to be fair -- this
patch implements a per-namespace limit.

An async COPY request that occurs while this limit is exceeded gets
NFS4ERR_DELAY. The requesting client can choose to send the request
again after a delay or fall back to a traditional read/write style
copy.

If there is need to make the mechanism more sophisticated, we can
visit that in future patches.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232384">SUSE bug 1232384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49976</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49976" ref_url="https://www.suse.com/security/cve/CVE-2024-49976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/timerlat: Drop interface_lock in stop_kthread()

stop_kthread() is the offline callback for "trace/osnoise:online", since
commit 5bfbcd1ee57b ("tracing/timerlat: Add interface_lock around clearing
of kthread in stop_kthread()"), the following ABBA deadlock scenario is
introduced:

T1                            | T2 [BP]               | T3 [AP]
osnoise_hotplug_workfn()      | work_for_cpu_fn()     | cpuhp_thread_fun()
                              |   _cpu_down()         |   osnoise_cpu_die()
  mutex_lock(&amp;interface_lock) |                       |     stop_kthread()
                              |     cpus_write_lock() |       mutex_lock(&amp;interface_lock)
  cpus_read_lock()            |     cpuhp_kick_ap()   |

As the interface_lock here in just for protecting the "kthread" field of
the osn_var, use xchg() instead to fix this issue. Also use
for_each_online_cpu() back in stop_per_cpu_kthreads() as it can take
cpu_read_lock() again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49976/">CVE-2024-49976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49976">CVE-2024-49976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232103">SUSE bug 1232103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49977</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49977" ref_url="https://www.suse.com/security/cve/CVE-2024-49977" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Fix zero-division error when disabling tc cbs

The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider
when offload is disabled") allows the "port_transmit_rate_kbps" to be
set to a value of 0, which is then passed to the "div_s64" function when
tc-cbs is disabled. This leads to a zero-division error.

When tc-cbs is disabled, the idleslope, sendslope, and credit values the
credit values are not required to be configured. Therefore, adding a return
statement after setting the txQ mode to DCB when tc-cbs is disabled would
prevent a zero-division error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49977/">CVE-2024-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232102">SUSE bug 1232102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49978</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49978" ref_url="https://www.suse.com/security/cve/CVE-2024-49978" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gso: fix udp gso fraglist segmentation after pull from frag_list

Detect gso fraglist skbs with corrupted geometry (see below) and
pass these to skb_segment instead of skb_segment_list, as the first
can segment them correctly.

Valid SKB_GSO_FRAGLIST skbs
- consist of two or more segments
- the head_skb holds the protocol headers plus first gso_size
- one or more frag_list skbs hold exactly one segment
- all but the last must be gso_size

Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can
modify these skbs, breaking these invariants.

In extreme cases they pull all data into skb linear. For UDP, this
causes a NULL ptr deref in __udpv4_gso_segment_list_csum at
udp_hdr(seg-&gt;next)-&gt;dest.

Detect invalid geometry due to pull, by checking head_skb size.
Don't just drop, as this may blackhole a destination. Convert to be
able to pass to regular skb_segment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49978/">CVE-2024-49978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49978">CVE-2024-49978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232101">SUSE bug 1232101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49979</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49979" ref_url="https://www.suse.com/security/cve/CVE-2024-49979" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gso: fix tcp fraglist segmentation after pull from frag_list

Detect tcp gso fraglist skbs with corrupted geometry (see below) and
pass these to skb_segment instead of skb_segment_list, as the first
can segment them correctly.

Valid SKB_GSO_FRAGLIST skbs
- consist of two or more segments
- the head_skb holds the protocol headers plus first gso_size
- one or more frag_list skbs hold exactly one segment
- all but the last must be gso_size

Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can
modify these skbs, breaking these invariants.

In extreme cases they pull all data into skb linear. For TCP, this
causes a NULL ptr deref in __tcpv4_gso_segment_list_csum at
tcp_hdr(seg-&gt;next).

Detect invalid geometry due to pull, by checking head_skb size.
Don't just drop, as this may blackhole a destination. Convert to be
able to pass to regular skb_segment.

Approach and description based on a patch by Willem de Bruijn.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49979/">CVE-2024-49979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49979">CVE-2024-49979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232100">SUSE bug 1232100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49980</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49980" ref_url="https://www.suse.com/security/cve/CVE-2024-49980" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vrf: revert "vrf: Remove unnecessary RCU-bh critical section"

This reverts commit 504fc6f4f7f681d2a03aa5f68aad549d90eab853.

dev_queue_xmit_nit is expected to be called with BH disabled.
__dev_queue_xmit has the following:

        /* Disable soft irqs for various locks below. Also
         * stops preemption for RCU.
         */
        rcu_read_lock_bh();

VRF must follow this invariant. The referenced commit removed this
protection. Which triggered a lockdep warning:

	================================
	WARNING: inconsistent lock state
	6.11.0 #1 Tainted: G        W
	--------------------------------
	inconsistent {IN-SOFTIRQ-W} -&gt; {SOFTIRQ-ON-W} usage.
	btserver/134819 [HC0[0]:SC0[0]:HE1:SE1] takes:
	ffff8882da30c118 (rlock-AF_PACKET){+.?.}-{2:2}, at: tpacket_rcv+0x863/0x3b30
	{IN-SOFTIRQ-W} state was registered at:
	  lock_acquire+0x19a/0x4f0
	  _raw_spin_lock+0x27/0x40
	  packet_rcv+0xa33/0x1320
	  __netif_receive_skb_core.constprop.0+0xcb0/0x3a90
	  __netif_receive_skb_list_core+0x2c9/0x890
	  netif_receive_skb_list_internal+0x610/0xcc0
          [...]

	other info that might help us debug this:
	 Possible unsafe locking scenario:

	       CPU0
	       ----
	  lock(rlock-AF_PACKET);
	  &lt;Interrupt&gt;
	    lock(rlock-AF_PACKET);

	 *** DEADLOCK ***

	Call Trace:
	 &lt;TASK&gt;
	 dump_stack_lvl+0x73/0xa0
	 mark_lock+0x102e/0x16b0
	 __lock_acquire+0x9ae/0x6170
	 lock_acquire+0x19a/0x4f0
	 _raw_spin_lock+0x27/0x40
	 tpacket_rcv+0x863/0x3b30
	 dev_queue_xmit_nit+0x709/0xa40
	 vrf_finish_direct+0x26e/0x340 [vrf]
	 vrf_l3_out+0x5f4/0xe80 [vrf]
	 __ip_local_out+0x51e/0x7a0
          [...]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49980/">CVE-2024-49980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49980">CVE-2024-49980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232099">SUSE bug 1232099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49981</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: fix use after free bug in venus_remove due to race condition

in venus_probe, core-&gt;work is bound with venus_sys_error_handler, which is
used to handle error. The code use core-&gt;sys_err_done to make sync work.
The core-&gt;work is started in venus_event_notify.

If we call venus_remove, there might be an unfished work. The possible
sequence is as follows:

CPU0                  CPU1

                     |venus_sys_error_handler
venus_remove         |
hfi_destroy	 		 |
venus_hfi_destroy	 |
kfree(hdev);	     |
                     |hfi_reinit
					 |venus_hfi_queues_reinit
                     |//use hdev

Fix it by canceling the work in venus_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232098">SUSE bug 1232098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49982</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in more places

For fixing CVE-2023-6270, f98364e92662 ("aoe: fix the potential
use-after-free problem in aoecmd_cfg_pkts") makes tx() calling dev_put()
instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs
into use-after-free.

Then Nicolai Stange found more places in aoe have potential use-after-free
problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()
and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push
packet to tx queue. So they should also use dev_hold() to increase the
refcnt of skb-&gt;dev.

On the other hand, moving dev_put() to tx() causes that the refcnt of
skb-&gt;dev be reduced to a negative value, because corresponding
dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),
probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49983</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free

When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(),
the 'ppath' is updated but it is the 'path' that is freed, thus potentially
triggering a double-free in the following process:

ext4_ext_replay_update_ex
  ppath = path
  ext4_force_split_extent_at(&amp;ppath)
    ext4_split_extent_at
      ext4_ext_insert_extent
        ext4_ext_create_new_leaf
          ext4_ext_grow_indepth
            ext4_find_extent
              if (depth &gt; path[0].p_maxdepth)
                kfree(path)                 ---&gt; path First freed
                *orig_path = path = NULL    ---&gt; null ppath
  kfree(path)                               ---&gt; path double-free !!!

So drop the unnecessary ppath and use path directly to avoid this problem.
And use ext4_find_extent() directly to update path, avoiding unnecessary
memory allocation and freeing. Also, propagate the error returned by
ext4_find_extent() instead of using strange error codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232096">SUSE bug 1232096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49984</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49984" ref_url="https://www.suse.com/security/cve/CVE-2024-49984" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Prevent out of bounds access in performance query extensions

Check that the number of perfmons userspace is passing in the copy and
reset extensions is not greater than the internal kernel storage where
the ids will be copied into.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49984/">CVE-2024-49984 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49984">CVE-2024-49984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232095">SUSE bug 1232095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49985</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume

In case there is any sort of clock controller attached to this I2C bus
controller, for example Versaclock or even an AIC32x4 I2C codec, then
an I2C transfer triggered from the clock controller clk_ops .prepare
callback may trigger a deadlock on drivers/clk/clk.c prepare_lock mutex.

This is because the clock controller first grabs the prepare_lock mutex
and then performs the prepare operation, including its I2C access. The
I2C access resumes this I2C bus controller via .runtime_resume callback,
which calls clk_prepare_enable(), which attempts to grab the prepare_lock
mutex again and deadlocks.

Since the clock are already prepared since probe() and unprepared in
remove(), use simple clk_enable()/clk_disable() calls to enable and
disable the clock on runtime suspend and resume, to avoid hitting the
prepare_lock mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232094">SUSE bug 1232094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49986</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49986" ref_url="https://www.suse.com/security/cve/CVE-2024-49986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors

x86_android_tablet_remove() frees the pdevs[] array, so it should not
be used after calling x86_android_tablet_remove().

When platform_device_register() fails, store the pdevs[x] PTR_ERR() value
into the local ret variable before calling x86_android_tablet_remove()
to avoid using pdevs[] after it has been freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49986/">CVE-2024-49986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49986">CVE-2024-49986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232093">SUSE bug 1232093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49987</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49987" ref_url="https://www.suse.com/security/cve/CVE-2024-49987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpftool: Fix undefined behavior in qsort(NULL, 0, ...)

When netfilter has no entry to display, qsort is called with
qsort(NULL, 0, ...). This results in undefined behavior, as UBSan
reports:

net.c:827:2: runtime error: null pointer passed as argument 1, which is declared to never be null

Although the C standard does not explicitly state whether calling qsort
with a NULL pointer when the size is 0 constitutes undefined behavior,
Section 7.1.4 of the C standard (Use of library functions) mentions:

"Each of the following statements applies unless explicitly stated
otherwise in the detailed descriptions that follow: If an argument to a
function has an invalid value (such as a value outside the domain of
the function, or a pointer outside the address space of the program, or
a null pointer, or a pointer to non-modifiable storage when the
corresponding parameter is not const-qualified) or a type (after
promotion) not expected by a function with variable number of
arguments, the behavior is undefined."

To avoid this, add an early return when nf_link_info is NULL to prevent
calling qsort with a NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49987/">CVE-2024-49987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49987">CVE-2024-49987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232258">SUSE bug 1232258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49988</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49988" ref_url="https://www.suse.com/security/cve/CVE-2024-49988" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: add refcnt to ksmbd_conn struct

When sending an oplock break request, opinfo-&gt;conn is used,
But freed -&gt;conn can be used on multichannel.
This patch add a reference count to the ksmbd_conn struct
so that it can be freed when it is no longer used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49988/">CVE-2024-49988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49988">CVE-2024-49988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232482">SUSE bug 1232482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49989</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix double free issue during amdgpu module unload

Flexible endpoints use DIGs from available inflexible endpoints,
so only the encoders of inflexible links need to be freed.
Otherwise, a double free issue may occur when unloading the
amdgpu module.

[  279.190523] RIP: 0010:__slab_free+0x152/0x2f0
[  279.190577] Call Trace:
[  279.190580]  &lt;TASK&gt;
[  279.190582]  ? show_regs+0x69/0x80
[  279.190590]  ? die+0x3b/0x90
[  279.190595]  ? do_trap+0xc8/0xe0
[  279.190601]  ? do_error_trap+0x73/0xa0
[  279.190605]  ? __slab_free+0x152/0x2f0
[  279.190609]  ? exc_invalid_op+0x56/0x70
[  279.190616]  ? __slab_free+0x152/0x2f0
[  279.190642]  ? asm_exc_invalid_op+0x1f/0x30
[  279.190648]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191096]  ? __slab_free+0x152/0x2f0
[  279.191102]  ? dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191469]  kfree+0x260/0x2b0
[  279.191474]  dcn10_link_encoder_destroy+0x19/0x30 [amdgpu]
[  279.191821]  link_destroy+0xd7/0x130 [amdgpu]
[  279.192248]  dc_destruct+0x90/0x270 [amdgpu]
[  279.192666]  dc_destroy+0x19/0x40 [amdgpu]
[  279.193020]  amdgpu_dm_fini+0x16e/0x200 [amdgpu]
[  279.193432]  dm_hw_fini+0x26/0x40 [amdgpu]
[  279.193795]  amdgpu_device_fini_hw+0x24c/0x400 [amdgpu]
[  279.194108]  amdgpu_driver_unload_kms+0x4f/0x70 [amdgpu]
[  279.194436]  amdgpu_pci_remove+0x40/0x80 [amdgpu]
[  279.194632]  pci_device_remove+0x3a/0xa0
[  279.194638]  device_remove+0x40/0x70
[  279.194642]  device_release_driver_internal+0x1ad/0x210
[  279.194647]  driver_detach+0x4e/0xa0
[  279.194650]  bus_remove_driver+0x6f/0xf0
[  279.194653]  driver_unregister+0x33/0x60
[  279.194657]  pci_unregister_driver+0x44/0x90
[  279.194662]  amdgpu_exit+0x19/0x1f0 [amdgpu]
[  279.194939]  __do_sys_delete_module.isra.0+0x198/0x2f0
[  279.194946]  __x64_sys_delete_module+0x16/0x20
[  279.194950]  do_syscall_64+0x58/0x120
[  279.194954]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[  279.194980]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232483">SUSE bug 1232483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49990</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49990" ref_url="https://www.suse.com/security/cve/CVE-2024-49990" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/hdcp: Check GSC structure validity

Sometimes xe_gsc is not initialized when checked at HDCP capability
check. Add gsc structure check to avoid null pointer error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49990/">CVE-2024-49990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49990">CVE-2024-49990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232484">SUSE bug 1232484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49992</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49992" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49992" ref_url="https://www.suse.com/security/cve/CVE-2024-49992" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/stm: Avoid use-after-free issues with crtc and plane

ltdc_load() calls functions drm_crtc_init_with_planes(),
drm_universal_plane_init() and drm_encoder_init(). These functions
should not be called with parameters allocated with devm_kzalloc()
to avoid use-after-free issues [1].

Use allocations managed by the DRM framework.

Found by Linux Verification Center (linuxtesting.org).

[1]
https://lore.kernel.org/lkml/u366i76e3qhh3ra5oxrtngjtm2u5lterkekcz6y2jkndhuxzli@diujon4h7qwb/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49992/">CVE-2024-49992 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49992">CVE-2024-49992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232430">SUSE bug 1232430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232431">SUSE bug 1232431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49994</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49994" ref_url="https://www.suse.com/security/cve/CVE-2024-49994" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix integer overflow in BLKSECDISCARD

I independently rediscovered

	commit 22d24a544b0d49bbcbd61c8c0eaf77d3c9297155
	block: fix overflow in blk_ioctl_discard()

but for secure erase.

Same problem:

	uint64_t r[2] = {512, 18446744073709551104ULL};
	ioctl(fd, BLKSECDISCARD, r);

will enter near infinite loop inside blkdev_issue_secure_erase():

	a.out: attempt to access beyond end of device
	loop0: rw=5, sector=3399043073, nr_sectors = 1024 limit=2048
	bio_check_eod: 3286214 callbacks suppressed
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49994/">CVE-2024-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49994">CVE-2024-49994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225770">SUSE bug 1225770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49998</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49998" ref_url="https://www.suse.com/security/cve/CVE-2024-49998" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: improve shutdown sequence

Alexander Sverdlin presents 2 problems during shutdown with the
lan9303 driver. One is specific to lan9303 and the other just happens
to reproduce there.

The first problem is that lan9303 is unique among DSA drivers in that it
calls dev_get_drvdata() at "arbitrary runtime" (not probe, not shutdown,
not remove):

phy_state_machine()
-&gt; ...
   -&gt; dsa_user_phy_read()
      -&gt; ds-&gt;ops-&gt;phy_read()
         -&gt; lan9303_phy_read()
            -&gt; chip-&gt;ops-&gt;phy_read()
               -&gt; lan9303_mdio_phy_read()
                  -&gt; dev_get_drvdata()

But we never stop the phy_state_machine(), so it may continue to run
after dsa_switch_shutdown(). Our common pattern in all DSA drivers is
to set drvdata to NULL to suppress the remove() method that may come
afterwards. But in this case it will result in an NPD.

The second problem is that the way in which we set
dp-&gt;conduit-&gt;dsa_ptr = NULL; is concurrent with receive packet
processing. dsa_switch_rcv() checks once whether dev-&gt;dsa_ptr is NULL,
but afterwards, rather than continuing to use that non-NULL value,
dev-&gt;dsa_ptr is dereferenced again and again without NULL checks:
dsa_conduit_find_user() and many other places. In between dereferences,
there is no locking to ensure that what was valid once continues to be
valid.

Both problems have the common aspect that closing the conduit interface
solves them.

In the first case, dev_close(conduit) triggers the NETDEV_GOING_DOWN
event in dsa_user_netdevice_event() which closes user ports as well.
dsa_port_disable_rt() calls phylink_stop(), which synchronously stops
the phylink state machine, and ds-&gt;ops-&gt;phy_read() will thus no longer
call into the driver after this point.

In the second case, dev_close(conduit) should do this, as per
Documentation/networking/driver.rst:

| Quiescence
| ----------
|
| After the ndo_stop routine has been called, the hardware must
| not receive or transmit any data.  All in flight packets must
| be aborted. If necessary, poll or wait for completion of
| any reset commands.

So it should be sufficient to ensure that later, when we zeroize
conduit-&gt;dsa_ptr, there will be no concurrent dsa_switch_rcv() call
on this conduit.

The addition of the netif_device_detach() function is to ensure that
ioctls, rtnetlinks and ethtool requests on the user ports no longer
propagate down to the driver - we're no longer prepared to handle them.

The race condition actually did not exist when commit 0650bf52b31f
("net: dsa: be compatible with masters which unregister on shutdown")
first introduced dsa_switch_shutdown(). It was created later, when we
stopped unregistering the user interfaces from a bad spot, and we just
replaced that sequence with a racy zeroization of conduit-&gt;dsa_ptr
(one which doesn't ensure that the interfaces aren't up).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49998/">CVE-2024-49998 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49998">CVE-2024-49998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232087">SUSE bug 1232087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49999</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49999" ref_url="https://www.suse.com/security/cve/CVE-2024-49999" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix the setting of the server responding flag

In afs_wait_for_operation(), we set transcribe the call responded flag to
the server record that we used after doing the fileserver iteration loop -
but it's possible to exit the loop having had a response from the server
that we've discarded (e.g. it returned an abort or we started receiving
data, but the call didn't complete).

This means that op-&gt;server might be NULL, but we don't check that before
attempting to set the server flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49999/">CVE-2024-49999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49999">CVE-2024-49999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232086">SUSE bug 1232086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50000</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()

In mlx5e_tir_builder_alloc() kvzalloc() may return NULL
which is dereferenced on the next line in a reference
to the modify field.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232085">SUSE bug 1232085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50001</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50001" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix error path in multi-packet WQE transmit

Remove the erroneous unmap in case no DMA mapping was established

The multi-packet WQE transmit code attempts to obtain a DMA mapping for
the skb. This could fail, e.g. under memory pressure, when the IOMMU
driver just can't allocate more memory for page tables. While the code
tries to handle this in the path below the err_unmap label it erroneously
unmaps one entry from the sq's FIFO list of active mappings. Since the
current map attempt failed this unmap is removing some random DMA mapping
that might still be required. If the PCI function now presents that IOVA,
the IOMMU may assumes a rogue DMA access and e.g. on s390 puts the PCI
function in error state.

The erroneous behavior was seen in a stress-test environment that created
memory pressure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232084">SUSE bug 1232084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50002</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

static_call: Handle module init failure correctly in static_call_del_module()

Module insertion invokes static_call_add_module() to initialize the static
calls in a module. static_call_add_module() invokes __static_call_init(),
which allocates a struct static_call_mod to either encapsulate the built-in
static call sites of the associated key into it so further modules can be
added or to append the module to the module chain.

If that allocation fails the function returns with an error code and the
module core invokes static_call_del_module() to clean up eventually added
static_call_mod entries.

This works correctly, when all keys used by the module were converted over
to a module chain before the failure. If not then static_call_del_module()
causes a #GP as it blindly assumes that key::mods points to a valid struct
static_call_mod.

The problem is that key::mods is not a individual struct member of struct
static_call_key, it's part of a union to save space:

        union {
                /* bit 0: 0 = mods, 1 = sites */
                unsigned long type;
                struct static_call_mod *mods;
                struct static_call_site *sites;
	};

key::sites is a pointer to the list of built-in usage sites of the static
call. The type of the pointer is differentiated by bit 0. A mods pointer
has the bit clear, the sites pointer has the bit set.

As static_call_del_module() blidly assumes that the pointer is a valid
static_call_mod type, it fails to check for this failure case and
dereferences the pointer to the list of built-in call sites, which is
obviously bogus.

Cure it by checking whether the key has a sites or a mods pointer.

If it's a sites pointer then the key is not to be touched. As the sites are
walked in the same order as in __static_call_init() the site walk can be
terminated because all subsequent sites have not been touched by the init
code due to the error exit.

If it was converted before the allocation fail, then the inner loop which
searches for a module match will find nothing.

A fail in the second allocation in __static_call_init() is harmless and
does not require special treatment. The first allocation succeeded and
converted the key to a module chain. That first entry has mod::mod == NULL
and mod::next == NULL, so the inner loop of static_call_del_module() will
neither find a module match nor a module chain. The next site in the walk
was either already converted, but can't match the module, or it will exit
the outer loop because it has a static_call_site pointer and not a
static_call_mod pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232083">SUSE bug 1232083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50003</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix system hang while resume with TBT monitor

[Why]
Connected with a Thunderbolt monitor and do the suspend and the system
may hang while resume.

The TBT monitor HPD will be triggered during the resume procedure
and call the drm_client_modeset_probe() while
struct drm_connector connector-&gt;dev-&gt;master is NULL.

It will mess up the pipe topology after resume.

[How]
Skip the TBT monitor HPD during the resume procedure because we
currently will probe the connectors after resume by default.

(cherry picked from commit 453f86a26945207a16b8f66aaed5962dc2b95b85)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232385">SUSE bug 1232385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50004</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50004" ref_url="https://www.suse.com/security/cve/CVE-2024-50004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35

[WHY &amp; HOW]
Mismatch in DCN35 DML2 cause bw validation failed to acquire unexpected DPP pipe to cause
grey screen and system hang. Remove EnhancedPrefetchScheduleAccelerationFinal value override
to match HW spec.

(cherry picked from commit 9dad21f910fcea2bdcff4af46159101d7f9cd8ba)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50004/">CVE-2024-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50004">CVE-2024-50004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232396">SUSE bug 1232396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50005</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50005" ref_url="https://www.suse.com/security/cve/CVE-2024-50005" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac802154: Fix potential RCU dereference issue in mac802154_scan_worker

In the `mac802154_scan_worker` function, the `scan_req-&gt;type` field was
accessed after the RCU read-side critical section was unlocked. According
to RCU usage rules, this is illegal and can lead to unpredictable
behavior, such as accessing memory that has been updated or causing
use-after-free issues.

This possible bug was identified using a static analysis tool developed
by myself, specifically designed to detect RCU-related issues.

To address this, the `scan_req-&gt;type` value is now stored in a local
variable `scan_req_type` while still within the RCU read-side critical
section. The `scan_req_type` is then used after the RCU lock is released,
ensuring that the type value is safely accessed without violating RCU
rules.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50005/">CVE-2024-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50005">CVE-2024-50005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232082">SUSE bug 1232082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50009</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232318">SUSE bug 1232318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50010</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50010" ref_url="https://www.suse.com/security/cve/CVE-2024-50010" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exec: don't WARN for racy path_noexec check

Both i_mode and noexec checks wrapped in WARN_ON stem from an artifact
of the previous implementation. They used to legitimately check for the
condition, but that got moved up in two commits:
633fb6ac3980 ("exec: move S_ISREG() check earlier")
0fd338b2d2cd ("exec: move path_noexec() check earlier")

Instead of being removed said checks are WARN_ON'ed instead, which
has some debug value.

However, the spurious path_noexec check is racy, resulting in
unwarranted warnings should someone race with setting the noexec flag.

One can note there is more to perm-checking whether execve is allowed
and none of the conditions are guaranteed to still hold after they were
tested for.

Additionally this does not validate whether the code path did any perm
checking to begin with -- it will pass if the inode happens to be
regular.

Keep the redundant path_noexec() check even though it's mindless
nonsense checking for guarantee that isn't given so drop the WARN.

Reword the commentary and do small tidy ups while here.

[brauner: keep redundant path_noexec() check]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50010/">CVE-2024-50010 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50010">CVE-2024-50010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232388">SUSE bug 1232388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50011</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50011" ref_url="https://www.suse.com/security/cve/CVE-2024-50011" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item

There is no links_num in struct snd_soc_acpi_mach {}, and we test
!link-&gt;num_adr as a condition to end the loop in hda_sdw_machine_select().
So an empty item in struct snd_soc_acpi_link_adr array is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50011/">CVE-2024-50011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50011">CVE-2024-50011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232081">SUSE bug 1232081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50012</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50012" ref_url="https://www.suse.com/security/cve/CVE-2024-50012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: Avoid a bad reference count on CPU node

In the parse_perf_domain function, if the call to
of_parse_phandle_with_args returns an error, then the reference to the
CPU device node that was acquired at the start of the function would not
be properly decremented.

Address this by declaring the variable with the __free(device_node)
cleanup attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50012/">CVE-2024-50012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50012">CVE-2024-50012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232386">SUSE bug 1232386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50013</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix memory leak in exfat_load_bitmap()

If the first directory entry in the root directory is not a bitmap
directory entry, 'bh' will not be released and reassigned, which
will cause a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232080">SUSE bug 1232080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50014</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix access to uninitialised lock in fc replay path

The following kernel trace can be triggered with fstest generic/629 when
executed against a filesystem with fast-commit feature enabled:

INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 0 PID: 866 Comm: mount Not tainted 6.10.0+ #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x66/0x90
 register_lock_class+0x759/0x7d0
 __lock_acquire+0x85/0x2630
 ? __find_get_block+0xb4/0x380
 lock_acquire+0xd1/0x2d0
 ? __ext4_journal_get_write_access+0xd5/0x160
 _raw_spin_lock+0x33/0x40
 ? __ext4_journal_get_write_access+0xd5/0x160
 __ext4_journal_get_write_access+0xd5/0x160
 ext4_reserve_inode_write+0x61/0xb0
 __ext4_mark_inode_dirty+0x79/0x270
 ? ext4_ext_replay_set_iblocks+0x2f8/0x450
 ext4_ext_replay_set_iblocks+0x330/0x450
 ext4_fc_replay+0x14c8/0x1540
 ? jread+0x88/0x2e0
 ? rcu_is_watching+0x11/0x40
 do_one_pass+0x447/0xd00
 jbd2_journal_recover+0x139/0x1b0
 jbd2_journal_load+0x96/0x390
 ext4_load_and_init_journal+0x253/0xd40
 ext4_fill_super+0x2cc6/0x3180
...

In the replay path there's an attempt to lock sbi-&gt;s_bdev_wb_lock in
function ext4_check_bdev_write_error().  Unfortunately, at this point this
spinlock has not been initialized yet.  Moving it's initialization to an
earlier point in __ext4_fill_super() fixes this splat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232446">SUSE bug 1232446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50016</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50016" ref_url="https://www.suse.com/security/cve/CVE-2024-50016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid overflow assignment in link_dp_cts

sampling_rate is an uint8_t but is assigned an unsigned int, and thus it
can overflow. As a result, sampling_rate is changed to uint32_t.

Similarly, LINK_QUAL_PATTERN_SET has a size of 2 bits, and it should
only be assigned to a value less or equal than 4.

This fixes 2 INTEGER_OVERFLOW issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50016/">CVE-2024-50016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50016">CVE-2024-50016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232420">SUSE bug 1232420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50019</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kthread: unpark only parked kthread

Calling into kthread unparking unconditionally is mostly harmless when
the kthread is already unparked. The wake up is then simply ignored
because the target is not in TASK_PARKED state.

However if the kthread is per CPU, the wake up is preceded by a call
to kthread_bind() which expects the task to be inactive and in
TASK_PARKED state, which obviously isn't the case if it is unparked.

As a result, calling kthread_stop() on an unparked per-cpu kthread
triggers such a warning:

	WARNING: CPU: 0 PID: 11 at kernel/kthread.c:525 __kthread_bind_mask kernel/kthread.c:525
	 &lt;TASK&gt;
	 kthread_stop+0x17a/0x630 kernel/kthread.c:707
	 destroy_workqueue+0x136/0xc40 kernel/workqueue.c:5810
	 wg_destruct+0x1e2/0x2e0 drivers/net/wireguard/device.c:257
	 netdev_run_todo+0xe1a/0x1000 net/core/dev.c:10693
	 default_device_exit_batch+0xa14/0xa90 net/core/dev.c:11769
	 ops_exit_list net/core/net_namespace.c:178 [inline]
	 cleanup_net+0x89d/0xcc0 net/core/net_namespace.c:640
	 process_one_work kernel/workqueue.c:3231 [inline]
	 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
	 worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
	 kthread+0x2f0/0x390 kernel/kthread.c:389
	 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
	 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
	 &lt;/TASK&gt;

Fix this with skipping unecessary unparking while stopping a kthread.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231990">SUSE bug 1231990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50020</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50020" ref_url="https://www.suse.com/security/cve/CVE-2024-50020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count()

This patch addresses an issue with improper reference count handling in the
ice_sriov_set_msix_vec_count() function.

First, the function calls ice_get_vf_by_id(), which increments the
reference count of the vf pointer. If the subsequent call to
ice_get_vf_vsi() fails, the function currently returns an error without
decrementing the reference count of the vf pointer, leading to a reference
count leak. The correct behavior, as implemented in this patch, is to
decrement the reference count using ice_put_vf(vf) before returning an
error when vsi is NULL.

Second, the function calls ice_sriov_get_irqs(), which sets
vf-&gt;first_vector_idx. If this call returns a negative value, indicating an
error, the function returns an error without decrementing the reference
count of the vf pointer, resulting in another reference count leak. The
patch addresses this by adding a call to ice_put_vf(vf) before returning
an error when vf-&gt;first_vector_idx &lt; 0.

This bug was identified by an experimental static analysis tool developed
by our team. The tool specializes in analyzing reference count operations
and identifying potential mismanagement of reference counts. In this case,
the tool flagged the missing decrement operation as a potential issue,
leading to this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50020/">CVE-2024-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50020">CVE-2024-50020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231989">SUSE bug 1231989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50021</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50021" ref_url="https://www.suse.com/security/cve/CVE-2024-50021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins()

This patch addresses a reference count handling issue in the
ice_dpll_init_rclk_pins() function. The function calls ice_dpll_get_pins(),
which increments the reference count of the relevant resources. However,
if the condition WARN_ON((!vsi || !vsi-&gt;netdev)) is met, the function
currently returns an error without properly releasing the resources
acquired by ice_dpll_get_pins(), leading to a reference count leak.

To resolve this, the check has been moved to the top of the function. This
ensures that the function verifies the state before any resources are
acquired, avoiding the need for additional resource management in the
error path.

This bug was identified by an experimental static analysis tool developed
by our team. The tool specializes in analyzing reference count operations
and detecting potential issues where resources are not properly managed.
In this case, the tool flagged the missing release operation as a
potential problem, which led to the development of this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50021/">CVE-2024-50021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50021">CVE-2024-50021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231957">SUSE bug 1231957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50022</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

device-dax: correct pgoff align in dax_set_mapping()

pgoff should be aligned using ALIGN_DOWN() instead of ALIGN().  Otherwise,
vmf-&gt;address not aligned to fault_size will be aligned to the next
alignment, that can result in memory failure getting the wrong address.

It's a subtle situation that only can be observed in
page_mapped_in_vma() after the page is page fault handled by
dev_dax_huge_fault.  Generally, there is little chance to perform
page_mapped_in_vma in dev-dax's page unless in specific error injection
to the dax device to trigger an MCE - memory-failure.  In that case,
page_mapped_in_vma() will be triggered to determine which task is
accessing the failure address and kill that task in the end.


We used self-developed dax device (which is 2M aligned mapping) , to
perform error injection to random address.  It turned out that error
injected to non-2M-aligned address was causing endless MCE until panic.
Because page_mapped_in_vma() kept resulting wrong address and the task
accessing the failure address was never killed properly:


[ 3783.719419] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3784.049006] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3784.049190] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3784.448042] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3784.448186] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3784.792026] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3784.792179] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3785.162502] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3785.162633] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3785.461116] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3785.461247] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3785.764730] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3785.764859] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3786.042128] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3786.042259] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3786.464293] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3786.464423] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3786.818090] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3786.818217] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3787.085297] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3787.085424] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered

It took us several weeks to pinpoint this problem,  but we eventually
used bpftrace to trace the page fault and mce address and successfully
identified the issue.


Joao added:

; Likely we never reproduce in production because we always pin
: device-dax regions in the region align they provide (Qemu does
: similarly with prealloc in hugetlb/file backed memory).  I think this
: bug requires that we touch *unpinned* device-dax regions unaligned to
: the device-dax selected alignment (page size i.e.  4K/2M/1G)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231956">SUSE bug 1231956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50023</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: Remove LED entry from LEDs list on unregister

Commit c938ab4da0eb ("net: phy: Manual remove LEDs to ensure correct
ordering") correctly fixed a problem with using devm_ but missed
removing the LED entry from the LEDs list.

This cause kernel panic on specific scenario where the port for the PHY
is torn down and up and the kmod for the PHY is removed.

On setting the port down the first time, the assosiacted LEDs are
correctly unregistered. The associated kmod for the PHY is now removed.
The kmod is now added again and the port is now put up, the associated LED
are registered again.
On putting the port down again for the second time after these step, the
LED list now have 4 elements. With the first 2 already unregistered
previously and the 2 new one registered again.

This cause a kernel panic as the first 2 element should have been
removed.

Fix this by correctly removing the element when LED is unregistered.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231955">SUSE bug 1231955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50025</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: fnic: Move flush_work initialization out of if block

After commit 379a58caa199 ("scsi: fnic: Move fnic_fnic_flush_tx() to a
work queue"), it can happen that a work item is sent to an uninitialized
work queue.  This may has the effect that the item being queued is never
actually queued, and any further actions depending on it will not
proceed.

The following warning is observed while the fnic driver is loaded:

kernel: WARNING: CPU: 11 PID: 0 at ../kernel/workqueue.c:1524 __queue_work+0x373/0x410
kernel:  &lt;IRQ&gt;
kernel:  queue_work_on+0x3a/0x50
kernel:  fnic_wq_copy_cmpl_handler+0x54a/0x730 [fnic 62fbff0c42e7fb825c60a55cde2fb91facb2ed24]
kernel:  fnic_isr_msix_wq_copy+0x2d/0x60 [fnic 62fbff0c42e7fb825c60a55cde2fb91facb2ed24]
kernel:  __handle_irq_event_percpu+0x36/0x1a0
kernel:  handle_irq_event_percpu+0x30/0x70
kernel:  handle_irq_event+0x34/0x60
kernel:  handle_edge_irq+0x7e/0x1a0
kernel:  __common_interrupt+0x3b/0xb0
kernel:  common_interrupt+0x58/0xa0
kernel:  &lt;/IRQ&gt;

It has been observed that this may break the rediscovery of Fibre
Channel devices after a temporary fabric failure.

This patch fixes it by moving the work queue initialization out of
an if block in fnic_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231953">SUSE bug 1231953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50026</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: wd33c93: Don't use stale scsi_pointer value

A regression was introduced with commit dbb2da557a6a ("scsi: wd33c93:
Move the SCSI pointer to private command data") which results in an oops
in wd33c93_intr(). That commit added the scsi_pointer variable and
initialized it from hostdata-&gt;connected. However, during selection,
hostdata-&gt;connected is not yet valid. Fix this by getting the current
scsi_pointer from hostdata-&gt;selecting.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231952">SUSE bug 1231952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50027</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Free tzp copy along with the thermal zone

The object pointed to by tz-&gt;tzp may still be accessed after being
freed in thermal_zone_device_unregister(), so move the freeing of it
to the point after the removal completion has been completed at which
it cannot be accessed any more.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231951">SUSE bug 1231951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50028</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Reference count the zone in thermal_zone_get_by_id()

There are places in the thermal netlink code where nothing prevents
the thermal zone object from going away while being accessed after it
has been returned by thermal_zone_get_by_id().

To address this, make thermal_zone_get_by_id() get a reference on the
thermal zone device object to be returned with the help of get_device(),
under thermal_list_lock, and adjust all of its callers to this change
with the help of the cleanup.h infrastructure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231950">SUSE bug 1231950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50029</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50029" ref_url="https://www.suse.com/security/cve/CVE-2024-50029" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync

This checks if the ACL connection remains valid as it could be destroyed
while hci_enhanced_setup_sync is pending on cmd_sync leading to the
following trace:

BUG: KASAN: slab-use-after-free in hci_enhanced_setup_sync+0x91b/0xa60
Read of size 1 at addr ffff888002328ffd by task kworker/u5:2/37

CPU: 0 UID: 0 PID: 37 Comm: kworker/u5:2 Not tainted 6.11.0-rc6-01300-g810be445d8d6 #7099
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x5d/0x80
 ? hci_enhanced_setup_sync+0x91b/0xa60
 print_report+0x152/0x4c0
 ? hci_enhanced_setup_sync+0x91b/0xa60
 ? __virt_addr_valid+0x1fa/0x420
 ? hci_enhanced_setup_sync+0x91b/0xa60
 kasan_report+0xda/0x1b0
 ? hci_enhanced_setup_sync+0x91b/0xa60
 hci_enhanced_setup_sync+0x91b/0xa60
 ? __pfx_hci_enhanced_setup_sync+0x10/0x10
 ? __pfx___mutex_lock+0x10/0x10
 hci_cmd_sync_work+0x1c2/0x330
 process_one_work+0x7d9/0x1360
 ? __pfx_lock_acquire+0x10/0x10
 ? __pfx_process_one_work+0x10/0x10
 ? assign_work+0x167/0x240
 worker_thread+0x5b7/0xf60
 ? __kthread_parkme+0xac/0x1c0
 ? __pfx_worker_thread+0x10/0x10
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x293/0x360
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2f/0x70
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 34:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 __hci_conn_add+0x187/0x17d0
 hci_connect_sco+0x2e1/0xb90
 sco_sock_connect+0x2a2/0xb80
 __sys_connect+0x227/0x2a0
 __x64_sys_connect+0x6d/0xb0
 do_syscall_64+0x71/0x140
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 37:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x101/0x160
 kfree+0xd0/0x250
 device_release+0x9a/0x210
 kobject_put+0x151/0x280
 hci_conn_del+0x448/0xbf0
 hci_abort_conn_sync+0x46f/0x980
 hci_cmd_sync_work+0x1c2/0x330
 process_one_work+0x7d9/0x1360
 worker_thread+0x5b7/0xf60
 kthread+0x293/0x360
 ret_from_fork+0x2f/0x70
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50029/">CVE-2024-50029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231949">SUSE bug 1231949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50030</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50030" ref_url="https://www.suse.com/security/cve/CVE-2024-50030" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/ct: prevent UAF in send_recv()

Ensure we serialize with completion side to prevent UAF with fence going
out of scope on the stack, since we have no clue if it will fire after
the timeout before we can erase from the xa. Also we have some dependent
loads and stores for which we need the correct ordering, and we lack the
needed barriers. Fix this by grabbing the ct-&gt;lock after the wait, which
is also held by the completion side.

v2 (Badal):
 - Also print done after acquiring the lock and seeing timeout.

(cherry picked from commit 52789ce35c55ccd30c4b67b9cc5b2af55e0122ea)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50030/">CVE-2024-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50030">CVE-2024-50030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231948">SUSE bug 1231948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Stop the active perfmon before being destroyed

When running `kmscube` with one or more performance monitors enabled
via `GALLIUM_HUD`, the following kernel panic can occur:

[   55.008324] Unable to handle kernel paging request at virtual address 00000000052004a4
[   55.008368] Mem abort info:
[   55.008377]   ESR = 0x0000000096000005
[   55.008387]   EC = 0x25: DABT (current EL), IL = 32 bits
[   55.008402]   SET = 0, FnV = 0
[   55.008412]   EA = 0, S1PTW = 0
[   55.008421]   FSC = 0x05: level 1 translation fault
[   55.008434] Data abort info:
[   55.008442]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[   55.008455]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   55.008467]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   55.008481] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001046c6000
[   55.008497] [00000000052004a4] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[   55.008525] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   55.008542] Modules linked in: rfcomm [...] vc4 v3d snd_soc_hdmi_codec drm_display_helper
gpu_sched drm_shmem_helper cec drm_dma_helper drm_kms_helper i2c_brcmstb
drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd backlight
[   55.008799] CPU: 2 PID: 166 Comm: v3d_bin Tainted: G         C         6.6.47+rpt-rpi-v8 #1  Debian 1:6.6.47-1+rpt1
[   55.008824] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)
[   55.008838] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   55.008855] pc : __mutex_lock.constprop.0+0x90/0x608
[   55.008879] lr : __mutex_lock.constprop.0+0x58/0x608
[   55.008895] sp : ffffffc080673cf0
[   55.008904] x29: ffffffc080673cf0 x28: 0000000000000000 x27: ffffff8106188a28
[   55.008926] x26: ffffff8101e78040 x25: ffffff8101baa6c0 x24: ffffffd9d989f148
[   55.008947] x23: ffffffda1c2a4008 x22: 0000000000000002 x21: ffffffc080673d38
[   55.008968] x20: ffffff8101238000 x19: ffffff8104f83188 x18: 0000000000000000
[   55.008988] x17: 0000000000000000 x16: ffffffda1bd04d18 x15: 00000055bb08bc90
[   55.009715] x14: 0000000000000000 x13: 0000000000000000 x12: ffffffda1bd4cbb0
[   55.010433] x11: 00000000fa83b2da x10: 0000000000001a40 x9 : ffffffda1bd04d04
[   55.011162] x8 : ffffff8102097b80 x7 : 0000000000000000 x6 : 00000000030a5857
[   55.011880] x5 : 00ffffffffffffff x4 : 0300000005200470 x3 : 0300000005200470
[   55.012598] x2 : ffffff8101238000 x1 : 0000000000000021 x0 : 0300000005200470
[   55.013292] Call trace:
[   55.013959]  __mutex_lock.constprop.0+0x90/0x608
[   55.014646]  __mutex_lock_slowpath+0x1c/0x30
[   55.015317]  mutex_lock+0x50/0x68
[   55.015961]  v3d_perfmon_stop+0x40/0xe0 [v3d]
[   55.016627]  v3d_bin_job_run+0x10c/0x2d8 [v3d]
[   55.017282]  drm_sched_main+0x178/0x3f8 [gpu_sched]
[   55.017921]  kthread+0x11c/0x128
[   55.018554]  ret_from_fork+0x10/0x20
[   55.019168] Code: f9400260 f1001c1f 54001ea9 927df000 (b9403401)
[   55.019776] ---[ end trace 0000000000000000 ]---
[   55.020411] note: v3d_bin[166] exited with preempt_count 1

This issue arises because, upon closing the file descriptor (which happens
when we interrupt `kmscube`), the active performance monitor is not
stopped. Although all perfmons are destroyed in `v3d_perfmon_close_file()`,
the active performance monitor's pointer (`v3d-&gt;active_perfmon`) is still
retained.

If `kmscube` is run again, the driver will attempt to stop the active
performance monitor using the stale pointer in `v3d-&gt;active_perfmon`.
However, this pointer is no longer valid because the previous process has
already terminated, and all performance monitors associated with it have
been destroyed and freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231947">SUSE bug 1231947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50032</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50032" ref_url="https://www.suse.com/security/cve/CVE-2024-50032" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/nocb: Fix rcuog wake-up from offline softirq

After a CPU has set itself offline and before it eventually calls
rcutree_report_cpu_dead(), there are still opportunities for callbacks
to be enqueued, for example from a softirq. When that happens on NOCB,
the rcuog wake-up is deferred through an IPI to an online CPU in order
not to call into the scheduler and risk arming the RT-bandwidth after
hrtimers have been migrated out and disabled.

But performing a synchronized IPI from a softirq is buggy as reported in
the following scenario:

        WARNING: CPU: 1 PID: 26 at kernel/smp.c:633 smp_call_function_single
        Modules linked in: rcutorture torture
        CPU: 1 UID: 0 PID: 26 Comm: migration/1 Not tainted 6.11.0-rc1-00012-g9139f93209d1 #1
        Stopper: multi_cpu_stop+0x0/0x320 &lt;- __stop_cpus+0xd0/0x120
        RIP: 0010:smp_call_function_single
        &lt;IRQ&gt;
        swake_up_one_online
        __call_rcu_nocb_wake
        __call_rcu_common
        ? rcu_torture_one_read
        call_timer_fn
        __run_timers
        run_timer_softirq
        handle_softirqs
        irq_exit_rcu
        ? tick_handle_periodic
        sysvec_apic_timer_interrupt
        &lt;/IRQ&gt;

Fix this with forcing deferred rcuog wake up through the NOCB timer when
the CPU is offline. The actual wake up will happen from
rcutree_report_cpu_dead().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50032/">CVE-2024-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50032">CVE-2024-50032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231915">SUSE bug 1231915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50034</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50034" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50034" ref_url="https://www.suse.com/security/cve/CVE-2024-50034" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC

Eric report a panic on IPPROTO_SMC, and give the facts
that when INET_PROTOSW_ICSK was set, icsk-&gt;icsk_sync_mss must be set too.

Bug: Unable to handle kernel NULL pointer dereference at virtual address
0000000000000000
Mem abort info:
ESR = 0x0000000086000005
EC = 0x21: IABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x05: level 1 translation fault
user pgtable: 4k pages, 48-bit VAs, pgdp=00000001195d1000
[0000000000000000] pgd=0800000109c46003, p4d=0800000109c46003,
pud=0000000000000000
Internal error: Oops: 0000000086000005 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 UID: 0 PID: 8037 Comm: syz.3.265 Not tainted
6.11.0-rc7-syzkaller-g5f5673607153 #0
Hardware name: Google Google Compute Engine/Google Compute Engine,
BIOS Google 08/06/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : 0x0
lr : cipso_v4_sock_setattr+0x2a8/0x3c0 net/ipv4/cipso_ipv4.c:1910
sp : ffff80009b887a90
x29: ffff80009b887aa0 x28: ffff80008db94050 x27: 0000000000000000
x26: 1fffe0001aa6f5b3 x25: dfff800000000000 x24: ffff0000db75da00
x23: 0000000000000000 x22: ffff0000d8b78518 x21: 0000000000000000
x20: ffff0000d537ad80 x19: ffff0000d8b78000 x18: 1fffe000366d79ee
x17: ffff8000800614a8 x16: ffff800080569b84 x15: 0000000000000001
x14: 000000008b336894 x13: 00000000cd96feaa x12: 0000000000000003
x11: 0000000000040000 x10: 00000000000020a3 x9 : 1fffe0001b16f0f1
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 000000000000003f
x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000000 x0 : ffff0000d8b78000
Call trace:
0x0
netlbl_sock_setattr+0x2e4/0x338 net/netlabel/netlabel_kapi.c:1000
smack_netlbl_add+0xa4/0x154 security/smack/smack_lsm.c:2593
smack_socket_post_create+0xa8/0x14c security/smack/smack_lsm.c:2973
security_socket_post_create+0x94/0xd4 security/security.c:4425
__sock_create+0x4c8/0x884 net/socket.c:1587
sock_create net/socket.c:1622 [inline]
__sys_socket_create net/socket.c:1659 [inline]
__sys_socket+0x134/0x340 net/socket.c:1706
__do_sys_socket net/socket.c:1720 [inline]
__se_sys_socket net/socket.c:1718 [inline]
__arm64_sys_socket+0x7c/0x94 net/socket.c:1718
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
Code: ???????? ???????? ???????? ???????? (????????)
---[ end trace 0000000000000000 ]---

This patch add a toy implementation that performs a simple return to
prevent such panic. This is because MSS can be set in sock_create_kern
or smc_setsockopt, similar to how it's done in AF_SMC. However, for
AF_SMC, there is currently no way to synchronize MSS within
__sys_connect_file. This toy implementation lays the groundwork for us
to support such feature for IPPROTO_SMC in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50034/">CVE-2024-50034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50034">CVE-2024-50034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231913">SUSE bug 1231913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50037</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50037" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50037" ref_url="https://www.suse.com/security/cve/CVE-2024-50037" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/fbdev-dma: Only cleanup deferred I/O if necessary

Commit 5a498d4d06d6 ("drm/fbdev-dma: Only install deferred I/O if
necessary") initializes deferred I/O only if it is used.
drm_fbdev_dma_fb_destroy() however calls fb_deferred_io_cleanup()
unconditionally with struct fb_info.fbdefio == NULL. KASAN with the
out-of-tree Apple silicon display driver posts following warning from
__flush_work() of a random struct work_struct instead of the expected
NULL pointer derefs.

[   22.053799] ------------[ cut here ]------------
[   22.054832] WARNING: CPU: 2 PID: 1 at kernel/workqueue.c:4177 __flush_work+0x4d8/0x580
[   22.056597] Modules linked in: uhid bnep uinput nls_ascii ip6_tables ip_tables i2c_dev loop fuse dm_multipath nfnetlink zram hid_magicmouse btrfs xor xor_neon brcmfmac_wcc raid6_pq hci_bcm4377 bluetooth brcmfmac hid_apple brcmutil nvmem_spmi_mfd simple_mfd_spmi dockchannel_hid cfg80211 joydev regmap_spmi nvme_apple ecdh_generic ecc macsmc_hid rfkill dwc3 appledrm snd_soc_macaudio macsmc_power nvme_core apple_isp phy_apple_atc apple_sart apple_rtkit_helper apple_dockchannel tps6598x macsmc_hwmon snd_soc_cs42l84 videobuf2_v4l2 spmi_apple_controller nvmem_apple_efuses videobuf2_dma_sg apple_z2 videobuf2_memops spi_nor panel_summit videobuf2_common asahi videodev pwm_apple apple_dcp snd_soc_apple_mca apple_admac spi_apple clk_apple_nco i2c_pasemi_platform snd_pcm_dmaengine mc i2c_pasemi_core mux_core ofpart adpdrm drm_dma_helper apple_dart apple_soc_cpufreq leds_pwm phram
[   22.073768] CPU: 2 UID: 0 PID: 1 Comm: systemd-shutdow Not tainted 6.11.2-asahi+ #asahi-dev
[   22.075612] Hardware name: Apple MacBook Pro (13-inch, M2, 2022) (DT)
[   22.077032] pstate: 01400005 (nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   22.078567] pc : __flush_work+0x4d8/0x580
[   22.079471] lr : __flush_work+0x54/0x580
[   22.080345] sp : ffffc000836ef820
[   22.081089] x29: ffffc000836ef880 x28: 0000000000000000 x27: ffff80002ddb7128
[   22.082678] x26: dfffc00000000000 x25: 1ffff000096f0c57 x24: ffffc00082d3e358
[   22.084263] x23: ffff80004b7862b8 x22: dfffc00000000000 x21: ffff80005aa1d470
[   22.085855] x20: ffff80004b786000 x19: ffff80004b7862a0 x18: 0000000000000000
[   22.087439] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000005
[   22.089030] x14: 1ffff800106ddf0a x13: 0000000000000000 x12: 0000000000000000
[   22.090618] x11: ffffb800106ddf0f x10: dfffc00000000000 x9 : 1ffff800106ddf0e
[   22.092206] x8 : 0000000000000000 x7 : aaaaaaaaaaaaaaaa x6 : 0000000000000001
[   22.093790] x5 : ffffc000836ef728 x4 : 0000000000000000 x3 : 0000000000000020
[   22.095368] x2 : 0000000000000008 x1 : 00000000000000aa x0 : 0000000000000000
[   22.096955] Call trace:
[   22.097505]  __flush_work+0x4d8/0x580
[   22.098330]  flush_delayed_work+0x80/0xb8
[   22.099231]  fb_deferred_io_cleanup+0x3c/0x130
[   22.100217]  drm_fbdev_dma_fb_destroy+0x6c/0xe0 [drm_dma_helper]
[   22.101559]  unregister_framebuffer+0x210/0x2f0
[   22.102575]  drm_fb_helper_unregister_info+0x48/0x60
[   22.103683]  drm_fbdev_dma_client_unregister+0x4c/0x80 [drm_dma_helper]
[   22.105147]  drm_client_dev_unregister+0x1cc/0x230
[   22.106217]  drm_dev_unregister+0x58/0x570
[   22.107125]  apple_drm_unbind+0x50/0x98 [appledrm]
[   22.108199]  component_del+0x1f8/0x3a8
[   22.109042]  dcp_platform_shutdown+0x24/0x38 [apple_dcp]
[   22.110357]  platform_shutdown+0x70/0x90
[   22.111219]  device_shutdown+0x368/0x4d8
[   22.112095]  kernel_restart+0x6c/0x1d0
[   22.112946]  __arm64_sys_reboot+0x1c8/0x328
[   22.113868]  invoke_syscall+0x78/0x1a8
[   22.114703]  do_el0_svc+0x124/0x1a0
[   22.115498]  el0_svc+0x3c/0xe0
[   22.116181]  el0t_64_sync_handler+0x70/0xc0
[   22.117110]  el0t_64_sync+0x190/0x198
[   22.117931] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50037/">CVE-2024-50037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50037">CVE-2024-50037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231911">SUSE bug 1231911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50040</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50040" ref_url="https://www.suse.com/security/cve/CVE-2024-50040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Do not bring the device up after non-fatal error

Commit 004d25060c78 ("igb: Fix igb_down hung on surprise removal")
changed igb_io_error_detected() to ignore non-fatal pcie errors in order
to avoid hung task that can happen when igb_down() is called multiple
times. This caused an issue when processing transient non-fatal errors.
igb_io_resume(), which is called after igb_io_error_detected(), assumes
that device is brought down by igb_io_error_detected() if the interface
is up. This resulted in panic with stacktrace below.

[ T3256] igb 0000:09:00.0 haeth0: igb: haeth0 NIC Link is Down
[  T292] pcieport 0000:00:1c.5: AER: Uncorrected (Non-Fatal) error received: 0000:09:00.0
[  T292] igb 0000:09:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fatal), type=Transaction Layer, (Requester ID)
[  T292] igb 0000:09:00.0:   device [8086:1537] error status/mask=00004000/00000000
[  T292] igb 0000:09:00.0:    [14] CmpltTO [  200.105524,009][  T292] igb 0000:09:00.0: AER:   TLP Header: 00000000 00000000 00000000 00000000
[  T292] pcieport 0000:00:1c.5: AER: broadcast error_detected message
[  T292] igb 0000:09:00.0: Non-correctable non-fatal error reported.
[  T292] pcieport 0000:00:1c.5: AER: broadcast mmio_enabled message
[  T292] pcieport 0000:00:1c.5: AER: broadcast resume message
[  T292] ------------[ cut here ]------------
[  T292] kernel BUG at net/core/dev.c:6539!
[  T292] invalid opcode: 0000 [#1] PREEMPT SMP
[  T292] RIP: 0010:napi_enable+0x37/0x40
[  T292] Call Trace:
[  T292]  &lt;TASK&gt;
[  T292]  ? die+0x33/0x90
[  T292]  ? do_trap+0xdc/0x110
[  T292]  ? napi_enable+0x37/0x40
[  T292]  ? do_error_trap+0x70/0xb0
[  T292]  ? napi_enable+0x37/0x40
[  T292]  ? napi_enable+0x37/0x40
[  T292]  ? exc_invalid_op+0x4e/0x70
[  T292]  ? napi_enable+0x37/0x40
[  T292]  ? asm_exc_invalid_op+0x16/0x20
[  T292]  ? napi_enable+0x37/0x40
[  T292]  igb_up+0x41/0x150
[  T292]  igb_io_resume+0x25/0x70
[  T292]  report_resume+0x54/0x70
[  T292]  ? report_frozen_detected+0x20/0x20
[  T292]  pci_walk_bus+0x6c/0x90
[  T292]  ? aer_print_port_info+0xa0/0xa0
[  T292]  pcie_do_recovery+0x22f/0x380
[  T292]  aer_process_err_devices+0x110/0x160
[  T292]  aer_isr+0x1c1/0x1e0
[  T292]  ? disable_irq_nosync+0x10/0x10
[  T292]  irq_thread_fn+0x1a/0x60
[  T292]  irq_thread+0xe3/0x1a0
[  T292]  ? irq_set_affinity_notifier+0x120/0x120
[  T292]  ? irq_affinity_notify+0x100/0x100
[  T292]  kthread+0xe2/0x110
[  T292]  ? kthread_complete_and_exit+0x20/0x20
[  T292]  ret_from_fork+0x2d/0x50
[  T292]  ? kthread_complete_and_exit+0x20/0x20
[  T292]  ret_from_fork_asm+0x11/0x20
[  T292]  &lt;/TASK&gt;

To fix this issue igb_io_resume() checks if the interface is running and
the device is not down this means igb_io_error_detected() did not bring
the device down and there is no need to bring it up.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50040/">CVE-2024-50040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50040">CVE-2024-50040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231908">SUSE bug 1231908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50041</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix macvlan leak by synchronizing access to mac_filter_hash

This patch addresses a macvlan leak issue in the i40e driver caused by
concurrent access to vsi-&gt;mac_filter_hash. The leak occurs when multiple
threads attempt to modify the mac_filter_hash simultaneously, leading to
inconsistent state and potential memory leaks.

To fix this, we now wrap the calls to i40e_del_mac_filter() and zeroing
vf-&gt;default_lan_addr.addr with spin_lock/unlock_bh(&amp;vsi-&gt;mac_filter_hash_lock),
ensuring atomic operations and preventing concurrent access.

Additionally, we add lockdep_assert_held(&amp;vsi-&gt;mac_filter_hash_lock) in
i40e_add_mac_filter() to help catch similar issues in the future.

Reproduction steps:
1. Spawn VFs and configure port vlan on them.
2. Trigger concurrent macvlan operations (e.g., adding and deleting
	portvlan and/or mac filters).
3. Observe the potential memory leak and inconsistent state in the
	mac_filter_hash.

This synchronization ensures the integrity of the mac_filter_hash and prevents
the described leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231907">SUSE bug 1231907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50042" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50042" ref_url="https://www.suse.com/security/cve/CVE-2024-50042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix increasing MSI-X on VF

Increasing MSI-X value on a VF leads to invalid memory operations. This
is caused by not reallocating some arrays.

Reproducer:
  modprobe ice
  echo 0 &gt; /sys/bus/pci/devices/$PF_PCI/sriov_drivers_autoprobe
  echo 1 &gt; /sys/bus/pci/devices/$PF_PCI/sriov_numvfs
  echo 17 &gt; /sys/bus/pci/devices/$VF0_PCI/sriov_vf_msix_count

Default MSI-X is 16, so 17 and above triggers this issue.

KASAN reports:

  BUG: KASAN: slab-out-of-bounds in ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
  Read of size 8 at addr ffff8888b937d180 by task bash/28433
  (...)

  Call Trace:
   (...)
   ? ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
   kasan_report+0xed/0x120
   ? ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
   ice_vsi_alloc_ring_stats+0x38d/0x4b0 [ice]
   ice_vsi_cfg_def+0x3360/0x4770 [ice]
   ? mutex_unlock+0x83/0xd0
   ? __pfx_ice_vsi_cfg_def+0x10/0x10 [ice]
   ? __pfx_ice_remove_vsi_lkup_fltr+0x10/0x10 [ice]
   ice_vsi_cfg+0x7f/0x3b0 [ice]
   ice_vf_reconfig_vsi+0x114/0x210 [ice]
   ice_sriov_set_msix_vec_count+0x3d0/0x960 [ice]
   sriov_vf_msix_count_store+0x21c/0x300
   (...)

  Allocated by task 28201:
   (...)
   ice_vsi_cfg_def+0x1c8e/0x4770 [ice]
   ice_vsi_cfg+0x7f/0x3b0 [ice]
   ice_vsi_setup+0x179/0xa30 [ice]
   ice_sriov_configure+0xcaa/0x1520 [ice]
   sriov_numvfs_store+0x212/0x390
   (...)

To fix it, use ice_vsi_rebuild() instead of ice_vf_reconfig_vsi(). This
causes the required arrays to be reallocated taking the new queue count
into account (ice_vsi_realloc_stat_arrays()). Set req_txq and req_rxq
before ice_vsi_rebuild(), so that realloc uses the newly set queue
count.

Additionally, ice_vsi_rebuild() does not remove VSI filters
(ice_fltr_remove_all()), so ice_vf_init_host_cfg() is no longer
necessary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50042/">CVE-2024-50042 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50042">CVE-2024-50042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231906">SUSE bug 1231906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50043" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50043" ref_url="https://www.suse.com/security/cve/CVE-2024-50043" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix possible badness in FREE_STATEID

When multiple FREE_STATEIDs are sent for the same delegation stateid,
it can lead to a possible either use-after-free or counter refcount
underflow errors.

In nfsd4_free_stateid() under the client lock we find a delegation
stateid, however the code drops the lock before calling nfs4_put_stid(),
that allows another FREE_STATE to find the stateid again. The first one
will proceed to then free the stateid which leads to either
use-after-free or decrementing already zeroed counter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50043/">CVE-2024-50043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50043">CVE-2024-50043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231905">SUSE bug 1231905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()

On the node of an NFS client, some files saved in the mountpoint of the
NFS server were copied to another location of the same NFS server.
Accidentally, the nfs42_complete_copies() got a NULL-pointer dereference
crash with the following syslog:

[232064.838881] NFSv4: state recovery failed for open file nfs/pvc-12b5200d-cd0f-46a3-b9f0-af8f4fe0ef64.qcow2, error = -116
[232064.839360] NFSv4: state recovery failed for open file nfs/pvc-12b5200d-cd0f-46a3-b9f0-af8f4fe0ef64.qcow2, error = -116
[232066.588183] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000058
[232066.588586] Mem abort info:
[232066.588701]   ESR = 0x0000000096000007
[232066.588862]   EC = 0x25: DABT (current EL), IL = 32 bits
[232066.589084]   SET = 0, FnV = 0
[232066.589216]   EA = 0, S1PTW = 0
[232066.589340]   FSC = 0x07: level 3 translation fault
[232066.589559] Data abort info:
[232066.589683]   ISV = 0, ISS = 0x00000007
[232066.589842]   CM = 0, WnR = 0
[232066.589967] user pgtable: 64k pages, 48-bit VAs, pgdp=00002000956ff400
[232066.590231] [0000000000000058] pgd=08001100ae100003, p4d=08001100ae100003, pud=08001100ae100003, pmd=08001100b3c00003, pte=0000000000000000
[232066.590757] Internal error: Oops: 96000007 [#1] SMP
[232066.590958] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs ocfs2_dlmfs ocfs2_stack_o2cb ocfs2_dlm vhost_net vhost vhost_iotlb tap tun ipt_rpfilter xt_multiport ip_set_hash_ip ip_set_hash_net xfrm_interface xfrm6_tunnel tunnel4 tunnel6 esp4 ah4 wireguard libcurve25519_generic veth xt_addrtype xt_set nf_conntrack_netlink ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_bitmap_port ip_set_hash_ipport dummy ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs iptable_filter sch_ingress nfnetlink_cttimeout vport_gre ip_gre ip_tunnel gre vport_geneve geneve vport_vxlan vxlan ip6_udp_tunnel udp_tunnel openvswitch nf_conncount dm_round_robin dm_service_time dm_multipath xt_nat xt_MASQUERADE nft_chain_nat nf_nat xt_mark xt_conntrack xt_comment nft_compat nft_counter nf_tables nfnetlink ocfs2 ocfs2_nodemanager ocfs2_stackglue iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ipmi_ssif nbd overlay 8021q garp mrp bonding tls rfkill sunrpc ext4 mbcache jbd2
[232066.591052]  vfat fat cas_cache cas_disk ses enclosure scsi_transport_sas sg acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler ip_tables vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio dm_mirror dm_region_hash dm_log dm_mod nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter bridge stp llc fuse xfs libcrc32c ast drm_vram_helper qla2xxx drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce fb_sys_fops cec sha256_arm64 sha1_ce drm_ttm_helper ttm nvme_fc igb sbsa_gwdt nvme_fabrics drm nvme_core i2c_algo_bit i40e scsi_transport_fc megaraid_sas aes_neon_bs
[232066.596953] CPU: 6 PID: 4124696 Comm: 10.253.166.125- Kdump: loaded Not tainted 5.15.131-9.cl9_ocfs2.aarch64 #1
[232066.597356] Hardware name: Great Wall .\x93\x8e...RF6260 V5/GWMSSE2GL1T, BIOS T656FBE_V3.0.18 2024-01-06
[232066.597721] pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[232066.598034] pc : nfs4_reclaim_open_state+0x220/0x800 [nfsv4]
[232066.598327] lr : nfs4_reclaim_open_state+0x12c/0x800 [nfsv4]
[232066.598595] sp : ffff8000f568fc70
[232066.598731] x29: ffff8000f568fc70 x28: 0000000000001000 x27: ffff21003db33000
[232066.599030] x26: ffff800005521ae0 x25: ffff0100f98fa3f0 x24: 0000000000000001
[232066.599319] x23: ffff800009920008 x22: ffff21003db33040 x21: ffff21003db33050
[232066.599628] x20: ffff410172fe9e40 x19: ffff410172fe9e00 x18: 0000000000000000
[232066.599914] x17: 0000000000000000 x16: 0000000000000004 x15: 0000000000000000
[232066.600195] x14: 0000000000000000 x13: ffff800008e685a8 x12: 00000000eac0c6e6
[232066.600498] x11: 00000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231902">SUSE bug 1231902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: Fix a NULL pointer dereference issue in fbcon_putcs

syzbot has found a NULL pointer dereference bug in fbcon.
Here is the simplified C reproducer:

struct param {
	uint8_t type;
	struct tiocl_selection ts;
};

int main()
{
	struct fb_con2fbmap con2fb;
	struct param param;

	int fd = open("/dev/fb1", 0, 0);

	con2fb.console = 0x19;
	con2fb.framebuffer = 0;
	ioctl(fd, FBIOPUT_CON2FBMAP, &amp;con2fb);

	param.type = 2;
	param.ts.xs = 0; param.ts.ys = 0;
	param.ts.xe = 0; param.ts.ye = 0;
	param.ts.sel_mode = 0;

	int fd1 = open("/dev/tty1", O_RDWR, 0);
	ioctl(fd1, TIOCLINUX, &amp;param);

	con2fb.console = 1;
	con2fb.framebuffer = 0;
	ioctl(fd, FBIOPUT_CON2FBMAP, &amp;con2fb);

	return 0;
}

After calling ioctl(fd1, TIOCLINUX, &amp;param), the subsequent ioctl(fd, FBIOPUT_CON2FBMAP, &amp;con2fb)
causes the kernel to follow a different execution path:

 set_con2fb_map
  -&gt; con2fb_init_display
   -&gt; fbcon_set_disp
    -&gt; redraw_screen
     -&gt; hide_cursor
      -&gt; clear_selection
       -&gt; highlight
        -&gt; invert_screen
         -&gt; do_update_region
          -&gt; fbcon_putcs
           -&gt; ops-&gt;putcs

Since ops-&gt;putcs is a NULL pointer, this leads to a kernel panic.
To prevent this, we need to call set_blitting_type() within set_con2fb_map()
to properly initialize ops-&gt;putcs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232310">SUSE bug 1232310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check null pointer before dereferencing se

[WHAT &amp; HOW]
se is null checked previously in the same function, indicating
it might be null; therefore, it must be checked when used again.

This fixes 1 FORWARD_NULL issue reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232309">SUSE bug 1232309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50051" ref_url="https://www.suse.com/security/cve/CVE-2024-50051" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: mpc52xx: Add cancel_work_sync before module remove

If we remove the module which will call mpc52xx_spi_remove
it will free 'ms' through spi_unregister_controller.
while the work ms-&gt;work will be used. The sequence of operations
that may lead to a UAF bug.

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in mpc52xx_spi_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50051/">CVE-2024-50051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50051">CVE-2024-50051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235739">SUSE bug 1235739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50056" ref_url="https://www.suse.com/security/cve/CVE-2024-50056" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c

Fix potential dereferencing of ERR_PTR() in find_format_by_pix()
and uvc_v4l2_enum_format().

Fix the following smatch errors:

drivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix()
error: 'fmtdesc' dereferencing possible ERR_PTR()

drivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format()
error: 'fmtdesc' dereferencing possible ERR_PTR()

Also, fix similar issue in uvc_v4l2_try_format() for potential
dereferencing of ERR_PTR().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50056/">CVE-2024-50056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50056">CVE-2024-50056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232389">SUSE bug 1232389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50057" ref_url="https://www.suse.com/security/cve/CVE-2024-50057" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Free IRQ only if it was requested before

In polling mode, if no IRQ was requested there is no need to free it.
Call devm_free_irq() only if client-&gt;irq is set. This fixes the warning
caused by the tps6598x module removal:

WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c
...
...
Call trace:
  devm_free_irq+0x80/0x8c
  tps6598x_remove+0x28/0x88 [tps6598x]
  i2c_device_remove+0x2c/0x9c
  device_remove+0x4c/0x80
  device_release_driver_internal+0x1cc/0x228
  driver_detach+0x50/0x98
  bus_remove_driver+0x6c/0xbc
  driver_unregister+0x30/0x60
  i2c_del_driver+0x54/0x64
  tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x]
  __arm64_sys_delete_module+0x184/0x264
  invoke_syscall+0x48/0x110
  el0_svc_common.constprop.0+0xc8/0xe8
  do_el0_svc+0x20/0x2c
  el0_svc+0x28/0x98
  el0t_64_sync_handler+0x13c/0x158
  el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50057/">CVE-2024-50057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232393">SUSE bug 1232393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition

In the switchtec_ntb_add function, it can call switchtec_ntb_init_sndev
function, then &amp;sndev-&gt;check_link_status_work is bound with
check_link_status_work. switchtec_ntb_link_notification may be called
to start the work.

If we remove the module which will call switchtec_ntb_remove to make
cleanup, it will free sndev through kfree(sndev), while the work
mentioned above will be used. The sequence of operations that may lead
to a UAF bug is as follows:

CPU0                                 CPU1

                        | check_link_status_work
switchtec_ntb_remove    |
kfree(sndev);           |
                        | if (sndev-&gt;link_force_down)
                        | // use sndev

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in switchtec_ntb_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232345">SUSE bug 1232345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232348">SUSE bug 1232348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check if we need to reschedule during overflow flush

In terms of normal application usage, this list will always be empty.
And if an application does overflow a bit, it'll have a few entries.
However, nothing obviously prevents syzbot from running a test case
that generates a ton of overflow entries, and then flushing them can
take quite a while.

Check for needing to reschedule while flushing, and drop our locks and
do so if necessary. There's no state to maintain here as overflows
always prune from head-of-list, hence it's fine to drop and reacquire
the locks at the end of the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232417">SUSE bug 1232417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition

In the cdns_i3c_master_probe function, &amp;master-&gt;hj_work is bound with
cdns_i3c_master_hj. And cdns_i3c_master_interrupt can call
cnds_i3c_master_demux_ibis function to start the work.

If we remove the module which will call cdns_i3c_master_remove to
make cleanup, it will free master-&gt;base through i3c_master_unregister
while the work mentioned above will be used. The sequence of operations
that may lead to a UAF bug is as follows:

CPU0                                      CPU1

                                     | cdns_i3c_master_hj
cdns_i3c_master_remove               |
i3c_master_unregister(&amp;master-&gt;base) |
device_unregister(&amp;master-&gt;dev)      |
device_release                       |
//free master-&gt;base                  |
                                     | i3c_master_do_daa(&amp;master-&gt;base)
                                     | //use master-&gt;base

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in cdns_i3c_master_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232263">SUSE bug 1232263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rtrs-srv: Avoid null pointer deref during path establishment

For RTRS path establishment, RTRS client initiates and completes con_num
of connections. After establishing all its connections, the information
is exchanged between the client and server through the info_req message.
During this exchange, it is essential that all connections have been
established, and the state of the RTRS srv path is CONNECTED.

So add these sanity checks, to make sure we detect and abort process in
error scenarios to avoid null pointer deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232232">SUSE bug 1232232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

zram: free secondary algorithms names

We need to kfree() secondary algorithms names when reset zram device that
had multi-streams, otherwise we leak memory.

[senozhatsky@chromium.org: kfree(NULL) is legal]
  Link: https://lkml.kernel.org/r/20240917013021.868769-1-senozhatsky@chromium.org
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231901">SUSE bug 1231901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50065" ref_url="https://www.suse.com/security/cve/CVE-2024-50065" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntfs3: Change to non-blocking allocation in ntfs_d_hash

d_hash is done while under "rcu-walk" and should not sleep.
__get_name() allocates using GFP_KERNEL, having the possibility
to sleep when under memory pressure. Change the allocation to
GFP_NOWAIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-23"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50065/">CVE-2024-50065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50065">CVE-2024-50065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231899">SUSE bug 1231899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50066" ref_url="https://www.suse.com/security/cve/CVE-2024-50066" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mremap: fix move_normal_pmd/retract_page_tables race

In mremap(), move_page_tables() looks at the type of the PMD entry and the
specified address range to figure out by which method the next chunk of
page table entries should be moved.

At that point, the mmap_lock is held in write mode, but no rmap locks are
held yet.  For PMD entries that point to page tables and are fully covered
by the source address range, move_pgt_entry(NORMAL_PMD, ...) is called,
which first takes rmap locks, then does move_normal_pmd(). 
move_normal_pmd() takes the necessary page table locks at source and
destination, then moves an entire page table from the source to the
destination.

The problem is: The rmap locks, which protect against concurrent page
table removal by retract_page_tables() in the THP code, are only taken
after the PMD entry has been read and it has been decided how to move it. 
So we can race as follows (with two processes that have mappings of the
same tmpfs file that is stored on a tmpfs mount with huge=advise); note
that process A accesses page tables through the MM while process B does it
through the file rmap:

process A                      process B
=========                      =========
mremap
  mremap_to
    move_vma
      move_page_tables
        get_old_pmd
        alloc_new_pmd
                      *** PREEMPT ***
                               madvise(MADV_COLLAPSE)
                                 do_madvise
                                   madvise_walk_vmas
                                     madvise_vma_behavior
                                       madvise_collapse
                                         hpage_collapse_scan_file
                                           collapse_file
                                             retract_page_tables
                                               i_mmap_lock_read(mapping)
                                               pmdp_collapse_flush
                                               i_mmap_unlock_read(mapping)
        move_pgt_entry(NORMAL_PMD, ...)
          take_rmap_locks
          move_normal_pmd
          drop_rmap_locks

When this happens, move_normal_pmd() can end up creating bogus PMD entries
in the line `pmd_populate(mm, new_pmd, pmd_pgtable(pmd))`.  The effect
depends on arch-specific and machine-specific details; on x86, you can end
up with physical page 0 mapped as a page table, which is likely
exploitable for user-&gt;kernel privilege escalation.

Fix the race by letting process B recheck that the PMD still points to a
page table after the rmap locks have been taken.  Otherwise, we bail and
let the caller fall back to the PTE-level copying path, which will then
bail immediately at the pmd_none() check.

Bug reachability: Reaching this bug requires that you can create
shmem/file THP mappings - anonymous THP uses different code that doesn't
zap stuff under rmap locks.  File THP is gated on an experimental config
flag (CONFIG_READ_ONLY_THP_FOR_FS), so on normal distro kernels you need
shmem THP to hit this bug.  As far as I know, getting shmem THP normally
requires that you can mount your own tmpfs with the right mount flags,
which would require creating your own user+mount namespace; though I don't
know if some distros maybe enable shmem THP by default or something like
that.

Bug impact: This issue can likely be used for user-&gt;kernel privilege
escalation when it is reachable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-27"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50066/">CVE-2024-50066 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50066">CVE-2024-50066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232078">SUSE bug 1232078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50068" ref_url="https://www.suse.com/security/cve/CVE-2024-50068" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets()

The sysfs_target-&gt;regions allocated in damon_sysfs_regions_alloc() is not
freed in damon_sysfs_test_add_targets(), which cause the following memory
leak, free it to fix it.

	unreferenced object 0xffffff80c2a8db80 (size 96):
	  comm "kunit_try_catch", pid 187, jiffies 4294894363
	  hex dump (first 32 bytes):
	    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
	    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
	  backtrace (crc 0):
	    [&lt;0000000001e3714d&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;000000008e6835c1&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;000000001286d9f8&gt;] damon_sysfs_test_add_targets+0x1cc/0x738
	    [&lt;0000000032ef8f77&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;00000000f3edea23&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000adf936cf&gt;] kthread+0x2e8/0x374
	    [&lt;0000000041bb1628&gt;] ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50068/">CVE-2024-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50068">CVE-2024-50068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232512">SUSE bug 1232512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50069" ref_url="https://www.suse.com/security/cve/CVE-2024-50069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: apple: check devm_kasprintf() returned value

devm_kasprintf() can return a NULL pointer on failure but this returned
value is not checked. Fix this lack and check the returned value.

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50069/">CVE-2024-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50069">CVE-2024-50069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232511">SUSE bug 1232511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50070" ref_url="https://www.suse.com/security/cve/CVE-2024-50070" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: stm32: check devm_kasprintf() returned value

devm_kasprintf() can return a NULL pointer on failure but this returned
value is not checked. Fix this lack and check the returned value.

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50070/">CVE-2024-50070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50070">CVE-2024-50070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232510">SUSE bug 1232510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50071" ref_url="https://www.suse.com/security/cve/CVE-2024-50071" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: nuvoton: fix a double free in ma35_pinctrl_dt_node_to_map_func()

'new_map' is allocated using devm_* which takes care of freeing the
allocated data on device removal, call to

	.dt_free_map = pinconf_generic_dt_free_map

double frees the map as pinconf_generic_dt_free_map() calls
pinctrl_utils_free_map().

Fix this by using kcalloc() instead of auto-managed devm_kcalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50071/">CVE-2024-50071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50071">CVE-2024-50071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232509">SUSE bug 1232509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parport: Proper fix for array out-of-bounds access

The recent fix for array out-of-bounds accesses replaced sprintf()
calls blindly with snprintf().  However, since snprintf() returns the
would-be-printed size, not the actually output size, the length
calculation can still go over the given limit.

Use scnprintf() instead of snprintf(), which returns the actually
output letters, for addressing the potential out-of-bounds access
properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232507">SUSE bug 1232507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: tegra: fix checked USB2 port number

If USB virtualizatoin is enabled, USB2 ports are shared between all
Virtual Functions. The USB2 port number owned by an USB2 root hub in
a Virtual Function may be less than total USB2 phy number supported
by the Tegra XUSB controller.

Using total USB2 phy number as port number to check all PORTSC values
would cause invalid memory access.

[  116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f
...
[  117.213640] Call trace:
[  117.216783]  tegra_xusb_enter_elpg+0x23c/0x658
[  117.222021]  tegra_xusb_runtime_suspend+0x40/0x68
[  117.227260]  pm_generic_runtime_suspend+0x30/0x50
[  117.232847]  __rpm_callback+0x84/0x3c0
[  117.237038]  rpm_suspend+0x2dc/0x740
[  117.241229] pm_runtime_work+0xa0/0xb8
[  117.245769]  process_scheduled_works+0x24c/0x478
[  117.251007]  worker_thread+0x23c/0x328
[  117.255547]  kthread+0x104/0x1b0
[  117.259389]  ret_from_fork+0x10/0x20
[  117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232506">SUSE bug 1232506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50076" ref_url="https://www.suse.com/security/cve/CVE-2024-50076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: prevent kernel-infoleak in con_font_get()

font.data may not initialize all memory spaces depending on the implementation
of vc-&gt;vc_sw-&gt;con_font_get. This may cause info-leak, so to prevent this, it
is safest to modify it to initialize the allocated memory space to 0, and it
generally does not affect the overall performance of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50076/">CVE-2024-50076 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50076">CVE-2024-50076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232505">SUSE bug 1232505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix multiple init when debugfs is disabled

If bt_debugfs is not created successfully, which happens if either
CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init()
returns early and does not set iso_inited to true. This means that a
subsequent call to iso_init() will result in duplicate calls to
proto_register(), bt_sock_register(), etc.

With CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the
duplicate call to proto_register() triggers this BUG():

  list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250,
    next=ffffffffc0b280d0.
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:35!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x9a/0xa0
  ...
    __list_add_valid_or_report+0x9a/0xa0
    proto_register+0x2b5/0x340
    iso_init+0x23/0x150 [bluetooth]
    set_iso_socket_func+0x68/0x1b0 [bluetooth]
    kmem_cache_free+0x308/0x330
    hci_sock_sendmsg+0x990/0x9e0 [bluetooth]
    __sock_sendmsg+0x7b/0x80
    sock_write_iter+0x9a/0x110
    do_iter_readv_writev+0x11d/0x220
    vfs_writev+0x180/0x3e0
    do_writev+0xca/0x100
  ...

This change removes the early return. The check for iso_debugfs being
NULL was unnecessary, it is always NULL when iso_inited is false.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Call iso_exit() on module unload

If iso_init() has been called, iso_exit() must be called on module
unload. Without that, the struct proto that iso_init() registered with
proto_register() becomes invalid, which could cause unpredictable
problems later. In my case, with CONFIG_LIST_HARDENED and
CONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually
triggers this BUG():

  list_add corruption. next-&gt;prev should be prev (ffffffffb5355fd0),
    but was 0000000000000068. (next=ffffffffc0a010d0).
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:29!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x61/0xa0
  ...
    __list_add_valid_or_report+0x61/0xa0
    proto_register+0x299/0x320
    hci_sock_init+0x16/0xc0 [bluetooth]
    bt_init+0x68/0xd0 [bluetooth]
    __pfx_bt_init+0x10/0x10 [bluetooth]
    do_one_initcall+0x80/0x2f0
    do_init_module+0x8b/0x230
    __do_sys_init_module+0x15f/0x190
    do_syscall_64+0x68/0x110
  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232503">SUSE bug 1232503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50079" ref_url="https://www.suse.com/security/cve/CVE-2024-50079" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/sqpoll: ensure task state is TASK_RUNNING when running task_work

When the sqpoll is exiting and cancels pending work items, it may need
to run task_work. If this happens from within io_uring_cancel_generic(),
then it may be under waiting for the io_uring_task waitqueue. This
results in the below splat from the scheduler, as the ring mutex may be
attempted grabbed while in a TASK_INTERRUPTIBLE state.

Ensure that the task state is set appropriately for that, just like what
is done for the other cases in io_run_task_work().

do not call blocking ops when !TASK_RUNNING; state=1 set at [&lt;0000000029387fd2&gt;] prepare_to_wait+0x88/0x2fc
WARNING: CPU: 6 PID: 59939 at kernel/sched/core.c:8561 __might_sleep+0xf4/0x140
Modules linked in:
CPU: 6 UID: 0 PID: 59939 Comm: iou-sqp-59938 Not tainted 6.12.0-rc3-00113-g8d020023b155 #7456
Hardware name: linux,dummy-virt (DT)
pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
pc : __might_sleep+0xf4/0x140
lr : __might_sleep+0xf4/0x140
sp : ffff80008c5e7830
x29: ffff80008c5e7830 x28: ffff0000d93088c0 x27: ffff60001c2d7230
x26: dfff800000000000 x25: ffff0000e16b9180 x24: ffff80008c5e7a50
x23: 1ffff000118bcf4a x22: ffff0000e16b9180 x21: ffff0000e16b9180
x20: 000000000000011b x19: ffff80008310fac0 x18: 1ffff000118bcd90
x17: 30303c5b20746120 x16: 74657320313d6574 x15: 0720072007200720
x14: 0720072007200720 x13: 0720072007200720 x12: ffff600036c64f0b
x11: 1fffe00036c64f0a x10: ffff600036c64f0a x9 : dfff800000000000
x8 : 00009fffc939b0f6 x7 : ffff0001b6327853 x6 : 0000000000000001
x5 : ffff0001b6327850 x4 : ffff600036c64f0b x3 : ffff8000803c35bc
x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000e16b9180
Call trace:
 __might_sleep+0xf4/0x140
 mutex_lock+0x84/0x124
 io_handle_tw_list+0xf4/0x260
 tctx_task_work_run+0x94/0x340
 io_run_task_work+0x1ec/0x3c0
 io_uring_cancel_generic+0x364/0x524
 io_sq_thread+0x820/0x124c
 ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50079/">CVE-2024-50079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50079">CVE-2024-50079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232495">SUSE bug 1232495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50080" ref_url="https://www.suse.com/security/cve/CVE-2024-50080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk: don't allow user copy for unprivileged device

UBLK_F_USER_COPY requires userspace to call write() on ublk char
device for filling request buffer, and unprivileged device can't
be trusted.

So don't allow user copy for unprivileged device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50080/">CVE-2024-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50080">CVE-2024-50080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232502">SUSE bug 1232502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: setup queue -&gt;tag_set before initializing hctx

Commit 7b815817aa58 ("blk-mq: add helper for checking if one CPU is mapped to specified hctx")
needs to check queue mapping via tag set in hctx's cpuhp handler.

However, q-&gt;tag_set may not be setup yet when the cpuhp handler is
enabled, then kernel oops is triggered.

Fix the issue by setup queue tag_set before initializing hctx.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232501">SUSE bug 1232501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50083" ref_url="https://www.suse.com/security/cve/CVE-2024-50083" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix mptcp DSS corruption due to large pmtu xmit

Syzkaller was able to trigger a DSS corruption:

  TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 5227 at net/mptcp/protocol.c:695 __mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695
  Modules linked in:
  CPU: 0 UID: 0 PID: 5227 Comm: syz-executor350 Not tainted 6.11.0-syzkaller-08829-gaf9c191ac2a0 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
  RIP: 0010:__mptcp_move_skbs_from_subflow+0x20a9/0x21f0 net/mptcp/protocol.c:695
  Code: 0f b6 dc 31 ff 89 de e8 b5 dd ea f5 89 d8 48 81 c4 50 01 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc e8 98 da ea f5 90 &lt;0f&gt; 0b 90 e9 47 ff ff ff e8 8a da ea f5 90 0f 0b 90 e9 99 e0 ff ff
  RSP: 0018:ffffc90000006db8 EFLAGS: 00010246
  RAX: ffffffff8ba9df18 RBX: 00000000000055f0 RCX: ffff888030023c00
  RDX: 0000000000000100 RSI: 00000000000081e5 RDI: 00000000000055f0
  RBP: 1ffff110062bf1ae R08: ffffffff8ba9cf12 R09: 1ffff110062bf1b8
  R10: dffffc0000000000 R11: ffffed10062bf1b9 R12: 0000000000000000
  R13: dffffc0000000000 R14: 00000000700cec61 R15: 00000000000081e5
  FS:  000055556679c380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000020287000 CR3: 0000000077892000 CR4: 00000000003506f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;IRQ&gt;
   move_skbs_to_msk net/mptcp/protocol.c:811 [inline]
   mptcp_data_ready+0x29c/0xa90 net/mptcp/protocol.c:854
   subflow_data_ready+0x34a/0x920 net/mptcp/subflow.c:1490
   tcp_data_queue+0x20fd/0x76c0 net/ipv4/tcp_input.c:5283
   tcp_rcv_established+0xfba/0x2020 net/ipv4/tcp_input.c:6237
   tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915
   tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2350
   ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233
   NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
   NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
   __netif_receive_skb_one_core net/core/dev.c:5662 [inline]
   __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5775
   process_backlog+0x662/0x15b0 net/core/dev.c:6107
   __napi_poll+0xcb/0x490 net/core/dev.c:6771
   napi_poll net/core/dev.c:6840 [inline]
   net_rx_action+0x89b/0x1240 net/core/dev.c:6962
   handle_softirqs+0x2c5/0x980 kernel/softirq.c:554
   do_softirq+0x11b/0x1e0 kernel/softirq.c:455
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
   local_bh_enable include/linux/bottom_half.h:33 [inline]
   rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
   __dev_queue_xmit+0x1764/0x3e80 net/core/dev.c:4451
   dev_queue_xmit include/linux/netdevice.h:3094 [inline]
   neigh_hh_output include/net/neighbour.h:526 [inline]
   neigh_output include/net/neighbour.h:540 [inline]
   ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236
   ip_local_out net/ipv4/ip_output.c:130 [inline]
   __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536
   __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466
   tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]
   tcp_mtu_probe net/ipv4/tcp_output.c:2547 [inline]
   tcp_write_xmit+0x641d/0x6bf0 net/ipv4/tcp_output.c:2752
   __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015
   tcp_push_pending_frames include/net/tcp.h:2107 [inline]
   tcp_data_snd_check net/ipv4/tcp_input.c:5714 [inline]
   tcp_rcv_established+0x1026/0x2020 net/ipv4/tcp_input.c:6239
   tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915
   sk_backlog_rcv include/net/sock.h:1113 [inline]
   __release_sock+0x214/0x350 net/core/sock.c:3072
   release_sock+0x61/0x1f0 net/core/sock.c:3626
   mptcp_push_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50083/">CVE-2024-50083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50083">CVE-2024-50083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232493">SUSE bug 1232493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50084" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50084" ref_url="https://www.suse.com/security/cve/CVE-2024-50084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: microchip: vcap api: Fix memory leaks in vcap_api_encode_rule_test()

Commit a3c1e45156ad ("net: microchip: vcap: Fix use-after-free error in
kunit test") fixed the use-after-free error, but introduced below
memory leaks by removing necessary vcap_free_rule(), add it to fix it.

	unreferenced object 0xffffff80ca58b700 (size 192):
	  comm "kunit_try_catch", pid 1215, jiffies 4294898264
	  hex dump (first 32 bytes):
	    00 12 7a 00 05 00 00 00 0a 00 00 00 64 00 00 00  ..z.........d...
	    00 00 00 00 00 00 00 00 00 04 0b cc 80 ff ff ff  ................
	  backtrace (crc 9c09c3fe):
	    [&lt;0000000052a0be73&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;0000000043605459&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;0000000040a01b8d&gt;] vcap_alloc_rule+0x3cc/0x9c4
	    [&lt;000000003fe86110&gt;] vcap_api_encode_rule_test+0x1ac/0x16b0
	    [&lt;00000000b3595fc4&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;0000000010f5d2bf&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000c5d82c9a&gt;] kthread+0x2e8/0x374
	    [&lt;00000000f4287308&gt;] ret_from_fork+0x10/0x20
	unreferenced object 0xffffff80cc0b0400 (size 64):
	  comm "kunit_try_catch", pid 1215, jiffies 4294898265
	  hex dump (first 32 bytes):
	    80 04 0b cc 80 ff ff ff 18 b7 58 ca 80 ff ff ff  ..........X.....
	    39 00 00 00 02 00 00 00 06 05 04 03 02 01 ff ff  9...............
	  backtrace (crc daf014e9):
	    [&lt;0000000052a0be73&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;0000000043605459&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;000000000ff63fd4&gt;] vcap_rule_add_key+0x2cc/0x528
	    [&lt;00000000dfdb1e81&gt;] vcap_api_encode_rule_test+0x224/0x16b0
	    [&lt;00000000b3595fc4&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;0000000010f5d2bf&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000c5d82c9a&gt;] kthread+0x2e8/0x374
	    [&lt;00000000f4287308&gt;] ret_from_fork+0x10/0x20
	unreferenced object 0xffffff80cc0b0700 (size 64):
	  comm "kunit_try_catch", pid 1215, jiffies 4294898265
	  hex dump (first 32 bytes):
	    80 07 0b cc 80 ff ff ff 28 b7 58 ca 80 ff ff ff  ........(.X.....
	    3c 00 00 00 00 00 00 00 01 2f 03 b3 ec ff ff ff  &lt;......../......
	  backtrace (crc 8d877792):
	    [&lt;0000000052a0be73&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;0000000043605459&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;000000006eadfab7&gt;] vcap_rule_add_action+0x2d0/0x52c
	    [&lt;00000000323475d1&gt;] vcap_api_encode_rule_test+0x4d4/0x16b0
	    [&lt;00000000b3595fc4&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;0000000010f5d2bf&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000c5d82c9a&gt;] kthread+0x2e8/0x374
	    [&lt;00000000f4287308&gt;] ret_from_fork+0x10/0x20
	unreferenced object 0xffffff80cc0b0900 (size 64):
	  comm "kunit_try_catch", pid 1215, jiffies 4294898266
	  hex dump (first 32 bytes):
	    80 09 0b cc 80 ff ff ff 80 06 0b cc 80 ff ff ff  ................
	    7d 00 00 00 01 00 00 00 00 00 00 00 ff 00 00 00  }...............
	  backtrace (crc 34181e56):
	    [&lt;0000000052a0be73&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;0000000043605459&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;000000000ff63fd4&gt;] vcap_rule_add_key+0x2cc/0x528
	    [&lt;00000000991e3564&gt;] vcap_val_rule+0xcf0/0x13e8
	    [&lt;00000000fc9868e5&gt;] vcap_api_encode_rule_test+0x678/0x16b0
	    [&lt;00000000b3595fc4&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;0000000010f5d2bf&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000c5d82c9a&gt;] kthread+0x2e8/0x374
	    [&lt;00000000f4287308&gt;] ret_from_fork+0x10/0x20
	unreferenced object 0xffffff80cc0b0980 (size 64):
	  comm "kunit_try_catch", pid 1215, jiffies 4294898266
	  hex dump (first 32 bytes):
	    18 b7 58 ca 80 ff ff ff 00 09 0b cc 80 ff ff ff  ..X.............
	    67 00 00 00 00 00 00 00 01 01 74 88 c0 ff ff ff  g.........t.....
	  backtrace (crc 275fd9be):
	    [&lt;0000000052a0be73&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;0000000043605459&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;000000000ff63fd4&gt;] vcap_rule_add_key+0x2cc/0x528
	    [&lt;000000001396a1a2&gt;] test_add_de
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50084/">CVE-2024-50084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50084">CVE-2024-50084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232494">SUSE bug 1232494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50085" ref_url="https://www.suse.com/security/cve/CVE-2024-50085" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: fix UaF read in mptcp_pm_nl_rm_addr_or_subflow

Syzkaller reported this splat:

  ==================================================================
  BUG: KASAN: slab-use-after-free in mptcp_pm_nl_rm_addr_or_subflow+0xb44/0xcc0 net/mptcp/pm_netlink.c:881
  Read of size 4 at addr ffff8880569ac858 by task syz.1.2799/14662

  CPU: 0 UID: 0 PID: 14662 Comm: syz.1.2799 Not tainted 6.12.0-rc2-syzkaller-00307-g36c254515dc6 #0
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0xc3/0x620 mm/kasan/report.c:488
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   mptcp_pm_nl_rm_addr_or_subflow+0xb44/0xcc0 net/mptcp/pm_netlink.c:881
   mptcp_pm_nl_rm_subflow_received net/mptcp/pm_netlink.c:914 [inline]
   mptcp_nl_remove_id_zero_address+0x305/0x4a0 net/mptcp/pm_netlink.c:1572
   mptcp_pm_nl_del_addr_doit+0x5c9/0x770 net/mptcp/pm_netlink.c:1603
   genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115
   genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
   genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210
   netlink_rcv_skb+0x165/0x410 net/netlink/af_netlink.c:2551
   genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219
   netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]
   netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1357
   netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1901
   sock_sendmsg_nosec net/socket.c:729 [inline]
   __sock_sendmsg net/socket.c:744 [inline]
   ____sys_sendmsg+0x9ae/0xb40 net/socket.c:2607
   ___sys_sendmsg+0x135/0x1e0 net/socket.c:2661
   __sys_sendmsg+0x117/0x1f0 net/socket.c:2690
   do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
   __do_fast_syscall_32+0x73/0x120 arch/x86/entry/common.c:386
   do_fast_syscall_32+0x32/0x80 arch/x86/entry/common.c:411
   entry_SYSENTER_compat_after_hwframe+0x84/0x8e
  RIP: 0023:0xf7fe4579
  Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 &lt;5d&gt; 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
  RSP: 002b:00000000f574556c EFLAGS: 00000296 ORIG_RAX: 0000000000000172
  RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000020000140
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
  RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000
  R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
   &lt;/TASK&gt;

  Allocated by task 5387:
   kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
   kasan_save_track+0x14/0x30 mm/kasan/common.c:68
   poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
   __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
   kmalloc_noprof include/linux/slab.h:878 [inline]
   kzalloc_noprof include/linux/slab.h:1014 [inline]
   subflow_create_ctx+0x87/0x2a0 net/mptcp/subflow.c:1803
   subflow_ulp_init+0xc3/0x4d0 net/mptcp/subflow.c:1956
   __tcp_set_ulp net/ipv4/tcp_ulp.c:146 [inline]
   tcp_set_ulp+0x326/0x7f0 net/ipv4/tcp_ulp.c:167
   mptcp_subflow_create_socket+0x4ae/0x10a0 net/mptcp/subflow.c:1764
   __mptcp_subflow_connect+0x3cc/0x1490 net/mptcp/subflow.c:1592
   mptcp_pm_create_subflow_or_signal_addr+0xbda/0x23a0 net/mptcp/pm_netlink.c:642
   mptcp_pm_nl_fully_established net/mptcp/pm_netlink.c:650 [inline]
   mptcp_pm_nl_work+0x3a1/0x4f0 net/mptcp/pm_netlink.c:943
   mptcp_worker+0x15a/0x1240 net/mptcp/protocol.c:2777
   process_one_work+0x958/0x1b30 kernel/workqueue.c:3229
   process_scheduled_works kernel/workqueue.c:3310 [inline]
   worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391
   kthread+0x2c1/0x3a0 kernel/kthread.c:389
   ret_from_fork+0x45/0x80 arch/x86/ke
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50085/">CVE-2024-50085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50085">CVE-2024-50085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232508">SUSE bug 1232508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50086" ref_url="https://www.suse.com/security/cve/CVE-2024-50086" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix user-after-free from session log off

There is racy issue between smb2 session log off and smb2 session setup.
It will cause user-after-free from session log off.
This add session_lock when setting SMB2_SESSION_EXPIRED and referece
count to session struct not to free session while it is being used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50086/">CVE-2024-50086 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50086">CVE-2024-50086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232521">SUSE bug 1232521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50087" ref_url="https://www.suse.com/security/cve/CVE-2024-50087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix uninitialized pointer free on read_alloc_one_name() error

The function read_alloc_one_name() does not initialize the name field of
the passed fscrypt_str struct if kmalloc fails to allocate the
corresponding buffer.  Thus, it is not guaranteed that
fscrypt_str.name is initialized when freeing it.

This is a follow-up to the linked patch that fixes the remaining
instances of the bug introduced by commit e43eec81c516 ("btrfs: use
struct qstr instead of name and namelen pairs").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50087/">CVE-2024-50087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50087">CVE-2024-50087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232499">SUSE bug 1232499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50088" ref_url="https://www.suse.com/security/cve/CVE-2024-50088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix uninitialized pointer free in add_inode_ref()

The add_inode_ref() function does not initialize the "name" struct when
it is declared.  If any of the following calls to "read_one_inode()
returns NULL,

	dir = read_one_inode(root, parent_objectid);
	if (!dir) {
		ret = -ENOENT;
		goto out;
	}

	inode = read_one_inode(root, inode_objectid);
	if (!inode) {
		ret = -EIO;
		goto out;
	}

then "name.name" would be freed on "out" before being initialized.

out:
	...
	kfree(name.name);

This issue was reported by Coverity with CID 1526744.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50088/">CVE-2024-50088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50088">CVE-2024-50088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232498">SUSE bug 1232498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    ** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233250">SUSE bug 1233250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50090" ref_url="https://www.suse.com/security/cve/CVE-2024-50090" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/oa: Fix overflow in oa batch buffer

By default xe_bb_create_job() appends a MI_BATCH_BUFFER_END to batch
buffer, this is not a problem if batch buffer is only used once but
oa reuses the batch buffer for the same metric and at each call
it appends a MI_BATCH_BUFFER_END, printing the warning below and then
overflowing.

[  381.072016] ------------[ cut here ]------------
[  381.072019] xe 0000:00:02.0: [drm] Assertion `bb-&gt;len * 4 + bb_prefetch(q-&gt;gt) &lt;= size` failed!
               platform: LUNARLAKE subplatform: 1
               graphics: Xe2_LPG / Xe2_HPG 20.04 step B0
               media: Xe2_LPM / Xe2_HPM 20.00 step B0
               tile: 0 VRAM 0 B
               GT: 0 type 1

So here checking if batch buffer already have MI_BATCH_BUFFER_END if
not append it.

v2:
- simply fix, suggestion from Ashutosh

(cherry picked from commit 9ba0e0f30ca42a98af3689460063edfb6315718a)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50090/">CVE-2024-50090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50090">CVE-2024-50090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232862">SUSE bug 1232862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50091" ref_url="https://www.suse.com/security/cve/CVE-2024-50091" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm vdo: don't refer to dedupe_context after releasing it

Clear the dedupe_context pointer in a data_vio whenever ownership of
the context is lost, so that vdo can't examine it accidentally.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50091/">CVE-2024-50091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50091">CVE-2024-50091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232872">SUSE bug 1232872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50092" ref_url="https://www.suse.com/security/cve/CVE-2024-50092" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netconsole: fix wrong warning

A warning is triggered when there is insufficient space in the buffer
for userdata. However, this is not an issue since userdata will be sent
in the next iteration.

Current warning message:

    ------------[ cut here ]------------
     WARNING: CPU: 13 PID: 3013042 at drivers/net/netconsole.c:1122 write_ext_msg+0x3b6/0x3d0
      ? write_ext_msg+0x3b6/0x3d0
      console_flush_all+0x1e9/0x330

The code incorrectly issues a warning when this_chunk is zero, which is
a valid scenario. The warning should only be triggered when this_chunk
is negative.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50092/">CVE-2024-50092 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50092">CVE-2024-50092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232874">SUSE bug 1232874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: int340x: processor: Fix warning during module unload

The processor_thermal driver uses pcim_device_enable() to enable a PCI
device, which means the device will be automatically disabled on driver
detach.  Thus there is no need to call pci_disable_device() again on it.

With recent PCI device resource management improvements, e.g. commit
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is
exposed and triggers the warining below.

 [  224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device
 [  224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100
 ...
 [  224.010844] Call Trace:
 [  224.010845]  &lt;TASK&gt;
 [  224.010847]  ? show_regs+0x6d/0x80
 [  224.010851]  ? __warn+0x8c/0x140
 [  224.010854]  ? pci_disable_device+0xe5/0x100
 [  224.010856]  ? report_bug+0x1c9/0x1e0
 [  224.010859]  ? handle_bug+0x46/0x80
 [  224.010862]  ? exc_invalid_op+0x1d/0x80
 [  224.010863]  ? asm_exc_invalid_op+0x1f/0x30
 [  224.010867]  ? pci_disable_device+0xe5/0x100
 [  224.010869]  ? pci_disable_device+0xe5/0x100
 [  224.010871]  ? kfree+0x21a/0x2b0
 [  224.010873]  pcim_disable_device+0x20/0x30
 [  224.010875]  devm_action_release+0x16/0x20
 [  224.010878]  release_nodes+0x47/0xc0
 [  224.010880]  devres_release_all+0x9f/0xe0
 [  224.010883]  device_unbind_cleanup+0x12/0x80
 [  224.010885]  device_release_driver_internal+0x1ca/0x210
 [  224.010887]  driver_detach+0x4e/0xa0
 [  224.010889]  bus_remove_driver+0x6f/0xf0
 [  224.010890]  driver_unregister+0x35/0x60
 [  224.010892]  pci_unregister_driver+0x44/0x90
 [  224.010894]  proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]
 ...
 [  224.010921] ---[ end trace 0000000000000000 ]---

Remove the excess pci_disable_device() calls.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232877">SUSE bug 1232877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50094" ref_url="https://www.suse.com/security/cve/CVE-2024-50094" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: Don't invoke xdp_do_flush() from netpoll.

Yury reported a crash in the sfc driver originated from
netpoll_send_udp(). The netconsole sends a message and then netpoll
invokes the driver's NAPI function with a budget of zero. It is
dedicated to allow driver to free TX resources, that it may have used
while sending the packet.

In the netpoll case the driver invokes xdp_do_flush() unconditionally,
leading to crash because bpf_net_context was never assigned.

Invoke xdp_do_flush() only if budget is not zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50094/">CVE-2024-50094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50094">CVE-2024-50094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232875">SUSE bug 1232875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error

The `nouveau_dmem_copy_one` function ensures that the copy push command is
sent to the device firmware but does not track whether it was executed
successfully.

In the case of a copy error (e.g., firmware or hardware failure), the
copy push command will be sent via the firmware channel, and
`nouveau_dmem_copy_one` will likely report success, leading to the
`migrate_to_ram` function returning a dirty HIGH_USER page to the user.

This can result in a security vulnerability, as a HIGH_USER page that may
contain sensitive or corrupted data could be returned to the user.

To prevent this vulnerability, we allocate a zero page. Thus, in case of
an error, a non-dirty (zero) page will be returned to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232870">SUSE bug 1232870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50097" ref_url="https://www.suse.com/security/cve/CVE-2024-50097" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fec: don't save PTP state if PTP is unsupported

Some platforms (such as i.MX25 and i.MX27) do not support PTP, so on
these platforms fec_ptp_init() is not called and the related members
in fep are not initialized. However, fec_ptp_save_state() is called
unconditionally, which causes the kernel to panic. Therefore, add a
condition so that fec_ptp_save_state() is not called if PTP is not
supported.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50097/">CVE-2024-50097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50097">CVE-2024-50097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232871">SUSE bug 1232871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down

There is a history of deadlock if reboot is performed at the beginning
of booting. SDEV_QUIESCE was set for all LU's scsi_devices by UFS
shutdown, and at that time the audio driver was waiting on
blk_mq_submit_bio() holding a mutex_lock while reading the fw binary.
After that, a deadlock issue occurred while audio driver shutdown was
waiting for mutex_unlock of blk_mq_submit_bio(). To solve this, set
SDEV_OFFLINE for all LUs except WLUN, so that any I/O that comes down
after a UFS shutdown will return an error.

[   31.907781]I[0:      swapper/0:    0]        1        130705007       1651079834      11289729804                0 D(   2) 3 ffffff882e208000 *             init [device_shutdown]
[   31.907793]I[0:      swapper/0:    0] Mutex: 0xffffff8849a2b8b0: owner[0xffffff882e28cb00 kworker/6:0 :49]
[   31.907806]I[0:      swapper/0:    0] Call trace:
[   31.907810]I[0:      swapper/0:    0]  __switch_to+0x174/0x338
[   31.907819]I[0:      swapper/0:    0]  __schedule+0x5ec/0x9cc
[   31.907826]I[0:      swapper/0:    0]  schedule+0x7c/0xe8
[   31.907834]I[0:      swapper/0:    0]  schedule_preempt_disabled+0x24/0x40
[   31.907842]I[0:      swapper/0:    0]  __mutex_lock+0x408/0xdac
[   31.907849]I[0:      swapper/0:    0]  __mutex_lock_slowpath+0x14/0x24
[   31.907858]I[0:      swapper/0:    0]  mutex_lock+0x40/0xec
[   31.907866]I[0:      swapper/0:    0]  device_shutdown+0x108/0x280
[   31.907875]I[0:      swapper/0:    0]  kernel_restart+0x4c/0x11c
[   31.907883]I[0:      swapper/0:    0]  __arm64_sys_reboot+0x15c/0x280
[   31.907890]I[0:      swapper/0:    0]  invoke_syscall+0x70/0x158
[   31.907899]I[0:      swapper/0:    0]  el0_svc_common+0xb4/0xf4
[   31.907909]I[0:      swapper/0:    0]  do_el0_svc+0x2c/0xb0
[   31.907918]I[0:      swapper/0:    0]  el0_svc+0x34/0xe0
[   31.907928]I[0:      swapper/0:    0]  el0t_64_sync_handler+0x68/0xb4
[   31.907937]I[0:      swapper/0:    0]  el0t_64_sync+0x1a0/0x1a4

[   31.908774]I[0:      swapper/0:    0]       49                0         11960702      11236868007                0 D(   2) 6 ffffff882e28cb00 *      kworker/6:0 [__bio_queue_enter]
[   31.908783]I[0:      swapper/0:    0] Call trace:
[   31.908788]I[0:      swapper/0:    0]  __switch_to+0x174/0x338
[   31.908796]I[0:      swapper/0:    0]  __schedule+0x5ec/0x9cc
[   31.908803]I[0:      swapper/0:    0]  schedule+0x7c/0xe8
[   31.908811]I[0:      swapper/0:    0]  __bio_queue_enter+0xb8/0x178
[   31.908818]I[0:      swapper/0:    0]  blk_mq_submit_bio+0x194/0x67c
[   31.908827]I[0:      swapper/0:    0]  __submit_bio+0xb8/0x19c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232881">SUSE bug 1232881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50100" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50100" ref_url="https://www.suse.com/security/cve/CVE-2024-50100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: dummy-hcd: Fix "task hung" problem

The syzbot fuzzer has been encountering "task hung" problems ever
since the dummy-hcd driver was changed to use hrtimers instead of
regular timers.  It turns out that the problems are caused by a subtle
difference between the timer_pending() and hrtimer_active() APIs.

The changeover blindly replaced the first by the second.  However,
timer_pending() returns True when the timer is queued but not when its
callback is running, whereas hrtimer_active() returns True when the
hrtimer is queued _or_ its callback is running.  This difference
occasionally caused dummy_urb_enqueue() to think that the callback
routine had not yet started when in fact it was almost finished.  As a
result the hrtimer was not restarted, which made it impossible for the
driver to dequeue later the URB that was just enqueued.  This caused
usb_kill_urb() to hang, and things got worse from there.

Since hrtimers have no API for telling when they are queued and the
callback isn't running, the driver must keep track of this for itself.
That's what this patch does, adding a new "timer_pending" flag and
setting or clearing it at the appropriate times.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50100/">CVE-2024-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50100">CVE-2024-50100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232876">SUSE bug 1232876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50101" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50101" ref_url="https://www.suse.com/security/cve/CVE-2024-50101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices

Previously, the domain_context_clear() function incorrectly called
pci_for_each_dma_alias() to set up context entries for non-PCI devices.
This could lead to kernel hangs or other unexpected behavior.

Add a check to only call pci_for_each_dma_alias() for PCI devices. For
non-PCI devices, domain_context_clear_one() is called directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50101/">CVE-2024-50101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232869">SUSE bug 1232869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50102</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50102" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50102" ref_url="https://www.suse.com/security/cve/CVE-2024-50102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86: fix user address masking non-canonical speculation issue

It turns out that AMD has a "Meltdown Lite(tm)" issue with non-canonical
accesses in kernel space.  And so using just the high bit to decide
whether an access is in user space or kernel space ends up with the good
old "leak speculative data" if you have the right gadget using the
result:

  CVE-2020-12965 "Transient Execution of Non-Canonical Accesses"

Now, the kernel surrounds the access with a STAC/CLAC pair, and those
instructions end up serializing execution on older Zen architectures,
which closes the speculation window.

But that was true only up until Zen 5, which renames the AC bit [1].
That improves performance of STAC/CLAC a lot, but also means that the
speculation window is now open.

Note that this affects not just the new address masking, but also the
regular valid_user_address() check used by access_ok(), and the asm
version of the sign bit check in the get_user() helpers.

It does not affect put_user() or clear_user() variants, since there's no
speculative result to be used in a gadget for those operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50102/">CVE-2024-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50102">CVE-2024-50102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232880">SUSE bug 1232880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50103" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe()

A devm_kzalloc() in asoc_qcom_lpass_cpu_platform_probe() could
possibly return NULL pointer. NULL Pointer Dereference may be
triggerred without addtional check.
Add a NULL check for the returned pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232878">SUSE bug 1232878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50104" ref_url="https://www.suse.com/security/cve/CVE-2024-50104" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: sdm845: add missing soundwire runtime stream alloc

During the migration of Soundwire runtime stream allocation from
the Qualcomm Soundwire controller to SoC's soundcard drivers the sdm845
soundcard was forgotten.

At this point any playback attempt or audio daemon startup, for instance
on sdm845-db845c (Qualcomm RB3 board), will result in stream pointer
NULL dereference:

 Unable to handle kernel NULL pointer dereference at virtual
 address 0000000000000020
 Mem abort info:
   ESR = 0x0000000096000004
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x04: level 0 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101ecf000
 [0000000000000020] pgd=0000000000000000, p4d=0000000000000000
 Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
 Modules linked in: ...
 CPU: 5 UID: 0 PID: 1198 Comm: aplay
 Not tainted 6.12.0-rc2-qcomlt-arm64-00059-g9d78f315a362-dirty #18
 Hardware name: Thundercomm Dragonboard 845c (DT)
 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : sdw_stream_add_slave+0x44/0x380 [soundwire_bus]
 lr : sdw_stream_add_slave+0x44/0x380 [soundwire_bus]
 sp : ffff80008a2035c0
 x29: ffff80008a2035c0 x28: ffff80008a203978 x27: 0000000000000000
 x26: 00000000000000c0 x25: 0000000000000000 x24: ffff1676025f4800
 x23: ffff167600ff1cb8 x22: ffff167600ff1c98 x21: 0000000000000003
 x20: ffff167607316000 x19: ffff167604e64e80 x18: 0000000000000000
 x17: 0000000000000000 x16: ffffcec265074160 x15: 0000000000000000
 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff167600ff1cec
 x5 : ffffcec22cfa2010 x4 : 0000000000000000 x3 : 0000000000000003
 x2 : ffff167613f836c0 x1 : 0000000000000000 x0 : ffff16761feb60b8
 Call trace:
  sdw_stream_add_slave+0x44/0x380 [soundwire_bus]
  wsa881x_hw_params+0x68/0x80 [snd_soc_wsa881x]
  snd_soc_dai_hw_params+0x3c/0xa4
  __soc_pcm_hw_params+0x230/0x660
  dpcm_be_dai_hw_params+0x1d0/0x3f8
  dpcm_fe_dai_hw_params+0x98/0x268
  snd_pcm_hw_params+0x124/0x460
  snd_pcm_common_ioctl+0x998/0x16e8
  snd_pcm_ioctl+0x34/0x58
  __arm64_sys_ioctl+0xac/0xf8
  invoke_syscall+0x48/0x104
  el0_svc_common.constprop.0+0x40/0xe0
  do_el0_svc+0x1c/0x28
  el0_svc+0x34/0xe0
  el0t_64_sync_handler+0x120/0x12c
  el0t_64_sync+0x190/0x194
 Code: aa0403fb f9418400 9100e000 9400102f (f8420f22)
 ---[ end trace 0000000000000000 ]---

0000000000006108 &lt;sdw_stream_add_slave&gt;:
    6108:       d503233f        paciasp
    610c:       a9b97bfd        stp     x29, x30, [sp, #-112]!
    6110:       910003fd        mov     x29, sp
    6114:       a90153f3        stp     x19, x20, [sp, #16]
    6118:       a9025bf5        stp     x21, x22, [sp, #32]
    611c:       aa0103f6        mov     x22, x1
    6120:       2a0303f5        mov     w21, w3
    6124:       a90363f7        stp     x23, x24, [sp, #48]
    6128:       aa0003f8        mov     x24, x0
    612c:       aa0203f7        mov     x23, x2
    6130:       a9046bf9        stp     x25, x26, [sp, #64]
    6134:       aa0403f9        mov     x25, x4        &lt;-- x4 copied to x25
    6138:       a90573fb        stp     x27, x28, [sp, #80]
    613c:       aa0403fb        mov     x27, x4
    6140:       f9418400        ldr     x0, [x0, #776]
    6144:       9100e000        add     x0, x0, #0x38
    6148:       94000000        bl      0 &lt;mutex_lock&gt;
    614c:       f8420f22        ldr     x2, [x25, #32]!  &lt;-- offset 0x44
    ^^^
This is 0x6108 + offset 0x44 from the beginning of sdw_stream_add_slave()
where data abort happens.
wsa881x_hw_params() is called with stream = NULL and passes it further
in register x4 (5th argu
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50104/">CVE-2024-50104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50104">CVE-2024-50104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232868">SUSE bug 1232868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50105" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50105" ref_url="https://www.suse.com/security/cve/CVE-2024-50105" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc

Commit 15c7fab0e047 ("ASoC: qcom: Move Soundwire runtime stream alloc to
soundcards") moved the allocation of Soundwire stream runtime from the
Qualcomm Soundwire driver to each individual machine sound card driver,
except that it forgot to update SC7280 card.

Just like for other Qualcomm sound cards using Soundwire, the card
driver should allocate and release the runtime.  Otherwise sound
playback will result in a NULL pointer dereference or other effect of
uninitialized memory accesses (which was confirmed on SDM845 having
similar issue).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50105/">CVE-2024-50105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50105">CVE-2024-50105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232879">SUSE bug 1232879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50107" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50107" ref_url="https://www.suse.com/security/cve/CVE-2024-50107" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses

Commit 50c6dbdfd16e ("x86/ioremap: Improve iounmap() address range checks")
introduces a WARN when adrress ranges of iounmap are invalid. On Thinkpad
P1 Gen 7 (Meteor Lake-P) this caused the following warning to appear:

WARNING: CPU: 7 PID: 713 at arch/x86/mm/ioremap.c:461 iounmap+0x58/0x1f0
Modules linked in: rfkill(+) snd_timer(+) fjes(+) snd soundcore intel_pmc_core(+)
int3403_thermal(+) int340x_thermal_zone intel_vsec pmt_telemetry acpi_pad pmt_class
acpi_tad int3400_thermal acpi_thermal_rel joydev loop nfnetlink zram xe drm_suballoc_helper
nouveau i915 mxm_wmi drm_ttm_helper gpu_sched drm_gpuvm drm_exec drm_buddy i2c_algo_bit
crct10dif_pclmul crc32_pclmul ttm crc32c_intel polyval_clmulni rtsx_pci_sdmmc ucsi_acpi
polyval_generic mmc_core hid_multitouch drm_display_helper ghash_clmulni_intel typec_ucsi
nvme sha512_ssse3 video sha256_ssse3 nvme_core intel_vpu sha1_ssse3 rtsx_pci cec typec
nvme_auth i2c_hid_acpi i2c_hid wmi pinctrl_meteorlake serio_raw ip6_tables ip_tables fuse
CPU: 7 UID: 0 PID: 713 Comm: (udev-worker) Not tainted 6.12.0-rc2iounmap+ #42
Hardware name: LENOVO 21KWCTO1WW/21KWCTO1WW, BIOS N48ET19W (1.06 ) 07/18/2024
RIP: 0010:iounmap+0x58/0x1f0
Code: 85 6a 01 00 00 48 8b 05 e6 e2 28 04 48 39 c5 72 19 eb 26 cc cc cc 48 ba 00 00 00 00 00 00 32 00 48 8d 44 02 ff 48 39 c5 72 23 &lt;0f&gt; 0b 48 83 c4 08 5b 5d 41 5c c3 cc cc cc cc 48 ba 00 00 00 00 00
RSP: 0018:ffff888131eff038 EFLAGS: 00010207
RAX: ffffc90000000000 RBX: 0000000000000000 RCX: ffff888e33b80000
RDX: dffffc0000000000 RSI: ffff888e33bc29c0 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffff8881598a8000 R09: ffff888e2ccedc10
R10: 0000000000000003 R11: ffffffffb3367634 R12: 00000000fe000000
R13: ffff888101d0da28 R14: ffffffffc2e437e0 R15: ffff888110b03b28
FS:  00007f3c1d4b3980(0000) GS:ffff888e33b80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005651cfc93578 CR3: 0000000124e4c002 CR4: 0000000000f70ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
&lt;TASK&gt;
? __warn.cold+0xb6/0x176
? iounmap+0x58/0x1f0
? report_bug+0x1f4/0x2b0
? handle_bug+0x58/0x90
? exc_invalid_op+0x17/0x40
? asm_exc_invalid_op+0x1a/0x20
? iounmap+0x58/0x1f0
pmc_core_ssram_get_pmc+0x477/0x6c0 [intel_pmc_core]
? __pfx_pmc_core_ssram_get_pmc+0x10/0x10 [intel_pmc_core]
? __pfx_do_pci_enable_device+0x10/0x10
? pci_wait_for_pending+0x60/0x110
? pci_enable_device_flags+0x1e3/0x2e0
? __pfx_mtl_core_init+0x10/0x10 [intel_pmc_core]
pmc_core_ssram_init+0x7f/0x110 [intel_pmc_core]
mtl_core_init+0xda/0x130 [intel_pmc_core]
? __mutex_init+0xb9/0x130
pmc_core_probe+0x27e/0x10b0 [intel_pmc_core]
? _raw_spin_lock_irqsave+0x96/0xf0
? __pfx_pmc_core_probe+0x10/0x10 [intel_pmc_core]
? __pfx_mutex_unlock+0x10/0x10
? __pfx_mutex_lock+0x10/0x10
? device_pm_check_callbacks+0x82/0x370
? acpi_dev_pm_attach+0x234/0x2b0
platform_probe+0x9f/0x150
really_probe+0x1e0/0x8a0
__driver_probe_device+0x18c/0x370
? __pfx___driver_attach+0x10/0x10
driver_probe_device+0x4a/0x120
__driver_attach+0x190/0x4a0
? __pfx___driver_attach+0x10/0x10
bus_for_each_dev+0x103/0x180
? __pfx_bus_for_each_dev+0x10/0x10
? klist_add_tail+0x136/0x270
bus_add_driver+0x2fc/0x540
driver_register+0x1a5/0x360
? __pfx_pmc_core_driver_init+0x10/0x10 [intel_pmc_core]
do_one_initcall+0xa4/0x380
? __pfx_do_one_initcall+0x10/0x10
? kasan_unpoison+0x44/0x70
do_init_module+0x296/0x800
load_module+0x5090/0x6ce0
? __pfx_load_module+0x10/0x10
? ima_post_read_file+0x193/0x200
? __pfx_ima_post_read_file+0x10/0x10
? rw_verify_area+0x152/0x4c0
? kernel_read_file+0x257/0x750
? __pfx_kernel_read_file+0x10/0x10
? __pfx_filemap_get_read_batch+0x10/0x10
? init_module_from_file+0xd1/0x130
init_module_from_file+0xd1/0x130
? __pfx_init_module_from_file+0x10/0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50107/">CVE-2024-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50107">CVE-2024-50107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232883">SUSE bug 1232883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50108" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too

Stuart Hayhurst has found that both at bootup and fullscreen VA-API video
is leading to black screens for around 1 second and kernel WARNING [1] traces
when calling dmub_psr_enable() with Parade 08-01 TCON.

These symptoms all go away with PSR-SU disabled for this TCON, so disable
it for now while DMUB traces [2] from the failure can be analyzed and the failure
state properly root caused.

(cherry picked from commit afb634a6823d8d9db23c5fb04f79c5549349628b)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232884">SUSE bug 1232884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50109" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50109" ref_url="https://www.suse.com/security/cve/CVE-2024-50109" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null ptr dereference in raid10_size()

In raid10_run() if raid10_set_queue_limits() succeed, the return value
is set to zero, and if following procedures failed raid10_run() will
return zero while mddev-&gt;private is still NULL, causing null ptr
dereference in raid10_size().

Fix the problem by only overwrite the return value if
raid10_set_queue_limits() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50109/">CVE-2024-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50109">CVE-2024-50109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232886">SUSE bug 1232886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: fix one more kernel-infoleak in algo dumping

During fuzz testing, the following issue was discovered:

BUG: KMSAN: kernel-infoleak in _copy_to_iter+0x598/0x2a30
 _copy_to_iter+0x598/0x2a30
 __skb_datagram_iter+0x168/0x1060
 skb_copy_datagram_iter+0x5b/0x220
 netlink_recvmsg+0x362/0x1700
 sock_recvmsg+0x2dc/0x390
 __sys_recvfrom+0x381/0x6d0
 __x64_sys_recvfrom+0x130/0x200
 x64_sys_call+0x32c8/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Uninit was stored to memory at:
 copy_to_user_state_extra+0xcc1/0x1e00
 dump_one_state+0x28c/0x5f0
 xfrm_state_walk+0x548/0x11e0
 xfrm_dump_sa+0x1e0/0x840
 netlink_dump+0x943/0x1c40
 __netlink_dump_start+0x746/0xdb0
 xfrm_user_rcv_msg+0x429/0xc00
 netlink_rcv_skb+0x613/0x780
 xfrm_netlink_rcv+0x77/0xc0
 netlink_unicast+0xe90/0x1280
 netlink_sendmsg+0x126d/0x1490
 __sock_sendmsg+0x332/0x3d0
 ____sys_sendmsg+0x863/0xc30
 ___sys_sendmsg+0x285/0x3e0
 __x64_sys_sendmsg+0x2d6/0x560
 x64_sys_call+0x1316/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Uninit was created at:
 __kmalloc+0x571/0xd30
 attach_auth+0x106/0x3e0
 xfrm_add_sa+0x2aa0/0x4230
 xfrm_user_rcv_msg+0x832/0xc00
 netlink_rcv_skb+0x613/0x780
 xfrm_netlink_rcv+0x77/0xc0
 netlink_unicast+0xe90/0x1280
 netlink_sendmsg+0x126d/0x1490
 __sock_sendmsg+0x332/0x3d0
 ____sys_sendmsg+0x863/0xc30
 ___sys_sendmsg+0x285/0x3e0
 __x64_sys_sendmsg+0x2d6/0x560
 x64_sys_call+0x1316/0x3cc0
 do_syscall_64+0xd8/0x1c0
 entry_SYSCALL_64_after_hwframe+0x79/0x81

Bytes 328-379 of 732 are uninitialized
Memory access of size 732 starts at ffff88800e18e000
Data copied to user address 00007ff30f48aff0

CPU: 2 PID: 18167 Comm: syz-executor.0 Not tainted 6.8.11 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014

Fixes copying of xfrm algorithms where some random
data of the structure fields can end up in userspace.
Padding in structures may be filled with random (possibly sensitve)
data and should never be given directly to user-space.

A similar issue was resolved in the commit
8222d5910dae ("xfrm: Zero padding when dumping algos and encap")

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232885">SUSE bug 1232885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50111" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50111" ref_url="https://www.suse.com/security/cve/CVE-2024-50111" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Enable IRQ if do_ale() triggered in irq-enabled context

Unaligned access exception can be triggered in irq-enabled context such
as user mode, in this case do_ale() may call get_user() which may cause
sleep. Then we will get:

 BUG: sleeping function called from invalid context at arch/loongarch/kernel/access-helper.h:7
 in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 129, name: modprobe
 preempt_count: 0, expected: 0
 RCU nest depth: 0, expected: 0
 CPU: 0 UID: 0 PID: 129 Comm: modprobe Tainted: G        W          6.12.0-rc1+ #1723
 Tainted: [W]=WARN
 Stack : 9000000105e0bd48 0000000000000000 9000000003803944 9000000105e08000
         9000000105e0bc70 9000000105e0bc78 0000000000000000 0000000000000000
         9000000105e0bc78 0000000000000001 9000000185e0ba07 9000000105e0b890
         ffffffffffffffff 9000000105e0bc78 73924b81763be05b 9000000100194500
         000000000000020c 000000000000000a 0000000000000000 0000000000000003
         00000000000023f0 00000000000e1401 00000000072f8000 0000007ffbb0e260
         0000000000000000 0000000000000000 9000000005437650 90000000055d5000
         0000000000000000 0000000000000003 0000007ffbb0e1f0 0000000000000000
         0000005567b00490 0000000000000000 9000000003803964 0000007ffbb0dfec
         00000000000000b0 0000000000000007 0000000000000003 0000000000071c1d
         ...
 Call Trace:
 [&lt;9000000003803964&gt;] show_stack+0x64/0x1a0
 [&lt;9000000004c57464&gt;] dump_stack_lvl+0x74/0xb0
 [&lt;9000000003861ab4&gt;] __might_resched+0x154/0x1a0
 [&lt;900000000380c96c&gt;] emulate_load_store_insn+0x6c/0xf60
 [&lt;9000000004c58118&gt;] do_ale+0x78/0x180
 [&lt;9000000003801bc8&gt;] handle_ale+0x128/0x1e0

So enable IRQ if unaligned access exception is triggered in irq-enabled
context to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50111/">CVE-2024-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50111">CVE-2024-50111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232866">SUSE bug 1232866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50112" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50112" ref_url="https://www.suse.com/security/cve/CVE-2024-50112" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/lam: Disable ADDRESS_MASKING in most cases

Linear Address Masking (LAM) has a weakness related to transient
execution as described in the SLAM paper[1]. Unless Linear Address
Space Separation (LASS) is enabled this weakness may be exploitable.

Until kernel adds support for LASS[2], only allow LAM for COMPILE_TEST,
or when speculation mitigations have been disabled at compile time,
otherwise keep LAM disabled.

There are no processors in market that support LAM yet, so currently
nobody is affected by this issue.

[1] SLAM: https://download.vusec.net/papers/slam_sp24.pdf
[2] LASS: https://lore.kernel.org/lkml/20230609183632.48706-1-alexander.shishkin@linux.intel.com/

[ dhansen: update SPECULATION_MITIGATIONS -&gt; CPU_MITIGATIONS ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50112/">CVE-2024-50112 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50112">CVE-2024-50112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232867">SUSE bug 1232867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50113" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50113" ref_url="https://www.suse.com/security/cve/CVE-2024-50113" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firewire: core: fix invalid port index for parent device

In a commit 24b7f8e5cd65 ("firewire: core: use helper functions for self
ID sequence"), the enumeration over self ID sequence was refactored with
some helper functions with KUnit tests. These helper functions are
guaranteed to work expectedly by the KUnit tests, however their application
includes a mistake to assign invalid value to the index of port connected
to parent device.

This bug affects the case that any extra node devices which has three or
more ports are connected to 1394 OHCI controller. In the case, the path
to update the tree cache could hits WARN_ON(), and gets general protection
fault due to the access to invalid address computed by the invalid value.

This commit fixes the bug to assign correct port index.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50113/">CVE-2024-50113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50113">CVE-2024-50113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232891">SUSE bug 1232891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50114" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50114" ref_url="https://www.suse.com/security/cve/CVE-2024-50114" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Unregister redistributor for failed vCPU creation

Alex reports that syzkaller has managed to trigger a use-after-free when
tearing down a VM:

  BUG: KASAN: slab-use-after-free in kvm_put_kvm+0x300/0xe68 virt/kvm/kvm_main.c:5769
  Read of size 8 at addr ffffff801c6890d0 by task syz.3.2219/10758

  CPU: 3 UID: 0 PID: 10758 Comm: syz.3.2219 Not tainted 6.11.0-rc6-dirty #64
  Hardware name: linux,dummy-virt (DT)
  Call trace:
   dump_backtrace+0x17c/0x1a8 arch/arm64/kernel/stacktrace.c:317
   show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:324
   __dump_stack lib/dump_stack.c:93 [inline]
   dump_stack_lvl+0x94/0xc0 lib/dump_stack.c:119
   print_report+0x144/0x7a4 mm/kasan/report.c:377
   kasan_report+0xcc/0x128 mm/kasan/report.c:601
   __asan_report_load8_noabort+0x20/0x2c mm/kasan/report_generic.c:381
   kvm_put_kvm+0x300/0xe68 virt/kvm/kvm_main.c:5769
   kvm_vm_release+0x4c/0x60 virt/kvm/kvm_main.c:1409
   __fput+0x198/0x71c fs/file_table.c:422
   ____fput+0x20/0x30 fs/file_table.c:450
   task_work_run+0x1cc/0x23c kernel/task_work.c:228
   do_notify_resume+0x144/0x1a0 include/linux/resume_user_mode.h:50
   el0_svc+0x64/0x68 arch/arm64/kernel/entry-common.c:169
   el0t_64_sync_handler+0x90/0xfc arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598

Upon closer inspection, it appears that we do not properly tear down the
MMIO registration for a vCPU that fails creation late in the game, e.g.
a vCPU w/ the same ID already exists in the VM.

It is important to consider the context of commit that introduced this bug
by moving the unregistration out of __kvm_vgic_vcpu_destroy(). That
change correctly sought to avoid an srcu v. config_lock inversion by
breaking up the vCPU teardown into two parts, one guarded by the
config_lock.

Fix the use-after-free while avoiding lock inversion by adding a
special-cased unregistration to __kvm_vgic_vcpu_destroy(). This is safe
because failed vCPUs are torn down outside of the config_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50114/">CVE-2024-50114 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50114">CVE-2024-50114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232912">SUSE bug 1232912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50116" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug due to missing clearing of buffer delay flag

Syzbot reported that after nilfs2 reads a corrupted file system image
and degrades to read-only, the BUG_ON check for the buffer delay flag
in submit_bh_wbc() may fail, causing a kernel bug.

This is because the buffer delay flag is not cleared when clearing the
buffer state flags to discard a page/folio or a buffer head. So, fix
this.

This became necessary when the use of nilfs2's own page clear routine
was expanded.  This state inconsistency does not occur if the buffer
is written normally by log writing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232892">SUSE bug 1232892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50118" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50118" ref_url="https://www.suse.com/security/cve/CVE-2024-50118" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: reject ro-&gt;rw reconfiguration if there are hard ro requirements

[BUG]
Syzbot reports the following crash:

  BTRFS info (device loop0 state MCS): disabling free space tree
  BTRFS info (device loop0 state MCS): clearing compat-ro feature flag for FREE_SPACE_TREE (0x1)
  BTRFS info (device loop0 state MCS): clearing compat-ro feature flag for FREE_SPACE_TREE_VALID (0x2)
  Oops: general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
  RIP: 0010:backup_super_roots fs/btrfs/disk-io.c:1691 [inline]
  RIP: 0010:write_all_supers+0x97a/0x40f0 fs/btrfs/disk-io.c:4041
  Call Trace:
   &lt;TASK&gt;
   btrfs_commit_transaction+0x1eae/0x3740 fs/btrfs/transaction.c:2530
   btrfs_delete_free_space_tree+0x383/0x730 fs/btrfs/free-space-tree.c:1312
   btrfs_start_pre_rw_mount+0xf28/0x1300 fs/btrfs/disk-io.c:3012
   btrfs_remount_rw fs/btrfs/super.c:1309 [inline]
   btrfs_reconfigure+0xae6/0x2d40 fs/btrfs/super.c:1534
   btrfs_reconfigure_for_mount fs/btrfs/super.c:2020 [inline]
   btrfs_get_tree_subvol fs/btrfs/super.c:2079 [inline]
   btrfs_get_tree+0x918/0x1920 fs/btrfs/super.c:2115
   vfs_get_tree+0x90/0x2b0 fs/super.c:1800
   do_new_mount+0x2be/0xb40 fs/namespace.c:3472
   do_mount fs/namespace.c:3812 [inline]
   __do_sys_mount fs/namespace.c:4020 [inline]
   __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:3997
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

[CAUSE]
To support mounting different subvolume with different RO/RW flags for
the new mount APIs, btrfs introduced two workaround to support this feature:

- Skip mount option/feature checks if we are mounting a different
  subvolume

- Reconfigure the fs to RW if the initial mount is RO

Combining these two, we can have the following sequence:

- Mount the fs ro,rescue=all,clear_cache,space_cache=v1
  rescue=all will mark the fs as hard read-only, so no v2 cache clearing
  will happen.

- Mount a subvolume rw of the same fs.
  We go into btrfs_get_tree_subvol(), but fc_mount() returns EBUSY
  because our new fc is RW, different from the original fs.

  Now we enter btrfs_reconfigure_for_mount(), which switches the RO flag
  first so that we can grab the existing fs_info.
  Then we reconfigure the fs to RW.

- During reconfiguration, option/features check is skipped
  This means we will restart the v2 cache clearing, and convert back to
  v1 cache.
  This will trigger fs writes, and since the original fs has "rescue=all"
  option, it skips the csum tree read.

  And eventually causing NULL pointer dereference in super block
  writeback.

[FIX]
For reconfiguration caused by different subvolume RO/RW flags, ensure we
always run btrfs_check_options() to ensure we have proper hard RO
requirements met.

In fact the function btrfs_check_options() doesn't really do many
complex checks, but hard RO requirement and some feature dependency
checks, thus there is no special reason not to do the check for mount
reconfiguration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50118/">CVE-2024-50118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50118">CVE-2024-50118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232859">SUSE bug 1232859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50119" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50119" ref_url="https://www.suse.com/security/cve/CVE-2024-50119" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix warning when destroy 'cifs_io_request_pool'

There's a issue as follows:
WARNING: CPU: 1 PID: 27826 at mm/slub.c:4698 free_large_kmalloc+0xac/0xe0
RIP: 0010:free_large_kmalloc+0xac/0xe0
Call Trace:
 &lt;TASK&gt;
 ? __warn+0xea/0x330
 mempool_destroy+0x13f/0x1d0
 init_cifs+0xa50/0xff0 [cifs]
 do_one_initcall+0xdc/0x550
 do_init_module+0x22d/0x6b0
 load_module+0x4e96/0x5ff0
 init_module_from_file+0xcd/0x130
 idempotent_init_module+0x330/0x620
 __x64_sys_finit_module+0xb3/0x110
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Obviously, 'cifs_io_request_pool' is not created by mempool_create().
So just use mempool_exit() to revert 'cifs_io_request_pool'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50119/">CVE-2024-50119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50119">CVE-2024-50119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232858">SUSE bug 1232858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50120" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50120" ref_url="https://www.suse.com/security/cve/CVE-2024-50120" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Handle kstrdup failures for passwords

In smb3_reconfigure(), after duplicating ctx-&gt;password and
ctx-&gt;password2 with kstrdup(), we need to check for allocation
failures.

If ses-&gt;password allocation fails, return -ENOMEM.
If ses-&gt;password2 allocation fails, free ses-&gt;password, set it
to NULL, and return -ENOMEM.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50120/">CVE-2024-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232924">SUSE bug 1232924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50121" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50121" ref_url="https://www.suse.com/security/cve/CVE-2024-50121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net

In the normal case, when we excute `echo 0 &gt; /proc/fs/nfsd/threads`, the
function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will
release all resources related to the hashed `nfs4_client`. If the
`nfsd_client_shrinker` is running concurrently, the `expire_client`
function will first unhash this client and then destroy it. This can
lead to the following warning. Additionally, numerous use-after-free
errors may occur as well.

nfsd_client_shrinker         echo 0 &gt; /proc/fs/nfsd/threads

expire_client                nfsd_shutdown_net
  unhash_client                ...
                               nfs4_state_shutdown_net
                                 /* won't wait shrinker exit */
  /*                             cancel_work(&amp;nn-&gt;nfsd_shrinker_work)
   * nfsd_file for this          /* won't destroy unhashed client1 */
   * client1 still alive         nfs4_state_destroy_net
   */

                               nfsd_file_cache_shutdown
                                 /* trigger warning */
                                 kmem_cache_destroy(nfsd_file_slab)
                                 kmem_cache_destroy(nfsd_file_mark_slab)
  /* release nfsd_file and mark */
  __destroy_client

====================================================================
BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on
__kmem_cache_shutdown()
--------------------------------------------------------------------
CPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1

 dump_stack_lvl+0x53/0x70
 slab_err+0xb0/0xf0
 __kmem_cache_shutdown+0x15c/0x310
 kmem_cache_destroy+0x66/0x160
 nfsd_file_cache_shutdown+0xac/0x210 [nfsd]
 nfsd_destroy_serv+0x251/0x2a0 [nfsd]
 nfsd_svc+0x125/0x1e0 [nfsd]
 write_threads+0x16a/0x2a0 [nfsd]
 nfsctl_transaction_write+0x74/0xa0 [nfsd]
 vfs_write+0x1a5/0x6d0
 ksys_write+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

====================================================================
BUG nfsd_file_mark (Tainted: G    B   W         ): Objects remaining
nfsd_file_mark on __kmem_cache_shutdown()
--------------------------------------------------------------------

 dump_stack_lvl+0x53/0x70
 slab_err+0xb0/0xf0
 __kmem_cache_shutdown+0x15c/0x310
 kmem_cache_destroy+0x66/0x160
 nfsd_file_cache_shutdown+0xc8/0x210 [nfsd]
 nfsd_destroy_serv+0x251/0x2a0 [nfsd]
 nfsd_svc+0x125/0x1e0 [nfsd]
 write_threads+0x16a/0x2a0 [nfsd]
 nfsctl_transaction_write+0x74/0xa0 [nfsd]
 vfs_write+0x1a5/0x6d0
 ksys_write+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

To resolve this issue, cancel `nfsd_shrinker_work` using synchronous
mode in nfs4_state_shutdown_net.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50121/">CVE-2024-50121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232925">SUSE bug 1232925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50122" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50122" ref_url="https://www.suse.com/security/cve/CVE-2024-50122" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Hold rescan lock while adding devices during host probe

Since adding the PCI power control code, we may end up with a race between
the pwrctl platform device rescanning the bus and host controller probe
functions. The latter need to take the rescan lock when adding devices or
we may end up in an undefined state having two incompletely added devices
and hit the following crash when trying to remove the device over sysfs:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
  Internal error: Oops: 0000000096000004 [#1] SMP
  Call trace:
    __pi_strlen+0x14/0x150
    kernfs_find_ns+0x80/0x13c
    kernfs_remove_by_name_ns+0x54/0xf0
    sysfs_remove_bin_file+0x24/0x34
    pci_remove_resource_files+0x3c/0x84
    pci_remove_sysfs_dev_files+0x28/0x38
    pci_stop_bus_device+0x8c/0xd8
    pci_stop_bus_device+0x40/0xd8
    pci_stop_and_remove_bus_device_locked+0x28/0x48
    remove_store+0x70/0xb0
    dev_attr_store+0x20/0x38
    sysfs_kf_write+0x58/0x78
    kernfs_fop_write_iter+0xe8/0x184
    vfs_write+0x2dc/0x308
    ksys_write+0x7c/0xec
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50122/">CVE-2024-50122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50122">CVE-2024-50122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232930">SUSE bug 1232930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50123" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50123" ref_url="https://www.suse.com/security/cve/CVE-2024-50123" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add the missing BPF_LINK_TYPE invocation for sockmap

There is an out-of-bounds read in bpf_link_show_fdinfo() for the sockmap
link fd. Fix it by adding the missing BPF_LINK_TYPE invocation for
sockmap link

Also add comments for bpf_link_type to prevent missing updates in the
future.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50123/">CVE-2024-50123 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50123">CVE-2024-50123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232857">SUSE bug 1232857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50124" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix UAF on iso_sock_timeout

conn-&gt;sk maybe have been unlinked/freed while waiting for iso_conn_lock
so this checks if the conn-&gt;sk is still valid by checking if it part of
iso_sk_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232926">SUSE bug 1232926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232927">SUSE bug 1232927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50126" ref_url="https://www.suse.com/security/cve/CVE-2024-50126" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: use RCU read-side critical section in taprio_dump()

Fix possible use-after-free in 'taprio_dump()' by adding RCU
read-side critical section there. Never seen on x86 but
found on a KASAN-enabled arm64 system when investigating
https://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa:

[T15862] BUG: KASAN: slab-use-after-free in taprio_dump+0xa0c/0xbb0
[T15862] Read of size 4 at addr ffff0000d4bb88f8 by task repro/15862
[T15862]
[T15862] CPU: 0 UID: 0 PID: 15862 Comm: repro Not tainted 6.11.0-rc1-00293-gdefaf1a2113a-dirty #2
[T15862] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-20240524-5.fc40 05/24/2024
[T15862] Call trace:
[T15862]  dump_backtrace+0x20c/0x220
[T15862]  show_stack+0x2c/0x40
[T15862]  dump_stack_lvl+0xf8/0x174
[T15862]  print_report+0x170/0x4d8
[T15862]  kasan_report+0xb8/0x1d4
[T15862]  __asan_report_load4_noabort+0x20/0x2c
[T15862]  taprio_dump+0xa0c/0xbb0
[T15862]  tc_fill_qdisc+0x540/0x1020
[T15862]  qdisc_notify.isra.0+0x330/0x3a0
[T15862]  tc_modify_qdisc+0x7b8/0x1838
[T15862]  rtnetlink_rcv_msg+0x3c8/0xc20
[T15862]  netlink_rcv_skb+0x1f8/0x3d4
[T15862]  rtnetlink_rcv+0x28/0x40
[T15862]  netlink_unicast+0x51c/0x790
[T15862]  netlink_sendmsg+0x79c/0xc20
[T15862]  __sock_sendmsg+0xe0/0x1a0
[T15862]  ____sys_sendmsg+0x6c0/0x840
[T15862]  ___sys_sendmsg+0x1ac/0x1f0
[T15862]  __sys_sendmsg+0x110/0x1d0
[T15862]  __arm64_sys_sendmsg+0x74/0xb0
[T15862]  invoke_syscall+0x88/0x2e0
[T15862]  el0_svc_common.constprop.0+0xe4/0x2a0
[T15862]  do_el0_svc+0x44/0x60
[T15862]  el0_svc+0x50/0x184
[T15862]  el0t_64_sync_handler+0x120/0x12c
[T15862]  el0t_64_sync+0x190/0x194
[T15862]
[T15862] Allocated by task 15857:
[T15862]  kasan_save_stack+0x3c/0x70
[T15862]  kasan_save_track+0x20/0x3c
[T15862]  kasan_save_alloc_info+0x40/0x60
[T15862]  __kasan_kmalloc+0xd4/0xe0
[T15862]  __kmalloc_cache_noprof+0x194/0x334
[T15862]  taprio_change+0x45c/0x2fe0
[T15862]  tc_modify_qdisc+0x6a8/0x1838
[T15862]  rtnetlink_rcv_msg+0x3c8/0xc20
[T15862]  netlink_rcv_skb+0x1f8/0x3d4
[T15862]  rtnetlink_rcv+0x28/0x40
[T15862]  netlink_unicast+0x51c/0x790
[T15862]  netlink_sendmsg+0x79c/0xc20
[T15862]  __sock_sendmsg+0xe0/0x1a0
[T15862]  ____sys_sendmsg+0x6c0/0x840
[T15862]  ___sys_sendmsg+0x1ac/0x1f0
[T15862]  __sys_sendmsg+0x110/0x1d0
[T15862]  __arm64_sys_sendmsg+0x74/0xb0
[T15862]  invoke_syscall+0x88/0x2e0
[T15862]  el0_svc_common.constprop.0+0xe4/0x2a0
[T15862]  do_el0_svc+0x44/0x60
[T15862]  el0_svc+0x50/0x184
[T15862]  el0t_64_sync_handler+0x120/0x12c
[T15862]  el0t_64_sync+0x190/0x194
[T15862]
[T15862] Freed by task 6192:
[T15862]  kasan_save_stack+0x3c/0x70
[T15862]  kasan_save_track+0x20/0x3c
[T15862]  kasan_save_free_info+0x4c/0x80
[T15862]  poison_slab_object+0x110/0x160
[T15862]  __kasan_slab_free+0x3c/0x74
[T15862]  kfree+0x134/0x3c0
[T15862]  taprio_free_sched_cb+0x18c/0x220
[T15862]  rcu_core+0x920/0x1b7c
[T15862]  rcu_core_si+0x10/0x1c
[T15862]  handle_softirqs+0x2e8/0xd64
[T15862]  __do_softirq+0x14/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50126/">CVE-2024-50126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232895">SUSE bug 1232895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix use-after-free in taprio_change()

In 'taprio_change()', 'admin' pointer may become dangling due to sched
switch / removal caused by 'advance_sched()', and critical section
protected by 'q-&gt;current_entry_lock' is too small to prevent from such
a scenario (which causes use-after-free detected by KASAN). Fix this
by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update
'admin' immediately before an attempt to schedule freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232908">SUSE bug 1232908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: fix global oob in wwan_rtnl_policy

The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to
a global out-of-bounds read when parsing the netlink attributes. Exactly
same bug cause as the oob fixed in commit b33fb5b801c6 ("net: qualcomm:
rmnet: fix global oob in rmnet_policy").

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:388 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
Read of size 1 at addr ffffffff8b09cb60 by task syz.1.66276/323862

CPU: 0 PID: 323862 Comm: syz.1.66276 Not tainted 6.1.70 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x14f/0x750 mm/kasan/report.c:395
 kasan_report+0x139/0x170 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:388 [inline]
 __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
 __nla_parse+0x3c/0x50 lib/nlattr.c:700
 nla_parse_nested_deprecated include/net/netlink.h:1269 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3514 [inline]
 rtnl_newlink+0x7bc/0x1fd0 net/core/rtnetlink.c:3623
 rtnetlink_rcv_msg+0x794/0xef0 net/core/rtnetlink.c:6122
 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508
 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
 netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352
 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874
 sock_sendmsg_nosec net/socket.c:716 [inline]
 __sock_sendmsg net/socket.c:728 [inline]
 ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499
 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553
 __sys_sendmsg net/socket.c:2582 [inline]
 __do_sys_sendmsg net/socket.c:2591 [inline]
 __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f67b19a24ad
RSP: 002b:00007f67b17febb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f67b1b45f80 RCX: 00007f67b19a24ad
RDX: 0000000000000000 RSI: 0000000020005e40 RDI: 0000000000000004
RBP: 00007f67b1a1e01d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd2513764f R14: 00007ffd251376e0 R15: 00007f67b17fed40
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 wwan_rtnl_policy+0x20/0x40

The buggy address belongs to the physical page:
page:ffffea00002c2700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb09c
flags: 0xfff00000001000(reserved|node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000001000 ffffea00002c2708 ffffea00002c2708 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner info is not present (never set?)

Memory state around the buggy address:
 ffffffff8b09ca00: 05 f9 f9 f9 05 f9 f9 f9 00 01 f9 f9 00 01 f9 f9
 ffffffff8b09ca80: 00 00 00 05 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9
&gt;ffffffff8b09cb00: 00 00 00 00 05 f9 f9 f9 00 00 00 00 f9 f9 f9 f9
                                                       ^
 ffffffff8b09cb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================

According to the comment of `nla_parse_nested_deprecated`, use correct size
`IFLA_WWAN_MAX` here to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50129" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50129" ref_url="https://www.suse.com/security/cve/CVE-2024-50129" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: pse-pd: Fix out of bound for loop

Adjust the loop limit to prevent out-of-bounds access when iterating over
PI structures. The loop should not reach the index pcdev-&gt;nr_lines since
we allocate exactly pcdev-&gt;nr_lines number of PI structures. This fix
ensures proper bounds are maintained during iterations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50129/">CVE-2024-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50129">CVE-2024-50129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232856">SUSE bug 1232856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50130" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: bpf: must hold reference on net namespace

BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0
Read of size 8 at addr ffff8880106fe400 by task repro/72=
bpf_nf_link_release+0xda/0x1e0
bpf_link_free+0x139/0x2d0
bpf_link_release+0x68/0x80
__fput+0x414/0xb60

Eric says:
 It seems that bpf was able to defer the __nf_unregister_net_hook()
 after exit()/close() time.
 Perhaps a netns reference is missing, because the netns has been
 dismantled/freed already.
 bpf_nf_link_attach() does :
 link-&gt;net = net;
 But I do not see a reference being taken on net.

Add such a reference and release it after hook unreg.
Note that I was unable to get syzbot reproducer to work, so I
do not know if this resolves this splat.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232894">SUSE bug 1232894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Consider the NULL character when validating the event length

strlen() returns a string length excluding the null byte. If the string
length equals to the maximum buffer length, the buffer will have no
space for the NULL terminating character.

This commit checks this condition and returns failure for it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232896">SUSE bug 1232896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50132" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50132" ref_url="https://www.suse.com/security/cve/CVE-2024-50132" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/probes: Fix MAX_TRACE_ARGS limit handling

When creating a trace_probe we would set nr_args prior to truncating the
arguments to MAX_TRACE_ARGS. However, we would only initialize arguments
up to the limit.

This caused invalid memory access when attempting to set up probes with
more than 128 fetchargs.

  BUG: kernel NULL pointer dereference, address: 0000000000000020
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: Oops: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 UID: 0 PID: 1769 Comm: cat Not tainted 6.11.0-rc7+ #8
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014
  RIP: 0010:__set_print_fmt+0x134/0x330

Resolve the issue by applying the MAX_TRACE_ARGS limit earlier. Return
an error when there are too many arguments instead of silently
truncating.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50132/">CVE-2024-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50132">CVE-2024-50132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232861">SUSE bug 1232861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50133" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50133" ref_url="https://www.suse.com/security/cve/CVE-2024-50133" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Don't crash in stack_top() for tasks without vDSO

Not all tasks have a vDSO mapped, for example kthreads never do. If such
a task ever ends up calling stack_top(), it will derefence the NULL vdso
pointer and crash.

This can for example happen when using kunit:

	[&lt;9000000000203874&gt;] stack_top+0x58/0xa8
	[&lt;90000000002956cc&gt;] arch_pick_mmap_layout+0x164/0x220
	[&lt;90000000003c284c&gt;] kunit_vm_mmap_init+0x108/0x12c
	[&lt;90000000003c1fbc&gt;] __kunit_add_resource+0x38/0x8c
	[&lt;90000000003c2704&gt;] kunit_vm_mmap+0x88/0xc8
	[&lt;9000000000410b14&gt;] usercopy_test_init+0xbc/0x25c
	[&lt;90000000003c1db4&gt;] kunit_try_run_case+0x5c/0x184
	[&lt;90000000003c3d54&gt;] kunit_generic_run_threadfn_adapter+0x24/0x48
	[&lt;900000000022e4bc&gt;] kthread+0xc8/0xd4
	[&lt;9000000000200ce8&gt;] ret_from_kernel_thread+0xc/0xa4
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50133/">CVE-2024-50133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50133">CVE-2024-50133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232854">SUSE bug 1232854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50134" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA

Replace the fake VLA at end of the vbva_mouse_pointer_shape shape with
a real VLA to fix a "memcpy: detected field-spanning write error" warning:

[   13.319813] memcpy: detected field-spanning write (size 16896) of single field "p-&gt;data" at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 (size 4)
[   13.319841] WARNING: CPU: 0 PID: 1105 at drivers/gpu/drm/vboxvideo/hgsmi_base.c:154 hgsmi_update_pointer_shape+0x192/0x1c0 [vboxvideo]
[   13.320038] Call Trace:
[   13.320173]  hgsmi_update_pointer_shape [vboxvideo]
[   13.320184]  vbox_cursor_atomic_update [vboxvideo]

Note as mentioned in the added comment it seems the original length
calculation for the allocated and send hgsmi buffer is 4 bytes too large.
Changing this is not the goal of this patch, so this behavior is kept.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232890">SUSE bug 1232890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50136" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50136" ref_url="https://www.suse.com/security/cve/CVE-2024-50136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Unregister notifier on eswitch init failure

It otherwise remains registered and a subsequent attempt at eswitch
enabling might trigger warnings of the sort:

[  682.589148] ------------[ cut here ]------------
[  682.590204] notifier callback eswitch_vport_event [mlx5_core] already registered
[  682.590256] WARNING: CPU: 13 PID: 2660 at kernel/notifier.c:31 notifier_chain_register+0x3e/0x90
[...snipped]
[  682.610052] Call Trace:
[  682.610369]  &lt;TASK&gt;
[  682.610663]  ? __warn+0x7c/0x110
[  682.611050]  ? notifier_chain_register+0x3e/0x90
[  682.611556]  ? report_bug+0x148/0x170
[  682.611977]  ? handle_bug+0x36/0x70
[  682.612384]  ? exc_invalid_op+0x13/0x60
[  682.612817]  ? asm_exc_invalid_op+0x16/0x20
[  682.613284]  ? notifier_chain_register+0x3e/0x90
[  682.613789]  atomic_notifier_chain_register+0x25/0x40
[  682.614322]  mlx5_eswitch_enable_locked+0x1d4/0x3b0 [mlx5_core]
[  682.614965]  mlx5_eswitch_enable+0xc9/0x100 [mlx5_core]
[  682.615551]  mlx5_device_enable_sriov+0x25/0x340 [mlx5_core]
[  682.616170]  mlx5_core_sriov_configure+0x50/0x170 [mlx5_core]
[  682.616789]  sriov_numvfs_store+0xb0/0x1b0
[  682.617248]  kernfs_fop_write_iter+0x117/0x1a0
[  682.617734]  vfs_write+0x231/0x3f0
[  682.618138]  ksys_write+0x63/0xe0
[  682.618536]  do_syscall_64+0x4c/0x100
[  682.618958]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50136/">CVE-2024-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50136">CVE-2024-50136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232914">SUSE bug 1232914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50137" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50137" ref_url="https://www.suse.com/security/cve/CVE-2024-50137" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

reset: starfive: jh71x0: Fix accessing the empty member on JH7110 SoC

data-&gt;asserted will be NULL on JH7110 SoC since commit 82327b127d41
("reset: starfive: Add StarFive JH7110 reset driver") was added. Add
the judgment condition to avoid errors when calling reset_control_status
on JH7110 SoC.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50137/">CVE-2024-50137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50137">CVE-2024-50137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232932">SUSE bug 1232932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50138" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Use raw_spinlock_t in ringbuf

The function __bpf_ringbuf_reserve is invoked from a tracepoint, which
disables preemption. Using spinlock_t in this context can lead to a
"sleep in atomic" warning in the RT variant. This issue is illustrated
in the example below:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs
preempt_count: 1, expected: 0
RCU nest depth: 1, expected: 1
INFO: lockdep is turned off.
Preemption disabled at:
[&lt;ffffd33a5c88ea44&gt;] migrate_enable+0xc0/0x39c
CPU: 7 PID: 556208 Comm: test_progs Tainted: G
Hardware name: Qualcomm SA8775P Ride (DT)
Call trace:
 dump_backtrace+0xac/0x130
 show_stack+0x1c/0x30
 dump_stack_lvl+0xac/0xe8
 dump_stack+0x18/0x30
 __might_resched+0x3bc/0x4fc
 rt_spin_lock+0x8c/0x1a4
 __bpf_ringbuf_reserve+0xc4/0x254
 bpf_ringbuf_reserve_dynptr+0x5c/0xdc
 bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238
 trace_call_bpf+0x238/0x774
 perf_call_bpf_enter.isra.0+0x104/0x194
 perf_syscall_enter+0x2f8/0x510
 trace_sys_enter+0x39c/0x564
 syscall_trace_enter+0x220/0x3c0
 do_el0_svc+0x138/0x1dc
 el0_svc+0x54/0x130
 el0t_64_sync_handler+0x134/0x150
 el0t_64_sync+0x17c/0x180

Switch the spinlock to raw_spinlock_t to avoid this error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232935">SUSE bug 1232935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50139" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50139" ref_url="https://www.suse.com/security/cve/CVE-2024-50139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Fix shift-out-of-bounds bug

Fix a shift-out-of-bounds bug reported by UBSAN when running
VM with MTE enabled host kernel.

UBSAN: shift-out-of-bounds in arch/arm64/kvm/sys_regs.c:1988:14
shift exponent 33 is too large for 32-bit type 'int'
CPU: 26 UID: 0 PID: 7629 Comm: qemu-kvm Not tainted 6.12.0-rc2 #34
Hardware name: IEI NF5280R7/Mitchell MB, BIOS 00.00. 2024-10-12 09:28:54 10/14/2024
Call trace:
 dump_backtrace+0xa0/0x128
 show_stack+0x20/0x38
 dump_stack_lvl+0x74/0x90
 dump_stack+0x18/0x28
 __ubsan_handle_shift_out_of_bounds+0xf8/0x1e0
 reset_clidr+0x10c/0x1c8
 kvm_reset_sys_regs+0x50/0x1c8
 kvm_reset_vcpu+0xec/0x2b0
 __kvm_vcpu_set_target+0x84/0x158
 kvm_vcpu_set_target+0x138/0x168
 kvm_arch_vcpu_ioctl_vcpu_init+0x40/0x2b0
 kvm_arch_vcpu_ioctl+0x28c/0x4b8
 kvm_vcpu_ioctl+0x4bc/0x7a8
 __arm64_sys_ioctl+0xb4/0x100
 invoke_syscall+0x70/0x100
 el0_svc_common.constprop.0+0x48/0xf0
 do_el0_svc+0x24/0x38
 el0_svc+0x3c/0x158
 el0t_64_sync_handler+0x120/0x130
 el0t_64_sync+0x194/0x198
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50139/">CVE-2024-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50139">CVE-2024-50139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233062">SUSE bug 1233062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50140" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50140" ref_url="https://www.suse.com/security/cve/CVE-2024-50140" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/core: Disable page allocation in task_tick_mm_cid()

With KASAN and PREEMPT_RT enabled, calling task_work_add() in
task_tick_mm_cid() may cause the following splat.

[   63.696416] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
[   63.696416] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 610, name: modprobe
[   63.696416] preempt_count: 10001, expected: 0
[   63.696416] RCU nest depth: 1, expected: 1

This problem is caused by the following call trace.

  sched_tick() [ acquire rq-&gt;__lock ]
   -&gt; task_tick_mm_cid()
    -&gt; task_work_add()
     -&gt; __kasan_record_aux_stack()
      -&gt; kasan_save_stack()
       -&gt; stack_depot_save_flags()
        -&gt; alloc_pages_mpol_noprof()
         -&gt; __alloc_pages_noprof()
	  -&gt; get_page_from_freelist()
	   -&gt; rmqueue()
	    -&gt; rmqueue_pcplist()
	     -&gt; __rmqueue_pcplist()
	      -&gt; rmqueue_bulk()
	       -&gt; rt_spin_lock()

The rq lock is a raw_spinlock_t. We can't sleep while holding
it. IOW, we can't call alloc_pages() in stack_depot_save_flags().

The task_tick_mm_cid() function with its task_work_add() call was
introduced by commit 223baf9d17f2 ("sched: Fix performance regression
introduced by mm_cid") in v6.4 kernel.

Fortunately, there is a kasan_record_aux_stack_noalloc() variant that
calls stack_depot_save_flags() while not allowing it to allocate
new pages.  To allow task_tick_mm_cid() to use task_work without
page allocation, a new TWAF_NO_ALLOC flag is added to enable calling
kasan_record_aux_stack_noalloc() instead of kasan_record_aux_stack()
if set. The task_tick_mm_cid() function is modified to add this new flag.

The possible downside is the missing stack trace in a KASAN report due
to new page allocation required when task_work_add_noallloc() is called
which should be rare.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50140/">CVE-2024-50140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50140">CVE-2024-50140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233060">SUSE bug 1233060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context

PRMT needs to find the correct type of block to translate the PA-VA
mapping for EFI runtime services.

The issue arises because the PRMT is finding a block of type
EFI_CONVENTIONAL_MEMORY, which is not appropriate for runtime services
as described in Section 2.2.2 (Runtime Services) of the UEFI
Specification [1]. Since the PRM handler is a type of runtime service,
this causes an exception when the PRM handler is called.

    [Firmware Bug]: Unable to handle paging request in EFI runtime service
    WARNING: CPU: 22 PID: 4330 at drivers/firmware/efi/runtime-wrappers.c:341
        __efi_queue_work+0x11c/0x170
    Call trace:

Let PRMT find a block with EFI_MEMORY_RUNTIME for PRM handler and PRM
context.

If no suitable block is found, a warning message will be printed, but
the procedure continues to manage the next PRM handler.

However, if the PRM handler is actually called without proper allocation,
it would result in a failure during error handling.

By using the correct memory types for runtime services, ensure that the
PRM handler and the context are properly mapped in the virtual address
space during runtime, preventing the paging request error.

The issue is really that only memory that has been remapped for runtime
by the firmware can be used by the PRM handler, and so the region needs
to have the EFI_MEMORY_RUNTIME attribute.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233065">SUSE bug 1233065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50142</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50142" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50142" ref_url="https://www.suse.com/security/cve/CVE-2024-50142" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: validate new SA's prefixlen using SA family when sel.family is unset

This expands the validation introduced in commit 07bf7908950a ("xfrm:
Validate address prefix lengths in the xfrm selector.")

syzbot created an SA with
    usersa.sel.family = AF_UNSPEC
    usersa.sel.prefixlen_s = 128
    usersa.family = AF_INET

Because of the AF_UNSPEC selector, verify_newsa_info doesn't put
limits on prefixlen_{s,d}. But then copy_from_user_state sets
x-&gt;sel.family to usersa.family (AF_INET). Do the same conversion in
verify_newsa_info before validating prefixlen_{s,d}, since that's how
prefixlen is going to be used later on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50142/">CVE-2024-50142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50142">CVE-2024-50142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233028">SUSE bug 1233028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50143" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: fix uninit-value use in udf_get_fileshortad

Check for overflow when computing alen in udf_current_aext to mitigate
later uninit-value use in udf_get_fileshortad KMSAN bug[1].
After applying the patch reproducer did not trigger any issue[2].

[1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df
[2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233038">SUSE bug 1233038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50144" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50144" ref_url="https://www.suse.com/security/cve/CVE-2024-50144" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: fix unbalanced rpm put() with fence_fini()

Currently we can call fence_fini() twice if something goes wrong when
sending the GuC CT for the tlb request, since we signal the fence and
return an error, leading to the caller also calling fini() on the error
path in the case of stack version of the flow, which leads to an extra
rpm put() which might later cause device to enter suspend when it
shouldn't. It looks like we can just drop the fini() call since the
fence signaller side will already call this for us.

There are known mysterious splats with device going to sleep even with
an rpm ref, and this could be one candidate.

v2 (Matt B):
  - Prefer warning if we detect double fini()

(cherry picked from commit cfcbc0520d5055825f0647ab922b655688605183)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50144/">CVE-2024-50144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50144">CVE-2024-50144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233040">SUSE bug 1233040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50145" ref_url="https://www.suse.com/security/cve/CVE-2024-50145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeon_ep: Add SKB allocation failures handling in __octep_oq_process_rx()

build_skb() returns NULL in case of a memory allocation failure so handle
it inside __octep_oq_process_rx() to avoid NULL pointer dereference.

__octep_oq_process_rx() is called during NAPI polling by the driver. If
skb allocation fails, keep on pulling packets out of the Rx DMA queue: we
shouldn't break the polling immediately and thus falsely indicate to the
octep_napi_poll() that the Rx pressure is going down. As there is no
associated skb in this case, don't process the packets and don't push them
up the network stack - they are skipped.

Helper function is implemented to unmmap/flush all the fragment buffers
used by the dropped packet. 'alloc_failures' counter is incremented to
mark the skb allocation error in driver statistics.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50145/">CVE-2024-50145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50145">CVE-2024-50145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233044">SUSE bug 1233044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't call cleanup on profile rollback failure

When profile rollback fails in mlx5e_netdev_change_profile, the netdev
profile var is left set to NULL. Avoid a crash when unloading the driver
by not calling profile-&gt;cleanup in such a case.

This was encountered while testing, with the original trigger that
the wq rescuer thread creation got interrupted (presumably due to
Ctrl+C-ing modprobe), which gets converted to ENOMEM (-12) by
mlx5e_priv_init, the profile rollback also fails for the same reason
(signal still active) so the profile is left as NULL, leading to a crash
later in _mlx5e_remove.

 [  732.473932] mlx5_core 0000:08:00.1: E-Switch: Unload vfs: mode(OFFLOADS), nvfs(2), necvfs(0), active vports(2)
 [  734.525513] workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
 [  734.557372] mlx5_core 0000:08:00.1: mlx5e_netdev_init_profile:6235:(pid 6086): mlx5e_priv_init failed, err=-12
 [  734.559187] mlx5_core 0000:08:00.1 eth3: mlx5e_netdev_change_profile: new profile init failed, -12
 [  734.560153] workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
 [  734.589378] mlx5_core 0000:08:00.1: mlx5e_netdev_init_profile:6235:(pid 6086): mlx5e_priv_init failed, err=-12
 [  734.591136] mlx5_core 0000:08:00.1 eth3: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12
 [  745.537492] BUG: kernel NULL pointer dereference, address: 0000000000000008
 [  745.538222] #PF: supervisor read access in kernel mode
&lt;snipped&gt;
 [  745.551290] Call Trace:
 [  745.551590]  &lt;TASK&gt;
 [  745.551866]  ? __die+0x20/0x60
 [  745.552218]  ? page_fault_oops+0x150/0x400
 [  745.555307]  ? exc_page_fault+0x79/0x240
 [  745.555729]  ? asm_exc_page_fault+0x22/0x30
 [  745.556166]  ? mlx5e_remove+0x6b/0xb0 [mlx5_core]
 [  745.556698]  auxiliary_bus_remove+0x18/0x30
 [  745.557134]  device_release_driver_internal+0x1df/0x240
 [  745.557654]  bus_remove_device+0xd7/0x140
 [  745.558075]  device_del+0x15b/0x3c0
 [  745.558456]  mlx5_rescan_drivers_locked.part.0+0xb1/0x2f0 [mlx5_core]
 [  745.559112]  mlx5_unregister_device+0x34/0x50 [mlx5_core]
 [  745.559686]  mlx5_uninit_one+0x46/0xf0 [mlx5_core]
 [  745.560203]  remove_one+0x4e/0xd0 [mlx5_core]
 [  745.560694]  pci_device_remove+0x39/0xa0
 [  745.561112]  device_release_driver_internal+0x1df/0x240
 [  745.561631]  driver_detach+0x47/0x90
 [  745.562022]  bus_remove_driver+0x84/0x100
 [  745.562444]  pci_unregister_driver+0x3b/0x90
 [  745.562890]  mlx5_cleanup+0xc/0x1b [mlx5_core]
 [  745.563415]  __x64_sys_delete_module+0x14d/0x2f0
 [  745.563886]  ? kmem_cache_free+0x1b0/0x460
 [  745.564313]  ? lockdep_hardirqs_on_prepare+0xe2/0x190
 [  745.564825]  do_syscall_64+0x6d/0x140
 [  745.565223]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 [  745.565725] RIP: 0033:0x7f1579b1288b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233056">SUSE bug 1233056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix command bitmask initialization

Command bitmask have a dedicated bit for MANAGE_PAGES command, this bit
isn't Initialize during command bitmask Initialization, only during
MANAGE_PAGES.

In addition, mlx5_cmd_trigger_completions() is trying to trigger
completion for MANAGE_PAGES command as well.

Hence, in case health error occurred before any MANAGE_PAGES command
have been invoke (for example, during mlx5_enable_hca()),
mlx5_cmd_trigger_completions() will try to trigger completion for
MANAGE_PAGES command, which will result in null-ptr-deref error.[1]

Fix it by Initialize command bitmask correctly.

While at it, re-write the code for better understanding.

[1]
BUG: KASAN: null-ptr-deref in mlx5_cmd_trigger_completions+0x1db/0x600 [mlx5_core]
Write of size 4 at addr 0000000000000214 by task kworker/u96:2/12078
CPU: 10 PID: 12078 Comm: kworker/u96:2 Not tainted 6.9.0-rc2_for_upstream_debug_2024_04_07_19_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: mlx5_health0000:08:00.0 mlx5_fw_fatal_reporter_err_work [mlx5_core]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x7e/0xc0
 kasan_report+0xb9/0xf0
 kasan_check_range+0xec/0x190
 mlx5_cmd_trigger_completions+0x1db/0x600 [mlx5_core]
 mlx5_cmd_flush+0x94/0x240 [mlx5_core]
 enter_error_state+0x6c/0xd0 [mlx5_core]
 mlx5_fw_fatal_reporter_err_work+0xf3/0x480 [mlx5_core]
 process_one_work+0x787/0x1490
 ? lockdep_hardirqs_on_prepare+0x400/0x400
 ? pwq_dec_nr_in_flight+0xda0/0xda0
 ? assign_work+0x168/0x240
 worker_thread+0x586/0xd30
 ? rescuer_thread+0xae0/0xae0
 kthread+0x2df/0x3b0
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x2d/0x70
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233067">SUSE bug 1233067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50148" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bnep: fix wild-memory-access in proto_unregister

There's issue as follows:
  KASAN: maybe wild-memory-access in range [0xdead...108-0xdead...10f]
  CPU: 3 UID: 0 PID: 2805 Comm: rmmod Tainted: G        W
  RIP: 0010:proto_unregister+0xee/0x400
  Call Trace:
   &lt;TASK&gt;
   __do_sys_delete_module+0x318/0x580
   do_syscall_64+0xc1/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

As bnep_init() ignore bnep_sock_init()'s return value, and bnep_sock_init()
will cleanup all resource. Then when remove bnep module will call
bnep_sock_cleanup() to cleanup sock's resource.
To solve above issue just return bnep_sock_init()'s return value in
bnep_exit().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233063">SUSE bug 1233063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50149" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50149" ref_url="https://www.suse.com/security/cve/CVE-2024-50149" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Don't free job in TDR

Freeing job in TDR is not safe as TDR can pass the run_job thread
resulting in UAF. It is only safe for free job to naturally be called by
the scheduler. Rather free job in TDR, add to pending list.

(cherry picked from commit ea2f6a77d0c40d97f4a4dc93fee4afe15d94926d)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50149/">CVE-2024-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50149">CVE-2024-50149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233034">SUSE bug 1233034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmode should keep reference to parent

The altmode device release refers to its parent device, but without keeping
a reference to it.

When registering the altmode, get a reference to the parent and put it in
the release function.

Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues
like this:

[   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000)
[   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000)
[   46.612867] ==================================================================
[   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129
[   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48
[   46.614538]
[   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535
[   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   46.616042] Workqueue: events kobject_delayed_cleanup
[   46.616446] Call Trace:
[   46.616648]  &lt;TASK&gt;
[   46.616820]  dump_stack_lvl+0x5b/0x7c
[   46.617112]  ? typec_altmode_release+0x38/0x129
[   46.617470]  print_report+0x14c/0x49e
[   46.617769]  ? rcu_read_unlock_sched+0x56/0x69
[   46.618117]  ? __virt_addr_valid+0x19a/0x1ab
[   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d
[   46.618807]  ? typec_altmode_release+0x38/0x129
[   46.619161]  kasan_report+0x8d/0xb4
[   46.619447]  ? typec_altmode_release+0x38/0x129
[   46.619809]  ? process_scheduled_works+0x3cb/0x85f
[   46.620185]  typec_altmode_release+0x38/0x129
[   46.620537]  ? process_scheduled_works+0x3cb/0x85f
[   46.620907]  device_release+0xaf/0xf2
[   46.621206]  kobject_delayed_cleanup+0x13b/0x17a
[   46.621584]  process_scheduled_works+0x4f6/0x85f
[   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10
[   46.622353]  ? hlock_class+0x31/0x9a
[   46.622647]  ? lock_acquired+0x361/0x3c3
[   46.622956]  ? move_linked_works+0x46/0x7d
[   46.623277]  worker_thread+0x1ce/0x291
[   46.623582]  ? __kthread_parkme+0xc8/0xdf
[   46.623900]  ? __pfx_worker_thread+0x10/0x10
[   46.624236]  kthread+0x17e/0x190
[   46.624501]  ? kthread+0xfb/0x190
[   46.624756]  ? __pfx_kthread+0x10/0x10
[   46.625015]  ret_from_fork+0x20/0x40
[   46.625268]  ? __pfx_kthread+0x10/0x10
[   46.625532]  ret_from_fork_asm+0x1a/0x30
[   46.625805]  &lt;/TASK&gt;
[   46.625953]
[   46.626056] Allocated by task 678:
[   46.626287]  kasan_save_stack+0x24/0x44
[   46.626555]  kasan_save_track+0x14/0x2d
[   46.626811]  __kasan_kmalloc+0x3f/0x4d
[   46.627049]  __kmalloc_noprof+0x1bf/0x1f0
[   46.627362]  typec_register_port+0x23/0x491
[   46.627698]  cros_typec_probe+0x634/0xbb6
[   46.628026]  platform_probe+0x47/0x8c
[   46.628311]  really_probe+0x20a/0x47d
[   46.628605]  device_driver_attach+0x39/0x72
[   46.628940]  bind_store+0x87/0xd7
[   46.629213]  kernfs_fop_write_iter+0x1aa/0x218
[   46.629574]  vfs_write+0x1d6/0x29b
[   46.629856]  ksys_write+0xcd/0x13b
[   46.630128]  do_syscall_64+0xd4/0x139
[   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   46.630820]
[   46.630946] Freed by task 48:
[   46.631182]  kasan_save_stack+0x24/0x44
[   46.631493]  kasan_save_track+0x14/0x2d
[   46.631799]  kasan_save_free_info+0x3f/0x4d
[   46.632144]  __kasan_slab_free+0x37/0x45
[   46.632474]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233051">SUSE bug 1233051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50151" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50151" ref_url="https://www.suse.com/security/cve/CVE-2024-50151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix OOBs when building SMB2_IOCTL request

When using encryption, either enforced by the server or when using
'seal' mount option, the client will squash all compound request buffers
down for encryption into a single iov in smb2_set_next_command().

SMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the
SMB2_IOCTL request in the first iov, and if the user passes an input
buffer that is greater than 328 bytes, smb2_set_next_command() will
end up writing off the end of @rqst-&gt;iov[0].iov_base as shown below:

  mount.cifs //srv/share /mnt -o ...,seal
  ln -s $(perl -e "print('a')for 1..1024") /mnt/link

  BUG: KASAN: slab-out-of-bounds in
  smb2_set_next_command.cold+0x1d6/0x24c [cifs]
  Write of size 4116 at addr ffff8881148fcab8 by task ln/859

  CPU: 1 UID: 0 PID: 859 Comm: ln Not tainted 6.12.0-rc3 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  1.16.3-2.fc40 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   print_report+0x156/0x4d9
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   ? __virt_addr_valid+0x145/0x310
   ? __phys_addr+0x46/0x90
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   kasan_report+0xda/0x110
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   kasan_check_range+0x10f/0x1f0
   __asan_memcpy+0x3c/0x60
   smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   smb2_compound_op+0x238c/0x3840 [cifs]
   ? kasan_save_track+0x14/0x30
   ? kasan_save_free_info+0x3b/0x70
   ? vfs_symlink+0x1a1/0x2c0
   ? do_symlinkat+0x108/0x1c0
   ? __pfx_smb2_compound_op+0x10/0x10 [cifs]
   ? kmem_cache_free+0x118/0x3e0
   ? cifs_get_writable_path+0xeb/0x1a0 [cifs]
   smb2_get_reparse_inode+0x423/0x540 [cifs]
   ? __pfx_smb2_get_reparse_inode+0x10/0x10 [cifs]
   ? rcu_is_watching+0x20/0x50
   ? __kmalloc_noprof+0x37c/0x480
   ? smb2_create_reparse_symlink+0x257/0x490 [cifs]
   ? smb2_create_reparse_symlink+0x38f/0x490 [cifs]
   smb2_create_reparse_symlink+0x38f/0x490 [cifs]
   ? __pfx_smb2_create_reparse_symlink+0x10/0x10 [cifs]
   ? find_held_lock+0x8a/0xa0
   ? hlock_class+0x32/0xb0
   ? __build_path_from_dentry_optional_prefix+0x19d/0x2e0 [cifs]
   cifs_symlink+0x24f/0x960 [cifs]
   ? __pfx_make_vfsuid+0x10/0x10
   ? __pfx_cifs_symlink+0x10/0x10 [cifs]
   ? make_vfsgid+0x6b/0xc0
   ? generic_permission+0x96/0x2d0
   vfs_symlink+0x1a1/0x2c0
   do_symlinkat+0x108/0x1c0
   ? __pfx_do_symlinkat+0x10/0x10
   ? strncpy_from_user+0xaa/0x160
   __x64_sys_symlinkat+0xb9/0xf0
   do_syscall_64+0xbb/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7f08d75c13bb
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50151/">CVE-2024-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233055">SUSE bug 1233055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50152" ref_url="https://www.suse.com/security/cve/CVE-2024-50152" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix possible double free in smb2_set_ea()

Clang static checker(scan-build) warning:
fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory.
 1304 |         kfree(ea);
      |         ^~~~~~~~~

There is a double free in such case:
'ea is initialized to NULL' -&gt; 'first successful memory allocation for
ea' -&gt; 'something failed, goto sea_exit' -&gt; 'first memory release for ea'
-&gt; 'goto replay_again' -&gt; 'second goto sea_exit before allocate memory
for ea' -&gt; 'second memory release for ea resulted in double free'.

Re-initialie 'ea' to NULL near to the replay_again label, it can fix this
double free problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50152/">CVE-2024-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233033">SUSE bug 1233033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Fix null-ptr-deref in target_alloc_device()

There is a null-ptr-deref issue reported by KASAN:

BUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]
...
 kasan_report+0xb9/0xf0
 target_alloc_device+0xbc4/0xbe0 [target_core_mod]
 core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]
 target_core_init_configfs+0x205/0x420 [target_core_mod]
 do_one_initcall+0xdd/0x4e0
...
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

In target_alloc_device(), if allocing memory for dev queues fails, then
dev will be freed by dev-&gt;transport-&gt;free_device(), but dev-&gt;transport
is not initialized at that time, which will lead to a null pointer
reference problem.

Fixing this bug by freeing dev with hba-&gt;backend-&gt;ops-&gt;free_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233061">SUSE bug 1233061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().

  """
  We are seeing a use-after-free from a bpf prog attached to
  trace_tcp_retransmit_synack. The program passes the req-&gt;sk to the
  bpf_sk_storage_get_tracing kernel helper which does check for null
  before using it.
  """

The commit 83fccfc3940c ("inet: fix potential deadlock in
reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not
to call del_timer_sync() from reqsk_timer_handler(), but it introduced a
small race window.

Before the timer is called, expire_timers() calls detach_timer(timer, true)
to clear timer-&gt;entry.pprev and marks it as not pending.

If reqsk_queue_unlink() checks timer_pending() just after expire_timers()
calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will
continue running and send multiple SYN+ACKs until it expires.

The reported UAF could happen if req-&gt;sk is close()d earlier than the timer
expiration, which is 63s by default.

The scenario would be

  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),
     but del_timer_sync() is missed

  2. reqsk timer is executed and scheduled again

  3. req-&gt;sk is accept()ed and reqsk_put() decrements rsk_refcnt, but
     reqsk timer still has another one, and inet_csk_accept() does not
     clear req-&gt;sk for non-TFO sockets

  4. sk is close()d

  5. reqsk timer is executed again, and BPF touches req-&gt;sk

Let's not use timer_pending() by passing the caller context to
__inet_csk_reqsk_queue_drop().

Note that reqsk timer is pinned, so the issue does not happen in most
use cases. [1]

[0]
BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0

Use-after-free read at 0x00000000a891fb3a (in kfence-#1):
bpf_sk_storage_get_tracing+0x2e/0x1b0
bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda
bpf_trace_run2+0x4c/0xc0
tcp_rtx_synack+0xf9/0x100
reqsk_timer_handler+0xda/0x3d0
run_timer_softirq+0x292/0x8a0
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
intel_idle_irq+0x5a/0xa0
cpuidle_enter_state+0x94/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6

allocated by task 0 on cpu 9 at 260507.901592s:
sk_prot_alloc+0x35/0x140
sk_clone_lock+0x1f/0x3f0
inet_csk_clone_lock+0x15/0x160
tcp_create_openreq_child+0x1f/0x410
tcp_v6_syn_recv_sock+0x1da/0x700
tcp_check_req+0x1fb/0x510
tcp_v6_rcv+0x98b/0x1420
ipv6_list_rcv+0x2258/0x26e0
napi_complete_done+0x5b1/0x2990
mlx5e_napi_poll+0x2ae/0x8d0
net_rx_action+0x13e/0x590
irq_exit_rcu+0xf5/0x320
common_interrupt+0x80/0x90
asm_common_interrupt+0x22/0x40
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

freed by task 0 on cpu 9 at 260507.927527s:
rcu_core_si+0x4ff/0xf10
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233072">SUSE bug 1233072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50155" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: use cond_resched() in nsim_dev_trap_report_work()

I am still seeing many syzbot reports hinting that syzbot
might fool nsim_dev_trap_report_work() with hundreds of ports [1]

Lets use cond_resched(), and system_unbound_wq
instead of implicit system_wq.

[1]
INFO: task syz-executor:20633 blocked for more than 143 seconds.
      Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor    state:D stack:25856 pid:20633 tgid:20633 ppid:1      flags:0x00004006
...
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 16760 Comm: kworker/1:0 Not tainted 6.12.0-rc2-syzkaller-00205-g1d227fcc7222 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events nsim_dev_trap_report_work
 RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d 04 fb 9c 0c 48 89 de 5b e9 c3 c7 5d 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 &lt;f3&gt; 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 c0 d7 03 00 65 8b 15 60 f0
RSP: 0018:ffffc90000a187e8 EFLAGS: 00000246
RAX: 0000000000000100 RBX: ffffc90000a188e0 RCX: ffff888027d3bc00
RDX: ffff888027d3bc00 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88804a2e6000 R08: ffffffff8a4bc495 R09: ffffffff89da3577
R10: 0000000000000004 R11: ffffffff8a4bc2b0 R12: dffffc0000000000
R13: ffff88806573b503 R14: dffffc0000000000 R15: ffff8880663cca00
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc90a747f98 CR3: 000000000e734000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 000000000000002b DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 &lt;NMI&gt;
 &lt;/NMI&gt;
 &lt;TASK&gt;
  __local_bh_enable_ip+0x1bb/0x200 kernel/softirq.c:382
  spin_unlock_bh include/linux/spinlock.h:396 [inline]
  nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline]
  nsim_dev_trap_report_work+0x75d/0xaa0 drivers/net/netdevsim/dev.c:850
  process_one_work kernel/workqueue.c:3229 [inline]
  process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310
  worker_thread+0x870/0xd30 kernel/workqueue.c:3391
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233035">SUSE bug 1233035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Avoid NULL dereference in msm_disp_state_print_regs()

If the allocation in msm_disp_state_dump_regs() failed then
`block-&gt;state` can be NULL. The msm_disp_state_print_regs() function
_does_ have code to try to handle it with:

  if (*reg)
    dump_addr = *reg;

...but since "dump_addr" is initialized to NULL the above is actually
a noop. The code then goes on to dereference `dump_addr`.

Make the function print "Registers not stored" when it sees a NULL to
solve this. Since we're touching the code, fix
msm_disp_state_print_regs() not to pointlessly take a double-pointer
and properly mark the pointer as `const`.

Patchwork: https://patchwork.freedesktop.org/patch/619657/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233073">SUSE bug 1233073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50157" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50157" ref_url="https://www.suse.com/security/cve/CVE-2024-50157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Avoid CPU lockups due fifo occupancy check loop

Driver waits indefinitely for the fifo occupancy to go below a threshold
as soon as the pacing interrupt is received. This can cause soft lockup on
one of the processors, if the rate of DB is very high.

Add a loop count for FPGA and exit the __wait_for_fifo_occupancy_below_th
if the loop is taking more time. Pacing will be continuing until the
occupancy is below the threshold. This is ensured by the checks in
bnxt_re_pacing_timer_exp and further scheduling the work for pacing based
on the fifo occupancy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50157/">CVE-2024-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50157">CVE-2024-50157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233032">SUSE bug 1233032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50158" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50158" ref_url="https://www.suse.com/security/cve/CVE-2024-50158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix out of bound check

Driver exports pacing stats only on GenP5 and P7 adapters. But while
parsing the pacing stats, driver has a check for "rdev-&gt;dbr_pacing".  This
caused a trace when KASAN is enabled.

BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re]
Write of size 8 at addr ffff8885942a6340 by task modprobe/4809
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50158/">CVE-2024-50158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50158">CVE-2024-50158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233036">SUSE bug 1233036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50159</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50159" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50159" ref_url="https://www.suse.com/security/cve/CVE-2024-50159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix the double free in scmi_debugfs_common_setup()

Clang static checker(scan-build) throws below warning:
  |  drivers/firmware/arm_scmi/driver.c:line 2915, column 2
  |        Attempt to free released memory.

When devm_add_action_or_reset() fails, scmi_debugfs_common_cleanup()
will run twice which causes double free of 'dbg-&gt;name'.

Remove the redundant scmi_debugfs_common_cleanup() to fix this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50159/">CVE-2024-50159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50159">CVE-2024-50159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233041">SUSE bug 1233041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50160" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/cs8409: Fix possible NULL dereference

If snd_hda_gen_add_kctl fails to allocate memory and returns NULL, then
NULL pointer dereference will occur in the next line.

Since dolphin_fixups function is a hda_fixup function which is not supposed
to return any errors, add simple check before dereference, ignore the fail.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233074">SUSE bug 1233074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50161" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50161" ref_url="https://www.suse.com/security/cve/CVE-2024-50161" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check the remaining info_cnt before repeating btf fields

When trying to repeat the btf fields for array of nested struct, it
doesn't check the remaining info_cnt. The following splat will be
reported when the value of ret * nelems is greater than BTF_FIELDS_MAX:

  ------------[ cut here ]------------
  UBSAN: array-index-out-of-bounds in ../kernel/bpf/btf.c:3951:49
  index 11 is out of range for type 'btf_field_info [11]'
  CPU: 6 UID: 0 PID: 411 Comm: test_progs ...... 6.11.0-rc4+ #1
  Tainted: [O]=OOT_MODULE
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ...
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x57/0x70
   dump_stack+0x10/0x20
   ubsan_epilogue+0x9/0x40
   __ubsan_handle_out_of_bounds+0x6f/0x80
   ? kallsyms_lookup_name+0x48/0xb0
   btf_parse_fields+0x992/0xce0
   map_create+0x591/0x770
   __sys_bpf+0x229/0x2410
   __x64_sys_bpf+0x1f/0x30
   x64_sys_call+0x199/0x9f0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
  RIP: 0033:0x7fea56f2cc5d
  ......
   &lt;/TASK&gt;
  ---[ end trace ]---

Fix it by checking the remaining info_cnt in btf_repeat_fields() before
repeating the btf fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50161/">CVE-2024-50161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50161">CVE-2024-50161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233037">SUSE bug 1233037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50162" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50162" ref_url="https://www.suse.com/security/cve/CVE-2024-50162" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: devmap: provide rxq after redirect

rxq contains a pointer to the device from where
the redirect happened. Currently, the BPF program
that was executed after a redirect via BPF_MAP_TYPE_DEVMAP*
does not have it set.

This is particularly bad since accessing ingress_ifindex, e.g.

SEC("xdp")
int prog(struct xdp_md *pkt)
{
        return bpf_redirect_map(&amp;dev_redirect_map, 0, 0);
}

SEC("xdp/devmap")
int prog_after_redirect(struct xdp_md *pkt)
{
        bpf_printk("ifindex %i", pkt-&gt;ingress_ifindex);
        return XDP_PASS;
}

depends on access to rxq, so a NULL pointer gets dereferenced:

&lt;1&gt;[  574.475170] BUG: kernel NULL pointer dereference, address: 0000000000000000
&lt;1&gt;[  574.475188] #PF: supervisor read access in kernel mode
&lt;1&gt;[  574.475194] #PF: error_code(0x0000) - not-present page
&lt;6&gt;[  574.475199] PGD 0 P4D 0
&lt;4&gt;[  574.475207] Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt;[  574.475217] CPU: 4 UID: 0 PID: 217 Comm: kworker/4:1 Not tainted 6.11.0-rc5-reduced-00859-g780801200300 #23
&lt;4&gt;[  574.475226] Hardware name: Intel(R) Client Systems NUC13ANHi7/NUC13ANBi7, BIOS ANRPL357.0026.2023.0314.1458 03/14/2023
&lt;4&gt;[  574.475231] Workqueue: mld mld_ifc_work
&lt;4&gt;[  574.475247] RIP: 0010:bpf_prog_5e13354d9cf5018a_prog_after_redirect+0x17/0x3c
&lt;4&gt;[  574.475257] Code: cc cc cc cc cc cc cc 80 00 00 00 cc cc cc cc cc cc cc cc f3 0f 1e fa 0f 1f 44 00 00 66 90 55 48 89 e5 f3 0f 1e fa 48 8b 57 20 &lt;48&gt; 8b 52 00 8b 92 e0 00 00 00 48 bf f8 a6 d5 c4 5d a0 ff ff be 0b
&lt;4&gt;[  574.475263] RSP: 0018:ffffa62440280c98 EFLAGS: 00010206
&lt;4&gt;[  574.475269] RAX: ffffa62440280cd8 RBX: 0000000000000001 RCX: 0000000000000000
&lt;4&gt;[  574.475274] RDX: 0000000000000000 RSI: ffffa62440549048 RDI: ffffa62440280ce0
&lt;4&gt;[  574.475278] RBP: ffffa62440280c98 R08: 0000000000000002 R09: 0000000000000001
&lt;4&gt;[  574.475281] R10: ffffa05dc8b98000 R11: ffffa05f577fca40 R12: ffffa05dcab24000
&lt;4&gt;[  574.475285] R13: ffffa62440280ce0 R14: ffffa62440549048 R15: ffffa62440549000
&lt;4&gt;[  574.475289] FS:  0000000000000000(0000) GS:ffffa05f4f700000(0000) knlGS:0000000000000000
&lt;4&gt;[  574.475294] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&lt;4&gt;[  574.475298] CR2: 0000000000000000 CR3: 000000025522e000 CR4: 0000000000f50ef0
&lt;4&gt;[  574.475303] PKRU: 55555554
&lt;4&gt;[  574.475306] Call Trace:
&lt;4&gt;[  574.475313]  &lt;IRQ&gt;
&lt;4&gt;[  574.475318]  ? __die+0x23/0x70
&lt;4&gt;[  574.475329]  ? page_fault_oops+0x180/0x4c0
&lt;4&gt;[  574.475339]  ? skb_pp_cow_data+0x34c/0x490
&lt;4&gt;[  574.475346]  ? kmem_cache_free+0x257/0x280
&lt;4&gt;[  574.475357]  ? exc_page_fault+0x67/0x150
&lt;4&gt;[  574.475368]  ? asm_exc_page_fault+0x26/0x30
&lt;4&gt;[  574.475381]  ? bpf_prog_5e13354d9cf5018a_prog_after_redirect+0x17/0x3c
&lt;4&gt;[  574.475386]  bq_xmit_all+0x158/0x420
&lt;4&gt;[  574.475397]  __dev_flush+0x30/0x90
&lt;4&gt;[  574.475407]  veth_poll+0x216/0x250 [veth]
&lt;4&gt;[  574.475421]  __napi_poll+0x28/0x1c0
&lt;4&gt;[  574.475430]  net_rx_action+0x32d/0x3a0
&lt;4&gt;[  574.475441]  handle_softirqs+0xcb/0x2c0
&lt;4&gt;[  574.475451]  do_softirq+0x40/0x60
&lt;4&gt;[  574.475458]  &lt;/IRQ&gt;
&lt;4&gt;[  574.475461]  &lt;TASK&gt;
&lt;4&gt;[  574.475464]  __local_bh_enable_ip+0x66/0x70
&lt;4&gt;[  574.475471]  __dev_queue_xmit+0x268/0xe40
&lt;4&gt;[  574.475480]  ? selinux_ip_postroute+0x213/0x420
&lt;4&gt;[  574.475491]  ? alloc_skb_with_frags+0x4a/0x1d0
&lt;4&gt;[  574.475502]  ip6_finish_output2+0x2be/0x640
&lt;4&gt;[  574.475512]  ? nf_hook_slow+0x42/0xf0
&lt;4&gt;[  574.475521]  ip6_finish_output+0x194/0x300
&lt;4&gt;[  574.475529]  ? __pfx_ip6_finish_output+0x10/0x10
&lt;4&gt;[  574.475538]  mld_sendpack+0x17c/0x240
&lt;4&gt;[  574.475548]  mld_ifc_work+0x192/0x410
&lt;4&gt;[  574.475557]  process_one_work+0x15d/0x380
&lt;4&gt;[  574.475566]  worker_thread+0x29d/0x3a0
&lt;4&gt;[  574.475573]  ? __pfx_worker_thread+0x10/0x10
&lt;4&gt;[  574.475580]  ? __pfx_worker_thread+0x10/0x10
&lt;4&gt;[  574.475587]  kthread+0xcd/0x100
&lt;4&gt;[  574.475597]  ? __pfx_kthread+0x10/0x10
&lt;4&gt;[  574.475606]  ret_from_fork+0x31/0x50
&lt;4&gt;[  574.475615]  ? __pfx_kthread+0x10/0x10
&lt;4&gt;[  574.475623]  ret_from_fork_asm+0x1a/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50162/">CVE-2024-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233075">SUSE bug 1233075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50163" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50163" ref_url="https://www.suse.com/security/cve/CVE-2024-50163" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Make sure internal and UAPI bpf_redirect flags don't overlap

The bpf_redirect_info is shared between the SKB and XDP redirect paths,
and the two paths use the same numeric flag values in the ri-&gt;flags
field (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that
if skb bpf_redirect_neigh() is used with a non-NULL params argument and,
subsequently, an XDP redirect is performed using the same
bpf_redirect_info struct, the XDP path will get confused and end up
crashing, which syzbot managed to trigger.

With the stack-allocated bpf_redirect_info, the structure is no longer
shared between the SKB and XDP paths, so the crash doesn't happen
anymore. However, different code paths using identically-numbered flag
values in the same struct field still seems like a bit of a mess, so
this patch cleans that up by moving the flag definitions together and
redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap
with the flags used for XDP. It also adds a BUILD_BUG_ON() check to make
sure the overlap is not re-introduced by mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50163/">CVE-2024-50163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233098">SUSE bug 1233098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50164" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50164" ref_url="https://www.suse.com/security/cve/CVE-2024-50164" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix overloading of MEM_UNINIT's meaning

Lonial reported an issue in the BPF verifier where check_mem_size_reg()
has the following code:

    if (!tnum_is_const(reg-&gt;var_off))
        /* For unprivileged variable accesses, disable raw
         * mode so that the program is required to
         * initialize all the memory that the helper could
         * just partially fill up.
         */
         meta = NULL;

This means that writes are not checked when the register containing the
size of the passed buffer has not a fixed size. Through this bug, a BPF
program can write to a map which is marked as read-only, for example,
.rodata global maps.

The problem is that MEM_UNINIT's initial meaning that "the passed buffer
to the BPF helper does not need to be initialized" which was added back
in commit 435faee1aae9 ("bpf, verifier: add ARG_PTR_TO_RAW_STACK type")
got overloaded over time with "the passed buffer is being written to".

The problem however is that checks such as the above which were added later
via 06c1c049721a ("bpf: allow helpers access to variable memory") set meta
to NULL in order force the user to always initialize the passed buffer to
the helper. Due to the current double meaning of MEM_UNINIT, this bypasses
verifier write checks to the memory (not boundary checks though) and only
assumes the latter memory is read instead.

Fix this by reverting MEM_UNINIT back to its original meaning, and having
MEM_WRITE as an annotation to BPF helpers in order to then trigger the
BPF verifier checks for writing to memory.

Some notes: check_arg_pair_ok() ensures that for ARG_CONST_SIZE{,_OR_ZERO}
we can access fn-&gt;arg_type[arg - 1] since it must contain a preceding
ARG_PTR_TO_MEM. For check_mem_reg() the meta argument can be removed
altogether since we do check both BPF_READ and BPF_WRITE. Same for the
equivalent check_kfunc_mem_size_reg().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50164/">CVE-2024-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50164">CVE-2024-50164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233099">SUSE bug 1233099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50165" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50165" ref_url="https://www.suse.com/security/cve/CVE-2024-50165" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Preserve param-&gt;string when parsing mount options

In bpf_parse_param(), keep the value of param-&gt;string intact so it can
be freed later. Otherwise, the kmalloc area pointed to by param-&gt;string
will be leaked as shown below:

unreferenced object 0xffff888118c46d20 (size 8):
  comm "new_name", pid 12109, jiffies 4295580214
  hex dump (first 8 bytes):
    61 6e 79 00 38 c9 5c 7e                          any.8.\~
  backtrace (crc e1b7f876):
    [&lt;00000000c6848ac7&gt;] kmemleak_alloc+0x4b/0x80
    [&lt;00000000de9f7d00&gt;] __kmalloc_node_track_caller_noprof+0x36e/0x4a0
    [&lt;000000003e29b886&gt;] memdup_user+0x32/0xa0
    [&lt;0000000007248326&gt;] strndup_user+0x46/0x60
    [&lt;0000000035b3dd29&gt;] __x64_sys_fsconfig+0x368/0x3d0
    [&lt;0000000018657927&gt;] x64_sys_call+0xff/0x9f0
    [&lt;00000000c0cabc95&gt;] do_syscall_64+0x3b/0xc0
    [&lt;000000002f331597&gt;] entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50165/">CVE-2024-50165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50165">CVE-2024-50165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233031">SUSE bug 1233031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50166" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50166" ref_url="https://www.suse.com/security/cve/CVE-2024-50166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsl/fman: Fix refcount handling of fman-related devices

In mac_probe() there are multiple calls to of_find_device_by_node(),
fman_bind() and fman_port_bind() which takes references to of_dev-&gt;dev.
Not all references taken by these calls are released later on error path
in mac_probe() and in mac_remove() which lead to reference leaks.

Add references release.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50166/">CVE-2024-50166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50166">CVE-2024-50166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233050">SUSE bug 1233050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50167" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

be2net: fix potential memory leak in be_xmit()

The be_xmit() returns NETDEV_TX_OK without freeing skb
in case of be_xmit_enqueue() fails, add dev_kfree_skb_any() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233049">SUSE bug 1233049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50168" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50168" ref_url="https://www.suse.com/security/cve/CVE-2024-50168" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sun3_82586: fix potential memory leak in sun3_82586_send_packet()

The sun3_82586_send_packet() returns NETDEV_TX_OK without freeing skb
in case of skb-&gt;len being too long, add dev_kfree_skb() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50168/">CVE-2024-50168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50168">CVE-2024-50168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233059">SUSE bug 1233059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50169" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50169" ref_url="https://www.suse.com/security/cve/CVE-2024-50169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Update rx_bytes on read_skb()

Make sure virtio_transport_inc_rx_pkt() and virtio_transport_dec_rx_pkt()
calls are balanced (i.e. virtio_vsock_sock::rx_bytes doesn't lie) after
vsock_transport::read_skb().

While here, also inform the peer that we've freed up space and it has more
credit.

Failing to update rx_bytes after packet is dequeued leads to a warning on
SOCK_STREAM recv():

[  233.396654] rx_queue is empty, but rx_bytes is non-zero
[  233.396702] WARNING: CPU: 11 PID: 40601 at net/vmw_vsock/virtio_transport_common.c:589
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50169/">CVE-2024-50169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233320">SUSE bug 1233320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50170" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50170" ref_url="https://www.suse.com/security/cve/CVE-2024-50170" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bcmasp: fix potential memory leak in bcmasp_xmit()

The bcmasp_xmit() returns NETDEV_TX_OK without freeing skb
in case of mapping fails, add dev_kfree_skb() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50170/">CVE-2024-50170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50170">CVE-2024-50170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233030">SUSE bug 1233030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50171" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: systemport: fix potential memory leak in bcm_sysport_xmit()

The bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb
in case of dma_map_single() fails, add dev_kfree_skb() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233057">SUSE bug 1233057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50172" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50172" ref_url="https://www.suse.com/security/cve/CVE-2024-50172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix a possible memory leak

In bnxt_re_setup_chip_ctx() when bnxt_qplib_map_db_bar() fails
driver is not freeing the memory allocated for "rdev-&gt;chip_ctx".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50172/">CVE-2024-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50172">CVE-2024-50172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233029">SUSE bug 1233029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50173" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50173" ref_url="https://www.suse.com/security/cve/CVE-2024-50173" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix access to uninitialized variable in tick_ctx_cleanup()

The group variable can't be used to retrieve ptdev in our second loop,
because it points to the previously iterated list_head, not a valid
group. Get the ptdev object from the scheduler instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50173/">CVE-2024-50173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50173">CVE-2024-50173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233094">SUSE bug 1233094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50174" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50174" ref_url="https://www.suse.com/security/cve/CVE-2024-50174" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix race when converting group handle to group object

XArray provides it's own internal lock which protects the internal array
when entries are being simultaneously added and removed. However there
is still a race between retrieving the pointer from the XArray and
incrementing the reference count.

To avoid this race simply hold the internal XArray lock when
incrementing the reference count, this ensures there cannot be a racing
call to xa_erase().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50174/">CVE-2024-50174 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50174">CVE-2024-50174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233093">SUSE bug 1233093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50175" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50175" ref_url="https://www.suse.com/security/cve/CVE-2024-50175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: qcom: camss: Remove use_count guard in stop_streaming

The use_count check was introduced so that multiple concurrent Raw Data
Interfaces RDIs could be driven by different virtual channels VCs on the
CSIPHY input driving the video pipeline.

This is an invalid use of use_count though as use_count pertains to the
number of times a video entity has been opened by user-space not the number
of active streams.

If use_count and stream-on count don't agree then stop_streaming() will
break as is currently the case and has become apparent when using CAMSS
with libcamera's released softisp 0.3.

The use of use_count like this is a bit hacky and right now breaks regular
usage of CAMSS for a single stream case. Stopping qcam results in the splat
below, and then it cannot be started again and any attempts to do so fails
with -EBUSY.

[ 1265.509831] WARNING: CPU: 5 PID: 919 at drivers/media/common/videobuf2/videobuf2-core.c:2183 __vb2_queue_cancel+0x230/0x2c8 [videobuf2_common]
...
[ 1265.510630] Call trace:
[ 1265.510636]  __vb2_queue_cancel+0x230/0x2c8 [videobuf2_common]
[ 1265.510648]  vb2_core_streamoff+0x24/0xcc [videobuf2_common]
[ 1265.510660]  vb2_ioctl_streamoff+0x5c/0xa8 [videobuf2_v4l2]
[ 1265.510673]  v4l_streamoff+0x24/0x30 [videodev]
[ 1265.510707]  __video_do_ioctl+0x190/0x3f4 [videodev]
[ 1265.510732]  video_usercopy+0x304/0x8c4 [videodev]
[ 1265.510757]  video_ioctl2+0x18/0x34 [videodev]
[ 1265.510782]  v4l2_ioctl+0x40/0x60 [videodev]
...
[ 1265.510944] videobuf2_common: driver bug: stop_streaming operation is leaving buffer 0 in active state
[ 1265.511175] videobuf2_common: driver bug: stop_streaming operation is leaving buffer 1 in active state
[ 1265.511398] videobuf2_common: driver bug: stop_streaming operation is leaving buffer 2 in active st

One CAMSS specific way to handle multiple VCs on the same RDI might be:

- Reference count each pipeline enable for CSIPHY, CSID, VFE and RDIx.
- The video buffers are already associated with msm_vfeN_rdiX so
  release video buffers when told to do so by stop_streaming.
- Only release the power-domains for the CSIPHY, CSID and VFE when
  their internal refcounts drop.

Either way refusing to release video buffers based on use_count is
erroneous and should be reverted. The silicon enabling code for selecting
VCs is perfectly fine. Its a "known missing feature" that concurrent VCs
won't work with CAMSS right now.

Initial testing with this code didn't show an error but, SoftISP and "real"
usage with Google Hangouts breaks the upstream code pretty quickly, we need
to do a partial revert and take another pass at VCs.

This commit partially reverts commit 89013969e232 ("media: camss: sm8250:
Pipeline starting and stopping for multiple virtual channels")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50175/">CVE-2024-50175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50175">CVE-2024-50175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233092">SUSE bug 1233092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50176" ref_url="https://www.suse.com/security/cve/CVE-2024-50176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: k3-r5: Fix error handling when power-up failed

By simply bailing out, the driver was violating its rule and internal
assumptions that either both or no rproc should be initialized. E.g.,
this could cause the first core to be available but not the second one,
leading to crashes on its shutdown later on while trying to dereference
that second instance.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50176/">CVE-2024-50176 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50176">CVE-2024-50176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233091">SUSE bug 1233091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50177" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50177" ref_url="https://www.suse.com/security/cve/CVE-2024-50177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a UBSAN warning in DML2.1

When programming phantom pipe, since cursor_width is explicity set to 0,
this causes calculation logic to trigger overflow for an unsigned int
triggering the kernel's UBSAN check as below:

[   40.962845] UBSAN: shift-out-of-bounds in /tmp/amd.EfpumTkO/amd/amdgpu/../display/dc/dml2/dml21/src/dml2_core/dml2_core_dcn4_calcs.c:3312:34
[   40.962849] shift exponent 4294967170 is too large for 32-bit type 'unsigned int'
[   40.962852] CPU: 1 PID: 1670 Comm: gnome-shell Tainted: G        W  OE      6.5.0-41-generic #41~22.04.2-Ubuntu
[   40.962854] Hardware name: Gigabyte Technology Co., Ltd. X670E AORUS PRO X/X670E AORUS PRO X, BIOS F21 01/10/2024
[   40.962856] Call Trace:
[   40.962857]  &lt;TASK&gt;
[   40.962860]  dump_stack_lvl+0x48/0x70
[   40.962870]  dump_stack+0x10/0x20
[   40.962872]  __ubsan_handle_shift_out_of_bounds+0x1ac/0x360
[   40.962878]  calculate_cursor_req_attributes.cold+0x1b/0x28 [amdgpu]
[   40.963099]  dml_core_mode_support+0x6b91/0x16bc0 [amdgpu]
[   40.963327]  ? srso_alias_return_thunk+0x5/0x7f
[   40.963331]  ? CalculateWatermarksMALLUseAndDRAMSpeedChangeSupport+0x18b8/0x2790 [amdgpu]
[   40.963534]  ? srso_alias_return_thunk+0x5/0x7f
[   40.963536]  ? dml_core_mode_support+0xb3db/0x16bc0 [amdgpu]
[   40.963730]  dml2_core_calcs_mode_support_ex+0x2c/0x90 [amdgpu]
[   40.963906]  ? srso_alias_return_thunk+0x5/0x7f
[   40.963909]  ? dml2_core_calcs_mode_support_ex+0x2c/0x90 [amdgpu]
[   40.964078]  core_dcn4_mode_support+0x72/0xbf0 [amdgpu]
[   40.964247]  dml2_top_optimization_perform_optimization_phase+0x1d3/0x2a0 [amdgpu]
[   40.964420]  dml2_build_mode_programming+0x23d/0x750 [amdgpu]
[   40.964587]  dml21_validate+0x274/0x770 [amdgpu]
[   40.964761]  ? srso_alias_return_thunk+0x5/0x7f
[   40.964763]  ? resource_append_dpp_pipes_for_plane_composition+0x27c/0x3b0 [amdgpu]
[   40.964942]  dml2_validate+0x504/0x750 [amdgpu]
[   40.965117]  ? dml21_copy+0x95/0xb0 [amdgpu]
[   40.965291]  ? srso_alias_return_thunk+0x5/0x7f
[   40.965295]  dcn401_validate_bandwidth+0x4e/0x70 [amdgpu]
[   40.965491]  update_planes_and_stream_state+0x38d/0x5c0 [amdgpu]
[   40.965672]  update_planes_and_stream_v3+0x52/0x1e0 [amdgpu]
[   40.965845]  ? srso_alias_return_thunk+0x5/0x7f
[   40.965849]  dc_update_planes_and_stream+0x71/0xb0 [amdgpu]

Fix this by adding a guard for checking cursor width before triggering
the size calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50177/">CVE-2024-50177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50177">CVE-2024-50177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233115">SUSE bug 1233115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50178" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50178" ref_url="https://www.suse.com/security/cve/CVE-2024-50178" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: loongson3: Use raw_smp_processor_id() in do_service_request()

Use raw_smp_processor_id() instead of plain smp_processor_id() in
do_service_request(), otherwise we may get some errors with the driver
enabled:

 BUG: using smp_processor_id() in preemptible [00000000] code: (udev-worker)/208
 caller is loongson3_cpufreq_probe+0x5c/0x250 [loongson3_cpufreq]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50178/">CVE-2024-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50178">CVE-2024-50178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233121">SUSE bug 1233121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50179" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: remove the incorrect Fw reference check when dirtying pages

When doing the direct-io reads it will also try to mark pages dirty,
but for the read path it won't hold the Fw caps and there is case
will it get the Fw reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233123">SUSE bug 1233123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: sisfb: Fix strbuf array overflow

The values of the variables xres and yres are placed in strbuf.
These variables are obtained from strbuf1.
The strbuf1 array contains digit characters
and a space if the array contains non-digit characters.
Then, when executing sprintf(strbuf, "%ux%ux8", xres, yres);
more than 16 bytes will be written to strbuf.
It is suggested to increase the size of the strbuf array to 24.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233125">SUSE bug 1233125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50181" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50181" ref_url="https://www.suse.com/security/cve/CVE-2024-50181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx: Remove CLK_SET_PARENT_GATE for DRAM mux for i.MX7D

For i.MX7D DRAM related mux clock, the clock source change should ONLY
be done done in low level asm code without accessing DRAM, and then
calling clk API to sync the HW clock status with clk tree, it should never
touch real clock source switch via clk API, so CLK_SET_PARENT_GATE flag
should NOT be added, otherwise, DRAM's clock parent will be disabled when
DRAM is active, and system will hang.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50181/">CVE-2024-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50181">CVE-2024-50181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233127">SUSE bug 1233127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

secretmem: disable memfd_secret() if arch cannot set direct map

Return -ENOSYS from memfd_secret() syscall if !can_set_direct_map().  This
is the case for example on some arm64 configurations, where marking 4k
PTEs in the direct map not present can only be done if the direct map is
set up at 4k granularity in the first place (as ARM's break-before-make
semantics do not easily allow breaking apart large/gigantic pages).

More precisely, on arm64 systems with !can_set_direct_map(),
set_direct_map_invalid_noflush() is a no-op, however it returns success
(0) instead of an error.  This means that memfd_secret will seemingly
"work" (e.g.  syscall succeeds, you can mmap the fd and fault in pages),
but it does not actually achieve its goal of removing its memory from the
direct map.

Note that with this patch, memfd_secret() will start erroring on systems
where can_set_direct_map() returns false (arm64 with
CONFIG_RODATA_FULL_DEFAULT_ENABLED=n, CONFIG_DEBUG_PAGEALLOC=n and
CONFIG_KFENCE=n), but that still seems better than the current silent
failure.  Since CONFIG_RODATA_FULL_DEFAULT_ENABLED defaults to 'y', most
arm64 systems actually have a working memfd_secret() and aren't be
affected.

From going through the iterations of the original memfd_secret patch
series, it seems that disabling the syscall in these scenarios was the
intended behavior [1] (preferred over having
set_direct_map_invalid_noflush return an error as that would result in
SIGBUSes at page-fault time), however the check for it got dropped between
v16 [2] and v17 [3], when secretmem moved away from CMA allocations.

[1]: https://lore.kernel.org/lkml/20201124164930.GK8537@kernel.org/
[2]: https://lore.kernel.org/lkml/20210121122723.3446-11-rppt@kernel.org/#t
[3]: https://lore.kernel.org/lkml/20201125092208.12544-10-rppt@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233129">SUSE bug 1233129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50183" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance

Deleting an NPIV instance requires all fabric ndlps to be released before
an NPIV's resources can be torn down.  Failure to release fabric ndlps
beforehand opens kref imbalance race conditions.  Fix by forcing the DA_ID
to complete synchronously with usage of wait_queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233130">SUSE bug 1233130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50184" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_pmem: Check device status before requesting flush

If a pmem device is in a bad status, the driver side could wait for
host ack forever in virtio_pmem_flush(), causing the system to hang.

So add a status check in the beginning of virtio_pmem_flush() to return
early if the device is not activated.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233135">SUSE bug 1233135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50185" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50185" ref_url="https://www.suse.com/security/cve/CVE-2024-50185" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: handle consistently DSS corruption

Bugged peer implementation can send corrupted DSS options, consistently
hitting a few warning in the data path. Use DEBUG_NET assertions, to
avoid the splat on some builds and handle consistently the error, dumping
related MIBs and performing fallback and/or reset according to the
subflow type.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50185/">CVE-2024-50185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50185">CVE-2024-50185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233109">SUSE bug 1233109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: explicitly clear the sk pointer, when pf-&gt;create fails

We have recently noticed the exact same KASAN splat as in commit
6cd4a78d962b ("net: do not leave a dangling sk pointer, when socket
creation fails"). The problem is that commit did not fully address the
problem, as some pf-&gt;create implementations do not use sk_common_release
in their error paths.

For example, we can use the same reproducer as in the above commit, but
changing ping to arping. arping uses AF_PACKET socket and if packet_create
fails, it will just sk_free the allocated sk object.

While we could chase all the pf-&gt;create implementations and make sure they
NULL the freed sk object on error from the socket, we can't guarantee
future protocols will not make the same mistake.

So it is easier to just explicitly NULL the sk pointer upon return from
pf-&gt;create in __sock_create. We do know that pf-&gt;create always releases the
allocated sk object on error, so if the pointer is not NULL, it is
definitely dangling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233110">SUSE bug 1233110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50187" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: Stop the active perfmon before being destroyed

Upon closing the file descriptor, the active performance monitor is not
stopped. Although all perfmons are destroyed in `vc4_perfmon_close_file()`,
the active performance monitor's pointer (`vc4-&gt;active_perfmon`) is still
retained.

If we open a new file descriptor and submit a few jobs with performance
monitors, the driver will attempt to stop the active performance monitor
using the stale pointer in `vc4-&gt;active_perfmon`. However, this pointer
is no longer valid because the previous process has already terminated,
and all performance monitors associated with it have been destroyed and
freed.

To fix this, when the active performance monitor belongs to a given
process, explicitly stop it before destroying and freeing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233108">SUSE bug 1233108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50188" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: dp83869: fix memory corruption when enabling fiber

When configuring the fiber port, the DP83869 PHY driver incorrectly
calls linkmode_set_bit() with a bit mask (1 &lt;&lt; 10) rather than a bit
number (10). This corrupts some other memory location -- in case of
arm64 the priv pointer in the same structure.

Since the advertising flags are updated from supported at the end of the
function the incorrect line isn't needed at all and can be removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233107">SUSE bug 1233107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()

Using the device-managed version allows to simplify clean-up in probe()
error path.

Additionally, this device-managed ensures proper cleanup, which helps to
resolve memory errors, page faults, btrfs going read-only, and btrfs
disk corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233105">SUSE bug 1233105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50190</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50190" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50190" ref_url="https://www.suse.com/security/cve/CVE-2024-50190" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix memleak in ice_init_tx_topology()

Fix leak of the FW blob (DDP pkg).

Make ice_cfg_tx_topo() const-correct, so ice_init_tx_topology() can avoid
copying whole FW blob. Copy just the topology section, and only when
needed. Reuse the buffer allocated for the read of the current topology.

This was found by kmemleak, with the following trace for each PF:
    [&lt;ffffffff8761044d&gt;] kmemdup_noprof+0x1d/0x50
    [&lt;ffffffffc0a0a480&gt;] ice_init_ddp_config+0x100/0x220 [ice]
    [&lt;ffffffffc0a0da7f&gt;] ice_init_dev+0x6f/0x200 [ice]
    [&lt;ffffffffc0a0dc49&gt;] ice_init+0x29/0x560 [ice]
    [&lt;ffffffffc0a10c1d&gt;] ice_probe+0x21d/0x310 [ice]

Constify ice_cfg_tx_topo() @buf parameter.
This cascades further down to few more functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50190/">CVE-2024-50190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50190">CVE-2024-50190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233090">SUSE bug 1233090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50191" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50191" ref_url="https://www.suse.com/security/cve/CVE-2024-50191" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: don't set SB_RDONLY after filesystem errors

When the filesystem is mounted with errors=remount-ro, we were setting
SB_RDONLY flag to stop all filesystem modifications. We knew this misses
proper locking (sb-&gt;s_umount) and does not go through proper filesystem
remount procedure but it has been the way this worked since early ext2
days and it was good enough for catastrophic situation damage
mitigation. Recently, syzbot has found a way (see link) to trigger
warnings in filesystem freezing because the code got confused by
SB_RDONLY changing under its hands. Since these days we set
EXT4_FLAGS_SHUTDOWN on the superblock which is enough to stop all
filesystem modifications, modifying SB_RDONLY shouldn't be needed. So
stop doing that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50191/">CVE-2024-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233101">SUSE bug 1233101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50192" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v4: Don't allow a VMOVP on a dying VPE

Kunkun Jiang reported that there is a small window of opportunity for
userspace to force a change of affinity for a VPE while the VPE has already
been unmapped, but the corresponding doorbell interrupt still visible in
/proc/irq/.

Plug the race by checking the value of vmapp_count, which tracks whether
the VPE is mapped ot not, and returning an error in this case.

This involves making vmapp_count common to both GICv4.1 and its v4.0
ancestor.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233106">SUSE bug 1233106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50193" ref_url="https://www.suse.com/security/cve/CVE-2024-50193" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/entry_32: Clear CPU buffers after register restore in NMI return

CPU buffers are currently cleared after call to exc_nmi, but before
register state is restored. This may be okay for MDS mitigation but not for
RDFS. Because RDFS mitigation requires CPU buffers to be cleared when
registers don't have any sensitive data.

Move CLEAR_CPU_BUFFERS after RESTORE_ALL_NMI.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50193/">CVE-2024-50193 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50193">CVE-2024-50193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233102">SUSE bug 1233102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50194" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: probes: Fix uprobes for big-endian kernels

The arm64 uprobes code is broken for big-endian kernels as it doesn't
convert the in-memory instruction encoding (which is always
little-endian) into the kernel's native endianness before analyzing and
simulating instructions. This may result in a few distinct problems:

* The kernel may may erroneously reject probing an instruction which can
  safely be probed.

* The kernel may erroneously erroneously permit stepping an
  instruction out-of-line when that instruction cannot be stepped
  out-of-line safely.

* The kernel may erroneously simulate instruction incorrectly dur to
  interpretting the byte-swapped encoding.

The endianness mismatch isn't caught by the compiler or sparse because:

* The arch_uprobe::{insn,ixol} fields are encoded as arrays of u8, so
  the compiler and sparse have no idea these contain a little-endian
  32-bit value. The core uprobes code populates these with a memcpy()
  which similarly does not handle endianness.

* While the uprobe_opcode_t type is an alias for __le32, both
  arch_uprobe_analyze_insn() and arch_uprobe_skip_sstep() cast from u8[]
  to the similarly-named probe_opcode_t, which is an alias for u32.
  Hence there is no endianness conversion warning.

Fix this by changing the arch_uprobe::{insn,ixol} fields to __le32 and
adding the appropriate __le32_to_cpu() conversions prior to consuming
the instruction encoding. The core uprobes copies these fields as opaque
ranges of bytes, and so is unaffected by this change.

At the same time, remove MAX_UINSN_BYTES and consistently use
AARCH64_INSN_SIZE for clarity.

Tested with the following:

| #include &lt;stdio.h&gt;
| #include &lt;stdbool.h&gt;
|
| #define noinline __attribute__((noinline))
|
| static noinline void *adrp_self(void)
| {
|         void *addr;
|
|         asm volatile(
|         "       adrp    %x0, adrp_self\n"
|         "       add     %x0, %x0, :lo12:adrp_self\n"
|         : "=r" (addr));
| }
|
|
| int main(int argc, char *argv)
| {
|         void *ptr = adrp_self();
|         bool equal = (ptr == adrp_self);
|
|         printf("adrp_self   =&gt; %p\n"
|                "adrp_self() =&gt; %p\n"
|                "%s\n",
|                adrp_self, ptr, equal ? "EQUAL" : "NOT EQUAL");
|
|         return 0;
| }

.... where the adrp_self() function was compiled to:

| 00000000004007e0 &lt;adrp_self&gt;:
|   4007e0:       90000000        adrp    x0, 400000 &lt;__ehdr_start&gt;
|   4007e4:       911f8000        add     x0, x0, #0x7e0
|   4007e8:       d65f03c0        ret

Before this patch, the ADRP is not recognized, and is assumed to be
steppable, resulting in corruption of the result:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0xffffffffff7e0
| NOT EQUAL

After this patch, the ADRP is correctly recognized and simulated:

| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
| #
| # echo 'p /root/adrp-self:0x007e0' &gt; /sys/kernel/tracing/uprobe_events
| # echo 1 &gt; /sys/kernel/tracing/events/uprobes/enable
| # ./adrp-self
| adrp_self   =&gt; 0x4007e0
| adrp_self() =&gt; 0x4007e0
| EQUAL
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233111">SUSE bug 1233111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-clock: Fix missing timespec64 check in pc_clock_settime()

As Andrew pointed out, it will make sense that the PTP core
checked timespec64 struct's tv_sec and tv_nsec range before calling
ptp-&gt;info-&gt;settime64().

As the man manual of clock_settime() said, if tp.tv_sec is negative or
tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL,
which include dynamic clocks which handles PTP clock, and the condition is
consistent with timespec64_valid(). As Thomas suggested, timespec64_valid()
only check the timespec is valid, but not ensure that the time is
in a valid range, so check it ahead using timespec64_valid_strict()
in pc_clock_settime() and return -EINVAL if not valid.

There are some drivers that use tp-&gt;tv_sec and tp-&gt;tv_nsec directly to
write registers without validity checks and assume that the higher layer
has checked it, which is dangerous and will benefit from this, such as
hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(),
and some drivers can remove the checks of itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233103">SUSE bug 1233103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50196" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: ocelot: fix system hang on level based interrupts

The current implementation only calls chained_irq_enter() and
chained_irq_exit() if it detects pending interrupts.

```
for (i = 0; i &lt; info-&gt;stride; i++) {
	uregmap_read(info-&gt;map, id_reg + 4 * i, &amp;reg);
	if (!reg)
		continue;

	chained_irq_enter(parent_chip, desc);
```

However, in case of GPIO pin configured in level mode and the parent
controller configured in edge mode, GPIO interrupt might be lowered by the
hardware. In the result, if the interrupt is short enough, the parent
interrupt is still pending while the GPIO interrupt is cleared;
chained_irq_enter() never gets called and the system hangs trying to
service the parent interrupt.

Moving chained_irq_enter() and chained_irq_exit() outside the for loop
ensures that they are called even when GPIO interrupt is lowered by the
hardware.

The similar code with chained_irq_enter() / chained_irq_exit() functions
wrapping interrupt checking loop may be found in many other drivers:
```
grep -r -A 10 chained_irq_enter drivers/pinctrl
```
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233113">SUSE bug 1233113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50197" ref_url="https://www.suse.com/security/cve/CVE-2024-50197" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: intel: platform: fix error path in device_for_each_child_node()

The device_for_each_child_node() loop requires calls to
fwnode_handle_put() upon early returns to decrement the refcount of
the child node and avoid leaking memory if that error path is triggered.

There is one early returns within that loop in
intel_platform_pinctrl_prepare_community(), but fwnode_handle_put() is
missing.

Instead of adding the missing call, the scoped version of the loop can
be used to simplify the code and avoid mistakes in the future if new
early returns are added, as the child node is only used for parsing, and
it is never assigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50197/">CVE-2024-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50197">CVE-2024-50197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233089">SUSE bug 1233089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50198" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: light: veml6030: fix IIO device retrieval from embedded device

The dev pointer that is received as an argument in the
in_illuminance_period_available_show function references the device
embedded in the IIO device, not in the i2c client.

dev_to_iio_dev() must be used to accessthe right data. The current
implementation leads to a segmentation fault on every attempt to read
the attribute because indio_dev gets a NULL assignment.

This bug has been present since the first appearance of the driver,
apparently since the last version (V6) before getting applied. A
constant attribute was used until then, and the last modifications might
have not been tested again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233100">SUSE bug 1233100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50199" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/swapfile: skip HugeTLB pages for unuse_vma

I got a bad pud error and lost a 1GB HugeTLB when calling swapoff.  The
problem can be reproduced by the following steps:

 1. Allocate an anonymous 1GB HugeTLB and some other anonymous memory.
 2. Swapout the above anonymous memory.
 3. run swapoff and we will get a bad pud error in kernel message:

  mm/pgtable-generic.c:42: bad pud 00000000743d215d(84000001400000e7)

We can tell that pud_clear_bad is called by pud_none_or_clear_bad in
unuse_pud_range() by ftrace.  And therefore the HugeTLB pages will never
be freed because we lost it from page table.  We can skip HugeTLB pages
for unuse_vma to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233112">SUSE bug 1233112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50200" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50200" ref_url="https://www.suse.com/security/cve/CVE-2024-50200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: correct tree corruption on spanning store

Patch series "maple_tree: correct tree corruption on spanning store", v3.

There has been a nasty yet subtle maple tree corruption bug that appears
to have been in existence since the inception of the algorithm.

This bug seems far more likely to happen since commit f8d112a4e657
("mm/mmap: avoid zeroing vma tree in mmap_region()"), which is the point
at which reports started to be submitted concerning this bug.

We were made definitely aware of the bug thanks to the kind efforts of
Bert Karwatzki who helped enormously in my being able to track this down
and identify the cause of it.

The bug arises when an attempt is made to perform a spanning store across
two leaf nodes, where the right leaf node is the rightmost child of the
shared parent, AND the store completely consumes the right-mode node.

This results in mas_wr_spanning_store() mitakenly duplicating the new and
existing entries at the maximum pivot within the range, and thus maple
tree corruption.

The fix patch corrects this by detecting this scenario and disallowing the
mistaken duplicate copy.

The fix patch commit message goes into great detail as to how this occurs.

This series also includes a test which reliably reproduces the issue, and
asserts that the fix works correctly.

Bert has kindly tested the fix and confirmed it resolved his issues.  Also
Mikhail Gavrilov kindly reported what appears to be precisely the same
bug, which this fix should also resolve.


This patch (of 2):

There has been a subtle bug present in the maple tree implementation from
its inception.

This arises from how stores are performed - when a store occurs, it will
overwrite overlapping ranges and adjust the tree as necessary to
accommodate this.

A range may always ultimately span two leaf nodes.  In this instance we
walk the two leaf nodes, determine which elements are not overwritten to
the left and to the right of the start and end of the ranges respectively
and then rebalance the tree to contain these entries and the newly
inserted one.

This kind of store is dubbed a 'spanning store' and is implemented by
mas_wr_spanning_store().

In order to reach this stage, mas_store_gfp() invokes
mas_wr_preallocate(), mas_wr_store_type() and mas_wr_walk() in turn to
walk the tree and update the object (mas) to traverse to the location
where the write should be performed, determining its store type.

When a spanning store is required, this function returns false stopping at
the parent node which contains the target range, and mas_wr_store_type()
marks the mas-&gt;store_type as wr_spanning_store to denote this fact.

When we go to perform the store in mas_wr_spanning_store(), we first
determine the elements AFTER the END of the range we wish to store (that
is, to the right of the entry to be inserted) - we do this by walking to
the NEXT pivot in the tree (i.e.  r_mas.last + 1), starting at the node we
have just determined contains the range over which we intend to write.

We then turn our attention to the entries to the left of the entry we are
inserting, whose state is represented by l_mas, and copy these into a 'big
node', which is a special node which contains enough slots to contain two
leaf node's worth of data.

We then copy the entry we wish to store immediately after this - the copy
and the insertion of the new entry is performed by mas_store_b_node().

After this we copy the elements to the right of the end of the range which
we are inserting, if we have not exceeded the length of the node (i.e. 
r_mas.offset &lt;= r_mas.end).

Herein lies the bug - under very specific circumstances, this logic can
break and corrupt the maple tree.

Consider the following tree:

Height
  0                             Root Node
                                 /      \
                 pivot = 0xffff /        \ pivot = ULONG_MAX
                               /          
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50200/">CVE-2024-50200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50200">CVE-2024-50200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233088">SUSE bug 1233088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix encoder-&gt;possible_clones

Include the encoder itself in its possible_clones bitmask.
In the past nothing validated that drivers were populating
possible_clones correctly, but that changed in commit
74d2aacbe840 ("drm: Validate encoder-&gt;possible_clones").
Looks like radeon never got the memo and is still not
following the rules 100% correctly.

This results in some warnings during driver initialization:
Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7)
WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c
...

(cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233104">SUSE bug 1233104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50202" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50202" ref_url="https://www.suse.com/security/cve/CVE-2024-50202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: propagate directory read errors from nilfs_find_entry()

Syzbot reported that a task hang occurs in vcs_open() during a fuzzing
test for nilfs2.

The root cause of this problem is that in nilfs_find_entry(), which
searches for directory entries, ignores errors when loading a directory
page/folio via nilfs_get_folio() fails.

If the filesystem images is corrupted, and the i_size of the directory
inode is large, and the directory page/folio is successfully read but
fails the sanity check, for example when it is zero-filled,
nilfs_check_folio() may continue to spit out error messages in bursts.

Fix this issue by propagating the error to the callers when loading a
page/folio fails in nilfs_find_entry().

The current interface of nilfs_find_entry() and its callers is outdated
and cannot propagate error codes such as -EIO and -ENOMEM returned via
nilfs_find_entry(), so fix it together.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50202/">CVE-2024-50202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50202">CVE-2024-50202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233324">SUSE bug 1233324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50203" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50203" ref_url="https://www.suse.com/security/cve/CVE-2024-50203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fix address emission with tag-based KASAN enabled

When BPF_TRAMP_F_CALL_ORIG is enabled, the address of a bpf_tramp_image
struct on the stack is passed during the size calculation pass and
an address on the heap is passed during code generation. This may
cause a heap buffer overflow if the heap address is tagged because
emit_a64_mov_i64() will emit longer code than it did during the size
calculation pass. The same problem could occur without tag-based
KASAN if one of the 16-bit words of the stack address happened to
be all-ones during the size calculation pass. Fix the problem by
assuming the worst case (4 instructions) when calculating the size
of the bpf_tramp_image address emission.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50203/">CVE-2024-50203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50203">CVE-2024-50203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233328">SUSE bug 1233328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50204" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50204" ref_url="https://www.suse.com/security/cve/CVE-2024-50204" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: don't try and remove empty rbtree node

When copying a namespace we won't have added the new copy into the
namespace rbtree until after the copy succeeded. Calling free_mnt_ns()
will try to remove the copy from the rbtree which is invalid. Simply
free the namespace skeleton directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50204/">CVE-2024-50204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50204">CVE-2024-50204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233331">SUSE bug 1233331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50205" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size()

The step variable is initialized to zero. It is changed in the loop,
but if it's not changed it will remain zero. Add a variable check
before the division.

The observed behavior was introduced by commit 826b5de90c0b
("ALSA: firewire-lib: fix insufficient PCM rule for period/buffer size"),
and it is difficult to show that any of the interval parameters will
satisfy the snd_interval_test() condition with data from the
amdtp_rate_table[] table.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233294">SUSE bug 1233294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50206" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50206" ref_url="https://www.suse.com/security/cve/CVE-2024-50206" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: mtk_eth_soc: fix memory corruption during fq dma init

The loop responsible for allocating up to MTK_FQ_DMA_LENGTH buffers must
only touch as many descriptors, otherwise it ends up corrupting unrelated
memory. Fix the loop iteration count accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50206/">CVE-2024-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50206">CVE-2024-50206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233288">SUSE bug 1233288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50207" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50207" ref_url="https://www.suse.com/security/cve/CVE-2024-50207" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix reader locking when changing the sub buffer order

The function ring_buffer_subbuf_order_set() updates each
ring_buffer_per_cpu and installs new sub buffers that match the requested
page order. This operation may be invoked concurrently with readers that
rely on some of the modified data, such as the head bit (RB_PAGE_HEAD), or
the ring_buffer_per_cpu.pages and reader_page pointers. However, no
exclusive access is acquired by ring_buffer_subbuf_order_set(). Modifying
the mentioned data while a reader also operates on them can then result in
incorrect memory access and various crashes.

Fix the problem by taking the reader_lock when updating a specific
ring_buffer_per_cpu in ring_buffer_subbuf_order_set().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50207/">CVE-2024-50207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50207">CVE-2024-50207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233122">SUSE bug 1233122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages

Avoid memory corruption while setting up Level-2 PBL pages for the non MR
resources when num_pages &gt; 256K.

There will be a single PDE page address (contiguous pages in the case of &gt;
PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid
memory access after 256K PBL entries in the PDE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233118">SUSE bug 1233118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50209" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Add a check for memory allocation

__alloc_pbl() can return error when memory allocation fails.
Driver is not checking the status on one of the instances.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233114">SUSE bug 1233114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50210" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50210" ref_url="https://www.suse.com/security/cve/CVE-2024-50210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime()

If get_clock_desc() succeeds, it calls fget() for the clockid's fd,
and get the clk-&gt;rwsem read lock, so the error path should release
the lock to make the lock balance and fput the clockid's fd to make
the refcount balance and release the fd related resource.

However the below commit left the error path locked behind resulting in
unbalanced locking. Check timespec64_valid_strict() before
get_clock_desc() to fix it, because the "ts" is not changed
after that.

[pabeni@redhat.com: fixed commit message typo]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50210/">CVE-2024-50210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50210">CVE-2024-50210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233097">SUSE bug 1233097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50211" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50211" ref_url="https://www.suse.com/security/cve/CVE-2024-50211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: refactor inode_bmap() to handle error

Refactor inode_bmap() to handle error since udf_next_aext() can return
error now. On situations like ftruncate, udf_extend_file() can now
detect errors and bail out early without resorting to checking for
particular offsets and assuming internal behavior of these functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50211/">CVE-2024-50211 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50211">CVE-2024-50211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233096">SUSE bug 1233096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50212" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50212" ref_url="https://www.suse.com/security/cve/CVE-2024-50212" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib: alloc_tag_module_unload must wait for pending kfree_rcu calls

Ben Greear reports following splat:
 ------------[ cut here ]------------
 net/netfilter/nf_nat_core.c:1114 module nf_nat func:nf_nat_register_fn has 256 allocated at module unload
 WARNING: CPU: 1 PID: 10421 at lib/alloc_tag.c:168 alloc_tag_module_unload+0x22b/0x3f0
 Modules linked in: nf_nat(-) btrfs ufs qnx4 hfsplus hfs minix vfat msdos fat
...
 Hardware name: Default string Default string/SKYBAY, BIOS 5.12 08/04/2020
 RIP: 0010:alloc_tag_module_unload+0x22b/0x3f0
  codetag_unload_module+0x19b/0x2a0
  ? codetag_load_module+0x80/0x80

nf_nat module exit calls kfree_rcu on those addresses, but the free
operation is likely still pending by the time alloc_tag checks for leaks.

Wait for outstanding kfree_rcu operations to complete before checking
resolves this warning.

Reproducer:
unshare -n iptables-nft -t nat -A PREROUTING -p tcp
grep nf_nat /proc/allocinfo # will list 4 allocations
rmmod nft_chain_nat
rmmod nf_nat                # will WARN.

[akpm@linux-foundation.org: add comment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50212/">CVE-2024-50212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50212">CVE-2024-50212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233173">SUSE bug 1233173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50213" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50213" ref_url="https://www.suse.com/security/cve/CVE-2024-50213" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tests: hdmi: Fix memory leaks in drm_display_mode_from_cea_vic()

modprobe drm_hdmi_state_helper_test and then rmmod it, the following
memory leak occurs.

The `mode` allocated in drm_mode_duplicate() called by
drm_display_mode_from_cea_vic() is not freed, which cause the memory leak:

	unreferenced object 0xffffff80ccd18100 (size 128):
	  comm "kunit_try_catch", pid 1851, jiffies 4295059695
	  hex dump (first 32 bytes):
	    57 62 00 00 80 02 90 02 f0 02 20 03 00 00 e0 01  Wb........ .....
	    ea 01 ec 01 0d 02 00 00 0a 00 00 00 00 00 00 00  ................
	  backtrace (crc c2f1aa95):
	    [&lt;000000000f10b11b&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;000000001cd4cf73&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;00000000f1f3cffa&gt;] drm_mode_duplicate+0x44/0x19c
	    [&lt;000000008cbeef13&gt;] drm_display_mode_from_cea_vic+0x88/0x98
	    [&lt;0000000019daaacf&gt;] 0xffffffedc11ae69c
	    [&lt;000000000aad0f85&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;00000000a9210bac&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;000000000a0b2e9e&gt;] kthread+0x2e8/0x374
	    [&lt;00000000bd668858&gt;] ret_from_fork+0x10/0x20
	......

Free `mode` by using drm_kunit_display_mode_from_cea_vic()
to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50213/">CVE-2024-50213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50213">CVE-2024-50213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233174">SUSE bug 1233174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50214" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50214" ref_url="https://www.suse.com/security/cve/CVE-2024-50214" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/connector: hdmi: Fix memory leak in drm_display_mode_from_cea_vic()

modprobe drm_connector_test and then rmmod drm_connector_test,
the following memory leak occurs.

The `mode` allocated in drm_mode_duplicate() called by
drm_display_mode_from_cea_vic() is not freed, which cause the memory leak:

	unreferenced object 0xffffff80cb0ee400 (size 128):
	  comm "kunit_try_catch", pid 1948, jiffies 4294950339
	  hex dump (first 32 bytes):
	    14 44 02 00 80 07 d8 07 04 08 98 08 00 00 38 04  .D............8.
	    3c 04 41 04 65 04 00 00 05 00 00 00 00 00 00 00  &lt;.A.e...........
	  backtrace (crc 90e9585c):
	    [&lt;00000000ec42e3d7&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;00000000d0ef055a&gt;] __kmalloc_cache_noprof+0x26c/0x2f4
	    [&lt;00000000c2062161&gt;] drm_mode_duplicate+0x44/0x19c
	    [&lt;00000000f96c74aa&gt;] drm_display_mode_from_cea_vic+0x88/0x98
	    [&lt;00000000d8f2c8b4&gt;] 0xffffffdc982a4868
	    [&lt;000000005d164dbc&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;000000006fb23398&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;000000006ea56ca0&gt;] kthread+0x2e8/0x374
	    [&lt;000000000676063f&gt;] ret_from_fork+0x10/0x20
	......

Free `mode` by using drm_kunit_display_mode_from_cea_vic()
to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50214/">CVE-2024-50214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50214">CVE-2024-50214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233177">SUSE bug 1233177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-auth: assign dh_key to NULL after kfree_sensitive

ctrl-&gt;dh_key might be used across multiple calls to nvmet_setup_dhgroup()
for the same controller. So it's better to nullify it after release on
error path in order to avoid double free later in nvmet_destroy_auth().

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233189">SUSE bug 1233189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50216" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50216" ref_url="https://www.suse.com/security/cve/CVE-2024-50216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix finding a last resort AG in xfs_filestream_pick_ag

When the main loop in xfs_filestream_pick_ag fails to find a suitable
AG it tries to just pick the online AG.  But the loop for that uses
args-&gt;pag as loop iterator while the later code expects pag to be
set.  Fix this by reusing the max_pag case for this last resort, and
also add a check for impossible case of no AG just to make sure that
the uninitialized pag doesn't even escape in theory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50216/">CVE-2024-50216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233179">SUSE bug 1233179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50217" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50217" ref_url="https://www.suse.com/security/cve/CVE-2024-50217" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free of block device file in __btrfs_free_extra_devids()

Mounting btrfs from two images (which have the same one fsid and two
different dev_uuids) in certain executing order may trigger an UAF for
variable 'device-&gt;bdev_file' in __btrfs_free_extra_devids(). And
following are the details:

1. Attach image_1 to loop0, attach image_2 to loop1, and scan btrfs
   devices by ioctl(BTRFS_IOC_SCAN_DEV):

             /  btrfs_device_1 → loop0
   fs_device
             \  btrfs_device_2 → loop1
2. mount /dev/loop0 /mnt
   btrfs_open_devices
    btrfs_device_1-&gt;bdev_file = btrfs_get_bdev_and_sb(loop0)
    btrfs_device_2-&gt;bdev_file = btrfs_get_bdev_and_sb(loop1)
   btrfs_fill_super
    open_ctree
     fail: btrfs_close_devices // -ENOMEM
	    btrfs_close_bdev(btrfs_device_1)
             fput(btrfs_device_1-&gt;bdev_file)
	      // btrfs_device_1-&gt;bdev_file is freed
	    btrfs_close_bdev(btrfs_device_2)
             fput(btrfs_device_2-&gt;bdev_file)

3. mount /dev/loop1 /mnt
   btrfs_open_devices
    btrfs_get_bdev_and_sb(&amp;bdev_file)
     // EIO, btrfs_device_1-&gt;bdev_file is not assigned,
     // which points to a freed memory area
    btrfs_device_2-&gt;bdev_file = btrfs_get_bdev_and_sb(loop1)
   btrfs_fill_super
    open_ctree
     btrfs_free_extra_devids
      if (btrfs_device_1-&gt;bdev_file)
       fput(btrfs_device_1-&gt;bdev_file) // UAF !

Fix it by setting 'device-&gt;bdev_file' as 'NULL' after closing the
btrfs_device in btrfs_close_one_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50217/">CVE-2024-50217 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50217">CVE-2024-50217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233194">SUSE bug 1233194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50218" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow

Syzbot reported a kernel BUG in ocfs2_truncate_inline.  There are two
reasons for this: first, the parameter value passed is greater than
ocfs2_max_inline_data_with_xattr, second, the start and end parameters of
ocfs2_truncate_inline are "unsigned int".

So, we need to add a sanity check for byte_start and byte_len right before
ocfs2_truncate_inline() in ocfs2_remove_inode_range(), if they are greater
than ocfs2_max_inline_data_with_xattr return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233191">SUSE bug 1233191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50220" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50220" ref_url="https://www.suse.com/security/cve/CVE-2024-50220" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fork: do not invoke uffd on fork if error occurs

Patch series "fork: do not expose incomplete mm on fork".

During fork we may place the virtual memory address space into an
inconsistent state before the fork operation is complete.

In addition, we may encounter an error during the fork operation that
indicates that the virtual memory address space is invalidated.

As a result, we should not be exposing it in any way to external machinery
that might interact with the mm or VMAs, machinery that is not designed to
deal with incomplete state.

We specifically update the fork logic to defer khugepaged and ksm to the
end of the operation and only to be invoked if no error arose, and
disallow uffd from observing fork events should an error have occurred.


This patch (of 2):

Currently on fork we expose the virtual address space of a process to
userland unconditionally if uffd is registered in VMAs, regardless of
whether an error arose in the fork.

This is performed in dup_userfaultfd_complete() which is invoked
unconditionally, and performs two duties - invoking registered handlers
for the UFFD_EVENT_FORK event via dup_fctx(), and clearing down
userfaultfd_fork_ctx objects established in dup_userfaultfd().

This is problematic, because the virtual address space may not yet be
correctly initialised if an error arose.

The change in commit d24062914837 ("fork: use __mt_dup() to duplicate
maple tree in dup_mmap()") makes this more pertinent as we may be in a
state where entries in the maple tree are not yet consistent.

We address this by, on fork error, ensuring that we roll back state that
we would otherwise expect to clean up through the event being handled by
userland and perform the memory freeing duty otherwise performed by
dup_userfaultfd_complete().

We do this by implementing a new function, dup_userfaultfd_fail(), which
performs the same loop, only decrementing reference counts.

Note that we perform mmgrab() on the parent and child mm's, however
userfaultfd_ctx_put() will mmdrop() this once the reference count drops to
zero, so we will avoid memory leaks correctly here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50220/">CVE-2024-50220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50220">CVE-2024-50220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233175">SUSE bug 1233175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50221" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50221" ref_url="https://www.suse.com/security/cve/CVE-2024-50221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Vangogh: Fix kernel memory out of bounds write

KASAN reports that the GPU metrics table allocated in
vangogh_tables_init() is not large enough for the memset done in
smu_cmn_init_soft_gpu_metrics(). Condensed report follows:

[   33.861314] BUG: KASAN: slab-out-of-bounds in smu_cmn_init_soft_gpu_metrics+0x73/0x200 [amdgpu]
[   33.861799] Write of size 168 at addr ffff888129f59500 by task mangoapp/1067
...
[   33.861808] CPU: 6 UID: 1000 PID: 1067 Comm: mangoapp Tainted: G        W          6.12.0-rc4 #356 1a56f59a8b5182eeaf67eb7cb8b13594dd23b544
[   33.861816] Tainted: [W]=WARN
[   33.861818] Hardware name: Valve Galileo/Galileo, BIOS F7G0107 12/01/2023
[   33.861822] Call Trace:
[   33.861826]  &lt;TASK&gt;
[   33.861829]  dump_stack_lvl+0x66/0x90
[   33.861838]  print_report+0xce/0x620
[   33.861853]  kasan_report+0xda/0x110
[   33.862794]  kasan_check_range+0xfd/0x1a0
[   33.862799]  __asan_memset+0x23/0x40
[   33.862803]  smu_cmn_init_soft_gpu_metrics+0x73/0x200 [amdgpu 13b1bc364ec578808f676eba412c20eaab792779]
[   33.863306]  vangogh_get_gpu_metrics_v2_4+0x123/0xad0 [amdgpu 13b1bc364ec578808f676eba412c20eaab792779]
[   33.864257]  vangogh_common_get_gpu_metrics+0xb0c/0xbc0 [amdgpu 13b1bc364ec578808f676eba412c20eaab792779]
[   33.865682]  amdgpu_dpm_get_gpu_metrics+0xcc/0x110 [amdgpu 13b1bc364ec578808f676eba412c20eaab792779]
[   33.866160]  amdgpu_get_gpu_metrics+0x154/0x2d0 [amdgpu 13b1bc364ec578808f676eba412c20eaab792779]
[   33.867135]  dev_attr_show+0x43/0xc0
[   33.867147]  sysfs_kf_seq_show+0x1f1/0x3b0
[   33.867155]  seq_read_iter+0x3f8/0x1140
[   33.867173]  vfs_read+0x76c/0xc50
[   33.867198]  ksys_read+0xfb/0x1d0
[   33.867214]  do_syscall_64+0x90/0x160
...
[   33.867353] Allocated by task 378 on cpu 7 at 22.794876s:
[   33.867358]  kasan_save_stack+0x33/0x50
[   33.867364]  kasan_save_track+0x17/0x60
[   33.867367]  __kasan_kmalloc+0x87/0x90
[   33.867371]  vangogh_init_smc_tables+0x3f9/0x840 [amdgpu]
[   33.867835]  smu_sw_init+0xa32/0x1850 [amdgpu]
[   33.868299]  amdgpu_device_init+0x467b/0x8d90 [amdgpu]
[   33.868733]  amdgpu_driver_load_kms+0x19/0xf0 [amdgpu]
[   33.869167]  amdgpu_pci_probe+0x2d6/0xcd0 [amdgpu]
[   33.869608]  local_pci_probe+0xda/0x180
[   33.869614]  pci_device_probe+0x43f/0x6b0

Empirically we can confirm that the former allocates 152 bytes for the
table, while the latter memsets the 168 large block.

Root cause appears that when GPU metrics tables for v2_4 parts were added
it was not considered to enlarge the table to fit.

The fix in this patch is rather "brute force" and perhaps later should be
done in a smarter way, by extracting and consolidating the part version to
size logic to a common helper, instead of brute forcing the largest
possible allocation. Nevertheless, for now this works and fixes the out of
bounds write.

v2:
 * Drop impossible v3_0 case. (Mario)

(cherry picked from commit 0880f58f9609f0200483a49429af0f050d281703)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50221/">CVE-2024-50221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50221">CVE-2024-50221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233185">SUSE bug 1233185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50222" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50222" ref_url="https://www.suse.com/security/cve/CVE-2024-50222" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iov_iter: fix copy_page_from_iter_atomic() if KMAP_LOCAL_FORCE_MAP

generic/077 on x86_32 CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP=y with highmem,
on huge=always tmpfs, issues a warning and then hangs (interruptibly):

WARNING: CPU: 5 PID: 3517 at mm/highmem.c:622 kunmap_local_indexed+0x62/0xc9
CPU: 5 UID: 0 PID: 3517 Comm: cp Not tainted 6.12.0-rc4 #2
...
copy_page_from_iter_atomic+0xa6/0x5ec
generic_perform_write+0xf6/0x1b4
shmem_file_write_iter+0x54/0x67

Fix copy_page_from_iter_atomic() by limiting it in that case
(include/linux/skbuff.h skb_frag_must_loop() does similar).

But going forward, perhaps CONFIG_DEBUG_KMAP_LOCAL_FORCE_MAP is too
surprising, has outlived its usefulness, and should just be removed?
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50222/">CVE-2024-50222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50222">CVE-2024-50222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233184">SUSE bug 1233184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50223" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50223" ref_url="https://www.suse.com/security/cve/CVE-2024-50223" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/numa: Fix the potential null pointer dereference in task_numa_work()

When running stress-ng-vm-segv test, we found a null pointer dereference
error in task_numa_work(). Here is the backtrace:

  [323676.066985] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
  ......
  [323676.067108] CPU: 35 PID: 2694524 Comm: stress-ng-vm-se
  ......
  [323676.067113] pstate: 23401009 (nzCv daif +PAN -UAO +TCO +DIT +SSBS BTYPE=--)
  [323676.067115] pc : vma_migratable+0x1c/0xd0
  [323676.067122] lr : task_numa_work+0x1ec/0x4e0
  [323676.067127] sp : ffff8000ada73d20
  [323676.067128] x29: ffff8000ada73d20 x28: 0000000000000000 x27: 000000003e89f010
  [323676.067130] x26: 0000000000080000 x25: ffff800081b5c0d8 x24: ffff800081b27000
  [323676.067133] x23: 0000000000010000 x22: 0000000104d18cc0 x21: ffff0009f7158000
  [323676.067135] x20: 0000000000000000 x19: 0000000000000000 x18: ffff8000ada73db8
  [323676.067138] x17: 0001400000000000 x16: ffff800080df40b0 x15: 0000000000000035
  [323676.067140] x14: ffff8000ada73cc8 x13: 1fffe0017cc72001 x12: ffff8000ada73cc8
  [323676.067142] x11: ffff80008001160c x10: ffff000be639000c x9 : ffff8000800f4ba4
  [323676.067145] x8 : ffff000810375000 x7 : ffff8000ada73974 x6 : 0000000000000001
  [323676.067147] x5 : 0068000b33e26707 x4 : 0000000000000001 x3 : ffff0009f7158000
  [323676.067149] x2 : 0000000000000041 x1 : 0000000000004400 x0 : 0000000000000000
  [323676.067152] Call trace:
  [323676.067153]  vma_migratable+0x1c/0xd0
  [323676.067155]  task_numa_work+0x1ec/0x4e0
  [323676.067157]  task_work_run+0x78/0xd8
  [323676.067161]  do_notify_resume+0x1ec/0x290
  [323676.067163]  el0_svc+0x150/0x160
  [323676.067167]  el0t_64_sync_handler+0xf8/0x128
  [323676.067170]  el0t_64_sync+0x17c/0x180
  [323676.067173] Code: d2888001 910003fd f9000bf3 aa0003f3 (f9401000)
  [323676.067177] SMP: stopping secondary CPUs
  [323676.070184] Starting crashdump kernel...

stress-ng-vm-segv in stress-ng is used to stress test the SIGSEGV error
handling function of the system, which tries to cause a SIGSEGV error on
return from unmapping the whole address space of the child process.

Normally this program will not cause kernel crashes. But before the
munmap system call returns to user mode, a potential task_numa_work()
for numa balancing could be added and executed. In this scenario, since the
child process has no vma after munmap, the vma_next() in task_numa_work()
will return a null pointer even if the vma iterator restarts from 0.

Recheck the vma pointer before dereferencing it in task_numa_work().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50223/">CVE-2024-50223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50223">CVE-2024-50223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233192">SUSE bug 1233192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50224" ref_url="https://www.suse.com/security/cve/CVE-2024-50224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-fsl-dspi: Fix crash when not using GPIO chip select

Add check for the return value of spi_get_csgpiod() to avoid passing a NULL
pointer to gpiod_direction_output(), preventing a crash when GPIO chip
select is not used.

Fix below crash:
[    4.251960] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[    4.260762] Mem abort info:
[    4.263556]   ESR = 0x0000000096000004
[    4.267308]   EC = 0x25: DABT (current EL), IL = 32 bits
[    4.272624]   SET = 0, FnV = 0
[    4.275681]   EA = 0, S1PTW = 0
[    4.278822]   FSC = 0x04: level 0 translation fault
[    4.283704] Data abort info:
[    4.286583]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    4.292074]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    4.297130]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    4.302445] [0000000000000000] user address but active_mm is swapper
[    4.308805] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    4.315072] Modules linked in:
[    4.318124] CPU: 2 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc4-next-20241023-00008-ga20ec42c5fc1 #359
[    4.328130] Hardware name: LS1046A QDS Board (DT)
[    4.332832] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.339794] pc : gpiod_direction_output+0x34/0x5c
[    4.344505] lr : gpiod_direction_output+0x18/0x5c
[    4.349208] sp : ffff80008003b8f0
[    4.352517] x29: ffff80008003b8f0 x28: 0000000000000000 x27: ffffc96bcc7e9068
[    4.359659] x26: ffffc96bcc6e00b0 x25: ffffc96bcc598398 x24: ffff447400132810
[    4.366800] x23: 0000000000000000 x22: 0000000011e1a300 x21: 0000000000020002
[    4.373940] x20: 0000000000000000 x19: 0000000000000000 x18: ffffffffffffffff
[    4.381081] x17: ffff44740016e600 x16: 0000000500000003 x15: 0000000000000007
[    4.388221] x14: 0000000000989680 x13: 0000000000020000 x12: 000000000000001e
[    4.395362] x11: 0044b82fa09b5a53 x10: 0000000000000019 x9 : 0000000000000008
[    4.402502] x8 : 0000000000000002 x7 : 0000000000000007 x6 : 0000000000000000
[    4.409641] x5 : 0000000000000200 x4 : 0000000002000000 x3 : 0000000000000000
[    4.416781] x2 : 0000000000022202 x1 : 0000000000000000 x0 : 0000000000000000
[    4.423921] Call trace:
[    4.426362]  gpiod_direction_output+0x34/0x5c (P)
[    4.431067]  gpiod_direction_output+0x18/0x5c (L)
[    4.435771]  dspi_setup+0x220/0x334
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50224/">CVE-2024-50224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50224">CVE-2024-50224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233188">SUSE bug 1233188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50225" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50225" ref_url="https://www.suse.com/security/cve/CVE-2024-50225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix error propagation of split bios

The purpose of btrfs_bbio_propagate_error() shall be propagating an error
of split bio to its original btrfs_bio, and tell the error to the upper
layer. However, it's not working well on some cases.

* Case 1. Immediate (or quick) end_bio with an error

When btrfs sends btrfs_bio to mirrored devices, btrfs calls
btrfs_bio_end_io() when all the mirroring bios are completed. If that
btrfs_bio was split, it is from btrfs_clone_bioset and its end_io function
is btrfs_orig_write_end_io. For this case, btrfs_bbio_propagate_error()
accesses the orig_bbio's bio context to increase the error count.

That works well in most cases. However, if the end_io is called enough
fast, orig_bbio's (remaining part after split) bio context may not be
properly set at that time. Since the bio context is set when the orig_bbio
(the last btrfs_bio) is sent to devices, that might be too late for earlier
split btrfs_bio's completion.  That will result in NULL pointer
dereference.

That bug is easily reproducible by running btrfs/146 on zoned devices [1]
and it shows the following trace.

[1] You need raid-stripe-tree feature as it create "-d raid0 -m raid1" FS.

  BUG: kernel NULL pointer dereference, address: 0000000000000020
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: Oops: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 UID: 0 PID: 13 Comm: kworker/u32:1 Not tainted 6.11.0-rc7-BTRFS-ZNS+ #474
  Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
  Workqueue: writeback wb_workfn (flush-btrfs-5)
  RIP: 0010:btrfs_bio_end_io+0xae/0xc0 [btrfs]
  BTRFS error (device dm-0): bdev /dev/mapper/error-test errs: wr 2, rd 0, flush 0, corrupt 0, gen 0
  RSP: 0018:ffffc9000006f248 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff888005a7f080 RCX: ffffc9000006f1dc
  RDX: 0000000000000000 RSI: 000000000000000a RDI: ffff888005a7f080
  RBP: ffff888011dfc540 R08: 0000000000000000 R09: 0000000000000001
  R10: ffffffff82e508e0 R11: 0000000000000005 R12: ffff88800ddfbe58
  R13: ffff888005a7f080 R14: ffff888005a7f158 R15: ffff888005a7f158
  FS:  0000000000000000(0000) GS:ffff88803ea80000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000020 CR3: 0000000002e22006 CR4: 0000000000370ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   ? __die_body.cold+0x19/0x26
   ? page_fault_oops+0x13e/0x2b0
   ? _printk+0x58/0x73
   ? do_user_addr_fault+0x5f/0x750
   ? exc_page_fault+0x76/0x240
   ? asm_exc_page_fault+0x22/0x30
   ? btrfs_bio_end_io+0xae/0xc0 [btrfs]
   ? btrfs_log_dev_io_error+0x7f/0x90 [btrfs]
   btrfs_orig_write_end_io+0x51/0x90 [btrfs]
   dm_submit_bio+0x5c2/0xa50 [dm_mod]
   ? find_held_lock+0x2b/0x80
   ? blk_try_enter_queue+0x90/0x1e0
   __submit_bio+0xe0/0x130
   ? ktime_get+0x10a/0x160
   ? lockdep_hardirqs_on+0x74/0x100
   submit_bio_noacct_nocheck+0x199/0x410
   btrfs_submit_bio+0x7d/0x150 [btrfs]
   btrfs_submit_chunk+0x1a1/0x6d0 [btrfs]
   ? lockdep_hardirqs_on+0x74/0x100
   ? __folio_start_writeback+0x10/0x2c0
   btrfs_submit_bbio+0x1c/0x40 [btrfs]
   submit_one_bio+0x44/0x60 [btrfs]
   submit_extent_folio+0x13f/0x330 [btrfs]
   ? btrfs_set_range_writeback+0xa3/0xd0 [btrfs]
   extent_writepage_io+0x18b/0x360 [btrfs]
   extent_write_locked_range+0x17c/0x340 [btrfs]
   ? __pfx_end_bbio_data_write+0x10/0x10 [btrfs]
   run_delalloc_cow+0x71/0xd0 [btrfs]
   btrfs_run_delalloc_range+0x176/0x500 [btrfs]
   ? find_lock_delalloc_range+0x119/0x260 [btrfs]
   writepage_delalloc+0x2ab/0x480 [btrfs]
   extent_write_cache_pages+0x236/0x7d0 [btrfs]
   btrfs_writepages+0x72/0x130 [btrfs]
   do_writepages+0xd4/0x240
   ? find_held_lock+0x2b/0x80
   ? wbc_attach_and_unlock_inode+0x12c/0x290
   ? wbc_attach_and_unlock_inode+0x12c/0x29
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50225/">CVE-2024-50225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50225">CVE-2024-50225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233193">SUSE bug 1233193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50226" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50226" ref_url="https://www.suse.com/security/cve/CVE-2024-50226" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/port: Fix use-after-free, permit out-of-order decoder shutdown

In support of investigating an initialization failure report [1],
cxl_test was updated to register mock memory-devices after the mock
root-port/bus device had been registered. That led to cxl_test crashing
with a use-after-free bug with the following signature:

    cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem0:decoder7.0 @ 0 next: cxl_switch_uport.0 nr_eps: 1 nr_targets: 1
    cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem4:decoder14.0 @ 1 next: cxl_switch_uport.0 nr_eps: 2 nr_targets: 1
    cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[0] = cxl_switch_dport.0 for mem0:decoder7.0 @ 0
1)  cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[1] = cxl_switch_dport.4 for mem4:decoder14.0 @ 1
    [..]
    cxld_unregister: cxl decoder14.0:
    cxl_region_decode_reset: cxl_region region3:
    mock_decoder_reset: cxl_port port3: decoder3.0 reset
2)  mock_decoder_reset: cxl_port port3: decoder3.0: out of order reset, expected decoder3.1
    cxl_endpoint_decoder_release: cxl decoder14.0:
    [..]
    cxld_unregister: cxl decoder7.0:
3)  cxl_region_decode_reset: cxl_region region3:
    Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6bc3: 0000 [#1] PREEMPT SMP PTI
    [..]
    RIP: 0010:to_cxl_port+0x8/0x60 [cxl_core]
    [..]
    Call Trace:
     &lt;TASK&gt;
     cxl_region_decode_reset+0x69/0x190 [cxl_core]
     cxl_region_detach+0xe8/0x210 [cxl_core]
     cxl_decoder_kill_region+0x27/0x40 [cxl_core]
     cxld_unregister+0x5d/0x60 [cxl_core]

At 1) a region has been established with 2 endpoint decoders (7.0 and
14.0). Those endpoints share a common switch-decoder in the topology
(3.0). At teardown, 2), decoder14.0 is the first to be removed and hits
the "out of order reset case" in the switch decoder. The effect though
is that region3 cleanup is aborted leaving it in-tact and
referencing decoder14.0. At 3) the second attempt to teardown region3
trips over the stale decoder14.0 object which has long since been
deleted.

The fix here is to recognize that the CXL specification places no
mandate on in-order shutdown of switch-decoders, the driver enforces
in-order allocation, and hardware enforces in-order commit. So, rather
than fail and leave objects dangling, always remove them.

In support of making cxl_region_decode_reset() always succeed,
cxl_region_invalidate_memregion() failures are turned into warnings.
Crashing the kernel is ok there since system integrity is at risk if
caches cannot be managed around physical address mutation events like
CXL region destruction.

A new device_for_each_child_reverse_from() is added to cleanup
port-&gt;commit_end after all dependent decoders have been disabled. In
other words if decoders are allocated 0-&gt;1-&gt;2 and disabled 1-&gt;2-&gt;0 then
port-&gt;commit_end only decrements from 2 after 2 has been disabled, and
it decrements all the way to zero since 1 was disabled previously.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50226/">CVE-2024-50226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233195">SUSE bug 1233195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50227" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50227" ref_url="https://www.suse.com/security/cve/CVE-2024-50227" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Fix KASAN reported stack out-of-bounds read in tb_retimer_scan()

KASAN reported following issue:

 BUG: KASAN: stack-out-of-bounds in tb_retimer_scan+0xffe/0x1550 [thunderbolt]
 Read of size 4 at addr ffff88810111fc1c by task kworker/u56:0/11
 CPU: 0 UID: 0 PID: 11 Comm: kworker/u56:0 Tainted: G     U             6.11.0+ #1387
 Tainted: [U]=USER
 Workqueue: thunderbolt0 tb_handle_hotplug [thunderbolt]
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x6c/0x90
  print_report+0xd1/0x630
  kasan_report+0xdb/0x110
  __asan_report_load4_noabort+0x14/0x20
  tb_retimer_scan+0xffe/0x1550 [thunderbolt]
  tb_scan_port+0xa6f/0x2060 [thunderbolt]
  tb_handle_hotplug+0x17b1/0x3080 [thunderbolt]
  process_one_work+0x626/0x1100
  worker_thread+0x6c8/0xfa0
  kthread+0x2c8/0x3a0
  ret_from_fork+0x3a/0x80
  ret_from_fork_asm+0x1a/0x30

This happens because the loop variable still gets incremented by one so
max becomes 3 instead of 2, and this makes the second loop read past the
the array declared on the stack.

Fix this by assigning to max directly in the loop body.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50227/">CVE-2024-50227 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50227">CVE-2024-50227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233181">SUSE bug 1233181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential deadlock with newly created symlinks

Syzbot reported that page_symlink(), called by nilfs_symlink(), triggers
memory reclamation involving the filesystem layer, which can result in
circular lock dependencies among the reader/writer semaphore
nilfs-&gt;ns_segctor_sem, s_writers percpu_rwsem (intwrite) and the
fs_reclaim pseudo lock.

This is because after commit 21fc61c73c39 ("don't put symlink bodies in
pagecache into highmem"), the gfp flags of the page cache for symbolic
links are overwritten to GFP_KERNEL via inode_nohighmem().

This is not a problem for symlinks read from the backing device, because
the __GFP_FS flag is dropped after inode_nohighmem() is called.  However,
when a new symlink is created with nilfs_symlink(), the gfp flags remain
overwritten to GFP_KERNEL.  Then, memory allocation called from
page_symlink() etc.  triggers memory reclamation including the FS layer,
which may call nilfs_evict_inode() or nilfs_dirty_inode().  And these can
cause a deadlock if they are called while nilfs-&gt;ns_segctor_sem is held:

Fix this issue by dropping the __GFP_FS flag from the page cache GFP flags
of newly created symlinks in the same way that nilfs_new_inode() and
__nilfs_read_inode() do, as a workaround until we adopt nofs allocation
scope consistently or improve the locking constraints.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233205">SUSE bug 1233205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50230" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix kernel bug due to missing clearing of checked flag

Syzbot reported that in directory operations after nilfs2 detects
filesystem corruption and degrades to read-only,
__block_write_begin_int(), which is called to prepare block writes, may
fail the BUG_ON check for accesses exceeding the folio/page size,
triggering a kernel bug.

This was found to be because the "checked" flag of a page/folio was not
cleared when it was discarded by nilfs2's own routine, which causes the
sanity check of directory entries to be skipped when the directory
page/folio is reloaded.  So, fix that.

This was necessary when the use of nilfs2's own page discard routine was
applied to more than just metadata files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233206">SUSE bug 1233206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50231" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50231" ref_url="https://www.suse.com/security/cve/CVE-2024-50231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: gts-helper: Fix memory leaks in iio_gts_build_avail_scale_table()

modprobe iio-test-gts and rmmod it, then the following memory leak
occurs:

	unreferenced object 0xffffff80c810be00 (size 64):
	  comm "kunit_try_catch", pid 1654, jiffies 4294913981
	  hex dump (first 32 bytes):
	    02 00 00 00 08 00 00 00 20 00 00 00 40 00 00 00  ........ ...@...
	    80 00 00 00 00 02 00 00 00 04 00 00 00 08 00 00  ................
	  backtrace (crc a63d875e):
	    [&lt;0000000028c1b3c2&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;000000001d6ecc87&gt;] __kmalloc_noprof+0x2bc/0x3c0
	    [&lt;00000000393795c1&gt;] devm_iio_init_iio_gts+0x4b4/0x16f4
	    [&lt;0000000071bb4b09&gt;] 0xffffffdf052a62e0
	    [&lt;000000000315bc18&gt;] 0xffffffdf052a6488
	    [&lt;00000000f9dc55b5&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;00000000175a3fd4&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000f505065d&gt;] kthread+0x2e8/0x374
	    [&lt;00000000bbfb0e5d&gt;] ret_from_fork+0x10/0x20
	unreferenced object 0xffffff80cbfe9e70 (size 16):
	  comm "kunit_try_catch", pid 1658, jiffies 4294914015
	  hex dump (first 16 bytes):
	    10 00 00 00 40 00 00 00 80 00 00 00 00 00 00 00  ....@...........
	  backtrace (crc 857f0cb4):
	    [&lt;0000000028c1b3c2&gt;] kmemleak_alloc+0x34/0x40
	    [&lt;000000001d6ecc87&gt;] __kmalloc_noprof+0x2bc/0x3c0
	    [&lt;00000000393795c1&gt;] devm_iio_init_iio_gts+0x4b4/0x16f4
	    [&lt;0000000071bb4b09&gt;] 0xffffffdf052a62e0
	    [&lt;000000007d089d45&gt;] 0xffffffdf052a6864
	    [&lt;00000000f9dc55b5&gt;] kunit_try_run_case+0x13c/0x3ac
	    [&lt;00000000175a3fd4&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec
	    [&lt;00000000f505065d&gt;] kthread+0x2e8/0x374
	    [&lt;00000000bbfb0e5d&gt;] ret_from_fork+0x10/0x20
	......

It includes 5*5 times "size 64" memory leaks, which correspond to 5 times
test_init_iio_gain_scale() calls with gts_test_gains size 10 (10*size(int))
and gts_test_itimes size 5. It also includes 5*1 times "size 16"
memory leak, which correspond to one time __test_init_iio_gain_scale()
call with gts_test_gains_gain_low size 3 (3*size(int)) and gts_test_itimes
size 5.

The reason is that the per_time_gains[i] is not freed which is allocated in
the "gts-&gt;num_itime" for loop in iio_gts_build_avail_scale_table().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50231/">CVE-2024-50231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50231">CVE-2024-50231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233208">SUSE bug 1233208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr()

In the ad7124_write_raw() function, parameter val can potentially
be zero. This may lead to a division by zero when DIV_ROUND_CLOSEST()
is called within ad7124_set_channel_odr(). The ad7124_write_raw()
function is invoked through the sequence: iio_write_channel_raw() -&gt;
iio_write_channel_attribute() -&gt; iio_channel_write(), with no checks
in place to ensure val is non-zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233209">SUSE bug 1233209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50233" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg()

In the ad9832_write_frequency() function, clk_get_rate() might return 0.
This can lead to a division by zero when calling ad9832_calc_freqreg().
The check if (fout &gt; (clk_get_rate(st-&gt;mclk) / 2)) does not protect
against the case when fout is 0. The ad9832_write_frequency() function
is called from ad9832_write(), and fout is derived from a text buffer,
which can contain any value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233210">SUSE bug 1233210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50235" ref_url="https://www.suse.com/security/cve/CVE-2024-50235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: clear wdev-&gt;cqm_config pointer on free

When we free wdev-&gt;cqm_config when unregistering, we also
need to clear out the pointer since the same wdev/netdev
may get re-registered in another network namespace, then
destroyed later, running this code again, which results in
a double-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50235/">CVE-2024-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233176">SUSE bug 1233176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Fix memory leak in management tx

In the current logic, memory is allocated for storing the MSDU context
during management packet TX but this memory is not being freed during
management TX completion. Similar leaks are seen in the management TX
cleanup logic.

Kmemleak reports this problem as below,

unreferenced object 0xffffff80b64ed250 (size 16):
  comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
  hex dump (first 16 bytes):
    00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......
  backtrace:
    [&lt;ffffffe6e7b245dc&gt;] __kmem_cache_alloc_node+0x1e4/0x2d8
    [&lt;ffffffe6e7adde88&gt;] kmalloc_trace+0x48/0x110
    [&lt;ffffffe6bbd765fc&gt;] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
    [&lt;ffffffe6bbd3eed4&gt;] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
    [&lt;ffffffe6e78d5974&gt;] process_scheduled_works+0x1ac/0x400
    [&lt;ffffffe6e78d60b8&gt;] worker_thread+0x208/0x328
    [&lt;ffffffe6e78dc890&gt;] kthread+0x100/0x1c0
    [&lt;ffffffe6e78166c0&gt;] ret_from_fork+0x10/0x20

Free the memory during completion and cleanup to fix the leak.

Protect the mgmt_pending_tx idr_remove() operation in
ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar-&gt;data_lock similar to
other instances.

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233212">SUSE bug 1233212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower

Avoid potentially crashing in the driver because of uninitialized private data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233216">SUSE bug 1233216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50238" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50238" ref_url="https://www.suse.com/security/cve/CVE-2024-50238" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom: qmp-usbc: fix NULL-deref on runtime suspend

Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation")
removed most users of the platform device driver data from the
qcom-qmp-usb driver, but mistakenly also removed the initialisation
despite the data still being used in the runtime PM callbacks. This bug
was later reproduced when the driver was copied to create the qmp-usbc
driver.

Restore the driver data initialisation at probe to avoid a NULL-pointer
dereference on runtime suspend.

Apparently no one uses runtime PM, which currently needs to be enabled
manually through sysfs, with these drivers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50238/">CVE-2024-50238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50238">CVE-2024-50238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233182">SUSE bug 1233182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50239" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50239" ref_url="https://www.suse.com/security/cve/CVE-2024-50239" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend

Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation")
removed most users of the platform device driver data from the
qcom-qmp-usb driver, but mistakenly also removed the initialisation
despite the data still being used in the runtime PM callbacks. This bug
was later reproduced when the driver was copied to create the
qmp-usb-legacy driver.

Restore the driver data initialisation at probe to avoid a NULL-pointer
dereference on runtime suspend.

Apparently no one uses runtime PM, which currently needs to be enabled
manually through sysfs, with these drivers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50239/">CVE-2024-50239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50239">CVE-2024-50239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233180">SUSE bug 1233180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50240</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50240" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50240" ref_url="https://www.suse.com/security/cve/CVE-2024-50240" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom: qmp-usb: fix NULL-deref on runtime suspend

Commit 413db06c05e7 ("phy: qcom-qmp-usb: clean up probe initialisation")
removed most users of the platform device driver data, but mistakenly
also removed the initialisation despite the data still being used in the
runtime PM callbacks.

Restore the driver data initialisation at probe to avoid a NULL-pointer
dereference on runtime suspend.

Apparently no one uses runtime PM, which currently needs to be enabled
manually through sysfs, with this driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50240/">CVE-2024-50240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50240">CVE-2024-50240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233217">SUSE bug 1233217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50241</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50241" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50241" ref_url="https://www.suse.com/security/cve/CVE-2024-50241" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Initialize struct nfsd4_copy earlier

Ensure the refcount and async_copies fields are initialized early.
cleanup_async_copy() will reference these fields if an error occurs
in nfsd4_copy(). If they are not correctly initialized, at the very
least, a refcount underflow occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50241/">CVE-2024-50241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50241">CVE-2024-50241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233187">SUSE bug 1233187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50242</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50242" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50242" ref_url="https://www.suse.com/security/cve/CVE-2024-50242" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Additional check in ntfs_file_release
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50242/">CVE-2024-50242 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50242">CVE-2024-50242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233268">SUSE bug 1233268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50243</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50243" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50243" ref_url="https://www.suse.com/security/cve/CVE-2024-50243" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix general protection fault in run_is_mapped_full

Fixed deleating of a non-resident attribute in ntfs_create_inode()
rollback.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50243/">CVE-2024-50243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50243">CVE-2024-50243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233269">SUSE bug 1233269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50244</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50244" ref_url="https://www.suse.com/security/cve/CVE-2024-50244" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Additional check in ni_clear()

Checking of NTFS_FLAGS_LOG_REPLAYING added to prevent access to
uninitialized bitmap during replay process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50244/">CVE-2024-50244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50244">CVE-2024-50244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233270">SUSE bug 1233270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50245</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50245" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50245" ref_url="https://www.suse.com/security/cve/CVE-2024-50245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix possible deadlock in mi_read

Mutex lock with another subclass used in ni_lock_dir().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50245/">CVE-2024-50245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50245">CVE-2024-50245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233203">SUSE bug 1233203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50246</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50246" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50246" ref_url="https://www.suse.com/security/cve/CVE-2024-50246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add rough attr alloc_size check
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50246/">CVE-2024-50246 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50246">CVE-2024-50246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233207">SUSE bug 1233207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50247</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50247" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50247" ref_url="https://www.suse.com/security/cve/CVE-2024-50247" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Check if more than chunk-size bytes are written

A incorrectly formatted chunk may decompress into
more than LZNT_CHUNK_SIZE bytes and a index out of bounds
will occur in s_max_off.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50247/">CVE-2024-50247 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50247">CVE-2024-50247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233271">SUSE bug 1233271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50248</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50248" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50248" ref_url="https://www.suse.com/security/cve/CVE-2024-50248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntfs3: Add bounds checking to mi_enum_attr()

Added bounds checking to make sure that every attr don't stray beyond
valid memory region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50248/">CVE-2024-50248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50248">CVE-2024-50248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233219">SUSE bug 1233219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50249</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Make rmw_lock a raw_spin_lock

The following BUG was triggered:

=============================
[ BUG: Invalid wait context ]
6.12.0-rc2-XXX #406 Not tainted
-----------------------------
kworker/1:1/62 is trying to lock:
ffffff8801593030 (&amp;cpc_ptr-&gt;rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370
other info that might help us debug this:
context-{5:5}
2 locks held by kworker/1:1/62:
  #0: ffffff897ef5ec98 (&amp;rq-&gt;__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50
  #1: ffffff880154e238 (&amp;sg_policy-&gt;update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280
stack backtrace:
CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406
Workqueue:  0x0 (events)
Call trace:
  dump_backtrace+0xa4/0x130
  show_stack+0x20/0x38
  dump_stack_lvl+0x90/0xd0
  dump_stack+0x18/0x28
  __lock_acquire+0x480/0x1ad8
  lock_acquire+0x114/0x310
  _raw_spin_lock+0x50/0x70
  cpc_write+0xcc/0x370
  cppc_set_perf+0xa0/0x3a8
  cppc_cpufreq_fast_switch+0x40/0xc0
  cpufreq_driver_fast_switch+0x4c/0x218
  sugov_update_shared+0x234/0x280
  update_load_avg+0x6ec/0x7b8
  dequeue_entities+0x108/0x830
  dequeue_task_fair+0x58/0x408
  __schedule+0x4f0/0x1070
  schedule+0x54/0x130
  worker_thread+0xc0/0x2e8
  kthread+0x130/0x148
  ret_from_fork+0x10/0x20

sugov_update_shared() locks a raw_spinlock while cpc_write() locks a
spinlock.

To have a correct wait-type order, update rmw_lock to a raw spinlock and
ensure that interrupts will be disabled on the CPU holding it.

[ rjw: Changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233197">SUSE bug 1233197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50250</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50250" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50250" ref_url="https://www.suse.com/security/cve/CVE-2024-50250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsdax: dax_unshare_iter needs to copy entire blocks

The code that copies data from srcmap to iomap in dax_unshare_iter is
very very broken, which bfoster's recent fsx changes have exposed.

If the pos and len passed to dax_file_unshare are not aligned to an
fsblock boundary, the iter pos and length in the _iter function will
reflect this unalignment.

dax_iomap_direct_access always returns a pointer to the start of the
kmapped fsdax page, even if its pos argument is in the middle of that
page.  This is catastrophic for data integrity when iter-&gt;pos is not
aligned to a page, because daddr/saddr do not point to the same byte in
the file as iter-&gt;pos.  Hence we corrupt user data by copying it to the
wrong place.

If iter-&gt;pos + iomap_length() in the _iter function not aligned to a
page, then we fail to copy a full block, and only partially populate the
destination block.  This is catastrophic for data confidentiality
because we expose stale pmem contents.

Fix both of these issues by aligning copy_pos/copy_len to a page
boundary (remember, this is fsdax so 1 fsblock == 1 base page) so that
we always copy full blocks.

We're not done yet -- there's no call to invalidate_inode_pages2_range,
so programs that have the file range mmap'd will continue accessing the
old memory mapping after the file metadata updates have completed.

Be careful with the return value -- if the unshare succeeds, we still
need to return the number of bytes that the iomap iter thinks we're
operating on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50250/">CVE-2024-50250 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50250">CVE-2024-50250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233226">SUSE bug 1233226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233227">SUSE bug 1233227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50251</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50251" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50251" ref_url="https://www.suse.com/security/cve/CVE-2024-50251" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_payload: sanitize offset and length before calling skb_checksum()

If access to offset + length is larger than the skbuff length, then
skb_checksum() triggers BUG_ON().

skb_checksum() internally subtracts the length parameter while iterating
over skbuff, BUG_ON(len) at the end of it checks that the expected
length to be included in the checksum calculation is fully consumed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50251/">CVE-2024-50251 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233248">SUSE bug 1233248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50252</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50252" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50252" ref_url="https://www.suse.com/security/cve/CVE-2024-50252" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address

The device stores IPv6 addresses that are used for encapsulation in
linear memory that is managed by the driver.

Changing the remote address of an ip6gre net device never worked
properly, but since cited commit the following reproducer [1] would
result in a warning [2] and a memory leak [3]. The problem is that the
new remote address is never added by the driver to its hash table (and
therefore the device) and the old address is never removed from it.

Fix by programming the new address when the configuration of the ip6gre
net device changes and removing the old one. If the address did not
change, then the above would result in increasing the reference count of
the address and then decreasing it.

[1]
 # ip link add name bla up type ip6gre local 2001:db8:1::1 remote 2001:db8:2::1 tos inherit ttl inherit
 # ip link set dev bla type ip6gre remote 2001:db8:3::1
 # ip link del dev bla
 # devlink dev reload pci/0000:01:00.0

[2]
WARNING: CPU: 0 PID: 1682 at drivers/net/ethernet/mellanox/mlxsw/spectrum.c:3002 mlxsw_sp_ipv6_addr_put+0x140/0x1d0
Modules linked in:
CPU: 0 UID: 0 PID: 1682 Comm: ip Not tainted 6.12.0-rc3-custom-g86b5b55bc835 #151
Hardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023
RIP: 0010:mlxsw_sp_ipv6_addr_put+0x140/0x1d0
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_router_netdevice_event+0x55f/0x1240
 notifier_call_chain+0x5a/0xd0
 call_netdevice_notifiers_info+0x39/0x90
 unregister_netdevice_many_notify+0x63e/0x9d0
 rtnl_dellink+0x16b/0x3a0
 rtnetlink_rcv_msg+0x142/0x3f0
 netlink_rcv_skb+0x50/0x100
 netlink_unicast+0x242/0x390
 netlink_sendmsg+0x1de/0x420
 ____sys_sendmsg+0x2bd/0x320
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xd0
 do_syscall_64+0x9e/0x1a0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[3]
unreferenced object 0xffff898081f597a0 (size 32):
  comm "ip", pid 1626, jiffies 4294719324
  hex dump (first 32 bytes):
    20 01 0d b8 00 02 00 00 00 00 00 00 00 00 00 01   ...............
    21 49 61 83 80 89 ff ff 00 00 00 00 01 00 00 00  !Ia.............
  backtrace (crc fd9be911):
    [&lt;00000000df89c55d&gt;] __kmalloc_cache_noprof+0x1da/0x260
    [&lt;00000000ff2a1ddb&gt;] mlxsw_sp_ipv6_addr_kvdl_index_get+0x281/0x340
    [&lt;000000009ddd445d&gt;] mlxsw_sp_router_netdevice_event+0x47b/0x1240
    [&lt;00000000743e7757&gt;] notifier_call_chain+0x5a/0xd0
    [&lt;000000007c7b9e13&gt;] call_netdevice_notifiers_info+0x39/0x90
    [&lt;000000002509645d&gt;] register_netdevice+0x5f7/0x7a0
    [&lt;00000000c2e7d2a9&gt;] ip6gre_newlink_common.isra.0+0x65/0x130
    [&lt;0000000087cd6d8d&gt;] ip6gre_newlink+0x72/0x120
    [&lt;000000004df7c7cc&gt;] rtnl_newlink+0x471/0xa20
    [&lt;0000000057ed632a&gt;] rtnetlink_rcv_msg+0x142/0x3f0
    [&lt;0000000032e0d5b5&gt;] netlink_rcv_skb+0x50/0x100
    [&lt;00000000908bca63&gt;] netlink_unicast+0x242/0x390
    [&lt;00000000cdbe1c87&gt;] netlink_sendmsg+0x1de/0x420
    [&lt;0000000011db153e&gt;] ____sys_sendmsg+0x2bd/0x320
    [&lt;000000003b6d53eb&gt;] ___sys_sendmsg+0x9a/0xe0
    [&lt;00000000cae27c62&gt;] __sys_sendmsg+0x7a/0xd0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50252/">CVE-2024-50252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233201">SUSE bug 1233201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50253</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50253" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50253" ref_url="https://www.suse.com/security/cve/CVE-2024-50253" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check the validity of nr_words in bpf_iter_bits_new()

Check the validity of nr_words in bpf_iter_bits_new(). Without this
check, when multiplication overflow occurs for nr_bits (e.g., when
nr_words = 0x0400-0001, nr_bits becomes 64), stack corruption may occur
due to bpf_probe_read_kernel_common(..., nr_bytes = 0x2000-0008).

Fix it by limiting the maximum value of nr_words to 511. The value is
derived from the current implementation of BPF memory allocator. To
ensure compatibility if the BPF memory allocator's size limitation
changes in the future, use the helper bpf_mem_alloc_check_size() to
check whether nr_bytes is too larger. And return -E2BIG instead of
-ENOMEM for oversized nr_bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50253/">CVE-2024-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50253">CVE-2024-50253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233186">SUSE bug 1233186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50254</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50254" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50254" ref_url="https://www.suse.com/security/cve/CVE-2024-50254" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Free dynamically allocated bits in bpf_iter_bits_destroy()

bpf_iter_bits_destroy() uses "kit-&gt;nr_bits &lt;= 64" to check whether the
bits are dynamically allocated. However, the check is incorrect and may
cause a kmemleak as shown below:

unreferenced object 0xffff88812628c8c0 (size 32):
  comm "swapper/0", pid 1, jiffies 4294727320
  hex dump (first 32 bytes):
	b0 c1 55 f5 81 88 ff ff f0 f0 f0 f0 f0 f0 f0 f0  ..U...........
	f0 f0 f0 f0 f0 f0 f0 f0 00 00 00 00 00 00 00 00  ..............
  backtrace (crc 781e32cc):
	[&lt;00000000c452b4ab&gt;] kmemleak_alloc+0x4b/0x80
	[&lt;0000000004e09f80&gt;] __kmalloc_node_noprof+0x480/0x5c0
	[&lt;00000000597124d6&gt;] __alloc.isra.0+0x89/0xb0
	[&lt;000000004ebfffcd&gt;] alloc_bulk+0x2af/0x720
	[&lt;00000000d9c10145&gt;] prefill_mem_cache+0x7f/0xb0
	[&lt;00000000ff9738ff&gt;] bpf_mem_alloc_init+0x3e2/0x610
	[&lt;000000008b616eac&gt;] bpf_global_ma_init+0x19/0x30
	[&lt;00000000fc473efc&gt;] do_one_initcall+0xd3/0x3c0
	[&lt;00000000ec81498c&gt;] kernel_init_freeable+0x66a/0x940
	[&lt;00000000b119f72f&gt;] kernel_init+0x20/0x160
	[&lt;00000000f11ac9a7&gt;] ret_from_fork+0x3c/0x70
	[&lt;0000000004671da4&gt;] ret_from_fork_asm+0x1a/0x30

That is because nr_bits will be set as zero in bpf_iter_bits_next()
after all bits have been iterated.

Fix the issue by setting kit-&gt;bit to kit-&gt;nr_bits instead of setting
kit-&gt;nr_bits to zero when the iteration completes in
bpf_iter_bits_next(). In addition, use "!nr_bits || bits &gt;= nr_bits" to
check whether the iteration is complete and still use "nr_bits &gt; 64" to
indicate whether bits are dynamically allocated. The "!nr_bits" check is
necessary because bpf_iter_bits_new() may fail before setting
kit-&gt;nr_bits, and this condition will stop the iteration early instead
of accessing the zeroed or freed kit-&gt;bits.

Considering the initial value of kit-&gt;bits is -1 and the type of
kit-&gt;nr_bits is unsigned int, change the type of kit-&gt;nr_bits to int.
The potential overflow problem will be handled in the following patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50254/">CVE-2024-50254 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50254">CVE-2024-50254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233183">SUSE bug 1233183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50255</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50255" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs

Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes.

__hci_cmd_sync_sk() returns NULL if a command returns a status event.
However, it also returns NULL where an opcode doesn't exist in the
hci_cc table because hci_cmd_complete_evt() assumes status = skb-&gt;data[0]
for unknown opcodes.
This leads to null-ptr-deref in cmd_sync for HCI_OP_READ_LOCAL_CODECS as
there is no hci_cc for HCI_OP_READ_LOCAL_CODECS, which always assumes
status = skb-&gt;data[0].

KASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]
CPU: 1 PID: 2000 Comm: kworker/u9:5 Not tainted 6.9.0-ga6bcb805883c-dirty #10
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci7 hci_power_on
RIP: 0010:hci_read_supported_codecs+0xb9/0x870 net/bluetooth/hci_codec.c:138
Code: 08 48 89 ef e8 b8 c1 8f fd 48 8b 75 00 e9 96 00 00 00 49 89 c6 48 ba 00 00 00 00 00 fc ff df 4c 8d 60 70 4c 89 e3 48 c1 eb 03 &lt;0f&gt; b6 04 13 84 c0 0f 85 82 06 00 00 41 83 3c 24 02 77 0a e8 bf 78
RSP: 0018:ffff888120bafac8 EFLAGS: 00010212
RAX: 0000000000000000 RBX: 000000000000000e RCX: ffff8881173f0040
RDX: dffffc0000000000 RSI: ffffffffa58496c0 RDI: ffff88810b9ad1e4
RBP: ffff88810b9ac000 R08: ffffffffa77882a7 R09: 1ffffffff4ef1054
R10: dffffc0000000000 R11: fffffbfff4ef1055 R12: 0000000000000070
R13: 0000000000000000 R14: 0000000000000000 R15: ffff88810b9ac000
FS:  0000000000000000(0000) GS:ffff8881f6c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6ddaa3439e CR3: 0000000139764003 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 hci_read_local_codecs_sync net/bluetooth/hci_sync.c:4546 [inline]
 hci_init_stage_sync net/bluetooth/hci_sync.c:3441 [inline]
 hci_init4_sync net/bluetooth/hci_sync.c:4706 [inline]
 hci_init_sync net/bluetooth/hci_sync.c:4742 [inline]
 hci_dev_init_sync net/bluetooth/hci_sync.c:4912 [inline]
 hci_dev_open_sync+0x19a9/0x2d30 net/bluetooth/hci_sync.c:4994
 hci_dev_do_open net/bluetooth/hci_core.c:483 [inline]
 hci_power_on+0x11e/0x560 net/bluetooth/hci_core.c:1015
 process_one_work kernel/workqueue.c:3267 [inline]
 process_scheduled_works+0x8ef/0x14f0 kernel/workqueue.c:3348
 worker_thread+0x91f/0xe50 kernel/workqueue.c:3429
 kthread+0x2cb/0x360 kernel/kthread.c:388
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233238">SUSE bug 1233238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50256</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50256" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50256" ref_url="https://www.suse.com/security/cve/CVE-2024-50256" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()

I got a syzbot report without a repro [1] crashing in nf_send_reset6()

I think the issue is that dev-&gt;hard_header_len is zero, and we attempt
later to push an Ethernet header.

Use LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c.

[1]

skbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc900045269b0 EFLAGS: 00010282
RAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800
RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc
R10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140
R13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c
FS:  00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  eth_header+0x38/0x1f0 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3208 [inline]
  nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358
  nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
  br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
  __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562
  __netif_receive_skb_one_core net/core/dev.c:5666 [inline]
  __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781
  netif_receive_skb_internal net/core/dev.c:5867 [inline]
  netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926
  tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550
  tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007
  tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053
  new_sync_write fs/read_write.c:590 [inline]
  vfs_write+0xa6d/0xc90 fs/read_write.c:683
  ksys_write+0x183/0x2b0 fs/read_write.c:736
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fdbeeb7d1ff
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48
RSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff
RDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8
RBP: 00007fdbeebf12be R08: 0000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50256/">CVE-2024-50256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233200">SUSE bug 1233200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50257</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50257" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50257" ref_url="https://www.suse.com/security/cve/CVE-2024-50257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: Fix use-after-free in get_info()

ip6table_nat module unload has refcnt warning for UAF. call trace is:

WARNING: CPU: 1 PID: 379 at kernel/module/main.c:853 module_put+0x6f/0x80
Modules linked in: ip6table_nat(-)
CPU: 1 UID: 0 PID: 379 Comm: ip6tables Not tainted 6.12.0-rc4-00047-gc2ee9f594da8-dirty #205
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:module_put+0x6f/0x80
Call Trace:
 &lt;TASK&gt;
 get_info+0x128/0x180
 do_ip6t_get_ctl+0x6a/0x430
 nf_getsockopt+0x46/0x80
 ipv6_getsockopt+0xb9/0x100
 rawv6_getsockopt+0x42/0x190
 do_sock_getsockopt+0xaa/0x180
 __sys_getsockopt+0x70/0xc0
 __x64_sys_getsockopt+0x20/0x30
 do_syscall_64+0xa2/0x1a0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Concurrent execution of module unload and get_info() trigered the warning.
The root cause is as follows:

cpu0				      cpu1
module_exit
//mod-&gt;state = MODULE_STATE_GOING
  ip6table_nat_exit
    xt_unregister_template
	kfree(t)
	//removed from templ_list
				      getinfo()
					  t = xt_find_table_lock
						list_for_each_entry(tmpl, &amp;xt_templates[af]...)
							if (strcmp(tmpl-&gt;name, name))
								continue;  //table not found
							try_module_get
						list_for_each_entry(t, &amp;xt_net-&gt;tables[af]...)
							return t;  //not get refcnt
					  module_put(t-&gt;me) //uaf
    unregister_pernet_subsys
    //remove table from xt_net list

While xt_table module was going away and has been removed from
xt_templates list, we couldnt get refcnt of xt_table-&gt;me. Check
module in xt_net-&gt;tables list re-traversal to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50257/">CVE-2024-50257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50257">CVE-2024-50257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233244">SUSE bug 1233244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233245">SUSE bug 1233245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50258</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50258" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50258" ref_url="https://www.suse.com/security/cve/CVE-2024-50258" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix crash when config small gso_max_size/gso_ipv4_max_size

Config a small gso_max_size/gso_ipv4_max_size will lead to an underflow
in sk_dst_gso_max_size(), which may trigger a BUG_ON crash,
because sk-&gt;sk_gso_max_size would be much bigger than device limits.
Call Trace:
tcp_write_xmit
    tso_segs = tcp_init_tso_segs(skb, mss_now);
        tcp_set_skb_tso_segs
            tcp_skb_pcount_set
                // skb-&gt;len = 524288, mss_now = 8
                // u16 tso_segs = 524288/8 = 65535 -&gt; 0
                tso_segs = DIV_ROUND_UP(skb-&gt;len, mss_now)
    BUG_ON(!tso_segs)
Add check for the minimum value of gso_max_size and gso_ipv4_max_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50258/">CVE-2024-50258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50258">CVE-2024-50258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233221">SUSE bug 1233221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50259</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50259" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write()

This was found by a static analyzer.
We should not forget the trailing zero after copy_from_user()
if we will further do some string operations, sscanf() in this
case. Adding a trailing zero will ensure that the function
performs properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-19"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233215">SUSE bug 1233215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50260</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50260" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50260" ref_url="https://www.suse.com/security/cve/CVE-2024-50260" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: fix a NULL pointer dereference in sock_map_link_update_prog()

The following race condition could trigger a NULL pointer dereference:

sock_map_link_detach():		sock_map_link_update_prog():
   mutex_lock(&amp;sockmap_mutex);
   ...
   sockmap_link-&gt;map = NULL;
   mutex_unlock(&amp;sockmap_mutex);
   				   mutex_lock(&amp;sockmap_mutex);
				   ...
				   sock_map_prog_link_lookup(sockmap_link-&gt;map);
				   mutex_unlock(&amp;sockmap_mutex);
   &lt;continue&gt;

Fix it by adding a NULL pointer check. In this specific case, it makes
no sense to update a link which is being released.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50260/">CVE-2024-50260 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50260">CVE-2024-50260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233178">SUSE bug 1233178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50261</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macsec: Fix use-after-free while sending the offloading packet

KASAN reports the following UAF. The metadata_dst, which is used to
store the SCI value for macsec offload, is already freed by
metadata_dst_free() in macsec_free_netdev(), while driver still use it
for sending the packet.

To fix this issue, dst_release() is used instead to release
metadata_dst. So it is not freed instantly in macsec_free_netdev() if
still referenced by skb.

 BUG: KASAN: slab-use-after-free in mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
 Read of size 2 at addr ffff88813e42e038 by task kworker/7:2/714
 [...]
 Workqueue: mld mld_ifc_work
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x51/0x60
  print_report+0xc1/0x600
  kasan_report+0xab/0xe0
  mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
  dev_hard_start_xmit+0x120/0x530
  sch_direct_xmit+0x149/0x11e0
  __qdisc_run+0x3ad/0x1730
  __dev_queue_xmit+0x1196/0x2ed0
  vlan_dev_hard_start_xmit+0x32e/0x510 [8021q]
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  macsec_start_xmit+0x13e9/0x2340
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  ip6_finish_output2+0x923/0x1a70
  ip6_finish_output+0x2d7/0x970
  ip6_output+0x1ce/0x3a0
  NF_HOOK.constprop.0+0x15f/0x190
  mld_sendpack+0x59a/0xbd0
  mld_ifc_work+0x48a/0xa80
  process_one_work+0x5aa/0xe50
  worker_thread+0x79c/0x1290
  kthread+0x28f/0x350
  ret_from_fork+0x2d/0x70
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

 Allocated by task 3922:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  __kasan_kmalloc+0x77/0x90
  __kmalloc_noprof+0x188/0x400
  metadata_dst_alloc+0x1f/0x4e0
  macsec_newlink+0x914/0x1410
  __rtnl_newlink+0xe08/0x15b0
  rtnl_newlink+0x5f/0x90
  rtnetlink_rcv_msg+0x667/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 Freed by task 4011:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  kasan_save_free_info+0x37/0x50
  poison_slab_object+0x10c/0x190
  __kasan_slab_free+0x11/0x30
  kfree+0xe0/0x290
  macsec_free_netdev+0x3f/0x140
  netdev_run_todo+0x450/0xc70
  rtnetlink_rcv_msg+0x66f/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233253">SUSE bug 1233253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50262</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50262" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50262" ref_url="https://www.suse.com/security/cve/CVE-2024-50262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix out-of-bounds write in trie_get_next_key()

trie_get_next_key() allocates a node stack with size trie-&gt;max_prefixlen,
while it writes (trie-&gt;max_prefixlen + 1) nodes to the stack when it has
full paths from the root to leaves. For example, consider a trie with
max_prefixlen is 8, and the nodes with key 0x00/0, 0x00/1, 0x00/2, ...
0x00/8 inserted. Subsequent calls to trie_get_next_key with _key with
.prefixlen = 8 make 9 nodes be written on the node stack with size 8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50262/">CVE-2024-50262 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50262">CVE-2024-50262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233239">SUSE bug 1233239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50263</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50263" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50263" ref_url="https://www.suse.com/security/cve/CVE-2024-50263" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fork: only invoke khugepaged, ksm hooks if no error

There is no reason to invoke these hooks early against an mm that is in an
incomplete state.

The change in commit d24062914837 ("fork: use __mt_dup() to duplicate
maple tree in dup_mmap()") makes this more pertinent as we may be in a
state where entries in the maple tree are not yet consistent.

Their placement early in dup_mmap() only appears to have been meaningful
for early error checking, and since functionally it'd require a very small
allocation to fail (in practice 'too small to fail') that'd only occur in
the most dire circumstances, meaning the fork would fail or be OOM'd in
any case.

Since both khugepaged and KSM tracking are there to provide optimisations
to memory performance rather than critical functionality, it doesn't
really matter all that much if, under such dire memory pressure, we fail
to register an mm with these.

As a result, we follow the example of commit d2081b2bf819 ("mm:
khugepaged: make khugepaged_enter() void function") and make ksm_fork() a
void function also.

We only expose the mm to these functions once we are done with them and
only if no error occurred in the fork operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50263/">CVE-2024-50263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50263">CVE-2024-50263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233254">SUSE bug 1233254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50264</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans

During loopback communication, a dangling pointer can be created in
vsk-&gt;trans, potentially leading to a Use-After-Free condition.  This
issue is resolved by initializing vsk-&gt;trans to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233712">SUSE bug 1233712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50265</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50265" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50265" ref_url="https://www.suse.com/security/cve/CVE-2024-50265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove()

Syzkaller is able to provoke null-ptr-dereference in ocfs2_xa_remove():

[   57.319872] (a.out,1161,7):ocfs2_xa_remove:2028 ERROR: status = -12
[   57.320420] (a.out,1161,7):ocfs2_xa_cleanup_value_truncate:1999 ERROR: Partial truncate while removing xattr overlay.upper.  Leaking 1 clusters and removing the entry
[   57.321727] BUG: kernel NULL pointer dereference, address: 0000000000000004
[...]
[   57.325727] RIP: 0010:ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[...]
[   57.331328] Call Trace:
[   57.331477]  &lt;TASK&gt;
[...]
[   57.333511]  ? do_user_addr_fault+0x3e5/0x740
[   57.333778]  ? exc_page_fault+0x70/0x170
[   57.334016]  ? asm_exc_page_fault+0x2b/0x30
[   57.334263]  ? __pfx_ocfs2_xa_block_wipe_namevalue+0x10/0x10
[   57.334596]  ? ocfs2_xa_block_wipe_namevalue+0x2a/0xc0
[   57.334913]  ocfs2_xa_remove_entry+0x23/0xc0
[   57.335164]  ocfs2_xa_set+0x704/0xcf0
[   57.335381]  ? _raw_spin_unlock+0x1a/0x40
[   57.335620]  ? ocfs2_inode_cache_unlock+0x16/0x20
[   57.335915]  ? trace_preempt_on+0x1e/0x70
[   57.336153]  ? start_this_handle+0x16c/0x500
[   57.336410]  ? preempt_count_sub+0x50/0x80
[   57.336656]  ? _raw_read_unlock+0x20/0x40
[   57.336906]  ? start_this_handle+0x16c/0x500
[   57.337162]  ocfs2_xattr_block_set+0xa6/0x1e0
[   57.337424]  __ocfs2_xattr_set_handle+0x1fd/0x5d0
[   57.337706]  ? ocfs2_start_trans+0x13d/0x290
[   57.337971]  ocfs2_xattr_set+0xb13/0xfb0
[   57.338207]  ? dput+0x46/0x1c0
[   57.338393]  ocfs2_xattr_trusted_set+0x28/0x30
[   57.338665]  ? ocfs2_xattr_trusted_set+0x28/0x30
[   57.338948]  __vfs_removexattr+0x92/0xc0
[   57.339182]  __vfs_removexattr_locked+0xd5/0x190
[   57.339456]  ? preempt_count_sub+0x50/0x80
[   57.339705]  vfs_removexattr+0x5f/0x100
[...]

Reproducer uses faultinject facility to fail ocfs2_xa_remove() -&gt;
ocfs2_xa_value_truncate() with -ENOMEM.

In this case the comment mentions that we can return 0 if
ocfs2_xa_cleanup_value_truncate() is going to wipe the entry
anyway. But the following 'rc' check is wrong and execution flow do
'ocfs2_xa_remove_entry(loc);' twice:
* 1st: in ocfs2_xa_cleanup_value_truncate();
* 2nd: returning back to ocfs2_xa_remove() instead of going to 'out'.

Fix this by skipping the 2nd removal of the same entry and making
syzkaller repro happy.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-50265/">CVE-2024-50265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233454">SUSE bug 1233454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50266</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50266" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50266" ref_url="https://www.suse.com/security/cve/CVE-2024-50266" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: videocc-sm8350: use HW_CTRL_TRIGGER for vcodec GDSCs

A recent change in the venus driver results in a stuck clock on the
Lenovo ThinkPad X13s, for example, when streaming video in firefox:

	video_cc_mvs0_clk status stuck at 'off'
	WARNING: CPU: 6 PID: 2885 at drivers/clk/qcom/clk-branch.c:87 clk_branch_wait+0x144/0x15c
	...
	Call trace:
	 clk_branch_wait+0x144/0x15c
	 clk_branch2_enable+0x30/0x40
	 clk_core_enable+0xd8/0x29c
	 clk_enable+0x2c/0x4c
	 vcodec_clks_enable.isra.0+0x94/0xd8 [venus_core]
	 coreid_power_v4+0x464/0x628 [venus_core]
	 vdec_start_streaming+0xc4/0x510 [venus_dec]
	 vb2_start_streaming+0x6c/0x180 [videobuf2_common]
	 vb2_core_streamon+0x120/0x1dc [videobuf2_common]
	 vb2_streamon+0x1c/0x6c [videobuf2_v4l2]
	 v4l2_m2m_ioctl_streamon+0x30/0x80 [v4l2_mem2mem]
	 v4l_streamon+0x24/0x30 [videodev]

using the out-of-tree sm8350/sc8280xp venus support. [1]

Update also the sm8350/sc8280xp GDSC definitions so that the hw control
mode can be changed at runtime as the venus driver now requires.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50266/">CVE-2024-50266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50266">CVE-2024-50266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233455">SUSE bug 1233455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50267</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50267" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: serial: io_edgeport: fix use after free in debug printk

The "dev_dbg(&amp;urb-&gt;dev-&gt;dev, ..." which happens after usb_free_urb(urb)
is a use after free of the "urb" pointer.  Store the "dev" pointer at the
start of the function to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233711">SUSE bug 1233711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50268</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50268" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50268" ref_url="https://www.suse.com/security/cve/CVE-2024-50268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd()

The "*cmd" variable can be controlled by the user via debugfs.  That means
"new_cam" can be as high as 255 while the size of the uc-&gt;updated[] array
is UCSI_MAX_ALTMODES (30).

The call tree is:
ucsi_cmd() // val comes from simple_attr_write_xsigned()
-&gt; ucsi_send_command()
   -&gt; ucsi_send_command_common()
      -&gt; ucsi_run_command() // calls ucsi-&gt;ops-&gt;sync_control()
         -&gt; ucsi_ccg_sync_control()
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50268/">CVE-2024-50268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233457">SUSE bug 1233457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50269</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50269" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50269" ref_url="https://www.suse.com/security/cve/CVE-2024-50269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: sunxi: Fix accessing an released usb phy

Commit 6ed05c68cbca ("usb: musb: sunxi: Explicitly release USB PHY on
exit") will cause that usb phy @glue-&gt;xceiv is accessed after released.

1) register platform driver @sunxi_musb_driver
// get the usb phy @glue-&gt;xceiv
sunxi_musb_probe() -&gt; devm_usb_get_phy().

2) register and unregister platform driver @musb_driver
musb_probe() -&gt; sunxi_musb_init()
use the phy here
//the phy is released here
musb_remove() -&gt; sunxi_musb_exit() -&gt; devm_usb_put_phy()

3) register @musb_driver again
musb_probe() -&gt; sunxi_musb_init()
use the phy here but the phy has been released at 2).
...

Fixed by reverting the commit, namely, removing devm_usb_put_phy()
from sunxi_musb_exit().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50269/">CVE-2024-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233458">SUSE bug 1233458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50270</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50270" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50270" ref_url="https://www.suse.com/security/cve/CVE-2024-50270" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/core: avoid overflow in damon_feed_loop_next_input()

damon_feed_loop_next_input() is inefficient and fragile to overflows. 
Specifically, 'score_goal_diff_bp' calculation can overflow when 'score'
is high.  The calculation is actually unnecessary at all because 'goal' is
a constant of value 10,000.  Calculation of 'compensation' is again
fragile to overflow.  Final calculation of return value for under-achiving
case is again fragile to overflow when the current score is
under-achieving the target.

Add two corner cases handling at the beginning of the function to make the
body easier to read, and rewrite the body of the function to avoid
overflows and the unnecessary bp value calcuation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50270/">CVE-2024-50270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50270">CVE-2024-50270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233459">SUSE bug 1233459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50271</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

signal: restore the override_rlimit logic

Prior to commit d64696905554 ("Reimplement RLIMIT_SIGPENDING on top of
ucounts") UCOUNT_RLIMIT_SIGPENDING rlimit was not enforced for a class of
signals.  However now it's enforced unconditionally, even if
override_rlimit is set.  This behavior change caused production issues.  

For example, if the limit is reached and a process receives a SIGSEGV
signal, sigqueue_alloc fails to allocate the necessary resources for the
signal delivery, preventing the signal from being delivered with siginfo. 
This prevents the process from correctly identifying the fault address and
handling the error.  From the user-space perspective, applications are
unaware that the limit has been reached and that the siginfo is
effectively 'corrupted'.  This can lead to unpredictable behavior and
crashes, as we observed with java applications.

Fix this by passing override_rlimit into inc_rlimit_get_ucounts() and skip
the comparison to max there if override_rlimit is set.  This effectively
restores the old behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233460">SUSE bug 1233460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50272</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50272" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50272" ref_url="https://www.suse.com/security/cve/CVE-2024-50272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filemap: Fix bounds checking in filemap_read()

If the caller supplies an iocb-&gt;ki_pos value that is close to the
filesystem upper limit, and an iterator with a count that causes us to
overflow that limit, then filemap_read() enters an infinite loop.

This behaviour was discovered when testing xfstests generic/525 with the
"localio" optimisation for loopback NFS mounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50272/">CVE-2024-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50272">CVE-2024-50272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233461">SUSE bug 1233461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50273</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50273" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50273" ref_url="https://www.suse.com/security/cve/CVE-2024-50273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: reinitialize delayed ref list after deleting it from the list

At insert_delayed_ref() if we need to update the action of an existing
ref to BTRFS_DROP_DELAYED_REF, we delete the ref from its ref head's
ref_add_list using list_del(), which leaves the ref's add_list member
not reinitialized, as list_del() sets the next and prev members of the
list to LIST_POISON1 and LIST_POISON2, respectively.

If later we end up calling drop_delayed_ref() against the ref, which can
happen during merging or when destroying delayed refs due to a transaction
abort, we can trigger a crash since at drop_delayed_ref() we call
list_empty() against the ref's add_list, which returns false since
the list was not reinitialized after the list_del() and as a consequence
we call list_del() again at drop_delayed_ref(). This results in an
invalid list access since the next and prev members are set to poison
pointers, resulting in a splat if CONFIG_LIST_HARDENED and
CONFIG_DEBUG_LIST are set or invalid poison pointer dereferences
otherwise.

So fix this by deleting from the list with list_del_init() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50273/">CVE-2024-50273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233462">SUSE bug 1233462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50274</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50274" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: avoid vport access in idpf_get_link_ksettings

When the device control plane is removed or the platform
running device control plane is rebooted, a reset is detected
on the driver. On driver reset, it releases the resources and
waits for the reset to complete. If the reset fails, it takes
the error path and releases the vport lock. At this time if the
monitoring tools tries to access link settings, it call traces
for accessing released vport pointer.

To avoid it, move link_speed_mbps to netdev_priv structure
which removes the dependency on vport pointer and the vport lock
in idpf_get_link_ksettings. Also use netif_carrier_ok()
to check the link status and adjust the offsetof to use link_up
instead of link_speed_mbps.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235104">SUSE bug 1235104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50275</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50275" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50275" ref_url="https://www.suse.com/security/cve/CVE-2024-50275" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/sve: Discard stale CPU state when handling SVE traps

The logic for handling SVE traps manipulates saved FPSIMD/SVE state
incorrectly, and a race with preemption can result in a task having
TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SVE traps enabled). This has been observed to result
in warnings from do_sve_acc() where SVE traps are not expected while
TIF_SVE is set:

|         if (test_and_set_thread_flag(TIF_SVE))
|                 WARN_ON(1); /* SVE access shouldn't have trapped */

Warnings of this form have been reported intermittently, e.g.

  https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/
  https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/

The race can occur when the SVE trap handler is preempted before and
after manipulating the saved FPSIMD/SVE state, starting and ending on
the same CPU, e.g.

| void do_sve_acc(unsigned long esr, struct pt_regs *regs)
| {
|         // Trap on CPU 0 with TIF_SVE clear, SVE traps enabled
|         // task-&gt;fpsimd_cpu is 0.
|         // per_cpu_ptr(&amp;fpsimd_last_state, 0) is task.
|
|         ...
|
|         // Preempted; migrated from CPU 0 to CPU 1.
|         // TIF_FOREIGN_FPSTATE is set.
|
|         get_cpu_fpsimd_context();
|
|         if (test_and_set_thread_flag(TIF_SVE))
|                 WARN_ON(1); /* SVE access shouldn't have trapped */
|
|         sve_init_regs() {
|                 if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
|                         ...
|                 } else {
|                         fpsimd_to_sve(current);
|                         current-&gt;thread.fp_type = FP_STATE_SVE;
|                 }
|         }
|
|         put_cpu_fpsimd_context();
|
|         // Preempted; migrated from CPU 1 to CPU 0.
|         // task-&gt;fpsimd_cpu is still 0
|         // If per_cpu_ptr(&amp;fpsimd_last_state, 0) is still task then:
|         // - Stale HW state is reused (with SVE traps enabled)
|         // - TIF_FOREIGN_FPSTATE is cleared
|         // - A return to userspace skips HW state restore
| }

Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50275/">CVE-2024-50275 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233464">SUSE bug 1233464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50276</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50276" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50276" ref_url="https://www.suse.com/security/cve/CVE-2024-50276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vertexcom: mse102x: Fix possible double free of TX skb

The scope of the TX skb is wider than just mse102x_tx_frame_spi(),
so in case the TX skb room needs to be expanded, we should free the
the temporary skb instead of the original skb. Otherwise the original
TX skb pointer would be freed again in mse102x_tx_work(), which leads
to crashes:

  Internal error: Oops: 0000000096000004 [#2] PREEMPT SMP
  CPU: 0 PID: 712 Comm: kworker/0:1 Tainted: G      D            6.6.23
  Hardware name: chargebyte Charge SOM DC-ONE (DT)
  Workqueue: events mse102x_tx_work [mse102x]
  pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : skb_release_data+0xb8/0x1d8
  lr : skb_release_data+0x1ac/0x1d8
  sp : ffff8000819a3cc0
  x29: ffff8000819a3cc0 x28: ffff0000046daa60 x27: ffff0000057f2dc0
  x26: ffff000005386c00 x25: 0000000000000002 x24: 00000000ffffffff
  x23: 0000000000000000 x22: 0000000000000001 x21: ffff0000057f2e50
  x20: 0000000000000006 x19: 0000000000000000 x18: ffff00003fdacfcc
  x17: e69ad452d0c49def x16: 84a005feff870102 x15: 0000000000000000
  x14: 000000000000024a x13: 0000000000000002 x12: 0000000000000000
  x11: 0000000000000400 x10: 0000000000000930 x9 : ffff00003fd913e8
  x8 : fffffc00001bc008
  x7 : 0000000000000000 x6 : 0000000000000008
  x5 : ffff00003fd91340 x4 : 0000000000000000 x3 : 0000000000000009
  x2 : 00000000fffffffe x1 : 0000000000000000 x0 : 0000000000000000
  Call trace:
   skb_release_data+0xb8/0x1d8
   kfree_skb_reason+0x48/0xb0
   mse102x_tx_work+0x164/0x35c [mse102x]
   process_one_work+0x138/0x260
   worker_thread+0x32c/0x438
   kthread+0x118/0x11c
   ret_from_fork+0x10/0x20
  Code: aa1303e0 97fffab6 72001c1f 54000141 (f9400660)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50276/">CVE-2024-50276 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50276">CVE-2024-50276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233465">SUSE bug 1233465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50277</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50277" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50277" ref_url="https://www.suse.com/security/cve/CVE-2024-50277" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix a crash if blk_alloc_disk fails

If blk_alloc_disk fails, the variable md-&gt;disk is set to an error value.
cleanup_mapped_device will see that md-&gt;disk is non-NULL and it will
attempt to access it, causing a crash on this statement
"md-&gt;disk-&gt;private_data = NULL;".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50277/">CVE-2024-50277 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50277">CVE-2024-50277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233466">SUSE bug 1233466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50278</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50278" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50278" ref_url="https://www.suse.com/security/cve/CVE-2024-50278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix potential out-of-bounds access on the first resume

Out-of-bounds access occurs if the fast device is expanded unexpectedly
before the first-time resume of the cache table. This happens because
expanding the fast device requires reloading the cache table for
cache_create to allocate new in-core data structures that fit the new
size, and the check in cache_preresume is not performed during the
first resume, leading to the issue.

Reproduce steps:

1. prepare component devices:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct

2. load a cache table of 512 cache blocks, and deliberately expand the
   fast device before resuming the cache, making the in-core data
   structures inadequate.

dmsetup create cache --notable
dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"
dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

3. suspend the cache to write out the in-core dirty bitset and hint
   array, leading to out-of-bounds access to the dirty bitset at offset
   0x40:

dmsetup suspend cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80
  Read of size 8 at addr ffffc90000085040 by task dmsetup/90

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc90000085000, ffffc90000087000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  &gt;ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8
                                             ^
   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by checking the size change on the first resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50278/">CVE-2024-50278 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233467">SUSE bug 1233467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233709">SUSE bug 1233709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50279</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50279" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix out-of-bounds access to the dirty bitset when resizing

dm-cache checks the dirty bits of the cache blocks to be dropped when
shrinking the fast device, but an index bug in bitset iteration causes
out-of-bounds access.

Reproduce steps:

1. create a cache device of 1024 cache blocks (128 bytes dirty bitset)

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. shrink the fast device to 512 cache blocks, triggering out-of-bounds
   access to the dirty bitset (offset 0x80)

dmsetup suspend cache
dmsetup reload cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in cache_preresume+0x269/0x7b0
  Read of size 8 at addr ffffc900000f3080 by task dmsetup/131

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc900000f3000, ffffc900000f5000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc900000f2f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  &gt;ffffc900000f3080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
                     ^
   ffffc900000f3100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc900000f3180: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by making the index post-incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233708">SUSE bug 1233708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50280</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50280" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50280" ref_url="https://www.suse.com/security/cve/CVE-2024-50280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix flushing uninitialized delayed_work on cache_ctr error

An unexpected WARN_ON from flush_work() may occur when cache creation
fails, caused by destroying the uninitialized delayed_work waker in the
error path of cache_create(). For example, the warning appears on the
superblock checksum error.

Reproduce steps:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/urandom of=/dev/mapper/cmeta bs=4k count=1 oflag=direct
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

Kernel logs:

(snip)
WARNING: CPU: 0 PID: 84 at kernel/workqueue.c:4178 __flush_work+0x5d4/0x890

Fix by pulling out the cancel_delayed_work_sync() from the constructor's
error path. This patch doesn't affect the use-after-free fix for
concurrent dm_resume and dm_destroy (commit 6a459d8edbdb ("dm cache: Fix
UAF in destroy()")) as cache_dtr is not changed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50280/">CVE-2024-50280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50280">CVE-2024-50280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233469">SUSE bug 1233469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50281</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50281" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50281" ref_url="https://www.suse.com/security/cve/CVE-2024-50281" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: dcp: fix NULL dereference in AEAD crypto operation

When sealing or unsealing a key blob we currently do not wait for
the AEAD cipher operation to finish and simply return after submitting
the request. If there is some load on the system we can exit before
the cipher operation is done and the buffer we read from/write to
is already removed from the stack. This will e.g. result in NULL
pointer dereference errors in the DCP driver during blob creation.

Fix this by waiting for the AEAD cipher operation to finish before
resuming the seal and unseal calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50281/">CVE-2024-50281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50281">CVE-2024-50281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233470">SUSE bug 1233470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50282</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()

Avoid a possible buffer overflow if size is larger than 4K.

(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233471">SUSE bug 1233471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233707">SUSE bug 1233707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50283</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50283" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50283" ref_url="https://www.suse.com/security/cve/CVE-2024-50283" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slab-use-after-free in smb3_preauth_hash_rsp

ksmbd_user_session_put should be called under smb3_preauth_hash_rsp().
It will avoid freeing session before calling smb3_preauth_hash_rsp().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-50283/">CVE-2024-50283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50283">CVE-2024-50283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233472">SUSE bug 1233472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50284</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50284" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50284" ref_url="https://www.suse.com/security/cve/CVE-2024-50284" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: Fix the missing xa_store error check

xa_store() can fail, it return xa_err(-EINVAL) if the entry cannot
be stored in an XArray, or xa_err(-ENOMEM) if memory allocation failed,
so check error for xa_store() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50284/">CVE-2024-50284 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50284">CVE-2024-50284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233473">SUSE bug 1233473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50285</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50285" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50285" ref_url="https://www.suse.com/security/cve/CVE-2024-50285" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: check outstanding simultaneous SMB operations

If Client send simultaneous SMB operations to ksmbd, It exhausts too much
memory through the "ksmbd_work_cache". It will cause OOM issue.
ksmbd has a credit mechanism but it can't handle this problem. This patch
add the check if it exceeds max credits to prevent this problem by assuming
that one smb request consumes at least one credit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-50285/">CVE-2024-50285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50285">CVE-2024-50285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233474">SUSE bug 1233474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50286</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50286" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50286" ref_url="https://www.suse.com/security/cve/CVE-2024-50286" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix slab-use-after-free in ksmbd_smb2_session_create

There is a race condition between ksmbd_smb2_session_create and
ksmbd_expire_session. This patch add missing sessions_table_lock
while adding/deleting session from global session table.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50286/">CVE-2024-50286 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50286">CVE-2024-50286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233475">SUSE bug 1233475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50287</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50287" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50287" ref_url="https://www.suse.com/security/cve/CVE-2024-50287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-tpg: prevent the risk of a division by zero

As reported by Coverity, the logic at tpg_precalculate_line()
blindly rescales the buffer even when scaled_witdh is equal to
zero. If this ever happens, this will cause a division by zero.

Instead, add a WARN_ON_ONCE() to trigger such cases and return
without doing any precalculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50287/">CVE-2024-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233476">SUSE bug 1233476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50288</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50288" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50288" ref_url="https://www.suse.com/security/cve/CVE-2024-50288" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vivid: fix buffer overwrite when using &gt; 32 buffers

The maximum number of buffers that can be requested was increased to
64 for the video capture queue. But video capture used a must_blank
array that was still sized for 32 (VIDEO_MAX_FRAME). This caused an
out-of-bounds write when using buffer indices &gt;= 32.

Create a new define MAX_VID_CAP_BUFFERS that is used to access the
must_blank array and set max_num_buffers for the video capture queue.

This solves a crash reported by:

	https://bugzilla.kernel.org/show_bug.cgi?id=219258
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50288/">CVE-2024-50288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50288">CVE-2024-50288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233477">SUSE bug 1233477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50289</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50289" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50289" ref_url="https://www.suse.com/security/cve/CVE-2024-50289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: av7110: fix a spectre vulnerability

As warned by smatch:
	drivers/staging/media/av7110/av7110_ca.c:270 dvb_ca_ioctl() warn: potential spectre issue 'av7110-&gt;ci_slot' [w] (local cap)

There is a spectre-related vulnerability at the code. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-50289/">CVE-2024-50289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50289">CVE-2024-50289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233478">SUSE bug 1233478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50290</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50290" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: cx24116: prevent overflows on SNR calculus

as reported by Coverity, if reading SNR registers fail, a negative
number will be returned, causing an underflow when reading SNR
registers.

Prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233681">SUSE bug 1233681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50291</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50291" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50291" ref_url="https://www.suse.com/security/cve/CVE-2024-50291" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-core: add missing buffer index check

dvb_vb2_expbuf() didn't check if the given buffer index was
for a valid buffer. Add this check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50291/">CVE-2024-50291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50291">CVE-2024-50291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233480">SUSE bug 1233480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50292</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50292" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50292" ref_url="https://www.suse.com/security/cve/CVE-2024-50292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove

In case of error when requesting ctrl_chan DMA channel, ctrl_chan is not
null. So the release of the dma channel leads to the following issue:
[    4.879000] st,stm32-spdifrx 500d0000.audio-controller:
dma_request_slave_channel error -19
[    4.888975] Unable to handle kernel NULL pointer dereference
at virtual address 000000000000003d
[...]
[    5.096577] Call trace:
[    5.099099]  dma_release_channel+0x24/0x100
[    5.103235]  stm32_spdifrx_remove+0x24/0x60 [snd_soc_stm32_spdifrx]
[    5.109494]  stm32_spdifrx_probe+0x320/0x4c4 [snd_soc_stm32_spdifrx]

To avoid this issue, release channel only if the pointer is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50292/">CVE-2024-50292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233481">SUSE bug 1233481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50293</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50293" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50293" ref_url="https://www.suse.com/security/cve/CVE-2024-50293" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: do not leave a dangling sk pointer in __smc_create()

Thanks to commit 4bbd360a5084 ("socket: Print pf-&gt;create() when
it does not clear sock-&gt;sk on failure."), syzbot found an issue with AF_SMC:

smc_create must clear sock-&gt;sk on failure, family: 43, type: 1, protocol: 0
 WARNING: CPU: 0 PID: 5827 at net/socket.c:1565 __sock_create+0x96f/0xa30 net/socket.c:1563
Modules linked in:
CPU: 0 UID: 0 PID: 5827 Comm: syz-executor259 Not tainted 6.12.0-rc6-next-20241106-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:__sock_create+0x96f/0xa30 net/socket.c:1563
Code: 03 00 74 08 4c 89 e7 e8 4f 3b 85 f8 49 8b 34 24 48 c7 c7 40 89 0c 8d 8b 54 24 04 8b 4c 24 0c 44 8b 44 24 08 e8 32 78 db f7 90 &lt;0f&gt; 0b 90 90 e9 d3 fd ff ff 89 e9 80 e1 07 fe c1 38 c1 0f 8c ee f7
RSP: 0018:ffffc90003e4fda0 EFLAGS: 00010246
RAX: 099c6f938c7f4700 RBX: 1ffffffff1a595fd RCX: ffff888034823c00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00000000ffffffe9 R08: ffffffff81567052 R09: 1ffff920007c9f50
R10: dffffc0000000000 R11: fffff520007c9f51 R12: ffffffff8d2cafe8
R13: 1ffffffff1a595fe R14: ffffffff9a789c40 R15: ffff8880764298c0
FS:  000055557b518380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa62ff43225 CR3: 0000000031628000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  sock_create net/socket.c:1616 [inline]
  __sys_socket_create net/socket.c:1653 [inline]
  __sys_socket+0x150/0x3c0 net/socket.c:1700
  __do_sys_socket net/socket.c:1714 [inline]
  __se_sys_socket net/socket.c:1712 [inline]

For reference, see commit 2d859aff775d ("Merge branch
'do-not-leave-dangling-sk-pointers-in-pf-create-functions'")
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50293/">CVE-2024-50293 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50293">CVE-2024-50293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233482">SUSE bug 1233482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50294</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50294" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50294" ref_url="https://www.suse.com/security/cve/CVE-2024-50294" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix missing locking causing hanging calls

If a call gets aborted (e.g. because kafs saw a signal) between it being
queued for connection and the I/O thread picking up the call, the abort
will be prioritised over the connection and it will be removed from
local-&gt;new_client_calls by rxrpc_disconnect_client_call() without a lock
being held.  This may cause other calls on the list to disappear if a race
occurs.

Fix this by taking the client_call_lock when removing a call from whatever
list its -&gt;wait_link happens to be on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50294/">CVE-2024-50294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50294">CVE-2024-50294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233483">SUSE bug 1233483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50295</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50295" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50295" ref_url="https://www.suse.com/security/cve/CVE-2024-50295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: arc: fix the device for dma_map_single/dma_unmap_single

The ndev-&gt;dev and pdev-&gt;dev aren't the same device, use ndev-&gt;dev.parent
which has dma_mask, ndev-&gt;dev.parent is just pdev-&gt;dev.
Or it would cause the following issue:

[   39.933526] ------------[ cut here ]------------
[   39.938414] WARNING: CPU: 1 PID: 501 at kernel/dma/mapping.c:149 dma_map_page_attrs+0x90/0x1f8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50295/">CVE-2024-50295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233484">SUSE bug 1233484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50296</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50296" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50296" ref_url="https://www.suse.com/security/cve/CVE-2024-50296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when uninstalling driver

When the driver is uninstalled and the VF is disabled concurrently, a
kernel crash occurs. The reason is that the two actions call function
pci_disable_sriov(). The num_VFs is checked to determine whether to
release the corresponding resources. During the second calling, num_VFs
is not 0 and the resource release function is called. However, the
corresponding resource has been released during the first invoking.
Therefore, the problem occurs:

[15277.839633][T50670] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
...
[15278.131557][T50670] Call trace:
[15278.134686][T50670]  klist_put+0x28/0x12c
[15278.138682][T50670]  klist_del+0x14/0x20
[15278.142592][T50670]  device_del+0xbc/0x3c0
[15278.146676][T50670]  pci_remove_bus_device+0x84/0x120
[15278.151714][T50670]  pci_stop_and_remove_bus_device+0x6c/0x80
[15278.157447][T50670]  pci_iov_remove_virtfn+0xb4/0x12c
[15278.162485][T50670]  sriov_disable+0x50/0x11c
[15278.166829][T50670]  pci_disable_sriov+0x24/0x30
[15278.171433][T50670]  hnae3_unregister_ae_algo_prepare+0x60/0x90 [hnae3]
[15278.178039][T50670]  hclge_exit+0x28/0xd0 [hclge]
[15278.182730][T50670]  __se_sys_delete_module.isra.0+0x164/0x230
[15278.188550][T50670]  __arm64_sys_delete_module+0x1c/0x30
[15278.193848][T50670]  invoke_syscall+0x50/0x11c
[15278.198278][T50670]  el0_svc_common.constprop.0+0x158/0x164
[15278.203837][T50670]  do_el0_svc+0x34/0xcc
[15278.207834][T50670]  el0_svc+0x20/0x30

For details, see the following figure.

     rmmod hclge              disable VFs
----------------------------------------------------
hclge_exit()            sriov_numvfs_store()
  ...                     device_lock()
  pci_disable_sriov()     hns3_pci_sriov_configure()
                            pci_disable_sriov()
                              sriov_disable()
    sriov_disable()             if !num_VFs :
      if !num_VFs :               return;
        return;                 sriov_del_vfs()
      sriov_del_vfs()             ...
        ...                       klist_put()
        klist_put()               ...
        ...                     num_VFs = 0;
      num_VFs = 0;        device_unlock();

In this patch, when driver is removing, we get the device_lock()
to protect num_VFs, just like sriov_numvfs_store().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50296/">CVE-2024-50296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50296">CVE-2024-50296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233485">SUSE bug 1233485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50297</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50297" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50297" ref_url="https://www.suse.com/security/cve/CVE-2024-50297" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: xilinx: axienet: Enqueue Tx packets in dql before dmaengine starts

Enqueue packets in dql after dma engine starts causes race condition.
Tx transfer starts once dma engine is started and may execute dql dequeue
in completion before it gets queued. It results in following kernel crash
while running iperf stress test:

kernel BUG at lib/dynamic_queue_limits.c:99!
&lt;snip&gt;
Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
pc : dql_completed+0x238/0x248
lr : dql_completed+0x3c/0x248

Call trace:
  dql_completed+0x238/0x248
  axienet_dma_tx_cb+0xa0/0x170
  xilinx_dma_do_tasklet+0xdc/0x290
  tasklet_action_common+0xf8/0x11c
  tasklet_action+0x30/0x3c
  handle_softirqs+0xf8/0x230
&lt;snip&gt;

Start dmaengine after enqueue in dql fixes the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50297/">CVE-2024-50297 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50297">CVE-2024-50297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233486">SUSE bug 1233486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50298</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50298" ref_url="https://www.suse.com/security/cve/CVE-2024-50298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: allocate vf_state during PF probes

In the previous implementation, vf_state is allocated memory only when VF
is enabled. However, net_device_ops::ndo_set_vf_mac() may be called before
VF is enabled to configure the MAC address of VF. If this is the case,
enetc_pf_set_vf_mac() will access vf_state, resulting in access to a null
pointer. The simplified error log is as follows.

root@ls1028ardb:~# ip link set eno0 vf 1 mac 00:0c:e7:66:77:89
[  173.543315] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
[  173.637254] pc : enetc_pf_set_vf_mac+0x3c/0x80 Message from sy
[  173.641973] lr : do_setlink+0x4a8/0xec8
[  173.732292] Call trace:
[  173.734740]  enetc_pf_set_vf_mac+0x3c/0x80
[  173.738847]  __rtnl_newlink+0x530/0x89c
[  173.742692]  rtnl_newlink+0x50/0x7c
[  173.746189]  rtnetlink_rcv_msg+0x128/0x390
[  173.750298]  netlink_rcv_skb+0x60/0x130
[  173.754145]  rtnetlink_rcv+0x18/0x24
[  173.757731]  netlink_unicast+0x318/0x380
[  173.761665]  netlink_sendmsg+0x17c/0x3c8
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50298/">CVE-2024-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233487">SUSE bug 1233487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50299</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50299" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50299" ref_url="https://www.suse.com/security/cve/CVE-2024-50299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: properly validate chunk size in sctp_sf_ootb()

A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add
size validation when walking chunks") is also required in sctp_sf_ootb()
to address a crash reported by syzbot:

  BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712
  sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712
  sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166
  sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407
  sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
  sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243
  sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159
  ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50299/">CVE-2024-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233488">SUSE bug 1233488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50300</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50300" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50300" ref_url="https://www.suse.com/security/cve/CVE-2024-50300" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: rtq2208: Fix uninitialized use of regulator_config

Fix rtq2208 driver uninitialized use to cause kernel error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50300/">CVE-2024-50300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50300">CVE-2024-50300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233489">SUSE bug 1233489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50301</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

security/keys: fix slab-out-of-bounds in key_task_permission

KASAN reports an out of bounds read:
BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36
BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]
BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410
security/keys/permission.c:54
Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362

CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0x107/0x167 lib/dump_stack.c:123
 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 __kuid_val include/linux/uidgid.h:36 [inline]
 uid_eq include/linux/uidgid.h:63 [inline]
 key_task_permission+0x394/0x410 security/keys/permission.c:54
 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793

This issue was also reported by syzbot.

It can be reproduced by following these steps(more details [1]):
1. Obtain more than 32 inputs that have similar hashes, which ends with the
   pattern '0xxxxxxxe6'.
2. Reboot and add the keys obtained in step 1.

The reproducer demonstrates how this issue happened:
1. In the search_nested_keyrings function, when it iterates through the
   slots in a node(below tag ascend_to_node), if the slot pointer is meta
   and node-&gt;back_pointer != NULL(it means a root), it will proceed to
   descend_to_node. However, there is an exception. If node is the root,
   and one of the slots points to a shortcut, it will be treated as a
   keyring.
2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.
   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as
   ASSOC_ARRAY_PTR_SUBTYPE_MASK.
3. When 32 keys with the similar hashes are added to the tree, the ROOT
   has keys with hashes that are not similar (e.g. slot 0) and it splits
   NODE A without using a shortcut. When NODE A is filled with keys that
   all hashes are xxe6, the keys are similar, NODE A will split with a
   shortcut. Finally, it forms the tree as shown below, where slot 6 points
   to a shortcut.

                      NODE A
              +------&gt;+---+
      ROOT    |       | 0 | xxe6
      +---+   |       +---+
 xxxx | 0 | shortcut  :   : xxe6
      +---+   |       +---+
 xxe6 :   :   |       |   | xxe6
      +---+   |       +---+
      | 6 |---+       :   : xxe6
      +---+           +---+
 xxe6 :   :           | f | xxe6
      +---+           +---+
 xxe6 | f |
      +---+

4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,
   it may be mistakenly transferred to a key*, leading to a read
   out-of-bounds read.

To fix this issue, one should jump to descend_to_node if the ptr is a
shortcut, regardless of whether the node is root or not.

[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/

[jarkko: tweaked the commit message a bit to have an appropriate closes
 tag.]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233680">SUSE bug 1233680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50302</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233679">SUSE bug 1233679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50303</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50303" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50303" ref_url="https://www.suse.com/security/cve/CVE-2024-50303" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

resource,kexec: walk_system_ram_res_rev must retain resource flags

walk_system_ram_res_rev() erroneously discards resource flags when passing
the information to the callback.

This causes systems with IORESOURCE_SYSRAM_DRIVER_MANAGED memory to have
these resources selected during kexec to store kexec buffers if that
memory happens to be at placed above normal system ram.

This leads to undefined behavior after reboot.  If the kexec buffer is
never touched, nothing happens.  If the kexec buffer is touched, it could
lead to a crash (like below) or undefined behavior.

Tested on a system with CXL memory expanders with driver managed memory,
TPM enabled, and CONFIG_IMA_KEXEC=y.  Adding printk's showed the flags
were being discarded and as a result the check for
IORESOURCE_SYSRAM_DRIVER_MANAGED passes.

find_next_iomem_res: name(System RAM (kmem))
		     start(10000000000)
		     end(1034fffffff)
		     flags(83000200)

locate_mem_hole_top_down: start(10000000000) end(1034fffffff) flags(0)

[.] BUG: unable to handle page fault for address: ffff89834ffff000
[.] #PF: supervisor read access in kernel mode
[.] #PF: error_code(0x0000) - not-present page
[.] PGD c04c8bf067 P4D c04c8bf067 PUD c04c8be067 PMD 0
[.] Oops: 0000 [#1] SMP
[.] RIP: 0010:ima_restore_measurement_list+0x95/0x4b0
[.] RSP: 0018:ffffc900000d3a80 EFLAGS: 00010286
[.] RAX: 0000000000001000 RBX: 0000000000000000 RCX: ffff89834ffff000
[.] RDX: 0000000000000018 RSI: ffff89834ffff000 RDI: ffff89834ffff018
[.] RBP: ffffc900000d3ba0 R08: 0000000000000020 R09: ffff888132b8a900
[.] R10: 4000000000000000 R11: 000000003a616d69 R12: 0000000000000000
[.] R13: ffffffff8404ac28 R14: 0000000000000000 R15: ffff89834ffff000
[.] FS:  0000000000000000(0000) GS:ffff893d44640000(0000) knlGS:0000000000000000
[.] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[.] ata5: SATA link down (SStatus 0 SControl 300)
[.] CR2: ffff89834ffff000 CR3: 000001034d00f001 CR4: 0000000000770ef0
[.] PKRU: 55555554
[.] Call Trace:
[.]  &lt;TASK&gt;
[.]  ? __die+0x78/0xc0
[.]  ? page_fault_oops+0x2a8/0x3a0
[.]  ? exc_page_fault+0x84/0x130
[.]  ? asm_exc_page_fault+0x22/0x30
[.]  ? ima_restore_measurement_list+0x95/0x4b0
[.]  ? template_desc_init_fields+0x317/0x410
[.]  ? crypto_alloc_tfm_node+0x9c/0xc0
[.]  ? init_ima_lsm+0x30/0x30
[.]  ima_load_kexec_buffer+0x72/0xa0
[.]  ima_init+0x44/0xa0
[.]  __initstub__kmod_ima__373_1201_init_ima7+0x1e/0xb0
[.]  ? init_ima_lsm+0x30/0x30
[.]  do_one_initcall+0xad/0x200
[.]  ? idr_alloc_cyclic+0xaa/0x110
[.]  ? new_slab+0x12c/0x420
[.]  ? new_slab+0x12c/0x420
[.]  ? number+0x12a/0x430
[.]  ? sysvec_apic_timer_interrupt+0xa/0x80
[.]  ? asm_sysvec_apic_timer_interrupt+0x16/0x20
[.]  ? parse_args+0xd4/0x380
[.]  ? parse_args+0x14b/0x380
[.]  kernel_init_freeable+0x1c1/0x2b0
[.]  ? rest_init+0xb0/0xb0
[.]  kernel_init+0x16/0x1a0
[.]  ret_from_fork+0x2f/0x40
[.]  ? rest_init+0xb0/0xb0
[.]  ret_from_fork_asm+0x11/0x20
[.]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50303/">CVE-2024-50303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50303">CVE-2024-50303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233521">SUSE bug 1233521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50304</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50304" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50304" ref_url="https://www.suse.com/security/cve/CVE-2024-50304" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()

The per-netns IP tunnel hash table is protected by the RTNL mutex and
ip_tunnel_find() is only called from the control path where the mutex is
taken.

Add a lockdep expression to hlist_for_each_entry_rcu() in
ip_tunnel_find() in order to validate that the mutex is held and to
silence the suspicious RCU usage warning [1].

[1]
WARNING: suspicious RCU usage
6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted
-----------------------------
net/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
1 lock held by ip/362:
 #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60

stack backtrace:
CPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139
Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xba/0x110
 lockdep_rcu_suspicious.cold+0x4f/0xd6
 ip_tunnel_find+0x435/0x4d0
 ip_tunnel_newlink+0x517/0x7a0
 ipgre_newlink+0x14c/0x170
 __rtnl_newlink+0x1173/0x19c0
 rtnl_newlink+0x6c/0xa0
 rtnetlink_rcv_msg+0x3cc/0xf60
 netlink_rcv_skb+0x171/0x450
 netlink_unicast+0x539/0x7f0
 netlink_sendmsg+0x8c1/0xd80
 ____sys_sendmsg+0x8f9/0xc20
 ___sys_sendmsg+0x197/0x1e0
 __sys_sendmsg+0x122/0x1f0
 do_syscall_64+0xbb/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50304/">CVE-2024-50304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50304">CVE-2024-50304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233522">SUSE bug 1233522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202451729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-51729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-51729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51729" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-51729" ref_url="https://www.suse.com/security/cve/CVE-2024-51729" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51729/">CVE-2024-51729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51729">CVE-2024-51729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235741">SUSE bug 1235741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52319</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52319" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52319" ref_url="https://www.suse.com/security/cve/CVE-2024-52319" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52319/">CVE-2024-52319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52319">CVE-2024-52319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235742">SUSE bug 1235742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52332</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52332" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52332" ref_url="https://www.suse.com/security/cve/CVE-2024-52332" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix potential invalid memory access in igb_init_module()

The pci_register_driver() can fail and when this happened, the dca_notifier
needs to be unregistered, otherwise the dca_notifier can be called when
igb fails to install, resulting to invalid memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52332/">CVE-2024-52332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235700">SUSE bug 1235700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53042</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53042" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53042" ref_url="https://www.suse.com/security/cve/CVE-2024-53042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53042/">CVE-2024-53042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53042">CVE-2024-53042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233540">SUSE bug 1233540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233678">SUSE bug 1233678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53043</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53043" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53043" ref_url="https://www.suse.com/security/cve/CVE-2024-53043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53043/">CVE-2024-53043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53043">CVE-2024-53043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233523">SUSE bug 1233523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53044</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53044" ref_url="https://www.suse.com/security/cve/CVE-2024-53044" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53044/">CVE-2024-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53044">CVE-2024-53044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233722">SUSE bug 1233722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53045</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53045" ref_url="https://www.suse.com/security/cve/CVE-2024-53045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53045/">CVE-2024-53045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53045">CVE-2024-53045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233524">SUSE bug 1233524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53046</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53046" ref_url="https://www.suse.com/security/cve/CVE-2024-53046" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53046/">CVE-2024-53046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53046">CVE-2024-53046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233525">SUSE bug 1233525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53047</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53047" ref_url="https://www.suse.com/security/cve/CVE-2024-53047" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53047/">CVE-2024-53047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53047">CVE-2024-53047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233545">SUSE bug 1233545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53048</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53048" ref_url="https://www.suse.com/security/cve/CVE-2024-53048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53048/">CVE-2024-53048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53048">CVE-2024-53048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233721">SUSE bug 1233721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53049</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53049" ref_url="https://www.suse.com/security/cve/CVE-2024-53049" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53049/">CVE-2024-53049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53049">CVE-2024-53049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233720">SUSE bug 1233720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53050</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53050" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53050" ref_url="https://www.suse.com/security/cve/CVE-2024-53050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53050/">CVE-2024-53050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53050">CVE-2024-53050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233546">SUSE bug 1233546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53051</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53051" ref_url="https://www.suse.com/security/cve/CVE-2024-53051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53051/">CVE-2024-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53051">CVE-2024-53051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233547">SUSE bug 1233547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53052</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233548">SUSE bug 1233548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53053</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53053" ref_url="https://www.suse.com/security/cve/CVE-2024-53053" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53053/">CVE-2024-53053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53053">CVE-2024-53053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233719">SUSE bug 1233719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53055</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53055" ref_url="https://www.suse.com/security/cve/CVE-2024-53055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53055/">CVE-2024-53055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53055">CVE-2024-53055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233550">SUSE bug 1233550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53056</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53056" ref_url="https://www.suse.com/security/cve/CVE-2024-53056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53056/">CVE-2024-53056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53056">CVE-2024-53056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233568">SUSE bug 1233568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53057</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53057" ref_url="https://www.suse.com/security/cve/CVE-2024-53057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53057/">CVE-2024-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233551">SUSE bug 1233551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53058</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53058" ref_url="https://www.suse.com/security/cve/CVE-2024-53058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53058/">CVE-2024-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53058">CVE-2024-53058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233552">SUSE bug 1233552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53059</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233553">SUSE bug 1233553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53060</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported

acpi_evaluate_object() may return AE_NOT_FOUND (failure), which
would result in dereferencing buffer.pointer (obj) while being NULL.

Although this case may be unrealistic for the current code, it is
still better to protect against possible bugs.

Bail out also when status is AE_NOT_FOUND.

This fixes 1 FORWARD_NULL issue reported by Coverity
Report: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)

(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233554">SUSE bug 1233554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53061</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233621">SUSE bug 1233621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53062</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53062" ref_url="https://www.suse.com/security/cve/CVE-2024-53062" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53062/">CVE-2024-53062 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53062">CVE-2024-53062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233556">SUSE bug 1233556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53063</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53063" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233619">SUSE bug 1233619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53064</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53064" ref_url="https://www.suse.com/security/cve/CVE-2024-53064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53064/">CVE-2024-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53064">CVE-2024-53064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233558">SUSE bug 1233558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53065</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53065" ref_url="https://www.suse.com/security/cve/CVE-2024-53065" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53065/">CVE-2024-53065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53065">CVE-2024-53065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233559">SUSE bug 1233559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53066</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53066" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53066" ref_url="https://www.suse.com/security/cve/CVE-2024-53066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53066/">CVE-2024-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233560">SUSE bug 1233560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53067</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53067" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53067" ref_url="https://www.suse.com/security/cve/CVE-2024-53067" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53067/">CVE-2024-53067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53067">CVE-2024-53067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233717">SUSE bug 1233717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53068</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233618">SUSE bug 1233618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53069</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53069" ref_url="https://www.suse.com/security/cve/CVE-2024-53069" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53069/">CVE-2024-53069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53069">CVE-2024-53069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233562">SUSE bug 1233562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53070</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53070" ref_url="https://www.suse.com/security/cve/CVE-2024-53070" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53070/">CVE-2024-53070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233563">SUSE bug 1233563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53071</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53071" ref_url="https://www.suse.com/security/cve/CVE-2024-53071" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53071/">CVE-2024-53071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53071">CVE-2024-53071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233716">SUSE bug 1233716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53072</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53072" ref_url="https://www.suse.com/security/cve/CVE-2024-53072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53072/">CVE-2024-53072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53072">CVE-2024-53072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233564">SUSE bug 1233564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53073</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53073" ref_url="https://www.suse.com/security/cve/CVE-2024-53073" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Never decrement pending_async_copies on error

The error flow in nfsd4_copy() calls cleanup_async_copy(), which
already decrements nn-&gt;pending_async_copies.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53073/">CVE-2024-53073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53073">CVE-2024-53073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233565">SUSE bug 1233565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53074</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53074" ref_url="https://www.suse.com/security/cve/CVE-2024-53074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53074/">CVE-2024-53074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53074">CVE-2024-53074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233566">SUSE bug 1233566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235086">SUSE bug 1235086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53075</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53075" ref_url="https://www.suse.com/security/cve/CVE-2024-53075" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53075/">CVE-2024-53075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53075">CVE-2024-53075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233715">SUSE bug 1233715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53076</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53076" ref_url="https://www.suse.com/security/cve/CVE-2024-53076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: gts-helper: Fix memory leaks for the error path of iio_gts_build_avail_scale_table()

If per_time_scales[i] or per_time_gains[i] kcalloc fails in the for loop
of iio_gts_build_avail_scale_table(), the err_free_out will fail to call
kfree() each time when i is reduced to 0, so all the per_time_scales[0]
and per_time_gains[0] will not be freed, which will cause memory leaks.

Fix it by checking if i &gt;= 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53076/">CVE-2024-53076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53076">CVE-2024-53076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233567">SUSE bug 1233567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53077</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53077" ref_url="https://www.suse.com/security/cve/CVE-2024-53077" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpcrdma: Always release the rpcrdma_device's xa_array

Dai pointed out that the xa_init_flags() in rpcrdma_add_one() needs
to have a matching xa_destroy() in rpcrdma_remove_one() to release
underlying memory that the xarray might have accrued during
operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53077/">CVE-2024-53077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53077">CVE-2024-53077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233714">SUSE bug 1233714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53078</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53078" ref_url="https://www.suse.com/security/cve/CVE-2024-53078" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: Fix NULL vs IS_ERR() check in probe()

The iommu_paging_domain_alloc() function doesn't  return NULL pointers,
it returns error pointers.  Update the check to match.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53078/">CVE-2024-53078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53078">CVE-2024-53078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233569">SUSE bug 1233569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53079</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53079" ref_url="https://www.suse.com/security/cve/CVE-2024-53079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/thp: fix deferred split unqueue naming and locking

Recent changes are putting more pressure on THP deferred split queues:
under load revealing long-standing races, causing list_del corruptions,
"Bad page state"s and worse (I keep BUGs in both of those, so usually
don't get to see how badly they end up without).  The relevant recent
changes being 6.8's mTHP, 6.10's mTHP swapout, and 6.12's mTHP swapin,
improved swap allocation, and underused THP splitting.

Before fixing locking: rename misleading folio_undo_large_rmappable(),
which does not undo large_rmappable, to folio_unqueue_deferred_split(),
which is what it does.  But that and its out-of-line __callee are mm
internals of very limited usability: add comment and WARN_ON_ONCEs to
check usage; and return a bool to say if a deferred split was unqueued,
which can then be used in WARN_ON_ONCEs around safety checks (sparing
callers the arcane conditionals in __folio_unqueue_deferred_split()).

Just omit the folio_unqueue_deferred_split() from free_unref_folios(), all
of whose callers now call it beforehand (and if any forget then bad_page()
will tell) - except for its caller put_pages_list(), which itself no
longer has any callers (and will be deleted separately).

Swapout: mem_cgroup_swapout() has been resetting folio-&gt;memcg_data 0
without checking and unqueueing a THP folio from deferred split list;
which is unfortunate, since the split_queue_lock depends on the memcg
(when memcg is enabled); so swapout has been unqueueing such THPs later,
when freeing the folio, using the pgdat's lock instead: potentially
corrupting the memcg's list.  __remove_mapping() has frozen refcount to 0
here, so no problem with calling folio_unqueue_deferred_split() before
resetting memcg_data.

That goes back to 5.4 commit 87eaceb3faa5 ("mm: thp: make deferred split
shrinker memcg aware"): which included a check on swapcache before adding
to deferred queue, but no check on deferred queue before adding THP to
swapcache.  That worked fine with the usual sequence of events in reclaim
(though there were a couple of rare ways in which a THP on deferred queue
could have been swapped out), but 6.12 commit dafff3f4c850 ("mm: split
underused THPs") avoids splitting underused THPs in reclaim, which makes
swapcache THPs on deferred queue commonplace.

Keep the check on swapcache before adding to deferred queue?  Yes: it is
no longer essential, but preserves the existing behaviour, and is likely
to be a worthwhile optimization (vmstat showed much more traffic on the
queue under swapping load if the check was removed); update its comment.

Memcg-v1 move (deprecated): mem_cgroup_move_account() has been changing
folio-&gt;memcg_data without checking and unqueueing a THP folio from the
deferred list, sometimes corrupting "from" memcg's list, like swapout. 
Refcount is non-zero here, so folio_unqueue_deferred_split() can only be
used in a WARN_ON_ONCE to validate the fix, which must be done earlier:
mem_cgroup_move_charge_pte_range() first try to split the THP (splitting
of course unqueues), or skip it if that fails.  Not ideal, but moving
charge has been requested, and khugepaged should repair the THP later:
nobody wants new custom unqueueing code just for this deprecated case.

The 87eaceb3faa5 commit did have the code to move from one deferred list
to another (but was not conscious of its unsafety while refcount non-0);
but that was removed by 5.6 commit fac0516b5534 ("mm: thp: don't need care
deferred split queue in memcg charge move path"), which argued that the
existence of a PMD mapping guarantees that the THP cannot be on a deferred
list.  As above, false in rare cases, and now commonly false.

Backport to 6.11 should be straightforward.  Earlier backports must take
care that other _deferred_list fixes and dependencies are included.  There
is not a strong case for backports, but they can fix cornercases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-53079/">CVE-2024-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233570">SUSE bug 1233570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53080</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53080" ref_url="https://www.suse.com/security/cve/CVE-2024-53080" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Lock XArray when getting entries for the VM

Similar to commit cac075706f29 ("drm/panthor: Fix race when converting
group handle to group object") we need to use the XArray's internal
locking when retrieving a vm pointer from there.

v2: Removed part of the patch that was trying to protect fetching
the heap pointer from XArray, as that operation is protected by
the @pool-&gt;lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53080/">CVE-2024-53080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53080">CVE-2024-53080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233571">SUSE bug 1233571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53081</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53081" ref_url="https://www.suse.com/security/cve/CVE-2024-53081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ar0521: don't overflow when checking PLL values

The PLL checks are comparing 64 bit integers with 32 bit
ones, as reported by Coverity. Depending on the values of
the variables, this may underflow.

Fix it ensuring that both sides of the expression are u64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53081/">CVE-2024-53081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53081">CVE-2024-53081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233572">SUSE bug 1233572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53082</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53082" ref_url="https://www.suse.com/security/cve/CVE-2024-53082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Add hash_key_length check

Add hash_key_length check in virtnet_probe() to avoid possible out of
bound errors when setting/reading the hash key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53082/">CVE-2024-53082 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53082">CVE-2024-53082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233573">SUSE bug 1233573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233677">SUSE bug 1233677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53083</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53083" ref_url="https://www.suse.com/security/cve/CVE-2024-53083" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: qcom-pmic: init value of hdr_len/txbuf_len earlier

If the read of USB_PDPHY_RX_ACKNOWLEDGE_REG failed, then hdr_len and
txbuf_len are uninitialized. This commit stops to print uninitialized
value and misleading/false data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53083/">CVE-2024-53083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53083">CVE-2024-53083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233574">SUSE bug 1233574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53084</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53084" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53084" ref_url="https://www.suse.com/security/cve/CVE-2024-53084" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imagination: Break an object reference loop

When remaining resources are being cleaned up on driver close,
outstanding VM mappings may result in resources being leaked, due
to an object reference loop, as shown below, with each object (or
set of objects) referencing the object below it:

    PVR GEM Object
    GPU scheduler "finished" fence
    GPU scheduler "scheduled" fence
    PVR driver "done" fence
    PVR Context
    PVR VM Context
    PVR VM Mappings
    PVR GEM Object

The reference that the PVR VM Context has on the VM mappings is a
soft one, in the sense that the freeing of outstanding VM mappings
is done as part of VM context destruction; no reference counts are
involved, as is the case for all the other references in the loop.

To break the reference loop during cleanup, free the outstanding
VM mappings before destroying the PVR Context associated with the
VM context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53084/">CVE-2024-53084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53084">CVE-2024-53084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233575">SUSE bug 1233575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53085</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Lock TPM chip in tpm_pm_suspend() first

Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy
according, as this leaves window for tpm_hwrng_read() to be called while
the operation is in progress. The recent bug report gives also evidence of
this behaviour.

Aadress this by locking the TPM chip before checking any chip-&gt;flags both
in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED
check inside tpm_get_random() so that it will be always checked only when
the lock is reserved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233577">SUSE bug 1233577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53086</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53086" ref_url="https://www.suse.com/security/cve/CVE-2024-53086" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Drop VM dma-resv lock on xe_sync_in_fence_get failure in exec IOCTL

Upon failure all locks need to be dropped before returning to the user.

(cherry picked from commit 7d1a4258e602ffdce529f56686925034c1b3b095)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53086/">CVE-2024-53086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53086">CVE-2024-53086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233713">SUSE bug 1233713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53087</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53087" ref_url="https://www.suse.com/security/cve/CVE-2024-53087" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix possible exec queue leak in exec IOCTL

In a couple of places after an exec queue is looked up the exec IOCTL
returns on input errors without dropping the exec queue ref. Fix this
ensuring the exec queue ref is dropped on input error.

(cherry picked from commit 07064a200b40ac2195cb6b7b779897d9377e5e6f)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53087/">CVE-2024-53087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53087">CVE-2024-53087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233579">SUSE bug 1233579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53088</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0065" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000741.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix race condition by adding filter's intermediate sync state

Fix a race condition in the i40e driver that leads to MAC/VLAN filters
becoming corrupted and leaking. Address the issue that occurs under
heavy load when multiple threads are concurrently modifying MAC/VLAN
filters by setting mac and port VLAN.

1. Thread T0 allocates a filter in i40e_add_filter() within
        i40e_ndo_set_vf_port_vlan().
2. Thread T1 concurrently frees the filter in __i40e_del_filter() within
        i40e_ndo_set_vf_mac().
3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which
        refers to the already freed filter memory, causing corruption.

Reproduction steps:
1. Spawn multiple VFs.
2. Apply a concurrent heavy load by running parallel operations to change
        MAC addresses on the VFs and change port VLANs on the host.
3. Observe errors in dmesg:
"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,
	please set promiscuous on manually for VF XX".

Exact code for stable reproduction Intel can't open-source now.

The fix involves implementing a new intermediate filter state,
I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.
These filters cannot be deleted from the hash list directly but
must be removed using the full process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233580">SUSE bug 1233580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53089</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53089" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53089" ref_url="https://www.suse.com/security/cve/CVE-2024-53089" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: KVM: Mark hrtimer to expire in hard interrupt context

Like commit 2c0d278f3293f ("KVM: LAPIC: Mark hrtimer to expire in hard
interrupt context") and commit 9090825fa9974 ("KVM: arm/arm64: Let the
timer expire in hardirq context on RT"), On PREEMPT_RT enabled kernels
unmarked hrtimers are moved into soft interrupt expiry mode by default.
Then the timers are canceled from an preempt-notifier which is invoked
with disabled preemption which is not allowed on PREEMPT_RT.

The timer callback is short so in could be invoked in hard-IRQ context.
So let the timer expire on hard-IRQ context even on -RT.

This fix a "scheduling while atomic" bug for PREEMPT_RT enabled kernels:

 BUG: scheduling while atomic: qemu-system-loo/1011/0x00000002
 Modules linked in: amdgpu rfkill nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat ns
 CPU: 1 UID: 0 PID: 1011 Comm: qemu-system-loo Tainted: G        W          6.12.0-rc2+ #1774
 Tainted: [W]=WARN
 Hardware name: Loongson Loongson-3A5000-7A1000-1w-CRB/Loongson-LS3A5000-7A1000-1w-CRB, BIOS vUDK2018-LoongArch-V2.0.0-prebeta9 10/21/2022
 Stack : ffffffffffffffff 0000000000000000 9000000004e3ea38 9000000116744000
         90000001167475a0 0000000000000000 90000001167475a8 9000000005644830
         90000000058dc000 90000000058dbff8 9000000116747420 0000000000000001
         0000000000000001 6a613fc938313980 000000000790c000 90000001001c1140
         00000000000003fe 0000000000000001 000000000000000d 0000000000000003
         0000000000000030 00000000000003f3 000000000790c000 9000000116747830
         90000000057ef000 0000000000000000 9000000005644830 0000000000000004
         0000000000000000 90000000057f4b58 0000000000000001 9000000116747868
         900000000451b600 9000000005644830 9000000003a13998 0000000010000020
         00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d
         ...
 Call Trace:
 [&lt;9000000003a13998&gt;] show_stack+0x38/0x180
 [&lt;9000000004e3ea34&gt;] dump_stack_lvl+0x84/0xc0
 [&lt;9000000003a71708&gt;] __schedule_bug+0x48/0x60
 [&lt;9000000004e45734&gt;] __schedule+0x1114/0x1660
 [&lt;9000000004e46040&gt;] schedule_rtlock+0x20/0x60
 [&lt;9000000004e4e330&gt;] rtlock_slowlock_locked+0x3f0/0x10a0
 [&lt;9000000004e4f038&gt;] rt_spin_lock+0x58/0x80
 [&lt;9000000003b02d68&gt;] hrtimer_cancel_wait_running+0x68/0xc0
 [&lt;9000000003b02e30&gt;] hrtimer_cancel+0x70/0x80
 [&lt;ffff80000235eb70&gt;] kvm_restore_timer+0x50/0x1a0 [kvm]
 [&lt;ffff8000023616c8&gt;] kvm_arch_vcpu_load+0x68/0x2a0 [kvm]
 [&lt;ffff80000234c2d4&gt;] kvm_sched_in+0x34/0x60 [kvm]
 [&lt;9000000003a749a0&gt;] finish_task_switch.isra.0+0x140/0x2e0
 [&lt;9000000004e44a70&gt;] __schedule+0x450/0x1660
 [&lt;9000000004e45cb0&gt;] schedule+0x30/0x180
 [&lt;ffff800002354c70&gt;] kvm_vcpu_block+0x70/0x120 [kvm]
 [&lt;ffff800002354d80&gt;] kvm_vcpu_halt+0x60/0x3e0 [kvm]
 [&lt;ffff80000235b194&gt;] kvm_handle_gspr+0x3f4/0x4e0 [kvm]
 [&lt;ffff80000235f548&gt;] kvm_handle_exit+0x1c8/0x260 [kvm]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53089/">CVE-2024-53089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53089">CVE-2024-53089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233636">SUSE bug 1233636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53090</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53090" ref_url="https://www.suse.com/security/cve/CVE-2024-53090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix lock recursion

afs_wake_up_async_call() can incur lock recursion.  The problem is that it
is called from AF_RXRPC whilst holding the -&gt;notify_lock, but it tries to
take a ref on the afs_call struct in order to pass it to a work queue - but
if the afs_call is already queued, we then have an extraneous ref that must
be put... calling afs_put_call() may call back down into AF_RXRPC through
rxrpc_kernel_shutdown_call(), however, which might try taking the
-&gt;notify_lock again.

This case isn't very common, however, so defer it to a workqueue.  The oops
looks something like:

  BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646
   lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0
  CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351
  Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x47/0x70
   do_raw_spin_lock+0x3c/0x90
   rxrpc_kernel_shutdown_call+0x83/0xb0
   afs_put_call+0xd7/0x180
   rxrpc_notify_socket+0xa0/0x190
   rxrpc_input_split_jumbo+0x198/0x1d0
   rxrpc_input_data+0x14b/0x1e0
   ? rxrpc_input_call_packet+0xc2/0x1f0
   rxrpc_input_call_event+0xad/0x6b0
   rxrpc_input_packet_on_conn+0x1e1/0x210
   rxrpc_input_packet+0x3f2/0x4d0
   rxrpc_io_thread+0x243/0x410
   ? __pfx_rxrpc_io_thread+0x10/0x10
   kthread+0xcf/0xe0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x24/0x40
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53090/">CVE-2024-53090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53090">CVE-2024-53090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233637">SUSE bug 1233637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53091</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53091" ref_url="https://www.suse.com/security/cve/CVE-2024-53091" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx

As the introduction of the support for vsock and unix sockets in sockmap,
tls_sw_has_ctx_tx/rx cannot presume the socket passed in must be IS_ICSK.
vsock and af_unix sockets have vsock_sock and unix_sock instead of
inet_connection_sock. For these sockets, tls_get_ctx may return an invalid
pointer and cause page fault in function tls_sw_ctx_rx.

BUG: unable to handle page fault for address: 0000000000040030
Workqueue: vsock-loopback vsock_loopback_work
RIP: 0010:sk_psock_strp_data_ready+0x23/0x60
Call Trace:
 ? __die+0x81/0xc3
 ? no_context+0x194/0x350
 ? do_page_fault+0x30/0x110
 ? async_page_fault+0x3e/0x50
 ? sk_psock_strp_data_ready+0x23/0x60
 virtio_transport_recv_pkt+0x750/0x800
 ? update_load_avg+0x7e/0x620
 vsock_loopback_work+0xd0/0x100
 process_one_work+0x1a7/0x360
 worker_thread+0x30/0x390
 ? create_worker+0x1a0/0x1a0
 kthread+0x112/0x130
 ? __kthread_cancel_work+0x40/0x40
 ret_from_fork+0x1f/0x40

v2:
  - Add IS_ICSK check
v3:
  - Update the commits in Fixes
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53091/">CVE-2024-53091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53091">CVE-2024-53091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233638">SUSE bug 1233638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53092</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53092" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53092" ref_url="https://www.suse.com/security/cve/CVE-2024-53092" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_pci: Fix admin vq cleanup by using correct info pointer

vp_modern_avq_cleanup() and vp_del_vqs() clean up admin vq
resources by virtio_pci_vq_info pointer. The info pointer of admin
vq is stored in vp_dev-&gt;admin_vq.info instead of vp_dev-&gt;vqs[].
Using the info pointer from vp_dev-&gt;vqs[] for admin vq causes a
kernel NULL pointer dereference bug.
In vp_modern_avq_cleanup() and vp_del_vqs(), get the info pointer
from vp_dev-&gt;admin_vq.info for admin vq to clean up the resources.
Also make info ptr as argument of vp_del_vq() to be symmetric with
vp_setup_vq().

vp_reset calls vp_modern_avq_cleanup, and causes the Call Trace:
==================================================================
BUG: kernel NULL pointer dereference, address:0000000000000000
...
CPU: 49 UID: 0 PID: 4439 Comm: modprobe Not tainted 6.11.0-rc5 #1
RIP: 0010:vp_reset+0x57/0x90 [virtio_pci]
Call Trace:
 &lt;TASK&gt;
...
 ? vp_reset+0x57/0x90 [virtio_pci]
 ? vp_reset+0x38/0x90 [virtio_pci]
 virtio_reset_device+0x1d/0x30
 remove_vq_common+0x1c/0x1a0 [virtio_net]
 virtnet_remove+0xa1/0xc0 [virtio_net]
 virtio_dev_remove+0x46/0xa0
...
 virtio_pci_driver_exit+0x14/0x810 [virtio_pci]
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53092/">CVE-2024-53092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53092">CVE-2024-53092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233639">SUSE bug 1233639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53093</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53093" ref_url="https://www.suse.com/security/cve/CVE-2024-53093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-multipath: defer partition scanning

We need to suppress the partition scan from occuring within the
controller's scan_work context. If a path error occurs here, the IO will
wait until a path becomes available or all paths are torn down, but that
action also occurs within scan_work, so it would deadlock. Defer the
partion scan to a different context that does not block scan_work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53093/">CVE-2024-53093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233640">SUSE bug 1233640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53094</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53094" ref_url="https://www.suse.com/security/cve/CVE-2024-53094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Add sendpage_ok() check to disable MSG_SPLICE_PAGES

While running ISER over SIW, the initiator machine encounters a warning
from skb_splice_from_iter() indicating that a slab page is being used in
send_page. To address this, it is better to add a sendpage_ok() check
within the driver itself, and if it returns 0, then MSG_SPLICE_PAGES flag
should be disabled before entering the network stack.

A similar issue has been discussed for NVMe in this thread:
https://lore.kernel.org/all/20240530142417.146696-1-ofir.gal@volumez.com/

  WARNING: CPU: 0 PID: 5342 at net/core/skbuff.c:7140 skb_splice_from_iter+0x173/0x320
  Call Trace:
   tcp_sendmsg_locked+0x368/0xe40
   siw_tx_hdt+0x695/0xa40 [siw]
   siw_qp_sq_process+0x102/0xb00 [siw]
   siw_sq_resume+0x39/0x110 [siw]
   siw_run_sq+0x74/0x160 [siw]
   kthread+0xd2/0x100
   ret_from_fork+0x34/0x40
   ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53094/">CVE-2024-53094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53094">CVE-2024-53094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233641">SUSE bug 1233641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53095</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Fix use-after-free of network namespace.

Recently, we got a customer report that CIFS triggers oops while
reconnecting to a server.  [0]

The workload runs on Kubernetes, and some pods mount CIFS servers
in non-root network namespaces.  The problem rarely happened, but
it was always while the pod was dying.

The root cause is wrong reference counting for network namespace.

CIFS uses kernel sockets, which do not hold refcnt of the netns that
the socket belongs to.  That means CIFS must ensure the socket is
always freed before its netns; otherwise, use-after-free happens.

The repro steps are roughly:

  1. mount CIFS in a non-root netns
  2. drop packets from the netns
  3. destroy the netns
  4. unmount CIFS

We can reproduce the issue quickly with the script [1] below and see
the splat [2] if CONFIG_NET_NS_REFCNT_TRACKER is enabled.

When the socket is TCP, it is hard to guarantee the netns lifetime
without holding refcnt due to async timers.

Let's hold netns refcnt for each socket as done for SMC in commit
9744d2bf1976 ("smc: Fix use-after-free in tcp_write_timer_handler().").

Note that we need to move put_net() from cifs_put_tcp_session() to
clean_demultiplex_info(); otherwise, __sock_create() still could touch a
freed netns while cifsd tries to reconnect from cifs_demultiplex_thread().

Also, maybe_get_net() cannot be put just before __sock_create() because
the code is not under RCU and there is a small chance that the same
address happened to be reallocated to another netns.

[0]:
CIFS: VFS: \\XXXXXXXXXXX has not responded in 15 seconds. Reconnecting...
CIFS: Serverclose failed 4 times, giving up
Unable to handle kernel paging request at virtual address 14de99e461f84a07
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
[14de99e461f84a07] address between user and kernel address ranges
Internal error: Oops: 0000000096000004 [#1] SMP
Modules linked in: cls_bpf sch_ingress nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver tcp_diag inet_diag veth xt_state xt_connmark nf_conntrack_netlink xt_nat xt_statistic xt_MASQUERADE xt_mark xt_addrtype ipt_REJECT nf_reject_ipv4 nft_chain_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment nft_compat nf_tables nfnetlink overlay nls_ascii nls_cp437 sunrpc vfat fat aes_ce_blk aes_ce_cipher ghash_ce sm4_ce_cipher sm4 sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 sha1_ce ena button sch_fq_codel loop fuse configfs dmi_sysfs sha2_ce sha256_arm64 dm_mirror dm_region_hash dm_log dm_mod dax efivarfs
CPU: 5 PID: 2690970 Comm: cifsd Not tainted 6.1.103-109.184.amzn2023.aarch64 #1
Hardware name: Amazon EC2 r7g.4xlarge/, BIOS 1.0 11/1/2018
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : fib_rules_lookup+0x44/0x238
lr : __fib_lookup+0x64/0xbc
sp : ffff8000265db790
x29: ffff8000265db790 x28: 0000000000000000 x27: 000000000000bd01
x26: 0000000000000000 x25: ffff000b4baf8000 x24: ffff00047b5e4580
x23: ffff8000265db7e0 x22: 0000000000000000 x21: ffff00047b5e4500
x20: ffff0010e3f694f8 x19: 14de99e461f849f7 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000000 x12: 3f92800abd010002
x11: 0000000000000001 x10: ffff0010e3f69420 x9 : ffff800008a6f294
x8 : 0000000000000000 x7 : 0000000000000006 x6 : 0000000000000000
x5 : 0000000000000001 x4 : ffff001924354280 x3 : ffff8000265db7e0
x2 : 0000000000000000 x1 : ffff0010e3f694f8 x0 : ffff00047b5e4500
Call trace:
 fib_rules_lookup+0x44/0x238
 __fib_lookup+0x64/0xbc
 ip_route_output_key_hash_rcu+0x2c4/0x398
 ip_route_output_key_hash+0x60/0x8c
 tcp_v4_connect+0x290/0x488
 __inet_stream_connect+0x108/0x3d0
 inet_stream_connect+0x50/0x78
 kernel_connect+0x6c/0xac
 generic_ip_conne
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-24"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233642">SUSE bug 1233642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53096</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53096" ref_url="https://www.suse.com/security/cve/CVE-2024-53096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: resolve faulty mmap_region() error path behaviour

The mmap_region() function is somewhat terrifying, with spaghetti-like
control flow and numerous means by which issues can arise and incomplete
state, memory leaks and other unpleasantness can occur.

A large amount of the complexity arises from trying to handle errors late
in the process of mapping a VMA, which forms the basis of recently
observed issues with resource leaks and observable inconsistent state.

Taking advantage of previous patches in this series we move a number of
checks earlier in the code, simplifying things by moving the core of the
logic into a static internal function __mmap_region().

Doing this allows us to perform a number of checks up front before we do
any real work, and allows us to unwind the writable unmap check
unconditionally as required and to perform a CONFIG_DEBUG_VM_MAPLE_TREE
validation unconditionally also.

We move a number of things here:

1. We preallocate memory for the iterator before we call the file-backed
   memory hook, allowing us to exit early and avoid having to perform
   complicated and error-prone close/free logic. We carefully free
   iterator state on both success and error paths.

2. The enclosing mmap_region() function handles the mapping_map_writable()
   logic early. Previously the logic had the mapping_map_writable() at the
   point of mapping a newly allocated file-backed VMA, and a matching
   mapping_unmap_writable() on success and error paths.

   We now do this unconditionally if this is a file-backed, shared writable
   mapping. If a driver changes the flags to eliminate VM_MAYWRITE, however
   doing so does not invalidate the seal check we just performed, and we in
   any case always decrement the counter in the wrapper.

   We perform a debug assert to ensure a driver does not attempt to do the
   opposite.

3. We also move arch_validate_flags() up into the mmap_region()
   function. This is only relevant on arm64 and sparc64, and the check is
   only meaningful for SPARC with ADI enabled. We explicitly add a warning
   for this arch if a driver invalidates this check, though the code ought
   eventually to be fixed to eliminate the need for this.

With all of these measures in place, we no longer need to explicitly close
the VMA on error paths, as we place all checks which might fail prior to a
call to any driver mmap hook.

This eliminates an entire class of errors, makes the code easier to reason
about and more robust.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53096/">CVE-2024-53096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53096">CVE-2024-53096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233756">SUSE bug 1233756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53097</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53097" ref_url="https://www.suse.com/security/cve/CVE-2024-53097" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: krealloc: Fix MTE false alarm in __do_krealloc

This patch addresses an issue introduced by commit 1a83a716ec233 ("mm:
krealloc: consider spare memory for __GFP_ZERO") which causes MTE
(Memory Tagging Extension) to falsely report a slab-out-of-bounds error.

The problem occurs when zeroing out spare memory in __do_krealloc. The
original code only considered software-based KASAN and did not account
for MTE. It does not reset the KASAN tag before calling memset, leading
to a mismatch between the pointer tag and the memory tag, resulting
in a false positive.

Example of the error:
==================================================================
swapper/0: BUG: KASAN: slab-out-of-bounds in __memset+0x84/0x188
swapper/0: Write at addr f4ffff8005f0fdf0 by task swapper/0/1
swapper/0: Pointer tag: [f4], memory tag: [fe]
swapper/0:
swapper/0: CPU: 4 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.
swapper/0: Hardware name: MT6991(ENG) (DT)
swapper/0: Call trace:
swapper/0:  dump_backtrace+0xfc/0x17c
swapper/0:  show_stack+0x18/0x28
swapper/0:  dump_stack_lvl+0x40/0xa0
swapper/0:  print_report+0x1b8/0x71c
swapper/0:  kasan_report+0xec/0x14c
swapper/0:  __do_kernel_fault+0x60/0x29c
swapper/0:  do_bad_area+0x30/0xdc
swapper/0:  do_tag_check_fault+0x20/0x34
swapper/0:  do_mem_abort+0x58/0x104
swapper/0:  el1_abort+0x3c/0x5c
swapper/0:  el1h_64_sync_handler+0x80/0xcc
swapper/0:  el1h_64_sync+0x68/0x6c
swapper/0:  __memset+0x84/0x188
swapper/0:  btf_populate_kfunc_set+0x280/0x3d8
swapper/0:  __register_btf_kfunc_id_set+0x43c/0x468
swapper/0:  register_btf_kfunc_id_set+0x48/0x60
swapper/0:  register_nf_nat_bpf+0x1c/0x40
swapper/0:  nf_nat_init+0xc0/0x128
swapper/0:  do_one_initcall+0x184/0x464
swapper/0:  do_initcall_level+0xdc/0x1b0
swapper/0:  do_initcalls+0x70/0xc0
swapper/0:  do_basic_setup+0x1c/0x28
swapper/0:  kernel_init_freeable+0x144/0x1b8
swapper/0:  kernel_init+0x20/0x1a8
swapper/0:  ret_from_fork+0x10/0x20
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53097/">CVE-2024-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233757">SUSE bug 1233757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53098</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53098" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53098" ref_url="https://www.suse.com/security/cve/CVE-2024-53098" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/ufence: Prefetch ufence addr to catch bogus address

access_ok() only checks for addr overflow so also try to read the addr
to catch invalid addr sent from userspace.

(cherry picked from commit 9408c4508483ffc60811e910a93d6425b8e63928)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-12-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53098/">CVE-2024-53098 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53098">CVE-2024-53098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233775">SUSE bug 1233775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233776">SUSE bug 1233776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53099</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53099" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53099" ref_url="https://www.suse.com/security/cve/CVE-2024-53099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check validity of link-&gt;type in bpf_link_show_fdinfo()

If a newly-added link type doesn't invoke BPF_LINK_TYPE(), accessing
bpf_link_type_strs[link-&gt;type] may result in an out-of-bounds access.

To spot such missed invocations early in the future, checking the
validity of link-&gt;type in bpf_link_show_fdinfo() and emitting a warning
when such invocations are missed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53099/">CVE-2024-53099 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53099">CVE-2024-53099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233772">SUSE bug 1233772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53100</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53100" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53100" ref_url="https://www.suse.com/security/cve/CVE-2024-53100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: tcp: avoid race between queue_lock lock and destroy

Commit 76d54bf20cdc ("nvme-tcp: don't access released socket during
error recovery") added a mutex_lock() call for the queue-&gt;queue_lock
in nvme_tcp_get_address(). However, the mutex_lock() races with
mutex_destroy() in nvme_tcp_free_queue(), and causes the WARN below.

DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
WARNING: CPU: 3 PID: 34077 at kernel/locking/mutex.c:587 __mutex_lock+0xcf0/0x1220
Modules linked in: nvmet_tcp nvmet nvme_tcp nvme_fabrics iw_cm ib_cm ib_core pktcdvd nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables qrtr sunrpc ppdev 9pnet_virtio 9pnet pcspkr netfs parport_pc parport e1000 i2c_piix4 i2c_smbus loop fuse nfnetlink zram bochs drm_vram_helper drm_ttm_helper ttm drm_kms_helper xfs drm sym53c8xx floppy nvme scsi_transport_spi nvme_core nvme_auth serio_raw ata_generic pata_acpi dm_multipath qemu_fw_cfg [last unloaded: ib_uverbs]
CPU: 3 UID: 0 PID: 34077 Comm: udisksd Not tainted 6.11.0-rc7 #319
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:__mutex_lock+0xcf0/0x1220
Code: 08 84 d2 0f 85 c8 04 00 00 8b 15 ef b6 c8 01 85 d2 0f 85 78 f4 ff ff 48 c7 c6 20 93 ee af 48 c7 c7 60 91 ee af e8 f0 a7 6d fd &lt;0f&gt; 0b e9 5e f4 ff ff 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1
RSP: 0018:ffff88811305f760 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff88812c652058 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
RBP: ffff88811305f8b0 R08: 0000000000000001 R09: ffffed1075c36341
R10: ffff8883ae1b1a0b R11: 0000000000010498 R12: 0000000000000000
R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88812c652058
FS:  00007f9713ae4980(0000) GS:ffff8883ae180000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fcd78483c7c CR3: 0000000122c38000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __warn.cold+0x5b/0x1af
 ? __mutex_lock+0xcf0/0x1220
 ? report_bug+0x1ec/0x390
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x13/0x40
 ? asm_exc_invalid_op+0x16/0x20
 ? __mutex_lock+0xcf0/0x1220
 ? nvme_tcp_get_address+0xc2/0x1e0 [nvme_tcp]
 ? __pfx___mutex_lock+0x10/0x10
 ? __lock_acquire+0xd6a/0x59e0
 ? nvme_tcp_get_address+0xc2/0x1e0 [nvme_tcp]
 nvme_tcp_get_address+0xc2/0x1e0 [nvme_tcp]
 ? __pfx_nvme_tcp_get_address+0x10/0x10 [nvme_tcp]
 nvme_sysfs_show_address+0x81/0xc0 [nvme_core]
 dev_attr_show+0x42/0x80
 ? __asan_memset+0x1f/0x40
 sysfs_kf_seq_show+0x1f0/0x370
 seq_read_iter+0x2cb/0x1130
 ? rw_verify_area+0x3b1/0x590
 ? __mutex_lock+0x433/0x1220
 vfs_read+0x6a6/0xa20
 ? lockdep_hardirqs_on+0x78/0x100
 ? __pfx_vfs_read+0x10/0x10
 ksys_read+0xf7/0x1d0
 ? __pfx_ksys_read+0x10/0x10
 ? __x64_sys_openat+0x105/0x1d0
 do_syscall_64+0x93/0x180
 ? lockdep_hardirqs_on_prepare+0x16d/0x400
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on+0x78/0x100
 ? do_syscall_64+0x9f/0x180
 ? __pfx_ksys_read+0x10/0x10
 ? lockdep_hardirqs_on_prepare+0x16d/0x400
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on+0x78/0x100
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on_prepare+0x16d/0x400
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on+0x78/0x100
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on_prepare+0x16d/0x400
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on+0x78/0x100
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on_prepare+0x16d/0x400
 ? do_syscall_64+0x9f/0x180
 ? lockdep_hardirqs_on+0x78/0x100
 ? do_syscall_64+0x9f/0x180
 ? do_syscall_64+0x9f/0x180
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f9713f55cfa
Code: 55 48 89 e5 48 83 ec 20 48 89 55 e8 48 89 75 f0 89 7d f8 e8 e8 74 f8 ff 48 8b 55 e8 48 8b 75 f0 4
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-12-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53100/">CVE-2024-53100 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53100">CVE-2024-53100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233771">SUSE bug 1233771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53101</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53101" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53101" ref_url="https://www.suse.com/security/cve/CVE-2024-53101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: Fix uninitialized value issue in from_kuid and from_kgid

ocfs2_setattr() uses attr-&gt;ia_mode, attr-&gt;ia_uid and attr-&gt;ia_gid in
a trace point even though ATTR_MODE, ATTR_UID and ATTR_GID aren't set.

Initialize all fields of newattrs to avoid uninitialized variables, by
checking if ATTR_MODE, ATTR_UID, ATTR_GID are initialized, otherwise 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53101/">CVE-2024-53101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53101">CVE-2024-53101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233769">SUSE bug 1233769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53103</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53103" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53103" ref_url="https://www.suse.com/security/cve/CVE-2024-53103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer

When hvs is released, there is a possibility that vsk-&gt;trans may not
be initialized to NULL, which could lead to a dangling pointer.
This issue is resolved by initializing vsk-&gt;trans to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53103/">CVE-2024-53103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234024">SUSE bug 1234024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53104</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53105</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53105" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53105" ref_url="https://www.suse.com/security/cve/CVE-2024-53105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: page_alloc: move mlocked flag clearance into free_pages_prepare()

Syzbot reported a bad page state problem caused by a page being freed
using free_page() still having a mlocked flag at free_pages_prepare()
stage:

  BUG: Bad page state in process syz.5.504  pfn:61f45
  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61f45
  flags: 0xfff00000080204(referenced|workingset|mlocked|node=0|zone=1|lastcpupid=0x7ff)
  raw: 00fff00000080204 0000000000000000 dead000000000122 0000000000000000
  raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
  page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set
  page_owner tracks the page as allocated
  page last allocated via order 0, migratetype Unmovable, gfp_mask 0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), pid 8443, tgid 8442 (syz.5.504), ts 201884660643, free_ts 201499827394
   set_page_owner include/linux/page_owner.h:32 [inline]
   post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1537
   prep_new_page mm/page_alloc.c:1545 [inline]
   get_page_from_freelist+0x303f/0x3190 mm/page_alloc.c:3457
   __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4733
   alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265
   kvm_coalesced_mmio_init+0x1f/0xf0 virt/kvm/coalesced_mmio.c:99
   kvm_create_vm virt/kvm/kvm_main.c:1235 [inline]
   kvm_dev_ioctl_create_vm virt/kvm/kvm_main.c:5488 [inline]
   kvm_dev_ioctl+0x12dc/0x2240 virt/kvm/kvm_main.c:5530
   __do_compat_sys_ioctl fs/ioctl.c:1007 [inline]
   __se_compat_sys_ioctl+0x510/0xc90 fs/ioctl.c:950
   do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
   __do_fast_syscall_32+0xb4/0x110 arch/x86/entry/common.c:386
   do_fast_syscall_32+0x34/0x80 arch/x86/entry/common.c:411
   entry_SYSENTER_compat_after_hwframe+0x84/0x8e
  page last free pid 8399 tgid 8399 stack trace:
   reset_page_owner include/linux/page_owner.h:25 [inline]
   free_pages_prepare mm/page_alloc.c:1108 [inline]
   free_unref_folios+0xf12/0x18d0 mm/page_alloc.c:2686
   folios_put_refs+0x76c/0x860 mm/swap.c:1007
   free_pages_and_swap_cache+0x5c8/0x690 mm/swap_state.c:335
   __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline]
   tlb_batch_pages_flush mm/mmu_gather.c:149 [inline]
   tlb_flush_mmu_free mm/mmu_gather.c:366 [inline]
   tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:373
   tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:465
   exit_mmap+0x496/0xc40 mm/mmap.c:1926
   __mmput+0x115/0x390 kernel/fork.c:1348
   exit_mm+0x220/0x310 kernel/exit.c:571
   do_exit+0x9b2/0x28e0 kernel/exit.c:926
   do_group_exit+0x207/0x2c0 kernel/exit.c:1088
   __do_sys_exit_group kernel/exit.c:1099 [inline]
   __se_sys_exit_group kernel/exit.c:1097 [inline]
   __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097
   x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  Modules linked in:
  CPU: 0 UID: 0 PID: 8442 Comm: syz.5.504 Not tainted 6.12.0-rc6-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
   bad_page+0x176/0x1d0 mm/page_alloc.c:501
   free_page_is_bad mm/page_alloc.c:918 [inline]
   free_pages_prepare mm/page_alloc.c:1100 [inline]
   free_unref_page+0xed0/0xf20 mm/page_alloc.c:2638
   kvm_destroy_vm virt/kvm/kvm_main.c:1327 [inline]
   kvm_put_kvm+0xc75/0x1350 virt/kvm/kvm_main.c:1386
   kvm_vcpu_release+0x54/0x60 virt/kvm/kvm_main.c:4143
   __fput+0x23f/0x880 fs/file_table.c:431
   task_work_run+0x24f/0x310 kernel/task_work.c:239
   exit_task_work include/linux/task_work.h:43 [inline]
   do_exit+0xa2f/0x28e0 kernel/exit.c:939
   do_group_exit+0x207/0x2c0 kernel/exit.c:1088
   __do_sys_exit_group kernel/exit.c:1099 [in
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53105/">CVE-2024-53105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53105">CVE-2024-53105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234069">SUSE bug 1234069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53106</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53106" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53106" ref_url="https://www.suse.com/security/cve/CVE-2024-53106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: fix buffer overrun in ima_eventdigest_init_common

Function ima_eventdigest_init() calls ima_eventdigest_init_common()
with HASH_ALGO__LAST which is then used to access the array
hash_digest_size[] leading to buffer overrun. Have a conditional
statement to handle this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53106/">CVE-2024-53106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53106">CVE-2024-53106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234083">SUSE bug 1234083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53107</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53107" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53107" ref_url="https://www.suse.com/security/cve/CVE-2024-53107" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc/task_mmu: prevent integer overflow in pagemap_scan_get_args()

The "arg-&gt;vec_len" variable is a u64 that comes from the user at the start
of the function.  The "arg-&gt;vec_len * sizeof(struct page_region))"
multiplication can lead to integer wrapping.  Use size_mul() to avoid
that.

Also the size_add/mul() functions work on unsigned long so for 32bit
systems we need to ensure that "arg-&gt;vec_len" fits in an unsigned long.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53107/">CVE-2024-53107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53107">CVE-2024-53107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234080">SUSE bug 1234080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53108</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53108" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53108" ref_url="https://www.suse.com/security/cve/CVE-2024-53108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Adjust VSDB parser for replay feature

At some point, the IEEE ID identification for the replay check in the
AMD EDID was added. However, this check causes the following
out-of-bounds issues when using KASAN:

[   27.804016] BUG: KASAN: slab-out-of-bounds in amdgpu_dm_update_freesync_caps+0xefa/0x17a0 [amdgpu]
[   27.804788] Read of size 1 at addr ffff8881647fdb00 by task systemd-udevd/383

...

[   27.821207] Memory state around the buggy address:
[   27.821215]  ffff8881647fda00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.821224]  ffff8881647fda80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.821234] &gt;ffff8881647fdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.821243]                    ^
[   27.821250]  ffff8881647fdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.821259]  ffff8881647fdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.821268] ==================================================================

This is caused because the ID extraction happens outside of the range of
the edid lenght. This commit addresses this issue by considering the
amd_vsdb_block size.

(cherry picked from commit b7e381b1ccd5e778e3d9c44c669ad38439a861d8)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53108/">CVE-2024-53108 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53108">CVE-2024-53108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234081">SUSE bug 1234081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53109</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53109" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53109" ref_url="https://www.suse.com/security/cve/CVE-2024-53109" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nommu: pass NULL argument to vma_iter_prealloc()

When deleting a vma entry from a maple tree, it has to pass NULL to
vma_iter_prealloc() in order to calculate internal state of the tree, but
it passed a wrong argument.  As a result, nommu kernels crashed upon
accessing a vma iterator, such as acct_collect() reading the size of vma
entries after do_munmap().

This commit fixes this issue by passing a right argument to the
preallocation call.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53109/">CVE-2024-53109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53109">CVE-2024-53109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234084">SUSE bug 1234084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53110</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vp_vdpa: fix id_table array not null terminated error

Allocate one extra virtio_device_id as null terminator, otherwise
vdpa_mgmtdev_get_classes() may iterate multiple times and visit
undefined memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234085">SUSE bug 1234085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53111</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53111" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53111" ref_url="https://www.suse.com/security/cve/CVE-2024-53111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mremap: fix address wraparound in move_page_tables()

On 32-bit platforms, it is possible for the expression `len + old_addr &lt;
old_end` to be false-positive if `len + old_addr` wraps around. 
`old_addr` is the cursor in the old range up to which page table entries
have been moved; so if the operation succeeded, `old_addr` is the *end* of
the old region, and adding `len` to it can wrap.

The overflow causes mremap() to mistakenly believe that PTEs have been
copied; the consequence is that mremap() bails out, but doesn't move the
PTEs back before the new VMA is unmapped, causing anonymous pages in the
region to be lost.  So basically if userspace tries to mremap() a
private-anon region and hits this bug, mremap() will return an error and
the private-anon region's contents appear to have been zeroed.

The idea of this check is that `old_end - len` is the original start
address, and writing the check that way also makes it easier to read; so
fix the check by rearranging the comparison accordingly.

(An alternate fix would be to refactor this function by introducing an
"orig_old_start" variable or such.)


Tested in a VM with a 32-bit X86 kernel; without the patch:

```
user@horn:~/big_mremap$ cat test.c
#define _GNU_SOURCE
#include &lt;stdlib.h&gt;
#include &lt;stdio.h&gt;
#include &lt;err.h&gt;
#include &lt;sys/mman.h&gt;

#define ADDR1 ((void*)0x60000000)
#define ADDR2 ((void*)0x10000000)
#define SIZE          0x50000000uL

int main(void) {
  unsigned char *p1 = mmap(ADDR1, SIZE, PROT_READ|PROT_WRITE,
      MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0);
  if (p1 == MAP_FAILED)
    err(1, "mmap 1");
  unsigned char *p2 = mmap(ADDR2, SIZE, PROT_NONE,
      MAP_ANONYMOUS|MAP_PRIVATE|MAP_FIXED_NOREPLACE, -1, 0);
  if (p2 == MAP_FAILED)
    err(1, "mmap 2");
  *p1 = 0x41;
  printf("first char is 0x%02hhx\n", *p1);
  unsigned char *p3 = mremap(p1, SIZE, SIZE,
      MREMAP_MAYMOVE|MREMAP_FIXED, p2);
  if (p3 == MAP_FAILED) {
    printf("mremap() failed; first char is 0x%02hhx\n", *p1);
  } else {
    printf("mremap() succeeded; first char is 0x%02hhx\n", *p3);
  }
}
user@horn:~/big_mremap$ gcc -static -o test test.c
user@horn:~/big_mremap$ setarch -R ./test
first char is 0x41
mremap() failed; first char is 0x00
```

With the patch:

```
user@horn:~/big_mremap$ setarch -R ./test
first char is 0x41
mremap() succeeded; first char is 0x41
```
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53111/">CVE-2024-53111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53111">CVE-2024-53111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234086">SUSE bug 1234086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53112</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53112" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53112" ref_url="https://www.suse.com/security/cve/CVE-2024-53112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: uncache inode which has failed entering the group

Syzbot has reported the following BUG:

kernel BUG at fs/ocfs2/uptodate.c:509!
...
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x5f/0xb0
 ? die+0x9e/0xc0
 ? do_trap+0x15a/0x3a0
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? do_error_trap+0x1dc/0x2c0
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? __pfx_do_error_trap+0x10/0x10
 ? handle_invalid_op+0x34/0x40
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ? exc_invalid_op+0x38/0x50
 ? asm_exc_invalid_op+0x1a/0x20
 ? ocfs2_set_new_buffer_uptodate+0x2e/0x160
 ? ocfs2_set_new_buffer_uptodate+0x144/0x160
 ? ocfs2_set_new_buffer_uptodate+0x145/0x160
 ocfs2_group_add+0x39f/0x15a0
 ? __pfx_ocfs2_group_add+0x10/0x10
 ? __pfx_lock_acquire+0x10/0x10
 ? mnt_get_write_access+0x68/0x2b0
 ? __pfx_lock_release+0x10/0x10
 ? rcu_read_lock_any_held+0xb7/0x160
 ? __pfx_rcu_read_lock_any_held+0x10/0x10
 ? smack_log+0x123/0x540
 ? mnt_get_write_access+0x68/0x2b0
 ? mnt_get_write_access+0x68/0x2b0
 ? mnt_get_write_access+0x226/0x2b0
 ocfs2_ioctl+0x65e/0x7d0
 ? __pfx_ocfs2_ioctl+0x10/0x10
 ? smack_file_ioctl+0x29e/0x3a0
 ? __pfx_smack_file_ioctl+0x10/0x10
 ? lockdep_hardirqs_on_prepare+0x43d/0x780
 ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
 ? __pfx_ocfs2_ioctl+0x10/0x10
 __se_sys_ioctl+0xfb/0x170
 do_syscall_64+0xf3/0x230
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
 &lt;/TASK&gt;

When 'ioctl(OCFS2_IOC_GROUP_ADD, ...)' has failed for the particular
inode in 'ocfs2_verify_group_and_input()', corresponding buffer head
remains cached and subsequent call to the same 'ioctl()' for the same
inode issues the BUG() in 'ocfs2_set_new_buffer_uptodate()' (trying
to cache the same buffer head of that inode). Fix this by uncaching
the buffer head with 'ocfs2_remove_from_cache()' on error path in
'ocfs2_group_add()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53112/">CVE-2024-53112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53112">CVE-2024-53112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234087">SUSE bug 1234087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53113</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53113" ref_url="https://www.suse.com/security/cve/CVE-2024-53113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix NULL pointer dereference in alloc_pages_bulk_noprof

We triggered a NULL pointer dereference for ac.preferred_zoneref-&gt;zone in
alloc_pages_bulk_noprof() when the task is migrated between cpusets.

When cpuset is enabled, in prepare_alloc_pages(), ac-&gt;nodemask may be
&amp;current-&gt;mems_allowed.  when first_zones_zonelist() is called to find
preferred_zoneref, the ac-&gt;nodemask may be modified concurrently if the
task is migrated between different cpusets.  Assuming we have 2 NUMA Node,
when traversing Node1 in ac-&gt;zonelist, the nodemask is 2, and when
traversing Node2 in ac-&gt;zonelist, the nodemask is 1.  As a result, the
ac-&gt;preferred_zoneref points to NULL zone.

In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a
allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading
to NULL pointer dereference.

__alloc_pages_noprof() fixes this issue by checking NULL pointer in commit
ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and
commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc
fastpath").

To fix it, check NULL pointer for preferred_zoneref-&gt;zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53113/">CVE-2024-53113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53113">CVE-2024-53113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234077">SUSE bug 1234077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53114</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53114" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53114" ref_url="https://www.suse.com/security/cve/CVE-2024-53114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client

A number of Zen4 client SoCs advertise the ability to use virtualized
VMLOAD/VMSAVE, but using these instructions is reported to be a cause
of a random host reboot.

These instructions aren't intended to be advertised on Zen4 client
so clear the capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53114/">CVE-2024-53114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53114">CVE-2024-53114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234072">SUSE bug 1234072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53115</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53115" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53115" ref_url="https://www.suse.com/security/cve/CVE-2024-53115" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: avoid null_ptr_deref in vmw_framebuffer_surface_create_handle

The 'vmw_user_object_buffer' function may return NULL with incorrect
inputs. To avoid possible null pointer dereference, add a check whether
the 'bo' is NULL in the vmw_framebuffer_surface_create_handle.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53115/">CVE-2024-53115 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53115">CVE-2024-53115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234063">SUSE bug 1234063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53116</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53116" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53116" ref_url="https://www.suse.com/security/cve/CVE-2024-53116" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix handling of partial GPU mapping of BOs

This commit fixes the bug in the handling of partial mapping of the
buffer objects to the GPU, which caused kernel warnings.

Panthor didn't correctly handle the case where the partial mapping
spanned multiple scatterlists and the mapping offset didn't point
to the 1st page of starting scatterlist. The offset variable was
not cleared after reaching the starting scatterlist.

Following warning messages were seen.
WARNING: CPU: 1 PID: 650 at drivers/iommu/io-pgtable-arm.c:659 __arm_lpae_unmap+0x254/0x5a0
&lt;snip&gt;
pc : __arm_lpae_unmap+0x254/0x5a0
lr : __arm_lpae_unmap+0x2cc/0x5a0
&lt;snip&gt;
Call trace:
 __arm_lpae_unmap+0x254/0x5a0
 __arm_lpae_unmap+0x108/0x5a0
 __arm_lpae_unmap+0x108/0x5a0
 __arm_lpae_unmap+0x108/0x5a0
 arm_lpae_unmap_pages+0x80/0xa0
 panthor_vm_unmap_pages+0xac/0x1c8 [panthor]
 panthor_gpuva_sm_step_unmap+0x4c/0xc8 [panthor]
 op_unmap_cb.isra.23.constprop.30+0x54/0x80
 __drm_gpuvm_sm_unmap+0x184/0x1c8
 drm_gpuvm_sm_unmap+0x40/0x60
 panthor_vm_exec_op+0xa8/0x120 [panthor]
 panthor_vm_bind_exec_sync_op+0xc4/0xe8 [panthor]
 panthor_ioctl_vm_bind+0x10c/0x170 [panthor]
 drm_ioctl_kernel+0xbc/0x138
 drm_ioctl+0x210/0x4b0
 __arm64_sys_ioctl+0xb0/0xf8
 invoke_syscall+0x4c/0x110
 el0_svc_common.constprop.1+0x98/0xf8
 do_el0_svc+0x24/0x38
 el0_svc+0x34/0xc8
 el0t_64_sync_handler+0xa0/0xc8
 el0t_64_sync+0x174/0x178
&lt;snip&gt;
panthor : [drm] drm_WARN_ON(unmapped_sz != pgsize * pgcount)
WARNING: CPU: 1 PID: 650 at drivers/gpu/drm/panthor/panthor_mmu.c:922 panthor_vm_unmap_pages+0x124/0x1c8 [panthor]
&lt;snip&gt;
pc : panthor_vm_unmap_pages+0x124/0x1c8 [panthor]
lr : panthor_vm_unmap_pages+0x124/0x1c8 [panthor]
&lt;snip&gt;
panthor : [drm] *ERROR* failed to unmap range ffffa388f000-ffffa3890000 (requested range ffffa388c000-ffffa3890000)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53116/">CVE-2024-53116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53116">CVE-2024-53116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234064">SUSE bug 1234064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53117</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53117" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53117" ref_url="https://www.suse.com/security/cve/CVE-2024-53117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Improve MSG_ZEROCOPY error handling

Add a missing kfree_skb() to prevent memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53117/">CVE-2024-53117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53117">CVE-2024-53117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234079">SUSE bug 1234079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53118</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53118" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53118" ref_url="https://www.suse.com/security/cve/CVE-2024-53118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix sk_error_queue memory leak

Kernel queues MSG_ZEROCOPY completion notifications on the error queue.
Where they remain, until explicitly recv()ed. To prevent memory leaks,
clean up the queue when the socket is destroyed.

unreferenced object 0xffff8881028beb00 (size 224):
  comm "vsock_test", pid 1218, jiffies 4294694897
  hex dump (first 32 bytes):
    90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff  ..!.......!.....
    00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff  ..........!.....
  backtrace (crc 6c7031ca):
    [&lt;ffffffff81418ef7&gt;] kmem_cache_alloc_node_noprof+0x2f7/0x370
    [&lt;ffffffff81d35882&gt;] __alloc_skb+0x132/0x180
    [&lt;ffffffff81d2d32b&gt;] sock_omalloc+0x4b/0x80
    [&lt;ffffffff81d3a8ae&gt;] msg_zerocopy_realloc+0x9e/0x240
    [&lt;ffffffff81fe5cb2&gt;] virtio_transport_send_pkt_info+0x412/0x4c0
    [&lt;ffffffff81fe6183&gt;] virtio_transport_stream_enqueue+0x43/0x50
    [&lt;ffffffff81fe0813&gt;] vsock_connectible_sendmsg+0x373/0x450
    [&lt;ffffffff81d233d5&gt;] ____sys_sendmsg+0x365/0x3a0
    [&lt;ffffffff81d246f4&gt;] ___sys_sendmsg+0x84/0xd0
    [&lt;ffffffff81d26f47&gt;] __sys_sendmsg+0x47/0x80
    [&lt;ffffffff820d3df3&gt;] do_syscall_64+0x93/0x180
    [&lt;ffffffff8220012b&gt;] entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53118/">CVE-2024-53118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53118">CVE-2024-53118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234071">SUSE bug 1234071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53119</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53119" ref_url="https://www.suse.com/security/cve/CVE-2024-53119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Fix accept_queue memory leak

As the final stages of socket destruction may be delayed, it is possible
that virtio_transport_recv_listen() will be called after the accept_queue
has been flushed, but before the SOCK_DONE flag has been set. As a result,
sockets enqueued after the flush would remain unremoved, leading to a
memory leak.

vsock_release
  __vsock_release
    lock
    virtio_transport_release
      virtio_transport_close
        schedule_delayed_work(close_work)
    sk_shutdown = SHUTDOWN_MASK
(!) flush accept_queue
    release
                                        virtio_transport_recv_pkt
                                          vsock_find_bound_socket
                                          lock
                                          if flag(SOCK_DONE) return
                                          virtio_transport_recv_listen
                                            child = vsock_create_connected
                                      (!)   vsock_enqueue_accept(child)
                                          release
close_work
  lock
  virtio_transport_do_close
    set_flag(SOCK_DONE)
    virtio_transport_remove_sock
      vsock_remove_sock
        vsock_remove_bound
  release

Introduce a sk_shutdown check to disallow vsock_enqueue_accept() during
socket destruction.

unreferenced object 0xffff888109e3f800 (size 2040):
  comm "kworker/5:2", pid 371, jiffies 4294940105
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    28 00 0b 40 00 00 00 00 00 00 00 00 00 00 00 00  (..@............
  backtrace (crc 9e5f4e84):
    [&lt;ffffffff81418ff1&gt;] kmem_cache_alloc_noprof+0x2c1/0x360
    [&lt;ffffffff81d27aa0&gt;] sk_prot_alloc+0x30/0x120
    [&lt;ffffffff81d2b54c&gt;] sk_alloc+0x2c/0x4b0
    [&lt;ffffffff81fe049a&gt;] __vsock_create.constprop.0+0x2a/0x310
    [&lt;ffffffff81fe6d6c&gt;] virtio_transport_recv_pkt+0x4dc/0x9a0
    [&lt;ffffffff81fe745d&gt;] vsock_loopback_work+0xfd/0x140
    [&lt;ffffffff810fc6ac&gt;] process_one_work+0x20c/0x570
    [&lt;ffffffff810fce3f&gt;] worker_thread+0x1bf/0x3a0
    [&lt;ffffffff811070dd&gt;] kthread+0xdd/0x110
    [&lt;ffffffff81044fdd&gt;] ret_from_fork+0x2d/0x50
    [&lt;ffffffff8100785a&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53119/">CVE-2024-53119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53119">CVE-2024-53119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234073">SUSE bug 1234073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53120</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53120" ref_url="https://www.suse.com/security/cve/CVE-2024-53120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT: Fix null-ptr-deref in add rule err flow

In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add()
callback returns error, zone_rule-&gt;attr is used uninitiated. Fix it to
use attr which has the needed pointer value.

Kernel log:
 BUG: kernel NULL pointer dereference, address: 0000000000000110
 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]
…
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x20/0x70
  ? page_fault_oops+0x150/0x3e0
  ? exc_page_fault+0x74/0x140
  ? asm_exc_page_fault+0x22/0x30
  ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]
  ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core]
  mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core]
  ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]
  nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]
  flow_offload_work_handler+0x142/0x320 [nf_flow_table]
  ? finish_task_switch.isra.0+0x15b/0x2b0
  process_one_work+0x16c/0x320
  worker_thread+0x28c/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xb8/0xf0
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x2d/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53120/">CVE-2024-53120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53120">CVE-2024-53120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234075">SUSE bug 1234075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53121</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53121" ref_url="https://www.suse.com/security/cve/CVE-2024-53121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fs, lock FTE when checking if active

The referenced commits introduced a two-step process for deleting FTEs:

- Lock the FTE, delete it from hardware, set the hardware deletion function
  to NULL and unlock the FTE.
- Lock the parent flow group, delete the software copy of the FTE, and
  remove it from the xarray.

However, this approach encounters a race condition if a rule with the same
match value is added simultaneously. In this scenario, fs_core may set the
hardware deletion function to NULL prematurely, causing a panic during
subsequent rule deletions.

To prevent this, ensure the active flag of the FTE is checked under a lock,
which will prevent the fs_core layer from attaching a new steering rule to
an FTE that is in the process of deletion.

[  438.967589] MOSHE: 2496 mlx5_del_flow_rules del_hw_func
[  438.968205] ------------[ cut here ]------------
[  438.968654] refcount_t: decrement hit 0; leaking memory.
[  438.969249] WARNING: CPU: 0 PID: 8957 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110
[  438.970054] Modules linked in: act_mirred cls_flower act_gact sch_ingress openvswitch nsh mlx5_vdpa vringh vhost_iotlb vdpa mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core zram zsmalloc fuse [last unloaded: cls_flower]
[  438.973288] CPU: 0 UID: 0 PID: 8957 Comm: tc Not tainted 6.12.0-rc1+ #8
[  438.973888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  438.974874] RIP: 0010:refcount_warn_saturate+0xfb/0x110
[  438.975363] Code: 40 66 3b 82 c6 05 16 e9 4d 01 01 e8 1f 7c a0 ff 0f 0b c3 cc cc cc cc 48 c7 c7 10 66 3b 82 c6 05 fd e8 4d 01 01 e8 05 7c a0 ff &lt;0f&gt; 0b c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90
[  438.976947] RSP: 0018:ffff888124a53610 EFLAGS: 00010286
[  438.977446] RAX: 0000000000000000 RBX: ffff888119d56de0 RCX: 0000000000000000
[  438.978090] RDX: ffff88852c828700 RSI: ffff88852c81b3c0 RDI: ffff88852c81b3c0
[  438.978721] RBP: ffff888120fa0e88 R08: 0000000000000000 R09: ffff888124a534b0
[  438.979353] R10: 0000000000000001 R11: 0000000000000001 R12: ffff888119d56de0
[  438.979979] R13: ffff888120fa0ec0 R14: ffff888120fa0ee8 R15: ffff888119d56de0
[  438.980607] FS:  00007fe6dcc0f800(0000) GS:ffff88852c800000(0000) knlGS:0000000000000000
[  438.983984] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  438.984544] CR2: 00000000004275e0 CR3: 0000000186982001 CR4: 0000000000372eb0
[  438.985205] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  438.985842] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  438.986507] Call Trace:
[  438.986799]  &lt;TASK&gt;
[  438.987070]  ? __warn+0x7d/0x110
[  438.987426]  ? refcount_warn_saturate+0xfb/0x110
[  438.987877]  ? report_bug+0x17d/0x190
[  438.988261]  ? prb_read_valid+0x17/0x20
[  438.988659]  ? handle_bug+0x53/0x90
[  438.989054]  ? exc_invalid_op+0x14/0x70
[  438.989458]  ? asm_exc_invalid_op+0x16/0x20
[  438.989883]  ? refcount_warn_saturate+0xfb/0x110
[  438.990348]  mlx5_del_flow_rules+0x2f7/0x340 [mlx5_core]
[  438.990932]  __mlx5_eswitch_del_rule+0x49/0x170 [mlx5_core]
[  438.991519]  ? mlx5_lag_is_sriov+0x3c/0x50 [mlx5_core]
[  438.992054]  ? xas_load+0x9/0xb0
[  438.992407]  mlx5e_tc_rule_unoffload+0x45/0xe0 [mlx5_core]
[  438.993037]  mlx5e_tc_del_fdb_flow+0x2a6/0x2e0 [mlx5_core]
[  438.993623]  mlx5e_flow_put+0x29/0x60 [mlx5_core]
[  438.994161]  mlx5e_delete_flower+0x261/0x390 [mlx5_core]
[  438.994728]  tc_setup_cb_destroy+0xb9/0x190
[  438.995150]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]
[  438.995650]  fl_change+0x11a4/0x13c0 [cls_flower]
[  438.996105]  tc_new_tfilter+0x347/0xbc0
[  438.996503]  ? __
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53121/">CVE-2024-53121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53121">CVE-2024-53121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234078">SUSE bug 1234078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53122</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53122" ref_url="https://www.suse.com/security/cve/CVE-2024-53122" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0065" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: cope racing subflow creation in mptcp_rcv_space_adjust

Additional active subflows - i.e. created by the in kernel path
manager - are included into the subflow list before starting the
3whs.

A racing recvmsg() spooling data received on an already established
subflow would unconditionally call tcp_cleanup_rbuf() on all the
current subflows, potentially hitting a divide by zero error on
the newly created ones.

Explicitly check that the subflow is in a suitable state before
invoking tcp_cleanup_rbuf().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53122/">CVE-2024-53122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234076">SUSE bug 1234076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53123</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53123" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53123" ref_url="https://www.suse.com/security/cve/CVE-2024-53123" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: error out earlier on disconnect

Eric reported a division by zero splat in the MPTCP protocol:

Oops: divide error: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 6094 Comm: syz-executor317 Not tainted
6.12.0-rc5-syzkaller-00291-g05b92660cdfe #0
Hardware name: Google Google Compute Engine/Google Compute Engine,
BIOS Google 09/13/2024
RIP: 0010:__tcp_select_window+0x5b4/0x1310 net/ipv4/tcp_output.c:3163
Code: f6 44 01 e3 89 df e8 9b 75 09 f8 44 39 f3 0f 8d 11 ff ff ff e8
0d 74 09 f8 45 89 f4 e9 04 ff ff ff e8 00 74 09 f8 44 89 f0 99 &lt;f7&gt; 7c
24 14 41 29 d6 45 89 f4 e9 ec fe ff ff e8 e8 73 09 f8 48 89
RSP: 0018:ffffc900041f7930 EFLAGS: 00010293
RAX: 0000000000017e67 RBX: 0000000000017e67 RCX: ffffffff8983314b
RDX: 0000000000000000 RSI: ffffffff898331b0 RDI: 0000000000000004
RBP: 00000000005d6000 R08: 0000000000000004 R09: 0000000000017e67
R10: 0000000000003e80 R11: 0000000000000000 R12: 0000000000003e80
R13: ffff888031d9b440 R14: 0000000000017e67 R15: 00000000002eb000
FS: 00007feb5d7f16c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007feb5d8adbb8 CR3: 0000000074e4c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
__tcp_cleanup_rbuf+0x3e7/0x4b0 net/ipv4/tcp.c:1493
mptcp_rcv_space_adjust net/mptcp/protocol.c:2085 [inline]
mptcp_recvmsg+0x2156/0x2600 net/mptcp/protocol.c:2289
inet_recvmsg+0x469/0x6a0 net/ipv4/af_inet.c:885
sock_recvmsg_nosec net/socket.c:1051 [inline]
sock_recvmsg+0x1b2/0x250 net/socket.c:1073
__sys_recvfrom+0x1a5/0x2e0 net/socket.c:2265
__do_sys_recvfrom net/socket.c:2283 [inline]
__se_sys_recvfrom net/socket.c:2279 [inline]
__x64_sys_recvfrom+0xe0/0x1c0 net/socket.c:2279
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7feb5d857559
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d
01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007feb5d7f1208 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
RAX: ffffffffffffffda RBX: 00007feb5d8e1318 RCX: 00007feb5d857559
RDX: 000000800000000e RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007feb5d8e1310 R08: 0000000000000000 R09: ffffffff81000000
R10: 0000000000000100 R11: 0000000000000246 R12: 00007feb5d8e131c
R13: 00007feb5d8ae074 R14: 000000800000000e R15: 00000000fffffdef

and provided a nice reproducer.

The root cause is the current bad handling of racing disconnect.
After the blamed commit below, sk_wait_data() can return (with
error) with the underlying socket disconnected and a zero rcv_mss.

Catch the error and return without performing any additional
operations on the current socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53123/">CVE-2024-53123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53123">CVE-2024-53123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234070">SUSE bug 1234070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53124</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53124" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53124" ref_url="https://www.suse.com/security/cve/CVE-2024-53124" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix data-races around sk-&gt;sk_forward_alloc

Syzkaller reported this warning:
 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 16 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x1c5/0x1e0
 Modules linked in:
 CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-rc5 #26
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 RIP: 0010:inet_sock_destruct+0x1c5/0x1e0
 Code: 24 12 4c 89 e2 5b 48 c7 c7 98 ec bb 82 41 5c e9 d1 18 17 ff 4c 89 e6 5b 48 c7 c7 d0 ec bb 82 41 5c e9 bf 18 17 ff 0f 0b eb 83 &lt;0f&gt; 0b eb 97 0f 0b eb 87 0f 0b e9 68 ff ff ff 66 66 2e 0f 1f 84 00
 RSP: 0018:ffffc9000008bd90 EFLAGS: 00010206
 RAX: 0000000000000300 RBX: ffff88810b172a90 RCX: 0000000000000007
 RDX: 0000000000000002 RSI: 0000000000000300 RDI: ffff88810b172a00
 RBP: ffff88810b172a00 R08: ffff888104273c00 R09: 0000000000100007
 R10: 0000000000020000 R11: 0000000000000006 R12: ffff88810b172a00
 R13: 0000000000000004 R14: 0000000000000000 R15: ffff888237c31f78
 FS:  0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007ffc63fecac8 CR3: 000000000342e000 CR4: 00000000000006f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0x88/0x130
  ? inet_sock_destruct+0x1c5/0x1e0
  ? report_bug+0x18e/0x1a0
  ? handle_bug+0x53/0x90
  ? exc_invalid_op+0x18/0x70
  ? asm_exc_invalid_op+0x1a/0x20
  ? inet_sock_destruct+0x1c5/0x1e0
  __sk_destruct+0x2a/0x200
  rcu_do_batch+0x1aa/0x530
  ? rcu_do_batch+0x13b/0x530
  rcu_core+0x159/0x2f0
  handle_softirqs+0xd3/0x2b0
  ? __pfx_smpboot_thread_fn+0x10/0x10
  run_ksoftirqd+0x25/0x30
  smpboot_thread_fn+0xdd/0x1d0
  kthread+0xd3/0x100
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x34/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---

Its possible that two threads call tcp_v6_do_rcv()/sk_forward_alloc_add()
concurrently when sk-&gt;sk_state == TCP_LISTEN with sk-&gt;sk_lock unlocked,
which triggers a data-race around sk-&gt;sk_forward_alloc:
tcp_v6_rcv
    tcp_v6_do_rcv
        skb_clone_and_charge_r
            sk_rmem_schedule
                __sk_mem_schedule
                    sk_forward_alloc_add()
            skb_set_owner_r
                sk_mem_charge
                    sk_forward_alloc_add()
        __kfree_skb
            skb_release_all
                skb_release_head_state
                    sock_rfree
                        sk_mem_uncharge
                            sk_forward_alloc_add()
                            sk_mem_reclaim
                                // set local var reclaimable
                                __sk_mem_reclaim
                                    sk_forward_alloc_add()

In this syzkaller testcase, two threads call
tcp_v6_do_rcv() with skb-&gt;truesize=768, the sk_forward_alloc changes like
this:
 (cpu 1)             | (cpu 2)             | sk_forward_alloc
 ...                 | ...                 | 0
 __sk_mem_schedule() |                     | +4096 = 4096
                     | __sk_mem_schedule() | +4096 = 8192
 sk_mem_charge()     |                     | -768  = 7424
                     | sk_mem_charge()     | -768  = 6656
 ...                 |    ...              |
 sk_mem_uncharge()   |                     | +768  = 7424
 reclaimable=7424    |                     |
                     | sk_mem_uncharge()   | +768  = 8192
                     | reclaimable=8192    |
 __sk_mem_reclaim()  |                     | -4096 = 4096
                     | __sk_mem_reclaim()  | -8192 = -4096 != 0

The skb_clone_and_charge_r() should not be called in tcp_v6_do_rcv() when
sk-&gt;sk_state is TCP_LISTEN, it happens later in tcp_v6_syn_recv_sock().
Fix the same issue in dccp_v6_do_rcv().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53124/">CVE-2024-53124 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53124">CVE-2024-53124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234074">SUSE bug 1234074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53125</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53125" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53125" ref_url="https://www.suse.com/security/cve/CVE-2024-53125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: sync_linked_regs() must preserve subreg_def

Range propagation must not affect subreg_def marks, otherwise the
following example is rewritten by verifier incorrectly when
BPF_F_TEST_RND_HI32 flag is set:

  0: call bpf_ktime_get_ns                   call bpf_ktime_get_ns
  1: r0 &amp;= 0x7fffffff       after verifier   r0 &amp;= 0x7fffffff
  2: w1 = w0                rewrites         w1 = w0
  3: if w0 &lt; 10 goto +0     --------------&gt;  r11 = 0x2f5674a6     (r)
  4: r1 &gt;&gt;= 32                               r11 &lt;&lt;= 32           (r)
  5: r0 = r1                                 r1 |= r11            (r)
  6: exit;                                   if w0 &lt; 0xa goto pc+0
                                             r1 &gt;&gt;= 32
                                             r0 = r1
                                             exit

(or zero extension of w1 at (2) is missing for architectures that
 require zero extension for upper register half).

The following happens w/o this patch:
- r0 is marked as not a subreg at (0);
- w1 is marked as subreg at (2);
- w1 subreg_def is overridden at (3) by copy_register_state();
- w1 is read at (5) but mark_insn_zext() does not mark (2)
  for zero extension, because w1 subreg_def is not set;
- because of BPF_F_TEST_RND_HI32 flag verifier inserts random
  value for hi32 bits of (2) (marked (r));
- this random value is read at (5).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53125/">CVE-2024-53125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53125">CVE-2024-53125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234156">SUSE bug 1234156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53126</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53126" ref_url="https://www.suse.com/security/cve/CVE-2024-53126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: solidrun: Fix UB bug with devres

In psnet_open_pf_bar() and snet_open_vf_bar() a string later passed to
pcim_iomap_regions() is placed on the stack. Neither
pcim_iomap_regions() nor the functions it calls copy that string.

Should the string later ever be used, this, consequently, causes
undefined behavior since the stack frame will by then have disappeared.

Fix the bug by allocating the strings on the heap through
devm_kasprintf().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53126/">CVE-2024-53126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53126">CVE-2024-53126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234158">SUSE bug 1234158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53127</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53127" ref_url="https://www.suse.com/security/cve/CVE-2024-53127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K"

The commit 8396c793ffdf ("mmc: dw_mmc: Fix IDMAC operation with pages
bigger than 4K") increased the max_req_size, even for 4K pages, causing
various issues:
- Panic booting the kernel/rootfs from an SD card on Rockchip RK3566
- Panic booting the kernel/rootfs from an SD card on StarFive JH7100
- "swiotlb buffer is full" and data corruption on StarFive JH7110

At this stage no fix have been found, so it's probably better to just
revert the change.

This reverts commit 8396c793ffdf28bb8aee7cfe0891080f8cab7890.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53127/">CVE-2024-53127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53127">CVE-2024-53127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234153">SUSE bug 1234153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53128</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53128" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53128" ref_url="https://www.suse.com/security/cve/CVE-2024-53128" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers

When CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the
object_is_on_stack() function may produce incorrect results due to the
presence of tags in the obj pointer, while the stack pointer does not have
tags.  This discrepancy can lead to incorrect stack object detection and
subsequently trigger warnings if CONFIG_DEBUG_OBJECTS is also enabled.

Example of the warning:

ODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1 at lib/debugobjects.c:557 __debug_object_init+0x330/0x364
Modules linked in:
CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc5 #4
Hardware name: linux,dummy-virt (DT)
pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __debug_object_init+0x330/0x364
lr : __debug_object_init+0x330/0x364
sp : ffff800082ea7b40
x29: ffff800082ea7b40 x28: 98ff0000c0164518 x27: 98ff0000c0164534
x26: ffff800082d93ec8 x25: 0000000000000001 x24: 1cff0000c00172a0
x23: 0000000000000000 x22: ffff800082d93ed0 x21: ffff800081a24418
x20: 3eff800082ea7bb0 x19: efff800000000000 x18: 0000000000000000
x17: 00000000000000ff x16: 0000000000000047 x15: 206b63617473206e
x14: 0000000000000018 x13: ffff800082ea7780 x12: 0ffff800082ea78e
x11: 0ffff800082ea790 x10: 0ffff800082ea79d x9 : 34d77febe173e800
x8 : 34d77febe173e800 x7 : 0000000000000001 x6 : 0000000000000001
x5 : feff800082ea74b8 x4 : ffff800082870a90 x3 : ffff80008018d3c4
x2 : 0000000000000001 x1 : ffff800082858810 x0 : 0000000000000050
Call trace:
 __debug_object_init+0x330/0x364
 debug_object_init_on_stack+0x30/0x3c
 schedule_hrtimeout_range_clock+0xac/0x26c
 schedule_hrtimeout+0x1c/0x30
 wait_task_inactive+0x1d4/0x25c
 kthread_bind_mask+0x28/0x98
 init_rescuer+0x1e8/0x280
 workqueue_init+0x1a0/0x3cc
 kernel_init_freeable+0x118/0x200
 kernel_init+0x28/0x1f0
 ret_from_fork+0x10/0x20
---[ end trace 0000000000000000 ]---
ODEBUG: object 3eff800082ea7bb0 is NOT on stack ffff800082ea0000, but annotated.
------------[ cut here ]------------
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53128/">CVE-2024-53128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53128">CVE-2024-53128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234218">SUSE bug 1234218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53129</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53129" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53129" ref_url="https://www.suse.com/security/cve/CVE-2024-53129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: vop: Fix a dereferenced before check warning

The 'state' can't be NULL, we should check crtc_state.

Fix warning:
drivers/gpu/drm/rockchip/rockchip_drm_vop.c:1096
vop_plane_atomic_async_check() warn: variable dereferenced before check
'state' (see line 1077)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53129/">CVE-2024-53129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53129">CVE-2024-53129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234155">SUSE bug 1234155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53130</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53130" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53130" ref_url="https://www.suse.com/security/cve/CVE-2024-53130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint

When using the "block:block_dirty_buffer" tracepoint, mark_buffer_dirty()
may cause a NULL pointer dereference, or a general protection fault when
KASAN is enabled.

This happens because, since the tracepoint was added in
mark_buffer_dirty(), it references the dev_t member bh-&gt;b_bdev-&gt;bd_dev
regardless of whether the buffer head has a pointer to a block_device
structure.

In the current implementation, nilfs_grab_buffer(), which grabs a buffer
to read (or create) a block of metadata, including b-tree node blocks,
does not set the block device, but instead does so only if the buffer is
not in the "uptodate" state for each of its caller block reading
functions.  However, if the uptodate flag is set on a folio/page, and the
buffer heads are detached from it by try_to_free_buffers(), and new buffer
heads are then attached by create_empty_buffers(), the uptodate flag may
be restored to each buffer without the block device being set to
bh-&gt;b_bdev, and mark_buffer_dirty() may be called later in that state,
resulting in the bug mentioned above.

Fix this issue by making nilfs_grab_buffer() always set the block device
of the super block structure to the buffer head, regardless of the state
of the buffer's uptodate flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53130/">CVE-2024-53130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53130">CVE-2024-53130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234219">SUSE bug 1234219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53131</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53131" ref_url="https://www.suse.com/security/cve/CVE-2024-53131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint

Patch series "nilfs2: fix null-ptr-deref bugs on block tracepoints".

This series fixes null pointer dereference bugs that occur when using
nilfs2 and two block-related tracepoints.


This patch (of 2):

It has been reported that when using "block:block_touch_buffer"
tracepoint, touch_buffer() called from __nilfs_get_folio_block() causes a
NULL pointer dereference, or a general protection fault when KASAN is
enabled.

This happens because since the tracepoint was added in touch_buffer(), it
references the dev_t member bh-&gt;b_bdev-&gt;bd_dev regardless of whether the
buffer head has a pointer to a block_device structure.  In the current
implementation, the block_device structure is set after the function
returns to the caller.

Here, touch_buffer() is used to mark the folio/page that owns the buffer
head as accessed, but the common search helper for folio/page used by the
caller function was optimized to mark the folio/page as accessed when it
was reimplemented a long time ago, eliminating the need to call
touch_buffer() here in the first place.

So this solves the issue by eliminating the touch_buffer() call itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53131/">CVE-2024-53131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53131">CVE-2024-53131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234220">SUSE bug 1234220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53132</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53132" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53132" ref_url="https://www.suse.com/security/cve/CVE-2024-53132" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/oa: Fix "Missing outer runtime PM protection" warning

Fix the following drm_WARN:

[953.586396] xe 0000:00:02.0: [drm] Missing outer runtime PM protection
...
&lt;4&gt; [953.587090]  ? xe_pm_runtime_get_noresume+0x8d/0xa0 [xe]
&lt;4&gt; [953.587208]  guc_exec_queue_add_msg+0x28/0x130 [xe]
&lt;4&gt; [953.587319]  guc_exec_queue_fini+0x3a/0x40 [xe]
&lt;4&gt; [953.587425]  xe_exec_queue_destroy+0xb3/0xf0 [xe]
&lt;4&gt; [953.587515]  xe_oa_release+0x9c/0xc0 [xe]

(cherry picked from commit b107c63d2953907908fd0cafb0e543b3c3167b75)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53132/">CVE-2024-53132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53132">CVE-2024-53132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234151">SUSE bug 1234151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53133</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53133" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53133" ref_url="https://www.suse.com/security/cve/CVE-2024-53133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Handle dml allocation failure to avoid crash

[Why]
In the case where a dml allocation fails for any reason, the
current state's dml contexts would no longer be valid. Then
subsequent calls dc_state_copy_internal would shallow copy
invalid memory and if the new state was released, a double
free would occur.

[How]
Reset dml pointers in new_state to NULL and avoid invalid
pointer

(cherry picked from commit bcafdc61529a48f6f06355d78eb41b3aeda5296c)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53133/">CVE-2024-53133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53133">CVE-2024-53133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234221">SUSE bug 1234221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53134</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53134" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53134" ref_url="https://www.suse.com/security/cve/CVE-2024-53134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx93-blk-ctrl: correct remove path

The check condition should be 'i &lt; bc-&gt;onecell_data.num_domains', not
'bc-&gt;onecell_data.num_domains' which will make the look never finish
and cause kernel panic.

Also disable runtime to address
"imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53134/">CVE-2024-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53134">CVE-2024-53134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234159">SUSE bug 1234159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53135</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53135" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53135" ref_url="https://www.suse.com/security/cve/CVE-2024-53135" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN

Hide KVM's pt_mode module param behind CONFIG_BROKEN, i.e. disable support
for virtualizing Intel PT via guest/host mode unless BROKEN=y.  There are
myriad bugs in the implementation, some of which are fatal to the guest,
and others which put the stability and health of the host at risk.

For guest fatalities, the most glaring issue is that KVM fails to ensure
tracing is disabled, and *stays* disabled prior to VM-Enter, which is
necessary as hardware disallows loading (the guest's) RTIT_CTL if tracing
is enabled (enforced via a VMX consistency check).  Per the SDM:

  If the logical processor is operating with Intel PT enabled (if
  IA32_RTIT_CTL.TraceEn = 1) at the time of VM entry, the "load
  IA32_RTIT_CTL" VM-entry control must be 0.

On the host side, KVM doesn't validate the guest CPUID configuration
provided by userspace, and even worse, uses the guest configuration to
decide what MSRs to save/load at VM-Enter and VM-Exit.  E.g. configuring
guest CPUID to enumerate more address ranges than are supported in hardware
will result in KVM trying to passthrough, save, and load non-existent MSRs,
which generates a variety of WARNs, ToPA ERRORs in the host, a potential
deadlock, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53135/">CVE-2024-53135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234154">SUSE bug 1234154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53136</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53136" ref_url="https://www.suse.com/security/cve/CVE-2024-53136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: revert "mm: shmem: fix data-race in shmem_getattr()"

Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1].  It is causing deadlocks when accessing tmpfs over
NFS.

As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem".
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53136/">CVE-2024-53136 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53136">CVE-2024-53136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234161">SUSE bug 1234161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53137</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53137" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53137" ref_url="https://www.suse.com/security/cve/CVE-2024-53137" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: fix cacheflush with PAN

It seems that the cacheflush syscall got broken when PAN for LPAE was
implemented. User access was not enabled around the cache maintenance
instructions, causing them to fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53137/">CVE-2024-53137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53137">CVE-2024-53137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234152">SUSE bug 1234152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53138</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53138" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53138" ref_url="https://www.suse.com/security/cve/CVE-2024-53138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: kTLS, Fix incorrect page refcounting

The kTLS tx handling code is using a mix of get_page() and
page_ref_inc() APIs to increment the page reference. But on the release
path (mlx5e_ktls_tx_handle_resync_dump_comp()), only put_page() is used.

This is an issue when using pages from large folios: the get_page()
references are stored on the folio page while the page_ref_inc()
references are stored directly in the given page. On release the folio
page will be dereferenced too many times.

This was found while doing kTLS testing with sendfile() + ZC when the
served file was read from NFS on a kernel with NFS large folios support
(commit 49b29a573da8 ("nfs: add support for large folios")).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53138/">CVE-2024-53138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53138">CVE-2024-53138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234223">SUSE bug 1234223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53139</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53139" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53139" ref_url="https://www.suse.com/security/cve/CVE-2024-53139" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: fix possible UAF in sctp_v6_available()

A lockdep report [1] with CONFIG_PROVE_RCU_LIST=y hints
that sctp_v6_available() is calling dev_get_by_index_rcu()
and ipv6_chk_addr() without holding rcu.

[1]
 =============================
 WARNING: suspicious RCU usage
 6.12.0-rc5-virtme #1216 Tainted: G        W
 -----------------------------
 net/core/dev.c:876 RCU-list traversed in non-reader section!!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
 1 lock held by sctp_hello/31495:
 #0: ffff9f1ebbdb7418 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sctp_bind (./arch/x86/include/asm/jump_label.h:27 net/sctp/socket.c:315) sctp

stack backtrace:
 CPU: 7 UID: 0 PID: 31495 Comm: sctp_hello Tainted: G        W          6.12.0-rc5-virtme #1216
 Tainted: [W]=WARN
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 Call Trace:
  &lt;TASK&gt;
 dump_stack_lvl (lib/dump_stack.c:123)
 lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822)
 dev_get_by_index_rcu (net/core/dev.c:876 (discriminator 7))
 sctp_v6_available (net/sctp/ipv6.c:701) sctp
 sctp_do_bind (net/sctp/socket.c:400 (discriminator 1)) sctp
 sctp_bind (net/sctp/socket.c:320) sctp
 inet6_bind_sk (net/ipv6/af_inet6.c:465)
 ? security_socket_bind (security/security.c:4581 (discriminator 1))
 __sys_bind (net/socket.c:1848 net/socket.c:1869)
 ? do_user_addr_fault (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340)
 ? do_user_addr_fault (./arch/x86/include/asm/preempt.h:84 (discriminator 13) ./include/linux/rcupdate.h:98 (discriminator 13) ./include/linux/rcupdate.h:882 (discriminator 13) ./include/linux/mm.h:729 (discriminator 13) arch/x86/mm/fault.c:1340 (discriminator 13))
 __x64_sys_bind (net/socket.c:1877 (discriminator 1) net/socket.c:1875 (discriminator 1) net/socket.c:1875 (discriminator 1))
 do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1) arch/x86/entry/common.c:83 (discriminator 1))
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
 RIP: 0033:0x7f59b934a1e7
 Code: 44 00 00 48 8b 15 39 8c 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bd 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b8 31 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 09 8c 0c 00 f7 d8 64 89 01 48
All code
========
   0:	44 00 00             	add    %r8b,(%rax)
   3:	48 8b 15 39 8c 0c 00 	mov    0xc8c39(%rip),%rdx        # 0xc8c43
   a:	f7 d8                	neg    %eax
   c:	64 89 02             	mov    %eax,%fs:(%rdx)
   f:	b8 ff ff ff ff       	mov    $0xffffffff,%eax
  14:	eb bd                	jmp    0xffffffffffffffd3
  16:	66 2e 0f 1f 84 00 00 	cs nopw 0x0(%rax,%rax,1)
  1d:	00 00 00
  20:	0f 1f 00             	nopl   (%rax)
  23:	b8 31 00 00 00       	mov    $0x31,%eax
  28:	0f 05                	syscall
  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		&lt;-- trapping instruction
  30:	73 01                	jae    0x33
  32:	c3                   	ret
  33:	48 8b 0d 09 8c 0c 00 	mov    0xc8c09(%rip),%rcx        # 0xc8c43
  3a:	f7 d8                	neg    %eax
  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
   6:	73 01                	jae    0x9
   8:	c3                   	ret
   9:	48 8b 0d 09 8c 0c 00 	mov    0xc8c09(%rip),%rcx        # 0xc8c19
  10:	f7 d8                	neg    %eax
  12:	64 89 01             	mov    %eax,%fs:(%rcx)
  15:	48                   	rex.W
 RSP: 002b:00007ffe2d0ad398 EFLAGS: 00000202 ORIG_RAX: 0000000000000031
 RAX: ffffffffffffffda RBX: 00007ffe2d0ad3d0 RCX: 00007f59b934a1e7
 RDX: 000000000000001c RSI: 00007ffe2d0ad3d0 RDI: 0000000000000005
 RBP: 0000000000000005 R08: 1999999999999999 R09: 0000000000000000
 R10: 00007f59b9253298 R11: 000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53139/">CVE-2024-53139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53139">CVE-2024-53139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234157">SUSE bug 1234157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53140</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53140" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53140" ref_url="https://www.suse.com/security/cve/CVE-2024-53140" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: terminate outstanding dump on socket close

Netlink supports iterative dumping of data. It provides the families
the following ops:
 - start - (optional) kicks off the dumping process
 - dump  - actual dump helper, keeps getting called until it returns 0
 - done  - (optional) pairs with .start, can be used for cleanup
The whole process is asynchronous and the repeated calls to .dump
don't actually happen in a tight loop, but rather are triggered
in response to recvmsg() on the socket.

This gives the user full control over the dump, but also means that
the user can close the socket without getting to the end of the dump.
To make sure .start is always paired with .done we check if there
is an ongoing dump before freeing the socket, and if so call .done.

The complication is that sockets can get freed from BH and .done
is allowed to sleep. So we use a workqueue to defer the call, when
needed.

Unfortunately this does not work correctly. What we defer is not
the cleanup but rather releasing a reference on the socket.
We have no guarantee that we own the last reference, if someone
else holds the socket they may release it in BH and we're back
to square one.

The whole dance, however, appears to be unnecessary. Only the user
can interact with dumps, so we can clean up when socket is closed.
And close always happens in process context. Some async code may
still access the socket after close, queue notification skbs to it etc.
but no dumps can start, end or otherwise make progress.

Delete the workqueue and flush the dump state directly from the release
handler. Note that further cleanup is possible in -next, for instance
we now always call .done before releasing the main module reference,
so dump doesn't have to take a reference of its own.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-06"/>
	<updated date="2024-12-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53140/">CVE-2024-53140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53140">CVE-2024-53140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234222">SUSE bug 1234222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53141</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add missing range check in bitmap_ip_uadt

When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,
the values of ip and ip_to are slightly swapped. Therefore, the range check
for ip should be done later, but this part is missing and it seems that the
vulnerability occurs.

So we should add missing range checks and remove unnecessary range checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234381">SUSE bug 1234381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53143</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53143" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53143" ref_url="https://www.suse.com/security/cve/CVE-2024-53143" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsnotify: Fix ordering of iput() and watched_objects decrement

Ensure the superblock is kept alive until we're done with iput().
Holding a reference to an inode is not allowed unless we ensure the
superblock stays alive, which fsnotify does by keeping the
watched_objects count elevated, so iput() must happen before the
watched_objects decrement.
This can lead to a UAF of something like sb-&gt;s_fs_info in tmpfs, but the
UAF is hard to hit because race orderings that oops are more likely, thanks
to the CHECK_DATA_CORRUPTION() block in generic_shutdown_super().

Also, ensure that fsnotify_put_sb_watched_objects() doesn't call
fsnotify_sb_watched_objects() on a superblock that may have already been
freed, which would cause a UAF read of sb-&gt;s_fsnotify_info.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-10"/>
	<updated date="2024-12-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53143/">CVE-2024-53143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53143">CVE-2024-53143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234316">SUSE bug 1234316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53144</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53144" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53144" ref_url="https://www.suse.com/security/cve/CVE-2024-53144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE

This aligned BR/EDR JUST_WORKS method with LE which since 92516cd97fd4
("Bluetooth: Always request for user confirmation for Just Works")
always request user confirmation with confirm_hint set since the
likes of bluetoothd have dedicated policy around JUST_WORKS method
(e.g. main.conf:JustWorksRepairing).

CVE: CVE-2024-8805
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53144/">CVE-2024-53144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53144">CVE-2024-53144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234690">SUSE bug 1234690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53145</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53145" ref_url="https://www.suse.com/security/cve/CVE-2024-53145" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: Fix potential integer overflow during physmem setup

This issue happens when the real map size is greater than LONG_MAX,
which can be easily triggered on UML/i386.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53145/">CVE-2024-53145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53145">CVE-2024-53145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234831">SUSE bug 1234831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53146</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent a potential integer overflow

If the tag length is &gt;= U32_MAX - 3 then the "length + 4" addition
can result in an integer overflow. Address this by splitting the
decoding into several steps so that decode_cb_compound4res() does
not have to perform arithmetic on the unsafe length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234854">SUSE bug 1234854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53147</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53147" ref_url="https://www.suse.com/security/cve/CVE-2024-53147" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix out-of-bounds access of directory entries

In the case of the directory size is greater than or equal to
the cluster size, if start_clu becomes an EOF cluster(an invalid
cluster) due to file system corruption, then the directory entry
where ei-&gt;hint_femp.eidx hint is outside the directory, resulting
in an out-of-bounds access, which may cause further file system
corruption.

This commit adds a check for start_clu, if it is an invalid cluster,
the file or directory will be treated as empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2024-12-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53147/">CVE-2024-53147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53147">CVE-2024-53147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234857">SUSE bug 1234857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53148</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53148" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53148" ref_url="https://www.suse.com/security/cve/CVE-2024-53148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Flush partial mappings in error case

If some remap_pfn_range() calls succeeded before one failed, we still have
buffer pages mapped into the userspace page tables when we drop the buffer
reference with comedi_buf_map_put(bm). The userspace mappings are only
cleaned up later in the mmap error path.

Fix it by explicitly flushing all mappings in our VMA on the error path.

See commit 79a61cc3fc04 ("mm: avoid leaving partial pfn mappings around in
error case").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53148/">CVE-2024-53148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53148">CVE-2024-53148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234832">SUSE bug 1234832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234833">SUSE bug 1234833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53149</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53149" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53149" ref_url="https://www.suse.com/security/cve/CVE-2024-53149" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: glink: fix off-by-one in connector_status

UCSI connector's indices start from 1 up to 3, PMIC_GLINK_MAX_PORTS.
Correct the condition in the pmic_glink_ucsi_connector_status()
callback, fixing Type-C orientation reporting for the third USB-C
connector.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-09"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53149/">CVE-2024-53149 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53149">CVE-2024-53149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234842">SUSE bug 1234842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53150</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out of bounds reads when finding clock sources

The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors.  That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.

For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal.  When the descriptor
length is shorter than expected, it's skipped in the loop.

For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234834">SUSE bug 1234834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53151</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53151" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53151" ref_url="https://www.suse.com/security/cve/CVE-2024-53151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

svcrdma: Address an integer overflow

Dan Carpenter reports:
&gt; Commit 78147ca8b4a9 ("svcrdma: Add a "parsed chunk list" data
&gt; structure") from Jun 22, 2020 (linux-next), leads to the following
&gt; Smatch static checker warning:
&gt;
&gt;	net/sunrpc/xprtrdma/svc_rdma_recvfrom.c:498 xdr_check_write_chunk()
&gt;	warn: potential user controlled sizeof overflow 'segcount * 4 * 4'
&gt;
&gt; net/sunrpc/xprtrdma/svc_rdma_recvfrom.c
&gt;     488 static bool xdr_check_write_chunk(struct svc_rdma_recv_ctxt *rctxt)
&gt;     489 {
&gt;     490         u32 segcount;
&gt;     491         __be32 *p;
&gt;     492
&gt;     493         if (xdr_stream_decode_u32(&amp;rctxt-&gt;rc_stream, &amp;segcount))
&gt;                                                               ^^^^^^^^
&gt;
&gt;     494                 return false;
&gt;     495
&gt;     496         /* A bogus segcount causes this buffer overflow check to fail. */
&gt;     497         p = xdr_inline_decode(&amp;rctxt-&gt;rc_stream,
&gt; --&gt; 498                               segcount * rpcrdma_segment_maxsz * sizeof(*p));
&gt;
&gt;
&gt; segcount is an untrusted u32.  On 32bit systems anything &gt;= SIZE_MAX / 16 will
&gt; have an integer overflow and some those values will be accepted by
&gt; xdr_inline_decode().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53151/">CVE-2024-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53151">CVE-2024-53151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234829">SUSE bug 1234829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53152</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53152" ref_url="https://www.suse.com/security/cve/CVE-2024-53152" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert()

Currently, the endpoint cleanup function dw_pcie_ep_cleanup() and EPF
deinit notify function pci_epc_deinit_notify() are called during the
execution of pex_ep_event_pex_rst_assert() i.e., when the host has asserted
PERST#. But quickly after this step, refclk will also be disabled by the
host.

All of the tegra194 endpoint SoCs supported as of now depend on the refclk
from the host for keeping the controller operational. Due to this
limitation, any access to the hardware registers in the absence of refclk
will result in a whole endpoint crash. Unfortunately, most of the
controller cleanups require accessing the hardware registers (like eDMA
cleanup performed in dw_pcie_ep_cleanup(), etc...). So these cleanup
functions can cause the crash in the endpoint SoC once host asserts PERST#.

One way to address this issue is by generating the refclk in the endpoint
itself and not depending on the host. But that is not always possible as
some of the endpoint designs do require the endpoint to consume refclk from
the host.

Thus, fix this crash by moving the controller cleanups to the start of
the pex_ep_event_pex_rst_deassert() function. This function is called
whenever the host has deasserted PERST# and it is guaranteed that the
refclk would be active at this point. So at the start of this function
(after enabling resources) the controller cleanup can be performed. Once
finished, rest of the code execution for PERST# deassert can continue as
usual.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53152/">CVE-2024-53152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53152">CVE-2024-53152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234841">SUSE bug 1234841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53153</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53153" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53153" ref_url="https://www.suse.com/security/cve/CVE-2024-53153" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: qcom-ep: Move controller cleanups to qcom_pcie_perst_deassert()

Currently, the endpoint cleanup function dw_pcie_ep_cleanup() and EPF
deinit notify function pci_epc_deinit_notify() are called during the
execution of qcom_pcie_perst_assert() i.e., when the host has asserted
PERST#. But quickly after this step, refclk will also be disabled by the
host.

All of the Qcom endpoint SoCs supported as of now depend on the refclk from
the host for keeping the controller operational. Due to this limitation,
any access to the hardware registers in the absence of refclk will result
in a whole endpoint crash. Unfortunately, most of the controller cleanups
require accessing the hardware registers (like eDMA cleanup performed in
dw_pcie_ep_cleanup(), powering down MHI EPF etc...). So these cleanup
functions are currently causing the crash in the endpoint SoC once host
asserts PERST#.

One way to address this issue is by generating the refclk in the endpoint
itself and not depending on the host. But that is not always possible as
some of the endpoint designs do require the endpoint to consume refclk from
the host (as I was told by the Qcom engineers).

Thus, fix this crash by moving the controller cleanups to the start of
the qcom_pcie_perst_deassert() function. qcom_pcie_perst_deassert() is
called whenever the host has deasserted PERST# and it is guaranteed that
the refclk would be active at this point. So at the start of this function
(after enabling resources), the controller cleanup can be performed. Once
finished, rest of the code execution for PERST# deassert can continue as
usual.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53153/">CVE-2024-53153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53153">CVE-2024-53153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234830">SUSE bug 1234830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53154</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53154" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53154" ref_url="https://www.suse.com/security/cve/CVE-2024-53154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: clk-apple-nco: Add NULL check in applnco_probe

Add NULL check in applnco_probe, to handle kernel NULL pointer
dereference error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53154/">CVE-2024-53154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53154">CVE-2024-53154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234826">SUSE bug 1234826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53155</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53155" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53155" ref_url="https://www.suse.com/security/cve/CVE-2024-53155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix uninitialized value in ocfs2_file_read_iter()

Syzbot has reported the following KMSAN splat:

BUG: KMSAN: uninit-value in ocfs2_file_read_iter+0x9a4/0xf80
 ocfs2_file_read_iter+0x9a4/0xf80
 __io_read+0x8d4/0x20f0
 io_read+0x3e/0xf0
 io_issue_sqe+0x42b/0x22c0
 io_wq_submit_work+0xaf9/0xdc0
 io_worker_handle_work+0xd13/0x2110
 io_wq_worker+0x447/0x1410
 ret_from_fork+0x6f/0x90
 ret_from_fork_asm+0x1a/0x30

Uninit was created at:
 __alloc_pages_noprof+0x9a7/0xe00
 alloc_pages_mpol_noprof+0x299/0x990
 alloc_pages_noprof+0x1bf/0x1e0
 allocate_slab+0x33a/0x1250
 ___slab_alloc+0x12ef/0x35e0
 kmem_cache_alloc_bulk_noprof+0x486/0x1330
 __io_alloc_req_refill+0x84/0x560
 io_submit_sqes+0x172f/0x2f30
 __se_sys_io_uring_enter+0x406/0x41c0
 __x64_sys_io_uring_enter+0x11f/0x1a0
 x64_sys_call+0x2b54/0x3ba0
 do_syscall_64+0xcd/0x1e0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Since an instance of 'struct kiocb' may be passed from the block layer
with 'private' field uninitialized, introduce 'ocfs2_iocb_init_rw_locked()'
and use it from where 'ocfs2_dio_end_io()' might take care, i.e. in
'ocfs2_file_read_iter()' and 'ocfs2_file_write_iter()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53155/">CVE-2024-53155 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53155">CVE-2024-53155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234855">SUSE bug 1234855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53156</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()

I found the following bug in my fuzzer:

  UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51
  index 255 is out of range for type 'htc_endpoint [22]'
  CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  Workqueue: events request_firmware_work_func
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x180/0x1b0
   __ubsan_handle_out_of_bounds+0xd4/0x130
   htc_issue_send.constprop.0+0x20c/0x230
   ? _raw_spin_unlock_irqrestore+0x3c/0x70
   ath9k_wmi_cmd+0x41d/0x610
   ? mark_held_locks+0x9f/0xe0
   ...

Since this bug has been confirmed to be caused by insufficient verification
of conn_rsp_epid, I think it would be appropriate to add a range check for
conn_rsp_epid to htc_connect_service() to prevent the bug from occurring.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234846">SUSE bug 1234846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234847">SUSE bug 1234847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53157</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53157" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53157" ref_url="https://www.suse.com/security/cve/CVE-2024-53157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware

Fix a kernel crash with the below call trace when the SCPI firmware
returns OPP count of zero.

dvfs_info.opp_count may be zero on some platforms during the reboot
test, and the kernel will crash after dereferencing the pointer to
kcalloc(info-&gt;count, sizeof(*opp), GFP_KERNEL).

  |  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000028
  |  Mem abort info:
  |    ESR = 0x96000004
  |    Exception class = DABT (current EL), IL = 32 bits
  |    SET = 0, FnV = 0
  |    EA = 0, S1PTW = 0
  |  Data abort info:
  |    ISV = 0, ISS = 0x00000004
  |    CM = 0, WnR = 0
  |  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000faefa08c
  |  [0000000000000028] pgd=0000000000000000
  |  Internal error: Oops: 96000004 [#1] SMP
  |  scpi-hwmon: probe of PHYT000D:00 failed with error -110
  |  Process systemd-udevd (pid: 1701, stack limit = 0x00000000aaede86c)
  |  CPU: 2 PID: 1701 Comm: systemd-udevd Not tainted 4.19.90+ #1
  |  Hardware name: PHYTIUM LTD Phytium FT2000/4/Phytium FT2000/4, BIOS
  |  pstate: 60000005 (nZCv daif -PAN -UAO)
  |  pc : scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]
  |  lr : clk_register+0x438/0x720
  |  Call trace:
  |   scpi_dvfs_recalc_rate+0x40/0x58 [clk_scpi]
  |   devm_clk_hw_register+0x50/0xa0
  |   scpi_clk_ops_init.isra.2+0xa0/0x138 [clk_scpi]
  |   scpi_clocks_probe+0x528/0x70c [clk_scpi]
  |   platform_drv_probe+0x58/0xa8
  |   really_probe+0x260/0x3d0
  |   driver_probe_device+0x12c/0x148
  |   device_driver_attach+0x74/0x98
  |   __driver_attach+0xb4/0xe8
  |   bus_for_each_dev+0x88/0xe0
  |   driver_attach+0x30/0x40
  |   bus_add_driver+0x178/0x2b0
  |   driver_register+0x64/0x118
  |   __platform_driver_register+0x54/0x60
  |   scpi_clocks_driver_init+0x24/0x1000 [clk_scpi]
  |   do_one_initcall+0x54/0x220
  |   do_init_module+0x54/0x1c8
  |   load_module+0x14a4/0x1668
  |   __se_sys_finit_module+0xf8/0x110
  |   __arm64_sys_finit_module+0x24/0x30
  |   el0_svc_common+0x78/0x170
  |   el0_svc_handler+0x38/0x78
  |   el0_svc+0x8/0x340
  |  Code: 937d7c00 a94153f3 a8c27bfd f9400421 (b8606820)
  |  ---[ end trace 06feb22469d89fa8 ]---
  |  Kernel panic - not syncing: Fatal exception
  |  SMP: stopping secondary CPUs
  |  Kernel Offset: disabled
  |  CPU features: 0x10,a0002008
  |  Memory Limit: none
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53157/">CVE-2024-53157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53157">CVE-2024-53157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234827">SUSE bug 1234827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53158</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53158" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53158" ref_url="https://www.suse.com/security/cve/CVE-2024-53158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: geni-se: fix array underflow in geni_se_clk_tbl_get()

This loop is supposed to break if the frequency returned from
clk_round_rate() is the same as on the previous iteration.  However,
that check doesn't make sense on the first iteration through the loop.
It leads to reading before the start of these-&gt;clk_perf_tbl[] array.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-25"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53158/">CVE-2024-53158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53158">CVE-2024-53158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234811">SUSE bug 1234811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53160</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53160" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53160" ref_url="https://www.suse.com/security/cve/CVE-2024-53160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu

KCSAN reports a data race when access the krcp-&gt;monitor_work.timer.expires
variable in the schedule_delayed_monitor_work() function:

&lt;snip&gt;
BUG: KCSAN: data-race in __mod_timer / kvfree_call_rcu

read to 0xffff888237d1cce8 of 8 bytes by task 10149 on cpu 1:
 schedule_delayed_monitor_work kernel/rcu/tree.c:3520 [inline]
 kvfree_call_rcu+0x3b8/0x510 kernel/rcu/tree.c:3839
 trie_update_elem+0x47c/0x620 kernel/bpf/lpm_trie.c:441
 bpf_map_update_value+0x324/0x350 kernel/bpf/syscall.c:203
 generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1849
 bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5143
 __sys_bpf+0x2e5/0x7a0
 __do_sys_bpf kernel/bpf/syscall.c:5741 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5739 [inline]
 __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5739
 x64_sys_call+0x2625/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

write to 0xffff888237d1cce8 of 8 bytes by task 56 on cpu 0:
 __mod_timer+0x578/0x7f0 kernel/time/timer.c:1173
 add_timer_global+0x51/0x70 kernel/time/timer.c:1330
 __queue_delayed_work+0x127/0x1a0 kernel/workqueue.c:2523
 queue_delayed_work_on+0xdf/0x190 kernel/workqueue.c:2552
 queue_delayed_work include/linux/workqueue.h:677 [inline]
 schedule_delayed_monitor_work kernel/rcu/tree.c:3525 [inline]
 kfree_rcu_monitor+0x5e8/0x660 kernel/rcu/tree.c:3643
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 56 Comm: kworker/u8:4 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_unbound kfree_rcu_monitor
&lt;snip&gt;

kfree_rcu_monitor() rearms the work if a "krcp" has to be still
offloaded and this is done without holding krcp-&gt;lock, whereas
the kvfree_call_rcu() holds it.

Fix it by acquiring the "krcp-&gt;lock" for kfree_rcu_monitor() so
both functions do not race anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-25"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53160/">CVE-2024-53160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53160">CVE-2024-53160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234810">SUSE bug 1234810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53161</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53161" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53161" ref_url="https://www.suse.com/security/cve/CVE-2024-53161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/bluefield: Fix potential integer overflow

The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx
left-shifted 16 bits and OR-ed with DIMM index.  With mem_ctrl_idx defined as
32-bits wide the left-shift operation truncates the upper 16 bits of
information during the calculation of the SMC argument.

The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any
potential integer overflow, i.e. loss of data from upper 16 bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53161/">CVE-2024-53161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53161">CVE-2024-53161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234856">SUSE bug 1234856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53162</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53162" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53162" ref_url="https://www.suse.com/security/cve/CVE-2024-53162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat/qat_4xxx - fix off by one in uof_get_name()

The fw_objs[] array has "num_objs" elements so the &gt; needs to be &gt;= to
prevent an out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53162/">CVE-2024-53162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53162">CVE-2024-53162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234843">SUSE bug 1234843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53163</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53163" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53163" ref_url="https://www.suse.com/security/cve/CVE-2024-53163" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat/qat_420xx - fix off by one in uof_get_name()

This is called from uof_get_name_420xx() where "num_objs" is the
ARRAY_SIZE() of fw_objs[].  The &gt; needs to be &gt;= to prevent an out of
bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53163/">CVE-2024-53163 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53163">CVE-2024-53163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234828">SUSE bug 1234828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53164</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53164" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix ordering of qlen adjustment

Changes to sch-&gt;q.qlen around qdisc_tree_reduce_backlog() need to happen
_before_ a call to said function because otherwise it may fail to notify
parent qdiscs when the child is about to become empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2024-12-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53165</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53165" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53165" ref_url="https://www.suse.com/security/cve/CVE-2024-53165" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sh: intc: Fix use-after-free bug in register_intc_controller()

In the error handling for this function, d is freed without ever
removing it from intc_list which would lead to a use after free.
To fix this, let's only add it to the list after everything has
succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53165/">CVE-2024-53165 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53165">CVE-2024-53165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234882">SUSE bug 1234882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53166</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53166" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix bfqq uaf in bfq_limit_depth()

Set new allocated bfqq to bic or remove freed bfqq from bic are both
protected by bfqd-&gt;lock, however bfq_limit_depth() is deferencing bfqq
from bic without the lock, this can lead to UAF if the io_context is
shared by multiple tasks.

For example, test bfq with io_uring can trigger following UAF in v6.6:

==================================================================
BUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x47/0x80
 print_address_description.constprop.0+0x66/0x300
 print_report+0x3e/0x70
 kasan_report+0xb4/0xf0
 bfqq_group+0x15/0x50
 bfqq_request_over_limit+0x130/0x9a0
 bfq_limit_depth+0x1b5/0x480
 __blk_mq_alloc_requests+0x2b5/0xa00
 blk_mq_get_new_requests+0x11d/0x1d0
 blk_mq_submit_bio+0x286/0xb00
 submit_bio_noacct_nocheck+0x331/0x400
 __block_write_full_folio+0x3d0/0x640
 writepage_cb+0x3b/0xc0
 write_cache_pages+0x254/0x6c0
 write_cache_pages+0x254/0x6c0
 do_writepages+0x192/0x310
 filemap_fdatawrite_wbc+0x95/0xc0
 __filemap_fdatawrite_range+0x99/0xd0
 filemap_write_and_wait_range.part.0+0x4d/0xa0
 blkdev_read_iter+0xef/0x1e0
 io_read+0x1b6/0x8a0
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Allocated by task 808602:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_slab_alloc+0x83/0x90
 kmem_cache_alloc_node+0x1b1/0x6d0
 bfq_get_queue+0x138/0xfa0
 bfq_get_bfqq_handle_split+0xe3/0x2c0
 bfq_init_rq+0x196/0xbb0
 bfq_insert_request.isra.0+0xb5/0x480
 bfq_insert_requests+0x156/0x180
 blk_mq_insert_request+0x15d/0x440
 blk_mq_submit_bio+0x8a4/0xb00
 submit_bio_noacct_nocheck+0x331/0x400
 __blkdev_direct_IO_async+0x2dd/0x330
 blkdev_write_iter+0x39a/0x450
 io_write+0x22a/0x840
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork+0x2d/0x50
 ret_from_fork_asm+0x1b/0x30

Freed by task 808589:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 __kasan_slab_free+0x126/0x1b0
 kmem_cache_free+0x10c/0x750
 bfq_put_queue+0x2dd/0x770
 __bfq_insert_request.isra.0+0x155/0x7a0
 bfq_insert_request.isra.0+0x122/0x480
 bfq_insert_requests+0x156/0x180
 blk_mq_dispatch_plug_list+0x528/0x7e0
 blk_mq_flush_plug_list.part.0+0xe5/0x590
 __blk_flush_plug+0x3b/0x90
 blk_finish_plug+0x40/0x60
 do_writepages+0x19d/0x310
 filemap_fdatawrite_wbc+0x95/0xc0
 __filemap_fdatawrite_range+0x99/0xd0
 filemap_write_and_wait_range.part.0+0x4d/0xa0
 blkdev_read_iter+0xef/0x1e0
 io_read+0x1b6/0x8a0
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork+0x2d/0x50
 ret_from_fork_asm+0x1b/0x30

Fix the problem by protecting bic_to_bfqq() with bfqd-&gt;lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234884">SUSE bug 1234884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234885">SUSE bug 1234885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53167</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53167" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53167" ref_url="https://www.suse.com/security/cve/CVE-2024-53167" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs/blocklayout: Don't attempt unregister for invalid block device

Since commit d869da91cccb ("nfs/blocklayout: Fix premature PR key
unregistration") an unmount of a pNFS SCSI layout-enabled NFS may
dereference a NULL block_device in:

  bl_unregister_scsi+0x16/0xe0 [blocklayoutdriver]
  bl_free_device+0x70/0x80 [blocklayoutdriver]
  bl_free_deviceid_node+0x12/0x30 [blocklayoutdriver]
  nfs4_put_deviceid_node+0x60/0xc0 [nfsv4]
  nfs4_deviceid_purge_client+0x132/0x190 [nfsv4]
  unset_pnfs_layoutdriver+0x59/0x60 [nfsv4]
  nfs4_destroy_server+0x36/0x70 [nfsv4]
  nfs_free_server+0x23/0xe0 [nfs]
  deactivate_locked_super+0x30/0xb0
  cleanup_mnt+0xba/0x150
  task_work_run+0x59/0x90
  syscall_exit_to_user_mode+0x217/0x220
  do_syscall_64+0x8e/0x160

This happens because even though we were able to create the
nfs4_deviceid_node, the lookup for the device was unable to attach the
block device to the pnfs_block_dev.

If we never found a block device to register, we can avoid this case with
the PNFS_BDEV_REGISTERED flag.  Move the deref behind the test for the
flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53167/">CVE-2024-53167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53167">CVE-2024-53167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234886">SUSE bug 1234886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53168</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53168" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53168" ref_url="https://www.suse.com/security/cve/CVE-2024-53168" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket

BUG: KASAN: slab-use-after-free in tcp_write_timer_handler+0x156/0x3e0
Read of size 1 at addr ffff888111f322cd by task swapper/0/0

CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc4-dirty #7
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x68/0xa0
 print_address_description.constprop.0+0x2c/0x3d0
 print_report+0xb4/0x270
 kasan_report+0xbd/0xf0
 tcp_write_timer_handler+0x156/0x3e0
 tcp_write_timer+0x66/0x170
 call_timer_fn+0xfb/0x1d0
 __run_timers+0x3f8/0x480
 run_timer_softirq+0x9b/0x100
 handle_softirqs+0x153/0x390
 __irq_exit_rcu+0x103/0x120
 irq_exit_rcu+0xe/0x20
 sysvec_apic_timer_interrupt+0x76/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:default_idle+0xf/0x20
Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90
 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 33 f8 25 00 fb f4 &lt;fa&gt; c3 cc cc cc
 cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
RSP: 0018:ffffffffa2007e28 EFLAGS: 00000242
RAX: 00000000000f3b31 RBX: 1ffffffff4400fc7 RCX: ffffffffa09c3196
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff9f00590f
RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed102360835d
R10: ffff88811b041aeb R11: 0000000000000001 R12: 0000000000000000
R13: ffffffffa202d7c0 R14: 0000000000000000 R15: 00000000000147d0
 default_idle_call+0x6b/0xa0
 cpuidle_idle_call+0x1af/0x1f0
 do_idle+0xbc/0x130
 cpu_startup_entry+0x33/0x40
 rest_init+0x11f/0x210
 start_kernel+0x39a/0x420
 x86_64_start_reservations+0x18/0x30
 x86_64_start_kernel+0x97/0xa0
 common_startup_64+0x13e/0x141
 &lt;/TASK&gt;

Allocated by task 595:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_slab_alloc+0x87/0x90
 kmem_cache_alloc_noprof+0x12b/0x3f0
 copy_net_ns+0x94/0x380
 create_new_namespaces+0x24c/0x500
 unshare_nsproxy_namespaces+0x75/0xf0
 ksys_unshare+0x24e/0x4f0
 __x64_sys_unshare+0x1f/0x30
 do_syscall_64+0x70/0x180
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 100:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x54/0x70
 kmem_cache_free+0x156/0x5d0
 cleanup_net+0x5d3/0x670
 process_one_work+0x776/0xa90
 worker_thread+0x2e2/0x560
 kthread+0x1a8/0x1f0
 ret_from_fork+0x34/0x60
 ret_from_fork_asm+0x1a/0x30

Reproduction script:

mkdir -p /mnt/nfsshare
mkdir -p /mnt/nfs/netns_1
mkfs.ext4 /dev/sdb
mount /dev/sdb /mnt/nfsshare
systemctl restart nfs-server
chmod 777 /mnt/nfsshare
exportfs -i -o rw,no_root_squash *:/mnt/nfsshare

ip netns add netns_1
ip link add name veth_1_peer type veth peer veth_1
ifconfig veth_1_peer 11.11.0.254 up
ip link set veth_1 netns netns_1
ip netns exec netns_1 ifconfig veth_1 11.11.0.1

ip netns exec netns_1 /root/iptables -A OUTPUT -d 11.11.0.254 -p tcp \
	--tcp-flags FIN FIN  -j DROP

(note: In my environment, a DESTROY_CLIENTID operation is always sent
 immediately, breaking the nfs tcp connection.)
ip netns exec netns_1 timeout -s 9 300 mount -t nfs -o proto=tcp,vers=4.1 \
	11.11.0.254:/mnt/nfsshare /mnt/nfs/netns_1

ip netns del netns_1

The reason here is that the tcp socket in netns_1 (nfs side) has been
shutdown and closed (done in xs_destroy), but the FIN message (with ack)
is discarded, and the nfsd side keeps sending retransmission messages.
As a result, when the tcp sock in netns_1 processes the received message,
it sends the message (FIN message) in the sending queue, and the tcp timer
is re-established. When the network namespace is deleted, the net structure
accessed by tcp's timer handler function causes problems.

To fix this problem, let's hold netns refcnt for the tcp kernel socket as
done in other modules. This is an ugly hack which can easily be backported
to earlier kernels. A proper fix which cleans up the interfaces will
follow, but may not be so easy to backport.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53168/">CVE-2024-53168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53168">CVE-2024-53168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234887">SUSE bug 1234887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53169</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53169" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53169" ref_url="https://www.suse.com/security/cve/CVE-2024-53169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fabrics: fix kernel crash while shutting down controller

The nvme keep-alive operation, which executes at a periodic interval,
could potentially sneak in while shutting down a fabric controller.
This may lead to a race between the fabric controller admin queue
destroy code path (invoked while shutting down controller) and hw/hctx
queue dispatcher called from the nvme keep-alive async request queuing
operation. This race could lead to the kernel crash shown below:

Call Trace:
    autoremove_wake_function+0x0/0xbc (unreliable)
    __blk_mq_sched_dispatch_requests+0x114/0x24c
    blk_mq_sched_dispatch_requests+0x44/0x84
    blk_mq_run_hw_queue+0x140/0x220
    nvme_keep_alive_work+0xc8/0x19c [nvme_core]
    process_one_work+0x200/0x4e0
    worker_thread+0x340/0x504
    kthread+0x138/0x140
    start_kernel_thread+0x14/0x18

While shutting down fabric controller, if nvme keep-alive request sneaks
in then it would be flushed off. The nvme_keep_alive_end_io function is
then invoked to handle the end of the keep-alive operation which
decrements the admin-&gt;q_usage_counter and assuming this is the last/only
request in the admin queue then the admin-&gt;q_usage_counter becomes zero.
If that happens then blk-mq destroy queue operation (blk_mq_destroy_
queue()) which could be potentially running simultaneously on another
cpu (as this is the controller shutdown code path) would forward
progress and deletes the admin queue. So, now from this point onward
we are not supposed to access the admin queue resources. However the
issue here's that the nvme keep-alive thread running hw/hctx queue
dispatch operation hasn't yet finished its work and so it could still
potentially access the admin queue resource while the admin queue had
been already deleted and that causes the above crash.

The above kernel crash is regression caused due to changes implemented
in commit a54a93d0e359 ("nvme: move stopping keep-alive into
nvme_uninit_ctrl()"). Ideally we should stop keep-alive before destroyin
g the admin queue and freeing the admin tagset so that it wouldn't sneak
in during the shutdown operation. However we removed the keep alive stop
operation from the beginning of the controller shutdown code path in commit
a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()")
and added it under nvme_uninit_ctrl() which executes very late in the
shutdown code path after the admin queue is destroyed and its tagset is
removed. So this change created the possibility of keep-alive sneaking in
and interfering with the shutdown operation and causing observed kernel
crash.

To fix the observed crash, we decided to move nvme_stop_keep_alive() from
nvme_uninit_ctrl() to nvme_remove_admin_tag_set(). This change would ensure
that we don't forward progress and delete the admin queue until the keep-
alive operation is finished (if it's in-flight) or cancelled and that would
help contain the race condition explained above and hence avoid the crash.

Moving nvme_stop_keep_alive() to nvme_remove_admin_tag_set() instead of
adding nvme_stop_keep_alive() to the beginning of the controller shutdown
code path in nvme_stop_ctrl(), as was the case earlier before commit
a54a93d0e359 ("nvme: move stopping keep-alive into nvme_uninit_ctrl()"),
would help save one callsite of nvme_stop_keep_alive().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53169/">CVE-2024-53169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53169">CVE-2024-53169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234900">SUSE bug 1234900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53170</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53170" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53170" ref_url="https://www.suse.com/security/cve/CVE-2024-53170" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix uaf for flush rq while iterating tags

blk_mq_clear_flush_rq_mapping() is not called during scsi probe, by
checking blk_queue_init_done(). However, QUEUE_FLAG_INIT_DONE is cleared
in del_gendisk by commit aec89dc5d421 ("block: keep q_usage_counter in
atomic mode after del_gendisk"), hence for disk like scsi, following
blk_mq_destroy_queue() will not clear flush rq from tags-&gt;rqs[] as well,
cause following uaf that is found by our syzkaller for v6.6:

==================================================================
BUG: KASAN: slab-use-after-free in blk_mq_find_and_get_req+0x16e/0x1a0 block/blk-mq-tag.c:261
Read of size 4 at addr ffff88811c969c20 by task kworker/1:2H/224909

CPU: 1 PID: 224909 Comm: kworker/1:2H Not tainted 6.6.0-ga836a5060850 #32
Workqueue: kblockd blk_mq_timeout_work
Call Trace:

__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
print_address_description.constprop.0+0x66/0x300 mm/kasan/report.c:364
print_report+0x3e/0x70 mm/kasan/report.c:475
kasan_report+0xb8/0xf0 mm/kasan/report.c:588
blk_mq_find_and_get_req+0x16e/0x1a0 block/blk-mq-tag.c:261
bt_iter block/blk-mq-tag.c:288 [inline]
__sbitmap_for_each_set include/linux/sbitmap.h:295 [inline]
sbitmap_for_each_set include/linux/sbitmap.h:316 [inline]
bt_for_each+0x455/0x790 block/blk-mq-tag.c:325
blk_mq_queue_tag_busy_iter+0x320/0x740 block/blk-mq-tag.c:534
blk_mq_timeout_work+0x1a3/0x7b0 block/blk-mq.c:1673
process_one_work+0x7c4/0x1450 kernel/workqueue.c:2631
process_scheduled_works kernel/workqueue.c:2704 [inline]
worker_thread+0x804/0xe40 kernel/workqueue.c:2785
kthread+0x346/0x450 kernel/kthread.c:388
ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:293

Allocated by task 942:
kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
____kasan_kmalloc mm/kasan/common.c:374 [inline]
__kasan_kmalloc mm/kasan/common.c:383 [inline]
__kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:380
kasan_kmalloc include/linux/kasan.h:198 [inline]
__do_kmalloc_node mm/slab_common.c:1007 [inline]
__kmalloc_node+0x69/0x170 mm/slab_common.c:1014
kmalloc_node include/linux/slab.h:620 [inline]
kzalloc_node include/linux/slab.h:732 [inline]
blk_alloc_flush_queue+0x144/0x2f0 block/blk-flush.c:499
blk_mq_alloc_hctx+0x601/0x940 block/blk-mq.c:3788
blk_mq_alloc_and_init_hctx+0x27f/0x330 block/blk-mq.c:4261
blk_mq_realloc_hw_ctxs+0x488/0x5e0 block/blk-mq.c:4294
blk_mq_init_allocated_queue+0x188/0x860 block/blk-mq.c:4350
blk_mq_init_queue_data block/blk-mq.c:4166 [inline]
blk_mq_init_queue+0x8d/0x100 block/blk-mq.c:4176
scsi_alloc_sdev+0x843/0xd50 drivers/scsi/scsi_scan.c:335
scsi_probe_and_add_lun+0x77c/0xde0 drivers/scsi/scsi_scan.c:1189
__scsi_scan_target+0x1fc/0x5a0 drivers/scsi/scsi_scan.c:1727
scsi_scan_channel drivers/scsi/scsi_scan.c:1815 [inline]
scsi_scan_channel+0x14b/0x1e0 drivers/scsi/scsi_scan.c:1791
scsi_scan_host_selected+0x2fe/0x400 drivers/scsi/scsi_scan.c:1844
scsi_scan+0x3a0/0x3f0 drivers/scsi/scsi_sysfs.c:151
store_scan+0x2a/0x60 drivers/scsi/scsi_sysfs.c:191
dev_attr_store+0x5c/0x90 drivers/base/core.c:2388
sysfs_kf_write+0x11c/0x170 fs/sysfs/file.c:136
kernfs_fop_write_iter+0x3fc/0x610 fs/kernfs/file.c:338
call_write_iter include/linux/fs.h:2083 [inline]
new_sync_write+0x1b4/0x2d0 fs/read_write.c:493
vfs_write+0x76c/0xb00 fs/read_write.c:586
ksys_write+0x127/0x250 fs/read_write.c:639
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x70/0x120 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x78/0xe2

Freed by task 244687:
kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
kasan_save_free_info+0x2b/0x50 mm/kasan/generic.c:522
____kasan_slab_free mm/kasan/common.c:236 [inline]
__kasan_slab_free+0x12a/0x1b0 mm/kasan/common.c:244
kasan_slab_free include/linux/kasan.h:164 [in
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53170/">CVE-2024-53170 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53170">CVE-2024-53170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234888">SUSE bug 1234888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53171</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53171" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53171" ref_url="https://www.suse.com/security/cve/CVE-2024-53171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubifs: authentication: Fix use-after-free in ubifs_tnc_end_commit

After an insertion in TNC, the tree might split and cause a node to
change its `znode-&gt;parent`. A further deletion of other nodes in the
tree (which also could free the nodes), the aforementioned node's
`znode-&gt;cparent` could still point to a freed node. This
`znode-&gt;cparent` may not be updated when getting nodes to commit in
`ubifs_tnc_start_commit()`. This could then trigger a use-after-free
when accessing the `znode-&gt;cparent` in `write_index()` in
`ubifs_tnc_end_commit()`.

This can be triggered by running

  rm -f /etc/test-file.bin
  dd if=/dev/urandom of=/etc/test-file.bin bs=1M count=60 conv=fsync

in a loop, and with `CONFIG_UBIFS_FS_AUTHENTICATION`. KASAN then
reports:

  BUG: KASAN: use-after-free in ubifs_tnc_end_commit+0xa5c/0x1950
  Write of size 32 at addr ffffff800a3af86c by task ubifs_bgt0_20/153

  Call trace:
   dump_backtrace+0x0/0x340
   show_stack+0x18/0x24
   dump_stack_lvl+0x9c/0xbc
   print_address_description.constprop.0+0x74/0x2b0
   kasan_report+0x1d8/0x1f0
   kasan_check_range+0xf8/0x1a0
   memcpy+0x84/0xf4
   ubifs_tnc_end_commit+0xa5c/0x1950
   do_commit+0x4e0/0x1340
   ubifs_bg_thread+0x234/0x2e0
   kthread+0x36c/0x410
   ret_from_fork+0x10/0x20

  Allocated by task 401:
   kasan_save_stack+0x38/0x70
   __kasan_kmalloc+0x8c/0xd0
   __kmalloc+0x34c/0x5bc
   tnc_insert+0x140/0x16a4
   ubifs_tnc_add+0x370/0x52c
   ubifs_jnl_write_data+0x5d8/0x870
   do_writepage+0x36c/0x510
   ubifs_writepage+0x190/0x4dc
   __writepage+0x58/0x154
   write_cache_pages+0x394/0x830
   do_writepages+0x1f0/0x5b0
   filemap_fdatawrite_wbc+0x170/0x25c
   file_write_and_wait_range+0x140/0x190
   ubifs_fsync+0xe8/0x290
   vfs_fsync_range+0xc0/0x1e4
   do_fsync+0x40/0x90
   __arm64_sys_fsync+0x34/0x50
   invoke_syscall.constprop.0+0xa8/0x260
   do_el0_svc+0xc8/0x1f0
   el0_svc+0x34/0x70
   el0t_64_sync_handler+0x108/0x114
   el0t_64_sync+0x1a4/0x1a8

  Freed by task 403:
   kasan_save_stack+0x38/0x70
   kasan_set_track+0x28/0x40
   kasan_set_free_info+0x28/0x4c
   __kasan_slab_free+0xd4/0x13c
   kfree+0xc4/0x3a0
   tnc_delete+0x3f4/0xe40
   ubifs_tnc_remove_range+0x368/0x73c
   ubifs_tnc_remove_ino+0x29c/0x2e0
   ubifs_jnl_delete_inode+0x150/0x260
   ubifs_evict_inode+0x1d4/0x2e4
   evict+0x1c8/0x450
   iput+0x2a0/0x3c4
   do_unlinkat+0x2cc/0x490
   __arm64_sys_unlinkat+0x90/0x100
   invoke_syscall.constprop.0+0xa8/0x260
   do_el0_svc+0xc8/0x1f0
   el0_svc+0x34/0x70
   el0t_64_sync_handler+0x108/0x114
   el0t_64_sync+0x1a4/0x1a8

The offending `memcpy()` in `ubifs_copy_hash()` has a use-after-free
when a node becomes root in TNC but still has a `cparent` to an already
freed node. More specifically, consider the following TNC:

         zroot
         /
        /
      zp1
      /
     /
    zn

Inserting a new node `zn_new` with a key smaller then `zn` will trigger
a split in `tnc_insert()` if `zp1` is full:

         zroot
         /   \
        /     \
      zp1     zp2
      /         \
     /           \
  zn_new          zn

`zn-&gt;parent` has now been moved to `zp2`, *but* `zn-&gt;cparent` still
points to `zp1`.

Now, consider a removal of all the nodes _except_ `zn`. Just when
`tnc_delete()` is about to delete `zroot` and `zp2`:

         zroot
             \
              \
              zp2
                \
                 \
                 zn

`zroot` and `zp2` get freed and the tree collapses:

           zn

`zn` now becomes the new `zroot`.

`get_znodes_to_commit()` will now only find `zn`, the new `zroot`, and
`write_index()` will check its `znode-&gt;cparent` that wrongly points to
the already freed `zp1`. `ubifs_copy_hash()` thus gets wrongly called
with `znode-&gt;cparent-&gt;zbranch[znode-&gt;iip].hash` that triggers the
use-after-free!

Fix this by explicitly setting `znode-&gt;cparent` to `NULL` in
`get_znodes_to_commit()` for the root node. The search for the dirty
nodes
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53171/">CVE-2024-53171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53171">CVE-2024-53171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234889">SUSE bug 1234889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236234">SUSE bug 1236234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53172</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53172" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53172" ref_url="https://www.suse.com/security/cve/CVE-2024-53172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ubi: fastmap: Fix duplicate slab cache names while attaching

Since commit 4c39529663b9 ("slab: Warn on duplicate cache names when
DEBUG_VM=y"), the duplicate slab cache names can be detected and a
kernel WARNING is thrown out.
In UBI fast attaching process, alloc_ai() could be invoked twice
with the same slab cache name 'ubi_aeb_slab_cache', which will trigger
following warning messages:
 kmem_cache of name 'ubi_aeb_slab_cache' already exists
 WARNING: CPU: 0 PID: 7519 at mm/slab_common.c:107
          __kmem_cache_create_args+0x100/0x5f0
 Modules linked in: ubi(+) nandsim [last unloaded: nandsim]
 CPU: 0 UID: 0 PID: 7519 Comm: modprobe Tainted: G 6.12.0-rc2
 RIP: 0010:__kmem_cache_create_args+0x100/0x5f0
 Call Trace:
   __kmem_cache_create_args+0x100/0x5f0
   alloc_ai+0x295/0x3f0 [ubi]
   ubi_attach+0x3c3/0xcc0 [ubi]
   ubi_attach_mtd_dev+0x17cf/0x3fa0 [ubi]
   ubi_init+0x3fb/0x800 [ubi]
   do_init_module+0x265/0x7d0
   __x64_sys_finit_module+0x7a/0xc0

The problem could be easily reproduced by loading UBI device by fastmap
with CONFIG_DEBUG_VM=y.
Fix it by using different slab names for alloc_ai() callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53172/">CVE-2024-53172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53172">CVE-2024-53172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234898">SUSE bug 1234898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53173</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53173" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4.0: Fix a use-after-free problem in the asynchronous open()

Yang Erkun reports that when two threads are opening files at the same
time, and are forced to abort before a reply is seen, then the call to
nfs_release_seqid() in nfs4_opendata_free() can result in a
use-after-free of the pointer to the defunct rpc task of the other
thread.
The fix is to ensure that if the RPC call is aborted before the call to
nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
in nfs4_open_release() before the rpc_task is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234892">SUSE bug 1234892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53174</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53174" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53174" ref_url="https://www.suse.com/security/cve/CVE-2024-53174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: make sure cache entry active before cache_show

The function `c_show` was called with protection from RCU. This only
ensures that `cp` will not be freed. Therefore, the reference count for
`cp` can drop to zero, which will trigger a refcount use-after-free
warning when `cache_get` is called. To resolve this issue, use
`cache_get_rcu` to ensure that `cp` remains active.

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 7 PID: 822 at lib/refcount.c:25
refcount_warn_saturate+0xb1/0x120
CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb1/0x120

Call Trace:
 &lt;TASK&gt;
 c_show+0x2fc/0x380 [sunrpc]
 seq_read_iter+0x589/0x770
 seq_read+0x1e5/0x270
 proc_reg_read+0xe1/0x140
 vfs_read+0x125/0x530
 ksys_read+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53174/">CVE-2024-53174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53174">CVE-2024-53174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234899">SUSE bug 1234899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53175</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53175" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53175" ref_url="https://www.suse.com/security/cve/CVE-2024-53175" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipc: fix memleak if msg_init_ns failed in create_ipc_ns

Percpu memory allocation may failed during create_ipc_ns however this
fail is not handled properly since ipc sysctls and mq sysctls is not
released properly. Fix this by release these two resource when failure.

Here is the kmemleak stack when percpu failed:

unreferenced object 0xffff88819de2a600 (size 512):
  comm "shmem_2nstest", pid 120711, jiffies 4300542254
  hex dump (first 32 bytes):
    60 aa 9d 84 ff ff ff ff fc 18 48 b2 84 88 ff ff  `.........H.....
    04 00 00 00 a4 01 00 00 20 e4 56 81 ff ff ff ff  ........ .V.....
  backtrace (crc be7cba35):
    [&lt;ffffffff81b43f83&gt;] __kmalloc_node_track_caller_noprof+0x333/0x420
    [&lt;ffffffff81a52e56&gt;] kmemdup_noprof+0x26/0x50
    [&lt;ffffffff821b2f37&gt;] setup_mq_sysctls+0x57/0x1d0
    [&lt;ffffffff821b29cc&gt;] copy_ipcs+0x29c/0x3b0
    [&lt;ffffffff815d6a10&gt;] create_new_namespaces+0x1d0/0x920
    [&lt;ffffffff815d7449&gt;] copy_namespaces+0x2e9/0x3e0
    [&lt;ffffffff815458f3&gt;] copy_process+0x29f3/0x7ff0
    [&lt;ffffffff8154b080&gt;] kernel_clone+0xc0/0x650
    [&lt;ffffffff8154b6b1&gt;] __do_sys_clone+0xa1/0xe0
    [&lt;ffffffff843df8ff&gt;] do_syscall_64+0xbf/0x1c0
    [&lt;ffffffff846000b0&gt;] entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53175/">CVE-2024-53175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53175">CVE-2024-53175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234893">SUSE bug 1234893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53176</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53176" ref_url="https://www.suse.com/security/cve/CVE-2024-53176" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: During unmount, ensure all cached dir instances drop their dentry

The unmount process (cifs_kill_sb() calling close_all_cached_dirs()) can
race with various cached directory operations, which ultimately results
in dentries not being dropped and these kernel BUGs:

BUG: Dentry ffff88814f37e358{i=1000000000080,n=/}  still in use (2) [unmount of cifs cifs]
VFS: Busy inodes after unmount of cifs (cifs)
------------[ cut here ]------------
kernel BUG at fs/super.c:661!

This happens when a cfid is in the process of being cleaned up when, and
has been removed from the cfids-&gt;entries list, including:

- Receiving a lease break from the server
- Server reconnection triggers invalidate_all_cached_dirs(), which
  removes all the cfids from the list
- The laundromat thread decides to expire an old cfid.

To solve these problems, dropping the dentry is done in queued work done
in a newly-added cfid_put_wq workqueue, and close_all_cached_dirs()
flushes that workqueue after it drops all the dentries of which it's
aware. This is a global workqueue (rather than scoped to a mount), but
the queued work is minimal.

The final cleanup work for cleaning up a cfid is performed via work
queued in the serverclose_wq workqueue; this is done separate from
dropping the dentries so that close_all_cached_dirs() doesn't block on
any server operations.

Both of these queued works expect to invoked with a cfid reference and
a tcon reference to avoid those objects from being freed while the work
is ongoing.

While we're here, add proper locking to close_all_cached_dirs(), and
locking around the freeing of cfid-&gt;dentry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53176/">CVE-2024-53176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53176">CVE-2024-53176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234894">SUSE bug 1234894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53177</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53177" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53177" ref_url="https://www.suse.com/security/cve/CVE-2024-53177" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: prevent use-after-free due to open_cached_dir error paths

If open_cached_dir() encounters an error parsing the lease from the
server, the error handling may race with receiving a lease break,
resulting in open_cached_dir() freeing the cfid while the queued work is
pending.

Update open_cached_dir() to drop refs rather than directly freeing the
cfid.

Have cached_dir_lease_break(), cfids_laundromat_worker(), and
invalidate_all_cached_dirs() clear has_lease immediately while still
holding cfids-&gt;cfid_list_lock, and then use this to also simplify the
reference counting in cfids_laundromat_worker() and
invalidate_all_cached_dirs().

Fixes this KASAN splat (which manually injects an error and lease break
in open_cached_dir()):

==================================================================
BUG: KASAN: slab-use-after-free in smb2_cached_lease_break+0x27/0xb0
Read of size 8 at addr ffff88811cc24c10 by task kworker/3:1/65

CPU: 3 UID: 0 PID: 65 Comm: kworker/3:1 Not tainted 6.12.0-rc6-g255cf264e6e5-dirty #87
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
Workqueue: cifsiod smb2_cached_lease_break
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x77/0xb0
 print_report+0xce/0x660
 kasan_report+0xd3/0x110
 smb2_cached_lease_break+0x27/0xb0
 process_one_work+0x50a/0xc50
 worker_thread+0x2ba/0x530
 kthread+0x17c/0x1c0
 ret_from_fork+0x34/0x60
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 2464:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0xaa/0xb0
 open_cached_dir+0xa7d/0x1fb0
 smb2_query_path_info+0x43c/0x6e0
 cifs_get_fattr+0x346/0xf10
 cifs_get_inode_info+0x157/0x210
 cifs_revalidate_dentry_attr+0x2d1/0x460
 cifs_getattr+0x173/0x470
 vfs_statx_path+0x10f/0x160
 vfs_statx+0xe9/0x150
 vfs_fstatat+0x5e/0xc0
 __do_sys_newfstatat+0x91/0xf0
 do_syscall_64+0x95/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 2464:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x51/0x70
 kfree+0x174/0x520
 open_cached_dir+0x97f/0x1fb0
 smb2_query_path_info+0x43c/0x6e0
 cifs_get_fattr+0x346/0xf10
 cifs_get_inode_info+0x157/0x210
 cifs_revalidate_dentry_attr+0x2d1/0x460
 cifs_getattr+0x173/0x470
 vfs_statx_path+0x10f/0x160
 vfs_statx+0xe9/0x150
 vfs_fstatat+0x5e/0xc0
 __do_sys_newfstatat+0x91/0xf0
 do_syscall_64+0x95/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Last potentially related work creation:
 kasan_save_stack+0x33/0x60
 __kasan_record_aux_stack+0xad/0xc0
 insert_work+0x32/0x100
 __queue_work+0x5c9/0x870
 queue_work_on+0x82/0x90
 open_cached_dir+0x1369/0x1fb0
 smb2_query_path_info+0x43c/0x6e0
 cifs_get_fattr+0x346/0xf10
 cifs_get_inode_info+0x157/0x210
 cifs_revalidate_dentry_attr+0x2d1/0x460
 cifs_getattr+0x173/0x470
 vfs_statx_path+0x10f/0x160
 vfs_statx+0xe9/0x150
 vfs_fstatat+0x5e/0xc0
 __do_sys_newfstatat+0x91/0xf0
 do_syscall_64+0x95/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

The buggy address belongs to the object at ffff88811cc24c00
 which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 16 bytes inside of
 freed 1024-byte region [ffff88811cc24c00, ffff88811cc25000)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53177/">CVE-2024-53177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53177">CVE-2024-53177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234896">SUSE bug 1234896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235103">SUSE bug 1235103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53178</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53178" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53178" ref_url="https://www.suse.com/security/cve/CVE-2024-53178" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Don't leak cfid when reconnect races with open_cached_dir

open_cached_dir() may either race with the tcon reconnection even before
compound_send_recv() or directly trigger a reconnection via
SMB2_open_init() or SMB_query_info_init().

The reconnection process invokes invalidate_all_cached_dirs() via
cifs_mark_open_files_invalid(), which removes all cfids from the
cfids-&gt;entries list but doesn't drop a ref if has_lease isn't true. This
results in the currently-being-constructed cfid not being on the list,
but still having a refcount of 2. It leaks if returned from
open_cached_dir().

Fix this by setting cfid-&gt;has_lease when the ref is actually taken; the
cfid will not be used by other threads until it has a valid time.

Addresses these kmemleaks:

unreferenced object 0xffff8881090c4000 (size 1024):
  comm "bash", pid 1860, jiffies 4295126592
  hex dump (first 32 bytes):
    00 01 00 00 00 00 ad de 22 01 00 00 00 00 ad de  ........".......
    00 ca 45 22 81 88 ff ff f8 dc 4f 04 81 88 ff ff  ..E"......O.....
  backtrace (crc 6f58c20f):
    [&lt;ffffffff8b895a1e&gt;] __kmalloc_cache_noprof+0x2be/0x350
    [&lt;ffffffff8bda06e3&gt;] open_cached_dir+0x993/0x1fb0
    [&lt;ffffffff8bdaa750&gt;] cifs_readdir+0x15a0/0x1d50
    [&lt;ffffffff8b9a853f&gt;] iterate_dir+0x28f/0x4b0
    [&lt;ffffffff8b9a9aed&gt;] __x64_sys_getdents64+0xfd/0x200
    [&lt;ffffffff8cf6da05&gt;] do_syscall_64+0x95/0x1a0
    [&lt;ffffffff8d00012f&gt;] entry_SYSCALL_64_after_hwframe+0x76/0x7e
unreferenced object 0xffff8881044fdcf8 (size 8):
  comm "bash", pid 1860, jiffies 4295126592
  hex dump (first 8 bytes):
    00 cc cc cc cc cc cc cc                          ........
  backtrace (crc 10c106a9):
    [&lt;ffffffff8b89a3d3&gt;] __kmalloc_node_track_caller_noprof+0x363/0x480
    [&lt;ffffffff8b7d7256&gt;] kstrdup+0x36/0x60
    [&lt;ffffffff8bda0700&gt;] open_cached_dir+0x9b0/0x1fb0
    [&lt;ffffffff8bdaa750&gt;] cifs_readdir+0x15a0/0x1d50
    [&lt;ffffffff8b9a853f&gt;] iterate_dir+0x28f/0x4b0
    [&lt;ffffffff8b9a9aed&gt;] __x64_sys_getdents64+0xfd/0x200
    [&lt;ffffffff8cf6da05&gt;] do_syscall_64+0x95/0x1a0
    [&lt;ffffffff8d00012f&gt;] entry_SYSCALL_64_after_hwframe+0x76/0x7e

And addresses these BUG splats when unmounting the SMB filesystem:

BUG: Dentry ffff888140590ba0{i=1000000000080,n=/}  still in use (2) [unmount of cifs cifs]
WARNING: CPU: 3 PID: 3433 at fs/dcache.c:1536 umount_check+0xd0/0x100
Modules linked in:
CPU: 3 UID: 0 PID: 3433 Comm: bash Not tainted 6.12.0-rc4-g850925a8133c-dirty #49
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:umount_check+0xd0/0x100
Code: 8d 7c 24 40 e8 31 5a f4 ff 49 8b 54 24 40 41 56 49 89 e9 45 89 e8 48 89 d9 41 57 48 89 de 48 c7 c7 80 e7 db ac e8 f0 72 9a ff &lt;0f&gt; 0b 58 31 c0 5a 5b 5d 41 5c 41 5d 41 5e 41 5f e9 2b e5 5d 01 41
RSP: 0018:ffff88811cc27978 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffff888140590ba0 RCX: ffffffffaaf20bae
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881f6fb6f40
RBP: ffff8881462ec000 R08: 0000000000000001 R09: ffffed1023984ee3
R10: ffff88811cc2771f R11: 00000000016cfcc0 R12: ffff888134383e08
R13: 0000000000000002 R14: ffff8881462ec668 R15: ffffffffaceab4c0
FS:  00007f23bfa98740(0000) GS:ffff8881f6f80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556de4a6f808 CR3: 0000000123c80000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 d_walk+0x6a/0x530
 shrink_dcache_for_umount+0x6a/0x200
 generic_shutdown_super+0x52/0x2a0
 kill_anon_super+0x22/0x40
 cifs_kill_sb+0x159/0x1e0
 deactivate_locked_super+0x66/0xe0
 cleanup_mnt+0x140/0x210
 task_work_run+0xfb/0x170
 syscall_exit_to_user_mode+0x29f/0x2b0
 do_syscall_64+0xa1/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f23bfb93ae7
Code: ff ff ff ff c3 66 0f 1f 44 00 00 48 8b 0d 11 93 0d 00 f7 d8 64 89 01 b8 ff ff ff ff eb bf 0f 1f 44 00 00 b8 50 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d e9 92 0d 00 f7 d8 64 89 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53178/">CVE-2024-53178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53178">CVE-2024-53178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234895">SUSE bug 1234895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53179</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53179" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53179" ref_url="https://www.suse.com/security/cve/CVE-2024-53179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free of signing key

Customers have reported use-after-free in @ses-&gt;auth_key.response with
SMB2.1 + sign mounts which occurs due to following race:

task A                         task B
cifs_mount()
 dfs_mount_share()
  get_session()
   cifs_mount_get_session()    cifs_send_recv()
    cifs_get_smb_ses()          compound_send_recv()
     cifs_setup_session()        smb2_setup_request()
      kfree_sensitive()           smb2_calc_signature()
                                   crypto_shash_setkey() *UAF*

Fix this by ensuring that we have a valid @ses-&gt;auth_key.response by
checking whether @ses-&gt;ses_status is SES_GOOD or SES_EXITING with
@ses-&gt;ses_lock held.  After commit 24a9799aa8ef ("smb: client: fix UAF
in smb2_reconnect_server()"), we made sure to call -&gt;logoff() only
when @ses was known to be good (e.g. valid -&gt;auth_key.response), so
it's safe to access signing key when @ses-&gt;ses_status == SES_EXITING.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53179/">CVE-2024-53179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53179">CVE-2024-53179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234921">SUSE bug 1234921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234927">SUSE bug 1234927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53180</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53180" ref_url="https://www.suse.com/security/cve/CVE-2024-53180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Add sanity NULL check for the default mmap fault handler

A driver might allow the mmap access before initializing its
runtime-&gt;dma_area properly.  Add a proper NULL check before passing to
virt_to_page() for avoiding a panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53180/">CVE-2024-53180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53180">CVE-2024-53180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234929">SUSE bug 1234929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53181</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53181" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53181" ref_url="https://www.suse.com/security/cve/CVE-2024-53181" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: vector: Do not use drvdata in release

The drvdata is not available in release. Let's just use container_of()
to get the vector_device instance. Otherwise, removing a vector device
will result in a crash:

RIP: 0033:vector_device_release+0xf/0x50
RSP: 00000000e187bc40  EFLAGS: 00010202
RAX: 0000000060028f61 RBX: 00000000600f1baf RCX: 00000000620074e0
RDX: 000000006220b9c0 RSI: 0000000060551c80 RDI: 0000000000000000
RBP: 00000000e187bc50 R08: 00000000603ad594 R09: 00000000e187bb70
R10: 000000000000135a R11: 00000000603ad422 R12: 00000000623ae028
R13: 000000006287a200 R14: 0000000062006d30 R15: 00000000623700b6
Kernel panic - not syncing: Segfault with no mm
CPU: 0 UID: 0 PID: 16 Comm: kworker/0:1 Not tainted 6.12.0-rc6-g59b723cd2adb #1
Workqueue: events mc_work_proc
Stack:
 60028f61 623ae028 e187bc80 60276fcd
 6220b9c0 603f5820 623ae028 00000000
 e187bcb0 603a2bcd 623ae000 62370010
Call Trace:
 [&lt;60028f61&gt;] ? vector_device_release+0x0/0x50
 [&lt;60276fcd&gt;] device_release+0x70/0xba
 [&lt;603a2bcd&gt;] kobject_put+0xba/0xe7
 [&lt;60277265&gt;] put_device+0x19/0x1c
 [&lt;60281266&gt;] platform_device_put+0x26/0x29
 [&lt;60281e5f&gt;] platform_device_unregister+0x2c/0x2e
 [&lt;60029422&gt;] vector_remove+0x52/0x58
 [&lt;60031316&gt;] ? mconsole_reply+0x0/0x50
 [&lt;600310c8&gt;] mconsole_remove+0x160/0x1cc
 [&lt;603b19f4&gt;] ? strlen+0x0/0x15
 [&lt;60066611&gt;] ? __dequeue_entity+0x1a9/0x206
 [&lt;600666a7&gt;] ? set_next_entity+0x39/0x63
 [&lt;6006666e&gt;] ? set_next_entity+0x0/0x63
 [&lt;60038fa6&gt;] ? um_set_signals+0x0/0x43
 [&lt;6003070c&gt;] mc_work_proc+0x77/0x91
 [&lt;60057664&gt;] process_scheduled_works+0x1b3/0x2dd
 [&lt;60055f32&gt;] ? assign_work+0x0/0x58
 [&lt;60057f0a&gt;] worker_thread+0x1e9/0x293
 [&lt;6005406f&gt;] ? set_pf_worker+0x0/0x64
 [&lt;6005d65d&gt;] ? arch_local_irq_save+0x0/0x2d
 [&lt;6005d748&gt;] ? kthread_exit+0x0/0x3a
 [&lt;60057d21&gt;] ? worker_thread+0x0/0x293
 [&lt;6005dbf1&gt;] kthread+0x126/0x12b
 [&lt;600219c5&gt;] new_thread_handler+0x85/0xb6
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53181/">CVE-2024-53181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53181">CVE-2024-53181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234945">SUSE bug 1234945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53182</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53182" ref_url="https://www.suse.com/security/cve/CVE-2024-53182" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "block, bfq: merge bfq_release_process_ref() into bfq_put_cooperator()"

This reverts commit bc3b1e9e7c50e1de0f573eea3871db61dd4787de.

The bic is associated with sync_bfqq, and bfq_release_process_ref cannot
be put into bfq_put_cooperator.

kasan report:
[  400.347277] ==================================================================
[  400.347287] BUG: KASAN: slab-use-after-free in bic_set_bfqq+0x200/0x230
[  400.347420] Read of size 8 at addr ffff88881cab7d60 by task dockerd/5800
[  400.347430]
[  400.347436] CPU: 24 UID: 0 PID: 5800 Comm: dockerd Kdump: loaded Tainted: G E 6.12.0 #32
[  400.347450] Tainted: [E]=UNSIGNED_MODULE
[  400.347454] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022
[  400.347460] Call Trace:
[  400.347464]  &lt;TASK&gt;
[  400.347468]  dump_stack_lvl+0x5d/0x80
[  400.347490]  print_report+0x174/0x505
[  400.347521]  kasan_report+0xe0/0x160
[  400.347541]  bic_set_bfqq+0x200/0x230
[  400.347549]  bfq_bic_update_cgroup+0x419/0x740
[  400.347560]  bfq_bio_merge+0x133/0x320
[  400.347584]  blk_mq_submit_bio+0x1761/0x1e20
[  400.347625]  __submit_bio+0x28b/0x7b0
[  400.347664]  submit_bio_noacct_nocheck+0x6b2/0xd30
[  400.347690]  iomap_readahead+0x50c/0x680
[  400.347731]  read_pages+0x17f/0x9c0
[  400.347785]  page_cache_ra_unbounded+0x366/0x4a0
[  400.347795]  filemap_fault+0x83d/0x2340
[  400.347819]  __xfs_filemap_fault+0x11a/0x7d0 [xfs]
[  400.349256]  __do_fault+0xf1/0x610
[  400.349270]  do_fault+0x977/0x11a0
[  400.349281]  __handle_mm_fault+0x5d1/0x850
[  400.349314]  handle_mm_fault+0x1f8/0x560
[  400.349324]  do_user_addr_fault+0x324/0x970
[  400.349337]  exc_page_fault+0x76/0xf0
[  400.349350]  asm_exc_page_fault+0x26/0x30
[  400.349360] RIP: 0033:0x55a480d77375
[  400.349384] Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 49 3b 66 10 0f 86 ae 02 00 00 55 48 89 e5 48 83 ec 58 48 8b 10 &lt;83&gt; 7a 10 00 0f 84 27 02 00 00 44 0f b6 42 28 44 0f b6 4a 29 41 80
[  400.349392] RSP: 002b:00007f18c37fd8b8 EFLAGS: 00010216
[  400.349401] RAX: 00007f18c37fd9d0 RBX: 0000000000000000 RCX: 0000000000000000
[  400.349407] RDX: 000055a484407d38 RSI: 000000c000e8b0c0 RDI: 0000000000000000
[  400.349412] RBP: 00007f18c37fd910 R08: 000055a484017f60 R09: 000055a484066f80
[  400.349417] R10: 0000000000194000 R11: 0000000000000005 R12: 0000000000000008
[  400.349422] R13: 0000000000000000 R14: 000000c000476a80 R15: 0000000000000000
[  400.349430]  &lt;/TASK&gt;
[  400.349452]
[  400.349454] Allocated by task 5800:
[  400.349459]  kasan_save_stack+0x30/0x50
[  400.349469]  kasan_save_track+0x14/0x30
[  400.349475]  __kasan_slab_alloc+0x89/0x90
[  400.349482]  kmem_cache_alloc_node_noprof+0xdc/0x2a0
[  400.349492]  bfq_get_queue+0x1ef/0x1100
[  400.349502]  __bfq_get_bfqq_handle_split+0x11a/0x510
[  400.349511]  bfq_insert_requests+0xf55/0x9030
[  400.349519]  blk_mq_flush_plug_list+0x446/0x14c0
[  400.349527]  __blk_flush_plug+0x27c/0x4e0
[  400.349534]  blk_finish_plug+0x52/0xa0
[  400.349540]  _xfs_buf_ioapply+0x739/0xc30 [xfs]
[  400.350246]  __xfs_buf_submit+0x1b2/0x640 [xfs]
[  400.350967]  xfs_buf_read_map+0x306/0xa20 [xfs]
[  400.351672]  xfs_trans_read_buf_map+0x285/0x7d0 [xfs]
[  400.352386]  xfs_imap_to_bp+0x107/0x270 [xfs]
[  400.353077]  xfs_iget+0x70d/0x1eb0 [xfs]
[  400.353786]  xfs_lookup+0x2ca/0x3a0 [xfs]
[  400.354506]  xfs_vn_lookup+0x14e/0x1a0 [xfs]
[  400.355197]  __lookup_slow+0x19c/0x340
[  400.355204]  lookup_one_unlocked+0xfc/0x120
[  400.355211]  ovl_lookup_single+0x1b3/0xcf0 [overlay]
[  400.355255]  ovl_lookup_layer+0x316/0x490 [overlay]
[  400.355295]  ovl_lookup+0x844/0x1fd0 [overlay]
[  400.355351]  lookup_one_qstr_excl+0xef/0x150
[  400.355357]  do_unlinkat+0x22a/0x620
[  400.355366]  __x64_sys_unlinkat+0x109/0x1e0
[  400.355375]  do_syscall_64+0x82/0x160
[  400.355384]  entry_SYSCALL_64_after_hwframe+0x76/0x7
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53182/">CVE-2024-53182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53182">CVE-2024-53182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234946">SUSE bug 1234946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53183</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53183" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53183" ref_url="https://www.suse.com/security/cve/CVE-2024-53183" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: net: Do not use drvdata in release

The drvdata is not available in release. Let's just use container_of()
to get the uml_net instance. Otherwise, removing a network device will
result in a crash:

RIP: 0033:net_device_release+0x10/0x6f
RSP: 00000000e20c7c40  EFLAGS: 00010206
RAX: 000000006002e4e7 RBX: 00000000600f1baf RCX: 00000000624074e0
RDX: 0000000062778000 RSI: 0000000060551c80 RDI: 00000000627af028
RBP: 00000000e20c7c50 R08: 00000000603ad594 R09: 00000000e20c7b70
R10: 000000000000135a R11: 00000000603ad422 R12: 0000000000000000
R13: 0000000062c7af00 R14: 0000000062406d60 R15: 00000000627700b6
Kernel panic - not syncing: Segfault with no mm
CPU: 0 UID: 0 PID: 29 Comm: kworker/0:2 Not tainted 6.12.0-rc6-g59b723cd2adb #1
Workqueue: events mc_work_proc
Stack:
 627af028 62c7af00 e20c7c80 60276fcd
 62778000 603f5820 627af028 00000000
 e20c7cb0 603a2bcd 627af000 62770010
Call Trace:
 [&lt;60276fcd&gt;] device_release+0x70/0xba
 [&lt;603a2bcd&gt;] kobject_put+0xba/0xe7
 [&lt;60277265&gt;] put_device+0x19/0x1c
 [&lt;60281266&gt;] platform_device_put+0x26/0x29
 [&lt;60281e5f&gt;] platform_device_unregister+0x2c/0x2e
 [&lt;6002ec9c&gt;] net_remove+0x63/0x69
 [&lt;60031316&gt;] ? mconsole_reply+0x0/0x50
 [&lt;600310c8&gt;] mconsole_remove+0x160/0x1cc
 [&lt;60087d40&gt;] ? __remove_hrtimer+0x38/0x74
 [&lt;60087ff8&gt;] ? hrtimer_try_to_cancel+0x8c/0x98
 [&lt;6006b3cf&gt;] ? dl_server_stop+0x3f/0x48
 [&lt;6006b390&gt;] ? dl_server_stop+0x0/0x48
 [&lt;600672e8&gt;] ? dequeue_entities+0x327/0x390
 [&lt;60038fa6&gt;] ? um_set_signals+0x0/0x43
 [&lt;6003070c&gt;] mc_work_proc+0x77/0x91
 [&lt;60057664&gt;] process_scheduled_works+0x1b3/0x2dd
 [&lt;60055f32&gt;] ? assign_work+0x0/0x58
 [&lt;60057f0a&gt;] worker_thread+0x1e9/0x293
 [&lt;6005406f&gt;] ? set_pf_worker+0x0/0x64
 [&lt;6005d65d&gt;] ? arch_local_irq_save+0x0/0x2d
 [&lt;6005d748&gt;] ? kthread_exit+0x0/0x3a
 [&lt;60057d21&gt;] ? worker_thread+0x0/0x293
 [&lt;6005dbf1&gt;] kthread+0x126/0x12b
 [&lt;600219c5&gt;] new_thread_handler+0x85/0xb6
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53183/">CVE-2024-53183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53183">CVE-2024-53183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234951">SUSE bug 1234951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53184</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53184" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53184" ref_url="https://www.suse.com/security/cve/CVE-2024-53184" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

um: ubd: Do not use drvdata in release

The drvdata is not available in release. Let's just use container_of()
to get the ubd instance. Otherwise, removing a ubd device will result
in a crash:

RIP: 0033:blk_mq_free_tag_set+0x1f/0xba
RSP: 00000000e2083bf0  EFLAGS: 00010246
RAX: 000000006021463a RBX: 0000000000000348 RCX: 0000000062604d00
RDX: 0000000004208060 RSI: 00000000605241a0 RDI: 0000000000000348
RBP: 00000000e2083c10 R08: 0000000062414010 R09: 00000000601603f7
R10: 000000000000133a R11: 000000006038c4bd R12: 0000000000000000
R13: 0000000060213a5c R14: 0000000062405d20 R15: 00000000604f7aa0
Kernel panic - not syncing: Segfault with no mm
CPU: 0 PID: 17 Comm: kworker/0:1 Not tainted 6.8.0-rc3-00107-gba3f67c11638 #1
Workqueue: events mc_work_proc
Stack:
 00000000 604f7ef0 62c5d000 62405d20
 e2083c30 6002c776 6002c755 600e47ff
 e2083c60 6025ffe3 04208060 603d36e0
Call Trace:
 [&lt;6002c776&gt;] ubd_device_release+0x21/0x55
 [&lt;6002c755&gt;] ? ubd_device_release+0x0/0x55
 [&lt;600e47ff&gt;] ? kfree+0x0/0x100
 [&lt;6025ffe3&gt;] device_release+0x70/0xba
 [&lt;60381d6a&gt;] kobject_put+0xb5/0xe2
 [&lt;6026027b&gt;] put_device+0x19/0x1c
 [&lt;6026a036&gt;] platform_device_put+0x26/0x29
 [&lt;6026ac5a&gt;] platform_device_unregister+0x2c/0x2e
 [&lt;6002c52e&gt;] ubd_remove+0xb8/0xd6
 [&lt;6002bb74&gt;] ? mconsole_reply+0x0/0x50
 [&lt;6002b926&gt;] mconsole_remove+0x160/0x1cc
 [&lt;6002bbbc&gt;] ? mconsole_reply+0x48/0x50
 [&lt;6003379c&gt;] ? um_set_signals+0x3b/0x43
 [&lt;60061c55&gt;] ? update_min_vruntime+0x14/0x70
 [&lt;6006251f&gt;] ? dequeue_task_fair+0x164/0x235
 [&lt;600620aa&gt;] ? update_cfs_group+0x0/0x40
 [&lt;603a0e77&gt;] ? __schedule+0x0/0x3ed
 [&lt;60033761&gt;] ? um_set_signals+0x0/0x43
 [&lt;6002af6a&gt;] mc_work_proc+0x77/0x91
 [&lt;600520b4&gt;] process_scheduled_works+0x1af/0x2c3
 [&lt;6004ede3&gt;] ? assign_work+0x0/0x58
 [&lt;600527a1&gt;] worker_thread+0x2f7/0x37a
 [&lt;6004ee3b&gt;] ? set_pf_worker+0x0/0x64
 [&lt;6005765d&gt;] ? arch_local_irq_save+0x0/0x2d
 [&lt;60058e07&gt;] ? kthread_exit+0x0/0x3a
 [&lt;600524aa&gt;] ? worker_thread+0x0/0x37a
 [&lt;60058f9f&gt;] kthread+0x130/0x135
 [&lt;6002068e&gt;] new_thread_handler+0x85/0xb6
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53184/">CVE-2024-53184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53184">CVE-2024-53184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234953">SUSE bug 1234953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53185</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53185" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53185" ref_url="https://www.suse.com/security/cve/CVE-2024-53185" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix NULL ptr deref in crypto_aead_setkey()

Neither SMB3.0 or SMB3.02 supports encryption negotiate context, so
when SMB2_GLOBAL_CAP_ENCRYPTION flag is set in the negotiate response,
the client uses AES-128-CCM as the default cipher.  See MS-SMB2
3.3.5.4.

Commit b0abcd65ec54 ("smb: client: fix UAF in async decryption") added
a @server-&gt;cipher_type check to conditionally call
smb3_crypto_aead_allocate(), but that check would always be false as
@server-&gt;cipher_type is unset for SMB3.02.

Fix the following KASAN splat by setting @server-&gt;cipher_type for
SMB3.02 as well.

mount.cifs //srv/share /mnt -o vers=3.02,seal,...

BUG: KASAN: null-ptr-deref in crypto_aead_setkey+0x2c/0x130
Read of size 8 at addr 0000000000000020 by task mount.cifs/1095
CPU: 1 UID: 0 PID: 1095 Comm: mount.cifs Not tainted 6.12.0 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-3.fc41
04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x5d/0x80
 ? crypto_aead_setkey+0x2c/0x130
 kasan_report+0xda/0x110
 ? crypto_aead_setkey+0x2c/0x130
 crypto_aead_setkey+0x2c/0x130
 crypt_message+0x258/0xec0 [cifs]
 ? __asan_memset+0x23/0x50
 ? __pfx_crypt_message+0x10/0x10 [cifs]
 ? mark_lock+0xb0/0x6a0
 ? hlock_class+0x32/0xb0
 ? mark_lock+0xb0/0x6a0
 smb3_init_transform_rq+0x352/0x3f0 [cifs]
 ? lock_acquire.part.0+0xf4/0x2a0
 smb_send_rqst+0x144/0x230 [cifs]
 ? __pfx_smb_send_rqst+0x10/0x10 [cifs]
 ? hlock_class+0x32/0xb0
 ? smb2_setup_request+0x225/0x3a0 [cifs]
 ? __pfx_cifs_compound_last_callback+0x10/0x10 [cifs]
 compound_send_recv+0x59b/0x1140 [cifs]
 ? __pfx_compound_send_recv+0x10/0x10 [cifs]
 ? __create_object+0x5e/0x90
 ? hlock_class+0x32/0xb0
 ? do_raw_spin_unlock+0x9a/0xf0
 cifs_send_recv+0x23/0x30 [cifs]
 SMB2_tcon+0x3ec/0xb30 [cifs]
 ? __pfx_SMB2_tcon+0x10/0x10 [cifs]
 ? lock_acquire.part.0+0xf4/0x2a0
 ? __pfx_lock_release+0x10/0x10
 ? do_raw_spin_trylock+0xc6/0x120
 ? lock_acquire+0x3f/0x90
 ? _get_xid+0x16/0xd0 [cifs]
 ? __pfx_SMB2_tcon+0x10/0x10 [cifs]
 ? cifs_get_smb_ses+0xcdd/0x10a0 [cifs]
 cifs_get_smb_ses+0xcdd/0x10a0 [cifs]
 ? __pfx_cifs_get_smb_ses+0x10/0x10 [cifs]
 ? cifs_get_tcp_session+0xaa0/0xca0 [cifs]
 cifs_mount_get_session+0x8a/0x210 [cifs]
 dfs_mount_share+0x1b0/0x11d0 [cifs]
 ? __pfx___lock_acquire+0x10/0x10
 ? __pfx_dfs_mount_share+0x10/0x10 [cifs]
 ? lock_acquire.part.0+0xf4/0x2a0
 ? find_held_lock+0x8a/0xa0
 ? hlock_class+0x32/0xb0
 ? lock_release+0x203/0x5d0
 cifs_mount+0xb3/0x3d0 [cifs]
 ? do_raw_spin_trylock+0xc6/0x120
 ? __pfx_cifs_mount+0x10/0x10 [cifs]
 ? lock_acquire+0x3f/0x90
 ? find_nls+0x16/0xa0
 ? smb3_update_mnt_flags+0x372/0x3b0 [cifs]
 cifs_smb3_do_mount+0x1e2/0xc80 [cifs]
 ? __pfx_vfs_parse_fs_string+0x10/0x10
 ? __pfx_cifs_smb3_do_mount+0x10/0x10 [cifs]
 smb3_get_tree+0x1bf/0x330 [cifs]
 vfs_get_tree+0x4a/0x160
 path_mount+0x3c1/0xfb0
 ? kasan_quarantine_put+0xc7/0x1d0
 ? __pfx_path_mount+0x10/0x10
 ? kmem_cache_free+0x118/0x3e0
 ? user_path_at+0x74/0xa0
 __x64_sys_mount+0x1a6/0x1e0
 ? __pfx___x64_sys_mount+0x10/0x10
 ? mark_held_locks+0x1a/0x90
 do_syscall_64+0xbb/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53185/">CVE-2024-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53185">CVE-2024-53185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234901">SUSE bug 1234901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53186</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53186" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53186" ref_url="https://www.suse.com/security/cve/CVE-2024-53186" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix use-after-free in SMB request handling

A race condition exists between SMB request handling in
`ksmbd_conn_handler_loop()` and the freeing of `ksmbd_conn` in the
workqueue handler `handle_ksmbd_work()`. This leads to a UAF.
- KASAN: slab-use-after-free Read in handle_ksmbd_work
- KASAN: slab-use-after-free in rtlock_slowlock_locked

This race condition arises as follows:
- `ksmbd_conn_handler_loop()` waits for `conn-&gt;r_count` to reach zero:
  `wait_event(conn-&gt;r_count_q, atomic_read(&amp;conn-&gt;r_count) == 0);`
- Meanwhile, `handle_ksmbd_work()` decrements `conn-&gt;r_count` using
  `atomic_dec_return(&amp;conn-&gt;r_count)`, and if it reaches zero, calls
  `ksmbd_conn_free()`, which frees `conn`.
- However, after `handle_ksmbd_work()` decrements `conn-&gt;r_count`,
  it may still access `conn-&gt;r_count_q` in the following line:
  `waitqueue_active(&amp;conn-&gt;r_count_q)` or `wake_up(&amp;conn-&gt;r_count_q)`
  This results in a UAF, as `conn` has already been freed.

The discovery of this UAF can be referenced in the following PR for
syzkaller's support for SMB requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53186/">CVE-2024-53186 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53186">CVE-2024-53186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235457">SUSE bug 1235457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53187</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53187" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53187" ref_url="https://www.suse.com/security/cve/CVE-2024-53187" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check for overflows in io_pin_pages

WARNING: CPU: 0 PID: 5834 at io_uring/memmap.c:144 io_pin_pages+0x149/0x180 io_uring/memmap.c:144
CPU: 0 UID: 0 PID: 5834 Comm: syz-executor825 Not tainted 6.12.0-next-20241118-syzkaller #0
Call Trace:
 &lt;TASK&gt;
 __io_uaddr_map+0xfb/0x2d0 io_uring/memmap.c:183
 io_rings_map io_uring/io_uring.c:2611 [inline]
 io_allocate_scq_urings+0x1c0/0x650 io_uring/io_uring.c:3470
 io_uring_create+0x5b5/0xc00 io_uring/io_uring.c:3692
 io_uring_setup io_uring/io_uring.c:3781 [inline]
 ...
 &lt;/TASK&gt;

io_pin_pages()'s uaddr parameter came directly from the user and can be
garbage. Don't just add size to it as it can overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53187/">CVE-2024-53187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53187">CVE-2024-53187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234947">SUSE bug 1234947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53188</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53188" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53188" ref_url="https://www.suse.com/security/cve/CVE-2024-53188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix crash when unbinding

If there is an error during some initialization related to firmware,
the function ath12k_dp_cc_cleanup is called to release resources.
However this is released again when the device is unbinded (ath12k_pci),
and we get:
BUG: kernel NULL pointer dereference, address: 0000000000000020
at RIP: 0010:ath12k_dp_cc_cleanup.part.0+0xb6/0x500 [ath12k]
Call Trace:
ath12k_dp_cc_cleanup
ath12k_dp_free
ath12k_core_deinit
ath12k_pci_remove
...

The issue is always reproducible from a VM because the MSI addressing
initialization is failing.

In order to fix the issue, just set to NULL the released structure in
ath12k_dp_cc_cleanup at the end.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53188/">CVE-2024-53188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53188">CVE-2024-53188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234948">SUSE bug 1234948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53189</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53189" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53189" ref_url="https://www.suse.com/security/cve/CVE-2024-53189" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix bounds checker error in nl80211_parse_sched_scan

The channels array in the cfg80211_scan_request has a __counted_by
attribute attached to it, which points to the n_channels variable. This
attribute is used in bounds checking, and if it is not set before the
array is filled, then the bounds sanitizer will issue a warning or a
kernel panic if CONFIG_UBSAN_TRAP is set.

This patch sets the size of allocated memory as the initial value for
n_channels. It is updated with the actual number of added elements after
the array is filled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53189/">CVE-2024-53189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53189">CVE-2024-53189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234949">SUSE bug 1234949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53191" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53191" ref_url="https://www.suse.com/security/cve/CVE-2024-53191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix warning when unbinding

If there is an error during some initialization related to firmware,
the buffers dp-&gt;tx_ring[i].tx_status are released.
However this is released again when the device is unbinded (ath12k_pci),
and we get:
WARNING: CPU: 0 PID: 2098 at mm/slub.c:4689 free_large_kmalloc+0x4d/0x80
Call Trace:
free_large_kmalloc
ath12k_dp_free
ath12k_core_deinit
ath12k_pci_remove
...

The issue is always reproducible from a VM because the MSI addressing
initialization is failing.

In order to fix the issue, just set the buffers to NULL after releasing in
order to avoid the double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53191/">CVE-2024-53191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53191">CVE-2024-53191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234952">SUSE bug 1234952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53192</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53192" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53192" ref_url="https://www.suse.com/security/cve/CVE-2024-53192" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: clk-loongson2: Fix potential buffer overflow in flexible-array member access

Flexible-array member `hws` in `struct clk_hw_onecell_data` is annotated
with the `counted_by()` attribute. This means that when memory is
allocated for this array, the _counter_, which in this case is member
`num` in the flexible structure, should be set to the maximum number of
elements the flexible array can contain, or fewer.

In this case, the total number of elements for the flexible array is
determined by variable `clks_num` when allocating heap space via
`devm_kzalloc()`, as shown below:

289         struct loongson2_clk_provider *clp;
	...
296         for (p = data; p-&gt;name; p++)
297                 clks_num++;
298
299         clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num),
300                            GFP_KERNEL);

So, `clp-&gt;clk_data.num` should be set to `clks_num` or less, and not
exceed `clks_num`, as is currently the case. Otherwise, if data is
written into `clp-&gt;clk_data.hws[clks_num]`, the instrumentation
provided by the compiler won't detect the overflow, leading to a
memory corruption bug at runtime.

Fix this issue by setting `clp-&gt;clk_data.num` to `clks_num`.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53192/">CVE-2024-53192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53192">CVE-2024-53192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234956">SUSE bug 1234956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53193" ref_url="https://www.suse.com/security/cve/CVE-2024-53193" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: clk-loongson2: Fix memory corruption bug in struct loongson2_clk_provider

Some heap space is allocated for the flexible structure `struct
clk_hw_onecell_data` and its flexible-array member `hws` through
the composite structure `struct loongson2_clk_provider` in function
`loongson2_clk_probe()`, as shown below:

289         struct loongson2_clk_provider *clp;
	...
296         for (p = data; p-&gt;name; p++)
297                 clks_num++;
298
299         clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num),
300                            GFP_KERNEL);

Then some data is written into the flexible array:

350                 clp-&gt;clk_data.hws[p-&gt;id] = hw;

This corrupts `clk_lock`, which is the spinlock variable immediately
following the `clk_data` member in `struct loongson2_clk_provider`:

struct loongson2_clk_provider {
	void __iomem *base;
	struct device *dev;
	struct clk_hw_onecell_data clk_data;
	spinlock_t clk_lock;	/* protect access to DIV registers */
};

The problem is that the flexible structure is currently placed in the
middle of `struct loongson2_clk_provider` instead of at the end.

Fix this by moving `struct clk_hw_onecell_data clk_data;` to the end of
`struct loongson2_clk_provider`. Also, add a code comment to help
prevent this from happening again in case new members are added to the
structure in the future.

This change also fixes the following -Wflex-array-member-not-at-end
warning:

drivers/clk/clk-loongson2.c:32:36: warning: structure containing a flexible array member is not at the end of another structure [-Wflex-array-member-not-at-end]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53193/">CVE-2024-53193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53193">CVE-2024-53193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234902">SUSE bug 1234902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53194</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53194" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53194" ref_url="https://www.suse.com/security/cve/CVE-2024-53194" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix use-after-free of slot-&gt;bus on hot remove

Dennis reports a boot crash on recent Lenovo laptops with a USB4 dock.

Since commit 0fc70886569c ("thunderbolt: Reset USB4 v2 host router") and
commit 59a54c5f3dbd ("thunderbolt: Reset topology created by the boot
firmware"), USB4 v2 and v1 Host Routers are reset on probe of the
thunderbolt driver.

The reset clears the Presence Detect State and Data Link Layer Link Active
bits at the USB4 Host Router's Root Port and thus causes hot removal of the
dock.

The crash occurs when pciehp is unbound from one of the dock's Downstream
Ports:  pciehp creates a pci_slot on bind and destroys it on unbind.  The
pci_slot contains a pointer to the pci_bus below the Downstream Port, but
a reference on that pci_bus is never acquired.  The pci_bus is destroyed
before the pci_slot, so a use-after-free ensues when pci_slot_release()
accesses slot-&gt;bus.

In principle this should not happen because pci_stop_bus_device() unbinds
pciehp (and therefore destroys the pci_slot) before the pci_bus is
destroyed by pci_remove_bus_device().

However the stacktrace provided by Dennis shows that pciehp is unbound from
pci_remove_bus_device() instead of pci_stop_bus_device().  To understand
the significance of this, one needs to know that the PCI core uses a two
step process to remove a portion of the hierarchy:  It first unbinds all
drivers in the sub-hierarchy in pci_stop_bus_device() and then actually
removes the devices in pci_remove_bus_device().  There is no precaution to
prevent driver binding in-between pci_stop_bus_device() and
pci_remove_bus_device().

In Dennis' case, it seems removal of the hierarchy by pciehp races with
driver binding by pci_bus_add_devices().  pciehp is bound to the
Downstream Port after pci_stop_bus_device() has run, so it is unbound by
pci_remove_bus_device() instead of pci_stop_bus_device().  Because the
pci_bus has already been destroyed at that point, accesses to it result in
a use-after-free.

One might conclude that driver binding needs to be prevented after
pci_stop_bus_device() has run.  However it seems risky that pci_slot points
to pci_bus without holding a reference.  Solely relying on correct ordering
of driver unbind versus pci_bus destruction is certainly not defensive
programming.

If pci_slot has a need to access data in pci_bus, it ought to acquire a
reference.  Amend pci_create_slot() accordingly.  Dennis reports that the
crash is not reproducible with this change.

Abridged stacktrace:

  pcieport 0000:00:07.0: PME: Signaling with IRQ 156
  pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
  pci_bus 0000:20: dev 00, created physical slot 12
  pcieport 0000:00:07.0: pciehp: Slot(12): Card not present
  ...
  pcieport 0000:21:02.0: pciehp: pcie_disable_notification: SLOTCTRL d8 write cmd 0
  Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 13 UID: 0 PID: 134 Comm: irq/156-pciehp Not tainted 6.11.0-devel+ #1
  RIP: 0010:dev_driver_string+0x12/0x40
  pci_destroy_slot
  pciehp_remove
  pcie_port_remove_service
  device_release_driver_internal
  bus_remove_device
  device_del
  device_unregister
  remove_iter
  device_for_each_child
  pcie_portdrv_remove
  pci_device_remove
  device_release_driver_internal
  bus_remove_device
  device_del
  pci_remove_bus_device (recursive invocation)
  pci_remove_bus_device
  pciehp_unconfigure_device
  pciehp_disable_slot
  pciehp_handle_presence_or_link_change
  pciehp_ist
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53194/">CVE-2024-53194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53194">CVE-2024-53194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235459">SUSE bug 1235459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53195</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53195" ref_url="https://www.suse.com/security/cve/CVE-2024-53195" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Get rid of userspace_irqchip_in_use

Improper use of userspace_irqchip_in_use led to syzbot hitting the
following WARN_ON() in kvm_timer_update_irq():

WARNING: CPU: 0 PID: 3281 at arch/arm64/kvm/arch_timer.c:459
kvm_timer_update_irq+0x21c/0x394
Call trace:
  kvm_timer_update_irq+0x21c/0x394 arch/arm64/kvm/arch_timer.c:459
  kvm_timer_vcpu_reset+0x158/0x684 arch/arm64/kvm/arch_timer.c:968
  kvm_reset_vcpu+0x3b4/0x560 arch/arm64/kvm/reset.c:264
  kvm_vcpu_set_target arch/arm64/kvm/arm.c:1553 [inline]
  kvm_arch_vcpu_ioctl_vcpu_init arch/arm64/kvm/arm.c:1573 [inline]
  kvm_arch_vcpu_ioctl+0x112c/0x1b3c arch/arm64/kvm/arm.c:1695
  kvm_vcpu_ioctl+0x4ec/0xf74 virt/kvm/kvm_main.c:4658
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __arm64_sys_ioctl+0x108/0x184 fs/ioctl.c:893
  __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
  invoke_syscall+0x78/0x1b8 arch/arm64/kernel/syscall.c:49
  el0_svc_common+0xe8/0x1b0 arch/arm64/kernel/syscall.c:132
  do_el0_svc+0x40/0x50 arch/arm64/kernel/syscall.c:151
  el0_svc+0x54/0x14c arch/arm64/kernel/entry-common.c:712
  el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
  el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598

The following sequence led to the scenario:
 - Userspace creates a VM and a vCPU.
 - The vCPU is initialized with KVM_ARM_VCPU_PMU_V3 during
   KVM_ARM_VCPU_INIT.
 - Without any other setup, such as vGIC or vPMU, userspace issues
   KVM_RUN on the vCPU. Since the vPMU is requested, but not setup,
   kvm_arm_pmu_v3_enable() fails in kvm_arch_vcpu_run_pid_change().
   As a result, KVM_RUN returns after enabling the timer, but before
   incrementing 'userspace_irqchip_in_use':
   kvm_arch_vcpu_run_pid_change()
       ret = kvm_arm_pmu_v3_enable()
           if (!vcpu-&gt;arch.pmu.created)
               return -EINVAL;
       if (ret)
           return ret;
       [...]
       if (!irqchip_in_kernel(kvm))
           static_branch_inc(&amp;userspace_irqchip_in_use);
 - Userspace ignores the error and issues KVM_ARM_VCPU_INIT again.
   Since the timer is already enabled, control moves through the
   following flow, ultimately hitting the WARN_ON():
   kvm_timer_vcpu_reset()
       if (timer-&gt;enabled)
          kvm_timer_update_irq()
              if (!userspace_irqchip())
                  ret = kvm_vgic_inject_irq()
                      ret = vgic_lazy_init()
                          if (unlikely(!vgic_initialized(kvm)))
                              if (kvm-&gt;arch.vgic.vgic_model !=
                                  KVM_DEV_TYPE_ARM_VGIC_V2)
                                      return -EBUSY;
                  WARN_ON(ret);

Theoretically, since userspace_irqchip_in_use's functionality can be
simply replaced by '!irqchip_in_kernel()', get rid of the static key
to avoid the mismanagement, which also helps with the syzbot issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53195/">CVE-2024-53195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53195">CVE-2024-53195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234957">SUSE bug 1234957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53196</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53196" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53196" ref_url="https://www.suse.com/security/cve/CVE-2024-53196" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Don't retire aborted MMIO instruction

Returning an abort to the guest for an unsupported MMIO access is a
documented feature of the KVM UAPI. Nevertheless, it's clear that this
plumbing has seen limited testing, since userspace can trivially cause a
WARN in the MMIO return:

  WARNING: CPU: 0 PID: 30558 at arch/arm64/include/asm/kvm_emulate.h:536 kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536
  Call trace:
   kvm_handle_mmio_return+0x46c/0x5c4 arch/arm64/include/asm/kvm_emulate.h:536
   kvm_arch_vcpu_ioctl_run+0x98/0x15b4 arch/arm64/kvm/arm.c:1133
   kvm_vcpu_ioctl+0x75c/0xa78 virt/kvm/kvm_main.c:4487
   __do_sys_ioctl fs/ioctl.c:51 [inline]
   __se_sys_ioctl fs/ioctl.c:893 [inline]
   __arm64_sys_ioctl+0x14c/0x1c8 fs/ioctl.c:893
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x1e0/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x38/0x68 arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x90/0xfc arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598

The splat is complaining that KVM is advancing PC while an exception is
pending, i.e. that KVM is retiring the MMIO instruction despite a
pending synchronous external abort. Womp womp.

Fix the glaring UAPI bug by skipping over all the MMIO emulation in
case there is a pending synchronous exception. Note that while userspace
is capable of pending an asynchronous exception (SError, IRQ, or FIQ),
it is still safe to retire the MMIO instruction in this case as (1) they
are by definition asynchronous, and (2) KVM relies on hardware support
for pending/delivering these exceptions instead of the software state
machine for advancing PC.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53196/">CVE-2024-53196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53196">CVE-2024-53196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234906">SUSE bug 1234906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53197</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices

A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev-&gt;config.

This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235464">SUSE bug 1235464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53198</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53198" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53198" ref_url="https://www.suse.com/security/cve/CVE-2024-53198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen: Fix the issue of resource not being properly released in xenbus_dev_probe()

This patch fixes an issue in the function xenbus_dev_probe(). In the
xenbus_dev_probe() function, within the if (err) branch at line 313, the
program incorrectly returns err directly without releasing the resources
allocated by err = drv-&gt;probe(dev, id). As the return value is non-zero,
the upper layers assume the processing logic has failed. However, the probe
operation was performed earlier without a corresponding remove operation.
Since the probe actually allocates resources, failing to perform the remove
operation could lead to problems.

To fix this issue, we followed the resource release logic of the
xenbus_dev_remove() function by adding a new block fail_remove before the
fail_put block. After entering the branch if (err) at line 313, the
function will use a goto statement to jump to the fail_remove block,
ensuring that the previously acquired resources are correctly released,
thus preventing the reference count leak.

This bug was identified by an experimental static analysis tool developed
by our team. The tool specializes in analyzing reference count operations
and detecting potential issues where resources are not properly managed.
In this case, the tool flagged the missing release operation as a
potential problem, which led to the development of this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53198/">CVE-2024-53198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53198">CVE-2024-53198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234923">SUSE bug 1234923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53199</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53199" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53199" ref_url="https://www.suse.com/security/cve/CVE-2024-53199" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: imx-audmix: Add NULL check in imx_audmix_probe

devm_kasprintf() can return a NULL pointer on failure,but this
returned value in imx_audmix_probe() is not checked.
Add NULL check in imx_audmix_probe(), to handle kernel NULL
pointer dereference error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53199/">CVE-2024-53199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53199">CVE-2024-53199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234967">SUSE bug 1234967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53200</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53200" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53200" ref_url="https://www.suse.com/security/cve/CVE-2024-53200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in hwss_setup_dpp

This commit addresses a null pointer dereference issue in
hwss_setup_dpp(). The issue could occur when pipe_ctx-&gt;plane_state is
null. The fix adds a check to ensure `pipe_ctx-&gt;plane_state` is not null
before accessing. This prevents a null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53200/">CVE-2024-53200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53200">CVE-2024-53200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234968">SUSE bug 1234968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53201</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53201" ref_url="https://www.suse.com/security/cve/CVE-2024-53201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe

This commit addresses a null pointer dereference issue in
dcn20_program_pipe(). Previously, commit 8e4ed3cf1642 ("drm/amd/display:
Add null check for pipe_ctx-&gt;plane_state in dcn20_program_pipe")
partially fixed the null pointer dereference issue. However, in
dcn20_update_dchubp_dpp(), the variable pipe_ctx is passed in, and
plane_state is accessed again through pipe_ctx. Multiple if statements
directly call attributes of plane_state, leading to potential null
pointer dereference issues. This patch adds necessary null checks to
ensure stability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53201/">CVE-2024-53201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53201">CVE-2024-53201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234969">SUSE bug 1234969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53202</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53202" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53202" ref_url="https://www.suse.com/security/cve/CVE-2024-53202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Fix possible resource leak in fw_log_firmware_info()

The alg instance should be released under the exception path, otherwise
there may be resource leak here.

To mitigate this, free the alg instance with crypto_free_shash when kmalloc
fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53202/">CVE-2024-53202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53202">CVE-2024-53202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234970">SUSE bug 1234970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53203</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53203" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53203" ref_url="https://www.suse.com/security/cve/CVE-2024-53203" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential array underflow in ucsi_ccg_sync_control()

The "command" variable can be controlled by the user via debugfs.  The
worry is that if con_index is zero then "&amp;uc-&gt;ucsi-&gt;connector[con_index
- 1]" would be an array underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53203/">CVE-2024-53203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53203">CVE-2024-53203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235001">SUSE bug 1235001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53204</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53204" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53204" ref_url="https://www.suse.com/security/cve/CVE-2024-53204" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: realtek: usb: fix NULL deref in rtk_usb3phy_probe

In rtk_usb3phy_probe() devm_kzalloc() may return NULL
but this returned value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53204/">CVE-2024-53204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53204">CVE-2024-53204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234955">SUSE bug 1234955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53205</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53205" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53205" ref_url="https://www.suse.com/security/cve/CVE-2024-53205" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: realtek: usb: fix NULL deref in rtk_usb2phy_probe

In rtk_usb2phy_probe() devm_kzalloc() may return NULL
but this returned value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53205/">CVE-2024-53205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53205">CVE-2024-53205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234954">SUSE bug 1234954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53206</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53206" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53206" ref_url="https://www.suse.com/security/cve/CVE-2024-53206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix use-after-free of nreq in reqsk_timer_handler().

The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with
__inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().

Then, oreq should be passed to reqsk_put() instead of req; otherwise
use-after-free of nreq could happen when reqsk is migrated but the
retry attempt failed (e.g. due to timeout).

Let's pass oreq to reqsk_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53206/">CVE-2024-53206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53206">CVE-2024-53206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234960">SUSE bug 1234960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53207</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53207" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53207" ref_url="https://www.suse.com/security/cve/CVE-2024-53207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible deadlocks

This fixes possible deadlocks like the following caused by
hci_cmd_sync_dequeue causing the destroy function to run:

 INFO: task kworker/u19:0:143 blocked for more than 120 seconds.
       Tainted: G        W  O        6.8.0-2024-03-19-intel-next-iLS-24ww14 #1
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:kworker/u19:0   state:D stack:0     pid:143   tgid:143   ppid:2      flags:0x00004000
 Workqueue: hci0 hci_cmd_sync_work [bluetooth]
 Call Trace:
  &lt;TASK&gt;
  __schedule+0x374/0xaf0
  schedule+0x3c/0xf0
  schedule_preempt_disabled+0x1c/0x30
  __mutex_lock.constprop.0+0x3ef/0x7a0
  __mutex_lock_slowpath+0x13/0x20
  mutex_lock+0x3c/0x50
  mgmt_set_connectable_complete+0xa4/0x150 [bluetooth]
  ? kfree+0x211/0x2a0
  hci_cmd_sync_dequeue+0xae/0x130 [bluetooth]
  ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth]
  cmd_complete_rsp+0x26/0x80 [bluetooth]
  mgmt_pending_foreach+0x4d/0x70 [bluetooth]
  __mgmt_power_off+0x8d/0x180 [bluetooth]
  ? _raw_spin_unlock_irq+0x23/0x40
  hci_dev_close_sync+0x445/0x5b0 [bluetooth]
  hci_set_powered_sync+0x149/0x250 [bluetooth]
  set_powered_sync+0x24/0x60 [bluetooth]
  hci_cmd_sync_work+0x90/0x150 [bluetooth]
  process_one_work+0x13e/0x300
  worker_thread+0x2f7/0x420
  ? __pfx_worker_thread+0x10/0x10
  kthread+0x107/0x140
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x3d/0x60
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1b/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53207/">CVE-2024-53207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53207">CVE-2024-53207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234907">SUSE bug 1234907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53208</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53208" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53208" ref_url="https://www.suse.com/security/cve/CVE-2024-53208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync

This fixes the following crash:

==================================================================
BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54

CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
q kasan_report+0x143/0x180 mm/kasan/report.c:601
 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd10 kernel/workqueue.c:3389
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;

Allocated by task 5247:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
 kasan_kmalloc include/linux/kasan.h:211 [inline]
 __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4193
 kmalloc_noprof include/linux/slab.h:681 [inline]
 kzalloc_noprof include/linux/slab.h:807 [inline]
 mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296
 set_powered+0x3cd/0x5e0 net/bluetooth/mgmt.c:1394
 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:745
 sock_write_iter+0x2dd/0x400 net/socket.c:1160
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0xa72/0xc90 fs/read_write.c:590
 ksys_write+0x1a0/0x2c0 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5246:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x149/0x360 mm/slub.c:4598
 settings_rsp+0x2bc/0x390 net/bluetooth/mgmt.c:1443
 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259
 __mgmt_power_off+0x112/0x420 net/bluetooth/mgmt.c:9455
 hci_dev_close_sync+0x665/0x11a0 net/bluetooth/hci_sync.c:5191
 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]
 hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508
 sock_do_ioctl+0x158/0x460 net/socket.c:1222
 sock_ioctl+0x629/0x8e0 net/socket.c:1341
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83gv
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53208/">CVE-2024-53208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53208">CVE-2024-53208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234909">SUSE bug 1234909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236244">SUSE bug 1236244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53209</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53209" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53209" ref_url="https://www.suse.com/security/cve/CVE-2024-53209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix receive ring space parameters when XDP is active

The MTU setting at the time an XDP multi-buffer is attached
determines whether the aggregation ring will be used and the
rx_skb_func handler.  This is done in bnxt_set_rx_skb_mode().

If the MTU is later changed, the aggregation ring setting may need
to be changed and it may become out-of-sync with the settings
initially done in bnxt_set_rx_skb_mode().  This may result in
random memory corruption and crashes as the HW may DMA data larger
than the allocated buffer size, such as:

BUG: kernel NULL pointer dereference, address: 00000000000003c0
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 17 PID: 0 Comm: swapper/17 Kdump: loaded Tainted: G S         OE      6.1.0-226bf9805506 #1
Hardware name: Wiwynn Delta Lake PVT BZA.02601.0150/Delta Lake-Class1, BIOS F0E_3A12 08/26/2021
RIP: 0010:bnxt_rx_pkt+0xe97/0x1ae0 [bnxt_en]
Code: 8b 95 70 ff ff ff 4c 8b 9d 48 ff ff ff 66 41 89 87 b4 00 00 00 e9 0b f7 ff ff 0f b7 43 0a 49 8b 95 a8 04 00 00 25 ff 0f 00 00 &lt;0f&gt; b7 14 42 48 c1 e2 06 49 03 95 a0 04 00 00 0f b6 42 33f
RSP: 0018:ffffa19f40cc0d18 EFLAGS: 00010202
RAX: 00000000000001e0 RBX: ffff8e2c805c6100 RCX: 00000000000007ff
RDX: 0000000000000000 RSI: ffff8e2c271ab990 RDI: ffff8e2c84f12380
RBP: ffffa19f40cc0e48 R08: 000000000001000d R09: 974ea2fcddfa4cbf
R10: 0000000000000000 R11: ffffa19f40cc0ff8 R12: ffff8e2c94b58980
R13: ffff8e2c952d6600 R14: 0000000000000016 R15: ffff8e2c271ab990
FS:  0000000000000000(0000) GS:ffff8e3b3f840000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000003c0 CR3: 0000000e8580a004 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 __bnxt_poll_work+0x1c2/0x3e0 [bnxt_en]

To address the issue, we now call bnxt_set_rx_skb_mode() within
bnxt_change_mtu() to properly set the AGG rings configuration and
update rx_skb_func based on the new MTU value.
Additionally, BNXT_FLAG_NO_AGG_RINGS is cleared at the beginning of
bnxt_set_rx_skb_mode() to make sure it gets set or cleared based on
the current MTU.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53209/">CVE-2024-53209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53209">CVE-2024-53209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235002">SUSE bug 1235002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53210</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53210" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53210" ref_url="https://www.suse.com/security/cve/CVE-2024-53210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()

Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount
(skb-&gt;users) and iucv_sock_recvmsg() does not decrement skb refcount
at exit.
This results in skb memory leak in skb_queue_purge() and WARN_ON in
iucv_sock_destruct() during socket close. To fix this decrease
skb refcount by one if MSG_PEEK is set in order to prevent memory
leak and WARN_ON.

WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv]
CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G        W          6.10.0-rc7 #1
Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)
Call Trace:
        [&lt;001587c682c4aa98&gt;] iucv_sock_destruct+0x148/0x1a0 [af_iucv]
        [&lt;001587c682c4a9d0&gt;] iucv_sock_destruct+0x80/0x1a0 [af_iucv]
        [&lt;001587c704117a32&gt;] __sk_destruct+0x52/0x550
        [&lt;001587c704104a54&gt;] __sock_release+0xa4/0x230
        [&lt;001587c704104c0c&gt;] sock_close+0x2c/0x40
        [&lt;001587c702c5f5a8&gt;] __fput+0x2e8/0x970
        [&lt;001587c7024148c4&gt;] task_work_run+0x1c4/0x2c0
        [&lt;001587c7023b0716&gt;] do_exit+0x996/0x1050
        [&lt;001587c7023b13aa&gt;] do_group_exit+0x13a/0x360
        [&lt;001587c7023b1626&gt;] __s390x_sys_exit_group+0x56/0x60
        [&lt;001587c7022bccca&gt;] do_syscall+0x27a/0x380
        [&lt;001587c7049a6a0c&gt;] __do_syscall+0x9c/0x160
        [&lt;001587c7049ce8a8&gt;] system_call+0x70/0x98
        Last Breaking-Event-Address:
        [&lt;001587c682c4a9d4&gt;] iucv_sock_destruct+0x84/0x1a0 [af_iucv]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53210/">CVE-2024-53210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53210">CVE-2024-53210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234971">SUSE bug 1234971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53211</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53211" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53211" ref_url="https://www.suse.com/security/cve/CVE-2024-53211" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/l2tp: fix warning in l2tp_exit_net found by syzbot

In l2tp's net exit handler, we check that an IDR is empty before
destroying it:

	WARN_ON_ONCE(!idr_is_empty(&amp;pn-&gt;l2tp_tunnel_idr));
	idr_destroy(&amp;pn-&gt;l2tp_tunnel_idr);

By forcing memory allocation failures in idr_alloc_32, syzbot is able
to provoke a condition where idr_is_empty returns false despite there
being no items in the IDR. This turns out to be because the radix tree
of the IDR contains only internal radix-tree nodes and it is this that
causes idr_is_empty to return false. The internal nodes are cleaned by
idr_destroy.

Use idr_for_each to check that the IDR is empty instead of
idr_is_empty to avoid the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53211/">CVE-2024-53211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53211">CVE-2024-53211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234961">SUSE bug 1234961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53212</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53212" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53212" ref_url="https://www.suse.com/security/cve/CVE-2024-53212" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: fix false positive warning in extack during dumps

Commit under fixes extended extack reporting to dumps.
It works under normal conditions, because extack errors are
usually reported during -&gt;start() or the first -&gt;dump(),
it's quite rare that the dump starts okay but fails later.
If the dump does fail later, however, the input skb will
already have the initiating message pulled, so checking
if bad attr falls within skb-&gt;data will fail.

Switch the check to using nlh, which is always valid.

syzbot found a way to hit that scenario by filling up
the receive queue. In this case we initiate a dump
but don't call -&gt;dump() until there is read space for
an skb.

WARNING: CPU: 1 PID: 5845 at net/netlink/af_netlink.c:2210 netlink_ack_tlv_fill+0x1a8/0x560 net/netlink/af_netlink.c:2209
RIP: 0010:netlink_ack_tlv_fill+0x1a8/0x560 net/netlink/af_netlink.c:2209
Call Trace:
 &lt;TASK&gt;
 netlink_dump_done+0x513/0x970 net/netlink/af_netlink.c:2250
 netlink_dump+0x91f/0xe10 net/netlink/af_netlink.c:2351
 netlink_recvmsg+0x6bb/0x11d0 net/netlink/af_netlink.c:1983
 sock_recvmsg_nosec net/socket.c:1051 [inline]
 sock_recvmsg+0x22f/0x280 net/socket.c:1073
 __sys_recvfrom+0x246/0x3d0 net/socket.c:2267
 __do_sys_recvfrom net/socket.c:2285 [inline]
 __se_sys_recvfrom net/socket.c:2281 [inline]
 __x64_sys_recvfrom+0xde/0x100 net/socket.c:2281
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 RIP: 0033:0x7ff37dd17a79
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53212/">CVE-2024-53212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53212">CVE-2024-53212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234972">SUSE bug 1234972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53213</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53213" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53213" ref_url="https://www.suse.com/security/cve/CVE-2024-53213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: lan78xx: Fix double free issue with interrupt buffer allocation

In lan78xx_probe(), the buffer `buf` was being freed twice: once
implicitly through `usb_free_urb(dev-&gt;urb_intr)` with the
`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused
a double free issue.

To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to
simplify the initialization sequence and removed the redundant
`kfree(buf)`.  Now, `buf` is allocated after `usb_alloc_urb()`, ensuring
it is correctly managed by  `usb_fill_int_urb()` and freed by
`usb_free_urb()` as intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53213/">CVE-2024-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53213">CVE-2024-53213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234973">SUSE bug 1234973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53214</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53214" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53214" ref_url="https://www.suse.com/security/cve/CVE-2024-53214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Properly hide first-in-list PCIe extended capability

There are cases where a PCIe extended capability should be hidden from
the user. For example, an unknown capability (i.e., capability with ID
greater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally
chosen to be hidden from the user.

Hiding a capability is done by virtualizing and modifying the 'Next
Capability Offset' field of the previous capability so it points to the
capability after the one that should be hidden.

The special case where the first capability in the list should be hidden
is handled differently because there is no previous capability that can
be modified. In this case, the capability ID and version are zeroed
while leaving the next pointer intact. This hides the capability and
leaves an anchor for the rest of the capability list.

However, today, hiding the first capability in the list is not done
properly if the capability is unknown, as struct
vfio_pci_core_device-&gt;pci_config_map is set to the capability ID during
initialization but the capability ID is not properly checked later when
used in vfio_config_do_rw(). This leads to the following warning [1] and
to an out-of-bounds access to ecap_perms array.

Fix it by checking cap_id in vfio_config_do_rw(), and if it is greater
than PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct
read only access instead of the ecap_perms array.

Note that this is safe since the above is the only case where cap_id can
exceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which
are already checked before).

[1]

WARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
CPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1
(snip)
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x69/0x80
 ? __warn+0x8d/0x140
 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
 ? report_bug+0x18f/0x1a0
 ? handle_bug+0x63/0xa0
 ? exc_invalid_op+0x19/0x70
 ? asm_exc_invalid_op+0x1b/0x20
 ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]
 ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]
 vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]
 vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]
 vfio_device_fops_read+0x27/0x40 [vfio]
 vfs_read+0xbd/0x340
 ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]
 ? __rseq_handle_notify_resume+0xa4/0x4b0
 __x64_sys_pread64+0x96/0xc0
 x64_sys_call+0x1c3d/0x20d0
 do_syscall_64+0x4d/0x120
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53214/">CVE-2024-53214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53214">CVE-2024-53214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235004">SUSE bug 1235004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235005">SUSE bug 1235005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53215</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53215" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53215" ref_url="https://www.suse.com/security/cve/CVE-2024-53215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()

There's issue as follows:
RPC: Registered rdma transport module.
RPC: Registered rdma backchannel transport module.
RPC: Unregistered rdma transport module.
RPC: Unregistered rdma backchannel transport module.
BUG: unable to handle page fault for address: fffffbfff80c609a
PGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
RIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0
Call Trace:
 &lt;TASK&gt;
 __die+0x1f/0x70
 page_fault_oops+0x2cd/0x860
 spurious_kernel_fault+0x36/0x450
 do_kern_addr_fault+0xca/0x100
 exc_page_fault+0x128/0x150
 asm_exc_page_fault+0x26/0x30
 percpu_counter_destroy_many+0xf7/0x2a0
 mmdrop+0x209/0x350
 finish_task_switch.isra.0+0x481/0x840
 schedule_tail+0xe/0xd0
 ret_from_fork+0x23/0x80
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

If register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not
destroy the percpu counters which init in svc_rdma_proc_init().
If CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the
'percpu_counters' list. The above issue may occur once the module is
removed. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory
leakage occurs.
To solve above issue just destroy all percpu counters when
register_sysctl() return NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53215/">CVE-2024-53215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53215">CVE-2024-53215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234962">SUSE bug 1234962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53216</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53216" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53216" ref_url="https://www.suse.com/security/cve/CVE-2024-53216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: release svc_expkey/svc_export with rcu_work

The last reference for `cache_head` can be reduced to zero in `c_show`
and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). Consequently,
`svc_export_put` and `expkey_put` will be invoked, leading to two
issues:

1. The `svc_export_put` will directly free ex_uuid. However,
   `e_show`/`c_show` will access `ex_uuid` after `cache_put`, which can
   trigger a use-after-free issue, shown below.

   ==================================================================
   BUG: KASAN: slab-use-after-free in svc_export_show+0x362/0x430 [nfsd]
   Read of size 1 at addr ff11000010fdc120 by task cat/870

   CPU: 1 UID: 0 PID: 870 Comm: cat Not tainted 6.12.0-rc3+ #1
   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
   1.16.1-2.fc37 04/01/2014
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x53/0x70
    print_address_description.constprop.0+0x2c/0x3a0
    print_report+0xb9/0x280
    kasan_report+0xae/0xe0
    svc_export_show+0x362/0x430 [nfsd]
    c_show+0x161/0x390 [sunrpc]
    seq_read_iter+0x589/0x770
    seq_read+0x1e5/0x270
    proc_reg_read+0xe1/0x140
    vfs_read+0x125/0x530
    ksys_read+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

   Allocated by task 830:
    kasan_save_stack+0x20/0x40
    kasan_save_track+0x14/0x30
    __kasan_kmalloc+0x8f/0xa0
    __kmalloc_node_track_caller_noprof+0x1bc/0x400
    kmemdup_noprof+0x22/0x50
    svc_export_parse+0x8a9/0xb80 [nfsd]
    cache_do_downcall+0x71/0xa0 [sunrpc]
    cache_write_procfs+0x8e/0xd0 [sunrpc]
    proc_reg_write+0xe1/0x140
    vfs_write+0x1a5/0x6d0
    ksys_write+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

   Freed by task 868:
    kasan_save_stack+0x20/0x40
    kasan_save_track+0x14/0x30
    kasan_save_free_info+0x3b/0x60
    __kasan_slab_free+0x37/0x50
    kfree+0xf3/0x3e0
    svc_export_put+0x87/0xb0 [nfsd]
    cache_purge+0x17f/0x1f0 [sunrpc]
    nfsd_destroy_serv+0x226/0x2d0 [nfsd]
    nfsd_svc+0x125/0x1e0 [nfsd]
    write_threads+0x16a/0x2a0 [nfsd]
    nfsctl_transaction_write+0x74/0xa0 [nfsd]
    vfs_write+0x1a5/0x6d0
    ksys_write+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

2. We cannot sleep while using `rcu_read_lock`/`rcu_read_unlock`.
   However, `svc_export_put`/`expkey_put` will call path_put, which
   subsequently triggers a sleeping operation due to the following
   `dput`.

   =============================
   WARNING: suspicious RCU usage
   5.10.0-dirty #141 Not tainted
   -----------------------------
   ...
   Call Trace:
   dump_stack+0x9a/0xd0
   ___might_sleep+0x231/0x240
   dput+0x39/0x600
   path_put+0x1b/0x30
   svc_export_put+0x17/0x80
   e_show+0x1c9/0x200
   seq_read_iter+0x63f/0x7c0
   seq_read+0x226/0x2d0
   vfs_read+0x113/0x2c0
   ksys_read+0xc9/0x170
   do_syscall_64+0x33/0x40
   entry_SYSCALL_64_after_hwframe+0x67/0xd1

Fix these issues by using `rcu_work` to help release
`svc_expkey`/`svc_export`. This approach allows for an asynchronous
context to invoke `path_put` and also facilitates the freeing of
`uuid/exp/key` after an RCU grace period.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53216/">CVE-2024-53216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53216">CVE-2024-53216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235003">SUSE bug 1235003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53217</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53217" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53217" ref_url="https://www.suse.com/security/cve/CVE-2024-53217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent NULL dereference in nfsd4_process_cb_update()

@ses is initialized to NULL. If __nfsd4_find_backchannel() finds no
available backchannel session, setup_callback_client() will try to
dereference @ses and segfault.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53217/">CVE-2024-53217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53217">CVE-2024-53217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234999">SUSE bug 1234999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53218</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53218" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53218" ref_url="https://www.suse.com/security/cve/CVE-2024-53218" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix race in concurrent f2fs_stop_gc_thread

In my test case, concurrent calls to f2fs shutdown report the following
stack trace:

 Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI
 CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x8b/0xa0
  ? __die_body+0x26/0xa0
  ? die_addr+0x54/0x90
  ? exc_general_protection+0x24b/0x5c0
  ? asm_exc_general_protection+0x26/0x30
  ? kthread_stop+0x46/0x390
  f2fs_stop_gc_thread+0x6c/0x110
  f2fs_do_shutdown+0x309/0x3a0
  f2fs_ioc_shutdown+0x150/0x1c0
  __f2fs_ioctl+0xffd/0x2ac0
  f2fs_ioctl+0x76/0xe0
  vfs_ioctl+0x23/0x60
  __x64_sys_ioctl+0xce/0xf0
  x64_sys_call+0x2b1b/0x4540
  do_syscall_64+0xa7/0x240
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

The root cause is a race condition in f2fs_stop_gc_thread() called from
different f2fs shutdown paths:

  [CPU0]                       [CPU1]
  ----------------------       -----------------------
  f2fs_stop_gc_thread          f2fs_stop_gc_thread
                                 gc_th = sbi-&gt;gc_thread
    gc_th = sbi-&gt;gc_thread
    kfree(gc_th)
    sbi-&gt;gc_thread = NULL
                                 &lt; gc_th != NULL &gt;
                                 kthread_stop(gc_th-&gt;f2fs_gc_task) //UAF

The commit c7f114d864ac ("f2fs: fix to avoid use-after-free in
f2fs_stop_gc_thread()") attempted to fix this issue by using a read
semaphore to prevent races between shutdown and remount threads, but
it fails to prevent all race conditions.

Fix it by converting to write lock of s_umount in f2fs_do_shutdown().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53218/">CVE-2024-53218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53218">CVE-2024-53218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234966">SUSE bug 1234966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53219</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53219" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53219" ref_url="https://www.suse.com/security/cve/CVE-2024-53219" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtiofs: use pages instead of pointer for kernel direct IO

When trying to insert a 10MB kernel module kept in a virtio-fs with cache
disabled, the following warning was reported:

  ------------[ cut here ]------------
  WARNING: CPU: 1 PID: 404 at mm/page_alloc.c:4551 ......
  Modules linked in:
  CPU: 1 PID: 404 Comm: insmod Not tainted 6.9.0-rc5+ #123
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......
  RIP: 0010:__alloc_pages+0x2bf/0x380
  ......
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0x8e/0x150
   ? __alloc_pages+0x2bf/0x380
   __kmalloc_large_node+0x86/0x160
   __kmalloc+0x33c/0x480
   virtio_fs_enqueue_req+0x240/0x6d0
   virtio_fs_wake_pending_and_unlock+0x7f/0x190
   queue_request_and_unlock+0x55/0x60
   fuse_simple_request+0x152/0x2b0
   fuse_direct_io+0x5d2/0x8c0
   fuse_file_read_iter+0x121/0x160
   __kernel_read+0x151/0x2d0
   kernel_read+0x45/0x50
   kernel_read_file+0x1a9/0x2a0
   init_module_from_file+0x6a/0xe0
   idempotent_init_module+0x175/0x230
   __x64_sys_finit_module+0x5d/0xb0
   x64_sys_call+0x1c3/0x9e0
   do_syscall_64+0x3d/0xc0
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   ......
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

The warning is triggered as follows:

1) syscall finit_module() handles the module insertion and it invokes
kernel_read_file() to read the content of the module first.

2) kernel_read_file() allocates a 10MB buffer by using vmalloc() and
passes it to kernel_read(). kernel_read() constructs a kvec iter by
using iov_iter_kvec() and passes it to fuse_file_read_iter().

3) virtio-fs disables the cache, so fuse_file_read_iter() invokes
fuse_direct_io(). As for now, the maximal read size for kvec iter is
only limited by fc-&gt;max_read. For virtio-fs, max_read is UINT_MAX, so
fuse_direct_io() doesn't split the 10MB buffer. It saves the address and
the size of the 10MB-sized buffer in out_args[0] of a fuse request and
passes the fuse request to virtio_fs_wake_pending_and_unlock().

4) virtio_fs_wake_pending_and_unlock() uses virtio_fs_enqueue_req() to
queue the request. Because virtiofs need DMA-able address, so
virtio_fs_enqueue_req() uses kmalloc() to allocate a bounce buffer for
all fuse args, copies these args into the bounce buffer and passed the
physical address of the bounce buffer to virtiofsd. The total length of
these fuse args for the passed fuse request is about 10MB, so
copy_args_to_argbuf() invokes kmalloc() with a 10MB size parameter and
it triggers the warning in __alloc_pages():

	if (WARN_ON_ONCE_GFP(order &gt; MAX_PAGE_ORDER, gfp))
		return NULL;

5) virtio_fs_enqueue_req() will retry the memory allocation in a
kworker, but it won't help, because kmalloc() will always return NULL
due to the abnormal size and finit_module() will hang forever.

A feasible solution is to limit the value of max_read for virtio-fs, so
the length passed to kmalloc() will be limited. However it will affect
the maximal read size for normal read. And for virtio-fs write initiated
from kernel, it has the similar problem but now there is no way to limit
fc-&gt;max_write in kernel.

So instead of limiting both the values of max_read and max_write in
kernel, introducing use_pages_for_kvec_io in fuse_conn and setting it as
true in virtiofs. When use_pages_for_kvec_io is enabled, fuse will use
pages instead of pointer to pass the KVEC_IO data.

After switching to pages for KVEC_IO data, these pages will be used for
DMA through virtio-fs. If these pages are backed by vmalloc(),
{flush|invalidate}_kernel_vmap_range() are necessary to flush or
invalidate the cache before the DMA operation. So add two new fields in
fuse_args_pages to record the base address of vmalloc area and the
condition indicating whether invalidation is needed. Perform the flush
in fuse_get_user_pages() for write operations and the invalidation in
fuse_release_user_pages() for read operations.

It may seem necessary to introduce another fie
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53219/">CVE-2024-53219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53219">CVE-2024-53219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235010">SUSE bug 1235010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53220</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53220" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53220" ref_url="https://www.suse.com/security/cve/CVE-2024-53220" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to account dirty data in __get_secs_required()

It will trigger system panic w/ testcase in [1]:

------------[ cut here ]------------
kernel BUG at fs/f2fs/segment.c:2752!
RIP: 0010:new_curseg+0xc81/0x2110
Call Trace:
 f2fs_allocate_data_block+0x1c91/0x4540
 do_write_page+0x163/0xdf0
 f2fs_outplace_write_data+0x1aa/0x340
 f2fs_do_write_data_page+0x797/0x2280
 f2fs_write_single_data_page+0x16cd/0x2190
 f2fs_write_cache_pages+0x994/0x1c80
 f2fs_write_data_pages+0x9cc/0xea0
 do_writepages+0x194/0x7a0
 filemap_fdatawrite_wbc+0x12b/0x1a0
 __filemap_fdatawrite_range+0xbb/0xf0
 file_write_and_wait_range+0xa1/0x110
 f2fs_do_sync_file+0x26f/0x1c50
 f2fs_sync_file+0x12b/0x1d0
 vfs_fsync_range+0xfa/0x230
 do_fsync+0x3d/0x80
 __x64_sys_fsync+0x37/0x50
 x64_sys_call+0x1e88/0x20d0
 do_syscall_64+0x4b/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

The root cause is if checkpoint_disabling and lfs_mode are both on,
it will trigger OPU for all overwritten data, it may cost more free
segment than expected, so f2fs must account those data correctly to
calculate cosumed free segments later, and return ENOSPC earlier to
avoid run out of free segment during block allocation.

[1] https://lore.kernel.org/fstests/20241015025106.3203676-1-chao@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53220/">CVE-2024-53220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53220">CVE-2024-53220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234975">SUSE bug 1234975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53221</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53221" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53221" ref_url="https://www.suse.com/security/cve/CVE-2024-53221" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix null-ptr-deref in f2fs_submit_page_bio()

There's issue as follows when concurrently installing the f2fs.ko
module and mounting the f2fs file system:
KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
RIP: 0010:__bio_alloc+0x2fb/0x6c0 [f2fs]
Call Trace:
 &lt;TASK&gt;
 f2fs_submit_page_bio+0x126/0x8b0 [f2fs]
 __get_meta_page+0x1d4/0x920 [f2fs]
 get_checkpoint_version.constprop.0+0x2b/0x3c0 [f2fs]
 validate_checkpoint+0xac/0x290 [f2fs]
 f2fs_get_valid_checkpoint+0x207/0x950 [f2fs]
 f2fs_fill_super+0x1007/0x39b0 [f2fs]
 mount_bdev+0x183/0x250
 legacy_get_tree+0xf4/0x1e0
 vfs_get_tree+0x88/0x340
 do_new_mount+0x283/0x5e0
 path_mount+0x2b2/0x15b0
 __x64_sys_mount+0x1fe/0x270
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Above issue happens as the biset of the f2fs file system is not
initialized before register "f2fs_fs_type".
To address above issue just register "f2fs_fs_type" at the last in
init_f2fs_fs(). Ensure that all f2fs file system resources are
initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53221/">CVE-2024-53221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53221">CVE-2024-53221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234903">SUSE bug 1234903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53222</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53222" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53222" ref_url="https://www.suse.com/security/cve/CVE-2024-53222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

zram: fix NULL pointer in comp_algorithm_show()

LTP reported a NULL pointer dereference as followed:

 CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: loaded Not tainted 6.12.0-rc6+ #3
 Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __pi_strcmp+0x24/0x140
 lr : zcomp_available_show+0x60/0x100 [zram]
 sp : ffff800088b93b90
 x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0
 x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 0000000000000000
 x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900
 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000
 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000000 x10: ffff80007b3e2900 x9 : ffff80007b3cb280
 x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
 x5 : 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c
 x2 : 0000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000
 Call trace:
  __pi_strcmp+0x24/0x140
  comp_algorithm_show+0x40/0x70 [zram]
  dev_attr_show+0x28/0x80
  sysfs_kf_seq_show+0x90/0x140
  kernfs_seq_show+0x34/0x48
  seq_read_iter+0x1d4/0x4e8
  kernfs_fop_read_iter+0x40/0x58
  new_sync_read+0x9c/0x168
  vfs_read+0x1a8/0x1f8
  ksys_read+0x74/0x108
  __arm64_sys_read+0x24/0x38
  invoke_syscall+0x50/0x120
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x38/0x138
  el0t_64_sync_handler+0xc0/0xc8
  el0t_64_sync+0x188/0x190

The zram-&gt;comp_algs[ZRAM_PRIMARY_COMP] can be NULL in zram_add() if
comp_algorithm_set() has not been called.  User can access the zram device
by sysfs after device_add_disk(), so there is a time window to trigger the
NULL pointer dereference.  Move it ahead device_add_disk() to make sure
when user can access the zram device, it is ready.  comp_algorithm_set()
is protected by zram-&gt;init_lock in other places and no such problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53222/">CVE-2024-53222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53222">CVE-2024-53222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234974">SUSE bug 1234974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53223</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53223" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53223" ref_url="https://www.suse.com/security/cve/CVE-2024-53223" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: ralink: mtmips: fix clocks probe order in oldest ralink SoCs

Base clocks are the first in being probed and are real dependencies of the
rest of fixed, factor and peripheral clocks. For old ralink SoCs RT2880,
RT305x and RT3883 'xtal' must be defined first since in any other case,
when fixed clocks are probed they are delayed until 'xtal' is probed so the
following warning appears:

 WARNING: CPU: 0 PID: 0 at drivers/clk/ralink/clk-mtmips.c:499 rt3883_bus_recalc_rate+0x98/0x138
 Modules linked in:
 CPU: 0 PID: 0 Comm: swapper Not tainted 6.6.43 #0
 Stack : 805e58d0 00000000 00000004 8004f950 00000000 00000004 00000000 00000000
 80669c54 80830000 80700000 805ae570 80670068 00000001 80669bf8 00000000
 00000000 00000000 805ae570 80669b38 00000020 804db7dc 00000000 00000000
 203a6d6d 80669b78 80669e48 70617773 00000000 805ae570 00000000 00000009
 00000000 00000001 00000004 00000001 00000000 00000000 83fe43b0 00000000
 ...
 Call Trace:
 [&lt;800065d0&gt;] show_stack+0x64/0xf4
 [&lt;804bca14&gt;] dump_stack_lvl+0x38/0x60
 [&lt;800218ac&gt;] __warn+0x94/0xe4
 [&lt;8002195c&gt;] warn_slowpath_fmt+0x60/0x94
 [&lt;80259ff8&gt;] rt3883_bus_recalc_rate+0x98/0x138
 [&lt;80254530&gt;] __clk_register+0x568/0x688
 [&lt;80254838&gt;] of_clk_hw_register+0x18/0x2c
 [&lt;8070b910&gt;] rt2880_clk_of_clk_init_driver+0x18c/0x594
 [&lt;8070b628&gt;] of_clk_init+0x1c0/0x23c
 [&lt;806fc448&gt;] plat_time_init+0x58/0x18c
 [&lt;806fdaf0&gt;] time_init+0x10/0x6c
 [&lt;806f9bc4&gt;] start_kernel+0x458/0x67c

 ---[ end trace 0000000000000000 ]---

When this driver was mainlined we could not find any active users of old
ralink SoCs so we cannot perform any real tests for them. Now, one user
of a Belkin f9k1109 version 1 device which uses RT3883 SoC appeared and
reported some issues in openWRT:
- https://github.com/openwrt/openwrt/issues/16054

Thus, define a 'rt2880_xtal_recalc_rate()' just returning the expected
frequency 40Mhz and use it along the old ralink SoCs to have a correct
boot trace with no warnings and a working clock plan from the beggining.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53223/">CVE-2024-53223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53223">CVE-2024-53223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234976">SUSE bug 1234976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53224</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53224" ref_url="https://www.suse.com/security/cve/CVE-2024-53224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Move events notifier registration to be after device registration

Move pkey change work initialization and cleanup from device resources
stage to notifier stage, since this is the stage which handles this work
events.

Fix a race between the device deregistration and pkey change work by moving
MLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to
ensure that the notifier is deregistered before the device during cleanup.
Which ensures there are no works that are being executed after the
device has already unregistered which can cause the panic below.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023
Workqueue: events pkey_change_handler [mlx5_ib]
RIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]
Code: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 &lt;4c&gt; 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40
RSP: 0018:ffffbcc54068be20 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36
RDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128
RBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001
R10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000
R13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905
FS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
mlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]
process_one_work+0x1e8/0x3c0
worker_thread+0x50/0x3b0
? rescuer_thread+0x380/0x380
kthread+0x149/0x170
? set_kthread_struct+0x50/0x50
ret_from_fork+0x22/0x30
Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]
CR2: 0000000000000000
---[ end trace f6f8be4eae12f7bc ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53224/">CVE-2024-53224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53224">CVE-2024-53224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235009">SUSE bug 1235009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53225</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53225" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53225" ref_url="https://www.suse.com/security/cve/CVE-2024-53225" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/tegra241-cmdqv: Fix alignment failure at max_n_shift

When configuring a kernel with PAGE_SIZE=4KB, depending on its setting of
CONFIG_CMA_ALIGNMENT, VCMDQ_LOG2SIZE_MAX=19 could fail the alignment test
and trigger a WARN_ON:
    WARNING: at drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c:3646
    Call trace:
     arm_smmu_init_one_queue+0x15c/0x210
     tegra241_cmdqv_init_structures+0x114/0x338
     arm_smmu_device_probe+0xb48/0x1d90

Fix it by capping max_n_shift to CMDQ_MAX_SZ_SHIFT as SMMUv3 CMDQ does.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53225/">CVE-2024-53225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53225">CVE-2024-53225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235006">SUSE bug 1235006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53226</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53226" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53226" ref_url="https://www.suse.com/security/cve/CVE-2024-53226" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg()

ib_map_mr_sg() allows ULPs to specify NULL as the sg_offset argument.
The driver needs to check whether it is a NULL pointer before
dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53226/">CVE-2024-53226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53226">CVE-2024-53226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236576">SUSE bug 1236576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53227</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53227" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53227" ref_url="https://www.suse.com/security/cve/CVE-2024-53227" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: bfa: Fix use-after-free in bfad_im_module_exit()

BUG: KASAN: slab-use-after-free in __lock_acquire+0x2aca/0x3a20
Read of size 8 at addr ffff8881082d80c8 by task modprobe/25303

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x95/0xe0
 print_report+0xcb/0x620
 kasan_report+0xbd/0xf0
 __lock_acquire+0x2aca/0x3a20
 lock_acquire+0x19b/0x520
 _raw_spin_lock+0x2b/0x40
 attribute_container_unregister+0x30/0x160
 fc_release_transport+0x19/0x90 [scsi_transport_fc]
 bfad_im_module_exit+0x23/0x60 [bfa]
 bfad_init+0xdb/0xff0 [bfa]
 do_one_initcall+0xdc/0x550
 do_init_module+0x22d/0x6b0
 load_module+0x4e96/0x5ff0
 init_module_from_file+0xcd/0x130
 idempotent_init_module+0x330/0x620
 __x64_sys_finit_module+0xb3/0x110
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

Allocated by task 25303:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 fc_attach_transport+0x4f/0x4740 [scsi_transport_fc]
 bfad_im_module_init+0x17/0x80 [bfa]
 bfad_init+0x23/0xff0 [bfa]
 do_one_initcall+0xdc/0x550
 do_init_module+0x22d/0x6b0
 load_module+0x4e96/0x5ff0
 init_module_from_file+0xcd/0x130
 idempotent_init_module+0x330/0x620
 __x64_sys_finit_module+0xb3/0x110
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 25303:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x38/0x50
 kfree+0x212/0x480
 bfad_im_module_init+0x7e/0x80 [bfa]
 bfad_init+0x23/0xff0 [bfa]
 do_one_initcall+0xdc/0x550
 do_init_module+0x22d/0x6b0
 load_module+0x4e96/0x5ff0
 init_module_from_file+0xcd/0x130
 idempotent_init_module+0x330/0x620
 __x64_sys_finit_module+0xb3/0x110
 do_syscall_64+0xc1/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Above issue happens as follows:

bfad_init
  error = bfad_im_module_init()
    fc_release_transport(bfad_im_scsi_transport_template);
  if (error)
    goto ext;

ext:
  bfad_im_module_exit();
    fc_release_transport(bfad_im_scsi_transport_template);
    --&gt; Trigger double release

Don't call bfad_im_module_exit() if bfad_im_module_init() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53227/">CVE-2024-53227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53227">CVE-2024-53227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235011">SUSE bug 1235011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53228</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53228" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53228" ref_url="https://www.suse.com/security/cve/CVE-2024-53228" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: kvm: Fix out-of-bounds array access

In kvm_riscv_vcpu_sbi_init() the entry-&gt;ext_idx can contain an
out-of-bound index. This is used as a special marker for the base
extensions, that cannot be disabled. However, when traversing the
extensions, that special marker is not checked prior indexing the
array.

Add an out-of-bounds check to the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53228/">CVE-2024-53228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53228">CVE-2024-53228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235094">SUSE bug 1235094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53229</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53229" ref_url="https://www.suse.com/security/cve/CVE-2024-53229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the qp flush warnings in req

When the qp is in error state, the status of WQEs in the queue should be
set to error. Or else the following will appear.

[  920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6
[  920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G           O       6.1.113-storage+ #65
[  920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
[  920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff &lt;0f&gt; 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24
[  920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246
[  920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008
[  920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac
[  920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450
[  920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800
[  920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000
[  920.622609] FS:  0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000
[  920.622979] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0
[  920.623680] Call Trace:
[  920.623815]  &lt;TASK&gt;
[  920.623933]  ? __warn+0x79/0xc0
[  920.624116]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.624356]  ? report_bug+0xfb/0x150
[  920.624594]  ? handle_bug+0x3c/0x60
[  920.624796]  ? exc_invalid_op+0x14/0x70
[  920.624976]  ? asm_exc_invalid_op+0x16/0x20
[  920.625203]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.625474]  ? rxe_completer+0x329/0xcc0 [rdma_rxe]
[  920.625749]  rxe_do_task+0x80/0x110 [rdma_rxe]
[  920.626037]  rxe_requester+0x625/0xde0 [rdma_rxe]
[  920.626310]  ? rxe_cq_post+0xe2/0x180 [rdma_rxe]
[  920.626583]  ? do_complete+0x18d/0x220 [rdma_rxe]
[  920.626812]  ? rxe_completer+0x1a3/0xcc0 [rdma_rxe]
[  920.627050]  rxe_do_task+0x80/0x110 [rdma_rxe]
[  920.627285]  tasklet_action_common.constprop.0+0xa4/0x120
[  920.627522]  handle_softirqs+0xc2/0x250
[  920.627728]  ? sort_range+0x20/0x20
[  920.627942]  run_ksoftirqd+0x1f/0x30
[  920.628158]  smpboot_thread_fn+0xc7/0x1b0
[  920.628334]  kthread+0xd6/0x100
[  920.628504]  ? kthread_complete_and_exit+0x20/0x20
[  920.628709]  ret_from_fork+0x1f/0x30
[  920.628892]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53229/">CVE-2024-53229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53229">CVE-2024-53229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234905">SUSE bug 1234905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53230</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53230" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53230" ref_url="https://www.suse.com/security/cve/CVE-2024-53230" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: CPPC: Fix possible null-ptr-deref for cppc_get_cpu_cost()

cpufreq_cpu_get_raw() may return NULL if the cpu is not in
policy-&gt;cpus cpu mask and it will cause null pointer dereference,
so check NULL for cppc_get_cpu_cost().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53230/">CVE-2024-53230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53230">CVE-2024-53230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235976">SUSE bug 1235976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53231</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53231" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53231" ref_url="https://www.suse.com/security/cve/CVE-2024-53231" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: CPPC: Fix possible null-ptr-deref for cpufreq_cpu_get_raw()

cpufreq_cpu_get_raw() may return NULL if the cpu is not in
policy-&gt;cpus cpu mask and it will cause null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53231/">CVE-2024-53231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53231">CVE-2024-53231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235977">SUSE bug 1235977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53232</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53232" ref_url="https://www.suse.com/security/cve/CVE-2024-53232" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/s390: Implement blocking domain

This fixes a crash when surprise hot-unplugging a PCI device. This crash
happens because during hot-unplug __iommu_group_set_domain_nofail()
attaching the default domain fails when the platform no longer
recognizes the device as it has already been removed and we end up with
a NULL domain pointer and UAF. This is exactly the case referred to in
the second comment in __iommu_device_set_domain() and just as stated
there if we can instead attach the blocking domain the UAF is prevented
as this can handle the already removed device. Implement the blocking
domain to use this handling.  With this change, the crash is fixed but
we still hit a warning attempting to change DMA ownership on a blocked
device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53232/">CVE-2024-53232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53232">CVE-2024-53232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235050">SUSE bug 1235050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53233</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53233" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53233" ref_url="https://www.suse.com/security/cve/CVE-2024-53233" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

unicode: Fix utf8_load() error path

utf8_load() requests the symbol "utf8_data_table" and then checks if the
requested UTF-8 version is supported. If it's unsupported, it tries to
put the data table using symbol_put(). If an unsupported version is
requested, symbol_put() fails like this:

 kernel BUG at kernel/module/main.c:786!
 RIP: 0010:__symbol_put+0x93/0xb0
 Call Trace:
  &lt;TASK&gt;
  ? __die_body.cold+0x19/0x27
  ? die+0x2e/0x50
  ? do_trap+0xca/0x110
  ? do_error_trap+0x65/0x80
  ? __symbol_put+0x93/0xb0
  ? exc_invalid_op+0x51/0x70
  ? __symbol_put+0x93/0xb0
  ? asm_exc_invalid_op+0x1a/0x20
  ? __pfx_cmp_name+0x10/0x10
  ? __symbol_put+0x93/0xb0
  ? __symbol_put+0x62/0xb0
  utf8_load+0xf8/0x150

That happens because symbol_put() expects the unique string that
identify the symbol, instead of a pointer to the loaded symbol. Fix that
by using such string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53233/">CVE-2024-53233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53233">CVE-2024-53233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235046">SUSE bug 1235046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53234</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53234" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53234" ref_url="https://www.suse.com/security/cve/CVE-2024-53234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: handle NONHEAD !delta[1] lclusters gracefully

syzbot reported a WARNING in iomap_iter_done:
 iomap_fiemap+0x73b/0x9b0 fs/iomap/fiemap.c:80
 ioctl_fiemap fs/ioctl.c:220 [inline]

Generally, NONHEAD lclusters won't have delta[1]==0, except for crafted
images and filesystems created by pre-1.0 mkfs versions.

Previously, it would immediately bail out if delta[1]==0, which led to
inadequate decompressed lengths (thus FIEMAP is impacted).  Treat it as
delta[1]=1 to work around these legacy mkfs versions.

`lclusterbits &gt; 14` is illegal for compact indexes, error out too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53234/">CVE-2024-53234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53234">CVE-2024-53234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235045">SUSE bug 1235045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53235</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53235" ref_url="https://www.suse.com/security/cve/CVE-2024-53235" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix file-backed mounts over FUSE

syzbot reported a null-ptr-deref in fuse_read_args_fill:
 fuse_read_folio+0xb0/0x100 fs/fuse/file.c:905
 filemap_read_folio+0xc6/0x2a0 mm/filemap.c:2367
 do_read_cache_folio+0x263/0x5c0 mm/filemap.c:3825
 read_mapping_folio include/linux/pagemap.h:1011 [inline]
 erofs_bread+0x34d/0x7e0 fs/erofs/data.c:41
 erofs_read_superblock fs/erofs/super.c:281 [inline]
 erofs_fc_fill_super+0x2b9/0x2500 fs/erofs/super.c:625

Unlike most filesystems, some network filesystems and FUSE need
unavoidable valid `file` pointers for their read I/Os [1].
Anyway, those use cases need to be supported too.

[1] https://docs.kernel.org/filesystems/vfs.html
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53235/">CVE-2024-53235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53235">CVE-2024-53235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234998">SUSE bug 1234998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53236</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53236" ref_url="https://www.suse.com/security/cve/CVE-2024-53236" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: Free skb when TX metadata options are invalid

When a new skb is allocated for transmitting an xsk descriptor, i.e., for
every non-multibuf descriptor or the first frag of a multibuf descriptor,
but the descriptor is later found to have invalid options set for the TX
metadata, the new skb is never freed. This can leak skbs until the send
buffer is full which makes sending more packets impossible.

Fix this by freeing the skb in the error path if we are currently dealing
with the first frag, i.e., an skb allocated in this iteration of
xsk_build_skb.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53236/">CVE-2024-53236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53236">CVE-2024-53236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235000">SUSE bug 1235000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53237</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53237" ref_url="https://www.suse.com/security/cve/CVE-2024-53237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: fix use-after-free in device_for_each_child()

Syzbot has reported the following KASAN splat:

BUG: KASAN: slab-use-after-free in device_for_each_child+0x18f/0x1a0
Read of size 8 at addr ffff88801f605308 by task kbnepd bnep0/4980

CPU: 0 UID: 0 PID: 4980 Comm: kbnepd bnep0 Not tainted 6.12.0-rc4-00161-gae90f6a6170d #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x100/0x190
 ? device_for_each_child+0x18f/0x1a0
 print_report+0x13a/0x4cb
 ? __virt_addr_valid+0x5e/0x590
 ? __phys_addr+0xc6/0x150
 ? device_for_each_child+0x18f/0x1a0
 kasan_report+0xda/0x110
 ? device_for_each_child+0x18f/0x1a0
 ? __pfx_dev_memalloc_noio+0x10/0x10
 device_for_each_child+0x18f/0x1a0
 ? __pfx_device_for_each_child+0x10/0x10
 pm_runtime_set_memalloc_noio+0xf2/0x180
 netdev_unregister_kobject+0x1ed/0x270
 unregister_netdevice_many_notify+0x123c/0x1d80
 ? __mutex_trylock_common+0xde/0x250
 ? __pfx_unregister_netdevice_many_notify+0x10/0x10
 ? trace_contention_end+0xe6/0x140
 ? __mutex_lock+0x4e7/0x8f0
 ? __pfx_lock_acquire.part.0+0x10/0x10
 ? rcu_is_watching+0x12/0xc0
 ? unregister_netdev+0x12/0x30
 unregister_netdevice_queue+0x30d/0x3f0
 ? __pfx_unregister_netdevice_queue+0x10/0x10
 ? __pfx_down_write+0x10/0x10
 unregister_netdev+0x1c/0x30
 bnep_session+0x1fb3/0x2ab0
 ? __pfx_bnep_session+0x10/0x10
 ? __pfx_lock_release+0x10/0x10
 ? __pfx_woken_wake_function+0x10/0x10
 ? __kthread_parkme+0x132/0x200
 ? __pfx_bnep_session+0x10/0x10
 ? kthread+0x13a/0x370
 ? __pfx_bnep_session+0x10/0x10
 kthread+0x2b7/0x370
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x48/0x80
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 4974:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0xaa/0xb0
 __kmalloc_noprof+0x1d1/0x440
 hci_alloc_dev_priv+0x1d/0x2820
 __vhci_create_device+0xef/0x7d0
 vhci_write+0x2c7/0x480
 vfs_write+0x6a0/0xfc0
 ksys_write+0x12f/0x260
 do_syscall_64+0xc7/0x250
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 4979:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x4f/0x70
 kfree+0x141/0x490
 hci_release_dev+0x4d9/0x600
 bt_host_release+0x6a/0xb0
 device_release+0xa4/0x240
 kobject_put+0x1ec/0x5a0
 put_device+0x1f/0x30
 vhci_release+0x81/0xf0
 __fput+0x3f6/0xb30
 task_work_run+0x151/0x250
 do_exit+0xa79/0x2c30
 do_group_exit+0xd5/0x2a0
 get_signal+0x1fcd/0x2210
 arch_do_signal_or_restart+0x93/0x780
 syscall_exit_to_user_mode+0x140/0x290
 do_syscall_64+0xd4/0x250
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

In 'hci_conn_del_sysfs()', 'device_unregister()' may be called when
an underlying (kobject) reference counter is greater than 1. This
means that reparenting (happened when the device is actually freed)
is delayed and, during that delay, parent controller device (hciX)
may be deleted. Since the latter may create a dangling pointer to
freed parent, avoid that scenario by reparenting to NULL explicitly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53237/">CVE-2024-53237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53237">CVE-2024-53237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235007">SUSE bug 1235007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235008">SUSE bug 1235008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53238</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53238" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53238" ref_url="https://www.suse.com/security/cve/CVE-2024-53238" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btmtk: adjust the position to init iso data anchor

MediaTek iso data anchor init should be moved to where MediaTek
claims iso data interface.
If there is an unexpected BT usb disconnect during setup flow,
it will cause a NULL pointer crash issue when releasing iso
anchor since the anchor wasn't been init yet. Adjust the position
to do iso data anchor init.

[   17.137991] pc : usb_kill_anchored_urbs+0x60/0x168
[   17.137998] lr : usb_kill_anchored_urbs+0x44/0x168
[   17.137999] sp : ffffffc0890cb5f0
[   17.138000] x29: ffffffc0890cb5f0 x28: ffffff80bb6c2e80
[   17.144081] gpio gpiochip0: registered chardev handle for 1 lines
[   17.148421]  x27: 0000000000000000
[   17.148422] x26: ffffffd301ff4298 x25: 0000000000000003 x24: 00000000000000f0
[   17.148424] x23: 0000000000000000 x22: 00000000ffffffff x21: 0000000000000001
[   17.148425] x20: ffffffffffffffd8 x19: ffffff80c0f25560 x18: 0000000000000000
[   17.148427] x17: ffffffd33864e408 x16: ffffffd33808f7c8 x15: 0000000000200000
[   17.232789] x14: e0cd73cf80ffffff x13: 50f2137c0a0338c9 x12: 0000000000000001
[   17.239912] x11: 0000000080150011 x10: 0000000000000002 x9 : 0000000000000001
[   17.247035] x8 : 0000000000000000 x7 : 0000000000008080 x6 : 8080000000000000
[   17.254158] x5 : ffffffd33808ebc0 x4 : fffffffe033dcf20 x3 : 0000000080150011
[   17.261281] x2 : ffffff8087a91400 x1 : 0000000000000000 x0 : ffffff80c0f25588
[   17.268404] Call trace:
[   17.270841]  usb_kill_anchored_urbs+0x60/0x168
[   17.275274]  btusb_mtk_release_iso_intf+0x2c/0xd8 [btusb (HASH:5afe 6)]
[   17.284226]  btusb_mtk_disconnect+0x14/0x28 [btusb (HASH:5afe 6)]
[   17.292652]  btusb_disconnect+0x70/0x140 [btusb (HASH:5afe 6)]
[   17.300818]  usb_unbind_interface+0xc4/0x240
[   17.305079]  device_release_driver_internal+0x18c/0x258
[   17.310296]  device_release_driver+0x1c/0x30
[   17.314557]  bus_remove_device+0x140/0x160
[   17.318643]  device_del+0x1c0/0x330
[   17.322121]  usb_disable_device+0x80/0x180
[   17.326207]  usb_disconnect+0xec/0x300
[   17.329948]  hub_quiesce+0x80/0xd0
[   17.333339]  hub_disconnect+0x44/0x190
[   17.337078]  usb_unbind_interface+0xc4/0x240
[   17.341337]  device_release_driver_internal+0x18c/0x258
[   17.346551]  device_release_driver+0x1c/0x30
[   17.350810]  usb_driver_release_interface+0x70/0x88
[   17.355677]  proc_ioctl+0x13c/0x228
[   17.359157]  proc_ioctl_default+0x50/0x80
[   17.363155]  usbdev_ioctl+0x830/0xd08
[   17.366808]  __arm64_sys_ioctl+0x94/0xd0
[   17.370723]  invoke_syscall+0x6c/0xf8
[   17.374377]  el0_svc_common+0x84/0xe0
[   17.378030]  do_el0_svc+0x20/0x30
[   17.381334]  el0_svc+0x34/0x60
[   17.384382]  el0t_64_sync_handler+0x88/0xf0
[   17.388554]  el0t_64_sync+0x180/0x188
[   17.392208] Code: f9400677 f100a2f4 54fffea0 d503201f (b8350288)
[   17.398289] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53238/">CVE-2024-53238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53238">CVE-2024-53238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234910">SUSE bug 1234910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53239</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53239" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53239" ref_url="https://www.suse.com/security/cve/CVE-2024-53239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: 6fire: Release resources at card release

The current 6fire code tries to release the resources right after the
call of usb6fire_chip_abort().  But at this moment, the card object
might be still in use (as we're calling snd_card_free_when_closed()).

For avoid potential UAFs, move the release of resources to the card's
private_free instead of the manual call of usb6fire_chip_destroy() at
the USB disconnect callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53239/">CVE-2024-53239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53239">CVE-2024-53239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235054">SUSE bug 1235054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235055">SUSE bug 1235055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53680" ref_url="https://www.suse.com/security/cve/CVE-2024-53680" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()

Under certain kernel configurations when building with Clang/LLVM, the
compiler does not generate a return or jump as the terminator
instruction for ip_vs_protocol_init(), triggering the following objtool
warning during build time:

  vmlinux.o: warning: objtool: ip_vs_protocol_init() falls through to next function __initstub__kmod_ip_vs_rr__935_123_ip_vs_rr_init6()

At runtime, this either causes an oops when trying to load the ipvs
module or a boot-time panic if ipvs is built-in. This same issue has
been reported by the Intel kernel test robot previously.

Digging deeper into both LLVM and the kernel code reveals this to be a
undefined behavior problem. ip_vs_protocol_init() uses a on-stack buffer
of 64 chars to store the registered protocol names and leaves it
uninitialized after definition. The function calls strnlen() when
concatenating protocol names into the buffer. With CONFIG_FORTIFY_SOURCE
strnlen() performs an extra step to check whether the last byte of the
input char buffer is a null character (commit 3009f891bb9f ("fortify:
Allow strlen() and strnlen() to pass compile-time known lengths")).
This, together with possibly other configurations, cause the following
IR to be generated:

  define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #5 section ".init.text" align 16 !kcfi_type !29 {
    %1 = alloca [64 x i8], align 16
    ...

  14:                                               ; preds = %11
    %15 = getelementptr inbounds i8, ptr %1, i64 63
    %16 = load i8, ptr %15, align 1
    %17 = tail call i1 @llvm.is.constant.i8(i8 %16)
    %18 = icmp eq i8 %16, 0
    %19 = select i1 %17, i1 %18, i1 false
    br i1 %19, label %20, label %23

  20:                                               ; preds = %14
    %21 = call i64 @strlen(ptr noundef nonnull dereferenceable(1) %1) #23
    ...

  23:                                               ; preds = %14, %11, %20
    %24 = call i64 @strnlen(ptr noundef nonnull dereferenceable(1) %1, i64 noundef 64) #24
    ...
  }

The above code calculates the address of the last char in the buffer
(value %15) and then loads from it (value %16). Because the buffer is
never initialized, the LLVM GVN pass marks value %16 as undefined:

  %13 = getelementptr inbounds i8, ptr %1, i64 63
  br i1 undef, label %14, label %17

This gives later passes (SCCP, in particular) more DCE opportunities by
propagating the undef value further, and eventually removes everything
after the load on the uninitialized stack location:

  define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #0 section ".init.text" align 16 !kcfi_type !11 {
    %1 = alloca [64 x i8], align 16
    ...

  12:                                               ; preds = %11
    %13 = getelementptr inbounds i8, ptr %1, i64 63
    unreachable
  }

In this way, the generated native code will just fall through to the
next function, as LLVM does not generate any code for the unreachable IR
instruction and leaves the function without a terminator.

Zero the on-stack buffer to avoid this possible UB.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53680/">CVE-2024-53680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235715">SUSE bug 1235715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53681" ref_url="https://www.suse.com/security/cve/CVE-2024-53681" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: Don't overflow subsysnqn

nvmet_root_discovery_nqn_store treats the subsysnqn string like a fixed
size buffer, even though it is dynamically allocated to the size of the
string.

Create a new string with kstrndup instead of using the old buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53681/">CVE-2024-53681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53681">CVE-2024-53681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235904">SUSE bug 1235904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53682" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53682" ref_url="https://www.suse.com/security/cve/CVE-2024-53682" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: axp20x: AXP717: set ramp_delay

AXP717 datasheet says that regulator ramp delay is 15.625 us/step,
which is 10mV in our case.

Add a AXP_DESC_RANGES_DELAY macro and update AXP_DESC_RANGES macro to
expand to AXP_DESC_RANGES_DELAY with ramp_delay = 0

For DCDC4, steps is 100mv

Add a AXP_DESC_DELAY macro and update AXP_DESC macro to
expand to AXP_DESC_DELAY with ramp_delay = 0

This patch fix crashes when using CPU DVFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53682/">CVE-2024-53682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53682">CVE-2024-53682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235718">SUSE bug 1235718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53685" ref_url="https://www.suse.com/security/cve/CVE-2024-53685" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: give up on paths longer than PATH_MAX

If the full path to be built by ceph_mdsc_build_path() happens to be
longer than PATH_MAX, then this function will enter an endless (retry)
loop, effectively blocking the whole task.  Most of the machine
becomes unusable, making this a very simple and effective DoS
vulnerability.

I cannot imagine why this retry was ever implemented, but it seems
rather useless and harmful to me.  Let's remove it and fail with
ENAMETOOLONG instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53685/">CVE-2024-53685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53685">CVE-2024-53685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235720">SUSE bug 1235720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53687" ref_url="https://www.suse.com/security/cve/CVE-2024-53687" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Fix IPIs usage in kfence_protect_page()

flush_tlb_kernel_range() may use IPIs to flush the TLBs of all the
cores, which triggers the following warning when the irqs are disabled:

[    3.455330] WARNING: CPU: 1 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x452/0x520
[    3.456647] Modules linked in:
[    3.457218] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7-00010-g91d3de7240b8 #1
[    3.457416] Hardware name: QEMU QEMU Virtual Machine, BIOS
[    3.457633] epc : smp_call_function_many_cond+0x452/0x520
[    3.457736]  ra : on_each_cpu_cond_mask+0x1e/0x30
[    3.457786] epc : ffffffff800b669a ra : ffffffff800b67c2 sp : ff2000000000bb50
[    3.457824]  gp : ffffffff815212b8 tp : ff6000008014f080 t0 : 000000000000003f
[    3.457859]  t1 : ffffffff815221e0 t2 : 000000000000000f s0 : ff2000000000bc10
[    3.457920]  s1 : 0000000000000040 a0 : ffffffff815221e0 a1 : 0000000000000001
[    3.457953]  a2 : 0000000000010000 a3 : 0000000000000003 a4 : 0000000000000000
[    3.458006]  a5 : 0000000000000000 a6 : ffffffffffffffff a7 : 0000000000000000
[    3.458042]  s2 : ffffffff815223be s3 : 00fffffffffff000 s4 : ff600001ffe38fc0
[    3.458076]  s5 : ff600001ff950d00 s6 : 0000000200000120 s7 : 0000000000000001
[    3.458109]  s8 : 0000000000000001 s9 : ff60000080841ef0 s10: 0000000000000001
[    3.458141]  s11: ffffffff81524812 t3 : 0000000000000001 t4 : ff60000080092bc0
[    3.458172]  t5 : 0000000000000000 t6 : ff200000000236d0
[    3.458203] status: 0000000200000100 badaddr: ffffffff800b669a cause: 0000000000000003
[    3.458373] [&lt;ffffffff800b669a&gt;] smp_call_function_many_cond+0x452/0x520
[    3.458593] [&lt;ffffffff800b67c2&gt;] on_each_cpu_cond_mask+0x1e/0x30
[    3.458625] [&lt;ffffffff8000e4ca&gt;] __flush_tlb_range+0x118/0x1ca
[    3.458656] [&lt;ffffffff8000e6b2&gt;] flush_tlb_kernel_range+0x1e/0x26
[    3.458683] [&lt;ffffffff801ea56a&gt;] kfence_protect+0xc0/0xce
[    3.458717] [&lt;ffffffff801e9456&gt;] kfence_guarded_free+0xc6/0x1c0
[    3.458742] [&lt;ffffffff801e9d6c&gt;] __kfence_free+0x62/0xc6
[    3.458764] [&lt;ffffffff801c57d8&gt;] kfree+0x106/0x32c
[    3.458786] [&lt;ffffffff80588cf2&gt;] detach_buf_split+0x188/0x1a8
[    3.458816] [&lt;ffffffff8058708c&gt;] virtqueue_get_buf_ctx+0xb6/0x1f6
[    3.458839] [&lt;ffffffff805871da&gt;] virtqueue_get_buf+0xe/0x16
[    3.458880] [&lt;ffffffff80613d6a&gt;] virtblk_done+0x5c/0xe2
[    3.458908] [&lt;ffffffff8058766e&gt;] vring_interrupt+0x6a/0x74
[    3.458930] [&lt;ffffffff800747d8&gt;] __handle_irq_event_percpu+0x7c/0xe2
[    3.458956] [&lt;ffffffff800748f0&gt;] handle_irq_event+0x3c/0x86
[    3.458978] [&lt;ffffffff800786cc&gt;] handle_simple_irq+0x9e/0xbe
[    3.459004] [&lt;ffffffff80073934&gt;] generic_handle_domain_irq+0x1c/0x2a
[    3.459027] [&lt;ffffffff804bf87c&gt;] imsic_handle_irq+0xba/0x120
[    3.459056] [&lt;ffffffff80073934&gt;] generic_handle_domain_irq+0x1c/0x2a
[    3.459080] [&lt;ffffffff804bdb76&gt;] riscv_intc_aia_irq+0x24/0x34
[    3.459103] [&lt;ffffffff809d0452&gt;] handle_riscv_irq+0x2e/0x4c
[    3.459133] [&lt;ffffffff809d923e&gt;] call_on_irq_stack+0x32/0x40

So only flush the local TLB and let the lazy kfence page fault handling
deal with the faults which could happen when a core has an old protected
pte version cached in its TLB. That leads to potential inaccuracies which
can be tolerated when using kfence.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53687/">CVE-2024-53687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53687">CVE-2024-53687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235721">SUSE bug 1235721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53689" ref_url="https://www.suse.com/security/cve/CVE-2024-53689" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix potential deadlock while freezing queue and acquiring sysfs_lock

For storing a value to a queue attribute, the queue_attr_store function
first freezes the queue (-&gt;q_usage_counter(io)) and then acquire
-&gt;sysfs_lock. This seems not correct as the usual ordering should be to
acquire -&gt;sysfs_lock before freezing the queue. This incorrect ordering
causes the following lockdep splat which we are able to reproduce always
simply by accessing /sys/kernel/debug file using ls command:

[   57.597146] WARNING: possible circular locking dependency detected
[   57.597154] 6.12.0-10553-gb86545e02e8c #20 Tainted: G        W
[   57.597162] ------------------------------------------------------
[   57.597168] ls/4605 is trying to acquire lock:
[   57.597176] c00000003eb56710 (&amp;mm-&gt;mmap_lock){++++}-{4:4}, at: __might_fault+0x58/0xc0
[   57.597200]
               but task is already holding lock:
[   57.597207] c0000018e27c6810 (&amp;sb-&gt;s_type-&gt;i_mutex_key#3){++++}-{4:4}, at: iterate_dir+0x94/0x1d4
[   57.597226]
               which lock already depends on the new lock.

[   57.597233]
               the existing dependency chain (in reverse order) is:
[   57.597241]
               -&gt; #5 (&amp;sb-&gt;s_type-&gt;i_mutex_key#3){++++}-{4:4}:
[   57.597255]        down_write+0x6c/0x18c
[   57.597264]        start_creating+0xb4/0x24c
[   57.597274]        debugfs_create_dir+0x2c/0x1e8
[   57.597283]        blk_register_queue+0xec/0x294
[   57.597292]        add_disk_fwnode+0x2e4/0x548
[   57.597302]        brd_alloc+0x2c8/0x338
[   57.597309]        brd_init+0x100/0x178
[   57.597317]        do_one_initcall+0x88/0x3e4
[   57.597326]        kernel_init_freeable+0x3cc/0x6e0
[   57.597334]        kernel_init+0x34/0x1cc
[   57.597342]        ret_from_kernel_user_thread+0x14/0x1c
[   57.597350]
               -&gt; #4 (&amp;q-&gt;debugfs_mutex){+.+.}-{4:4}:
[   57.597362]        __mutex_lock+0xfc/0x12a0
[   57.597370]        blk_register_queue+0xd4/0x294
[   57.597379]        add_disk_fwnode+0x2e4/0x548
[   57.597388]        brd_alloc+0x2c8/0x338
[   57.597395]        brd_init+0x100/0x178
[   57.597402]        do_one_initcall+0x88/0x3e4
[   57.597410]        kernel_init_freeable+0x3cc/0x6e0
[   57.597418]        kernel_init+0x34/0x1cc
[   57.597426]        ret_from_kernel_user_thread+0x14/0x1c
[   57.597434]
               -&gt; #3 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}:
[   57.597446]        __mutex_lock+0xfc/0x12a0
[   57.597454]        queue_attr_store+0x9c/0x110
[   57.597462]        sysfs_kf_write+0x70/0xb0
[   57.597471]        kernfs_fop_write_iter+0x1b0/0x2ac
[   57.597480]        vfs_write+0x3dc/0x6e8
[   57.597488]        ksys_write+0x84/0x140
[   57.597495]        system_call_exception+0x130/0x360
[   57.597504]        system_call_common+0x160/0x2c4
[   57.597516]
               -&gt; #2 (&amp;q-&gt;q_usage_counter(io)#21){++++}-{0:0}:
[   57.597530]        __submit_bio+0x5ec/0x828
[   57.597538]        submit_bio_noacct_nocheck+0x1e4/0x4f0
[   57.597547]        iomap_readahead+0x2a0/0x448
[   57.597556]        xfs_vm_readahead+0x28/0x3c
[   57.597564]        read_pages+0x88/0x41c
[   57.597571]        page_cache_ra_unbounded+0x1ac/0x2d8
[   57.597580]        filemap_get_pages+0x188/0x984
[   57.597588]        filemap_read+0x13c/0x4bc
[   57.597596]        xfs_file_buffered_read+0x88/0x17c
[   57.597605]        xfs_file_read_iter+0xac/0x158
[   57.597614]        vfs_read+0x2d4/0x3b4
[   57.597622]        ksys_read+0x84/0x144
[   57.597629]        system_call_exception+0x130/0x360
[   57.597637]        system_call_common+0x160/0x2c4
[   57.597647]
               -&gt; #1 (mapping.invalidate_lock#2){++++}-{4:4}:
[   57.597661]        down_read+0x6c/0x220
[   57.597669]        filemap_fault+0x870/0x100c
[   57.597677]        xfs_filemap_fault+0xc4/0x18c
[   57.597684]        __do_fault+0x64/0x164
[   57.597693]        __handle_mm_fault+0x1274/0x1dac
[   57.597702]        handle_mm_fault+0x248/0x48
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53689/">CVE-2024-53689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53689">CVE-2024-53689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235736">SUSE bug 1235736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53690" ref_url="https://www.suse.com/security/cve/CVE-2024-53690" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53690/">CVE-2024-53690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53690">CVE-2024-53690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235842">SUSE bug 1235842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54031</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext

Access to genmask field in struct nft_set_ext results in unaligned
atomic read:

[   72.130109] Unable to handle kernel paging request at virtual address ffff0000c2bb708c
[   72.131036] Mem abort info:
[   72.131213]   ESR = 0x0000000096000021
[   72.131446]   EC = 0x25: DABT (current EL), IL = 32 bits
[   72.132209]   SET = 0, FnV = 0
[   72.133216]   EA = 0, S1PTW = 0
[   72.134080]   FSC = 0x21: alignment fault
[   72.135593] Data abort info:
[   72.137194]   ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
[   72.142351]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   72.145989]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   72.150115] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000237d27000
[   72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403,
+pte=0068000102bb7707
[   72.163021] Internal error: Oops: 0000000096000021 [#1] SMP
[...]
[   72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Tainted: G            E      6.13.0-rc3+ #2
[   72.170509] Tainted: [E]=UNSIGNED_MODULE
[   72.170720] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-stable202302-for-qemu 03/01/2023
[   72.171192] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]
[   72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables]
[   72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables]
[   72.172546] sp : ffff800081f2bce0
[   72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038
[   72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78
[   72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78
[   72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000
[   72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978
[   72.174485] x14: ffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0
[   72.174841] x11: 0000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000
[   72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000
[   72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000
[   72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004
[   72.176207] Call trace:
[   72.176316]  nft_rhash_gc+0x200/0x2d8 [nf_tables] (P)
[   72.176653]  process_one_work+0x178/0x3d0
[   72.176831]  worker_thread+0x200/0x3f0
[   72.176995]  kthread+0xe8/0xf8
[   72.177130]  ret_from_fork+0x10/0x20
[   72.177289] Code: 54fff984 d503201f d2800080 91003261 (f820303f)
[   72.177557] ---[ end trace 0000000000000000 ]---

Align struct nft_set_ext to word size to address this and
documentation it.

pahole reports that this increases the size of elements for rhash and
pipapo in 8 bytes on x86_64.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54191</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54191" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54191" ref_url="https://www.suse.com/security/cve/CVE-2024-54191" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: iso: Fix circular lock in iso_conn_big_sync

This fixes the circular locking dependency warning below, by reworking
iso_sock_recvmsg, to ensure that the socket lock is always released
before calling a function that locks hdev.

[  561.670344] ======================================================
[  561.670346] WARNING: possible circular locking dependency detected
[  561.670349] 6.12.0-rc6+ #26 Not tainted
[  561.670351] ------------------------------------------------------
[  561.670353] iso-tester/3289 is trying to acquire lock:
[  561.670355] ffff88811f600078 (&amp;hdev-&gt;lock){+.+.}-{3:3},
               at: iso_conn_big_sync+0x73/0x260 [bluetooth]
[  561.670405]
               but task is already holding lock:
[  561.670407] ffff88815af58258 (sk_lock-AF_BLUETOOTH){+.+.}-{0:0},
               at: iso_sock_recvmsg+0xbf/0x500 [bluetooth]
[  561.670450]
               which lock already depends on the new lock.

[  561.670452]
               the existing dependency chain (in reverse order) is:
[  561.670453]
               -&gt; #2 (sk_lock-AF_BLUETOOTH){+.+.}-{0:0}:
[  561.670458]        lock_acquire+0x7c/0xc0
[  561.670463]        lock_sock_nested+0x3b/0xf0
[  561.670467]        bt_accept_dequeue+0x1a5/0x4d0 [bluetooth]
[  561.670510]        iso_sock_accept+0x271/0x830 [bluetooth]
[  561.670547]        do_accept+0x3dd/0x610
[  561.670550]        __sys_accept4+0xd8/0x170
[  561.670553]        __x64_sys_accept+0x74/0xc0
[  561.670556]        x64_sys_call+0x17d6/0x25f0
[  561.670559]        do_syscall_64+0x87/0x150
[  561.670563]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  561.670567]
               -&gt; #1 (sk_lock-AF_BLUETOOTH-BTPROTO_ISO){+.+.}-{0:0}:
[  561.670571]        lock_acquire+0x7c/0xc0
[  561.670574]        lock_sock_nested+0x3b/0xf0
[  561.670577]        iso_sock_listen+0x2de/0xf30 [bluetooth]
[  561.670617]        __sys_listen_socket+0xef/0x130
[  561.670620]        __x64_sys_listen+0xe1/0x190
[  561.670623]        x64_sys_call+0x2517/0x25f0
[  561.670626]        do_syscall_64+0x87/0x150
[  561.670629]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  561.670632]
               -&gt; #0 (&amp;hdev-&gt;lock){+.+.}-{3:3}:
[  561.670636]        __lock_acquire+0x32ad/0x6ab0
[  561.670639]        lock_acquire.part.0+0x118/0x360
[  561.670642]        lock_acquire+0x7c/0xc0
[  561.670644]        __mutex_lock+0x18d/0x12f0
[  561.670647]        mutex_lock_nested+0x1b/0x30
[  561.670651]        iso_conn_big_sync+0x73/0x260 [bluetooth]
[  561.670687]        iso_sock_recvmsg+0x3e9/0x500 [bluetooth]
[  561.670722]        sock_recvmsg+0x1d5/0x240
[  561.670725]        sock_read_iter+0x27d/0x470
[  561.670727]        vfs_read+0x9a0/0xd30
[  561.670731]        ksys_read+0x1a8/0x250
[  561.670733]        __x64_sys_read+0x72/0xc0
[  561.670736]        x64_sys_call+0x1b12/0x25f0
[  561.670738]        do_syscall_64+0x87/0x150
[  561.670741]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  561.670744]
               other info that might help us debug this:

[  561.670745] Chain exists of:
&amp;hdev-&gt;lock --&gt; sk_lock-AF_BLUETOOTH-BTPROTO_ISO --&gt; sk_lock-AF_BLUETOOTH

[  561.670751]  Possible unsafe locking scenario:

[  561.670753]        CPU0                    CPU1
[  561.670754]        ----                    ----
[  561.670756]   lock(sk_lock-AF_BLUETOOTH);
[  561.670758]                                lock(sk_lock
                                              AF_BLUETOOTH-BTPROTO_ISO);
[  561.670761]                                lock(sk_lock-AF_BLUETOOTH);
[  561.670764]   lock(&amp;hdev-&gt;lock);
[  561.670767]
                *** DEADLOCK ***
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54191/">CVE-2024-54191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54191">CVE-2024-54191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235717">SUSE bug 1235717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54193</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54193" ref_url="https://www.suse.com/security/cve/CVE-2024-54193" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54193/">CVE-2024-54193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54193">CVE-2024-54193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235713">SUSE bug 1235713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54455</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54455" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54455" ref_url="https://www.suse.com/security/cve/CVE-2024-54455" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54455/">CVE-2024-54455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54455">CVE-2024-54455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235719">SUSE bug 1235719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54460</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54460" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54460" ref_url="https://www.suse.com/security/cve/CVE-2024-54460" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: iso: Fix circular lock in iso_listen_bis

This fixes the circular locking dependency warning below, by
releasing the socket lock before enterning iso_listen_bis, to
avoid any potential deadlock with hdev lock.

[   75.307983] ======================================================
[   75.307984] WARNING: possible circular locking dependency detected
[   75.307985] 6.12.0-rc6+ #22 Not tainted
[   75.307987] ------------------------------------------------------
[   75.307987] kworker/u81:2/2623 is trying to acquire lock:
[   75.307988] ffff8fde1769da58 (sk_lock-AF_BLUETOOTH-BTPROTO_ISO)
               at: iso_connect_cfm+0x253/0x840 [bluetooth]
[   75.308021]
               but task is already holding lock:
[   75.308022] ffff8fdd61a10078 (&amp;hdev-&gt;lock)
               at: hci_le_per_adv_report_evt+0x47/0x2f0 [bluetooth]
[   75.308053]
               which lock already depends on the new lock.

[   75.308054]
               the existing dependency chain (in reverse order) is:
[   75.308055]
               -&gt; #1 (&amp;hdev-&gt;lock){+.+.}-{3:3}:
[   75.308057]        __mutex_lock+0xad/0xc50
[   75.308061]        mutex_lock_nested+0x1b/0x30
[   75.308063]        iso_sock_listen+0x143/0x5c0 [bluetooth]
[   75.308085]        __sys_listen_socket+0x49/0x60
[   75.308088]        __x64_sys_listen+0x4c/0x90
[   75.308090]        x64_sys_call+0x2517/0x25f0
[   75.308092]        do_syscall_64+0x87/0x150
[   75.308095]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   75.308098]
               -&gt; #0 (sk_lock-AF_BLUETOOTH-BTPROTO_ISO){+.+.}-{0:0}:
[   75.308100]        __lock_acquire+0x155e/0x25f0
[   75.308103]        lock_acquire+0xc9/0x300
[   75.308105]        lock_sock_nested+0x32/0x90
[   75.308107]        iso_connect_cfm+0x253/0x840 [bluetooth]
[   75.308128]        hci_connect_cfm+0x6c/0x190 [bluetooth]
[   75.308155]        hci_le_per_adv_report_evt+0x27b/0x2f0 [bluetooth]
[   75.308180]        hci_le_meta_evt+0xe7/0x200 [bluetooth]
[   75.308206]        hci_event_packet+0x21f/0x5c0 [bluetooth]
[   75.308230]        hci_rx_work+0x3ae/0xb10 [bluetooth]
[   75.308254]        process_one_work+0x212/0x740
[   75.308256]        worker_thread+0x1bd/0x3a0
[   75.308258]        kthread+0xe4/0x120
[   75.308259]        ret_from_fork+0x44/0x70
[   75.308261]        ret_from_fork_asm+0x1a/0x30
[   75.308263]
               other info that might help us debug this:

[   75.308264]  Possible unsafe locking scenario:

[   75.308264]        CPU0                CPU1
[   75.308265]        ----                ----
[   75.308265]   lock(&amp;hdev-&gt;lock);
[   75.308267]                            lock(sk_lock-
                                                AF_BLUETOOTH-BTPROTO_ISO);
[   75.308268]                            lock(&amp;hdev-&gt;lock);
[   75.308269]   lock(sk_lock-AF_BLUETOOTH-BTPROTO_ISO);
[   75.308270]
                *** DEADLOCK ***

[   75.308271] 4 locks held by kworker/u81:2/2623:
[   75.308272]  #0: ffff8fdd66e52148 ((wq_completion)hci0#2){+.+.}-{0:0},
                at: process_one_work+0x443/0x740
[   75.308276]  #1: ffffafb488b7fe48 ((work_completion)(&amp;hdev-&gt;rx_work)),
                at: process_one_work+0x1ce/0x740
[   75.308280]  #2: ffff8fdd61a10078 (&amp;hdev-&gt;lock){+.+.}-{3:3}
                at: hci_le_per_adv_report_evt+0x47/0x2f0 [bluetooth]
[   75.308304]  #3: ffffffffb6ba4900 (rcu_read_lock){....}-{1:2},
                at: hci_connect_cfm+0x29/0x190 [bluetooth]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54460/">CVE-2024-54460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235722">SUSE bug 1235722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235723">SUSE bug 1235723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54683" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54683" ref_url="https://www.suse.com/security/cve/CVE-2024-54683" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: IDLETIMER: Fix for possible ABBA deadlock

Deletion of the last rule referencing a given idletimer may happen at
the same time as a read of its file in sysfs:

| ======================================================
| WARNING: possible circular locking dependency detected
| 6.12.0-rc7-01692-g5e9a28f41134-dirty #594 Not tainted
| ------------------------------------------------------
| iptables/3303 is trying to acquire lock:
| ffff8881057e04b8 (kn-&gt;active#48){++++}-{0:0}, at: __kernfs_remove+0x20
|
| but task is already holding lock:
| ffffffffa0249068 (list_mutex){+.+.}-{3:3}, at: idletimer_tg_destroy_v]
|
| which lock already depends on the new lock.

A simple reproducer is:

| #!/bin/bash
|
| while true; do
|         iptables -A INPUT -i foo -j IDLETIMER --timeout 10 --label "testme"
|         iptables -D INPUT -i foo -j IDLETIMER --timeout 10 --label "testme"
| done &amp;
| while true; do
|         cat /sys/class/xt_idletimer/timers/testme &gt;/dev/null
| done

Avoid this by freeing list_mutex right after deleting the element from
the list, then continuing with the teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54683/">CVE-2024-54683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54683">CVE-2024-54683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235729">SUSE bug 1235729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55639" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55639" ref_url="https://www.suse.com/security/cve/CVE-2024-55639" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: renesas: rswitch: avoid use-after-put for a device tree node

The device tree node saved in the rswitch_device structure is used at
several driver locations. So passing this node to of_node_put() after
the first use is wrong.

Move of_node_put() for this node to exit paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55639/">CVE-2024-55639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55639">CVE-2024-55639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235737">SUSE bug 1235737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235738">SUSE bug 1235738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55641" ref_url="https://www.suse.com/security/cve/CVE-2024-55641" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: unlock inodes when erroring out of xfs_trans_alloc_dir

Debugging a filesystem patch with generic/475 caused the system to hang
after observing the following sequences in dmesg:

 XFS (dm-0): metadata I/O error in "xfs_imap_to_bp+0x61/0xe0 [xfs]" at daddr 0x491520 len 32 error 5
 XFS (dm-0): metadata I/O error in "xfs_btree_read_buf_block+0xba/0x160 [xfs]" at daddr 0x3445608 len 8 error 5
 XFS (dm-0): metadata I/O error in "xfs_imap_to_bp+0x61/0xe0 [xfs]" at daddr 0x138e1c0 len 32 error 5
 XFS (dm-0): log I/O error -5
 XFS (dm-0): Metadata I/O Error (0x1) detected at xfs_trans_read_buf_map+0x1ea/0x4b0 [xfs] (fs/xfs/xfs_trans_buf.c:311).  Shutting down filesystem.
 XFS (dm-0): Please unmount the filesystem and rectify the problem(s)
 XFS (dm-0): Internal error dqp-&gt;q_ino.reserved &lt; dqp-&gt;q_ino.count at line 869 of file fs/xfs/xfs_trans_dquot.c.  Caller xfs_trans_dqresv+0x236/0x440 [xfs]
 XFS (dm-0): Corruption detected. Unmount and run xfs_repair
 XFS (dm-0): Unmounting Filesystem be6bcbcc-9921-4deb-8d16-7cc94e335fa7

The system is stuck in unmount trying to lock a couple of inodes so that
they can be purged.  The dquot corruption notice above is a clue to what
happened -- a link() call tried to set up a transaction to link a child
into a directory.  Quota reservation for the transaction failed after IO
errors shut down the filesystem, but then we forgot to unlock the inodes
on our way out.  Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55641/">CVE-2024-55641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55641">CVE-2024-55641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235740">SUSE bug 1235740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55642" ref_url="https://www.suse.com/security/cve/CVE-2024-55642" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Prevent potential deadlocks in zone write plug error recovery

Zone write plugging for handling writes to zones of a zoned block
device always execute a zone report whenever a write BIO to a zone
fails. The intent of this is to ensure that the tracking of a zone write
pointer is always correct to ensure that the alignment to a zone write
pointer of write BIOs can be checked on submission and that we can
always correctly emulate zone append operations using regular write
BIOs.

However, this error recovery scheme introduces a potential deadlock if a
device queue freeze is initiated while BIOs are still plugged in a zone
write plug and one of these write operation fails. In such case, the
disk zone write plug error recovery work is scheduled and executes a
report zone. This in turn can result in a request allocation in the
underlying driver to issue the report zones command to the device. But
with the device queue freeze already started, this allocation will
block, preventing the report zone execution and the continuation of the
processing of the plugged BIOs. As plugged BIOs hold a queue usage
reference, the queue freeze itself will never complete, resulting in a
deadlock.

Avoid this problem by completely removing from the zone write plugging
code the use of report zones operations after a failed write operation,
instead relying on the device user to either execute a report zones,
reset the zone, finish the zone, or give up writing to the device (which
is a fairly common pattern for file systems which degrade to read-only
after write failures). This is not an unreasonnable requirement as all
well-behaved applications, FSes and device mapper already use report
zones to recover from write errors whenever possible by comparing the
current position of a zone write pointer with what their assumption
about the position is.

The changes to remove the automatic error recovery are as follows:
 - Completely remove the error recovery work and its associated
   resources (zone write plug list head, disk error list, and disk
   zone_wplugs_work work struct). This also removes the functions
   disk_zone_wplug_set_error() and disk_zone_wplug_clear_error().

 - Change the BLK_ZONE_WPLUG_ERROR zone write plug flag into
   BLK_ZONE_WPLUG_NEED_WP_UPDATE. This new flag is set for a zone write
   plug whenever a write opration targetting the zone of the zone write
   plug fails. This flag indicates that the zone write pointer offset is
   not reliable and that it must be updated when the next report zone,
   reset zone, finish zone or disk revalidation is executed.

 - Modify blk_zone_write_plug_bio_endio() to set the
   BLK_ZONE_WPLUG_NEED_WP_UPDATE flag for the target zone of a failed
   write BIO.

 - Modify the function disk_zone_wplug_set_wp_offset() to clear this
   new flag, thus implementing recovery of a correct write pointer
   offset with the reset (all) zone and finish zone operations.

 - Modify blkdev_report_zones() to always use the disk_report_zones_cb()
   callback so that disk_zone_wplug_sync_wp_offset() can be called for
   any zone marked with the BLK_ZONE_WPLUG_NEED_WP_UPDATE flag.
   This implements recovery of a correct write pointer offset for zone
   write plugs marked with BLK_ZONE_WPLUG_NEED_WP_UPDATE and within
   the range of the report zones operation executed by the user.

 - Modify blk_revalidate_seq_zone() to call
   disk_zone_wplug_sync_wp_offset() for all sequential write required
   zones when a zoned block device is revalidated, thus always resolving
   any inconsistency between the write pointer offset of zone write
   plugs and the actual write pointer position of sequential zones.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55642/">CVE-2024-55642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55642">CVE-2024-55642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235744">SUSE bug 1235744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55881" ref_url="https://www.suse.com/security/cve/CVE-2024-55881" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Play nice with protected guests in complete_hypercall_exit()

Use is_64_bit_hypercall() instead of is_64_bit_mode() to detect a 64-bit
hypercall when completing said hypercall.  For guests with protected state,
e.g. SEV-ES and SEV-SNP, KVM must assume the hypercall was made in 64-bit
mode as the vCPU state needed to detect 64-bit mode is unavailable.

Hacking the sev_smoke_test selftest to generate a KVM_HC_MAP_GPA_RANGE
hypercall via VMGEXIT trips the WARN:

  ------------[ cut here ]------------
  WARNING: CPU: 273 PID: 326626 at arch/x86/kvm/x86.h:180 complete_hypercall_exit+0x44/0xe0 [kvm]
  Modules linked in: kvm_amd kvm ... [last unloaded: kvm]
  CPU: 273 UID: 0 PID: 326626 Comm: sev_smoke_test Not tainted 6.12.0-smp--392e932fa0f3-feat #470
  Hardware name: Google Astoria/astoria, BIOS 0.20240617.0-0 06/17/2024
  RIP: 0010:complete_hypercall_exit+0x44/0xe0 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_arch_vcpu_ioctl_run+0x2400/0x2720 [kvm]
   kvm_vcpu_ioctl+0x54f/0x630 [kvm]
   __se_sys_ioctl+0x6b/0xc0
   do_syscall_64+0x83/0x160
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55881/">CVE-2024-55881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-55881">CVE-2024-55881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235745">SUSE bug 1235745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55916" ref_url="https://www.suse.com/security/cve/CVE-2024-55916" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: util: Avoid accessing a ringbuffer not initialized yet

If the KVP (or VSS) daemon starts before the VMBus channel's ringbuffer is
fully initialized, we can hit the panic below:

hv_utils: Registering HyperV Utility Driver
hv_vmbus: registering driver hv_utils
...
BUG: kernel NULL pointer dereference, address: 0000000000000000
CPU: 44 UID: 0 PID: 2552 Comm: hv_kvp_daemon Tainted: G E 6.11.0-rc3+ #1
RIP: 0010:hv_pkt_iter_first+0x12/0xd0
Call Trace:
...
 vmbus_recvpacket
 hv_kvp_onchannelcallback
 vmbus_on_event
 tasklet_action_common
 tasklet_action
 handle_softirqs
 irq_exit_rcu
 sysvec_hyperv_stimer0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_hyperv_stimer0
...
 kvp_register_done
 hvt_op_read
 vfs_read
 ksys_read
 __x64_sys_read

This can happen because the KVP/VSS channel callback can be invoked
even before the channel is fully opened:
1) as soon as hv_kvp_init() -&gt; hvutil_transport_init() creates
/dev/vmbus/hv_kvp, the kvp daemon can open the device file immediately and
register itself to the driver by writing a message KVP_OP_REGISTER1 to the
file (which is handled by kvp_on_msg() -&gt;kvp_handle_handshake()) and
reading the file for the driver's response, which is handled by
hvt_op_read(), which calls hvt-&gt;on_read(), i.e. kvp_register_done().

2) the problem with kvp_register_done() is that it can cause the
channel callback to be called even before the channel is fully opened,
and when the channel callback is starting to run, util_probe()-&gt;
vmbus_open() may have not initialized the ringbuffer yet, so the
callback can hit the panic of NULL pointer dereference.

To reproduce the panic consistently, we can add a "ssleep(10)" for KVP in
__vmbus_open(), just before the first hv_ringbuffer_init(), and then we
unload and reload the driver hv_utils, and run the daemon manually within
the 10 seconds.

Fix the panic by reordering the steps in util_probe() so the char dev
entry used by the KVP or VSS daemon is not created until after
vmbus_open() has completed. This reordering prevents the race condition
from happening.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-55916/">CVE-2024-55916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55916">CVE-2024-55916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235747">SUSE bug 1235747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56368</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56368" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56368" ref_url="https://www.suse.com/security/cve/CVE-2024-56368" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix overflow in __rb_map_vma

An overflow occurred when performing the following calculation:

   nr_pages = ((nr_subbufs + 1) &lt;&lt; subbuf_order) - pgoff;

Add a check before the calculation to avoid this problem.

syzbot reported this as a slab-out-of-bounds in __rb_map_vma:

BUG: KASAN: slab-out-of-bounds in __rb_map_vma+0x9ab/0xae0 kernel/trace/ring_buffer.c:7058
Read of size 8 at addr ffff8880767dd2b8 by task syz-executor187/5836

CPU: 0 UID: 0 PID: 5836 Comm: syz-executor187 Not tainted 6.13.0-rc2-syzkaller-00159-gf932fb9b4074 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xc3/0x620 mm/kasan/report.c:489
 kasan_report+0xd9/0x110 mm/kasan/report.c:602
 __rb_map_vma+0x9ab/0xae0 kernel/trace/ring_buffer.c:7058
 ring_buffer_map+0x56e/0x9b0 kernel/trace/ring_buffer.c:7138
 tracing_buffers_mmap+0xa6/0x120 kernel/trace/trace.c:8482
 call_mmap include/linux/fs.h:2183 [inline]
 mmap_file mm/internal.h:124 [inline]
 __mmap_new_file_vma mm/vma.c:2291 [inline]
 __mmap_new_vma mm/vma.c:2355 [inline]
 __mmap_region+0x1786/0x2670 mm/vma.c:2456
 mmap_region+0x127/0x320 mm/mmap.c:1348
 do_mmap+0xc00/0xfc0 mm/mmap.c:496
 vm_mmap_pgoff+0x1ba/0x360 mm/util.c:580
 ksys_mmap_pgoff+0x32c/0x5c0 mm/mmap.c:542
 __do_sys_mmap arch/x86/kernel/sys_x86_64.c:89 [inline]
 __se_sys_mmap arch/x86/kernel/sys_x86_64.c:82 [inline]
 __x64_sys_mmap+0x125/0x190 arch/x86/kernel/sys_x86_64.c:82
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The reproducer for this bug is:

------------------------8&lt;-------------------------
 #include &lt;fcntl.h&gt;
 #include &lt;stdlib.h&gt;
 #include &lt;unistd.h&gt;
 #include &lt;asm/types.h&gt;
 #include &lt;sys/mman.h&gt;

 int main(int argc, char **argv)
 {
	int page_size = getpagesize();
	int fd;
	void *meta;

	system("echo 1 &gt; /sys/kernel/tracing/buffer_size_kb");
	fd = open("/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw", O_RDONLY);

	meta = mmap(NULL, page_size, PROT_READ, MAP_SHARED, fd, page_size * 5);
 }
------------------------&gt;8-------------------------
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56368/">CVE-2024-56368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56368">CVE-2024-56368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235752">SUSE bug 1235752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56369</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56369" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56369" ref_url="https://www.suse.com/security/cve/CVE-2024-56369" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56369/">CVE-2024-56369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56369">CVE-2024-56369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235750">SUSE bug 1235750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56372</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56372" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56372" ref_url="https://www.suse.com/security/cve/CVE-2024-56372" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56372/">CVE-2024-56372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56372">CVE-2024-56372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235753">SUSE bug 1235753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56531</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56531" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56531" ref_url="https://www.suse.com/security/cve/CVE-2024-56531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56531/">CVE-2024-56531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56531">CVE-2024-56531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235057">SUSE bug 1235057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56532</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56532" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56532" ref_url="https://www.suse.com/security/cve/CVE-2024-56532" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56532/">CVE-2024-56532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56532">CVE-2024-56532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235059">SUSE bug 1235059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56533</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56533" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56533" ref_url="https://www.suse.com/security/cve/CVE-2024-56533" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56533/">CVE-2024-56533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56533">CVE-2024-56533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235053">SUSE bug 1235053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56534</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56534" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56534" ref_url="https://www.suse.com/security/cve/CVE-2024-56534" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56534/">CVE-2024-56534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56534">CVE-2024-56534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234965">SUSE bug 1234965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56535</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56535" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56535" ref_url="https://www.suse.com/security/cve/CVE-2024-56535" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56535/">CVE-2024-56535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56535">CVE-2024-56535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235044">SUSE bug 1235044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56536</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56536" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56536" ref_url="https://www.suse.com/security/cve/CVE-2024-56536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cw1200: Fix potential NULL dereference

A recent refactoring was identified by static analysis to
cause a potential NULL dereference, fix this!
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56536/">CVE-2024-56536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56536">CVE-2024-56536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234911">SUSE bug 1234911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56537</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56537" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56537" ref_url="https://www.suse.com/security/cve/CVE-2024-56537" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: xlnx: zynqmp_disp: layer may be null while releasing

layer-&gt;info can be null if we have an error on the first layer in
zynqmp_disp_create_layers
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56537/">CVE-2024-56537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56537">CVE-2024-56537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235049">SUSE bug 1235049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56538</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56538" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56538" ref_url="https://www.suse.com/security/cve/CVE-2024-56538" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: zynqmp_kms: Unplug DRM device before removal

Prevent userspace accesses to the DRM device from causing
use-after-frees by unplugging the device before we remove it. This
causes any further userspace accesses to result in an error without
further calls into this driver's internals.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56538/">CVE-2024-56538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56538">CVE-2024-56538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235051">SUSE bug 1235051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56539</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56539" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56539" ref_url="https://www.suse.com/security/cve/CVE-2024-56539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()

Replace one-element array with a flexible-array member in `struct
mwifiex_ie_types_wildcard_ssid_params` to fix the following warning
on a MT8173 Chromebook (mt8173-elm-hana):

[  356.775250] ------------[ cut here ]------------
[  356.784543] memcpy: detected field-spanning write (size 6) of single field "wildcard_ssid_tlv-&gt;ssid" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)
[  356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]

The "(size 6)" above is exactly the length of the SSID of the network
this device was connected to. The source of the warning looks like:

    ssid_len = user_scan_in-&gt;ssid_list[i].ssid_len;
    [...]
    memcpy(wildcard_ssid_tlv-&gt;ssid,
           user_scan_in-&gt;ssid_list[i].ssid, ssid_len);

There is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this
struct, but it already didn't account for the size of the one-element
array, so it doesn't need to be changed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56539/">CVE-2024-56539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56539">CVE-2024-56539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234963">SUSE bug 1234963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234964">SUSE bug 1234964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56540</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56540" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56540" ref_url="https://www.suse.com/security/cve/CVE-2024-56540" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Prevent recovery invocation during probe and resume

Refactor IPC send and receive functions to allow correct
handling of operations that should not trigger a recovery process.

Expose ivpu_send_receive_internal(), which is now utilized by the D0i3
entry, DCT initialization, and HWS initialization functions.
These functions have been modified to return error codes gracefully,
rather than initiating recovery.

The updated functions are invoked within ivpu_probe() and ivpu_resume(),
ensuring that any errors encountered during these stages result in a proper
teardown or shutdown sequence. The previous approach of triggering recovery
within these functions could lead to a race condition, potentially causing
undefined behavior and kernel crashes due to null pointer dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56540/">CVE-2024-56540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56540">CVE-2024-56540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235063">SUSE bug 1235063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56541</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56541" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56541" ref_url="https://www.suse.com/security/cve/CVE-2024-56541" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix use-after-free in ath12k_dp_cc_cleanup()

During ath12k module removal, in ath12k_core_deinit(),
ath12k_mac_destroy() un-registers ah-&gt;hw from mac80211 and frees
the ah-&gt;hw as well as all the ar's in it. After this
ath12k_core_soc_destroy()-&gt; ath12k_dp_free()-&gt; ath12k_dp_cc_cleanup()
tries to access one of the freed ar's from pending skb.

This is because during mac destroy, driver failed to flush few
data packets, which were accessed later in ath12k_dp_cc_cleanup()
and freed, but using ar from the packet led to this use-after-free.

BUG: KASAN: use-after-free in ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k]
Write of size 4 at addr ffff888150bd3514 by task modprobe/8926
CPU: 0 UID: 0 PID: 8926 Comm: modprobe Not tainted
6.11.0-rc2-wt-ath+ #1746
Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS
HNKBLi70.86A.0067.2021.0528.1339 05/28/2021

Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x7d/0xe0
  print_address_description.constprop.0+0x33/0x3a0
  print_report+0xb5/0x260
  ? kasan_addr_to_slab+0x24/0x80
  kasan_report+0xd8/0x110
  ? ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k]
  ? ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k]
  kasan_check_range+0xf3/0x1a0
  __kasan_check_write+0x14/0x20
  ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k]
  ath12k_dp_free+0x178/0x420 [ath12k]
  ath12k_core_stop+0x176/0x200 [ath12k]
  ath12k_core_deinit+0x13f/0x210 [ath12k]
  ath12k_pci_remove+0xad/0x1c0 [ath12k]
  pci_device_remove+0x9b/0x1b0
  device_remove+0xbf/0x150
  device_release_driver_internal+0x3c3/0x580
  ? __kasan_check_read+0x11/0x20
  driver_detach+0xc4/0x190
  bus_remove_driver+0x130/0x2a0
  driver_unregister+0x68/0x90
  pci_unregister_driver+0x24/0x240
  ? find_module_all+0x13e/0x1e0
  ath12k_pci_exit+0x10/0x20 [ath12k]
  __do_sys_delete_module+0x32c/0x580
  ? module_flags+0x2f0/0x2f0
  ? kmem_cache_free+0xf0/0x410
  ? __fput+0x56f/0xab0
  ? __fput+0x56f/0xab0
  ? debug_smp_processor_id+0x17/0x20
  __x64_sys_delete_module+0x4f/0x70
  x64_sys_call+0x522/0x9f0
  do_syscall_64+0x64/0x130
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f8182c6ac8b

Commit 24de1b7b231c ("wifi: ath12k: fix flush failure in recovery
scenarios") added the change to decrement the pending packets count
in case of recovery which make sense as ah-&gt;hw as well all
ar's in it are intact during recovery, but during core deinit there
is no use in decrementing packets count or waking up the empty waitq
as the module is going to be removed also ar's from pending skb's
can't be used and the packets should just be released back.

To fix this, avoid accessing ar from skb-&gt;cb when driver is being
unregistered.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00214-QCAHKSWPL_SILICONZ-1
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56541/">CVE-2024-56541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56541">CVE-2024-56541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235064">SUSE bug 1235064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56542</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56542" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56542" ref_url="https://www.suse.com/security/cve/CVE-2024-56542" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a memleak issue when driver is removed

Running "modprobe amdgpu" the second time (followed by a modprobe -r
amdgpu) causes a call trace like:

[  845.212163] Memory manager not clean during takedown.
[  845.212170] WARNING: CPU: 4 PID: 2481 at drivers/gpu/drm/drm_mm.c:999 drm_mm_takedown+0x2b/0x40
[  845.212177] Modules linked in: amdgpu(OE-) amddrm_ttm_helper(OE) amddrm_buddy(OE) amdxcp(OE) amd_sched(OE) drm_exec drm_suballoc_helper drm_display_helper i2c_algo_bit amdttm(OE) amdkcl(OE) cec rc_core sunrpc qrtr intel_rapl_msr intel_rapl_common snd_hda_codec_hdmi edac_mce_amd snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_usb_audio snd_hda_codec snd_usbmidi_lib kvm_amd snd_hda_core snd_ump mc snd_hwdep kvm snd_pcm snd_seq_midi snd_seq_midi_event irqbypass crct10dif_pclmul snd_rawmidi polyval_clmulni polyval_generic ghash_clmulni_intel sha256_ssse3 sha1_ssse3 snd_seq aesni_intel crypto_simd snd_seq_device cryptd snd_timer mfd_aaeon asus_nb_wmi eeepc_wmi joydev asus_wmi snd ledtrig_audio sparse_keymap ccp wmi_bmof input_leds k10temp i2c_piix4 platform_profile rapl soundcore gpio_amdpt mac_hid binfmt_misc msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs ip_tables x_tables autofs4 hid_logitech_hidpp hid_logitech_dj hid_generic usbhid hid ahci xhci_pci igc crc32_pclmul libahci xhci_pci_renesas video
[  845.212284]  wmi [last unloaded: amddrm_ttm_helper(OE)]
[  845.212290] CPU: 4 PID: 2481 Comm: modprobe Tainted: G        W  OE      6.8.0-31-generic #31-Ubuntu
[  845.212296] RIP: 0010:drm_mm_takedown+0x2b/0x40
[  845.212300] Code: 1f 44 00 00 48 8b 47 38 48 83 c7 38 48 39 f8 75 09 31 c0 31 ff e9 90 2e 86 00 55 48 c7 c7 d0 f6 8e 8a 48 89 e5 e8 f5 db 45 ff &lt;0f&gt; 0b 5d 31 c0 31 ff e9 74 2e 86 00 66 0f 1f 84 00 00 00 00 00 90
[  845.212302] RSP: 0018:ffffb11302127ae0 EFLAGS: 00010246
[  845.212305] RAX: 0000000000000000 RBX: ffff92aa5020fc08 RCX: 0000000000000000
[  845.212307] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  845.212309] RBP: ffffb11302127ae0 R08: 0000000000000000 R09: 0000000000000000
[  845.212310] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000004
[  845.212312] R13: ffff92aa50200000 R14: ffff92aa5020fb10 R15: ffff92aa5020faa0
[  845.212313] FS:  0000707dd7c7c080(0000) GS:ffff92b93de00000(0000) knlGS:0000000000000000
[  845.212316] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  845.212318] CR2: 00007d48b0aee200 CR3: 0000000115a58000 CR4: 0000000000f50ef0
[  845.212320] PKRU: 55555554
[  845.212321] Call Trace:
[  845.212323]  &lt;TASK&gt;
[  845.212328]  ? show_regs+0x6d/0x80
[  845.212333]  ? __warn+0x89/0x160
[  845.212339]  ? drm_mm_takedown+0x2b/0x40
[  845.212344]  ? report_bug+0x17e/0x1b0
[  845.212350]  ? handle_bug+0x51/0xa0
[  845.212355]  ? exc_invalid_op+0x18/0x80
[  845.212359]  ? asm_exc_invalid_op+0x1b/0x20
[  845.212366]  ? drm_mm_takedown+0x2b/0x40
[  845.212371]  amdgpu_gtt_mgr_fini+0xa9/0x130 [amdgpu]
[  845.212645]  amdgpu_ttm_fini+0x264/0x340 [amdgpu]
[  845.212770]  amdgpu_bo_fini+0x2e/0xc0 [amdgpu]
[  845.212894]  gmc_v12_0_sw_fini+0x2a/0x40 [amdgpu]
[  845.213036]  amdgpu_device_fini_sw+0x11a/0x590 [amdgpu]
[  845.213159]  amdgpu_driver_release_kms+0x16/0x40 [amdgpu]
[  845.213302]  devm_drm_dev_init_release+0x5e/0x90
[  845.213305]  devm_action_release+0x12/0x30
[  845.213308]  release_nodes+0x42/0xd0
[  845.213311]  devres_release_all+0x97/0xe0
[  845.213314]  device_unbind_cleanup+0x12/0x80
[  845.213317]  device_release_driver_internal+0x230/0x270
[  845.213319]  ? srso_alias_return_thunk+0x5/0xfbef5

This is caused by lost memory during early init phase. First time driver
is removed, memory is freed but when second time the driver is inserted,
VBIOS dmub is not active, since the PSP policy is to retain the driver
loaded version on subsequent warm boots. Hence, communication with VBIOS
DMUB fails.

Fix this by aborting further comm
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56542/">CVE-2024-56542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56542">CVE-2024-56542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234908">SUSE bug 1234908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56543</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56543" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56543" ref_url="https://www.suse.com/security/cve/CVE-2024-56543" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Skip Rx TID cleanup for self peer

During peer create, dp setup for the peer is done where Rx TID is
updated for all the TIDs. Peer object for self peer will not go through
dp setup.

When core halts, dp cleanup is done for all the peers. While cleanup,
rx_tid::ab is accessed which causes below stack trace for self peer.

WARNING: CPU: 6 PID: 12297 at drivers/net/wireless/ath/ath12k/dp_rx.c:851
Call Trace:
__warn+0x7b/0x1a0
ath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k]
report_bug+0x10b/0x200
handle_bug+0x3f/0x70
exc_invalid_op+0x13/0x60
asm_exc_invalid_op+0x16/0x20
ath12k_dp_rx_frags_cleanup+0xd2/0xe0 [ath12k]
ath12k_dp_rx_frags_cleanup+0xca/0xe0 [ath12k]
ath12k_dp_rx_peer_tid_cleanup+0x39/0xa0 [ath12k]
ath12k_mac_peer_cleanup_all+0x61/0x100 [ath12k]
ath12k_core_halt+0x3b/0x100 [ath12k]
ath12k_core_reset+0x494/0x4c0 [ath12k]

sta object in peer will be updated when remote peer is created. Hence
use peer::sta to detect the self peer and skip the cleanup.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56543/">CVE-2024-56543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56543">CVE-2024-56543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235065">SUSE bug 1235065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56544</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56544" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56544" ref_url="https://www.suse.com/security/cve/CVE-2024-56544" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: change folios array from kmalloc to kvmalloc

When PAGE_SIZE 4096, MAX_PAGE_ORDER 10, 64bit machine,
page_alloc only support 4MB.
If above this, trigger this warn and return NULL.

udmabuf can change size limit, if change it to 3072(3GB), and then alloc
3GB udmabuf, will fail create.

[ 4080.876581] ------------[ cut here ]------------
[ 4080.876843] WARNING: CPU: 3 PID: 2015 at mm/page_alloc.c:4556 __alloc_pages+0x2c8/0x350
[ 4080.878839] RIP: 0010:__alloc_pages+0x2c8/0x350
[ 4080.879470] Call Trace:
[ 4080.879473]  &lt;TASK&gt;
[ 4080.879473]  ? __alloc_pages+0x2c8/0x350
[ 4080.879475]  ? __warn.cold+0x8e/0xe8
[ 4080.880647]  ? __alloc_pages+0x2c8/0x350
[ 4080.880909]  ? report_bug+0xff/0x140
[ 4080.881175]  ? handle_bug+0x3c/0x80
[ 4080.881556]  ? exc_invalid_op+0x17/0x70
[ 4080.881559]  ? asm_exc_invalid_op+0x1a/0x20
[ 4080.882077]  ? udmabuf_create+0x131/0x400

Because MAX_PAGE_ORDER, kmalloc can max alloc 4096 * (1 &lt;&lt; 10), 4MB
memory, each array entry is pointer(8byte), so can save 524288 pages(2GB).

Further more, costly order(order 3) may not be guaranteed that it can be
applied for, due to fragmentation.

This patch change udmabuf array use kvmalloc_array, this can fallback
alloc into vmalloc, which can guarantee allocation for any size and does
not affect the performance of kmalloc allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56544/">CVE-2024-56544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56544">CVE-2024-56544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235067">SUSE bug 1235067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56545</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56545" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56545" ref_url="https://www.suse.com/security/cve/CVE-2024-56545" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hyperv: streamline driver probe to avoid devres issues

It was found that unloading 'hid_hyperv' module results in a devres
complaint:

 ...
 hv_vmbus: unregistering driver hid_hyperv
 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 3983 at drivers/base/devres.c:691 devres_release_group+0x1f2/0x2c0
 ...
 Call Trace:
  &lt;TASK&gt;
  ? devres_release_group+0x1f2/0x2c0
  ? __warn+0xd1/0x1c0
  ? devres_release_group+0x1f2/0x2c0
  ? report_bug+0x32a/0x3c0
  ? handle_bug+0x53/0xa0
  ? exc_invalid_op+0x18/0x50
  ? asm_exc_invalid_op+0x1a/0x20
  ? devres_release_group+0x1f2/0x2c0
  ? devres_release_group+0x90/0x2c0
  ? rcu_is_watching+0x15/0xb0
  ? __pfx_devres_release_group+0x10/0x10
  hid_device_remove+0xf5/0x220
  device_release_driver_internal+0x371/0x540
  ? klist_put+0xf3/0x170
  bus_remove_device+0x1f1/0x3f0
  device_del+0x33f/0x8c0
  ? __pfx_device_del+0x10/0x10
  ? cleanup_srcu_struct+0x337/0x500
  hid_destroy_device+0xc8/0x130
  mousevsc_remove+0xd2/0x1d0 [hid_hyperv]
  device_release_driver_internal+0x371/0x540
  driver_detach+0xc5/0x180
  bus_remove_driver+0x11e/0x2a0
  ? __mutex_unlock_slowpath+0x160/0x5e0
  vmbus_driver_unregister+0x62/0x2b0 [hv_vmbus]
  ...

And the issue seems to be that the corresponding devres group is not
allocated. Normally, devres_open_group() is called from
__hid_device_probe() but Hyper-V HID driver overrides 'hid_dev-&gt;driver'
with 'mousevsc_hid_driver' stub and basically re-implements
__hid_device_probe() by calling hid_parse() and hid_hw_start() but not
devres_open_group(). hid_device_probe() does not call __hid_device_probe()
for it. Later, when the driver is removed, hid_device_remove() calls
devres_release_group() as it doesn't check whether hdev-&gt;driver was
initially overridden or not.

The issue seems to be related to the commit 62c68e7cee33 ("HID: ensure
timely release of driver-allocated resources") but the commit itself seems
to be correct.

Fix the issue by dropping the 'hid_dev-&gt;driver' override and using
hid_register_driver()/hid_unregister_driver() instead. Alternatively, it
would have been possible to rely on the default handling but
HID_CONNECT_DEFAULT implies HID_CONNECT_HIDRAW and it doesn't seem to work
for mousevsc as-is.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56545/">CVE-2024-56545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56545">CVE-2024-56545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235069">SUSE bug 1235069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56546</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56546" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56546" ref_url="https://www.suse.com/security/cve/CVE-2024-56546" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: soc: xilinx: add the missing kfree in xlnx_add_cb_for_suspend()

If we fail to allocate memory for cb_data by kmalloc, the memory
allocation for eve_data is never freed, add the missing kfree()
in the error handling path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-05"/>
	<updated date="2025-01-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56546/">CVE-2024-56546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56546">CVE-2024-56546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235070">SUSE bug 1235070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56547</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56547" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56547" ref_url="https://www.suse.com/security/cve/CVE-2024-56547" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/nocb: Fix missed RCU barrier on deoffloading

Currently, running rcutorture test with torture_type=rcu fwd_progress=8
n_barrier_cbs=8 nocbs_nthreads=8 nocbs_toggle=100 onoff_interval=60
test_boost=2, will trigger the following warning:

	WARNING: CPU: 19 PID: 100 at kernel/rcu/tree_nocb.h:1061 rcu_nocb_rdp_deoffload+0x292/0x2a0
	RIP: 0010:rcu_nocb_rdp_deoffload+0x292/0x2a0
	 Call Trace:
	  &lt;TASK&gt;
	  ? __warn+0x7e/0x120
	  ? rcu_nocb_rdp_deoffload+0x292/0x2a0
	  ? report_bug+0x18e/0x1a0
	  ? handle_bug+0x3d/0x70
	  ? exc_invalid_op+0x18/0x70
	  ? asm_exc_invalid_op+0x1a/0x20
	  ? rcu_nocb_rdp_deoffload+0x292/0x2a0
	  rcu_nocb_cpu_deoffload+0x70/0xa0
	  rcu_nocb_toggle+0x136/0x1c0
	  ? __pfx_rcu_nocb_toggle+0x10/0x10
	  kthread+0xd1/0x100
	  ? __pfx_kthread+0x10/0x10
	  ret_from_fork+0x2f/0x50
	  ? __pfx_kthread+0x10/0x10
	  ret_from_fork_asm+0x1a/0x30
	  &lt;/TASK&gt;

CPU0                               CPU2                          CPU3
//rcu_nocb_toggle             //nocb_cb_wait                   //rcutorture

// deoffload CPU1             // process CPU1's rdp
rcu_barrier()
    rcu_segcblist_entrain()
        rcu_segcblist_add_len(1);
        // len == 2
        // enqueue barrier
        // callback to CPU1's
        // rdp-&gt;cblist
                             rcu_do_batch()
                                 // invoke CPU1's rdp-&gt;cblist
                                 // callback
                                 rcu_barrier_callback()
                                                             rcu_barrier()
                                                               mutex_lock(&amp;rcu_state.barrier_mutex);
                                                               // still see len == 2
                                                               // enqueue barrier callback
                                                               // to CPU1's rdp-&gt;cblist
                                                               rcu_segcblist_entrain()
                                                                   rcu_segcblist_add_len(1);
                                                                   // len == 3
                                 // decrement len
                                 rcu_segcblist_add_len(-2);
                             kthread_parkme()

// CPU1's rdp-&gt;cblist len == 1
// Warn because there is
// still a pending barrier
// trigger warning
WARN_ON_ONCE(rcu_segcblist_n_cbs(&amp;rdp-&gt;cblist));
cpus_read_unlock();

                                                                // wait CPU1 to comes online and
                                                                // invoke barrier callback on
                                                                // CPU1 rdp's-&gt;cblist
                                                                wait_for_completion(&amp;rcu_state.barrier_completion);
// deoffload CPU4
cpus_read_lock()
  rcu_barrier()
    mutex_lock(&amp;rcu_state.barrier_mutex);
    // block on barrier_mutex
    // wait rcu_barrier() on
    // CPU3 to unlock barrier_mutex
    // but CPU3 unlock barrier_mutex
    // need to wait CPU1 comes online
    // when CPU1 going online will block on cpus_write_lock

The above scenario will not only trigger a WARN_ON_ONCE(), but also
trigger a deadlock.

Thanks to nocb locking, a second racing rcu_barrier() on an offline CPU
will either observe the decremented callback counter down to 0 and spare
the callback enqueue, or rcuo will observe the new callback and keep
rdp-&gt;nocb_cb_sleep to false.

Therefore check rdp-&gt;nocb_cb_sleep before parking to make sure no
further rcu_barrier() is waiting on the rdp.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56547/">CVE-2024-56547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56547">CVE-2024-56547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235072">SUSE bug 1235072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56548</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56548" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56548" ref_url="https://www.suse.com/security/cve/CVE-2024-56548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hfsplus: don't query the device logical block size multiple times

Devices block sizes may change. One of these cases is a loop device by
using ioctl LOOP_SET_BLOCK_SIZE.

While this may cause other issues like IO being rejected, in the case of
hfsplus, it will allocate a block by using that size and potentially write
out-of-bounds when hfsplus_read_wrapper calls hfsplus_submit_bio and the
latter function reads a different io_size.

Using a new min_io_size initally set to sb_min_blocksize works for the
purposes of the original fix, since it will be set to the max between
HFSPLUS_SECTOR_SIZE and the first seen logical block size. We still use the
max between HFSPLUS_SECTOR_SIZE and min_io_size in case the latter is not
initialized.

Tested by mounting an hfsplus filesystem with loop block sizes 512, 1024
and 4096.

The produced KASAN report before the fix looks like this:

[  419.944641] ==================================================================
[  419.945655] BUG: KASAN: slab-use-after-free in hfsplus_read_wrapper+0x659/0xa0a
[  419.946703] Read of size 2 at addr ffff88800721fc00 by task repro/10678
[  419.947612]
[  419.947846] CPU: 0 UID: 0 PID: 10678 Comm: repro Not tainted 6.12.0-rc5-00008-gdf56e0f2f3ca #84
[  419.949007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[  419.950035] Call Trace:
[  419.950384]  &lt;TASK&gt;
[  419.950676]  dump_stack_lvl+0x57/0x78
[  419.951212]  ? hfsplus_read_wrapper+0x659/0xa0a
[  419.951830]  print_report+0x14c/0x49e
[  419.952361]  ? __virt_addr_valid+0x267/0x278
[  419.952979]  ? kmem_cache_debug_flags+0xc/0x1d
[  419.953561]  ? hfsplus_read_wrapper+0x659/0xa0a
[  419.954231]  kasan_report+0x89/0xb0
[  419.954748]  ? hfsplus_read_wrapper+0x659/0xa0a
[  419.955367]  hfsplus_read_wrapper+0x659/0xa0a
[  419.955948]  ? __pfx_hfsplus_read_wrapper+0x10/0x10
[  419.956618]  ? do_raw_spin_unlock+0x59/0x1a9
[  419.957214]  ? _raw_spin_unlock+0x1a/0x2e
[  419.957772]  hfsplus_fill_super+0x348/0x1590
[  419.958355]  ? hlock_class+0x4c/0x109
[  419.958867]  ? __pfx_hfsplus_fill_super+0x10/0x10
[  419.959499]  ? __pfx_string+0x10/0x10
[  419.960006]  ? lock_acquire+0x3e2/0x454
[  419.960532]  ? bdev_name.constprop.0+0xce/0x243
[  419.961129]  ? __pfx_bdev_name.constprop.0+0x10/0x10
[  419.961799]  ? pointer+0x3f0/0x62f
[  419.962277]  ? __pfx_pointer+0x10/0x10
[  419.962761]  ? vsnprintf+0x6c4/0xfba
[  419.963178]  ? __pfx_vsnprintf+0x10/0x10
[  419.963621]  ? setup_bdev_super+0x376/0x3b3
[  419.964029]  ? snprintf+0x9d/0xd2
[  419.964344]  ? __pfx_snprintf+0x10/0x10
[  419.964675]  ? lock_acquired+0x45c/0x5e9
[  419.965016]  ? set_blocksize+0x139/0x1c1
[  419.965381]  ? sb_set_blocksize+0x6d/0xae
[  419.965742]  ? __pfx_hfsplus_fill_super+0x10/0x10
[  419.966179]  mount_bdev+0x12f/0x1bf
[  419.966512]  ? __pfx_mount_bdev+0x10/0x10
[  419.966886]  ? vfs_parse_fs_string+0xce/0x111
[  419.967293]  ? __pfx_vfs_parse_fs_string+0x10/0x10
[  419.967702]  ? __pfx_hfsplus_mount+0x10/0x10
[  419.968073]  legacy_get_tree+0x104/0x178
[  419.968414]  vfs_get_tree+0x86/0x296
[  419.968751]  path_mount+0xba3/0xd0b
[  419.969157]  ? __pfx_path_mount+0x10/0x10
[  419.969594]  ? kmem_cache_free+0x1e2/0x260
[  419.970311]  do_mount+0x99/0xe0
[  419.970630]  ? __pfx_do_mount+0x10/0x10
[  419.971008]  __do_sys_mount+0x199/0x1c9
[  419.971397]  do_syscall_64+0xd0/0x135
[  419.971761]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  419.972233] RIP: 0033:0x7c3cb812972e
[  419.972564] Code: 48 8b 0d f5 46 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 49 89 ca b8 a5 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d c2 46 0d 00 f7 d8 64 89 01 48
[  419.974371] RSP: 002b:00007ffe30632548 EFLAGS: 00000286 ORIG_RAX: 00000000000000a5
[  419.975048] RAX: ffffffffffffffda RBX: 00007ffe306328d8 RCX: 00007c3cb812972e
[  419.975701] RDX: 0000000020000000 RSI: 0000000020000c80 RDI:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56548/">CVE-2024-56548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56548">CVE-2024-56548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235073">SUSE bug 1235073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235074">SUSE bug 1235074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56549</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56549" ref_url="https://www.suse.com/security/cve/CVE-2024-56549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: Fix NULL pointer dereference in object-&gt;file

At present, the object-&gt;file has the NULL pointer dereference problem in
ondemand-mode. The root cause is that the allocated fd and object-&gt;file
lifetime are inconsistent, and the user-space invocation to anon_fd uses
object-&gt;file. Following is the process that triggers the issue:

	  [write fd]				[umount]
cachefiles_ondemand_fd_write_iter
				       fscache_cookie_state_machine
					 cachefiles_withdraw_cookie
  if (!file) return -ENOBUFS
					   cachefiles_clean_up_object
					     cachefiles_unmark_inode_in_use
					     fput(object-&gt;file)
					     object-&gt;file = NULL
  // file NULL pointer dereference!
  __cachefiles_write(..., file, ...)

Fix this issue by add an additional reference count to the object-&gt;file
before write/llseek, and decrement after it finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56549/">CVE-2024-56549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56549">CVE-2024-56549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234912">SUSE bug 1234912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56550</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56550" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56550" ref_url="https://www.suse.com/security/cve/CVE-2024-56550" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/stacktrace: Use break instead of return statement

arch_stack_walk_user_common() contains a return statement instead of a
break statement in case store_ip() fails while trying to store a callchain
entry of a user space process.
This may lead to a missing pagefault_enable() call.

If this happens any subsequent page fault of the process won't be resolved
by the page fault handler and this in turn will lead to the process being
killed.

Use a break instead of a return statement to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56550/">CVE-2024-56550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56550">CVE-2024-56550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234915">SUSE bug 1234915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56551</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56551" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56551" ref_url="https://www.suse.com/security/cve/CVE-2024-56551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix usage slab after free

[  +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147

[  +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1
[  +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000016] Call Trace:
[  +0.000008]  &lt;TASK&gt;
[  +0.000009]  dump_stack_lvl+0x76/0xa0
[  +0.000017]  print_report+0xce/0x5f0
[  +0.000017]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  ? srso_return_thunk+0x5/0x5f
[  +0.000015]  ? kasan_complete_mode_report_info+0x72/0x200
[  +0.000016]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  kasan_report+0xbe/0x110
[  +0.000015]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000023]  __asan_report_load8_noabort+0x14/0x30
[  +0.000014]  drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000016]  ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? enable_work+0x124/0x220
[  +0.000015]  ? __pfx_enable_work+0x10/0x10
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? free_large_kmalloc+0x85/0xf0
[  +0.000016]  drm_sched_entity_destroy+0x18/0x30 [gpu_sched]
[  +0.000020]  amdgpu_vce_sw_fini+0x55/0x170 [amdgpu]
[  +0.000735]  ? __kasan_check_read+0x11/0x20
[  +0.000016]  vce_v4_0_sw_fini+0x80/0x110 [amdgpu]
[  +0.000726]  amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu]
[  +0.000679]  ? mutex_unlock+0x80/0xe0
[  +0.000017]  ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu]
[  +0.000662]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? mutex_unlock+0x80/0xe0
[  +0.000016]  amdgpu_driver_release_kms+0x16/0x80 [amdgpu]
[  +0.000663]  drm_minor_release+0xc9/0x140 [drm]
[  +0.000081]  drm_release+0x1fd/0x390 [drm]
[  +0.000082]  __fput+0x36c/0xad0
[  +0.000018]  __fput_sync+0x3c/0x50
[  +0.000014]  __x64_sys_close+0x7d/0xe0
[  +0.000014]  x64_sys_call+0x1bc6/0x2680
[  +0.000014]  do_syscall_64+0x70/0x130
[  +0.000014]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit_to_user_mode+0x60/0x190
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit+0x43/0x50
[  +0.000012]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? exc_page_fault+0x7c/0x110
[  +0.000015]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  +0.000014] RIP: 0033:0x7ffff7b14f67
[  +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff
[  +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67
[  +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003
[  +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000
[  +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8
[  +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040
[  +0.000020]  &lt;/TASK&gt;

[  +0.000016] Allocated by task 383 on cpu 7 at 26.880319s:
[  +0.000014]  kasan_save_stack+0x28/0x60
[  +0.000008]  kasan_save_track+0x18/0x70
[  +0.000007]  kasan_save_alloc_info+0x38/0x60
[  +0.000007]  __kasan_kmalloc+0xc1/0xd0
[  +0.000007]  kmalloc_trace_noprof+0x180/0x380
[  +0.000007]  drm_sched_init+0x411/0xec0 [gpu_sched]
[  +0.000012]  amdgpu_device_init+0x695f/0xa610 [amdgpu]
[  +0.000658]  amdgpu_driver_load_kms+0x1a/0x120 [amdgpu]
[  +0.000662]  amdgpu_pci_p
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56551/">CVE-2024-56551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235075">SUSE bug 1235075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235102">SUSE bug 1235102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56552</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56552" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56552" ref_url="https://www.suse.com/security/cve/CVE-2024-56552" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc_submit: fix race around suspend_pending

Currently in some testcases we can trigger:

xe 0000:03:00.0: [drm] Assertion `exec_queue_destroyed(q)` failed!
....
WARNING: CPU: 18 PID: 2640 at drivers/gpu/drm/xe/xe_guc_submit.c:1826 xe_guc_sched_done_handler+0xa54/0xef0 [xe]
xe 0000:03:00.0: [drm] *ERROR* GT1: DEREGISTER_DONE: Unexpected engine state 0x00a1, guc_id=57

Looking at a snippet of corresponding ftrace for this GuC id we can see:

162.673311: xe_sched_msg_add:     dev=0000:03:00.0, gt=1 guc_id=57, opcode=3
162.673317: xe_sched_msg_recv:    dev=0000:03:00.0, gt=1 guc_id=57, opcode=3
162.673319: xe_exec_queue_scheduling_disable: dev=0000:03:00.0, 1:0x2, gt=1, width=1, guc_id=57, guc_state=0x29, flags=0x0
162.674089: xe_exec_queue_kill:   dev=0000:03:00.0, 1:0x2, gt=1, width=1, guc_id=57, guc_state=0x29, flags=0x0
162.674108: xe_exec_queue_close:  dev=0000:03:00.0, 1:0x2, gt=1, width=1, guc_id=57, guc_state=0xa9, flags=0x0
162.674488: xe_exec_queue_scheduling_done: dev=0000:03:00.0, 1:0x2, gt=1, width=1, guc_id=57, guc_state=0xa9, flags=0x0
162.678452: xe_exec_queue_deregister: dev=0000:03:00.0, 1:0x2, gt=1, width=1, guc_id=57, guc_state=0xa1, flags=0x0

It looks like we try to suspend the queue (opcode=3), setting
suspend_pending and triggering a disable_scheduling. The user then
closes the queue. However the close will also forcefully signal the
suspend fence after killing the queue, later when the G2H response for
disable_scheduling comes back we have now cleared suspend_pending when
signalling the suspend fence, so the disable_scheduling now incorrectly
tries to also deregister the queue. This leads to warnings since the queue
has yet to even be marked for destruction. We also seem to trigger
errors later with trying to double unregister the same queue.

To fix this tweak the ordering when handling the response to ensure we
don't race with a disable_scheduling that didn't actually intend to
perform an unregister.  The destruction path should now also correctly
wait for any pending_disable before marking as destroyed.

(cherry picked from commit f161809b362f027b6d72bd998e47f8f0bad60a2e)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56552/">CVE-2024-56552 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56552">CVE-2024-56552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235071">SUSE bug 1235071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56553</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56553" ref_url="https://www.suse.com/security/cve/CVE-2024-56553" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix memleak of proc-&gt;delivered_freeze

If a freeze notification is cleared with BC_CLEAR_FREEZE_NOTIFICATION
before calling binder_freeze_notification_done(), then it is detached
from its reference (e.g. ref-&gt;freeze) but the work remains queued in
proc-&gt;delivered_freeze. This leads to a memory leak when the process
exits as any pending entries in proc-&gt;delivered_freeze are not freed:

  unreferenced object 0xffff38e8cfa36180 (size 64):
    comm "binder-util", pid 655, jiffies 4294936641
    hex dump (first 32 bytes):
      b8 e9 9e c8 e8 38 ff ff b8 e9 9e c8 e8 38 ff ff  .....8.......8..
      0b 00 00 00 00 00 00 00 3c 1f 4b 00 00 00 00 00  ........&lt;.K.....
    backtrace (crc 95983b32):
      [&lt;000000000d0582cf&gt;] kmemleak_alloc+0x34/0x40
      [&lt;000000009c99a513&gt;] __kmalloc_cache_noprof+0x208/0x280
      [&lt;00000000313b1704&gt;] binder_thread_write+0xdec/0x439c
      [&lt;000000000cbd33bb&gt;] binder_ioctl+0x1b68/0x22cc
      [&lt;000000002bbedeeb&gt;] __arm64_sys_ioctl+0x124/0x190
      [&lt;00000000b439adee&gt;] invoke_syscall+0x6c/0x254
      [&lt;00000000173558fc&gt;] el0_svc_common.constprop.0+0xac/0x230
      [&lt;0000000084f72311&gt;] do_el0_svc+0x40/0x58
      [&lt;000000008b872457&gt;] el0_svc+0x38/0x78
      [&lt;00000000ee778653&gt;] el0t_64_sync_handler+0x120/0x12c
      [&lt;00000000a8ec61bf&gt;] el0t_64_sync+0x190/0x194

This patch fixes the leak by ensuring that any pending entries in
proc-&gt;delivered_freeze are freed during binder_deferred_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56553/">CVE-2024-56553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56553">CVE-2024-56553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234917">SUSE bug 1234917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56554</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56554" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56554" ref_url="https://www.suse.com/security/cve/CVE-2024-56554" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix freeze UAF in binder_release_work()

When a binder reference is cleaned up, any freeze work queued in the
associated process should also be removed. Otherwise, the reference is
freed while its ref-&gt;freeze.work is still queued in proc-&gt;work leading
to a use-after-free issue as shown by the following KASAN report:

  ==================================================================
  BUG: KASAN: slab-use-after-free in binder_release_work+0x398/0x3d0
  Read of size 8 at addr ffff31600ee91488 by task kworker/5:1/211

  CPU: 5 UID: 0 PID: 211 Comm: kworker/5:1 Not tainted 6.11.0-rc7-00382-gfc6c92196396 #22
  Hardware name: linux,dummy-virt (DT)
  Workqueue: events binder_deferred_func
  Call trace:
   binder_release_work+0x398/0x3d0
   binder_deferred_func+0xb60/0x109c
   process_one_work+0x51c/0xbd4
   worker_thread+0x608/0xee8

  Allocated by task 703:
   __kmalloc_cache_noprof+0x130/0x280
   binder_thread_write+0xdb4/0x42a0
   binder_ioctl+0x18f0/0x25ac
   __arm64_sys_ioctl+0x124/0x190
   invoke_syscall+0x6c/0x254

  Freed by task 211:
   kfree+0xc4/0x230
   binder_deferred_func+0xae8/0x109c
   process_one_work+0x51c/0xbd4
   worker_thread+0x608/0xee8
  ==================================================================

This commit fixes the issue by ensuring any queued freeze work is removed
when cleaning up a binder reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56554/">CVE-2024-56554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56554">CVE-2024-56554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235119">SUSE bug 1235119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56555</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56555" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56555" ref_url="https://www.suse.com/security/cve/CVE-2024-56555" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix OOB in binder_add_freeze_work()

In binder_add_freeze_work() we iterate over the proc-&gt;nodes with the
proc-&gt;inner_lock held. However, this lock is temporarily dropped to
acquire the node-&gt;lock first (lock nesting order). This can race with
binder_deferred_release() which removes the nodes from the proc-&gt;nodes
rbtree and adds them into binder_dead_nodes list. This leads to a broken
iteration in binder_add_freeze_work() as rb_next() will use data from
binder_dead_nodes, triggering an out-of-bounds access:

  ==================================================================
  BUG: KASAN: global-out-of-bounds in rb_next+0xfc/0x124
  Read of size 8 at addr ffffcb84285f7170 by task freeze/660

  CPU: 8 UID: 0 PID: 660 Comm: freeze Not tainted 6.11.0-07343-ga727812a8d45 #18
  Hardware name: linux,dummy-virt (DT)
  Call trace:
   rb_next+0xfc/0x124
   binder_add_freeze_work+0x344/0x534
   binder_ioctl+0x1e70/0x25ac
   __arm64_sys_ioctl+0x124/0x190

  The buggy address belongs to the variable:
   binder_dead_nodes+0x10/0x40
  [...]
  ==================================================================

This is possible because proc-&gt;nodes (rbtree) and binder_dead_nodes
(list) share entries in binder_node through a union:

	struct binder_node {
	[...]
		union {
			struct rb_node rb_node;
			struct hlist_node dead_node;
		};

Fix the race by checking that the proc is still alive. If not, simply
break out of the iteration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56555/">CVE-2024-56555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56555">CVE-2024-56555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235120">SUSE bug 1235120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56556</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56556" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56556" ref_url="https://www.suse.com/security/cve/CVE-2024-56556" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binder: fix node UAF in binder_add_freeze_work()

In binder_add_freeze_work() we iterate over the proc-&gt;nodes with the
proc-&gt;inner_lock held. However, this lock is temporarily dropped in
order to acquire the node-&gt;lock first (lock nesting order). This can
race with binder_node_release() and trigger a use-after-free:

  ==================================================================
  BUG: KASAN: slab-use-after-free in _raw_spin_lock+0xe4/0x19c
  Write of size 4 at addr ffff53c04c29dd04 by task freeze/640

  CPU: 5 UID: 0 PID: 640 Comm: freeze Not tainted 6.11.0-07343-ga727812a8d45 #17
  Hardware name: linux,dummy-virt (DT)
  Call trace:
   _raw_spin_lock+0xe4/0x19c
   binder_add_freeze_work+0x148/0x478
   binder_ioctl+0x1e70/0x25ac
   __arm64_sys_ioctl+0x124/0x190

  Allocated by task 637:
   __kmalloc_cache_noprof+0x12c/0x27c
   binder_new_node+0x50/0x700
   binder_transaction+0x35ac/0x6f74
   binder_thread_write+0xfb8/0x42a0
   binder_ioctl+0x18f0/0x25ac
   __arm64_sys_ioctl+0x124/0x190

  Freed by task 637:
   kfree+0xf0/0x330
   binder_thread_read+0x1e88/0x3a68
   binder_ioctl+0x16d8/0x25ac
   __arm64_sys_ioctl+0x124/0x190
  ==================================================================

Fix the race by taking a temporary reference on the node before
releasing the proc-&gt;inner lock. This ensures the node remains alive
while in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56556/">CVE-2024-56556 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56556">CVE-2024-56556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235121">SUSE bug 1235121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56557</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56557" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56557" ref_url="https://www.suse.com/security/cve/CVE-2024-56557" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer

The AD7923 was updated to support devices with 8 channels, but the size
of tx_buf and ring_xfer was not increased accordingly, leading to a
potential buffer overflow in ad7923_update_scan_mode().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56557/">CVE-2024-56557 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56557">CVE-2024-56557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235122">SUSE bug 1235122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56558</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56558" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: make sure exp active before svc_export_show

The function `e_show` was called with protection from RCU. This only
ensures that `exp` will not be freed. Therefore, the reference count for
`exp` can drop to zero, which will trigger a refcount use-after-free
warning when `exp_get` is called. To resolve this issue, use
`cache_get_rcu` to ensure that `exp` remains active.

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 819 at lib/refcount.c:25
refcount_warn_saturate+0xb1/0x120
CPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb1/0x120
...
Call Trace:
 &lt;TASK&gt;
 e_show+0x20b/0x230 [nfsd]
 seq_read_iter+0x589/0x770
 seq_read+0x1e5/0x270
 vfs_read+0x125/0x530
 ksys_read+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235100">SUSE bug 1235100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56559</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56559" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56559" ref_url="https://www.suse.com/security/cve/CVE-2024-56559" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc: combine all TLB flush operations of KASAN shadow virtual address into one operation

When compiling kernel source 'make -j $(nproc)' with the up-and-running
KASAN-enabled kernel on a 256-core machine, the following soft lockup is
shown:

watchdog: BUG: soft lockup - CPU#28 stuck for 22s! [kworker/28:1:1760]
CPU: 28 PID: 1760 Comm: kworker/28:1 Kdump: loaded Not tainted 6.10.0-rc5 #95
Workqueue: events drain_vmap_area_work
RIP: 0010:smp_call_function_many_cond+0x1d8/0xbb0
Code: 38 c8 7c 08 84 c9 0f 85 49 08 00 00 8b 45 08 a8 01 74 2e 48 89 f1 49 89 f7 48 c1 e9 03 41 83 e7 07 4c 01 e9 41 83 c7 03 f3 90 &lt;0f&gt; b6 01 41 38 c7 7c 08 84 c0 0f 85 d4 06 00 00 8b 45 08 a8 01 75
RSP: 0018:ffffc9000cb3fb60 EFLAGS: 00000202
RAX: 0000000000000011 RBX: ffff8883bc4469c0 RCX: ffffed10776e9949
RDX: 0000000000000002 RSI: ffff8883bb74ca48 RDI: ffffffff8434dc50
RBP: ffff8883bb74ca40 R08: ffff888103585dc0 R09: ffff8884533a1800
R10: 0000000000000004 R11: ffffffffffffffff R12: ffffed1077888d39
R13: dffffc0000000000 R14: ffffed1077888d38 R15: 0000000000000003
FS:  0000000000000000(0000) GS:ffff8883bc400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005577b5c8d158 CR3: 0000000004850000 CR4: 0000000000350ef0
Call Trace:
 &lt;IRQ&gt;
 ? watchdog_timer_fn+0x2cd/0x390
 ? __pfx_watchdog_timer_fn+0x10/0x10
 ? __hrtimer_run_queues+0x300/0x6d0
 ? sched_clock_cpu+0x69/0x4e0
 ? __pfx___hrtimer_run_queues+0x10/0x10
 ? srso_return_thunk+0x5/0x5f
 ? ktime_get_update_offsets_now+0x7f/0x2a0
 ? srso_return_thunk+0x5/0x5f
 ? srso_return_thunk+0x5/0x5f
 ? hrtimer_interrupt+0x2ca/0x760
 ? __sysvec_apic_timer_interrupt+0x8c/0x2b0
 ? sysvec_apic_timer_interrupt+0x6a/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 ? asm_sysvec_apic_timer_interrupt+0x16/0x20
 ? smp_call_function_many_cond+0x1d8/0xbb0
 ? __pfx_do_kernel_range_flush+0x10/0x10
 on_each_cpu_cond_mask+0x20/0x40
 flush_tlb_kernel_range+0x19b/0x250
 ? srso_return_thunk+0x5/0x5f
 ? kasan_release_vmalloc+0xa7/0xc0
 purge_vmap_node+0x357/0x820
 ? __pfx_purge_vmap_node+0x10/0x10
 __purge_vmap_area_lazy+0x5b8/0xa10
 drain_vmap_area_work+0x21/0x30
 process_one_work+0x661/0x10b0
 worker_thread+0x844/0x10e0
 ? srso_return_thunk+0x5/0x5f
 ? __kthread_parkme+0x82/0x140
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x2a5/0x370
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x30/0x70
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Debugging Analysis:

  1. The following ftrace log shows that the lockup CPU spends too much
     time iterating vmap_nodes and flushing TLB when purging vm_area
     structures. (Some info is trimmed).

     kworker: funcgraph_entry:              |  drain_vmap_area_work() {
     kworker: funcgraph_entry:              |   mutex_lock() {
     kworker: funcgraph_entry:  1.092 us    |     __cond_resched();
     kworker: funcgraph_exit:   3.306 us    |   }
     ...                                        ...
     kworker: funcgraph_entry:              |    flush_tlb_kernel_range() {
     ...                                          ...
     kworker: funcgraph_exit: # 7533.649 us |    }
     ...                                         ...
     kworker: funcgraph_entry:  2.344 us    |   mutex_unlock();
     kworker: funcgraph_exit: $ 23871554 us | }

     The drain_vmap_area_work() spends over 23 seconds.

     There are 2805 flush_tlb_kernel_range() calls in the ftrace log.
       * One is called in __purge_vmap_area_lazy().
       * Others are called by purge_vmap_node-&gt;kasan_release_vmalloc.
         purge_vmap_node() iteratively releases kasan vmalloc
         allocations and flushes TLB for each vmap_area.
           - [Rough calculation] Each flush_tlb_kernel_range() runs
             about 7.5ms.
               -- 2804 * 7.5ms = 21.03 seconds.
               -- That's why a soft lock is triggered.

  2. Extending the soft lockup time can work around the issue (For example,
     # echo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56559/">CVE-2024-56559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56559">CVE-2024-56559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235101">SUSE bug 1235101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56560</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56560" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56560" ref_url="https://www.suse.com/security/cve/CVE-2024-56560" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

slab: Fix too strict alignment check in create_cache()

On m68k, where the minimum alignment of unsigned long is 2 bytes:

    Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22
    CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783
    Stack from 0102fe5c:
	    0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b
	    0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044
	    0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007
	    01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4
	    00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004
	    00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88
    Call Trace: [&lt;00425e78&gt;] dump_stack+0xc/0x10
     [&lt;0041eb74&gt;] panic+0xd8/0x26c
     [&lt;000e7a68&gt;] __kmem_cache_create_args+0x278/0x2e8
     [&lt;000e77f0&gt;] __kmem_cache_create_args+0x0/0x2e8
     [&lt;0041e5f0&gt;] memset+0x0/0x8c
     [&lt;005f67c0&gt;] io_uring_init+0x54/0xd2

The minimal alignment of an integral type may differ from its size,
hence is not safe to assume that an arbitrary freeptr_t (which is
basically an unsigned long) is always aligned to 4 or 8 bytes.

As nothing seems to require the additional alignment, it is safe to fix
this by relaxing the check to the actual minimum alignment of freeptr_t.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56560/">CVE-2024-56560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56560">CVE-2024-56560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234925">SUSE bug 1234925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56561</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56561" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56561" ref_url="https://www.suse.com/security/cve/CVE-2024-56561" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix PCI domain ID release in pci_epc_destroy()

pci_epc_destroy() invokes pci_bus_release_domain_nr() to release the PCI
domain ID, but there are two issues:

  - 'epc-&gt;dev' is passed to pci_bus_release_domain_nr() which was already
    freed by device_unregister(), leading to a use-after-free issue.

  - Domain ID corresponds to the EPC device parent, so passing 'epc-&gt;dev'
    is also wrong.

Fix these issues by passing 'epc-&gt;dev.parent' to
pci_bus_release_domain_nr() and also do it before device_unregister().

[mani: reworded subject and description]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56561/">CVE-2024-56561 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56561">CVE-2024-56561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235105">SUSE bug 1235105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56562</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56562" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56562" ref_url="https://www.suse.com/security/cve/CVE-2024-56562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()

if (dev-&gt;boardinfo &amp;&amp; dev-&gt;boardinfo-&gt;init_dyn_addr)
                                      ^^^ here check "init_dyn_addr"
	i3c_bus_set_addr_slot_status(&amp;master-&gt;bus, dev-&gt;info.dyn_addr, ...)
						             ^^^^
							free "dyn_addr"
Fix copy/paste error "dyn_addr" by replacing it with "init_dyn_addr".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56562/">CVE-2024-56562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234930">SUSE bug 1234930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56563</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56563" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56563" ref_url="https://www.suse.com/security/cve/CVE-2024-56563" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix cred leak in ceph_mds_check_access()

get_current_cred() increments the reference counter, but the
put_cred() call was missing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56563/">CVE-2024-56563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56563">CVE-2024-56563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235107">SUSE bug 1235107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56564</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56564" ref_url="https://www.suse.com/security/cve/CVE-2024-56564" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: pass cred pointer to ceph_mds_auth_match()

This eliminates a redundant get_current_cred() call, because
ceph_mds_check_access() has already obtained this pointer.

As a side effect, this also fixes a reference leak in
ceph_mds_auth_match(): by omitting the get_current_cred() call, no
additional cred reference is taken.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56564/">CVE-2024-56564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56564">CVE-2024-56564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235109">SUSE bug 1235109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56565</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56565" ref_url="https://www.suse.com/security/cve/CVE-2024-56565" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to drop all discards after creating snapshot on lvm device

Piergiorgio reported a bug in bugzilla as below:

------------[ cut here ]------------
WARNING: CPU: 2 PID: 969 at fs/f2fs/segment.c:1330
RIP: 0010:__submit_discard_cmd+0x27d/0x400 [f2fs]
Call Trace:
 __issue_discard_cmd+0x1ca/0x350 [f2fs]
 issue_discard_thread+0x191/0x480 [f2fs]
 kthread+0xcf/0x100
 ret_from_fork+0x31/0x50
 ret_from_fork_asm+0x1a/0x30

w/ below testcase, it can reproduce this bug quickly:
- pvcreate /dev/vdb
- vgcreate myvg1 /dev/vdb
- lvcreate -L 1024m -n mylv1 myvg1
- mount /dev/myvg1/mylv1 /mnt/f2fs
- dd if=/dev/zero of=/mnt/f2fs/file bs=1M count=20
- sync
- rm /mnt/f2fs/file
- sync
- lvcreate -L 1024m -s -n mylv1-snapshot /dev/myvg1/mylv1
- umount /mnt/f2fs

The root cause is: it will update discard_max_bytes of mounted lvm
device to zero after creating snapshot on this lvm device, then,
__submit_discard_cmd() will pass parameter @nr_sects w/ zero value
to __blkdev_issue_discard(), it returns a NULL bio pointer, result
in panic.

This patch changes as below for fixing:
1. Let's drop all remained discards in f2fs_unfreeze() if snapshot
of lvm device is created.
2. Checking discard_max_bytes before submitting discard during
__submit_discard_cmd().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56565/">CVE-2024-56565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56565">CVE-2024-56565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235110">SUSE bug 1235110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56566</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56566" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56566" ref_url="https://www.suse.com/security/cve/CVE-2024-56566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: Avoid list corruption when removing a slab from the full list

Boot with slub_debug=UFPZ.

If allocated object failed in alloc_consistency_checks, all objects of
the slab will be marked as used, and then the slab will be removed from
the partial list.

When an object belonging to the slab got freed later, the remove_full()
function is called. Because the slab is neither on the partial list nor
on the full list, it eventually lead to a list corruption (actually a
list poison being detected).

So we need to mark and isolate the slab page with metadata corruption,
do not put it back in circulation.

Because the debug caches avoid all the fastpaths, reusing the frozen bit
to mark slab page with metadata corruption seems to be fine.

[ 4277.385669] list_del corruption, ffffea00044b3e50-&gt;next is LIST_POISON1 (dead000000000100)
[ 4277.387023] ------------[ cut here ]------------
[ 4277.387880] kernel BUG at lib/list_debug.c:56!
[ 4277.388680] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[ 4277.389562] CPU: 5 PID: 90 Comm: kworker/5:1 Kdump: loaded Tainted: G           OE      6.6.1-1 #1
[ 4277.392113] Workqueue: xfs-inodegc/vda1 xfs_inodegc_worker [xfs]
[ 4277.393551] RIP: 0010:__list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.394518] Code: 48 91 82 e8 37 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 28 49 91 82 e8 26 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 58 49 91
[ 4277.397292] RSP: 0018:ffffc90000333b38 EFLAGS: 00010082
[ 4277.398202] RAX: 000000000000004e RBX: ffffea00044b3e50 RCX: 0000000000000000
[ 4277.399340] RDX: 0000000000000002 RSI: ffffffff828f8715 RDI: 00000000ffffffff
[ 4277.400545] RBP: ffffea00044b3e40 R08: 0000000000000000 R09: ffffc900003339f0
[ 4277.401710] R10: 0000000000000003 R11: ffffffff82d44088 R12: ffff888112cf9910
[ 4277.402887] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8881000424c0
[ 4277.404049] FS:  0000000000000000(0000) GS:ffff88842fd40000(0000) knlGS:0000000000000000
[ 4277.405357] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4277.406389] CR2: 00007f2ad0b24000 CR3: 0000000102a3a006 CR4: 00000000007706e0
[ 4277.407589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4277.408780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4277.410000] PKRU: 55555554
[ 4277.410645] Call Trace:
[ 4277.411234]  &lt;TASK&gt;
[ 4277.411777]  ? die+0x32/0x80
[ 4277.412439]  ? do_trap+0xd6/0x100
[ 4277.413150]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.414158]  ? do_error_trap+0x6a/0x90
[ 4277.414948]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.415915]  ? exc_invalid_op+0x4c/0x60
[ 4277.416710]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.417675]  ? asm_exc_invalid_op+0x16/0x20
[ 4277.418482]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.419466]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.420410]  free_to_partial_list+0x515/0x5e0
[ 4277.421242]  ? xfs_iext_remove+0x41a/0xa10 [xfs]
[ 4277.422298]  xfs_iext_remove+0x41a/0xa10 [xfs]
[ 4277.423316]  ? xfs_inodegc_worker+0xb4/0x1a0 [xfs]
[ 4277.424383]  xfs_bmap_del_extent_delay+0x4fe/0x7d0 [xfs]
[ 4277.425490]  __xfs_bunmapi+0x50d/0x840 [xfs]
[ 4277.426445]  xfs_itruncate_extents_flags+0x13a/0x490 [xfs]
[ 4277.427553]  xfs_inactive_truncate+0xa3/0x120 [xfs]
[ 4277.428567]  xfs_inactive+0x22d/0x290 [xfs]
[ 4277.429500]  xfs_inodegc_worker+0xb4/0x1a0 [xfs]
[ 4277.430479]  process_one_work+0x171/0x340
[ 4277.431227]  worker_thread+0x277/0x390
[ 4277.431962]  ? __pfx_worker_thread+0x10/0x10
[ 4277.432752]  kthread+0xf0/0x120
[ 4277.433382]  ? __pfx_kthread+0x10/0x10
[ 4277.434134]  ret_from_fork+0x2d/0x50
[ 4277.434837]  ? __pfx_kthread+0x10/0x10
[ 4277.435566]  ret_from_fork_asm+0x1b/0x30
[ 4277.436280]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56566/">CVE-2024-56566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235033">SUSE bug 1235033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235034">SUSE bug 1235034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56567</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56567" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56567" ref_url="https://www.suse.com/security/cve/CVE-2024-56567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ad7780: fix division by zero in ad7780_write_raw()

In the ad7780_write_raw() , val2 can be zero, which might lead to a
division by zero error in DIV_ROUND_CLOSEST(). The ad7780_write_raw()
is based on iio_info's write_raw. While val is explicitly declared that
can be zero (in read mode), val2 is not specified to be non-zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56567/">CVE-2024-56567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56567">CVE-2024-56567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234916">SUSE bug 1234916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56568</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56568" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56568" ref_url="https://www.suse.com/security/cve/CVE-2024-56568" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu: Defer probe of clients after smmu device bound

Null pointer dereference occurs due to a race between smmu
driver probe and client driver probe, when of_dma_configure()
for client is called after the iommu_device_register() for smmu driver
probe has executed but before the driver_bound() for smmu driver
has been called.

Following is how the race occurs:

T1:Smmu device probe		T2: Client device probe

really_probe()
arm_smmu_device_probe()
iommu_device_register()
					really_probe()
					platform_dma_configure()
					of_dma_configure()
					of_dma_configure_id()
					of_iommu_configure()
					iommu_probe_device()
					iommu_init_device()
					arm_smmu_probe_device()
					arm_smmu_get_by_fwnode()
						driver_find_device_by_fwnode()
						driver_find_device()
						next_device()
						klist_next()
						    /* null ptr
						       assigned to smmu */
					/* null ptr dereference
					   while smmu-&gt;streamid_mask */
driver_bound()
	klist_add_tail()

When this null smmu pointer is dereferenced later in
arm_smmu_probe_device, the device crashes.

Fix this by deferring the probe of the client device
until the smmu device has bound to the arm smmu driver.

[will: Add comment]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56568/">CVE-2024-56568 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56568">CVE-2024-56568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235032">SUSE bug 1235032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56569</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56569" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56569" ref_url="https://www.suse.com/security/cve/CVE-2024-56569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix regression with module command in stack_trace_filter

When executing the following command:

    # echo "write*:mod:ext3" &gt; /sys/kernel/tracing/stack_trace_filter

The current mod command causes a null pointer dereference. While commit
0f17976568b3f ("ftrace: Fix regression with module command in stack_trace_filter")
has addressed part of the issue, it left a corner case unhandled, which still
results in a kernel crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56569/">CVE-2024-56569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56569">CVE-2024-56569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235031">SUSE bug 1235031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56570</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56570" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: Filter invalid inodes with missing lookup function

Add a check to the ovl_dentry_weird() function to prevent the
processing of directory inodes that lack the lookup function.
This is important because such inodes can cause errors in overlayfs
when passed to the lowerstack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235035">SUSE bug 1235035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56571</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56571" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56571" ref_url="https://www.suse.com/security/cve/CVE-2024-56571" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Require entities to have a non-zero unique ID

Per UVC 1.1+ specification 3.7.2, units and terminals must have a non-zero
unique ID.

```
Each Unit and Terminal within the video function is assigned a unique
identification number, the Unit ID (UID) or Terminal ID (TID), contained in
the bUnitID or bTerminalID field of the descriptor. The value 0x00 is
reserved for undefined ID,
```

So, deny allocating an entity with ID 0 or an ID that belongs to a unit
that is already added to the list of entities.

This also prevents some syzkaller reproducers from triggering warnings due
to a chain of entities referring to themselves. In one particular case, an
Output Unit is connected to an Input Unit, both with the same ID of 1. But
when looking up for the source ID of the Output Unit, that same entity is
found instead of the input entity, which leads to such warnings.

In another case, a backward chain was considered finished as the source ID
was 0. Later on, that entity was found, but its pads were not valid.

Here is a sample stack trace for one of those cases.

[   20.650953] usb 1-1: new high-speed USB device number 2 using dummy_hcd
[   20.830206] usb 1-1: Using ep0 maxpacket: 8
[   20.833501] usb 1-1: config 0 descriptor??
[   21.038518] usb 1-1: string descriptor 0 read error: -71
[   21.038893] usb 1-1: Found UVC 0.00 device &lt;unnamed&gt; (2833:0201)
[   21.039299] uvcvideo 1-1:0.0: Entity type for entity Output 1 was not initialized!
[   21.041583] uvcvideo 1-1:0.0: Entity type for entity Input 1 was not initialized!
[   21.042218] ------------[ cut here ]------------
[   21.042536] WARNING: CPU: 0 PID: 9 at drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0
[   21.043195] Modules linked in:
[   21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.11.0-rc7-00030-g3480e43aeccf #444
[   21.044101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   21.044639] Workqueue: usb_hub_wq hub_event
[   21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0
[   21.045508] Code: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 &lt;0f&gt; 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00
[   21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246
[   21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1
[   21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290
[   21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000
[   21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003
[   21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000
[   21.049648] FS:  0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000
[   21.050271] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0
[   21.051136] PKRU: 55555554
[   21.051331] Call Trace:
[   21.051480]  &lt;TASK&gt;
[   21.051611]  ? __warn+0xc4/0x210
[   21.051861]  ? media_create_pad_link+0x2c4/0x2e0
[   21.052252]  ? report_bug+0x11b/0x1a0
[   21.052540]  ? trace_hardirqs_on+0x31/0x40
[   21.052901]  ? handle_bug+0x3d/0x70
[   21.053197]  ? exc_invalid_op+0x1a/0x50
[   21.053511]  ? asm_exc_invalid_op+0x1a/0x20
[   21.053924]  ? media_create_pad_link+0x91/0x2e0
[   21.054364]  ? media_create_pad_link+0x2c4/0x2e0
[   21.054834]  ? media_create_pad_link+0x91/0x2e0
[   21.055131]  ? _raw_spin_unlock+0x1e/0x40
[   21.055441]  ? __v4l2_device_register_subdev+0x202/0x210
[   21.055837]  uvc_mc_register_entities+0x358/0x400
[   21.056144]  uvc_register_chains+0x1fd/0x290
[   21.056413]  uvc_probe+0x380e/0x3dc0
[   21.056676]  ? __lock_acquire+0x5aa/0x26e0
[   21.056946]  ? find_held_lock+0x33/0xa0
[   21.057196]  ? kernfs_activate+0x70/0x80
[   21.057533]  ? usb_match_dy
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56571/">CVE-2024-56571 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56571">CVE-2024-56571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235037">SUSE bug 1235037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56572</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56572" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56572" ref_url="https://www.suse.com/security/cve/CVE-2024-56572" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: platform: allegro-dvt: Fix possible memory leak in allocate_buffers_internal()

The buffer in the loop should be released under the exception path,
otherwise there may be a memory leak here.

To mitigate this, free the buffer when allegro_alloc_buffer fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56572/">CVE-2024-56572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56572">CVE-2024-56572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235043">SUSE bug 1235043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56573</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56573" ref_url="https://www.suse.com/security/cve/CVE-2024-56573" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi/libstub: Free correct pointer on failure

cmdline_ptr is an out parameter, which is not allocated by the function
itself, and likely points into the caller's stack.

cmdline refers to the pool allocation that should be freed when cleaning
up after a failure, so pass this instead to free_pool().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56573/">CVE-2024-56573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56573">CVE-2024-56573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235042">SUSE bug 1235042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56574</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56574" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56574" ref_url="https://www.suse.com/security/cve/CVE-2024-56574" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ts2020: fix null-ptr-deref in ts2020_probe()

KASAN reported a null-ptr-deref issue when executing the following
command:

  # echo ts2020 0x20 &gt; /sys/bus/i2c/devices/i2c-0/new_device
    KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
    CPU: 53 UID: 0 PID: 970 Comm: systemd-udevd Not tainted 6.12.0-rc2+ #24
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)
    RIP: 0010:ts2020_probe+0xad/0xe10 [ts2020]
    RSP: 0018:ffffc9000abbf598 EFLAGS: 00010202
    RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffffc0714809
    RDX: 0000000000000002 RSI: ffff88811550be00 RDI: 0000000000000010
    RBP: ffff888109868800 R08: 0000000000000001 R09: fffff52001577eb6
    R10: 0000000000000000 R11: ffffc9000abbff50 R12: ffffffffc0714790
    R13: 1ffff92001577eb8 R14: ffffffffc07190d0 R15: 0000000000000001
    FS:  00007f95f13b98c0(0000) GS:ffff888149280000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000555d2634b000 CR3: 0000000152236000 CR4: 00000000000006f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
     &lt;TASK&gt;
     ts2020_probe+0xad/0xe10 [ts2020]
     i2c_device_probe+0x421/0xb40
     really_probe+0x266/0x850
    ...

The cause of the problem is that when using sysfs to dynamically register
an i2c device, there is no platform data, but the probe process of ts2020
needs to use platform data, resulting in a null pointer being accessed.

Solve this problem by adding checks to platform data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56574/">CVE-2024-56574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56574">CVE-2024-56574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235040">SUSE bug 1235040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56575</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56575" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56575" ref_url="https://www.suse.com/security/cve/CVE-2024-56575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx-jpeg: Ensure power suppliers be suspended before detach them

The power suppliers are always requested to suspend asynchronously,
dev_pm_domain_detach() requires the caller to ensure proper
synchronization of this function with power management callbacks.
otherwise the detach may led to kernel panic, like below:

[ 1457.107934] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000040
[ 1457.116777] Mem abort info:
[ 1457.119589]   ESR = 0x0000000096000004
[ 1457.123358]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 1457.128692]   SET = 0, FnV = 0
[ 1457.131764]   EA = 0, S1PTW = 0
[ 1457.134920]   FSC = 0x04: level 0 translation fault
[ 1457.139812] Data abort info:
[ 1457.142707]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[ 1457.148196]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 1457.153256]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 1457.158563] user pgtable: 4k pages, 48-bit VAs, pgdp=00000001138b6000
[ 1457.165000] [0000000000000040] pgd=0000000000000000, p4d=0000000000000000
[ 1457.171792] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[ 1457.178045] Modules linked in: v4l2_jpeg wave6_vpu_ctrl(-) [last unloaded: mxc_jpeg_encdec]
[ 1457.186383] CPU: 0 PID: 51938 Comm: kworker/0:3 Not tainted 6.6.36-gd23d64eea511 #66
[ 1457.194112] Hardware name: NXP i.MX95 19X19 board (DT)
[ 1457.199236] Workqueue: pm pm_runtime_work
[ 1457.203247] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1457.210188] pc : genpd_runtime_suspend+0x20/0x290
[ 1457.214886] lr : __rpm_callback+0x48/0x1d8
[ 1457.218968] sp : ffff80008250bc50
[ 1457.222270] x29: ffff80008250bc50 x28: 0000000000000000 x27: 0000000000000000
[ 1457.229394] x26: 0000000000000000 x25: 0000000000000008 x24: 00000000000f4240
[ 1457.236518] x23: 0000000000000000 x22: ffff00008590f0e4 x21: 0000000000000008
[ 1457.243642] x20: ffff80008099c434 x19: ffff00008590f000 x18: ffffffffffffffff
[ 1457.250766] x17: 5300326563697665 x16: 645f676e696c6f6f x15: 63343a6d726f6674
[ 1457.257890] x14: 0000000000000004 x13: 00000000000003a4 x12: 0000000000000002
[ 1457.265014] x11: 0000000000000000 x10: 0000000000000a60 x9 : ffff80008250bbb0
[ 1457.272138] x8 : ffff000092937200 x7 : ffff0003fdf6af80 x6 : 0000000000000000
[ 1457.279262] x5 : 00000000410fd050 x4 : 0000000000200000 x3 : 0000000000000000
[ 1457.286386] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00008590f000
[ 1457.293510] Call trace:
[ 1457.295946]  genpd_runtime_suspend+0x20/0x290
[ 1457.300296]  __rpm_callback+0x48/0x1d8
[ 1457.304038]  rpm_callback+0x6c/0x78
[ 1457.307515]  rpm_suspend+0x10c/0x570
[ 1457.311077]  pm_runtime_work+0xc4/0xc8
[ 1457.314813]  process_one_work+0x138/0x248
[ 1457.318816]  worker_thread+0x320/0x438
[ 1457.322552]  kthread+0x110/0x114
[ 1457.325767]  ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56575/">CVE-2024-56575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56575">CVE-2024-56575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235039">SUSE bug 1235039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56576</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56576" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56576" ref_url="https://www.suse.com/security/cve/CVE-2024-56576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: i2c: tc358743: Fix crash in the probe error path when using polling

If an error occurs in the probe() function, we should remove the polling
timer that was alarmed earlier, otherwise the timer is called with
arguments that are already freed, which results in a crash.

------------[ cut here ]------------
WARNING: CPU: 3 PID: 0 at kernel/time/timer.c:1830 __run_timers+0x244/0x268
Modules linked in:
CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.11.0 #226
Hardware name: Diasom DS-RK3568-SOM-EVB (DT)
pstate: 804000c9 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __run_timers+0x244/0x268
lr : __run_timers+0x1d4/0x268
sp : ffffff80eff2baf0
x29: ffffff80eff2bb50 x28: 7fffffffffffffff x27: ffffff80eff2bb00
x26: ffffffc080f669c0 x25: ffffff80efef6bf0 x24: ffffff80eff2bb00
x23: 0000000000000000 x22: dead000000000122 x21: 0000000000000000
x20: ffffff80efef6b80 x19: ffffff80041c8bf8 x18: ffffffffffffffff
x17: ffffffc06f146000 x16: ffffff80eff27dc0 x15: 000000000000003e
x14: 0000000000000000 x13: 00000000000054da x12: 0000000000000000
x11: 00000000000639c0 x10: 000000000000000c x9 : 0000000000000009
x8 : ffffff80eff2cb40 x7 : ffffff80eff2cb40 x6 : ffffff8002bee480
x5 : ffffffc080cb2220 x4 : ffffffc080cb2150 x3 : 00000000000f4240
x2 : 0000000000000102 x1 : ffffff80eff2bb00 x0 : ffffff80041c8bf0
Call trace:
 __run_timers+0x244/0x268
 timer_expire_remote+0x50/0x68
 tmigr_handle_remote+0x388/0x39c
 run_timer_softirq+0x38/0x44
 handle_softirqs+0x138/0x298
 __do_softirq+0x14/0x20
 ____do_softirq+0x10/0x1c
 call_on_irq_stack+0x24/0x4c
 do_softirq_own_stack+0x1c/0x2c
 irq_exit_rcu+0x9c/0xcc
 el1_interrupt+0x48/0xc0
 el1h_64_irq_handler+0x18/0x24
 el1h_64_irq+0x7c/0x80
 default_idle_call+0x34/0x68
 do_idle+0x23c/0x294
 cpu_startup_entry+0x38/0x3c
 secondary_start_kernel+0x128/0x160
 __secondary_switched+0xb8/0xbc
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56576/">CVE-2024-56576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56576">CVE-2024-56576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235019">SUSE bug 1235019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56577</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56577" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56577" ref_url="https://www.suse.com/security/cve/CVE-2024-56577" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mtk-jpeg: Fix null-ptr-deref during unload module

The workqueue should be destroyed in mtk_jpeg_core.c since commit
09aea13ecf6f ("media: mtk-jpeg: refactor some variables"), otherwise
the below calltrace can be easily triggered.

[  677.862514] Unable to handle kernel paging request at virtual address dfff800000000023
[  677.863633] KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
...
[  677.879654] CPU: 6 PID: 1071 Comm: modprobe Tainted: G           O       6.8.12-mtk+gfa1a78e5d24b+ #17
...
[  677.882838] pc : destroy_workqueue+0x3c/0x770
[  677.883413] lr : mtk_jpegdec_destroy_workqueue+0x70/0x88 [mtk_jpeg_dec_hw]
[  677.884314] sp : ffff80008ad974f0
[  677.884744] x29: ffff80008ad974f0 x28: ffff0000d7115580 x27: ffff0000dd691070
[  677.885669] x26: ffff0000dd691408 x25: ffff8000844af3e0 x24: ffff80008ad97690
[  677.886592] x23: ffff0000e051d400 x22: ffff0000dd691010 x21: dfff800000000000
[  677.887515] x20: 0000000000000000 x19: 0000000000000000 x18: ffff800085397ac0
[  677.888438] x17: 0000000000000000 x16: ffff8000801b87c8 x15: 1ffff000115b2e10
[  677.889361] x14: 00000000f1f1f1f1 x13: 0000000000000000 x12: ffff7000115b2e4d
[  677.890285] x11: 1ffff000115b2e4c x10: ffff7000115b2e4c x9 : ffff80000aa43e90
[  677.891208] x8 : 00008fffeea4d1b4 x7 : ffff80008ad97267 x6 : 0000000000000001
[  677.892131] x5 : ffff80008ad97260 x4 : ffff7000115b2e4d x3 : 0000000000000000
[  677.893054] x2 : 0000000000000023 x1 : dfff800000000000 x0 : 0000000000000118
[  677.893977] Call trace:
[  677.894297]  destroy_workqueue+0x3c/0x770
[  677.894826]  mtk_jpegdec_destroy_workqueue+0x70/0x88 [mtk_jpeg_dec_hw]
[  677.895677]  devm_action_release+0x50/0x90
[  677.896211]  release_nodes+0xe8/0x170
[  677.896688]  devres_release_all+0xf8/0x178
[  677.897219]  device_unbind_cleanup+0x24/0x170
[  677.897785]  device_release_driver_internal+0x35c/0x480
[  677.898461]  device_release_driver+0x20/0x38
...
[  677.912665] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56577/">CVE-2024-56577 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56577">CVE-2024-56577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235112">SUSE bug 1235112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56578</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56578" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56578" ref_url="https://www.suse.com/security/cve/CVE-2024-56578" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx-jpeg: Set video drvdata before register video device

The video drvdata should be set before the video device is registered,
otherwise video_drvdata() may return NULL in the open() file ops, and led
to oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56578/">CVE-2024-56578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56578">CVE-2024-56578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235115">SUSE bug 1235115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56579</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56579" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56579" ref_url="https://www.suse.com/security/cve/CVE-2024-56579" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: amphion: Set video drvdata before register video device

The video drvdata should be set before the video device is registered,
otherwise video_drvdata() may return NULL in the open() file ops, and led
to oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56579/">CVE-2024-56579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56579">CVE-2024-56579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236575">SUSE bug 1236575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56580</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56580" ref_url="https://www.suse.com/security/cve/CVE-2024-56580" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: qcom: camss: fix error path on configuration of power domains

There is a chance to meet runtime issues during configuration of CAMSS
power domains, because on the error path dev_pm_domain_detach() is
unexpectedly called with NULL or error pointer.

One of the simplest ways to reproduce the problem is to probe CAMSS
driver before registration of CAMSS power domains, for instance if
a platform CAMCC driver is simply not built.

Warning backtrace example:

    Unable to handle kernel NULL pointer dereference at virtual address 00000000000001a2

    &lt;snip&gt;

    pc : dev_pm_domain_detach+0x8/0x48
    lr : camss_probe+0x374/0x9c0

    &lt;snip&gt;

    Call trace:
     dev_pm_domain_detach+0x8/0x48
     platform_probe+0x70/0xf0
     really_probe+0xc4/0x2a8
     __driver_probe_device+0x80/0x140
     driver_probe_device+0x48/0x170
     __device_attach_driver+0xc0/0x148
     bus_for_each_drv+0x88/0xf0
     __device_attach+0xb0/0x1c0
     device_initial_probe+0x1c/0x30
     bus_probe_device+0xb4/0xc0
     deferred_probe_work_func+0x90/0xd0
     process_one_work+0x164/0x3e0
     worker_thread+0x310/0x420
     kthread+0x120/0x130
     ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56580/">CVE-2024-56580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56580">CVE-2024-56580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235114">SUSE bug 1235114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56581</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56581" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56581" ref_url="https://www.suse.com/security/cve/CVE-2024-56581" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: ref-verify: fix use-after-free after invalid ref action

At btrfs_ref_tree_mod() after we successfully inserted the new ref entry
(local variable 'ref') into the respective block entry's rbtree (local
variable 'be'), if we find an unexpected action of BTRFS_DROP_DELAYED_REF,
we error out and free the ref entry without removing it from the block
entry's rbtree. Then in the error path of btrfs_ref_tree_mod() we call
btrfs_free_ref_cache(), which iterates over all block entries and then
calls free_block_entry() for each one, and there we will trigger a
use-after-free when we are called against the block entry to which we
added the freed ref entry to its rbtree, since the rbtree still points
to the block entry, as we didn't remove it from the rbtree before freeing
it in the error path at btrfs_ref_tree_mod(). Fix this by removing the
new ref entry from the rbtree before freeing it.

Syzbot report this with the following stack traces:

   BTRFS error (device loop0 state EA):   Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615
      __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523
      update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512
      btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594
      btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754
      btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116
      btrfs_insert_empty_items+0x9c/0x1a0 fs/btrfs/ctree.c:4314
      btrfs_insert_empty_item fs/btrfs/ctree.h:669 [inline]
      btrfs_insert_orphan_item+0x1f1/0x320 fs/btrfs/orphan.c:23
      btrfs_orphan_add+0x6d/0x1a0 fs/btrfs/inode.c:3482
      btrfs_unlink+0x267/0x350 fs/btrfs/inode.c:4293
      vfs_unlink+0x365/0x650 fs/namei.c:4469
      do_unlinkat+0x4ae/0x830 fs/namei.c:4533
      __do_sys_unlinkat fs/namei.c:4576 [inline]
      __se_sys_unlinkat fs/namei.c:4569 [inline]
      __x64_sys_unlinkat+0xcc/0xf0 fs/namei.c:4569
      do_syscall_x64 arch/x86/entry/common.c:52 [inline]
      do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
      entry_SYSCALL_64_after_hwframe+0x77/0x7f
   BTRFS error (device loop0 state EA):   Ref action 1, root 5, ref_root 5, parent 0, owner 260, offset 0, num_refs 1
      __btrfs_mod_ref+0x76b/0xac0 fs/btrfs/extent-tree.c:2521
      update_ref_for_cow+0x96a/0x11f0
      btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594
      btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754
      btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116
      btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411
      __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030
      btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1114 [inline]
      __btrfs_commit_inode_delayed_items+0x2318/0x24a0 fs/btrfs/delayed-inode.c:1137
      __btrfs_run_delayed_items+0x213/0x490 fs/btrfs/delayed-inode.c:1171
      btrfs_commit_transaction+0x8a8/0x3740 fs/btrfs/transaction.c:2313
      prepare_to_relocate+0x3c4/0x4c0 fs/btrfs/relocation.c:3586
      relocate_block_group+0x16c/0xd40 fs/btrfs/relocation.c:3611
      btrfs_relocate_block_group+0x77d/0xd90 fs/btrfs/relocation.c:4081
      btrfs_relocate_chunk+0x12c/0x3b0 fs/btrfs/volumes.c:3377
      __btrfs_balance+0x1b0f/0x26b0 fs/btrfs/volumes.c:4161
      btrfs_balance+0xbdc/0x10c0 fs/btrfs/volumes.c:4538
   BTRFS error (device loop0 state EA):   Ref action 2, root 5, ref_root 0, parent 8564736, owner 0, offset 0, num_refs 18446744073709551615
      __btrfs_mod_ref+0x7dd/0xac0 fs/btrfs/extent-tree.c:2523
      update_ref_for_cow+0x9cd/0x11f0 fs/btrfs/ctree.c:512
      btrfs_force_cow_block+0x9f6/0x1da0 fs/btrfs/ctree.c:594
      btrfs_cow_block+0x35e/0xa40 fs/btrfs/ctree.c:754
      btrfs_search_slot+0xbdd/0x30d0 fs/btrfs/ctree.c:2116
      btrfs_lookup_inode+0xdc/0x480 fs/btrfs/inode-item.c:411
      __btrfs_update_delayed_inode+0x1e7/0xb90 fs/btrfs/delayed-inode.c:1030
      btrfs_update_delayed_i
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56581/">CVE-2024-56581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56581">CVE-2024-56581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235124">SUSE bug 1235124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56582</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56582" ref_url="https://www.suse.com/security/cve/CVE-2024-56582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free in btrfs_encoded_read_endio()

Shinichiro reported the following use-after free that sometimes is
happening in our CI system when running fstests' btrfs/284 on a TCMU
runner device:

  BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780
  Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219

  CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15
  Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020
  Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6e/0xa0
   ? lock_release+0x708/0x780
   print_report+0x174/0x505
   ? lock_release+0x708/0x780
   ? __virt_addr_valid+0x224/0x410
   ? lock_release+0x708/0x780
   kasan_report+0xda/0x1b0
   ? lock_release+0x708/0x780
   ? __wake_up+0x44/0x60
   lock_release+0x708/0x780
   ? __pfx_lock_release+0x10/0x10
   ? __pfx_do_raw_spin_lock+0x10/0x10
   ? lock_is_held_type+0x9a/0x110
   _raw_spin_unlock_irqrestore+0x1f/0x60
   __wake_up+0x44/0x60
   btrfs_encoded_read_endio+0x14b/0x190 [btrfs]
   btrfs_check_read_bio+0x8d9/0x1360 [btrfs]
   ? lock_release+0x1b0/0x780
   ? trace_lock_acquire+0x12f/0x1a0
   ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]
   ? process_one_work+0x7e3/0x1460
   ? lock_acquire+0x31/0xc0
   ? process_one_work+0x7e3/0x1460
   process_one_work+0x85c/0x1460
   ? __pfx_process_one_work+0x10/0x10
   ? assign_work+0x16c/0x240
   worker_thread+0x5e6/0xfc0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x2c3/0x3a0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x31/0x70
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 3661:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   __kasan_kmalloc+0xaa/0xb0
   btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]
   send_extent_data+0xf0f/0x24a0 [btrfs]
   process_extent+0x48a/0x1830 [btrfs]
   changed_cb+0x178b/0x2ea0 [btrfs]
   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]
   _btrfs_ioctl_send+0x117/0x330 [btrfs]
   btrfs_ioctl+0x184a/0x60a0 [btrfs]
   __x64_sys_ioctl+0x12e/0x1a0
   do_syscall_64+0x95/0x180
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

  Freed by task 3661:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   kasan_save_free_info+0x3b/0x70
   __kasan_slab_free+0x4f/0x70
   kfree+0x143/0x490
   btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]
   send_extent_data+0xf0f/0x24a0 [btrfs]
   process_extent+0x48a/0x1830 [btrfs]
   changed_cb+0x178b/0x2ea0 [btrfs]
   btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]
   _btrfs_ioctl_send+0x117/0x330 [btrfs]
   btrfs_ioctl+0x184a/0x60a0 [btrfs]
   __x64_sys_ioctl+0x12e/0x1a0
   do_syscall_64+0x95/0x180
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

  The buggy address belongs to the object at ffff888106a83f00
   which belongs to the cache kmalloc-rnd-07-96 of size 96
  The buggy address is located 24 bytes inside of
   freed 96-byte region [ffff888106a83f00, ffff888106a83f60)

  The buggy address belongs to the physical page:
  page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83
  flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)
  page_type: f5(slab)
  raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004
  raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
   ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
  &gt;ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
                              ^
   ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
   ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  ==================================================================

Further analyzing the trace and 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56582/">CVE-2024-56582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56582">CVE-2024-56582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235128">SUSE bug 1235128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235129">SUSE bug 1235129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56583</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56583" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56583" ref_url="https://www.suse.com/security/cve/CVE-2024-56583" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/deadline: Fix warning in migrate_enable for boosted tasks

When running the following command:

while true; do
    stress-ng --cyclic 30 --timeout 30s --minimize --quiet
done

a warning is eventually triggered:

WARNING: CPU: 43 PID: 2848 at kernel/sched/deadline.c:794
setup_new_dl_entity+0x13e/0x180
...
Call Trace:
 &lt;TASK&gt;
 ? show_trace_log_lvl+0x1c4/0x2df
 ? enqueue_dl_entity+0x631/0x6e0
 ? setup_new_dl_entity+0x13e/0x180
 ? __warn+0x7e/0xd0
 ? report_bug+0x11a/0x1a0
 ? handle_bug+0x3c/0x70
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 enqueue_dl_entity+0x631/0x6e0
 enqueue_task_dl+0x7d/0x120
 __do_set_cpus_allowed+0xe3/0x280
 __set_cpus_allowed_ptr_locked+0x140/0x1d0
 __set_cpus_allowed_ptr+0x54/0xa0
 migrate_enable+0x7e/0x150
 rt_spin_unlock+0x1c/0x90
 group_send_sig_info+0xf7/0x1a0
 ? kill_pid_info+0x1f/0x1d0
 kill_pid_info+0x78/0x1d0
 kill_proc_info+0x5b/0x110
 __x64_sys_kill+0x93/0xc0
 do_syscall_64+0x5c/0xf0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76
 RIP: 0033:0x7f0dab31f92b

This warning occurs because set_cpus_allowed dequeues and enqueues tasks
with the ENQUEUE_RESTORE flag set. If the task is boosted, the warning
is triggered. A boosted task already had its parameters set by
rt_mutex_setprio, and a new call to setup_new_dl_entity is unnecessary,
hence the WARN_ON call.

Check if we are requeueing a boosted task and avoid calling
setup_new_dl_entity if that's the case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56583/">CVE-2024-56583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56583">CVE-2024-56583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235118">SUSE bug 1235118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56584</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56584" ref_url="https://www.suse.com/security/cve/CVE-2024-56584" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/tctx: work around xa_store() allocation error issue

syzbot triggered the following WARN_ON:

WARNING: CPU: 0 PID: 16 at io_uring/tctx.c:51 __io_uring_free+0xfa/0x140 io_uring/tctx.c:51

which is the

WARN_ON_ONCE(!xa_empty(&amp;tctx-&gt;xa));

sanity check in __io_uring_free() when a io_uring_task is going through
its final put. The syzbot test case includes injecting memory allocation
failures, and it very much looks like xa_store() can fail one of its
memory allocations and end up with -&gt;head being non-NULL even though no
entries exist in the xarray.

Until this issue gets sorted out, work around it by attempting to
iterate entries in our xarray, and WARN_ON_ONCE() if one is found.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56584/">CVE-2024-56584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56584">CVE-2024-56584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235117">SUSE bug 1235117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56585</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56585" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56585" ref_url="https://www.suse.com/security/cve/CVE-2024-56585" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Fix sleeping in atomic context for PREEMPT_RT

Commit bab1c299f3945ffe79 ("LoongArch: Fix sleeping in atomic context in
setup_tlb_handler()") changes the gfp flag from GFP_KERNEL to GFP_ATOMIC
for alloc_pages_node(). However, for PREEMPT_RT kernels we can still get
a "sleeping in atomic context" error:

[    0.372259] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
[    0.372266] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1
[    0.372268] preempt_count: 1, expected: 0
[    0.372270] RCU nest depth: 1, expected: 1
[    0.372272] 3 locks held by swapper/1/0:
[    0.372274]  #0: 900000000c9f5e60 (&amp;pcp-&gt;lock){+.+.}-{3:3}, at: get_page_from_freelist+0x524/0x1c60
[    0.372294]  #1: 90000000087013b8 (rcu_read_lock){....}-{1:3}, at: rt_spin_trylock+0x50/0x140
[    0.372305]  #2: 900000047fffd388 (&amp;zone-&gt;lock){+.+.}-{3:3}, at: __rmqueue_pcplist+0x30c/0xea0
[    0.372314] irq event stamp: 0
[    0.372316] hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
[    0.372322] hardirqs last disabled at (0): [&lt;9000000005947320&gt;] copy_process+0x9c0/0x26e0
[    0.372329] softirqs last  enabled at (0): [&lt;9000000005947320&gt;] copy_process+0x9c0/0x26e0
[    0.372335] softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
[    0.372341] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.12.0-rc7+ #1891
[    0.372346] Hardware name: Loongson Loongson-3A5000-7A1000-1w-CRB/Loongson-LS3A5000-7A1000-1w-CRB, BIOS vUDK2018-LoongArch-V2.0.0-prebeta9 10/21/2022
[    0.372349] Stack : 0000000000000089 9000000005a0db9c 90000000071519c8 9000000100388000
[    0.372486]         900000010038b890 0000000000000000 900000010038b898 9000000007e53788
[    0.372492]         900000000815bcc8 900000000815bcc0 900000010038b700 0000000000000001
[    0.372498]         0000000000000001 4b031894b9d6b725 00000000055ec000 9000000100338fc0
[    0.372503]         00000000000000c4 0000000000000001 000000000000002d 0000000000000003
[    0.372509]         0000000000000030 0000000000000003 00000000055ec000 0000000000000003
[    0.372515]         900000000806d000 9000000007e53788 00000000000000b0 0000000000000004
[    0.372521]         0000000000000000 0000000000000000 900000000c9f5f10 0000000000000000
[    0.372526]         90000000076f12d8 9000000007e53788 9000000005924778 0000000000000000
[    0.372532]         00000000000000b0 0000000000000004 0000000000000000 0000000000070000
[    0.372537]         ...
[    0.372540] Call Trace:
[    0.372542] [&lt;9000000005924778&gt;] show_stack+0x38/0x180
[    0.372548] [&lt;90000000071519c4&gt;] dump_stack_lvl+0x94/0xe4
[    0.372555] [&lt;900000000599b880&gt;] __might_resched+0x1a0/0x260
[    0.372561] [&lt;90000000071675cc&gt;] rt_spin_lock+0x4c/0x140
[    0.372565] [&lt;9000000005cbb768&gt;] __rmqueue_pcplist+0x308/0xea0
[    0.372570] [&lt;9000000005cbed84&gt;] get_page_from_freelist+0x564/0x1c60
[    0.372575] [&lt;9000000005cc0d98&gt;] __alloc_pages_noprof+0x218/0x1820
[    0.372580] [&lt;900000000593b36c&gt;] tlb_init+0x1ac/0x298
[    0.372585] [&lt;9000000005924b74&gt;] per_cpu_trap_init+0x114/0x140
[    0.372589] [&lt;9000000005921964&gt;] cpu_probe+0x4e4/0xa60
[    0.372592] [&lt;9000000005934874&gt;] start_secondary+0x34/0xc0
[    0.372599] [&lt;900000000715615c&gt;] smpboot_entry+0x64/0x6c

This is because in PREEMPT_RT kernels normal spinlocks are replaced by
rt spinlocks and rt_spin_lock() will cause sleeping. Fix it by disabling
NUMA optimization completely for PREEMPT_RT kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56585/">CVE-2024-56585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56585">CVE-2024-56585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235127">SUSE bug 1235127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56586</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56586" ref_url="https://www.suse.com/security/cve/CVE-2024-56586" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix f2fs_bug_on when uninstalling filesystem call f2fs_evict_inode.

creating a large files during checkpoint disable until it runs out of
space and then delete it, then remount to enable checkpoint again, and
then unmount the filesystem triggers the f2fs_bug_on as below:

------------[ cut here ]------------
kernel BUG at fs/f2fs/inode.c:896!
CPU: 2 UID: 0 PID: 1286 Comm: umount Not tainted 6.11.0-rc7-dirty #360
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:f2fs_evict_inode+0x58c/0x610
Call Trace:
 __die_body+0x15/0x60
 die+0x33/0x50
 do_trap+0x10a/0x120
 f2fs_evict_inode+0x58c/0x610
 do_error_trap+0x60/0x80
 f2fs_evict_inode+0x58c/0x610
 exc_invalid_op+0x53/0x60
 f2fs_evict_inode+0x58c/0x610
 asm_exc_invalid_op+0x16/0x20
 f2fs_evict_inode+0x58c/0x610
 evict+0x101/0x260
 dispose_list+0x30/0x50
 evict_inodes+0x140/0x190
 generic_shutdown_super+0x2f/0x150
 kill_block_super+0x11/0x40
 kill_f2fs_super+0x7d/0x140
 deactivate_locked_super+0x2a/0x70
 cleanup_mnt+0xb3/0x140
 task_work_run+0x61/0x90

The root cause is: creating large files during disable checkpoint
period results in not enough free segments, so when writing back root
inode will failed in f2fs_enable_checkpoint. When umount the file
system after enabling checkpoint, the root inode is dirty in
f2fs_evict_inode function, which triggers BUG_ON. The steps to
reproduce are as follows:

dd if=/dev/zero of=f2fs.img bs=1M count=55
mount f2fs.img f2fs_dir -o checkpoint=disable:10%
dd if=/dev/zero of=big bs=1M count=50
sync
rm big
mount -o remount,checkpoint=enable f2fs_dir
umount f2fs_dir

Let's redirty inode when there is not free segments during checkpoint
is disable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56586/">CVE-2024-56586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56586">CVE-2024-56586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235126">SUSE bug 1235126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56587</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56587" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56587" ref_url="https://www.suse.com/security/cve/CVE-2024-56587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: class: Protect brightness_show() with led_cdev-&gt;led_access mutex

There is NULL pointer issue observed if from Process A where hid device
being added which results in adding a led_cdev addition and later a
another call to access of led_cdev attribute from Process B can result
in NULL pointer issue.

Use mutex led_cdev-&gt;led_access to protect access to led-&gt;cdev and its
attribute inside brightness_show() and max_brightness_show() and also
update the comment for mutex that it should be used to protect the led
class device fields.

	Process A 				Process B

 kthread+0x114
 worker_thread+0x244
 process_scheduled_works+0x248
 uhid_device_add_worker+0x24
 hid_add_device+0x120
 device_add+0x268
 bus_probe_device+0x94
 device_initial_probe+0x14
 __device_attach+0xfc
 bus_for_each_drv+0x10c
 __device_attach_driver+0x14c
 driver_probe_device+0x3c
 __driver_probe_device+0xa0
 really_probe+0x190
 hid_device_probe+0x130
 ps_probe+0x990
 ps_led_register+0x94
 devm_led_classdev_register_ext+0x58
 led_classdev_register_ext+0x1f8
 device_create_with_groups+0x48
 device_create_groups_vargs+0xc8
 device_add+0x244
 kobject_uevent+0x14
 kobject_uevent_env[jt]+0x224
 mutex_unlock[jt]+0xc4
 __mutex_unlock_slowpath+0xd4
 wake_up_q+0x70
 try_to_wake_up[jt]+0x48c
 preempt_schedule_common+0x28
 __schedule+0x628
 __switch_to+0x174
						el0t_64_sync+0x1a8/0x1ac
						el0t_64_sync_handler+0x68/0xbc
						el0_svc+0x38/0x68
						do_el0_svc+0x1c/0x28
						el0_svc_common+0x80/0xe0
						invoke_syscall+0x58/0x114
						__arm64_sys_read+0x1c/0x2c
						ksys_read+0x78/0xe8
						vfs_read+0x1e0/0x2c8
						kernfs_fop_read_iter+0x68/0x1b4
						seq_read_iter+0x158/0x4ec
						kernfs_seq_show+0x44/0x54
						sysfs_kf_seq_show+0xb4/0x130
						dev_attr_show+0x38/0x74
						brightness_show+0x20/0x4c
						dualshock4_led_get_brightness+0xc/0x74

[ 3313.874295][ T4013] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060
[ 3313.874301][ T4013] Mem abort info:
[ 3313.874303][ T4013]   ESR = 0x0000000096000006
[ 3313.874305][ T4013]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 3313.874307][ T4013]   SET = 0, FnV = 0
[ 3313.874309][ T4013]   EA = 0, S1PTW = 0
[ 3313.874311][ T4013]   FSC = 0x06: level 2 translation fault
[ 3313.874313][ T4013] Data abort info:
[ 3313.874314][ T4013]   ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
[ 3313.874316][ T4013]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[ 3313.874318][ T4013]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[ 3313.874320][ T4013] user pgtable: 4k pages, 39-bit VAs, pgdp=00000008f2b0a000
..

[ 3313.874332][ T4013] Dumping ftrace buffer:
[ 3313.874334][ T4013]    (ftrace buffer empty)
..
..
[ dd3313.874639][ T4013] CPU: 6 PID: 4013 Comm: InputReader
[ 3313.874648][ T4013] pc : dualshock4_led_get_brightness+0xc/0x74
[ 3313.874653][ T4013] lr : led_update_brightness+0x38/0x60
[ 3313.874656][ T4013] sp : ffffffc0b910bbd0
..
..
[ 3313.874685][ T4013] Call trace:
[ 3313.874687][ T4013]  dualshock4_led_get_brightness+0xc/0x74
[ 3313.874690][ T4013]  brightness_show+0x20/0x4c
[ 3313.874692][ T4013]  dev_attr_show+0x38/0x74
[ 3313.874696][ T4013]  sysfs_kf_seq_show+0xb4/0x130
[ 3313.874700][ T4013]  kernfs_seq_show+0x44/0x54
[ 3313.874703][ T4013]  seq_read_iter+0x158/0x4ec
[ 3313.874705][ T4013]  kernfs_fop_read_iter+0x68/0x1b4
[ 3313.874708][ T4013]  vfs_read+0x1e0/0x2c8
[ 3313.874711][ T4013]  ksys_read+0x78/0xe8
[ 3313.874714][ T4013]  __arm64_sys_read+0x1c/0x2c
[ 3313.874718][ T4013]  invoke_syscall+0x58/0x114
[ 3313.874721][ T4013]  el0_svc_common+0x80/0xe0
[ 3313.874724][ T4013]  do_el0_svc+0x1c/0x28
[ 3313.874727][ T4013]  el0_svc+0x38/0x68
[ 3313.874730][ T4013]  el0t_64_sync_handler+0x68/0xbc
[ 3313.874732][ T4013]  el0t_64_sync+0x1a8/0x1ac
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56587/">CVE-2024-56587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56587">CVE-2024-56587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235125">SUSE bug 1235125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56588</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56588" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56588" ref_url="https://www.suse.com/security/cve/CVE-2024-56588" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: hisi_sas: Create all dump files during debugfs initialization

For the current debugfs of hisi_sas, after user triggers dump, the
driver allocate memory space to save the register information and create
debugfs files to display the saved information. In this process, the
debugfs files created after each dump.

Therefore, when the dump is triggered while the driver is unbind, the
following hang occurs:

[67840.853907] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[67840.862947] Mem abort info:
[67840.865855]   ESR = 0x0000000096000004
[67840.869713]   EC = 0x25: DABT (current EL), IL = 32 bits
[67840.875125]   SET = 0, FnV = 0
[67840.878291]   EA = 0, S1PTW = 0
[67840.881545]   FSC = 0x04: level 0 translation fault
[67840.886528] Data abort info:
[67840.889524]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[67840.895117]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[67840.900284]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[67840.905709] user pgtable: 4k pages, 48-bit VAs, pgdp=0000002803a1f000
[67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000
[67840.919177] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[67841.003628] pc : down_write+0x30/0x98
[67841.007546] lr : start_creating.part.0+0x60/0x198
[67841.012495] sp : ffff8000b979ba20
[67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40
[67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8
[67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18
[67841.038147] x20: ffff00281dc1e3c0 x19: fffffffffffffffe x18: 0000000000000020
[67841.045515] x17: 0000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff
[67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18
[67841.060263] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa368b1289b18
[67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9
[67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001
[67841.082388] x2 : 0000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0
[67841.089759] Call trace:
[67841.092456]  down_write+0x30/0x98
[67841.096017]  start_creating.part.0+0x60/0x198
[67841.100613]  debugfs_create_dir+0x48/0x1f8
[67841.104950]  debugfs_create_files_v3_hw+0x88/0x348 [hisi_sas_v3_hw]
[67841.111447]  debugfs_snapshot_regs_v3_hw+0x708/0x798 [hisi_sas_v3_hw]
[67841.118111]  debugfs_trigger_dump_v3_hw_write+0x9c/0x120 [hisi_sas_v3_hw]
[67841.125115]  full_proxy_write+0x68/0xc8
[67841.129175]  vfs_write+0xd8/0x3f0
[67841.132708]  ksys_write+0x70/0x108
[67841.136317]  __arm64_sys_write+0x24/0x38
[67841.140440]  invoke_syscall+0x50/0x128
[67841.144385]  el0_svc_common.constprop.0+0xc8/0xf0
[67841.149273]  do_el0_svc+0x24/0x38
[67841.152773]  el0_svc+0x38/0xd8
[67841.156009]  el0t_64_sync_handler+0xc0/0xc8
[67841.160361]  el0t_64_sync+0x1a4/0x1a8
[67841.164189] Code: b9000882 d2800002 d2800023 f9800011 (c85ffc05)
[67841.170443] ---[ end trace 0000000000000000 ]---

To fix this issue, create all directories and files during debugfs
initialization. In this way, the driver only needs to allocate memory
space to save information each time the user triggers dumping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56588/">CVE-2024-56588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56588">CVE-2024-56588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235123">SUSE bug 1235123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56589</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56589" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56589" ref_url="https://www.suse.com/security/cve/CVE-2024-56589" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: hisi_sas: Add cond_resched() for no forced preemption model

For no forced preemption model kernel, in the scenario where the
expander is connected to 12 high performance SAS SSDs, the following
call trace may occur:

[  214.409199][  C240] watchdog: BUG: soft lockup - CPU#240 stuck for 22s! [irq/149-hisi_sa:3211]
[  214.568533][  C240] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)
[  214.575224][  C240] pc : fput_many+0x8c/0xdc
[  214.579480][  C240] lr : fput+0x1c/0xf0
[  214.583302][  C240] sp : ffff80002de2b900
[  214.587298][  C240] x29: ffff80002de2b900 x28: ffff1082aa412000
[  214.593291][  C240] x27: ffff3062a0348c08 x26: ffff80003a9f6000
[  214.599284][  C240] x25: ffff1062bbac5c40 x24: 0000000000001000
[  214.605277][  C240] x23: 000000000000000a x22: 0000000000000001
[  214.611270][  C240] x21: 0000000000001000 x20: 0000000000000000
[  214.617262][  C240] x19: ffff3062a41ae580 x18: 0000000000010000
[  214.623255][  C240] x17: 0000000000000001 x16: ffffdb3a6efe5fc0
[  214.629248][  C240] x15: ffffffffffffffff x14: 0000000003ffffff
[  214.635241][  C240] x13: 000000000000ffff x12: 000000000000029c
[  214.641234][  C240] x11: 0000000000000006 x10: ffff80003a9f7fd0
[  214.647226][  C240] x9 : ffffdb3a6f0482fc x8 : 0000000000000001
[  214.653219][  C240] x7 : 0000000000000002 x6 : 0000000000000080
[  214.659212][  C240] x5 : ffff55480ee9b000 x4 : fffffde7f94c6554
[  214.665205][  C240] x3 : 0000000000000002 x2 : 0000000000000020
[  214.671198][  C240] x1 : 0000000000000021 x0 : ffff3062a41ae5b8
[  214.677191][  C240] Call trace:
[  214.680320][  C240]  fput_many+0x8c/0xdc
[  214.684230][  C240]  fput+0x1c/0xf0
[  214.687707][  C240]  aio_complete_rw+0xd8/0x1fc
[  214.692225][  C240]  blkdev_bio_end_io+0x98/0x140
[  214.696917][  C240]  bio_endio+0x160/0x1bc
[  214.701001][  C240]  blk_update_request+0x1c8/0x3bc
[  214.705867][  C240]  scsi_end_request+0x3c/0x1f0
[  214.710471][  C240]  scsi_io_completion+0x7c/0x1a0
[  214.715249][  C240]  scsi_finish_command+0x104/0x140
[  214.720200][  C240]  scsi_softirq_done+0x90/0x180
[  214.724892][  C240]  blk_mq_complete_request+0x5c/0x70
[  214.730016][  C240]  scsi_mq_done+0x48/0xac
[  214.734194][  C240]  sas_scsi_task_done+0xbc/0x16c [libsas]
[  214.739758][  C240]  slot_complete_v3_hw+0x260/0x760 [hisi_sas_v3_hw]
[  214.746185][  C240]  cq_thread_v3_hw+0xbc/0x190 [hisi_sas_v3_hw]
[  214.752179][  C240]  irq_thread_fn+0x34/0xa4
[  214.756435][  C240]  irq_thread+0xc4/0x130
[  214.760520][  C240]  kthread+0x108/0x13c
[  214.764430][  C240]  ret_from_fork+0x10/0x18

This is because in the hisi_sas driver, both the hardware interrupt
handler and the interrupt thread are executed on the same CPU. In the
performance test scenario, function irq_wait_for_interrupt() will always
return 0 if lots of interrupts occurs and the CPU will be continuously
consumed. As a result, the CPU cannot run the watchdog thread. When the
watchdog time exceeds the specified time, call trace occurs.

To fix it, add cond_resched() to execute the watchdog thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56589/">CVE-2024-56589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56589">CVE-2024-56589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235241">SUSE bug 1235241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56590</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56590" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56590" ref_url="https://www.suse.com/security/cve/CVE-2024-56590" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet

This fixes not checking if skb really contains an ACL header otherwise
the code may attempt to access some uninitilized/invalid memory past the
valid skb-&gt;data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56590/">CVE-2024-56590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235038">SUSE bug 1235038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56591</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56591" ref_url="https://www.suse.com/security/cve/CVE-2024-56591" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: Use disable_delayed_work_sync

This makes use of disable_delayed_work_sync instead
cancel_delayed_work_sync as it not only cancel the ongoing work but also
disables new submit which is disarable since the object holding the work
is about to be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56591/">CVE-2024-56591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235052">SUSE bug 1235052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56592</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56592" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56592" ref_url="https://www.suse.com/security/cve/CVE-2024-56592" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Call free_htab_elem() after htab_unlock_bucket()

For htab of maps, when the map is removed from the htab, it may hold the
last reference of the map. bpf_map_fd_put_ptr() will invoke
bpf_map_free_id() to free the id of the removed map element. However,
bpf_map_fd_put_ptr() is invoked while holding a bucket lock
(raw_spin_lock_t), and bpf_map_free_id() attempts to acquire map_idr_lock
(spinlock_t), triggering the following lockdep warning:

  =============================
  [ BUG: Invalid wait context ]
  6.11.0-rc4+ #49 Not tainted
  -----------------------------
  test_maps/4881 is trying to lock:
  ffffffff84884578 (map_idr_lock){+...}-{3:3}, at: bpf_map_free_id.part.0+0x21/0x70
  other info that might help us debug this:
  context-{5:5}
  2 locks held by test_maps/4881:
   #0: ffffffff846caf60 (rcu_read_lock){....}-{1:3}, at: bpf_fd_htab_map_update_elem+0xf9/0x270
   #1: ffff888149ced148 (&amp;htab-&gt;lockdep_key#2){....}-{2:2}, at: htab_map_update_elem+0x178/0xa80
  stack backtrace:
  CPU: 0 UID: 0 PID: 4881 Comm: test_maps Not tainted 6.11.0-rc4+ #49
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), ...
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6e/0xb0
   dump_stack+0x10/0x20
   __lock_acquire+0x73e/0x36c0
   lock_acquire+0x182/0x450
   _raw_spin_lock_irqsave+0x43/0x70
   bpf_map_free_id.part.0+0x21/0x70
   bpf_map_put+0xcf/0x110
   bpf_map_fd_put_ptr+0x9a/0xb0
   free_htab_elem+0x69/0xe0
   htab_map_update_elem+0x50f/0xa80
   bpf_fd_htab_map_update_elem+0x131/0x270
   htab_map_update_elem+0x50f/0xa80
   bpf_fd_htab_map_update_elem+0x131/0x270
   bpf_map_update_value+0x266/0x380
   __sys_bpf+0x21bb/0x36b0
   __x64_sys_bpf+0x45/0x60
   x64_sys_call+0x1b2a/0x20d0
   do_syscall_64+0x5d/0x100
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

One way to fix the lockdep warning is using raw_spinlock_t for
map_idr_lock as well. However, bpf_map_alloc_id() invokes
idr_alloc_cyclic() after acquiring map_idr_lock, it will trigger a
similar lockdep warning because the slab's lock (s-&gt;cpu_slab-&gt;lock) is
still a spinlock.

Instead of changing map_idr_lock's type, fix the issue by invoking
htab_put_fd_value() after htab_unlock_bucket(). However, only deferring
the invocation of htab_put_fd_value() is not enough, because the old map
pointers in htab of maps can not be saved during batched deletion.
Therefore, also defer the invocation of free_htab_elem(), so these
to-be-freed elements could be linked together similar to lru map.

There are four callers for -&gt;map_fd_put_ptr:

(1) alloc_htab_elem() (through htab_put_fd_value())
It invokes -&gt;map_fd_put_ptr() under a raw_spinlock_t. The invocation of
htab_put_fd_value() can not simply move after htab_unlock_bucket(),
because the old element has already been stashed in htab-&gt;extra_elems.
It may be reused immediately after htab_unlock_bucket() and the
invocation of htab_put_fd_value() after htab_unlock_bucket() may release
the newly-added element incorrectly. Therefore, saving the map pointer
of the old element for htab of maps before unlocking the bucket and
releasing the map_ptr after unlock. Beside the map pointer in the old
element, should do the same thing for the special fields in the old
element as well.

(2) free_htab_elem() (through htab_put_fd_value())
Its caller includes __htab_map_lookup_and_delete_elem(),
htab_map_delete_elem() and __htab_map_lookup_and_delete_batch().

For htab_map_delete_elem(), simply invoke free_htab_elem() after
htab_unlock_bucket(). For __htab_map_lookup_and_delete_batch(), just
like lru map, linking the to-be-freed element into node_to_free list
and invoking free_htab_elem() for these element after unlock. It is safe
to reuse batch_flink as the link for node_to_free, because these
elements have been removed from the hash llist.

Because htab of maps doesn't support lookup_and_delete operation,
__htab_map_lookup_and_delete_elem() doesn't have the problem, so kept
it as
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56592/">CVE-2024-56592 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56592">CVE-2024-56592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235244">SUSE bug 1235244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56593</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56593" ref_url="https://www.suse.com/security/cve/CVE-2024-56593" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw()

This patch fixes a NULL pointer dereference bug in brcmfmac that occurs
when a high 'sd_sgentry_align' value applies (e.g. 512) and a lot of queued SKBs
are sent from the pkt queue.

The problem is the number of entries in the pre-allocated sgtable, it is
nents = max(rxglom_size, txglom_size) + max(rxglom_size, txglom_size) &gt;&gt; 4 + 1.
Given the default [rt]xglom_size=32 it's actually 35 which is too small.
Worst case, the pkt queue can end up with 64 SKBs. This occurs when a new SKB
is added for each original SKB if tailroom isn't enough to hold tail_pad.
At least one sg entry is needed for each SKB. So, eventually the "skb_queue_walk loop"
in brcmf_sdiod_sglist_rw may run out of sg entries. This makes sg_next return
NULL and this causes the oops.

The patch sets nents to max(rxglom_size, txglom_size) * 2 to be able handle
the worst-case.
Btw. this requires only 64-35=29 * 16 (or 20 if CONFIG_NEED_SG_DMA_LENGTH) = 464
additional bytes of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56593/">CVE-2024-56593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56593">CVE-2024-56593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235252">SUSE bug 1235252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56594</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56594" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56594" ref_url="https://www.suse.com/security/cve/CVE-2024-56594" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: set the right AMDGPU sg segment limitation

The driver needs to set the correct max_segment_size;
otherwise debug_dma_map_sg() will complain about the
over-mapping of the AMDGPU sg length as following:

WARNING: CPU: 6 PID: 1964 at kernel/dma/debug.c:1178 debug_dma_map_sg+0x2dc/0x370
[  364.049444] Modules linked in: veth amdgpu(OE) amdxcp drm_exec gpu_sched drm_buddy drm_ttm_helper ttm(OE) drm_suballoc_helper drm_display_helper drm_kms_helper i2c_algo_bit rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace netfs xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo iptable_nat xt_addrtype iptable_filter br_netfilter nvme_fabrics overlay nfnetlink_cttimeout nfnetlink openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bridge stp llc amd_atl intel_rapl_msr intel_rapl_common sunrpc sch_fq_codel snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd binfmt_misc snd_hda_codec snd_pci_acp6x snd_hda_core snd_acp_config snd_hwdep snd_soc_acpi kvm_amd snd_pcm kvm snd_seq_midi snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel sha512_ssse3 snd_rawmidi sha256_ssse3 sha1_ssse3 aesni_intel snd_seq nls_iso8859_1 crypto_simd snd_seq_device cryptd snd_timer rapl input_leds snd
[  364.049532]  ipmi_devintf wmi_bmof ccp serio_raw k10temp sp5100_tco soundcore ipmi_msghandler cm32181 industrialio mac_hid msr parport_pc ppdev lp parport drm efi_pstore ip_tables x_tables pci_stub crc32_pclmul nvme ahci libahci i2c_piix4 r8169 nvme_core i2c_designware_pci realtek i2c_ccgx_ucsi video wmi hid_generic cdc_ether usbnet usbhid hid r8152 mii
[  364.049576] CPU: 6 PID: 1964 Comm: rocminfo Tainted: G           OE      6.10.0-custom #492
[  364.049579] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS RMJ1009A 06/13/2021
[  364.049582] RIP: 0010:debug_dma_map_sg+0x2dc/0x370
[  364.049585] Code: 89 4d b8 e8 36 b1 86 00 8b 4d b8 48 8b 55 b0 44 8b 45 a8 4c 8b 4d a0 48 89 c6 48 c7 c7 00 4b 74 bc 4c 89 4d b8 e8 b4 73 f3 ff &lt;0f&gt; 0b 4c 8b 4d b8 8b 15 c8 2c b8 01 85 d2 0f 85 ee fd ff ff 8b 05
[  364.049588] RSP: 0018:ffff9ca600b57ac0 EFLAGS: 00010286
[  364.049590] RAX: 0000000000000000 RBX: ffff88b7c132b0c8 RCX: 0000000000000027
[  364.049592] RDX: ffff88bb0f521688 RSI: 0000000000000001 RDI: ffff88bb0f521680
[  364.049594] RBP: ffff9ca600b57b20 R08: 000000000000006f R09: ffff9ca600b57930
[  364.049596] R10: ffff9ca600b57928 R11: ffffffffbcb46328 R12: 0000000000000000
[  364.049597] R13: 0000000000000001 R14: ffff88b7c19c0700 R15: ffff88b7c9059800
[  364.049599] FS:  00007fb2d3516e80(0000) GS:ffff88bb0f500000(0000) knlGS:0000000000000000
[  364.049601] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  364.049603] CR2: 000055610bd03598 CR3: 00000001049f6000 CR4: 0000000000350ef0
[  364.049605] Call Trace:
[  364.049607]  &lt;TASK&gt;
[  364.049609]  ? show_regs+0x6d/0x80
[  364.049614]  ? __warn+0x8c/0x140
[  364.049618]  ? debug_dma_map_sg+0x2dc/0x370
[  364.049621]  ? report_bug+0x193/0x1a0
[  364.049627]  ? handle_bug+0x46/0x80
[  364.049631]  ? exc_invalid_op+0x1d/0x80
[  364.049635]  ? asm_exc_invalid_op+0x1f/0x30
[  364.049642]  ? debug_dma_map_sg+0x2dc/0x370
[  364.049647]  __dma_map_sg_attrs+0x90/0xe0
[  364.049651]  dma_map_sgtable+0x25/0x40
[  364.049654]  amdgpu_bo_move+0x59a/0x850 [amdgpu]
[  364.049935]  ? srso_return_thunk+0x5/0x5f
[  364.049939]  ? amdgpu_ttm_tt_populate+0x5d/0xc0 [amdgpu]
[  364.050095]  ttm_bo_handle_move_mem+0xc3/0x180 [ttm]
[  364.050103]  ttm_bo_validate+0xc1/0x160 [ttm]
[  364.050108]  ? amdgpu_ttm_tt_get_user_pages+0xe5/0x1b0 [amdgpu]
[  364.050263]  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0xa12/0xc90 [amdgpu]
[  364.050473]  kfd_ioctl_alloc_memory_of_gpu+0x16b/0x3b0 [amdgpu]
[  364.050680]  kfd_ioctl+0x3c2/0x530 [amdgpu]
[  364.050866]  ? __pfx_kfd_ioctl_alloc_memory_of_gpu+0x10/0x10 [amdgpu]
[  364.05105
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56594/">CVE-2024-56594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56594">CVE-2024-56594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235413">SUSE bug 1235413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56595</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56595" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56595" ref_url="https://www.suse.com/security/cve/CVE-2024-56595" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: add a check to prevent array-index-out-of-bounds in dbAdjTree

When the value of lp is 0 at the beginning of the for loop, it will
become negative in the next assignment and we should bail out.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56595/">CVE-2024-56595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56595">CVE-2024-56595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235410">SUSE bug 1235410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56596" ref_url="https://www.suse.com/security/cve/CVE-2024-56596" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix array-index-out-of-bounds in jfs_readdir

The stbl might contain some invalid values. Added a check to
return error code in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56596/">CVE-2024-56596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56596">CVE-2024-56596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235458">SUSE bug 1235458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56597</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56597" ref_url="https://www.suse.com/security/cve/CVE-2024-56597" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: fix shift-out-of-bounds in dbSplit

When dmt_budmin is less than zero, it causes errors
in the later stages. Added a check to return an error beforehand
in dbAllocCtl itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56597/">CVE-2024-56597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56597">CVE-2024-56597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235222">SUSE bug 1235222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56598</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56598" ref_url="https://www.suse.com/security/cve/CVE-2024-56598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jfs: array-index-out-of-bounds fix in dtReadFirst

The value of stbl can be sometimes out of bounds due
to a bad filesystem. Added a check with appopriate return
of error code in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56598/">CVE-2024-56598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56598">CVE-2024-56598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235220">SUSE bug 1235220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235221">SUSE bug 1235221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56599</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56599" ref_url="https://www.suse.com/security/cve/CVE-2024-56599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: avoid NULL pointer error during sdio remove

When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio
workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON
is set to yes, kernel panic will happen:
Call trace:
 destroy_workqueue+0x1c/0x258
 ath10k_sdio_remove+0x84/0x94
 sdio_bus_remove+0x50/0x16c
 device_release_driver_internal+0x188/0x25c
 device_driver_detach+0x20/0x2c

This is because during 'rmmod ath10k', ath10k_sdio_remove() will call
ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()
will finally be called in ath10k_core_destroy(). This function will free
struct cfg80211_registered_device *rdev and all its members, including
wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio
workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.

After device release, destroy_workqueue() will use NULL pointer then the
kernel panic happen.

Call trace:
ath10k_sdio_remove
  -&gt;ath10k_core_unregister
    ……
    -&gt;ath10k_core_stop
      -&gt;ath10k_hif_stop
        -&gt;ath10k_sdio_irq_disable
    -&gt;ath10k_hif_power_down
      -&gt;del_timer_sync(&amp;ar_sdio-&gt;sleep_timer)
  -&gt;ath10k_core_destroy
    -&gt;ath10k_mac_destroy
      -&gt;ieee80211_free_hw
        -&gt;wiphy_free
    ……
          -&gt;wiphy_dev_release
  -&gt;destroy_workqueue

Need to call destroy_workqueue() before ath10k_core_destroy(), free
the work queue buffer first and then free pointer of work queue by
ath10k_core_destroy(). This order matches the error path order in
ath10k_sdio_probe().

No work will be queued on sdio workqueue between it is destroyed and
ath10k_core_destroy() is called. Based on the call_stack above, the
reason is:
Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and
ath10k_sdio_irq_disable() will queue work on sdio workqueue.
Sleep timer will be deleted before ath10k_core_destroy() in
ath10k_hif_power_down().
ath10k_sdio_irq_disable() only be called in ath10k_hif_stop().
ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif
bus, so ath10k_sdio_hif_tx_sg() won't be called anymore.

Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56599/">CVE-2024-56599 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56599">CVE-2024-56599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235138">SUSE bug 1235138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56600</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: inet6: do not leave a dangling sk pointer in inet6_create()

sock_init_data() attaches the allocated sk pointer to the provided sock
object. If inet6_create() fails later, the sk object is released, but the
sock object retains the dangling sk pointer, which may cause use-after-free
later.

Clear the sock sk pointer on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235217">SUSE bug 1235217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235218">SUSE bug 1235218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56601</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: inet: do not leave a dangling sk pointer in inet_create()

sock_init_data() attaches the allocated sk object to the provided sock
object. If inet_create() fails later, the sk object is freed, but the
sock object retains the dangling pointer, which may create use-after-free
later.

Clear the sk pointer in the sock object on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235230">SUSE bug 1235230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235231">SUSE bug 1235231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56602</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()

sock_init_data() attaches the allocated sk object to the provided sock
object. If ieee802154_create() fails later, the allocated sk object is
freed, but the dangling pointer remains in the provided sock object, which
may allow use-after-free.

Clear the sk pointer in the sock object on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235521">SUSE bug 1235521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235522">SUSE bug 1235522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56603</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56603" ref_url="https://www.suse.com/security/cve/CVE-2024-56603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: af_can: do not leave a dangling sk pointer in can_create()

On error can_create() frees the allocated sk object, but sock_init_data()
has already attached it to the provided sock object. This will leave a
dangling sk pointer in the sock object and may cause use-after-free later.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56603/">CVE-2024-56603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235415">SUSE bug 1235415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56604</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56604" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()

bt_sock_alloc() attaches allocated sk object to the provided sock object.
If rfcomm_dlc_alloc() fails, we release the sk object, but leave the
dangling pointer in the sock object, which may cause use-after-free.

Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235056">SUSE bug 1235056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235058">SUSE bug 1235058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56605</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56605" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()

bt_sock_alloc() allocates the sk object and attaches it to the provided
sock object. On error l2cap_sock_alloc() frees the sk object, but the
dangling pointer is still attached to the sock object, which may create
use-after-free in other code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235062">SUSE bug 1235062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56606</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56606" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56606" ref_url="https://www.suse.com/security/cve/CVE-2024-56606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_packet: avoid erroring out after sock_init_data() in packet_create()

After sock_init_data() the allocated sk object is attached to the provided
sock object. On error, packet_create() frees the sk object leaving the
dangling pointer in the sock object on return. Some other code may try
to use this pointer and cause use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56606/">CVE-2024-56606 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56606">CVE-2024-56606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235417">SUSE bug 1235417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56607</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56607" ref_url="https://www.suse.com/security/cve/CVE-2024-56607" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix atomic calls in ath12k_mac_op_set_bitrate_mask()

When I try to manually set bitrates:

iw wlan0 set bitrates legacy-2.4 1

I get sleeping from invalid context error, see below. Fix that by switching to
use recently introduced ieee80211_iterate_stations_mtx().

Do note that WCN6855 firmware is still crashing, I'm not sure if that firmware
even supports bitrate WMI commands and should we consider disabling
ath12k_mac_op_set_bitrate_mask() for WCN6855? But that's for another patch.

BUG: sleeping function called from invalid context at drivers/net/wireless/ath/ath12k/wmi.c:420
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 2236, name: iw
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
3 locks held by iw/2236:
 #0: ffffffffabc6f1d8 (cb_lock){++++}-{3:3}, at: genl_rcv+0x14/0x40
 #1: ffff888138410810 (&amp;rdev-&gt;wiphy.mtx){+.+.}-{3:3}, at: nl80211_pre_doit+0x54d/0x800 [cfg80211]
 #2: ffffffffab2cfaa0 (rcu_read_lock){....}-{1:2}, at: ieee80211_iterate_stations_atomic+0x2f/0x200 [mac80211]
CPU: 3 UID: 0 PID: 2236 Comm: iw Not tainted 6.11.0-rc7-wt-ath+ #1772
Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xa4/0xe0
 dump_stack+0x10/0x20
 __might_resched+0x363/0x5a0
 ? __alloc_skb+0x165/0x340
 __might_sleep+0xad/0x160
 ath12k_wmi_cmd_send+0xb1/0x3d0 [ath12k]
 ? ath12k_wmi_init_wcn7850+0xa40/0xa40 [ath12k]
 ? __netdev_alloc_skb+0x45/0x7b0
 ? __asan_memset+0x39/0x40
 ? ath12k_wmi_alloc_skb+0xf0/0x150 [ath12k]
 ? reacquire_held_locks+0x4d0/0x4d0
 ath12k_wmi_set_peer_param+0x340/0x5b0 [ath12k]
 ath12k_mac_disable_peer_fixed_rate+0xa3/0x110 [ath12k]
 ? ath12k_mac_vdev_stop+0x4f0/0x4f0 [ath12k]
 ieee80211_iterate_stations_atomic+0xd4/0x200 [mac80211]
 ath12k_mac_op_set_bitrate_mask+0x5d2/0x1080 [ath12k]
 ? ath12k_mac_vif_chan+0x320/0x320 [ath12k]
 drv_set_bitrate_mask+0x267/0x470 [mac80211]
 ieee80211_set_bitrate_mask+0x4cc/0x8a0 [mac80211]
 ? __this_cpu_preempt_check+0x13/0x20
 nl80211_set_tx_bitrate_mask+0x2bc/0x530 [cfg80211]
 ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]
 ? trace_contention_end+0xef/0x140
 ? rtnl_unlock+0x9/0x10
 ? nl80211_pre_doit+0x557/0x800 [cfg80211]
 genl_family_rcv_msg_doit+0x1f0/0x2e0
 ? genl_family_rcv_msg_attrs_parse.isra.0+0x250/0x250
 ? ns_capable+0x57/0xd0
 genl_family_rcv_msg+0x34c/0x600
 ? genl_family_rcv_msg_dumpit+0x310/0x310
 ? __lock_acquire+0xc62/0x1de0
 ? he_set_mcs_mask.isra.0+0x8d0/0x8d0 [cfg80211]
 ? nl80211_parse_tx_bitrate_mask+0x2320/0x2320 [cfg80211]
 ? cfg80211_external_auth_request+0x690/0x690 [cfg80211]
 genl_rcv_msg+0xa0/0x130
 netlink_rcv_skb+0x14c/0x400
 ? genl_family_rcv_msg+0x600/0x600
 ? netlink_ack+0xd70/0xd70
 ? rwsem_optimistic_spin+0x4f0/0x4f0
 ? genl_rcv+0x14/0x40
 ? down_read_killable+0x580/0x580
 ? netlink_deliver_tap+0x13e/0x350
 ? __this_cpu_preempt_check+0x13/0x20
 genl_rcv+0x23/0x40
 netlink_unicast+0x45e/0x790
 ? netlink_attachskb+0x7f0/0x7f0
 netlink_sendmsg+0x7eb/0xdb0
 ? netlink_unicast+0x790/0x790
 ? __this_cpu_preempt_check+0x13/0x20
 ? selinux_socket_sendmsg+0x31/0x40
 ? netlink_unicast+0x790/0x790
 __sock_sendmsg+0xc9/0x160
 ____sys_sendmsg+0x620/0x990
 ? kernel_sendmsg+0x30/0x30
 ? __copy_msghdr+0x410/0x410
 ? __kasan_check_read+0x11/0x20
 ? mark_lock+0xe6/0x1470
 ___sys_sendmsg+0xe9/0x170
 ? copy_msghdr_from_user+0x120/0x120
 ? __lock_acquire+0xc62/0x1de0
 ? do_fault_around+0x2c6/0x4e0
 ? do_user_addr_fault+0x8c1/0xde0
 ? reacquire_held_locks+0x220/0x4d0
 ? do_user_addr_fault+0x8c1/0xde0
 ? __kasan_check_read+0x11/0x20
 ? __fdget+0x4e/0x1d0
 ? sockfd_lookup_light+0x1a/0x170
 __sys_sendmsg+0xd2/0x180
 ? __sys_sendmsg_sock+0x20/0x20
 ? reacquire_held_locks+0x4d0/0x4d0
 ? debug_smp_processor_id+0x17/0x20
 __x64_sys_sendmsg+0x72/0xb0
 ? lockdep_hardirqs_on+0x7d/0x100
 x64_sys_call+0x894/0x9f0
 do_syscall_64+0x64/0x130
 entry_SYSCALL_64_after_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56607/">CVE-2024-56607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56607">CVE-2024-56607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235423">SUSE bug 1235423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56608</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56608" ref_url="https://www.suse.com/security/cve/CVE-2024-56608" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix out-of-bounds access in 'dcn21_link_encoder_create'

An issue was identified in the dcn21_link_encoder_create function where
an out-of-bounds access could occur when the hpd_source index was used
to reference the link_enc_hpd_regs array. This array has a fixed size
and the index was not being checked against the array's bounds before
accessing it.

This fix adds a conditional check to ensure that the hpd_source index is
within the valid range of the link_enc_hpd_regs array. If the index is
out of bounds, the function now returns NULL to prevent undefined
behavior.

References:

[   65.920507] ------------[ cut here ]------------
[   65.920510] UBSAN: array-index-out-of-bounds in drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn21/dcn21_resource.c:1312:29
[   65.920519] index 7 is out of range for type 'dcn10_link_enc_hpd_registers [5]'
[   65.920523] CPU: 3 PID: 1178 Comm: modprobe Tainted: G           OE      6.8.0-cleanershaderfeatureresetasdntipmi200nv2132 #13
[   65.920525] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS WMJ0429N_Weekly_20_04_2 04/29/2020
[   65.920527] Call Trace:
[   65.920529]  &lt;TASK&gt;
[   65.920532]  dump_stack_lvl+0x48/0x70
[   65.920541]  dump_stack+0x10/0x20
[   65.920543]  __ubsan_handle_out_of_bounds+0xa2/0xe0
[   65.920549]  dcn21_link_encoder_create+0xd9/0x140 [amdgpu]
[   65.921009]  link_create+0x6d3/0xed0 [amdgpu]
[   65.921355]  create_links+0x18a/0x4e0 [amdgpu]
[   65.921679]  dc_create+0x360/0x720 [amdgpu]
[   65.921999]  ? dmi_matches+0xa0/0x220
[   65.922004]  amdgpu_dm_init+0x2b6/0x2c90 [amdgpu]
[   65.922342]  ? console_unlock+0x77/0x120
[   65.922348]  ? dev_printk_emit+0x86/0xb0
[   65.922354]  dm_hw_init+0x15/0x40 [amdgpu]
[   65.922686]  amdgpu_device_init+0x26a8/0x33a0 [amdgpu]
[   65.922921]  amdgpu_driver_load_kms+0x1b/0xa0 [amdgpu]
[   65.923087]  amdgpu_pci_probe+0x1b7/0x630 [amdgpu]
[   65.923087]  local_pci_probe+0x4b/0xb0
[   65.923087]  pci_device_probe+0xc8/0x280
[   65.923087]  really_probe+0x187/0x300
[   65.923087]  __driver_probe_device+0x85/0x130
[   65.923087]  driver_probe_device+0x24/0x110
[   65.923087]  __driver_attach+0xac/0x1d0
[   65.923087]  ? __pfx___driver_attach+0x10/0x10
[   65.923087]  bus_for_each_dev+0x7d/0xd0
[   65.923087]  driver_attach+0x1e/0x30
[   65.923087]  bus_add_driver+0xf2/0x200
[   65.923087]  driver_register+0x64/0x130
[   65.923087]  ? __pfx_amdgpu_init+0x10/0x10 [amdgpu]
[   65.923087]  __pci_register_driver+0x61/0x70
[   65.923087]  amdgpu_init+0x7d/0xff0 [amdgpu]
[   65.923087]  do_one_initcall+0x49/0x310
[   65.923087]  ? kmalloc_trace+0x136/0x360
[   65.923087]  do_init_module+0x6a/0x270
[   65.923087]  load_module+0x1fce/0x23a0
[   65.923087]  init_module_from_file+0x9c/0xe0
[   65.923087]  ? init_module_from_file+0x9c/0xe0
[   65.923087]  idempotent_init_module+0x179/0x230
[   65.923087]  __x64_sys_finit_module+0x5d/0xa0
[   65.923087]  do_syscall_64+0x76/0x120
[   65.923087]  entry_SYSCALL_64_after_hwframe+0x6e/0x76
[   65.923087] RIP: 0033:0x7f2d80f1e88d
[   65.923087] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 b5 0f 00 f7 d8 64 89 01 48
[   65.923087] RSP: 002b:00007ffc7bc1aa78 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[   65.923087] RAX: ffffffffffffffda RBX: 0000564c9c1db130 RCX: 00007f2d80f1e88d
[   65.923087] RDX: 0000000000000000 RSI: 0000564c9c1e5480 RDI: 000000000000000f
[   65.923087] RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000002
[   65.923087] R10: 000000000000000f R11: 0000000000000246 R12: 0000564c9c1e5480
[   65.923087] R13: 0000564c9c1db260 R14: 0000000000000000 R15: 0000564c9c1e54b0
[   65.923087]  &lt;/TASK&gt;
[   65.923927] ---[ end trace ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56608/">CVE-2024-56608 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56608">CVE-2024-56608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235487">SUSE bug 1235487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56609</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56609" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56609" ref_url="https://www.suse.com/security/cve/CVE-2024-56609" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: use ieee80211_purge_tx_queue() to purge TX skb

When removing kernel modules by:
   rmmod rtw88_8723cs rtw88_8703b rtw88_8723x rtw88_sdio rtw88_core

Driver uses skb_queue_purge() to purge TX skb, but not report tx status
causing "Have pending ack frames!" warning. Use ieee80211_purge_tx_queue()
to correct this.

Since ieee80211_purge_tx_queue() doesn't take locks, to prevent racing
between TX work and purge TX queue, flush and destroy TX work in advance.

   wlan0: deauthenticating from aa:f5:fd:60:4c:a8 by local
     choice (Reason: 3=DEAUTH_LEAVING)
   ------------[ cut here ]------------
   Have pending ack frames!
   WARNING: CPU: 3 PID: 9232 at net/mac80211/main.c:1691
       ieee80211_free_ack_frame+0x5c/0x90 [mac80211]
   CPU: 3 PID: 9232 Comm: rmmod Tainted: G         C
       6.10.1-200.fc40.aarch64 #1
   Hardware name: pine64 Pine64 PinePhone Braveheart
      (1.1)/Pine64 PinePhone Braveheart (1.1), BIOS 2024.01 01/01/2024
   pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
   pc : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]
   lr : ieee80211_free_ack_frame+0x5c/0x90 [mac80211]
   sp : ffff80008c1b37b0
   x29: ffff80008c1b37b0 x28: ffff000003be8000 x27: 0000000000000000
   x26: 0000000000000000 x25: ffff000003dc14b8 x24: ffff80008c1b37d0
   x23: ffff000000ff9f80 x22: 0000000000000000 x21: 000000007fffffff
   x20: ffff80007c7e93d8 x19: ffff00006e66f400 x18: 0000000000000000
   x17: ffff7ffffd2b3000 x16: ffff800083fc0000 x15: 0000000000000000
   x14: 0000000000000000 x13: 2173656d61726620 x12: 6b636120676e6964
   x11: 0000000000000000 x10: 000000000000005d x9 : ffff8000802af2b0
   x8 : ffff80008c1b3430 x7 : 0000000000000001 x6 : 0000000000000001
   x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
   x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000003be8000
   Call trace:
    ieee80211_free_ack_frame+0x5c/0x90 [mac80211]
    idr_for_each+0x74/0x110
    ieee80211_free_hw+0x44/0xe8 [mac80211]
    rtw_sdio_remove+0x9c/0xc0 [rtw88_sdio]
    sdio_bus_remove+0x44/0x180
    device_remove+0x54/0x90
    device_release_driver_internal+0x1d4/0x238
    driver_detach+0x54/0xc0
    bus_remove_driver+0x78/0x108
    driver_unregister+0x38/0x78
    sdio_unregister_driver+0x2c/0x40
    rtw_8723cs_driver_exit+0x18/0x1000 [rtw88_8723cs]
    __do_sys_delete_module.isra.0+0x190/0x338
    __arm64_sys_delete_module+0x1c/0x30
    invoke_syscall+0x74/0x100
    el0_svc_common.constprop.0+0x48/0xf0
    do_el0_svc+0x24/0x38
    el0_svc+0x3c/0x158
    el0t_64_sync_handler+0x120/0x138
    el0t_64_sync+0x194/0x198
   ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56609/">CVE-2024-56609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56609">CVE-2024-56609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235389">SUSE bug 1235389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56610</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56610" ref_url="https://www.suse.com/security/cve/CVE-2024-56610" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kcsan: Turn report_filterlist_lock into a raw_spinlock

Ran Xiaokai reports that with a KCSAN-enabled PREEMPT_RT kernel, we can see
splats like:

| BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
| in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1
| preempt_count: 10002, expected: 0
| RCU nest depth: 0, expected: 0
| no locks held by swapper/1/0.
| irq event stamp: 156674
| hardirqs last  enabled at (156673): [&lt;ffffffff81130bd9&gt;] do_idle+0x1f9/0x240
| hardirqs last disabled at (156674): [&lt;ffffffff82254f84&gt;] sysvec_apic_timer_interrupt+0x14/0xc0
| softirqs last  enabled at (0): [&lt;ffffffff81099f47&gt;] copy_process+0xfc7/0x4b60
| softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
| Preemption disabled at:
| [&lt;ffffffff814a3e2a&gt;] paint_ptr+0x2a/0x90
| CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.11.0+ #3
| Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-0-ga698c8995f-prebuilt.qemu.org 04/01/2014
| Call Trace:
|  &lt;IRQ&gt;
|  dump_stack_lvl+0x7e/0xc0
|  dump_stack+0x1d/0x30
|  __might_resched+0x1a2/0x270
|  rt_spin_lock+0x68/0x170
|  kcsan_skip_report_debugfs+0x43/0xe0
|  print_report+0xb5/0x590
|  kcsan_report_known_origin+0x1b1/0x1d0
|  kcsan_setup_watchpoint+0x348/0x650
|  __tsan_unaligned_write1+0x16d/0x1d0
|  hrtimer_interrupt+0x3d6/0x430
|  __sysvec_apic_timer_interrupt+0xe8/0x3a0
|  sysvec_apic_timer_interrupt+0x97/0xc0
|  &lt;/IRQ&gt;

On a detected data race, KCSAN's reporting logic checks if it should
filter the report. That list is protected by the report_filterlist_lock
*non-raw* spinlock which may sleep on RT kernels.

Since KCSAN may report data races in any context, convert it to a
raw_spinlock.

This requires being careful about when to allocate memory for the filter
list itself which can be done via KCSAN's debugfs interface. Concurrent
modification of the filter list via debugfs should be rare: the chosen
strategy is to optimistically pre-allocate memory before the critical
section and discard if unused.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56610/">CVE-2024-56610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56610">CVE-2024-56610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235390">SUSE bug 1235390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56611</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56611" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56611" ref_url="https://www.suse.com/security/cve/CVE-2024-56611" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM

We currently assume that there is at least one VMA in a MM, which isn't
true.

So we might end up having find_vma() return NULL, to then de-reference
NULL.  So properly handle find_vma() returning NULL.

This fixes the report:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 UID: 0 PID: 6021 Comm: syz-executor284 Not tainted 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
RIP: 0010:migrate_to_node mm/mempolicy.c:1090 [inline]
RIP: 0010:do_migrate_pages+0x403/0x6f0 mm/mempolicy.c:1194
Code: ...
RSP: 0018:ffffc9000375fd08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffc9000375fd78 RCX: 0000000000000000
RDX: ffff88807e171300 RSI: dffffc0000000000 RDI: ffff88803390c044
RBP: ffff88807e171428 R08: 0000000000000014 R09: fffffbfff2039ef1
R10: ffffffff901cf78f R11: 0000000000000000 R12: 0000000000000003
R13: ffffc9000375fe90 R14: ffffc9000375fe98 R15: ffffc9000375fdf8
FS:  00005555919e1380(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555919e1ca8 CR3: 000000007f12a000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 kernel_migrate_pages+0x5b2/0x750 mm/mempolicy.c:1709
 __do_sys_migrate_pages mm/mempolicy.c:1727 [inline]
 __se_sys_migrate_pages mm/mempolicy.c:1723 [inline]
 __x64_sys_migrate_pages+0x96/0x100 mm/mempolicy.c:1723
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[akpm@linux-foundation.org: add unlikely()]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56611/">CVE-2024-56611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235391">SUSE bug 1235391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56612</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56612" ref_url="https://www.suse.com/security/cve/CVE-2024-56612" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/gup: handle NULL pages in unpin_user_pages()

The recent addition of "pofs" (pages or folios) handling to gup has a
flaw: it assumes that unpin_user_pages() handles NULL pages in the pages**
array.  That's not the case, as I discovered when I ran on a new
configuration on my test machine.

Fix this by skipping NULL pages in unpin_user_pages(), just like
unpin_folios() already does.

Details: when booting on x86 with "numa=fake=2 movablecore=4G" on Linux
6.12, and running this:

    tools/testing/selftests/mm/gup_longterm

...I get the following crash:

BUG: kernel NULL pointer dereference, address: 0000000000000008
RIP: 0010:sanity_check_pinned_pages+0x3a/0x2d0
...
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x66/0xb0
 ? page_fault_oops+0x30c/0x3b0
 ? do_user_addr_fault+0x6c3/0x720
 ? irqentry_enter+0x34/0x60
 ? exc_page_fault+0x68/0x100
 ? asm_exc_page_fault+0x22/0x30
 ? sanity_check_pinned_pages+0x3a/0x2d0
 unpin_user_pages+0x24/0xe0
 check_and_migrate_movable_pages_or_folios+0x455/0x4b0
 __gup_longterm_locked+0x3bf/0x820
 ? mmap_read_lock_killable+0x12/0x50
 ? __pfx_mmap_read_lock_killable+0x10/0x10
 pin_user_pages+0x66/0xa0
 gup_test_ioctl+0x358/0xb20
 __se_sys_ioctl+0x6b/0xc0
 do_syscall_64+0x7b/0x150
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56612/">CVE-2024-56612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56612">CVE-2024-56612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235388">SUSE bug 1235388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56614</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56614" ref_url="https://www.suse.com/security/cve/CVE-2024-56614" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: fix OOB map writes when deleting elements

Jordy says:

"
In the xsk_map_delete_elem function an unsigned integer
(map-&gt;max_entries) is compared with a user-controlled signed integer
(k). Due to implicit type conversion, a large unsigned value for
map-&gt;max_entries can bypass the intended bounds check:

	if (k &gt;= map-&gt;max_entries)
		return -EINVAL;

This allows k to hold a negative value (between -2147483648 and -2),
which is then used as an array index in m-&gt;xsk_map[k], which results
in an out-of-bounds access.

	spin_lock_bh(&amp;m-&gt;lock);
	map_entry = &amp;m-&gt;xsk_map[k]; // Out-of-bounds map_entry
	old_xs = unrcu_pointer(xchg(map_entry, NULL));  // Oob write
	if (old_xs)
		xsk_map_sock_delete(old_xs, map_entry);
	spin_unlock_bh(&amp;m-&gt;lock);

The xchg operation can then be used to cause an out-of-bounds write.
Moreover, the invalid map_entry passed to xsk_map_sock_delete can lead
to further memory corruption.
"

It indeed results in following splat:

[76612.897343] BUG: unable to handle page fault for address: ffffc8fc2e461108
[76612.904330] #PF: supervisor write access in kernel mode
[76612.909639] #PF: error_code(0x0002) - not-present page
[76612.914855] PGD 0 P4D 0
[76612.917431] Oops: Oops: 0002 [#1] PREEMPT SMP
[76612.921859] CPU: 11 UID: 0 PID: 10318 Comm: a.out Not tainted 6.12.0-rc1+ #470
[76612.929189] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[76612.939781] RIP: 0010:xsk_map_delete_elem+0x2d/0x60
[76612.944738] Code: 00 00 41 54 55 53 48 63 2e 3b 6f 24 73 38 4c 8d a7 f8 00 00 00 48 89 fb 4c 89 e7 e8 2d bf 05 00 48 8d b4 eb 00 01 00 00 31 ff &lt;48&gt; 87 3e 48 85 ff 74 05 e8 16 ff ff ff 4c 89 e7 e8 3e bc 05 00 31
[76612.963774] RSP: 0018:ffffc9002e407df8 EFLAGS: 00010246
[76612.969079] RAX: 0000000000000000 RBX: ffffc9002e461000 RCX: 0000000000000000
[76612.976323] RDX: 0000000000000001 RSI: ffffc8fc2e461108 RDI: 0000000000000000
[76612.983569] RBP: ffffffff80000001 R08: 0000000000000000 R09: 0000000000000007
[76612.990812] R10: ffffc9002e407e18 R11: ffff888108a38858 R12: ffffc9002e4610f8
[76612.998060] R13: ffff888108a38858 R14: 00007ffd1ae0ac78 R15: ffffc9002e4610c0
[76613.005303] FS:  00007f80b6f59740(0000) GS:ffff8897e0ec0000(0000) knlGS:0000000000000000
[76613.013517] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[76613.019349] CR2: ffffc8fc2e461108 CR3: 000000011e3ef001 CR4: 00000000007726f0
[76613.026595] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[76613.033841] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[76613.041086] PKRU: 55555554
[76613.043842] Call Trace:
[76613.046331]  &lt;TASK&gt;
[76613.048468]  ? __die+0x20/0x60
[76613.051581]  ? page_fault_oops+0x15a/0x450
[76613.055747]  ? search_extable+0x22/0x30
[76613.059649]  ? search_bpf_extables+0x5f/0x80
[76613.063988]  ? exc_page_fault+0xa9/0x140
[76613.067975]  ? asm_exc_page_fault+0x22/0x30
[76613.072229]  ? xsk_map_delete_elem+0x2d/0x60
[76613.076573]  ? xsk_map_delete_elem+0x23/0x60
[76613.080914]  __sys_bpf+0x19b7/0x23c0
[76613.084555]  __x64_sys_bpf+0x1a/0x20
[76613.088194]  do_syscall_64+0x37/0xb0
[76613.091832]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
[76613.096962] RIP: 0033:0x7f80b6d1e88d
[76613.100592] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 b5 0f 00 f7 d8 64 89 01 48
[76613.119631] RSP: 002b:00007ffd1ae0ac68 EFLAGS: 00000206 ORIG_RAX: 0000000000000141
[76613.131330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80b6d1e88d
[76613.142632] RDX: 0000000000000098 RSI: 00007ffd1ae0ad20 RDI: 0000000000000003
[76613.153967] RBP: 00007ffd1ae0adc0 R08: 0000000000000000 R09: 0000000000000000
[76613.166030] R10: 00007f80b6f77040 R11: 0000000000000206 R12: 00007ffd1ae0aed8
[76613.177130] R13: 000055ddf42ce1e9 R14: 000055ddf42d0d98 R15: 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56614/">CVE-2024-56614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235424">SUSE bug 1235424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56615</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56615" ref_url="https://www.suse.com/security/cve/CVE-2024-56615" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix OOB devmap writes when deleting elements

Jordy reported issue against XSKMAP which also applies to DEVMAP - the
index used for accessing map entry, due to being a signed integer,
causes the OOB writes. Fix is simple as changing the type from int to
u32, however, when compared to XSKMAP case, one more thing needs to be
addressed.

When map is released from system via dev_map_free(), we iterate through
all of the entries and an iterator variable is also an int, which
implies OOB accesses. Again, change it to be u32.

Example splat below:

[  160.724676] BUG: unable to handle page fault for address: ffffc8fc2c001000
[  160.731662] #PF: supervisor read access in kernel mode
[  160.736876] #PF: error_code(0x0000) - not-present page
[  160.742095] PGD 0 P4D 0
[  160.744678] Oops: Oops: 0000 [#1] PREEMPT SMP
[  160.749106] CPU: 1 UID: 0 PID: 520 Comm: kworker/u145:12 Not tainted 6.12.0-rc1+ #487
[  160.757050] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[  160.767642] Workqueue: events_unbound bpf_map_free_deferred
[  160.773308] RIP: 0010:dev_map_free+0x77/0x170
[  160.777735] Code: 00 e8 fd 91 ed ff e8 b8 73 ed ff 41 83 7d 18 19 74 6e 41 8b 45 24 49 8b bd f8 00 00 00 31 db 85 c0 74 48 48 63 c3 48 8d 04 c7 &lt;48&gt; 8b 28 48 85 ed 74 30 48 8b 7d 18 48 85 ff 74 05 e8 b3 52 fa ff
[  160.796777] RSP: 0018:ffffc9000ee1fe38 EFLAGS: 00010202
[  160.802086] RAX: ffffc8fc2c001000 RBX: 0000000080000000 RCX: 0000000000000024
[  160.809331] RDX: 0000000000000000 RSI: 0000000000000024 RDI: ffffc9002c001000
[  160.816576] RBP: 0000000000000000 R08: 0000000000000023 R09: 0000000000000001
[  160.823823] R10: 0000000000000001 R11: 00000000000ee6b2 R12: dead000000000122
[  160.831066] R13: ffff88810c928e00 R14: ffff8881002df405 R15: 0000000000000000
[  160.838310] FS:  0000000000000000(0000) GS:ffff8897e0c40000(0000) knlGS:0000000000000000
[  160.846528] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  160.852357] CR2: ffffc8fc2c001000 CR3: 0000000005c32006 CR4: 00000000007726f0
[  160.859604] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  160.866847] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  160.874092] PKRU: 55555554
[  160.876847] Call Trace:
[  160.879338]  &lt;TASK&gt;
[  160.881477]  ? __die+0x20/0x60
[  160.884586]  ? page_fault_oops+0x15a/0x450
[  160.888746]  ? search_extable+0x22/0x30
[  160.892647]  ? search_bpf_extables+0x5f/0x80
[  160.896988]  ? exc_page_fault+0xa9/0x140
[  160.900973]  ? asm_exc_page_fault+0x22/0x30
[  160.905232]  ? dev_map_free+0x77/0x170
[  160.909043]  ? dev_map_free+0x58/0x170
[  160.912857]  bpf_map_free_deferred+0x51/0x90
[  160.917196]  process_one_work+0x142/0x370
[  160.921272]  worker_thread+0x29e/0x3b0
[  160.925082]  ? rescuer_thread+0x4b0/0x4b0
[  160.929157]  kthread+0xd4/0x110
[  160.932355]  ? kthread_park+0x80/0x80
[  160.936079]  ret_from_fork+0x2d/0x50
[  160.943396]  ? kthread_park+0x80/0x80
[  160.950803]  ret_from_fork_asm+0x11/0x20
[  160.958482]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56615/">CVE-2024-56615 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56615">CVE-2024-56615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235426">SUSE bug 1235426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56616</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56616" ref_url="https://www.suse.com/security/cve/CVE-2024-56616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Fix MST sideband message body length check

Fix the MST sideband message body length check, which must be at least 1
byte accounting for the message body CRC (aka message data CRC) at the
end of the message.

This fixes a case where an MST branch device returns a header with a
correct header CRC (indicating a correctly received body length), with
the body length being incorrectly set to 0. This will later lead to a
memory corruption in drm_dp_sideband_append_payload() and the following
errors in dmesg:

   UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25
   index -1 is out of range for type 'u8 [48]'
   Call Trace:
    drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]
    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]
    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]

   memcpy: detected field-spanning write (size 18446744073709551615) of single field "&amp;msg-&gt;msg[msg-&gt;curlen]" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)
   Call Trace:
    drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]
    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]
    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56616/">CVE-2024-56616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235427">SUSE bug 1235427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56617</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56617" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56617" ref_url="https://www.suse.com/security/cve/CVE-2024-56617" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU

Commit

  5944ce092b97 ("arch_topology: Build cacheinfo from primary CPU")

adds functionality that architectures can use to optionally allocate and
build cacheinfo early during boot. Commit

  6539cffa9495 ("cacheinfo: Add arch specific early level initializer")

lets secondary CPUs correct (and reallocate memory) cacheinfo data if
needed.

If the early build functionality is not used and cacheinfo does not need
correction, memory for cacheinfo is never allocated. x86 does not use
the early build functionality. Consequently, during the cacheinfo CPU
hotplug callback, last_level_cache_is_valid() attempts to dereference
a NULL pointer:

  BUG: kernel NULL pointer dereference, address: 0000000000000100
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEPMT SMP NOPTI
  CPU: 0 PID 19 Comm: cpuhp/0 Not tainted 6.4.0-rc2 #1
  RIP: 0010: last_level_cache_is_valid+0x95/0xe0a

Allocate memory for cacheinfo during the cacheinfo CPU hotplug callback
if not done earlier.

Moreover, before determining the validity of the last-level cache info,
ensure that it has been allocated. Simply checking for non-zero
cache_leaves() is not sufficient, as some architectures (e.g., Intel
processors) have non-zero cache_leaves() before allocation.

Dereferencing NULL cacheinfo can occur in update_per_cpu_data_slice_size().
This function iterates over all online CPUs. However, a CPU may have come
online recently, but its cacheinfo may not have been allocated yet.

While here, remove an unnecessary indentation in allocate_cache_info().

  [ bp: Massage. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56617/">CVE-2024-56617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56617">CVE-2024-56617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235429">SUSE bug 1235429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56618</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56618" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56618" ref_url="https://www.suse.com/security/cve/CVE-2024-56618" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx: gpcv2: Adjust delay after power up handshake

The udelay(5) is not enough, sometimes below kernel panic
still be triggered:

[    4.012973] Kernel panic - not syncing: Asynchronous SError Interrupt
[    4.012976] CPU: 2 UID: 0 PID: 186 Comm: (udev-worker) Not tainted 6.12.0-rc2-0.0.0-devel-00004-g8b1b79e88956 #1
[    4.012982] Hardware name: Toradex Verdin iMX8M Plus WB on Dahlia Board (DT)
[    4.012985] Call trace:
[...]
[    4.013029]  arm64_serror_panic+0x64/0x70
[    4.013034]  do_serror+0x3c/0x70
[    4.013039]  el1h_64_error_handler+0x30/0x54
[    4.013046]  el1h_64_error+0x64/0x68
[    4.013050]  clk_imx8mp_audiomix_runtime_resume+0x38/0x48
[    4.013059]  __genpd_runtime_resume+0x30/0x80
[    4.013066]  genpd_runtime_resume+0x114/0x29c
[    4.013073]  __rpm_callback+0x48/0x1e0
[    4.013079]  rpm_callback+0x68/0x80
[    4.013084]  rpm_resume+0x3bc/0x6a0
[    4.013089]  __pm_runtime_resume+0x50/0x9c
[    4.013095]  pm_runtime_get_suppliers+0x60/0x8c
[    4.013101]  __driver_probe_device+0x4c/0x14c
[    4.013108]  driver_probe_device+0x3c/0x120
[    4.013114]  __driver_attach+0xc4/0x200
[    4.013119]  bus_for_each_dev+0x7c/0xe0
[    4.013125]  driver_attach+0x24/0x30
[    4.013130]  bus_add_driver+0x110/0x240
[    4.013135]  driver_register+0x68/0x124
[    4.013142]  __platform_driver_register+0x24/0x30
[    4.013149]  sdma_driver_init+0x20/0x1000 [imx_sdma]
[    4.013163]  do_one_initcall+0x60/0x1e0
[    4.013168]  do_init_module+0x5c/0x21c
[    4.013175]  load_module+0x1a98/0x205c
[    4.013181]  init_module_from_file+0x88/0xd4
[    4.013187]  __arm64_sys_finit_module+0x258/0x350
[    4.013194]  invoke_syscall.constprop.0+0x50/0xe0
[    4.013202]  do_el0_svc+0xa8/0xe0
[    4.013208]  el0_svc+0x3c/0x140
[    4.013215]  el0t_64_sync_handler+0x120/0x12c
[    4.013222]  el0t_64_sync+0x190/0x194
[    4.013228] SMP: stopping secondary CPUs

The correct way is to wait handshake, but it needs BUS clock of
BLK-CTL be enabled, which is in separate driver. So delay is the
only option here. The udelay(10) is a data got by experiment.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56618/">CVE-2024-56618 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56618">CVE-2024-56618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235465">SUSE bug 1235465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56619</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56619" ref_url="https://www.suse.com/security/cve/CVE-2024-56619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()

Syzbot reported that when searching for records in a directory where the
inode's i_size is corrupted and has a large value, memory access outside
the folio/page range may occur, or a use-after-free bug may be detected if
KASAN is enabled.

This is because nilfs_last_byte(), which is called by nilfs_find_entry()
and others to calculate the number of valid bytes of directory data in a
page from i_size and the page index, loses the upper 32 bits of the 64-bit
size information due to an inappropriate type of local variable to which
the i_size value is assigned.

This caused a large byte offset value due to underflow in the end address
calculation in the calling nilfs_find_entry(), resulting in memory access
that exceeds the folio/page size.

Fix this issue by changing the type of the local variable causing the bit
loss from "unsigned int" to "u64".  The return value of nilfs_last_byte()
is also of type "unsigned int", but it is truncated so as not to exceed
PAGE_SIZE and no bit loss occurs, so no change is required.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56619/">CVE-2024-56619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56619">CVE-2024-56619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235224">SUSE bug 1235224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235225">SUSE bug 1235225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56620</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56620" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56620" ref_url="https://www.suse.com/security/cve/CVE-2024-56620" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: qcom: Only free platform MSIs when ESI is enabled

Otherwise, it will result in a NULL pointer dereference as below:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
Call trace:
 mutex_lock+0xc/0x54
 platform_device_msi_free_irqs_all+0x14/0x20
 ufs_qcom_remove+0x34/0x48 [ufs_qcom]
 platform_remove+0x28/0x44
 device_remove+0x4c/0x80
 device_release_driver_internal+0xd8/0x178
 driver_detach+0x50/0x9c
 bus_remove_driver+0x6c/0xbc
 driver_unregister+0x30/0x60
 platform_driver_unregister+0x14/0x20
 ufs_qcom_pltform_exit+0x18/0xb94 [ufs_qcom]
 __arm64_sys_delete_module+0x180/0x260
 invoke_syscall+0x44/0x100
 el0_svc_common.constprop.0+0xc0/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x34/0xdc
 el0t_64_sync_handler+0xc0/0xc4
 el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56620/">CVE-2024-56620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56620">CVE-2024-56620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235227">SUSE bug 1235227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56621</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56621" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56621" ref_url="https://www.suse.com/security/cve/CVE-2024-56621" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Cancel RTC work during ufshcd_remove()

Currently, RTC work is only cancelled during __ufshcd_wl_suspend(). When
ufshcd is removed in ufshcd_remove(), RTC work is not cancelled. Due to
this, any further trigger of the RTC work after ufshcd_remove() would
result in a NULL pointer dereference as below:

Unable to handle kernel NULL pointer dereference at virtual address 00000000000002a4
Workqueue: events ufshcd_rtc_work
Call trace:
 _raw_spin_lock_irqsave+0x34/0x8c
 pm_runtime_get_if_active+0x24/0xb4
 ufshcd_rtc_work+0x124/0x19c
 process_scheduled_works+0x18c/0x2d8
 worker_thread+0x144/0x280
 kthread+0x11c/0x128
 ret_from_fork+0x10/0x20

Since RTC work accesses the ufshcd internal structures, it should be cancelled
when ufshcd is removed. So do that in ufshcd_remove(), as per the order in
ufshcd_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56621/">CVE-2024-56621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56621">CVE-2024-56621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235228">SUSE bug 1235228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56622</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56622" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56622" ref_url="https://www.suse.com/security/cve/CVE-2024-56622" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: sysfs: Prevent div by zero

Prevent a division by 0 when monitoring is not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56622/">CVE-2024-56622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56622">CVE-2024-56622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235251">SUSE bug 1235251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56623</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56623" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix use after free on unload

System crash is observed with stack trace warning of use after
free. There are 2 signals to tell dpc_thread to terminate (UNLOADING
flag and kthread_stop).

On setting the UNLOADING flag when dpc_thread happens to run at the time
and sees the flag, this causes dpc_thread to exit and clean up
itself. When kthread_stop is called for final cleanup, this causes use
after free.

Remove UNLOADING signal to terminate dpc_thread.  Use the kthread_stop
as the main signal to exit dpc_thread.

[596663.812935] kernel BUG at mm/slub.c:294!
[596663.812950] invalid opcode: 0000 [#1] SMP PTI
[596663.812957] CPU: 13 PID: 1475935 Comm: rmmod Kdump: loaded Tainted: G          IOE    --------- -  - 4.18.0-240.el8.x86_64 #1
[596663.812960] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 08/20/2012
[596663.812974] RIP: 0010:__slab_free+0x17d/0x360

...
[596663.813008] Call Trace:
[596663.813022]  ? __dentry_kill+0x121/0x170
[596663.813030]  ? _cond_resched+0x15/0x30
[596663.813034]  ? _cond_resched+0x15/0x30
[596663.813039]  ? wait_for_completion+0x35/0x190
[596663.813048]  ? try_to_wake_up+0x63/0x540
[596663.813055]  free_task+0x5a/0x60
[596663.813061]  kthread_stop+0xf3/0x100
[596663.813103]  qla2x00_remove_one+0x284/0x440 [qla2xxx]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235466">SUSE bug 1235466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235468">SUSE bug 1235468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56624</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56624" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56624" ref_url="https://www.suse.com/security/cve/CVE-2024-56624" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Fix out_fput in iommufd_fault_alloc()

As fput() calls the file-&gt;f_op-&gt;release op, where fault obj and ictx are
getting released, there is no need to release these two after fput() one
more time, which would result in imbalanced refcounts:
  refcount_t: decrement hit 0; leaking memory.
  WARNING: CPU: 48 PID: 2369 at lib/refcount.c:31 refcount_warn_saturate+0x60/0x230
  Call trace:
   refcount_warn_saturate+0x60/0x230 (P)
   refcount_warn_saturate+0x60/0x230 (L)
   iommufd_fault_fops_release+0x9c/0xe0 [iommufd]
  ...
  VFS: Close: file count is 0 (f_op=iommufd_fops [iommufd])
  WARNING: CPU: 48 PID: 2369 at fs/open.c:1507 filp_flush+0x3c/0xf0
  Call trace:
   filp_flush+0x3c/0xf0 (P)
   filp_flush+0x3c/0xf0 (L)
   __arm64_sys_close+0x34/0x98
  ...
  imbalanced put on file reference count
  WARNING: CPU: 48 PID: 2369 at fs/file.c:74 __file_ref_put+0x100/0x138
  Call trace:
   __file_ref_put+0x100/0x138 (P)
   __file_ref_put+0x100/0x138 (L)
   __fput_sync+0x4c/0xd0

Drop those two lines to fix the warnings above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56624/">CVE-2024-56624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56624">CVE-2024-56624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235469">SUSE bug 1235469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56625</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56625" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56625" ref_url="https://www.suse.com/security/cve/CVE-2024-56625" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: dev: can_set_termination(): allow sleeping GPIOs

In commit 6e86a1543c37 ("can: dev: provide optional GPIO based
termination support") GPIO based termination support was added.

For no particular reason that patch uses gpiod_set_value() to set the
GPIO. This leads to the following warning, if the systems uses a
sleeping GPIO, i.e. behind an I2C port expander:

| WARNING: CPU: 0 PID: 379 at /drivers/gpio/gpiolib.c:3496 gpiod_set_value+0x50/0x6c
| CPU: 0 UID: 0 PID: 379 Comm: ip Not tainted 6.11.0-20241016-1 #1 823affae360cc91126e4d316d7a614a8bf86236c

Replace gpiod_set_value() by gpiod_set_value_cansleep() to allow the
use of sleeping GPIOs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56625/">CVE-2024-56625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56625">CVE-2024-56625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235223">SUSE bug 1235223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56626</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56626" ref_url="https://www.suse.com/security/cve/CVE-2024-56626" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix Out-of-Bounds Write in ksmbd_vfs_stream_write

An offset from client could be a negative value, It could allows
to write data outside the bounds of the allocated buffer.
Note that this issue is coming when setting
'vfs objects = streams_xattr parameter' in ksmbd.conf.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56626/">CVE-2024-56626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56626">CVE-2024-56626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235234">SUSE bug 1235234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235235">SUSE bug 1235235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56627</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56627" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56627" ref_url="https://www.suse.com/security/cve/CVE-2024-56627" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix Out-of-Bounds Read in ksmbd_vfs_stream_read

An offset from client could be a negative value, It could lead
to an out-of-bounds read from the stream_buf.
Note that this issue is coming when setting
'vfs objects = streams_xattr parameter' in ksmbd.conf.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56627/">CVE-2024-56627 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56627">CVE-2024-56627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235232">SUSE bug 1235232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56628</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56628" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56628" ref_url="https://www.suse.com/security/cve/CVE-2024-56628" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LoongArch: Add architecture specific huge_pte_clear()

When executing mm selftests run_vmtests.sh, there is such an error:

 BUG: Bad page state in process uffd-unit-tests  pfn:00000
 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x0
 flags: 0xffff0000002000(reserved|node=0|zone=0|lastcpupid=0xffff)
 raw: 00ffff0000002000 ffffbf0000000008 ffffbf0000000008 0000000000000000
 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
 page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set
 Modules linked in: snd_seq_dummy snd_seq snd_seq_device rfkill vfat fat
    virtio_balloon efi_pstore virtio_net pstore net_failover failover fuse
    nfnetlink virtio_scsi virtio_gpu virtio_dma_buf dm_multipath efivarfs
 CPU: 2 UID: 0 PID: 1913 Comm: uffd-unit-tests Not tainted 6.12.0 #184
 Hardware name: QEMU QEMU Virtual Machine, BIOS unknown 2/2/2022
 Stack : 900000047c8ac000 0000000000000000 9000000000223a7c 900000047c8ac000
         900000047c8af690 900000047c8af698 0000000000000000 900000047c8af7d8
         900000047c8af7d0 900000047c8af7d0 900000047c8af5b0 0000000000000001
         0000000000000001 900000047c8af698 10b3c7d53da40d26 0000010000000000
         0000000000000022 0000000fffffffff fffffffffe000000 ffff800000000000
         000000000000002f 0000800000000000 000000017a6d4000 90000000028f8940
         0000000000000000 0000000000000000 90000000025aa5e0 9000000002905000
         0000000000000000 90000000028f8940 ffff800000000000 0000000000000000
         0000000000000000 0000000000000000 9000000000223a94 000000012001839c
         00000000000000b0 0000000000000004 0000000000000000 0000000000071c1d
         ...
 Call Trace:
 [&lt;9000000000223a94&gt;] show_stack+0x5c/0x180
 [&lt;9000000001c3fd64&gt;] dump_stack_lvl+0x6c/0xa0
 [&lt;900000000056aa08&gt;] bad_page+0x1a0/0x1f0
 [&lt;9000000000574978&gt;] free_unref_folios+0xbf0/0xd20
 [&lt;90000000004e65cc&gt;] folios_put_refs+0x1a4/0x2b8
 [&lt;9000000000599a0c&gt;] free_pages_and_swap_cache+0x164/0x260
 [&lt;9000000000547698&gt;] tlb_batch_pages_flush+0xa8/0x1c0
 [&lt;9000000000547f30&gt;] tlb_finish_mmu+0xa8/0x218
 [&lt;9000000000543cb8&gt;] exit_mmap+0x1a0/0x360
 [&lt;9000000000247658&gt;] __mmput+0x78/0x200
 [&lt;900000000025583c&gt;] do_exit+0x43c/0xde8
 [&lt;9000000000256490&gt;] do_group_exit+0x68/0x110
 [&lt;9000000000256554&gt;] sys_exit_group+0x1c/0x20
 [&lt;9000000001c413b4&gt;] do_syscall+0x94/0x130
 [&lt;90000000002216d8&gt;] handle_syscall+0xb8/0x158
 Disabling lock debugging due to kernel taint
 BUG: non-zero pgtables_bytes on freeing mm: -16384

On LoongArch system, invalid huge pte entry should be invalid_pte_table
or a single _PAGE_HUGE bit rather than a zero value. And it should be
the same with invalid pmd entry, since pmd_none() is called by function
free_pgd_range() and pmd_none() return 0 by huge_pte_clear(). So single
_PAGE_HUGE bit is also treated as a valid pte table and free_pte_range()
will be called in free_pmd_range().

  free_pmd_range()
        pmd = pmd_offset(pud, addr);
        do {
                next = pmd_addr_end(addr, end);
                if (pmd_none_or_clear_bad(pmd))
                        continue;
                free_pte_range(tlb, pmd, addr);
        } while (pmd++, addr = next, addr != end);

Here invalid_pte_table is used for both invalid huge pte entry and
pmd entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56628/">CVE-2024-56628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56628">CVE-2024-56628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235471">SUSE bug 1235471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56629" ref_url="https://www.suse.com/security/cve/CVE-2024-56629" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: wacom: fix when get product name maybe null pointer

Due to incorrect dev-&gt;product reporting by certain devices, null
pointer dereferences occur when dev-&gt;product is empty, leading to
potential system crashes.

This issue was found on EXCELSIOR DL37-D05 device with
Loongson-LS3A6000-7A2000-DL37 motherboard.

Kernel logs:
[   56.470885] usb 4-3: new full-speed USB device number 4 using ohci-pci
[   56.671638] usb 4-3: string descriptor 0 read error: -22
[   56.671644] usb 4-3: New USB device found, idVendor=056a, idProduct=0374, bcdDevice= 1.07
[   56.671647] usb 4-3: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[   56.678839] hid-generic 0003:056A:0374.0004: hiddev0,hidraw3: USB HID v1.10 Device [HID 056a:0374] on usb-0000:00:05.0-3/input0
[   56.697719] CPU 2 Unable to handle kernel paging request at virtual address 0000000000000000, era == 90000000066e35c8, ra == ffff800004f98a80
[   56.697732] Oops[#1]:
[   56.697734] CPU: 2 PID: 2742 Comm: (udev-worker) Tainted: G           OE      6.6.0-loong64-desktop #25.00.2000.015
[   56.697737] Hardware name: Inspur CE520L2/C09901N000000000, BIOS 2.09.00 10/11/2024
[   56.697739] pc 90000000066e35c8 ra ffff800004f98a80 tp 9000000125478000 sp 900000012547b8a0
[   56.697741] a0 0000000000000000 a1 ffff800004818b28 a2 0000000000000000 a3 0000000000000000
[   56.697743] a4 900000012547b8f0 a5 0000000000000000 a6 0000000000000000 a7 0000000000000000
[   56.697745] t0 ffff800004818b2d t1 0000000000000000 t2 0000000000000003 t3 0000000000000005
[   56.697747] t4 0000000000000000 t5 0000000000000000 t6 0000000000000000 t7 0000000000000000
[   56.697748] t8 0000000000000000 u0 0000000000000000 s9 0000000000000000 s0 900000011aa48028
[   56.697750] s1 0000000000000000 s2 0000000000000000 s3 ffff800004818e80 s4 ffff800004810000
[   56.697751] s5 90000001000b98d0 s6 ffff800004811f88 s7 ffff800005470440 s8 0000000000000000
[   56.697753]    ra: ffff800004f98a80 wacom_update_name+0xe0/0x300 [wacom]
[   56.697802]   ERA: 90000000066e35c8 strstr+0x28/0x120
[   56.697806]  CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
[   56.697816]  PRMD: 0000000c (PPLV0 +PIE +PWE)
[   56.697821]  EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
[   56.697827]  ECFG: 00071c1d (LIE=0,2-4,10-12 VS=7)
[   56.697831] ESTAT: 00010000 [PIL] (IS= ECode=1 EsubCode=0)
[   56.697835]  BADV: 0000000000000000
[   56.697836]  PRID: 0014d000 (Loongson-64bit, Loongson-3A6000)
[   56.697838] Modules linked in: wacom(+) bnep bluetooth rfkill qrtr nls_iso8859_1 nls_cp437 snd_hda_codec_conexant snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hda_core snd_hwdep snd_pcm snd_timer snd soundcore input_leds mousedev led_class joydev deepin_netmonitor(OE) fuse nfnetlink dmi_sysfs ip_tables x_tables overlay amdgpu amdxcp drm_exec gpu_sched drm_buddy radeon drm_suballoc_helper i2c_algo_bit drm_ttm_helper r8169 ttm drm_display_helper spi_loongson_pci xhci_pci cec xhci_pci_renesas spi_loongson_core hid_generic realtek gpio_loongson_64bit
[   56.697887] Process (udev-worker) (pid: 2742, threadinfo=00000000aee0d8b4, task=00000000a9eff1f3)
[   56.697890] Stack : 0000000000000000 ffff800004817e00 0000000000000000 0000251c00000000
[   56.697896]         0000000000000000 00000011fffffffd 0000000000000000 0000000000000000
[   56.697901]         0000000000000000 1b67a968695184b9 0000000000000000 90000001000b98d0
[   56.697906]         90000001000bb8d0 900000011aa48028 0000000000000000 ffff800004f9d74c
[   56.697911]         90000001000ba000 ffff800004f9ce58 0000000000000000 ffff800005470440
[   56.697916]         ffff800004811f88 90000001000b98d0 9000000100da2aa8 90000001000bb8d0
[   56.697921]         0000000000000000 90000001000ba000 900000011aa48028 ffff800004f9d74c
[   56.697926]         ffff8000054704e8 90000001000bb8b8 90000001000ba000 0000000000000000
[   56.697931]         90000001000bb8d0 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56629/">CVE-2024-56629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56629">CVE-2024-56629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235473">SUSE bug 1235473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56630</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56630" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56630" ref_url="https://www.suse.com/security/cve/CVE-2024-56630" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: free inode when ocfs2_get_init_inode() fails

syzbot is reporting busy inodes after unmount, for commit 9c89fe0af826
("ocfs2: Handle error from dquot_initialize()") forgot to call iput() when
new_inode() succeeded and dquot_initialize() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56630/">CVE-2024-56630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56630">CVE-2024-56630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235479">SUSE bug 1235479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56631" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Fix slab-use-after-free read in sg_release()

Fix a use-after-free bug in sg_release(), detected by syzbot with KASAN:

BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30
kernel/locking/lockdep.c:5838
__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912
sg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407

In sg_release(), the function kref_put(&amp;sfp-&gt;f_ref, sg_remove_sfp) is
called before releasing the open_rel_lock mutex. The kref_put() call may
decrement the reference count of sfp to zero, triggering its cleanup
through sg_remove_sfp(). This cleanup includes scheduling deferred work
via sg_remove_sfp_usercontext(), which ultimately frees sfp.

After kref_put(), sg_release() continues to unlock open_rel_lock and may
reference sfp or sdp. If sfp has already been freed, this results in a
slab-use-after-free error.

Move the kref_put(&amp;sfp-&gt;f_ref, sg_remove_sfp) call after unlocking the
open_rel_lock mutex. This ensures:

 - No references to sfp or sdp occur after the reference count is
   decremented.

 - Cleanup functions such as sg_remove_sfp() and
   sg_remove_sfp_usercontext() can safely execute without impacting the
   mutex handling in sg_release().

The fix has been tested and validated by syzbot. This patch closes the
bug reported at the following syzkaller link and ensures proper
sequencing of resource cleanup and mutex operations, eliminating the
risk of use-after-free errors in sg_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235480">SUSE bug 1235480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235482">SUSE bug 1235482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56632" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56632" ref_url="https://www.suse.com/security/cve/CVE-2024-56632" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix the memleak while create new ctrl failed

Now while we create new ctrl failed, we have not free the
tagset occupied by admin_q, here try to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56632/">CVE-2024-56632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56632">CVE-2024-56632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235483">SUSE bug 1235483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56633" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56633" ref_url="https://www.suse.com/security/cve/CVE-2024-56633" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg

The current sk memory accounting logic in __SK_REDIRECT is pre-uncharging
tosend bytes, which is either msg-&gt;sg.size or a smaller value apply_bytes.

Potential problems with this strategy are as follows:

- If the actual sent bytes are smaller than tosend, we need to charge some
  bytes back, as in line 487, which is okay but seems not clean.

- When tosend is set to apply_bytes, as in line 417, and (ret &lt; 0), we may
  miss uncharging (msg-&gt;sg.size - apply_bytes) bytes.

[...]
415 tosend = msg-&gt;sg.size;
416 if (psock-&gt;apply_bytes &amp;&amp; psock-&gt;apply_bytes &lt; tosend)
417   tosend = psock-&gt;apply_bytes;
[...]
443 sk_msg_return(sk, msg, tosend);
444 release_sock(sk);
446 origsize = msg-&gt;sg.size;
447 ret = tcp_bpf_sendmsg_redir(sk_redir, redir_ingress,
448                             msg, tosend, flags);
449 sent = origsize - msg-&gt;sg.size;
[...]
454 lock_sock(sk);
455 if (unlikely(ret &lt; 0)) {
456   int free = sk_msg_free_nocharge(sk, msg);
458   if (!cork)
459     *copied -= free;
460 }
[...]
487 if (eval == __SK_REDIRECT)
488   sk_mem_charge(sk, tosend - sent);
[...]

When running the selftest test_txmsg_redir_wait_sndmem with txmsg_apply,
the following warning will be reported:

------------[ cut here ]------------
WARNING: CPU: 6 PID: 57 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x190/0x1a0
Modules linked in:
CPU: 6 UID: 0 PID: 57 Comm: kworker/6:0 Not tainted 6.12.0-rc1.bm.1-amd64+ #43
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Workqueue: events sk_psock_destroy
RIP: 0010:inet_sock_destruct+0x190/0x1a0
RSP: 0018:ffffad0a8021fe08 EFLAGS: 00010206
RAX: 0000000000000011 RBX: ffff9aab4475b900 RCX: ffff9aab481a0800
RDX: 0000000000000303 RSI: 0000000000000011 RDI: ffff9aab4475b900
RBP: ffff9aab4475b990 R08: 0000000000000000 R09: ffff9aab40050ec0
R10: 0000000000000000 R11: ffff9aae6fdb1d01 R12: ffff9aab49c60400
R13: ffff9aab49c60598 R14: ffff9aab49c60598 R15: dead000000000100
FS:  0000000000000000(0000) GS:ffff9aae6fd80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffec7e47bd8 CR3: 00000001a1a1c004 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
&lt;TASK&gt;
? __warn+0x89/0x130
? inet_sock_destruct+0x190/0x1a0
? report_bug+0xfc/0x1e0
? handle_bug+0x5c/0xa0
? exc_invalid_op+0x17/0x70
? asm_exc_invalid_op+0x1a/0x20
? inet_sock_destruct+0x190/0x1a0
__sk_destruct+0x25/0x220
sk_psock_destroy+0x2b2/0x310
process_scheduled_works+0xa3/0x3e0
worker_thread+0x117/0x240
? __pfx_worker_thread+0x10/0x10
kthread+0xcf/0x100
? __pfx_kthread+0x10/0x10
ret_from_fork+0x31/0x40
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
&lt;/TASK&gt;
---[ end trace 0000000000000000 ]---

In __SK_REDIRECT, a more concise way is delaying the uncharging after sent
bytes are finalized, and uncharge this value. When (ret &lt; 0), we shall
invoke sk_msg_free.

Same thing happens in case __SK_DROP, when tosend is set to apply_bytes,
we may miss uncharging (msg-&gt;sg.size - apply_bytes) bytes. The same
warning will be reported in selftest.

[...]
468 case __SK_DROP:
469 default:
470 sk_msg_free_partial(sk, msg, tosend);
471 sk_msg_apply_bytes(psock, tosend);
472 *copied -= (tosend + delta);
473 return -EACCES;
[...]

So instead of sk_msg_free_partial we can do sk_msg_free here.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56633/">CVE-2024-56633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56633">CVE-2024-56633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235485">SUSE bug 1235485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56634" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56634" ref_url="https://www.suse.com/security/cve/CVE-2024-56634" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: grgpio: Add NULL check in grgpio_probe

devm_kasprintf() can return a NULL pointer on failure,but this
returned value in grgpio_probe is not checked.
Add NULL check in grgpio_probe, to handle kernel NULL
pointer dereference error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56634/">CVE-2024-56634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56634">CVE-2024-56634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235486">SUSE bug 1235486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56635" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56635" ref_url="https://www.suse.com/security/cve/CVE-2024-56635" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: avoid potential UAF in default_operstate()

syzbot reported an UAF in default_operstate() [1]

Issue is a race between device and netns dismantles.

After calling __rtnl_unlock() from netdev_run_todo(),
we can not assume the netns of each device is still alive.

Make sure the device is not in NETREG_UNREGISTERED state,
and add an ASSERT_RTNL() before the call to
__dev_get_by_index().

We might move this ASSERT_RTNL() in __dev_get_by_index()
in the future.

[1]

BUG: KASAN: slab-use-after-free in __dev_get_by_index+0x5d/0x110 net/core/dev.c:852
Read of size 8 at addr ffff888043eba1b0 by task syz.0.0/5339

CPU: 0 UID: 0 PID: 5339 Comm: syz.0.0 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:489
  kasan_report+0x143/0x180 mm/kasan/report.c:602
  __dev_get_by_index+0x5d/0x110 net/core/dev.c:852
  default_operstate net/core/link_watch.c:51 [inline]
  rfc2863_policy+0x224/0x300 net/core/link_watch.c:67
  linkwatch_do_dev+0x3e/0x170 net/core/link_watch.c:170
  netdev_run_todo+0x461/0x1000 net/core/dev.c:10894
  rtnl_unlock net/core/rtnetlink.c:152 [inline]
  rtnl_net_unlock include/linux/rtnetlink.h:133 [inline]
  rtnl_dellink+0x760/0x8d0 net/core/rtnetlink.c:3520
  rtnetlink_rcv_msg+0x791/0xcf0 net/core/rtnetlink.c:6911
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2541
  netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline]
  netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1347
  netlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1891
  sock_sendmsg_nosec net/socket.c:711 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:726
  ____sys_sendmsg+0x52a/0x7e0 net/socket.c:2583
  ___sys_sendmsg net/socket.c:2637 [inline]
  __sys_sendmsg+0x269/0x350 net/socket.c:2669
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2a3cb80809
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f2a3d9cd058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f2a3cd45fa0 RCX: 00007f2a3cb80809
RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000008
RBP: 00007f2a3cbf393e R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f2a3cd45fa0 R15: 00007ffd03bc65c8
 &lt;/TASK&gt;

Allocated by task 5339:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394
  kasan_kmalloc include/linux/kasan.h:260 [inline]
  __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4314
  kmalloc_noprof include/linux/slab.h:901 [inline]
  kmalloc_array_noprof include/linux/slab.h:945 [inline]
  netdev_create_hash net/core/dev.c:11870 [inline]
  netdev_init+0x10c/0x250 net/core/dev.c:11890
  ops_init+0x31e/0x590 net/core/net_namespace.c:138
  setup_net+0x287/0x9e0 net/core/net_namespace.c:362
  copy_net_ns+0x33f/0x570 net/core/net_namespace.c:500
  create_new_namespaces+0x425/0x7b0 kernel/nsproxy.c:110
  unshare_nsproxy_namespaces+0x124/0x180 kernel/nsproxy.c:228
  ksys_unshare+0x57d/0xa70 kernel/fork.c:3314
  __do_sys_unshare kernel/fork.c:3385 [inline]
  __se_sys_unshare kernel/fork.c:3383 [inline]
  __x64_sys_unshare+0x38/0x40 kernel/fork.c:3383
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x8
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56635/">CVE-2024-56635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56635">CVE-2024-56635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235519">SUSE bug 1235519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56636" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56636" ref_url="https://www.suse.com/security/cve/CVE-2024-56636" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

geneve: do not assume mac header is set in geneve_xmit_skb()

We should not assume mac header is set in output path.

Use skb_eth_hdr() instead of eth_hdr() to fix the issue.

sysbot reported the following :

 WARNING: CPU: 0 PID: 11635 at include/linux/skbuff.h:3052 skb_mac_header include/linux/skbuff.h:3052 [inline]
 WARNING: CPU: 0 PID: 11635 at include/linux/skbuff.h:3052 eth_hdr include/linux/if_ether.h:24 [inline]
 WARNING: CPU: 0 PID: 11635 at include/linux/skbuff.h:3052 geneve_xmit_skb drivers/net/geneve.c:898 [inline]
 WARNING: CPU: 0 PID: 11635 at include/linux/skbuff.h:3052 geneve_xmit+0x4c38/0x5730 drivers/net/geneve.c:1039
Modules linked in:
CPU: 0 UID: 0 PID: 11635 Comm: syz.4.1423 Not tainted 6.12.0-syzkaller-10296-gaaf20f870da0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_mac_header include/linux/skbuff.h:3052 [inline]
 RIP: 0010:eth_hdr include/linux/if_ether.h:24 [inline]
 RIP: 0010:geneve_xmit_skb drivers/net/geneve.c:898 [inline]
 RIP: 0010:geneve_xmit+0x4c38/0x5730 drivers/net/geneve.c:1039
Code: 21 c6 02 e9 35 d4 ff ff e8 a5 48 4c fb 90 0f 0b 90 e9 fd f5 ff ff e8 97 48 4c fb 90 0f 0b 90 e9 d8 f5 ff ff e8 89 48 4c fb 90 &lt;0f&gt; 0b 90 e9 41 e4 ff ff e8 7b 48 4c fb 90 0f 0b 90 e9 cd e7 ff ff
RSP: 0018:ffffc90003b2f870 EFLAGS: 00010283
RAX: 000000000000037a RBX: 000000000000ffff RCX: ffffc9000dc3d000
RDX: 0000000000080000 RSI: ffffffff86428417 RDI: 0000000000000003
RBP: ffffc90003b2f9f0 R08: 0000000000000003 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000002 R12: ffff88806603c000
R13: 0000000000000000 R14: ffff8880685b2780 R15: 0000000000000e23
FS:  00007fdc2deed6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b30a1dff8 CR3: 0000000056b8c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  __netdev_start_xmit include/linux/netdevice.h:5002 [inline]
  netdev_start_xmit include/linux/netdevice.h:5011 [inline]
  __dev_direct_xmit+0x58a/0x720 net/core/dev.c:4490
  dev_direct_xmit include/linux/netdevice.h:3181 [inline]
  packet_xmit+0x1e4/0x360 net/packet/af_packet.c:285
  packet_snd net/packet/af_packet.c:3146 [inline]
  packet_sendmsg+0x2700/0x5660 net/packet/af_packet.c:3178
  sock_sendmsg_nosec net/socket.c:711 [inline]
  __sock_sendmsg net/socket.c:726 [inline]
  __sys_sendto+0x488/0x4f0 net/socket.c:2197
  __do_sys_sendto net/socket.c:2204 [inline]
  __se_sys_sendto net/socket.c:2200 [inline]
  __x64_sys_sendto+0xe0/0x1c0 net/socket.c:2200
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56636/">CVE-2024-56636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56636">CVE-2024-56636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235520">SUSE bug 1235520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56637" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56637" ref_url="https://www.suse.com/security/cve/CVE-2024-56637" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Hold module reference while requesting a module

User space may unload ip_set.ko while it is itself requesting a set type
backend module, leading to a kernel crash. The race condition may be
provoked by inserting an mdelay() right after the nfnl_unlock() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56637/">CVE-2024-56637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56637">CVE-2024-56637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235523">SUSE bug 1235523</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56638" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56638" ref_url="https://www.suse.com/security/cve/CVE-2024-56638" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_inner: incorrect percpu area handling under softirq

Softirq can interrupt ongoing packet from process context that is
walking over the percpu area that contains inner header offsets.

Disable bh and perform three checks before restoring the percpu inner
header offsets to validate that the percpu area is valid for this
skbuff:

1) If the NFT_PKTINFO_INNER_FULL flag is set on, then this skbuff
   has already been parsed before for inner header fetching to
   register.

2) Validate that the percpu area refers to this skbuff using the
   skbuff pointer as a cookie. If there is a cookie mismatch, then
   this skbuff needs to be parsed again.

3) Finally, validate if the percpu area refers to this tunnel type.

Only after these three checks the percpu area is restored to a on-stack
copy and bh is enabled again.

After inner header fetching, the on-stack copy is stored back to the
percpu area.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56638/">CVE-2024-56638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56638">CVE-2024-56638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235524">SUSE bug 1235524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56639" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56639" ref_url="https://www.suse.com/security/cve/CVE-2024-56639" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hsr: must allocate more bytes for RedBox support

Blamed commit forgot to change hsr_init_skb() to allocate
larger skb for RedBox case.

Indeed, send_hsr_supervision_frame() will add
two additional components (struct hsr_sup_tlv
and struct hsr_sup_payload)

syzbot reported the following crash:
skbuff: skb_over_panic: text:ffffffff8afd4b0a len:34 put:6 head:ffff88802ad29e00 data:ffff88802ad29f22 tail:0x144 end:0x140 dev:gretap0
------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 2 UID: 0 PID: 7611 Comm: syz-executor Not tainted 6.12.0-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
 RIP: 0010:skb_panic+0x157/0x1d0 net/core/skbuff.c:206
Code: b6 04 01 84 c0 74 04 3c 03 7e 21 8b 4b 70 41 56 45 89 e8 48 c7 c7 a0 7d 9b 8c 41 57 56 48 89 ee 52 4c 89 e2 e8 9a 76 79 f8 90 &lt;0f&gt; 0b 4c 89 4c 24 10 48 89 54 24 08 48 89 34 24 e8 94 76 fb f8 4c
RSP: 0018:ffffc90000858ab8 EFLAGS: 00010282
RAX: 0000000000000087 RBX: ffff8880598c08c0 RCX: ffffffff816d3e69
RDX: 0000000000000000 RSI: ffffffff816de786 RDI: 0000000000000005
RBP: ffffffff8c9b91c0 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000302 R11: ffffffff961cc1d0 R12: ffffffff8afd4b0a
R13: 0000000000000006 R14: ffff88804b938130 R15: 0000000000000140
FS:  000055558a3d6500(0000) GS:ffff88806a800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1295974ff8 CR3: 000000002ab6e000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;IRQ&gt;
  skb_over_panic net/core/skbuff.c:211 [inline]
  skb_put+0x174/0x1b0 net/core/skbuff.c:2617
  send_hsr_supervision_frame+0x6fa/0x9e0 net/hsr/hsr_device.c:342
  hsr_proxy_announce+0x1a3/0x4a0 net/hsr/hsr_device.c:436
  call_timer_fn+0x1a0/0x610 kernel/time/timer.c:1794
  expire_timers kernel/time/timer.c:1845 [inline]
  __run_timers+0x6e8/0x930 kernel/time/timer.c:2419
  __run_timer_base kernel/time/timer.c:2430 [inline]
  __run_timer_base kernel/time/timer.c:2423 [inline]
  run_timer_base+0x111/0x190 kernel/time/timer.c:2439
  run_timer_softirq+0x1a/0x40 kernel/time/timer.c:2449
  handle_softirqs+0x213/0x8f0 kernel/softirq.c:554
  __do_softirq kernel/softirq.c:588 [inline]
  invoke_softirq kernel/softirq.c:428 [inline]
  __irq_exit_rcu kernel/softirq.c:637 [inline]
  irq_exit_rcu+0xbb/0x120 kernel/softirq.c:649
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
  sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56639/">CVE-2024-56639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56639">CVE-2024-56639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235525">SUSE bug 1235525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56640" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56640" ref_url="https://www.suse.com/security/cve/CVE-2024-56640" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix LGR and link use-after-free issue

We encountered a LGR/link use-after-free issue, which manifested as
the LGR/link refcnt reaching 0 early and entering the clear process,
making resource access unsafe.

 refcount_t: addition on 0; use-after-free.
 WARNING: CPU: 14 PID: 107447 at lib/refcount.c:25 refcount_warn_saturate+0x9c/0x140
 Workqueue: events smc_lgr_terminate_work [smc]
 Call trace:
  refcount_warn_saturate+0x9c/0x140
  __smc_lgr_terminate.part.45+0x2a8/0x370 [smc]
  smc_lgr_terminate_work+0x28/0x30 [smc]
  process_one_work+0x1b8/0x420
  worker_thread+0x158/0x510
  kthread+0x114/0x118

or

 refcount_t: underflow; use-after-free.
 WARNING: CPU: 6 PID: 93140 at lib/refcount.c:28 refcount_warn_saturate+0xf0/0x140
 Workqueue: smc_hs_wq smc_listen_work [smc]
 Call trace:
  refcount_warn_saturate+0xf0/0x140
  smcr_link_put+0x1cc/0x1d8 [smc]
  smc_conn_free+0x110/0x1b0 [smc]
  smc_conn_abort+0x50/0x60 [smc]
  smc_listen_find_device+0x75c/0x790 [smc]
  smc_listen_work+0x368/0x8a0 [smc]
  process_one_work+0x1b8/0x420
  worker_thread+0x158/0x510
  kthread+0x114/0x118

It is caused by repeated release of LGR/link refcnt. One suspect is that
smc_conn_free() is called repeatedly because some smc_conn_free() from
server listening path are not protected by sock lock.

e.g.

Calls under socklock        | smc_listen_work
-------------------------------------------------------
lock_sock(sk)               | smc_conn_abort
smc_conn_free               | \- smc_conn_free
\- smcr_link_put            |    \- smcr_link_put (duplicated)
release_sock(sk)

So here add sock lock protection in smc_listen_work() path, making it
exclusive with other connection operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56640/">CVE-2024-56640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56640">CVE-2024-56640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235436">SUSE bug 1235436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56641" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56641" ref_url="https://www.suse.com/security/cve/CVE-2024-56641" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: initialize close_work early to avoid warning

We encountered a warning that close_work was canceled before
initialization.

  WARNING: CPU: 7 PID: 111103 at kernel/workqueue.c:3047 __flush_work+0x19e/0x1b0
  Workqueue: events smc_lgr_terminate_work [smc]
  RIP: 0010:__flush_work+0x19e/0x1b0
  Call Trace:
   ? __wake_up_common+0x7a/0x190
   ? work_busy+0x80/0x80
   __cancel_work_timer+0xe3/0x160
   smc_close_cancel_work+0x1a/0x70 [smc]
   smc_close_active_abort+0x207/0x360 [smc]
   __smc_lgr_terminate.part.38+0xc8/0x180 [smc]
   process_one_work+0x19e/0x340
   worker_thread+0x30/0x370
   ? process_one_work+0x340/0x340
   kthread+0x117/0x130
   ? __kthread_cancel_work+0x50/0x50
   ret_from_fork+0x22/0x30

This is because when smc_close_cancel_work is triggered, e.g. the RDMA
driver is rmmod and the LGR is terminated, the conn-&gt;close_work is
flushed before initialization, resulting in WARN_ON(!work-&gt;func).

__smc_lgr_terminate             | smc_connect_{rdma|ism}
-------------------------------------------------------------
                                | smc_conn_create
				| \- smc_lgr_register_conn
for conn in lgr-&gt;conns_all      |
\- smc_conn_kill                |
   \- smc_close_active_abort    |
      \- smc_close_cancel_work  |
         \- cancel_work_sync    |
            \- __flush_work     |
	         (close_work)   |
	                        | smc_close_init
	                        | \- INIT_WORK(&amp;close_work)

So fix this by initializing close_work before establishing the
connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56641/">CVE-2024-56641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56641">CVE-2024-56641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235526">SUSE bug 1235526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free of kernel socket in cleanup_bearer().

syzkaller reported a use-after-free of UDP kernel socket
in cleanup_bearer() without repro. [0][1]

When bearer_disable() calls tipc_udp_disable(), cleanup
of the UDP kernel socket is deferred by work calling
cleanup_bearer().

tipc_net_stop() waits for such works to finish by checking
tipc_net(net)-&gt;wq_count.  However, the work decrements the
count too early before releasing the kernel socket,
unblocking cleanup_net() and resulting in use-after-free.

Let's move the decrement after releasing the socket in
cleanup_bearer().

[0]:
ref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at
     sk_alloc+0x438/0x608
     inet_create+0x4c8/0xcb0
     __sock_create+0x350/0x6b8
     sock_create_kern+0x58/0x78
     udp_sock_create4+0x68/0x398
     udp_sock_create+0x88/0xc8
     tipc_udp_enable+0x5e8/0x848
     __tipc_nl_bearer_enable+0x84c/0xed8
     tipc_nl_bearer_enable+0x38/0x60
     genl_family_rcv_msg_doit+0x170/0x248
     genl_rcv_msg+0x400/0x5b0
     netlink_rcv_skb+0x1dc/0x398
     genl_rcv+0x44/0x68
     netlink_unicast+0x678/0x8b0
     netlink_sendmsg+0x5e4/0x898
     ____sys_sendmsg+0x500/0x830

[1]:
BUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]
BUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
 udp_hashslot include/net/udp.h:85 [inline]
 udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
 sk_common_release+0xaf/0x3f0 net/core/sock.c:3820
 inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437
 inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489
 __sock_release net/socket.c:658 [inline]
 sock_release+0xa0/0x210 net/socket.c:686
 cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
 kthread+0x531/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244

Uninit was created at:
 slab_free_hook mm/slub.c:2269 [inline]
 slab_free mm/slub.c:4580 [inline]
 kmem_cache_free+0x207/0xc40 mm/slub.c:4682
 net_free net/core/net_namespace.c:454 [inline]
 cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
 kthread+0x531/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244

CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: events cleanup_bearer
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235433">SUSE bug 1235433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235434">SUSE bug 1235434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56643" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56643" ref_url="https://www.suse.com/security/cve/CVE-2024-56643" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dccp: Fix memory leak in dccp_feat_change_recv

If dccp_feat_push_confirm() fails after new value for SP feature was accepted
without reconciliation ('entry == NULL' branch), memory allocated for that value
with dccp_feat_clone_sp_val() is never freed.

Here is the kmemleak stack for this:

unreferenced object 0xffff88801d4ab488 (size 8):
  comm "syz-executor310", pid 1127, jiffies 4295085598 (age 41.666s)
  hex dump (first 8 bytes):
    01 b4 4a 1d 80 88 ff ff                          ..J.....
  backtrace:
    [&lt;00000000db7cabfe&gt;] kmemdup+0x23/0x50 mm/util.c:128
    [&lt;0000000019b38405&gt;] kmemdup include/linux/string.h:465 [inline]
    [&lt;0000000019b38405&gt;] dccp_feat_clone_sp_val net/dccp/feat.c:371 [inline]
    [&lt;0000000019b38405&gt;] dccp_feat_clone_sp_val net/dccp/feat.c:367 [inline]
    [&lt;0000000019b38405&gt;] dccp_feat_change_recv net/dccp/feat.c:1145 [inline]
    [&lt;0000000019b38405&gt;] dccp_feat_parse_options+0x1196/0x2180 net/dccp/feat.c:1416
    [&lt;00000000b1f6d94a&gt;] dccp_parse_options+0xa2a/0x1260 net/dccp/options.c:125
    [&lt;0000000030d7b621&gt;] dccp_rcv_state_process+0x197/0x13d0 net/dccp/input.c:650
    [&lt;000000001f74c72e&gt;] dccp_v4_do_rcv+0xf9/0x1a0 net/dccp/ipv4.c:688
    [&lt;00000000a6c24128&gt;] sk_backlog_rcv include/net/sock.h:1041 [inline]
    [&lt;00000000a6c24128&gt;] __release_sock+0x139/0x3b0 net/core/sock.c:2570
    [&lt;00000000cf1f3a53&gt;] release_sock+0x54/0x1b0 net/core/sock.c:3111
    [&lt;000000008422fa23&gt;] inet_wait_for_connect net/ipv4/af_inet.c:603 [inline]
    [&lt;000000008422fa23&gt;] __inet_stream_connect+0x5d0/0xf70 net/ipv4/af_inet.c:696
    [&lt;0000000015b6f64d&gt;] inet_stream_connect+0x53/0xa0 net/ipv4/af_inet.c:735
    [&lt;0000000010122488&gt;] __sys_connect_file+0x15c/0x1a0 net/socket.c:1865
    [&lt;00000000b4b70023&gt;] __sys_connect+0x165/0x1a0 net/socket.c:1882
    [&lt;00000000f4cb3815&gt;] __do_sys_connect net/socket.c:1892 [inline]
    [&lt;00000000f4cb3815&gt;] __se_sys_connect net/socket.c:1889 [inline]
    [&lt;00000000f4cb3815&gt;] __x64_sys_connect+0x6e/0xb0 net/socket.c:1889
    [&lt;00000000e7b1e839&gt;] do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
    [&lt;0000000055e91434&gt;] entry_SYSCALL_64_after_hwframe+0x67/0xd1

Clean up the allocated memory in case of dccp_feat_push_confirm() failure
and bail out with an error reset code.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56643/">CVE-2024-56643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56643">CVE-2024-56643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235132">SUSE bug 1235132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56644" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56644" ref_url="https://www.suse.com/security/cve/CVE-2024-56644" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: release expired exception dst cached in socket

Dst objects get leaked in ip6_negative_advice() when this function is
executed for an expired IPv6 route located in the exception table. There
are several conditions that must be fulfilled for the leak to occur:
* an ICMPv6 packet indicating a change of the MTU for the path is received,
  resulting in an exception dst being created
* a TCP connection that uses the exception dst for routing packets must
  start timing out so that TCP begins retransmissions
* after the exception dst expires, the FIB6 garbage collector must not run
  before TCP executes ip6_negative_advice() for the expired exception dst

When TCP executes ip6_negative_advice() for an exception dst that has
expired and if no other socket holds a reference to the exception dst, the
refcount of the exception dst is 2, which corresponds to the increment
made by dst_init() and the increment made by the TCP socket for which the
connection is timing out. The refcount made by the socket is never
released. The refcount of the dst is decremented in sk_dst_reset() but
that decrement is counteracted by a dst_hold() intentionally placed just
before the sk_dst_reset() in ip6_negative_advice(). After
ip6_negative_advice() has finished, there is no other object tied to the
dst. The socket lost its reference stored in sk_dst_cache and the dst is
no longer in the exception table. The exception dst becomes a leaked
object.

As a result of this dst leak, an unbalanced refcount is reported for the
loopback device of a net namespace being destroyed under kernels that do
not contain e5f80fcf869a ("ipv6: give an IPv6 dev to blackhole_netdev"):
unregister_netdevice: waiting for lo to become free. Usage count = 2

Fix the dst leak by removing the dst_hold() in ip6_negative_advice(). The
patch that introduced the dst_hold() in ip6_negative_advice() was
92f1655aa2b22 ("net: fix __dst_negative_advice() race"). But 92f1655aa2b22
merely refactored the code with regards to the dst refcount so the issue
was present even before 92f1655aa2b22. The bug was introduced in
54c1a859efd9f ("ipv6: Don't drop cache route entry unless timer actually
expired.") where the expired cached route is deleted and the sk_dst_cache
member of the socket is set to NULL by calling dst_negative_advice() but
the refcount belonging to the socket is left unbalanced.

The IPv4 version - ipv4_negative_advice() - is not affected by this bug.
When the TCP connection times out ipv4_negative_advice() merely resets the
sk_dst_cache of the socket while decrementing the refcount of the
exception dst.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56644/">CVE-2024-56644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235133">SUSE bug 1235133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56645" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_session_new(): fix skb reference counting

Since j1939_session_skb_queue() does an extra skb_get() for each new
skb, do the same for the initial one in j1939_session_new() to avoid
refcount underflow.

[mkl: clean up commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235134">SUSE bug 1235134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235135">SUSE bug 1235135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56646" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56646" ref_url="https://www.suse.com/security/cve/CVE-2024-56646" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: avoid possible NULL deref in modify_prefix_route()

syzbot found a NULL deref [1] in modify_prefix_route(), caused by one
fib6_info without a fib6_table pointer set.

This can happen for net-&gt;ipv6.fib6_null_entry

[1]
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 1 UID: 0 PID: 5837 Comm: syz-executor888 Not tainted 6.12.0-syzkaller-09567-g7eef7e306d3c #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:__lock_acquire+0xe4/0x3c40 kernel/locking/lockdep.c:5089
Code: 08 84 d2 0f 85 15 14 00 00 44 8b 0d ca 98 f5 0e 45 85 c9 0f 84 b4 0e 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 e2 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 96 2c 00 00 49 8b 04 24 48 3d a0 07 7f 93 0f 84
RSP: 0018:ffffc900035d7268 EFLAGS: 00010006
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000006 RSI: 1ffff920006bae5f RDI: 0000000000000030
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff90608e17 R11: 0000000000000001 R12: 0000000000000030
R13: ffff888036334880 R14: 0000000000000000 R15: 0000000000000000
FS:  0000555579e90380(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffc59cc4278 CR3: 0000000072b54000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5849
  __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
  _raw_spin_lock_bh+0x33/0x40 kernel/locking/spinlock.c:178
  spin_lock_bh include/linux/spinlock.h:356 [inline]
  modify_prefix_route+0x30b/0x8b0 net/ipv6/addrconf.c:4831
  inet6_addr_modify net/ipv6/addrconf.c:4923 [inline]
  inet6_rtm_newaddr+0x12c7/0x1ab0 net/ipv6/addrconf.c:5055
  rtnetlink_rcv_msg+0x3c7/0xea0 net/core/rtnetlink.c:6920
  netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2541
  netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline]
  netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1347
  netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1891
  sock_sendmsg_nosec net/socket.c:711 [inline]
  __sock_sendmsg net/socket.c:726 [inline]
  ____sys_sendmsg+0xaaf/0xc90 net/socket.c:2583
  ___sys_sendmsg+0x135/0x1e0 net/socket.c:2637
  __sys_sendmsg+0x16e/0x220 net/socket.c:2669
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fd1dcef8b79
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc59cc4378 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd1dcef8b79
RDX: 0000000000040040 RSI: 0000000020000140 RDI: 0000000000000004
RBP: 00000000000113fd R08: 0000000000000006 R09: 0000000000000006
R10: 0000000000000006 R11: 0000000000000246 R12: 00007ffc59cc438c
R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56646/">CVE-2024-56646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56646">CVE-2024-56646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235131">SUSE bug 1235131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56647" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56647" ref_url="https://www.suse.com/security/cve/CVE-2024-56647" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix icmp host relookup triggering ip_rt_bug

arp link failure may trigger ip_rt_bug while xfrm enabled, call trace is:

WARNING: CPU: 0 PID: 0 at net/ipv4/route.c:1241 ip_rt_bug+0x14/0x20
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:ip_rt_bug+0x14/0x20
Call Trace:
 &lt;IRQ&gt;
 ip_send_skb+0x14/0x40
 __icmp_send+0x42d/0x6a0
 ipv4_link_failure+0xe2/0x1d0
 arp_error_report+0x3c/0x50
 neigh_invalidate+0x8d/0x100
 neigh_timer_handler+0x2e1/0x330
 call_timer_fn+0x21/0x120
 __run_timer_base.part.0+0x1c9/0x270
 run_timer_softirq+0x4c/0x80
 handle_softirqs+0xac/0x280
 irq_exit_rcu+0x62/0x80
 sysvec_apic_timer_interrupt+0x77/0x90

The script below reproduces this scenario:
ip xfrm policy add src 0.0.0.0/0 dst 0.0.0.0/0 \
	dir out priority 0 ptype main flag localok icmp
ip l a veth1 type veth
ip a a 192.168.141.111/24 dev veth0
ip l s veth0 up
ping 192.168.141.155 -c 1

icmp_route_lookup() create input routes for locally generated packets
while xfrm relookup ICMP traffic.Then it will set input route
(dst-&gt;out = ip_rt_bug) to skb for DESTUNREACH.

For ICMP err triggered by locally generated packets, dst-&gt;dev of output
route is loopback. Generally, xfrm relookup verification is not required
on loopback interfaces (net.ipv4.conf.lo.disable_xfrm = 1).

Skip icmp relookup for locally generated packets to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56647/">CVE-2024-56647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235435">SUSE bug 1235435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56648" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56648" ref_url="https://www.suse.com/security/cve/CVE-2024-56648" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hsr: avoid potential out-of-bound access in fill_frame_info()

syzbot is able to feed a packet with 14 bytes, pretending
it is a vlan one.

Since fill_frame_info() is relying on skb-&gt;mac_len already,
extend the check to cover this case.

BUG: KMSAN: uninit-value in fill_frame_info net/hsr/hsr_forward.c:709 [inline]
 BUG: KMSAN: uninit-value in hsr_forward_skb+0x9ee/0x3b10 net/hsr/hsr_forward.c:724
  fill_frame_info net/hsr/hsr_forward.c:709 [inline]
  hsr_forward_skb+0x9ee/0x3b10 net/hsr/hsr_forward.c:724
  hsr_dev_xmit+0x2f0/0x350 net/hsr/hsr_device.c:235
  __netdev_start_xmit include/linux/netdevice.h:5002 [inline]
  netdev_start_xmit include/linux/netdevice.h:5011 [inline]
  xmit_one net/core/dev.c:3590 [inline]
  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3606
  __dev_queue_xmit+0x366a/0x57d0 net/core/dev.c:4434
  dev_queue_xmit include/linux/netdevice.h:3168 [inline]
  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276
  packet_snd net/packet/af_packet.c:3146 [inline]
  packet_sendmsg+0x91ae/0xa6f0 net/packet/af_packet.c:3178
  sock_sendmsg_nosec net/socket.c:711 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:726
  __sys_sendto+0x594/0x750 net/socket.c:2197
  __do_sys_sendto net/socket.c:2204 [inline]
  __se_sys_sendto net/socket.c:2200 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2200
  x64_sys_call+0x346a/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:45
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4091 [inline]
  slab_alloc_node mm/slub.c:4134 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1323 [inline]
  alloc_skb_with_frags+0xc8/0xd00 net/core/skbuff.c:6612
  sock_alloc_send_pskb+0xa81/0xbf0 net/core/sock.c:2881
  packet_alloc_skb net/packet/af_packet.c:2995 [inline]
  packet_snd net/packet/af_packet.c:3089 [inline]
  packet_sendmsg+0x74c6/0xa6f0 net/packet/af_packet.c:3178
  sock_sendmsg_nosec net/socket.c:711 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:726
  __sys_sendto+0x594/0x750 net/socket.c:2197
  __do_sys_sendto net/socket.c:2204 [inline]
  __se_sys_sendto net/socket.c:2200 [inline]
  __x64_sys_sendto+0x125/0x1d0 net/socket.c:2200
  x64_sys_call+0x346a/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:45
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56648/">CVE-2024-56648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56648">CVE-2024-56648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235451">SUSE bug 1235451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235452">SUSE bug 1235452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56649" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56649" ref_url="https://www.suse.com/security/cve/CVE-2024-56649" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: Do not configure preemptible TCs if SIs do not support

Both ENETC PF and VF drivers share enetc_setup_tc_mqprio() to configure
MQPRIO. And enetc_setup_tc_mqprio() calls enetc_change_preemptible_tcs()
to configure preemptible TCs. However, only PF is able to configure
preemptible TCs. Because only PF has related registers, while VF does not
have these registers. So for VF, its hw-&gt;port pointer is NULL. Therefore,
VF will access an invalid pointer when accessing a non-existent register,
which will cause a crash issue. The simplified log is as follows.

root@ls1028ardb:~# tc qdisc add dev eno0vf0 parent root handle 100: \
mqprio num_tc 4 map 0 0 1 1 2 2 3 3 queues 1@0 1@1 1@2 1@3 hw 1
[  187.290775] Unable to handle kernel paging request at virtual address 0000000000001f00
[  187.424831] pc : enetc_mm_commit_preemptible_tcs+0x1c4/0x400
[  187.430518] lr : enetc_mm_commit_preemptible_tcs+0x30c/0x400
[  187.511140] Call trace:
[  187.513588]  enetc_mm_commit_preemptible_tcs+0x1c4/0x400
[  187.518918]  enetc_setup_tc_mqprio+0x180/0x214
[  187.523374]  enetc_vf_setup_tc+0x1c/0x30
[  187.527306]  mqprio_enable_offload+0x144/0x178
[  187.531766]  mqprio_init+0x3ec/0x668
[  187.535351]  qdisc_create+0x15c/0x488
[  187.539023]  tc_modify_qdisc+0x398/0x73c
[  187.542958]  rtnetlink_rcv_msg+0x128/0x378
[  187.547064]  netlink_rcv_skb+0x60/0x130
[  187.550910]  rtnetlink_rcv+0x18/0x24
[  187.554492]  netlink_unicast+0x300/0x36c
[  187.558425]  netlink_sendmsg+0x1a8/0x420
[  187.606759] ---[ end trace 0000000000000000 ]---

In addition, some PFs also do not support configuring preemptible TCs,
such as eno1 and eno3 on LS1028A. It won't crash like it does for VFs,
but we should prevent these PFs from accessing these unimplemented
registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56649/">CVE-2024-56649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56649">CVE-2024-56649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235449">SUSE bug 1235449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56650" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56650" ref_url="https://www.suse.com/security/cve/CVE-2024-56650" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: fix LED ID check in led_tg_check()

Syzbot has reported the following BUG detected by KASAN:

BUG: KASAN: slab-out-of-bounds in strlen+0x58/0x70
Read of size 1 at addr ffff8881022da0c8 by task repro/5879
...
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x241/0x360
 ? __pfx_dump_stack_lvl+0x10/0x10
 ? __pfx__printk+0x10/0x10
 ? _printk+0xd5/0x120
 ? __virt_addr_valid+0x183/0x530
 ? __virt_addr_valid+0x183/0x530
 print_report+0x169/0x550
 ? __virt_addr_valid+0x183/0x530
 ? __virt_addr_valid+0x183/0x530
 ? __virt_addr_valid+0x45f/0x530
 ? __phys_addr+0xba/0x170
 ? strlen+0x58/0x70
 kasan_report+0x143/0x180
 ? strlen+0x58/0x70
 strlen+0x58/0x70
 kstrdup+0x20/0x80
 led_tg_check+0x18b/0x3c0
 xt_check_target+0x3bb/0xa40
 ? __pfx_xt_check_target+0x10/0x10
 ? stack_depot_save_flags+0x6e4/0x830
 ? nft_target_init+0x174/0xc30
 nft_target_init+0x82d/0xc30
 ? __pfx_nft_target_init+0x10/0x10
 ? nf_tables_newrule+0x1609/0x2980
 ? nf_tables_newrule+0x1609/0x2980
 ? rcu_is_watching+0x15/0xb0
 ? nf_tables_newrule+0x1609/0x2980
 ? nf_tables_newrule+0x1609/0x2980
 ? __kmalloc_noprof+0x21a/0x400
 nf_tables_newrule+0x1860/0x2980
 ? __pfx_nf_tables_newrule+0x10/0x10
 ? __nla_parse+0x40/0x60
 nfnetlink_rcv+0x14e5/0x2ab0
 ? __pfx_validate_chain+0x10/0x10
 ? __pfx_nfnetlink_rcv+0x10/0x10
 ? __lock_acquire+0x1384/0x2050
 ? netlink_deliver_tap+0x2e/0x1b0
 ? __pfx_lock_release+0x10/0x10
 ? netlink_deliver_tap+0x2e/0x1b0
 netlink_unicast+0x7f8/0x990
 ? __pfx_netlink_unicast+0x10/0x10
 ? __virt_addr_valid+0x183/0x530
 ? __check_object_size+0x48e/0x900
 netlink_sendmsg+0x8e4/0xcb0
 ? __pfx_netlink_sendmsg+0x10/0x10
 ? aa_sock_msg_perm+0x91/0x160
 ? __pfx_netlink_sendmsg+0x10/0x10
 __sock_sendmsg+0x223/0x270
 ____sys_sendmsg+0x52a/0x7e0
 ? __pfx_____sys_sendmsg+0x10/0x10
 __sys_sendmsg+0x292/0x380
 ? __pfx___sys_sendmsg+0x10/0x10
 ? lockdep_hardirqs_on_prepare+0x43d/0x780
 ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
 ? exc_page_fault+0x590/0x8c0
 ? do_syscall_64+0xb6/0x230
 do_syscall_64+0xf3/0x230
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
 &lt;/TASK&gt;

Since an invalid (without '\0' byte at all) byte sequence may be passed
from userspace, add an extra check to ensure that such a sequence is
rejected as possible ID and so never passed to 'kstrdup()' and further.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56650/">CVE-2024-56650 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56650">CVE-2024-56650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235430">SUSE bug 1235430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235431">SUSE bug 1235431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56651" ref_url="https://www.suse.com/security/cve/CVE-2024-56651" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: hi3110_can_ist(): fix potential use-after-free

The commit a22bd630cfff ("can: hi311x: do not report txerr and rxerr
during bus-off") removed the reporting of rxerr and txerr even in case
of correct operation (i. e. not bus-off).

The error count information added to the CAN frame after netif_rx() is
a potential use after free, since there is no guarantee that the skb
is in the same state. It might be freed or reused.

Fix the issue by postponing the netif_rx() call in case of txerr and
rxerr reporting.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56651/">CVE-2024-56651 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56651">CVE-2024-56651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235528">SUSE bug 1235528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236570">SUSE bug 1236570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56652" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56652" ref_url="https://www.suse.com/security/cve/CVE-2024-56652" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/reg_sr: Remove register pool

That pool implementation doesn't really work: if the krealloc happens to
move the memory and return another address, the entries in the xarray
become invalid, leading to use-after-free later:

	BUG: KASAN: slab-use-after-free in xe_reg_sr_apply_mmio+0x570/0x760 [xe]
	Read of size 4 at addr ffff8881244b2590 by task modprobe/2753

	Allocated by task 2753:
	 kasan_save_stack+0x39/0x70
	 kasan_save_track+0x14/0x40
	 kasan_save_alloc_info+0x37/0x60
	 __kasan_kmalloc+0xc3/0xd0
	 __kmalloc_node_track_caller_noprof+0x200/0x6d0
	 krealloc_noprof+0x229/0x380

Simplify the code to fix the bug. A better pooling strategy may be added
back later if needed.

(cherry picked from commit e5283bd4dfecbd3335f43b62a68e24dae23f59e4)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56652/">CVE-2024-56652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56652">CVE-2024-56652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235529">SUSE bug 1235529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56653" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56653" ref_url="https://www.suse.com/security/cve/CVE-2024-56653" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btmtk: avoid UAF in btmtk_process_coredump

hci_devcd_append may lead to the release of the skb, so it cannot be
accessed once it is called.

==================================================================
BUG: KASAN: slab-use-after-free in btmtk_process_coredump+0x2a7/0x2d0 [btmtk]
Read of size 4 at addr ffff888033cfabb0 by task kworker/0:3/82

CPU: 0 PID: 82 Comm: kworker/0:3 Tainted: G     U             6.6.40-lockdep-03464-g1d8b4eb3060e #1 b0b3c1cc0c842735643fb411799d97921d1f688c
Hardware name: Google Yaviks_Ufs/Yaviks_Ufs, BIOS Google_Yaviks_Ufs.15217.552.0 05/07/2024
Workqueue: events btusb_rx_work [btusb]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xfd/0x150
 print_report+0x131/0x780
 kasan_report+0x177/0x1c0
 btmtk_process_coredump+0x2a7/0x2d0 [btmtk 03edd567dd71a65958807c95a65db31d433e1d01]
 btusb_recv_acl_mtk+0x11c/0x1a0 [btusb 675430d1e87c4f24d0c1f80efe600757a0f32bec]
 btusb_rx_work+0x9e/0xe0 [btusb 675430d1e87c4f24d0c1f80efe600757a0f32bec]
 worker_thread+0xe44/0x2cc0
 kthread+0x2ff/0x3a0
 ret_from_fork+0x51/0x80
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Allocated by task 82:
 stack_trace_save+0xdc/0x190
 kasan_set_track+0x4e/0x80
 __kasan_slab_alloc+0x4e/0x60
 kmem_cache_alloc+0x19f/0x360
 skb_clone+0x132/0xf70
 btusb_recv_acl_mtk+0x104/0x1a0 [btusb]
 btusb_rx_work+0x9e/0xe0 [btusb]
 worker_thread+0xe44/0x2cc0
 kthread+0x2ff/0x3a0
 ret_from_fork+0x51/0x80
 ret_from_fork_asm+0x1b/0x30

Freed by task 1733:
 stack_trace_save+0xdc/0x190
 kasan_set_track+0x4e/0x80
 kasan_save_free_info+0x28/0xb0
 ____kasan_slab_free+0xfd/0x170
 kmem_cache_free+0x183/0x3f0
 hci_devcd_rx+0x91a/0x2060 [bluetooth]
 worker_thread+0xe44/0x2cc0
 kthread+0x2ff/0x3a0
 ret_from_fork+0x51/0x80
 ret_from_fork_asm+0x1b/0x30

The buggy address belongs to the object at ffff888033cfab40
 which belongs to the cache skbuff_head_cache of size 232
The buggy address is located 112 bytes inside of
 freed 232-byte region [ffff888033cfab40, ffff888033cfac28)

The buggy address belongs to the physical page:
page:00000000a174ba93 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x33cfa
head:00000000a174ba93 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
anon flags: 0x4000000000000840(slab|head|zone=1)
page_type: 0xffffffff()
raw: 4000000000000840 ffff888100848a00 0000000000000000 0000000000000001
raw: 0000000000000000 0000000080190019 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888033cfaa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc
 ffff888033cfab00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
&gt;ffff888033cfab80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                     ^
 ffff888033cfac00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc
 ffff888033cfac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Check if we need to call hci_devcd_complete before calling
hci_devcd_append. That requires that we check data-&gt;cd_info.cnt &gt;=
MTK_COREDUMP_NUM instead of data-&gt;cd_info.cnt &gt; MTK_COREDUMP_NUM, as we
increment data-&gt;cd_info.cnt only once the call to hci_devcd_append
succeeds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56653/">CVE-2024-56653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235531">SUSE bug 1235531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56654" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56654" ref_url="https://www.suse.com/security/cve/CVE-2024-56654" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating

The usage of rcu_read_(un)lock while inside list_for_each_entry_rcu is
not safe since for the most part entries fetched this way shall be
treated as rcu_dereference:

	Note that the value returned by rcu_dereference() is valid
	only within the enclosing RCU read-side critical section [1]_.
	For example, the following is **not** legal::

		rcu_read_lock();
		p = rcu_dereference(head.next);
		rcu_read_unlock();
		x = p-&gt;address;	/* BUG!!! */
		rcu_read_lock();
		y = p-&gt;data;	/* BUG!!! */
		rcu_read_unlock();
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56654/">CVE-2024-56654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235532">SUSE bug 1235532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56655" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56655" ref_url="https://www.suse.com/security/cve/CVE-2024-56655" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not defer rule destruction via call_rcu

nf_tables_chain_destroy can sleep, it can't be used from call_rcu
callbacks.

Moreover, nf_tables_rule_release() is only safe for error unwinding,
while transaction mutex is held and the to-be-desroyed rule was not
exposed to either dataplane or dumps, as it deactives+frees without
the required synchronize_rcu() in-between.

nft_rule_expr_deactivate() callbacks will change -&gt;use counters
of other chains/sets, see e.g. nft_lookup .deactivate callback, these
must be serialized via transaction mutex.

Also add a few lockdep asserts to make this more explicit.

Calling synchronize_rcu() isn't ideal, but fixing this without is hard
and way more intrusive.  As-is, we can get:

WARNING: .. net/netfilter/nf_tables_api.c:5515 nft_set_destroy+0x..
Workqueue: events nf_tables_trans_destroy_work
RIP: 0010:nft_set_destroy+0x3fe/0x5c0
Call Trace:
 &lt;TASK&gt;
 nf_tables_trans_destroy_work+0x6b7/0xad0
 process_one_work+0x64a/0xce0
 worker_thread+0x613/0x10d0

In case the synchronize_rcu becomes an issue, we can explore alternatives.

One way would be to allocate nft_trans_rule objects + one nft_trans_chain
object, deactivate the rules + the chain and then defer the freeing to the
nft destroy workqueue.  We'd still need to keep the synchronize_rcu path as
a fallback to handle -ENOMEM corner cases though.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56655/">CVE-2024-56655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56655">CVE-2024-56655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235446">SUSE bug 1235446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56656" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56656" ref_url="https://www.suse.com/security/cve/CVE-2024-56656" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix aggregation ID mask to prevent oops on 5760X chips

The 5760X (P7) chip's HW GRO/LRO interface is very similar to that of
the previous generation (5750X or P5).  However, the aggregation ID
fields in the completion structures on P7 have been redefined from
16 bits to 12 bits.  The freed up 4 bits are redefined for part of the
metadata such as the VLAN ID.  The aggregation ID mask was not modified
when adding support for P7 chips.  Including the extra 4 bits for the
aggregation ID can potentially cause the driver to store or fetch the
packet header of GRO/LRO packets in the wrong TPA buffer.  It may hit
the BUG() condition in __skb_pull() because the SKB contains no valid
packet header:

kernel BUG at include/linux/skbuff.h:2766!
Oops: invalid opcode: 0000 1 PREEMPT SMP NOPTI
CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Kdump: loaded Tainted: G           OE      6.12.0-rc2+ #7
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: Dell Inc. PowerEdge R760/0VRV9X, BIOS 1.0.1 12/27/2022
RIP: 0010:eth_type_trans+0xda/0x140
Code: 80 00 00 00 eb c1 8b 47 70 2b 47 74 48 8b 97 d0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb a5 &lt;0f&gt; 0b b8 00 01 00 00 eb 9c 48 85 ff 74 eb 31 f6 b9 02 00 00 00 48
RSP: 0018:ff615003803fcc28 EFLAGS: 00010283
RAX: 00000000000022d2 RBX: 0000000000000003 RCX: ff2e8c25da334040
RDX: 0000000000000040 RSI: ff2e8c25c1ce8000 RDI: ff2e8c25869f9000
RBP: ff2e8c258c31c000 R08: ff2e8c25da334000 R09: 0000000000000001
R10: ff2e8c25da3342c0 R11: ff2e8c25c1ce89c0 R12: ff2e8c258e0990b0
R13: ff2e8c25bb120000 R14: ff2e8c25c1ce89c0 R15: ff2e8c25869f9000
FS:  0000000000000000(0000) GS:ff2e8c34be300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f05317e4c8 CR3: 000000108bac6006 CR4: 0000000000773ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? die+0x33/0x90
 ? do_trap+0xd9/0x100
 ? eth_type_trans+0xda/0x140
 ? do_error_trap+0x65/0x80
 ? eth_type_trans+0xda/0x140
 ? exc_invalid_op+0x4e/0x70
 ? eth_type_trans+0xda/0x140
 ? asm_exc_invalid_op+0x16/0x20
 ? eth_type_trans+0xda/0x140
 bnxt_tpa_end+0x10b/0x6b0 [bnxt_en]
 ? bnxt_tpa_start+0x195/0x320 [bnxt_en]
 bnxt_rx_pkt+0x902/0xd90 [bnxt_en]
 ? __bnxt_tx_int.constprop.0+0x89/0x300 [bnxt_en]
 ? kmem_cache_free+0x343/0x440
 ? __bnxt_tx_int.constprop.0+0x24f/0x300 [bnxt_en]
 __bnxt_poll_work+0x193/0x370 [bnxt_en]
 bnxt_poll_p5+0x9a/0x300 [bnxt_en]
 ? try_to_wake_up+0x209/0x670
 __napi_poll+0x29/0x1b0

Fix it by redefining the aggregation ID mask for P5_PLUS chips to be
12 bits.  This will work because the maximum aggregation ID is less
than 4096 on all P5_PLUS chips.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56656/">CVE-2024-56656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56656">CVE-2024-56656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235444">SUSE bug 1235444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56657" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56657" ref_url="https://www.suse.com/security/cve/CVE-2024-56657" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: control: Avoid WARN() for symlink errors

Using WARN() for showing the error of symlink creations don't give
more information than telling that something goes wrong, since the
usual code path is a lregister callback from each control element
creation.  More badly, the use of WARN() rather confuses fuzzer as if
it were serious issues.

This patch downgrades the warning messages to use the normal dev_err()
instead of WARN().  For making it clearer, add the function name to
the prefix, too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56657/">CVE-2024-56657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56657">CVE-2024-56657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235432">SUSE bug 1235432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56658" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56658" ref_url="https://www.suse.com/security/cve/CVE-2024-56658" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: defer final 'struct net' free in netns dismantle

Ilya reported a slab-use-after-free in dst_destroy [1]

Issue is in xfrm6_net_init() and xfrm4_net_init() :

They copy xfrm[46]_dst_ops_template into net-&gt;xfrm.xfrm[46]_dst_ops.

But net structure might be freed before all the dst callbacks are
called. So when dst_destroy() calls later :

if (dst-&gt;ops-&gt;destroy)
    dst-&gt;ops-&gt;destroy(dst);

dst-&gt;ops points to the old net-&gt;xfrm.xfrm[46]_dst_ops, which has been freed.

See a relevant issue fixed in :

ac888d58869b ("net: do not delay dst_entries_add() in dst_release()")

A fix is to queue the 'struct net' to be freed after one
another cleanup_net() round (and existing rcu_barrier())

[1]

BUG: KASAN: slab-use-after-free in dst_destroy (net/core/dst.c:112)
Read of size 8 at addr ffff8882137ccab0 by task swapper/37/0
Dec 03 05:46:18 kernel:
CPU: 37 UID: 0 PID: 0 Comm: swapper/37 Kdump: loaded Not tainted 6.12.0 #67
Hardware name: Red Hat KVM/RHEL, BIOS 1.16.1-1.el9 04/01/2014
Call Trace:
 &lt;IRQ&gt;
dump_stack_lvl (lib/dump_stack.c:124)
print_address_description.constprop.0 (mm/kasan/report.c:378)
? dst_destroy (net/core/dst.c:112)
print_report (mm/kasan/report.c:489)
? dst_destroy (net/core/dst.c:112)
? kasan_addr_to_slab (mm/kasan/common.c:37)
kasan_report (mm/kasan/report.c:603)
? dst_destroy (net/core/dst.c:112)
? rcu_do_batch (kernel/rcu/tree.c:2567)
dst_destroy (net/core/dst.c:112)
rcu_do_batch (kernel/rcu/tree.c:2567)
? __pfx_rcu_do_batch (kernel/rcu/tree.c:2491)
? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4339 kernel/locking/lockdep.c:4406)
rcu_core (kernel/rcu/tree.c:2825)
handle_softirqs (kernel/softirq.c:554)
__irq_exit_rcu (kernel/softirq.c:589 kernel/softirq.c:428 kernel/softirq.c:637)
irq_exit_rcu (kernel/softirq.c:651)
sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1049 arch/x86/kernel/apic/apic.c:1049)
 &lt;/IRQ&gt;
 &lt;TASK&gt;
asm_sysvec_apic_timer_interrupt (./arch/x86/include/asm/idtentry.h:702)
RIP: 0010:default_idle (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/kernel/process.c:743)
Code: 00 4d 29 c8 4c 01 c7 4c 29 c2 e9 6e ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d c7 c9 27 00 fb f4 &lt;fa&gt; c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90
RSP: 0018:ffff888100d2fe00 EFLAGS: 00000246
RAX: 00000000001870ed RBX: 1ffff110201a5fc2 RCX: ffffffffb61a3e46
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffb3d4d123
RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed11c7e1835d
R10: ffff888e3f0c1aeb R11: 0000000000000000 R12: 0000000000000000
R13: ffff888100d20000 R14: dffffc0000000000 R15: 0000000000000000
? ct_kernel_exit.constprop.0 (kernel/context_tracking.c:148)
? cpuidle_idle_call (kernel/sched/idle.c:186)
default_idle_call (./include/linux/cpuidle.h:143 kernel/sched/idle.c:118)
cpuidle_idle_call (kernel/sched/idle.c:186)
? __pfx_cpuidle_idle_call (kernel/sched/idle.c:168)
? lock_release (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5848)
? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406)
? tsc_verify_tsc_adjust (arch/x86/kernel/tsc_sync.c:59)
do_idle (kernel/sched/idle.c:326)
cpu_startup_entry (kernel/sched/idle.c:423 (discriminator 1))
start_secondary (arch/x86/kernel/smpboot.c:202 arch/x86/kernel/smpboot.c:282)
? __pfx_start_secondary (arch/x86/kernel/smpboot.c:232)
? soft_restart_cpu (arch/x86/kernel/head_64.S:452)
common_startup_64 (arch/x86/kernel/head_64.S:414)
 &lt;/TASK&gt;
Dec 03 05:46:18 kernel:
Allocated by task 12184:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69)
__kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345)
kmem_cache_alloc_noprof (mm/slub.c:4085 mm/slub.c:4134 mm/slub.c:4141)
copy_net_ns (net/core/net_namespace.c:421 net/core/net_namespace.c:480)
create_new_namespaces
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56658/">CVE-2024-56658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56658">CVE-2024-56658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235441">SUSE bug 1235441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235442">SUSE bug 1235442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56659" ref_url="https://www.suse.com/security/cve/CVE-2024-56659" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: lapb: increase LAPB_HEADER_LEN

It is unclear if net/lapb code is supposed to be ready for 8021q.

We can at least avoid crashes like the following :

skbuff: skb_under_panic: text:ffffffff8aabe1f6 len:24 put:20 head:ffff88802824a400 data:ffff88802824a3fe tail:0x16 end:0x140 dev:nr0.2
------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5508 Comm: dhcpcd Not tainted 6.12.0-rc7-syzkaller-00144-g66418447d27b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0d 8d 48 c7 c6 2e 9e 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 1a 6f 37 02 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc90002ddf638 EFLAGS: 00010282
RAX: 0000000000000086 RBX: dffffc0000000000 RCX: 7a24750e538ff600
RDX: 0000000000000000 RSI: 0000000000000201 RDI: 0000000000000000
RBP: ffff888034a86650 R08: ffffffff8174b13c R09: 1ffff920005bbe60
R10: dffffc0000000000 R11: fffff520005bbe61 R12: 0000000000000140
R13: ffff88802824a400 R14: ffff88802824a3fe R15: 0000000000000016
FS:  00007f2a5990d740(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c2631fd CR3: 0000000029504000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  nr_header+0x36/0x320 net/netrom/nr_dev.c:69
  dev_hard_header include/linux/netdevice.h:3148 [inline]
  vlan_dev_hard_header+0x359/0x480 net/8021q/vlan_dev.c:83
  dev_hard_header include/linux/netdevice.h:3148 [inline]
  lapbeth_data_transmit+0x1f6/0x2a0 drivers/net/wan/lapbether.c:257
  lapb_data_transmit+0x91/0xb0 net/lapb/lapb_iface.c:447
  lapb_transmit_buffer+0x168/0x1f0 net/lapb/lapb_out.c:149
 lapb_establish_data_link+0x84/0xd0
 lapb_device_event+0x4e0/0x670
  notifier_call_chain+0x19f/0x3e0 kernel/notifier.c:93
 __dev_notify_flags+0x207/0x400
  dev_change_flags+0xf0/0x1a0 net/core/dev.c:8922
  devinet_ioctl+0xa4e/0x1aa0 net/ipv4/devinet.c:1188
  inet_ioctl+0x3d7/0x4f0 net/ipv4/af_inet.c:1003
  sock_do_ioctl+0x158/0x460 net/socket.c:1227
  sock_ioctl+0x626/0x8e0 net/socket.c:1346
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56659/">CVE-2024-56659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56659">CVE-2024-56659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235439">SUSE bug 1235439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56660" ref_url="https://www.suse.com/security/cve/CVE-2024-56660" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: DR, prevent potential error pointer dereference

The dr_domain_add_vport_cap() function generally returns NULL on error
but sometimes we want it to return ERR_PTR(-EBUSY) so the caller can
retry.  The problem here is that "ret" can be either -EBUSY or -ENOMEM
and if it's and -ENOMEM then the error pointer is propogated back and
eventually dereferenced in dr_ste_v0_build_src_gvmi_qpn_tag().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56660/">CVE-2024-56660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56660">CVE-2024-56660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235437">SUSE bug 1235437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56661" ref_url="https://www.suse.com/security/cve/CVE-2024-56661" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix NULL deref in cleanup_bearer()

syzbot found [1] that after blamed commit, ub-&gt;ubsock-&gt;sk
was NULL when attempting the atomic_dec() :

atomic_dec(&amp;tipc_net(sock_net(ub-&gt;ubsock-&gt;sk))-&gt;wq_count);

Fix this by caching the tipc_net pointer.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 0 UID: 0 PID: 5896 Comm: kworker/0:3 Not tainted 6.13.0-rc1-next-20241203-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events cleanup_bearer
 RIP: 0010:read_pnet include/net/net_namespace.h:387 [inline]
 RIP: 0010:sock_net include/net/sock.h:655 [inline]
 RIP: 0010:cleanup_bearer+0x1f7/0x280 net/tipc/udp_media.c:820
Code: 18 48 89 d8 48 c1 e8 03 42 80 3c 28 00 74 08 48 89 df e8 3c f7 99 f6 48 8b 1b 48 83 c3 30 e8 f0 e4 60 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 80 3c 28 00 74 08 48 89 df e8 1a f7 99 f6 49 83 c7 e8 48 8b 1b
RSP: 0018:ffffc9000410fb70 EFLAGS: 00010206
RAX: 0000000000000006 RBX: 0000000000000030 RCX: ffff88802fe45a00
RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffc9000410f900
RBP: ffff88807e1f0908 R08: ffffc9000410f907 R09: 1ffff92000821f20
R10: dffffc0000000000 R11: fffff52000821f21 R12: ffff888031d19980
R13: dffffc0000000000 R14: dffffc0000000000 R15: ffff88807e1f0918
FS:  0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556ca050b000 CR3: 0000000031c0c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56661/">CVE-2024-56661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56661">CVE-2024-56661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234931">SUSE bug 1234931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56662" ref_url="https://www.suse.com/security/cve/CVE-2024-56662" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl

Fix an issue detected by syzbot with KASAN:

BUG: KASAN: vmalloc-out-of-bounds in cmd_to_func drivers/acpi/nfit/
core.c:416 [inline]
BUG: KASAN: vmalloc-out-of-bounds in acpi_nfit_ctl+0x20e8/0x24a0
drivers/acpi/nfit/core.c:459

The issue occurs in cmd_to_func when the call_pkg-&gt;nd_reserved2
array is accessed without verifying that call_pkg points to a buffer
that is appropriately sized as a struct nd_cmd_pkg. This can lead
to out-of-bounds access and undefined behavior if the buffer does not
have sufficient space.

To address this, a check was added in acpi_nfit_ctl() to ensure that
buf is not NULL and that buf_len is less than sizeof(*call_pkg)
before accessing it. This ensures safe access to the members of
call_pkg, including the nd_reserved2 array.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56662/">CVE-2024-56662 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235533">SUSE bug 1235533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56663" ref_url="https://www.suse.com/security/cve/CVE-2024-56663" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one

Since the netlink attribute range validation provides inclusive
checking, the *max* of attribute NL80211_ATTR_MLO_LINK_ID should be
IEEE80211_MLD_MAX_NUM_LINKS - 1 otherwise causing an off-by-one.

One crash stack for demonstration:
==================================================================
BUG: KASAN: wild-memory-access in ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939
Read of size 6 at addr 001102080000000c by task fuzzer.386/9508

CPU: 1 PID: 9508 Comm: syz.1.386 Not tainted 6.1.70 #2
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106
 print_report+0xe0/0x750 mm/kasan/report.c:398
 kasan_report+0x139/0x170 mm/kasan/report.c:495
 kasan_check_range+0x287/0x290 mm/kasan/generic.c:189
 memcpy+0x25/0x60 mm/kasan/shadow.c:65
 ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939
 rdev_tx_control_port net/wireless/rdev-ops.h:761 [inline]
 nl80211_tx_control_port+0x7b3/0xc40 net/wireless/nl80211.c:15453
 genl_family_rcv_msg_doit+0x22e/0x320 net/netlink/genetlink.c:756
 genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]
 genl_rcv_msg+0x539/0x740 net/netlink/genetlink.c:850
 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508
 genl_rcv+0x24/0x40 net/netlink/genetlink.c:861
 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
 netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352
 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874
 sock_sendmsg_nosec net/socket.c:716 [inline]
 __sock_sendmsg net/socket.c:728 [inline]
 ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499
 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553
 __sys_sendmsg net/socket.c:2582 [inline]
 __do_sys_sendmsg net/socket.c:2591 [inline]
 __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Update the policy to ensure correct validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56663/">CVE-2024-56663 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235454">SUSE bug 1235454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix race between element replace and close()

Element replace (with a socket different from the one stored) may race
with socket's close() link popping &amp; unlinking. __sock_map_delete()
unconditionally unrefs the (wrong) element:

// set map[0] = s0
map_update_elem(map, 0, s0)

// drop fd of s0
close(s0)
  sock_map_close()
    lock_sock(sk)               (s0!)
    sock_map_remove_links(sk)
      link = sk_psock_link_pop()
      sock_map_unlink(sk, link)
        sock_map_delete_from_link
                                        // replace map[0] with s1
                                        map_update_elem(map, 0, s1)
                                          sock_map_update_elem
                                (s1!)       lock_sock(sk)
                                            sock_map_update_common
                                              psock = sk_psock(sk)
                                              spin_lock(&amp;stab-&gt;lock)
                                              osk = stab-&gt;sks[idx]
                                              sock_map_add_link(..., &amp;stab-&gt;sks[idx])
                                              sock_map_unref(osk, &amp;stab-&gt;sks[idx])
                                                psock = sk_psock(osk)
                                                sk_psock_put(sk, psock)
                                                  if (refcount_dec_and_test(&amp;psock))
                                                    sk_psock_drop(sk, psock)
                                              spin_unlock(&amp;stab-&gt;lock)
                                            unlock_sock(sk)
          __sock_map_delete
            spin_lock(&amp;stab-&gt;lock)
            sk = *psk                        // s1 replaced s0; sk == s1
            if (!sk_test || sk_test == sk)   // sk_test (s0) != sk (s1); no branch
              sk = xchg(psk, NULL)
            if (sk)
              sock_map_unref(sk, psk)        // unref s1; sks[idx] will dangle
                psock = sk_psock(sk)
                sk_psock_put(sk, psock)
                  if (refcount_dec_and_test())
                    sk_psock_drop(sk, psock)
            spin_unlock(&amp;stab-&gt;lock)
    release_sock(sk)

Then close(map) enqueues bpf_map_free_deferred, which finally calls
sock_map_free(). This results in some refcount_t warnings along with
a KASAN splat [1].

Fix __sock_map_delete(), do not allow sock_map_unref() on elements that
may have been replaced.

[1]:
BUG: KASAN: slab-use-after-free in sock_map_free+0x10e/0x330
Write of size 4 at addr ffff88811f5b9100 by task kworker/u64:12/1063

CPU: 14 UID: 0 PID: 1063 Comm: kworker/u64:12 Not tainted 6.12.0+ #125
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
Workqueue: events_unbound bpf_map_free_deferred
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x68/0x90
 print_report+0x174/0x4f6
 kasan_report+0xb9/0x190
 kasan_check_range+0x10f/0x1e0
 sock_map_free+0x10e/0x330
 bpf_map_free_deferred+0x173/0x320
 process_one_work+0x846/0x1420
 worker_thread+0x5b3/0xf80
 kthread+0x29e/0x360
 ret_from_fork+0x2d/0x70
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 1202:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 __kasan_slab_alloc+0x85/0x90
 kmem_cache_alloc_noprof+0x131/0x450
 sk_prot_alloc+0x5b/0x220
 sk_alloc+0x2c/0x870
 unix_create1+0x88/0x8a0
 unix_create+0xc5/0x180
 __sock_create+0x241/0x650
 __sys_socketpair+0x1ce/0x420
 __x64_sys_socketpair+0x92/0x100
 do_syscall_64+0x93/0x180
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 46:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 kasan_save_free_info+0x37/0x60
 __kasan_slab_free+0x4b/0x70
 kmem_cache_free+0x1a1/0x590
 __sk_destruct+0x388/0x5a0
 sk_psock_destroy+0x73e/0xa50
 process_one_work+0x846/0x1420
 worker_thread+0x5b3/0xf80
 kthread+0x29e/0x360
 ret_from_fork+0x2d/0x70
 ret_from_fork_asm+0x1a/0x30

The bu
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235249">SUSE bug 1235249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235250">SUSE bug 1235250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56665</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56665" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56665" ref_url="https://www.suse.com/security/cve/CVE-2024-56665" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf,perf: Fix invalid prog_array access in perf_event_detach_bpf_prog

Syzbot reported [1] crash that happens for following tracing scenario:

  - create tracepoint perf event with attr.inherit=1, attach it to the
    process and set bpf program to it
  - attached process forks -&gt; chid creates inherited event

    the new child event shares the parent's bpf program and tp_event
    (hence prog_array) which is global for tracepoint

  - exit both process and its child -&gt; release both events
  - first perf_event_detach_bpf_prog call will release tp_event-&gt;prog_array
    and second perf_event_detach_bpf_prog will crash, because
    tp_event-&gt;prog_array is NULL

The fix makes sure the perf_event_detach_bpf_prog checks prog_array
is valid before it tries to remove the bpf program from it.

[1] https://lore.kernel.org/bpf/Z1MR6dCIKajNS6nU@krava/T/#m91dbf0688221ec7a7fc95e896a7ef9ff93b0b8ad
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56665/">CVE-2024-56665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56665">CVE-2024-56665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235489">SUSE bug 1235489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56666</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56666" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56666" ref_url="https://www.suse.com/security/cve/CVE-2024-56666" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Dereference null return value

In the function pqm_uninit there is a call-assignment of "pdd =
kfd_get_process_device_data" which could be null, and this value was
later dereferenced without checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56666/">CVE-2024-56666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56666">CVE-2024-56666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235242">SUSE bug 1235242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56667</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56667" ref_url="https://www.suse.com/security/cve/CVE-2024-56667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix NULL pointer dereference in capture_engine

When the intel_context structure contains NULL,
it raises a NULL pointer dereference error in drm_info().

(cherry picked from commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56667/">CVE-2024-56667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235016">SUSE bug 1235016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56668</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56668" ref_url="https://www.suse.com/security/cve/CVE-2024-56668" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix qi_batch NULL pointer with nested parent domain

The qi_batch is allocated when assigning cache tag for a domain. While
for nested parent domain, it is missed. Hence, when trying to map pages
to the nested parent, NULL dereference occurred. Also, there is potential
memleak since there is no lock around domain-&gt;qi_batch allocation.

To solve it, add a helper for qi_batch allocation, and call it in both
the __cache_tag_assign_domain() and __cache_tag_assign_parent_domain().

  BUG: kernel NULL pointer dereference, address: 0000000000000200
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 8104795067 P4D 0
  Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 223 UID: 0 PID: 4357 Comm: qemu-system-x86 Not tainted 6.13.0-rc1-00028-g4b50c3c3b998-dirty #2632
  Call Trace:
   ? __die+0x24/0x70
   ? page_fault_oops+0x80/0x150
   ? do_user_addr_fault+0x63/0x7b0
   ? exc_page_fault+0x7c/0x220
   ? asm_exc_page_fault+0x26/0x30
   ? cache_tag_flush_range_np+0x13c/0x260
   intel_iommu_iotlb_sync_map+0x1a/0x30
   iommu_map+0x61/0xf0
   batch_to_domain+0x188/0x250
   iopt_area_fill_domains+0x125/0x320
   ? rcu_is_watching+0x11/0x50
   iopt_map_pages+0x63/0x100
   iopt_map_common.isra.0+0xa7/0x190
   iopt_map_user_pages+0x6a/0x80
   iommufd_ioas_map+0xcd/0x1d0
   iommufd_fops_ioctl+0x118/0x1c0
   __x64_sys_ioctl+0x93/0xc0
   do_syscall_64+0x71/0x140
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56668/">CVE-2024-56668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56668">CVE-2024-56668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235017">SUSE bug 1235017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56669</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56669" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56669" ref_url="https://www.suse.com/security/cve/CVE-2024-56669" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Remove cache tags before disabling ATS

The current implementation removes cache tags after disabling ATS,
leading to potential memory leaks and kernel crashes. Specifically,
CACHE_TAG_DEVTLB type cache tags may still remain in the list even
after the domain is freed, causing a use-after-free condition.

This issue really shows up when multiple VFs from different PFs
passed through to a single user-space process via vfio-pci. In such
cases, the kernel may crash with kernel messages like:

 BUG: kernel NULL pointer dereference, address: 0000000000000014
 PGD 19036a067 P4D 1940a3067 PUD 136c9b067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 74 UID: 0 PID: 3183 Comm: testCli Not tainted 6.11.9 #2
 RIP: 0010:cache_tag_flush_range+0x9b/0x250
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x1f/0x60
  ? page_fault_oops+0x163/0x590
  ? exc_page_fault+0x72/0x190
  ? asm_exc_page_fault+0x22/0x30
  ? cache_tag_flush_range+0x9b/0x250
  ? cache_tag_flush_range+0x5d/0x250
  intel_iommu_tlb_sync+0x29/0x40
  intel_iommu_unmap_pages+0xfe/0x160
  __iommu_unmap+0xd8/0x1a0
  vfio_unmap_unpin+0x182/0x340 [vfio_iommu_type1]
  vfio_remove_dma+0x2a/0xb0 [vfio_iommu_type1]
  vfio_iommu_type1_ioctl+0xafa/0x18e0 [vfio_iommu_type1]

Move cache_tag_unassign_domain() before iommu_disable_pci_caps() to fix
it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56669/">CVE-2024-56669 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56669">CVE-2024-56669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235245">SUSE bug 1235245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56670</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56670" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56670" ref_url="https://www.suse.com/security/cve/CVE-2024-56670" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer

Considering that in some extreme cases,
when u_serial driver is accessed by multiple threads,
Thread A is executing the open operation and calling the gs_open,
Thread B is executing the disconnect operation and calling the
gserial_disconnect function,The port-&gt;port_usb pointer will be set to NULL.

E.g.
    Thread A                                 Thread B
    gs_open()                                gadget_unbind_driver()
    gs_start_io()                            composite_disconnect()
    gs_start_rx()                            gserial_disconnect()
    ...                                      ...
    spin_unlock(&amp;port-&gt;port_lock)
    status = usb_ep_queue()                  spin_lock(&amp;port-&gt;port_lock)
    spin_lock(&amp;port-&gt;port_lock)              port-&gt;port_usb = NULL
    gs_free_requests(port-&gt;port_usb-&gt;in)     spin_unlock(&amp;port-&gt;port_lock)
    Crash

This causes thread A to access a null pointer (port-&gt;port_usb is null)
when calling the gs_free_requests function, causing a crash.

If port_usb is NULL, the release request will be skipped as it
will be done by gserial_disconnect.

So add a null pointer check to gs_start_io before attempting
to access the value of the pointer port-&gt;port_usb.

Call trace:
 gs_start_io+0x164/0x25c
 gs_open+0x108/0x13c
 tty_open+0x314/0x638
 chrdev_open+0x1b8/0x258
 do_dentry_open+0x2c4/0x700
 vfs_open+0x2c/0x3c
 path_openat+0xa64/0xc60
 do_filp_open+0xb8/0x164
 do_sys_openat2+0x84/0xf0
 __arm64_sys_openat+0x70/0x9c
 invoke_syscall+0x58/0x114
 el0_svc_common+0x80/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x38/0x68
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56670/">CVE-2024-56670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56670">CVE-2024-56670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235488">SUSE bug 1235488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56671</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56671" ref_url="https://www.suse.com/security/cve/CVE-2024-56671" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: graniterapids: Fix vGPIO driver crash

Move setting irq_chip.name from probe() function to the initialization
of "irq_chip" struct in order to fix vGPIO driver crash during bootup.

Crash was caused by unauthorized modification of irq_chip.name field
where irq_chip struct was initialized as const.

This behavior is a consequence of suboptimal implementation of
gpio_irq_chip_set_chip(), which should be changed to avoid
casting away const qualifier.

Crash log:
BUG: unable to handle page fault for address: ffffffffc0ba81c0
/#PF: supervisor write access in kernel mode
/#PF: error_code(0x0003) - permissions violation
CPU: 33 UID: 0 PID: 1075 Comm: systemd-udevd Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7 #1
Hardware name: Intel Corporation Kaseyville RP/Kaseyville RP, BIOS KVLDCRB1.PGS.0026.D73.2410081258 10/08/2024
RIP: 0010:gnr_gpio_probe+0x171/0x220 [gpio_graniterapids]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-04"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56671/">CVE-2024-56671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56671">CVE-2024-56671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235018">SUSE bug 1235018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56672</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56672" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56672" ref_url="https://www.suse.com/security/cve/CVE-2024-56672" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix UAF in blkcg_unpin_online()

blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To
walk up, it uses blkcg_parent(blkcg) but it was calling that after
blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the
following UAF:

  ==================================================================
  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270
  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117

  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022
  Workqueue: cgwb_release cgwb_release_workfn
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x27/0x80
   print_report+0x151/0x710
   kasan_report+0xc0/0x100
   blkcg_unpin_online+0x15a/0x270
   cgwb_release_workfn+0x194/0x480
   process_scheduled_works+0x71b/0xe20
   worker_thread+0x82a/0xbd0
   kthread+0x242/0x2c0
   ret_from_fork+0x33/0x70
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;
  ...
  Freed by task 1944:
   kasan_save_track+0x2b/0x70
   kasan_save_free_info+0x3c/0x50
   __kasan_slab_free+0x33/0x50
   kfree+0x10c/0x330
   css_free_rwork_fn+0xe6/0xb30
   process_scheduled_works+0x71b/0xe20
   worker_thread+0x82a/0xbd0
   kthread+0x242/0x2c0
   ret_from_fork+0x33/0x70
   ret_from_fork_asm+0x1a/0x30

Note that the UAF is not easy to trigger as the free path is indirected
behind a couple RCU grace periods and a work item execution. I could only
trigger it with artifical msleep() injected in blkcg_unpin_online().

Fix it by reading the parent pointer before destroying the blkcg's blkg's.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56672/">CVE-2024-56672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235534">SUSE bug 1235534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56673</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56673" ref_url="https://www.suse.com/security/cve/CVE-2024-56673" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: mm: Do not call pmd dtor on vmemmap page table teardown

The vmemmap's, which is used for RV64 with SPARSEMEM_VMEMMAP, page
tables are populated using pmd (page middle directory) hugetables.
However, the pmd allocation is not using the generic mechanism used by
the VMA code (e.g. pmd_alloc()), or the RISC-V specific
create_pgd_mapping()/alloc_pmd_late(). Instead, the vmemmap page table
code allocates a page, and calls vmemmap_set_pmd(). This results in
that the pmd ctor is *not* called, nor would it make sense to do so.

Now, when tearing down a vmemmap page table pmd, the cleanup code
would unconditionally, and incorrectly call the pmd dtor, which
results in a crash (best case).

This issue was found when running the HMM selftests:

  | tools/testing/selftests/mm# ./test_hmm.sh smoke
  | ... # when unloading the test_hmm.ko module
  | page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10915b
  | flags: 0x1000000000000000(node=0|zone=1)
  | raw: 1000000000000000 0000000000000000 dead000000000122 0000000000000000
  | raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
  | page dumped because: VM_BUG_ON_PAGE(ptdesc-&gt;pmd_huge_pte)
  | ------------[ cut here ]------------
  | kernel BUG at include/linux/mm.h:3080!
  | Kernel BUG [#1]
  | Modules linked in: test_hmm(-) sch_fq_codel fuse drm drm_panel_orientation_quirks backlight dm_mod
  | CPU: 1 UID: 0 PID: 514 Comm: modprobe Tainted: G        W          6.12.0-00982-gf2a4f1682d07 #2
  | Tainted: [W]=WARN
  | Hardware name: riscv-virtio qemu/qemu, BIOS 2024.10 10/01/2024
  | epc : remove_pgd_mapping+0xbec/0x1070
  |  ra : remove_pgd_mapping+0xbec/0x1070
  | epc : ffffffff80010a68 ra : ffffffff80010a68 sp : ff20000000a73940
  |  gp : ffffffff827b2d88 tp : ff6000008785da40 t0 : ffffffff80fbce04
  |  t1 : 0720072007200720 t2 : 706d756420656761 s0 : ff20000000a73a50
  |  s1 : ff6000008915cff8 a0 : 0000000000000039 a1 : 0000000000000008
  |  a2 : ff600003fff0de20 a3 : 0000000000000000 a4 : 0000000000000000
  |  a5 : 0000000000000000 a6 : c0000000ffffefff a7 : ffffffff824469b8
  |  s2 : ff1c0000022456c0 s3 : ff1ffffffdbfffff s4 : ff6000008915c000
  |  s5 : ff6000008915c000 s6 : ff6000008915c000 s7 : ff1ffffffdc00000
  |  s8 : 0000000000000001 s9 : ff1ffffffdc00000 s10: ffffffff819a31f0
  |  s11: ffffffffffffffff t3 : ffffffff8000c950 t4 : ff60000080244f00
  |  t5 : ff60000080244000 t6 : ff20000000a73708
  | status: 0000000200000120 badaddr: ffffffff80010a68 cause: 0000000000000003
  | [&lt;ffffffff80010a68&gt;] remove_pgd_mapping+0xbec/0x1070
  | [&lt;ffffffff80fd238e&gt;] vmemmap_free+0x14/0x1e
  | [&lt;ffffffff8032e698&gt;] section_deactivate+0x220/0x452
  | [&lt;ffffffff8032ef7e&gt;] sparse_remove_section+0x4a/0x58
  | [&lt;ffffffff802f8700&gt;] __remove_pages+0x7e/0xba
  | [&lt;ffffffff803760d8&gt;] memunmap_pages+0x2bc/0x3fe
  | [&lt;ffffffff02a3ca28&gt;] dmirror_device_remove_chunks+0x2ea/0x518 [test_hmm]
  | [&lt;ffffffff02a3e026&gt;] hmm_dmirror_exit+0x3e/0x1018 [test_hmm]
  | [&lt;ffffffff80102c14&gt;] __riscv_sys_delete_module+0x15a/0x2a6
  | [&lt;ffffffff80fd020c&gt;] do_trap_ecall_u+0x1f2/0x266
  | [&lt;ffffffff80fde0a2&gt;] _new_vmalloc_restore_context_a0+0xc6/0xd2
  | Code: bf51 7597 0184 8593 76a5 854a 4097 0029 80e7 2c00 (9002) 7597
  | ---[ end trace 0000000000000000 ]---
  | Kernel panic - not syncing: Fatal exception in interrupt

Add a check to avoid calling the pmd dtor, if the calling context is
vmemmap_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56673/">CVE-2024-56673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56673">CVE-2024-56673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235400">SUSE bug 1235400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56674</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56674" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56674" ref_url="https://www.suse.com/security/cve/CVE-2024-56674" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: correct netdev_tx_reset_queue() invocation point

When virtnet_close is followed by virtnet_open, some TX completions can
possibly remain unconsumed, until they are finally processed during the
first NAPI poll after the netdev_tx_reset_queue(), resulting in a crash
[1]. Commit b96ed2c97c79 ("virtio_net: move netdev_tx_reset_queue() call
before RX napi enable") was not sufficient to eliminate all BQL crash
cases for virtio-net.

This issue can be reproduced with the latest net-next master by running:
`while :; do ip l set DEV down; ip l set DEV up; done` under heavy network
TX load from inside the machine.

netdev_tx_reset_queue() can actually be dropped from virtnet_open path;
the device is not stopped in any case. For BQL core part, it's just like
traffic nearly ceases to exist for some period. For stall detector added
to BQL, even if virtnet_close could somehow lead to some TX completions
delayed for long, followed by virtnet_open, we can just take it as stall
as mentioned in commit 6025b9135f7a ("net: dqs: add NIC stall detector
based on BQL"). Note also that users can still reset stall_max via sysfs.

So, drop netdev_tx_reset_queue() from virtnet_enable_queue_pair(). This
eliminates the BQL crashes. As a result, netdev_tx_reset_queue() is now
explicitly required in freeze/restore path. This patch adds it to
immediately after free_unused_bufs(), following the rule of thumb:
netdev_tx_reset_queue() should follow any SKB freeing not followed by
netdev_tx_completed_queue(). This seems the most consistent and
streamlined approach, and now netdev_tx_reset_queue() runs whenever
free_unused_bufs() is done.

[1]:
------------[ cut here ]------------
kernel BUG at lib/dynamic_queue_limits.c:99!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 7 UID: 0 PID: 1598 Comm: ip Tainted: G    N 6.12.0net-next_main+ #2
Tainted: [N]=TEST
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), \
BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:dql_completed+0x26b/0x290
Code: b7 c2 49 89 e9 44 89 da 89 c6 4c 89 d7 e8 ed 17 47 00 58 65 ff 0d
4d 27 90 7e 0f 85 fd fe ff ff e8 ea 53 8d ff e9 f3 fe ff ff &lt;0f&gt; 0b 01
d2 44 89 d1 29 d1 ba 00 00 00 00 0f 48 ca e9 28 ff ff ff
RSP: 0018:ffffc900002b0d08 EFLAGS: 00010297
RAX: 0000000000000000 RBX: ffff888102398c80 RCX: 0000000080190009
RDX: 0000000000000000 RSI: 000000000000006a RDI: 0000000000000000
RBP: ffff888102398c00 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000000000ca R11: 0000000000015681 R12: 0000000000000001
R13: ffffc900002b0d68 R14: ffff88811115e000 R15: ffff8881107aca40
FS:  00007f41ded69500(0000) GS:ffff888667dc0000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000556ccc2dc1a0 CR3: 0000000104fd8003 CR4: 0000000000772ef0
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? die+0x32/0x80
 ? do_trap+0xd9/0x100
 ? dql_completed+0x26b/0x290
 ? dql_completed+0x26b/0x290
 ? do_error_trap+0x6d/0xb0
 ? dql_completed+0x26b/0x290
 ? exc_invalid_op+0x4c/0x60
 ? dql_completed+0x26b/0x290
 ? asm_exc_invalid_op+0x16/0x20
 ? dql_completed+0x26b/0x290
 __free_old_xmit+0xff/0x170 [virtio_net]
 free_old_xmit+0x54/0xc0 [virtio_net]
 virtnet_poll+0xf4/0xe30 [virtio_net]
 ? __update_load_avg_cfs_rq+0x264/0x2d0
 ? update_curr+0x35/0x260
 ? reweight_entity+0x1be/0x260
 __napi_poll.constprop.0+0x28/0x1c0
 net_rx_action+0x329/0x420
 ? enqueue_hrtimer+0x35/0x90
 ? trace_hardirqs_on+0x1d/0x80
 ? kvm_sched_clock_read+0xd/0x20
 ? sched_clock+0xc/0x30
 ? kvm_sched_clock_read+0xd/0x20
 ? sched_clock+0xc/0x30
 ? sched_clock_cpu+0xd/0x1a0
 handle_softirqs+0x138/0x3e0
 do_softirq.part.0+0x89/0xc0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0xa7/0xb0
 virtnet_open+0xc8/0x310 [virtio_net]
 __dev_open+0xfa/0x1b0
 __dev_change_flags+0x1de/0x250
 dev_change_flags+0x22/0x60
 do_setlink.isra.0+0x2df/0x10b0
 ? rtnetlink_rcv_msg+0x34f/0x3f0
 ? netlink_rcv_skb+0x54/0x100
 ? netlink_unicas
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56674/">CVE-2024-56674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56674">CVE-2024-56674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235549">SUSE bug 1235549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56675</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56675" ref_url="https://www.suse.com/security/cve/CVE-2024-56675" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors

Uprobes always use bpf_prog_run_array_uprobe() under tasks-trace-RCU
protection. But it is possible to attach a non-sleepable BPF program to a
uprobe, and non-sleepable BPF programs are freed via normal RCU (see
__bpf_prog_put_noref()). This leads to UAF of the bpf_prog because a normal
RCU grace period does not imply a tasks-trace-RCU grace period.

Fix it by explicitly waiting for a tasks-trace-RCU grace period after
removing the attachment of a bpf_prog to a perf_event.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56675/">CVE-2024-56675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235555">SUSE bug 1235555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56676</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56676" ref_url="https://www.suse.com/security/cve/CVE-2024-56676" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: testing: Initialize some variables annoteded with _free()

Variables annotated with __free() need to be initialized if the function
can return before they get updated for the first time or the attempt to
free the memory pointed to by them upon function return may crash the
kernel.

Fix this issue in some places in the thermal testing code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56676/">CVE-2024-56676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56676">CVE-2024-56676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235493">SUSE bug 1235493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56677</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56677" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56677" ref_url="https://www.suse.com/security/cve/CVE-2024-56677" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/fadump: Move fadump_cma_init to setup_arch() after initmem_init()

During early init CMA_MIN_ALIGNMENT_BYTES can be PAGE_SIZE,
since pageblock_order is still zero and it gets initialized
later during initmem_init() e.g.
setup_arch() -&gt; initmem_init() -&gt; sparse_init() -&gt; set_pageblock_order()

One such use case where this causes issue is -
early_setup() -&gt; early_init_devtree() -&gt; fadump_reserve_mem() -&gt; fadump_cma_init()

This causes CMA memory alignment check to be bypassed in
cma_init_reserved_mem(). Then later cma_activate_area() can hit
a VM_BUG_ON_PAGE(pfn &amp; ((1 &lt;&lt; order) - 1)) if the reserved memory
area was not pageblock_order aligned.

Fix it by moving the fadump_cma_init() after initmem_init(),
where other such cma reservations also gets called.

&lt;stack trace&gt;
==============
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10010
flags: 0x13ffff800000000(node=1|zone=0|lastcpupid=0x7ffff) CMA
raw: 013ffff800000000 5deadbeef0000100 5deadbeef0000122 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: VM_BUG_ON_PAGE(pfn &amp; ((1 &lt;&lt; order) - 1))
------------[ cut here ]------------
kernel BUG at mm/page_alloc.c:778!

Call Trace:
__free_one_page+0x57c/0x7b0 (unreliable)
free_pcppages_bulk+0x1a8/0x2c8
free_unref_page_commit+0x3d4/0x4e4
free_unref_page+0x458/0x6d0
init_cma_reserved_pageblock+0x114/0x198
cma_init_reserved_areas+0x270/0x3e0
do_one_initcall+0x80/0x2f8
kernel_init_freeable+0x33c/0x530
kernel_init+0x34/0x26c
ret_from_kernel_user_thread+0x14/0x1c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56677/">CVE-2024-56677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56677">CVE-2024-56677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235494">SUSE bug 1235494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56678</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56678" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56678" ref_url="https://www.suse.com/security/cve/CVE-2024-56678" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/mm/fault: Fix kfence page fault reporting

copy_from_kernel_nofault() can be called when doing read of /proc/kcore.
/proc/kcore can have some unmapped kfence objects which when read via
copy_from_kernel_nofault() can cause page faults. Since *_nofault()
functions define their own fixup table for handling fault, use that
instead of asking kfence to handle such faults.

Hence we search the exception tables for the nip which generated the
fault. If there is an entry then we let the fixup table handler handle the
page fault by returning an error from within ___do_page_fault().

This can be easily triggered if someone tries to do dd from /proc/kcore.
eg. dd if=/proc/kcore of=/dev/null bs=1M

Some example false negatives:

  ===============================
  BUG: KFENCE: invalid read in copy_from_kernel_nofault+0x9c/0x1a0
  Invalid read at 0xc0000000fdff0000:
   copy_from_kernel_nofault+0x9c/0x1a0
   0xc00000000665f950
   read_kcore_iter+0x57c/0xa04
   proc_reg_read_iter+0xe4/0x16c
   vfs_read+0x320/0x3ec
   ksys_read+0x90/0x154
   system_call_exception+0x120/0x310
   system_call_vectored_common+0x15c/0x2ec

  BUG: KFENCE: use-after-free read in copy_from_kernel_nofault+0x9c/0x1a0
  Use-after-free read at 0xc0000000fe050000 (in kfence-#2):
   copy_from_kernel_nofault+0x9c/0x1a0
   0xc00000000665f950
   read_kcore_iter+0x57c/0xa04
   proc_reg_read_iter+0xe4/0x16c
   vfs_read+0x320/0x3ec
   ksys_read+0x90/0x154
   system_call_exception+0x120/0x310
   system_call_vectored_common+0x15c/0x2ec
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56678/">CVE-2024-56678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56678">CVE-2024-56678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235495">SUSE bug 1235495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56679</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56679" ref_url="https://www.suse.com/security/cve/CVE-2024-56679" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_common.c

Add error pointer check after calling otx2_mbox_get_rsp().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56679/">CVE-2024-56679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56679">CVE-2024-56679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235498">SUSE bug 1235498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56680</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56680" ref_url="https://www.suse.com/security/cve/CVE-2024-56680" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: intel/ipu6: do not handle interrupts when device is disabled

Some IPU6 devices have shared interrupts. We need to handle properly
case when interrupt is triggered from other device on shared irq line
and IPU6 itself disabled. In such case we get 0xffffffff from
ISR_STATUS register and handle all irq's cases, for what we are not
not prepared and usually hang the whole system.

To avoid the issue use pm_runtime_get_if_active() to check if
the device is enabled and prevent suspending it when we handle irq
until the end of irq. Additionally use synchronize_irq() in suspend
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56680/">CVE-2024-56680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56680">CVE-2024-56680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235556">SUSE bug 1235556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56681</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56681" ref_url="https://www.suse.com/security/cve/CVE-2024-56681" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: bcm - add error check in the ahash_hmac_init function

The ahash_init functions may return fails. The ahash_hmac_init should
not return ok when ahash_init returns error. For an example, ahash_init
will return -ENOMEM when allocation memory is error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56681/">CVE-2024-56681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56681">CVE-2024-56681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235557">SUSE bug 1235557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56682</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56682" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56682" ref_url="https://www.suse.com/security/cve/CVE-2024-56682" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/riscv-aplic: Prevent crash when MSI domain is missing

If the APLIC driver is probed before the IMSIC driver, the parent MSI
domain will be missing, which causes a NULL pointer dereference in
msi_create_device_irq_domain().

Avoid this by deferring probe until the parent MSI domain is available. Use
dev_err_probe() to avoid printing an error message when returning
-EPROBE_DEFER.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56682/">CVE-2024-56682 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56682">CVE-2024-56682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235559">SUSE bug 1235559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56683</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56683" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56683" ref_url="https://www.suse.com/security/cve/CVE-2024-56683" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vc4: hdmi: Avoid hang with debug registers when suspended

Trying to read /sys/kernel/debug/dri/1/hdmi1_regs
when the hdmi is disconnected results in a fatal system hang.

This is due to the pm suspend code disabling the dvp clock.
That is just a gate of the 108MHz clock in DVP_HT_RPI_MISC_CONFIG,
which results in accesses hanging AXI bus.

Protect against this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56683/">CVE-2024-56683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56683">CVE-2024-56683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235497">SUSE bug 1235497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56684</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56684" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56684" ref_url="https://www.suse.com/security/cve/CVE-2024-56684" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: mtk-cmdq: fix wrong use of sizeof in cmdq_get_clocks()

It should be size of the struct clk_bulk_data, not data pointer pass to
devm_kcalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56684/">CVE-2024-56684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56684">CVE-2024-56684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235560">SUSE bug 1235560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56685</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56685" ref_url="https://www.suse.com/security/cve/CVE-2024-56685" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: Check num_codecs is not zero to avoid panic during probe

Following commit 13f58267cda3 ("ASoC: soc.h: don't create dummy
Component via COMP_DUMMY()"), COMP_DUMMY() became an array with zero
length, and only gets populated with the dummy struct after the card is
registered. Since the sound card driver's probe happens before the card
registration, accessing any of the members of a dummy component during
probe will result in undefined behavior.

This can be observed in the mt8188 and mt8195 machine sound drivers. By
omitting a dai link subnode in the sound card's node in the Devicetree,
the default uninitialized dummy codec is used, and when its dai_name
pointer gets passed to strcmp() it results in a null pointer dereference
and a kernel panic.

In addition to that, set_card_codec_info() in the generic helpers file,
mtk-soundcard-driver.c, will populate a dai link with a dummy codec when
a dai link node is present in DT but with no codec property.

The result is that at probe time, a dummy codec can either be
uninitialized with num_codecs = 0, or be an initialized dummy codec,
with num_codecs = 1 and dai_name = "snd-soc-dummy-dai". In order to
accommodate for both situations, check that num_codecs is not zero
before accessing the codecs' fields but still check for the codec's dai
name against "snd-soc-dummy-dai" as needed.

While at it, also drop the check that dai_name is not null in the mt8192
driver, introduced in commit 4d4e1b6319e5 ("ASoC: mediatek: mt8192:
Check existence of dai_name before dereferencing"), as it is actually
redundant given the preceding num_codecs != 0 check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56685/">CVE-2024-56685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56685">CVE-2024-56685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235561">SUSE bug 1235561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56687</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56687" ref_url="https://www.suse.com/security/cve/CVE-2024-56687" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: musb: Fix hardware lockup on first Rx endpoint request

There is a possibility that a request's callback could be invoked from
usb_ep_queue() (call trace below, supplemented with missing calls):

req-&gt;complete from usb_gadget_giveback_request
	(drivers/usb/gadget/udc/core.c:999)
usb_gadget_giveback_request from musb_g_giveback
	(drivers/usb/musb/musb_gadget.c:147)
musb_g_giveback from rxstate
	(drivers/usb/musb/musb_gadget.c:784)
rxstate from musb_ep_restart
	(drivers/usb/musb/musb_gadget.c:1169)
musb_ep_restart from musb_ep_restart_resume_work
	(drivers/usb/musb/musb_gadget.c:1176)
musb_ep_restart_resume_work from musb_queue_resume_work
	(drivers/usb/musb/musb_core.c:2279)
musb_queue_resume_work from musb_gadget_queue
	(drivers/usb/musb/musb_gadget.c:1241)
musb_gadget_queue from usb_ep_queue
	(drivers/usb/gadget/udc/core.c:300)

According to the docstring of usb_ep_queue(), this should not happen:

"Note that @req's -&gt;complete() callback must never be called from within
usb_ep_queue() as that can create deadlock situations."

In fact, a hardware lockup might occur in the following sequence:

1. The gadget is initialized using musb_gadget_enable().
2. Meanwhile, a packet arrives, and the RXPKTRDY flag is set, raising an
   interrupt.
3. If IRQs are enabled, the interrupt is handled, but musb_g_rx() finds an
   empty queue (next_request() returns NULL). The interrupt flag has
   already been cleared by the glue layer handler, but the RXPKTRDY flag
   remains set.
4. The first request is enqueued using usb_ep_queue(), leading to the call
   of req-&gt;complete(), as shown in the call trace above.
5. If the callback enables IRQs and another packet is waiting, step (3)
   repeats. The request queue is empty because usb_g_giveback() removes the
   request before invoking the callback.
6. The endpoint remains locked up, as the interrupt triggered by hardware
   setting the RXPKTRDY flag has been handled, but the flag itself remains
   set.

For this scenario to occur, it is only necessary for IRQs to be enabled at
some point during the complete callback. This happens with the USB Ethernet
gadget, whose rx_complete() callback calls netif_rx(). If called in the
task context, netif_rx() disables the bottom halves (BHs). When the BHs are
re-enabled, IRQs are also enabled to allow soft IRQs to be processed. The
gadget itself is initialized at module load (or at boot if built-in), but
the first request is enqueued when the network interface is brought up,
triggering rx_complete() in the task context via ioctl(). If a packet
arrives while the interface is down, it can prevent the interface from
receiving any further packets from the USB host.

The situation is quite complicated with many parties involved. This
particular issue can be resolved in several possible ways:

1. Ensure that callbacks never enable IRQs. This would be difficult to
   enforce, as discovering how netif_rx() interacts with interrupts was
   already quite challenging and u_ether is not the only function driver.
   Similar "bugs" could be hidden in other drivers as well.
2. Disable MUSB interrupts in musb_g_giveback() before calling the callback
   and re-enable them afterwars (by calling musb_{dis,en}able_interrupts(),
   for example). This would ensure that MUSB interrupts are not handled
   during the callback, even if IRQs are enabled. In fact, it would allow
   IRQs to be enabled when releasing the lock. However, this feels like an
   inelegant hack.
3. Modify the interrupt handler to clear the RXPKTRDY flag if the request
   queue is empty. While this approach also feels like a hack, it wastes
   CPU time by attempting to handle incoming packets when the software is
   not ready to process them.
4. Flush the Rx FIFO instead of calling rxstate() in musb_ep_restart().
   This ensures that the hardware can receive packets when there is at
   least one request in the queue. Once I
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56687/">CVE-2024-56687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56687">CVE-2024-56687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235537">SUSE bug 1235537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56688</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56688" ref_url="https://www.suse.com/security/cve/CVE-2024-56688" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport

Since transport-&gt;sock has been set to NULL during reset transport,
XPRT_SOCK_UPD_TIMEOUT also needs to be cleared. Otherwise, the
xs_tcp_set_socket_timeouts() may be triggered in xs_tcp_send_request()
to dereference the transport-&gt;sock that has been set to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56688/">CVE-2024-56688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56688">CVE-2024-56688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235538">SUSE bug 1235538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56689</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56689" ref_url="https://www.suse.com/security/cve/CVE-2024-56689" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: epf-mhi: Avoid NULL dereference if DT lacks 'mmio'

If platform_get_resource_byname() fails and returns NULL because DT lacks
an 'mmio' property for the MHI endpoint, dereferencing res-&gt;start will
cause a NULL pointer access. Add a check to prevent it.

[kwilczynski: error message update per the review feedback]
[bhelgaas: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56689/">CVE-2024-56689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56689">CVE-2024-56689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235543">SUSE bug 1235543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56690</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56690" ref_url="https://www.suse.com/security/cve/CVE-2024-56690" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY

Since commit 8f4f68e788c3 ("crypto: pcrypt - Fix hungtask for
PADATA_RESET"), the pcrypt encryption and decryption operations return
-EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is
generated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns
-EAGAIN, the unnecessary panic will occur when panic_on_warn set 1.
Fix this issue by calling crypto layer directly without parallelization
in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56690/">CVE-2024-56690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56690">CVE-2024-56690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235428">SUSE bug 1235428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56691</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56691" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56691" ref_url="https://www.suse.com/security/cve/CVE-2024-56691" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for USB Type-C device

While design wise the idea of converting the driver to use
the hierarchy of the IRQ chips is correct, the implementation
has (inherited) flaws. This was unveiled when platform_get_irq()
had started WARN() on IRQ 0 that is supposed to be a Linux
IRQ number (also known as vIRQ).

Rework the driver to respect IRQ domain when creating each MFD
device separately, as the domain is not the same for all of them.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56691/">CVE-2024-56691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56691">CVE-2024-56691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235425">SUSE bug 1235425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56692</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56692" ref_url="https://www.suse.com/security/cve/CVE-2024-56692" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to do sanity check on node blkaddr in truncate_node()

syzbot reports a f2fs bug as below:

------------[ cut here ]------------
kernel BUG at fs/f2fs/segment.c:2534!
RIP: 0010:f2fs_invalidate_blocks+0x35f/0x370 fs/f2fs/segment.c:2534
Call Trace:
 truncate_node+0x1ae/0x8c0 fs/f2fs/node.c:909
 f2fs_remove_inode_page+0x5c2/0x870 fs/f2fs/node.c:1288
 f2fs_evict_inode+0x879/0x15c0 fs/f2fs/inode.c:856
 evict+0x4e8/0x9b0 fs/inode.c:723
 f2fs_handle_failed_inode+0x271/0x2e0 fs/f2fs/inode.c:986
 f2fs_create+0x357/0x530 fs/f2fs/namei.c:394
 lookup_open fs/namei.c:3595 [inline]
 open_last_lookups fs/namei.c:3694 [inline]
 path_openat+0x1c03/0x3590 fs/namei.c:3930
 do_filp_open+0x235/0x490 fs/namei.c:3960
 do_sys_openat2+0x13e/0x1d0 fs/open.c:1415
 do_sys_open fs/open.c:1430 [inline]
 __do_sys_openat fs/open.c:1446 [inline]
 __se_sys_openat fs/open.c:1441 [inline]
 __x64_sys_openat+0x247/0x2a0 fs/open.c:1441
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0010:f2fs_invalidate_blocks+0x35f/0x370 fs/f2fs/segment.c:2534

The root cause is: on a fuzzed image, blkaddr in nat entry may be
corrupted, then it will cause system panic when using it in
f2fs_invalidate_blocks(), to avoid this, let's add sanity check on
nat blkaddr in truncate_node().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56692/">CVE-2024-56692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56692">CVE-2024-56692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235420">SUSE bug 1235420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56693</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56693" ref_url="https://www.suse.com/security/cve/CVE-2024-56693" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

brd: defer automatic disk creation until module initialization succeeds

My colleague Wupeng found the following problems during fault injection:

BUG: unable to handle page fault for address: fffffbfff809d073
PGD 6e648067 P4D 123ec8067 PUD 123ec4067 PMD 100e38067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 5 UID: 0 PID: 755 Comm: modprobe Not tainted 6.12.0-rc3+ #17
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:__asan_load8+0x4c/0xa0
...
Call Trace:
 &lt;TASK&gt;
 blkdev_put_whole+0x41/0x70
 bdev_release+0x1a3/0x250
 blkdev_release+0x11/0x20
 __fput+0x1d7/0x4a0
 task_work_run+0xfc/0x180
 syscall_exit_to_user_mode+0x1de/0x1f0
 do_syscall_64+0x6b/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

loop_init() is calling loop_add() after __register_blkdev() succeeds and
is ignoring disk_add() failure from loop_add(), for loop_add() failure
is not fatal and successfully created disks are already visible to
bdev_open().

brd_init() is currently calling brd_alloc() before __register_blkdev()
succeeds and is releasing successfully created disks when brd_init()
returns an error. This can cause UAF for the latter two case:

case 1:
    T1:
modprobe brd
  brd_init
    brd_alloc(0) // success
      add_disk
        disk_scan_partitions
          bdev_file_open_by_dev // alloc file
          fput // won't free until back to userspace
    brd_alloc(1) // failed since mem alloc error inject
  // error path for modprobe will release code segment
  // back to userspace
  __fput
    blkdev_release
      bdev_release
        blkdev_put_whole
          bdev-&gt;bd_disk-&gt;fops-&gt;release // fops is freed now, UAF!

case 2:
    T1:                            T2:
modprobe brd
  brd_init
    brd_alloc(0) // success
                                   open(/dev/ram0)
    brd_alloc(1) // fail
  // error path for modprobe

                                   close(/dev/ram0)
                                   ...
                                   /* UAF! */
                                   bdev-&gt;bd_disk-&gt;fops-&gt;release

Fix this problem by following what loop_init() does. Besides,
reintroduce brd_devices_mutex to help serialize modifications to
brd_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56693/">CVE-2024-56693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56693">CVE-2024-56693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235418">SUSE bug 1235418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235419">SUSE bug 1235419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56694</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56694" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56694" ref_url="https://www.suse.com/security/cve/CVE-2024-56694" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix recursive lock when verdict program return SK_PASS

When the stream_verdict program returns SK_PASS, it places the received skb
into its own receive queue, but a recursive lock eventually occurs, leading
to an operating system deadlock. This issue has been present since v6.9.

'''
sk_psock_strp_data_ready
    write_lock_bh(&amp;sk-&gt;sk_callback_lock)
    strp_data_ready
      strp_read_sock
        read_sock -&gt; tcp_read_sock
          strp_recv
            cb.rcv_msg -&gt; sk_psock_strp_read
              # now stream_verdict return SK_PASS without peer sock assign
              __SK_PASS = sk_psock_map_verd(SK_PASS, NULL)
              sk_psock_verdict_apply
                sk_psock_skb_ingress_self
                  sk_psock_skb_ingress_enqueue
                    sk_psock_data_ready
                      read_lock_bh(&amp;sk-&gt;sk_callback_lock) &lt;= dead lock

'''

This topic has been discussed before, but it has not been fixed.
Previous discussion:
https://lore.kernel.org/all/6684a5864ec86_403d20898@john.notmuch
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56694/">CVE-2024-56694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56694">CVE-2024-56694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235412">SUSE bug 1235412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56695</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56695" ref_url="https://www.suse.com/security/cve/CVE-2024-56695" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Use dynamic allocation for CU occupancy array in 'kfd_get_cu_occupancy()'

The `kfd_get_cu_occupancy` function previously declared a large
`cu_occupancy` array as a local variable, which could lead to stack
overflows due to excessive stack usage. This commit replaces the static
array allocation with dynamic memory allocation using `kcalloc`,
thereby reducing the stack size.

This change avoids the risk of stack overflows in kernel space,  in
scenarios where `AMDGPU_MAX_QUEUES` is large. The  allocated memory is
freed using `kfree` before the function returns  to prevent memory
leaks.

Fixes the below with gcc W=1:
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_process.c: In function 'kfd_get_cu_occupancy':
drivers/gpu/drm/amd/amdgpu/../amdkfd/kfd_process.c:322:1: warning: the frame size of 1056 bytes is larger than 1024 bytes [-Wframe-larger-than=]
  322 | }
      | ^
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56695/">CVE-2024-56695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56695">CVE-2024-56695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235541">SUSE bug 1235541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56696</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56696" ref_url="https://www.suse.com/security/cve/CVE-2024-56696" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: core: Fix possible NULL dereference caused by kunit_kzalloc()

kunit_kzalloc() may return a NULL pointer, dereferencing it without
NULL check may lead to NULL dereference.
Add NULL checks for all the kunit_kzalloc() in sound_kunit.c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56696/">CVE-2024-56696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56696">CVE-2024-56696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235539">SUSE bug 1235539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56697</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56697" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56697" ref_url="https://www.suse.com/security/cve/CVE-2024-56697" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the memory allocation issue in amdgpu_discovery_get_nps_info()

Fix two issues with memory allocation in amdgpu_discovery_get_nps_info()
for mem_ranges:

 - Add a check for allocation failure to avoid dereferencing a null
   pointer.

 - As suggested by Christophe, use kvcalloc() for memory allocation,
   which checks for multiplication overflow.

Additionally, assign the output parameters nps_type and range_cnt after
the kvcalloc() call to prevent modifying the output parameters in case
of an error return.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56697/">CVE-2024-56697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56697">CVE-2024-56697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235544">SUSE bug 1235544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56698</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56698" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56698" ref_url="https://www.suse.com/security/cve/CVE-2024-56698" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Fix looping of queued SG entries

The dwc3_request-&gt;num_queued_sgs is decremented on completion. If a
partially completed request is handled, then the
dwc3_request-&gt;num_queued_sgs no longer reflects the total number of
num_queued_sgs (it would be cleared).

Correctly check the number of request SG entries remained to be prepare
and queued. Failure to do this may cause null pointer dereference when
accessing non-existent SG entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56698/">CVE-2024-56698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56698">CVE-2024-56698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235491">SUSE bug 1235491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56699</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56699" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56699" ref_url="https://www.suse.com/security/cve/CVE-2024-56699" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pci: Fix potential double remove of hotplug slot

In commit 6ee600bfbe0f ("s390/pci: remove hotplug slot when releasing the
device") the zpci_exit_slot() was moved from zpci_device_reserved() to
zpci_release_device() with the intention of keeping the hotplug slot
around until the device is actually removed.

Now zpci_release_device() is only called once all references are
dropped. Since the zPCI subsystem only drops its reference once the
device is in the reserved state it follows that zpci_release_device()
must only deal with devices in the reserved state. Despite that it
contains code to tear down from both configured and standby state. For
the standby case this already includes the removal of the hotplug slot
so would cause a double removal if a device was ever removed in
either configured or standby state.

Instead of causing a potential double removal in a case that should
never happen explicitly WARN_ON() if a device in non-reserved state is
released and get rid of the dead code cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56699/">CVE-2024-56699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56699">CVE-2024-56699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235490">SUSE bug 1235490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56700</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56700" ref_url="https://www.suse.com/security/cve/CVE-2024-56700" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: wl128x: Fix atomicity violation in fmc_send_cmd()

Atomicity violation occurs when the fmc_send_cmd() function is executed
simultaneously with the modification of the fmdev-&gt;resp_skb value.
Consider a scenario where, after passing the validity check within the
function, a non-null fmdev-&gt;resp_skb variable is assigned a null value.
This results in an invalid fmdev-&gt;resp_skb variable passing the validity
check. As seen in the later part of the function, skb = fmdev-&gt;resp_skb;
when the invalid fmdev-&gt;resp_skb passes the check, a null pointer
dereference error may occur at line 478, evt_hdr = (void *)skb-&gt;data;

To address this issue, it is recommended to include the validity check of
fmdev-&gt;resp_skb within the locked section of the function. This
modification ensures that the value of fmdev-&gt;resp_skb does not change
during the validation process, thereby maintaining its validity.

This possible bug is found by an experimental static analysis tool
developed by our team. This tool analyzes the locking APIs
to extract function pairs that can be concurrently executed, and then
analyzes the instructions in the paired functions to identify possible
concurrency bugs including data races and atomicity violations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56700/">CVE-2024-56700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56700">CVE-2024-56700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235500">SUSE bug 1235500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56701</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56701" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56701" ref_url="https://www.suse.com/security/cve/CVE-2024-56701" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore

The dtl_access_lock needs to be a rw_sempahore, a sleeping lock, because
the code calls kmalloc() while holding it, which can sleep:

  # echo 1 &gt; /proc/powerpc/vcpudispatch_stats
  BUG: sleeping function called from invalid context at include/linux/sched/mm.h:337
  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 199, name: sh
  preempt_count: 1, expected: 0
  3 locks held by sh/199:
   #0: c00000000a0743f8 (sb_writers#3){.+.+}-{0:0}, at: vfs_write+0x324/0x438
   #1: c0000000028c7058 (dtl_enable_mutex){+.+.}-{3:3}, at: vcpudispatch_stats_write+0xd4/0x5f4
   #2: c0000000028c70b8 (dtl_access_lock){+.+.}-{2:2}, at: vcpudispatch_stats_write+0x220/0x5f4
  CPU: 0 PID: 199 Comm: sh Not tainted 6.10.0-rc4 #152
  Hardware name: IBM pSeries (emulated by qemu) POWER9 (raw) 0x4e1202 0xf000005 of:SLOF,HEAD hv:linux,kvm pSeries
  Call Trace:
    dump_stack_lvl+0x130/0x148 (unreliable)
    __might_resched+0x174/0x410
    kmem_cache_alloc_noprof+0x340/0x3d0
    alloc_dtl_buffers+0x124/0x1ac
    vcpudispatch_stats_write+0x2a8/0x5f4
    proc_reg_write+0xf4/0x150
    vfs_write+0xfc/0x438
    ksys_write+0x88/0x148
    system_call_exception+0x1c4/0x5a0
    system_call_common+0xf4/0x258
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56701/">CVE-2024-56701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56701">CVE-2024-56701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235496">SUSE bug 1235496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56702</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56702" ref_url="https://www.suse.com/security/cve/CVE-2024-56702" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Mark raw_tp arguments with PTR_MAYBE_NULL

Arguments to a raw tracepoint are tagged as trusted, which carries the
semantics that the pointer will be non-NULL.  However, in certain cases,
a raw tracepoint argument may end up being NULL. More context about this
issue is available in [0].

Thus, there is a discrepancy between the reality, that raw_tp arguments
can actually be NULL, and the verifier's knowledge, that they are never
NULL, causing explicit NULL checks to be deleted, and accesses to such
pointers potentially crashing the kernel.

To fix this, mark raw_tp arguments as PTR_MAYBE_NULL, and then special
case the dereference and pointer arithmetic to permit it, and allow
passing them into helpers/kfuncs; these exceptions are made for raw_tp
programs only. Ensure that we don't do this when ref_obj_id &gt; 0, as in
that case this is an acquired object and doesn't need such adjustment.

The reason we do mask_raw_tp_trusted_reg logic is because other will
recheck in places whether the register is a trusted_reg, and then
consider our register as untrusted when detecting the presence of the
PTR_MAYBE_NULL flag.

To allow safe dereference, we enable PROBE_MEM marking when we see loads
into trusted pointers with PTR_MAYBE_NULL.

While trusted raw_tp arguments can also be passed into helpers or kfuncs
where such broken assumption may cause issues, a future patch set will
tackle their case separately, as PTR_TO_BTF_ID (without PTR_TRUSTED) can
already be passed into helpers and causes similar problems. Thus, they
are left alone for now.

It is possible that these checks also permit passing non-raw_tp args
that are trusted PTR_TO_BTF_ID with null marking. In such a case,
allowing dereference when pointer is NULL expands allowed behavior, so
won't regress existing programs, and the case of passing these into
helpers is the same as above and will be dealt with later.

Also update the failure case in tp_btf_nullable selftest to capture the
new behavior, as the verifier will no longer cause an error when
directly dereference a raw tracepoint argument marked as __nullable.

  [0]: https://lore.kernel.org/bpf/ZrCZS6nisraEqehw@jlelli-thinkpadt14gen4.remote.csb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56702/">CVE-2024-56702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56702">CVE-2024-56702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235501">SUSE bug 1235501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56703</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56703" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56703" ref_url="https://www.suse.com/security/cve/CVE-2024-56703" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix soft lockups in fib6_select_path under high next hop churn

Soft lockups have been observed on a cluster of Linux-based edge routers
located in a highly dynamic environment. Using the `bird` service, these
routers continuously update BGP-advertised routes due to frequently
changing nexthop destinations, while also managing significant IPv6
traffic. The lockups occur during the traversal of the multipath
circular linked-list in the `fib6_select_path` function, particularly
while iterating through the siblings in the list. The issue typically
arises when the nodes of the linked list are unexpectedly deleted
concurrently on a different core—indicated by their 'next' and
'previous' elements pointing back to the node itself and their reference
count dropping to zero. This results in an infinite loop, leading to a
soft lockup that triggers a system panic via the watchdog timer.

Apply RCU primitives in the problematic code sections to resolve the
issue. Where necessary, update the references to fib6_siblings to
annotate or use the RCU APIs.

Include a test script that reproduces the issue. The script
periodically updates the routing table while generating a heavy load
of outgoing IPv6 traffic through multiple iperf3 clients. It
consistently induces infinite soft lockups within a couple of minutes.

Kernel log:

 0 [ffffbd13003e8d30] machine_kexec at ffffffff8ceaf3eb
 1 [ffffbd13003e8d90] __crash_kexec at ffffffff8d0120e3
 2 [ffffbd13003e8e58] panic at ffffffff8cef65d4
 3 [ffffbd13003e8ed8] watchdog_timer_fn at ffffffff8d05cb03
 4 [ffffbd13003e8f08] __hrtimer_run_queues at ffffffff8cfec62f
 5 [ffffbd13003e8f70] hrtimer_interrupt at ffffffff8cfed756
 6 [ffffbd13003e8fd0] __sysvec_apic_timer_interrupt at ffffffff8cea01af
 7 [ffffbd13003e8ff0] sysvec_apic_timer_interrupt at ffffffff8df1b83d
-- &lt;IRQ stack&gt; --
 8 [ffffbd13003d3708] asm_sysvec_apic_timer_interrupt at ffffffff8e000ecb
    [exception RIP: fib6_select_path+299]
    RIP: ffffffff8ddafe7b  RSP: ffffbd13003d37b8  RFLAGS: 00000287
    RAX: ffff975850b43600  RBX: ffff975850b40200  RCX: 0000000000000000
    RDX: 000000003fffffff  RSI: 0000000051d383e4  RDI: ffff975850b43618
    RBP: ffffbd13003d3800   R8: 0000000000000000   R9: ffff975850b40200
    R10: 0000000000000000  R11: 0000000000000000  R12: ffffbd13003d3830
    R13: ffff975850b436a8  R14: ffff975850b43600  R15: 0000000000000007
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
 9 [ffffbd13003d3808] ip6_pol_route at ffffffff8ddb030c
10 [ffffbd13003d3888] ip6_pol_route_input at ffffffff8ddb068c
11 [ffffbd13003d3898] fib6_rule_lookup at ffffffff8ddf02b5
12 [ffffbd13003d3928] ip6_route_input at ffffffff8ddb0f47
13 [ffffbd13003d3a18] ip6_rcv_finish_core.constprop.0 at ffffffff8dd950d0
14 [ffffbd13003d3a30] ip6_list_rcv_finish.constprop.0 at ffffffff8dd96274
15 [ffffbd13003d3a98] ip6_sublist_rcv at ffffffff8dd96474
16 [ffffbd13003d3af8] ipv6_list_rcv at ffffffff8dd96615
17 [ffffbd13003d3b60] __netif_receive_skb_list_core at ffffffff8dc16fec
18 [ffffbd13003d3be0] netif_receive_skb_list_internal at ffffffff8dc176b3
19 [ffffbd13003d3c50] napi_gro_receive at ffffffff8dc565b9
20 [ffffbd13003d3c80] ice_receive_skb at ffffffffc087e4f5 [ice]
21 [ffffbd13003d3c90] ice_clean_rx_irq at ffffffffc0881b80 [ice]
22 [ffffbd13003d3d20] ice_napi_poll at ffffffffc088232f [ice]
23 [ffffbd13003d3d80] __napi_poll at ffffffff8dc18000
24 [ffffbd13003d3db8] net_rx_action at ffffffff8dc18581
25 [ffffbd13003d3e40] __do_softirq at ffffffff8df352e9
26 [ffffbd13003d3eb0] run_ksoftirqd at ffffffff8ceffe47
27 [ffffbd13003d3ec0] smpboot_thread_fn at ffffffff8cf36a30
28 [ffffbd13003d3ee8] kthread at ffffffff8cf2b39f
29 [ffffbd13003d3f28] ret_from_fork at ffffffff8ce5fa64
30 [ffffbd13003d3f50] ret_from_fork_asm at ffffffff8ce03cbb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-09"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56703/">CVE-2024-56703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56703">CVE-2024-56703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235455">SUSE bug 1235455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56704</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56704" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56704" ref_url="https://www.suse.com/security/cve/CVE-2024-56704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

9p/xen: fix release of IRQ

Kernel logs indicate an IRQ was double-freed.

Pass correct device ID during IRQ release.

[Dominique: remove confusing variable reset to 0]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56704/">CVE-2024-56704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56704">CVE-2024-56704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235584">SUSE bug 1235584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56705</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56705" ref_url="https://www.suse.com/security/cve/CVE-2024-56705" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: atomisp: Add check for rgby_data memory allocation failure

In ia_css_3a_statistics_allocate(), there is no check on the allocation
result of the rgby_data memory. If rgby_data is not successfully
allocated, it may trigger the assert(host_stats-&gt;rgby_data) assertion in
ia_css_s3a_hmem_decode(). Adding a check to fix this potential issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56705/">CVE-2024-56705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56705">CVE-2024-56705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235568">SUSE bug 1235568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56706</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56706" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56706" ref_url="https://www.suse.com/security/cve/CVE-2024-56706" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cpum_sf: Fix and protect memory allocation of SDBs with mutex

Reservation of the PMU hardware is done at first event creation
and is protected by a pair of mutex_lock() and mutex_unlock().
After reservation of the PMU hardware the memory
required for the PMUs the event is to be installed on is
allocated by allocate_buffers() and alloc_sampling_buffer().
This done outside of the mutex protection.
Without mutex protection two or more concurrent invocations of
perf_event_init() may run in parallel.
This can lead to allocation of Sample Data Blocks (SDBs)
multiple times for the same PMU.
Prevent this and protect memory allocation of SDBs by
mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56706/">CVE-2024-56706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56706">CVE-2024-56706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235586">SUSE bug 1235586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56707</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56707" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56707" ref_url="https://www.suse.com/security/cve/CVE-2024-56707" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c

Add error pointer checks after calling otx2_mbox_get_rsp().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56707/">CVE-2024-56707 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56707">CVE-2024-56707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235545">SUSE bug 1235545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56708</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56708" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56708" ref_url="https://www.suse.com/security/cve/CVE-2024-56708" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/igen6: Avoid segmentation fault on module unload

The segmentation fault happens because:

During modprobe:
1. In igen6_probe(), igen6_pvt will be allocated with kzalloc()
2. In igen6_register_mci(), mci-&gt;pvt_info will point to
   &amp;igen6_pvt-&gt;imc[mc]

During rmmod:
1. In mci_release() in edac_mc.c, it will kfree(mci-&gt;pvt_info)
2. In igen6_remove(), it will kfree(igen6_pvt);

Fix this issue by setting mci-&gt;pvt_info to NULL to avoid the double
kfree.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56708/">CVE-2024-56708 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56708">CVE-2024-56708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235564">SUSE bug 1235564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56709</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56709" ref_url="https://www.suse.com/security/cve/CVE-2024-56709" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check if iowq is killed before queuing

task work can be executed after the task has gone through io_uring
termination, whether it's the final task_work run or the fallback path.
In this case, task work will find -&gt;io_wq being already killed and
null'ed, which is a problem if it then tries to forward the request to
io_queue_iowq(). Make io_queue_iowq() fail requests in this case.

Note that it also checks PF_KTHREAD, because the user can first close
a DEFER_TASKRUN ring and shortly after kill the task, in which case
-&gt;iowq check would race.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56709/">CVE-2024-56709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235552">SUSE bug 1235552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56710</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56710" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56710" ref_url="https://www.suse.com/security/cve/CVE-2024-56710" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix memory leak in ceph_direct_read_write()

The bvecs array which is allocated in iter_get_bvecs_alloc() is leaked
and pages remain pinned if ceph_alloc_sparse_ext_map() fails.

There is no need to delay the allocation of sparse_ext map until after
the bvecs array is set up, so fix this by moving sparse_ext allocation
a bit earlier.  Also, make a similar adjustment in __ceph_sync_read()
for consistency (a leak of the same kind in __ceph_sync_read() has been
addressed differently).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56710/">CVE-2024-56710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56710">CVE-2024-56710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235553">SUSE bug 1235553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56711</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56711" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56711" ref_url="https://www.suse.com/security/cve/CVE-2024-56711" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel: himax-hx83102: Add a check to prevent NULL pointer dereference

drm_mode_duplicate() could return NULL due to lack of memory,
which will then call NULL pointer dereference. Add a check to
prevent it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56711/">CVE-2024-56711 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56711">CVE-2024-56711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235562">SUSE bug 1235562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56712</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56712" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56712" ref_url="https://www.suse.com/security/cve/CVE-2024-56712" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: fix memory leak on last export_udmabuf() error path

In export_udmabuf(), if dma_buf_fd() fails because the FD table is full, a
dma_buf owning the udmabuf has already been created; but the error handling
in udmabuf_create() will tear down the udmabuf without doing anything about
the containing dma_buf.

This leaves a dma_buf in memory that contains a dangling pointer; though
that doesn't seem to lead to anything bad except a memory leak.

Fix it by moving the dma_buf_fd() call out of export_udmabuf() so that we
can give it different error handling.

Note that the shape of this code changed a lot in commit 5e72b2b41a21
("udmabuf: convert udmabuf driver to use folios"); but the memory leak
seems to have existed since the introduction of udmabuf.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56712/">CVE-2024-56712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56712">CVE-2024-56712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235565">SUSE bug 1235565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56713</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56713" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56713" ref_url="https://www.suse.com/security/cve/CVE-2024-56713" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netdevsim: fix nsim_pp_hold_write()

nsim_pp_hold_write() has two problems:

1) It may return with rtnl held, as found by syzbot.

2) Its return value does not propagate an error if any.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56713/">CVE-2024-56713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56713">CVE-2024-56713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235554">SUSE bug 1235554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56714</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56714" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56714" ref_url="https://www.suse.com/security/cve/CVE-2024-56714" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: no double destroy workqueue

There are some FW error handling paths that can cause us to
try to destroy the workqueue more than once, so let's be sure
we're checking for that.

The case where this popped up was in an AER event where the
handlers got called in such a way that ionic_reset_prepare()
and thus ionic_dev_teardown() got called twice in a row.
The second time through the workqueue was already destroyed,
and destroy_workqueue() choked on the bad wq pointer.

We didn't hit this in AER handler testing before because at
that time we weren't using a private workqueue.  Later we
replaced the use of the system workqueue with our own private
workqueue but hadn't rerun the AER handler testing since then.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56714/">CVE-2024-56714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56714">CVE-2024-56714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235558">SUSE bug 1235558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56715</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56715" ref_url="https://www.suse.com/security/cve/CVE-2024-56715" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: Fix netdev notifier unregister on failure

If register_netdev() fails, then the driver leaks the netdev notifier.
Fix this by calling ionic_lif_unregister() on register_netdev()
failure. This will also call ionic_lif_unregister_phc() if it has
already been registered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56715/">CVE-2024-56715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56715">CVE-2024-56715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235612">SUSE bug 1235612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56716</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56716" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56716" ref_url="https://www.suse.com/security/cve/CVE-2024-56716" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: prevent bad user input in nsim_dev_health_break_write()

If either a zero count or a large one is provided, kernel can crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56716/">CVE-2024-56716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56716">CVE-2024-56716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235587">SUSE bug 1235587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56717</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56717" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56717" ref_url="https://www.suse.com/security/cve/CVE-2024-56717" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mscc: ocelot: fix incorrect IFH SRC_PORT field in ocelot_ifh_set_basic()

Packets injected by the CPU should have a SRC_PORT field equal to the
CPU port module index in the Analyzer block (ocelot-&gt;num_phys_ports).

The blamed commit copied the ocelot_ifh_set_basic() call incorrectly
from ocelot_xmit_common() in net/dsa/tag_ocelot.c. Instead of calling
with "x", it calls with BIT_ULL(x), but the field is not a port mask,
but rather a single port index.

[ side note: this is the technical debt of code duplication :( ]

The error used to be silent and doesn't appear to have other
user-visible manifestations, but with new changes in the packing
library, it now fails loudly as follows:

------------[ cut here ]------------
Cannot store 0x40 inside bits 46-43 - will truncate
sja1105 spi2.0: xmit timed out
WARNING: CPU: 1 PID: 102 at lib/packing.c:98 __pack+0x90/0x198
sja1105 spi2.0: timed out polling for tstamp
CPU: 1 UID: 0 PID: 102 Comm: felix_xmit
Tainted: G        W        N 6.13.0-rc1-00372-gf706b85d972d-dirty #2605
Call trace:
 __pack+0x90/0x198 (P)
 __pack+0x90/0x198 (L)
 packing+0x78/0x98
 ocelot_ifh_set_basic+0x260/0x368
 ocelot_port_inject_frame+0xa8/0x250
 felix_port_deferred_xmit+0x14c/0x258
 kthread_worker_fn+0x134/0x350
 kthread+0x114/0x138

The code path pertains to the ocelot switchdev driver and to the felix
secondary DSA tag protocol, ocelot-8021q. Here seen with ocelot-8021q.

The messenger (packing) is not really to blame, so fix the original
commit instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56717/">CVE-2024-56717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56717">CVE-2024-56717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235588">SUSE bug 1235588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56718</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56718" ref_url="https://www.suse.com/security/cve/CVE-2024-56718" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: protect link down work from execute after lgr freed

link down work may be scheduled before lgr freed but execute
after lgr freed, which may result in crash. So it is need to
hold a reference before shedule link down work, and put the
reference after work executed or canceled.

The relevant crash call stack as follows:
 list_del corruption. prev-&gt;next should be ffffb638c9c0fe20,
    but was 0000000000000000
 ------------[ cut here ]------------
 kernel BUG at lib/list_debug.c:51!
 invalid opcode: 0000 [#1] SMP NOPTI
 CPU: 6 PID: 978112 Comm: kworker/6:119 Kdump: loaded Tainted: G #1
 Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 2221b89 04/01/2014
 Workqueue: events smc_link_down_work [smc]
 RIP: 0010:__list_del_entry_valid.cold+0x31/0x47
 RSP: 0018:ffffb638c9c0fdd8 EFLAGS: 00010086
 RAX: 0000000000000054 RBX: ffff942fb75e5128 RCX: 0000000000000000
 RDX: ffff943520930aa0 RSI: ffff94352091fc80 RDI: ffff94352091fc80
 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb638c9c0fc38
 R10: ffffb638c9c0fc30 R11: ffffffffa015eb28 R12: 0000000000000002
 R13: ffffb638c9c0fe20 R14: 0000000000000001 R15: ffff942f9cd051c0
 FS:  0000000000000000(0000) GS:ffff943520900000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f4f25214000 CR3: 000000025fbae004 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  rwsem_down_write_slowpath+0x17e/0x470
  smc_link_down_work+0x3c/0x60 [smc]
  process_one_work+0x1ac/0x350
  worker_thread+0x49/0x2f0
  ? rescuer_thread+0x360/0x360
  kthread+0x118/0x140
  ? __kthread_bind_mask+0x60/0x60
  ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56718/">CVE-2024-56718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56718">CVE-2024-56718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235589">SUSE bug 1235589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56719</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56719" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56719" ref_url="https://www.suse.com/security/cve/CVE-2024-56719" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix TSO DMA API usage causing oops

Commit 66600fac7a98 ("net: stmmac: TSO: Fix unbalanced DMA map/unmap
for non-paged SKB data") moved the assignment of tx_skbuff_dma[]'s
members to be later in stmmac_tso_xmit().

The buf (dma cookie) and len stored in this structure are passed to
dma_unmap_single() by stmmac_tx_clean(). The DMA API requires that
the dma cookie passed to dma_unmap_single() is the same as the value
returned from dma_map_single(). However, by moving the assignment
later, this is not the case when priv-&gt;dma_cap.addr64 &gt; 32 as "des"
is offset by proto_hdr_len.

This causes problems such as:

  dwc-eth-dwmac 2490000.ethernet eth0: Tx DMA map failed

and with DMA_API_DEBUG enabled:

  DMA-API: dwc-eth-dwmac 2490000.ethernet: device driver tries to +free DMA memory it has not allocated [device address=0x000000ffffcf65c0] [size=66 bytes]

Fix this by maintaining "des" as the original DMA cookie, and use
tso_des to pass the offset DMA cookie to stmmac_tso_allocator().

Full details of the crashes can be found at:
https://lore.kernel.org/all/d8112193-0386-4e14-b516-37c2d838171a@nvidia.com/
https://lore.kernel.org/all/klkzp5yn5kq5efgtrow6wbvnc46bcqfxs65nz3qy77ujr5turc@bwwhelz2l4dw/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56719/">CVE-2024-56719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56719">CVE-2024-56719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235591">SUSE bug 1235591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56720</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56720" ref_url="https://www.suse.com/security/cve/CVE-2024-56720" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Several fixes to bpf_msg_pop_data

Several fixes to bpf_msg_pop_data,
1. In sk_msg_shift_left, we should put_page
2. if (len == 0), return early is better
3. pop the entire sk_msg (last == msg-&gt;sg.size) should be supported
4. Fix for the value of variable "a"
5. In sk_msg_shift_left, after shifting, i has already pointed to the next
element. Addtional sk_msg_iter_var_next may result in BUG.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56720/">CVE-2024-56720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56720">CVE-2024-56720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235592">SUSE bug 1235592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56721</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56721" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56721" ref_url="https://www.suse.com/security/cve/CVE-2024-56721" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Terminate the erratum_1386_microcode array

The erratum_1386_microcode array requires an empty entry at the end.
Otherwise x86_match_cpu_with_stepping() will continue iterate the array after
it ended.

Add an empty entry to erratum_1386_microcode to its end.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56721/">CVE-2024-56721 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56721">CVE-2024-56721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235566">SUSE bug 1235566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56722</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56722" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56722" ref_url="https://www.suse.com/security/cve/CVE-2024-56722" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix cpu stuck caused by printings during reset

During reset, cmd to destroy resources such as qp, cq, and mr may fail,
and error logs will be printed. When a large number of resources are
destroyed, there will be lots of printings, and it may lead to a cpu
stuck.

Delete some unnecessary printings and replace other printing functions
in these paths with the ratelimited version.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56722/">CVE-2024-56722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56722">CVE-2024-56722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235570">SUSE bug 1235570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56723</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56723" ref_url="https://www.suse.com/security/cve/CVE-2024-56723" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for PMIC devices

While design wise the idea of converting the driver to use
the hierarchy of the IRQ chips is correct, the implementation
has (inherited) flaws. This was unveiled when platform_get_irq()
had started WARN() on IRQ 0 that is supposed to be a Linux
IRQ number (also known as vIRQ).

Rework the driver to respect IRQ domain when creating each MFD
device separately, as the domain is not the same for all of them.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56723/">CVE-2024-56723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56723">CVE-2024-56723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235571">SUSE bug 1235571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56724</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56724" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56724" ref_url="https://www.suse.com/security/cve/CVE-2024-56724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device

While design wise the idea of converting the driver to use
the hierarchy of the IRQ chips is correct, the implementation
has (inherited) flaws. This was unveiled when platform_get_irq()
had started WARN() on IRQ 0 that is supposed to be a Linux
IRQ number (also known as vIRQ).

Rework the driver to respect IRQ domain when creating each MFD
device separately, as the domain is not the same for all of them.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56724/">CVE-2024-56724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56724">CVE-2024-56724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235577">SUSE bug 1235577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56725</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56725" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56725" ref_url="https://www.suse.com/security/cve/CVE-2024-56725" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dcbnl.c

Add error pointer check after calling otx2_mbox_get_rsp().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56725/">CVE-2024-56725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56725">CVE-2024-56725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235578">SUSE bug 1235578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56727</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56727" ref_url="https://www.suse.com/security/cve/CVE-2024-56727" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_flows.c

Adding error pointer check after calling otx2_mbox_get_rsp().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56727/">CVE-2024-56727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56727">CVE-2024-56727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235583">SUSE bug 1235583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56728</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56728" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56728" ref_url="https://www.suse.com/security/cve/CVE-2024-56728" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_ethtool.c

Add error pointer check after calling otx2_mbox_get_rsp().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56728/">CVE-2024-56728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56728">CVE-2024-56728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235656">SUSE bug 1235656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56729</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56729" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56729" ref_url="https://www.suse.com/security/cve/CVE-2024-56729" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Initialize cfid-&gt;tcon before performing network ops

Avoid leaking a tcon ref when a lease break races with opening the
cached directory. Processing the leak break might take a reference to
the tcon in cached_dir_lease_break() and then fail to release the ref in
cached_dir_offload_close, since cfid-&gt;tcon is still NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56729/">CVE-2024-56729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56729">CVE-2024-56729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235503">SUSE bug 1235503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56730</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56730" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56730" ref_url="https://www.suse.com/security/cve/CVE-2024-56730" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/9p/usbg: fix handling of the failed kzalloc() memory allocation

On the linux-next, next-20241108 vanilla kernel, the coccinelle tool gave the
following error report:

./net/9p/trans_usbg.c:912:5-11: ERROR: allocation function on line 911 returns
NULL not ERR_PTR on failure

kzalloc() failure is fixed to handle the NULL return case on the memory exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56730/">CVE-2024-56730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56730">CVE-2024-56730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235610">SUSE bug 1235610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56739</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56739" ref_url="https://www.suse.com/security/cve/CVE-2024-56739" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56739/">CVE-2024-56739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56739">CVE-2024-56739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235611">SUSE bug 1235611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56740</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56740" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56740" ref_url="https://www.suse.com/security/cve/CVE-2024-56740" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56740/">CVE-2024-56740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56740">CVE-2024-56740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234932">SUSE bug 1234932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56741</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56741" ref_url="https://www.suse.com/security/cve/CVE-2024-56741" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56741/">CVE-2024-56741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56741">CVE-2024-56741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235502">SUSE bug 1235502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56742</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56742" ref_url="https://www.suse.com/security/cve/CVE-2024-56742" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56742/">CVE-2024-56742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56742">CVE-2024-56742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235613">SUSE bug 1235613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56743</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56743" ref_url="https://www.suse.com/security/cve/CVE-2024-56743" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56743/">CVE-2024-56743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56743">CVE-2024-56743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235614">SUSE bug 1235614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56744</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56744" ref_url="https://www.suse.com/security/cve/CVE-2024-56744" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56744/">CVE-2024-56744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56744">CVE-2024-56744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234933">SUSE bug 1234933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56745</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56745" ref_url="https://www.suse.com/security/cve/CVE-2024-56745" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2025-01-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56745/">CVE-2024-56745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56745">CVE-2024-56745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235563">SUSE bug 1235563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56746</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56746" ref_url="https://www.suse.com/security/cve/CVE-2024-56746" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56746/">CVE-2024-56746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56746">CVE-2024-56746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235622">SUSE bug 1235622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56747</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56747" ref_url="https://www.suse.com/security/cve/CVE-2024-56747" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56747/">CVE-2024-56747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56747">CVE-2024-56747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234934">SUSE bug 1234934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56748</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56748" ref_url="https://www.suse.com/security/cve/CVE-2024-56748" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56748/">CVE-2024-56748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56748">CVE-2024-56748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235627">SUSE bug 1235627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56749</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56749" ref_url="https://www.suse.com/security/cve/CVE-2024-56749" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56749/">CVE-2024-56749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56749">CVE-2024-56749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235628">SUSE bug 1235628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56750</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56750" ref_url="https://www.suse.com/security/cve/CVE-2024-56750" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56750/">CVE-2024-56750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56750">CVE-2024-56750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235630">SUSE bug 1235630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56751</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56751" ref_url="https://www.suse.com/security/cve/CVE-2024-56751" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56751/">CVE-2024-56751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56751">CVE-2024-56751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234936">SUSE bug 1234936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56752</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56752" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56752" ref_url="https://www.suse.com/security/cve/CVE-2024-56752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56752/">CVE-2024-56752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56752">CVE-2024-56752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234937">SUSE bug 1234937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56753</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56753" ref_url="https://www.suse.com/security/cve/CVE-2024-56753" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/gfx9: Add Cleaner Shader Deinitialization in gfx_v9_0 Module

This commit addresses an omission in the previous patch related to the
cleaner shader support for GFX9 hardware. Specifically, it adds the
necessary deinitialization code for the cleaner shader in the
gfx_v9_0_sw_fini function.

The added line amdgpu_gfx_cleaner_shader_sw_fini(adev); ensures that any
allocated resources for the cleaner shader are freed correctly, avoiding
potential memory leaks and ensuring that the GPU state is clean for the
next initialization sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56753/">CVE-2024-56753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56753">CVE-2024-56753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235631">SUSE bug 1235631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56754</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56754" ref_url="https://www.suse.com/security/cve/CVE-2024-56754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: caam - Fix the pointer passed to caam_qi_shutdown()

The type of the last parameter given to devm_add_action_or_reset() is
"struct caam_drv_private *", but in caam_qi_shutdown(), it is casted to
"struct device *".

Pass the correct parameter to devm_add_action_or_reset() so that the
resources are released as expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56754/">CVE-2024-56754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56754">CVE-2024-56754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234918">SUSE bug 1234918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56755</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56755" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56755" ref_url="https://www.suse.com/security/cve/CVE-2024-56755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs/fscache: Add a memory barrier for FSCACHE_VOLUME_CREATING

In fscache_create_volume(), there is a missing memory barrier between the
bit-clearing operation and the wake-up operation. This may cause a
situation where, after a wake-up, the bit-clearing operation hasn't been
detected yet, leading to an indefinite wait. The triggering process is as
follows:

  [cookie1]                [cookie2]                  [volume_work]
fscache_perform_lookup
  fscache_create_volume
                        fscache_perform_lookup
                          fscache_create_volume
			                        fscache_create_volume_work
                                                  cachefiles_acquire_volume
                                                  clear_and_wake_up_bit
    test_and_set_bit
                            test_and_set_bit
                              goto maybe_wait
      goto no_wait

In the above process, cookie1 and cookie2 has the same volume. When cookie1
enters the -no_wait- process, it will clear the bit and wake up the waiting
process. If a barrier is missing, it may cause cookie2 to remain in the
-wait- process indefinitely.

In commit 3288666c7256 ("fscache: Use clear_and_wake_up_bit() in
fscache_create_volume_work()"), barriers were added to similar operations
in fscache_create_volume_work(), but fscache_create_volume() was missed.

By combining the clear and wake operations into clear_and_wake_up_bit() to
fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56755/">CVE-2024-56755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56755">CVE-2024-56755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234920">SUSE bug 1234920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56756</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56756" ref_url="https://www.suse.com/security/cve/CVE-2024-56756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix freeing of the HMB descriptor table

The HMB descriptor table is sized to the maximum number of descriptors
that could be used for a given device, but __nvme_alloc_host_mem could
break out of the loop earlier on memory allocation failure and end up
using less descriptors than planned for, which leads to an incorrect
size passed to dma_free_coherent.

In practice this was not showing up because the number of descriptors
tends to be low and the dma coherent allocator always allocates and
frees at least a page.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56756/">CVE-2024-56756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56756">CVE-2024-56756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234922">SUSE bug 1234922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56757</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56757" ref_url="https://www.suse.com/security/cve/CVE-2024-56757" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: add intf release flow when usb disconnect

MediaTek claim an special usb intr interface for ISO data transmission.
The interface need to be released before unregistering hci device when
usb disconnect. Removing BT usb dongle without properly releasing the
interface may cause Kernel panic while unregister hci device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56757/">CVE-2024-56757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56757">CVE-2024-56757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235619">SUSE bug 1235619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56758</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56758" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56758" ref_url="https://www.suse.com/security/cve/CVE-2024-56758" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: check folio mapping after unlock in relocate_one_folio()

When we call btrfs_read_folio() to bring a folio uptodate, we unlock the
folio. The result of that is that a different thread can modify the
mapping (like remove it with invalidate) before we call folio_lock().
This results in an invalid page and we need to try again.

In particular, if we are relocating concurrently with aborting a
transaction, this can result in a crash like the following:

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 76 PID: 1411631 Comm: kworker/u322:5
  Workqueue: events_unbound btrfs_reclaim_bgs_work
  RIP: 0010:set_page_extent_mapped+0x20/0xb0
  RSP: 0018:ffffc900516a7be8 EFLAGS: 00010246
  RAX: ffffea009e851d08 RBX: ffffea009e0b1880 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: ffffc900516a7b90 RDI: ffffea009e0b1880
  RBP: 0000000003573000 R08: 0000000000000001 R09: ffff88c07fd2f3f0
  R10: 0000000000000000 R11: 0000194754b575be R12: 0000000003572000
  R13: 0000000003572fff R14: 0000000000100cca R15: 0000000005582fff
  FS:  0000000000000000(0000) GS:ffff88c07fd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 000000407d00f002 CR4: 00000000007706f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
  &lt;TASK&gt;
  ? __die+0x78/0xc0
  ? page_fault_oops+0x2a8/0x3a0
  ? __switch_to+0x133/0x530
  ? wq_worker_running+0xa/0x40
  ? exc_page_fault+0x63/0x130
  ? asm_exc_page_fault+0x22/0x30
  ? set_page_extent_mapped+0x20/0xb0
  relocate_file_extent_cluster+0x1a7/0x940
  relocate_data_extent+0xaf/0x120
  relocate_block_group+0x20f/0x480
  btrfs_relocate_block_group+0x152/0x320
  btrfs_relocate_chunk+0x3d/0x120
  btrfs_reclaim_bgs_work+0x2ae/0x4e0
  process_scheduled_works+0x184/0x370
  worker_thread+0xc6/0x3e0
  ? blk_add_timer+0xb0/0xb0
  kthread+0xae/0xe0
  ? flush_tlb_kernel_range+0x90/0x90
  ret_from_fork+0x2f/0x40
  ? flush_tlb_kernel_range+0x90/0x90
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

This occurs because cleanup_one_transaction() calls
destroy_delalloc_inodes() which calls invalidate_inode_pages2() which
takes the folio_lock before setting mapping to NULL. We fail to check
this, and subsequently call set_extent_mapping(), which assumes that
mapping != NULL (in fact it asserts that in debug mode)

Note that the "fixes" patch here is not the one that introduced the
race (the very first iteration of this code from 2009) but a more recent
change that made this particular crash happen in practice.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56758/">CVE-2024-56758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56758">CVE-2024-56758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235621">SUSE bug 1235621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56759</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56759" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56759" ref_url="https://www.suse.com/security/cve/CVE-2024-56759" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free when COWing tree bock and tracing is enabled

When a COWing a tree block, at btrfs_cow_block(), and we have the
tracepoint trace_btrfs_cow_block() enabled and preemption is also enabled
(CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent
buffer while inside the tracepoint code. This is because in some paths
that call btrfs_cow_block(), such as btrfs_search_slot(), we are holding
the last reference on the extent buffer @buf so btrfs_force_cow_block()
drops the last reference on the @buf extent buffer when it calls
free_extent_buffer_stale(buf), which schedules the release of the extent
buffer with RCU. This means that if we are on a kernel with preemption,
the current task may be preempted before calling trace_btrfs_cow_block()
and the extent buffer already released by the time trace_btrfs_cow_block()
is called, resulting in a use-after-free.

Fix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to
btrfs_force_cow_block() before the COWed extent buffer is freed.
This also has a side effect of invoking the tracepoint in the tree defrag
code, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is
called there, but this is fine and it was actually missing there.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56759/">CVE-2024-56759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56759">CVE-2024-56759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235645">SUSE bug 1235645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236569">SUSE bug 1236569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56760</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56760" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56760" ref_url="https://www.suse.com/security/cve/CVE-2024-56760" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/MSI: Handle lack of irqdomain gracefully

Alexandre observed a warning emitted from pci_msi_setup_msi_irqs() on a
RISCV platform which does not provide PCI/MSI support:

 WARNING: CPU: 1 PID: 1 at drivers/pci/msi/msi.h:121 pci_msi_setup_msi_irqs+0x2c/0x32
 __pci_enable_msix_range+0x30c/0x596
 pci_msi_setup_msi_irqs+0x2c/0x32
 pci_alloc_irq_vectors_affinity+0xb8/0xe2

RISCV uses hierarchical interrupt domains and correctly does not implement
the legacy fallback. The warning triggers from the legacy fallback stub.

That warning is bogus as the PCI/MSI layer knows whether a PCI/MSI parent
domain is associated with the device or not. There is a check for MSI-X,
which has a legacy assumption. But that legacy fallback assumption is only
valid when legacy support is enabled, but otherwise the check should simply
return -ENOTSUPP.

Loongarch tripped over the same problem and blindly enabled legacy support
without implementing the legacy fallbacks. There are weak implementations
which return an error, so the problem was papered over.

Correct pci_msi_domain_supports() to evaluate the legacy mode and add
the missing supported check into the MSI enable path to complete it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56760/">CVE-2024-56760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235616">SUSE bug 1235616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56761</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56761" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56761" ref_url="https://www.suse.com/security/cve/CVE-2024-56761" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fred: Clear WFE in missing-ENDBRANCH #CPs

An indirect branch instruction sets the CPU indirect branch tracker
(IBT) into WAIT_FOR_ENDBRANCH (WFE) state and WFE stays asserted
across the instruction boundary.  When the decoder finds an
inappropriate instruction while WFE is set ENDBR, the CPU raises a #CP
fault.

For the "kernel IBT no ENDBR" selftest where #CPs are deliberately
triggered, the WFE state of the interrupted context needs to be
cleared to let execution continue.  Otherwise when the CPU resumes
from the instruction that just caused the previous #CP, another
missing-ENDBRANCH #CP is raised and the CPU enters a dead loop.

This is not a problem with IDT because it doesn't preserve WFE and
IRET doesn't set WFE.  But FRED provides space on the entry stack
(in an expanded CS area) to save and restore the WFE state, thus the
WFE state is no longer clobbered, so software must clear it.

Clear WFE to avoid dead looping in ibt_clear_fred_wfe() and the
!ibt_fatal code path when execution is allowed to continue.

Clobbering WFE in any other circumstance is a security-relevant bug.

[ dhansen: changelog rewording ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56761/">CVE-2024-56761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56761">CVE-2024-56761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235633">SUSE bug 1235633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56763</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56763" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56763" ref_url="https://www.suse.com/security/cve/CVE-2024-56763" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Prevent bad count for tracing_cpumask_write

If a large count is provided, it will trigger a warning in bitmap_parse_user.
Also check zero for it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56763/">CVE-2024-56763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56763">CVE-2024-56763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235638">SUSE bug 1235638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56764</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56764" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56764" ref_url="https://www.suse.com/security/cve/CVE-2024-56764" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk: detach gendisk from ublk device if add_disk() fails

Inside ublk_abort_requests(), gendisk is grabbed for aborting all
inflight requests. And ublk_abort_requests() is called when exiting
the uring context or handling timeout.

If add_disk() fails, the gendisk may have been freed when calling
ublk_abort_requests(), so use-after-free can be caused when getting
disk's reference in ublk_abort_requests().

Fixes the bug by detaching gendisk from ublk device if add_disk() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56764/">CVE-2024-56764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56764">CVE-2024-56764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235634">SUSE bug 1235634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56765</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56765" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56765" ref_url="https://www.suse.com/security/cve/CVE-2024-56765" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/pseries/vas: Add close() callback in vas_vm_ops struct

The mapping VMA address is saved in VAS window struct when the
paste address is mapped. This VMA address is used during migration
to unmap the paste address if the window is active. The paste
address mapping will be removed when the window is closed or with
the munmap(). But the VMA address in the VAS window is not updated
with munmap() which is causing invalid access during migration.

The KASAN report shows:
[16386.254991] BUG: KASAN: slab-use-after-free in reconfig_close_windows+0x1a0/0x4e8
[16386.255043] Read of size 8 at addr c00000014a819670 by task drmgr/696928

[16386.255096] CPU: 29 UID: 0 PID: 696928 Comm: drmgr Kdump: loaded Tainted: G    B              6.11.0-rc5-nxgzip #2
[16386.255128] Tainted: [B]=BAD_PAGE
[16386.255148] Hardware name: IBM,9080-HEX Power11 (architected) 0x820200 0xf000007 of:IBM,FW1110.00 (NH1110_016) hv:phyp pSeries
[16386.255181] Call Trace:
[16386.255202] [c00000016b297660] [c0000000018ad0ac] dump_stack_lvl+0x84/0xe8 (unreliable)
[16386.255246] [c00000016b297690] [c0000000006e8a90] print_report+0x19c/0x764
[16386.255285] [c00000016b297760] [c0000000006e9490] kasan_report+0x128/0x1f8
[16386.255309] [c00000016b297880] [c0000000006eb5c8] __asan_load8+0xac/0xe0
[16386.255326] [c00000016b2978a0] [c00000000013f898] reconfig_close_windows+0x1a0/0x4e8
[16386.255343] [c00000016b297990] [c000000000140e58] vas_migration_handler+0x3a4/0x3fc
[16386.255368] [c00000016b297a90] [c000000000128848] pseries_migrate_partition+0x4c/0x4c4
...

[16386.256136] Allocated by task 696554 on cpu 31 at 16377.277618s:
[16386.256149]  kasan_save_stack+0x34/0x68
[16386.256163]  kasan_save_track+0x34/0x80
[16386.256175]  kasan_save_alloc_info+0x58/0x74
[16386.256196]  __kasan_slab_alloc+0xb8/0xdc
[16386.256209]  kmem_cache_alloc_noprof+0x200/0x3d0
[16386.256225]  vm_area_alloc+0x44/0x150
[16386.256245]  mmap_region+0x214/0x10c4
[16386.256265]  do_mmap+0x5fc/0x750
[16386.256277]  vm_mmap_pgoff+0x14c/0x24c
[16386.256292]  ksys_mmap_pgoff+0x20c/0x348
[16386.256303]  sys_mmap+0xd0/0x160
...

[16386.256350] Freed by task 0 on cpu 31 at 16386.204848s:
[16386.256363]  kasan_save_stack+0x34/0x68
[16386.256374]  kasan_save_track+0x34/0x80
[16386.256384]  kasan_save_free_info+0x64/0x10c
[16386.256396]  __kasan_slab_free+0x120/0x204
[16386.256415]  kmem_cache_free+0x128/0x450
[16386.256428]  vm_area_free_rcu_cb+0xa8/0xd8
[16386.256441]  rcu_do_batch+0x2c8/0xcf0
[16386.256458]  rcu_core+0x378/0x3c4
[16386.256473]  handle_softirqs+0x20c/0x60c
[16386.256495]  do_softirq_own_stack+0x6c/0x88
[16386.256509]  do_softirq_own_stack+0x58/0x88
[16386.256521]  __irq_exit_rcu+0x1a4/0x20c
[16386.256533]  irq_exit+0x20/0x38
[16386.256544]  interrupt_async_exit_prepare.constprop.0+0x18/0x2c
...

[16386.256717] Last potentially related work creation:
[16386.256729]  kasan_save_stack+0x34/0x68
[16386.256741]  __kasan_record_aux_stack+0xcc/0x12c
[16386.256753]  __call_rcu_common.constprop.0+0x94/0xd04
[16386.256766]  vm_area_free+0x28/0x3c
[16386.256778]  remove_vma+0xf4/0x114
[16386.256797]  do_vmi_align_munmap.constprop.0+0x684/0x870
[16386.256811]  __vm_munmap+0xe0/0x1f8
[16386.256821]  sys_munmap+0x54/0x6c
[16386.256830]  system_call_exception+0x1a0/0x4a0
[16386.256841]  system_call_vectored_common+0x15c/0x2ec

[16386.256868] The buggy address belongs to the object at c00000014a819670
                which belongs to the cache vm_area_struct of size 168
[16386.256887] The buggy address is located 0 bytes inside of
                freed 168-byte region [c00000014a819670, c00000014a819718)

[16386.256915] The buggy address belongs to the physical page:
[16386.256928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14a81
[16386.256950] memcg:c0000000ba430001
[16386.256961] anon flags: 0x43ffff800000000(node=4|zone=0|lastcpupid=0x7ffff)
[16386.256975] page_type: 0xfdffffff(slab)
[16386
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56765/">CVE-2024-56765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56765">CVE-2024-56765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235643">SUSE bug 1235643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56766</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56766" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56766" ref_url="https://www.suse.com/security/cve/CVE-2024-56766" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: fix double free in atmel_pmecc_create_user()

The "user" pointer was converted from being allocated with kzalloc() to
being allocated by devm_kzalloc().  Calling kfree(user) will lead to a
double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56766/">CVE-2024-56766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56766">CVE-2024-56766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235219">SUSE bug 1235219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56767</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56767" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56767" ref_url="https://www.suse.com/security/cve/CVE-2024-56767" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset

The at_xdmac_memset_create_desc may return NULL, which will lead to a
null pointer dereference. For example, the len input is error, or the
atchan-&gt;free_descs_list is empty and memory is exhausted. Therefore, add
check to avoid this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56767/">CVE-2024-56767 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56767">CVE-2024-56767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235160">SUSE bug 1235160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56768</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56768" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56768" ref_url="https://www.suse.com/security/cve/CVE-2024-56768" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP

On x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP
disabled can trigger the following bug, as pcpu_hot is unavailable:

 [    8.471774] BUG: unable to handle page fault for address: 00000000936a290c
 [    8.471849] #PF: supervisor read access in kernel mode
 [    8.471881] #PF: error_code(0x0000) - not-present page

Fix by inlining a return 0 in the !CONFIG_SMP case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56768/">CVE-2024-56768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56768">CVE-2024-56768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235648">SUSE bug 1235648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56769</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56769" ref_url="https://www.suse.com/security/cve/CVE-2024-56769" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg

Syzbot reports [1] an uninitialized value issue found by KMSAN in
dib3000_read_reg().

Local u8 rb[2] is used in i2c_transfer() as a read buffer; in case
that call fails, the buffer may end up with some undefined values.

Since no elaborate error handling is expected in dib3000_write_reg(),
simply zero out rb buffer to mitigate the problem.

[1] Syzkaller report
dvb-usb: bulk message failed: -22 (6/0)
=====================================================
BUG: KMSAN: uninit-value in dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758
 dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758
 dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31
 dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290
 dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [inline]
 dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [inline]
 dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310
 dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110
...
Local variable rb created at:
 dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54
 dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-08"/>
	<updated date="2025-01-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56769/">CVE-2024-56769 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56769">CVE-2024-56769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235155">SUSE bug 1235155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56770</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56770" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56770" ref_url="https://www.suse.com/security/cve/CVE-2024-56770" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: netem: account for backlog updates from child qdisc

In general, 'qlen' of any classful qdisc should keep track of the
number of packets that the qdisc itself and all of its children holds.
In case of netem, 'qlen' only accounts for the packets in its internal
tfifo. When netem is used with a child qdisc, the child qdisc can use
'qdisc_tree_reduce_backlog' to inform its parent, netem, about created
or dropped SKBs. This function updates 'qlen' and the backlog statistics
of netem, but netem does not account for changes made by a child qdisc.
'qlen' then indicates the wrong number of packets in the tfifo.
If a child qdisc creates new SKBs during enqueue and informs its parent
about this, netem's 'qlen' value is increased. When netem dequeues the
newly created SKBs from the child, the 'qlen' in netem is not updated.
If 'qlen' reaches the configured sch-&gt;limit, the enqueue function stops
working, even though the tfifo is not full.

Reproduce the bug:
Ensure that the sender machine has GSO enabled. Configure netem as root
qdisc and tbf as its child on the outgoing interface of the machine
as follows:
$ tc qdisc add dev &lt;oif&gt; root handle 1: netem delay 100ms limit 100
$ tc qdisc add dev &lt;oif&gt; parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms

Send bulk TCP traffic out via this interface, e.g., by running an iPerf3
client on the machine. Check the qdisc statistics:
$ tc -s qdisc show dev &lt;oif&gt;

Statistics after 10s of iPerf3 TCP test before the fix (note that
netem's backlog &gt; limit, netem stopped accepting packets):
qdisc netem 1: root refcnt 2 limit 1000 delay 100ms
 Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0)
 backlog 4294528236b 1155p requeues 0
qdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms
 Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0)
 backlog 0b 0p requeues 0

Statistics after the fix:
qdisc netem 1: root refcnt 2 limit 1000 delay 100ms
 Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0)
 backlog 0b 0p requeues 0
qdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms
 Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0)
 backlog 0b 0p requeues 0

tbf segments the GSO SKBs (tbf_segment) and updates the netem's 'qlen'.
The interface fully stops transferring packets and "locks". In this case,
the child qdisc and tfifo are empty, but 'qlen' indicates the tfifo is at
its limit and no more packets are accepted.

This patch adds a counter for the entries in the tfifo. Netem's 'qlen' is
only decreased when a packet is returned by its dequeue function, and not
during enqueuing into the child qdisc. External updates to 'qlen' are thus
accounted for and only the behavior of the backlog statistics changes. As
in other qdiscs, 'qlen' then keeps track of  how many packets are held in
netem and all of its children. As before, sch-&gt;limit remains as the
maximum number of packets in the tfifo. The same applies to netem's
backlog statistics.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56770/">CVE-2024-56770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56770">CVE-2024-56770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235637">SUSE bug 1235637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56771</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56771" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56771" ref_url="https://www.suse.com/security/cve/CVE-2024-56771" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information

These four chips:
* W25N512GW
* W25N01GW
* W25N01JW
* W25N02JW
all require a single bit of ECC strength and thus feature an on-die
Hamming-like ECC engine. There is no point in filling a -&gt;get_status()
callback for them because the main ECC status bytes are located in
standard places, and retrieving the number of bitflips in case of
corrected chunk is both useless and unsupported (if there are bitflips,
then there is 1 at most, so no need to query the chip for that).

Without this change, a kernel warning triggers every time a bit flips.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56771/">CVE-2024-56771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56771">CVE-2024-56771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235649">SUSE bug 1235649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56772</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56772" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56772" ref_url="https://www.suse.com/security/cve/CVE-2024-56772" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit: string-stream: Fix a UAF bug in kunit_init_suite()

In kunit_debugfs_create_suite(), if alloc_string_stream() fails in the
kunit_suite_for_each_test_case() loop, the "suite-&gt;log = stream"
has assigned before, and the error path only free the suite-&gt;log's stream
memory but not set it to NULL, so the later string_stream_clear() of
suite-&gt;log in kunit_init_suite() will cause below UAF bug.

Set stream pointer to NULL after free to fix it.

	Unable to handle kernel paging request at virtual address 006440150000030d
	Mem abort info:
	  ESR = 0x0000000096000004
	  EC = 0x25: DABT (current EL), IL = 32 bits
	  SET = 0, FnV = 0
	  EA = 0, S1PTW = 0
	  FSC = 0x04: level 0 translation fault
	Data abort info:
	  ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
	  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
	  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
	[006440150000030d] address between user and kernel address ranges
	Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
	Dumping ftrace buffer:
	   (ftrace buffer empty)
	Modules linked in: iio_test_gts industrialio_gts_helper cfg80211 rfkill ipv6 [last unloaded: iio_test_gts]
	CPU: 5 UID: 0 PID: 6253 Comm: modprobe Tainted: G    B   W        N 6.12.0-rc4+ #458
	Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
	Hardware name: linux,dummy-virt (DT)
	pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
	pc : string_stream_clear+0x54/0x1ac
	lr : string_stream_clear+0x1a8/0x1ac
	sp : ffffffc080b47410
	x29: ffffffc080b47410 x28: 006440550000030d x27: ffffff80c96b5e98
	x26: ffffff80c96b5e80 x25: ffffffe461b3f6c0 x24: 0000000000000003
	x23: ffffff80c96b5e88 x22: 1ffffff019cdf4fc x21: dfffffc000000000
	x20: ffffff80ce6fa7e0 x19: 032202a80000186d x18: 0000000000001840
	x17: 0000000000000000 x16: 0000000000000000 x15: ffffffe45c355cb4
	x14: ffffffe45c35589c x13: ffffffe45c03da78 x12: ffffffb810168e75
	x11: 1ffffff810168e74 x10: ffffffb810168e74 x9 : dfffffc000000000
	x8 : 0000000000000004 x7 : 0000000000000003 x6 : 0000000000000001
	x5 : ffffffc080b473a0 x4 : 0000000000000000 x3 : 0000000000000000
	x2 : 0000000000000001 x1 : ffffffe462fbf620 x0 : dfffffc000000000
	Call trace:
	 string_stream_clear+0x54/0x1ac
	 __kunit_test_suites_init+0x108/0x1d8
	 kunit_exec_run_tests+0xb8/0x100
	 kunit_module_notify+0x400/0x55c
	 notifier_call_chain+0xfc/0x3b4
	 blocking_notifier_call_chain+0x68/0x9c
	 do_init_module+0x24c/0x5c8
	 load_module+0x4acc/0x4e90
	 init_module_from_file+0xd4/0x128
	 idempotent_init_module+0x2d4/0x57c
	 __arm64_sys_finit_module+0xac/0x100
	 invoke_syscall+0x6c/0x258
	 el0_svc_common.constprop.0+0x160/0x22c
	 do_el0_svc+0x44/0x5c
	 el0_svc+0x48/0xb8
	 el0t_64_sync_handler+0x13c/0x158
	 el0t_64_sync+0x190/0x194
	Code: f9400753 d2dff800 f2fbffe0 d343fe7c (38e06b80)
	---[ end trace 0000000000000000 ]---
	Kernel panic - not syncing: Oops: Fatal exception
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56772/">CVE-2024-56772 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56772">CVE-2024-56772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235651">SUSE bug 1235651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56773</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56773" ref_url="https://www.suse.com/security/cve/CVE-2024-56773" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kunit: Fix potential null dereference in kunit_device_driver_test()

kunit_kzalloc() may return a NULL pointer, dereferencing it without
NULL check may lead to NULL dereference.
Add a NULL check for test_state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56773/">CVE-2024-56773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56773">CVE-2024-56773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235594">SUSE bug 1235594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56774</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56774" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56774" ref_url="https://www.suse.com/security/cve/CVE-2024-56774" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: add a sanity check for btrfs root in btrfs_search_slot()

Syzbot reports a null-ptr-deref in btrfs_search_slot().

The reproducer is using rescue=ibadroots, and the extent tree root is
corrupted thus the extent tree is NULL.

When scrub tries to search the extent tree to gather the needed extent
info, btrfs_search_slot() doesn't check if the target root is NULL or
not, resulting the null-ptr-deref.

Add sanity check for btrfs root before using it in btrfs_search_slot().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56774/">CVE-2024-56774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56774">CVE-2024-56774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235653">SUSE bug 1235653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56775</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56775" ref_url="https://www.suse.com/security/cve/CVE-2024-56775" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix handling of plane refcount

[Why]
The mechanism to backup and restore plane states doesn't maintain
refcount, which can cause issues if the refcount of the plane changes
in between backup and restore operations, such as memory leaks if the
refcount was supposed to go down, or double frees / invalid memory
accesses if the refcount was supposed to go up.

[How]
Cache and re-apply current refcount when restoring plane states.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56775/">CVE-2024-56775 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56775">CVE-2024-56775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235657">SUSE bug 1235657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56776</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56776" ref_url="https://www.suse.com/security/cve/CVE-2024-56776" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sti: avoid potential dereference of error pointers

The return value of drm_atomic_get_crtc_state() needs to be
checked. To avoid use of error pointer 'crtc_state' in case
of the failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56776/">CVE-2024-56776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56776">CVE-2024-56776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235647">SUSE bug 1235647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56777</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56777" ref_url="https://www.suse.com/security/cve/CVE-2024-56777" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check

The return value of drm_atomic_get_crtc_state() needs to be
checked. To avoid use of error pointer 'crtc_state' in case
of the failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56777/">CVE-2024-56777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56777">CVE-2024-56777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235641">SUSE bug 1235641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56778</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56778" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56778" ref_url="https://www.suse.com/security/cve/CVE-2024-56778" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check

The return value of drm_atomic_get_crtc_state() needs to be
checked. To avoid use of error pointer 'crtc_state' in case
of the failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56778/">CVE-2024-56778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56778">CVE-2024-56778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235635">SUSE bug 1235635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56779</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56779" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56779" ref_url="https://www.suse.com/security/cve/CVE-2024-56779" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur

The action force umount(umount -f) will attempt to kill all rpc_task even
umount operation may ultimately fail if some files remain open.
Consequently, if an action attempts to open a file, it can potentially
send two rpc_task to nfs server.

                   NFS CLIENT
thread1                             thread2
open("file")
...
nfs4_do_open
 _nfs4_do_open
  _nfs4_open_and_get_state
   _nfs4_proc_open
    nfs4_run_open_task
     /* rpc_task1 */
     rpc_run_task
     rpc_wait_for_completion_task

                                    umount -f
                                    nfs_umount_begin
                                     rpc_killall_tasks
                                      rpc_signal_task
     rpc_task1 been wakeup
     and return -512
 _nfs4_do_open // while loop
    ...
    nfs4_run_open_task
     /* rpc_task2 */
     rpc_run_task
     rpc_wait_for_completion_task

While processing an open request, nfsd will first attempt to find or
allocate an nfs4_openowner. If it finds an nfs4_openowner that is not
marked as NFS4_OO_CONFIRMED, this nfs4_openowner will released. Since
two rpc_task can attempt to open the same file simultaneously from the
client to server, and because two instances of nfsd can run
concurrently, this situation can lead to lots of memory leak.
Additionally, when we echo 0 to /proc/fs/nfsd/threads, warning will be
triggered.

                    NFS SERVER
nfsd1                  nfsd2       echo 0 &gt; /proc/fs/nfsd/threads

nfsd4_open
 nfsd4_process_open1
  find_or_alloc_open_stateowner
   // alloc oo1, stateid1
                       nfsd4_open
                        nfsd4_process_open1
                        find_or_alloc_open_stateowner
                        // find oo1, without NFS4_OO_CONFIRMED
                         release_openowner
                          unhash_openowner_locked
                          list_del_init(&amp;oo-&gt;oo_perclient)
                          // cannot find this oo
                          // from client, LEAK!!!
                         alloc_stateowner // alloc oo2

 nfsd4_process_open2
  init_open_stateid
  // associate oo1
  // with stateid1, stateid1 LEAK!!!
  nfs4_get_vfs_file
  // alloc nfsd_file1 and nfsd_file_mark1
  // all LEAK!!!

                         nfsd4_process_open2
                         ...

                                    write_threads
                                     ...
                                     nfsd_destroy_serv
                                      nfsd_shutdown_net
                                       nfs4_state_shutdown_net
                                        nfs4_state_destroy_net
                                         destroy_client
                                          __destroy_client
                                          // won't find oo1!!!
                                     nfsd_shutdown_generic
                                      nfsd_file_cache_shutdown
                                       kmem_cache_destroy
                                       for nfsd_file_slab
                                       and nfsd_file_mark_slab
                                       // bark since nfsd_file1
                                       // and nfsd_file_mark1
                                       // still alive

=======================================================================
BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on
__kmem_cache_shutdown()
-----------------------------------------------------------------------

Slab 0xffd4000004438a80 objects=34 used=1 fp=0xff11000110e2ad28
flags=0x17ffffc0000240(workingset|head|node=0|zone=2|lastcpupid=0x1fffff)
CPU: 4 UID: 0 PID: 757 Comm: sh Not tainted 6.12.0-rc6+ #19
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dum
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56779/">CVE-2024-56779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235632">SUSE bug 1235632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56780</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56780" ref_url="https://www.suse.com/security/cve/CVE-2024-56780" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

quota: flush quota_release_work upon quota writeback

One of the paths quota writeback is called from is:

freeze_super()
  sync_filesystem()
    ext4_sync_fs()
      dquot_writeback_dquots()

Since we currently don't always flush the quota_release_work queue in
this path, we can end up with the following race:

 1. dquot are added to releasing_dquots list during regular operations.
 2. FS Freeze starts, however, this does not flush the quota_release_work queue.
 3. Freeze completes.
 4. Kernel eventually tries to flush the workqueue while FS is frozen which
    hits a WARN_ON since transaction gets started during frozen state:

  ext4_journal_check_start+0x28/0x110 [ext4] (unreliable)
  __ext4_journal_start_sb+0x64/0x1c0 [ext4]
  ext4_release_dquot+0x90/0x1d0 [ext4]
  quota_release_workfn+0x43c/0x4d0

Which is the following line:

  WARN_ON(sb-&gt;s_writers.frozen == SB_FREEZE_COMPLETE);

Which ultimately results in generic/390 failing due to dmesg
noise. This was detected on powerpc machine 15 cores.

To avoid this, make sure to flush the workqueue during
dquot_writeback_dquots() so we dont have any pending workitems after
freeze.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56780/">CVE-2024-56780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56780">CVE-2024-56780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235650">SUSE bug 1235650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56781</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56781" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56781" ref_url="https://www.suse.com/security/cve/CVE-2024-56781" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/prom_init: Fixup missing powermac #size-cells

On some powermacs `escc` nodes are missing `#size-cells` properties,
which is deprecated and now triggers a warning at boot since commit
045b14ca5c36 ("of: WARN on deprecated #address-cells/#size-cells
handling").

For example:

  Missing '#size-cells' in /pci@f2000000/mac-io@c/escc@13000
  WARNING: CPU: 0 PID: 0 at drivers/of/base.c:133 of_bus_n_size_cells+0x98/0x108
  Hardware name: PowerMac3,1 7400 0xc0209 PowerMac
  ...
  Call Trace:
    of_bus_n_size_cells+0x98/0x108 (unreliable)
    of_bus_default_count_cells+0x40/0x60
    __of_get_address+0xc8/0x21c
    __of_address_to_resource+0x5c/0x228
    pmz_init_port+0x5c/0x2ec
    pmz_probe.isra.0+0x144/0x1e4
    pmz_console_init+0x10/0x48
    console_init+0xcc/0x138
    start_kernel+0x5c4/0x694

As powermacs boot via prom_init it's possible to add the missing
properties to the device tree during boot, avoiding the warning. Note
that `escc-legacy` nodes are also missing `#size-cells` properties, but
they are skipped by the macio driver, so leave them alone.

Depends-on: 045b14ca5c36 ("of: WARN on deprecated #address-cells/#size-cells handling")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56781/">CVE-2024-56781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56781">CVE-2024-56781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235655">SUSE bug 1235655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56782</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56782" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56782" ref_url="https://www.suse.com/security/cve/CVE-2024-56782" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()

acpi_dev_hid_match() does not check for adev == NULL, dereferencing
it unconditional.

Add a check for adev being NULL before calling acpi_dev_hid_match().

At the moment acpi_quirk_skip_serdev_enumeration() is never called with
a controller_parent without an ACPI companion, but better safe than sorry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56782/">CVE-2024-56782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56782">CVE-2024-56782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235629">SUSE bug 1235629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56783</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56783" ref_url="https://www.suse.com/security/cve/CVE-2024-56783" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level

cgroup maximum depth is INT_MAX by default, there is a cgroup toggle to
restrict this maximum depth to a more reasonable value not to harm
performance. Remove unnecessary WARN_ON_ONCE which is reachable from
userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56783/">CVE-2024-56783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235625">SUSE bug 1235625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56784</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56784" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56784" ref_url="https://www.suse.com/security/cve/CVE-2024-56784" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Adding array index check to prevent memory corruption

[Why &amp; How]
Array indices out of bound caused memory corruption. Adding checks to
ensure that array index stays in bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56784/">CVE-2024-56784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56784">CVE-2024-56784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235654">SUSE bug 1235654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56785</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56785" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56785" ref_url="https://www.suse.com/security/cve/CVE-2024-56785" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a

Fix the dtc warnings:

    arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but node is not an interrupt provider
    arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but node is not an interrupt provider
    arch/mips/boot/dts/loongson/loongson64g_4core_ls7a.dtb: Warning (interrupt_map): Failed prerequisite 'interrupt_provider'

And a runtime warning introduced in commit 045b14ca5c36 ("of: WARN on
deprecated #address-cells/#size-cells handling"):

    WARNING: CPU: 0 PID: 1 at drivers/of/base.c:106 of_bus_n_addr_cells+0x9c/0xe0
    Missing '#address-cells' in /bus@10000000/pci@1a000000/pci_bridge@9,0

The fix is similar to commit d89a415ff8d5 ("MIPS: Loongson64: DTS: Fix PCIe
port nodes for ls7a"), which has fixed the issue for ls2k (despite its
subject mentions ls7a).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56785/">CVE-2024-56785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56785">CVE-2024-56785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235642">SUSE bug 1235642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56786</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56786" ref_url="https://www.suse.com/security/cve/CVE-2024-56786" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: put bpf_link's program when link is safe to be deallocated

In general, BPF link's underlying BPF program should be considered to be
reachable through attach hook -&gt; link -&gt; prog chain, and, pessimistically,
we have to assume that as long as link's memory is not safe to free,
attach hook's code might hold a pointer to BPF program and use it.

As such, it's not (generally) correct to put link's program early before
waiting for RCU GPs to go through. More eager bpf_prog_put() that we
currently do is mostly correct due to BPF program's release code doing
similar RCU GP waiting, but as will be shown in the following patches,
BPF program can be non-sleepable (and, thus, reliant on only "classic"
RCU GP), while BPF link's attach hook can have sleepable semantics and
needs to be protected by RCU Tasks Trace, and for such cases BPF link
has to go through RCU Tasks Trace + "classic" RCU GPs before being
deallocated. And so, if we put BPF program early, we might free BPF
program before we free BPF link, leading to use-after-free situation.

So, this patch defers bpf_prog_put() until we are ready to perform
bpf_link's deallocation. At worst, this delays BPF program freeing by
one extra RCU GP, but that seems completely acceptable. Alternatively,
we'd need more elaborate ways to determine BPF hook, BPF link, and BPF
program lifetimes, and how they relate to each other, which seems like
an unnecessary complication.

Note, for most BPF links we still will perform eager bpf_prog_put() and
link dealloc, so for those BPF links there are no observable changes
whatsoever. Only BPF links that use deferred dealloc might notice
slightly delayed freeing of BPF programs.

Also, to reduce code and logic duplication, extract program put + link
dealloc logic into bpf_link_dealloc() helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56786/">CVE-2024-56786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235644">SUSE bug 1235644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56787</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56787" ref_url="https://www.suse.com/security/cve/CVE-2024-56787" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: imx8m: Probe the SoC driver as platform driver

With driver_async_probe=* on kernel command line, the following trace is
produced because on i.MX8M Plus hardware because the soc-imx8m.c driver
calls of_clk_get_by_name() which returns -EPROBE_DEFER because the clock
driver is not yet probed. This was not detected during regular testing
without driver_async_probe.

Convert the SoC code to platform driver and instantiate a platform device
in its current device_initcall() to probe the platform driver. Rework
.soc_revision callback to always return valid error code and return SoC
revision via parameter. This way, if anything in the .soc_revision callback
return -EPROBE_DEFER, it gets propagated to .probe and the .probe will get
retried later.

"
------------[ cut here ]------------
WARNING: CPU: 1 PID: 1 at drivers/soc/imx/soc-imx8m.c:115 imx8mm_soc_revision+0xdc/0x180
CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.11.0-next-20240924-00002-g2062bb554dea #603
Hardware name: DH electronics i.MX8M Plus DHCOM Premium Developer Kit (3) (DT)
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : imx8mm_soc_revision+0xdc/0x180
lr : imx8mm_soc_revision+0xd0/0x180
sp : ffff8000821fbcc0
x29: ffff8000821fbce0 x28: 0000000000000000 x27: ffff800081810120
x26: ffff8000818a9970 x25: 0000000000000006 x24: 0000000000824311
x23: ffff8000817f42c8 x22: ffff0000df8be210 x21: fffffffffffffdfb
x20: ffff800082780000 x19: 0000000000000001 x18: ffffffffffffffff
x17: ffff800081fff418 x16: ffff8000823e1000 x15: ffff0000c03b65e8
x14: ffff0000c00051b0 x13: ffff800082790000 x12: 0000000000000801
x11: ffff80008278ffff x10: ffff80008209d3a6 x9 : ffff80008062e95c
x8 : ffff8000821fb9a0 x7 : 0000000000000000 x6 : 00000000000080e3
x5 : ffff0000df8c03d8 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000000000 x1 : fffffffffffffdfb x0 : fffffffffffffdfb
Call trace:
 imx8mm_soc_revision+0xdc/0x180
 imx8_soc_init+0xb0/0x1e0
 do_one_initcall+0x94/0x1a8
 kernel_init_freeable+0x240/0x2a8
 kernel_init+0x28/0x140
 ret_from_fork+0x10/0x20
---[ end trace 0000000000000000 ]---
SoC: i.MX8MP revision 1.1
"
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2025-01-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56787/">CVE-2024-56787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56787">CVE-2024-56787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235663">SUSE bug 1235663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56788</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56788" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56788" ref_url="https://www.suse.com/security/cve/CVE-2024-56788" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: oa_tc6: fix tx skb race condition between reference pointers

There are two skb pointers to manage tx skb's enqueued from n/w stack.
waiting_tx_skb pointer points to the tx skb which needs to be processed
and ongoing_tx_skb pointer points to the tx skb which is being processed.

SPI thread prepares the tx data chunks from the tx skb pointed by the
ongoing_tx_skb pointer. When the tx skb pointed by the ongoing_tx_skb is
processed, the tx skb pointed by the waiting_tx_skb is assigned to
ongoing_tx_skb and the waiting_tx_skb pointer is assigned with NULL.
Whenever there is a new tx skb from n/w stack, it will be assigned to
waiting_tx_skb pointer if it is NULL. Enqueuing and processing of a tx skb
handled in two different threads.

Consider a scenario where the SPI thread processed an ongoing_tx_skb and
it moves next tx skb from waiting_tx_skb pointer to ongoing_tx_skb pointer
without doing any NULL check. At this time, if the waiting_tx_skb pointer
is NULL then ongoing_tx_skb pointer is also assigned with NULL. After
that, if a new tx skb is assigned to waiting_tx_skb pointer by the n/w
stack and there is a chance to overwrite the tx skb pointer with NULL in
the SPI thread. Finally one of the tx skb will be left as unhandled,
resulting packet missing and memory leak.

- Consider the below scenario where the TXC reported from the previous
transfer is 10 and ongoing_tx_skb holds an tx ethernet frame which can be
transported in 20 TXCs and waiting_tx_skb is still NULL.
	tx_credits = 10; /* 21 are filled in the previous transfer */
	ongoing_tx_skb = 20;
	waiting_tx_skb = NULL; /* Still NULL */
- So, (tc6-&gt;ongoing_tx_skb || tc6-&gt;waiting_tx_skb) becomes true.
- After oa_tc6_prepare_spi_tx_buf_for_tx_skbs()
	ongoing_tx_skb = 10;
	waiting_tx_skb = NULL; /* Still NULL */
- Perform SPI transfer.
- Process SPI rx buffer to get the TXC from footers.
- Now let's assume previously filled 21 TXCs are freed so we are good to
transport the next remaining 10 tx chunks from ongoing_tx_skb.
	tx_credits = 21;
	ongoing_tx_skb = 10;
	waiting_tx_skb = NULL;
- So, (tc6-&gt;ongoing_tx_skb || tc6-&gt;waiting_tx_skb) becomes true again.
- In the oa_tc6_prepare_spi_tx_buf_for_tx_skbs()
	ongoing_tx_skb = NULL;
	waiting_tx_skb = NULL;

- Now the below bad case might happen,

Thread1 (oa_tc6_start_xmit)	Thread2 (oa_tc6_spi_thread_handler)
---------------------------	-----------------------------------
- if waiting_tx_skb is NULL
				- if ongoing_tx_skb is NULL
				- ongoing_tx_skb = waiting_tx_skb
- waiting_tx_skb = skb
				- waiting_tx_skb = NULL
				...
				- ongoing_tx_skb = NULL
- if waiting_tx_skb is NULL
- waiting_tx_skb = skb

To overcome the above issue, protect the moving of tx skb reference from
waiting_tx_skb pointer to ongoing_tx_skb pointer and assigning new tx skb
to waiting_tx_skb pointer, so that the other thread can't access the
waiting_tx_skb pointer until the current thread completes moving the tx
skb reference safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56788/">CVE-2024-56788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56788">CVE-2024-56788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235754">SUSE bug 1235754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57791</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57791" ref_url="https://www.suse.com/security/cve/CVE-2024-57791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: check return value of sock_recvmsg when draining clc data

When receiving clc msg, the field length in smc_clc_msg_hdr indicates the
length of msg should be received from network and the value should not be
fully trusted as it is from the network. Once the value of length exceeds
the value of buflen in function smc_clc_wait_msg it may run into deadloop
when trying to drain the remaining data exceeding buflen.

This patch checks the return value of sock_recvmsg when draining data in
case of deadloop in draining.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57791/">CVE-2024-57791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57791">CVE-2024-57791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235759">SUSE bug 1235759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235760">SUSE bug 1235760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57792</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57792" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57792" ref_url="https://www.suse.com/security/cve/CVE-2024-57792" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57792/">CVE-2024-57792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57792">CVE-2024-57792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235764">SUSE bug 1235764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236568">SUSE bug 1236568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57793</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57793" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57793" ref_url="https://www.suse.com/security/cve/CVE-2024-57793" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-57793/">CVE-2024-57793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57793">CVE-2024-57793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235768">SUSE bug 1235768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235769">SUSE bug 1235769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57795</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57795" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57795" ref_url="https://www.suse.com/security/cve/CVE-2024-57795" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Remove the direct link to net_device

The similar patch in siw is in the link:
https://git.kernel.org/rdma/rdma/c/16b87037b48889

This problem also occurred in RXE. The following analyze this problem.
In the following Call Traces:
"
BUG: KASAN: slab-use-after-free in dev_get_flags+0x188/0x1d0 net/core/dev.c:8782
Read of size 4 at addr ffff8880554640b0 by task kworker/1:4/5295

CPU: 1 UID: 0 PID: 5295 Comm: kworker/1:4 Not tainted
6.12.0-rc3-syzkaller-00399-g9197b73fd7bb #0
Hardware name: Google Compute Engine/Google Compute Engine,
BIOS Google 09/13/2024
Workqueue: infiniband ib_cache_event_task
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 dev_get_flags+0x188/0x1d0 net/core/dev.c:8782
 rxe_query_port+0x12d/0x260 drivers/infiniband/sw/rxe/rxe_verbs.c:60
 __ib_query_port drivers/infiniband/core/device.c:2111 [inline]
 ib_query_port+0x168/0x7d0 drivers/infiniband/core/device.c:2143
 ib_cache_update+0x1a9/0xb80 drivers/infiniband/core/cache.c:1494
 ib_cache_event_task+0xf3/0x1e0 drivers/infiniband/core/cache.c:1568
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa65/0x1850 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f2/0x390 kernel/kthread.c:389
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;
"

1). In the link [1],

"
 infiniband syz2: set down
"

This means that on 839.350575, the event ib_cache_event_task was sent andi
queued in ib_wq.

2). In the link [1],

"
 team0 (unregistering): Port device team_slave_0 removed
"

It indicates that before 843.251853, the net device should be freed.

3). In the link [1],

"
 BUG: KASAN: slab-use-after-free in dev_get_flags+0x188/0x1d0
"

This means that on 850.559070, this slab-use-after-free problem occurred.

In all, on 839.350575, the event ib_cache_event_task was sent and queued
in ib_wq,

before 843.251853, the net device veth was freed.

on 850.559070, this event was executed, and the mentioned freed net device
was called. Thus, the above call trace occurred.

[1] https://syzkaller.appspot.com/x/log.txt?x=12e7025f980000
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57795/">CVE-2024-57795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57795">CVE-2024-57795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235906">SUSE bug 1235906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57798</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235818">SUSE bug 1235818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235819">SUSE bug 1235819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57799</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57799" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57799" ref_url="https://www.suse.com/security/cve/CVE-2024-57799" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57799/">CVE-2024-57799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57799">CVE-2024-57799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235770">SUSE bug 1235770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57800</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57800" ref_url="https://www.suse.com/security/cve/CVE-2024-57800" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57800/">CVE-2024-57800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57800">CVE-2024-57800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235772">SUSE bug 1235772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57801</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57801" ref_url="https://www.suse.com/security/cve/CVE-2024-57801" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Skip restore TC rules for vport rep without loaded flag

During driver unload, unregister_netdev is called after unloading
vport rep. So, the mlx5e_rep_priv is already freed while trying to get
rpriv-&gt;netdev, or walk rpriv-&gt;tc_ht, which results in use-after-free.
So add the checking to make sure access the data of vport rep which is
still loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57801/">CVE-2024-57801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57801">CVE-2024-57801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235940">SUSE bug 1235940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57802</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57802" ref_url="https://www.suse.com/security/cve/CVE-2024-57802" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netrom: check buffer length before accessing it

Syzkaller reports an uninit value read from ax25cmp when sending raw message
through ieee802154 implementation.

=====================================================
BUG: KMSAN: uninit-value in ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
 ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
 nr_dev_get+0x20e/0x450 net/netrom/nr_route.c:601
 nr_route_frame+0x1a2/0xfc0 net/netrom/nr_route.c:774
 nr_xmit+0x5a/0x1c0 net/netrom/nr_dev.c:144
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
 __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 raw_sendmsg+0x654/0xc10 net/ieee802154/socket.c:299
 ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
 slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
 kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
 __alloc_skb+0x318/0x740 net/core/skbuff.c:651
 alloc_skb include/linux/skbuff.h:1286 [inline]
 alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2780
 sock_alloc_send_skb include/net/sock.h:1884 [inline]
 raw_sendmsg+0x36d/0xc10 net/ieee802154/socket.c:282
 ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg net/socket.c:745 [inline]
 ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
 ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
 __sys_sendmsg net/socket.c:2667 [inline]
 __do_sys_sendmsg net/socket.c:2676 [inline]
 __se_sys_sendmsg net/socket.c:2674 [inline]
 __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b

CPU: 0 PID: 5037 Comm: syz-executor166 Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
=====================================================

This issue occurs because the skb buffer is too small, and it's actual
allocation is aligned. This hides an actual issue, which is that nr_route_frame
does not validate the buffer size before using it.

Fix this issue by checking skb-&gt;len before accessing any fields in skb-&gt;data.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57802/">CVE-2024-57802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57802">CVE-2024-57802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235941">SUSE bug 1235941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57804</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57804" ref_url="https://www.suse.com/security/cve/CVE-2024-57804" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix corrupt config pages PHY state is switched in sysfs

The driver, through the SAS transport, exposes a sysfs interface to
enable/disable PHYs in a controller/expander setup.  When multiple PHYs
are disabled and enabled in rapid succession, the persistent and current
config pages related to SAS IO unit/SAS Expander pages could get
corrupted.

Use separate memory for each config request.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57804/">CVE-2024-57804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57804">CVE-2024-57804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235779">SUSE bug 1235779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57805" ref_url="https://www.suse.com/security/cve/CVE-2024-57805" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57805/">CVE-2024-57805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57805">CVE-2024-57805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235790">SUSE bug 1235790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57806</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57806" ref_url="https://www.suse.com/security/cve/CVE-2024-57806" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57806/">CVE-2024-57806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57806">CVE-2024-57806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235792">SUSE bug 1235792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57807</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57807" ref_url="https://www.suse.com/security/cve/CVE-2024-57807" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57807/">CVE-2024-57807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57807">CVE-2024-57807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235761">SUSE bug 1235761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57809</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57809" ref_url="https://www.suse.com/security/cve/CVE-2024-57809" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: imx6: Fix suspend/resume support on i.MX6QDL

The suspend/resume functionality is currently broken on the i.MX6QDL
platform, as documented in the NXP errata (ERR005723):

  https://www.nxp.com/docs/en/errata/IMX6DQCE.pdf

This patch addresses the issue by sharing most of the suspend/resume
sequences used by other i.MX devices, while avoiding modifications to
critical registers that disrupt the PCIe functionality. It targets the
same problem as the following downstream commit:

  https://github.com/nxp-imx/linux-imx/commit/4e92355e1f79d225ea842511fcfd42b343b32995

Unlike the downstream commit, this patch also resets the connected PCIe
device if possible. Without this reset, certain drivers, such as ath10k
or iwlwifi, will crash on resume. The device reset is also done by the
driver on other i.MX platforms, making this patch consistent with
existing practices.

Upon resuming, the kernel will hang and display an error. Here's an
example of the error encountered with the ath10k driver:

  ath10k_pci 0000:01:00.0: Unable to change power state from D3hot to D0, device inaccessible
  Unhandled fault: imprecise external abort (0x1406) at 0x0106f944

Without this patch, suspend/resume will fail on i.MX6QDL devices if a
PCIe device is connected.

[kwilczynski: commit log, added tag for stable releases]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57809/">CVE-2024-57809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235793">SUSE bug 1235793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57838</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57838" ref_url="https://www.suse.com/security/cve/CVE-2024-57838" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/entry: Mark IRQ entries to fix stack depot warnings

The stack depot filters out everything outside of the top interrupt
context as an uninteresting or irrelevant part of the stack traces. This
helps with stack trace de-duplication, avoiding an explosion of saved
stack traces that share the same IRQ context code path but originate
from different randomly interrupted points, eventually exhausting the
stack depot.

Filtering uses in_irqentry_text() to identify functions within the
.irqentry.text and .softirqentry.text sections, which then become the
last stack trace entries being saved.

While __do_softirq() is placed into the .softirqentry.text section by
common code, populating .irqentry.text is architecture-specific.

Currently, the .irqentry.text section on s390 is empty, which prevents
stack depot filtering and de-duplication and could result in warnings
like:

Stack depot reached limit capacity
WARNING: CPU: 0 PID: 286113 at lib/stackdepot.c:252 depot_alloc_stack+0x39a/0x3c8

with PREEMPT and KASAN enabled.

Fix this by moving the IO/EXT interrupt handlers from .kprobes.text into
the .irqentry.text section and updating the kprobes blacklist to include
the .irqentry.text section.

This is done only for asynchronous interrupts and explicitly not for
program checks, which are synchronous and where the context beyond the
program check is important to preserve. Despite machine checks being
somewhat in between, they are extremely rare, and preserving context
when possible is also of value.

SVCs and Restart Interrupts are not relevant, one being always at the
boundary to user space and the other being a one-time thing.

IRQ entries filtering is also optionally used in ftrace function graph,
where the same logic applies.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57838/">CVE-2024-57838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57838">CVE-2024-57838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235798">SUSE bug 1235798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57839</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57839" ref_url="https://www.suse.com/security/cve/CVE-2024-57839" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "readahead: properly shorten readahead when falling back to do_page_cache_ra()"

This reverts commit 7c877586da3178974a8a94577b6045a48377ff25.

Anders and Philippe have reported that recent kernels occasionally hang
when used with NFS in readahead code.  The problem has been bisected to
7c877586da3 ("readahead: properly shorten readahead when falling back to
do_page_cache_ra()").  The cause of the problem is that ra-&gt;size can be
shrunk by read_pages() call and subsequently we end up calling
do_page_cache_ra() with negative (read huge positive) number of pages. 
Let's revert 7c877586da3 for now until we can find a proper way how the
logic in read_pages() and page_cache_ra_order() can coexist.  This can
lead to reduced readahead throughput due to readahead window confusion but
that's better than outright hangs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57839/">CVE-2024-57839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57839">CVE-2024-57839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235799">SUSE bug 1235799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57841</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57841" ref_url="https://www.suse.com/security/cve/CVE-2024-57841" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix memory leak in tcp_conn_request()

If inet_csk_reqsk_queue_hash_add() return false, tcp_conn_request() will
return without free the dst memory, which allocated in af_ops-&gt;route_req.

Here is the kmemleak stack:

unreferenced object 0xffff8881198631c0 (size 240):
  comm "softirq", pid 0, jiffies 4299266571 (age 1802.392s)
  hex dump (first 32 bytes):
    00 10 9b 03 81 88 ff ff 80 98 da bc ff ff ff ff  ................
    81 55 18 bb ff ff ff ff 00 00 00 00 00 00 00 00  .U..............
  backtrace:
    [&lt;ffffffffb93e8d4c&gt;] kmem_cache_alloc+0x60c/0xa80
    [&lt;ffffffffba11b4c5&gt;] dst_alloc+0x55/0x250
    [&lt;ffffffffba227bf6&gt;] rt_dst_alloc+0x46/0x1d0
    [&lt;ffffffffba23050a&gt;] __mkroute_output+0x29a/0xa50
    [&lt;ffffffffba23456b&gt;] ip_route_output_key_hash+0x10b/0x240
    [&lt;ffffffffba2346bd&gt;] ip_route_output_flow+0x1d/0x90
    [&lt;ffffffffba254855&gt;] inet_csk_route_req+0x2c5/0x500
    [&lt;ffffffffba26b331&gt;] tcp_conn_request+0x691/0x12c0
    [&lt;ffffffffba27bd08&gt;] tcp_rcv_state_process+0x3c8/0x11b0
    [&lt;ffffffffba2965c6&gt;] tcp_v4_do_rcv+0x156/0x3b0
    [&lt;ffffffffba299c98&gt;] tcp_v4_rcv+0x1cf8/0x1d80
    [&lt;ffffffffba239656&gt;] ip_protocol_deliver_rcu+0xf6/0x360
    [&lt;ffffffffba2399a6&gt;] ip_local_deliver_finish+0xe6/0x1e0
    [&lt;ffffffffba239b8e&gt;] ip_local_deliver+0xee/0x360
    [&lt;ffffffffba239ead&gt;] ip_rcv+0xad/0x2f0
    [&lt;ffffffffba110943&gt;] __netif_receive_skb_one_core+0x123/0x140

Call dst_release() to free the dst memory when
inet_csk_reqsk_queue_hash_add() return false in tcp_conn_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57841/">CVE-2024-57841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57841">CVE-2024-57841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235944">SUSE bug 1235944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57843</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57843" ref_url="https://www.suse.com/security/cve/CVE-2024-57843" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix overflow inside virtnet_rq_alloc

When the frag just got a page, then may lead to regression on VM.
Specially if the sysctl net.core.high_order_alloc_disable value is 1,
then the frag always get a page when do refill.

Which could see reliable crashes or scp failure (scp a file 100M in size
to VM).

The issue is that the virtnet_rq_dma takes up 16 bytes at the beginning
of a new frag. When the frag size is larger than PAGE_SIZE,
everything is fine. However, if the frag is only one page and the
total size of the buffer and virtnet_rq_dma is larger than one page, an
overflow may occur.

The commit f9dac92ba908 ("virtio_ring: enable premapped mode whatever
use_dma_api") introduced this problem. And we reverted some commits to
fix this in last linux version. Now we try to enable it and fix this
bug directly.

Here, when the frag size is not enough, we reduce the buffer len to fix
this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-57843/">CVE-2024-57843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235816">SUSE bug 1235816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57844</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57844" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57844" ref_url="https://www.suse.com/security/cve/CVE-2024-57844" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix fault on fd close after unbind

If userspace holds an fd open, unbinds the device and then closes it,
the driver shouldn't try to access the hardware. Protect it by using
drm_dev_enter()/drm_dev_exit(). This fixes the following page fault:

&lt;6&gt; [IGT] xe_wedged: exiting, ret=98
&lt;1&gt; BUG: unable to handle page fault for address: ffffc901bc5e508c
&lt;1&gt; #PF: supervisor read access in kernel mode
&lt;1&gt; #PF: error_code(0x0000) - not-present page
...
&lt;4&gt;   xe_lrc_update_timestamp+0x1c/0xd0 [xe]
&lt;4&gt;   xe_exec_queue_update_run_ticks+0x50/0xb0 [xe]
&lt;4&gt;   xe_exec_queue_fini+0x16/0xb0 [xe]
&lt;4&gt;   __guc_exec_queue_fini_async+0xc4/0x190 [xe]
&lt;4&gt;   guc_exec_queue_fini_async+0xa0/0xe0 [xe]
&lt;4&gt;   guc_exec_queue_fini+0x23/0x40 [xe]
&lt;4&gt;   xe_exec_queue_destroy+0xb3/0xf0 [xe]
&lt;4&gt;   xe_file_close+0xd4/0x1a0 [xe]
&lt;4&gt;   drm_file_free+0x210/0x280 [drm]
&lt;4&gt;   drm_close_helper.isra.0+0x6d/0x80 [drm]
&lt;4&gt;   drm_release_noglobal+0x20/0x90 [drm]

(cherry picked from commit 4ca1fd418338d4d135428a0eb1e16e3b3ce17ee8)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57844/">CVE-2024-57844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57844">CVE-2024-57844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235945">SUSE bug 1235945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57849</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57849" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57849" ref_url="https://www.suse.com/security/cve/CVE-2024-57849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/cpum_sf: Handle CPU hotplug remove during sampling

CPU hotplug remove handling triggers the following function
call sequence:

   CPUHP_AP_PERF_S390_SF_ONLINE  --&gt; s390_pmu_sf_offline_cpu()
   ...
   CPUHP_AP_PERF_ONLINE          --&gt; perf_event_exit_cpu()

The s390 CPUMF sampling CPU hotplug handler invokes:

 s390_pmu_sf_offline_cpu()
 +--&gt;  cpusf_pmu_setup()
       +--&gt; setup_pmc_cpu()
            +--&gt; deallocate_buffers()

This function de-allocates all sampling data buffers (SDBs) allocated
for that CPU at event initialization. It also clears the
PMU_F_RESERVED bit. The CPU is gone and can not be sampled.

With the event still being active on the removed CPU, the CPU event
hotplug support in kernel performance subsystem triggers the
following function calls on the removed CPU:

  perf_event_exit_cpu()
  +--&gt; perf_event_exit_cpu_context()
       +--&gt; __perf_event_exit_context()
	    +--&gt; __perf_remove_from_context()
	         +--&gt; event_sched_out()
	              +--&gt; cpumsf_pmu_del()
	                   +--&gt; cpumsf_pmu_stop()
                                +--&gt; hw_perf_event_update()

to stop and remove the event. During removal of the event, the
sampling device driver tries to read out the remaining samples from
the sample data buffers (SDBs). But they have already been freed
(and may have been re-assigned). This may lead to a use after free
situation in which case the samples are most likely invalid. In the
best case the memory has not been reassigned and still contains
valid data.

Remedy this situation and check if the CPU is still in reserved
state (bit PMU_F_RESERVED set). In this case the SDBs have not been
released an contain valid data. This is always the case when
the event is removed (and no CPU hotplug off occured).
If the PMU_F_RESERVED bit is not set, the SDB buffers are gone.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57849/">CVE-2024-57849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57849">CVE-2024-57849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235814">SUSE bug 1235814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235815">SUSE bug 1235815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57850</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57850" ref_url="https://www.suse.com/security/cve/CVE-2024-57850" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jffs2: Prevent rtime decompress memory corruption

The rtime decompression routine does not fully check bounds during the
entirety of the decompression pass and can corrupt memory outside the
decompression buffer if the compressed data is corrupted. This adds the
required check to prevent this failure mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57850/">CVE-2024-57850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57850">CVE-2024-57850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235812">SUSE bug 1235812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235813">SUSE bug 1235813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57857</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57857" ref_url="https://www.suse.com/security/cve/CVE-2024-57857" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57857/">CVE-2024-57857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57857">CVE-2024-57857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235946">SUSE bug 1235946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57872</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57872" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57872" ref_url="https://www.suse.com/security/cve/CVE-2024-57872" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove()

This will ensure that the scsi host is cleaned up properly using
scsi_host_dev_release(). Otherwise, it may lead to memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57872/">CVE-2024-57872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57872">CVE-2024-57872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235817">SUSE bug 1235817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57874</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57874" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57874" ref_url="https://www.suse.com/security/cve/CVE-2024-57874" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL

Currently tagged_addr_ctrl_set() doesn't initialize the temporary 'ctrl'
variable, and a SETREGSET call with a length of zero will leave this
uninitialized. Consequently tagged_addr_ctrl_set() will consume an
arbitrary value, potentially leaking up to 64 bits of memory from the
kernel stack. The read is limited to a specific slot on the stack, and
the issue does not provide a write mechanism.

As set_tagged_addr_ctrl() only accepts values where bits [63:4] zero and
rejects other values, a partial SETREGSET attempt will randomly succeed
or fail depending on the value of the uninitialized value, and the
exposure is significantly limited.

Fix this by initializing the temporary value before copying the regset
from userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,
NT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing
value of the tagged address ctrl will be retained.

The NT_ARM_TAGGED_ADDR_CTRL regset is only visible in the
user_aarch64_view used by a native AArch64 task to manipulate another
native AArch64 task. As get_tagged_addr_ctrl() only returns an error
value when called for a compat task, tagged_addr_ctrl_get() and
tagged_addr_ctrl_set() should never observe an error value from
get_tagged_addr_ctrl(). Add a WARN_ON_ONCE() to both to indicate that
such an error would be unexpected, and error handlnig is not missing in
either case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57874/">CVE-2024-57874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57874">CVE-2024-57874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235808">SUSE bug 1235808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57875</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57875" ref_url="https://www.suse.com/security/cve/CVE-2024-57875" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: RCU protect disk-&gt;conv_zones_bitmap

Ensure that a disk revalidation changing the conventional zones bitmap
of a disk does not cause invalid memory references when using the
disk_zone_is_conv() helper by RCU protecting the disk-&gt;conv_zones_bitmap
pointer.

disk_zone_is_conv() is modified to operate under the RCU read lock and
the function disk_set_conv_zones_bitmap() is added to update a disk
conv_zones_bitmap pointer using rcu_replace_pointer() with the disk
zone_wplugs_lock spinlock held.

disk_free_zone_resources() is modified to call
disk_update_zone_resources() with a NULL bitmap pointer to free the disk
conv_zones_bitmap. disk_set_conv_zones_bitmap() is also used in
disk_update_zone_resources() to set the new (revalidated) bitmap and
free the old one.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57875/">CVE-2024-57875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57875">CVE-2024-57875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235820">SUSE bug 1235820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57876</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57876" ref_url="https://www.suse.com/security/cve/CVE-2024-57876" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Fix resetting msg rx state after topology removal

If the MST topology is removed during the reception of an MST down reply
or MST up request sideband message, the
drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset
from one thread via drm_dp_mst_topology_mgr_set_mst(false), racing with
the reading/parsing of the message from another thread via
drm_dp_mst_handle_down_rep() or drm_dp_mst_handle_up_req(). The race is
possible since the reader/parser doesn't hold any lock while accessing
the reception state. This in turn can lead to a memory corruption in the
reader/parser as described by commit bd2fccac61b4 ("drm/dp_mst: Fix MST
sideband message body length check").

Fix the above by resetting the message reception state if needed before
reading/parsing a message. Another solution would be to hold the
drm_dp_mst_topology_mgr::lock for the whole duration of the message
reception/parsing in drm_dp_mst_handle_down_rep() and
drm_dp_mst_handle_up_req(), however this would require a bigger change.
Since the fix is also needed for stable, opting for the simpler solution
in this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57876/">CVE-2024-57876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235806">SUSE bug 1235806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235807">SUSE bug 1235807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57877</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57877" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57877" ref_url="https://www.suse.com/security/cve/CVE-2024-57877" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: ptrace: fix partial SETREGSET for NT_ARM_POE

Currently poe_set() doesn't initialize the temporary 'ctrl' variable,
and a SETREGSET call with a length of zero will leave this
uninitialized. Consequently an arbitrary value will be written back to
target-&gt;thread.por_el0, potentially leaking up to 64 bits of memory from
the kernel stack. The read is limited to a specific slot on the stack,
and the issue does not provide a write mechanism.

Fix this by initializing the temporary value before copying the regset
from userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,
NT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing
contents of POR_EL1 will be retained.

Before this patch:

| # ./poe-test
| Attempting to write NT_ARM_POE::por_el0 = 0x900d900d900d900d
| SETREGSET(nt=0x40f, len=8) wrote 8 bytes
|
| Attempting to read NT_ARM_POE::por_el0
| GETREGSET(nt=0x40f, len=8) read 8 bytes
| Read NT_ARM_POE::por_el0 = 0x900d900d900d900d
|
| Attempting to write NT_ARM_POE (zero length)
| SETREGSET(nt=0x40f, len=0) wrote 0 bytes
|
| Attempting to read NT_ARM_POE::por_el0
| GETREGSET(nt=0x40f, len=8) read 8 bytes
| Read NT_ARM_POE::por_el0 = 0xffff8000839c3d50

After this patch:

| # ./poe-test
| Attempting to write NT_ARM_POE::por_el0 = 0x900d900d900d900d
| SETREGSET(nt=0x40f, len=8) wrote 8 bytes
|
| Attempting to read NT_ARM_POE::por_el0
| GETREGSET(nt=0x40f, len=8) read 8 bytes
| Read NT_ARM_POE::por_el0 = 0x900d900d900d900d
|
| Attempting to write NT_ARM_POE (zero length)
| SETREGSET(nt=0x40f, len=0) wrote 0 bytes
|
| Attempting to read NT_ARM_POE::por_el0
| GETREGSET(nt=0x40f, len=8) read 8 bytes
| Read NT_ARM_POE::por_el0 = 0x900d900d900d900d
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57877/">CVE-2024-57877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57877">CVE-2024-57877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235804">SUSE bug 1235804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57878</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57878" ref_url="https://www.suse.com/security/cve/CVE-2024-57878" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: ptrace: fix partial SETREGSET for NT_ARM_FPMR

Currently fpmr_set() doesn't initialize the temporary 'fpmr' variable,
and a SETREGSET call with a length of zero will leave this
uninitialized. Consequently an arbitrary value will be written back to
target-&gt;thread.uw.fpmr, potentially leaking up to 64 bits of memory from
the kernel stack. The read is limited to a specific slot on the stack,
and the issue does not provide a write mechanism.

Fix this by initializing the temporary value before copying the regset
from userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,
NT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing
contents of FPMR will be retained.

Before this patch:

| # ./fpmr-test
| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d
| SETREGSET(nt=0x40e, len=8) wrote 8 bytes
|
| Attempting to read NT_ARM_FPMR::fpmr
| GETREGSET(nt=0x40e, len=8) read 8 bytes
| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d
|
| Attempting to write NT_ARM_FPMR (zero length)
| SETREGSET(nt=0x40e, len=0) wrote 0 bytes
|
| Attempting to read NT_ARM_FPMR::fpmr
| GETREGSET(nt=0x40e, len=8) read 8 bytes
| Read NT_ARM_FPMR::fpmr = 0xffff800083963d50

After this patch:

| # ./fpmr-test
| Attempting to write NT_ARM_FPMR::fpmr = 0x900d900d900d900d
| SETREGSET(nt=0x40e, len=8) wrote 8 bytes
|
| Attempting to read NT_ARM_FPMR::fpmr
| GETREGSET(nt=0x40e, len=8) read 8 bytes
| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d
|
| Attempting to write NT_ARM_FPMR (zero length)
| SETREGSET(nt=0x40e, len=0) wrote 0 bytes
|
| Attempting to read NT_ARM_FPMR::fpmr
| GETREGSET(nt=0x40e, len=8) read 8 bytes
| Read NT_ARM_FPMR::fpmr = 0x900d900d900d900d
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57878/">CVE-2024-57878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57878">CVE-2024-57878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235803">SUSE bug 1235803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57879</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57879" ref_url="https://www.suse.com/security/cve/CVE-2024-57879" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: iso: Always release hdev at the end of iso_listen_bis

Since hci_get_route holds the device before returning, the hdev
should be released with hci_dev_put at the end of iso_listen_bis
even if the function returns with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57879/">CVE-2024-57879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235802">SUSE bug 1235802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57880</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57880" ref_url="https://www.suse.com/security/cve/CVE-2024-57880" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof_sdw: Add space for a terminator into DAIs array

The code uses the initialised member of the asoc_sdw_dailink struct to
determine if a member of the array is in use. However in the case the
array is completely full this will lead to an access 1 past the end of
the array, expand the array by one entry to include a space for a
terminator.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-01-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57880/">CVE-2024-57880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57880">CVE-2024-57880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235800">SUSE bug 1235800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57881</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57881" ref_url="https://www.suse.com/security/cve/CVE-2024-57881" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_alloc: don't call pfn_to_page() on possibly non-existent PFN in split_large_buddy()

In split_large_buddy(), we might call pfn_to_page() on a PFN that might
not exist.  In corner cases, such as when freeing the highest pageblock in
the last memory section, this could result with CONFIG_SPARSEMEM &amp;&amp;
!CONFIG_SPARSEMEM_EXTREME in __pfn_to_section() returning NULL and and
__section_mem_map_addr() dereferencing that NULL pointer.

Let's fix it, and avoid doing a pfn_to_page() call for the first
iteration, where we already have the page.

So far this was found by code inspection, but let's just CC stable as the
fix is easy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57881/">CVE-2024-57881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57881">CVE-2024-57881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235843">SUSE bug 1235843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57882</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57882" ref_url="https://www.suse.com/security/cve/CVE-2024-57882" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix TCP options overflow.

Syzbot reported the following splat:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 UID: 0 PID: 5836 Comm: sshd Not tainted 6.13.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
RIP: 0010:_compound_head include/linux/page-flags.h:242 [inline]
RIP: 0010:put_page+0x23/0x260 include/linux/mm.h:1552
Code: 90 90 90 90 90 90 90 55 41 57 41 56 53 49 89 fe 48 bd 00 00 00 00 00 fc ff df e8 f8 5e 12 f8 49 8d 5e 08 48 89 d8 48 c1 e8 03 &lt;80&gt; 3c 28 00 74 08 48 89 df e8 8f c7 78 f8 48 8b 1b 48 89 de 48 83
RSP: 0000:ffffc90003916c90 EFLAGS: 00010202
RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888030458000
RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff898ca81d R09: 1ffff110054414ac
R10: dffffc0000000000 R11: ffffed10054414ad R12: 0000000000000007
R13: ffff88802a20a542 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f34f496e800(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9d6ec9ec28 CR3: 000000004d260000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 skb_page_unref include/linux/skbuff_ref.h:43 [inline]
 __skb_frag_unref include/linux/skbuff_ref.h:56 [inline]
 skb_release_data+0x483/0x8a0 net/core/skbuff.c:1119
 skb_release_all net/core/skbuff.c:1190 [inline]
 __kfree_skb+0x55/0x70 net/core/skbuff.c:1204
 tcp_clean_rtx_queue net/ipv4/tcp_input.c:3436 [inline]
 tcp_ack+0x2442/0x6bc0 net/ipv4/tcp_input.c:4032
 tcp_rcv_state_process+0x8eb/0x44e0 net/ipv4/tcp_input.c:6805
 tcp_v4_do_rcv+0x77d/0xc70 net/ipv4/tcp_ipv4.c:1939
 tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2351
 ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205
 ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233
 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
 __netif_receive_skb_one_core net/core/dev.c:5672 [inline]
 __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5785
 process_backlog+0x662/0x15b0 net/core/dev.c:6117
 __napi_poll+0xcb/0x490 net/core/dev.c:6883
 napi_poll net/core/dev.c:6952 [inline]
 net_rx_action+0x89b/0x1240 net/core/dev.c:7074
 handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
 __do_softirq kernel/softirq.c:595 [inline]
 invoke_softirq kernel/softirq.c:435 [inline]
 __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
 sysvec_apic_timer_interrupt+0x57/0xc0 arch/x86/kernel/apic/apic.c:1049
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0033:0x7f34f4519ad5
Code: 85 d2 74 0d 0f 10 02 48 8d 54 24 20 0f 11 44 24 20 64 8b 04 25 18 00 00 00 85 c0 75 27 41 b8 08 00 00 00 b8 0f 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 76 75 48 8b 15 24 73 0d 00 f7 d8 64 89 02 48 83
RSP: 002b:00007ffec5b32ce0 EFLAGS: 00000246
RAX: 0000000000000001 RBX: 00000000000668a0 RCX: 00007f34f4519ad5
RDX: 00007ffec5b32d00 RSI: 0000000000000004 RDI: 0000564f4bc6cae0
RBP: 0000564f4bc6b5a0 R08: 0000000000000008 R09: 0000000000000000
R10: 00007ffec5b32de8 R11: 0000000000000246 R12: 0000564f48ea8aa4
R13: 0000000000000001 R14: 0000564f48ea93e8 R15: 00007ffec5b32d68
 &lt;/TASK&gt;

Eric noted a probable shinfo-&gt;nr_frags corruption, which indeed
occurs.

The root cause is a buggy MPTCP option len computation in some
circumstances: the ADD_ADDR option should be mutually exclusive
with DSS since the blamed commit.

Still, mptcp_established_options_add_addr() tries to set the
relevant info in mptcp_out_options, if 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57882/">CVE-2024-57882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57882">CVE-2024-57882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235914">SUSE bug 1235914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235916">SUSE bug 1235916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57883</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57883" ref_url="https://www.suse.com/security/cve/CVE-2024-57883" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: hugetlb: independent PMD page table shared count

The folio refcount may be increased unexpectly through try_get_folio() by
caller such as split_huge_pages.  In huge_pmd_unshare(), we use refcount
to check whether a pmd page table is shared.  The check is incorrect if
the refcount is increased by the above caller, and this can cause the page
table leaked:

 BUG: Bad page state in process sh  pfn:109324
 page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x66 pfn:0x109324
 flags: 0x17ffff800000000(node=0|zone=2|lastcpupid=0xfffff)
 page_type: f2(table)
 raw: 017ffff800000000 0000000000000000 0000000000000000 0000000000000000
 raw: 0000000000000066 0000000000000000 00000000f2000000 0000000000000000
 page dumped because: nonzero mapcount
 ...
 CPU: 31 UID: 0 PID: 7515 Comm: sh Kdump: loaded Tainted: G    B              6.13.0-rc2master+ #7
 Tainted: [B]=BAD_PAGE
 Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
 Call trace:
  show_stack+0x20/0x38 (C)
  dump_stack_lvl+0x80/0xf8
  dump_stack+0x18/0x28
  bad_page+0x8c/0x130
  free_page_is_bad_report+0xa4/0xb0
  free_unref_page+0x3cc/0x620
  __folio_put+0xf4/0x158
  split_huge_pages_all+0x1e0/0x3e8
  split_huge_pages_write+0x25c/0x2d8
  full_proxy_write+0x64/0xd8
  vfs_write+0xcc/0x280
  ksys_write+0x70/0x110
  __arm64_sys_write+0x24/0x38
  invoke_syscall+0x50/0x120
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x34/0x128
  el0t_64_sync_handler+0xc8/0xd0
  el0t_64_sync+0x190/0x198

The issue may be triggered by damon, offline_page, page_idle, etc, which
will increase the refcount of page table.

1. The page table itself will be discarded after reporting the
   "nonzero mapcount".

2. The HugeTLB page mapped by the page table miss freeing since we
   treat the page table as shared and a shared page table will not be
   unmapped.

Fix it by introducing independent PMD page table shared count.  As
described by comment, pt_index/pt_mm/pt_frag_refcount are used for s390
gmap, x86 pgds and powerpc, pt_share_count is used for x86/arm64/riscv
pmds, so we can reuse the field as pt_share_count.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57883/">CVE-2024-57883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57883">CVE-2024-57883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235947">SUSE bug 1235947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57884</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57884" ref_url="https://www.suse.com/security/cve/CVE-2024-57884" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()

The task sometimes continues looping in throttle_direct_reclaim() because
allow_direct_reclaim(pgdat) keeps returning false.  

 #0 [ffff80002cb6f8d0] __switch_to at ffff8000080095ac
 #1 [ffff80002cb6f900] __schedule at ffff800008abbd1c
 #2 [ffff80002cb6f990] schedule at ffff800008abc50c
 #3 [ffff80002cb6f9b0] throttle_direct_reclaim at ffff800008273550
 #4 [ffff80002cb6fa20] try_to_free_pages at ffff800008277b68
 #5 [ffff80002cb6fae0] __alloc_pages_nodemask at ffff8000082c4660
 #6 [ffff80002cb6fc50] alloc_pages_vma at ffff8000082e4a98
 #7 [ffff80002cb6fca0] do_anonymous_page at ffff80000829f5a8
 #8 [ffff80002cb6fce0] __handle_mm_fault at ffff8000082a5974
 #9 [ffff80002cb6fd90] handle_mm_fault at ffff8000082a5bd4

At this point, the pgdat contains the following two zones:

        NODE: 4  ZONE: 0  ADDR: ffff00817fffe540  NAME: "DMA32"
          SIZE: 20480  MIN/LOW/HIGH: 11/28/45
          VM_STAT:
                NR_FREE_PAGES: 359
        NR_ZONE_INACTIVE_ANON: 18813
          NR_ZONE_ACTIVE_ANON: 0
        NR_ZONE_INACTIVE_FILE: 50
          NR_ZONE_ACTIVE_FILE: 0
          NR_ZONE_UNEVICTABLE: 0
        NR_ZONE_WRITE_PENDING: 0
                     NR_MLOCK: 0
                    NR_BOUNCE: 0
                   NR_ZSPAGES: 0
            NR_FREE_CMA_PAGES: 0

        NODE: 4  ZONE: 1  ADDR: ffff00817fffec00  NAME: "Normal"
          SIZE: 8454144  PRESENT: 98304  MIN/LOW/HIGH: 68/166/264
          VM_STAT:
                NR_FREE_PAGES: 146
        NR_ZONE_INACTIVE_ANON: 94668
          NR_ZONE_ACTIVE_ANON: 3
        NR_ZONE_INACTIVE_FILE: 735
          NR_ZONE_ACTIVE_FILE: 78
          NR_ZONE_UNEVICTABLE: 0
        NR_ZONE_WRITE_PENDING: 0
                     NR_MLOCK: 0
                    NR_BOUNCE: 0
                   NR_ZSPAGES: 0
            NR_FREE_CMA_PAGES: 0

In allow_direct_reclaim(), while processing ZONE_DMA32, the sum of
inactive/active file-backed pages calculated in zone_reclaimable_pages()
based on the result of zone_page_state_snapshot() is zero.  

Additionally, since this system lacks swap, the calculation of inactive/
active anonymous pages is skipped.

        crash&gt; p nr_swap_pages
        nr_swap_pages = $1937 = {
          counter = 0
        }

As a result, ZONE_DMA32 is deemed unreclaimable and skipped, moving on to
the processing of the next zone, ZONE_NORMAL, despite ZONE_DMA32 having
free pages significantly exceeding the high watermark.

The problem is that the pgdat-&gt;kswapd_failures hasn't been incremented.

        crash&gt; px ((struct pglist_data *) 0xffff00817fffe540)-&gt;kswapd_failures
        $1935 = 0x0

This is because the node deemed balanced.  The node balancing logic in
balance_pgdat() evaluates all zones collectively.  If one or more zones
(e.g., ZONE_DMA32) have enough free pages to meet their watermarks, the
entire node is deemed balanced.  This causes balance_pgdat() to exit early
before incrementing the kswapd_failures, as it considers the overall
memory state acceptable, even though some zones (like ZONE_NORMAL) remain
under significant pressure.


The patch ensures that zone_reclaimable_pages() includes free pages
(NR_FREE_PAGES) in its calculation when no other reclaimable pages are
available (e.g., file-backed or anonymous pages).  This change prevents
zones like ZONE_DMA32, which have sufficient free pages, from being
mistakenly deemed unreclaimable.  By doing so, the patch ensures proper
node balancing, avoids masking pressure on other zones like ZONE_NORMAL,
and prevents infinite loops in throttle_direct_reclaim() caused by
allow_direct_reclaim(pgdat) repeatedly returning false.


The kernel hangs due to a task stuck in throttle_direct_reclaim(), caused
by a node being incorrectly deemed balanced despite pressure in certain
zones, such as ZONE_NORMAL.  This issue arises from
zone_reclaimable_pages
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57884/">CVE-2024-57884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235948">SUSE bug 1235948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57885</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57885" ref_url="https://www.suse.com/security/cve/CVE-2024-57885" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: fix sleeping function called from invalid context at print message

Address a bug in the kernel that triggers a "sleeping function called from
invalid context" warning when /sys/kernel/debug/kmemleak is printed under
specific conditions:
- CONFIG_PREEMPT_RT=y
- Set SELinux as the LSM for the system
- Set kptr_restrict to 1
- kmemleak buffer contains at least one item

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 136, name: cat
preempt_count: 1, expected: 0
RCU nest depth: 2, expected: 2
6 locks held by cat/136:
 #0: ffff32e64bcbf950 (&amp;p-&gt;lock){+.+.}-{3:3}, at: seq_read_iter+0xb8/0xe30
 #1: ffffafe6aaa9dea0 (scan_mutex){+.+.}-{3:3}, at: kmemleak_seq_start+0x34/0x128
 #3: ffff32e6546b1cd0 (&amp;object-&gt;lock){....}-{2:2}, at: kmemleak_seq_show+0x3c/0x1e0
 #4: ffffafe6aa8d8560 (rcu_read_lock){....}-{1:2}, at: has_ns_capability_noaudit+0x8/0x1b0
 #5: ffffafe6aabbc0f8 (notif_lock){+.+.}-{2:2}, at: avc_compute_av+0xc4/0x3d0
irq event stamp: 136660
hardirqs last  enabled at (136659): [&lt;ffffafe6a80fd7a0&gt;] _raw_spin_unlock_irqrestore+0xa8/0xd8
hardirqs last disabled at (136660): [&lt;ffffafe6a80fd85c&gt;] _raw_spin_lock_irqsave+0x8c/0xb0
softirqs last  enabled at (0): [&lt;ffffafe6a5d50b28&gt;] copy_process+0x11d8/0x3df8
softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
Preemption disabled at:
[&lt;ffffafe6a6598a4c&gt;] kmemleak_seq_show+0x3c/0x1e0
CPU: 1 UID: 0 PID: 136 Comm: cat Tainted: G            E      6.11.0-rt7+ #34
Tainted: [E]=UNSIGNED_MODULE
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace+0xa0/0x128
 show_stack+0x1c/0x30
 dump_stack_lvl+0xe8/0x198
 dump_stack+0x18/0x20
 rt_spin_lock+0x8c/0x1a8
 avc_perm_nonode+0xa0/0x150
 cred_has_capability.isra.0+0x118/0x218
 selinux_capable+0x50/0x80
 security_capable+0x7c/0xd0
 has_ns_capability_noaudit+0x94/0x1b0
 has_capability_noaudit+0x20/0x30
 restricted_pointer+0x21c/0x4b0
 pointer+0x298/0x760
 vsnprintf+0x330/0xf70
 seq_printf+0x178/0x218
 print_unreferenced+0x1a4/0x2d0
 kmemleak_seq_show+0xd0/0x1e0
 seq_read_iter+0x354/0xe30
 seq_read+0x250/0x378
 full_proxy_read+0xd8/0x148
 vfs_read+0x190/0x918
 ksys_read+0xf0/0x1e0
 __arm64_sys_read+0x70/0xa8
 invoke_syscall.constprop.0+0xd4/0x1d8
 el0_svc+0x50/0x158
 el0t_64_sync+0x17c/0x180

%pS and %pK, in the same back trace line, are redundant, and %pS can void
%pK service in certain contexts.

%pS alone already provides the necessary information, and if it cannot
resolve the symbol, it falls back to printing the raw address voiding
the original intent behind the %pK.

Additionally, %pK requires a privilege check CAP_SYSLOG enforced through
the LSM, which can trigger a "sleeping function called from invalid
context" warning under RT_PREEMPT kernels when the check occurs in an
atomic context. This issue may also affect other LSMs.

This change avoids the unnecessary privilege check and resolves the
sleeping function warning without any loss of information.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57885/">CVE-2024-57885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235925">SUSE bug 1235925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57886</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57886" ref_url="https://www.suse.com/security/cve/CVE-2024-57886" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/core: fix new damon_target objects leaks on damon_commit_targets()

Patch series "mm/damon/core: fix memory leaks and ignored inputs from
damon_commit_ctx()".

Due to two bugs in damon_commit_targets() and damon_commit_schemes(),
which are called from damon_commit_ctx(), some user inputs can be ignored,
and some mmeory objects can be leaked.  Fix those.

Note that only DAMON sysfs interface users are affected.  Other DAMON core
API user modules that more focused more on simple and dedicated production
usages, including DAMON_RECLAIM and DAMON_LRU_SORT are not using the buggy
function in the way, so not affected.


This patch (of 2):

When new DAMON targets are added via damon_commit_targets(), the newly
created targets are not deallocated when updating the internal data
(damon_commit_target()) is failed.  Worse yet, even if the setup is
successfully done, the new target is not linked to the context.  Hence,
the new targets are always leaked regardless of the internal data setup
failure.  Fix the leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57886/">CVE-2024-57886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57886">CVE-2024-57886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235951">SUSE bug 1235951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57887</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57887" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57887" ref_url="https://www.suse.com/security/cve/CVE-2024-57887" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: adv7511: Fix use-after-free in adv7533_attach_dsi()

The host_node pointer was assigned and freed in adv7533_parse_dt(), and
later, adv7533_attach_dsi() uses the same. Fix this use-after-free issue
by dropping of_node_put() in adv7533_parse_dt() and calling of_node_put()
in error path of probe() and also in the remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57887/">CVE-2024-57887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57887">CVE-2024-57887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235952">SUSE bug 1235952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57888</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57888" ref_url="https://www.suse.com/security/cve/CVE-2024-57888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker

After commit
746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
amdgpu started seeing the following warning:

 [ ] workqueue: WQ_MEM_RECLAIM sdma0:drm_sched_run_job_work [gpu_sched] is flushing !WQ_MEM_RECLAIM events:amdgpu_device_delay_enable_gfx_off [amdgpu]
...
 [ ] Workqueue: sdma0 drm_sched_run_job_work [gpu_sched]
...
 [ ] Call Trace:
 [ ]  &lt;TASK&gt;
...
 [ ]  ? check_flush_dependency+0xf5/0x110
...
 [ ]  cancel_delayed_work_sync+0x6e/0x80
 [ ]  amdgpu_gfx_off_ctrl+0xab/0x140 [amdgpu]
 [ ]  amdgpu_ring_alloc+0x40/0x50 [amdgpu]
 [ ]  amdgpu_ib_schedule+0xf4/0x810 [amdgpu]
 [ ]  ? drm_sched_run_job_work+0x22c/0x430 [gpu_sched]
 [ ]  amdgpu_job_run+0xaa/0x1f0 [amdgpu]
 [ ]  drm_sched_run_job_work+0x257/0x430 [gpu_sched]
 [ ]  process_one_work+0x217/0x720
...
 [ ]  &lt;/TASK&gt;

The intent of the verifcation done in check_flush_depedency is to ensure
forward progress during memory reclaim, by flagging cases when either a
memory reclaim process, or a memory reclaim work item is flushed from a
context not marked as memory reclaim safe.

This is correct when flushing, but when called from the
cancel(_delayed)_work_sync() paths it is a false positive because work is
either already running, or will not be running at all. Therefore
cancelling it is safe and we can relax the warning criteria by letting the
helper know of the calling context.

References: 746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57888/">CVE-2024-57888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57888">CVE-2024-57888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235918">SUSE bug 1235918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57889</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57889" ref_url="https://www.suse.com/security/cve/CVE-2024-57889" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking

If a device uses MCP23xxx IO expander to receive IRQs, the following
bug can happen:

  BUG: sleeping function called from invalid context
    at kernel/locking/mutex.c:283
  in_atomic(): 1, irqs_disabled(): 1, non_block: 0, ...
  preempt_count: 1, expected: 0
  ...
  Call Trace:
  ...
  __might_resched+0x104/0x10e
  __might_sleep+0x3e/0x62
  mutex_lock+0x20/0x4c
  regmap_lock_mutex+0x10/0x18
  regmap_update_bits_base+0x2c/0x66
  mcp23s08_irq_set_type+0x1ae/0x1d6
  __irq_set_trigger+0x56/0x172
  __setup_irq+0x1e6/0x646
  request_threaded_irq+0xb6/0x160
  ...

We observed the problem while experimenting with a touchscreen driver which
used MCP23017 IO expander (I2C).

The regmap in the pinctrl-mcp23s08 driver uses a mutex for protection from
concurrent accesses, which is the default for regmaps without .fast_io,
.disable_locking, etc.

mcp23s08_irq_set_type() calls regmap_update_bits_base(), and the latter
locks the mutex.

However, __setup_irq() locks desc-&gt;lock spinlock before calling these
functions. As a result, the system tries to lock the mutex whole holding
the spinlock.

It seems, the internal regmap locks are not needed in this driver at all.
mcp-&gt;lock seems to protect the regmap from concurrent accesses already,
except, probably, in mcp_pinconf_get/set.

mcp23s08_irq_set_type() and mcp23s08_irq_mask/unmask() are called under
chip_bus_lock(), which calls mcp23s08_irq_bus_lock(). The latter takes
mcp-&gt;lock and enables regmap caching, so that the potentially slow I2C
accesses are deferred until chip_bus_unlock().

The accesses to the regmap from mcp23s08_probe_one() do not need additional
locking.

In all remaining places where the regmap is accessed, except
mcp_pinconf_get/set(), the driver already takes mcp-&gt;lock.

This patch adds locking in mcp_pinconf_get/set() and disables internal
locking in the regmap config. Among other things, it fixes the sleeping
in atomic context described above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57889/">CVE-2024-57889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57889">CVE-2024-57889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236573">SUSE bug 1236573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57890</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57890" ref_url="https://www.suse.com/security/cve/CVE-2024-57890" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/uverbs: Prevent integer overflow issue

In the expression "cmd.wqe_size * cmd.wr_count", both variables are u32
values that come from the user so the multiplication can lead to integer
wrapping.  Then we pass the result to uverbs_request_next_ptr() which also
could potentially wrap.  The "cmd.sge_count * sizeof(struct ib_uverbs_sge)"
multiplication can also overflow on 32bit systems although it's fine on
64bit systems.

This patch does two things.  First, I've re-arranged the condition in
uverbs_request_next_ptr() so that the use controlled variable "len" is on
one side of the comparison by itself without any math.  Then I've modified
all the callers to use size_mul() for the multiplications.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57890/">CVE-2024-57890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235919">SUSE bug 1235919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57891</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57891" ref_url="https://www.suse.com/security/cve/CVE-2024-57891" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Fix invalid irq restore in scx_ops_bypass()

While adding outer irqsave/restore locking, 0e7ffff1b811 ("scx: Fix raciness
in scx_ops_bypass()") forgot to convert an inner rq_unlock_irqrestore() to
rq_unlock() which could re-enable IRQ prematurely leading to the following
warning:

  raw_local_irq_restore() called with IRQs enabled
  WARNING: CPU: 1 PID: 96 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
  ...
  Sched_ext: create_dsq (enabling)
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : warn_bogus_irq_restore+0x30/0x40
  lr : warn_bogus_irq_restore+0x30/0x40
  ...
  Call trace:
   warn_bogus_irq_restore+0x30/0x40 (P)
   warn_bogus_irq_restore+0x30/0x40 (L)
   scx_ops_bypass+0x224/0x3b8
   scx_ops_enable.isra.0+0x2c8/0xaa8
   bpf_scx_reg+0x18/0x30
  ...
  irq event stamp: 33739
  hardirqs last  enabled at (33739): [&lt;ffff8000800b699c&gt;] scx_ops_bypass+0x174/0x3b8
  hardirqs last disabled at (33738): [&lt;ffff800080d48ad4&gt;] _raw_spin_lock_irqsave+0xb4/0xd8

Drop the stray _irqrestore().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57891/">CVE-2024-57891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57891">CVE-2024-57891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235953">SUSE bug 1235953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57892</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57892" ref_url="https://www.suse.com/security/cve/CVE-2024-57892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv

When mounting ocfs2 and then remounting it as read-only, a
slab-use-after-free occurs after the user uses a syscall to
quota_getnextquota.  Specifically, sb_dqinfo(sb, type)-&gt;dqi_priv is the
dangling pointer.

During the remounting process, the pointer dqi_priv is freed but is never
set as null leaving it to be accessed.  Additionally, the read-only option
for remounting sets the DQUOT_SUSPENDED flag instead of setting the
DQUOT_USAGE_ENABLED flags.  Moreover, later in the process of getting the
next quota, the function ocfs2_get_next_id is called and only checks the
quota usage flags and not the quota suspended flags.

To fix this, I set dqi_priv to null when it is freed after remounting with
read-only and put a check for DQUOT_SUSPENDED in ocfs2_get_next_id.

[akpm@linux-foundation.org: coding-style cleanups]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57892/">CVE-2024-57892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57892">CVE-2024-57892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235964">SUSE bug 1235964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57893</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57893" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57893" ref_url="https://www.suse.com/security/cve/CVE-2024-57893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: seq: oss: Fix races at processing SysEx messages

OSS sequencer handles the SysEx messages split in 6 bytes packets, and
ALSA sequencer OSS layer tries to combine those.  It stores the data
in the internal buffer and this access is racy as of now, which may
lead to the out-of-bounds access.

As a temporary band-aid fix, introduce a mutex for serializing the
process of the SysEx message packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57893/">CVE-2024-57893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57893">CVE-2024-57893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235920">SUSE bug 1235920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57894</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57894" ref_url="https://www.suse.com/security/cve/CVE-2024-57894" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix sleeping function called from invalid context

This reworks hci_cb_list to not use mutex hci_cb_list_lock to avoid bugs
like the bellow:

BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5070, name: kworker/u9:2
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
4 locks held by kworker/u9:2/5070:
 #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
 #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
 #1: ffffc90003b6fd00 ((work_completion)(&amp;hdev-&gt;rx_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
 #1: ffffc90003b6fd00 ((work_completion)(&amp;hdev-&gt;rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
 #2: ffff8880665d0078 (&amp;hdev-&gt;lock){+.+.}-{3:3}, at: hci_le_create_big_complete_evt+0xcf/0xae0 net/bluetooth/hci_event.c:6914
 #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: hci_le_create_big_complete_evt+0xdb/0xae0 net/bluetooth/hci_event.c:6915
CPU: 0 PID: 5070 Comm: kworker/u9:2 Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: hci0 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 __might_resched+0x5d4/0x780 kernel/sched/core.c:10187
 __mutex_lock_common kernel/locking/mutex.c:585 [inline]
 __mutex_lock+0xc1/0xd70 kernel/locking/mutex.c:752
 hci_connect_cfm include/net/bluetooth/hci_core.h:2004 [inline]
 hci_le_create_big_complete_evt+0x3d9/0xae0 net/bluetooth/hci_event.c:6939
 hci_event_func net/bluetooth/hci_event.c:7514 [inline]
 hci_event_packet+0xa53/0x1540 net/bluetooth/hci_event.c:7569
 hci_rx_work+0x3e8/0xca0 net/bluetooth/hci_core.c:4171
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0xa00/0x1770 kernel/workqueue.c:3335
 worker_thread+0x86d/0xd70 kernel/workqueue.c:3416
 kthread+0x2f0/0x390 kernel/kthread.c:388
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57894/">CVE-2024-57894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235922">SUSE bug 1235922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57895</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57895" ref_url="https://www.suse.com/security/cve/CVE-2024-57895" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: set ATTR_CTIME flags when setting mtime

David reported that the new warning from setattr_copy_mgtime is coming
like the following.

[  113.215316] ------------[ cut here ]------------
[  113.215974] WARNING: CPU: 1 PID: 31 at fs/attr.c:300 setattr_copy+0x1ee/0x200
[  113.219192] CPU: 1 UID: 0 PID: 31 Comm: kworker/1:1 Not tainted 6.13.0-rc1+ #234
[  113.220127] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
[  113.221530] Workqueue: ksmbd-io handle_ksmbd_work [ksmbd]
[  113.222220] RIP: 0010:setattr_copy+0x1ee/0x200
[  113.222833] Code: 24 28 49 8b 44 24 30 48 89 53 58 89 43 6c 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 48 89 df e8 77 d6 ff ff e9 cd fe ff ff &lt;0f&gt; 0b e9 be fe ff ff 66 0
[  113.225110] RSP: 0018:ffffaf218010fb68 EFLAGS: 00010202
[  113.225765] RAX: 0000000000000120 RBX: ffffa446815f8568 RCX: 0000000000000003
[  113.226667] RDX: ffffaf218010fd38 RSI: ffffa446815f8568 RDI: ffffffff94eb03a0
[  113.227531] RBP: ffffaf218010fb90 R08: 0000001a251e217d R09: 00000000675259fa
[  113.228426] R10: 0000000002ba8a6d R11: ffffa4468196c7a8 R12: ffffaf218010fd38
[  113.229304] R13: 0000000000000120 R14: ffffffff94eb03a0 R15: 0000000000000000
[  113.230210] FS:  0000000000000000(0000) GS:ffffa44739d00000(0000) knlGS:0000000000000000
[  113.231215] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  113.232055] CR2: 00007efe0053d27e CR3: 000000000331a000 CR4: 00000000000006b0
[  113.232926] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  113.233812] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  113.234797] Call Trace:
[  113.235116]  &lt;TASK&gt;
[  113.235393]  ? __warn+0x73/0xd0
[  113.235802]  ? setattr_copy+0x1ee/0x200
[  113.236299]  ? report_bug+0xf3/0x1e0
[  113.236757]  ? handle_bug+0x4d/0x90
[  113.237202]  ? exc_invalid_op+0x13/0x60
[  113.237689]  ? asm_exc_invalid_op+0x16/0x20
[  113.238185]  ? setattr_copy+0x1ee/0x200
[  113.238692]  btrfs_setattr+0x80/0x820 [btrfs]
[  113.239285]  ? get_stack_info_noinstr+0x12/0xf0
[  113.239857]  ? __module_address+0x22/0xa0
[  113.240368]  ? handle_ksmbd_work+0x6e/0x460 [ksmbd]
[  113.240993]  ? __module_text_address+0x9/0x50
[  113.241545]  ? __module_address+0x22/0xa0
[  113.242033]  ? unwind_next_frame+0x10e/0x920
[  113.242600]  ? __pfx_stack_trace_consume_entry+0x10/0x10
[  113.243268]  notify_change+0x2c2/0x4e0
[  113.243746]  ? stack_depot_save_flags+0x27/0x730
[  113.244339]  ? set_file_basic_info+0x130/0x2b0 [ksmbd]
[  113.244993]  set_file_basic_info+0x130/0x2b0 [ksmbd]
[  113.245613]  ? process_scheduled_works+0xbe/0x310
[  113.246181]  ? worker_thread+0x100/0x240
[  113.246696]  ? kthread+0xc8/0x100
[  113.247126]  ? ret_from_fork+0x2b/0x40
[  113.247606]  ? ret_from_fork_asm+0x1a/0x30
[  113.248132]  smb2_set_info+0x63f/0xa70 [ksmbd]

ksmbd is trying to set the atime and mtime via notify_change without also
setting the ctime. so This patch add ATTR_CTIME flags when setting mtime
to avoid a warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57895/">CVE-2024-57895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57895">CVE-2024-57895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235974">SUSE bug 1235974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57896</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57896" ref_url="https://www.suse.com/security/cve/CVE-2024-57896" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount

During the unmount path, at close_ctree(), we first stop the cleaner
kthread, using kthread_stop() which frees the associated task_struct, and
then stop and destroy all the work queues. However after we stopped the
cleaner we may still have a worker from the delalloc_workers queue running
inode.c:submit_compressed_extents(), which calls btrfs_add_delayed_iput(),
which in turn tries to wake up the cleaner kthread - which was already
destroyed before, resulting in a use-after-free on the task_struct.

Syzbot reported this with the following stack traces:

  BUG: KASAN: slab-use-after-free in __lock_acquire+0x78/0x2100 kernel/locking/lockdep.c:5089
  Read of size 8 at addr ffff8880259d2818 by task kworker/u8:3/52

  CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.13.0-rc1-syzkaller-00002-gcdd30ebb1b9f #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  Workqueue: btrfs-delalloc btrfs_work_helper
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:378 [inline]
   print_report+0x169/0x550 mm/kasan/report.c:489
   kasan_report+0x143/0x180 mm/kasan/report.c:602
   __lock_acquire+0x78/0x2100 kernel/locking/lockdep.c:5089
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
   _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
   class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]
   try_to_wake_up+0xc2/0x1470 kernel/sched/core.c:4205
   submit_compressed_extents+0xdf/0x16e0 fs/btrfs/inode.c:1615
   run_ordered_work fs/btrfs/async-thread.c:288 [inline]
   btrfs_work_helper+0x96f/0xc40 fs/btrfs/async-thread.c:324
   process_one_work kernel/workqueue.c:3229 [inline]
   process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
   worker_thread+0x870/0xd30 kernel/workqueue.c:3391
   kthread+0x2f0/0x390 kernel/kthread.c:389
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   &lt;/TASK&gt;

  Allocated by task 2:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
   unpoison_slab_object mm/kasan/common.c:319 [inline]
   __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
   kasan_slab_alloc include/linux/kasan.h:250 [inline]
   slab_post_alloc_hook mm/slub.c:4104 [inline]
   slab_alloc_node mm/slub.c:4153 [inline]
   kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4205
   alloc_task_struct_node kernel/fork.c:180 [inline]
   dup_task_struct+0x57/0x8c0 kernel/fork.c:1113
   copy_process+0x5d1/0x3d50 kernel/fork.c:2225
   kernel_clone+0x223/0x870 kernel/fork.c:2807
   kernel_thread+0x1bc/0x240 kernel/fork.c:2869
   create_kthread kernel/kthread.c:412 [inline]
   kthreadd+0x60d/0x810 kernel/kthread.c:767
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

  Freed by task 24:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
   kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582
   poison_slab_object mm/kasan/common.c:247 [inline]
   __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
   kasan_slab_free include/linux/kasan.h:233 [inline]
   slab_free_hook mm/slub.c:2338 [inline]
   slab_free mm/slub.c:4598 [inline]
   kmem_cache_free+0x195/0x410 mm/slub.c:4700
   put_task_struct include/linux/sched/task.h:144 [inline]
   delayed_put_task_struct+0x125/0x300 kernel/exit.c:227
   rcu_do_batch kernel/rcu/tree.c:2567 [inline]
   rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823
   handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:554
   run_ksoftirqd+0xca/0x130 kernel/softirq.c:943
  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57896/">CVE-2024-57896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57896">CVE-2024-57896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235965">SUSE bug 1235965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57897</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57897" ref_url="https://www.suse.com/security/cve/CVE-2024-57897" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Correct the migration DMA map direction

The SVM DMA device map direction should be set the same as
the DMA unmap setting, otherwise the DMA core will report
the following warning.

Before finialize this solution, there're some discussion on
the DMA mapping type(stream-based or coherent) in this KFD
migration case, followed by https://lore.kernel.org/all/04d4ab32
-45a1-4b88-86ee-fb0f35a0ca40@amd.com/T/.

As there's no dma_sync_single_for_*() in the DMA buffer accessed
that because this migration operation should be sync properly and
automatically. Give that there's might not be a performance problem
in various cache sync policy of DMA sync. Therefore, in order to
simplify the DMA direction setting alignment, let's set the DMA map
direction as BIDIRECTIONAL.

[  150.834218] WARNING: CPU: 8 PID: 1812 at kernel/dma/debug.c:1028 check_unmap+0x1cc/0x930
[  150.834225] Modules linked in: amdgpu(OE) amdxcp drm_exec(OE) gpu_sched drm_buddy(OE) drm_ttm_helper(OE) ttm(OE) drm_suballoc_helper(OE) drm_display_helper(OE) drm_kms_helper(OE) i2c_algo_bit rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace netfs xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo iptable_nat xt_addrtype iptable_filter br_netfilter nvme_fabrics overlay nfnetlink_cttimeout nfnetlink openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bridge stp llc sch_fq_codel intel_rapl_msr amd_atl intel_rapl_common snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd snd_pci_acp6x snd_hda_codec snd_acp_config snd_hda_core snd_hwdep snd_soc_acpi kvm_amd sunrpc snd_pcm kvm binfmt_misc snd_seq_midi crct10dif_pclmul snd_seq_midi_event ghash_clmulni_intel sha512_ssse3 snd_rawmidi nls_iso8859_1 sha256_ssse3 sha1_ssse3 snd_seq aesni_intel snd_seq_device crypto_simd snd_timer cryptd input_leds
[  150.834310]  wmi_bmof serio_raw k10temp rapl snd sp5100_tco ipmi_devintf soundcore ccp ipmi_msghandler cm32181 industrialio mac_hid msr parport_pc ppdev lp parport efi_pstore drm(OE) ip_tables x_tables pci_stub crc32_pclmul nvme ahci libahci i2c_piix4 r8169 nvme_core i2c_designware_pci realtek i2c_ccgx_ucsi video wmi hid_generic cdc_ether usbnet usbhid hid r8152 mii
[  150.834354] CPU: 8 PID: 1812 Comm: rocrtst64 Tainted: G           OE      6.10.0-custom #492
[  150.834358] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS RMJ1009A 06/13/2021
[  150.834360] RIP: 0010:check_unmap+0x1cc/0x930
[  150.834363] Code: c0 4c 89 4d c8 e8 34 bf 86 00 4c 8b 4d c8 4c 8b 45 c0 48 8b 4d b8 48 89 c6 41 57 4c 89 ea 48 c7 c7 80 49 b4 84 e8 b4 81 f3 ff &lt;0f&gt; 0b 48 c7 c7 04 83 ac 84 e8 76 ba fc ff 41 8b 76 4c 49 8d 7e 50
[  150.834365] RSP: 0018:ffffaac5023739e0 EFLAGS: 00010086
[  150.834368] RAX: 0000000000000000 RBX: ffffffff8566a2e0 RCX: 0000000000000027
[  150.834370] RDX: ffff8f6a8f621688 RSI: 0000000000000001 RDI: ffff8f6a8f621680
[  150.834372] RBP: ffffaac502373a30 R08: 00000000000000c9 R09: ffffaac502373850
[  150.834373] R10: ffffaac502373848 R11: ffffffff84f46328 R12: ffffaac502373a40
[  150.834375] R13: ffff8f6741045330 R14: ffff8f6741a77700 R15: ffffffff84ac831b
[  150.834377] FS:  00007faf0fc94c00(0000) GS:ffff8f6a8f600000(0000) knlGS:0000000000000000
[  150.834379] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  150.834381] CR2: 00007faf0b600020 CR3: 000000010a52e000 CR4: 0000000000350ef0
[  150.834383] Call Trace:
[  150.834385]  &lt;TASK&gt;
[  150.834387]  ? show_regs+0x6d/0x80
[  150.834393]  ? __warn+0x8c/0x140
[  150.834397]  ? check_unmap+0x1cc/0x930
[  150.834400]  ? report_bug+0x193/0x1a0
[  150.834406]  ? handle_bug+0x46/0x80
[  150.834410]  ? exc_invalid_op+0x1d/0x80
[  150.834413]  ? asm_exc_invalid_op+0x1f/0x30
[  150.834420]  ? check_unmap+0x1cc/0x930
[  150.834425]  debug_dma_unmap_page+0x86/0x90
[  150.834431]  ? srso_return_thunk+0x5/0x5f
[  150.834435] 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57897/">CVE-2024-57897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57897">CVE-2024-57897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235969">SUSE bug 1235969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57898</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57898" ref_url="https://www.suse.com/security/cve/CVE-2024-57898" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: clear link ID from bitmap during link delete after clean up

Currently, during link deletion, the link ID is first removed from the
valid_links bitmap before performing any clean-up operations. However, some
functions require the link ID to remain in the valid_links bitmap. One
such example is cfg80211_cac_event(). The flow is -

nl80211_remove_link()
    cfg80211_remove_link()
        ieee80211_del_intf_link()
            ieee80211_vif_set_links()
                ieee80211_vif_update_links()
                    ieee80211_link_stop()
                        cfg80211_cac_event()

cfg80211_cac_event() requires link ID to be present but it is cleared
already in cfg80211_remove_link(). Ultimately, WARN_ON() is hit.

Therefore, clear the link ID from the bitmap only after completing the link
clean-up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57898/">CVE-2024-57898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57898">CVE-2024-57898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235966">SUSE bug 1235966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57899</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57899" ref_url="https://www.suse.com/security/cve/CVE-2024-57899" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix mbss changed flags corruption on 32 bit systems

On 32-bit systems, the size of an unsigned long is 4 bytes,
while a u64 is 8 bytes. Therefore, when using
or_each_set_bit(bit, &amp;bits, sizeof(changed) * BITS_PER_BYTE),
the code is incorrectly searching for a bit in a 32-bit
variable that is expected to be 64 bits in size,
leading to incorrect bit finding.

Solution: Ensure that the size of the bits variable is correctly
adjusted for each architecture.

 Call Trace:
  ? show_regs+0x54/0x58
  ? __warn+0x6b/0xd4
  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]
  ? report_bug+0x113/0x150
  ? exc_overflow+0x30/0x30
  ? handle_bug+0x27/0x44
  ? exc_invalid_op+0x18/0x50
  ? handle_exception+0xf6/0xf6
  ? exc_overflow+0x30/0x30
  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]
  ? exc_overflow+0x30/0x30
  ? ieee80211_link_info_change_notify+0xcc/0xd4 [mac80211]
  ? ieee80211_mesh_work+0xff/0x260 [mac80211]
  ? cfg80211_wiphy_work+0x72/0x98 [cfg80211]
  ? process_one_work+0xf1/0x1fc
  ? worker_thread+0x2c0/0x3b4
  ? kthread+0xc7/0xf0
  ? mod_delayed_work_on+0x4c/0x4c
  ? kthread_complete_and_exit+0x14/0x14
  ? ret_from_fork+0x24/0x38
  ? kthread_complete_and_exit+0x14/0x14
  ? ret_from_fork_asm+0xf/0x14
  ? entry_INT80_32+0xf0/0xf0

[restore no-op path for no changes]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57899/">CVE-2024-57899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57899">CVE-2024-57899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235924">SUSE bug 1235924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57900</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57900" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57900" ref_url="https://www.suse.com/security/cve/CVE-2024-57900" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ila: serialize calls to nf_register_net_hooks()

syzbot found a race in ila_add_mapping() [1]

commit 031ae72825ce ("ila: call nf_unregister_net_hooks() sooner")
attempted to fix a similar issue.

Looking at the syzbot repro, we have concurrent ILA_CMD_ADD commands.

Add a mutex to make sure at most one thread is calling nf_register_net_hooks().

[1]
 BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline]
 BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604
Read of size 4 at addr ffff888028f40008 by task dhcpcd/5501

CPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 &lt;IRQ&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xc3/0x620 mm/kasan/report.c:489
  kasan_report+0xd9/0x110 mm/kasan/report.c:602
  rht_key_hashfn include/linux/rhashtable.h:159 [inline]
  __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604
  rhashtable_lookup include/linux/rhashtable.h:646 [inline]
  rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
  ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline]
  ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline]
  ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
  nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309
  __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672
  __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785
  process_backlog+0x443/0x15f0 net/core/dev.c:6117
  __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883
  napi_poll net/core/dev.c:6952 [inline]
  net_rx_action+0xa94/0x1010 net/core/dev.c:7074
  handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
  __do_softirq kernel/softirq.c:595 [inline]
  invoke_softirq kernel/softirq.c:435 [inline]
  __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
  sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57900/">CVE-2024-57900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57900">CVE-2024-57900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235973">SUSE bug 1235973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57901</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57901" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57901" ref_url="https://www.suse.com/security/cve/CVE-2024-57901" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK

Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found
by syzbot.

Rework vlan_get_protocol_dgram() to not touch skb at all,
so that it can be used from many cpus on the same skb.

Add a const qualifier to skb argument.

[1]
skbuff: skb_under_panic: text:ffffffff8a8ccd05 len:29 put:14 head:ffff88807fc8e400 data:ffff88807fc8e3f4 tail:0x11 end:0x140 dev:&lt;NULL&gt;
------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 5892 Comm: syz-executor883 Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0b 8d 48 c7 c6 86 d5 25 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 5a 69 79 f7 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc900038d7638 EFLAGS: 00010282
RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 609ffd18ea660600
RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
RBP: ffff88802483c8d0 R08: ffffffff817f0a8c R09: 1ffff9200071ae60
R10: dffffc0000000000 R11: fffff5200071ae61 R12: 0000000000000140
R13: ffff88807fc8e400 R14: ffff88807fc8e3f4 R15: 0000000000000011
FS:  00007fbac5e006c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fbac5e00d58 CR3: 000000001238e000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  vlan_get_protocol_dgram+0x165/0x290 net/packet/af_packet.c:585
  packet_recvmsg+0x948/0x1ef0 net/packet/af_packet.c:3552
  sock_recvmsg_nosec net/socket.c:1033 [inline]
  sock_recvmsg+0x22f/0x280 net/socket.c:1055
  ____sys_recvmsg+0x1c6/0x480 net/socket.c:2803
  ___sys_recvmsg net/socket.c:2845 [inline]
  do_recvmmsg+0x426/0xab0 net/socket.c:2940
  __sys_recvmmsg net/socket.c:3014 [inline]
  __do_sys_recvmmsg net/socket.c:3037 [inline]
  __se_sys_recvmmsg net/socket.c:3030 [inline]
  __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3030
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57901/">CVE-2024-57901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57901">CVE-2024-57901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235900">SUSE bug 1235900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57902</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57902" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57902" ref_url="https://www.suse.com/security/cve/CVE-2024-57902" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_packet: fix vlan_get_tci() vs MSG_PEEK

Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found
by syzbot.

Rework vlan_get_tci() to not touch skb at all,
so that it can be used from many cpus on the same skb.

Add a const qualifier to skb argument.

[1]
skbuff: skb_under_panic: text:ffffffff8a8da482 len:32 put:14 head:ffff88807a1d5800 data:ffff88807a1d5810 tail:0x14 end:0x140 dev:&lt;NULL&gt;
------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 5880 Comm: syz-executor172 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0b 8d 48 c7 c6 9e 6c 26 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 3a 5a 79 f7 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc90003baf5b8 EFLAGS: 00010286
RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 8565c1eec37aa000
RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
RBP: ffff88802616fb50 R08: ffffffff817f0a4c R09: 1ffff92000775e50
R10: dffffc0000000000 R11: fffff52000775e51 R12: 0000000000000140
R13: ffff88807a1d5800 R14: ffff88807a1d5810 R15: 0000000000000014
FS:  00007fa03261f6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffd65753000 CR3: 0000000031720000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  vlan_get_tci+0x272/0x550 net/packet/af_packet.c:565
  packet_recvmsg+0x13c9/0x1ef0 net/packet/af_packet.c:3616
  sock_recvmsg_nosec net/socket.c:1044 [inline]
  sock_recvmsg+0x22f/0x280 net/socket.c:1066
  ____sys_recvmsg+0x1c6/0x480 net/socket.c:2814
  ___sys_recvmsg net/socket.c:2856 [inline]
  do_recvmmsg+0x426/0xab0 net/socket.c:2951
  __sys_recvmmsg net/socket.c:3025 [inline]
  __do_sys_recvmmsg net/socket.c:3048 [inline]
  __se_sys_recvmmsg net/socket.c:3041 [inline]
  __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3041
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57902/">CVE-2024-57902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57902">CVE-2024-57902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235950">SUSE bug 1235950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57903</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57903" ref_url="https://www.suse.com/security/cve/CVE-2024-57903" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: restrict SO_REUSEPORT to inet sockets

After blamed commit, crypto sockets could accidentally be destroyed
from RCU call back, as spotted by zyzbot [1].

Trying to acquire a mutex in RCU callback is not allowed.

Restrict SO_REUSEPORT socket option to inet sockets.

v1 of this patch supported TCP, UDP and SCTP sockets,
but fcnal-test.sh test needed RAW and ICMP support.

[1]
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:562
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 24, name: ksoftirqd/1
preempt_count: 100, expected: 0
RCU nest depth: 0, expected: 0
1 lock held by ksoftirqd/1/24:
  #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
  #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2561 [inline]
  #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xa37/0x17a0 kernel/rcu/tree.c:2823
Preemption disabled at:
 [&lt;ffffffff8161c8c8&gt;] softirq_handle_begin kernel/softirq.c:402 [inline]
 [&lt;ffffffff8161c8c8&gt;] handle_softirqs+0x128/0x9b0 kernel/softirq.c:537
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00174-ga024e377efed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
  __might_resched+0x5d4/0x780 kernel/sched/core.c:8758
  __mutex_lock_common kernel/locking/mutex.c:562 [inline]
  __mutex_lock+0x131/0xee0 kernel/locking/mutex.c:735
  crypto_put_default_null_skcipher+0x18/0x70 crypto/crypto_null.c:179
  aead_release+0x3d/0x50 crypto/algif_aead.c:489
  alg_do_release crypto/af_alg.c:118 [inline]
  alg_sock_destruct+0x86/0xc0 crypto/af_alg.c:502
  __sk_destruct+0x58/0x5f0 net/core/sock.c:2260
  rcu_do_batch kernel/rcu/tree.c:2567 [inline]
  rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823
  handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
  run_ksoftirqd+0xca/0x130 kernel/softirq.c:950
  smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57903/">CVE-2024-57903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235967">SUSE bug 1235967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57904</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57904" ref_url="https://www.suse.com/security/cve/CVE-2024-57904" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: at91: call input_free_device() on allocated iio_dev

Current implementation of at91_ts_register() calls input_free_deivce()
on st-&gt;ts_input, however, the err label can be reached before the
allocated iio_dev is stored to st-&gt;ts_input. Thus call
input_free_device() on input instead of st-&gt;ts_input.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57904/">CVE-2024-57904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57904">CVE-2024-57904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236078">SUSE bug 1236078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57905</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57905" ref_url="https://www.suse.com/security/cve/CVE-2024-57905" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57905/">CVE-2024-57905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57905">CVE-2024-57905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236083">SUSE bug 1236083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57906</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57906" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57906" ref_url="https://www.suse.com/security/cve/CVE-2024-57906" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ti-ads8688: fix information leak in triggered buffer

The 'buffer' local array is used to push data to user space from a
triggered buffer, but it does not set values for inactive channels, as
it only uses iio_for_each_active_channel() to assign new values.

Initialize the array to zero before using it to avoid pushing
uninitialized information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57906/">CVE-2024-57906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57906">CVE-2024-57906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236088">SUSE bug 1236088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57907</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57907" ref_url="https://www.suse.com/security/cve/CVE-2024-57907" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: rockchip_saradc: fix information leak in triggered buffer

The 'data' local struct is used to push data to user space from a
triggered buffer, but it does not set values for inactive channels, as
it only uses iio_for_each_active_channel() to assign new values.

Initialize the struct to zero before using it to avoid pushing
uninitialized information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57907/">CVE-2024-57907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57907">CVE-2024-57907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236090">SUSE bug 1236090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57908</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57908" ref_url="https://www.suse.com/security/cve/CVE-2024-57908" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: imu: kmx61: fix information leak in triggered buffer

The 'buffer' local array is used to push data to user space from a
triggered buffer, but it does not set values for inactive channels, as
it only uses iio_for_each_active_channel() to assign new values.

Initialize the array to zero before using it to avoid pushing
uninitialized information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57908/">CVE-2024-57908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57908">CVE-2024-57908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236091">SUSE bug 1236091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57909</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57909" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57909" ref_url="https://www.suse.com/security/cve/CVE-2024-57909" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57909/">CVE-2024-57909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57909">CVE-2024-57909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236095">SUSE bug 1236095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57910</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57910" ref_url="https://www.suse.com/security/cve/CVE-2024-57910" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: light: vcnl4035: fix information leak in triggered buffer

The 'buffer' local array is used to push data to userspace from a
triggered buffer, but it does not set an initial value for the single
data element, which is an u16 aligned to 8 bytes. That leaves at least
4 bytes uninitialized even after writing an integer value with
regmap_read().

Initialize the array to zero before using it to avoid pushing
uninitialized information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57910/">CVE-2024-57910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57910">CVE-2024-57910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236097">SUSE bug 1236097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57911</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57911" ref_url="https://www.suse.com/security/cve/CVE-2024-57911" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer

The 'data' array is allocated via kmalloc() and it is used to push data
to user space from a triggered buffer, but it does not set values for
inactive channels, as it only uses iio_for_each_active_channel()
to assign new values.

Use kzalloc for the memory allocation to avoid pushing uninitialized
information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-57911/">CVE-2024-57911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57911">CVE-2024-57911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236098">SUSE bug 1236098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57912</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57912" ref_url="https://www.suse.com/security/cve/CVE-2024-57912" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: pressure: zpa2326: fix information leak in triggered buffer

The 'sample' local struct is used to push data to user space from a
triggered buffer, but it has a hole between the temperature and the
timestamp (u32 pressure, u16 temperature, GAP, u64 timestamp).
This hole is never initialized.

Initialize the struct to zero before using it to avoid pushing
uninitialized information to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57912/">CVE-2024-57912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57912">CVE-2024-57912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236101">SUSE bug 1236101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57913</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57913" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57913" ref_url="https://www.suse.com/security/cve/CVE-2024-57913" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Remove WARN_ON in functionfs_bind

This commit addresses an issue related to below kernel panic where
panic_on_warn is enabled. It is caused by the unnecessary use of WARN_ON
in functionsfs_bind, which easily leads to the following scenarios.

1.adb_write in adbd               2. UDC write via configfs
  =================	             =====================

-&gt;usb_ffs_open_thread()           -&gt;UDC write
 -&gt;open_functionfs()               -&gt;configfs_write_iter()
  -&gt;adb_open()                      -&gt;gadget_dev_desc_UDC_store()
   -&gt;adb_write()                     -&gt;usb_gadget_register_driver_owner
                                      -&gt;driver_register()
-&gt;StartMonitor()                       -&gt;bus_add_driver()
 -&gt;adb_read()                           -&gt;gadget_bind_driver()
&lt;times-out without BIND event&gt;           -&gt;configfs_composite_bind()
                                          -&gt;usb_add_function()
-&gt;open_functionfs()                        -&gt;ffs_func_bind()
 -&gt;adb_open()                               -&gt;functionfs_bind()
                                       &lt;ffs-&gt;state !=FFS_ACTIVE&gt;

The adb_open, adb_read, and adb_write operations are invoked from the
daemon, but trying to bind the function is a process that is invoked by
UDC write through configfs, which opens up the possibility of a race
condition between the two paths. In this race scenario, the kernel panic
occurs due to the WARN_ON from functionfs_bind when panic_on_warn is
enabled. This commit fixes the kernel panic by removing the unnecessary
WARN_ON.

Kernel panic - not syncing: kernel: panic_on_warn set ...
[   14.542395] Call trace:
[   14.542464]  ffs_func_bind+0x1c8/0x14a8
[   14.542468]  usb_add_function+0xcc/0x1f0
[   14.542473]  configfs_composite_bind+0x468/0x588
[   14.542478]  gadget_bind_driver+0x108/0x27c
[   14.542483]  really_probe+0x190/0x374
[   14.542488]  __driver_probe_device+0xa0/0x12c
[   14.542492]  driver_probe_device+0x3c/0x220
[   14.542498]  __driver_attach+0x11c/0x1fc
[   14.542502]  bus_for_each_dev+0x104/0x160
[   14.542506]  driver_attach+0x24/0x34
[   14.542510]  bus_add_driver+0x154/0x270
[   14.542514]  driver_register+0x68/0x104
[   14.542518]  usb_gadget_register_driver_owner+0x48/0xf4
[   14.542523]  gadget_dev_desc_UDC_store+0xf8/0x144
[   14.542526]  configfs_write_iter+0xf0/0x138
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57913/">CVE-2024-57913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57913">CVE-2024-57913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236102">SUSE bug 1236102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57914</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57914" ref_url="https://www.suse.com/security/cve/CVE-2024-57914" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57914/">CVE-2024-57914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57914">CVE-2024-57914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236119">SUSE bug 1236119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57915</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57915" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57915" ref_url="https://www.suse.com/security/cve/CVE-2024-57915" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null

Considering that in some extreme cases, when performing the
unbinding operation, gserial_disconnect has cleared gser-&gt;ioport,
which triggers gadget reconfiguration, and then calls gs_read_complete,
resulting in access to a null pointer. Therefore, ep is disabled before
gserial_disconnect sets port to null to prevent this from happening.

Call trace:
 gs_read_complete+0x58/0x240
 usb_gadget_giveback_request+0x40/0x160
 dwc3_remove_requests+0x170/0x484
 dwc3_ep0_out_start+0xb0/0x1d4
 __dwc3_gadget_start+0x25c/0x720
 kretprobe_trampoline.cfi_jt+0x0/0x8
 kretprobe_trampoline.cfi_jt+0x0/0x8
 udc_bind_to_driver+0x1d8/0x300
 usb_gadget_probe_driver+0xa8/0x1dc
 gadget_dev_desc_UDC_store+0x13c/0x188
 configfs_write_iter+0x160/0x1f4
 vfs_write+0x2d0/0x40c
 ksys_write+0x7c/0xf0
 __arm64_sys_write+0x20/0x30
 invoke_syscall+0x60/0x150
 el0_svc_common+0x8c/0xf8
 do_el0_svc+0x28/0xa0
 el0_svc+0x24/0x84
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57915/">CVE-2024-57915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57915">CVE-2024-57915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236120">SUSE bug 1236120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57916</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57916" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57916" ref_url="https://www.suse.com/security/cve/CVE-2024-57916" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57916/">CVE-2024-57916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57916">CVE-2024-57916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236125">SUSE bug 1236125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57917</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57917" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57917" ref_url="https://www.suse.com/security/cve/CVE-2024-57917" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

topology: Keep the cpumask unchanged when printing cpumap

During fuzz testing, the following warning was discovered:

 different return values (15 and 11) from vsnprintf("%*pbl
 ", ...)

 test:keyward is WARNING in kvasprintf
 WARNING: CPU: 55 PID: 1168477 at lib/kasprintf.c:30 kvasprintf+0x121/0x130
 Call Trace:
  kvasprintf+0x121/0x130
  kasprintf+0xa6/0xe0
  bitmap_print_to_buf+0x89/0x100
  core_siblings_list_read+0x7e/0xb0
  kernfs_file_read_iter+0x15b/0x270
  new_sync_read+0x153/0x260
  vfs_read+0x215/0x290
  ksys_read+0xb9/0x160
  do_syscall_64+0x56/0x100
  entry_SYSCALL_64_after_hwframe+0x78/0xe2

The call trace shows that kvasprintf() reported this warning during the
printing of core_siblings_list. kvasprintf() has several steps:

 (1) First, calculate the length of the resulting formatted string.

 (2) Allocate a buffer based on the returned length.

 (3) Then, perform the actual string formatting.

 (4) Check whether the lengths of the formatted strings returned in
     steps (1) and (2) are consistent.

If the core_cpumask is modified between steps (1) and (3), the lengths
obtained in these two steps may not match. Indeed our test includes cpu
hotplugging, which should modify core_cpumask while printing.

To fix this issue, cache the cpumask into a temporary variable before
calling cpumap_print_{list, cpumask}_to_buf(), to keep it unchanged
during the printing process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57917/">CVE-2024-57917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57917">CVE-2024-57917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236127">SUSE bug 1236127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57918</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57918" ref_url="https://www.suse.com/security/cve/CVE-2024-57918" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57918/">CVE-2024-57918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57918">CVE-2024-57918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236128">SUSE bug 1236128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57919</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57919" ref_url="https://www.suse.com/security/cve/CVE-2024-57919" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57919/">CVE-2024-57919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57919">CVE-2024-57919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236070">SUSE bug 1236070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57920</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57920" ref_url="https://www.suse.com/security/cve/CVE-2024-57920" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57920/">CVE-2024-57920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57920">CVE-2024-57920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236072">SUSE bug 1236072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57921</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57921" ref_url="https://www.suse.com/security/cve/CVE-2024-57921" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57921/">CVE-2024-57921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57921">CVE-2024-57921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236076">SUSE bug 1236076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57922</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57922" ref_url="https://www.suse.com/security/cve/CVE-2024-57922" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add check for granularity in dml ceil/floor helpers

[Why]
Wrapper functions for dcn_bw_ceil2() and dcn_bw_floor2()
should check for granularity is non zero to avoid assert and
divide-by-zero error in dcn_bw_ functions.

[How]
Add check for granularity 0.

(cherry picked from commit f6e09701c3eb2ccb8cb0518e0b67f1c69742a4ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57922/">CVE-2024-57922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57922">CVE-2024-57922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236080">SUSE bug 1236080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57923</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57923" ref_url="https://www.suse.com/security/cve/CVE-2024-57923" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path

Since the input data length passed to zlib_compress_folios() can be
arbitrary, always setting strm.avail_in to a multiple of PAGE_SIZE may
cause read-in bytes to exceed the input range. Currently this triggers
an assert in btrfs_compress_folios() on the debug kernel (see below).
Fix strm.avail_in calculation for S390 hardware acceleration path.

  assertion failed: *total_in &lt;= orig_len, in fs/btrfs/compression.c:1041
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/compression.c:1041!
  monitor event: 0040 ilc:2 [#1] PREEMPT SMP
  CPU: 16 UID: 0 PID: 325 Comm: kworker/u273:3 Not tainted 6.13.0-20241204.rc1.git6.fae3b21430ca.300.fc41.s390x+debug #1
  Hardware name: IBM 3931 A01 703 (z/VM 7.4.0)
  Workqueue: btrfs-delalloc btrfs_work_helper
  Krnl PSW : 0704d00180000000 0000021761df6538 (btrfs_compress_folios+0x198/0x1a0)
             R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3
  Krnl GPRS: 0000000080000000 0000000000000001 0000000000000047 0000000000000000
             0000000000000006 ffffff01757bb000 000001976232fcc0 000000000000130c
             000001976232fcd0 000001976232fcc8 00000118ff4a0e30 0000000000000001
             00000111821ab400 0000011100000000 0000021761df6534 000001976232fb58
  Krnl Code: 0000021761df6528: c020006f5ef4        larl    %r2,0000021762be2310
             0000021761df652e: c0e5ffbd09d5        brasl   %r14,00000217615978d8
            #0000021761df6534: af000000            mc      0,0
            &gt;0000021761df6538: 0707                bcr     0,%r7
             0000021761df653a: 0707                bcr     0,%r7
             0000021761df653c: 0707                bcr     0,%r7
             0000021761df653e: 0707                bcr     0,%r7
             0000021761df6540: c004004bb7ec        brcl    0,000002176276d518
  Call Trace:
   [&lt;0000021761df6538&gt;] btrfs_compress_folios+0x198/0x1a0
  ([&lt;0000021761df6534&gt;] btrfs_compress_folios+0x194/0x1a0)
   [&lt;0000021761d97788&gt;] compress_file_range+0x3b8/0x6d0
   [&lt;0000021761dcee7c&gt;] btrfs_work_helper+0x10c/0x160
   [&lt;0000021761645760&gt;] process_one_work+0x2b0/0x5d0
   [&lt;000002176164637e&gt;] worker_thread+0x20e/0x3e0
   [&lt;000002176165221a&gt;] kthread+0x15a/0x170
   [&lt;00000217615b859c&gt;] __ret_from_fork+0x3c/0x60
   [&lt;00000217626e72d2&gt;] ret_from_fork+0xa/0x38
  INFO: lockdep is turned off.
  Last Breaking-Event-Address:
   [&lt;0000021761597924&gt;] _printk+0x4c/0x58
  Kernel panic - not syncing: Fatal exception: panic_on_oops
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57923/">CVE-2024-57923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57923">CVE-2024-57923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236081">SUSE bug 1236081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57924</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57924" ref_url="https://www.suse.com/security/cve/CVE-2024-57924" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: relax assertions on failure to encode file handles

Encoding file handles is usually performed by a filesystem &gt;encode_fh()
method that may fail for various reasons.

The legacy users of exportfs_encode_fh(), namely, nfsd and
name_to_handle_at(2) syscall are ready to cope with the possibility
of failure to encode a file handle.

There are a few other users of exportfs_encode_{fh,fid}() that
currently have a WARN_ON() assertion when -&gt;encode_fh() fails.
Relax those assertions because they are wrong.

The second linked bug report states commit 16aac5ad1fa9 ("ovl: support
encoding non-decodable file handles") in v6.6 as the regressing commit,
but this is not accurate.

The aforementioned commit only increases the chances of the assertion
and allows triggering the assertion with the reproducer using overlayfs,
inotify and drop_caches.

Triggering this assertion was always possible with other filesystems and
other reasons of -&gt;encode_fh() failures and more particularly, it was
also possible with the exact same reproducer using overlayfs that is
mounted with options index=on,nfs_export=on also on kernels &lt; v6.6.
Therefore, I am not listing the aforementioned commit as a Fixes commit.

Backport hint: this patch will have a trivial conflict applying to
v6.6.y, and other trivial conflicts applying to stable kernels &lt; v6.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57924/">CVE-2024-57924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57924">CVE-2024-57924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236086">SUSE bug 1236086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57925</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57925" ref_url="https://www.suse.com/security/cve/CVE-2024-57925" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix a missing return value check bug

In the smb2_send_interim_resp(), if ksmbd_alloc_work_struct()
fails to allocate a node, it returns a NULL pointer to the
in_work pointer. This can lead to an illegal memory write of
in_work-&gt;response_buf when allocate_interim_rsp_buf() attempts
to perform a kzalloc() on it.

To address this issue, incorporating a check for the return
value of ksmbd_alloc_work_struct() ensures that the function
returns immediately upon allocation failure, thereby preventing
the aforementioned illegal memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57925/">CVE-2024-57925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57925">CVE-2024-57925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236087">SUSE bug 1236087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57926</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57926" ref_url="https://www.suse.com/security/cve/CVE-2024-57926" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Set private-&gt;all_drm_private[i]-&gt;drm to NULL if mtk_drm_bind returns err

The pointer need to be set to NULL, otherwise KASAN complains about
use-after-free. Because in mtk_drm_bind, all private's drm are set
as follows.

private-&gt;all_drm_private[i]-&gt;drm = drm;

And drm will be released by drm_dev_put in case mtk_drm_kms_init returns
failure. However, the shutdown path still accesses the previous allocated
memory in drm_atomic_helper_shutdown.

[   84.874820] watchdog: watchdog0: watchdog did not stop!
[   86.512054] ==================================================================
[   86.513162] BUG: KASAN: use-after-free in drm_atomic_helper_shutdown+0x33c/0x378
[   86.514258] Read of size 8 at addr ffff0000d46fc068 by task shutdown/1
[   86.515213]
[   86.515455] CPU: 1 UID: 0 PID: 1 Comm: shutdown Not tainted 6.13.0-rc1-mtk+gfa1a78e5d24b-dirty #55
[   86.516752] Hardware name: Unknown Product/Unknown Product, BIOS 2022.10 10/01/2022
[   86.517960] Call trace:
[   86.518333]  show_stack+0x20/0x38 (C)
[   86.518891]  dump_stack_lvl+0x90/0xd0
[   86.519443]  print_report+0xf8/0x5b0
[   86.519985]  kasan_report+0xb4/0x100
[   86.520526]  __asan_report_load8_noabort+0x20/0x30
[   86.521240]  drm_atomic_helper_shutdown+0x33c/0x378
[   86.521966]  mtk_drm_shutdown+0x54/0x80
[   86.522546]  platform_shutdown+0x64/0x90
[   86.523137]  device_shutdown+0x260/0x5b8
[   86.523728]  kernel_restart+0x78/0xf0
[   86.524282]  __do_sys_reboot+0x258/0x2f0
[   86.524871]  __arm64_sys_reboot+0x90/0xd8
[   86.525473]  invoke_syscall+0x74/0x268
[   86.526041]  el0_svc_common.constprop.0+0xb0/0x240
[   86.526751]  do_el0_svc+0x4c/0x70
[   86.527251]  el0_svc+0x4c/0xc0
[   86.527719]  el0t_64_sync_handler+0x144/0x168
[   86.528367]  el0t_64_sync+0x198/0x1a0
[   86.528920]
[   86.529157] The buggy address belongs to the physical page:
[   86.529972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000d46fd4d0 pfn:0x1146fc
[   86.531319] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   86.532267] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   86.533390] raw: ffff0000d46fd4d0 0000000000000000 00000000ffffffff 0000000000000000
[   86.534511] page dumped because: kasan: bad access detected
[   86.535323]
[   86.535559] Memory state around the buggy address:
[   86.536265]  ffff0000d46fbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   86.537314]  ffff0000d46fbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   86.538363] &gt;ffff0000d46fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   86.544733]                                                           ^
[   86.551057]  ffff0000d46fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   86.557510]  ffff0000d46fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   86.563928] ==================================================================
[   86.571093] Disabling lock debugging due to kernel taint
[   86.577642] Unable to handle kernel paging request at virtual address e0e9c0920000000b
[   86.581834] KASAN: maybe wild-memory-access in range [0x0752049000000058-0x075204900000005f]
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57926/">CVE-2024-57926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57926">CVE-2024-57926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236082">SUSE bug 1236082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57927</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57927" ref_url="https://www.suse.com/security/cve/CVE-2024-57927" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: Fix oops in nfs_netfs_init_request() when copying to cache

When netfslib wants to copy some data that has just been read on behalf of
nfs, it creates a new write request and calls nfs_netfs_init_request() to
initialise it, but with a NULL file pointer.  This causes
nfs_file_open_context() to oops - however, we don't actually need the nfs
context as we're only going to write to the cache.

Fix this by just returning if we aren't given a file pointer and emit a
warning if the request was for something other than copy-to-cache.

Further, fix nfs_netfs_free_request() so that it doesn't try to free the
context if the pointer is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57927/">CVE-2024-57927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57927">CVE-2024-57927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236089">SUSE bug 1236089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57928</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57928" ref_url="https://www.suse.com/security/cve/CVE-2024-57928" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix enomem handling in buffered reads

If netfs_read_to_pagecache() gets an error from either -&gt;prepare_read() or
from netfs_prepare_read_iterator(), it needs to decrement -&gt;nr_outstanding,
cancel the subrequest and break out of the issuing loop.  Currently, it
only does this for two of the cases, but there are two more that aren't
handled.

Fix this by moving the handling to a common place and jumping to it from
all four places.  This is in preference to inserting a wrapper around
netfs_prepare_read_iterator() as proposed by Dmitry Antipov[1].
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57928/">CVE-2024-57928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57928">CVE-2024-57928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236092">SUSE bug 1236092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57929</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57929" ref_url="https://www.suse.com/security/cve/CVE-2024-57929" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm array: fix releasing a faulty array block twice in dm_array_cursor_end

When dm_bm_read_lock() fails due to locking or checksum errors, it
releases the faulty block implicitly while leaving an invalid output
pointer behind. The caller of dm_bm_read_lock() should not operate on
this invalid dm_block pointer, or it will lead to undefined result.
For example, the dm_array_cursor incorrectly caches the invalid pointer
on reading a faulty array block, causing a double release in
dm_array_cursor_end(), then hitting the BUG_ON in dm-bufio cache_put().

Reproduce steps:

1. initialize a cache device

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc $262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. wipe the second array block offline

dmsteup remove cache cmeta cdata corig
mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \
2&gt;/dev/null | hexdump -e '1/8 "%u\n"')
ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \
2&gt;/dev/null | hexdump -e '1/8 "%u\n"')
dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock

3. try reopen the cache device

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc $262144"
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

Kernel logs:

(snip)
device-mapper: array: array_block_check failed: blocknr 0 != wanted 10
device-mapper: block manager: array validator check failed for block 10
device-mapper: array: get_ablock failed
device-mapper: cache metadata: dm_array_cursor_next for mapping failed
------------[ cut here ]------------
kernel BUG at drivers/md/dm-bufio.c:638!

Fix by setting the cached block pointer to NULL on errors.

In addition to the reproducer described above, this fix can be
verified using the "array_cursor/damaged" test in dm-unit:
  dm-unit run /pdata/array_cursor/damaged --kernel-dir &lt;KERNEL_DIR&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57929/">CVE-2024-57929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236096">SUSE bug 1236096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57930</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57930" ref_url="https://www.suse.com/security/cve/CVE-2024-57930" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Have process_string() also allow arrays

In order to catch a common bug where a TRACE_EVENT() TP_fast_assign()
assigns an address of an allocated string to the ring buffer and then
references it in TP_printk(), which can be executed hours later when the
string is free, the function test_event_printk() runs on all events as
they are registered to make sure there's no unwanted dereferencing.

It calls process_string() to handle cases in TP_printk() format that has
"%s". It returns whether or not the string is safe. But it can have some
false positives.

For instance, xe_bo_move() has:

 TP_printk("move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s",
            __entry-&gt;move_lacks_source ? "yes" : "no", __entry-&gt;bo, __entry-&gt;size,
            xe_mem_type_to_name[__entry-&gt;old_placement],
            xe_mem_type_to_name[__entry-&gt;new_placement], __get_str(device_id))

Where the "%s" references into xe_mem_type_to_name[]. This is an array of
pointers that should be safe for the event to access. Instead of flagging
this as a bad reference, if a reference points to an array, where the
record field is the index, consider it safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57930/">CVE-2024-57930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57930">CVE-2024-57930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236194">SUSE bug 1236194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57931</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57931" ref_url="https://www.suse.com/security/cve/CVE-2024-57931" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: ignore unknown extended permissions

When evaluating extended permissions, ignore unknown permissions instead
of calling BUG(). This commit ensures that future permissions can be
added without interfering with older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57931/">CVE-2024-57931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236192">SUSE bug 1236192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57932</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57932" ref_url="https://www.suse.com/security/cve/CVE-2024-57932" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: guard XDP xmit NDO on existence of xdp queues

In GVE, dedicated XDP queues only exist when an XDP program is installed
and the interface is up. As such, the NDO XDP XMIT callback should
return early if either of these conditions are false.

In the case of no loaded XDP program, priv-&gt;num_xdp_queues=0 which can
cause a divide-by-zero error, and in the case of interface down,
num_xdp_queues remains untouched to persist XDP queue count for the next
interface up, but the TX pointer itself would be NULL.

The XDP xmit callback also needs to synchronize with a device
transitioning from open to close. This synchronization will happen via
the GVE_PRIV_FLAGS_NAPI_ENABLED bit along with a synchronize_net() call,
which waits for any RCU critical sections at call-time to complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57932/">CVE-2024-57932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57932">CVE-2024-57932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236190">SUSE bug 1236190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57933</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57933" ref_url="https://www.suse.com/security/cve/CVE-2024-57933" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: guard XSK operations on the existence of queues

This patch predicates the enabling and disabling of XSK pools on the
existence of queues. As it stands, if the interface is down, disabling
or enabling XSK pools would result in a crash, as the RX queue pointer
would be NULL. XSK pool registration will occur as part of the next
interface up.

Similarly, xsk_wakeup needs be guarded against queues disappearing
while the function is executing, so a check against the
GVE_PRIV_FLAGS_NAPI_ENABLED flag is added to synchronize with the
disabling of the bit and the synchronize_net() in gve_turndown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57933/">CVE-2024-57933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57933">CVE-2024-57933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236178">SUSE bug 1236178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57934</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57934" ref_url="https://www.suse.com/security/cve/CVE-2024-57934" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fgraph: Add READ_ONCE() when accessing fgraph_array[]

In __ftrace_return_to_handler(), a loop iterates over the fgraph_array[]
elements, which are fgraph_ops. The loop checks if an element is a
fgraph_stub to prevent using a fgraph_stub afterward.

However, if the compiler reloads fgraph_array[] after this check, it might
race with an update to fgraph_array[] that introduces a fgraph_stub. This
could result in the stub being processed, but the stub contains a null
"func_hash" field, leading to a NULL pointer dereference.

To ensure that the gops compared against the fgraph_stub matches the gops
processed later, add a READ_ONCE(). A similar patch appears in commit
63a8dfb ("function_graph: Add READ_ONCE() when accessing fgraph_array[]").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57934/">CVE-2024-57934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57934">CVE-2024-57934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236179">SUSE bug 1236179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57935</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57935" ref_url="https://www.suse.com/security/cve/CVE-2024-57935" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix accessing invalid dip_ctx during destroying QP

If it fails to modify QP to RTR, dip_ctx will not be attached. And
during detroying QP, the invalid dip_ctx pointer will be accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57935/">CVE-2024-57935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57935">CVE-2024-57935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236180">SUSE bug 1236180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57936</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57936" ref_url="https://www.suse.com/security/cve/CVE-2024-57936" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix max SGEs for the Work Request

Gen P7 supports up to 13 SGEs for now. WQE software structure
can hold only 6 now. Since the max send sge is reported as
13, the stack can give requests up to 13 SGEs. This is causing
traffic failures and system crashes.

Use the define for max SGE supported for variable size. This
will work for both static and variable WQEs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57936/">CVE-2024-57936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57936">CVE-2024-57936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236181">SUSE bug 1236181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57938</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57938" ref_url="https://www.suse.com/security/cve/CVE-2024-57938" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sctp: Prevent autoclose integer overflow in sctp_association_init()

While by default max_autoclose equals to INT_MAX / HZ, one may set
net.sctp.max_autoclose to UINT_MAX. There is code in
sctp_association_init() that can consequently trigger overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57938/">CVE-2024-57938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57938">CVE-2024-57938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236182">SUSE bug 1236182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57939</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57939" ref_url="https://www.suse.com/security/cve/CVE-2024-57939" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: Fix sleeping in invalid context in die()

die() can be called in exception handler, and therefore cannot sleep.
However, die() takes spinlock_t which can sleep with PREEMPT_RT enabled.
That causes the following warning:

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 285, name: mutex
preempt_count: 110001, expected: 0
RCU nest depth: 0, expected: 0
CPU: 0 UID: 0 PID: 285 Comm: mutex Not tainted 6.12.0-rc7-00022-ge19049cf7d56-dirty #234
Hardware name: riscv-virtio,qemu (DT)
Call Trace:
    dump_backtrace+0x1c/0x24
    show_stack+0x2c/0x38
    dump_stack_lvl+0x5a/0x72
    dump_stack+0x14/0x1c
    __might_resched+0x130/0x13a
    rt_spin_lock+0x2a/0x5c
    die+0x24/0x112
    do_trap_insn_illegal+0xa0/0xea
    _new_vmalloc_restore_context_a0+0xcc/0xd8
Oops - illegal instruction [#1]

Switch to use raw_spinlock_t, which does not sleep even with PREEMPT_RT
enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57939/">CVE-2024-57939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57939">CVE-2024-57939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236226">SUSE bug 1236226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57940</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57940" ref_url="https://www.suse.com/security/cve/CVE-2024-57940" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix the infinite loop in exfat_readdir()

If the file system is corrupted so that a cluster is linked to
itself in the cluster chain, and there is an unused directory
entry in the cluster, 'dentry' will not be incremented, causing
condition 'dentry &lt; max_dentries' unable to prevent an infinite
loop.

This infinite loop causes s_lock not to be released, and other
tasks will hang, such as exfat_sync_fs().

This commit stops traversing the cluster chain when there is unused
directory entry in the cluster to avoid this infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57940/">CVE-2024-57940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236227">SUSE bug 1236227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57941</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57941" ref_url="https://www.suse.com/security/cve/CVE-2024-57941" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix the (non-)cancellation of copy when cache is temporarily disabled

When the caching for a cookie is temporarily disabled (e.g. due to a DIO
write on that file), future copying to the cache for that file is disabled
until all fds open on that file are closed.  However, if netfslib is using
the deprecated PG_private_2 method (such as is currently used by ceph), and
decides it wants to copy to the cache, netfs_advance_write() will just bail
at the first check seeing that the cache stream is unavailable, and
indicate that it dealt with all the content.

This means that we have no subrequests to provide notifications to drive
the state machine or even to pin the request and the request just gets
discarded, leaving the folios with PG_private_2 set.

Fix this by jumping directly to cancel the request if the cache is not
available.  That way, we don't remove mark3 from the folio_queue list and
netfs_pgpriv2_cancel() will clean up the folios.

This was found by running the generic/013 xfstest against ceph with an
active cache and the "-o fsc" option passed to ceph.  That would usually
hang
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57941/">CVE-2024-57941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57941">CVE-2024-57941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236228">SUSE bug 1236228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57942</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57942" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57942" ref_url="https://www.suse.com/security/cve/CVE-2024-57942" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix ceph copy to cache on write-begin

At the end of netfs_unlock_read_folio() in which folios are marked
appropriately for copying to the cache (either with by being marked dirty
and having their private data set or by having PG_private_2 set) and then
unlocked, the folio_queue struct has the entry pointing to the folio
cleared.  This presents a problem for netfs_pgpriv2_write_to_the_cache(),
which is used to write folios marked with PG_private_2 to the cache as it
expects to be able to trawl the folio_queue list thereafter to find the
relevant folios, leading to a hang.

Fix this by not clearing the folio_queue entry if we're going to do the
deprecated copy-to-cache.  The clearance will be done instead as the folios
are written to the cache.

This can be reproduced by starting cachefiles, mounting a ceph filesystem
with "-o fsc" and writing to it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57942/">CVE-2024-57942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57942">CVE-2024-57942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236229">SUSE bug 1236229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57943</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57943" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57943" ref_url="https://www.suse.com/security/cve/CVE-2024-57943" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix the new buffer was not zeroed before writing

Before writing, if a buffer_head marked as new, its data must
be zeroed, otherwise uninitialized data in the page cache will
be written.

So this commit uses folio_zero_new_buffers() to zero the new
buffers before -&gt;write_end().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57943/">CVE-2024-57943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57943">CVE-2024-57943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236230">SUSE bug 1236230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57944</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57944" ref_url="https://www.suse.com/security/cve/CVE-2024-57944" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: ti-ads1298: Add NULL check in ads1298_init

devm_kasprintf() can return a NULL pointer on failure. A check on the
return value of such a call in ads1298_init() is missing. Add it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57944/">CVE-2024-57944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57944">CVE-2024-57944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236197">SUSE bug 1236197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57945</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57945" ref_url="https://www.suse.com/security/cve/CVE-2024-57945" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

riscv: mm: Fix the out of bound issue of vmemmap address

In sparse vmemmap model, the virtual address of vmemmap is calculated as:
((struct page *)VMEMMAP_START - (phys_ram_base &gt;&gt; PAGE_SHIFT)).
And the struct page's va can be calculated with an offset:
(vmemmap + (pfn)).

However, when initializing struct pages, kernel actually starts from the
first page from the same section that phys_ram_base belongs to. If the
first page's physical address is not (phys_ram_base &gt;&gt; PAGE_SHIFT), then
we get an va below VMEMMAP_START when calculating va for it's struct page.

For example, if phys_ram_base starts from 0x82000000 with pfn 0x82000, the
first page in the same section is actually pfn 0x80000. During
init_unavailable_range(), we will initialize struct page for pfn 0x80000
with virtual address ((struct page *)VMEMMAP_START - 0x2000), which is
below VMEMMAP_START as well as PCI_IO_END.

This commit fixes this bug by introducing a new variable
'vmemmap_start_pfn' which is aligned with memory section size and using
it to calculate vmemmap address instead of phys_ram_base.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57945/">CVE-2024-57945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57945">CVE-2024-57945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236239">SUSE bug 1236239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57946</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57946" ref_url="https://www.suse.com/security/cve/CVE-2024-57946" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-blk: don't keep queue frozen during system suspend

Commit 4ce6e2db00de ("virtio-blk: Ensure no requests in virtqueues before
deleting vqs.") replaces queue quiesce with queue freeze in virtio-blk's
PM callbacks. And the motivation is to drain inflight IOs before suspending.

block layer's queue freeze looks very handy, but it is also easy to cause
deadlock, such as, any attempt to call into bio_queue_enter() may run into
deadlock if the queue is frozen in current context. There are all kinds
of -&gt;suspend() called in suspend context, so keeping queue frozen in the
whole suspend context isn't one good idea. And Marek reported lockdep
warning[1] caused by virtio-blk's freeze queue in virtblk_freeze().

[1] https://lore.kernel.org/linux-block/ca16370e-d646-4eee-b9cc-87277c89c43c@samsung.com/

Given the motivation is to drain in-flight IOs, it can be done by calling
freeze &amp; unfreeze, meantime restore to previous behavior by keeping queue
quiesced during suspend.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57946/">CVE-2024-57946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57946">CVE-2024-57946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236247">SUSE bug 1236247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57947</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_set_pipapo: fix initial map fill

The initial buffer has to be inited to all-ones, but it must restrict
it to the size of the first field, not the total field size.

After each round in the map search step, the result and the fill map
are swapped, so if we have a set where f-&gt;bsize of the first element
is smaller than m-&gt;bsize_max, those one-bits are leaked into future
rounds result map.

This makes pipapo find an incorrect matching results for sets where
first field size is not the largest.

Followup patch adds a test case to nft_concat_range.sh selftest script.

Thanks to Stefano Brivio for pointing out that we need to zero out
the remainder explicitly, only correcting memset() argument isn't enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-24"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236333">SUSE bug 1236333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7596</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7596" ref_url="https://www.suse.com/security/cve/CVE-2024-7596" source="SUSE CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-29"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-7596/">CVE-2024-7596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7596">CVE-2024-7596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231329">SUSE bug 1231329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8805</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8805" ref_url="https://www.suse.com/security/cve/CVE-2024-8805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
    <description>
    BlueZ HID over GATT Profile Improper Access Control Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the implementation of the HID over GATT Profile. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25177.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-14"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8805/">CVE-2024-8805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8805">CVE-2024-8805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230697">SUSE bug 1230697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21629</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21629" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21629" ref_url="https://www.suse.com/security/cve/CVE-2025-21629" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets

The blamed commit disabled hardware offoad of IPv6 packets with
extension headers on devices that advertise NETIF_F_IPV6_CSUM,
based on the definition of that feature in skbuff.h:

 *   * - %NETIF_F_IPV6_CSUM
 *     - Driver (device) is only able to checksum plain
 *       TCP or UDP packets over IPv6. These are specifically
 *       unencapsulated packets of the form IPv6|TCP or
 *       IPv6|UDP where the Next Header field in the IPv6
 *       header is either TCP or UDP. IPv6 extension headers
 *       are not supported with this feature. This feature
 *       cannot be set in features for a device with
 *       NETIF_F_HW_CSUM also set. This feature is being
 *       DEPRECATED (see below).

The change causes skb_warn_bad_offload to fire for BIG TCP
packets.

[  496.310233] WARNING: CPU: 13 PID: 23472 at net/core/dev.c:3129 skb_warn_bad_offload+0xc4/0xe0

[  496.310297]  ? skb_warn_bad_offload+0xc4/0xe0
[  496.310300]  skb_checksum_help+0x129/0x1f0
[  496.310303]  skb_csum_hwoffload_help+0x150/0x1b0
[  496.310306]  validate_xmit_skb+0x159/0x270
[  496.310309]  validate_xmit_skb_list+0x41/0x70
[  496.310312]  sch_direct_xmit+0x5c/0x250
[  496.310317]  __qdisc_run+0x388/0x620

BIG TCP introduced an IPV6_TLV_JUMBO IPv6 extension header to
communicate packet length, as this is an IPv6 jumbogram. But, the
feature is only enabled on devices that support BIG TCP TSO. The
header is only present for PF_PACKET taps like tcpdump, and not
transmitted by physical devices.

For this specific case of extension headers that are not
transmitted, return to the situation before the blamed commit
and support hardware offload.

ipv6_has_hopopt_jumbo() tests not only whether this header is present,
but also that it is the only extension header before a terminal (L4)
header.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-18"/>
	<updated date="2025-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21629/">CVE-2025-21629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21629">CVE-2025-21629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235968">SUSE bug 1235968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21631</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21631" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21631" ref_url="https://www.suse.com/security/cve/CVE-2025-21631" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()

Our syzkaller report a following UAF for v6.6:

BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958
Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726

CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0-g3629d1885222 #39
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
 print_address_description.constprop.0+0x66/0x300 mm/kasan/report.c:364
 print_report+0x3e/0x70 mm/kasan/report.c:475
 kasan_report+0xb8/0xf0 mm/kasan/report.c:588
 hlist_add_head include/linux/list.h:1023 [inline]
 bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958
 bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271
 bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323
 blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660
 blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143
 __submit_bio+0xa0/0x6b0 block/blk-core.c:639
 __submit_bio_noacct_mq block/blk-core.c:718 [inline]
 submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747
 submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847
 __ext4_read_bh fs/ext4/super.c:205 [inline]
 ext4_read_bh+0x15e/0x2e0 fs/ext4/super.c:230
 __read_extent_tree_block+0x304/0x6f0 fs/ext4/extents.c:567
 ext4_find_extent+0x479/0xd20 fs/ext4/extents.c:947
 ext4_ext_map_blocks+0x1a3/0x2680 fs/ext4/extents.c:4182
 ext4_map_blocks+0x929/0x15a0 fs/ext4/inode.c:660
 ext4_iomap_begin_report+0x298/0x480 fs/ext4/inode.c:3569
 iomap_iter+0x3dd/0x1010 fs/iomap/iter.c:91
 iomap_fiemap+0x1f4/0x360 fs/iomap/fiemap.c:80
 ext4_fiemap+0x181/0x210 fs/ext4/extents.c:5051
 ioctl_fiemap.isra.0+0x1b4/0x290 fs/ioctl.c:220
 do_vfs_ioctl+0x31c/0x11a0 fs/ioctl.c:811
 __do_sys_ioctl fs/ioctl.c:869 [inline]
 __se_sys_ioctl+0xae/0x190 fs/ioctl.c:857
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x70/0x120 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x78/0xe2

Allocated by task 232719:
 kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328
 kasan_slab_alloc include/linux/kasan.h:188 [inline]
 slab_post_alloc_hook mm/slab.h:768 [inline]
 slab_alloc_node mm/slub.c:3492 [inline]
 kmem_cache_alloc_node+0x1b8/0x6f0 mm/slub.c:3537
 bfq_get_queue+0x215/0x1f00 block/bfq-iosched.c:5869
 bfq_get_bfqq_handle_split+0x167/0x5f0 block/bfq-iosched.c:6776
 bfq_init_rq+0x13a4/0x17a0 block/bfq-iosched.c:6938
 bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271
 bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323
 blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660
 blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143
 __submit_bio+0xa0/0x6b0 block/blk-core.c:639
 __submit_bio_noacct_mq block/blk-core.c:718 [inline]
 submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747
 submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847
 __ext4_read_bh fs/ext4/super.c:205 [inline]
 ext4_read_bh_nowait+0x15a/0x240 fs/ext4/super.c:217
 ext4_read_bh_lock+0xac/0xd0 fs/ext4/super.c:242
 ext4_bread_batch+0x268/0x500 fs/ext4/inode.c:958
 __ext4_find_entry+0x448/0x10f0 fs/ext4/namei.c:1671
 ext4_lookup_entry fs/ext4/namei.c:1774 [inline]
 ext4_lookup.part.0+0x359/0x6f0 fs/ext4/namei.c:1842
 ext4_lookup+0x72/0x90 fs/ext4/namei.c:1839
 __lookup_slow+0x257/0x480 fs/namei.c:1696
 lookup_slow fs/namei.c:1713 [inline]
 walk_component+0x454/0x5c0 fs/namei.c:2004
 link_path_walk.part.0+0x773/0xda0 fs/namei.c:2331
 link_path_walk fs/namei.c:3826 [inline]
 path_openat+0x1b9/0x520 fs/namei.c:3826
 do_filp_open+0x1b7/0x400 fs/namei.c:3857
 do_sys_openat2+0x5dc/0x6e0 fs/open.c:1428
 do_sys_open fs/open.c:1443 [inline]
 __do_sys_openat fs/open.c:1459 [inline]
 __se_sys_openat fs/open.c:1454 [inline]
 __x64_sys_openat+0x148/0x200 fs/open.c:1454
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_6
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21631/">CVE-2025-21631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236099">SUSE bug 1236099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236100">SUSE bug 1236100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21632</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21632" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21632" ref_url="https://www.suse.com/security/cve/CVE-2025-21632" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Ensure shadow stack is active before "getting" registers

The x86 shadow stack support has its own set of registers. Those registers
are XSAVE-managed, but they are "supervisor state components" which means
that userspace can not touch them with XSAVE/XRSTOR.  It also means that
they are not accessible from the existing ptrace ABI for XSAVE state.
Thus, there is a new ptrace get/set interface for it.

The regset code that ptrace uses provides an -&gt;active() handler in
addition to the get/set ones. For shadow stack this -&gt;active() handler
verifies that shadow stack is enabled via the ARCH_SHSTK_SHSTK bit in the
thread struct. The -&gt;active() handler is checked from some call sites of
the regset get/set handlers, but not the ptrace ones. This was not
understood when shadow stack support was put in place.

As a result, both the set/get handlers can be called with
XFEATURE_CET_USER in its init state, which would cause get_xsave_addr() to
return NULL and trigger a WARN_ON(). The ssp_set() handler luckily has an
ssp_active() check to avoid surprising the kernel with shadow stack
behavior when the kernel is not ready for it (ARCH_SHSTK_SHSTK==0). That
check just happened to avoid the warning.

But the -&gt;get() side wasn't so lucky. It can be called with shadow stacks
disabled, triggering the warning in practice, as reported by Christina
Schimpe:

WARNING: CPU: 5 PID: 1773 at arch/x86/kernel/fpu/regset.c:198 ssp_get+0x89/0xa0
[...]
Call Trace:
&lt;TASK&gt;
? show_regs+0x6e/0x80
? ssp_get+0x89/0xa0
? __warn+0x91/0x150
? ssp_get+0x89/0xa0
? report_bug+0x19d/0x1b0
? handle_bug+0x46/0x80
? exc_invalid_op+0x1d/0x80
? asm_exc_invalid_op+0x1f/0x30
? __pfx_ssp_get+0x10/0x10
? ssp_get+0x89/0xa0
? ssp_get+0x52/0xa0
__regset_get+0xad/0xf0
copy_regset_to_user+0x52/0xc0
ptrace_regset+0x119/0x140
ptrace_request+0x13c/0x850
? wait_task_inactive+0x142/0x1d0
? do_syscall_64+0x6d/0x90
arch_ptrace+0x102/0x300
[...]

Ensure that shadow stacks are active in a thread before looking them up
in the XSAVE buffer. Since ARCH_SHSTK_SHSTK and user_ssp[SHSTK_EN] are
set at the same time, the active check ensures that there will be
something to find in the XSAVE buffer.

[ dhansen: changelog/subject tweaks ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21632/">CVE-2025-21632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21632">CVE-2025-21632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236106">SUSE bug 1236106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21633</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21633" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21633" ref_url="https://www.suse.com/security/cve/CVE-2025-21633" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/sqpoll: zero sqd-&gt;thread on tctx errors

Syzkeller reports:

BUG: KASAN: slab-use-after-free in thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341
Read of size 8 at addr ffff88803578c510 by task syz.2.3223/27552
 Call Trace:
  &lt;TASK&gt;
  ...
  kasan_report+0x143/0x180 mm/kasan/report.c:602
  thread_group_cputime+0x409/0x700 kernel/sched/cputime.c:341
  thread_group_cputime_adjusted+0xa6/0x340 kernel/sched/cputime.c:639
  getrusage+0x1000/0x1340 kernel/sys.c:1863
  io_uring_show_fdinfo+0xdfe/0x1770 io_uring/fdinfo.c:197
  seq_show+0x608/0x770 fs/proc/fd.c:68
  ...

That's due to sqd-&gt;task not being cleared properly in cases where
SQPOLL task tctx setup fails, which can essentially only happen with
fault injection to insert allocation errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21633/">CVE-2025-21633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21633">CVE-2025-21633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236108">SUSE bug 1236108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21634</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21634" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21634" ref_url="https://www.suse.com/security/cve/CVE-2025-21634" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: remove kernfs active break

A warning was found:

WARNING: CPU: 10 PID: 3486953 at fs/kernfs/file.c:828
CPU: 10 PID: 3486953 Comm: rmdir Kdump: loaded Tainted: G
RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0
RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202
RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000
RDX: 0000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04
RBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180
R10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08
R13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0
FS:  00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 kernfs_drain+0x15e/0x2f0
 __kernfs_remove+0x165/0x300
 kernfs_remove_by_name_ns+0x7b/0xc0
 cgroup_rm_file+0x154/0x1c0
 cgroup_addrm_files+0x1c2/0x1f0
 css_clear_dir+0x77/0x110
 kill_css+0x4c/0x1b0
 cgroup_destroy_locked+0x194/0x380
 cgroup_rmdir+0x2a/0x140

It can be explained by:
rmdir 				echo 1 &gt; cpuset.cpus
				kernfs_fop_write_iter // active=0
cgroup_rm_file
kernfs_remove_by_name_ns	kernfs_get_active // active=1
__kernfs_remove					  // active=0x80000002
kernfs_drain			cpuset_write_resmask
wait_event
//waiting (active == 0x80000001)
				kernfs_break_active_protection
				// active = 0x80000001
// continue
				kernfs_unbreak_active_protection
				// active = 0x80000002
...
kernfs_should_drain_open_files
// warning occurs
				kernfs_put_active

This warning is caused by 'kernfs_break_active_protection' when it is
writing to cpuset.cpus, and the cgroup is removed concurrently.

The commit 3a5a6d0c2b03 ("cpuset: don't nest cgroup_mutex inside
get_online_cpus()") made cpuset_hotplug_workfn asynchronous, This change
involves calling flush_work(), which can create a multiple processes
circular locking dependency that involve cgroup_mutex, potentially leading
to a deadlock. To avoid deadlock. the commit 76bb5ab8f6e3 ("cpuset: break
kernfs active protection in cpuset_write_resmask()") added
'kernfs_break_active_protection' in the cpuset_write_resmask. This could
lead to this warning.

After the commit 2125c0034c5d ("cgroup/cpuset: Make cpuset hotplug
processing synchronous"), the cpuset_write_resmask no longer needs to
wait the hotplug to finish, which means that concurrent hotplug and cpuset
operations are no longer possible. Therefore, the deadlock doesn't exist
anymore and it does not have to 'break active protection' now. To fix this
warning, just remove kernfs_break_active_protection operation in the
'cpuset_write_resmask'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21634/">CVE-2025-21634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21634">CVE-2025-21634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236110">SUSE bug 1236110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21635</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21635" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21635" ref_url="https://www.suse.com/security/cve/CVE-2025-21635" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current-&gt;nsproxy

As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The per-netns structure can be obtained from the table-&gt;data using
container_of(), then the 'net' one can be retrieved from the listen
socket (if available).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21635/">CVE-2025-21635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21635">CVE-2025-21635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236111">SUSE bug 1236111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21636</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21636" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21636" ref_url="https://www.suse.com/security/cve/CVE-2025-21636" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: plpmtud_probe_interval: avoid using current-&gt;nsproxy

As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The 'net' structure can be obtained from the table-&gt;data using
container_of().

Note that table-&gt;data could also be used directly, as this is the only
member needed from the 'net' structure, but that would increase the size
of this fix, to use '*data' everywhere 'net-&gt;sctp.probe_interval' is
used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21636/">CVE-2025-21636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21636">CVE-2025-21636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236113">SUSE bug 1236113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21637</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21637" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21637" ref_url="https://www.suse.com/security/cve/CVE-2025-21637" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: udp_port: avoid using current-&gt;nsproxy

As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The 'net' structure can be obtained from the table-&gt;data using
container_of().

Note that table-&gt;data could also be used directly, but that would
increase the size of this fix, while 'sctp.ctl_sock' still needs to be
retrieved from 'net' structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21637/">CVE-2025-21637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21637">CVE-2025-21637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236114">SUSE bug 1236114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21638</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21638" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21638" ref_url="https://www.suse.com/security/cve/CVE-2025-21638" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: auth_enable: avoid using current-&gt;nsproxy

As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The 'net' structure can be obtained from the table-&gt;data using
container_of().

Note that table-&gt;data could also be used directly, but that would
increase the size of this fix, while 'sctp.ctl_sock' still needs to be
retrieved from 'net' structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21638/">CVE-2025-21638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21638">CVE-2025-21638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236115">SUSE bug 1236115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21639</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21639" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21639" ref_url="https://www.suse.com/security/cve/CVE-2025-21639" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: rto_min/max: avoid using current-&gt;nsproxy

As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The 'net' structure can be obtained from the table-&gt;data using
container_of().

Note that table-&gt;data could also be used directly, as this is the only
member needed from the 'net' structure, but that would increase the size
of this fix, to use '*data' everywhere 'net-&gt;sctp.rto_min/max' is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21639/">CVE-2025-21639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21639">CVE-2025-21639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236122">SUSE bug 1236122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21640</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21640" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21640" ref_url="https://www.suse.com/security/cve/CVE-2025-21640" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: sysctl: cookie_hmac_alg: avoid using current-&gt;nsproxy

As mentioned in a previous commit of this series, using the 'net'
structure via 'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The 'net' structure can be obtained from the table-&gt;data using
container_of().

Note that table-&gt;data could also be used directly, as this is the only
member needed from the 'net' structure, but that would increase the size
of this fix, to use '*data' everywhere 'net-&gt;sctp.sctp_hmac_alg' is
used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21640/">CVE-2025-21640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21640">CVE-2025-21640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236123">SUSE bug 1236123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21641</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21641" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21641" ref_url="https://www.suse.com/security/cve/CVE-2025-21641" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: sysctl: blackhole timeout: avoid using current-&gt;nsproxy

As mentioned in the previous commit, using the 'net' structure via
'current' is not recommended for different reasons:

- Inconsistency: getting info from the reader's/writer's netns vs only
  from the opener's netns.

- current-&gt;nsproxy can be NULL in some cases, resulting in an 'Oops'
  (null-ptr-deref), e.g. when the current task is exiting, as spotted by
  syzbot [1] using acct(2).

The 'pernet' structure can be obtained from the table-&gt;data using
container_of().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21641/">CVE-2025-21641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21641">CVE-2025-21641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236124">SUSE bug 1236124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21642</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21642" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21642" ref_url="https://www.suse.com/security/cve/CVE-2025-21642" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: sysctl: sched: avoid using current-&gt;nsproxy

Using the 'net' structure via 'current' is not recommended for different
reasons.

First, if the goal is to use it to read or write per-netns data, this is
inconsistent with how the "generic" sysctl entries are doing: directly
by only using pointers set to the table entry, e.g. table-&gt;data. Linked
to that, the per-netns data should always be obtained from the table
linked to the netns it had been created for, which may not coincide with
the reader's or writer's netns.

Another reason is that access to current-&gt;nsproxy-&gt;netns can oops if
attempted when current-&gt;nsproxy had been dropped when the current task
is exiting. This is what syzbot found, when using acct(2):

  Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN PTI
  KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
  CPU: 1 UID: 0 PID: 5924 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00004-gccb98ccef0e5 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125
  Code: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 28 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 cc 02 00 00 4d 8b 7c 24 28 48 8d 84 24 c8 00 00
  RSP: 0018:ffffc900034774e8 EFLAGS: 00010206

  RAX: dffffc0000000000 RBX: 1ffff9200068ee9e RCX: ffffc90003477620
  RDX: 0000000000000005 RSI: ffffffff8b08f91e RDI: 0000000000000028
  RBP: 0000000000000001 R08: ffffc90003477710 R09: 0000000000000040
  R10: 0000000000000040 R11: 00000000726f7475 R12: 0000000000000000
  R13: ffffc90003477620 R14: ffffc90003477710 R15: dffffc0000000000
  FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fee3cd452d8 CR3: 000000007d116000 CR4: 00000000003526f0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   proc_sys_call_handler+0x403/0x5d0 fs/proc/proc_sysctl.c:601
   __kernel_write_iter+0x318/0xa80 fs/read_write.c:612
   __kernel_write+0xf6/0x140 fs/read_write.c:632
   do_acct_process+0xcb0/0x14a0 kernel/acct.c:539
   acct_pin_kill+0x2d/0x100 kernel/acct.c:192
   pin_kill+0x194/0x7c0 fs/fs_pin.c:44
   mnt_pin_kill+0x61/0x1e0 fs/fs_pin.c:81
   cleanup_mnt+0x3ac/0x450 fs/namespace.c:1366
   task_work_run+0x14e/0x250 kernel/task_work.c:239
   exit_task_work include/linux/task_work.h:43 [inline]
   do_exit+0xad8/0x2d70 kernel/exit.c:938
   do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
   get_signal+0x2576/0x2610 kernel/signal.c:3017
   arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:337
   exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
   exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
   __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
   syscall_exit_to_user_mode+0x150/0x2a0 kernel/entry/common.c:218
   do_syscall_64+0xda/0x250 arch/x86/entry/common.c:89
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7fee3cb87a6a
  Code: Unable to access opcode bytes at 0x7fee3cb87a40.
  RSP: 002b:00007fffcccac688 EFLAGS: 00000202 ORIG_RAX: 0000000000000037
  RAX: 0000000000000000 RBX: 00007fffcccac710 RCX: 00007fee3cb87a6a
  RDX: 0000000000000041 RSI: 0000000000000000 RDI: 0000000000000003
  RBP: 0000000000000003 R08: 00007fffcccac6ac R09: 00007fffcccacac7
  R10: 00007fffcccac710 R11: 0000000000000202 R12: 00007fee3cd49500
  R13: 00007fffcccac6ac R14: 0000000000000000 R15: 00007fee3cd4b000
   &lt;/TASK&gt;
  Modules linked in:
  ---[ end trace 0000000000000000 ]---
  RIP: 0010:proc_scheduler+0xc6/0x3c0 net/mptcp/ctrl.c:125
  Code: 03 42 80 3c 38 00 0f 85 fe 02 00 00 4d 8b a4 24 08 09 00 00 48 b8 00 00 00 00 00 fc
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21642/">CVE-2025-21642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21642">CVE-2025-21642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236572">SUSE bug 1236572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21643</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21643" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21643" ref_url="https://www.suse.com/security/cve/CVE-2025-21643" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix kernel async DIO

Netfslib needs to be able to handle kernel-initiated asynchronous DIO that
is supplied with a bio_vec[] array.  Currently, because of the async flag,
this gets passed to netfs_extract_user_iter() which throws a warning and
fails because it only handles IOVEC and UBUF iterators.  This can be
triggered through a combination of cifs and a loopback blockdev with
something like:

        mount //my/cifs/share /foo
        dd if=/dev/zero of=/foo/m0 bs=4K count=1K
        losetup --sector-size 4096 --direct-io=on /dev/loop2046 /foo/m0
        echo hello &gt;/dev/loop2046

This causes the following to appear in syslog:

        WARNING: CPU: 2 PID: 109 at fs/netfs/iterator.c:50 netfs_extract_user_iter+0x170/0x250 [netfs]

and the write to fail.

Fix this by removing the check in netfs_unbuffered_write_iter_locked() that
causes async kernel DIO writes to be handled as userspace writes.  Note
that this change relies on the kernel caller maintaining the existence of
the bio_vec array (or kvec[] or folio_queue) until the op is complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21643/">CVE-2025-21643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21643">CVE-2025-21643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236129">SUSE bug 1236129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21644</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21644" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21644" ref_url="https://www.suse.com/security/cve/CVE-2025-21644" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix tlb invalidation when wedging

If GuC fails to load, the driver wedges, but in the process it tries to
do stuff that may not be initialized yet. This moves the
xe_gt_tlb_invalidation_init() to be done earlier: as its own doc says,
it's a software-only initialization and should had been named with the
_early() suffix.

Move it to be called by xe_gt_init_early(), so the locks and seqno are
initialized, avoiding a NULL ptr deref when wedging:

	xe 0000:03:00.0: [drm] *ERROR* GT0: load failed: status: Reset = 0, BootROM = 0x50, UKernel = 0x00, MIA = 0x00, Auth = 0x01
	xe 0000:03:00.0: [drm] *ERROR* GT0: firmware signature verification failed
	xe 0000:03:00.0: [drm] *ERROR* CRITICAL: Xe has declared device 0000:03:00.0 as wedged.
	...
	BUG: kernel NULL pointer dereference, address: 0000000000000000
	#PF: supervisor read access in kernel mode
	#PF: error_code(0x0000) - not-present page
	PGD 0 P4D 0
	Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
	CPU: 9 UID: 0 PID: 3908 Comm: modprobe Tainted: G     U  W          6.13.0-rc4-xe+ #3
	Tainted: [U]=USER, [W]=WARN
	Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-S ADP-S DDR5 UDIMM CRB, BIOS ADLSFWI1.R00.3275.A00.2207010640 07/01/2022
	RIP: 0010:xe_gt_tlb_invalidation_reset+0x75/0x110 [xe]

This can be easily triggered by poking the GuC binary to force a
signature failure. There will still be an extra message,

	xe 0000:03:00.0: [drm] *ERROR* GT0: GuC mmio request 0x4100: no reply 0x4100

but that's better than a NULL ptr deref.

(cherry picked from commit 5001ef3af8f2c972d6fd9c5221a8457556f8bea6)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21644/">CVE-2025-21644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21644">CVE-2025-21644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236085">SUSE bug 1236085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21645</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21645" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21645" ref_url="https://www.suse.com/security/cve/CVE-2025-21645" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it

Wakeup for IRQ1 should be disabled only in cases where i8042 had
actually enabled it, otherwise "wake_depth" for this IRQ will try to
drop below zero and there will be an unpleasant WARN() logged:

kernel: atkbd serio0: Disabling IRQ1 wakeup source to avoid platform firmware bug
kernel: ------------[ cut here ]------------
kernel: Unbalanced IRQ 1 wake disable
kernel: WARNING: CPU: 10 PID: 6431 at kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0

The PMC driver uses DEFINE_SIMPLE_DEV_PM_OPS() to define its dev_pm_ops
which sets amd_pmc_suspend_handler() to the .suspend, .freeze, and
.poweroff handlers. i8042_pm_suspend(), however, is only set as
the .suspend handler.

Fix the issue by call PMC suspend handler only from the same set of
dev_pm_ops handlers as i8042_pm_suspend(), which currently means just
the .suspend handler.

To reproduce this issue try hibernating (S4) the machine after a fresh boot
without putting it into s2idle first.

[ij: edited the commit message.]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21645/">CVE-2025-21645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21645">CVE-2025-21645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236131">SUSE bug 1236131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21646</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21646" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21646" ref_url="https://www.suse.com/security/cve/CVE-2025-21646" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix the maximum cell name length

The kafs filesystem limits the maximum length of a cell to 256 bytes, but a
problem occurs if someone actually does that: kafs tries to create a
directory under /proc/net/afs/ with the name of the cell, but that fails
with a warning:

        WARNING: CPU: 0 PID: 9 at fs/proc/generic.c:405

because procfs limits the maximum filename length to 255.

However, the DNS limits the maximum lookup length and, by extension, the
maximum cell name, to 255 less two (length count and trailing NUL).

Fix this by limiting the maximum acceptable cellname length to 253.  This
also allows us to be sure we can create the "/afs/.&lt;cell&gt;/" mountpoint too.

Further, split the YFS VL record cell name maximum to be the 256 allowed by
the protocol and ignore the record retrieved by YFSVL.GetCellName if it
exceeds 253.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21646/">CVE-2025-21646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236168">SUSE bug 1236168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21647</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21647" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21647" ref_url="https://www.suse.com/security/cve/CVE-2025-21647" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: add bounds checks to host bulk flow fairness counts

Even though we fixed a logic error in the commit cited below, syzbot
still managed to trigger an underflow of the per-host bulk flow
counters, leading to an out of bounds memory access.

To avoid any such logic errors causing out of bounds memory accesses,
this commit factors out all accesses to the per-host bulk flow counters
to a series of helpers that perform bounds-checking before any
increments and decrements. This also has the benefit of improving
readability by moving the conditional checks for the flow mode into
these helpers, instead of having them spread out throughout the
code (which was the cause of the original logic error).

As part of this change, the flow quantum calculation is consolidated
into a helper function, which means that the dithering applied to the
ost load scaling is now applied both in the DRR rotation and when a
sparse flow's quantum is first initiated. The only user-visible effect
of this is that the maximum packet size that can be sent while a flow
stays sparse will now vary with +/- one byte in some cases. This should
not make a noticeable difference in practice, and thus it's not worth
complicating the code to preserve the old behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21647/">CVE-2025-21647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236133">SUSE bug 1236133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236134">SUSE bug 1236134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21648</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21648" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21648" ref_url="https://www.suse.com/security/cve/CVE-2025-21648" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: clamp maximum hashtable size to INT_MAX

Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it
is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when
resizing hashtable because __GFP_NOWARN is unset. See:

  0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls")

Note: hashtable resize is only possible from init_netns.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21648/">CVE-2025-21648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236142">SUSE bug 1236142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21649</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21649" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21649" ref_url="https://www.suse.com/security/cve/CVE-2025-21649" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix kernel crash when 1588 is sent on HIP08 devices

Currently, HIP08 devices does not register the ptp devices, so the
hdev-&gt;ptp is NULL. But the tx process would still try to set hardware time
stamp info with SKBTX_HW_TSTAMP flag and cause a kernel crash.

[  128.087798] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000018
...
[  128.280251] pc : hclge_ptp_set_tx_info+0x2c/0x140 [hclge]
[  128.286600] lr : hclge_ptp_set_tx_info+0x20/0x140 [hclge]
[  128.292938] sp : ffff800059b93140
[  128.297200] x29: ffff800059b93140 x28: 0000000000003280
[  128.303455] x27: ffff800020d48280 x26: ffff0cb9dc814080
[  128.309715] x25: ffff0cb9cde93fa0 x24: 0000000000000001
[  128.315969] x23: 0000000000000000 x22: 0000000000000194
[  128.322219] x21: ffff0cd94f986000 x20: 0000000000000000
[  128.328462] x19: ffff0cb9d2a166c0 x18: 0000000000000000
[  128.334698] x17: 0000000000000000 x16: ffffcf1fc523ed24
[  128.340934] x15: 0000ffffd530a518 x14: 0000000000000000
[  128.347162] x13: ffff0cd6bdb31310 x12: 0000000000000368
[  128.353388] x11: ffff0cb9cfbc7070 x10: ffff2cf55dd11e02
[  128.359606] x9 : ffffcf1f85a212b4 x8 : ffff0cd7cf27dab0
[  128.365831] x7 : 0000000000000a20 x6 : ffff0cd7cf27d000
[  128.372040] x5 : 0000000000000000 x4 : 000000000000ffff
[  128.378243] x3 : 0000000000000400 x2 : ffffcf1f85a21294
[  128.384437] x1 : ffff0cb9db520080 x0 : ffff0cb9db500080
[  128.390626] Call trace:
[  128.393964]  hclge_ptp_set_tx_info+0x2c/0x140 [hclge]
[  128.399893]  hns3_nic_net_xmit+0x39c/0x4c4 [hns3]
[  128.405468]  xmit_one.constprop.0+0xc4/0x200
[  128.410600]  dev_hard_start_xmit+0x54/0xf0
[  128.415556]  sch_direct_xmit+0xe8/0x634
[  128.420246]  __dev_queue_xmit+0x224/0xc70
[  128.425101]  dev_queue_xmit+0x1c/0x40
[  128.429608]  ovs_vport_send+0xac/0x1a0 [openvswitch]
[  128.435409]  do_output+0x60/0x17c [openvswitch]
[  128.440770]  do_execute_actions+0x898/0x8c4 [openvswitch]
[  128.446993]  ovs_execute_actions+0x64/0xf0 [openvswitch]
[  128.453129]  ovs_dp_process_packet+0xa0/0x224 [openvswitch]
[  128.459530]  ovs_vport_receive+0x7c/0xfc [openvswitch]
[  128.465497]  internal_dev_xmit+0x34/0xb0 [openvswitch]
[  128.471460]  xmit_one.constprop.0+0xc4/0x200
[  128.476561]  dev_hard_start_xmit+0x54/0xf0
[  128.481489]  __dev_queue_xmit+0x968/0xc70
[  128.486330]  dev_queue_xmit+0x1c/0x40
[  128.490856]  ip_finish_output2+0x250/0x570
[  128.495810]  __ip_finish_output+0x170/0x1e0
[  128.500832]  ip_finish_output+0x3c/0xf0
[  128.505504]  ip_output+0xbc/0x160
[  128.509654]  ip_send_skb+0x58/0xd4
[  128.513892]  udp_send_skb+0x12c/0x354
[  128.518387]  udp_sendmsg+0x7a8/0x9c0
[  128.522793]  inet_sendmsg+0x4c/0x8c
[  128.527116]  __sock_sendmsg+0x48/0x80
[  128.531609]  __sys_sendto+0x124/0x164
[  128.536099]  __arm64_sys_sendto+0x30/0x5c
[  128.540935]  invoke_syscall+0x50/0x130
[  128.545508]  el0_svc_common.constprop.0+0x10c/0x124
[  128.551205]  do_el0_svc+0x34/0xdc
[  128.555347]  el0_svc+0x20/0x30
[  128.559227]  el0_sync_handler+0xb8/0xc0
[  128.563883]  el0_sync+0x160/0x180
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21649/">CVE-2025-21649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21649">CVE-2025-21649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236143">SUSE bug 1236143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21650</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21650" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21650" ref_url="https://www.suse.com/security/cve/CVE-2025-21650" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue

The TQP BAR space is divided into two segments. TQPs 0-1023 and TQPs
1024-1279 are in different BAR space addresses. However,
hclge_fetch_pf_reg does not distinguish the tqp space information when
reading the tqp space information. When the number of TQPs is greater
than 1024, access bar space overwriting occurs.
The problem of different segments has been considered during the
initialization of tqp.io_base. Therefore, tqp.io_base is directly used
when the queue is read in hclge_fetch_pf_reg.

The error message:

Unable to handle kernel paging request at virtual address ffff800037200000
pc : hclge_fetch_pf_reg+0x138/0x250 [hclge]
lr : hclge_get_regs+0x84/0x1d0 [hclge]
Call trace:
 hclge_fetch_pf_reg+0x138/0x250 [hclge]
 hclge_get_regs+0x84/0x1d0 [hclge]
 hns3_get_regs+0x2c/0x50 [hns3]
 ethtool_get_regs+0xf4/0x270
 dev_ethtool+0x674/0x8a0
 dev_ioctl+0x270/0x36c
 sock_do_ioctl+0x110/0x2a0
 sock_ioctl+0x2ac/0x530
 __arm64_sys_ioctl+0xa8/0x100
 invoke_syscall+0x4c/0x124
 el0_svc_common.constprop.0+0x140/0x15c
 do_el0_svc+0x30/0xd0
 el0_svc+0x1c/0x2c
 el0_sync_handler+0xb0/0xb4
 el0_sync+0x168/0x180
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21650/">CVE-2025-21650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21650">CVE-2025-21650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236144">SUSE bug 1236144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21651</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21651" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21651" ref_url="https://www.suse.com/security/cve/CVE-2025-21651" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: don't auto enable misc vector

Currently, there is a time window between misc irq enabled
and service task inited. If an interrupte is reported at
this time, it will cause warning like below:

[   16.324639] Call trace:
[   16.324641]  __queue_delayed_work+0xb8/0xe0
[   16.324643]  mod_delayed_work_on+0x78/0xd0
[   16.324655]  hclge_errhand_task_schedule+0x58/0x90 [hclge]
[   16.324662]  hclge_misc_irq_handle+0x168/0x240 [hclge]
[   16.324666]  __handle_irq_event_percpu+0x64/0x1e0
[   16.324667]  handle_irq_event+0x80/0x170
[   16.324670]  handle_fasteoi_edge_irq+0x110/0x2bc
[   16.324671]  __handle_domain_irq+0x84/0xfc
[   16.324673]  gic_handle_irq+0x88/0x2c0
[   16.324674]  el1_irq+0xb8/0x140
[   16.324677]  arch_cpu_idle+0x18/0x40
[   16.324679]  default_idle_call+0x5c/0x1bc
[   16.324682]  cpuidle_idle_call+0x18c/0x1c4
[   16.324684]  do_idle+0x174/0x17c
[   16.324685]  cpu_startup_entry+0x30/0x6c
[   16.324687]  secondary_start_kernel+0x1a4/0x280
[   16.324688] ---[ end trace 6aa0bff672a964aa ]---

So don't auto enable misc vector when request irq..
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21651/">CVE-2025-21651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21651">CVE-2025-21651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236145">SUSE bug 1236145</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21652</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21652" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21652" ref_url="https://www.suse.com/security/cve/CVE-2025-21652" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Fix use-after-free in ipvlan_get_iflink().

syzbot presented an use-after-free report [0] regarding ipvlan and
linkwatch.

ipvlan does not hold a refcnt of the lower device unlike vlan and
macvlan.

If the linkwatch work is triggered for the ipvlan dev, the lower dev
might have already been freed, resulting in UAF of ipvlan-&gt;phy_dev in
ipvlan_get_iflink().

We can delay the lower dev unregistration like vlan and macvlan by
holding the lower dev's refcnt in dev-&gt;netdev_ops-&gt;ndo_init() and
releasing it in dev-&gt;priv_destructor().

Jakub pointed out calling .ndo_XXX after unregister_netdevice() has
returned is error prone and suggested [1] addressing this UAF in the
core by taking commit 750e51603395 ("net: avoid potential UAF in
default_operstate()") further.

Let's assume unregistering devices DOWN and use RCU protection in
default_operstate() not to race with the device unregistration.

[0]:
BUG: KASAN: slab-use-after-free in ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353
Read of size 4 at addr ffff0000d768c0e0 by task kworker/u8:35/6944

CPU: 0 UID: 0 PID: 6944 Comm: kworker/u8:35 Not tainted 6.13.0-rc2-g9bc5c9515b48 #12 4c3cb9e8b4565456f6a355f312ff91f4f29b3c47
Hardware name: linux,dummy-virt (DT)
Workqueue: events_unbound linkwatch_event
Call trace:
 show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:484 (C)
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x16c/0x6f0 mm/kasan/report.c:489
 kasan_report+0xc0/0x120 mm/kasan/report.c:602
 __asan_report_load4_noabort+0x20/0x30 mm/kasan/report_generic.c:380
 ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353
 dev_get_iflink+0x7c/0xd8 net/core/dev.c:674
 default_operstate net/core/link_watch.c:45 [inline]
 rfc2863_policy+0x144/0x360 net/core/link_watch.c:72
 linkwatch_do_dev+0x60/0x228 net/core/link_watch.c:175
 __linkwatch_run_queue+0x2f4/0x5b8 net/core/link_watch.c:239
 linkwatch_event+0x64/0xa8 net/core/link_watch.c:282
 process_one_work+0x700/0x1398 kernel/workqueue.c:3229
 process_scheduled_works kernel/workqueue.c:3310 [inline]
 worker_thread+0x8c4/0xe10 kernel/workqueue.c:3391
 kthread+0x2b0/0x360 kernel/kthread.c:389
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862

Allocated by task 9303:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x30/0x68 mm/kasan/common.c:68
 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4283 [inline]
 __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4289
 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:650
 alloc_netdev_mqs+0xb4/0x1118 net/core/dev.c:11209
 rtnl_create_link+0x2b8/0xb60 net/core/rtnetlink.c:3595
 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3771
 __rtnl_newlink net/core/rtnetlink.c:3896 [inline]
 rtnl_newlink+0x122c/0x15c0 net/core/rtnetlink.c:4011
 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6901
 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2542
 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6928
 netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline]
 netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1347
 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1891
 sock_sendmsg_nosec net/socket.c:711 [inline]
 __sock_sendmsg net/socket.c:726 [inline]
 __sys_sendto+0x2ec/0x438 net/socket.c:2197
 __do_sys_sendto net/socket.c:2204 [inline]
 __se_sys_sendto net/socket.c:2200 [inline]
 __arm64_sys_sendto+0xe4/0x110 net/socket.c:2200
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151
 el
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21652/">CVE-2025-21652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21652">CVE-2025-21652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236160">SUSE bug 1236160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21653</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21653" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21653" ref_url="https://www.suse.com/security/cve/CVE-2025-21653" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute

syzbot found that TCA_FLOW_RSHIFT attribute was not validated.
Right shitfing a 32bit integer is undefined for large shift values.

UBSAN: shift-out-of-bounds in net/sched/cls_flow.c:329:23
shift exponent 9445 is too large for 32-bit type 'u32' (aka 'unsigned int')
CPU: 1 UID: 0 PID: 54 Comm: kworker/u8:3 Not tainted 6.13.0-rc3-syzkaller-00180-g4f619d518db9 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: ipv6_addrconf addrconf_dad_work
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
  ubsan_epilogue lib/ubsan.c:231 [inline]
  __ubsan_handle_shift_out_of_bounds+0x3c8/0x420 lib/ubsan.c:468
  flow_classify+0x24d5/0x25b0 net/sched/cls_flow.c:329
  tc_classify include/net/tc_wrapper.h:197 [inline]
  __tcf_classify net/sched/cls_api.c:1771 [inline]
  tcf_classify+0x420/0x1160 net/sched/cls_api.c:1867
  sfb_classify net/sched/sch_sfb.c:260 [inline]
  sfb_enqueue+0x3ad/0x18b0 net/sched/sch_sfb.c:318
  dev_qdisc_enqueue+0x4b/0x290 net/core/dev.c:3793
  __dev_xmit_skb net/core/dev.c:3889 [inline]
  __dev_queue_xmit+0xf0e/0x3f50 net/core/dev.c:4400
  dev_queue_xmit include/linux/netdevice.h:3168 [inline]
  neigh_hh_output include/net/neighbour.h:523 [inline]
  neigh_output include/net/neighbour.h:537 [inline]
  ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236
  iptunnel_xmit+0x55d/0x9b0 net/ipv4/ip_tunnel_core.c:82
  udp_tunnel_xmit_skb+0x262/0x3b0 net/ipv4/udp_tunnel_core.c:173
  geneve_xmit_skb drivers/net/geneve.c:916 [inline]
  geneve_xmit+0x21dc/0x2d00 drivers/net/geneve.c:1039
  __netdev_start_xmit include/linux/netdevice.h:5002 [inline]
  netdev_start_xmit include/linux/netdevice.h:5011 [inline]
  xmit_one net/core/dev.c:3590 [inline]
  dev_hard_start_xmit+0x27a/0x7d0 net/core/dev.c:3606
  __dev_queue_xmit+0x1b73/0x3f50 net/core/dev.c:4434
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21653/">CVE-2025-21653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21653">CVE-2025-21653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236161">SUSE bug 1236161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21654</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21654" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21654" ref_url="https://www.suse.com/security/cve/CVE-2025-21654" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: support encoding fid from inode with no alias

Dmitry Safonov reported that a WARN_ON() assertion can be trigered by
userspace when calling inotify_show_fdinfo() for an overlayfs watched
inode, whose dentry aliases were discarded with drop_caches.

The WARN_ON() assertion in inotify_show_fdinfo() was removed, because
it is possible for encoding file handle to fail for other reason, but
the impact of failing to encode an overlayfs file handle goes beyond
this assertion.

As shown in the LTP test case mentioned in the link below, failure to
encode an overlayfs file handle from a non-aliased inode also leads to
failure to report an fid with FAN_DELETE_SELF fanotify events.

As Dmitry notes in his analyzis of the problem, ovl_encode_fh() fails
if it cannot find an alias for the inode, but this failure can be fixed.
ovl_encode_fh() seldom uses the alias and in the case of non-decodable
file handles, as is often the case with fanotify fid info,
ovl_encode_fh() never needs to use the alias to encode a file handle.

Defer finding an alias until it is actually needed so ovl_encode_fh()
will not fail in the common case of FAN_DELETE_SELF fanotify events.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21654/">CVE-2025-21654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21654">CVE-2025-21654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236162">SUSE bug 1236162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21655</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21655" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21655" ref_url="https://www.suse.com/security/cve/CVE-2025-21655" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/eventfd: ensure io_eventfd_signal() defers another RCU period

io_eventfd_do_signal() is invoked from an RCU callback, but when
dropping the reference to the io_ev_fd, it calls io_eventfd_free()
directly if the refcount drops to zero. This isn't correct, as any
potential freeing of the io_ev_fd should be deferred another RCU grace
period.

Just call io_eventfd_put() rather than open-code the dec-and-test and
free, which will correctly defer it another RCU grace period.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21655/">CVE-2025-21655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21655">CVE-2025-21655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236163">SUSE bug 1236163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21656</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21656" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21656" ref_url="https://www.suse.com/security/cve/CVE-2025-21656" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur

scsi_execute_cmd() function can return both negative (linux codes) and
positive (scsi_cmnd result field) error codes.

Currently the driver just passes error codes of scsi_execute_cmd() to
hwmon core, which is incorrect because hwmon only checks for negative
error codes. This leads to hwmon reporting uninitialized data to
userspace in case of SCSI errors (for example if the disk drive was
disconnected).

This patch checks scsi_execute_cmd() output and returns -EIO if it's
error code is positive.

[groeck: Avoid inline variable declaration for portability]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-29"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21656/">CVE-2025-21656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21656">CVE-2025-21656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236248">SUSE bug 1236248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21657</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21657" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21657" ref_url="https://www.suse.com/security/cve/CVE-2025-21657" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()

scx_ops_bypass() iterates all CPUs to re-enqueue all the scx tasks.
For each CPU, it acquires a lock using rq_lock() regardless of whether
a CPU is offline or the CPU is currently running a task in a higher
scheduler class (e.g., deadline). The rq_lock() is supposed to be used
for online CPUs, and the use of rq_lock() may trigger an unnecessary
warning in rq_pin_lock(). Therefore, replace rq_lock() to
raw_spin_rq_lock() in scx_ops_bypass().

Without this change, we observe the following warning:

===== START =====
[    6.615205] rq-&gt;balance_callback &amp;&amp; rq-&gt;balance_callback != &amp;balance_push_callback
[    6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90
=====  END  =====
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21657/">CVE-2025-21657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21657">CVE-2025-21657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236246">SUSE bug 1236246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21658</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21658" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21658" ref_url="https://www.suse.com/security/cve/CVE-2025-21658" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: avoid NULL pointer dereference if no valid extent tree

[BUG]
Syzbot reported a crash with the following call trace:

  BTRFS info (device loop0): scrub: started on devid 1
  BUG: kernel NULL pointer dereference, address: 0000000000000208
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 106e70067 P4D 106e70067 PUD 107143067 PMD 0
  Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 1 UID: 0 PID: 689 Comm: repro Kdump: loaded Tainted: G           O       6.13.0-rc4-custom+ #206
  Tainted: [O]=OOT_MODULE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS unknown 02/02/2022
  RIP: 0010:find_first_extent_item+0x26/0x1f0 [btrfs]
  Call Trace:
   &lt;TASK&gt;
   scrub_find_fill_first_stripe+0x13d/0x3b0 [btrfs]
   scrub_simple_mirror+0x175/0x260 [btrfs]
   scrub_stripe+0x5d4/0x6c0 [btrfs]
   scrub_chunk+0xbb/0x170 [btrfs]
   scrub_enumerate_chunks+0x2f4/0x5f0 [btrfs]
   btrfs_scrub_dev+0x240/0x600 [btrfs]
   btrfs_ioctl+0x1dc8/0x2fa0 [btrfs]
   ? do_sys_openat2+0xa5/0xf0
   __x64_sys_ioctl+0x97/0xc0
   do_syscall_64+0x4f/0x120
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
   &lt;/TASK&gt;

[CAUSE]
The reproducer is using a corrupted image where extent tree root is
corrupted, thus forcing to use "rescue=all,ro" mount option to mount the
image.

Then it triggered a scrub, but since scrub relies on extent tree to find
where the data/metadata extents are, scrub_find_fill_first_stripe()
relies on an non-empty extent root.

But unfortunately scrub_find_fill_first_stripe() doesn't really expect
an NULL pointer for extent root, it use extent_root to grab fs_info and
triggered a NULL pointer dereference.

[FIX]
Add an extra check for a valid extent root at the beginning of
scrub_find_fill_first_stripe().

The new error path is introduced by 42437a6386ff ("btrfs: introduce
mount option rescue=ignorebadroots"), but that's pretty old, and later
commit b979547513ff ("btrfs: scrub: introduce helper to find and fill
sector info for a scrub_stripe") changed how we do scrub.

So for kernels older than 6.6, the fix will need manual backport.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21658/">CVE-2025-21658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21658">CVE-2025-21658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236208">SUSE bug 1236208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21659</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21659" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21659" ref_url="https://www.suse.com/security/cve/CVE-2025-21659" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdev: prevent accessing NAPI instances from another namespace

The NAPI IDs were not fully exposed to user space prior to the netlink
API, so they were never namespaced. The netlink API must ensure that
at the very least NAPI instance belongs to the same netns as the owner
of the genl sock.

napi_by_id() can become static now, but it needs to move because of
dev_get_by_napi_id().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21659/">CVE-2025-21659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21659">CVE-2025-21659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236206">SUSE bug 1236206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236207">SUSE bug 1236207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21660</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21660" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21660" ref_url="https://www.suse.com/security/cve/CVE-2025-21660" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked

When `ksmbd_vfs_kern_path_locked` met an error and it is not the last
entry, it will exit without restoring changed path buffer. But later this
buffer may be used as the filename for creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21660/">CVE-2025-21660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21660">CVE-2025-21660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236204">SUSE bug 1236204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21661</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21661" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21661" ref_url="https://www.suse.com/security/cve/CVE-2025-21661" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: virtuser: fix missing lookup table cleanups

When a virtuser device is created via configfs and the probe fails due
to an incorrect lookup table, the table is not removed. This prevents
subsequent probe attempts from succeeding, even if the issue is
corrected, unless the device is released. Additionally, cleanup is also
needed in the less likely case of platform_device_register_full()
failure.

Besides, a consistent memory leak in lookup_table-&gt;dev_id was spotted
using kmemleak by toggling the live state between 0 and 1 with a correct
lookup table.

Introduce gpio_virtuser_remove_lookup_table() as the counterpart to the
existing gpio_virtuser_make_lookup_table() and call it from all
necessary points to ensure proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21661/">CVE-2025-21661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21661">CVE-2025-21661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236201">SUSE bug 1236201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21662</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21662" ref_url="https://www.suse.com/security/cve/CVE-2025-21662" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix variable not being completed when function returns

When cmd_alloc_index(), fails cmd_work_handler() needs
to complete ent-&gt;slotted before returning early.
Otherwise the task which issued the command may hang:

   mlx5_core 0000:01:00.0: cmd_work_handler:877:(pid 3880418): failed to allocate command entry
   INFO: task kworker/13:2:4055883 blocked for more than 120 seconds.
         Not tainted 4.19.90-25.44.v2101.ky10.aarch64 #1
   "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
   kworker/13:2    D    0 4055883      2 0x00000228
   Workqueue: events mlx5e_tx_dim_work [mlx5_core]
   Call trace:
      __switch_to+0xe8/0x150
      __schedule+0x2a8/0x9b8
      schedule+0x2c/0x88
      schedule_timeout+0x204/0x478
      wait_for_common+0x154/0x250
      wait_for_completion+0x28/0x38
      cmd_exec+0x7a0/0xa00 [mlx5_core]
      mlx5_cmd_exec+0x54/0x80 [mlx5_core]
      mlx5_core_modify_cq+0x6c/0x80 [mlx5_core]
      mlx5_core_modify_cq_moderation+0xa0/0xb8 [mlx5_core]
      mlx5e_tx_dim_work+0x54/0x68 [mlx5_core]
      process_one_work+0x1b0/0x448
      worker_thread+0x54/0x468
      kthread+0x134/0x138
      ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21662/">CVE-2025-21662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21662">CVE-2025-21662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236198">SUSE bug 1236198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21663</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21663" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21663" ref_url="https://www.suse.com/security/cve/CVE-2025-21663" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: dwmac-tegra: Read iommu stream id from device tree

Nvidia's Tegra MGBE controllers require the IOMMU "Stream ID" (SID) to be
written to the MGBE_WRAP_AXI_ASID0_CTRL register.

The current driver is hard coded to use MGBE0's SID for all controllers.
This causes softirq time outs and kernel panics when using controllers
other than MGBE0.

Example dmesg errors when an ethernet cable is connected to MGBE1:

[  116.133290] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx
[  121.851283] tegra-mgbe 6910000.ethernet eth1: NETDEV WATCHDOG: CPU: 5: transmit queue 0 timed out 5690 ms
[  121.851782] tegra-mgbe 6910000.ethernet eth1: Reset adapter.
[  121.892464] tegra-mgbe 6910000.ethernet eth1: Register MEM_TYPE_PAGE_POOL RxQ-0
[  121.905920] tegra-mgbe 6910000.ethernet eth1: PHY [stmmac-1:00] driver [Aquantia AQR113] (irq=171)
[  121.907356] tegra-mgbe 6910000.ethernet eth1: Enabling Safety Features
[  121.907578] tegra-mgbe 6910000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
[  121.908399] tegra-mgbe 6910000.ethernet eth1: registered PTP clock
[  121.908582] tegra-mgbe 6910000.ethernet eth1: configuring for phy/10gbase-r link mode
[  125.961292] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx
[  181.921198] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[  181.921404] rcu: 	7-....: (1 GPs behind) idle=540c/1/0x4000000000000002 softirq=1748/1749 fqs=2337
[  181.921684] rcu: 	(detected by 4, t=6002 jiffies, g=1357, q=1254 ncpus=8)
[  181.921878] Sending NMI from CPU 4 to CPUs 7:
[  181.921886] NMI backtrace for cpu 7
[  181.922131] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Kdump: loaded Not tainted 6.13.0-rc3+ #6
[  181.922390] Hardware name: NVIDIA CTI Forge + Orin AGX/Jetson, BIOS 202402.1-Unknown 10/28/2024
[  181.922658] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  181.922847] pc : handle_softirqs+0x98/0x368
[  181.922978] lr : __do_softirq+0x18/0x20
[  181.923095] sp : ffff80008003bf50
[  181.923189] x29: ffff80008003bf50 x28: 0000000000000008 x27: 0000000000000000
[  181.923379] x26: ffffce78ea277000 x25: 0000000000000000 x24: 0000001c61befda0
[  181.924486] x23: 0000000060400009 x22: ffffce78e99918bc x21: ffff80008018bd70
[  181.925568] x20: ffffce78e8bb00d8 x19: ffff80008018bc20 x18: 0000000000000000
[  181.926655] x17: ffff318ebe7d3000 x16: ffff800080038000 x15: 0000000000000000
[  181.931455] x14: ffff000080816680 x13: ffff318ebe7d3000 x12: 000000003464d91d
[  181.938628] x11: 0000000000000040 x10: ffff000080165a70 x9 : ffffce78e8bb0160
[  181.945804] x8 : ffff8000827b3160 x7 : f9157b241586f343 x6 : eeb6502a01c81c74
[  181.953068] x5 : a4acfcdd2e8096bb x4 : ffffce78ea277340 x3 : 00000000ffffd1e1
[  181.960329] x2 : 0000000000000101 x1 : ffffce78ea277340 x0 : ffff318ebe7d3000
[  181.967591] Call trace:
[  181.970043]  handle_softirqs+0x98/0x368 (P)
[  181.974240]  __do_softirq+0x18/0x20
[  181.977743]  ____do_softirq+0x14/0x28
[  181.981415]  call_on_irq_stack+0x24/0x30
[  181.985180]  do_softirq_own_stack+0x20/0x30
[  181.989379]  __irq_exit_rcu+0x114/0x140
[  181.993142]  irq_exit_rcu+0x14/0x28
[  181.996816]  el1_interrupt+0x44/0xb8
[  182.000316]  el1h_64_irq_handler+0x14/0x20
[  182.004343]  el1h_64_irq+0x80/0x88
[  182.007755]  cpuidle_enter_state+0xc4/0x4a8 (P)
[  182.012305]  cpuidle_enter+0x3c/0x58
[  182.015980]  cpuidle_idle_call+0x128/0x1c0
[  182.020005]  do_idle+0xe0/0xf0
[  182.023155]  cpu_startup_entry+0x3c/0x48
[  182.026917]  secondary_start_kernel+0xdc/0x120
[  182.031379]  __secondary_switched+0x74/0x78
[  212.971162] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 7-.... } 6103 jiffies s: 417 root: 0x80/.
[  212.985935] rcu: blocking rcu_node structures (internal RCU debug):
[  212.992758] Sending NMI from CPU 0 to CPUs 7:
[  212.998539] NMI backtrace for cpu 7
[  213.004304] CPU: 7 UID: 0 PI
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21663/">CVE-2025-21663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236260">SUSE bug 1236260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009334017" comment="kernel-default is not affected"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21664</title>
    <affected family="unix">
            <platform>SUSE Linux Enterprise Micro 5.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21664" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21664" ref_url="https://www.suse.com/security/cve/CVE-2025-21664" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: make get_first_thin use rcu-safe list first function

The documentation in rculist.h explains the absence of list_empty_rcu()
and cautions programmers against relying on a list_empty() -&gt;
list_first() sequence in RCU safe code.  This is because each of these
functions performs its own READ_ONCE() of the list head.  This can lead
to a situation where the list_empty() sees a valid list entry, but the
subsequent list_first() sees a different view of list head state after a
modification.

In the case of dm-thin, this author had a production box crash from a GP
fault in the process_deferred_bios path.  This function saw a valid list
head in get_first_thin() but when it subsequently dereferenced that and
turned it into a thin_c, it got the inside of the struct pool, since the
list was now empty and referring to itself.  The kernel on which this
occurred printed both a warning about a refcount_t being saturated, and
a UBSAN error for an out-of-bounds cpuid access in the queued spinlock,
prior to the fault itself.  When the resulting kdump was examined, it
was possible to see another thread patiently waiting in thin_dtr's
synchronize_rcu.

The thin_dtr call managed to pull the thin_c out of the active thins
list (and have it be the last entry in the active_thins list) at just
the wrong moment which lead to this crash.

Fortunately, the fix here is straight forward.  Switch get_first_thin()
function to use list_first_or_null_rcu() which performs just a single
READ_ONCE() and returns NULL if the list is already empty.

This was run against the devicemapper test suite's thin-provisioning
suites for delete and suspend and no regressions were observed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-23"/>
	<updated date="2025-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21664/">CVE-2025-21664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21664">CVE-2025-21664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236262">SUSE bug 1236262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:suse-microos:5.0</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009704855" comment="SUSE Linux Enterprise Micro 5.0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009338032" comment="kernel-default is affected"/>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334017" version="1" comment="kernel-default is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704855" version="1" comment="SUSE-MicroOS-release is ==5.0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009732558" version="1" comment="rpcbind is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333942" version="1" comment="openssl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334866" version="1" comment="libopenssl1_1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333944" version="1" comment="openssl-1_1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667767" version="1" comment="nfs-client is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667769" version="1" comment="nfs-kernel-server is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333977" version="1" comment="curl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335173" version="1" comment="libcurl4 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705046" version="1" comment="kernel-rt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333996" version="1" comment="openssh is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904466" version="1" comment="libnm0 is &lt;1.22.10-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904467" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.22.10-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489365" version="1" comment="libvorbis0 is &lt;1.3.6-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489366" version="1" comment="libvorbisenc2 is &lt;1.3.6-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334187" version="1" comment="python3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337751" version="1" comment="libxml2-2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337752" version="1" comment="libxml2-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904497" version="1" comment="vim-data-common is &lt;8.0.1568-5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904498" version="1" comment="vim-small is &lt;8.0.1568-5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489671" version="1" comment="fuse is &lt;2.9.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489674" version="1" comment="libfuse2 is &lt;2.9.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882361" version="1" comment="libthai-data is &lt;0.1.27-1.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882363" version="1" comment="libthai0 is &lt;0.1.27-1.16 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904439" version="1" comment="glibc is &lt;2.26-13.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904440" version="1" comment="glibc-locale is &lt;2.26-13.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904441" version="1" comment="glibc-locale-base is &lt;2.26-13.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009491105" version="1" comment="tar is &lt;1.30-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881810" version="1" comment="dbus-1-glib is &lt;0.108-1.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334290" version="1" comment="sudo is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009886989" version="1" comment="logrotate is &lt;3.13.0-4.3.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009896219" version="1" comment="hardlink is &lt;1.0+git.e66999f-1.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881701" version="1" comment="augeas is &lt;1.10.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881703" version="1" comment="augeas-lenses is &lt;1.10.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881704" version="1" comment="libaugeas0 is &lt;1.10.1-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490502" version="1" comment="libexpat1 is &lt;2.2.5-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009896702" version="1" comment="squashfs is &lt;4.3-1.29 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493132" version="1" comment="libruby2_5-2_5 is &lt;2.5.8-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493133" version="1" comment="ruby2.5 is &lt;2.5.8-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493136" version="1" comment="ruby2.5-stdlib is &lt;2.5.8-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009896051" version="1" comment="coreutils is &lt;8.29-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881984" version="1" comment="libXext6 is &lt;1.3.3-1.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882003" version="1" comment="libXrender1 is &lt;0.9.10-1.30 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882011" version="1" comment="libXv1 is &lt;1.0.11-1.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904501" version="1" comment="xen-libs is &lt;4.13.2_06-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499780" version="1" comment="libspice-server1 is &lt;0.14.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334933" version="1" comment="libvirt-daemon is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334936" version="1" comment="libvirt-daemon-driver-interface is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334939" version="1" comment="libvirt-daemon-driver-network is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334940" version="1" comment="libvirt-daemon-driver-nodedev is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334941" version="1" comment="libvirt-daemon-driver-nwfilter is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334942" version="1" comment="libvirt-daemon-driver-qemu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334943" version="1" comment="libvirt-daemon-driver-secret is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334944" version="1" comment="libvirt-daemon-driver-storage is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336191" version="1" comment="libvirt-daemon-driver-storage-core is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336192" version="1" comment="libvirt-daemon-driver-storage-disk is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336193" version="1" comment="libvirt-daemon-driver-storage-iscsi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336194" version="1" comment="libvirt-daemon-driver-storage-logical is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336195" version="1" comment="libvirt-daemon-driver-storage-mpath is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336196" version="1" comment="libvirt-daemon-driver-storage-rbd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336197" version="1" comment="libvirt-daemon-driver-storage-scsi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334946" version="1" comment="libvirt-daemon-qemu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336198" version="1" comment="libvirt-libs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882202" version="1" comment="libjson-c3 is &lt;0.13-1.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882404" version="1" comment="libyaml-0-2 is &lt;0.1.7-1.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009897127" version="1" comment="python3-Jinja2 is &lt;2.10.1-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882399" version="1" comment="libxml2-2 is &lt;2.9.7-3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882402" version="1" comment="libxml2-tools is &lt;2.9.7-3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500021" version="1" comment="qemu is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904487" version="1" comment="qemu-arm is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904488" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904489" version="1" comment="qemu-ppc is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904490" version="1" comment="qemu-s390 is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904491" version="1" comment="qemu-seabios is &lt;1.12.1+-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904492" version="1" comment="qemu-sgabios is &lt;8-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494122" version="1" comment="qemu-tools is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904493" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904494" version="1" comment="qemu-x86 is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882144" version="1" comment="libfreebl3 is &lt;3.53.1-3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882146" version="1" comment="libsoftokn3 is &lt;3.53.1-3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882148" version="1" comment="mozilla-nss is &lt;3.53.1-3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882150" version="1" comment="mozilla-nss-certs is &lt;3.53.1-3.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492694" version="1" comment="libfreetype6 is &lt;2.10.1-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493615" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882252" version="1" comment="openssl is &lt;1.1.1d-1.46 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493619" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882156" version="1" comment="libgcrypt20 is &lt;1.8.2-8.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009491500" version="1" comment="dbus-1 is &lt;1.12.2-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009491503" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904495" version="1" comment="shim is &lt;15+git47-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494108" version="1" comment="wpa_supplicant is &lt;2.9-4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887019" version="1" comment="file is &lt;5.32-7.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887021" version="1" comment="file-magic is &lt;5.32-7.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887022" version="1" comment="libmagic1 is &lt;5.32-7.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904485" version="1" comment="powerpc-utils is &lt;1.3.7.1-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882217" version="1" comment="liblzo2-2 is &lt;2.10-2.22 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494123" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494124" version="1" comment="python3 is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494125" version="1" comment="python3-base is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678603" version="1" comment="liblz4-1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887027" version="1" comment="docker is &lt;19.03.15_ce-6.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492821" version="1" comment="krb5 is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882142" version="1" comment="libevent-2_1-8 is &lt;2.1.8-2.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492790" version="1" comment="libzmq5 is &lt;4.2.3-3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493480" version="1" comment="libvirt-libs is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493127" version="1" comment="libssh4 is &lt;0.8.7-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493620" version="1" comment="curl is &lt;7.66.0-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493622" version="1" comment="libcurl4 is &lt;7.66.0-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887035" version="1" comment="rsync is &lt;3.1.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904464" version="1" comment="libgnutls30 is &lt;3.6.7-14.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882267" version="1" comment="libpcre1 is &lt;8.41-4.20 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882277" version="1" comment="libpcre2-8-0 is &lt;10.31-1.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882205" version="1" comment="libksba8 is &lt;1.3.5-2.14 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492455" version="1" comment="libjpeg8 is &lt;8.1.2-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490765" version="1" comment="cpio is &lt;2.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904456" version="1" comment="libblkid1 is &lt;2.33.1-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904457" version="1" comment="libfdisk1 is &lt;2.33.1-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904458" version="1" comment="libmount1 is &lt;2.33.1-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904459" version="1" comment="libsmartcols1 is &lt;2.33.1-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904460" version="1" comment="libuuid1 is &lt;2.33.1-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904461" version="1" comment="util-linux is &lt;2.33.1-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904462" version="1" comment="util-linux-systemd is &lt;2.33.1-4.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490191" version="1" comment="elfutils is &lt;0.168-4.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490194" version="1" comment="libasm1 is &lt;0.168-4.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490196" version="1" comment="libdw1 is &lt;0.168-4.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490199" version="1" comment="libebl-plugins is &lt;0.168-4.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490202" version="1" comment="libelf1 is &lt;0.168-4.5.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881923" version="1" comment="less is &lt;530-1.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492057" version="1" comment="libmspack0 is &lt;0.6-3.8.19 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493148" version="1" comment="sudo is &lt;1.8.22-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337724" version="1" comment="libpixman-1-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904430" version="1" comment="e2fsprogs is &lt;1.43.8-4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904431" version="1" comment="libcom_err2 is &lt;1.43.8-4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904432" version="1" comment="libext2fs2 is &lt;1.43.8-4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882499" version="1" comment="update-alternatives is &lt;1.19.0.4-2.48 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887056" version="1" comment="grep is &lt;3.1-4.3.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493735" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904465" version="1" comment="libldap-data is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492903" version="1" comment="libssh2-1 is &lt;1.9.0-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342637" version="1" comment="chrony is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348255" version="1" comment="chrony-pool-suse is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882167" version="1" comment="libidn11 is &lt;1.34-3.2.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882169" version="1" comment="libidn2-0 is &lt;2.2.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009897595" version="1" comment="python3-requests is &lt;2.20.1-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490140" version="1" comment="libtasn1 is &lt;4.13-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490141" version="1" comment="libtasn1-6 is &lt;4.13-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654598" version="1" comment="libpcre2-8-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882287" version="1" comment="libpolkit0 is &lt;0.116-1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882288" version="1" comment="polkit is &lt;0.116-1.51 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887067" version="1" comment="pam is &lt;1.3.0-6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904476" version="1" comment="libunwind is &lt;1.2.1-4.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624167" version="1" comment="libsqlite3-0 is &lt;3.36.0-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335190" version="1" comment="libsqlite3-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334819" version="1" comment="xen-libs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904454" version="1" comment="libaudit1 is &lt;2.8.1-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904455" version="1" comment="libauparse0 is &lt;2.8.1-12.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904477" version="1" comment="libvmtools0 is &lt;11.2.5-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904478" version="1" comment="open-vm-tools is &lt;11.2.5-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335684" version="1" comment="librados2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335686" version="1" comment="librbd1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654580" version="1" comment="libevent-2_1-8 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492703" version="1" comment="mozilla-nspr is &lt;4.25.1-3.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887076" version="1" comment="rpcbind is &lt;0.2.3-5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904471" version="1" comment="libsystemd0 is &lt;246.10-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904472" version="1" comment="libudev1 is &lt;246.10-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904473" version="1" comment="systemd is &lt;246.10-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904474" version="1" comment="systemd-sysvinit is &lt;246.10-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904475" version="1" comment="udev is &lt;246.10-2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492051" version="1" comment="libxslt1 is &lt;1.1.32-3.8.24 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490148" version="1" comment="libpng16-16 is &lt;1.6.34-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904481" version="1" comment="openssh is &lt;8.1p1-5.12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904442" version="1" comment="grub2 is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904443" version="1" comment="grub2-arm64-efi is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904444" version="1" comment="grub2-i386-pc is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904445" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904446" version="1" comment="grub2-s390x-emu is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904447" version="1" comment="grub2-snapper-plugin is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904448" version="1" comment="grub2-x86_64-efi is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904449" version="1" comment="grub2-x86_64-xen is &lt;2.04-9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493118" version="1" comment="libhogweed4 is &lt;3.4.1-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493121" version="1" comment="libnettle6 is &lt;3.4.1-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333938" version="1" comment="glibc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334828" version="1" comment="glibc-locale is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339499" version="1" comment="glibc-locale-base is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669024" version="1" comment="glibc is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669032" version="1" comment="glibc-locale is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669033" version="1" comment="glibc-locale-base is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336128" version="1" comment="libfreetype6 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881861" version="1" comment="gstreamer is &lt;1.16.2-1.53 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881865" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.2-1.53 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499082" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704997" version="1" comment="glibc is &lt;2.26-13.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704998" version="1" comment="glibc-locale is &lt;2.26-13.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704999" version="1" comment="glibc-locale-base is &lt;2.26-13.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334114" version="1" comment="perl is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336057" version="1" comment="perl-base is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881851" version="1" comment="libgraphite2-3 is &lt;1.3.11-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009897519" version="1" comment="libnghttp2-14 is &lt;1.40.0-1.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887094" version="1" comment="chrony is &lt;3.2-9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887096" version="1" comment="chrony-pool-suse is &lt;3.2-9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808877" version="1" comment="apparmor-abstractions is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337464" version="1" comment="apparmor-parser is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494159" version="1" comment="python3-salt is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494160" version="1" comment="salt is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494163" version="1" comment="salt-minion is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490359" version="1" comment="libbz2-1 is &lt;1.0.6-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655181" version="1" comment="dosfstools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009899804" version="1" comment="openslp is &lt;2.0.0-6.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009896811" version="1" comment="firewalld is &lt;0.5.5-4.24.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009896813" version="1" comment="python3-firewall is &lt;0.5.5-4.24.9 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904450" version="1" comment="kdump is &lt;0.9.0-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887100" version="1" comment="cracklib is &lt;2.9.7-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887102" version="1" comment="cracklib-dict-small is &lt;2.9.7-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887103" version="1" comment="libcrack2 is &lt;2.9.7-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904482" version="1" comment="policycoreutils is &lt;3.1-1.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904483" version="1" comment="policycoreutils-python-utils is &lt;3.1-1.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904484" version="1" comment="python3-policycoreutils is &lt;3.1-1.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336474" version="1" comment="libbluetooth3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904429" version="1" comment="dracut is &lt;049.1+suse.186.g320cc3d1-1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904486" version="1" comment="python3-urllib3 is &lt;1.24-9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881737" version="1" comment="libcairo2 is &lt;1.16.0-1.55 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009899807" version="1" comment="bash is &lt;4.4-9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009899811" version="1" comment="libreadline7 is &lt;7.0-9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493488" version="1" comment="libbluetooth3 is &lt;5.48-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904479" version="1" comment="libz1 is &lt;1.2.11-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494427" version="1" comment="containerd is &lt;1.3.9-5.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494431" version="1" comment="docker-runc is &lt;1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494419" version="1" comment="runc is &lt;1.0.0~rc10-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882254" version="1" comment="libopus0 is &lt;1.3.1-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654583" version="1" comment="libnl-config is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654584" version="1" comment="libnl3-200 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494097" version="1" comment="kernel-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904452" version="1" comment="kernel-rt is &lt;5.3.18-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009333988" version="1" comment="qemu is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335414" version="1" comment="qemu-arm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335214" version="1" comment="qemu-ipxe is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335244" version="1" comment="qemu-seabios is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335245" version="1" comment="qemu-sgabios is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335217" version="1" comment="qemu-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335218" version="1" comment="qemu-vgabios is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335246" version="1" comment="qemu-x86 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338955" version="1" comment="libfreebl3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338959" version="1" comment="libsoftokn3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338881" version="1" comment="mozilla-nss is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338964" version="1" comment="mozilla-nss-certs is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492107" version="1" comment="perl is &lt;5.26.1-7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492108" version="1" comment="perl-base is &lt;5.26.1-7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904451" version="1" comment="kernel-firmware is &lt;20200107-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475442" version="1" comment="vim-data-common is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655960" version="1" comment="vim-small is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659871" version="1" comment="iscsiuio is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659872" version="1" comment="libopeniscsiusr0_2_0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659873" version="1" comment="open-iscsi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493125" version="1" comment="python3-PyYAML is &lt;5.1.2-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347405" version="1" comment="python3-salt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347406" version="1" comment="salt is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347413" version="1" comment="salt-minion is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656852" version="1" comment="salt-transactional-update is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887126" version="1" comment="ucode-intel is &lt;20210216-2.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009210721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882406" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-4.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904427" version="1" comment="apparmor-parser is &lt;2.13.4-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655543" version="1" comment="libgnutls30 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334127" version="1" comment="libtasn1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336122" version="1" comment="libtasn1-6 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904480" version="1" comment="libzypp is &lt;17.25.6-3.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904502" version="1" comment="zypper is &lt;1.14.42-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904503" version="1" comment="zypper-needs-restarting is &lt;1.14.42-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009897606" version="1" comment="rpm is &lt;4.14.1-20.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347616" version="1" comment="rpm is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882062" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-1.26 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348236" version="1" comment="libruby2_5-2_5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348228" version="1" comment="ruby2.5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348239" version="1" comment="ruby2.5-stdlib is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009373564" version="1" comment="zypper is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654588" version="1" comment="zypper-needs-restarting is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656853" version="1" comment="python3-pyOpenSSL is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009899855" version="1" comment="gpg2 is &lt;2.2.5-4.14.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009216093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494403" version="1" comment="podman is &lt;2.1.1-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009887139" version="1" comment="podman-cni-config is &lt;2.1.1-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654591" version="1" comment="liblldp_clif1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654592" version="1" comment="open-lldp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904468" version="1" comment="libprocps7 is &lt;3.3.15-7.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904469" version="1" comment="procps is &lt;3.3.15-7.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336008" version="1" comment="libpng16-16 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492445" version="1" comment="libX11-6 is &lt;1.6.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904453" version="1" comment="libX11-data is &lt;1.6.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492449" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704936" version="1" comment="libmspack0 is &lt;0.6-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881730" version="1" comment="btrfsmaintenance is &lt;0.4.2-1.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882262" version="1" comment="libpango-1_0-0 is &lt;1.44.7+11-1.25 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904463" version="1" comment="libcontainers-common is &lt;20200727-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494057" version="1" comment="python3-distro is &lt;1.5.0-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504114" version="1" comment="python3-salt is &lt;3002.2-37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504115" version="1" comment="salt is &lt;3002.2-37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504120" version="1" comment="salt-minion is &lt;3002.2-37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504125" version="1" comment="salt-transactional-update is &lt;3002.2-37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489751" version="1" comment="libxkbcommon0 is &lt;0.8.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904434" version="1" comment="glib2-tools is &lt;2.62.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904435" version="1" comment="libgio-2_0-0 is &lt;2.62.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904436" version="1" comment="libglib-2_0-0 is &lt;2.62.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904437" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904438" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882521" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2908_55e924b8a842-4.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659879" version="1" comment="cni-plugins is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339036" version="1" comment="libcairo2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667510" version="1" comment="libmspack0 is &lt;0.6-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904433" version="1" comment="gettext-runtime is &lt;0.19.8.1-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490728" version="1" comment="libncurses6 is &lt;6.1-5.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490731" version="1" comment="ncurses-utils is &lt;6.1-5.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490733" version="1" comment="terminfo is &lt;6.1-5.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490734" version="1" comment="terminfo-base is &lt;6.1-5.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904496" version="1" comment="supportutils is &lt;3.1.9-5.24.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490530" version="1" comment="libsqlite3-0 is &lt;3.28.0-3.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705032" version="1" comment="tar is &lt;1.34-150000.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904470" version="1" comment="libsolv-tools is &lt;0.7.16-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705024" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676998" version="1" comment="libz1 is &lt;1.2.11-150000.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335465" version="1" comment="libgcrypt20 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009491587" version="1" comment="shadow is &lt;4.6-3.5.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334073" version="1" comment="elfutils is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335871" version="1" comment="libasm1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335872" version="1" comment="libdw1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659704" version="1" comment="libebl-plugins is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335876" version="1" comment="libelf1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489337" version="1" comment="libzstd1 is &lt;1.4.4-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335952" version="1" comment="libssh2-1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338972" version="1" comment="dnsmasq is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708029" version="1" comment="shim is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658281" version="1" comment="kernel-firmware is &lt;20200107-3.23.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658282" version="1" comment="ucode-amd is &lt;20200107-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704898" version="1" comment="qemu is &lt;4.2.1-11.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499897" version="1" comment="qemu-arm is &lt;4.2.1-11.19.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499905" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499911" version="1" comment="qemu-seabios is &lt;1.12.1+-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499912" version="1" comment="qemu-sgabios is &lt;8-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704899" version="1" comment="qemu-tools is &lt;4.2.1-11.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499916" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499917" version="1" comment="qemu-x86 is &lt;4.2.1-11.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490606" version="1" comment="liblz4-1 is &lt;1.8.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704876" version="1" comment="libfribidi0 is &lt;1.0.5-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704857" version="1" comment="kernel-default is &lt;5.3.18-24.61.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704858" version="1" comment="kernel-default-base is &lt;5.3.18-24.61.1.9.26.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009620089" version="1" comment="kernel-rt is &lt;5.3.18-8.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655560" version="1" comment="python3-psutil is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336106" version="1" comment="libsolv-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904499" version="1" comment="wicked is &lt;0.6.64-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904500" version="1" comment="wicked-service is &lt;0.6.64-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629441" version="1" comment="libesmtp is &lt;1.0.6-150.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492024" version="1" comment="libbsd0 is &lt;0.8.7-3.3.17 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339120" version="1" comment="iproute2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704972" version="1" comment="libpcre1 is &lt;8.45-20.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882473" version="1" comment="python3-setuptools is &lt;40.5.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624613" version="1" comment="kernel-rt is &lt;4.12.14-10.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494044" version="1" comment="permissions is &lt;20181224-23.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009882422" version="1" comment="nfs-client is &lt;2.1.1-10.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009897189" version="1" comment="libgbm1 is &lt;19.3.4-45.23 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009215439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334285" version="1" comment="openslp is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490511" version="1" comment="liblua5_3-5 is &lt;5.3.4-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494397" version="1" comment="slirp4netns is &lt;0.4.7-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490528" version="1" comment="libseccomp2 is &lt;2.4.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881867" version="1" comment="gstreamer-plugins-base is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881870" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881871" version="1" comment="libgstapp-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881872" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881874" version="1" comment="libgstgl-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881875" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881876" version="1" comment="libgstriff-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881880" version="1" comment="libgsttag-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881881" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.2-2.12 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009904428" version="1" comment="cni-plugins is &lt;0.8.6-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009217017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705014" version="1" comment="libnghttp2-14 is &lt;1.40.0-3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704937" version="1" comment="dbus-1 is &lt;1.12.2-8.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704938" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.11.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705005" version="1" comment="kernel-default is &lt;5.3.18-24.52.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705006" version="1" comment="kernel-default-base is &lt;5.3.18-24.52.1.9.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632956" version="1" comment="libfreebl3 is &lt;3.68-3.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632960" version="1" comment="libsoftokn3 is &lt;3.68-3.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632964" version="1" comment="mozilla-nspr is &lt;4.32-3.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632967" version="1" comment="mozilla-nss is &lt;3.68-3.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632969" version="1" comment="mozilla-nss-certs is &lt;3.68-3.56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664167" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704945" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704859" version="1" comment="qemu is &lt;4.2.1-11.16.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499829" version="1" comment="qemu-arm is &lt;4.2.1-11.16.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499837" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499843" version="1" comment="qemu-seabios is &lt;1.12.1+-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499844" version="1" comment="qemu-sgabios is &lt;8-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704860" version="1" comment="qemu-tools is &lt;4.2.1-11.16.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499848" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499849" version="1" comment="qemu-x86 is &lt;4.2.1-11.16.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705033" version="1" comment="qemu is &lt;4.2.1-11.34.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705034" version="1" comment="qemu-arm is &lt;4.2.1-11.34.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667529" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667533" version="1" comment="qemu-seabios is &lt;1.12.1+-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667534" version="1" comment="qemu-sgabios is &lt;8-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705035" version="1" comment="qemu-tools is &lt;4.2.1-11.34.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667539" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667540" version="1" comment="qemu-x86 is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705002" version="1" comment="glib-networking is &lt;2.62.4-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492636" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492650" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705047" version="1" comment="iscsiuio is &lt;0.7.8.6-22.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705048" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.1.4-22.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705049" version="1" comment="open-iscsi is &lt;2.1.4-22.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653320" version="1" comment="dnsmasq is &lt;2.86-7.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009511395" version="1" comment="python3-PyYAML is &lt;5.3.1-6.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009120651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009348261" version="1" comment="liblua5_3-5 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704903" version="1" comment="libjpeg8 is &lt;8.1.2-5.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704904" version="1" comment="liblua5_3-5 is &lt;5.3.6-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494035" version="1" comment="ucode-intel is &lt;20210525-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704896" version="1" comment="kernel-default is &lt;5.3.18-24.67.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704897" version="1" comment="kernel-default-base is &lt;5.3.18-24.67.3.9.30.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498554" version="1" comment="kernel-rt is &lt;5.3.18-8.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492610" version="1" comment="libproxy1 is &lt;0.4.15-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503809" version="1" comment="libruby2_5-2_5 is &lt;2.5.8-4.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503810" version="1" comment="ruby2.5 is &lt;2.5.8-4.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503813" version="1" comment="ruby2.5-stdlib is &lt;2.5.8-4.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626945" version="1" comment="python3-asn1crypto is &lt;0.24.0-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704939" version="1" comment="python3-cffi is &lt;1.13.2-3.2.5 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704940" version="1" comment="python3-cryptography is &lt;2.8-10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626950" version="1" comment="python3-pyOpenSSL is &lt;17.5.0-8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626951" version="1" comment="python3-pyasn1 is &lt;0.4.2-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626952" version="1" comment="python3-pycparser is &lt;2.17-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626953" version="1" comment="python3-urllib3 is &lt;1.25.10-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704907" version="1" comment="kernel-default is &lt;5.3.18-24.70.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704908" version="1" comment="kernel-default-base is &lt;5.3.18-24.70.1.9.32.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664563" version="1" comment="kernel-default is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664564" version="1" comment="kernel-default-base is &lt;5.3.18-24.99.1.9.46.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658974" version="1" comment="kernel-rt is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672628" version="1" comment="slirp4netns is &lt;0.4.7-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659809" version="1" comment="libp11-kit0 is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659810" version="1" comment="p11-kit is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659813" version="1" comment="p11-kit-tools is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494015" version="1" comment="python3-py is &lt;1.8.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704934" version="1" comment="qemu is &lt;4.2.1-11.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630345" version="1" comment="qemu-arm is &lt;4.2.1-11.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630353" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630359" version="1" comment="qemu-seabios is &lt;1.12.1+-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630360" version="1" comment="qemu-sgabios is &lt;8-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704935" version="1" comment="qemu-tools is &lt;4.2.1-11.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630364" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630365" version="1" comment="qemu-x86 is &lt;4.2.1-11.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615809" version="1" comment="dbus-1 is &lt;1.12.2-8.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615812" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704954" version="1" comment="kernel-default is &lt;5.3.18-24.86.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704955" version="1" comment="kernel-default-base is &lt;5.3.18-24.86.2.9.40.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651689" version="1" comment="kernel-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704956" version="1" comment="kmod is &lt;25-6.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704957" version="1" comment="kmod-compat is &lt;25-6.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704958" version="1" comment="libkmod2 is &lt;25-6.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704959" version="1" comment="perl-Bootloader is &lt;0.931-3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334435" version="1" comment="docker is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669993" version="1" comment="kernel-firmware is &lt;20200107-3.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669994" version="1" comment="ucode-amd is &lt;20200107-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632243" version="1" comment="xen-libs is &lt;4.13.3_02-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667863" version="1" comment="ucode-intel is &lt;20220207-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338728" version="1" comment="ucode-intel is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679192" version="1" comment="kernel-default is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679193" version="1" comment="kernel-default-base is &lt;5.3.18-150200.24.112.1.150200.9.52.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679475" version="1" comment="kernel-rt is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705000" version="1" comment="kernel-default is &lt;5.3.18-24.96.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705001" version="1" comment="kernel-default-base is &lt;5.3.18-24.96.1.9.44.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704902" version="1" comment="libspice-server1 is &lt;0.14.2-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705015" version="1" comment="libgnutls30 is &lt;3.6.7-14.10.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704952" version="1" comment="python3-rpm is &lt;4.14.1-22.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704953" version="1" comment="rpm is &lt;4.14.1-22.4.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503185" version="1" comment="libhogweed4 is &lt;3.4.1-4.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503187" version="1" comment="libnettle6 is &lt;3.4.1-4.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504109" version="1" comment="containerd is &lt;1.4.4-5.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504110" version="1" comment="docker is &lt;20.10.6_ce-6.49.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504111" version="1" comment="runc is &lt;1.0.0~rc93-1.14.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704932" version="1" comment="kernel-default is &lt;5.3.18-24.78.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704933" version="1" comment="kernel-default-base is &lt;5.3.18-24.78.1.9.36.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628046" version="1" comment="kernel-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704973" version="1" comment="python3-salt is &lt;3002.2-49.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704974" version="1" comment="salt is &lt;3002.2-49.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704975" version="1" comment="salt-minion is &lt;3002.2-49.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704976" version="1" comment="salt-transactional-update is &lt;3002.2-49.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704910" version="1" comment="kernel-default is &lt;5.3.18-24.75.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704911" version="1" comment="kernel-default-base is &lt;5.3.18-24.75.3.9.34.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626892" version="1" comment="kernel-rt is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705023" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667498" version="1" comment="kernel-default is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667499" version="1" comment="kernel-default-base is &lt;5.3.18-24.102.1.9.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668286" version="1" comment="kernel-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704853" version="1" comment="curl is &lt;7.66.0-4.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704854" version="1" comment="libcurl4 is &lt;7.66.0-4.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704879" version="1" comment="curl is &lt;7.66.0-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704880" version="1" comment="libcurl4 is &lt;7.66.0-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704912" version="1" comment="curl is &lt;7.66.0-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704913" version="1" comment="libcurl4 is &lt;7.66.0-4.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704950" version="1" comment="curl is &lt;7.66.0-4.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704951" version="1" comment="libcurl4 is &lt;7.66.0-4.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705016" version="1" comment="libpython3_6m1_0 is &lt;3.6.13-3.78.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705017" version="1" comment="python3 is &lt;3.6.13-3.78.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705018" version="1" comment="python3-base is &lt;3.6.13-3.78.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705007" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705008" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503123" version="1" comment="mozilla-nspr is &lt;4.25.1-3.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705019" version="1" comment="libzstd1 is &lt;1.4.4-1.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680342" version="1" comment="xen-libs is &lt;4.13.4_08-150200.3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705009" version="1" comment="glib2-tools is &lt;2.62.6-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705010" version="1" comment="libgio-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705011" version="1" comment="libglib-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705012" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705013" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705027" version="1" comment="glib2-tools is &lt;2.62.6-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705028" version="1" comment="libgio-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705029" version="1" comment="libglib-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705030" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705031" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-150200.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493665" version="1" comment="xen-libs is &lt;4.13.2_08-3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633428" version="1" comment="xen-libs is &lt;4.13.3_04-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658528" version="1" comment="xen-libs is &lt;4.13.4_02-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658985" version="1" comment="kernel-rt is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704861" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704862" version="1" comment="ruby2.5 is &lt;2.5.9-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704863" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704870" version="1" comment="kernel-default is &lt;5.3.18-24.64.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704871" version="1" comment="kernel-default-base is &lt;5.3.18-24.64.1.9.28.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498544" version="1" comment="kernel-rt is &lt;5.3.18-8.10.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704856" version="1" comment="wpa_supplicant is &lt;2.9-4.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651737" version="1" comment="containerd is &lt;1.4.11-56.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651738" version="1" comment="docker is &lt;20.10.9_ce-156.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651739" version="1" comment="runc is &lt;1.0.2-23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503414" version="1" comment="libX11-6 is &lt;1.6.5-3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494026" version="1" comment="libX11-data is &lt;1.6.5-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503416" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503164" version="1" comment="sudo is &lt;1.8.22-4.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680329" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680330" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680333" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704883" version="1" comment="gstreamer is &lt;1.16.3-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704884" version="1" comment="gstreamer-plugins-base is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704885" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704886" version="1" comment="libgstapp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704887" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704888" version="1" comment="libgstgl-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704889" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704890" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.3-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704891" version="1" comment="libgstriff-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704892" version="1" comment="libgsttag-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704893" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009504140" version="1" comment="libgcrypt20 is &lt;1.8.2-8.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634576" version="1" comment="glibc is &lt;2.26-13.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634580" version="1" comment="glibc-locale is &lt;2.26-13.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634581" version="1" comment="glibc-locale-base is &lt;2.26-13.59.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009477296" version="1" comment="libfuse3-3 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660091" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-3.91.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660092" version="1" comment="python3 is &lt;3.6.15-3.91.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660093" version="1" comment="python3-base is &lt;3.6.15-3.91.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705020" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705021" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704948" version="1" comment="kernel-default is &lt;5.3.18-24.83.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704949" version="1" comment="kernel-default-base is &lt;5.3.18-24.83.2.9.38.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633320" version="1" comment="kernel-rt is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704877" version="1" comment="libhivex0 is &lt;1.3.14-5.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704878" version="1" comment="perl-Win-Hivex is &lt;1.3.14-5.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601181" version="1" comment="librados2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601182" version="1" comment="librbd1 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704874" version="1" comment="libxml2-2 is &lt;2.9.7-3.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704875" version="1" comment="libxml2-tools is &lt;2.9.7-3.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503309" version="1" comment="liblz4-1 is &lt;1.8.0-3.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704900" version="1" comment="libxml2-2 is &lt;2.9.7-3.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704901" version="1" comment="libxml2-tools is &lt;2.9.7-3.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704995" version="1" comment="kernel-default is &lt;5.3.18-24.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704996" version="1" comment="kernel-default-base is &lt;5.3.18-24.93.1.9.42.5 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651700" version="1" comment="kernel-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704905" version="1" comment="qemu is &lt;4.2.1-11.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499926" version="1" comment="qemu-arm is &lt;4.2.1-11.22.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499934" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499940" version="1" comment="qemu-seabios is &lt;1.12.1+-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499941" version="1" comment="qemu-sgabios is &lt;8-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704906" version="1" comment="qemu-tools is &lt;4.2.1-11.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499945" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499946" version="1" comment="qemu-x86 is &lt;4.2.1-11.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704894" version="1" comment="libpolkit0 is &lt;0.116-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704895" version="1" comment="polkit is &lt;0.116-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503543" version="1" comment="libhogweed4 is &lt;3.4.1-4.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009503545" version="1" comment="libnettle6 is &lt;3.4.1-4.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704930" version="1" comment="qemu is &lt;4.2.1-11.25.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626240" version="1" comment="qemu-arm is &lt;4.2.1-11.25.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626248" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626254" version="1" comment="qemu-seabios is &lt;1.12.1+-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626255" version="1" comment="qemu-sgabios is &lt;8-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704931" version="1" comment="qemu-tools is &lt;4.2.1-11.25.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626259" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626260" version="1" comment="qemu-x86 is &lt;4.2.1-11.25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704946" version="1" comment="libhivex0 is &lt;1.3.14-5.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704947" version="1" comment="perl-Win-Hivex is &lt;1.3.14-5.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626718" version="1" comment="krb5 is &lt;1.16.3-3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704914" version="1" comment="libvirt-daemon is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704915" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704916" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704917" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704918" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704919" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704920" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704921" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704922" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704923" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704924" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704925" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704926" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624910" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704927" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704928" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704929" version="1" comment="libvirt-libs is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336436" version="1" comment="libssh4 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704977" version="1" comment="libvirt-daemon is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704978" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704979" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704980" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704981" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704982" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704983" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704984" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704985" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704986" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704987" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704988" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704989" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652326" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704990" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704991" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704992" version="1" comment="libvirt-libs is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878275" version="1" comment="libusbredirparser1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704941" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704942" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704943" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704944" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704993" version="1" comment="qemu is &lt;4.2.1-11.31.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652933" version="1" comment="qemu-arm is &lt;4.2.1-11.31.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652941" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652947" version="1" comment="qemu-seabios is &lt;1.12.1+-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652948" version="1" comment="qemu-sgabios is &lt;8-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704994" version="1" comment="qemu-tools is &lt;4.2.1-11.31.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652952" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652953" version="1" comment="qemu-x86 is &lt;4.2.1-11.31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704965" version="1" comment="libblkid1 is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704966" version="1" comment="libfdisk1 is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704967" version="1" comment="libmount1 is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704968" version="1" comment="libsmartcols1 is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704969" version="1" comment="libuuid1 is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704970" version="1" comment="util-linux is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704971" version="1" comment="util-linux-systemd is &lt;2.33.2-4.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704960" version="1" comment="krb5 is &lt;1.16.3-3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669883" version="1" comment="vim-data-common is &lt;8.0.1568-5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705042" version="1" comment="vim-small is &lt;8.0.1568-5.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336707" version="1" comment="glib2-tools is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336708" version="1" comment="libgio-2_0-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336711" version="1" comment="libglib-2_0-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336713" version="1" comment="libgmodule-2_0-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336715" version="1" comment="libgobject-2_0-0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631310" version="1" comment="cpio is &lt;2.12-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704961" version="1" comment="libncurses6 is &lt;6.1-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704962" version="1" comment="ncurses-utils is &lt;6.1-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704963" version="1" comment="terminfo is &lt;6.1-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704964" version="1" comment="terminfo-base is &lt;6.1-5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662009" version="1" comment="libvirt-daemon is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662012" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662015" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662016" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662017" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662018" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662019" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662020" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662021" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662022" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662023" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662024" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662025" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662026" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662027" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662030" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662034" version="1" comment="libvirt-libs is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338902" version="1" comment="grub2 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339065" version="1" comment="grub2-arm64-efi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338904" version="1" comment="grub2-i386-pc is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338906" version="1" comment="grub2-snapper-plugin is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338908" version="1" comment="grub2-x86_64-efi is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338909" version="1" comment="grub2-x86_64-xen is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337634" version="1" comment="libblkid1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664921" version="1" comment="libfdisk1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664923" version="1" comment="libmount1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664926" version="1" comment="libsmartcols1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009337635" version="1" comment="libuuid1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334326" version="1" comment="util-linux is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009336434" version="1" comment="libsystemd0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335309" version="1" comment="libudev1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009334001" version="1" comment="systemd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624596" version="1" comment="systemd-container is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335313" version="1" comment="systemd-sysvinit is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335314" version="1" comment="udev is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343329" version="1" comment="podman is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343330" version="1" comment="podman-cni-config is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664559" version="1" comment="libpolkit0 is &lt;0.116-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664560" version="1" comment="polkit is &lt;0.116-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662947" version="1" comment="kernel-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705036" version="1" comment="containerd is &lt;1.4.12-60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705037" version="1" comment="docker is &lt;20.10.12_ce-159.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705038" version="1" comment="libpolkit0 is &lt;0.116-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705039" version="1" comment="polkit is &lt;0.116-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339165" version="1" comment="cryptsetup is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009339166" version="1" comment="libcryptsetup12 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671497" version="1" comment="openssh is &lt;8.1p1-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705040" version="1" comment="libgnutls30 is &lt;3.6.7-14.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658530" version="1" comment="python3-Babel is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659044" version="1" comment="libfreebl3 is &lt;3.68.1-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659046" version="1" comment="libsoftokn3 is &lt;3.68.1-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659048" version="1" comment="mozilla-nss is &lt;3.68.1-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659049" version="1" comment="mozilla-nss-certs is &lt;3.68.1-3.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681381" version="1" comment="containerd is &lt;1.5.11-150000.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681382" version="1" comment="docker is &lt;20.10.14_ce-150000.163.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705003" version="1" comment="libgmp10 is &lt;6.1.2-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659270" version="1" comment="runc is &lt;1.0.3-27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663792" version="1" comment="containerd is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671505" version="1" comment="kernel-default is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671506" version="1" comment="kernel-default-base is &lt;5.3.18-24.107.1.9.50.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338893" version="1" comment="libharfbuzz0 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664062" version="1" comment="libexpat1 is &lt;2.2.5-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671417" version="1" comment="kernel-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667314" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009705025" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673279" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673282" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679488" version="1" comment="dnsmasq is &lt;2.86-150100.7.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678060" version="1" comment="libfreebl3 is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678062" version="1" comment="libsoftokn3 is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678064" version="1" comment="mozilla-nss is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678065" version="1" comment="mozilla-nss-certs is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682445" version="1" comment="gzip is &lt;1.10-150200.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679181" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679182" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682231" version="1" comment="e2fsprogs is &lt;1.43.8-150000.4.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682235" version="1" comment="libcom_err2 is &lt;1.43.8-150000.4.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682238" version="1" comment="libext2fs2 is &lt;1.43.8-150000.4.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009684924" version="1" comment="logrotate is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335823" version="1" comment="libpcre1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680833" version="1" comment="python3-salt is &lt;3002.2-150200.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680834" version="1" comment="salt is &lt;3002.2-150200.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680841" version="1" comment="salt-minion is &lt;3002.2-150200.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681002" version="1" comment="salt-transactional-update is &lt;3002.2-150200.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665606" version="1" comment="xen-libs is &lt;4.13.4_04-3.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669199" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665462" version="1" comment="libexpat1 is &lt;2.2.5-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669200" version="1" comment="cyrus-sasl is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669205" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669214" version="1" comment="libsasl2-3 is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669765" version="1" comment="libexpat1 is &lt;2.2.5-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671238" version="1" comment="libexpat1 is &lt;2.2.5-3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625089" version="1" comment="libgcc_s1 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625100" version="1" comment="libstdc++6 is ==0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960518" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009335442" version="1" comment="libcairo2 is &gt;0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338032" version="1" comment="kernel-default is &gt;0" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009079459"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE-MicroOS-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-abstractions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnl3-200</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblldp_clif1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-lldp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iproute2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmod2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Bootloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbredirparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptsetup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptsetup12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5.0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.10-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.27-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.108-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.0-4.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+git.e66999f-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.29-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_06-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.7-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32-7.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.7.1-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-3.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.15_ce-6.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.8-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.41-4.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.31-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.1-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.1-4.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.168-4.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:530-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-2.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-4.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.20.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-4.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.1-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.2.5-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:246.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.32-3.8.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.34-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.11-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-4.24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:049.1+suse.186.g320cc3d1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-5.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc10+gitr3981_dc9208a3303f-6.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc10-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009210721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210216-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.25.6-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.42-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009216093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-7.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.7+11-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200727-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2908_55e924b8a842-4.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.9-5.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.16-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-3.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1.9.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.64-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-150.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-3.3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.5.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-10.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181224-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009215439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.3.4-45.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.4-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009217017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1.9.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.32-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.6-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-22.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009120651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3.9.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-3.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1.9.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1.9.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2.9.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.931-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_02-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1.150200.9.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1.9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-22.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-22.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-6.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc93-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1.9.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3.9.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1.9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.13-3.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_08-150200.3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_08-3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_04-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_02-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1.9.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-3.91.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-3.91.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2.9.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1.9.42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.12-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.12_ce-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.11-150000.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.14_ce-150000.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1.9.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-150200.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.8-150000.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150200.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_04-3.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009079459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than">0:0-0</evr>
  </rpminfo_state>
</states>
</oval_definitions>
